-
Observation of $χ_{cJ}\to 3(K^+K^-)$
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (632 additional authors not shown)
Abstract:
By analyzing $(27.12\pm0.14)\times10^8$ $ψ(3686)$ events collected with the BESIII detector operating at the BEPCII collider, the decay processes $χ_{cJ} \to 3(K^+K^-)$ ($J=0,1,2$) are observed for the first time with statistical significances of 8.2$σ$, 8.1$σ$, and 12.4$σ$, respectively. The product branching fractions of $ψ(3686)\toγχ_{cJ}$, $χ_{cJ}\to 3(K^+K^-)$ are presented and the branching…
▽ More
By analyzing $(27.12\pm0.14)\times10^8$ $ψ(3686)$ events collected with the BESIII detector operating at the BEPCII collider, the decay processes $χ_{cJ} \to 3(K^+K^-)$ ($J=0,1,2$) are observed for the first time with statistical significances of 8.2$σ$, 8.1$σ$, and 12.4$σ$, respectively. The product branching fractions of $ψ(3686)\toγχ_{cJ}$, $χ_{cJ}\to 3(K^+K^-)$ are presented and the branching fractions of $χ_{cJ}\to 3(K^+K^-)$ decays are determined to be
$\mathcal{B}_{χ_{c0}\to 3(K^+K^-)}$=$(10.7\pm1.8\pm1.1)$$\times10^{-6}$,
$\mathcal{B}_{χ_{c1}\to 3(K^+K^-)}$=$(4.2\pm0.9\pm0.5)$$\times10^{-6}$, and
$\mathcal{B}_{χ_{c2}\to 3(K^+K^-)}$=$(7.2\pm1.1\pm0.8)$$\times10^{-6}$,
where the first uncertainties are statistical and the second are systematic.
△ Less
Submitted 26 December, 2023;
originally announced December 2023.
-
Strategic Bidding Wars in On-chain Auctions
Authors:
Fei Wu,
Thomas Thiery,
Stefanos Leonardos,
Carmine Ventre
Abstract:
The Ethereum block-building process has changed significantly since the emergence of Proposer-Builder Separation. Validators access blocks through a marketplace, where block builders bid for the right to construct the block and earn MEV (Maximal Extractable Value) rewards in an on-chain competition, known as the MEV-boost auction. While more than 90% of blocks are currently built via MEV-Boost, tr…
▽ More
The Ethereum block-building process has changed significantly since the emergence of Proposer-Builder Separation. Validators access blocks through a marketplace, where block builders bid for the right to construct the block and earn MEV (Maximal Extractable Value) rewards in an on-chain competition, known as the MEV-boost auction. While more than 90% of blocks are currently built via MEV-Boost, trade-offs between builders' strategic behaviors and auction design remain poorly understood. In this paper we address this gap. We introduce a game-theoretic model for MEV-Boost auctions and use simulations to study different builders' bidding strategies observed in practice. We study various strategic interactions and auction setups and evaluate how the interplay between critical elements such as access to MEV opportunities and improved connectivity to relays impact bidding performance. Our results demonstrate the importance of latency on the effectiveness of builders' strategies and the overall auction outcome from the proposer's perspective.
△ Less
Submitted 17 March, 2024; v1 submitted 22 December, 2023;
originally announced December 2023.
-
Critical quantum geometric tensors of parametrically-driven nonlinear resonators
Authors:
Hao-Long Zhang,
Jia-Hao Lv,
Ken Chen,
Xue-Jia Yu,
Fan Wu,
Zhen-Biao Yang,
Shi-Biao Zheng
Abstract:
Parametrically driven nonlinear resonators represent a building block for realizing fault-tolerant quantum computation and are useful for critical quantum sensing. From a fundamental viewpoint, the most intriguing feature of such a system is perhaps the critical phenomena, which can occur without interaction with any other quantum system. The non-analytic behaviors of its eigenspectrum have been s…
▽ More
Parametrically driven nonlinear resonators represent a building block for realizing fault-tolerant quantum computation and are useful for critical quantum sensing. From a fundamental viewpoint, the most intriguing feature of such a system is perhaps the critical phenomena, which can occur without interaction with any other quantum system. The non-analytic behaviors of its eigenspectrum have been substantially investigated, but those associated with the ground state wavefunction have largely remained unexplored. Using the quantum ground state geometric tensor as an indicator, we comprehensively establish a phase diagram involving the driving parameter $\varepsilon$ and phase $φ$. The results reveal that with the increase in $\varepsilon$, the system undergoes a quantum phase transition from the normal to the superradiant phase, with the critical point unaffected by $φ$. Furthermore, the critical exponent and scaling dimension are obtained by an exact numerical method, which is consistent with previous works. Our numerical results show that the phase transition falls within the universality class of the quantum Rabi model. This work reveals that the quantum metric and Berry curvature display diverging behaviors across the quantum phase transition.
△ Less
Submitted 21 December, 2023;
originally announced December 2023.
-
Benchmarking and Defending Against Indirect Prompt Injection Attacks on Large Language Models
Authors:
**gwei Yi,
Yueqi Xie,
Bin Zhu,
Emre Kiciman,
Guangzhong Sun,
Xing Xie,
Fangzhao Wu
Abstract:
The integration of large language models (LLMs) with external content has enabled more up-to-date and wide-ranging applications of LLMs, such as Microsoft Copilot. However, this integration has also exposed LLMs to the risk of indirect prompt injection attacks, where an attacker can embed malicious instructions within external content, compromising LLM output and causing responses to deviate from…
▽ More
The integration of large language models (LLMs) with external content has enabled more up-to-date and wide-ranging applications of LLMs, such as Microsoft Copilot. However, this integration has also exposed LLMs to the risk of indirect prompt injection attacks, where an attacker can embed malicious instructions within external content, compromising LLM output and causing responses to deviate from user expectations. To investigate this important but underexplored issue, we introduce the first benchmark for indirect prompt injection attacks, named BIPIA, to evaluate the risk of such attacks. Based on the evaluation, our work makes a key analysis of the underlying reason for the success of the attack, namely the inability of LLMs to distinguish between instructions and external content and the absence of LLMs' awareness to not execute instructions within external content. Building upon this analysis, we develop two black-box methods based on prompt learning and a white-box defense method based on fine-tuning with adversarial training accordingly. Experimental results demonstrate that black-box defenses are highly effective in mitigating these attacks, while the white-box defense reduces the attack success rate to near-zero levels. Overall, our work systematically investigates indirect prompt injection attacks by introducing a benchmark, analyzing the underlying reason for the success of the attack, and develo** an initial set of defenses.
△ Less
Submitted 8 March, 2024; v1 submitted 20 December, 2023;
originally announced December 2023.
-
Search for the decay $χ_{c1}(3872)\toπ^{+}π^{-}χ_{c1}$
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
X. C. Ai,
R. Aliberti,
A. Amoroso,
M. R. An,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (608 additional authors not shown)
Abstract:
Using a data sample corresponding to an integrated luminosity of 10.9 fb$^{-1}$ collected at center-of-mass energies from 4.16 to 4.34 GeV with the BESIII detector, we search for the decay $χ_{c1}(3872) \to π^{+}π^{-}χ_{c1}$ in the radiative production $e^{+}e^{-} \to γχ_{c1}(3872)$. No significant signal is observed, and the ratio for the branching fraction of $χ_{c1}(3872) \to π^{+}π^{-}χ_{c1}$…
▽ More
Using a data sample corresponding to an integrated luminosity of 10.9 fb$^{-1}$ collected at center-of-mass energies from 4.16 to 4.34 GeV with the BESIII detector, we search for the decay $χ_{c1}(3872) \to π^{+}π^{-}χ_{c1}$ in the radiative production $e^{+}e^{-} \to γχ_{c1}(3872)$. No significant signal is observed, and the ratio for the branching fraction of $χ_{c1}(3872) \to π^{+}π^{-}χ_{c1}$ to $χ_{c1}(3872) \to π^{+}π^{-}J/ψ$ is measured as $\mathcal{R}\equiv\frac{\mathcal{B}[χ_{c1}(3872) \to π^{+}π^{-}χ_{c1}]}{\mathcal{B}[χ_{c1}(3872) \to π^{+}π^{-} J/ψ]}<0.18$ at 90$\%$ confidence level. The upper limit on the product of the cross section $σ[e^{+}e^{-}\toγχ_{c1}(3872)]$ and the branching fraction $\mathcal{B}[χ_{c1}(3872)\toπ^{+}π^{-}χ_{c1}]$ at each center-of-mass energy is also given. These measurements favor the non-conventional charmonium nature of the $χ_{c1}(3872)$ state.
△ Less
Submitted 21 December, 2023;
originally announced December 2023.
-
Measurements of $Σ$ electromagnetic form factors in the time-like region using the untagged initial-state radiation technique
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (626 additional authors not shown)
Abstract:
The process $e^{+}e^{-}\toΣ^{+}\barΣ^{-}$ is studied from threshold up to 3.04 GeV/$c^2$ via the initial-state radiation technique using data with an integrated luminosity of 12.0 fb$^{-1}$, collected at center-of-mass energies between 3.773 and 4.258 GeV with the BESIII detector at the BEPCII collider. The pair production cross sections and the effective form factors of $Σ$ are measured in eleven…
▽ More
The process $e^{+}e^{-}\toΣ^{+}\barΣ^{-}$ is studied from threshold up to 3.04 GeV/$c^2$ via the initial-state radiation technique using data with an integrated luminosity of 12.0 fb$^{-1}$, collected at center-of-mass energies between 3.773 and 4.258 GeV with the BESIII detector at the BEPCII collider. The pair production cross sections and the effective form factors of $Σ$ are measured in eleven $Σ^{+}\barΣ^{-}$ invariant mass intervals from threshold to 3.04 GeV/$c^2$. The results are consistent with the previous results from Belle and BESIII. Furthermore, the branching fractions of the decays $J/ψ\toΣ^{+}\barΣ^{-}$ and $ψ(3686)\toΣ^{+}\barΣ^{-}$ are determined and the obtained results are consistent with the previous results of BESIII.
△ Less
Submitted 19 December, 2023;
originally announced December 2023.
-
Learning to Reweight for Graph Neural Network
Authors:
Zhengyu Chen,
Teng Xiao,
Kun Kuang,
Zheqi Lv,
Min Zhang,
**luan Yang,
Chengqiang Lu,
Hongxia Yang,
Fei Wu
Abstract:
Graph Neural Networks (GNNs) show promising results for graph tasks. However, existing GNNs' generalization ability will degrade when there exist distribution shifts between testing and training graph data. The cardinal impetus underlying the severe degeneration is that the GNNs are architected predicated upon the I.I.D assumptions. In such a setting, GNNs are inclined to leverage imperceptible st…
▽ More
Graph Neural Networks (GNNs) show promising results for graph tasks. However, existing GNNs' generalization ability will degrade when there exist distribution shifts between testing and training graph data. The cardinal impetus underlying the severe degeneration is that the GNNs are architected predicated upon the I.I.D assumptions. In such a setting, GNNs are inclined to leverage imperceptible statistical correlations subsisting in the training set to predict, albeit it is a spurious correlation. In this paper, we study the problem of the generalization ability of GNNs in Out-Of-Distribution (OOD) settings. To solve this problem, we propose the Learning to Reweight for Generalizable Graph Neural Network (L2R-GNN) to enhance the generalization ability for achieving satisfactory performance on unseen testing graphs that have different distributions with training graphs. We propose a novel nonlinear graph decorrelation method, which can substantially improve the out-of-distribution generalization ability and compares favorably to previous methods in restraining the over-reduced sample size. The variables of the graph representation are clustered based on the stability of the correlation, and the graph decorrelation method learns weights to remove correlations between the variables of different clusters rather than any two variables. Besides, we interpose an efficacious stochastic algorithm upon bi-level optimization for the L2R-GNN framework, which facilitates simultaneously learning the optimal weights and GNN parameters, and avoids the overfitting problem. Experimental results show that L2R-GNN greatly outperforms baselines on various graph prediction benchmarks under distribution shifts.
△ Less
Submitted 19 December, 2023;
originally announced December 2023.
-
Observation of significant flavor-SU(3) breaking in the kaon wave function at $12~{\rm GeV}^2<Q^2<25~{\rm GeV}^2$ and discovery of the charmless decay $ψ(3770)\to K_S^0K_L^0$
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
X. C. Ai,
R. Aliberti,
A. Amoroso,
M. R. An,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (607 additional authors not shown)
Abstract:
We present cross sections for the reaction $e^+e^-\to K_S^0K_L^0$ at center-of-mass energies ranging from 3.51 GeV to 4.95 GeV using data samples collected in the BESIII experiment, corresponding to a total integrated luminosity of 26.5 fb$^{-1}$. The ratio of neutral-to-charged kaon form factors at large momentum transfers ($12~{\rm GeV}^2<Q^2<25~{\rm GeV}^2$) is determined to be $0.21\pm 0.01$,…
▽ More
We present cross sections for the reaction $e^+e^-\to K_S^0K_L^0$ at center-of-mass energies ranging from 3.51 GeV to 4.95 GeV using data samples collected in the BESIII experiment, corresponding to a total integrated luminosity of 26.5 fb$^{-1}$. The ratio of neutral-to-charged kaon form factors at large momentum transfers ($12~{\rm GeV}^2<Q^2<25~{\rm GeV}^2$) is determined to be $0.21\pm 0.01$, which indicates a small but significant effect of flavor-SU(3) breaking in the kaon wave function, and consequently excludes the possibility that flavor-SU(3) breaking is the primary reason for the strong experimental violation of the pQCD prediction $|F(π^{\pm})|/|F(K^{\pm})|=f^2_π/f^2_{K}$, where $F(π^{\pm})$ and $F(K^{\pm})$ are the form factors, and $f_π$ and $f_{K}$ are the decay constants of charged pions and kaons, respectively. We also observe a significant signal for the charmless decay $ψ(3770)\to K_S^0K_L^0$ for the first time. Within a $1σ$ contour of the likelihood value, the the branching fraction for $ψ(3770)\to K_S^0K_L^0$ is determined to be ${\cal B}=(2.63_{-1.59}^{+1.40})\times 10^{-5}$, and the relative phase between the continuum and $ψ(3770)$ amplitudes is $φ=(-0.39_{-0.10}^{+0.05})π$. The branching fraction is in good agreement with the $\mathcal{S}$- and $\mathcal{D}$-wave charmonia mixing scheme proposed in the interpretation of the "$ρπ$ puzzle" between $J/ψ$ and $ψ(3686)$ decays.
△ Less
Submitted 18 December, 2023;
originally announced December 2023.
-
RetroOOD: Understanding Out-of-Distribution Generalization in Retrosynthesis Prediction
Authors:
Yemin Yu,
Luotian Yuan,
Ying Wei,
Hanyu Gao,
Xinhai Ye,
Zhihua Wang,
Fei Wu
Abstract:
Machine learning-assisted retrosynthesis prediction models have been gaining widespread adoption, though their performances oftentimes degrade significantly when deployed in real-world applications embracing out-of-distribution (OOD) molecules or reactions. Despite steady progress on standard benchmarks, our understanding of existing retrosynthesis prediction models under the premise of distributi…
▽ More
Machine learning-assisted retrosynthesis prediction models have been gaining widespread adoption, though their performances oftentimes degrade significantly when deployed in real-world applications embracing out-of-distribution (OOD) molecules or reactions. Despite steady progress on standard benchmarks, our understanding of existing retrosynthesis prediction models under the premise of distribution shifts remains stagnant. To this end, we first formally sort out two types of distribution shifts in retrosynthesis prediction and construct two groups of benchmark datasets. Next, through comprehensive experiments, we systematically compare state-of-the-art retrosynthesis prediction models on the two groups of benchmarks, revealing the limitations of previous in-distribution evaluation and re-examining the advantages of each model. More remarkably, we are motivated by the above empirical insights to propose two model-agnostic techniques that can improve the OOD generalization of arbitrary off-the-shelf retrosynthesis prediction algorithms. Our preliminary experiments show their high potential with an average performance improvement of 4.6%, and the established benchmarks serve as a foothold for further retrosynthesis prediction research towards OOD generalization.
△ Less
Submitted 17 December, 2023;
originally announced December 2023.
-
Rethinking Causal Relationships Learning in Graph Neural Networks
Authors:
Hang Gao,
Chengyu Yao,
Jiangmeng Li,
Lingyu Si,
Yifan **,
Fengge Wu,
Changwen Zheng,
Hua** Liu
Abstract:
Graph Neural Networks (GNNs) demonstrate their significance by effectively modeling complex interrelationships within graph-structured data. To enhance the credibility and robustness of GNNs, it becomes exceptionally crucial to bolster their ability to capture causal relationships. However, despite recent advancements that have indeed strengthened GNNs from a causal learning perspective, conductin…
▽ More
Graph Neural Networks (GNNs) demonstrate their significance by effectively modeling complex interrelationships within graph-structured data. To enhance the credibility and robustness of GNNs, it becomes exceptionally crucial to bolster their ability to capture causal relationships. However, despite recent advancements that have indeed strengthened GNNs from a causal learning perspective, conducting an in-depth analysis specifically targeting the causal modeling prowess of GNNs remains an unresolved issue. In order to comprehensively analyze various GNN models from a causal learning perspective, we constructed an artificially synthesized dataset with known and controllable causal relationships between data and labels. The rationality of the generated data is further ensured through theoretical foundations. Drawing insights from analyses conducted using our dataset, we introduce a lightweight and highly adaptable GNN module designed to strengthen GNNs' causal learning capabilities across a diverse range of tasks. Through a series of experiments conducted on both synthetic datasets and other real-world datasets, we empirically validate the effectiveness of the proposed module.
△ Less
Submitted 15 December, 2023;
originally announced December 2023.
-
Open Domain Knowledge Extraction for Knowledge Graphs
Authors:
Kun Qian,
Anton Belyi,
Fei Wu,
Samira Khorshidi,
Azadeh Nikfarjam,
Rahul Khot,
Yisi Sang,
Katherine Luna,
Xianqi Chu,
Eric Choi,
Yash Govind,
Chloe Seivwright,
Yiwen Sun,
Ahmed Fakhry,
Theo Rekatsinas,
Ihab Ilyas,
Xiaoguang Qi,
Yunyao Li
Abstract:
The quality of a knowledge graph directly impacts the quality of downstream applications (e.g. the number of answerable questions using the graph). One ongoing challenge when building a knowledge graph is to ensure completeness and freshness of the graph's entities and facts. In this paper, we introduce ODKE, a scalable and extensible framework that sources high-quality entities and facts from ope…
▽ More
The quality of a knowledge graph directly impacts the quality of downstream applications (e.g. the number of answerable questions using the graph). One ongoing challenge when building a knowledge graph is to ensure completeness and freshness of the graph's entities and facts. In this paper, we introduce ODKE, a scalable and extensible framework that sources high-quality entities and facts from open web at scale. ODKE utilizes a wide range of extraction models and supports both streaming and batch processing at different latency. We reflect on the challenges and design decisions made and share lessons learned when building and deploying ODKE to grow an industry-scale open domain knowledge graph.
△ Less
Submitted 30 October, 2023;
originally announced December 2023.
-
Measurements of Born Cross Sections for $e^+e^-\to Λ_{c}^+ \barΛ_{c}(2595)^- + {\rm c.c.}$ and $e^+e^-\to Λ_{c}^+ \barΛ_{c}(2625)^- + {\rm c.c.}$ at $\sqrt{s}=$4918.0 and 4950.9 MeV
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (620 additional authors not shown)
Abstract:
Using $e^+e^-$ collision data collected with the BESIII detector operating at the BEPCII collider, the Born cross sections of $e^+e^-\to Λ_{c}^+ \barΛ_{c}(2595)^- + \rm{c.c.}$ and $e^+e^-\to Λ_{c}^+ \barΛ_{c}(2625)^- + \rm{c.c.}$ are measured for the first time at center-of-mass energies of $\sqrt{s}=4918.0$ and 4950.9 MeV. Non-zero cross sections are observed very close to the production threshol…
▽ More
Using $e^+e^-$ collision data collected with the BESIII detector operating at the BEPCII collider, the Born cross sections of $e^+e^-\to Λ_{c}^+ \barΛ_{c}(2595)^- + \rm{c.c.}$ and $e^+e^-\to Λ_{c}^+ \barΛ_{c}(2625)^- + \rm{c.c.}$ are measured for the first time at center-of-mass energies of $\sqrt{s}=4918.0$ and 4950.9 MeV. Non-zero cross sections are observed very close to the production threshold. The measured Born cross sections of $e^+e^-\to Λ_{c}^+ \barΛ_{c}(2625)^- + \rm{c.c.}$ are about $2\sim3$ times greater than those of $e^+e^-\to Λ_{c}^+ \barΛ_{c}(2595)^- + \rm{c.c.}$, thereby indicating that the exotic structure potentially exists in the excited charmed baryons. The Born cross sections are $15.6\pm3.1\pm0.9$ pb and $29.4\pm3.7\pm2.7$ pb for $e^+e^-\to Λ_{c}^+ \barΛ_{c}(2595)^- + \rm{c.c.}$, and are $43.4\pm4.0\pm4.1$ pb and $76.8\pm6.5\pm4.2$ pb for $e^+e^-\to Λ_{c}^+ \barΛ_{c}(2625)^- +\rm{c.c.}$ at $\sqrt s=4918.0$ and 4950.9 MeV, respectively. Based on the polar angle distributions of the $\barΛ_{c}(2625)^-$ and $Λ_{c}(2625)^+$, the form-factor ratios $\sqrt{|G_{E}|^2 + 3|G_{M}|^2}/|G_{C}|$ are determined for $e^+e^-\to Λ_{c}^+ \barΛ_{c}(2625)^- + \rm{c.c.}$ for the first time, which are $5.95\pm4.07\pm0.15$ and $0.94\pm0.32\pm0.02$ at $\sqrt s=4918.0$ and 4950.9 MeV, respectively. All of these first uncertainties are statistical and second systematic.
△ Less
Submitted 8 May, 2024; v1 submitted 13 December, 2023;
originally announced December 2023.
-
Quantum metric and metrology with parametrically-driven Tavis-Cummings models
Authors:
Jia-Hao Lü,
Pei-Rong Han,
Wen Ning,
Xin Zhu,
Fan Wu,
Li-Tuo Shen,
Zhen-Biao Yang,
Shi-Biao Zheng
Abstract:
We study the quantum metric in a driven Tavis-Cummings model, comprised of multiple qubits interacting with a quantized photonic field. The parametrical driving of the photonic field breaks the system's U(1) symmetry down to a ${\rm Z}_2$ symmetry, whose spontaneous breaking initiates a superradiant phase transition. We analytically solved the eigenenergies and eigenstates, and numerically simulat…
▽ More
We study the quantum metric in a driven Tavis-Cummings model, comprised of multiple qubits interacting with a quantized photonic field. The parametrical driving of the photonic field breaks the system's U(1) symmetry down to a ${\rm Z}_2$ symmetry, whose spontaneous breaking initiates a superradiant phase transition. We analytically solved the eigenenergies and eigenstates, and numerically simulated the system behaviors near the critical point. The critical behaviors near the superradiant phase transition are characterized by the quantum metric, defined in terms of the response of the quantum state to variation of the control parameter. In addition, a quantum metrological protocol based on the critical behaviors of the quantum metric near the superradiant phase transition is proposed, which enables greatly the achievable measurement precision.
△ Less
Submitted 13 December, 2023;
originally announced December 2023.
-
Search for $D^{0}\to K_{S}^{0} K^{-} e^{+}ν_{e}$, $D^{+}\to K_{S}^{0} K_{S}^{0} e^{+}ν_{e}$, and $D^{+}\to K^{+}K^{-} e^{+}ν_{e}$
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
M. R. An,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko
, et al. (604 additional authors not shown)
Abstract:
A search has been performed for the semileptonic decays $D^{0}\to K_{S}^{0} K^{-} e^{+}ν_{e}$, $D^{+}\to K_{S}^{0} K_{S}^{0} e^{+}ν_{e}$ and $D^{+}\to K^{+}K^{-} e^{+}ν_{e}$, using $7.9~\mathrm{fb}^{-1}$ of $e^+e^-$ annihilation data collected at the center-of-mass energy $\sqrt{s}=3.773$ GeV by the BESIII detector operating at the BEPCII collider. No significant signals are observed, and upper li…
▽ More
A search has been performed for the semileptonic decays $D^{0}\to K_{S}^{0} K^{-} e^{+}ν_{e}$, $D^{+}\to K_{S}^{0} K_{S}^{0} e^{+}ν_{e}$ and $D^{+}\to K^{+}K^{-} e^{+}ν_{e}$, using $7.9~\mathrm{fb}^{-1}$ of $e^+e^-$ annihilation data collected at the center-of-mass energy $\sqrt{s}=3.773$ GeV by the BESIII detector operating at the BEPCII collider. No significant signals are observed, and upper limits are set at the 90\% confidence level of $2.13\times10^{-5}$, $1.54\times10^{-5}$ and $2.10\times10^{-5}$ for the branching fractions of $D^{0}\to K_{S}^{0} K^{-} e^{+}ν_{e}$, $D^{+}\to K_{S}^{0} K_{S}^{0} e^{+}ν_{e}$ and $D^{+}\to K^{+}K^{-} e^{+}ν_{e}$, respectively.
△ Less
Submitted 10 December, 2023;
originally announced December 2023.
-
Mixture Matrix-valued Autoregressive Model
Authors:
Fei Wu,
Kung-Sik Chan
Abstract:
Time series of matrix-valued data are increasingly available in various areas including economics, finance, social science, etc. These data may shed light on the inter-dynamical relationships between two sets of attributes, for instance countries and economic indices. The matrix autoregressive (MAR) model provides a parsimonious approach for analyzing such data. However, the MAR model, being a lin…
▽ More
Time series of matrix-valued data are increasingly available in various areas including economics, finance, social science, etc. These data may shed light on the inter-dynamical relationships between two sets of attributes, for instance countries and economic indices. The matrix autoregressive (MAR) model provides a parsimonious approach for analyzing such data. However, the MAR model, being a linear model with parametric constraints, cannot capture the nonlinear patterns in the data, such as regime shifts in the dynamics. We propose a mixture matrix autoregressive (MMAR) model for analyzing potential regime shifts in the dynamics between two attributes, for instance, due to recession vs. blooming, or quiet period vs. pandemic. We propose an EM algorithm for maximum likelihood estimation. We derive some theoretical properties of the proposed method including consistency and asymptotic distribution, and illustrate its performance via simulations and real applications.
△ Less
Submitted 26 May, 2024; v1 submitted 10 December, 2023;
originally announced December 2023.
-
Sim-GPT: Text Similarity via GPT Annotated Data
Authors:
Shuhe Wang,
Beiming Cao,
Shengyu Zhang,
Xiaoya Li,
Jiwei Li,
Fei Wu,
Guoyin Wang,
Eduard Hovy
Abstract:
Due to the lack of a large collection of high-quality labeled sentence pairs with textual similarity scores, existing approaches for Semantic Textual Similarity (STS) mostly rely on unsupervised techniques or training signals that are only partially correlated with textual similarity, e.g., NLI-based datasets. To tackle this issue, in this paper, we propose the strategy of measuring text similarit…
▽ More
Due to the lack of a large collection of high-quality labeled sentence pairs with textual similarity scores, existing approaches for Semantic Textual Similarity (STS) mostly rely on unsupervised techniques or training signals that are only partially correlated with textual similarity, e.g., NLI-based datasets. To tackle this issue, in this paper, we propose the strategy of measuring text similarity via GPT annotated data (Sim-GPT for short). The core idea of Sim-GPT is to generate data with STS labels using GPT-4, based on which an STS model is trained. Sim-GPT framework utilizes LLMs to provide a substantial amount of reliable annotated data filling the gap of the lack of training signals for STS. Sim-GPT is trained on a one-time generated dataset using BERT or RoBERTa as the backbone, which offers long-term savings in cost and speed compared to repeatedly invoking LLMs for each sentence pair. Trained on the examples from GPT-4 (371K), Sim-GPT yields SOTA performances on the widely-used seven STS benchmarks: +0.99 over supervised-SimCSE, and +0.42 over the current SOTA PromCSE model. To encourage further advancements of the field, we release both models and the 371K annotated examples from GPT-4. Code, models and annotated data are available at: https://github.com/ShuheWang1998/Sim-GPT.
△ Less
Submitted 12 December, 2023; v1 submitted 9 December, 2023;
originally announced December 2023.
-
Determination of spin-parity quantum numbers of X(2370) as $0^{-+}$ from $J/ψ\rightarrowγK^{0}_{S}K^{0}_{S}η^{\prime}$
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
X. C. Ai,
R. Aliberti,
A. Amoroso,
M. R. An,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (605 additional authors not shown)
Abstract:
Based on $(10087\pm44)\times10^{6}$ $J/ψ$ events collected with the BESIII detector, a partial wave analysis of the decay $J/ψ\rightarrowγK^{0}_{S}K^{0}_{S}η^{\prime}$ is performed. The mass and width of the $X(2370)$ are measured to be $2395 \pm 11 ({\rm stat})^{+26}_{-94}({\rm syst})\ \mathrm{MeV}/c^{2}$ and $188^{+18}_{-17}({\rm stat})^{+124}_{-33}({\rm syst})~\mathrm{MeV}$, respectively. The c…
▽ More
Based on $(10087\pm44)\times10^{6}$ $J/ψ$ events collected with the BESIII detector, a partial wave analysis of the decay $J/ψ\rightarrowγK^{0}_{S}K^{0}_{S}η^{\prime}$ is performed. The mass and width of the $X(2370)$ are measured to be $2395 \pm 11 ({\rm stat})^{+26}_{-94}({\rm syst})\ \mathrm{MeV}/c^{2}$ and $188^{+18}_{-17}({\rm stat})^{+124}_{-33}({\rm syst})~\mathrm{MeV}$, respectively. The corresponding product branching fraction is $\mathcal{B}[J/ψ\rightarrowγX(2370)] \times \mathcal{B}[X(2370) \rightarrow f_{0}(980)η^{\prime}] \times \mathcal{B}[f_{0}(980) \rightarrow K^{0}_{S}K^{0}_{S}] = \left( 1.31 \pm 0.22 ({\rm stat})^{+2.85}_{-0.84}({\rm syst}) \right) \times 10^{-5}$. The statistical significance of the $X(2370)$ is greater than $11.7σ$ and the spin-parity is determined to be $0^{-+}$ for the first time. The measured mass and spin-parity of the $X(2370)$ are consistent with the predictions of the lightest pseudoscalar glueball.
△ Less
Submitted 6 May, 2024; v1 submitted 8 December, 2023;
originally announced December 2023.
-
Exploring the Limits of ChatGPT in Software Security Applications
Authors:
Fangzhou Wu,
Qingzhao Zhang,
Ati Priya Bajaj,
Tiffany Bao,
Ning Zhang,
Ruoyu "Fish" Wang,
Chaowei Xiao
Abstract:
Large language models (LLMs) have undergone rapid evolution and achieved remarkable results in recent times. OpenAI's ChatGPT, backed by GPT-3.5 or GPT-4, has gained instant popularity due to its strong capability across a wide range of tasks, including natural language tasks, coding, mathematics, and engaging conversations. However, the impacts and limits of such LLMs in system security domain ar…
▽ More
Large language models (LLMs) have undergone rapid evolution and achieved remarkable results in recent times. OpenAI's ChatGPT, backed by GPT-3.5 or GPT-4, has gained instant popularity due to its strong capability across a wide range of tasks, including natural language tasks, coding, mathematics, and engaging conversations. However, the impacts and limits of such LLMs in system security domain are less explored. In this paper, we delve into the limits of LLMs (i.e., ChatGPT) in seven software security applications including vulnerability detection/repair, debugging, debloating, decompilation, patching, root cause analysis, symbolic execution, and fuzzing. Our exploration reveals that ChatGPT not only excels at generating code, which is the conventional application of language models, but also demonstrates strong capability in understanding user-provided commands in natural languages, reasoning about control and data flows within programs, generating complex data structures, and even decompiling assembly code. Notably, GPT-4 showcases significant improvements over GPT-3.5 in most security tasks. Also, certain limitations of ChatGPT in security-related tasks are identified, such as its constrained ability to process long code contexts.
△ Less
Submitted 7 December, 2023;
originally announced December 2023.
-
DeceptPrompt: Exploiting LLM-driven Code Generation via Adversarial Natural Language Instructions
Authors:
Fangzhou Wu,
Xiaogeng Liu,
Chaowei Xiao
Abstract:
With the advancement of Large Language Models (LLMs), significant progress has been made in code generation, enabling LLMs to transform natural language into programming code. These Code LLMs have been widely accepted by massive users and organizations. However, a dangerous nature is hidden in the code, which is the existence of fatal vulnerabilities. While some LLM providers have attempted to add…
▽ More
With the advancement of Large Language Models (LLMs), significant progress has been made in code generation, enabling LLMs to transform natural language into programming code. These Code LLMs have been widely accepted by massive users and organizations. However, a dangerous nature is hidden in the code, which is the existence of fatal vulnerabilities. While some LLM providers have attempted to address these issues by aligning with human guidance, these efforts fall short of making Code LLMs practical and robust. Without a deep understanding of the performance of the LLMs under the practical worst cases, it would be concerning to apply them to various real-world applications. In this paper, we answer the critical issue: Are existing Code LLMs immune to generating vulnerable code? If not, what is the possible maximum severity of this issue in practical deployment scenarios? In this paper, we introduce DeceptPrompt, a novel algorithm that can generate adversarial natural language instructions that drive the Code LLMs to generate functionality correct code with vulnerabilities. DeceptPrompt is achieved through a systematic evolution-based algorithm with a fine grain loss design. The unique advantage of DeceptPrompt enables us to find natural prefix/suffix with totally benign and non-directional semantic meaning, meanwhile, having great power in inducing the Code LLMs to generate vulnerable code. This feature can enable us to conduct the almost-worstcase red-teaming on these LLMs in a real scenario, where users are using natural language. Our extensive experiments and analyses on DeceptPrompt not only validate the effectiveness of our approach but also shed light on the huge weakness of LLMs in the code generation task. When applying the optimized prefix/suffix, the attack success rate (ASR) will improve by average 50% compared with no prefix/suffix applying.
△ Less
Submitted 12 December, 2023; v1 submitted 7 December, 2023;
originally announced December 2023.
-
Holmes: Towards Distributed Training Across Clusters with Heterogeneous NIC Environment
Authors:
Fei Yang,
Shuang Peng,
Ning Sun,
Fangyu Wang,
Yuanyuan Wang,
Fu Wu,
Jiezhong Qiu,
Aimin Pan
Abstract:
Large language models (LLMs) such as GPT-3, OPT, and LLaMA have demonstrated remarkable accuracy in a wide range of tasks. However, training these models can incur significant expenses, often requiring tens of thousands of GPUs for months of continuous operation. Typically, this training is carried out in specialized GPU clusters equipped with homogeneous high-speed Remote Direct Memory Access (RD…
▽ More
Large language models (LLMs) such as GPT-3, OPT, and LLaMA have demonstrated remarkable accuracy in a wide range of tasks. However, training these models can incur significant expenses, often requiring tens of thousands of GPUs for months of continuous operation. Typically, this training is carried out in specialized GPU clusters equipped with homogeneous high-speed Remote Direct Memory Access (RDMA) network interface cards (NICs). The acquisition and maintenance of such dedicated clusters is challenging. Current LLM training frameworks, like Megatron-LM and Megatron-DeepSpeed, focus primarily on optimizing training within homogeneous cluster settings. In this paper, we introduce Holmes, a training framework for LLMs that employs thoughtfully crafted data and model parallelism strategies over the heterogeneous NIC environment. Our primary technical contribution lies in a novel scheduling method that intelligently allocates distinct computational tasklets in LLM training to specific groups of GPU devices based on the characteristics of their connected NICs. Furthermore, our proposed framework, utilizing pipeline parallel techniques, demonstrates scalability to multiple GPU clusters, even in scenarios without high-speed interconnects between nodes in distinct clusters. We conducted comprehensive experiments that involved various scenarios in the heterogeneous NIC environment. In most cases, our framework achieves performance levels close to those achievable with homogeneous RDMA-capable networks (InfiniBand or RoCE), significantly exceeding training efficiency within the pure Ethernet environment. Additionally, we verified that our framework outperforms other mainstream LLM frameworks under heterogeneous NIC environment in terms of training efficiency and can be seamlessly integrated with them.
△ Less
Submitted 29 April, 2024; v1 submitted 6 December, 2023;
originally announced December 2023.
-
Amplitude Analysis of the Decays $D^0\toπ^+π^-π^+π^-$ and $π^+π^-π^0π^0$
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (620 additional authors not shown)
Abstract:
Using $e^+e^-$ annihilation data corresponding to an integrated luminosity of 2.93 $\rm fb^{-1}$ taken at the center-of-mass energy $\sqrt{s}=3.773$~GeV with the BESIII detector, a joint amplitude analysis is performed on the decays $D^0\toπ^+π^-π^+π^-$ and $D^0\toπ^+π^-π^0π^0$(non-$η$). The fit fractions of individual components are obtained, and large interferences among the dominant components…
▽ More
Using $e^+e^-$ annihilation data corresponding to an integrated luminosity of 2.93 $\rm fb^{-1}$ taken at the center-of-mass energy $\sqrt{s}=3.773$~GeV with the BESIII detector, a joint amplitude analysis is performed on the decays $D^0\toπ^+π^-π^+π^-$ and $D^0\toπ^+π^-π^0π^0$(non-$η$). The fit fractions of individual components are obtained, and large interferences among the dominant components of $D^{0}\to a_{1}(1260)π$, $D^{0}\toπ(1300)π$, $D^{0}\toρ(770)ρ(770)$ and $D^{0}\to2(ππ)_{S}$ are found in both channels. With the obtained amplitude model, the $CP$-even fractions of $D^0\to π^+π^-π^+π^-$ and $D^0\toπ^+π^-π^0π^0$(non-$η$) are determined to be $(75.2\pm1.1_{\rm stat.}\pm1.5_{\rm syst.})\%$ and $(68.9\pm1.5_{\rm stat.}\pm 2.4_{\rm syst.})\%$, respectively. The branching fractions of $D^0\to π^+π^-π^+π^-$ and $D^0\toπ^+π^-π^0π^0$(non-$η$) are measured to be $(0.688\pm0.010_{\rm stat.}\pm 0.010_{\rm syst.})\%$ and $(0.951\pm0.025_{\rm stat.}\pm 0.021_{\rm syst.})\%$, respectively. The amplitude analysis provides an important model for binning strategy in the measurements of the strong phase parameters of $D^0 \to 4π$ when used to determine the CKM angle $γ(φ_{3})$ via the $B^{-}\to D K^{-}$ decay.
△ Less
Submitted 3 April, 2024; v1 submitted 5 December, 2023;
originally announced December 2023.
-
LpiCT: A logic security analysis framework for protocols
Authors:
Fusheng Wu,
**hui Liu,
Yanbing Li,
Mingtao Ni
Abstract:
The pi calculus is a basic theory of mobile communication based on the notion of interaction, which, aimed at analyzing and modelling the behaviors of communication process in communicating and mobile systems, is widely applied to the security analysis of cryptographic protocol's design and implementation. But the pi calculus does not provide perfect logic security analysis, so the logic flaws in…
▽ More
The pi calculus is a basic theory of mobile communication based on the notion of interaction, which, aimed at analyzing and modelling the behaviors of communication process in communicating and mobile systems, is widely applied to the security analysis of cryptographic protocol's design and implementation. But the pi calculus does not provide perfect logic security analysis, so the logic flaws in the design and the implementation of a cryptographic protocol can not be discovered in time. The aim is to analyze whether there are logic flaws in the design and the implementation of a cryptographic protocol, so as to ensure the security of the cryptographic protocol when it is encoded into a software and implemented. This paper introduces logic rules and proofs, binary tree and the KMP algorithm, and proposes a new extension the pi calculus theory, a logic security analysis framework and an algorithm. This paper presents the logic security proof and analysis of TLS1.3 protocol's interactional implementation process. Empirical results show that the new extension theory, the logic security analysis framework and the algorithm can effectively analyze whether there are logic flaws in the design and the implementation of a cryptographic protocol. The security of cryptographic protocols depends not only on cryptographic primitives, but also on the coding of cryptographic protocols and the environment in which they are implemented. The security analysis framework of cryptographic protocol implementation proposed in this paper can ensure the security of protocol implementation.
△ Less
Submitted 1 November, 2023;
originally announced December 2023.
-
Towards Decentralized Task Offloading and Resource Allocation in User-Centric Mobile Edge Computing
Authors:
Langtian Qin,
Hancheng Lu,
Yuang Chen,
Baolin Chong,
Feng Wu
Abstract:
In the traditional cellular-based mobile edge computing (MEC), users at the edge of the cell are prone to suffer severe inter-cell interference and signal attenuation, leading to low throughput even transmission interruptions. Such edge effect severely obstructs offloading of tasks to MEC servers. To address this issue, we propose user-centric mobile edge computing (UCMEC), a novel MEC architectur…
▽ More
In the traditional cellular-based mobile edge computing (MEC), users at the edge of the cell are prone to suffer severe inter-cell interference and signal attenuation, leading to low throughput even transmission interruptions. Such edge effect severely obstructs offloading of tasks to MEC servers. To address this issue, we propose user-centric mobile edge computing (UCMEC), a novel MEC architecture integrating user-centric transmission, which can ensure high throughput and reliable communication for task offloading. Then, we formulate an optimization problem with joint consideration of task offloading, power control, and computing resource allocation in UCMEC, aiming at obtaining the optimal performance in terms of long-term average total delay. To solve the intractable problem, we propose two decentralized joint optimization schemes based on multi-agent deep reinforcement learning (MADRL) and convex optimization, which consider both cooperation and non-cooperation among network nodes. Simulation results demonstrate that the proposed schemes in UCMEC can significantly improve the uplink transmission rate by at most 343.56% and reduce the long-term average total delay by at most 45.57% compared to traditional cellular-based MEC.
△ Less
Submitted 3 December, 2023;
originally announced December 2023.
-
Application of Regularization Methods in the Sky Map Reconstruction of the Tianlai Cylinder Pathfinder Array
Authors:
Kaifeng Yu,
Shifan Zuo,
Fengquan Wu,
Yougang Wang,
Xuelei Chen
Abstract:
The Tianlai cylinder pathfinder is a radio interferometer array to test 21 cm intensity map** techniques in the post-reionization era. It works in passive drift scan mode to survey the sky visible in the northern hemisphere. To deal with the large instantaneous field of view and the spherical sky, we decompose the drift scan data into m-modes, which are linearly related to the sky intensity. The…
▽ More
The Tianlai cylinder pathfinder is a radio interferometer array to test 21 cm intensity map** techniques in the post-reionization era. It works in passive drift scan mode to survey the sky visible in the northern hemisphere. To deal with the large instantaneous field of view and the spherical sky, we decompose the drift scan data into m-modes, which are linearly related to the sky intensity. The sky map is reconstructed by solving the linear interferometer equations. Due to incomplete uv coverage of the interferometer baselines, this inverse problem is usually ill-posed, and regularization method is needed for its solution. In this paper, we use simulation to investigate two frequently used regularization methods, the Truncated Singular Value Decomposition (TSVD), and the Tikhonov regularization techniques. Choosing the regularization parameter is very important for its application. We employ the generalized cross validation (GCV) method and the L-curve method to determine the optimal value. We compare the resulting maps obtained with the different regularization methods, and for the different parameters derived using the different criteria. While both methods can yield good maps for a range of regularization parameters, in the Tikhonov method the suppression of noisy modes are more gradually applied, produce more smooth maps which avoids some visual artefacts in the maps generated with the TSVD method.
△ Less
Submitted 2 December, 2023;
originally announced December 2023.
-
DiffGEPCI: 3D MRI Synthesis from mGRE Signals using 2.5D Diffusion Model
Authors:
Yuyang Hu,
Satya V. V. N. Kothapalli,
Weijie Gan,
Alexander L. Sukstanskii,
Gregory F. Wu,
Manu Goyal,
Dmitriy A. Yablonskiy,
Ulugbek S. Kamilov
Abstract:
We introduce a new framework called DiffGEPCI for cross-modality generation in magnetic resonance imaging (MRI) using a 2.5D conditional diffusion model. DiffGEPCI can synthesize high-quality Fluid Attenuated Inversion Recovery (FLAIR) and Magnetization Prepared-Rapid Gradient Echo (MPRAGE) images, without acquiring corresponding measurements, by leveraging multi-Gradient-Recalled Echo (mGRE) MRI…
▽ More
We introduce a new framework called DiffGEPCI for cross-modality generation in magnetic resonance imaging (MRI) using a 2.5D conditional diffusion model. DiffGEPCI can synthesize high-quality Fluid Attenuated Inversion Recovery (FLAIR) and Magnetization Prepared-Rapid Gradient Echo (MPRAGE) images, without acquiring corresponding measurements, by leveraging multi-Gradient-Recalled Echo (mGRE) MRI signals as conditional inputs. DiffGEPCI operates in a two-step fashion: it initially estimates a 3D volume slice-by-slice using the axial plane and subsequently applies a refinement algorithm (referred to as 2.5D) to enhance the quality of the coronal and sagittal planes. Experimental validation on real mGRE data shows that DiffGEPCI achieves excellent performance, surpassing generative adversarial networks (GANs) and traditional diffusion models.
△ Less
Submitted 18 April, 2024; v1 submitted 29 November, 2023;
originally announced November 2023.
-
Measurement of Branching Fractions for $Λ_{c}^{+} \rightarrow n K_{S}^{0} π^{+}$ and $Λ_{c}^{+} \rightarrow n K_{S}^{0} K^{+}$
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
M. R. An,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (603 additional authors not shown)
Abstract:
Based on 4.5 fb$^{-1}$ of $e^{+}e^{-}$ collision data accumulated at center-of-mass energies between $4.600\,\mathrm{GeV}$ and $4.699\,\mathrm{GeV}$ with the BESIII detector, we measure the absolute branching fraction of the Cabibbo-favored decay $Λ_{c}^{+} \rightarrow n K_{S}^{0} π^{+}$ with the precision improved by a factor of 2.8 and report the first evidence for the singly-Cabibbo-suppressed…
▽ More
Based on 4.5 fb$^{-1}$ of $e^{+}e^{-}$ collision data accumulated at center-of-mass energies between $4.600\,\mathrm{GeV}$ and $4.699\,\mathrm{GeV}$ with the BESIII detector, we measure the absolute branching fraction of the Cabibbo-favored decay $Λ_{c}^{+} \rightarrow n K_{S}^{0} π^{+}$ with the precision improved by a factor of 2.8 and report the first evidence for the singly-Cabibbo-suppressed decay $Λ_{c}^{+} \rightarrow n K_{S}^{0} K^{+}$. The branching fractions for $Λ_{c}^{+} \rightarrow n K_{S}^{0} π^{+}$ and $Λ_{c}^{+} \rightarrow n K_{S}^{0} K^{+}$ are determined to be $(1.86\pm0.08\pm0.04)\times10^{-2}$ and $\left(4.3^{+1.9}_{-1.5}\pm0.3\right)\times10^{-4}$, respectively, where the first uncertainties are statistical and the second ones are systematic.
△ Less
Submitted 28 November, 2023;
originally announced November 2023.
-
Teaching DevOps Security Education with Hands-on Labware: Automated Detection of Security Weakness in Python
Authors:
Mst Shapna Akter,
Juanjose Rodriguez-Cardenas,
Md Mostafizur Rahman,
Hossain Shahriar,
Akond Rahman,
Fan Wu
Abstract:
The field of DevOps security education necessitates innovative approaches to effectively address the ever-evolving challenges of cybersecurity. In adopting a student-centered ap-proach, there is the need for the design and development of a comprehensive set of hands-on learning modules. In this paper, we introduce hands-on learning modules that enable learners to be familiar with identifying known…
▽ More
The field of DevOps security education necessitates innovative approaches to effectively address the ever-evolving challenges of cybersecurity. In adopting a student-centered ap-proach, there is the need for the design and development of a comprehensive set of hands-on learning modules. In this paper, we introduce hands-on learning modules that enable learners to be familiar with identifying known security weaknesses, based on taint tracking to accurately pinpoint vulnerable code. To cultivate an engaging and motivating learning environment, our hands-on approach includes a pre-lab, hands-on and post lab sections. They all provide introduction to specific DevOps topics and software security problems at hand, followed by practicing with real world code examples having security issues to detect them using tools. The initial evaluation results from a number of courses across multiple schools show that the hands-on modules are enhancing the interests among students on software security and cybersecurity, while preparing them to address DevOps security vulnerabilities.
△ Less
Submitted 3 April, 2024; v1 submitted 14 August, 2023;
originally announced November 2023.
-
Room-temperature correlated states in twisted bilayer MoS$_2$
Authors:
Fanfan Wu,
Qiaoling Xu,
Qinqin Wang,
Yanbang Chu,
Lu Li,
Jian Tang,
Jieying Liu,
**peng Tian,
Yiru Ji,
Le Liu,
Yalong Yuan,
Zhiheng Huang,
Jiaojiao Zhao,
Xiaozhou Zan,
Kenji Watanabe,
Takashi Taniguchi,
Dongxia Shi,
Gangxu Gu,
Yang Xu,
Lede Xian,
Wei Yang,
Luojun Du,
Guangyu Zhang
Abstract:
Moiré superlattices have emerged as an exciting condensed-matter quantum simulator for exploring the exotic physics of strong electronic correlations. Notable progress has been witnessed, but such correlated states are achievable usually at low temperatures. Here, we report the transport evidences of room-temperature correlated electronic states and layer-hybridized SU(4) Hubbard model simulator i…
▽ More
Moiré superlattices have emerged as an exciting condensed-matter quantum simulator for exploring the exotic physics of strong electronic correlations. Notable progress has been witnessed, but such correlated states are achievable usually at low temperatures. Here, we report the transport evidences of room-temperature correlated electronic states and layer-hybridized SU(4) Hubbard model simulator in AB-stacked MoS$_2$ homo-bilayer moiré superlattices. Correlated insulating states at moiré band filling factors v = 1, 2, 3 are unambiguously established in twisted bilayer MoS$_2$. Remarkably, the correlated electronic states can persist up to a record-high critical temperature of over 285 K. The realization of room-temperature correlated states in twisted bilayer MoS$_2$ can be understood as the cooperation effects of the stacking-specific atomic reconstruction and the resonantly enhanced interlayer hybridization, which largely amplify the moiré superlattice effects on electronic correlations. Furthermore, extreme large non-linear Hall responses up to room-temperature are uncovered near correlated insulating states, demonstrating the quantum geometry of moiré flat conduction band.
△ Less
Submitted 28 November, 2023;
originally announced November 2023.
-
A Hierarchical Training Paradigm for Antibody Structure-sequence Co-design
Authors:
Fang Wu,
Stan Z. Li
Abstract:
Therapeutic antibodies are an essential and rapidly expanding drug modality. The binding specificity between antibodies and antigens is decided by complementarity-determining regions (CDRs) at the tips of these Y-shaped proteins. In this paper, we propose a hierarchical training paradigm (HTP) for the antibody sequence-structure co-design. HTP consists of four levels of training stages, each corre…
▽ More
Therapeutic antibodies are an essential and rapidly expanding drug modality. The binding specificity between antibodies and antigens is decided by complementarity-determining regions (CDRs) at the tips of these Y-shaped proteins. In this paper, we propose a hierarchical training paradigm (HTP) for the antibody sequence-structure co-design. HTP consists of four levels of training stages, each corresponding to a specific protein modality within a particular protein domain. Through carefully crafted tasks in different stages, HTP seamlessly and effectively integrates geometric graph neural networks (GNNs) with large-scale protein language models to excavate evolutionary information from not only geometric structures but also vast antibody and non-antibody sequence databases, which determines ligand binding pose and strength. Empirical experiments show that HTP sets the new state-of-the-art performance in the co-design problem as well as the fix-backbone design. Our research offers a hopeful path to unleash the potential of deep generative architectures and seeks to illuminate the way forward for the antibody sequence and structure co-design challenge.
△ Less
Submitted 29 October, 2023;
originally announced November 2023.
-
First observation of $Λ_c^+\rightarrowΛK^+π^0$ and evidence of $Λ_c^+\rightarrowΛK^+π^+π^-$
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
X. C. Ai,
R. Aliberti,
A. Amoroso,
M. R. An,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (608 additional authors not shown)
Abstract:
We present the first observation of the singly Cabibbo-suppressed decay $Λ_c^+ \rightarrow ΛK^+π^0$ with a significance of $5.7σ$ and the first evidence of $Λ_c^+ \rightarrow ΛK^+π^+π^-$ decay with a significance of $3.1σ$, based on $e^+e^-$ annihilation data recorded by the BESIII detector at the BEPCII collider. The data correspond to an integrated luminosity of $6.4~{\rm fb^{-1}}$, in the cente…
▽ More
We present the first observation of the singly Cabibbo-suppressed decay $Λ_c^+ \rightarrow ΛK^+π^0$ with a significance of $5.7σ$ and the first evidence of $Λ_c^+ \rightarrow ΛK^+π^+π^-$ decay with a significance of $3.1σ$, based on $e^+e^-$ annihilation data recorded by the BESIII detector at the BEPCII collider. The data correspond to an integrated luminosity of $6.4~{\rm fb^{-1}}$, in the center-of-mass energy range from $4.600~{\rm GeV}$ to $4.950~{\rm GeV}$. We determine the branching fractions of $Λ_c^+ \rightarrow ΛK^+π^0$ and $Λ_c^+ \rightarrow ΛK^+π^+π^-$ relative to their Cabibbo-favored counterparts to be $\frac{\mathcal{B}(Λ_c^+ \rightarrow ΛK^+π^0)}{\mathcal{B}(Λ_c^+ \rightarrow Λπ^+π^0)} = (2.09\pm0.39_{\mathrm{stat.}}\pm0.07_{\mathrm{syst.}}) \times 10^{-2}$ and $\frac{\mathcal{B}(Λ_c^+ \rightarrow ΛK^+π^+π^-)}{\mathcal{B}(Λ_c^+ \rightarrow Λπ^+π^+π^-)} = (1.13\pm0.41_{\mathrm{stat.}}\pm0.06_{\mathrm{syst.}}) \times 10^{-2}$, respectively. Moreover, by combining our measured result with the world average of $\mathcal{B}(Λ^+_c\to Λπ^+π^0)$, we obtain the branching fraction $\mathcal{B}(Λ_c^+ \to ΛK^+π^0) = (1.49\pm0.27_{\mathrm{stat.}}\pm0.05_{\mathrm{syst.}}\pm0.08_{\mathrm{ref.}}) \times 10^{-3}$. This result significantly departs from theoretical predictions based on quark $SU(3)$ flavor symmetry, which is underpinned by the presumption of meson pair $S$-wave amplitude dominance.
△ Less
Submitted 25 February, 2024; v1 submitted 21 November, 2023;
originally announced November 2023.
-
Improved measurement of the decays $η' \to π^{+}π^{-}π^{+(0)}π^{-(0)}$ and search for the rare decay $η' \to 4π^{0}$
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
X. C. Ai,
R. Aliberti,
A. Amoroso,
M. R. An,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (606 additional authors not shown)
Abstract:
Using a sample of 10 billion $J/ψ$ events collected with the BESIII detector, the decays $η' \to π^{+}π^{-}π^{+}π^{-}$, $η' \to π^{+}π^{-}π^{0}π^{0}$ and $η' \to 4 π^{0}$ are studied via the process $J/ψ\toγη'$. The branching fractions of $η' \to π^{+}π^{-}π^{+}π^{-}$ and $η' \to π^{+}π^{-}π^{0}$ $π^{0}$ are measured to be $( 8.56 \pm 0.25({\rm stat.}) \pm 0.23({\rm syst.}) ) \times {10^{ - 5}}$ a…
▽ More
Using a sample of 10 billion $J/ψ$ events collected with the BESIII detector, the decays $η' \to π^{+}π^{-}π^{+}π^{-}$, $η' \to π^{+}π^{-}π^{0}π^{0}$ and $η' \to 4 π^{0}$ are studied via the process $J/ψ\toγη'$. The branching fractions of $η' \to π^{+}π^{-}π^{+}π^{-}$ and $η' \to π^{+}π^{-}π^{0}$ $π^{0}$ are measured to be $( 8.56 \pm 0.25({\rm stat.}) \pm 0.23({\rm syst.}) ) \times {10^{ - 5}}$ and $(2.12 \pm 0.12({\rm stat.}) \pm 0.10({\rm syst.})) \times {10^{ - 4}}$, respectively, which are consistent with previous measurements but with improved precision. No significant $η' \to 4 π^{0}$ signal is observed, and the upper limit on the branching fraction of this decay is determined to be less than $1.24 \times {10^{-5}}$ at the $90\%$ confidence level. In addition, an amplitude analysis of $η' \to π^{+}π^{-}π^{+}π^{-}$ is performed to extract the doubly virtual isovector form factor $α$ for the first time. The measured value of $α=1.22 \pm 0.33({\rm stat.}) \pm 0.04({\rm syst.})$, is in agreement with the prediction of the VMD model.
△ Less
Submitted 21 November, 2023;
originally announced November 2023.
-
ECLM: Efficient Edge-Cloud Collaborative Learning with Continuous Environment Adaptation
Authors:
Yan Zhuang,
Zhenzhe Zheng,
Yunfeng Shao,
Bingshuai Li,
Fan Wu,
Guihai Chen
Abstract:
Pervasive mobile AI applications primarily employ one of the two learning paradigms: cloud-based learning (with powerful large models) or on-device learning (with lightweight small models). Despite their own advantages, neither paradigm can effectively handle dynamic edge environments with frequent data distribution shifts and on-device resource fluctuations, inevitably suffering from performance…
▽ More
Pervasive mobile AI applications primarily employ one of the two learning paradigms: cloud-based learning (with powerful large models) or on-device learning (with lightweight small models). Despite their own advantages, neither paradigm can effectively handle dynamic edge environments with frequent data distribution shifts and on-device resource fluctuations, inevitably suffering from performance degradation. In this paper, we propose ECLM, an edge-cloud collaborative learning framework for rapid model adaptation for dynamic edge environments. We first propose a novel block-level model decomposition design to decompose the original large cloud model into multiple combinable modules. By flexibly combining a subset of the modules, this design enables the derivation of compact, task-specific sub-models for heterogeneous edge devices from the large cloud model, and the seamless integration of new knowledge learned on these devices into the cloud model periodically. As such, ECLM ensures that the cloud model always provides up-to-date sub-models for edge devices. We further propose an end-to-end learning framework that incorporates the modular model design into an efficient model adaptation pipeline including an offline on-cloud model prototy** and training stage, and an online edge-cloud collaborative adaptation stage. Extensive experiments over various datasets demonstrate that ECLM significantly improves model performance (e.g., 18.89% accuracy increase) and resource efficiency (e.g., 7.12x communication cost reduction) in adapting models to dynamic edge environments by efficiently collaborating the edge and the cloud models.
△ Less
Submitted 18 November, 2023;
originally announced November 2023.
-
Scaling User Modeling: Large-scale Online User Representations for Ads Personalization in Meta
Authors:
Wei Zhang,
Dai Li,
Chen Liang,
Fang Zhou,
Zhongke Zhang,
Xuewei Wang,
Ru Li,
Yi Zhou,
Yaning Huang,
Dong Liang,
Kai Wang,
Zhangyuan Wang,
Zhengxing Chen,
Fenggang Wu,
Minghai Chen,
Huayu Li,
Yunnan Wu,
Zhan Shu,
Mindi Yuan,
Sri Reddy
Abstract:
Effective user representations are pivotal in personalized advertising. However, stringent constraints on training throughput, serving latency, and memory, often limit the complexity and input feature set of online ads ranking models. This challenge is magnified in extensive systems like Meta's, which encompass hundreds of models with diverse specifications, rendering the tailoring of user represe…
▽ More
Effective user representations are pivotal in personalized advertising. However, stringent constraints on training throughput, serving latency, and memory, often limit the complexity and input feature set of online ads ranking models. This challenge is magnified in extensive systems like Meta's, which encompass hundreds of models with diverse specifications, rendering the tailoring of user representation learning for each model impractical. To address these challenges, we present Scaling User Modeling (SUM), a framework widely deployed in Meta's ads ranking system, designed to facilitate efficient and scalable sharing of online user representation across hundreds of ads models. SUM leverages a few designated upstream user models to synthesize user embeddings from massive amounts of user features with advanced modeling techniques. These embeddings then serve as inputs to downstream online ads ranking models, promoting efficient representation sharing. To adapt to the dynamic nature of user features and ensure embedding freshness, we designed SUM Online Asynchronous Platform (SOAP), a latency free online serving system complemented with model freshness and embedding stabilization, which enables frequent user model updates and online inference of user embeddings upon each user request. We share our hands-on deployment experiences for the SUM framework and validate its superiority through comprehensive experiments. To date, SUM has been launched to hundreds of ads ranking models in Meta, processing hundreds of billions of user requests daily, yielding significant online metric gains and improved infrastructure efficiency.
△ Less
Submitted 22 May, 2024; v1 submitted 15 November, 2023;
originally announced November 2023.
-
Identifying the spin trapped character of the $^{32}$Si isomeric state
Authors:
J. Williams,
G. Hackman,
K. Starosta,
R. S. Lubna,
Priyanka Choudhary,
P. C. Srivastava,
C. Andreoiu,
D. Annen,
H. Asch,
M. D. H. K. G. Badanage,
G. C. Ball,
M. Beuschlein,
H. Bidaman,
V. Bildstein,
R. Coleman,
A. B. Garnsworthy,
B. Greaves,
G. Leckenby,
V. Karayonchev,
M. S. Martin,
C. Natzke,
C. M. Petrache,
A. Radich,
E. Raleigh-Smith,
D. Rhodes
, et al. (8 additional authors not shown)
Abstract:
The properties of a nanosecond isomer in $^{32}$Si, disputed in previous studies, depend on the evolution of proton and neutron shell gaps near the `island of inversion'. We have placed the isomer at 5505.2(2) keV with $J^π = 5^-$, decaying primarily via an $E3$ transition to the $2^+_1$ state. The $E3$ strength of 0.0841(10) W.u. is unusually small and suggests that this isomer is dominated by th…
▽ More
The properties of a nanosecond isomer in $^{32}$Si, disputed in previous studies, depend on the evolution of proton and neutron shell gaps near the `island of inversion'. We have placed the isomer at 5505.2(2) keV with $J^π = 5^-$, decaying primarily via an $E3$ transition to the $2^+_1$ state. The $E3$ strength of 0.0841(10) W.u. is unusually small and suggests that this isomer is dominated by the $(νd_{3/2})^{-1} \otimes (νf_{7/2})^{1}$ configuration, which is sensitive to the $N=20$ shell gap. A newly observed $4^+_1$ state is placed at 5881.4(13) keV; its energy is enhanced by the $Z=14$ subshell closure. This indicates that the isomer is located in a `yrast trap', a feature rarely seen at low mass numbers.
△ Less
Submitted 15 November, 2023;
originally announced November 2023.
-
Correlation-aware active learning for surgery video segmentation
Authors:
Fei Wu,
Pablo Marquez-Neila,
Mingyi Zheng,
Hedyeh Rafii-Tari,
Raphael Sznitman
Abstract:
Semantic segmentation is a complex task that relies heavily on large amounts of annotated image data. However, annotating such data can be time-consuming and resource-intensive, especially in the medical domain. Active Learning (AL) is a popular approach that can help to reduce this burden by iteratively selecting images for annotation to improve the model performance. In the case of video data, i…
▽ More
Semantic segmentation is a complex task that relies heavily on large amounts of annotated image data. However, annotating such data can be time-consuming and resource-intensive, especially in the medical domain. Active Learning (AL) is a popular approach that can help to reduce this burden by iteratively selecting images for annotation to improve the model performance. In the case of video data, it is important to consider the model uncertainty and the temporal nature of the sequences when selecting images for annotation. This work proposes a novel AL strategy for surgery video segmentation, COWAL, COrrelation-aWare Active Learning. Our approach involves projecting images into a latent space that has been fine-tuned using contrastive learning and then selecting a fixed number of representative images from local clusters of video frames. We demonstrate the effectiveness of this approach on two video datasets of surgical instruments and three real-world video datasets. The datasets and code will be made publicly available upon receiving necessary approvals.
△ Less
Submitted 11 December, 2023; v1 submitted 15 November, 2023;
originally announced November 2023.
-
Study of the decay $J/ψ\to φπ^{0}η$
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
X. C. Ai,
R. Aliberti,
A. Amoroso,
M. R. An,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (604 additional authors not shown)
Abstract:
Based on $(10.09 \pm 0.04) \times 10^9$ $J/ψ$ events collected with the BESIII detector operating at the BEPCII collider, a partial wave analysis of the decay $J/ψ\to φπ^{0}η$ is performed. We observe for the first time two new structures on the $φη$ invariant mass distribution, with statistical significances of $24.0σ$ and $16.9σ$; the first with $J^{\rm PC}$ = $1^{+-}$, mass M = (1911 $\pm$ 6 (s…
▽ More
Based on $(10.09 \pm 0.04) \times 10^9$ $J/ψ$ events collected with the BESIII detector operating at the BEPCII collider, a partial wave analysis of the decay $J/ψ\to φπ^{0}η$ is performed. We observe for the first time two new structures on the $φη$ invariant mass distribution, with statistical significances of $24.0σ$ and $16.9σ$; the first with $J^{\rm PC}$ = $1^{+-}$, mass M = (1911 $\pm$ 6 (stat.) $\pm$ 14 (sys.))~MeV/$c^{2}$, and width $Γ= $ (149 $\pm$ 12 (stat.) $\pm$ 23 (sys.))~MeV, the second with $J^{\rm PC}$ = $1^{--}$, mass M = (1996 $\pm$ 11 (stat.) $\pm$ 30 (sys.))~MeV/$c^{2}$, and width $Γ$ = (148 $\pm$ 16 (stat.) $\pm$ 66 (sys.))~MeV. These measurements provide important input for the strangeonium spectrum. In addition, the $f_0(980)-a_0(980)^0$ mixing signal in $J/ψ\to φf_0(980) \to φa_0(980)^0$ and the corresponding electromagnetic decay $J/ψ\to φa_0(980)^0$ are measured with improved precision, providing crucial information to understand the nature of $a_0(980)^0$ and $f_0(980)$.
△ Less
Submitted 14 November, 2023; v1 submitted 12 November, 2023;
originally announced November 2023.
-
Evidence of the Singly Cabibbo Suppressed decay $Λ_c^+\to pπ^0$
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
X. C. Ai,
R. Aliberti,
A. Amoroso,
M. R. An,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere,
A. Brueggemann
, et al. (600 additional authors not shown)
Abstract:
Evidence for the singly Cabibbo suppressed decay $Λ_c^+\to pπ^0$ is reported for the first time with a statistical significance of $3.7σ$ based on 6.0 $\mathrm{fb}^{-1}$ of $e^+e^-$ collision data collected at center-of-mass energies between 4.600 and 4.843 GeV with the BESIII detector at the BEPCII collider. The absolute branching fraction of $Λ_c^+\to pπ^0$ is measured to be…
▽ More
Evidence for the singly Cabibbo suppressed decay $Λ_c^+\to pπ^0$ is reported for the first time with a statistical significance of $3.7σ$ based on 6.0 $\mathrm{fb}^{-1}$ of $e^+e^-$ collision data collected at center-of-mass energies between 4.600 and 4.843 GeV with the BESIII detector at the BEPCII collider. The absolute branching fraction of $Λ_c^+\to pπ^0$ is measured to be $(1.56^{+0.72}_{-0.58}\pm0.20)\times 10^{-4}$. Combining with the branching fraction of $Λ_c^+\to nπ^+$, $(6.6\pm1.3)\times10^{-4}$, the ratio of the branching fractions of $Λ_c^+\to nπ^+$ and $Λ_c^+\to pπ^0$ is calculated to be $3.2^{+2.2}_{-1.2}$. As an important input for the theoretical models describing the decay mechanisms of charmed baryons, our result indicates that the non-factorizable contributions play an essential role and their interference with the factorizable contributions should not be significant. In addition, the absolute branching fraction of $Λ_c^+\to pη$ is measured to be $(1.63\pm0.31_{\rm stat}\pm0.11_{\rm syst}) \times10^{-3}$.
△ Less
Submitted 3 June, 2024; v1 submitted 12 November, 2023;
originally announced November 2023.
-
Report of the 1st Workshop on Generative AI and Law
Authors:
A. Feder Cooper,
Katherine Lee,
James Grimmelmann,
Daphne Ippolito,
Christopher Callison-Burch,
Christopher A. Choquette-Choo,
Niloofar Mireshghallah,
Miles Brundage,
David Mimno,
Madiha Zahrah Choksi,
Jack M. Balkin,
Nicholas Carlini,
Christopher De Sa,
Jonathan Frankle,
Deep Ganguli,
Bryant Gipson,
Andres Guadamuz,
Swee Leng Harris,
Abigail Z. Jacobs,
Elizabeth Joh,
Gautam Kamath,
Mark Lemley,
Cass Matthews,
Christine McLeavey,
Corynne McSherry
, et al. (10 additional authors not shown)
Abstract:
This report presents the takeaways of the inaugural Workshop on Generative AI and Law (GenLaw), held in July 2023. A cross-disciplinary group of practitioners and scholars from computer science and law convened to discuss the technical, doctrinal, and policy challenges presented by law for Generative AI, and by Generative AI for law, with an emphasis on U.S. law in particular. We begin the report…
▽ More
This report presents the takeaways of the inaugural Workshop on Generative AI and Law (GenLaw), held in July 2023. A cross-disciplinary group of practitioners and scholars from computer science and law convened to discuss the technical, doctrinal, and policy challenges presented by law for Generative AI, and by Generative AI for law, with an emphasis on U.S. law in particular. We begin the report with a high-level statement about why Generative AI is both immensely significant and immensely challenging for law. To meet these challenges, we conclude that there is an essential need for 1) a shared knowledge base that provides a common conceptual language for experts across disciplines; 2) clarification of the distinctive technical capabilities of generative-AI systems, as compared and contrasted to other computer and AI systems; 3) a logical taxonomy of the legal issues these systems raise; and, 4) a concrete research agenda to promote collaboration and knowledge-sharing on emerging issues at the intersection of Generative AI and law. In this report, we synthesize the key takeaways from the GenLaw workshop that begin to address these needs. All of the listed authors contributed to the workshop upon which this report is based, but they and their organizations do not necessarily endorse all of the specific claims in this report.
△ Less
Submitted 2 December, 2023; v1 submitted 10 November, 2023;
originally announced November 2023.
-
Observation and branching fraction measurement of the decay $J\!/\!ψ\rightarrow \bar{p} Σ^{+} K_{S}^{0} + c.c.$
Authors:
M. Ablikim,
M. N. Achasov,
P. Adlarson,
X. C. Ai,
R. Aliberti,
A. Amoroso,
M. R. An,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
J. Bloms,
A. Bortone,
I. Boyko,
R. A. Briere,
A. Brueggemann
, et al. (602 additional authors not shown)
Abstract:
The first observation of the decays $J\!/\!ψ\rightarrow \bar{p} Σ^{+} K_{S}^{0}$ and $J\!/\!ψ\rightarrow p \barΣ^{-} K_{S}^{0}$ is reported using $(10087\pm44)\times10^{6}$ $J\!/\!ψ$ events recorded by the BESIII detector at the BEPCII storage ring. The branching fractions of each channel are determined to be…
▽ More
The first observation of the decays $J\!/\!ψ\rightarrow \bar{p} Σ^{+} K_{S}^{0}$ and $J\!/\!ψ\rightarrow p \barΣ^{-} K_{S}^{0}$ is reported using $(10087\pm44)\times10^{6}$ $J\!/\!ψ$ events recorded by the BESIII detector at the BEPCII storage ring. The branching fractions of each channel are determined to be $\mathcal{B}(J\!/\!ψ\rightarrow \bar{p} Σ^{+} K_{S}^{0})=(1.361 \pm 0.006 \pm 0.025) \times 10^{-4}$ and $\mathcal{B}(J\!/\!ψ\rightarrow p \barΣ^{-} K_{S}^{0})=(1.352 \pm 0.006 \pm 0.025) \times 10^{-4}$. The combined result is $\mathcal{B}(J\!/\!ψ\rightarrow \bar{p} Σ^{+} K_{S}^{0} +c.c.)=(2.725 \pm 0.009 \pm 0.050) \times 10^{-4}$, where the first uncertainty is statistical and the second systematic. The results presented are in good agreement with the branching fractions of the isospin partner decay $J\!/\!ψ\rightarrow p K^- \barΣ^0 + c.c.$.
△ Less
Submitted 14 November, 2023; v1 submitted 10 November, 2023;
originally announced November 2023.
-
Context Shift Reduction for Offline Meta-Reinforcement Learning
Authors:
Yunkai Gao,
Rui Zhang,
Jiaming Guo,
Fan Wu,
Qi Yi,
Shaohui Peng,
Siming Lan,
Ruizhi Chen,
Zidong Du,
Xing Hu,
Qi Guo,
Ling Li,
Yunji Chen
Abstract:
Offline meta-reinforcement learning (OMRL) utilizes pre-collected offline datasets to enhance the agent's generalization ability on unseen tasks. However, the context shift problem arises due to the distribution discrepancy between the contexts used for training (from the behavior policy) and testing (from the exploration policy). The context shift problem leads to incorrect task inference and fur…
▽ More
Offline meta-reinforcement learning (OMRL) utilizes pre-collected offline datasets to enhance the agent's generalization ability on unseen tasks. However, the context shift problem arises due to the distribution discrepancy between the contexts used for training (from the behavior policy) and testing (from the exploration policy). The context shift problem leads to incorrect task inference and further deteriorates the generalization ability of the meta-policy. Existing OMRL methods either overlook this problem or attempt to mitigate it with additional information. In this paper, we propose a novel approach called Context Shift Reduction for OMRL (CSRO) to address the context shift problem with only offline datasets. The key insight of CSRO is to minimize the influence of policy in context during both the meta-training and meta-test phases. During meta-training, we design a max-min mutual information representation learning mechanism to diminish the impact of the behavior policy on task representation. In the meta-test phase, we introduce the non-prior context collection strategy to reduce the effect of the exploration policy. Experimental results demonstrate that CSRO significantly reduces the context shift and improves the generalization ability, surpassing previous methods across various challenging domains.
△ Less
Submitted 6 November, 2023;
originally announced November 2023.
-
The Effects of the Local Environment on a Compact Radio Interferometer I: Cross-coupling in the Tianlai Dish Pathfinder Array
Authors:
Juhun Kwak,
John Podczerwinski,
Peter Timbie,
Réza Ansari,
John Marriner,
Albert Stebbins,
Fengquan Wu,
Haotian Cao,
Xuelei Chen,
Kai He,
Jixia Li,
Shijie Sun,
Jiacong Zhu
Abstract:
The visibilities measured by radio astronomical interferometers include non-astronomical correlated signals that arise from the local environment of the array. These correlated signals are especially important in compact arrays such as those under development for 21\,cm intensity map**. The amplitudes of the contaminated visibilities can exceed the expected 21\,cm signal and represent a signific…
▽ More
The visibilities measured by radio astronomical interferometers include non-astronomical correlated signals that arise from the local environment of the array. These correlated signals are especially important in compact arrays such as those under development for 21\,cm intensity map**. The amplitudes of the contaminated visibilities can exceed the expected 21\,cm signal and represent a significant systematic effect. We study the receiver noise radiated by antennas in compact arrays and develop a model for how it couples to other antennas. We apply the model to the Tianlai Dish Pathfinder Array (TDPA), a compact array of 16, 6-m dish antennas. The coupling model includes electromagnetic simulations, measurements with a network analyzer, and measurements of the noise of the receivers. We compare the model to drift-scan observations with the array and set requirements on the level of antenna cross-coupling for 21\,cm intensity map** instruments. We find that for the TDPA, cross-coupling would have to be reduced by TBD orders of magnitude in order to contribute negligibly to the visibilities.
△ Less
Submitted 6 November, 2023;
originally announced November 2023.
-
Measurement of the absolute branching fraction of the three-body decay $Λ_{c}^+ \to Ξ^{0}K^{+}π^{0}$ and search for $Λ_{c}^+ \to nK^+π^0$, $Σ^{0}K^{+}π^{0}$ and $ΛK^{+}π^{0}$
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
M. R. An,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (600 additional authors not shown)
Abstract:
The Cabbibo-favored decay $Λ_{c}^+ \to Ξ^{0}K^{+}π^{0}$ is studied for the first time using 6.1 fb$^{-1}$ of $e^+e^-$ collision data at center-of-mass energies between 4.600 and 4.840 GeV, collected with the BESIII detector at the BEPCII collider. With a double-tag method, the branching fraction of the three-body decay $Λ_{c}^+ \to Ξ^{0}K^{+}π^{0}$ is measured to be…
▽ More
The Cabbibo-favored decay $Λ_{c}^+ \to Ξ^{0}K^{+}π^{0}$ is studied for the first time using 6.1 fb$^{-1}$ of $e^+e^-$ collision data at center-of-mass energies between 4.600 and 4.840 GeV, collected with the BESIII detector at the BEPCII collider. With a double-tag method, the branching fraction of the three-body decay $Λ_{c}^+ \to Ξ^{0}K^{+}π^{0}$ is measured to be $(7.79 \pm 1.46 _{\rm} \pm0.71 _{\rm}) \times 10^{ - 3}$, where the first and second uncertainties are statistical and systematic, respectively. The branching fraction of the two-body decay $Λ_{c}^+ \to Ξ(1530)^{0}K^+$ is $(5.99\pm1.04\pm0.29)\times10^{-3}$, which is consistent with the previous result of $(5.02\pm0.99\pm0.31)\times 10^{-3}$. In addition, the upper limit on the branching fraction of the doubly Cabbibo-suppressed decay $Λ_{c}^+ \to nK^+π^0$ is $7.1 \times 10^{-4}$ at the 90$\%$ confidence level. The upper limits on the branching fractions of $Λ_{c}^+ \to Σ^{0}K^{+}π^{0}$ and $ΛK^{+}π^{0}$ are also determined to be $1.8\times 10^{-3}$ and $ 2.0 \times 10^{-3}$, respectively.
△ Less
Submitted 8 May, 2024; v1 submitted 4 November, 2023;
originally announced November 2023.
-
Sentiment Analysis through LLM Negotiations
Authors:
Xiaofei Sun,
Xiaoya Li,
Shengyu Zhang,
Shuhe Wang,
Fei Wu,
Jiwei Li,
Tianwei Zhang,
Guoyin Wang
Abstract:
A standard paradigm for sentiment analysis is to rely on a singular LLM and makes the decision in a single round under the framework of in-context learning. This framework suffers the key disadvantage that the single-turn output generated by a single LLM might not deliver the perfect decision, just as humans sometimes need multiple attempts to get things right. This is especially true for the task…
▽ More
A standard paradigm for sentiment analysis is to rely on a singular LLM and makes the decision in a single round under the framework of in-context learning. This framework suffers the key disadvantage that the single-turn output generated by a single LLM might not deliver the perfect decision, just as humans sometimes need multiple attempts to get things right. This is especially true for the task of sentiment analysis where deep reasoning is required to address the complex linguistic phenomenon (e.g., clause composition, irony, etc) in the input.
To address this issue, this paper introduces a multi-LLM negotiation framework for sentiment analysis. The framework consists of a reasoning-infused generator to provide decision along with rationale, a explanation-deriving discriminator to evaluate the credibility of the generator. The generator and the discriminator iterate until a consensus is reached. The proposed framework naturally addressed the aforementioned challenge, as we are able to take the complementary abilities of two LLMs, have them use rationale to persuade each other for correction.
Experiments on a wide range of sentiment analysis benchmarks (SST-2, Movie Review, Twitter, yelp, amazon, IMDB) demonstrate the effectiveness of proposed approach: it consistently yields better performances than the ICL baseline across all benchmarks, and even superior performances to supervised baselines on the Twitter and movie review datasets.
△ Less
Submitted 3 November, 2023;
originally announced November 2023.
-
Search for a muonphilic scalar $X_{0}$ or vector $X_{1}$ via $J/ψ\toμ^+μ^-+\rm{invisible}$ decays at BESII
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
X. C. Ai,
R. Aliberti,
A. Amoroso,
M. R. An,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (608 additional authors not shown)
Abstract:
A light scalar $X_{0}$ or vector $X_{1}$ particles have been introduced as a possible explanation for the $(g-2)_μ$ anomaly and dark matter phenomena.
Using $(8.998\pm 0.039)\times10^9$ $\jpsi $ events collected by the BESIII detector, we search for a light muon philic scalar $X_{0}$ or vector $X_{1}$ in the processes $J/ψ\toμ^+μ^- X_{0,1}$ with $X_{0,1}$ invisible decays. No obvious signal is f…
▽ More
A light scalar $X_{0}$ or vector $X_{1}$ particles have been introduced as a possible explanation for the $(g-2)_μ$ anomaly and dark matter phenomena.
Using $(8.998\pm 0.039)\times10^9$ $\jpsi $ events collected by the BESIII detector, we search for a light muon philic scalar $X_{0}$ or vector $X_{1}$ in the processes $J/ψ\toμ^+μ^- X_{0,1}$ with $X_{0,1}$ invisible decays. No obvious signal is found, and the upper limits on the coupling $g_{0,1}'$ between the muon and the $X_{0,1}$ particles are set to be between $1.1\times10^{-3}$ and $1.0\times10^{-2}$ for the $X_{0,1}$ mass in the range of $1<M(X_{0,1})<1000$ MeV$/c^2$ at 90$\%$ confidence level.
△ Less
Submitted 18 February, 2024; v1 submitted 2 November, 2023;
originally announced November 2023.
-
Contrastive Modules with Temporal Attention for Multi-Task Reinforcement Learning
Authors:
Siming Lan,
Rui Zhang,
Qi Yi,
Jiaming Guo,
Shaohui Peng,
Yunkai Gao,
Fan Wu,
Ruizhi Chen,
Zidong Du,
Xing Hu,
Xishan Zhang,
Ling Li,
Yunji Chen
Abstract:
In the field of multi-task reinforcement learning, the modular principle, which involves specializing functionalities into different modules and combining them appropriately, has been widely adopted as a promising approach to prevent the negative transfer problem that performance degradation due to conflicts between tasks. However, most of the existing multi-task RL methods only combine shared mod…
▽ More
In the field of multi-task reinforcement learning, the modular principle, which involves specializing functionalities into different modules and combining them appropriately, has been widely adopted as a promising approach to prevent the negative transfer problem that performance degradation due to conflicts between tasks. However, most of the existing multi-task RL methods only combine shared modules at the task level, ignoring that there may be conflicts within the task. In addition, these methods do not take into account that without constraints, some modules may learn similar functions, resulting in restricting the model's expressiveness and generalization capability of modular methods. In this paper, we propose the Contrastive Modules with Temporal Attention(CMTA) method to address these limitations. CMTA constrains the modules to be different from each other by contrastive learning and combining shared modules at a finer granularity than the task level with temporal attention, alleviating the negative transfer within the task and improving the generalization ability and the performance for multi-task RL. We conducted the experiment on Meta-World, a multi-task RL benchmark containing various robotics manipulation tasks. Experimental results show that CMTA outperforms learning each task individually for the first time and achieves substantial performance improvements over the baselines.
△ Less
Submitted 2 November, 2023;
originally announced November 2023.
-
RPCANet: Deep Unfolding RPCA Based Infrared Small Target Detection
Authors:
Fengyi Wu,
Tianfang Zhang,
Lei Li,
Yian Huang,
Zhenming Peng
Abstract:
Deep learning (DL) networks have achieved remarkable performance in infrared small target detection (ISTD). However, these structures exhibit a deficiency in interpretability and are widely regarded as black boxes, as they disregard domain knowledge in ISTD. To alleviate this issue, this work proposes an interpretable deep network for detecting infrared dim targets, dubbed RPCANet. Specifically, o…
▽ More
Deep learning (DL) networks have achieved remarkable performance in infrared small target detection (ISTD). However, these structures exhibit a deficiency in interpretability and are widely regarded as black boxes, as they disregard domain knowledge in ISTD. To alleviate this issue, this work proposes an interpretable deep network for detecting infrared dim targets, dubbed RPCANet. Specifically, our approach formulates the ISTD task as sparse target extraction, low-rank background estimation, and image reconstruction in a relaxed Robust Principle Component Analysis (RPCA) model. By unfolding the iterative optimization updating steps into a deep-learning framework, time-consuming and complex matrix calculations are replaced by theory-guided neural networks. RPCANet detects targets with clear interpretability and preserves the intrinsic image feature, instead of directly transforming the detection task into a matrix decomposition problem. Extensive experiments substantiate the effectiveness of our deep unfolding framework and demonstrate its trustworthy results, surpassing baseline methods in both qualitative and quantitative evaluations.
△ Less
Submitted 1 November, 2023;
originally announced November 2023.
-
HAP: Structure-Aware Masked Image Modeling for Human-Centric Perception
Authors:
Junkun Yuan,
Xinyu Zhang,
Hao Zhou,
Jian Wang,
Zhongwei Qiu,
Zhiyin Shao,
Shaofeng Zhang,
Sifan Long,
Kun Kuang,
Kun Yao,
Junyu Han,
Errui Ding,
Lanfen Lin,
Fei Wu,
**gdong Wang
Abstract:
Model pre-training is essential in human-centric perception. In this paper, we first introduce masked image modeling (MIM) as a pre-training approach for this task. Upon revisiting the MIM training strategy, we reveal that human structure priors offer significant potential. Motivated by this insight, we further incorporate an intuitive human structure prior - human parts - into pre-training. Speci…
▽ More
Model pre-training is essential in human-centric perception. In this paper, we first introduce masked image modeling (MIM) as a pre-training approach for this task. Upon revisiting the MIM training strategy, we reveal that human structure priors offer significant potential. Motivated by this insight, we further incorporate an intuitive human structure prior - human parts - into pre-training. Specifically, we employ this prior to guide the mask sampling process. Image patches, corresponding to human part regions, have high priority to be masked out. This encourages the model to concentrate more on body structure information during pre-training, yielding substantial benefits across a range of human-centric perception tasks. To further capture human characteristics, we propose a structure-invariant alignment loss that enforces different masked views, guided by the human part prior, to be closely aligned for the same image. We term the entire method as HAP. HAP simply uses a plain ViT as the encoder yet establishes new state-of-the-art performance on 11 human-centric benchmarks, and on-par result on one dataset. For example, HAP achieves 78.1% mAP on MSMT17 for person re-identification, 86.54% mA on PA-100K for pedestrian attribute recognition, 78.2% AP on MS COCO for 2D pose estimation, and 56.0 PA-MPJPE on 3DPW for 3D pose and shape estimation.
△ Less
Submitted 31 October, 2023;
originally announced October 2023.
-
Sequence-Level Certainty Reduces Hallucination In Knowledge-Grounded Dialogue Generation
Authors:
Yixin Wan,
Fanyou Wu,
Weijie Xu,
Srinivasan H. Sengamedu
Abstract:
In this work, we propose sequence-level certainty as a common theme over hallucination in Knowledge Grounded Dialogue Generation (KGDG). We explore the correlation between the level of hallucination in model responses and two types of sequence-level certainty: probabilistic certainty and semantic certainty. Empirical results reveal that higher levels of both types of certainty in model responses a…
▽ More
In this work, we propose sequence-level certainty as a common theme over hallucination in Knowledge Grounded Dialogue Generation (KGDG). We explore the correlation between the level of hallucination in model responses and two types of sequence-level certainty: probabilistic certainty and semantic certainty. Empirical results reveal that higher levels of both types of certainty in model responses are correlated with lower levels of hallucination. We further propose Certainty-based Response Ranking (CRR), a decoding-time hallucination mitigation method that samples several response candidates, ranks them based on sequence-level certainty, and outputs the response with the highest certainty level. Aligning with our definitions of sequence-level certainty, we design 2 types of CRR approaches: Probabilistic CRR (P-CRR) and Semantic CRR (S-CRR). P-CRR ranks individually sampled model responses using the arithmetic mean log-probability of the entire sequence. S-CRR approaches certainty estimation from meaning-space, and ranks model response candidates based on their semantic certainty level as measured by an entailment-based Agreement Score (AS). Through extensive experiments across 3 KGDG datasets, 3 decoding methods, and 4 KGDG models, we validate the effectiveness of CRR for reducing hallucination in KGDG task.
△ Less
Submitted 12 April, 2024; v1 submitted 28 October, 2023;
originally announced October 2023.
-
Observation of the Anomalous Shape of $X(1840)$ in $J/ψ\rightarrow γ3(π^+ π^-)$ Indicating a Second Resonance Near $p\bar{p}$ Threshold
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
X. C. Ai,
R. Aliberti,
A. Amoroso,
M. R. An,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere,
A. Brueggemann
, et al. (604 additional authors not shown)
Abstract:
Using a sample of $(10087\pm44)\times 10^6$ $J/ψ$ events, which is about 45 times larger than that was previously analyzed, a further investigation on the $J/ψ\rightarrow γ3(π^+π^-)$ decay is performed. A significant distortion at 1.84 GeV/$c^2$ in the line-shape of the $3(π^+π^-)$ invariant mass spectrum is observed for the first time, which could be resolved by two overlap** resonant structure…
▽ More
Using a sample of $(10087\pm44)\times 10^6$ $J/ψ$ events, which is about 45 times larger than that was previously analyzed, a further investigation on the $J/ψ\rightarrow γ3(π^+π^-)$ decay is performed. A significant distortion at 1.84 GeV/$c^2$ in the line-shape of the $3(π^+π^-)$ invariant mass spectrum is observed for the first time, which could be resolved by two overlap** resonant structures, $X(1840)$ and $X(1880)$. The new state $X(1880)$ is observed with a statistical significance larger than $10σ$. The mass and width of $X(1880)$ are determined to be $1882.1\pm1.7\pm0.7$ MeV/$c^2$ and $30.7\pm5.5 \pm2.4$ MeV, respectively, which indicates the existence of a $p\bar{p}$ bound state.
△ Less
Submitted 15 April, 2024; v1 submitted 27 October, 2023;
originally announced October 2023.
-
FLEEK: Factual Error Detection and Correction with Evidence Retrieved from External Knowledge
Authors:
Farima Fatahi Bayat,
Kun Qian,
Benjamin Han,
Yisi Sang,
Anton Belyi,
Samira Khorshidi,
Fei Wu,
Ihab F. Ilyas,
Yunyao Li
Abstract:
Detecting factual errors in textual information, whether generated by large language models (LLM) or curated by humans, is crucial for making informed decisions. LLMs' inability to attribute their claims to external knowledge and their tendency to hallucinate makes it difficult to rely on their responses. Humans, too, are prone to factual errors in their writing. Since manual detection and correct…
▽ More
Detecting factual errors in textual information, whether generated by large language models (LLM) or curated by humans, is crucial for making informed decisions. LLMs' inability to attribute their claims to external knowledge and their tendency to hallucinate makes it difficult to rely on their responses. Humans, too, are prone to factual errors in their writing. Since manual detection and correction of factual errors is labor-intensive, develo** an automatic approach can greatly reduce human effort. We present FLEEK, a prototype tool that automatically extracts factual claims from text, gathers evidence from external knowledge sources, evaluates the factuality of each claim, and suggests revisions for identified errors using the collected evidence. Initial empirical evaluation on fact error detection (77-85\% F1) shows the potential of FLEEK. A video demo of FLEEK can be found at https://youtu.be/NapJFUlkPdQ.
△ Less
Submitted 25 October, 2023;
originally announced October 2023.