-
Achieving Energetic Superiority Through System-Level Quantum Circuit Simulation
Authors:
Rong Fu,
Zhongling Su,
Han-Sen Zhong,
Xiti Zhao,
Jianyang Zhang,
Feng Pan,
Pan Zhang,
Xianhe Zhao,
Ming-Cheng Chen,
Chao-Yang Lu,
Jian-Wei Pan,
Zhiling Pei,
Xingcheng Zhang,
Wanli Ouyang
Abstract:
Quantum Computational Superiority boasts rapid computation and high energy efficiency. Despite recent advances in classical algorithms aimed at refuting the milestone claim of Google's sycamore, challenges remain in generating uncorrelated samples of random quantum circuits. In this paper, we present a groundbreaking large-scale system technology that leverages optimization on global, node, and de…
▽ More
Quantum Computational Superiority boasts rapid computation and high energy efficiency. Despite recent advances in classical algorithms aimed at refuting the milestone claim of Google's sycamore, challenges remain in generating uncorrelated samples of random quantum circuits. In this paper, we present a groundbreaking large-scale system technology that leverages optimization on global, node, and device levels to achieve unprecedented scalability for tensor networks. This enables the handling of large-scale tensor networks with memory capacities reaching tens of terabytes, surpassing memory space constraints on a single node. Our techniques enable accommodating large-scale tensor networks with up to tens of terabytes of memory, reaching up to 2304 GPUs with a peak computing power of 561 PFLOPS half-precision. Notably, we have achieved a time-to-solution of 14.22 seconds with energy consumption of 2.39 kWh which achieved fidelity of 0.002 and our most remarkable result is a time-to-solution of 17.18 seconds, with energy consumption of only 0.29 kWh which achieved a XEB of 0.002 after post-processing, outperforming Google's quantum processor Sycamore in both speed and energy efficiency, which recorded 600 seconds and 4.3 kWh, respectively.
△ Less
Submitted 30 June, 2024;
originally announced July 2024.
-
UWBAD: Towards Effective and Imperceptible Jamming Attacks Against UWB Ranging Systems with COTS Chips
Authors:
Yuqiao Yang,
Zhongjie Wu,
Yongzhao Zhang,
Ting Chen,
Jun Li,
Jie Yang,
Wenhao Liu,
Xiaosong Zhang,
Ruicong Shi,
**gwei Li,
Yu Jiang,
Zhuo Su
Abstract:
UWB ranging systems have been adopted in many critical and security sensitive applications due to its precise positioning and secure ranging capabilities. We present a practical jamming attack, namely UWBAD, against commercial UWB ranging systems, which exploits the vulnerability of the adoption of the normalized cross-correlation process in UWB ranging and can selectively and quickly block rangin…
▽ More
UWB ranging systems have been adopted in many critical and security sensitive applications due to its precise positioning and secure ranging capabilities. We present a practical jamming attack, namely UWBAD, against commercial UWB ranging systems, which exploits the vulnerability of the adoption of the normalized cross-correlation process in UWB ranging and can selectively and quickly block ranging sessions without prior knowledge of the configurations of the victim devices, potentially leading to severe consequences such as property loss, unauthorized access, or vehicle theft. UWBAD achieves more effective and less imperceptible jamming due to: (i) it efficiently blocks every ranging session by leveraging the field-level jamming, thereby exerting a tangible impact on commercial UWB ranging systems, and (ii) the compact, reactive, and selective system design based on COTS UWB chips, making it affordable and less imperceptible. We successfully conducted real attacks against commercial UWB ranging systems from the three largest UWB chip vendors on the market, e.g., Apple, NXP, and Qorvo. We reported our findings to Apple, related Original Equipment Manufacturers (OEM), and the Automotive Security Research Group, triggering internal security incident response procedures at Volkswagen, Audi, Bosch, and NXP. As of the writing of this paper, the related OEM has acknowledged this vulnerability in their automotive systems and has offered a $5,000 reward as a bounty.
△ Less
Submitted 30 June, 2024;
originally announced July 2024.
-
Leapfrogging Sycamore: Harnessing 1432 GPUs for 7$\times$ Faster Quantum Random Circuit Sampling
Authors:
Xian-He Zhao,
Han-Sen Zhong,
Feng Pan,
Zi-Han Chen,
Rong Fu,
Zhongling Su,
Xiaotong Xie,
Chaoxing Zhao,
Pan Zhang,
Wanli Ouyang,
Chao-Yang Lu,
Jian-Wei Pan,
Ming-Cheng Chen
Abstract:
Random quantum circuit sampling serves as a benchmark to demonstrate quantum computational advantage. Recent progress in classical algorithms, especially those based on tensor network methods, has significantly reduced the classical simulation time and challenged the claim of the first-generation quantum advantage experiments. However, in terms of generating uncorrelated samples, time-to-solution,…
▽ More
Random quantum circuit sampling serves as a benchmark to demonstrate quantum computational advantage. Recent progress in classical algorithms, especially those based on tensor network methods, has significantly reduced the classical simulation time and challenged the claim of the first-generation quantum advantage experiments. However, in terms of generating uncorrelated samples, time-to-solution, and energy consumption, previous classical simulation experiments still underperform the \textit{Sycamore} processor. Here we report an energy-efficient classical simulation algorithm, using 1432 GPUs to simulate quantum random circuit sampling which generates uncorrelated samples with higher linear cross entropy score and is 7 times faster than \textit{Sycamore} 53 qubits experiment. We propose a post-processing algorithm to reduce the overall complexity, and integrated state-of-the-art high-performance general-purpose GPU to achieve two orders of lower energy consumption compared to previous works. Our work provides the first unambiguous experimental evidence to refute \textit{Sycamore}'s claim of quantum advantage, and redefines the boundary of quantum computational advantage using random circuit sampling.
△ Less
Submitted 27 June, 2024;
originally announced June 2024.
-
Zero-Shot Long-Form Video Understanding through Screenplay
Authors:
Yongliang Wu,
Bozheng Li,
Jiawang Cao,
Wenbo Zhu,
Yi Lu,
Weiheng Chi,
Chuyun Xie,
Haolin Zheng,
Ziyue Su,
Jay Wu,
Xu Yang
Abstract:
The Long-form Video Question-Answering task requires the comprehension and analysis of extended video content to respond accurately to questions by utilizing both temporal and contextual information. In this paper, we present MM-Screenplayer, an advanced video understanding system with multi-modal perception capabilities that can convert any video into textual screenplay representations. Unlike pr…
▽ More
The Long-form Video Question-Answering task requires the comprehension and analysis of extended video content to respond accurately to questions by utilizing both temporal and contextual information. In this paper, we present MM-Screenplayer, an advanced video understanding system with multi-modal perception capabilities that can convert any video into textual screenplay representations. Unlike previous storytelling methods, we organize video content into scenes as the basic unit, rather than just visually continuous shots. Additionally, we developed a ``Look Back'' strategy to reassess and validate uncertain information, particularly targeting breakpoint mode. MM-Screenplayer achieved highest score in the CVPR'2024 LOng-form VidEo Understanding (LOVEU) Track 1 Challenge, with a global accuracy of 87.5% and a breakpoint accuracy of 68.8%.
△ Less
Submitted 25 June, 2024;
originally announced June 2024.
-
MindSpore Quantum: A User-Friendly, High-Performance, and AI-Compatible Quantum Computing Framework
Authors:
Xusheng Xu,
Jiangyu Cui,
Zidong Cui,
Runhong He,
Qingyu Li,
Xiaowei Li,
Yanling Lin,
Jiale Liu,
Wuxin Liu,
Jiale Lu,
Maolin Luo,
Chufan Lyu,
Shijie Pan,
Mosharev Pavel,
Runqiu Shu,
Jialiang Tang,
Ruoqian Xu,
Shu Xu,
Kang Yang,
Fan Yu,
Qingguo Zeng,
Haiying Zhao,
Qiang Zheng,
Junyuan Zhou,
Xu Zhou
, et al. (14 additional authors not shown)
Abstract:
We introduce MindSpore Quantum, a pioneering hybrid quantum-classical framework with a primary focus on the design and implementation of noisy intermediate-scale quantum (NISQ) algorithms. Leveraging the robust support of MindSpore, an advanced open-source deep learning training/inference framework, MindSpore Quantum exhibits exceptional efficiency in the design and training of variational quantum…
▽ More
We introduce MindSpore Quantum, a pioneering hybrid quantum-classical framework with a primary focus on the design and implementation of noisy intermediate-scale quantum (NISQ) algorithms. Leveraging the robust support of MindSpore, an advanced open-source deep learning training/inference framework, MindSpore Quantum exhibits exceptional efficiency in the design and training of variational quantum algorithms on both CPU and GPU platforms, delivering remarkable performance. Furthermore, this framework places a strong emphasis on enhancing the operational efficiency of quantum algorithms when executed on real quantum hardware. This encompasses the development of algorithms for quantum circuit compilation and qubit map**, crucial components for achieving optimal performance on quantum processors. In addition to the core framework, we introduce QuPack, a meticulously crafted quantum computing acceleration engine. QuPack significantly accelerates the simulation speed of MindSpore Quantum, particularly in variational quantum eigensolver (VQE), quantum approximate optimization algorithm (QAOA), and tensor network simulations, providing astonishing speed. This combination of cutting-edge technologies empowers researchers and practitioners to explore the frontiers of quantum computing with unprecedented efficiency and performance.
△ Less
Submitted 27 June, 2024; v1 submitted 24 June, 2024;
originally announced June 2024.
-
Integrated Study of X-ray Spectrum and Time Lags for HBL Mrk 421 within the Framework of the Multiple-Zone Leptonic Model
Authors:
Wen Hu,
Jia-Lai Kang,
Zhen-Yi Cai,
Jun-Xian Wang,
Zhen-Bo Su,
Guang-Cheng Xiao
Abstract:
We present the timing analysis of 10 archived \XMM observations with an exposure of $>40$ ks of Markarian 421. Mrk 421 is the brightest high-frequency-peaked BL Lac object (HBL) emitting in X-rays produced by electrons accelerated in the innermost regions of a relativistic jet pointing toward us. For each observation, we construct averaged X-ray spectra in 0.5--10 keV band, as well as 100 s binned…
▽ More
We present the timing analysis of 10 archived \XMM observations with an exposure of $>40$ ks of Markarian 421. Mrk 421 is the brightest high-frequency-peaked BL Lac object (HBL) emitting in X-rays produced by electrons accelerated in the innermost regions of a relativistic jet pointing toward us. For each observation, we construct averaged X-ray spectra in 0.5--10 keV band, as well as 100 s binned light curves (LCs) in various subbands. During these observations, the source exhibited various intensity states differing by close to an order of magnitude in flux, with the fractional variability amplitude increasing with energy through the X-ray band. Bayesian power spectral density analysis reveals that the X-ray variability can be characterized by a colored noise, with an index ranging from $\sim-1.9$ to $-3.0$. Moreover, both the standard cross-correlation function and cross-spectral methods indicate that the amount of time lags increases with the energy difference between two compared LCs. A time-dependent two-zone jet model is developed to extract physical information from the X-ray emission of Mrk 421. In the model, we assume that the jet emission mostly comprises a quasi-stationary component and a highly variable one. Our results show that the two-zone model can simultaneously provide a satisfactory description for both the X-ray spectra and time lags observed in different epochs, with the model parameters constrained in a fully acceptable interval. We suggest that shocks within the jets may be the primary energy dissipation process responsible for triggering the rapid variability, although magnetic reconnection cannot be excluded.
△ Less
Submitted 23 June, 2024;
originally announced June 2024.
-
Timo: Towards Better Temporal Reasoning for Language Models
Authors:
Zhaochen Su,
Jun Zhang,
Tong Zhu,
Xiaoye Qu,
Juntao Li,
Min Zhang,
Yu Cheng
Abstract:
Reasoning about time is essential for Large Language Models (LLMs) to understand the world. Previous works focus on solving specific tasks, primarily on time-sensitive question answering. While these methods have proven effective, they cannot generalize to a wider spectrum of temporal reasoning tasks. Therefore, we propose a crucial question: Can we build a universal framework to handle a variety…
▽ More
Reasoning about time is essential for Large Language Models (LLMs) to understand the world. Previous works focus on solving specific tasks, primarily on time-sensitive question answering. While these methods have proven effective, they cannot generalize to a wider spectrum of temporal reasoning tasks. Therefore, we propose a crucial question: Can we build a universal framework to handle a variety of temporal reasoning tasks? To that end, we systematically study 38 temporal reasoning tasks. Based on the observation that 19 tasks are directly related to mathematics, we first leverage the available mathematical dataset to set a solid foundation for temporal reasoning. However, the in-depth study indicates that focusing solely on mathematical enhancement falls short of addressing pure temporal reasoning tasks. To mitigate this limitation, we propose a simple but effective self-critic temporal optimization method to enhance the model's temporal reasoning capabilities without sacrificing general task abilities. Finally, we develop Timo, a model designed to excel in temporal reasoning at the 7B and 13B scales. Notably, Timo outperforms the counterpart LLMs by 10.0 and 7.6 in average accuracy scores and achieves the new state-of-the-art (SOTA) performance of comparable size. Extensive experiments further validate our framework's effectiveness and its generalization across diverse temporal tasks. The code is available at https://github.com/zhaochen0110/Timo.
△ Less
Submitted 20 June, 2024;
originally announced June 2024.
-
Ultra-High-Definition Restoration: New Benchmarks and A Dual Interaction Prior-Driven Solution
Authors:
Liyan Wang,
Cong Wang,
**shan Pan,
Weixiang Zhou,
Xiaoran Sun,
Wei Wang,
Zhixun Su
Abstract:
Ultra-High-Definition (UHD) image restoration has acquired remarkable attention due to its practical demand. In this paper, we construct UHD snow and rain benchmarks, named UHD-Snow and UHD-Rain, to remedy the deficiency in this field. The UHD-Snow/UHD-Rain is established by simulating the physics process of rain/snow into consideration and each benchmark contains 3200 degraded/clear image pairs o…
▽ More
Ultra-High-Definition (UHD) image restoration has acquired remarkable attention due to its practical demand. In this paper, we construct UHD snow and rain benchmarks, named UHD-Snow and UHD-Rain, to remedy the deficiency in this field. The UHD-Snow/UHD-Rain is established by simulating the physics process of rain/snow into consideration and each benchmark contains 3200 degraded/clear image pairs of 4K resolution. Furthermore, we propose an effective UHD image restoration solution by considering gradient and normal priors in model design thanks to these priors' spatial and detail contributions. Specifically, our method contains two branches: (a) feature fusion and reconstruction branch in high-resolution space and (b) prior feature interaction branch in low-resolution space. The former learns high-resolution features and fuses prior-guided low-resolution features to reconstruct clear images, while the latter utilizes normal and gradient priors to mine useful spatial features and detail features to guide high-resolution recovery better. To better utilize these priors, we introduce single prior feature interaction and dual prior feature interaction, where the former respectively fuses normal and gradient priors with high-resolution features to enhance prior ones, while the latter calculates the similarity between enhanced prior ones and further exploits dual guided filtering to boost the feature interaction of dual priors. We conduct experiments on both new and existing public datasets and demonstrate the state-of-the-art performance of our method on UHD image low-light enhancement, UHD image desonwing, and UHD image deraining. The source codes and benchmarks are available at \url{https://github.com/wlydlut/UHDDIP}.
△ Less
Submitted 22 June, 2024; v1 submitted 19 June, 2024;
originally announced June 2024.
-
HumanSplat: Generalizable Single-Image Human Gaussian Splatting with Structure Priors
Authors:
Panwang Pan,
Zhuo Su,
Chenguo Lin,
Zhen Fan,
Yongjie Zhang,
Zeming Li,
Tingting Shen,
Yadong Mu,
Yebin Liu
Abstract:
Despite recent advancements in high-fidelity human reconstruction techniques, the requirements for densely captured images or time-consuming per-instance optimization significantly hinder their applications in broader scenarios. To tackle these issues, we present HumanSplat which predicts the 3D Gaussian Splatting properties of any human from a single input image in a generalizable manner. In part…
▽ More
Despite recent advancements in high-fidelity human reconstruction techniques, the requirements for densely captured images or time-consuming per-instance optimization significantly hinder their applications in broader scenarios. To tackle these issues, we present HumanSplat which predicts the 3D Gaussian Splatting properties of any human from a single input image in a generalizable manner. In particular, HumanSplat comprises a 2D multi-view diffusion model and a latent reconstruction transformer with human structure priors that adeptly integrate geometric priors and semantic features within a unified framework. A hierarchical loss that incorporates human semantic information is further designed to achieve high-fidelity texture modeling and better constrain the estimated multiple views. Comprehensive experiments on standard benchmarks and in-the-wild images demonstrate that HumanSplat surpasses existing state-of-the-art methods in achieving photorealistic novel-view synthesis.
△ Less
Submitted 18 June, 2024;
originally announced June 2024.
-
Mokav: Execution-driven Differential Testing with LLMs
Authors:
Khashayar Etemadi,
Bardia Mohammadi,
Zhendong Su,
Martin Monperrus
Abstract:
It is essential to detect functional differences in various software engineering tasks, such as automated program repair, mutation testing, and code refactoring. The problem of detecting functional differences between two programs can be reduced to searching for a difference exposing test (DET): a test input that results in different outputs on the subject programs. In this paper, we propose Mokav…
▽ More
It is essential to detect functional differences in various software engineering tasks, such as automated program repair, mutation testing, and code refactoring. The problem of detecting functional differences between two programs can be reduced to searching for a difference exposing test (DET): a test input that results in different outputs on the subject programs. In this paper, we propose Mokav, a novel execution-driven tool that leverages LLMs to generate DETs. Mokav takes two versions of a program (P and Q) and an example test input. When successful, Mokav generates a valid DET, a test input that leads to different outputs on P and Q. Mokav iteratively prompts an LLM with a specialized prompt to generate new test inputs. At each iteration, Mokav provides execution-based feedback regarding previously generated tests until the LLM produces a DET. We evaluate Mokav on 1,535 pairs of Python programs collected from the Codeforces competition platform and 32 pairs of programs from the QuixBugs dataset. Our experiments show that Mokav outperforms the state-of-the-art, Pynguin and Differential Prompting, by a large margin. Mokav can generate DETs for 81.7% (1,255/1,535) of the program pairs in our benchmark (versus 4.9% for Pynguin and 37.3% for Differential Prompting). We demonstrate that all components in our system, including the iterative and execution-driven approaches, contribute to its high effectiveness.
△ Less
Submitted 14 June, 2024;
originally announced June 2024.
-
Living in the Moment: Can Large Language Models Grasp Co-Temporal Reasoning?
Authors:
Zhaochen Su,
Juntao Li,
Jun Zhang,
Tong Zhu,
Xiaoye Qu,
Pan Zhou,
Yan Bowen,
Yu Cheng,
Min zhang
Abstract:
Temporal reasoning is fundamental for large language models (LLMs) to comprehend the world. Current temporal reasoning datasets are limited to questions about single or isolated events, falling short in mirroring the realistic temporal characteristics involving concurrent nature and intricate temporal interconnections. In this paper, we introduce CoTempQA, a comprehensive co-temporal Question Answ…
▽ More
Temporal reasoning is fundamental for large language models (LLMs) to comprehend the world. Current temporal reasoning datasets are limited to questions about single or isolated events, falling short in mirroring the realistic temporal characteristics involving concurrent nature and intricate temporal interconnections. In this paper, we introduce CoTempQA, a comprehensive co-temporal Question Answering (QA) benchmark containing four co-temporal scenarios (Equal, Overlap, During, Mix) with 4,748 samples for evaluating the co-temporal comprehension and reasoning abilities of LLMs. Our extensive experiments reveal a significant gap between the performance of current LLMs and human-level reasoning on CoTempQA tasks. Even when enhanced with Chain of Thought (CoT) methodologies, models consistently struggle with our task. In our preliminary exploration, we discovered that mathematical reasoning plays a significant role in handling co-temporal events and proposed a strategy to boost LLMs' co-temporal reasoning from a mathematical perspective. We hope that our CoTempQA datasets will encourage further advancements in improving the co-temporal reasoning capabilities of LLMs. Our code is available at https://github.com/zhaochen0110/Cotempqa.
△ Less
Submitted 13 June, 2024;
originally announced June 2024.
-
Practical, Automated Scenario-based Mobile App Testing
Authors:
Shengcheng Yu,
Chunrong Fang,
Mingzhe Du,
Zimin Ding,
Zhenyu Chen,
Zhendong Su
Abstract:
The importance of mobile application (app) quality insurance is increasing with the rapid development of the mobile Internet. Automated test generation approaches, as a dominant direction of app quality insurance, follow specific models or strategies, targeting at optimizing the code coverage. Such approaches lead to a huge gap between testing execution and app business logic. Test scripts develop…
▽ More
The importance of mobile application (app) quality insurance is increasing with the rapid development of the mobile Internet. Automated test generation approaches, as a dominant direction of app quality insurance, follow specific models or strategies, targeting at optimizing the code coverage. Such approaches lead to a huge gap between testing execution and app business logic. Test scripts developed by human testers consider business logic by focusing on testing scenarios. Due to the GUI-intensive feature of mobile apps, human testers always understand app GUI to organize test scripts for scenarios. This inspires us to utilize domain knowledge from app GUI understanding for scenario-based test generation.
In this paper, we propose a novel approach, ScenTest, for scenario-based mobile app testing with event knowledge graph (EKG) via GUI image understanding. ScenTest tries to start automated testing by imitating human practices and integrating domain knowledge into scenario-based mobile app testing, realizing fully automated testing on target testing scenarios for the first time. ScenTest extracts four kinds of entities and five kinds of corresponding relationships from crowdsourced test reports, where the test events and app GUI information are presented, and constructs the EKGs for specific scenarios. Then, ScenTest conducts test generation for specific scenarios on different apps with the guidance of EKG with the combination consideration of app current state and testing context. We conduct an evaluation on ScenTest on different aspects. The results show that the test generation of ScenTest on the basis of EKG is effective, and ScenTest can reveal 80+ distinct real-world bugs in specific scenarios compared with representative baselines.
△ Less
Submitted 12 June, 2024;
originally announced June 2024.
-
Compilation Quotient (CQ): A Metric for the Compilation Hardness of Programming Languages
Authors:
Vince Szabo,
Dominik Winterer,
Zhendong Su
Abstract:
Today's programmers can choose from an exceptional range of programming languages, each with its own traits, purpose, and complexity. A key aspect of a language's complexity is how hard it is to compile programs in the language. While most programmers have an intuition about compilation hardness for different programming languages, no metric exists to quantify it. We introduce the compilation quot…
▽ More
Today's programmers can choose from an exceptional range of programming languages, each with its own traits, purpose, and complexity. A key aspect of a language's complexity is how hard it is to compile programs in the language. While most programmers have an intuition about compilation hardness for different programming languages, no metric exists to quantify it. We introduce the compilation quotient (CQ), a metric to quantify the compilation hardness of compiled programming languages. The key idea is to measure the compilation success rates of programs sampled from context-free grammars. To this end, we fairly sample over 12 million programs in total. CQ ranges between 0 and 100, where 0 indicates that no programs compile, and 100 means that all programs compile. Our findings on 12 popular compiled programming languages show high variation in CQ. C has a CQ of 48.11, C++ has 0.60, Java has 0.27 and Haskell has 0.13. Strikingly, Rust's CQ is nearly 0, and for C, even a large fraction of very sizable programs compile. We believe CQ can help understand the differences of compiled programming languages better and help language designers.
△ Less
Submitted 7 June, 2024;
originally announced June 2024.
-
A novel fault localization with data refinement for hydroelectric units
Authors:
Jialong Huang,
Junlin Song,
Penglong Lian,
Mengjie Gan,
Zhiheng Su,
Benhao Wang,
Wenji Zhu,
Xiaomin Pu,
Jianxiao Zou,
Shicai Fan
Abstract:
Due to the scarcity of fault samples and the complexity of non-linear and non-smooth characteristics data in hydroelectric units, most of the traditional hydroelectric unit fault localization methods are difficult to carry out accurate localization. To address these problems, a sparse autoencoder (SAE)-generative adversarial network (GAN)-wavelet noise reduction (WNR)- manifold-boosted deep learni…
▽ More
Due to the scarcity of fault samples and the complexity of non-linear and non-smooth characteristics data in hydroelectric units, most of the traditional hydroelectric unit fault localization methods are difficult to carry out accurate localization. To address these problems, a sparse autoencoder (SAE)-generative adversarial network (GAN)-wavelet noise reduction (WNR)- manifold-boosted deep learning (SG-WMBDL) based fault localization method for hydroelectric units is proposed. To overcome the data scarcity, a SAE is embedded into the GAN to generate more high-quality samples in the data generation module. Considering the signals involving non-linear and non-smooth characteristics, the improved WNR which combining both soft and hard thresholding and local linear embedding (LLE) are utilized to the data preprocessing module in order to reduce the noise and effectively capture the local features. In addition, to seek higher performance, the novel Adaptive Boost (AdaBoost) combined with multi deep learning is proposed to achieve accurate fault localization. The experimental results show that the SG-WMBDL can locate faults for hydroelectric units under a small number of fault samples with non-linear and non-smooth characteristics on higher precision and accuracy compared to other frontier methods, which verifies the effectiveness and practicality of the proposed method.
△ Less
Submitted 29 May, 2024;
originally announced May 2024.
-
Few-shot fault diagnosis based on multi-scale graph convolution filtering for industry
Authors:
Mengjie Gan,
Penglong Lian,
Zhiheng Su,
Jiyang Zhang,
Jialong Huang,
Benhao Wang,
Jianxiao Zou,
Shicai Fan
Abstract:
Industrial equipment fault diagnosis often encounter challenges such as the scarcity of fault data, complex operating conditions, and varied types of failures. Signal analysis, data statistical learning, and conventional deep learning techniques face constraints under these conditions due to their substantial data requirements and the necessity for transfer learning to accommodate new failure mode…
▽ More
Industrial equipment fault diagnosis often encounter challenges such as the scarcity of fault data, complex operating conditions, and varied types of failures. Signal analysis, data statistical learning, and conventional deep learning techniques face constraints under these conditions due to their substantial data requirements and the necessity for transfer learning to accommodate new failure modes. To effectively leverage information and extract the intrinsic characteristics of faults across different domains under limited sample conditions, this paper introduces a fault diagnosis approach employing Multi-Scale Graph Convolution Filtering (MSGCF). MSGCF enhances the traditional Graph Neural Network (GNN) framework by integrating both local and global information fusion modules within the graph convolution filter block. This advancement effectively mitigates the over-smoothing issue associated with excessive layering of graph convolutional layers while preserving a broad receptive field. It also reduces the risk of overfitting in few-shot diagnosis, thereby augmenting the model's representational capacity. Experiments on the University of Paderborn bearing dataset (PU) demonstrate that the MSGCF method proposed herein surpasses alternative approaches in accuracy, thereby offering valuable insights for industrial fault diagnosis in few-shot learning scenarios.
△ Less
Submitted 29 May, 2024;
originally announced May 2024.
-
Source Code Foundation Models are Transferable Binary Analysis Knowledge Bases
Authors:
Zian Su,
Xiangzhe Xu,
Ziyang Huang,
Kaiyuan Zhang,
Xiangyu Zhang
Abstract:
Human-Oriented Binary Reverse Engineering (HOBRE) lies at the intersection of binary and source code, aiming to lift binary code to human-readable content relevant to source code, thereby bridging the binary-source semantic gap. Recent advancements in uni-modal code model pre-training, particularly in generative Source Code Foundation Models (SCFMs) and binary understanding models, have laid the g…
▽ More
Human-Oriented Binary Reverse Engineering (HOBRE) lies at the intersection of binary and source code, aiming to lift binary code to human-readable content relevant to source code, thereby bridging the binary-source semantic gap. Recent advancements in uni-modal code model pre-training, particularly in generative Source Code Foundation Models (SCFMs) and binary understanding models, have laid the groundwork for transfer learning applicable to HOBRE. However, existing approaches for HOBRE rely heavily on uni-modal models like SCFMs for supervised fine-tuning or general LLMs for prompting, resulting in sub-optimal performance. Inspired by recent progress in large multi-modal models, we propose that it is possible to harness the strengths of uni-modal code models from both sides to bridge the semantic gap effectively. In this paper, we introduce a novel probe-and-recover framework that incorporates a binary-source encoder-decoder model and black-box LLMs for binary analysis. Our approach leverages the pre-trained knowledge within SCFMs to synthesize relevant, symbol-rich code fragments as context. This additional context enables black-box LLMs to enhance recovery accuracy. We demonstrate significant improvements in zero-shot binary summarization and binary function name recovery, with a 10.3% relative gain in CHRF and a 16.7% relative gain in a GPT4-based metric for summarization, as well as a 6.7% and 7.4% absolute increase in token-level precision and recall for name recovery, respectively. These results highlight the effectiveness of our approach in automating and improving binary code analysis.
△ Less
Submitted 29 May, 2024;
originally announced May 2024.
-
Can We Enhance the Quality of Mobile Crowdsensing Data Without Ground Truth?
Authors:
Jiajie Li,
Bo Gu,
Shimin Gong,
Zhou Su,
Mohsen Guizani
Abstract:
Mobile crowdsensing (MCS) has emerged as a prominent trend across various domains. However, ensuring the quality of the sensing data submitted by mobile users (MUs) remains a complex and challenging problem. To address this challenge, an advanced method is required to detect low-quality sensing data and identify malicious MUs that may disrupt the normal operations of an MCS system. Therefore, this…
▽ More
Mobile crowdsensing (MCS) has emerged as a prominent trend across various domains. However, ensuring the quality of the sensing data submitted by mobile users (MUs) remains a complex and challenging problem. To address this challenge, an advanced method is required to detect low-quality sensing data and identify malicious MUs that may disrupt the normal operations of an MCS system. Therefore, this article proposes a prediction- and reputation-based truth discovery (PRBTD) framework, which can separate low-quality data from high-quality data in sensing tasks. First, we apply a correlation-focused spatial-temporal transformer network to predict the ground truth of the input sensing data. Then, we extract the sensing errors of the data as features based on the prediction results to calculate the implications among the data. Finally, we design a reputation-based truth discovery (TD) module for identifying low-quality data with their implications. Given sensing data submitted by MUs, PRBTD can eliminate the data with heavy noise and identify malicious MUs with high accuracy. Extensive experimental results demonstrate that PRBTD outperforms the existing methods in terms of identification accuracy and data quality enhancement.
△ Less
Submitted 28 May, 2024;
originally announced May 2024.
-
On Galkin's Lower Bound Conjecture
Authors:
Jianxun Hu,
Huazhong Ke,
Changzheng Li,
Zhitong Su
Abstract:
We estimate an upper bound of the spectral radius of a linear operator on the quantum cohomology of the toric Fano manifolds $\mathbb{P}_{\mathbb{P}^{n}}(\mathcal{O}\oplus\mathcal{O}(3))$. This provides a negative answer to Galkin's lower bound conjecture.
We estimate an upper bound of the spectral radius of a linear operator on the quantum cohomology of the toric Fano manifolds $\mathbb{P}_{\mathbb{P}^{n}}(\mathcal{O}\oplus\mathcal{O}(3))$. This provides a negative answer to Galkin's lower bound conjecture.
△ Less
Submitted 27 May, 2024;
originally announced May 2024.
-
Counter-examples to Gamma conjecture I
Authors:
Sergey Galkin,
Jianxun Hu,
Hiroshi Iritani,
Huazhong Ke,
Changzheng Li,
Zhitong Su
Abstract:
We investigate Gamma conjecture I and its underlying Conjecture $\mathcal{O}$ for the $\mathbb{P}^1$-bundles $X_n=\mathbb{P}_{\mathbb{P}^{n}}(\mathcal{O}\oplus\mathcal{O}(n))$ with $n\ge 3$. We show that Conjecture $\mathcal{O}$ does not hold if $n$ is odd, and that Gamma conjecture I does not hold if $n$ is even. Led by this example, we propose modifications for Gamma conjecture I, discuss Gamma…
▽ More
We investigate Gamma conjecture I and its underlying Conjecture $\mathcal{O}$ for the $\mathbb{P}^1$-bundles $X_n=\mathbb{P}_{\mathbb{P}^{n}}(\mathcal{O}\oplus\mathcal{O}(n))$ with $n\ge 3$. We show that Conjecture $\mathcal{O}$ does not hold if $n$ is odd, and that Gamma conjecture I does not hold if $n$ is even. Led by this example, we propose modifications for Gamma conjecture I, discuss Gamma conjecture I over the Kahler moduli space, and identify the corresponding principal asymptotic class.
△ Less
Submitted 5 June, 2024; v1 submitted 27 May, 2024;
originally announced May 2024.
-
Mixture of Experts Using Tensor Products
Authors:
Zhan Su,
Fengran Mo,
Prayag Tiwari,
Benyou Wang,
Jian-Yun Nie,
Jakob Grue Simonsen
Abstract:
In multi-task learning, the conventional approach involves training a model on multiple tasks simultaneously. However, the training signals from different tasks can interfere with one another, potentially leading to \textit{negative transfer}. To mitigate this, we investigate if modular language models can facilitate positive transfer and systematic generalization. Specifically, we propose a novel…
▽ More
In multi-task learning, the conventional approach involves training a model on multiple tasks simultaneously. However, the training signals from different tasks can interfere with one another, potentially leading to \textit{negative transfer}. To mitigate this, we investigate if modular language models can facilitate positive transfer and systematic generalization. Specifically, we propose a novel modular language model (\texttt{TensorPoly}), that balances parameter efficiency with nuanced routing methods. For \textit{modules}, we reparameterize Low-Rank Adaptation (\texttt{LoRA}) by employing an entangled tensor through the use of tensor product operations and name the resulting approach \texttt{TLoRA}. For \textit{routing function}, we tailor two innovative routing functions according to the granularity: \texttt{TensorPoly-I} which directs to each rank within the entangled tensor while \texttt{TensorPoly-II} offers a finer-grained routing approach targeting each order of the entangled tensor. The experimental results from the multi-task T0-benchmark demonstrate that: 1) all modular LMs surpass the corresponding dense approaches, highlighting the potential of modular language models to mitigate negative inference in multi-task learning and deliver superior outcomes. 2) \texttt{TensorPoly-I} achieves higher parameter efficiency in adaptation and outperforms other modular LMs, which shows the potential of our approach in multi-task transfer learning.
△ Less
Submitted 26 May, 2024;
originally announced May 2024.
-
SCMix: Stochastic Compound Mixing for Open Compound Domain Adaptation in Semantic Segmentation
Authors:
Kai Yao,
Zhaorui Tan,
Zixian Su,
Xi Yang,
Jie Sun,
Kaizhu Huang
Abstract:
Open compound domain adaptation (OCDA) aims to transfer knowledge from a labeled source domain to a mix of unlabeled homogeneous compound target domains while generalizing to open unseen domains. Existing OCDA methods solve the intra-domain gaps by a divide-and-conquer strategy, which divides the problem into several individual and parallel domain adaptation (DA) tasks. Such approaches often conta…
▽ More
Open compound domain adaptation (OCDA) aims to transfer knowledge from a labeled source domain to a mix of unlabeled homogeneous compound target domains while generalizing to open unseen domains. Existing OCDA methods solve the intra-domain gaps by a divide-and-conquer strategy, which divides the problem into several individual and parallel domain adaptation (DA) tasks. Such approaches often contain multiple sub-networks or stages, which may constrain the model's performance. In this work, starting from the general DA theory, we establish the generalization bound for the setting of OCDA. Built upon this, we argue that conventional OCDA approaches may substantially underestimate the inherent variance inside the compound target domains for model generalization. We subsequently present Stochastic Compound Mixing (SCMix), an augmentation strategy with the primary objective of mitigating the divergence between source and mixed target distributions. We provide theoretical analysis to substantiate the superiority of SCMix and prove that the previous methods are sub-groups of our methods. Extensive experiments show that our method attains a lower empirical risk on OCDA semantic segmentation tasks, thus supporting our theories. Combining the transformer architecture, SCMix achieves a notable performance boost compared to the SoTA results.
△ Less
Submitted 23 May, 2024;
originally announced May 2024.
-
Remote Keylogging Attacks in Multi-user VR Applications
Authors:
Zihao Su,
Kunlin Cai,
Reuben Beeler,
Lukas Dresel,
Allan Garcia,
Ilya Grishchenko,
Yuan Tian,
Christopher Kruegel,
Giovanni Vigna
Abstract:
As Virtual Reality (VR) applications grow in popularity, they have bridged distances and brought users closer together. However, with this growth, there have been increasing concerns about security and privacy, especially related to the motion data used to create immersive experiences. In this study, we highlight a significant security threat in multi-user VR applications, which are applications t…
▽ More
As Virtual Reality (VR) applications grow in popularity, they have bridged distances and brought users closer together. However, with this growth, there have been increasing concerns about security and privacy, especially related to the motion data used to create immersive experiences. In this study, we highlight a significant security threat in multi-user VR applications, which are applications that allow multiple users to interact with each other in the same virtual space. Specifically, we propose a remote attack that utilizes the avatar rendering information collected from an adversary's game clients to extract user-typed secrets like credit card information, passwords, or private conversations. We do this by (1) extracting motion data from network packets, and (2) map** motion data to keystroke entries. We conducted a user study to verify the attack's effectiveness, in which our attack successfully inferred 97.62% of the keystrokes. Besides, we performed an additional experiment to underline that our attack is practical, confirming its effectiveness even when (1) there are multiple users in a room, and (2) the attacker cannot see the victims. Moreover, we replicated our proposed attack on four applications to demonstrate the generalizability of the attack. These results underscore the severity of the vulnerability and its potential impact on millions of VR social platform users.
△ Less
Submitted 22 May, 2024;
originally announced May 2024.
-
EchoSpike Predictive Plasticity: An Online Local Learning Rule for Spiking Neural Networks
Authors:
Lars Graf,
Zhe Su,
Giacomo Indiveri
Abstract:
The drive to develop artificial neural networks that efficiently utilize resources has generated significant interest in bio-inspired Spiking Neural Networks (SNNs). These networks are particularly attractive due to their potential in applications requiring low power and memory. This potential is further enhanced by the ability to perform online local learning, enabling them to adapt to dynamic en…
▽ More
The drive to develop artificial neural networks that efficiently utilize resources has generated significant interest in bio-inspired Spiking Neural Networks (SNNs). These networks are particularly attractive due to their potential in applications requiring low power and memory. This potential is further enhanced by the ability to perform online local learning, enabling them to adapt to dynamic environments. This requires the model to be adaptive in a self-supervised manner. While self-supervised learning has seen great success in many deep learning domains, its application for online local learning in multi-layer SNNs remains underexplored. In this paper, we introduce the "EchoSpike Predictive Plasticity" (ESPP) learning rule, a pioneering online local learning rule designed to leverage hierarchical temporal dynamics in SNNs through predictive and contrastive coding. We validate the effectiveness of this approach using benchmark datasets, demonstrating that it performs on par with current state-of-the-art supervised learning rules. The temporal and spatial locality of ESPP makes it particularly well-suited for low-cost neuromorphic processors, representing a significant advancement in develo** biologically plausible self-supervised learning models for neuromorphic computing at the edge.
△ Less
Submitted 26 May, 2024; v1 submitted 22 May, 2024;
originally announced May 2024.
-
Towards Modular LLMs by Building and Reusing a Library of LoRAs
Authors:
Oleksiy Ostapenko,
Zhan Su,
Edoardo Maria Ponti,
Laurent Charlin,
Nicolas Le Roux,
Matheus Pereira,
Lucas Caccia,
Alessandro Sordoni
Abstract:
The growing number of parameter-efficient adaptations of a base large language model (LLM) calls for studying whether we can reuse such trained adapters to improve performance for new tasks. We study how to best build a library of adapters given multi-task data and devise techniques for both zero-shot and supervised task generalization through routing in such library. We benchmark existing approac…
▽ More
The growing number of parameter-efficient adaptations of a base large language model (LLM) calls for studying whether we can reuse such trained adapters to improve performance for new tasks. We study how to best build a library of adapters given multi-task data and devise techniques for both zero-shot and supervised task generalization through routing in such library. We benchmark existing approaches to build this library and introduce model-based clustering, MBC, a method that groups tasks based on the similarity of their adapter parameters, indirectly optimizing for transfer across the multi-task dataset. To re-use the library, we present a novel zero-shot routing mechanism, Arrow, which enables dynamic selection of the most relevant adapters for new inputs without the need for retraining. We experiment with several LLMs, such as Phi-2 and Mistral, on a wide array of held-out tasks, verifying that MBC-based adapters and Arrow routing lead to superior generalization to new tasks. We make steps towards creating modular, adaptable LLMs that can match or outperform traditional joint training.
△ Less
Submitted 17 May, 2024;
originally announced May 2024.
-
Proximal indirect comparison
Authors:
Zehao Su,
Helene C. W. Rytgaard,
Henrik Ravn,
Frank Eriksson
Abstract:
We consider the problem of indirect comparison, where a treatment arm of interest is absent by design in the target randomized control trial (RCT) but available in a source RCT. The identifiability of the target population average treatment effect often relies on conditional transportability assumptions. However, it is a common concern whether all relevant effect modifiers are measured and control…
▽ More
We consider the problem of indirect comparison, where a treatment arm of interest is absent by design in the target randomized control trial (RCT) but available in a source RCT. The identifiability of the target population average treatment effect often relies on conditional transportability assumptions. However, it is a common concern whether all relevant effect modifiers are measured and controlled for. We highlight a new proximal identification result in the presence of shifted, unobserved effect modifiers based on proxies: an adjustment proxy in both RCTs and an additional reweighting proxy in the source RCT. We propose an estimator which is doubly-robust against misspecifications of the so-called bridge functions and asymptotically normal under mild consistency of the nuisance models. An alternative estimator is presented to accommodate missing outcomes in the source RCT, which we then apply to conduct a proximal indirect comparison analysis using two weight management trials.
△ Less
Submitted 17 May, 2024;
originally announced May 2024.
-
Efficient estimation of target population treatment effect from multiple source trials under effect-measure transportability
Authors:
Zehao Su,
Helene C. W. Rytgaard,
Henrik Ravn,
Frank Eriksson
Abstract:
When the marginal causal effect comparing the same treatment pair is available from multiple trials, we wish to transport all results to make inference on the target population effect. To account for the differences between populations, statistical analysis is often performed controlling for relevant variables. However, when transportability assumptions are placed on conditional causal effects, ra…
▽ More
When the marginal causal effect comparing the same treatment pair is available from multiple trials, we wish to transport all results to make inference on the target population effect. To account for the differences between populations, statistical analysis is often performed controlling for relevant variables. However, when transportability assumptions are placed on conditional causal effects, rather than the distribution of potential outcomes, we need to carefully choose these effect measures. In particular, we present identifiability results in two cases: target population average treatment effect for a continuous outcome and causal mean ratio for a positive outcome. We characterize the semiparametric efficiency bounds of the causal effects under the respective transportability assumptions and propose estimators that are doubly robust against model misspecifications. We highlight an important discussion on the tension between the non-collapsibility of conditional effects and the variational independence induced by transportability in the case of multiple source trials.
△ Less
Submitted 17 May, 2024;
originally announced May 2024.
-
LayGA: Layered Gaussian Avatars for Animatable Clothing Transfer
Authors:
Siyou Lin,
Zhe Li,
Zhaoqi Su,
Zerong Zheng,
Hongwen Zhang,
Yebin Liu
Abstract:
Animatable clothing transfer, aiming at dressing and animating garments across characters, is a challenging problem. Most human avatar works entangle the representations of the human body and clothing together, which leads to difficulties for virtual try-on across identities. What's worse, the entangled representations usually fail to exactly track the sliding motion of garments. To overcome these…
▽ More
Animatable clothing transfer, aiming at dressing and animating garments across characters, is a challenging problem. Most human avatar works entangle the representations of the human body and clothing together, which leads to difficulties for virtual try-on across identities. What's worse, the entangled representations usually fail to exactly track the sliding motion of garments. To overcome these limitations, we present Layered Gaussian Avatars (LayGA), a new representation that formulates body and clothing as two separate layers for photorealistic animatable clothing transfer from multi-view videos. Our representation is built upon the Gaussian map-based avatar for its excellent representation power of garment details. However, the Gaussian map produces unstructured 3D Gaussians distributed around the actual surface. The absence of a smooth explicit surface raises challenges in accurate garment tracking and collision handling between body and garments. Therefore, we propose two-stage training involving single-layer reconstruction and multi-layer fitting. In the single-layer reconstruction stage, we propose a series of geometric constraints to reconstruct smooth surfaces and simultaneously obtain the segmentation between body and clothing. Next, in the multi-layer fitting stage, we train two separate models to represent body and clothing and utilize the reconstructed clothing geometries as 3D supervision for more accurate garment tracking. Furthermore, we propose geometry and rendering layers for both high-quality geometric reconstruction and high-fidelity rendering. Overall, the proposed LayGA realizes photorealistic animations and virtual try-on, and outperforms other baseline methods. Our project page is https://jsnln.github.io/layga/index.html.
△ Less
Submitted 12 May, 2024;
originally announced May 2024.
-
Uniform Hanson-Wright Type Deviation Inequalities for $Ī±$-Subexponential Random Vectors
Authors:
Guozheng Dai,
Zhonggen Su
Abstract:
This paper is devoted to uniform versions of the Hanson-Wright inequality for a random vector with independent centered $Ī±$-subexponential entries, $0<Ī±\le 1$. Our method relies upon a novel decoupling inequality and a comparison of weak and strong moments. As an application, we use the derived inequality to prove the restricted isometry property of partial random circulant matrices generated by s…
▽ More
This paper is devoted to uniform versions of the Hanson-Wright inequality for a random vector with independent centered $Ī±$-subexponential entries, $0<Ī±\le 1$. Our method relies upon a novel decoupling inequality and a comparison of weak and strong moments. As an application, we use the derived inequality to prove the restricted isometry property of partial random circulant matrices generated by standard $Ī±$-subexponential random vectors, $0<Ī±\le 1$.
△ Less
Submitted 12 May, 2024;
originally announced May 2024.
-
AffirmativeAI: Towards LGBTQ+ Friendly Audit Frameworks for Large Language Models
Authors:
Yinru Long,
Zilin Ma,
Yiyang Mei,
Zhaoyuan Su
Abstract:
LGBTQ+ community face disproportionate mental health challenges, including higher rates of depression, anxiety, and suicidal ideation. Research has shown that LGBTQ+ people have been using large language model-based chatbots, such as ChatGPT, for their mental health needs. Despite the potential for immediate support and anonymity these chatbots offer, concerns regarding their capacity to provide e…
▽ More
LGBTQ+ community face disproportionate mental health challenges, including higher rates of depression, anxiety, and suicidal ideation. Research has shown that LGBTQ+ people have been using large language model-based chatbots, such as ChatGPT, for their mental health needs. Despite the potential for immediate support and anonymity these chatbots offer, concerns regarding their capacity to provide empathetic, accurate, and affirming responses remain. In response to these challenges, we propose a framework for evaluating the affirmativeness of LLMs based on principles of affirmative therapy, emphasizing the need for attitudes, knowledge, and actions that support and validate LGBTQ+ experiences. We propose a combination of qualitative and quantitative analyses, ho** to establish benchmarks for "Affirmative AI," ensuring that LLM-based chatbots can provide safe, supportive, and effective mental health support to LGBTQ+ individuals. We benchmark LLM affirmativeness not as a mental health solution for LGBTQ+ individuals or to claim it resolves their mental health issues, as we highlight the need to consider complex discrimination in the LGBTQ+ community when designing technological aids. Our goal is to evaluate LLMs for LGBTQ+ mental health support since many in the community already use them, aiming to identify potential harms of using general-purpose LLMs in this context.
△ Less
Submitted 7 May, 2024;
originally announced May 2024.
-
Language Modeling Using Tensor Trains
Authors:
Zhan Su,
Yuqin Zhou,
Fengran Mo,
Jakob Grue Simonsen
Abstract:
We propose a novel tensor network language model based on the simplest tensor network (i.e., tensor trains), called `Tensor Train Language Model' (TTLM). TTLM represents sentences in an exponential space constructed by the tensor product of words, but computing the probabilities of sentences in a low-dimensional fashion. We demonstrate that the architectures of Second-order RNNs, Recurrent Arithme…
▽ More
We propose a novel tensor network language model based on the simplest tensor network (i.e., tensor trains), called `Tensor Train Language Model' (TTLM). TTLM represents sentences in an exponential space constructed by the tensor product of words, but computing the probabilities of sentences in a low-dimensional fashion. We demonstrate that the architectures of Second-order RNNs, Recurrent Arithmetic Circuits (RACs), and Multiplicative Integration RNNs are, essentially, special cases of TTLM. Experimental evaluations on real language modeling tasks show that the proposed variants of TTLM (i.e., TTLM-Large and TTLM-Tiny) outperform the vanilla Recurrent Neural Networks (RNNs) with low-scale of hidden units. (The code is available at https://github.com/shuishen112/tensortrainlm.)
△ Less
Submitted 7 May, 2024;
originally announced May 2024.
-
Anomalous Gate-tunable Capacitance in Graphene MoirƩ Heterostructures
Authors:
Linshang Chen,
Haoran Long,
Heng Wu,
Rui Mei,
Zhengyu Su,
Mengjie Feng,
Jiang-Bin Wu,
Kenji Watanabe,
Takashi Taniguchi,
Xuewei Cao,
Zhongming Wei,
**-Heng Tan,
Yanmeng Shi
Abstract:
Interface engineered ferroelectricity in van der Waals heterostructures is of broad interest both fundamentally and technologically for the applications in neuromorphic computing and so on. In particular, the moirĆ© ferroelectricity in graphene/hexagonal boron nitride (hBN) heterostructures driven by charge ordering instead of traditional lattice displacement has drawn considerable attention becaus…
▽ More
Interface engineered ferroelectricity in van der Waals heterostructures is of broad interest both fundamentally and technologically for the applications in neuromorphic computing and so on. In particular, the moirƩ ferroelectricity in graphene/hexagonal boron nitride (hBN) heterostructures driven by charge ordering instead of traditional lattice displacement has drawn considerable attention because of its fascinating properties and promising high-frequency programmable electrical polarization switching. Yet, the underlying mechanism of the electronic ferroelectricity is still under debate. On the other hand, combining the interface engineered ferroelectricity and strong correlations in moirƩ heterostructures could enable the realization of novel quantum states such as ferroelectric superconductivity and multiferroicity. Here we study the electronic transport properties of twisted double bilayer graphene (TDBLG), aligned with one of the neighbouring hBN. We observe a strong gating hysteresis and ferroelectric-like behaviour, as well as the electronic ratchet effect. We find that the top gate is anomalously screened. On the contrary, the back gate is anomalously doubly efficient in injecting charges into graphene, that is, the effective back gate capacitance is two times larger than its geometry capacitance. This unexpected gate-tunable capacitance causes a dramatic change of electric fields between forward and backward scans. The asymmetric gating behaviours and anomalous change in capacitance could be explained with a simple model involved with a spontaneous electric polarization between top hBN and graphene. Our work provides more insights into the mysterious ferroelectricity in graphene/hBN moirƩ heterostructures and paves the way to the understanding of the underlying mechanism.
△ Less
Submitted 6 May, 2024;
originally announced May 2024.
-
Enabling Patient-side Disease Prediction via the Integration of Patient Narratives
Authors:
Zhixiang Su,
Yinan Zhang,
Jiazheng **g,
Jie Xiao,
Zhiqi Shen
Abstract:
Disease prediction holds considerable significance in modern healthcare, because of its crucial role in facilitating early intervention and implementing effective prevention measures. However, most recent disease prediction approaches heavily rely on laboratory test outcomes (e.g., blood tests and medical imaging from X-rays). Gaining access to such data for precise disease prediction is often a c…
▽ More
Disease prediction holds considerable significance in modern healthcare, because of its crucial role in facilitating early intervention and implementing effective prevention measures. However, most recent disease prediction approaches heavily rely on laboratory test outcomes (e.g., blood tests and medical imaging from X-rays). Gaining access to such data for precise disease prediction is often a complex task from the standpoint of a patient and is always only available post-patient consultation. To make disease prediction available from patient-side, we propose Personalized Medical Disease Prediction (PoMP), which predicts diseases using patient health narratives including textual descriptions and demographic information. By applying PoMP, patients can gain a clearer comprehension of their conditions, empowering them to directly seek appropriate medical specialists and thereby reducing the time spent navigating healthcare communication to locate suitable doctors. We conducted extensive experiments using real-world data from Haodf to showcase the effectiveness of PoMP.
△ Less
Submitted 5 May, 2024;
originally announced May 2024.
-
A new timescale-mass scaling for the optical variation of active galactic nuclei across the intermediate-mass to supermassive scales
Authors:
Zhen-Bo Su,
Zhen-Yi Cai,
Mouyuan Sun,
Hengxiao Guo,
Wei-Min Gu,
Jun-Xian Wang
Abstract:
Variability of active galactic nuclei (AGNs) has long been servicing as an essential avenue of exploring the accretion physics of black hole (BH). There are two commonly used methods for analyzing AGN variability. First, the AGN variability, characterized by the structure function (SF) of a single band, can be well described by a damped random walk (DRW) process on timescales longer than ~weeks, s…
▽ More
Variability of active galactic nuclei (AGNs) has long been servicing as an essential avenue of exploring the accretion physics of black hole (BH). There are two commonly used methods for analyzing AGN variability. First, the AGN variability, characterized by the structure function (SF) of a single band, can be well described by a damped random walk (DRW) process on timescales longer than ~weeks, shorter than which departures have been reported. Second, the color variation (CV) between two bands behaves timescale-dependent, raising challenges to the widely accepted reprocessing scenario. However, both the departure from the DRW process and the timescale-dependent CV are hitherto limited to AGNs, mainly quasars, at the supermassive scale. Here, utilizing the high-cadence multi-wavelength monitoring on NGC 4395 harboring an intermediate-mass BH, we unveil at the intermediate-mass scale for the first time, prominent departures from the DRW process at timescales shorter than ~hours in all three nights and bands, and plausible timescale-dependent CVs in the two longest nights of observation. Furthermore, comparing SFs of NGC 4395 to four AGNs at the supermassive scale, we suggest a new scaling relation between the timescale (\uptau; across nearly three orders of magnitude) and the BH mass (M_BH): \uptau \propto M^Ī³_BH where the exponent Ī³is likely ~ 0.6 - 0.8. This exponent differs from most previous measurements, but confirms a few and is consistent with a recent theoretical prediction, suggesting a similar accretion process in AGNs across different mass scales.
△ Less
Submitted 4 May, 2024;
originally announced May 2024.
-
A Survey on Semantic Communication Networks: Architecture, Security, and Privacy
Authors:
Shaolong Guo,
Yuntao Wang,
Ning Zhang,
Zhou Su,
Tom H. Luan,
Zhiyi Tian,
Xuemin Shen
Abstract:
Semantic communication, emerging as a breakthrough beyond the classical Shannon paradigm, aims to convey the essential meaning of source data rather than merely focusing on precise yet content-agnostic bit transmission. By interconnecting diverse intelligent agents (e.g., autonomous vehicles and VR devices) via semantic communications, the semantic communication networks (SemComNet) supports seman…
▽ More
Semantic communication, emerging as a breakthrough beyond the classical Shannon paradigm, aims to convey the essential meaning of source data rather than merely focusing on precise yet content-agnostic bit transmission. By interconnecting diverse intelligent agents (e.g., autonomous vehicles and VR devices) via semantic communications, the semantic communication networks (SemComNet) supports semantic-oriented transmission, efficient spectrum utilization, and flexible networking among collaborative agents. Consequently, SemComNet stands out for enabling ever-increasing intelligent applications, such as autonomous driving and Metaverse. However, being built on a variety of cutting-edge technologies including AI and knowledge graphs, SemComNet introduces diverse brand-new and unexpected threats, which pose obstacles to its widespread development. Besides, due to the intrinsic characteristics of SemComNet in terms of heterogeneous components, autonomous intelligence, and large-scale structure, a series of critical challenges emerge in securing SemComNet. In this paper, we provide a comprehensive and up-to-date survey of SemComNet from its fundamentals, security, and privacy aspects. Specifically, we first introduce a novel three-layer architecture of SemComNet for multi-agent interaction, which comprises the control layer, semantic transmission layer, and cognitive sensing layer. Then, we discuss its working modes and enabling technologies. Afterward, based on the layered architecture of SemComNet, we outline a taxonomy of security and privacy threats, while discussing state-of-the-art defense approaches. Finally, we present future research directions, clarifying the path toward building intelligent, robust, and green SemComNet. To our knowledge, this survey is the first to comprehensively cover the fundamentals of SemComNet, alongside a detailed analysis of its security and privacy issues.
△ Less
Submitted 2 May, 2024;
originally announced May 2024.
-
Scaffold-BPE: Enhancing Byte Pair Encoding with Simple and Effective Scaffold Token Removal
Authors:
Haoran Lian,
Yizhe Xiong,
Jianwei Niu,
Shasha Mo,
Zhenpeng Su,
Zijia Lin,
Peng Liu,
Hui Chen,
Guiguang Ding
Abstract:
Byte Pair Encoding (BPE) serves as a foundation method for text tokenization in the Natural Language Processing (NLP) field. Despite its wide adoption, the original BPE algorithm harbors an inherent flaw: it inadvertently introduces a frequency imbalance for tokens in the text corpus. Since BPE iteratively merges the most frequent token pair in the text corpus while kee** all tokens that have be…
▽ More
Byte Pair Encoding (BPE) serves as a foundation method for text tokenization in the Natural Language Processing (NLP) field. Despite its wide adoption, the original BPE algorithm harbors an inherent flaw: it inadvertently introduces a frequency imbalance for tokens in the text corpus. Since BPE iteratively merges the most frequent token pair in the text corpus while kee** all tokens that have been merged in the vocabulary, it unavoidably holds tokens that primarily represent subwords of complete words and appear infrequently on their own in the text corpus. We term such tokens as Scaffold Tokens. Due to their infrequent appearance in the text corpus, Scaffold Tokens pose a learning imbalance issue for language models. To address that issue, we propose Scaffold-BPE, which incorporates a dynamic scaffold token removal mechanism by parameter-free, computation-light, and easy-to-implement modifications to the original BPE. This novel approach ensures the exclusion of low-frequency Scaffold Tokens from the token representations for the given texts, thereby mitigating the issue of frequency imbalance and facilitating model training. On extensive experiments across language modeling tasks and machine translation tasks, Scaffold-BPE consistently outperforms the original BPE, well demonstrating its effectiveness and superiority.
△ Less
Submitted 27 April, 2024;
originally announced April 2024.
-
Temporal Scaling Law for Large Language Models
Authors:
Yizhe Xiong,
Xiansheng Chen,
Xin Ye,
Hui Chen,
Zijia Lin,
Haoran Lian,
Zhenpeng Su,
Jianwei Niu,
Guiguang Ding
Abstract:
Recently, Large Language Models (LLMs) have been widely adopted in a wide range of tasks, leading to increasing attention towards the research on how scaling LLMs affects their performance. Existing works, termed Scaling Laws, have discovered that the final test loss of LLMs scales as power-laws with model size, computational budget, and dataset size. However, the temporal change of the test loss…
▽ More
Recently, Large Language Models (LLMs) have been widely adopted in a wide range of tasks, leading to increasing attention towards the research on how scaling LLMs affects their performance. Existing works, termed Scaling Laws, have discovered that the final test loss of LLMs scales as power-laws with model size, computational budget, and dataset size. However, the temporal change of the test loss of an LLM throughout its pre-training process remains unexplored, though it is valuable in many aspects, such as selecting better hyperparameters \textit{directly} on the target LLM. In this paper, we propose the novel concept of Temporal Scaling Law, studying how the test loss of an LLM evolves as the training steps scale up. In contrast to modeling the test loss as a whole in a coarse-grained manner, we break it down and dive into the fine-grained test loss of each token position, and further develop a dynamic hyperbolic-law. Afterwards, we derive the much more precise temporal scaling law by studying the temporal patterns of the parameters in the dynamic hyperbolic-law. Results on both in-distribution (ID) and out-of-distribution (OOD) validation datasets demonstrate that our temporal scaling law accurately predicts the test loss of LLMs across training steps. Our temporal scaling law has broad practical applications. First, it enables direct and efficient hyperparameter selection on the target LLM, such as data mixture proportions. Secondly, viewing the LLM pre-training dynamics from the token position granularity provides some insights to enhance the understanding of LLM pre-training.
△ Less
Submitted 16 June, 2024; v1 submitted 27 April, 2024;
originally announced April 2024.
-
A New Algorithm With Lower Complexity for Bilevel Optimization
Authors:
Haimei Huo,
Zhixun Su
Abstract:
Many stochastic algorithms have been proposed to solve the bilevel optimization problem, where the lower level function is strongly convex and the upper level value function is nonconvex. In particular, exising Hessian inverse-free algorithms that utilize momentum recursion or variance reduction technqiues can reach an $Īµ$-stationary point with a complexity of $\tilde{O}(Īµ^{-1.5})$ under usual smo…
▽ More
Many stochastic algorithms have been proposed to solve the bilevel optimization problem, where the lower level function is strongly convex and the upper level value function is nonconvex. In particular, exising Hessian inverse-free algorithms that utilize momentum recursion or variance reduction technqiues can reach an $Īµ$-stationary point with a complexity of $\tilde{O}(Īµ^{-1.5})$ under usual smoothness conditions. However, $\tilde{O}(Īµ^{-1.5})$ is a complexity higher than $O(Īµ^{-1.5})$. How to make a Hessian inverse-free algorithm achieve the complexity of $O(Īµ^{-1.5})$ under usual smoothness conditions remains an unresolved problem. In this paper, we propose a new Hessian inverse-free algorithm based on the projected stochastic gradient descent method and variance reduction technique of SPIDER. This algorithm can achieve a complexity of $O(Īµ^{-1.5})$ under usual smoothness conditions whether it runs in a fully single loop or double loop structure. Finally, we validate our theoretical results through synthetic experiments and demonstrate the efficiency of our algorithm in some machine learning applications.
△ Less
Submitted 17 April, 2024;
originally announced April 2024.
-
Natural disasters and social entrepreneurship: An attention-based view
Authors:
Shihao Wei,
Christopher Boudreaux,
Zhongfeng Su,
Zhan Wu
Abstract:
Drawing on the attention based view, this study explores the joint effects of natural disaster intensity at the country level with personal attributes in terms of gender, human capital, and fear of failure on the likelihood to enter social entrepreneurship. Using data on 107,386 observations across 30 countries, we find that natural disaster intensity has a positive effect on individuals likelihoo…
▽ More
Drawing on the attention based view, this study explores the joint effects of natural disaster intensity at the country level with personal attributes in terms of gender, human capital, and fear of failure on the likelihood to enter social entrepreneurship. Using data on 107,386 observations across 30 countries, we find that natural disaster intensity has a positive effect on individuals likelihood to engage in social entrepreneurship. In addition, the effect of natural disaster intensity is greater for males, individuals lacking human capital, and those who fear failure. Our study helps elaborate on the antecedents of social entrepreneurship and extends the consequences of natural disasters to entrepreneurship at the individual level.
△ Less
Submitted 12 April, 2024;
originally announced April 2024.
-
Leveraging Symmetry in RL-based Legged Locomotion Control
Authors:
Zhi Su,
Xiaoyu Huang,
Daniel OrdoƱez-Apraez,
Yunfei Li,
Zhongyu Li,
Qiayuan Liao,
Giulio Turrisi,
Massimiliano Pontil,
Claudio Semini,
Yi Wu,
Koushil Sreenath
Abstract:
Model-free reinforcement learning is a promising approach for autonomously solving challenging robotics control problems, but faces exploration difficulty without information of the robot's kinematics and dynamics morphology. The under-exploration of multiple modalities with symmetric states leads to behaviors that are often unnatural and sub-optimal. This issue becomes particularly pronounced in…
▽ More
Model-free reinforcement learning is a promising approach for autonomously solving challenging robotics control problems, but faces exploration difficulty without information of the robot's kinematics and dynamics morphology. The under-exploration of multiple modalities with symmetric states leads to behaviors that are often unnatural and sub-optimal. This issue becomes particularly pronounced in the context of robotic systems with morphological symmetries, such as legged robots for which the resulting asymmetric and aperiodic behaviors compromise performance, robustness, and transferability to real hardware. To mitigate this challenge, we can leverage symmetry to guide and improve the exploration in policy learning via equivariance/invariance constraints. In this paper, we investigate the efficacy of two approaches to incorporate symmetry: modifying the network architectures to be strictly equivariant/invariant, and leveraging data augmentation to approximate equivariant/invariant actor-critics. We implement the methods on challenging loco-manipulation and bipedal locomotion tasks and compare with an unconstrained baseline. We find that the strictly equivariant policy consistently outperforms other methods in sample efficiency and task performance in simulation. In addition, symmetry-incorporated approaches exhibit better gait quality, higher robustness and can be deployed zero-shot in real-world experiments.
△ Less
Submitted 26 March, 2024; v1 submitted 25 March, 2024;
originally announced March 2024.
-
Refining Segmentation On-the-Fly: An Interactive Framework for Point Cloud Semantic Segmentation
Authors:
Peng Zhang,
Ting Wu,
**sheng Sun,
Weiqing Li,
Zhiyong Su
Abstract:
Existing interactive point cloud segmentation approaches primarily focus on the object segmentation, which aim to determine which points belong to the object of interest guided by user interactions. This paper concentrates on an unexplored yet meaningful task, i.e., interactive point cloud semantic segmentation, which assigns high-quality semantic labels to all points in a scene with user correcti…
▽ More
Existing interactive point cloud segmentation approaches primarily focus on the object segmentation, which aim to determine which points belong to the object of interest guided by user interactions. This paper concentrates on an unexplored yet meaningful task, i.e., interactive point cloud semantic segmentation, which assigns high-quality semantic labels to all points in a scene with user corrective clicks. Concretely, we presents the first interactive framework for point cloud semantic segmentation, named InterPCSeg, which seamlessly integrates with off-the-shelf semantic segmentation networks without offline re-training, enabling it to run in an on-the-fly manner. To achieve online refinement, we treat user interactions as sparse training examples during the test-time. To address the instability caused by the sparse supervision, we design a stabilization energy to regulate the test-time training process. For objective and reproducible evaluation, we develop an interaction simulation scheme tailored for the interactive point cloud semantic segmentation task. We evaluate our framework on the S3DIS and ScanNet datasets with off-the-shelf segmentation networks, incorporating interactions from both the proposed interaction simulator and real users. Quantitative and qualitative experimental results demonstrate the efficacy of our framework in refining the semantic segmentation results with user interactions. The source code will be publicly available.
△ Less
Submitted 10 March, 2024;
originally announced March 2024.
-
Reframe Anything: LLM Agent for Open World Video Reframing
Authors:
Jiawang Cao,
Yongliang Wu,
Weiheng Chi,
Wenbo Zhu,
Ziyue Su,
Jay Wu
Abstract:
The proliferation of mobile devices and social media has revolutionized content dissemination, with short-form video becoming increasingly prevalent. This shift has introduced the challenge of video reframing to fit various screen aspect ratios, a process that highlights the most compelling parts of a video. Traditionally, video reframing is a manual, time-consuming task requiring professional exp…
▽ More
The proliferation of mobile devices and social media has revolutionized content dissemination, with short-form video becoming increasingly prevalent. This shift has introduced the challenge of video reframing to fit various screen aspect ratios, a process that highlights the most compelling parts of a video. Traditionally, video reframing is a manual, time-consuming task requiring professional expertise, which incurs high production costs. A potential solution is to adopt some machine learning models, such as video salient object detection, to automate the process. However, these methods often lack generalizability due to their reliance on specific training data. The advent of powerful large language models (LLMs) open new avenues for AI capabilities. Building on this, we introduce Reframe Any Video Agent (RAVA), a LLM-based agent that leverages visual foundation models and human instructions to restructure visual content for video reframing. RAVA operates in three stages: perception, where it interprets user instructions and video content; planning, where it determines aspect ratios and reframing strategies; and execution, where it invokes the editing tools to produce the final video. Our experiments validate the effectiveness of RAVA in video salient object detection and real-world reframing tasks, demonstrating its potential as a tool for AI-powered video editing.
△ Less
Submitted 9 March, 2024;
originally announced March 2024.
-
Is this the real life? Is this just fantasy? The Misleading Success of Simulating Social Interactions With LLMs
Authors:
Xuhui Zhou,
Zhe Su,
Tiwalayo Eisape,
Hyunwoo Kim,
Maarten Sap
Abstract:
Recent advances in large language models (LLM) have enabled richer social simulations, allowing for the study of various social phenomena. However, most recent work has used a more omniscient perspective on these simulations (e.g., single LLM to generate all interlocutors), which is fundamentally at odds with the non-omniscient, information asymmetric interactions that involve humans and AI agents…
▽ More
Recent advances in large language models (LLM) have enabled richer social simulations, allowing for the study of various social phenomena. However, most recent work has used a more omniscient perspective on these simulations (e.g., single LLM to generate all interlocutors), which is fundamentally at odds with the non-omniscient, information asymmetric interactions that involve humans and AI agents in the real world. To examine these differences, we develop an evaluation framework to simulate social interactions with LLMs in various settings (omniscient, non-omniscient). Our experiments show that LLMs perform better in unrealistic, omniscient simulation settings but struggle in ones that more accurately reflect real-world conditions with information asymmetry. Our findings indicate that addressing information asymmetry remains a fundamental challenge for LLM-based agents.
△ Less
Submitted 18 April, 2024; v1 submitted 7 March, 2024;
originally announced March 2024.
-
Continuous and deterministic all-photonic cluster state of indistinguishable photons
Authors:
Zu-En Su,
Boaz Taitler,
Ido Schwartz,
Dan Cogan,
Ismail Nassar,
Oded Kenneth,
Netanel H. Lindner,
David Gershoni
Abstract:
Cluster states are key resources for measurement-based quantum information processing. Photonic cluster and graph states, in particular, play indispensable roles in quantum network and quantum metrology. We demonstrate a semiconductor quantum dot based device in which the confined hole spin acts as a needle in a quantum knitting machine producing continuously and deterministically at sub-Gigahertz…
▽ More
Cluster states are key resources for measurement-based quantum information processing. Photonic cluster and graph states, in particular, play indispensable roles in quantum network and quantum metrology. We demonstrate a semiconductor quantum dot based device in which the confined hole spin acts as a needle in a quantum knitting machine producing continuously and deterministically at sub-Gigahertz repetition rate single indistinguishable photons which are all polarization entangled to each other and to the spin in a one dimensional cluster state. By projecting two nonadjacent photons onto circular polarization bases we disentangle the spin from the photons emitted in between, thus continuously and deterministically preparing all-photonic cluster states for the first time. We use polarization tomography on four sequentially detected photons to demonstrate and to directly quantify the robustness of the cluster's entanglement and the determinism in its photon generation.
△ Less
Submitted 6 March, 2024;
originally announced March 2024.
-
HMD-Poser: On-Device Real-time Human Motion Tracking from Scalable Sparse Observations
Authors:
Peng Dai,
Yang Zhang,
Tao Liu,
Zhen Fan,
Tianyuan Du,
Zhuo Su,
Xiaozheng Zheng,
Zeming Li
Abstract:
It is especially challenging to achieve real-time human motion tracking on a standalone VR Head-Mounted Display (HMD) such as Meta Quest and PICO. In this paper, we propose HMD-Poser, the first unified approach to recover full-body motions using scalable sparse observations from HMD and body-worn IMUs. In particular, it can support a variety of input scenarios, such as HMD, HMD+2IMUs, HMD+3IMUs, e…
▽ More
It is especially challenging to achieve real-time human motion tracking on a standalone VR Head-Mounted Display (HMD) such as Meta Quest and PICO. In this paper, we propose HMD-Poser, the first unified approach to recover full-body motions using scalable sparse observations from HMD and body-worn IMUs. In particular, it can support a variety of input scenarios, such as HMD, HMD+2IMUs, HMD+3IMUs, etc. The scalability of inputs may accommodate users' choices for both high tracking accuracy and easy-to-wear. A lightweight temporal-spatial feature learning network is proposed in HMD-Poser to guarantee that the model runs in real-time on HMDs. Furthermore, HMD-Poser presents online body shape estimation to improve the position accuracy of body joints. Extensive experimental results on the challenging AMASS dataset show that HMD-Poser achieves new state-of-the-art results in both accuracy and real-time performance. We also build a new free-dancing motion dataset to evaluate HMD-Poser's on-device performance and investigate the performance gap between synthetic data and real-captured sensor data. Finally, we demonstrate our HMD-Poser with a real-time Avatar-driving application on a commercial HMD. Our code and free-dancing motion dataset are available https://pico-ai-team.github.io/hmd-poser
△ Less
Submitted 6 March, 2024;
originally announced March 2024.
-
Enhancing Information Maximization with Distance-Aware Contrastive Learning for Source-Free Cross-Domain Few-Shot Learning
Authors:
Huali Xu,
Li Liu,
Shuaifeng Zhi,
Shao**g Fu,
Zhuo Su,
Ming-Ming Cheng,
Yongxiang Liu
Abstract:
Existing Cross-Domain Few-Shot Learning (CDFSL) methods require access to source domain data to train a model in the pre-training phase. However, due to increasing concerns about data privacy and the desire to reduce data transmission and training costs, it is necessary to develop a CDFSL solution without accessing source data. For this reason, this paper explores a Source-Free CDFSL (SF-CDFSL) pr…
▽ More
Existing Cross-Domain Few-Shot Learning (CDFSL) methods require access to source domain data to train a model in the pre-training phase. However, due to increasing concerns about data privacy and the desire to reduce data transmission and training costs, it is necessary to develop a CDFSL solution without accessing source data. For this reason, this paper explores a Source-Free CDFSL (SF-CDFSL) problem, in which CDFSL is addressed through the use of existing pretrained models instead of training a model with source data, avoiding accessing source data. This paper proposes an Enhanced Information Maximization with Distance-Aware Contrastive Learning (IM-DCL) method to address these challenges. Firstly, we introduce the transductive mechanism for learning the query set. Secondly, information maximization (IM) is explored to map target samples into both individual certainty and global diversity predictions, hel** the source model better fit the target data distribution. However, IM fails to learn the decision boundary of the target task. This motivates us to introduce a novel approach called Distance-Aware Contrastive Learning (DCL), in which we consider the entire feature set as both positive and negative sets, akin to Schrodinger's concept of a dual state. Instead of a rigid separation between positive and negative sets, we employ a weighted distance calculation among features to establish a soft classification of the positive and negative sets for the entire feature set. Furthermore, we address issues related to IM by incorporating contrastive constraints between object features and their corresponding positive and negative sets. Evaluations of the 4 datasets in the BSCD-FSL benchmark indicate that the proposed IM-DCL, without accessing the source domain, demonstrates superiority over existing methods, especially in the distant domain task.
△ Less
Submitted 4 March, 2024;
originally announced March 2024.
-
Observational Evidence for Hot Wind Impact on pc-scale in Low-luminosity Active Galactic Nucleus
Authors:
Fangzheng Shi,
Feng Yuan,
Zhiyuan Li,
Zhao Su,
Suoqing Ji
Abstract:
Supermassive black holes in galaxies spend majority of their lifetime in the low-luminosity regime, powered by hot accretion flow. Strong winds launched from the hot accretion flow have the potential to play an important role in active galactic nuclei (AGN) feedback. Direct observational evidence for these hot winds with temperature around 10 keV, has been obtained through the detection of highly…
▽ More
Supermassive black holes in galaxies spend majority of their lifetime in the low-luminosity regime, powered by hot accretion flow. Strong winds launched from the hot accretion flow have the potential to play an important role in active galactic nuclei (AGN) feedback. Direct observational evidence for these hot winds with temperature around 10 keV, has been obtained through the detection of highly ionized iron emission lines with Doppler shifts in two prototypical low-luminosity AGNs, namely M81* and NGC 7213. In this work, we further identify blueshifted H-like O/Ne emission lines in the soft X-ray spectra of these two sources. These lines are interpreted to be associated with additional outflowing components possessing velocity around several $10^3$ km/s and lower temperature (~0.2-0.4 keV). Blue-shifted velocity and the X-ray intensity of these additional outflowing components are hard to be explained by previously detected hot wind freely propagating to larger radii. Through detailed numerical simulations, we find the newly detected blue-shifted emission lines would come from circumnuclear gas shock-heated by the hot wind instead. Hot wind can provide larger ram pressure force on the clumpy circumnuclear gas than the gravitational force from central black hole, effectively impeding the black hole accretion of gas. Our results provide strong evidences for the energy and momentum feedback by the hot AGN wind.
△ Less
Submitted 1 March, 2024;
originally announced March 2024.
-
OHTA: One-shot Hand Avatar via Data-driven Implicit Priors
Authors:
Xiaozheng Zheng,
Chao Wen,
Zhuo Su,
Zeran Xu,
Zhaohu Li,
Yang Zhao,
Zhou Xue
Abstract:
In this paper, we delve into the creation of one-shot hand avatars, attaining high-fidelity and drivable hand representations swiftly from a single image. With the burgeoning domains of the digital human, the need for quick and personalized hand avatar creation has become increasingly critical. Existing techniques typically require extensive input data and may prove cumbersome or even impractical…
▽ More
In this paper, we delve into the creation of one-shot hand avatars, attaining high-fidelity and drivable hand representations swiftly from a single image. With the burgeoning domains of the digital human, the need for quick and personalized hand avatar creation has become increasingly critical. Existing techniques typically require extensive input data and may prove cumbersome or even impractical in certain scenarios. To enhance accessibility, we present a novel method OHTA (One-shot Hand avaTAr) that enables the creation of detailed hand avatars from merely one image. OHTA tackles the inherent difficulties of this data-limited problem by learning and utilizing data-driven hand priors. Specifically, we design a hand prior model initially employed for 1) learning various hand priors with available data and subsequently for 2) the inversion and fitting of the target identity with prior knowledge. OHTA demonstrates the capability to create high-fidelity hand avatars with consistent animatable quality, solely relying on a single image. Furthermore, we illustrate the versatility of OHTA through diverse applications, encompassing text-to-avatar conversion, hand editing, and identity latent space manipulation.
△ Less
Submitted 29 February, 2024;
originally announced February 2024.
-
LoLiSRFlow: Joint Single Image Low-light Enhancement and Super-resolution via Cross-scale Transformer-based Conditional Flow
Authors:
Ziyu Yue,
Jiaxin Gao,
Sihan Xie,
Yang Liu,
Zhixun Su
Abstract:
The visibility of real-world images is often limited by both low-light and low-resolution, however, these issues are only addressed in the literature through Low-Light Enhancement (LLE) and Super- Resolution (SR) methods. Admittedly, a simple cascade of these approaches cannot work harmoniously to cope well with the highly ill-posed problem for simultaneously enhancing visibility and resolution. I…
▽ More
The visibility of real-world images is often limited by both low-light and low-resolution, however, these issues are only addressed in the literature through Low-Light Enhancement (LLE) and Super- Resolution (SR) methods. Admittedly, a simple cascade of these approaches cannot work harmoniously to cope well with the highly ill-posed problem for simultaneously enhancing visibility and resolution. In this paper, we propose a normalizing flow network, dubbed LoLiSRFLow, specifically designed to consider the degradation mechanism inherent in joint LLE and SR. To break the bonds of the one-to-many map** for low-light low-resolution images to normal-light high-resolution images, LoLiSRFLow directly learns the conditional probability distribution over a variety of feasible solutions for high-resolution well-exposed images. Specifically, a multi-resolution parallel transformer acts as a conditional encoder that extracts the Retinex-induced resolution-and-illumination invariant map as the previous one. And the invertible network maps the distribution of usually exposed high-resolution images to a latent distribution. The backward inference is equivalent to introducing an additional constrained loss for the normal training route, thus enabling the manifold of the natural exposure of the high-resolution image to be immaculately depicted. We also propose a synthetic dataset modeling the realistic low-light low-resolution degradation, named DFSR-LLE, containing 7100 low-resolution dark-light/high-resolution normal sharp pairs. Quantitative and qualitative experimental results demonstrate the effectiveness of our method on both the proposed synthetic and real datasets.
△ Less
Submitted 29 February, 2024;
originally announced February 2024.
-
SAND: Decoupling Sanitization from Fuzzing for Low Overhead
Authors:
Ziqiao Kong,
Shaohua Li,
Heqing Huang,
Zhendong Su
Abstract:
Sanitizers provide robust test oracles for various software vulnerabilities. Fuzzing on sanitizer-enabled programs has been the best practice to find software bugs. Since sanitizers need to heavily instrument a target program to insert run-time checks, sanitizer-enabled programs have much higher overhead compared to normally built programs. In this paper, we present SAND, a new fuzzing framework t…
▽ More
Sanitizers provide robust test oracles for various software vulnerabilities. Fuzzing on sanitizer-enabled programs has been the best practice to find software bugs. Since sanitizers need to heavily instrument a target program to insert run-time checks, sanitizer-enabled programs have much higher overhead compared to normally built programs. In this paper, we present SAND, a new fuzzing framework that decouples sanitization from the fuzzing loop. SAND performs fuzzing on a normally built program and only invokes sanitizer-enabled programs when input is shown to be interesting. Since most of the generated inputs are not interesting, i.e., not bug-triggering, SAND allows most of the fuzzing time to be spent on the normally built program. To identify interesting inputs, we introduce execution pattern for a practical execution analysis on the normally built program. We realize SAND on top of AFL++ and evaluate it on 12 real-world programs. Our extensive evaluation highlights its effectiveness: on a period of 24 hours, compared to fuzzing on ASan/UBSan-enabled and MSan-enabled programs, SAND respectively achieves 2.6x and 15x throughput and detects 51% and 242% more bugs.
△ Less
Submitted 26 February, 2024;
originally announced February 2024.
-
Semi-supervised Counting via Pixel-by-pixel Density Distribution Modelling
Authors:
Hui Lin,
Zhiheng Ma,
Rongrong Ji,
Yaowei Wang,
Zhou Su,
Xiaopeng Hong,
Deyu Meng
Abstract:
This paper focuses on semi-supervised crowd counting, where only a small portion of the training data are labeled. We formulate the pixel-wise density value to regress as a probability distribution, instead of a single deterministic value. On this basis, we propose a semi-supervised crowd-counting model. Firstly, we design a pixel-wise distribution matching loss to measure the differences in the p…
▽ More
This paper focuses on semi-supervised crowd counting, where only a small portion of the training data are labeled. We formulate the pixel-wise density value to regress as a probability distribution, instead of a single deterministic value. On this basis, we propose a semi-supervised crowd-counting model. Firstly, we design a pixel-wise distribution matching loss to measure the differences in the pixel-wise density distributions between the prediction and the ground truth; Secondly, we enhance the transformer decoder by using density tokens to specialize the forwards of decoders w.r.t. different density intervals; Thirdly, we design the interleaving consistency self-supervised learning mechanism to learn from unlabeled data efficiently. Extensive experiments on four datasets are performed to show that our method clearly outperforms the competitors by a large margin under various labeled ratio settings. Code will be released at https://github.com/LoraLinH/Semi-supervised-Counting-via-Pixel-by-pixel-Density-Distribution-Modelling.
△ Less
Submitted 23 February, 2024;
originally announced February 2024.