-
Minimising the Probabilistic Bisimilarity Distance
Authors:
Stefan Kiefer,
Qiyi Tang
Abstract:
A labelled Markov decision process (MDP) is a labelled Markov chain with nondeterminism; i.e., together with a strategy a labelled MDP induces a labelled Markov chain. The model is related to interval Markov chains. Motivated by applications to the verification of probabilistic noninterference in security, we study problems of minimising probabilistic bisimilarity distances of labelled MDPs, in pa…
▽ More
A labelled Markov decision process (MDP) is a labelled Markov chain with nondeterminism; i.e., together with a strategy a labelled MDP induces a labelled Markov chain. The model is related to interval Markov chains. Motivated by applications to the verification of probabilistic noninterference in security, we study problems of minimising probabilistic bisimilarity distances of labelled MDPs, in particular, whether there exist strategies such that the probabilistic bisimilarity distance between the induced labelled Markov chains is less than a given rational number, both for memoryless strategies and general strategies. We show that the distance minimisation problem is ExTh(R)-complete for memoryless strategies and undecidable for general strategies. We also study the computational complexity of the qualitative problem about making the distance less than one. This problem is known to be NP-complete for memoryless strategies. We show that it is EXPTIME-complete for general strategies.
△ Less
Submitted 28 June, 2024;
originally announced June 2024.
-
Advancing UWF-SLO Vessel Segmentation with Source-Free Active Domain Adaptation and a Novel Multi-Center Dataset
Authors:
Hongqiu Wang,
Xiangde Luo,
Wu Chen,
Qingqing Tang,
Mei Xin,
Qiong Wang,
Lei Zhu
Abstract:
Accurate vessel segmentation in Ultra-Wide-Field Scanning Laser Ophthalmoscopy (UWF-SLO) images is crucial for diagnosing retinal diseases. Although recent techniques have shown encouraging outcomes in vessel segmentation, models trained on one medical dataset often underperform on others due to domain shifts. Meanwhile, manually labeling high-resolution UWF-SLO images is an extremely challenging,…
▽ More
Accurate vessel segmentation in Ultra-Wide-Field Scanning Laser Ophthalmoscopy (UWF-SLO) images is crucial for diagnosing retinal diseases. Although recent techniques have shown encouraging outcomes in vessel segmentation, models trained on one medical dataset often underperform on others due to domain shifts. Meanwhile, manually labeling high-resolution UWF-SLO images is an extremely challenging, time-consuming and expensive task. In response, this study introduces a pioneering framework that leverages a patch-based active domain adaptation approach. By actively recommending a few valuable image patches by the devised Cascade Uncertainty-Predominance (CUP) selection strategy for labeling and model-finetuning, our method significantly improves the accuracy of UWF-SLO vessel segmentation across diverse medical centers. In addition, we annotate and construct the first Multi-center UWF-SLO Vessel Segmentation (MU-VS) dataset to promote this topic research, comprising data from multiple institutions. This dataset serves as a valuable resource for cross-center evaluation, verifying the effectiveness and robustness of our approach. Experimental results demonstrate that our approach surpasses existing domain adaptation and active learning methods, considerably reducing the gap between the Upper and Lower bounds with minimal annotations, highlighting our method's practical clinical value. We will release our dataset and code to facilitate relevant research: https://github.com/whq-xxh/SFADA-UWF-SLO.
△ Less
Submitted 19 June, 2024;
originally announced June 2024.
-
Constraints on Ultra Heavy Dark Matter Properties from Dwarf Spheroidal Galaxies with LHAASO Observations
Authors:
Zhen Cao,
F. Aharonian,
Q. An,
Axikegu,
Y. X. Bai,
Y. W. Bao,
D. Bastieri,
X. J. Bi,
Y. J. Bi,
J. T. Cai,
Q. Cao,
W. Y. Cao,
Zhe Cao,
J. Chang,
J. F. Chang,
A. M. Chen,
E. S. Chen,
Liang Chen,
Lin Chen,
Long Chen,
M. J. Chen,
M. L. Chen,
Q. H. Chen,
S. H. Chen,
S. Z. Chen
, et al. (255 additional authors not shown)
Abstract:
In this work we try to search for signals generated by ultra-heavy dark matter at the Large High Altitude Air Shower Observatory (LHAASO) data. We look for possible gamma-ray by dark matter annihilation or decay from 16 dwarf spheroidal galaxies in the field of view of LHAASO. Dwarf spheroidal galaxies are among the most promising targets for indirect detection of dark matter which have low fluxes…
▽ More
In this work we try to search for signals generated by ultra-heavy dark matter at the Large High Altitude Air Shower Observatory (LHAASO) data. We look for possible gamma-ray by dark matter annihilation or decay from 16 dwarf spheroidal galaxies in the field of view of LHAASO. Dwarf spheroidal galaxies are among the most promising targets for indirect detection of dark matter which have low fluxes of astrophysical $γ$-ray background while large amount of dark matter. By analyzing more than 700 days observational data at LHAASO, no significant dark matter signal from 1 TeV to 1 EeV is detected. Accordingly we derive the most stringent constraints on the ultra-heavy dark matter annihilation cross-section up to EeV. The constraints on the lifetime of dark matter in decay mode are also derived.
△ Less
Submitted 12 June, 2024;
originally announced June 2024.
-
Chromatic symmetric functions of conjoined graphs
Authors:
E. Y. J. Qi,
D. Q. B. Tang,
D. G. L. Wang
Abstract:
We introduce path-conjoined graphs defined for two rooted graphs by joining their roots with a path, and investigate the chromatic symmetric functions of its two generalizations: spider-conjoined graphs and chain-conjoined graphs. By using the composition method developed by Zhou and the third author, we obtain neat positive $e_I$-expansions for the chromatic symmetric functions of clique-path-cyc…
▽ More
We introduce path-conjoined graphs defined for two rooted graphs by joining their roots with a path, and investigate the chromatic symmetric functions of its two generalizations: spider-conjoined graphs and chain-conjoined graphs. By using the composition method developed by Zhou and the third author, we obtain neat positive $e_I$-expansions for the chromatic symmetric functions of clique-path-cycle graphs, path-clique-path graphs, and path-clique-clique graphs.
△ Less
Submitted 3 June, 2024;
originally announced June 2024.
-
JUNO Sensitivity to Invisible Decay Modes of Neutrons
Authors:
JUNO Collaboration,
Angel Abusleme,
Thomas Adam,
Kai Adamowicz,
Shakeel Ahmad,
Rizwan Ahmed,
Sebastiano Aiello,
Fengpeng An,
Qi An,
Giuseppe Andronico,
Nikolay Anfimov,
Vito Antonelli,
Tatiana Antoshkina,
João Pedro Athayde Marcondes de André,
Didier Auguste,
Weidong Bai,
Nikita Balashov,
Wander Baldini,
Andrea Barresi,
Davide Basilico,
Eric Baussan,
Marco Bellato,
Marco Beretta,
Antonio Bergnoli,
Daniel Bick
, et al. (635 additional authors not shown)
Abstract:
We explore the bound neutrons decay into invisible particles (e.g., $n\rightarrow 3 ν$ or $nn \rightarrow 2 ν$) in the JUNO liquid scintillator detector. The invisible decay includes two decay modes: $ n \rightarrow { inv} $ and $ nn \rightarrow { inv} $. The invisible decays of $s$-shell neutrons in $^{12}{\rm C}$ will leave a highly excited residual nucleus. Subsequently, some de-excitation mode…
▽ More
We explore the bound neutrons decay into invisible particles (e.g., $n\rightarrow 3 ν$ or $nn \rightarrow 2 ν$) in the JUNO liquid scintillator detector. The invisible decay includes two decay modes: $ n \rightarrow { inv} $ and $ nn \rightarrow { inv} $. The invisible decays of $s$-shell neutrons in $^{12}{\rm C}$ will leave a highly excited residual nucleus. Subsequently, some de-excitation modes of the excited residual nuclei can produce a time- and space-correlated triple coincidence signal in the JUNO detector. Based on a full Monte Carlo simulation informed with the latest available data, we estimate all backgrounds, including inverse beta decay events of the reactor antineutrino $\barν_e$, natural radioactivity, cosmogenic isotopes and neutral current interactions of atmospheric neutrinos. Pulse shape discrimination and multivariate analysis techniques are employed to further suppress backgrounds. With two years of exposure, JUNO is expected to give an order of magnitude improvement compared to the current best limits. After 10 years of data taking, the JUNO expected sensitivities at a 90% confidence level are $τ/B( n \rightarrow { inv} ) > 5.0 \times 10^{31} \, {\rm yr}$ and $τ/B( nn \rightarrow { inv} ) > 1.4 \times 10^{32} \, {\rm yr}$.
△ Less
Submitted 27 May, 2024;
originally announced May 2024.
-
Simulation Study on Constraining GW Propagation Speed by GW and GRB Joint Observation on Binary Neutron Star Mergers
Authors:
**-Hui Rao,
Shu-Xu Yi,
Lian Tao,
Qing-Wen Tang
Abstract:
Theories of modified gravity suggest that the propagation speed of gravitational wave (GW) $v_g$ may deviate from the speed of light $c$. A constraint can be placed on the difference between $c$ and $v_g$ with a simple method that uses the arrival time delay between GW and electromagnetic (EM) wave simultaneously emitted from a burst event. We simulated the joint observation of GW and short Gamma-…
▽ More
Theories of modified gravity suggest that the propagation speed of gravitational wave (GW) $v_g$ may deviate from the speed of light $c$. A constraint can be placed on the difference between $c$ and $v_g$ with a simple method that uses the arrival time delay between GW and electromagnetic (EM) wave simultaneously emitted from a burst event. We simulated the joint observation of GW and short Gamma-Ray burst (sGRB) signals from Binary Neutron Star (BNS) merger events in different observation campaigns, involving advanced LIGO (aLIGO) in design sensitivity and Einstein Telescope (ET) joint-detected with \textit{Fermi}/GBM. As a result, the relative precision of constraint on $v_g$ can reach $\sim 10^{-17}$ (aLIGO) and $\sim 10^{-18}$ (ET), which are one and two orders of magnitude better than that from GW170817, respectively. We continue to obtain the bound of graviton mass $m_g \leq 7.1(3.2)\times 10^{-20}\,$eV with aLIGO (ET). Applying the Standard-Model Extension (SME) test framework, the constraint on $v_g$ allows us to study the Lorentz violation in the nondispersive, nonbirefringent limit of the gravitational sector. We obtain the constraints of the dimensionless isotropic coefficients $\bar{s}_{00}^{(4)}$ at mass dimension $d = 4$, which are $-1\times 10^{-15}< \bar{s}_{00}^{(4)}<9\times 10^{-17}$ for aLIGO and $-4\times 10^{-16}< \bar{s}_{00}^{(4)}<8\times 10^{-18}$ for ET.
△ Less
Submitted 21 May, 2024;
originally announced May 2024.
-
Trend to equilibrium for degenerate reaction-diffusion systems coming out of chemistry
Authors:
Laurent Desvillettes,
Kim Dang Phung,
Bao Quoc Tang
Abstract:
The trend to equilibrium for reaction-diffusion systems coming out of chemistry is investigated, in the case when reaction processes might happen only on some open subsets of the domain. A special case has been studied recently in [Desvillettes, L., \\& Phung, K. D. (2022). Journal of Differential Equations, 338, 227-255] using log convexity technique from controllability theory, which in turn req…
▽ More
The trend to equilibrium for reaction-diffusion systems coming out of chemistry is investigated, in the case when reaction processes might happen only on some open subsets of the domain. A special case has been studied recently in [Desvillettes, L., \\& Phung, K. D. (2022). Journal of Differential Equations, 338, 227-255] using log convexity technique from controllability theory, which in turn requires some amount of regularity for the solutions, and is difficult to generalise to more general systems. In this paper, we prove the convergence to equilibrium directly using vector-valued functional inequalities. One major advantage of our approach is that it allows to deal with nonlinearities of arbitrary orders, for which only global renormalised solutions are known to globally exist. For a specific situation where solutions are known to be bounded, we also prove the convergence to equilibrium when the diffusion as well as the reaction rates are degenerate. For this situation, we also treat the case of reactions happening in a set of strictly positive measure which may have an empty interior.
△ Less
Submitted 21 May, 2024;
originally announced May 2024.
-
Data quality control system and long-term performance monitor of the LHAASO-KM2A
Authors:
Zhen Cao,
F. Aharonian,
Axikegu,
Y. X. Bai,
Y. W. Bao,
D. Bastieri,
X. J. Bi,
Y. J. Bi,
W. Bian,
A. V. Bukevich,
Q. Cao,
W. Y. Cao,
Zhe Cao,
J. Chang,
J. F. Chang,
A. M. Chen,
E. S. Chen,
H. X. Chen,
Liang Chen,
Lin Chen,
Long Chen,
M. J. Chen,
M. L. Chen,
Q. H. Chen,
S. Chen
, et al. (263 additional authors not shown)
Abstract:
The KM2A is the largest sub-array of the Large High Altitude Air Shower Observatory (LHAASO). It consists of 5216 electromagnetic particle detectors (EDs) and 1188 muon detectors (MDs). The data recorded by the EDs and MDs are used to reconstruct primary information of cosmic ray and gamma-ray showers. This information is used for physical analysis in gamma-ray astronomy and cosmic ray physics. To…
▽ More
The KM2A is the largest sub-array of the Large High Altitude Air Shower Observatory (LHAASO). It consists of 5216 electromagnetic particle detectors (EDs) and 1188 muon detectors (MDs). The data recorded by the EDs and MDs are used to reconstruct primary information of cosmic ray and gamma-ray showers. This information is used for physical analysis in gamma-ray astronomy and cosmic ray physics. To ensure the reliability of the LHAASO-KM2A data, a three-level quality control system has been established. It is used to monitor the status of detector units, stability of reconstructed parameters and the performance of the array based on observations of the Crab Nebula and Moon shadow. This paper will introduce the control system and its application on the LHAASO-KM2A data collected from August 2021 to July 2023. During this period, the pointing and angular resolution of the array were stable. From the observations of the Moon shadow and Crab Nebula, the results achieved using the two methods are consistent with each other. According to the observation of the Crab Nebula at energies from 25 TeV to 100 TeV, the time averaged pointing errors are estimated to be $-0.003^{\circ} \pm 0.005^{\circ}$ and $0.001^{\circ} \pm 0.006^{\circ}$ in the R.A. and Dec directions, respectively.
△ Less
Submitted 13 June, 2024; v1 submitted 20 May, 2024;
originally announced May 2024.
-
Discovery of Very-high-energy Gamma-ray Emissions from the Low Luminosity AGN NGC 4278 by LHAASO
Authors:
Zhen Cao,
F. Aharonian,
Q. An,
Axikegu,
Y. X. Bai,
Y. W. Bao,
D. Bastieri,
X. J. Bi,
Y. J. Bi,
J. T. Cai,
Q. Cao,
W. Y. Cao,
Zhe Cao,
J. Chang,
J. F. Chang,
A. M. Chen,
E. S. Chen,
Liang Chen,
Lin Chen,
Long Chen,
M. J. Chen,
M. L. Chen,
Q. H. Chen,
S. H. Chen,
S. Z. Chen
, et al. (255 additional authors not shown)
Abstract:
The first source catalog of Large High Altitude Air Shower Observatory reported the detection of a very-high-energy gamma ray source, 1LHAASO J1219+2915. In this paper a further detailed study of the spectral and temporal behavior of this point-like source have been carried. The best-fit position of the TeV source ($\rm{RA}=185.05^{\circ}\pm0.04^{\circ}$, $\rm{Dec}=29.25^{\circ}\pm0.03^{\circ}$) i…
▽ More
The first source catalog of Large High Altitude Air Shower Observatory reported the detection of a very-high-energy gamma ray source, 1LHAASO J1219+2915. In this paper a further detailed study of the spectral and temporal behavior of this point-like source have been carried. The best-fit position of the TeV source ($\rm{RA}=185.05^{\circ}\pm0.04^{\circ}$, $\rm{Dec}=29.25^{\circ}\pm0.03^{\circ}$) is compatible with NGC 4278 within $\sim0.03$ degree. Variation analysis shows an indication of the variability at a few months level in the TeV band, which is consistent with low frequency observations. Based on these observations, we report the detection of TeV $γ$-ray emissions from this low-luminosity AGN NGC 4278. The observations by LHAASO-WCDA during active period has a significance level of 8.8\,$σ$ with best-fit photon spectral index $\varGamma=2.56\pm0.14$ and a flux $f_{1-10\,\rm{TeV}}=(7.0\pm1.1_{\rm{sta}}\pm0.35_{\rm{syst}})\times10^{-13}\,\rm{photons\,cm^{-2}\,s^{-1}}$, or approximately $5\%$ of the Crab Nebula. The discovery of VHE from NGC 4278 indicates that the compact, weak radio jet can efficiently accelerate particles and emit TeV photons.
△ Less
Submitted 13 May, 2024;
originally announced May 2024.
-
The spiders $S(4m+2,\,2m,\,1)$ are $e$-positivite
Authors:
Davion Q. B. Tang,
David G. L. Wang,
Monica M. Y. Wang
Abstract:
We establish the $e$-positivity of spider graphs of the form $S(4m+2,\, 2m,\, 1)$, which was conjectured by Aliniaeifard, Wang and van Willigenburg. A key to our proof is the $e_I$-expansion formula of the chromatic symmetric function of paths due to Shareshian and Wachs, where the symbol~$I$ indicates integer compositions rather than partitions. Following the strategy of the divide-and-conquer te…
▽ More
We establish the $e$-positivity of spider graphs of the form $S(4m+2,\, 2m,\, 1)$, which was conjectured by Aliniaeifard, Wang and van Willigenburg. A key to our proof is the $e_I$-expansion formula of the chromatic symmetric function of paths due to Shareshian and Wachs, where the symbol~$I$ indicates integer compositions rather than partitions. Following the strategy of the divide-and-conquer technique, we pick out one or two positive $e_J$-terms for each negative $e_I$-term in an $e$-expression for the spiders, where $J$ are selected to be distinct compositions obtained by rearranging the parts of $I$.
△ Less
Submitted 8 May, 2024;
originally announced May 2024.
-
Learning equilibria in Cournot mean field games of controls
Authors:
Fabio Camilli,
Mathieu Laurière,
Qing Tang
Abstract:
We consider Cournot mean field games of controls, a model originally developed for the production of an exhaustible resource by a continuum of producers. We prove uniqueness of the solution under general assumptions on the price function. Then, we prove convergence of a learning algorithm which gives existence of a solution to the mean field games system. The learning algorithm is implemented with…
▽ More
We consider Cournot mean field games of controls, a model originally developed for the production of an exhaustible resource by a continuum of producers. We prove uniqueness of the solution under general assumptions on the price function. Then, we prove convergence of a learning algorithm which gives existence of a solution to the mean field games system. The learning algorithm is implemented with a suitable finite difference discretization to get a numerical method to the solution. We supplement our theoretical analysis with several numerical examples and illustrate the impacts of model parameters.
△ Less
Submitted 2 May, 2024;
originally announced May 2024.
-
Soft X-ray prompt emission from a high-redshift gamma-ray burst EP240315a
Authors:
Y. Liu,
H. Sun,
D. Xu,
D. S. Svinkin,
J. Delaunay,
N. R. Tanvir,
H. Gao,
C. Zhang,
Y. Chen,
X. -F. Wu,
B. Zhang,
W. Yuan,
J. An,
G. Bruni,
D. D. Frederiks,
G. Ghirlanda,
J. -W. Hu,
A. Li,
C. -K. Li,
J. -D. Li,
D. B. Malesani,
L. Piro,
G. Raman,
R. Ricci,
E. Troja
, et al. (170 additional authors not shown)
Abstract:
Long gamma-ray bursts (GRBs) are believed to originate from core collapse of massive stars. High-redshift GRBs can probe the star formation and reionization history of the early universe, but their detection remains rare. Here we report the detection of a GRB triggered in the 0.5--4 keV band by the Wide-field X-ray Telescope (WXT) on board the Einstein Probe (EP) mission, designated as EP240315a,…
▽ More
Long gamma-ray bursts (GRBs) are believed to originate from core collapse of massive stars. High-redshift GRBs can probe the star formation and reionization history of the early universe, but their detection remains rare. Here we report the detection of a GRB triggered in the 0.5--4 keV band by the Wide-field X-ray Telescope (WXT) on board the Einstein Probe (EP) mission, designated as EP240315a, whose bright peak was also detected by the Swift Burst Alert Telescope and Konus-Wind through off-line analyses. At a redshift of $z=4.859$, EP240315a showed a much longer and more complicated light curve in the soft X-ray band than in gamma-rays. Benefiting from a large field-of-view ($\sim$3600 deg$^2$) and a high sensitivity, EP-WXT captured the earlier engine activation and extended late engine activity through a continuous detection. With a peak X-ray flux at the faint end of previously known high-$z$ GRBs, the detection of EP240315a demonstrates the great potential for EP to study the early universe via GRBs.
△ Less
Submitted 25 April, 2024;
originally announced April 2024.
-
The Ninth NTIRE 2024 Efficient Super-Resolution Challenge Report
Authors:
Bin Ren,
Yawei Li,
Nancy Mehta,
Radu Timofte,
Hongyuan Yu,
Cheng Wan,
Yuxin Hong,
Bingnan Han,
Zhuoyuan Wu,
Yajun Zou,
Yuqing Liu,
Jizhe Li,
Keji He,
Chao Fan,
Heng Zhang,
Xiaolin Zhang,
Xuanwu Yin,
Kunlong Zuo,
Bohao Liao,
Peizhe Xia,
Long Peng,
Zhibo Du,
Xin Di,
Wangkai Li,
Yang Wang
, et al. (109 additional authors not shown)
Abstract:
This paper provides a comprehensive review of the NTIRE 2024 challenge, focusing on efficient single-image super-resolution (ESR) solutions and their outcomes. The task of this challenge is to super-resolve an input image with a magnification factor of x4 based on pairs of low and corresponding high-resolution images. The primary objective is to develop networks that optimize various aspects such…
▽ More
This paper provides a comprehensive review of the NTIRE 2024 challenge, focusing on efficient single-image super-resolution (ESR) solutions and their outcomes. The task of this challenge is to super-resolve an input image with a magnification factor of x4 based on pairs of low and corresponding high-resolution images. The primary objective is to develop networks that optimize various aspects such as runtime, parameters, and FLOPs, while still maintaining a peak signal-to-noise ratio (PSNR) of approximately 26.90 dB on the DIV2K_LSDIR_valid dataset and 26.99 dB on the DIV2K_LSDIR_test dataset. In addition, this challenge has 4 tracks including the main track (overall performance), sub-track 1 (runtime), sub-track 2 (FLOPs), and sub-track 3 (parameters). In the main track, all three metrics (ie runtime, FLOPs, and parameter count) were considered. The ranking of the main track is calculated based on a weighted sum-up of the scores of all other sub-tracks. In sub-track 1, the practical runtime performance of the submissions was evaluated, and the corresponding score was used to determine the ranking. In sub-track 2, the number of FLOPs was considered. The score calculated based on the corresponding FLOPs was used to determine the ranking. In sub-track 3, the number of parameters was considered. The score calculated based on the corresponding parameters was used to determine the ranking. RLFN is set as the baseline for efficiency measurement. The challenge had 262 registered participants, and 34 teams made valid submissions. They gauge the state-of-the-art in efficient single-image super-resolution. To facilitate the reproducibility of the challenge and enable other researchers to build upon these findings, the code and the pre-trained model of validated solutions are made publicly available at https://github.com/Amazingren/NTIRE2024_ESR/.
△ Less
Submitted 25 June, 2024; v1 submitted 16 April, 2024;
originally announced April 2024.
-
Crooked indifferentiability of the Feistel Construction
Authors:
Alexander Russell,
Qiang Tang,
Jiadong Zhu
Abstract:
The Feistel construction is a fundamental technique for building pseudorandom permutations and block ciphers. This paper shows that a simple adaptation of the construction is resistant, even to algorithm substitution attacks -- that is, adversarial subversion -- of the component round functions. Specifically, we establish that a Feistel-based construction with more than $2000n/\log(1/ε)$ rounds ca…
▽ More
The Feistel construction is a fundamental technique for building pseudorandom permutations and block ciphers. This paper shows that a simple adaptation of the construction is resistant, even to algorithm substitution attacks -- that is, adversarial subversion -- of the component round functions. Specifically, we establish that a Feistel-based construction with more than $2000n/\log(1/ε)$ rounds can transform a subverted random function -- which disagrees with the original one at a small fraction (denoted by $ε$) of inputs -- into an object that is \emph{crooked-indifferentiable} from a random permutation, even if the adversary is aware of all the randomness used in the transformation. We also provide a lower bound showing that the construction cannot use fewer than $2n/\log(1/ε)$ rounds to achieve crooked-indifferentiable security.
△ Less
Submitted 15 April, 2024;
originally announced April 2024.
-
Correcting Subverted Random Oracles
Authors:
Alexander Russell,
Qiang Tang,
Moti Yung,
Hong-Sheng Zhou,
Jiadong Zhu
Abstract:
The random oracle methodology has proven to be a powerful tool for designing and reasoning about cryptographic schemes. In this paper, we focus on the basic problem of correcting faulty or adversarially corrupted random oracles, so that they can be confidently applied for such cryptographic purposes.
We prove that a simple construction can transform a "subverted" random oracle which disagrees wi…
▽ More
The random oracle methodology has proven to be a powerful tool for designing and reasoning about cryptographic schemes. In this paper, we focus on the basic problem of correcting faulty or adversarially corrupted random oracles, so that they can be confidently applied for such cryptographic purposes.
We prove that a simple construction can transform a "subverted" random oracle which disagrees with the original one at a small fraction of inputs into an object that is indifferentiable from a random function, even if the adversary is made aware of all randomness used in the transformation. Our results permit future designers of cryptographic primitives in typical kleptographic settings (i.e., those permitting adversaries that subvert or replace basic cryptographic algorithms) to use random oracles as a trusted black box.
△ Less
Submitted 15 April, 2024;
originally announced April 2024.
-
LHAASO-KM2A detector simulation using Geant4
Authors:
Zhen Cao,
F. Aharonian,
Q. An,
Axikegu,
Y. X. Bai,
Y. W. Bao,
D. Bastieri,
X. J. Bi,
Y. J. Bi,
J. T. Cai,
Q. Cao,
W. Y. Cao,
Zhe Cao,
J. Chang,
J. F. Chang,
A. M. Chen,
E. S. Chen,
Liang Chen,
Lin Chen,
Long Chen,
M. J. Chen,
M. L. Chen,
Q. H. Chen,
S. H. Chen,
S. Z. Chen
, et al. (254 additional authors not shown)
Abstract:
KM2A is one of the main sub-arrays of LHAASO, working on gamma ray astronomy and cosmic ray physics at energies above 10 TeV. Detector simulation is the important foundation for estimating detector performance and data analysis. It is a big challenge to simulate the KM2A detector in the framework of Geant4 due to the need to track numerous photons from a large number of detector units (>6000) with…
▽ More
KM2A is one of the main sub-arrays of LHAASO, working on gamma ray astronomy and cosmic ray physics at energies above 10 TeV. Detector simulation is the important foundation for estimating detector performance and data analysis. It is a big challenge to simulate the KM2A detector in the framework of Geant4 due to the need to track numerous photons from a large number of detector units (>6000) with large altitude difference (30 m) and huge coverage (1.3 km^2). In this paper, the design of the KM2A simulation code G4KM2A based on Geant4 is introduced. The process of G4KM2A is optimized mainly in memory consumption to avoid memory overffow. Some simpliffcations are used to signiffcantly speed up the execution of G4KM2A. The running time is reduced by at least 30 times compared to full detector simulation. The particle distributions and the core/angle resolution comparison between simulation and experimental data of the full KM2A array are also presented, which show good agreement.
△ Less
Submitted 7 April, 2024;
originally announced April 2024.
-
On quasi-linear reaction diffusion systems arising from compartmental SEIR models
Authors:
Juan Yang,
Jeff Morgan,
Bao Quoc Tang
Abstract:
The global existence and boundedness of solutions to quasi-linear reaction-diffusion systems are investigated. The system arises from compartmental models describing the spread of infectious diseases proposed in [Viguerie et al, Appl. Math. Lett. (2021); Viguerie et al, Comput. Mech. (2020)], where the diffusion rate is assumed to depend on the total population, leading to quasilinear diffusion wi…
▽ More
The global existence and boundedness of solutions to quasi-linear reaction-diffusion systems are investigated. The system arises from compartmental models describing the spread of infectious diseases proposed in [Viguerie et al, Appl. Math. Lett. (2021); Viguerie et al, Comput. Mech. (2020)], where the diffusion rate is assumed to depend on the total population, leading to quasilinear diffusion with possible degeneracy. The mathematical analysis of this model has been addressed recently in [Auricchio et al, Math. Method Appl. Sci. (2023] where it was essentially assumed that all sub-populations diffuse at the same rate, which yields a positive lower bound of the total population, thus removing the degeneracy. In this work, we remove this assumption completely and show the global existence and boundedness of solutions by exploiting a recently developed $L^p$-energy method. Our approach is applicable to a larger class of systems and is sufficiently robust to allow model variants and different boundary conditions.
△ Less
Submitted 23 March, 2024;
originally announced March 2024.
-
Development of low-radon ultra-pure water for the Jiangmen Underground Neutrino Observatory
Authors:
T. Y. Guan,
Y. P. Zhang,
B. Wang,
C. Guo,
J. C. Liu,
Q. Tang,
C. G. Yang,
C. Li
Abstract:
The Jiangmen Underground Neutrino Observatory(JUNO) is a state-of-the-art liquid scintillator-based neutrino physics experiment under construction in South China. To reduce the background from external radioactivities, a water Cherenkov detector composed of 35~kton ultra-pure water and 2,400 20-inch photomultiplier tubes is developed. Even after specialized treatment, ultra-pure water still contai…
▽ More
The Jiangmen Underground Neutrino Observatory(JUNO) is a state-of-the-art liquid scintillator-based neutrino physics experiment under construction in South China. To reduce the background from external radioactivities, a water Cherenkov detector composed of 35~kton ultra-pure water and 2,400 20-inch photomultiplier tubes is developed. Even after specialized treatment, ultra-pure water still contains trace levels of radioactive elements that can contribute to the detector background. Among which $^{222}$Rn is particularly significant. To address this, an online radon removal system based on the JUNO prototype has been developed. By integrating micro-bubble generators to enhance degasser's radon removal efficiency, the radon concentration in water can be reduced to 1~mBq/m$^{3}$ level, meeting the stringent requirements of JUNO. Additionally, a highly sensitive online radon concentration measurement system capable of detecting concentrations $\sim$1~mBq/m$^3$ has been developed to monitor the radon concentration in water. In this paper, the details regarding both systems will be presented.
△ Less
Submitted 18 March, 2024;
originally announced March 2024.
-
JUMBO: Fully Asynchronous BFT Consensus Made Truly Scalable
Authors:
Hao Cheng,
Yuan Lu,
Zhenliang Lu,
Qiang Tang,
Yuxuan Zhang,
Zhenfeng Zhang
Abstract:
Recent progresses in asynchronous Byzantine fault-tolerant (BFT) consensus, e.g. Dumbo-NG (CCS' 22) and Tusk (EuroSys' 22), show promising performance through decoupling transaction dissemination and block agreement. However, when executed with a larger number $n$ of nodes, like several hundreds, they would suffer from significant degradation in performance. Their dominating scalability bottleneck…
▽ More
Recent progresses in asynchronous Byzantine fault-tolerant (BFT) consensus, e.g. Dumbo-NG (CCS' 22) and Tusk (EuroSys' 22), show promising performance through decoupling transaction dissemination and block agreement. However, when executed with a larger number $n$ of nodes, like several hundreds, they would suffer from significant degradation in performance. Their dominating scalability bottleneck is the huge authenticator complexity: each node has to multicast $\bigO(n)$ quorum certificates (QCs) and subsequently verify them for each block.
This paper systematically investigates and resolves the above scalability issue. We first propose a signature-free asynchronous BFT consensus FIN-NG that adapts a recent signature-free asynchronous common subset protocol FIN (CCS' 23) into the state-of-the-art framework of concurrent broadcast and agreement. The liveness of FIN-NG relies on our non-trivial redesign of FIN's multi-valued validated Byzantine agreement towards achieving optimal quality. FIN-NG greatly improves the performance of FIN and already outperforms Dumbo-NG in most deployment settings. To further overcome the scalability limit of FIN-NG due to $\bigO(n^3)$ messages, we propose JUMBO, a scalable instantiation of Dumbo-NG, with only $\bigO(n^2)$ complexities for both authenticators and messages. We use various aggregation and dispersal techniques for QCs to significantly reduce the authenticator complexity of original Dumbo-NG implementations by up to $\bigO(n^2)$ orders. We also propose a ``fairness'' patch for JUMBO, thus preventing a flooding adversary from controlling an overwhelming portion of transactions in its output.
△ Less
Submitted 17 March, 2024;
originally announced March 2024.
-
Measurements of All-Particle Energy Spectrum and Mean Logarithmic Mass of Cosmic Rays from 0.3 to 30 PeV with LHAASO-KM2A
Authors:
The LHAASO Collaboration,
Zhen Cao,
F. Aharonian,
Q. An,
A. Axikegu,
Y. X. Bai,
Y. W. Bao,
D. Bastieri,
X. J. Bi,
Y. J. Bi,
J. T. Cai,
Q. Cao,
W. Y. Cao,
Zhe Cao,
J. Chang,
J. F. Chang,
A. M. Chen,
E. S. Chen,
Liang Chen,
Lin Chen,
Long Chen,
M. J. Chen,
M. L. Chen,
Q. H. Chen,
S. H. Chen
, et al. (256 additional authors not shown)
Abstract:
We present the measurements of all-particle energy spectrum and mean logarithmic mass of cosmic rays in the energy range of 0.3-30 PeV using data collected from LHAASO-KM2A between September 2021 and December 2022, which is based on a nearly composition-independent energy reconstruction method, achieving unprecedented accuracy. Our analysis reveals the position of the knee at…
▽ More
We present the measurements of all-particle energy spectrum and mean logarithmic mass of cosmic rays in the energy range of 0.3-30 PeV using data collected from LHAASO-KM2A between September 2021 and December 2022, which is based on a nearly composition-independent energy reconstruction method, achieving unprecedented accuracy. Our analysis reveals the position of the knee at $3.67 \pm 0.05 \pm 0.15$ PeV. Below the knee, the spectral index is found to be -$2.7413 \pm 0.0004 \pm 0.0050$, while above the knee, it is -$3.128 \pm 0.005 \pm 0.027$, with the sharpness of the transition measured with a statistical error of 2%. The mean logarithmic mass of cosmic rays is almost heavier than helium in the whole measured energy range. It decreases from 1.7 at 0.3 PeV to 1.3 at 3 PeV, representing a 24% decline following a power law with an index of -$0.1200 \pm 0.0003 \pm 0.0341$. This is equivalent to an increase in abundance of light components. Above the knee, the mean logarithmic mass exhibits a power law trend towards heavier components, which is reversal to the behavior observed in the all-particle energy spectrum. Additionally, the knee position and the change in power-law index are approximately the same. These findings suggest that the knee observed in the all-particle spectrum corresponds to the knee of the light component, rather than the medium-heavy components.
△ Less
Submitted 26 March, 2024; v1 submitted 15 March, 2024;
originally announced March 2024.
-
Morphology Study for GeV Emission of the Nearby Supernova Remnant G332.5-5.6
Authors:
Ming-Hong Luo,
Qing-Wen Tang,
Xiu-Rong Mo
Abstract:
Spatial template is important to study the nearby supernova remnant (SNR). For SNR G332.5-5.6, we report a gaussian disk with radius of about 1.06 degrees to be a potential good spatial model in the gamma-ray band. Employing this new gaussian disk, its GeV lightcurve shows a significant variability of about 7 sigma. The $γ$-ray observations of this SNR could be explained well either by a leptonic…
▽ More
Spatial template is important to study the nearby supernova remnant (SNR). For SNR G332.5-5.6, we report a gaussian disk with radius of about 1.06 degrees to be a potential good spatial model in the gamma-ray band. Employing this new gaussian disk, its GeV lightcurve shows a significant variability of about 7 sigma. The $γ$-ray observations of this SNR could be explained well either by a leptonic model or a hadronic model, in which a flat spectrum for the ejected electrons/protons.
△ Less
Submitted 8 March, 2024;
originally announced March 2024.
-
Reclaiming the Lost Conformality in a non-Hermitian Quantum 5-state Potts Model
Authors:
Yin Tang,
Han Ma,
Qicheng Tang,
Yin-Chen He,
W. Zhu
Abstract:
Conformal symmetry, emerging at critical points, can be lost when renormalization group fixed points collide. Recently, it was proposed that after collisions, real fixed points transition into the complex plane, becoming complex fixed points described by complex conformal field theories (CFTs). Although this idea is compelling, directly demonstrating such complex conformal fixed points in microsco…
▽ More
Conformal symmetry, emerging at critical points, can be lost when renormalization group fixed points collide. Recently, it was proposed that after collisions, real fixed points transition into the complex plane, becoming complex fixed points described by complex conformal field theories (CFTs). Although this idea is compelling, directly demonstrating such complex conformal fixed points in microscopic models remains highly demanding. Furthermore, these concrete models are instrumental in unraveling the mysteries of complex CFTs and illuminating a variety of intriguing physical problems, including weakly first-order transitions in statistical mechanics and the conformal window of gauge theories. In this work, we have successfully addressed this complex challenge for the (1+1)-dimensional quantum $5$-state Potts model, whose phase transition has long been known to be weakly first-order. By adding an additional non-Hermitian interaction, we successfully identify two conjugate critical points located in the complex parameter space, where the lost conformality is restored in a complex manner. Specifically, we unambiguously demonstrate the radial quantization of the complex CFTs and compute the operator spectrum, as well as new operator product expansion coefficients that were previously unknown.
△ Less
Submitted 11 March, 2024; v1 submitted 29 February, 2024;
originally announced March 2024.
-
Self-Retrieval: Building an Information Retrieval System with One Large Language Model
Authors:
Qiaoyu Tang,
Jiawei Chen,
Bowen Yu,
Yaojie Lu,
Cheng Fu,
Haiyang Yu,
Hongyu Lin,
Fei Huang,
Ben He,
Xianpei Han,
Le Sun,
Yongbin Li
Abstract:
The rise of large language models (LLMs) has transformed the role of information retrieval (IR) systems in the way to humans accessing information. Due to the isolated architecture and the limited interaction, existing IR systems are unable to fully accommodate the shift from directly providing information to humans to indirectly serving large language models. In this paper, we propose Self-Retrie…
▽ More
The rise of large language models (LLMs) has transformed the role of information retrieval (IR) systems in the way to humans accessing information. Due to the isolated architecture and the limited interaction, existing IR systems are unable to fully accommodate the shift from directly providing information to humans to indirectly serving large language models. In this paper, we propose Self-Retrieval, an end-to-end, LLM-driven information retrieval architecture that can fully internalize the required abilities of IR systems into a single LLM and deeply leverage the capabilities of LLMs during IR process. Specifically, Self-retrieval internalizes the corpus to retrieve into a LLM via a natural language indexing architecture. Then the entire retrieval process is redefined as a procedure of document generation and self-assessment, which can be end-to-end executed using a single large language model. Experimental results demonstrate that Self-Retrieval not only significantly outperforms previous retrieval approaches by a large margin, but also can significantly boost the performance of LLM-driven downstream applications like retrieval augumented generation.
△ Less
Submitted 23 February, 2024;
originally announced March 2024.
-
Mobility edges in non-Hermitian models with slowly varying quasi-periodic disorders
Authors:
Qiyun Tang,
Yan He
Abstract:
We investigate the appearance of mobility edges in a one-dimensional non-Hermitian tight-banding model with alternating hop** constants and slowly varying quasi-periodic on-site potentials. Due to the presence of slowly varying exponent, the parity-time (PT) symmetry of this model is broken and its spectra is complex. It is found that the spectrum of this model can be divided into three differen…
▽ More
We investigate the appearance of mobility edges in a one-dimensional non-Hermitian tight-banding model with alternating hop** constants and slowly varying quasi-periodic on-site potentials. Due to the presence of slowly varying exponent, the parity-time (PT) symmetry of this model is broken and its spectra is complex. It is found that the spectrum of this model can be divided into three different types of patterns depending on the magnitude of the quasi-periodic potential. As the amplitude of the potential increases from small to large, the initially well defined mobility edges become blurred gradually and then eventually disappear for large enough potential. This behavior of the mobility edges is also confirmed by a detailed study of the winding number of the complex spectra of this non-Hermitian model.
△ Less
Submitted 27 February, 2024;
originally announced February 2024.
-
Intelligent Attractors for Singularly Perturbed Dynamical Systems
Authors:
Daniel A. Serino,
Allen Alvarez Loya,
J. W. Burby,
Ioannis G. Kevrekidis,
Qi Tang
Abstract:
Singularly perturbed dynamical systems, commonly known as fast-slow systems, play a crucial role in various applications such as plasma physics. They are closely related to reduced order modeling, closures, and structure-preserving numerical algorithms for multiscale modeling. A powerful and well-known tool to address these systems is the Fenichel normal form, which significantly simplifies fast d…
▽ More
Singularly perturbed dynamical systems, commonly known as fast-slow systems, play a crucial role in various applications such as plasma physics. They are closely related to reduced order modeling, closures, and structure-preserving numerical algorithms for multiscale modeling. A powerful and well-known tool to address these systems is the Fenichel normal form, which significantly simplifies fast dynamics near slow manifolds through a transformation. However, the Fenichel normal form is difficult to realize in conventional numerical algorithms. In this work, we explore an alternative way of realizing it through structure-preserving machine learning. Specifically, a fast-slow neural network (FSNN) is proposed for learning data-driven models of singularly perturbed dynamical systems with dissipative fast timescale dynamics. Our method enforces the existence of a trainable, attracting invariant slow manifold as a hard constraint. Closed-form representation of the slow manifold enables efficient integration on the slow time scale and significantly improves prediction accuracy beyond the training data. We demonstrate the FSNN on several examples that exhibit multiple timescales, including the Grad moment system from hydrodynamics, two-scale Lorentz96 equations for modeling atmospheric dynamics, and Abraham-Lorentz dynamics modeling radiation reaction of electrons in a magnetic field.
△ Less
Submitted 24 February, 2024;
originally announced February 2024.
-
Simulation Studies for the First Pathfinder of the CATCH Space Mission
Authors:
Yiming Huang,
Juan Zhang,
Lian Tao,
Zhengwei Li,
Donghua Zhao,
Qian-Qing Yin,
Xiangyang Wen,
**gyu Xiao,
Chen Zhang,
Shuang-Nan Zhang,
Shaolin Xiong,
Qingcui Bu,
Jirong Cang,
Dezhi Cao,
Wen Chen,
Siran Ding,
Min Gao,
Yang Gao,
Shu** Hou,
Li** Jia,
Ge **,
Dalin Li,
**song Li,
Pan** Li,
Yajun Li
, et al. (20 additional authors not shown)
Abstract:
The Chasing All Transients Constellation Hunters (CATCH) space mission is an intelligent constellation consisting of 126 micro-satellites in three types (A, B, and C), designed for X-ray observation with the objective of studying the dynamic universe. Currently, we are actively develo** the first Pathfinder (CATCH-1) for the CATCH mission, specifically for type-A satellites. CATCH-1 is equipped…
▽ More
The Chasing All Transients Constellation Hunters (CATCH) space mission is an intelligent constellation consisting of 126 micro-satellites in three types (A, B, and C), designed for X-ray observation with the objective of studying the dynamic universe. Currently, we are actively develo** the first Pathfinder (CATCH-1) for the CATCH mission, specifically for type-A satellites. CATCH-1 is equipped with Micro Pore Optics (MPO) and a 4-pixel Silicon Drift Detector (SDD) array. To assess its scientific performance, including the effective area of the optical system, on-orbit background, and telescope sensitivity, we employ the Monte Carlo software Geant4 for simulation in this study. The MPO optics exhibit an effective area of $41$ cm$^2$ at the focal spot for 1 keV X-rays, while the entire telescope system achieves an effective area of $29$ cm$^2$ at 1 keV when taking into account the SDD detector's detection efficiency. The primary contribution to the background is found to be from the Cosmic X-ray Background. Assuming a 625 km orbit with an inclination of $29^\circ$, the total background for CATCH-1 is estimated to be $8.13\times10^{-2}$ counts s$^{-1}$ in the energy range of 0.5--4 keV. Based on the background within the central detector and assuming a Crab-like source spectrum, the estimated ideal sensitivity could achieve $1.9\times10^{-12}$ erg cm$^{-2}$ s$^{-1}$ for an exposure of 10$^4$ s in the energy band of 0.5--4 keV. Furthermore, after simulating the background caused by low-energy charged particles near the geomagnetic equator, we have determined that there is no need to install a magnetic deflector.
△ Less
Submitted 23 February, 2024;
originally announced February 2024.
-
Develo** a $μ$Bq/m$^{3}$ level $^{226}$Ra concentration in water measurement system for the Jiangmen Underground Neutrino Observatory
Authors:
C. Li,
B. Wang,
Y. Liu,
C. Guo,
Y. P. Zhang,
J. C. Liu,
Q. Tang,
T. Y. Guan,
C. G. Yang
Abstract:
The Jiangmen Underground Neutrino Observatory (JUNO), a 20~kton multi-purpose low background Liquid Scintillator (LS) detector, was proposed primarily to determine the neutrino mass ordering. To suppress the radioactivity from the surrounding rocks and tag cosmic muons, the JUNO central detector is submerged in a Water Cherenkov Detector (WCD). In addition to being used in the WCD, ultrapure water…
▽ More
The Jiangmen Underground Neutrino Observatory (JUNO), a 20~kton multi-purpose low background Liquid Scintillator (LS) detector, was proposed primarily to determine the neutrino mass ordering. To suppress the radioactivity from the surrounding rocks and tag cosmic muons, the JUNO central detector is submerged in a Water Cherenkov Detector (WCD). In addition to being used in the WCD, ultrapure water is used in LS filling, for which the $^{226}$Ra concentration in water needs to be less than 50~$μ$Bq/m$^3$. To precisely measure the $^{226}$Ra concentration in water, a 6.0~$μ$Bq/m$^3$ $^{226}$Ra concentration in water measurement system has been developed. In this paper, the detail of the measurement system as well as the $^{226}$Ra concentration measurement result in regular EWII ultrapure water will be presented.
△ Less
Submitted 21 February, 2024;
originally announced February 2024.
-
Dictionary Learning Improves Patch-Free Circuit Discovery in Mechanistic Interpretability: A Case Study on Othello-GPT
Authors:
Zhengfu He,
Xuyang Ge,
Qiong Tang,
Tianxiang Sun,
Qinyuan Cheng,
Xipeng Qiu
Abstract:
Sparse dictionary learning has been a rapidly growing technique in mechanistic interpretability to attack superposition and extract more human-understandable features from model activations. We ask a further question based on the extracted more monosemantic features: How do we recognize circuits connecting the enormous amount of dictionary features? We propose a circuit discovery framework alterna…
▽ More
Sparse dictionary learning has been a rapidly growing technique in mechanistic interpretability to attack superposition and extract more human-understandable features from model activations. We ask a further question based on the extracted more monosemantic features: How do we recognize circuits connecting the enormous amount of dictionary features? We propose a circuit discovery framework alternative to activation patching. Our framework suffers less from out-of-distribution and proves to be more efficient in terms of asymptotic complexity. The basic unit in our framework is dictionary features decomposed from all modules writing to the residual stream, including embedding, attention output and MLP output. Starting from any logit, dictionary feature or attention score, we manage to trace down to lower-level dictionary features of all tokens and compute their contribution to these more interpretable and local model behaviors. We dig in a small transformer trained on a synthetic task named Othello and find a number of human-understandable fine-grained circuits inside of it.
△ Less
Submitted 19 February, 2024;
originally announced February 2024.
-
PANORAMIA: Privacy Auditing of Machine Learning Models without Retraining
Authors:
Mishaal Kazmi,
Hadrien Lautraite,
Alireza Akbari,
Mauricio Soroco,
Qiaoyue Tang,
Tao Wang,
Sébastien Gambs,
Mathias Lécuyer
Abstract:
We introduce a privacy auditing scheme for ML models that relies on membership inference attacks using generated data as "non-members". This scheme, which we call PANORAMIA, quantifies the privacy leakage for large-scale ML models without control of the training process or model re-training and only requires access to a subset of the training data. To demonstrate its applicability, we evaluate our…
▽ More
We introduce a privacy auditing scheme for ML models that relies on membership inference attacks using generated data as "non-members". This scheme, which we call PANORAMIA, quantifies the privacy leakage for large-scale ML models without control of the training process or model re-training and only requires access to a subset of the training data. To demonstrate its applicability, we evaluate our auditing scheme across multiple ML domains, ranging from image and tabular data classification to large-scale language models.
△ Less
Submitted 12 February, 2024;
originally announced February 2024.
-
Exploring Saliency Bias in Manipulation Detection
Authors:
Joshua Krinsky,
Alan Bettis,
Qiuyu Tang,
Daniel Moreira,
Aparna Bharati
Abstract:
The social media-fuelled explosion of fake news and misinformation supported by tampered images has led to growth in the development of models and datasets for image manipulation detection. However, existing detection methods mostly treat media objects in isolation, without considering the impact of specific manipulations on viewer perception. Forensic datasets are usually analyzed based on the ma…
▽ More
The social media-fuelled explosion of fake news and misinformation supported by tampered images has led to growth in the development of models and datasets for image manipulation detection. However, existing detection methods mostly treat media objects in isolation, without considering the impact of specific manipulations on viewer perception. Forensic datasets are usually analyzed based on the manipulation operations and corresponding pixel-based masks, but not on the semantics of the manipulation, i.e., type of scene, objects, and viewers' attention to scene content. The semantics of the manipulation play an important role in spreading misinformation through manipulated images. In an attempt to encourage further development of semantic-aware forensic approaches to understand visual misinformation, we propose a framework to analyze the trends of visual and semantic saliency in popular image manipulation datasets and their impact on detection.
△ Less
Submitted 15 February, 2024; v1 submitted 11 February, 2024;
originally announced February 2024.
-
The Boundary Condition for Some Isomonodromy Equations
Authors:
Qian Tang,
Xiaomeng Xu
Abstract:
In this article, we study a special class of Jimbo-Miwa-Mori-Sato isomonodromy equations, which can be seen as a higher-dimensional generalization of Painlevé VI. We first construct its convergent $n\times n$ matrix series solutions satisfying certain boundary condition. We then use the Riemann-Hilbert approach to prove that the resulting solutions are almost all the solutions. Along the way, we f…
▽ More
In this article, we study a special class of Jimbo-Miwa-Mori-Sato isomonodromy equations, which can be seen as a higher-dimensional generalization of Painlevé VI. We first construct its convergent $n\times n$ matrix series solutions satisfying certain boundary condition. We then use the Riemann-Hilbert approach to prove that the resulting solutions are almost all the solutions. Along the way, we find a shrinking phenomenon of the eigenvalues of the submatrices of the generic matrix solutions in the long time behaviour.
△ Less
Submitted 21 March, 2024; v1 submitted 11 February, 2024;
originally announced February 2024.
-
A Channel to Form Fast-spinning Black Hole-Neutron Star Binary Mergers as Multimessenger Sources. II. Accretion-induced Spin-up
Authors:
Zhen-Han-Tao Wang,
Rui-Chong Hu,
Ying Qin,
**-** Zhu,
Bing Zhang,
Shuang-Xi Yi,
Qin-Wen Tang,
Xin-Wen Shu,
Fen Lyu,
En-Wei Liang
Abstract:
In this work, we investigate an alternative channel for the formation of fast-spinning black hole-neutron star (BHNS) binaries, in which super-Eddington accretion is expected to occur in accreting BHs during the stable mass transfer phase within BH-stripped helium (BH--He-rich) star binary systems. We evolve intensive \texttt{MESA} grids of close-orbit BH--He-rich star systems to systematically ex…
▽ More
In this work, we investigate an alternative channel for the formation of fast-spinning black hole-neutron star (BHNS) binaries, in which super-Eddington accretion is expected to occur in accreting BHs during the stable mass transfer phase within BH-stripped helium (BH--He-rich) star binary systems. We evolve intensive \texttt{MESA} grids of close-orbit BH--He-rich star systems to systematically explore the projected aligned spins of BHs in BHNS binaries, as well as the impact of different accretion limits on the tidal disruption probability and electromagnetic (EM) signature of BHNS mergers. Most of the BHs in BHNS mergers cannot be effectively spun up through accretion, if the accretion rate is limited to $\lesssim10\,\dot{M}_{\rm Edd}$, where $\dot{M}_{\rm Edd}$ is the standard Eddington accretion limit. In order to reach high spins (e.g., $χ_{\rm BH} \gtrsim 0.5$), the BHs are required to be born less massive (e.g., $\lesssim3.0\,M_\odot$) in binary systems with initial periods of $\lesssim0.2-0.3\,{\rm days}$ and accrete material at $\sim100\,\dot{M}_{\rm Edd}$. However, even under this high accretion limit, $\gtrsim6\,M_\odot$ BHs are typically challenging to significantly spin up and generate detectable associated EM signals. Our population simulations suggest that different accretion limits have a slight impact on the ratio of tidal disruption events. However, as the accretion limit increases, the EM counterparts from the cosmological BHNS population can become bright overall.
△ Less
Submitted 23 February, 2024; v1 submitted 30 January, 2024;
originally announced January 2024.
-
EK-Net:Real-time Scene Text Detection with Expand Kernel Distance
Authors:
Boyuan Zhu,
Fagui Liu,
Xi Chen,
Quan Tang
Abstract:
Recently, scene text detection has received significant attention due to its wide application. However, accurate detection in complex scenes of multiple scales, orientations, and curvature remains a challenge. Numerous detection methods adopt the Vatti clip** (VC) algorithm for multiple-instance training to address the issue of arbitrary-shaped text. Yet we identify several bias results from the…
▽ More
Recently, scene text detection has received significant attention due to its wide application. However, accurate detection in complex scenes of multiple scales, orientations, and curvature remains a challenge. Numerous detection methods adopt the Vatti clip** (VC) algorithm for multiple-instance training to address the issue of arbitrary-shaped text. Yet we identify several bias results from these approaches called the "shrinked kernel". Specifically, it refers to a decrease in accuracy resulting from an output that overly favors the text kernel. In this paper, we propose a new approach named Expand Kernel Network (EK-Net) with expand kernel distance to compensate for the previous deficiency, which includes three-stages regression to complete instance detection. Moreover, EK-Net not only realize the precise positioning of arbitrary-shaped text, but also achieve a trade-off between performance and speed. Evaluation results demonstrate that EK-Net achieves state-of-the-art or competitive performance compared to other advanced methods, e.g., F-measure of 85.72% at 35.42 FPS on ICDAR 2015, F-measure of 85.75% at 40.13 FPS on CTW1500.
△ Less
Submitted 22 January, 2024;
originally announced January 2024.
-
BinaryAI: Binary Software Composition Analysis via Intelligent Binary Source Code Matching
Authors:
Ling Jiang,
Junwen An,
Huihui Huang,
Qiyi Tang,
Sen Nie,
Shi Wu,
Yuqun Zhang
Abstract:
While third-party libraries are extensively reused to enhance productivity during software development, they can also introduce potential security risks such as vulnerability propagation. Software composition analysis, proposed to identify reused TPLs for reducing such risks, has become an essential procedure within modern DevSecOps. As one of the mainstream SCA techniques, binary-to-source SCA id…
▽ More
While third-party libraries are extensively reused to enhance productivity during software development, they can also introduce potential security risks such as vulnerability propagation. Software composition analysis, proposed to identify reused TPLs for reducing such risks, has become an essential procedure within modern DevSecOps. As one of the mainstream SCA techniques, binary-to-source SCA identifies the third-party source projects contained in binary files via binary source code matching, which is a major challenge in reverse engineering since binary and source code exhibit substantial disparities after compilation. The existing binary-to-source SCA techniques leverage basic syntactic features that suffer from redundancy and lack robustness in the large-scale TPL dataset, leading to inevitable false positives and compromised recall. To mitigate these limitations, we introduce BinaryAI, a novel binary-to-source SCA technique with two-phase binary source code matching to capture both syntactic and semantic code features. First, BinaryAI trains a transformer-based model to produce function-level embeddings and obtain similar source functions for each binary function accordingly. Then by applying the link-time locality to facilitate function matching, BinaryAI detects the reused TPLs based on the ratio of matched source functions. Our experimental results demonstrate the superior performance of BinaryAI in terms of binary source code matching and the downstream SCA task. Specifically, our embedding model outperforms the state-of-the-art model CodeCMR, i.e., achieving 22.54% recall@1 and 0.34 MRR compared with 10.75% and 0.17 respectively. Additionally, BinaryAI outperforms all existing binary-to-source SCA tools in TPL detection, increasing the precision from 73.36% to 85.84% and recall from 59.81% to 64.98% compared with the well-recognized commercial SCA product Black Duck.
△ Less
Submitted 23 January, 2024; v1 submitted 20 January, 2024;
originally announced January 2024.
-
DP-AdamBC: Your DP-Adam Is Actually DP-SGD (Unless You Apply Bias Correction)
Authors:
Qiaoyue Tang,
Frederick Shpilevskiy,
Mathias Lécuyer
Abstract:
The Adam optimizer is a popular choice in contemporary deep learning, due to its strong empirical performance. However we observe that in privacy sensitive scenarios, the traditional use of Differential Privacy (DP) with the Adam optimizer leads to sub-optimal performance on several tasks. We find that this performance degradation is due to a DP bias in Adam's second moment estimator, introduced b…
▽ More
The Adam optimizer is a popular choice in contemporary deep learning, due to its strong empirical performance. However we observe that in privacy sensitive scenarios, the traditional use of Differential Privacy (DP) with the Adam optimizer leads to sub-optimal performance on several tasks. We find that this performance degradation is due to a DP bias in Adam's second moment estimator, introduced by the addition of independent noise in the gradient computation to enforce DP guarantees. This DP bias leads to a different scaling for low variance parameter updates, that is inconsistent with the behavior of non-private Adam. We propose DP-AdamBC, an optimization algorithm which removes the bias in the second moment estimation and retrieves the expected behaviour of Adam. Empirically, DP-AdamBC significantly improves the optimization performance of DP-Adam by up to 3.5% in final accuracy in image, text, and graph node classification tasks.
△ Less
Submitted 21 December, 2023;
originally announced December 2023.
-
Morphological Profiling for Drug Discovery in the Era of Deep Learning
Authors:
Qiaosi Tang,
Ranjala Ratnayake,
Gustavo Seabra,
Zhe Jiang,
Ruogu Fang,
Lina Cui,
Yousong Ding,
Tamer Kahveci,
Jiang Bian,
Chenglong Li,
Hendrik Luesch,
Yanjun Li
Abstract:
Morphological profiling is a valuable tool in phenotypic drug discovery. The advent of high-throughput automated imaging has enabled the capturing of a wide range of morphological features of cells or organisms in response to perturbations at the single-cell resolution. Concurrently, significant advances in machine learning and deep learning, especially in computer vision, have led to substantial…
▽ More
Morphological profiling is a valuable tool in phenotypic drug discovery. The advent of high-throughput automated imaging has enabled the capturing of a wide range of morphological features of cells or organisms in response to perturbations at the single-cell resolution. Concurrently, significant advances in machine learning and deep learning, especially in computer vision, have led to substantial improvements in analyzing large-scale high-content images at high-throughput. These efforts have facilitated understanding of compound mechanism-of-action (MOA), drug repurposing, characterization of cell morphodynamics under perturbation, and ultimately contributing to the development of novel therapeutics. In this review, we provide a comprehensive overview of the recent advances in the field of morphological profiling. We summarize the image profiling analysis workflow, survey a broad spectrum of analysis strategies encompassing feature engineering- and deep learning-based approaches, and introduce publicly available benchmark datasets. We place a particular emphasis on the application of deep learning in this pipeline, covering cell segmentation, image representation learning, and multimodal learning. Additionally, we illuminate the application of morphological profiling in phenotypic drug discovery and highlight potential challenges and opportunities in this field.
△ Less
Submitted 15 January, 2024; v1 submitted 13 December, 2023;
originally announced December 2023.
-
Semantic Lens: Instance-Centric Semantic Alignment for Video Super-Resolution
Authors:
Qi Tang,
Yao Zhao,
Meiqin Liu,
Jian **,
Chao Yao
Abstract:
As a critical clue of video super-resolution (VSR), inter-frame alignment significantly impacts overall performance. However, accurate pixel-level alignment is a challenging task due to the intricate motion interweaving in the video. In response to this issue, we introduce a novel paradigm for VSR named Semantic Lens, predicated on semantic priors drawn from degraded videos. Specifically, video is…
▽ More
As a critical clue of video super-resolution (VSR), inter-frame alignment significantly impacts overall performance. However, accurate pixel-level alignment is a challenging task due to the intricate motion interweaving in the video. In response to this issue, we introduce a novel paradigm for VSR named Semantic Lens, predicated on semantic priors drawn from degraded videos. Specifically, video is modeled as instances, events, and scenes via a Semantic Extractor. Those semantics assist the Pixel Enhancer in understanding the recovered contents and generating more realistic visual results. The distilled global semantics embody the scene information of each frame, while the instance-specific semantics assemble the spatial-temporal contexts related to each instance. Furthermore, we devise a Semantics-Powered Attention Cross-Embedding (SPACE) block to bridge the pixel-level features with semantic knowledge, composed of a Global Perspective Shifter (GPS) and an Instance-Specific Semantic Embedding Encoder (ISEE). Concretely, the GPS module generates pairs of affine transformation parameters for pixel-level feature modulation conditioned on global semantics. After that, the ISEE module harnesses the attention mechanism to align the adjacent frames in the instance-centric semantic space. In addition, we incorporate a simple yet effective pre-alignment module to alleviate the difficulty of model training. Extensive experiments demonstrate the superiority of our model over existing state-of-the-art VSR methods.
△ Less
Submitted 19 January, 2024; v1 submitted 12 December, 2023;
originally announced December 2023.
-
Curvature directed anchoring and defect structure of colloidal smectic liquid crystals in confinement
Authors:
Ethan I. L. Jull,
Gerardo Campos-Villalobos,
Qian**g Tang,
Marjolein Dijkstra,
Lisa Tran
Abstract:
Rod-like objects at high packing fractions can form smectic phases, where the rods break rotational and translational symmetry by forming lamellae. Smectic defects thereby include both discontinuities in the rod orientational order (disclinations), as well as in the positional order (dislocations). In this work, we use both experiments and simulations to probe how local and global geometrical frus…
▽ More
Rod-like objects at high packing fractions can form smectic phases, where the rods break rotational and translational symmetry by forming lamellae. Smectic defects thereby include both discontinuities in the rod orientational order (disclinations), as well as in the positional order (dislocations). In this work, we use both experiments and simulations to probe how local and global geometrical frustrations affect defect formation in hard-rod smectics. We confine a particle-resolved, colloidal smectic within elliptical wells of varying size and shape for a smooth variation of the boundary curvature. We find that the rod orientation near a boundary - the anchoring - depends upon the boundary curvature, with an anchoring transition observed at a critical radius of curvature approximately twice the rod length. The anchoring controls the smectic defect structure. By analyzing local and global order parameters, and the topological charges and loops of networks made of the density maxima (rod centers) and density minima (rod ends), we quantify the amount of disclinations and dislocations formed with varying confinement geometry. More circular confinements, having only planar anchoring, promote disclinations, while more elliptical confinements, with antipodal regions of homeotropic anchoring, promote long-range smectic ordering and dislocation formation. Our findings demonstrate how geometrical constraints can control the anchoring and defect structures of liquid crystals - a principle that is applicable from molecular to colloidal length scales.
△ Less
Submitted 30 November, 2023;
originally announced November 2023.
-
An Attention-Based Denoising Framework for Personality Detection in Social Media Texts
Authors:
Qirui Tang,
Wenkang Jiang,
Yihua Du,
Lei Lin
Abstract:
In social media networks, users produce a large amount of text content anytime, providing researchers with a valuable approach to digging for personality-related information. Personality detection based on user-generated texts is a universal method that can be used to build user portraits. The presence of noise in social media texts hinders personality detection. However, previous studies have not…
▽ More
In social media networks, users produce a large amount of text content anytime, providing researchers with a valuable approach to digging for personality-related information. Personality detection based on user-generated texts is a universal method that can be used to build user portraits. The presence of noise in social media texts hinders personality detection. However, previous studies have not fully addressed this challenge. Inspired by the scanning reading technique, we propose an attention-based information extraction mechanism (AIEM) for long texts, which is applied to quickly locate valuable pieces of information, and focus more attention on the deep semantics of key pieces. Then, we provide a novel attention-based denoising framework (ADF) for personality detection tasks and achieve state-of-the-art performance on two commonly used datasets. Notably, we obtain an average accuracy improvement of 10.2% on the gold standard Twitter-Myers-Briggs Type Indicator (Twitter-MBTI) dataset. We made our code publicly available on GitHub. We shed light on how AIEM works to magnify personality-related signals.
△ Less
Submitted 16 November, 2023;
originally announced November 2023.
-
Scalable and Adaptively Secure Any-Trust Distributed Key Generation and All-hands Checkpointing
Authors:
Hanwen Feng,
Tiancheng Mai,
Qiang Tang
Abstract:
The classical distributed key generation protocols (DKG) are resurging due to their widespread applications in blockchain. While efforts have been made to improve DKG communication, practical large-scale deployments are still yet to come due to various challenges, including the heavy computation and communication (particularly broadcast) overhead in their adversarial cases. In this paper, we propo…
▽ More
The classical distributed key generation protocols (DKG) are resurging due to their widespread applications in blockchain. While efforts have been made to improve DKG communication, practical large-scale deployments are still yet to come due to various challenges, including the heavy computation and communication (particularly broadcast) overhead in their adversarial cases. In this paper, we propose a practical DKG for DLog-based cryptosystems, which achieves (quasi-)linear computation and communication per-node cost with the help of a common coin, even in the face of the maximal amount of Byzantine nodes. Moreover, our protocol is secure against adaptive adversaries, which can corrupt less than half of all nodes. The key to our improvements lies in delegating the most costly operations to an Any-Trust group together with a set of techniques for adaptive security. This group is randomly sampled and consists of a small number of individuals. The population only trusts that at least one member in the group is honest, without knowing which one. Moreover, we present a generic transformer that enables us to efficiently deploy a conventional distributed protocol like our DKG, even when the participants have different weights. Additionally, we introduce an extended broadcast channel based on a blockchain and data dispersal network (such as IPFS), enabling reliable broadcasting of arbitrary-size messages at the cost of constant-size blockchain storage.
△ Less
Submitted 5 May, 2024; v1 submitted 16 November, 2023;
originally announced November 2023.
-
On the quadratic convergence of Newton's method for Mean Field Games with non-separable Hamiltonian
Authors:
Fabio Camilli,
Qing Tang
Abstract:
We analyze asymptotic convergence properties of Newton's method for a class of evolutive Mean Field Games systems with non-separable Hamiltonian arising in mean field type models with congestion. We prove the well posedness of the Mean Field Game system with non-separable Hamiltonian and of the linear system giving the Newton iterations. Then, by forward induction and assuming that the initial gue…
▽ More
We analyze asymptotic convergence properties of Newton's method for a class of evolutive Mean Field Games systems with non-separable Hamiltonian arising in mean field type models with congestion. We prove the well posedness of the Mean Field Game system with non-separable Hamiltonian and of the linear system giving the Newton iterations. Then, by forward induction and assuming that the initial guess is sufficiently close to the solution of problem, we show a quadratic rate of convergence for the approximation of the Mean Field Game system by Newton's method. We also consider the case of a nonlocal coupling, but with separable Hamiltonian, and we show a similar rate of convergence.
△ Less
Submitted 18 March, 2024; v1 submitted 9 November, 2023;
originally announced November 2023.
-
Detecting Any Human-Object Interaction Relationship: Universal HOI Detector with Spatial Prompt Learning on Foundation Models
Authors:
Yichao Cao,
Qingfei Tang,
Xiu Su,
Chen Song,
Shan You,
Xiaobo Lu,
Chang Xu
Abstract:
Human-object interaction (HOI) detection aims to comprehend the intricate relationships between humans and objects, predicting $<human, action, object>$ triplets, and serving as the foundation for numerous computer vision tasks. The complexity and diversity of human-object interactions in the real world, however, pose significant challenges for both annotation and recognition, particularly in reco…
▽ More
Human-object interaction (HOI) detection aims to comprehend the intricate relationships between humans and objects, predicting $<human, action, object>$ triplets, and serving as the foundation for numerous computer vision tasks. The complexity and diversity of human-object interactions in the real world, however, pose significant challenges for both annotation and recognition, particularly in recognizing interactions within an open world context. This study explores the universal interaction recognition in an open-world setting through the use of Vision-Language (VL) foundation models and large language models (LLMs). The proposed method is dubbed as \emph{\textbf{UniHOI}}. We conduct a deep analysis of the three hierarchical features inherent in visual HOI detectors and propose a method for high-level relation extraction aimed at VL foundation models, which we call HO prompt-based learning. Our design includes an HO Prompt-guided Decoder (HOPD), facilitates the association of high-level relation representations in the foundation model with various HO pairs within the image. Furthermore, we utilize a LLM (\emph{i.e.} GPT) for interaction interpretation, generating a richer linguistic understanding for complex HOIs. For open-category interaction recognition, our method supports either of two input types: interaction phrase or interpretive sentence. Our efficient architecture design and learning methods effectively unleash the potential of the VL foundation models and LLMs, allowing UniHOI to surpass all existing methods with a substantial margin, under both supervised and zero-shot settings. The code and pre-trained weights are available at: \url{https://github.com/Caoyichao/UniHOI}.
△ Less
Submitted 7 November, 2023;
originally announced November 2023.
-
High-dimensional Bid Learning for Energy Storage Bidding in Energy Markets
Authors:
**yu Liu,
Hongye Guo,
Qinghu Tang,
En Lu,
Qiuna Cai,
Qixin Chen
Abstract:
With the growing penetration of renewable energy resource, electricity market prices have exhibited greater volatility. Therefore, it is important for Energy Storage Systems(ESSs) to leverage the multidimensional nature of energy market bids to maximize profitability. However, current learning methods cannot fully utilize the high-dimensional price-quantity bids in the energy markets. To address t…
▽ More
With the growing penetration of renewable energy resource, electricity market prices have exhibited greater volatility. Therefore, it is important for Energy Storage Systems(ESSs) to leverage the multidimensional nature of energy market bids to maximize profitability. However, current learning methods cannot fully utilize the high-dimensional price-quantity bids in the energy markets. To address this challenge, we modify the common reinforcement learning(RL) process by proposing a new bid representation method called Neural Network Embedded Bids (NNEBs). NNEBs refer to market bids that are represented by monotonic neural networks with discrete outputs. To achieve effective learning of NNEBs, we first learn a neural network as a strategic map** from the market price to ESS power output with RL. Then, we re-train the network with two training modifications to make the network output monotonic and discrete. Finally, the neural network is equivalently converted into a high-dimensional bid for bidding. We conducted experiments over real-world market datasets. Our studies show that the proposed method achieves 18% higher profit than the baseline and up to 78% profit of the optimal market bidder.
△ Less
Submitted 4 November, 2023;
originally announced November 2023.
-
Does or did the supernova remnant Cassiopeia A operate as a PeVatron?
Authors:
Zhen Cao,
F. Aharonian,
Q. An,
Axikegu,
Y. X. Bai,
Y. W. Bao,
D. Bastieri,
X. J. Bi,
Y. J. Bi,
J. T. Cai,
Q. Cao,
W. Y. Cao,
Zhe Cao,
J. Chang,
J. F. Chang,
A. M. Chen,
E. S. Chen,
Liang Chen,
Lin Chen,
Long Chen,
M. J. Chen,
M. L. Chen,
Q. H. Chen,
S. H. Chen,
S. Z. Chen
, et al. (255 additional authors not shown)
Abstract:
For decades, supernova remnants (SNRs) have been considered the prime sources of Galactic Cosmic rays (CRs). But whether SNRs can accelerate CR protons to PeV energies and thus dominate CR flux up to the knee is currently under intensive theoretical and phenomenological debate. The direct test of the ability of SNRs to operate as CR PeVatrons can be provided by ultrahigh-energy (UHE;…
▽ More
For decades, supernova remnants (SNRs) have been considered the prime sources of Galactic Cosmic rays (CRs). But whether SNRs can accelerate CR protons to PeV energies and thus dominate CR flux up to the knee is currently under intensive theoretical and phenomenological debate. The direct test of the ability of SNRs to operate as CR PeVatrons can be provided by ultrahigh-energy (UHE; $E_γ\geq 100$~TeV) $γ$-rays. In this context, the historical SNR Cassiopeia A (Cas A) is considered one of the most promising target for UHE observations. This paper presents the observation of Cas A and its vicinity by the LHAASO KM2A detector. The exceptional sensitivity of LHAASO KM2A in the UHE band, combined with the young age of Cas A, enabled us to derive stringent model-independent limits on the energy budget of UHE protons and nuclei accelerated by Cas A at any epoch after the explosion. The results challenge the prevailing paradigm that Cas A-type SNRs are major suppliers of PeV CRs in the Milky Way.
△ Less
Submitted 25 October, 2023;
originally announced October 2023.
-
Study on the radon adsorption capability of low-background activated carbon
Authors:
Chi Li,
Yongpeng Zhang,
Lidan Lv,
**chang Liu,
Cong Guo,
Changgen Yang,
Tingyu Guan,
Yu Liu,
Yu Lei,
Quan Tang
Abstract:
Radon is a significant background source in rare event detection experiments. Activated Carbon (AC) adsorption is widely used for effective radon removal. The selection of AC considers its adsorption capacity and radioactive background. In this study, using self-developed devices, we screened and identified a new kind of low-background AC from Qingdao Inaf Technology Company that has very high Rad…
▽ More
Radon is a significant background source in rare event detection experiments. Activated Carbon (AC) adsorption is widely used for effective radon removal. The selection of AC considers its adsorption capacity and radioactive background. In this study, using self-developed devices, we screened and identified a new kind of low-background AC from Qingdao Inaf Technology Company that has very high Radon adsorption capacity. By adjusting the average pore size to 2.3 nm, this AC demonstrates a radon adsorption capacity of 2.6 or 4.7 times higher than Saratech or Carboact activated carbon under the same conditions.
△ Less
Submitted 22 October, 2023;
originally announced October 2023.
-
Evidence of Hadronic Emission from the brightest-of-all-time GRB 221009A
Authors:
Kai Wang,
Qing-Wen Tang,
Yan-Qiu Zhang,
Chao Zheng,
Shao-Lin Xiong,
Jia Ren,
Bing Zhang
Abstract:
Acceleration of hadrons in relativistic shocks has been long expected and invoked to model GRB high-energy photon and neutrino emissions. However, so far there has been no direct observational evidence of hadronic emission from GRBs. The B.O.A.T. ("brightest of all time") gamma-ray burst (GRB) 221009A had extreme energies (with an isotropic energy exceeding $10^{55}$ erg) and was detected in broad…
▽ More
Acceleration of hadrons in relativistic shocks has been long expected and invoked to model GRB high-energy photon and neutrino emissions. However, so far there has been no direct observational evidence of hadronic emission from GRBs. The B.O.A.T. ("brightest of all time") gamma-ray burst (GRB) 221009A had extreme energies (with an isotropic energy exceeding $10^{55}$ erg) and was detected in broad-band including the very-high-energy (VHE, $>100\,\rm GeV$) band up to $>10$ TeV. Here we perform a comprehensive spectral analysis of the GRB from keV to TeV energy range and perform detailed spectral and light curve modelings considering both the traditional synchrotron self-Compton process and the electromagnetic (EM) cascade process initiated by hadronic interactions by accelerated cosmic rays in the external shock. We find that the leptonic scenario alone is not adequate to account for the observations, whereas the proposed scenario with the combination of hadronic and leptonic components can well reproduce the multi-wavelength spectra and the light curve. This result reveals the existence of the accelerated hadronic component in the early afterglow of this extreme burst. According to this scenario, the observed TeV light curve should contain imprints of the prompt MeV emission.
△ Less
Submitted 18 October, 2023;
originally announced October 2023.
-
Feature Pyramid biLSTM: Using Smartphone Sensors for Transportation Mode Detection
Authors:
Qinrui Tang,
Hao Cheng
Abstract:
The widespread utilization of smartphones has provided extensive availability to Inertial Measurement Units, providing a wide range of sensory data that can be advantageous for the detection of transportation modes. The objective of this study is to propose a novel end-to-end approach to effectively explore a reduced amount of sensory data collected from a smartphone to achieve accurate mode detec…
▽ More
The widespread utilization of smartphones has provided extensive availability to Inertial Measurement Units, providing a wide range of sensory data that can be advantageous for the detection of transportation modes. The objective of this study is to propose a novel end-to-end approach to effectively explore a reduced amount of sensory data collected from a smartphone to achieve accurate mode detection in common daily traveling activities. Our approach, called Feature Pyramid biLSTM (FPbiLSTM), is characterized by its ability to reduce the number of sensors required and processing demands, resulting in a more efficient modeling process without sacrificing the quality of the outcomes than the other current models. FPbiLSTM extends an existing CNN biLSTM model with the Feature Pyramid Network, leveraging the advantages of both shallow layer richness and deeper layer feature resilience for capturing temporal moving patterns in various transportation modes. It exhibits an excellent performance by employing the data collected from only three out of seven sensors, i.e. accelerometers, gyroscopes, and magnetometers, in the 2018 Sussex-Huawei Locomotion (SHL) challenge dataset, attaining a noteworthy accuracy of 95.1% and an F1-score of 94.7% in detecting eight different transportation modes.
△ Less
Submitted 17 October, 2023;
originally announced October 2023.
-
Very high energy gamma-ray emission beyond 10 TeV from GRB 221009A
Authors:
Zhen Cao,
F. Aharonian,
Q. An,
A. Axikegu,
Y. X. Bai,
Y. W. Bao,
D. Bastieri,
X. J. Bi,
Y. J. Bi,
J. T. Cai,
Q. Cao,
W. Y. Cao,
Zhe Cao,
J. Chang,
J. F. Chang,
A. M. Chen,
E. S. Chen,
Liang Chen,
Lin Chen,
Long Chen,
M. J. Chen,
M. L. Chen,
Q. H. Chen,
S. H. Chen,
S. Z. Chen
, et al. (255 additional authors not shown)
Abstract:
The highest energy gamma-rays from gamma-ray bursts (GRBs) have important implications for their radiation mechanism. Here we report for the first time the detection of gamma-rays up to 13 TeV from the brightest GRB 221009A by the Large High Altitude Air-shower Observatory (LHAASO). The LHAASO-KM2A detector registered more than 140 gamma-rays with energies above 3 TeV during 230$-$900s after the t…
▽ More
The highest energy gamma-rays from gamma-ray bursts (GRBs) have important implications for their radiation mechanism. Here we report for the first time the detection of gamma-rays up to 13 TeV from the brightest GRB 221009A by the Large High Altitude Air-shower Observatory (LHAASO). The LHAASO-KM2A detector registered more than 140 gamma-rays with energies above 3 TeV during 230$-$900s after the trigger. The intrinsic energy spectrum of gamma-rays can be described by a power-law after correcting for extragalactic background light (EBL) absorption. Such a hard spectrum challenges the synchrotron self-Compton (SSC) scenario of relativistic electrons for the afterglow emission above several TeV. Observations of gamma-rays up to 13 TeV from a source with a measured redshift of z=0.151 hints more transparency in intergalactic space than previously expected. Alternatively, one may invoke new physics such as Lorentz Invariance Violation (LIV) or an axion origin of very high energy (VHE) signals.
△ Less
Submitted 22 November, 2023; v1 submitted 13 October, 2023;
originally announced October 2023.
-
Refining Decompiled C Code with Large Language Models
Authors:
Wai Kin Wong,
Huai** Wang,
Zongjie Li,
Zhibo Liu,
Shuai Wang,
Qiyi Tang,
Sen Nie,
Shi Wu
Abstract:
A C decompiler converts an executable into source code. The recovered C source code, once re-compiled, is expected to produce an executable with the same functionality as the original executable. With over twenty years of development, C decompilers have been widely used in production to support reverse engineering applications. Despite the prosperous development of C decompilers, it is widely ackn…
▽ More
A C decompiler converts an executable into source code. The recovered C source code, once re-compiled, is expected to produce an executable with the same functionality as the original executable. With over twenty years of development, C decompilers have been widely used in production to support reverse engineering applications. Despite the prosperous development of C decompilers, it is widely acknowledged that decompiler outputs are mainly used for human consumption, and are not suitable for automatic recompilation. Often, a substantial amount of manual effort is required to fix the decompiler outputs before they can be recompiled and executed properly.
This paper is motived by the recent success of large language models (LLMs) in comprehending dense corpus of natural language. To alleviate the tedious, costly and often error-prone manual effort in fixing decompiler outputs, we investigate the feasibility of using LLMs to augment decompiler outputs, thus delivering recompilable decompilation. Note that different from previous efforts that focus on augmenting decompiler outputs with higher readability (e.g., recovering type/variable names), we focus on augmenting decompiler outputs with recompilability, meaning to generate code that can be recompiled into an executable with the same functionality as the original executable.
We conduct a pilot study to characterize the obstacles in recompiling the outputs of the de facto commercial C decompiler -- IDA-Pro. We then propose a two-step, hybrid approach to augmenting decompiler outputs with LLMs. We evaluate our approach on a set of popular C test cases, and show that our approach can deliver a high recompilation success rate to over 75% with moderate effort, whereas none of the IDA-Pro's original outputs can be recompiled. We conclude with a discussion on the limitations of our approach and promising future research directions.
△ Less
Submitted 28 November, 2023; v1 submitted 10 October, 2023;
originally announced October 2023.
-
Statistical Properties of X-Ray Bursts from SGR J1935+2154 Detected by Insight-HXMT
Authors:
Wen-Long Zhang,
Xiu-Juan Li,
Yu-Peng Yang,
Shuang-Xi Yi,
Cheng-Kui Li,
Qing-Wen Tang,
Ying Qin,
Fa-Yin Wang
Abstract:
As one class of the most important objects in the universe, magnetars can produce a lot of different frequency bursts including X-ray bursts. In \cite{2022ApJS..260...24C}, 75 X-ray bursts produced by magnetar SGR J1935+2154 during an active period in 2020 are published, including the duration and net photon counts of each burst, and waiting time based on the trigger time difference. In this paper…
▽ More
As one class of the most important objects in the universe, magnetars can produce a lot of different frequency bursts including X-ray bursts. In \cite{2022ApJS..260...24C}, 75 X-ray bursts produced by magnetar SGR J1935+2154 during an active period in 2020 are published, including the duration and net photon counts of each burst, and waiting time based on the trigger time difference. In this paper, we utilize the power-law model, $dN(x)/dx\propto (x+x_0)^{-α_x}$, to fit the cumulative distributions of these parameters. It can be found that all the cumulative distributions can be well fitted, which can be interpreted by a self-organizing criticality theory. Furthermore, we check whether this phenomenon still exist in different energy bands and find that there is no obvious evolution. These findings further confirm that the X-ray bursts from magnetars are likely to be generated by some self-organizing critical process, which can be explained by a possible magnetic reconnection scenario in magnetars.
△ Less
Submitted 10 October, 2023;
originally announced October 2023.