-
Minimal-norm solution to the Fredholm integral equations of the first kind via the H-HK formulation
Authors:
Renjun Qiu,
Ming Xu,
Wei Qu
Abstract:
The Fredholm integral equations of the first kind is a typical ill-posed problem, so that it is usually difficult to obtain its analytical minimal-norm solution. This paper gives a closed-form minimal-norm solution for the degenerate kernel equations based on the H-HK formulation. Furthermore, it has been shown that the structure of solutions to degenerate kernel equations and matrix equations are…
▽ More
The Fredholm integral equations of the first kind is a typical ill-posed problem, so that it is usually difficult to obtain its analytical minimal-norm solution. This paper gives a closed-form minimal-norm solution for the degenerate kernel equations based on the H-HK formulation. Furthermore, it has been shown that the structure of solutions to degenerate kernel equations and matrix equations are consistent. Subsequently, the obtained results are extended to non-degenerate integral equations. Finally, the validity and applicability of the proposed method are demonstrated by some examples.
△ Less
Submitted 11 June, 2024;
originally announced June 2024.
-
A novel fourth-order scheme for two-dimensional Riesz space fractional nonlinear reaction-diffusion equations and its optimal preconditioned solver
Authors:
Wei Qu,
Yuan-Yuan Huang,
Sean Hon,
Siu-Long Lei
Abstract:
A novel fourth-order finite difference formula coupling the Crank-Nicolson explicit linearized method is proposed to solve Riesz space fractional nonlinear reaction-diffusion equations in two dimensions. Theoretically, under the Lipschitz assumption on the nonlinear term, the proposed high-order scheme is proved to be unconditionally stable and convergent in the discrete $L_2$-norm. Moreover, a…
▽ More
A novel fourth-order finite difference formula coupling the Crank-Nicolson explicit linearized method is proposed to solve Riesz space fractional nonlinear reaction-diffusion equations in two dimensions. Theoretically, under the Lipschitz assumption on the nonlinear term, the proposed high-order scheme is proved to be unconditionally stable and convergent in the discrete $L_2$-norm. Moreover, a $τ$-matrix based preconditioner is developed to speed up the convergence of the conjugate gradient method with an optimal convergence rate (a convergence rate independent of mesh sizes) for solving the symmetric discrete linear system. Theoretical analysis shows that the spectra of the preconditioned matrices are uniformly bounded in the open interval $(3/8,2)$. To the best of our knowledge, this is the first attempt to develop a preconditioned iterative solver with a mesh-independent convergence rate for the linearized high-order scheme. Numerical examples are given to validate the accuracy of the scheme and the effectiveness of the proposed preconditioned solver.
△ Less
Submitted 5 May, 2024;
originally announced May 2024.
-
Provably Robust Multi-bit Watermarking for AI-generated Text via Error Correction Code
Authors:
Wenjie Qu,
Dong Yin,
Zixin He,
Wei Zou,
Tianyang Tao,
**yuan Jia,
Jiaheng Zhang
Abstract:
Large Language Models (LLMs) have been widely deployed for their remarkable capability to generate texts resembling human language. However, they could be misused by criminals to create deceptive content, such as fake news and phishing emails, which raises ethical concerns. Watermarking is a key technique to mitigate the misuse of LLMs, which embeds a watermark (e.g., a bit string) into a text gen…
▽ More
Large Language Models (LLMs) have been widely deployed for their remarkable capability to generate texts resembling human language. However, they could be misused by criminals to create deceptive content, such as fake news and phishing emails, which raises ethical concerns. Watermarking is a key technique to mitigate the misuse of LLMs, which embeds a watermark (e.g., a bit string) into a text generated by a LLM. Consequently, this enables the detection of texts generated by a LLM as well as the tracing of generated texts to a specific user. The major limitation of existing watermark techniques is that they cannot accurately or efficiently extract the watermark from a text, especially when the watermark is a long bit string. This key limitation impedes their deployment for real-world applications, e.g., tracing generated texts to a specific user.
This work introduces a novel watermarking method for LLM-generated text grounded in \textbf{error-correction codes} to address this challenge. We provide strong theoretical analysis, demonstrating that under bounded adversarial word/token edits (insertion, deletion, and substitution), our method can correctly extract watermarks, offering a provable robustness guarantee. This breakthrough is also evidenced by our extensive experimental results. The experiments show that our method substantially outperforms existing baselines in both accuracy and robustness on benchmark datasets. For instance, when embedding a bit string of length 12 into a 200-token generated text, our approach attains an impressive match rate of $98.4\%$, surpassing the performance of Yoo et al. (state-of-the-art baseline) at $85.6\%$. When subjected to a copy-paste attack involving the injection of 50 tokens to generated texts with 200 words, our method maintains a substantial match rate of $90.8\%$, while the match rate of Yoo et al. diminishes to below $65\%$.
△ Less
Submitted 15 April, 2024; v1 submitted 30 January, 2024;
originally announced January 2024.
-
OFDM Reference Signal Pattern Design Criteria for Integrated Communication and Sensing
Authors:
Rui Zhang,
Shawn Tsai,
Tzu-Han Chou,
Jiaying Ren,
Wenze Qu,
Oliver Sun
Abstract:
Ambiguity performance, which indicates the maximum detectable region for target parameter estimation, is critical to radar sensor design. Driven by ambiguity performance requirements of bi-static sensing, we propose design criteria for orthogonal frequency division multiplexing (OFDM) reference signal (RS) patterns. The design not only reduces ambiguities in both time delay and Doppler shift domai…
▽ More
Ambiguity performance, which indicates the maximum detectable region for target parameter estimation, is critical to radar sensor design. Driven by ambiguity performance requirements of bi-static sensing, we propose design criteria for orthogonal frequency division multiplexing (OFDM) reference signal (RS) patterns. The design not only reduces ambiguities in both time delay and Doppler shift domains under different types of sensing algorithms, but also reduces resource overhead for integrated comunication and sensing. With minimal modifications of post-FFT processing for current RS patterns, guard interval is extended beyond conventional cyclic prefix (CP), while maintaining inter-symbol-interference-(ISI)-free delay estimation. For standard-resolution sensing algorithms, a staggering offset of a linear slope that is relatively prime to the RS comb size is suggested. As for high-resolution sensing algorithms, necessary and sufficient conditions of comb RS staggering offsets, plus new patterns synthesized therefrom, are derived for the corresponding achievable ambiguity performance. Furthermore, we generalize the RS pattern design criterion for high-resolution sensing algorithms to irregular forms, which minimizes number of resource elements (REs) for associated algorithms to eliminate all side peaks. Starting from staggered comb pattern in current positioning RS, our generalized design eventually removes any regular form for ultimate flexibility. Overall, the proposed techniques are promising to extend the ISI- and ambiguity-free range of distance and speed estimates for radar sensing.
△ Less
Submitted 25 April, 2024; v1 submitted 17 January, 2024;
originally announced January 2024.
-
Spectral integrated neural networks (SINNs) for solving forward and inverse dynamic problems
Authors:
Lin Qiu,
Fajie Wang,
Wenzhen Qu,
Yan Gu,
Qing-Hua Qin
Abstract:
This paper proposes a novel neural network framework, denoted as spectral integrated neural networks (SINNs), for resolving three-dimensional forward and inverse dynamic problems. In the SINNs, the spectral integration method is applied to perform temporal discretization, and then a fully connected neural network is adopted to solve resulting partial differential equations (PDEs) in the spatial do…
▽ More
This paper proposes a novel neural network framework, denoted as spectral integrated neural networks (SINNs), for resolving three-dimensional forward and inverse dynamic problems. In the SINNs, the spectral integration method is applied to perform temporal discretization, and then a fully connected neural network is adopted to solve resulting partial differential equations (PDEs) in the spatial domain. Specifically, spatial coordinates are employed as inputs in the network architecture, and the output layer is configured with multiple outputs, each dedicated to approximating solutions at different time instances characterized by Gaussian points used in the spectral method. By leveraging the automatic differentiation technique and spectral integration scheme, the SINNs minimize the loss function, constructed based on the governing PDEs and boundary conditions, to obtain solutions for dynamic problems. Additionally, we utilize polynomial basis functions to expand the unknown function, aiming to enhance the performance of SINNs in addressing inverse problems. The conceived framework is tested on six forward and inverse dynamic problems, involving nonlinear PDEs. Numerical results demonstrate the superior performance of SINNs over the popularly used physics-informed neural networks in terms of convergence speed, computational accuracy and efficiency. It is also noteworthy that the SINNs exhibit the capability to deliver accurate and stable solutions for long-time dynamic problems.
△ Less
Submitted 7 January, 2024;
originally announced January 2024.
-
A Conditional Denoising Diffusion Probabilistic Model for Point Cloud Upsampling
Authors:
Wentao Qu,
Yuantian Shao,
Lingwu Meng,
Xiaoshui Huang,
Liang Xiao
Abstract:
Point cloud upsampling (PCU) enriches the representation of raw point clouds, significantly improving the performance in downstream tasks such as classification and reconstruction. Most of the existing point cloud upsampling methods focus on sparse point cloud feature extraction and upsampling module design. In a different way, we dive deeper into directly modelling the gradient of data distributi…
▽ More
Point cloud upsampling (PCU) enriches the representation of raw point clouds, significantly improving the performance in downstream tasks such as classification and reconstruction. Most of the existing point cloud upsampling methods focus on sparse point cloud feature extraction and upsampling module design. In a different way, we dive deeper into directly modelling the gradient of data distribution from dense point clouds. In this paper, we proposed a conditional denoising diffusion probability model (DDPM) for point cloud upsampling, called PUDM. Specifically, PUDM treats the sparse point cloud as a condition, and iteratively learns the transformation relationship between the dense point cloud and the noise. Simultaneously, PUDM aligns with a dual map** paradigm to further improve the discernment of point features. In this context, PUDM enables learning complex geometry details in the ground truth through the dominant features, while avoiding an additional upsampling module design. Furthermore, to generate high-quality arbitrary-scale point clouds during inference, PUDM exploits the prior knowledge of the scale between sparse point clouds and dense point clouds during training by parameterizing a rate factor. Moreover, PUDM exhibits strong noise robustness in experimental results. In the quantitative and qualitative evaluations on PU1K and PUGAN, PUDM significantly outperformed existing methods in terms of Chamfer Distance (CD) and Hausdorff Distance (HD), achieving state of the art (SOTA) performance.
△ Less
Submitted 3 December, 2023;
originally announced December 2023.
-
Novel-view Synthesis and Pose Estimation for Hand-Object Interaction from Sparse Views
Authors:
Wentian Qu,
Zhaopeng Cui,
Yinda Zhang,
Chenyu Meng,
Cuixia Ma,
Xiaoming Deng,
Hongan Wang
Abstract:
Hand-object interaction understanding and the barely addressed novel view synthesis are highly desired in the immersive communication, whereas it is challenging due to the high deformation of hand and heavy occlusions between hand and object. In this paper, we propose a neural rendering and pose estimation system for hand-object interaction from sparse views, which can also enable 3D hand-object i…
▽ More
Hand-object interaction understanding and the barely addressed novel view synthesis are highly desired in the immersive communication, whereas it is challenging due to the high deformation of hand and heavy occlusions between hand and object. In this paper, we propose a neural rendering and pose estimation system for hand-object interaction from sparse views, which can also enable 3D hand-object interaction editing. We share the inspiration from recent scene understanding work that shows a scene specific model built beforehand can significantly improve and unblock vision tasks especially when inputs are sparse, and extend it to the dynamic hand-object interaction scenario and propose to solve the problem in two stages. We first learn the shape and appearance prior knowledge of hands and objects separately with the neural representation at the offline stage. During the online stage, we design a rendering-based joint model fitting framework to understand the dynamic hand-object interaction with the pre-built hand and object models as well as interaction priors, which thereby overcomes penetration and separation issues between hand and object and also enables novel view synthesis. In order to get stable contact during the hand-object interaction process in a sequence, we propose a stable contact loss to make the contact region to be consistent. Experiments demonstrate that our method outperforms the state-of-the-art methods. Code and dataset are available in project webpage https://iscas3dv.github.io/HO-NeRF.
△ Less
Submitted 22 August, 2023;
originally announced August 2023.
-
VQGraph: Rethinking Graph Representation Space for Bridging GNNs and MLPs
Authors:
Ling Yang,
Ye Tian,
Minkai Xu,
Zhongyi Liu,
Shenda Hong,
Wei Qu,
Wentao Zhang,
Bin Cui,
Muhan Zhang,
Jure Leskovec
Abstract:
GNN-to-MLP distillation aims to utilize knowledge distillation (KD) to learn computationally-efficient multi-layer perceptron (student MLP) on graph data by mimicking the output representations of teacher GNN. Existing methods mainly make the MLP to mimic the GNN predictions over a few class labels. However, the class space may not be expressive enough for covering numerous diverse local graph str…
▽ More
GNN-to-MLP distillation aims to utilize knowledge distillation (KD) to learn computationally-efficient multi-layer perceptron (student MLP) on graph data by mimicking the output representations of teacher GNN. Existing methods mainly make the MLP to mimic the GNN predictions over a few class labels. However, the class space may not be expressive enough for covering numerous diverse local graph structures, thus limiting the performance of knowledge transfer from GNN to MLP. To address this issue, we propose to learn a new powerful graph representation space by directly labeling nodes' diverse local structures for GNN-to-MLP distillation. Specifically, we propose a variant of VQ-VAE to learn a structure-aware tokenizer on graph data that can encode each node's local substructure as a discrete code. The discrete codes constitute a codebook as a new graph representation space that is able to identify different local graph structures of nodes with the corresponding code indices. Then, based on the learned codebook, we propose a new distillation target, namely soft code assignments, to directly transfer the structural knowledge of each node from GNN to MLP. The resulting framework VQGraph achieves new state-of-the-art performance on GNN-to-MLP distillation in both transductive and inductive settings across seven graph datasets. We show that VQGraph with better performance infers faster than GNNs by 828x, and also achieves accuracy improvement over GNNs and stand-alone MLPs by 3.90% and 28.05% on average, respectively. Code: https://github.com/YangLing0818/VQGraph.
△ Less
Submitted 6 March, 2024; v1 submitted 3 August, 2023;
originally announced August 2023.
-
Boundary integrated neural networks (BINNs) for 2D elastostatic and piezoelectric problems: Theory and MATLAB code
Authors:
Peijun Zhang,
Chuanzeng Zhang,
Yan Gu,
Wenzhen Qu,
Shengdong Zhao
Abstract:
In this paper, we make the first attempt to apply the boundary integrated neural networks (BINNs) for the numerical solution of two-dimensional (2D) elastostatic and piezoelectric problems. BINNs combine artificial neural networks with the well-established boundary integral equations (BIEs) to effectively solve partial differential equations (PDEs). The BIEs are utilized to map all the unknowns on…
▽ More
In this paper, we make the first attempt to apply the boundary integrated neural networks (BINNs) for the numerical solution of two-dimensional (2D) elastostatic and piezoelectric problems. BINNs combine artificial neural networks with the well-established boundary integral equations (BIEs) to effectively solve partial differential equations (PDEs). The BIEs are utilized to map all the unknowns onto the boundary, after which these unknowns are approximated using artificial neural networks and resolved via a training process. In contrast to traditional neural network-based methods, the current BINNs offer several distinct advantages. First, by embedding BIEs into the learning procedure, BINNs only need to discretize the boundary of the solution domain, which can lead to a faster and more stable learning process (only the boundary conditions need to be fitted during the training). Second, the differential operator with respect to the PDEs is substituted by an integral operator, which effectively eliminates the need for additional differentiation of the neural networks (high-order derivatives of neural networks may lead to instability in learning). Third, the loss function of the BINNs only contains the residuals of the BIEs, as all the boundary conditions have been inherently incorporated within the formulation. Therefore, there is no necessity for employing any weighing functions, which are commonly used in traditional methods to balance the gradients among different objective functions. Moreover, BINNs possess the ability to tackle PDEs in unbounded domains since the integral representation remains valid for both bounded and unbounded domains. Extensive numerical experiments show that BINNs are much easier to train and usually give more accurate learning solutions as compared to traditional neural network-based methods.
△ Less
Submitted 2 August, 2023;
originally announced August 2023.
-
Boundary integrated neural networks (BINNs) for acoustic radiation and scattering
Authors:
Wenzhen Qu,
Yan Gu,
Shengdong Zhao,
Fajie wang
Abstract:
This paper presents a novel approach called the boundary integrated neural networks (BINNs) for analyzing acoustic radiation and scattering. The method introduces fundamental solutions of the time-harmonic wave equation to encode the boundary integral equations (BIEs) within the neural networks, replacing the conventional use of the governing equation in physics-informed neural networks (PINNs). T…
▽ More
This paper presents a novel approach called the boundary integrated neural networks (BINNs) for analyzing acoustic radiation and scattering. The method introduces fundamental solutions of the time-harmonic wave equation to encode the boundary integral equations (BIEs) within the neural networks, replacing the conventional use of the governing equation in physics-informed neural networks (PINNs). This approach offers several advantages. Firstly, the input data for the neural networks in the BINNs only require the coordinates of "boundary" collocation points, making it highly suitable for analyzing acoustic fields in unbounded domains. Secondly, the loss function of the BINNs is not a composite form, and has a fast convergence. Thirdly, the BINNs achieve comparable precision to the PINNs using fewer collocation points and hidden layers/neurons. Finally, the semi-analytic characteristic of the BIEs contributes to the higher precision of the BINNs. Numerical examples are presented to demonstrate the performance of the proposed method.
△ Less
Submitted 19 July, 2023;
originally announced July 2023.
-
A Certified Radius-Guided Attack Framework to Image Segmentation Models
Authors:
Wenjie Qu,
Youqi Li,
Binghui Wang
Abstract:
Image segmentation is an important problem in many safety-critical applications. Recent studies show that modern image segmentation models are vulnerable to adversarial perturbations, while existing attack methods mainly follow the idea of attacking image classification models. We argue that image segmentation and classification have inherent differences, and design an attack framework specially f…
▽ More
Image segmentation is an important problem in many safety-critical applications. Recent studies show that modern image segmentation models are vulnerable to adversarial perturbations, while existing attack methods mainly follow the idea of attacking image classification models. We argue that image segmentation and classification have inherent differences, and design an attack framework specially for image segmentation models. Our attack framework is inspired by certified radius, which was originally used by defenders to defend against adversarial perturbations to classification models. We are the first, from the attacker perspective, to leverage the properties of certified radius and propose a certified radius guided attack framework against image segmentation models. Specifically, we first adapt randomized smoothing, the state-of-the-art certification method for classification models, to derive the pixel's certified radius. We then focus more on disrupting pixels with relatively smaller certified radii and design a pixel-wise certified radius guided loss, when plugged into any existing white-box attack, yields our certified radius-guided white-box attack. Next, we propose the first black-box attack to image segmentation models via bandit. We design a novel gradient estimator, based on bandit feedback, which is query-efficient and provably unbiased and stable. We use this gradient estimator to design a projected bandit gradient descent (PBGD) attack, as well as a certified radius-guided PBGD (CR-PBGD) attack. We prove our PBGD and CR-PBGD attacks can achieve asymptotically optimal attack performance with an optimal rate. We evaluate our certified-radius guided white-box and black-box attacks on multiple modern image segmentation models and datasets. Our results validate the effectiveness of our certified radius-guided attack framework.
△ Less
Submitted 5 April, 2023;
originally announced April 2023.
-
REaaS: Enabling Adversarially Robust Downstream Classifiers via Robust Encoder as a Service
Authors:
Wenjie Qu,
**yuan Jia,
Neil Zhenqiang Gong
Abstract:
Encoder as a service is an emerging cloud service. Specifically, a service provider first pre-trains an encoder (i.e., a general-purpose feature extractor) via either supervised learning or self-supervised learning and then deploys it as a cloud service API. A client queries the cloud service API to obtain feature vectors for its training/testing inputs when training/testing its classifier (called…
▽ More
Encoder as a service is an emerging cloud service. Specifically, a service provider first pre-trains an encoder (i.e., a general-purpose feature extractor) via either supervised learning or self-supervised learning and then deploys it as a cloud service API. A client queries the cloud service API to obtain feature vectors for its training/testing inputs when training/testing its classifier (called downstream classifier). A downstream classifier is vulnerable to adversarial examples, which are testing inputs with carefully crafted perturbation that the downstream classifier misclassifies. Therefore, in safety and security critical applications, a client aims to build a robust downstream classifier and certify its robustness guarantees against adversarial examples.
What APIs should the cloud service provide, such that a client can use any certification method to certify the robustness of its downstream classifier against adversarial examples while minimizing the number of queries to the APIs? How can a service provider pre-train an encoder such that clients can build more certifiably robust downstream classifiers? We aim to answer the two questions in this work. For the first question, we show that the cloud service only needs to provide two APIs, which we carefully design, to enable a client to certify the robustness of its downstream classifier with a minimal number of queries to the APIs. For the second question, we show that an encoder pre-trained using a spectral-norm regularization term enables clients to build more robust downstream classifiers.
△ Less
Submitted 7 January, 2023;
originally announced January 2023.
-
EPCL: Frozen CLIP Transformer is An Efficient Point Cloud Encoder
Authors:
Xiaoshui Huang,
Zhou Huang,
Sheng Li,
Wentao Qu,
Tong He,
Yuenan Hou,
Yifan Zuo,
Wanli Ouyang
Abstract:
The pretrain-finetune paradigm has achieved great success in NLP and 2D image fields because of the high-quality representation ability and transferability of their pretrained models. However, pretraining such a strong model is difficult in the 3D point cloud field due to the limited amount of point cloud sequences. This paper introduces \textbf{E}fficient \textbf{P}oint \textbf{C}loud \textbf{L}e…
▽ More
The pretrain-finetune paradigm has achieved great success in NLP and 2D image fields because of the high-quality representation ability and transferability of their pretrained models. However, pretraining such a strong model is difficult in the 3D point cloud field due to the limited amount of point cloud sequences. This paper introduces \textbf{E}fficient \textbf{P}oint \textbf{C}loud \textbf{L}earning (EPCL), an effective and efficient point cloud learner for directly training high-quality point cloud models with a frozen CLIP transformer. Our EPCL connects the 2D and 3D modalities by semantically aligning the image features and point cloud features without paired 2D-3D data. Specifically, the input point cloud is divided into a series of local patches, which are converted to token embeddings by the designed point cloud tokenizer. These token embeddings are concatenated with a task token and fed into the frozen CLIP transformer to learn point cloud representation. The intuition is that the proposed point cloud tokenizer projects the input point cloud into a unified token space that is similar to the 2D images. Comprehensive experiments on 3D detection, semantic segmentation, classification and few-shot learning demonstrate that the CLIP transformer can serve as an efficient point cloud encoder and our method achieves promising performance on both indoor and outdoor benchmarks. In particular, performance gains brought by our EPCL are $\textbf{19.7}$ AP$_{50}$ on ScanNet V2 detection, $\textbf{4.4}$ mIoU on S3DIS segmentation and $\textbf{1.2}$ mIoU on SemanticKITTI segmentation compared to contemporary pretrained models. Code is available at \url{https://github.com/XiaoshuiHuang/EPCL}.
△ Less
Submitted 10 December, 2023; v1 submitted 8 December, 2022;
originally announced December 2022.
-
Pre-trained Encoders in Self-Supervised Learning Improve Secure and Privacy-preserving Supervised Learning
Authors:
Hongbin Liu,
Wenjie Qu,
**yuan Jia,
Neil Zhenqiang Gong
Abstract:
Classifiers in supervised learning have various security and privacy issues, e.g., 1) data poisoning attacks, backdoor attacks, and adversarial examples on the security side as well as 2) inference attacks and the right to be forgotten for the training data on the privacy side. Various secure and privacy-preserving supervised learning algorithms with formal guarantees have been proposed to address…
▽ More
Classifiers in supervised learning have various security and privacy issues, e.g., 1) data poisoning attacks, backdoor attacks, and adversarial examples on the security side as well as 2) inference attacks and the right to be forgotten for the training data on the privacy side. Various secure and privacy-preserving supervised learning algorithms with formal guarantees have been proposed to address these issues. However, they suffer from various limitations such as accuracy loss, small certified security guarantees, and/or inefficiency. Self-supervised learning is an emerging technique to pre-train encoders using unlabeled data. Given a pre-trained encoder as a feature extractor, supervised learning can train a simple yet accurate classifier using a small amount of labeled training data. In this work, we perform the first systematic, principled measurement study to understand whether and when a pre-trained encoder can address the limitations of secure or privacy-preserving supervised learning algorithms. Our key findings are that a pre-trained encoder substantially improves 1) both accuracy under no attacks and certified security guarantees against data poisoning and backdoor attacks of state-of-the-art secure learning algorithms (i.e., bagging and KNN), 2) certified security guarantees of randomized smoothing against adversarial examples without sacrificing its accuracy under no attacks, 3) accuracy of differentially private classifiers, and 4) accuracy and/or efficiency of exact machine unlearning.
△ Less
Submitted 6 December, 2022;
originally announced December 2022.
-
GMF: General Multimodal Fusion Framework for Correspondence Outlier Rejection
Authors:
Xiaoshui Huang,
Wentao Qu,
Yifan Zuo,
Yuming Fang,
Xiaowei Zhao
Abstract:
Rejecting correspondence outliers enables to boost the correspondence quality, which is a critical step in achieving high point cloud registration accuracy. The current state-of-the-art correspondence outlier rejection methods only utilize the structure features of the correspondences. However, texture information is critical to reject the correspondence outliers in our human vision system. In thi…
▽ More
Rejecting correspondence outliers enables to boost the correspondence quality, which is a critical step in achieving high point cloud registration accuracy. The current state-of-the-art correspondence outlier rejection methods only utilize the structure features of the correspondences. However, texture information is critical to reject the correspondence outliers in our human vision system. In this paper, we propose General Multimodal Fusion (GMF) to learn to reject the correspondence outliers by leveraging both the structure and texture information. Specifically, two cross-attention-based fusion layers are proposed to fuse the texture information from paired images and structure information from point correspondences. Moreover, we propose a convolutional position encoding layer to enhance the difference between Tokens and enable the encoding feature pay attention to neighbor information. Our position encoding layer will make the cross-attention operation integrate both local and global information. Experiments on multiple datasets(3DMatch, 3DLoMatch, KITTI) and recent state-of-the-art models (3DRegNet, DGR, PointDSC) prove that our GMF achieves wide generalization ability and consistently improves the point cloud registration accuracy. Furthermore, several ablation studies demonstrate the robustness of the proposed GMF on different loss functions, lighting conditions and noises.The code is available at https://github.com/XiaoshuiHuang/GMF.
△ Less
Submitted 31 October, 2022;
originally announced November 2022.
-
MultiGuard: Provably Robust Multi-label Classification against Adversarial Examples
Authors:
**yuan Jia,
Wenjie Qu,
Neil Zhenqiang Gong
Abstract:
Multi-label classification, which predicts a set of labels for an input, has many applications. However, multiple recent studies showed that multi-label classification is vulnerable to adversarial examples. In particular, an attacker can manipulate the labels predicted by a multi-label classifier for an input via adding carefully crafted, human-imperceptible perturbation to it. Existing provable d…
▽ More
Multi-label classification, which predicts a set of labels for an input, has many applications. However, multiple recent studies showed that multi-label classification is vulnerable to adversarial examples. In particular, an attacker can manipulate the labels predicted by a multi-label classifier for an input via adding carefully crafted, human-imperceptible perturbation to it. Existing provable defenses for multi-class classification achieve sub-optimal provable robustness guarantees when generalized to multi-label classification. In this work, we propose MultiGuard, the first provably robust defense against adversarial examples to multi-label classification. Our MultiGuard leverages randomized smoothing, which is the state-of-the-art technique to build provably robust classifiers. Specifically, given an arbitrary multi-label classifier, our MultiGuard builds a smoothed multi-label classifier via adding random noise to the input. We consider isotropic Gaussian noise in this work. Our major theoretical contribution is that we show a certain number of ground truth labels of an input are provably in the set of labels predicted by our MultiGuard when the $\ell_2$-norm of the adversarial perturbation added to the input is bounded. Moreover, we design an algorithm to compute our provable robustness guarantees. Empirically, we evaluate our MultiGuard on VOC 2007, MS-COCO, and NUS-WIDE benchmark datasets. Our code is available at: \url{https://github.com/quwenjie/MultiGuard}
△ Less
Submitted 3 October, 2022;
originally announced October 2022.
-
The sparse representation related with fractional heat equations
Authors:
Pengtao Li,
Tao Qian,
Ieng Tak Leong,
Wei Qu
Abstract:
This study introduces pre-orthogonal adaptive Fourier decomposition (POAFD) to obtain approximations and numerical solutions to the fractional Laplacian initial value problem and the extension problem of Caffarelli and Silvestre (generalized Poisson equation). The method, as the first step, expands the initial data function into a sparse series of the fundamental solutions with fast convergence, a…
▽ More
This study introduces pre-orthogonal adaptive Fourier decomposition (POAFD) to obtain approximations and numerical solutions to the fractional Laplacian initial value problem and the extension problem of Caffarelli and Silvestre (generalized Poisson equation). The method, as the first step, expands the initial data function into a sparse series of the fundamental solutions with fast convergence, and, as the second step, makes use the semigroup or the reproducing kernel property of each of the expanding entries. Experiments show effectiveness and efficiency of the proposed series solutions.
△ Less
Submitted 16 June, 2022;
originally announced July 2022.
-
jTrans: Jump-Aware Transformer for Binary Code Similarity
Authors:
Hao Wang,
Wenjie Qu,
Gilad Katz,
Wenyu Zhu,
Zeyu Gao,
Han Qiu,
Jianwei Zhuge,
Chao Zhang
Abstract:
Binary code similarity detection (BCSD) has important applications in various fields such as vulnerability detection, software component analysis, and reverse engineering. Recent studies have shown that deep neural networks (DNNs) can comprehend instructions or control-flow graphs (CFG) of binary code and support BCSD. In this study, we propose a novel Transformer-based approach, namely jTrans, to…
▽ More
Binary code similarity detection (BCSD) has important applications in various fields such as vulnerability detection, software component analysis, and reverse engineering. Recent studies have shown that deep neural networks (DNNs) can comprehend instructions or control-flow graphs (CFG) of binary code and support BCSD. In this study, we propose a novel Transformer-based approach, namely jTrans, to learn representations of binary code. It is the first solution that embeds control flow information of binary code into Transformer-based language models, by using a novel jump-aware representation of the analyzed binaries and a newly-designed pre-training task. Additionally, we release to the community a newly-created large dataset of binaries, BinaryCorp, which is the most diverse to date. Evaluation results show that jTrans outperforms state-of-the-art (SOTA) approaches on this more challenging dataset by 30.5% (i.e., from 32.0% to 62.5%). In a real-world task of known vulnerability searching, jTrans achieves a recall that is 2X higher than existing SOTA baselines.
△ Less
Submitted 25 May, 2022;
originally announced May 2022.
-
AFD Types Sparse Representations vs. the Karhunen-Loeve Expansion for Decomposing Stochastic Processes
Authors:
Tao Qian,
Ying Zhang,
Wanquan Liu,
Wei Qu
Abstract:
This article introduces adaptive Fourier decomposition (AFD) type methods, emphasizing on those that can be applied to stochastic processes and random fields, mainly including stochastic adaptive Fourier decomposition and stochastic pre-orthogonal adaptive Fourier decomposition. We establish their algorithms based on the covariant function and prove that they enjoy the same convergence rate as the…
▽ More
This article introduces adaptive Fourier decomposition (AFD) type methods, emphasizing on those that can be applied to stochastic processes and random fields, mainly including stochastic adaptive Fourier decomposition and stochastic pre-orthogonal adaptive Fourier decomposition. We establish their algorithms based on the covariant function and prove that they enjoy the same convergence rate as the Karhunen-Loève (KL) decomposition. The AFD type methods are compared with the KL decomposition. In contrast with the latter, the AFD type methods do not need to compute eigenvalues and eigenfunctions of the kernel-integral operator induced by the covariance function, and thus considerably reduce the computation complexity and computer consumes. Various kinds of dictionaries offer AFD flexibility to solve problems of a great variety, including different types of deterministic and stochastic equations. The conducted experiments show, besides the numerical convenience and fast convergence, that the AFD type decompositions outperform the KL type in describing local details, in spite of the proven global optimality of the latter.
△ Less
Submitted 8 July, 2022; v1 submitted 9 March, 2022;
originally announced May 2022.
-
Sparse Local Patch Transformer for Robust Face Alignment and Landmarks Inherent Relation Learning
Authors:
Jiahao Xia,
Weiwei qu,
Wenjian Huang,
Jianguo Zhang,
Xi Wang,
Min Xu
Abstract:
Heatmap regression methods have dominated face alignment area in recent years while they ignore the inherent relation between different landmarks. In this paper, we propose a Sparse Local Patch Transformer (SLPT) for learning the inherent relation. The SLPT generates the representation of each single landmark from a local patch and aggregates them by an adaptive inherent relation based on the atte…
▽ More
Heatmap regression methods have dominated face alignment area in recent years while they ignore the inherent relation between different landmarks. In this paper, we propose a Sparse Local Patch Transformer (SLPT) for learning the inherent relation. The SLPT generates the representation of each single landmark from a local patch and aggregates them by an adaptive inherent relation based on the attention mechanism. The subpixel coordinate of each landmark is predicted independently based on the aggregated feature. Moreover, a coarse-to-fine framework is further introduced to incorporate with the SLPT, which enables the initial landmarks to gradually converge to the target facial landmarks using fine-grained features from dynamically resized local patches. Extensive experiments carried out on three popular benchmarks, including WFLW, 300W and COFW, demonstrate that the proposed method works at the state-of-the-art level with much less computational complexity by learning the inherent relation between facial landmarks. The code is available at the project website.
△ Less
Submitted 26 March, 2022; v1 submitted 12 March, 2022;
originally announced March 2022.
-
IMFNet: Interpretable Multimodal Fusion for Point Cloud Registration
Authors:
Xiaoshui Huang,
Wentao Qu,
Yifan Zuo,
Yuming Fang,
Xiaowei Zhao
Abstract:
The existing state-of-the-art point descriptor relies on structure information only, which omit the texture information. However, texture information is crucial for our humans to distinguish a scene part. Moreover, the current learning-based point descriptors are all black boxes which are unclear how the original points contribute to the final descriptor. In this paper, we propose a new multimodal…
▽ More
The existing state-of-the-art point descriptor relies on structure information only, which omit the texture information. However, texture information is crucial for our humans to distinguish a scene part. Moreover, the current learning-based point descriptors are all black boxes which are unclear how the original points contribute to the final descriptor. In this paper, we propose a new multimodal fusion method to generate a point cloud registration descriptor by considering both structure and texture information. Specifically, a novel attention-fusion module is designed to extract the weighted texture information for the descriptor extraction. In addition, we propose an interpretable module to explain the original points in contributing to the final descriptor. We use the descriptor element as the loss to backpropagate to the target layer and consider the gradient as the significance of this point to the final descriptor. This paper moves one step further to explainable deep learning in the registration task. Comprehensive experiments on 3DMatch, 3DLoMatch and KITTI demonstrate that the multimodal fusion descriptor achieves state-of-the-art accuracy and improve the descriptor's distinctiveness. We also demonstrate that our interpretable module in explaining the registration descriptor extraction.
△ Less
Submitted 18 November, 2021;
originally announced November 2021.
-
EncoderMI: Membership Inference against Pre-trained Encoders in Contrastive Learning
Authors:
Hongbin Liu,
**yuan Jia,
Wenjie Qu,
Neil Zhenqiang Gong
Abstract:
Given a set of unlabeled images or (image, text) pairs, contrastive learning aims to pre-train an image encoder that can be used as a feature extractor for many downstream tasks. In this work, we propose EncoderMI, the first membership inference method against image encoders pre-trained by contrastive learning. In particular, given an input and a black-box access to an image encoder, EncoderMI aim…
▽ More
Given a set of unlabeled images or (image, text) pairs, contrastive learning aims to pre-train an image encoder that can be used as a feature extractor for many downstream tasks. In this work, we propose EncoderMI, the first membership inference method against image encoders pre-trained by contrastive learning. In particular, given an input and a black-box access to an image encoder, EncoderMI aims to infer whether the input is in the training dataset of the image encoder. EncoderMI can be used 1) by a data owner to audit whether its (public) data was used to pre-train an image encoder without its authorization or 2) by an attacker to compromise privacy of the training data when it is private/sensitive. Our EncoderMI exploits the overfitting of the image encoder towards its training data. In particular, an overfitted image encoder is more likely to output more (or less) similar feature vectors for two augmented versions of an input in (or not in) its training dataset. We evaluate EncoderMI on image encoders pre-trained on multiple datasets by ourselves as well as the Contrastive Language-Image Pre-training (CLIP) image encoder, which is pre-trained on 400 million (image, text) pairs collected from the Internet and released by OpenAI. Our results show that EncoderMI can achieve high accuracy, precision, and recall. We also explore a countermeasure against EncoderMI via preventing overfitting through early stop**. Our results show that it achieves trade-offs between accuracy of EncoderMI and utility of the image encoder, i.e., it can reduce the accuracy of EncoderMI, but it also incurs classification accuracy loss of the downstream classifiers built based on the image encoder.
△ Less
Submitted 24 August, 2021;
originally announced August 2021.
-
Single-shot Compressed 3D Imaging by Exploiting Random Scattering and Astigmatism
Authors:
Qiong Gao,
Weidong Qu,
Ming Shao,
Wei Liu,
Xiangzheng Cheng
Abstract:
Based on point spread function (PSF) engineering and astigmatism due to a pair of cylindrical lenses, a novel compressed imaging mechanism is proposed to achieve single-shot incoherent 3D imaging. The speckle-like PSF of the imaging system is sensitive to axial shift, which makes it feasible to reconstruct a 3D image by solving an optimization problem with sparsity constraint. With the experimenta…
▽ More
Based on point spread function (PSF) engineering and astigmatism due to a pair of cylindrical lenses, a novel compressed imaging mechanism is proposed to achieve single-shot incoherent 3D imaging. The speckle-like PSF of the imaging system is sensitive to axial shift, which makes it feasible to reconstruct a 3D image by solving an optimization problem with sparsity constraint. With the experimentally calibrated PSFs, the proposed method is demonstrated by a synthetic 3D point object and real 3D object, and the images in different axial slices can be reconstructed faithfully. Moreover, 3D multispectral compressed imaging is explored with the same system, and the result is rather satisfactory with a synthetic point object. Because of the inherent compatibility between the compression in spectral and axial dimensions, the proposed mechanism has the potential to be a unified framework for multi-dimensional compressed imaging.
△ Less
Submitted 20 May, 2021;
originally announced May 2021.
-
Phase Retrieval in Hardy Space
Authors:
Wei Qu,
Xiao-Yun Sun,
Guan-Tie Deng
Abstract:
This paper concerns the study of reconstructing a function $f$ in the Hardy space of the unit disc $\D$ from intensity measurements $|f(z)|,\ z\in \D.$ It's known as the problem of phase retrieval. We transform it into solving the corresponding outer and inner function through the Nevanlinna factorization Theorem. The outer function will be established based on the mechanical quadrature method, wh…
▽ More
This paper concerns the study of reconstructing a function $f$ in the Hardy space of the unit disc $\D$ from intensity measurements $|f(z)|,\ z\in \D.$ It's known as the problem of phase retrieval. We transform it into solving the corresponding outer and inner function through the Nevanlinna factorization Theorem. The outer function will be established based on the mechanical quadrature method, while we use two different ways to find out the zero points of Blashcke product, thereby computing the inner function under the assumption that the singular inner function part is trivial. Then the concrete algorithms and illustrative experiments follow. Finally, we give a sparse representation of $f$ by introducing the unwinding adaptive Fourier decomposition.
△ Less
Submitted 26 November, 2020;
originally announced November 2020.
-
Sparse Approximation to the Dirac-δ Distribution
Authors:
Wei Qu,
Tao Qian,
Guan-Tie Deng
Abstract:
The Dirac-δ distribution may be realized through sequences of convlutions, the latter being also regarded as approximation to the identity. The present study proposes the so called pre-orthogonal adaptive Fourier decomposition (POAFD) method to realize fast approximation to the identity. The type of sparse representation method has potential applications in signal and image analysis, as well as in…
▽ More
The Dirac-δ distribution may be realized through sequences of convlutions, the latter being also regarded as approximation to the identity. The present study proposes the so called pre-orthogonal adaptive Fourier decomposition (POAFD) method to realize fast approximation to the identity. The type of sparse representation method has potential applications in signal and image analysis, as well as in system identification.
△ Less
Submitted 3 August, 2020;
originally announced August 2020.
-
A sufficient condition for n-Best Kernel Approximation in Reproducing Kernel Hilbert Spaces
Authors:
Wei Qu,
Tao Qian,
Guan-Tie Deng
Abstract:
We show that if a reproducing kernel Hilbert space $H_K,$ consisting of functions defined on ${\bf E},$ enjoys Double Boundary Vanishing Condition (DBVC) and Linear Independent Condition (LIC), then for any preset natural number $n,$ and any function $f\in H_K,$ there exists a set of $n$ parameterized multiple kernels ${\tilde{K}}_{w_1},\cdots,{\tilde{K}}_{w_n}, w_k\in {\bf E}, k=1,\cdots,n,$ and…
▽ More
We show that if a reproducing kernel Hilbert space $H_K,$ consisting of functions defined on ${\bf E},$ enjoys Double Boundary Vanishing Condition (DBVC) and Linear Independent Condition (LIC), then for any preset natural number $n,$ and any function $f\in H_K,$ there exists a set of $n$ parameterized multiple kernels ${\tilde{K}}_{w_1},\cdots,{\tilde{K}}_{w_n}, w_k\in {\bf E}, k=1,\cdots,n,$ and real (or complex) constants $c_1,\cdots,c_n,$ giving rise to a solution of the optimization problem
\[ \|f-\sum_{k=1}^n c_k{\tilde{K}}_{w_k}\|=\inf \{\|f-\sum_{k=1}^n d_k{\tilde{K}}_{v_k}\|\ |\ v_k\in {\bf E}, d_k\in {\bf R}\ ({\rm or}\ {\bf C}), k=1,\cdots,n\}.\]
By applying the theorem of this paper we show that the Hardy space and the Bergman space, as well as all the weighted Bergman spaces in the unit disc all possess $n$-best approximations. In the Hardy space case this gives a new proof of a classical result. Based on the obtained results we further prove existence of $n$-best spherical Poisson kernel approximation to functions of finite energy on the real-spheres.
△ Less
Submitted 1 August, 2020; v1 submitted 5 June, 2020;
originally announced June 2020.
-
KRM-based Dialogue Management
Authors:
Wenwu Qu,
Xiaoyu Chi,
Wei Zheng
Abstract:
A KRM-based dialogue management (DM) is proposed using to implement human-computer dialogue system in complex scenarios. KRM-based DM has a well description ability and it can ensure the logic of the dialogue process. Then a complex application scenario in the Internet of Things (IOT) industry and a dialogue system implemented based on the KRM-based DM will be introduced, where the system allows e…
▽ More
A KRM-based dialogue management (DM) is proposed using to implement human-computer dialogue system in complex scenarios. KRM-based DM has a well description ability and it can ensure the logic of the dialogue process. Then a complex application scenario in the Internet of Things (IOT) industry and a dialogue system implemented based on the KRM-based DM will be introduced, where the system allows enterprise customers to customize topics and adapts corresponding topics in the interaction process with users. The experimental results show that the system can complete the interactive tasks well, and can effectively solve the problems of topic switching, information inheritance between topics, change of dominance.
△ Less
Submitted 2 December, 2019;
originally announced December 2019.
-
Neural Network based Deep Transfer Learning for Cross-domain Dependency Parsing
Authors:
Zhentao Xia,
Likai Wang,
Weiguang Qu,
Junsheng Zhou,
Yanhui Gu
Abstract:
In this paper, we describe the details of the neural dependency parser sub-mitted by our team to the NLPCC 2019 Shared Task of Semi-supervised do-main adaptation subtask on Cross-domain Dependency Parsing. Our system is based on the stack-pointer networks(STACKPTR). Considering the im-portance of context, we utilize self-attention mechanism for the representa-tion vectors to capture the meaning of…
▽ More
In this paper, we describe the details of the neural dependency parser sub-mitted by our team to the NLPCC 2019 Shared Task of Semi-supervised do-main adaptation subtask on Cross-domain Dependency Parsing. Our system is based on the stack-pointer networks(STACKPTR). Considering the im-portance of context, we utilize self-attention mechanism for the representa-tion vectors to capture the meaning of words. In addition, to adapt three dif-ferent domains, we utilize neural network based deep transfer learning which transfers the pre-trained partial network in the source domain to be a part of deep neural network in the three target domains (product comments, product blogs and web fiction) respectively. Results on the three target domains demonstrate that our model performs competitively.
△ Less
Submitted 7 August, 2019;
originally announced August 2019.
-
The $ΔI$=2 bands in $^{109}$In: possible antimagnetic rotation
Authors:
Meng Wang,
Wu-ji Sun,
Bao-hua Sun,
Jian Li,
Li-hua Zhu,
Yun Zheng,
Gao-long Zhang,
Liu-chun He,
Wei-wei Qu,
Feng Wang,
Tao-feng Wang,
Chang Xiong,
Chuang-ye He,
Guang-sheng Li,
**-long Wang,
Xiao-guang Wu,
Shun-he Yao,
Cong-bo Li,
Hong-wei Li,
Shi-peng Hu,
Jia-jian Liu
Abstract:
The high-spin structure of $^{109}$In was investigated with the $^{100}$Mo($^{14}$N, 5$n$)$^{109}$In fusion-evaporation reaction at CIAE, Bei**g. Eleven new $γ$-rays of $^{109}$In were identified, by which the bandheads of the $ΔI$=2 rotational bands were confirmed. The configurations were assigned with the help of the systematic discussion. Furthermore, the rotational bands are compared with the…
▽ More
The high-spin structure of $^{109}$In was investigated with the $^{100}$Mo($^{14}$N, 5$n$)$^{109}$In fusion-evaporation reaction at CIAE, Bei**g. Eleven new $γ$-rays of $^{109}$In were identified, by which the bandheads of the $ΔI$=2 rotational bands were confirmed. The configurations were assigned with the help of the systematic discussion. Furthermore, the rotational bands are compared with the tilted-axis cranking calculations based on a relativistic mean-field approach. The rotational bands involving the $1p1h$ excitation to the $π$$d_{5/2}$ and $π$$g_{7/2}$ orbitals are suggested as candidates for antimagnetic rotation based on the theoretical results.
△ Less
Submitted 23 September, 2019; v1 submitted 23 March, 2019;
originally announced March 2019.
-
Entangling and squeezing atoms by weak measurement
Authors:
Mingfeng Wang,
Weizhi Qu,
Han Bao,
Pengxiong Li,
Yanhong Xiao
Abstract:
A weak measurement approach is proposed to entangle and squeeze atoms. We show that even for very small coupling strength between light and atoms, one can achieve large squeezing unattainable with normal measurement-based squeezing. Post-selecting the photons interacting with spins via a weak off-resonant quantum nondemolition interaction (QND) in a state nearly orthogonal to its initial state can…
▽ More
A weak measurement approach is proposed to entangle and squeeze atoms. We show that even for very small coupling strength between light and atoms, one can achieve large squeezing unattainable with normal measurement-based squeezing. Post-selecting the photons interacting with spins via a weak off-resonant quantum nondemolition interaction (QND) in a state nearly orthogonal to its initial state can strengthen the entanglement among elementary spins and thus enhance spin squeezing. The squeezing process is probabilistic but the created state is unconditionally determined. Further control of the post-selection parameter and the detection process can transform the QND-like spin squeezing into the one-axis-twisting or even two-axis-twisting type.
△ Less
Submitted 30 December, 2018;
originally announced December 2018.
-
Bidirectional Type Checking for Relational Properties
Authors:
Ezgi Çiçek,
Weihao Qu,
Gilles Barthe,
Marco Gaboardi,
Deepak Garg
Abstract:
Relational type systems have been designed for several applications including information flow, differential privacy, and cost analysis. In order to achieve the best results, these systems often use relational refinements and relational effects to maximally exploit the similarity in the structure of the two programs being compared. Relational type systems are appealing for relational properties be…
▽ More
Relational type systems have been designed for several applications including information flow, differential privacy, and cost analysis. In order to achieve the best results, these systems often use relational refinements and relational effects to maximally exploit the similarity in the structure of the two programs being compared. Relational type systems are appealing for relational properties because they deliver simpler and more precise verification than what could be derived from ty** the two programs separately. However, relational type systems do not yet achieve the practical appeal of their non-relational counterpart, in part because of the lack of a general foundations for implementing them.
In this paper, we take a step in this direction by develo** bidirectional relational type checking for systems with relational refinements and effects. Our approach achieves the benefits of bidirectional type checking, in a relational setting. In particular, it significantly reduces the need for ty** annotations through the combination of type checking and type inference. In order to highlight the foundational nature of our approach, we develop bidirectional versions of several relational type systems which incrementally combine many different components needed for expressive relational analysis.
△ Less
Submitted 12 December, 2018;
originally announced December 2018.
-
Relational Cost Analysis for Functional-Imperative Programs
Authors:
Weihao Qu,
Marco Gaboardi,
Deepak Garg
Abstract:
Relational cost analysis aims at formally establishing bounds on the difference in the evaluation costs of two programs. As a particular case, one can also use relational cost analysis to establish bounds on the difference in the evaluation cost of the same program on two different inputs. One way to perform relational cost analysis is to use a relational type-and-effect system that supports reaso…
▽ More
Relational cost analysis aims at formally establishing bounds on the difference in the evaluation costs of two programs. As a particular case, one can also use relational cost analysis to establish bounds on the difference in the evaluation cost of the same program on two different inputs. One way to perform relational cost analysis is to use a relational type-and-effect system that supports reasoning about relations between two executions of two programs.
Building on this basic idea, we present a type-and-effect system, called ARel, for reasoning about the relative cost of array-manipulating, higher-order functional-imperative programs. The key ingredient of our approach is a new lightweight type refinement discipline that we use to track relations (differences) between two arrays. This discipline combined with Hoare-style triples built into the types allows us to express and establish precise relative costs of several interesting programs which imperatively update their data.
△ Less
Submitted 24 September, 2019; v1 submitted 10 December, 2018;
originally announced December 2018.
-
Sub-Hertz resonance by weak measurement
Authors:
Weizhi Qu,
Jian Sun,
Shenchao **,
Liang Jiang,
Jianming Wen,
Yanhong Xiao
Abstract:
Weak measurement (WM) with state pre- and post-selection can amplify otherwise undetectable small signals and thus promise great potentials in precision measurements. Although frequency measurements offer the hitherto highest precision owing to stable narrow atomic transitions, it remains a long-standing interest to develop new schemes to further escalate their performance. Here, we propose and de…
▽ More
Weak measurement (WM) with state pre- and post-selection can amplify otherwise undetectable small signals and thus promise great potentials in precision measurements. Although frequency measurements offer the hitherto highest precision owing to stable narrow atomic transitions, it remains a long-standing interest to develop new schemes to further escalate their performance. Here, we propose and demonstrate a WM-enhanced spectroscopy technique which is capable of narrowing the resonance to 0.1 Hz in a room-temperature atomic vapor cell. Potential of this technique for precision measurement is demonstrated through weak magnetic field sensing. By judiciously pre- and post-selecting frequency-modulated input and output optical states in a nearly-orthogonal manner, a sensitivity of $\text{7 fT/}\sqrt{\text{Hz}}$ near DC is achieved, using only one laser beam of $\text{7 }\text{μW}$ power. Additionally, our results extend the WM framework to a non-Hermitian Hamiltonian, and shed new light in metrology and bio-magnetic field sensing applications.
△ Less
Submitted 6 December, 2018;
originally announced December 2018.
-
Spatial multiplexing of squeezed light by coherence diffusion
Authors:
Jian Sun,
Weizhi Qu,
Eugeniy Mikhailov,
Irina Novikova,
Heng Shen,
Yanhong Xiao
Abstract:
Spatially splitting nonclassical light beams is in principle prohibited due to noise contamination during beam splitting. We propose a platform based on thermal motion of atoms to realize spatial multiplexing of squeezed light. Light channels of separate spatial modes in an anti-relaxation coated vapor cell share the same long-lived atomic coherence jointly created by all channels through the cohe…
▽ More
Spatially splitting nonclassical light beams is in principle prohibited due to noise contamination during beam splitting. We propose a platform based on thermal motion of atoms to realize spatial multiplexing of squeezed light. Light channels of separate spatial modes in an anti-relaxation coated vapor cell share the same long-lived atomic coherence jointly created by all channels through the coherent diffusion of atoms which in turn enhances individual channel's nonlinear process responsible for light squeezing. Consequently, it behaves as squeezed light in one optical channel transferring to other distant channels even with laser powers below the threshold for squeezed light generation. An array of squeezed light beams was created with low laser power $\sim\text{mW}$. This approach holds great promise for applications in multi-node quantum network and quantum enhanced technologies such as quantum imaging and sensing.
△ Less
Submitted 20 December, 2018; v1 submitted 28 November, 2018;
originally announced November 2018.
-
Measurements with prediction and retrodiction on the collective spin of 10^{11} atoms beat the standard quantum limit
Authors:
Han Bao,
Junlei Duan,
Xingda Lu,
Pengxiong Li,
Weizhi Qu,
Shenchao **,
Mingfeng Wang,
Irina Novikova,
Eugeniy Mikhailov,
Kai-Feng Zhao,
Klaus Mølmer,
Heng Shen,
Yanhong Xiao
Abstract:
Quantum probes using $N$ uncorrelated particles give a limit on the measurement sensitivity referred to as the standard quantum limit (SQL). The SQL, however, can be overcome by exploiting quantum entangled states, such as spin squeezed states. We report generation of a quantum state, that surpasses the SQL for probing of the collective spin of $10^{11}$ $\text{Rb}$ atoms contained in a vapor cell…
▽ More
Quantum probes using $N$ uncorrelated particles give a limit on the measurement sensitivity referred to as the standard quantum limit (SQL). The SQL, however, can be overcome by exploiting quantum entangled states, such as spin squeezed states. We report generation of a quantum state, that surpasses the SQL for probing of the collective spin of $10^{11}$ $\text{Rb}$ atoms contained in a vapor cell. The state is prepared and verified by sequences of stroboscopic quantum non-demolition (QND) measurements, and we apply the theory of past quantum states to obtain the spin state information from the outcomes of both earlier and later QND measurements. In this way, we obtain a conditional noise reduction of 5.6 dB, and a metrologically-relevant squeezing of $4.5\pm0.40~\text{dB}$. The past quantum state yields tighter information on the spin component than we can obtain by a conventional QND measurement. Our squeezing results are obtained with 1000 times more atoms than in any previous experiments with a corresponding record $4.6\times10^{-13} rad^2$ variance of the angular fluctuations of a squeezed collective spin.
△ Less
Submitted 3 August, 2019; v1 submitted 16 November, 2018;
originally announced November 2018.
-
A Driver ASIC for Scientific CCD Detectors Using 180nm Technology
Authors:
Jie Gao,
Dong-xu Yang,
Yi Feng,
Guang-yu Zhang,
Wen-qing Qu,
Jian-min Wang,
Hong-fei Zhang,
Jian Wang
Abstract:
In order to achieve the driver function for several types of scientific CCD detector from E2V Co Ltd, and decreasing the size of electronics of CCD detector system, an Application-specified Integrated Circuit (ASIC) was designed. It provides multi-channel clocks and bias voltage for CCD driver. In the ASIC, the clock drivers are made of a clock switch circuit and high voltage amplifier. Two 8-bit…
▽ More
In order to achieve the driver function for several types of scientific CCD detector from E2V Co Ltd, and decreasing the size of electronics of CCD detector system, an Application-specified Integrated Circuit (ASIC) was designed. It provides multi-channel clocks and bias voltage for CCD driver. In the ASIC, the clock drivers are made of a clock switch circuit and high voltage amplifier. Two 8-bit current-steering DACs are used to adjust the driver capability and high-level voltage of clocks. The bias drivers are generated by 8-bit current-steering DACs and off-chip operation amplifiers. The Global Foundry 180 nm BCDlite technology is selected to implement this design. The first version of design has been finished and the tests have been done.
△ Less
Submitted 1 June, 2018; v1 submitted 29 May, 2018;
originally announced May 2018.
-
Rational Approximation in the Bergman Spaces
Authors:
Wei Qu,
Pei Dang
Abstract:
It is known that adaptive Fourier decomposition (AFD) offers efficient rational approxima- tions to functions in the classical Hardy H2 spaces with significant applications. This study aims at rational approximation in Bergman, and more widely, in weighted Bergman spaces, the functions of which have more singularity than those in the Hardy spaces. Due to lack of an effective inner function theory,…
▽ More
It is known that adaptive Fourier decomposition (AFD) offers efficient rational approxima- tions to functions in the classical Hardy H2 spaces with significant applications. This study aims at rational approximation in Bergman, and more widely, in weighted Bergman spaces, the functions of which have more singularity than those in the Hardy spaces. Due to lack of an effective inner function theory, direct adaptation of the Hardy-space AFD is not performable. We, however, show that a pre-orthogonal method, being equivalent to AFD in the classical cases, is available for all weighted Bergman spaces. The theory in the Bergman spaces has equal force as AFD in the Hardy spaces. The methodology of approximation is via constructing the rational orthogonal systems of the Bergman type spaces, called Bergman space rational orthog- onal (BRO) system, that have the same role as the Takennaka-Malmquist (TM) system in the Hardy spaces. Subsequently, we prove a certain type direct sum decomposition of the Bergman spaces that reveals the orthogonal complement relation between the span of the BRO system and the zero-based invariant spaces. We provide a sequence of examples with different and ex- plicit singularities at the boundary along with a study on the inclusion relations of the weighted Bergman spaces. We finally present illustrative examples for effectiveness of the approximation.
△ Less
Submitted 12 March, 2018;
originally announced March 2018.
-
New high-spin structure and possible chirality in $^{109}$In
Authors:
M. Wang,
Y. Y. Wang,
L. H. Zhu,
B. H. Sun,
G. L. Zhang,
L. C. He,
W. W. Qu,
F. Wang,
T. F. Wang,
Y. Y. Chen,
C. Xiong,
J. Zhang,
J. M. Zhang,
Y. Zheng,
C. Y. He,
G. S. Li,
J. L. Wang,
X. G. Wu,
S. H. Yao,
C. B. Li,
H. W. Li,
S. P. Hu,
J. J. Liu
Abstract:
High-spin structure of $^{109}$In has been investigated with the $^{100}$Mo($^{14}$N, 5$n$)$^{109}$In reaction at a beam energy of 78 MeV using the in-beam $γ$ spectroscopic method. The level scheme of $^{109}$In has been modified considerably and extended by 46 new $γ$-rays to the highest excited state at 8.979 MeV and $J^π$=(45/2$^{+}$). The new level scheme consists of eight bands, six of which…
▽ More
High-spin structure of $^{109}$In has been investigated with the $^{100}$Mo($^{14}$N, 5$n$)$^{109}$In reaction at a beam energy of 78 MeV using the in-beam $γ$ spectroscopic method. The level scheme of $^{109}$In has been modified considerably and extended by 46 new $γ$-rays to the highest excited state at 8.979 MeV and $J^π$=(45/2$^{+}$). The new level scheme consists of eight bands, six of which are identified as dipole bands. The configurations have been tentatively assigned with the help of the systematics of neighboring odd-$A$ indium isotopes and the experimental aligned angular momenta. The dipole bands are then compared with the titled axis cranking calculation in the framework of covariant density function theory (TAC-CDFT). The results of theoretical calculation based on the configurations, which involve one proton hole at the $g_{9/2}$ orbital and two or four unpaired neutrons at $g_{7/2}$, $d_{5/2}$ and $h_{11/2}$ orbitals, show that the shape of $^{109}$In undergoes an evolution on both $β$ and $γ$ deformations and possible chirality is suggested in $^{109}$In.
△ Less
Submitted 15 February, 2018;
originally announced February 2018.
-
Open-Category Classification by Adversarial Sample Generation
Authors:
Yang Yu,
Wei-Yang Qu,
Nan Li,
Zimin Guo
Abstract:
In real-world classification tasks, it is difficult to collect training samples from all possible categories of the environment. Therefore, when an instance of an unseen class appears in the prediction stage, a robust classifier should be able to tell that it is from an unseen class, instead of classifying it to be any known category. In this paper, adopting the idea of adversarial learning, we pr…
▽ More
In real-world classification tasks, it is difficult to collect training samples from all possible categories of the environment. Therefore, when an instance of an unseen class appears in the prediction stage, a robust classifier should be able to tell that it is from an unseen class, instead of classifying it to be any known category. In this paper, adopting the idea of adversarial learning, we propose the ASG framework for open-category classification. ASG generates positive and negative samples of seen categories in the unsupervised manner via an adversarial learning strategy. With the generated samples, ASG then learns to tell seen from unseen in the supervised manner. Experiments performed on several datasets show the effectiveness of ASG.
△ Less
Submitted 17 June, 2017; v1 submitted 24 May, 2017;
originally announced May 2017.
-
Anti-Parity-Time Symmetric Optics via Flying Atoms
Authors:
Peng Peng,
Wanxia Cao,
Ce Shen,
Weizhi Qu,
Jianming Wen,
Liang Jiang,
Yanhong Xiao
Abstract:
The recently-developed notion of 'parity-time (PT) symmetry' in optical systems with a controlled gain-loss interplay has spawned an intriguing way of achieving optical behaviors that are presently unattainable with standard arrangements. In most experimental studies so far, however, the implementations rely highly on the advances of nanotechnologies and sophisticated fabrication techniques to syn…
▽ More
The recently-developed notion of 'parity-time (PT) symmetry' in optical systems with a controlled gain-loss interplay has spawned an intriguing way of achieving optical behaviors that are presently unattainable with standard arrangements. In most experimental studies so far, however, the implementations rely highly on the advances of nanotechnologies and sophisticated fabrication techniques to synthesize solid-state materials. Here, we report the first experimental demonstration of optical anti-PT symmetry, a counterpart of conventional PT symmetry, in a warm atomic-vapor cell. By exploiting rapid coherence transport via flying atoms, our scheme illustrates essential features of anti-PT symmetry with an unprecedented precision on phase-transition threshold, and substantially reduces experimental complexity and cost. This result represents a significant advance in non-Hermitian optics by bridging a firm connection with the field of atomic, molecular and optical physics, where novel phenomena and applications in quantum and nonlinear optics aided by (anti-)PT symmetry could be anticipated.
△ Less
Submitted 25 September, 2015;
originally announced September 2015.
-
Two-axis-twisting spin squeezing by multi-pass quantum erasure
Authors:
Mingfeng Wang,
Weizhi Qu,
Pengxiong Li,
Han Bao,
Vladan Vuletić,
Yanhong Xiao
Abstract:
Many-body entangled states are key elements in quantum information science and quantum metrology. One important problem in establishing a high degree of many-body entanglement using optical techniques is the leakage of the system information via the light that creates such entanglement. We propose an all-optical interference-based approach to erase this information. Unwanted atom-light entanglemen…
▽ More
Many-body entangled states are key elements in quantum information science and quantum metrology. One important problem in establishing a high degree of many-body entanglement using optical techniques is the leakage of the system information via the light that creates such entanglement. We propose an all-optical interference-based approach to erase this information. Unwanted atom-light entanglement can be removed by destructive interference of three or more successive atom-light interactions, with only the desired effective atom-atom interaction left. This quantum erasure protocol allows implementation of Heisenberg-limited spin squeezing using coherent light and a cold or warm atomic ensemble. Calculations show that significant improvement in the squeezing exceeding 10 dB is obtained compared to previous methods, and substantial spin squeezing is attainable even under moderate experimental conditions. Our method enables the efficient creation of many-body entangled states with simple setups, and thus is promising for advancing technologies in quantum metrology and quantum information processing.
△ Less
Submitted 6 May, 2016; v1 submitted 6 February, 2015;
originally announced February 2015.