-
GraphMU: Repairing Robustness of Graph Neural Networks via Machine Unlearning
Authors:
Tao Wu,
Xinwen Cao,
Chao Wang,
Shaojie Qiao,
Lin Yuan,
Canyixing Cui,
Yanbing Liu
Abstract:
Graph Neural Networks (GNNs) have demonstrated significant application potential in various fields. However, GNNs are still vulnerable to adversarial attacks. Numerous adversarial defense methods on GNNs are proposed to address the problem of adversarial attacks. However, these methods can only serve as a defense before poisoning, but cannot repair poisoned GNN. Therefore, there is an urgent need…
▽ More
Graph Neural Networks (GNNs) have demonstrated significant application potential in various fields. However, GNNs are still vulnerable to adversarial attacks. Numerous adversarial defense methods on GNNs are proposed to address the problem of adversarial attacks. However, these methods can only serve as a defense before poisoning, but cannot repair poisoned GNN. Therefore, there is an urgent need for a method to repair poisoned GNN. In this paper, we address this gap by introducing the novel concept of model repair for GNNs. We propose a repair framework, Repairing Robustness of Graph Neural Networks via Machine Unlearning (GraphMU), which aims to fine-tune poisoned GNN to forget adversarial samples without the need for complete retraining. We also introduce a unlearning validation method to ensure that our approach effectively forget specified poisoned data. To evaluate the effectiveness of GraphMU, we explore three fine-tuned subgraph construction scenarios based on the available perturbation information: (i) Known Perturbation Ratios, (ii) Known Complete Knowledge of Perturbations, and (iii) Unknown any Knowledge of Perturbations. Our extensive experiments, conducted across four citation datasets and four adversarial attack scenarios, demonstrate that GraphMU can effectively restore the performance of poisoned GNN.
△ Less
Submitted 19 June, 2024;
originally announced June 2024.
-
Accessing the stringy structure of proton in the framework of Color Glass Condensate
Authors:
Wenchang Xiang,
Yanbing Cai,
Mengliang Wang,
Daicui Zhou
Abstract:
To investigate the possible geometric structure of the proton, an improved stringy proton model is constructed beyond the smallest distance approximation, where the constituent quarks are connected by gluon tubes which merge at the Fermat point of the quark triangle. The exclusive diffractive vector meson production process in electron-proton deep inelastic scattering is used to test the stringy s…
▽ More
To investigate the possible geometric structure of the proton, an improved stringy proton model is constructed beyond the smallest distance approximation, where the constituent quarks are connected by gluon tubes which merge at the Fermat point of the quark triangle. The exclusive diffractive vector meson production process in electron-proton deep inelastic scattering is used to test the stringy structure of the proton. We calculate the coherent and incoherent differential cross sections of the exclusive diffractive $J/Ψ$ photoproduction in the framework of Color Glass Condensate. The results show that our calculations are in good agreement with HERA data. Especially, our results give a better description of the HERA data at small $t$ as compared to the ones from the hot spot model where the constituent quarks are uncorrelated distributed in the proton. Meanwhile, the radius of the proton resulting from the improved stringy proton model is coincident with the one from fitting to the data from GlueX Collaboration at Jefferson Lab, which indicates that the predictive power of the stringy proton model is significantly improved once it goes beyond the smallest distance approximation. Moreover, we assume that the transverse shape of gluon tube satisfies Gaussian distribution, and explore the distribution width of the individual gluon tubes. We find an interesting result that the up quark induced gluon tube seems to have larger distribution width than the down quark induced gluon tube, which is favored by the HERA data.
△ Less
Submitted 18 June, 2024;
originally announced June 2024.
-
Resilience patterns in higher-order meta-population networks
Authors:
Yanyi Nie,
Yanbing Liu,
Qixuan Cao,
Tao Lin,
Wei Wang
Abstract:
Meta-population networks are effective tools for capturing population movement across distinct regions, but the assumption of well-mixed regions fails to capture the reality of population higher-order interactions. As a multidimensional system capturing mobility characteristics, meta-population networks are inherently complex and difficult to interpret when subjected to resilience analysis based o…
▽ More
Meta-population networks are effective tools for capturing population movement across distinct regions, but the assumption of well-mixed regions fails to capture the reality of population higher-order interactions. As a multidimensional system capturing mobility characteristics, meta-population networks are inherently complex and difficult to interpret when subjected to resilience analysis based on N-dimensional equations. We propose a higher-order meta-population model that captures large-scale global cross-regional mobility and small-scale higher-order interactions within regions. Remarkably, we extend the dimension-reduction approach, simplifying the N-dimensional higher-order meta-population system into a one-dimensional equation by decomposing different network behaviours into a single universal resilience function, thereby allowing for convenient and accurate prediction of the system resilience. The network structure and human mobility parameters can clearly and simply express the epidemic threshold. Numerical experimental results on both real networks and star networks confirm the accuracy of the proposed dimension-reduction framework in predicting the evolution of epidemic dynamics on higher-order meta-population networks. Additionally, higher-order interactions among populations are shown to lead to explosive growth in the epidemic infection size potentially. Population mobility causes changes in the spatial distribution of infectious diseases across different regions.
△ Less
Submitted 15 June, 2024;
originally announced June 2024.
-
Feasibility of accelerating homogeneous catalyst discovery with fault-tolerant quantum computers
Authors:
Nicole Bellonzi,
Alexander Kunitsa,
Joshua T. Cantin,
Jorge A. Campos-Gonzalez-Angulo,
Maxwell D. Radin,
Yanbing Zhou,
Peter D. Johnson,
Luis A. Martínez-Martínez,
Mohammad Reza Jangrouei,
Aritra Sankar Brahmachari,
Linjun Wang,
Smik Patel,
Monika Kodrycka,
Ignacio Loaiza,
Robert A. Lang,
Alán Aspuru-Guzik,
Artur F. Izmaylov,
Jhonathan Romero Fontalvo,
Yudong Cao
Abstract:
The industrial manufacturing of chemicals consumes a significant amount of energy and raw materials. In principle, the development of new catalysts could greatly improve the efficiency of chemical production. However, the discovery of viable catalysts can be exceedingly challenging because it is difficult to know the efficacy of a candidate without experimentally synthesizing and characterizing it…
▽ More
The industrial manufacturing of chemicals consumes a significant amount of energy and raw materials. In principle, the development of new catalysts could greatly improve the efficiency of chemical production. However, the discovery of viable catalysts can be exceedingly challenging because it is difficult to know the efficacy of a candidate without experimentally synthesizing and characterizing it. This study explores the feasibility of using fault-tolerant quantum computers to accelerate the discovery of homogeneous catalysts for nitrogen fixation, an industrially important chemical process. It introduces a set of ground-state energy estimation problems representative of calculations needed for the discovery of homogeneous catalysts and analyzes them on three dimensions: economic utility, classical hardness, and quantum resource requirements. For the highest utility problem considered, two steps of a catalytic cycle for the generation of cyanate anion from dinitrogen, the economic utility of running these computations is estimated to be $200,000, and the required runtime for double-factorized phase estimation on a fault-tolerant superconducting device is estimated under conservative assumptions to be 139,000 QPU-hours. The computational cost of an equivalent DMRG calculation is estimated to be about 400,000 CPU-hours. These results suggest that, with continued development, it will be feasible for fault-tolerant quantum computers to accelerate the discovery of homogeneous catalysts.
△ Less
Submitted 10 June, 2024;
originally announced June 2024.
-
Towards Efficient Disaster Response via Cost-effective Unbiased Class Rate Estimation through Neyman Allocation Stratified Sampling Active Learning
Authors:
Yanbing Bai,
Xinyi Wu,
Lai Xu,
Jihan Pei,
Erick Mas,
Shunichi Koshimura
Abstract:
With the rapid development of earth observation technology, we have entered an era of massively available satellite remote-sensing data. However, a large amount of satellite remote sensing data lacks a label or the label cost is too high to hinder the potential of AI technology mining satellite data. Especially in such an emergency response scenario that uses satellite data to evaluate the degree…
▽ More
With the rapid development of earth observation technology, we have entered an era of massively available satellite remote-sensing data. However, a large amount of satellite remote sensing data lacks a label or the label cost is too high to hinder the potential of AI technology mining satellite data. Especially in such an emergency response scenario that uses satellite data to evaluate the degree of disaster damage. Disaster damage assessment encountered bottlenecks due to excessive focus on the damage of a certain building in a specific geographical space or a certain area on a larger scale. In fact, in the early days of disaster emergency response, government departments were more concerned about the overall damage rate of the disaster area instead of single-building damage, because this helps the government decide the level of emergency response. We present an innovative algorithm that constructs Neyman stratified random sampling trees for binary classification and extends this approach to multiclass problems. Through extensive experimentation on various datasets and model structures, our findings demonstrate that our method surpasses both passive and conventional active learning techniques in terms of class rate estimation and model enhancement with only 30\%-60\% of the annotation cost of simple sampling. It effectively addresses the 'sampling bias' challenge in traditional active learning strategies and mitigates the 'cold start' dilemma. The efficacy of our approach is further substantiated through application to disaster evaluation tasks using Xview2 Satellite imagery, showcasing its practical utility in real-world contexts.
△ Less
Submitted 27 May, 2024;
originally announced May 2024.
-
Decomposing the Neurons: Activation Sparsity via Mixture of Experts for Continual Test Time Adaptation
Authors:
Rongyu Zhang,
Aosong Cheng,
Yulin Luo,
Gaole Dai,
Huanrui Yang,
Jiaming Liu,
Ran Xu,
Li Du,
Yuan Du,
Yanbing Jiang,
Shanghang Zhang
Abstract:
Continual Test-Time Adaptation (CTTA), which aims to adapt the pre-trained model to ever-evolving target domains, emerges as an important task for vision models. As current vision models appear to be heavily biased towards texture, continuously adapting the model from one domain distribution to another can result in serious catastrophic forgetting. Drawing inspiration from the human visual system'…
▽ More
Continual Test-Time Adaptation (CTTA), which aims to adapt the pre-trained model to ever-evolving target domains, emerges as an important task for vision models. As current vision models appear to be heavily biased towards texture, continuously adapting the model from one domain distribution to another can result in serious catastrophic forgetting. Drawing inspiration from the human visual system's adeptness at processing both shape and texture according to the famous Trichromatic Theory, we explore the integration of a Mixture-of-Activation-Sparsity-Experts (MoASE) as an adapter for the CTTA task. Given the distinct reaction of neurons with low/high activation to domain-specific/agnostic features, MoASE decomposes the neural activation into high-activation and low-activation components with a non-differentiable Spatial Differentiate Dropout (SDD). Based on the decomposition, we devise a multi-gate structure comprising a Domain-Aware Gate (DAG) that utilizes domain information to adaptive combine experts that process the post-SDD sparse activations of different strengths, and the Activation Sparsity Gate (ASG) that adaptively assigned feature selection threshold of the SDD for different experts for more precise feature decomposition. Finally, we introduce a Homeostatic-Proximal (HP) loss to bypass the error accumulation problem when continuously adapting the model. Extensive experiments on four prominent benchmarks substantiate that our methodology achieves state-of-the-art performance in both classification and segmentation CTTA tasks. Our code is now available at https://github.com/RoyZry98/MoASE-Pytorch.
△ Less
Submitted 26 May, 2024;
originally announced May 2024.
-
FAD-SAR: A Novel Fishing Activity Detection System via Synthetic Aperture Radar Images Based on Deep Learning Method
Authors:
Yanbing Bai,
Siao Li,
Rui-Yang Ju,
Zihao Yang,
**ze Yu,
Jen-Shiun Chiang
Abstract:
Illegal, unreported, and unregulated (IUU) fishing activities seriously affect various aspects of human life. However, traditional methods for detecting and monitoring IUU fishing activities at sea have limitations. Although synthetic aperture radar (SAR) can complement existing vessel detection systems, extracting useful information from SAR images using traditional methods remains a challenge, e…
▽ More
Illegal, unreported, and unregulated (IUU) fishing activities seriously affect various aspects of human life. However, traditional methods for detecting and monitoring IUU fishing activities at sea have limitations. Although synthetic aperture radar (SAR) can complement existing vessel detection systems, extracting useful information from SAR images using traditional methods remains a challenge, especially in IUU fishing. This paper proposes a deep learning based fishing activity detection system, which is implemented on the xView3 dataset using six classical object detection models: SSD, RetinaNet, FSAF, FCOS, Faster R-CNN, and Cascade R-CNN. In addition, this work employs different enhancement techniques to improve the performance of the Faster R-CNN model. The experimental results demonstrate that training the Faster R-CNN model using the Online Hard Example Mining (OHEM) strategy increases the Avg-F1 value from 0.212 to 0.216.
△ Less
Submitted 12 July, 2024; v1 submitted 28 April, 2024;
originally announced April 2024.
-
Flood Data Analysis on SpaceNet 8 Using Apache Sedona
Authors:
Yanbing Bai,
Zihao Yang,
**ze Yu,
Rui-Yang Ju,
Bin Yang,
Erick Mas,
Shunichi Koshimura
Abstract:
With the escalating frequency of floods posing persistent threats to human life and property, satellite remote sensing has emerged as an indispensable tool for monitoring flood hazards. SpaceNet8 offers a unique opportunity to leverage cutting-edge artificial intelligence technologies to assess these hazards. A significant contribution of this research is its application of Apache Sedona, an advan…
▽ More
With the escalating frequency of floods posing persistent threats to human life and property, satellite remote sensing has emerged as an indispensable tool for monitoring flood hazards. SpaceNet8 offers a unique opportunity to leverage cutting-edge artificial intelligence technologies to assess these hazards. A significant contribution of this research is its application of Apache Sedona, an advanced platform specifically designed for the efficient and distributed processing of large-scale geospatial data. This platform aims to enhance the efficiency of error analysis, a critical aspect of improving flood damage detection accuracy. Based on Apache Sedona, we introduce a novel approach that addresses the challenges associated with inaccuracies in flood damage detection. This approach involves the retrieval of cases from historical flood events, the adaptation of these cases to current scenarios, and the revision of the model based on clustering algorithms to refine its performance. Through the replication of both the SpaceNet8 baseline and its top-performing models, we embark on a comprehensive error analysis. This analysis reveals several main sources of inaccuracies. To address these issues, we employ data visual interpretation and histogram equalization techniques, resulting in significant improvements in model metrics. After these enhancements, our indicators show a notable improvement, with precision up by 5%, F1 score by 2.6%, and IoU by 4.5%. This work highlights the importance of advanced geospatial data processing tools, such as Apache Sedona. By improving the accuracy and efficiency of flood detection, this research contributes to safeguarding public safety and strengthening infrastructure resilience in flood-prone areas, making it a valuable addition to the field of remote sensing and disaster management.
△ Less
Submitted 28 April, 2024;
originally announced April 2024.
-
Attention Calibration for Disentangled Text-to-Image Personalization
Authors:
Yanbing Zhang,
Meng** Yang,
Qin Zhou,
Zhe Wang
Abstract:
Recent thrilling progress in large-scale text-to-image (T2I) models has unlocked unprecedented synthesis quality of AI-generated content (AIGC) including image generation, 3D and video composition. Further, personalized techniques enable appealing customized production of a novel concept given only several images as reference. However, an intriguing problem persists: Is it possible to capture mult…
▽ More
Recent thrilling progress in large-scale text-to-image (T2I) models has unlocked unprecedented synthesis quality of AI-generated content (AIGC) including image generation, 3D and video composition. Further, personalized techniques enable appealing customized production of a novel concept given only several images as reference. However, an intriguing problem persists: Is it possible to capture multiple, novel concepts from one single reference image? In this paper, we identify that existing approaches fail to preserve visual consistency with the reference image and eliminate cross-influence from concepts. To alleviate this, we propose an attention calibration mechanism to improve the concept-level understanding of the T2I model. Specifically, we first introduce new learnable modifiers bound with classes to capture attributes of multiple concepts. Then, the classes are separated and strengthened following the activation of the cross-attention operation, ensuring comprehensive and self-contained concepts. Additionally, we suppress the attention activation of different classes to mitigate mutual influence among concepts. Together, our proposed method, dubbed DisenDiff, can learn disentangled multiple concepts from one single image and produce novel customized images with learned concepts. We demonstrate that our method outperforms the current state of the art in both qualitative and quantitative evaluations. More importantly, our proposed techniques are compatible with LoRA and inpainting pipelines, enabling more interactive experiences.
△ Less
Submitted 11 April, 2024; v1 submitted 27 March, 2024;
originally announced March 2024.
-
Disorder-induced local strain distribution in Y-substituted TmVO4
Authors:
Yuntian Li,
Mark P. Zic,
Linda Ye,
W. Joe Meese,
Pierre Massat,
Yanbing Zhu,
Rafael M. Fernandes,
Ian R. Fisher
Abstract:
We report an investigation of the effect of substitution of Y for Tm in $Tm_{1-x}Y_xVO4$ via low-temperature heat capacity measurements, with the yttrium content $x$ varying from $0$ to $0.997$. Because the Tm ions support a local quadrupolar (nematic) moment, they act as reporters of the local strain state in the material, with the splitting of the ion's non-Kramers crystal field groundstate prop…
▽ More
We report an investigation of the effect of substitution of Y for Tm in $Tm_{1-x}Y_xVO4$ via low-temperature heat capacity measurements, with the yttrium content $x$ varying from $0$ to $0.997$. Because the Tm ions support a local quadrupolar (nematic) moment, they act as reporters of the local strain state in the material, with the splitting of the ion's non-Kramers crystal field groundstate proportional to the quadrature sum of the in-plane tetragonal symmetry-breaking transverse and longitudinal strains experienced by each ion individually. Analysis of the heat capacity therefore provides detailed insights into the distribution of local strains that arise as a consequence of the chemical substitution. These local strains suppress long-range quadrupole order for $x>0.22$, and result in a broad Schottky-like feature for higher concentrations. Heat capacity data are compared to expectations for a distribution of uncorrelated (random) strains. For dilute Tm concentrations, the heat capacity cannot be accounted for by randomly distributed strains, demonstrating the presence of significant strain correlations between sites. For intermediate Tm concentrations, these correlations must still exist, but the data cannot be distinguished from that which would be obtained from a 2D Gaussian distribution. The cross-over between these limits is discussed in terms of the interplay of key length scales in the substituted material. The central result of this work, that local strains arising from chemical substitution are not uncorrelated, has implications for the range of validity of theoretical models based on random effective fields that are used to describe such chemically substituted materials, particularly when electronic nematic correlations are present.
△ Less
Submitted 26 February, 2024;
originally announced February 2024.
-
Traffic Control via Connected and Automated Vehicles: An Open-Road Field Experiment with 100 CAVs
Authors:
Jonathan W. Lee,
Han Wang,
Kathy Jang,
Amaury Hayat,
Matthew Bunting,
Arwa Alanqary,
William Barbour,
Zhe Fu,
Xiaoqian Gong,
George Gunter,
Sharon Hornstein,
Abdul Rahman Kreidieh,
Nathan Lichtlé,
Matthew W. Nice,
William A. Richardson,
Adit Shah,
Eugene Vinitsky,
Fangyu Wu,
Shengquan Xiang,
Sulaiman Almatrudi,
Fahd Althukair,
Rahul Bhadani,
Joy Carpio,
Raphael Chekroun,
Eric Cheng
, et al. (39 additional authors not shown)
Abstract:
The CIRCLES project aims to reduce instabilities in traffic flow, which are naturally occurring phenomena due to human driving behavior. These "phantom jams" or "stop-and-go waves,"are a significant source of wasted energy. Toward this goal, the CIRCLES project designed a control system referred to as the MegaController by the CIRCLES team, that could be deployed in real traffic. Our field experim…
▽ More
The CIRCLES project aims to reduce instabilities in traffic flow, which are naturally occurring phenomena due to human driving behavior. These "phantom jams" or "stop-and-go waves,"are a significant source of wasted energy. Toward this goal, the CIRCLES project designed a control system referred to as the MegaController by the CIRCLES team, that could be deployed in real traffic. Our field experiment leveraged a heterogeneous fleet of 100 longitudinally-controlled vehicles as Lagrangian traffic actuators, each of which ran a controller with the architecture described in this paper. The MegaController is a hierarchical control architecture, which consists of two main layers. The upper layer is called Speed Planner, and is a centralized optimal control algorithm. It assigns speed targets to the vehicles, conveyed through the LTE cellular network. The lower layer is a control layer, running on each vehicle. It performs local actuation by overriding the stock adaptive cruise controller, using the stock on-board sensors. The Speed Planner ingests live data feeds provided by third parties, as well as data from our own control vehicles, and uses both to perform the speed assignment. The architecture of the speed planner allows for modular use of standard control techniques, such as optimal control, model predictive control, kernel methods and others, including Deep RL, model predictive control and explicit controllers. Depending on the vehicle architecture, all onboard sensing data can be accessed by the local controllers, or only some. Control inputs vary across different automakers, with inputs ranging from torque or acceleration requests for some cars, and electronic selection of ACC set points in others. The proposed architecture allows for the combination of all possible settings proposed above. Most configurations were tested throughout the ramp up to the MegaVandertest.
△ Less
Submitted 26 February, 2024;
originally announced February 2024.
-
Spin-density-wave transition in double-layer nickelate La3Ni2O7
Authors:
Zhao Dan,
Yanbing Zhou,
Mengwu Huo,
Yu Wang,
Linpeng Nie,
Meng Wang,
Tao Wu,
Xianhui Chen
Abstract:
Recently, a signature of high-temperature superconductivity above the liquid nitrogen temperature (77 K) was reported for La3Ni2O7 under pressure. This finding immediately stimulates intense interest in the possible high-Tc superconducting mechanism in double-layer nickelates. Interestingly, the pressure-dependent phase diagram inferred from transport measurements indicates that superconductivity…
▽ More
Recently, a signature of high-temperature superconductivity above the liquid nitrogen temperature (77 K) was reported for La3Ni2O7 under pressure. This finding immediately stimulates intense interest in the possible high-Tc superconducting mechanism in double-layer nickelates. Interestingly, the pressure-dependent phase diagram inferred from transport measurements indicates that superconductivity under high pressure emerges from the suppression of a density-wave-like transition at ambient pressure, which is similar to high-temperature superconductors. Therefore, clarifying the exact nature of the density-wave-like transition is important for determining the mechanism of superconductivity in double-layer nickelates. Here, nuclear magnetic resonance (NMR) spectroscopy of 139La nuclei was performed to study the density-wave-like transition in a single crystal of La3Ni2O7. The temperature-dependent 139La NMR spectrum and nuclear spin-lattice relaxation rate (1/T1) provide unambiguous evidence for a spin-density-wave (SDW) transition with a transition temperature TSDW of ~ 150 K. Furthermore, the anisotropic splitting of the NMR spectrum suggests a possible double spin stripe with magnetic moments along the c axis. In addition, the present NMR measurements also revealed spatial inhomogeneity of magnetism due to inner apical oxygen vacancies. All these results will be helpful for building a connection between superconductivity and magnetic interactions in double-layer nickelates.
△ Less
Submitted 6 February, 2024;
originally announced February 2024.
-
New exact analytical solution of the nonlinear Gribov-Levin-Ryskin-Mueller-Qiu equation
Authors:
Yanbing Cai,
Xiaopeng Wang,
Xurong Chen
Abstract:
The GLR-MQ equation is a nonlinear evolution equation that takes into account the shadowing effect, which tames the growth of the gluon at small-$x$. In this study, we analytically solve for the first time the nonlinear GLR-MQ equation using the homogeneous balance method. The definite solution of the GLR-MQ equation is obtained by fitting the MSTW2008LO gluon distribution data. We find that the g…
▽ More
The GLR-MQ equation is a nonlinear evolution equation that takes into account the shadowing effect, which tames the growth of the gluon at small-$x$. In this study, we analytically solve for the first time the nonlinear GLR-MQ equation using the homogeneous balance method. The definite solution of the GLR-MQ equation is obtained by fitting the MSTW2008LO gluon distribution data. We find that the geometric scaling is an intrinsic property of our analytical solution and the gluon distribution functions from our solution are able to reproduce the MSTW2008LO data. These results indicate that our analytical solution from the homogeneous balance method is valid to describe the gluon behavior at small-$x$. Moreover, the saturation scale $Q_s$ has been extracted from our analytical solution, we find that the energy-dependent saturation scale obeys the exponential law $Q_s^2\,\propto\,Q_0^2 e^{λY}$.
△ Less
Submitted 28 January, 2024;
originally announced January 2024.
-
An analysis of the gluon distribution with next-to-leading order splitting function in small-$x$
Authors:
**gxuan Chen,
Xiaopeng Wang,
Yanbing Cai,
Xurong Chen,
Qian Wang
Abstract:
An approximated solution for gluon distribution from DGLAP evolution equations with NLO splitting function in the small-$x$ limit is presented. We first obtain the simplified forms of LO and NLO splitting functions in the small-$x$ limit. With these approximated splitting functions, we obtain the analytical gluon distribution by using the Mellin transform. The free parameters in the boundary condi…
▽ More
An approximated solution for gluon distribution from DGLAP evolution equations with NLO splitting function in the small-$x$ limit is presented. We first obtain the simplified forms of LO and NLO splitting functions in the small-$x$ limit. With these approximated splitting functions, we obtain the analytical gluon distribution by using the Mellin transform. The free parameters in the boundary conditions are obtained by fitting the CJ15 gluon distribution data. We find that the asymptotic behavior of gluon distribution are consistent with the CJ15 data, however, the NLO results with the consideration of ``ladder'' structure of gluon emission are slightly better than those from LO. These results indicate that the corrections from NLO is significant and is necessary for a better description of the behavior of the gluon distribution in small-$x$ region. In addition, we investigate the DGLAP evolution of the proton structure function by using the analytical solution of the gluon distribution. The differential structure function shows that our results have a similar tendency with CJ15 at small-$x$.
△ Less
Submitted 26 January, 2024;
originally announced January 2024.
-
Persona-centric Metamorphic Relation guided Robustness Evaluation for Multi-turn Dialogue Modelling
Authors:
Yanbing Chen,
Lin Li,
Xiaohui Tao,
Dong Zhou
Abstract:
Recently there has been significant progress in the field of dialogue system thanks to the introduction of training paradigms such as fine-tune and prompt learning. Persona can function as the prior knowledge for maintaining the personality consistency of dialogue systems, which makes it perform well on accuracy. Nonetheless, the conventional reference-based evaluation method falls short in captur…
▽ More
Recently there has been significant progress in the field of dialogue system thanks to the introduction of training paradigms such as fine-tune and prompt learning. Persona can function as the prior knowledge for maintaining the personality consistency of dialogue systems, which makes it perform well on accuracy. Nonetheless, the conventional reference-based evaluation method falls short in capturing the genuine text comprehension prowess of the model, significantly relying on the quality of data annotation. In contrast, the application of metamorphic testing offers a more profound insight into the model's distinct capabilities without necessitating supplementary annotation labels. This approach furnishes a more comprehensive portrayal of the model's intricacies and exposes intricacies concealed within reference-based validation techniques. Consequently, we introduce a persona-centric metamorphic relation construction for metamorphic testing, aimed at evaluating both the persona consistency and robustness of personalized dialogue models. For that reason, this work evaluates several widely used training paradigms including learning from scratch, pretrain + fine-tune and prompt learning in personalized dialogue retrieval to know if they are more robust or if they have the same flaws as their predecessor. Under three kinds of designed metamorphic relations with consistent outputs, our experimental results reveal that prompt learning shows stronger robustness compared to training from scratch and fine-tune. Although tested retrieval models gain competitively high retrieval accuracy according to the traditional reference-based validation, they are still fragile and demonstrate various unexpected behaviors, thus there is still room for future improvement in personalized dialogue retrieval.
△ Less
Submitted 22 January, 2024;
originally announced January 2024.
-
Deriving the QCD evolution equations under the Abelian decomposition scheme
Authors:
Yirui Yang,
Wei Kou,
Xiaopeng Wang,
Yanbing Cai,
Xurong Chen
Abstract:
The Abelian decomposition of QCD reveals two types of gluons: color-neutral ``neurons" and color-carrying ``chromons". This classification does not alter the overall properties of QCD, but the investigation of different types of gluon dynamics is necessary. By employing the Cho-Duan-Ge decomposition theorem, we have derived dynamic evolution equations for two types of gluons by using the time-orde…
▽ More
The Abelian decomposition of QCD reveals two types of gluons: color-neutral ``neurons" and color-carrying ``chromons". This classification does not alter the overall properties of QCD, but the investigation of different types of gluon dynamics is necessary. By employing the Cho-Duan-Ge decomposition theorem, we have derived dynamic evolution equations for two types of gluons by using the time-ordered perturbation theory. We propose that the new equations are compatible with the DGLAP equations, requiring only the separate contributions of neurons and chromons to be summed. Surprisingly, with the evolution to high $Q^2$, the ratio of the number of chromons to neurons is approximately 3:1 in small-$x$ region regardless of the inputs at evolution starting point. The new gluon dynamic equations reevaluate the gluon distribution functions and allow for a elaborate inverstigation of the distinct contributions of gluons in high-energy collisions.
△ Less
Submitted 21 January, 2024;
originally announced January 2024.
-
"It Can Relate to Real Lives": Attitudes and Expectations in Justice-Centered Data Structures & Algorithms for Non-Majors
Authors:
Anna Batra,
Iris Zhou,
Suh Young Choi,
Chongjiu Gao,
Yanbing Xiao,
Sonia Fereidooni,
Kevin Lin
Abstract:
Prior work has argued for a more justice-centered approach to postsecondary computing education by emphasizing ethics, identity, and political vision. In this experience report, we examine how postsecondary students of diverse gender and racial identities experience a justice-centered Data Structures and Algorithms designed for undergraduate non-computer science majors. Through a quantitative and…
▽ More
Prior work has argued for a more justice-centered approach to postsecondary computing education by emphasizing ethics, identity, and political vision. In this experience report, we examine how postsecondary students of diverse gender and racial identities experience a justice-centered Data Structures and Algorithms designed for undergraduate non-computer science majors. Through a quantitative and qualitative analysis of two quarters of student survey data collected at the start and end of each quarter, we report on student attitudes and expectations.
Across the class, we found a significant increase in the following attitudes: computing confidence and sense of belonging. While women, non-binary, and other students not identifying as men (WNB+) also increased in these areas, they still reported significantly lower confidence and sense of belonging than men at the end of the quarter. Black, Latinx, Middle Eastern and North African, Native American, and Pacific Islander (BLMNPI) students had no significant differences compared to white and Asian students.
We also analyzed end-of-quarter student self-reflections on their fulfillment of expectations prior to taking the course. While the majority of students reported a positive overall sentiment about the course and many students specifically appreciated the justice-centered approach, some desired more practice with program implementation and interview preparation. We discuss implications for practice and articulate a political vision for holding both appreciation for computing ethics and a desire for professional preparation together through iterative design.
△ Less
Submitted 15 March, 2024; v1 submitted 19 December, 2023;
originally announced December 2023.
-
Investigating Unintegrated Gluon Distributions: Analytically Solving the Modified BFKL Equation with Anti-Shadowing Effect
Authors:
Xiaopeng Wang,
Yanbing Cai,
Xurong Chen
Abstract:
This paper presents an analysis of the MD-BFKL equation, taking into consideration both shadowing and anti-shadowing effects in gluon recombination. We successfully derive analytical expressions for unintegrated gluon distributions by solving the MD-BFKL equation with and without the inclusion of the anti-shadowing effect. By comparing these solutions with the CT18NLO gluon distribution function,…
▽ More
This paper presents an analysis of the MD-BFKL equation, taking into consideration both shadowing and anti-shadowing effects in gluon recombination. We successfully derive analytical expressions for unintegrated gluon distributions by solving the MD-BFKL equation with and without the inclusion of the anti-shadowing effect. By comparing these solutions with the CT18NLO gluon distribution function, the study reveals that the anti-shadowing effect has a notably stronger impact on the behavior of unintegrated gluon distribution in regions of large rapidity and momentum.
△ Less
Submitted 18 December, 2023;
originally announced December 2023.
-
LpiCT: A logic security analysis framework for protocols
Authors:
Fusheng Wu,
**hui Liu,
Yanbing Li,
Mingtao Ni
Abstract:
The pi calculus is a basic theory of mobile communication based on the notion of interaction, which, aimed at analyzing and modelling the behaviors of communication process in communicating and mobile systems, is widely applied to the security analysis of cryptographic protocol's design and implementation. But the pi calculus does not provide perfect logic security analysis, so the logic flaws in…
▽ More
The pi calculus is a basic theory of mobile communication based on the notion of interaction, which, aimed at analyzing and modelling the behaviors of communication process in communicating and mobile systems, is widely applied to the security analysis of cryptographic protocol's design and implementation. But the pi calculus does not provide perfect logic security analysis, so the logic flaws in the design and the implementation of a cryptographic protocol can not be discovered in time. The aim is to analyze whether there are logic flaws in the design and the implementation of a cryptographic protocol, so as to ensure the security of the cryptographic protocol when it is encoded into a software and implemented. This paper introduces logic rules and proofs, binary tree and the KMP algorithm, and proposes a new extension the pi calculus theory, a logic security analysis framework and an algorithm. This paper presents the logic security proof and analysis of TLS1.3 protocol's interactional implementation process. Empirical results show that the new extension theory, the logic security analysis framework and the algorithm can effectively analyze whether there are logic flaws in the design and the implementation of a cryptographic protocol. The security of cryptographic protocols depends not only on cryptographic primitives, but also on the coding of cryptographic protocols and the environment in which they are implemented. The security analysis framework of cryptographic protocol implementation proposed in this paper can ensure the security of protocol implementation.
△ Less
Submitted 1 November, 2023;
originally announced December 2023.
-
Virtual trajectories for I-24 MOTION: data and tools
Authors:
Junyi Ji,
Yanbing Wang,
Derek Gloudemans,
Gergely Zachár,
William Barbour,
Daniel B. Work
Abstract:
This article introduces a new virtual trajectory dataset derived from the I-24 MOTION INCEPTION v1.0.0 dataset to address challenges in analyzing large but noisy trajectory datasets. Building on the concept of virtual trajectories, we provide a Python implementation to generate virtual trajectories from large raw datasets that are typically challenging to process due to their size. We demonstrate…
▽ More
This article introduces a new virtual trajectory dataset derived from the I-24 MOTION INCEPTION v1.0.0 dataset to address challenges in analyzing large but noisy trajectory datasets. Building on the concept of virtual trajectories, we provide a Python implementation to generate virtual trajectories from large raw datasets that are typically challenging to process due to their size. We demonstrate the practical utility of these trajectories in assessing speed variability and travel times across different lanes within the INCEPTION dataset. The virtual trajectory dataset opens future research on traffic waves and their impact on energy.
△ Less
Submitted 17 November, 2023;
originally announced November 2023.
-
Online Min Cost Circulation for Multi-Object Tracking on Fragments
Authors:
Yanbing Wang,
Junyi Ji,
William Barbour,
Daniel B. Work
Abstract:
Multi-object tracking (MOT) or global data association problem is commonly approached as a minimum-cost-flow or minimum-cost-circulation problem on a graph. While there have been numerous studies aimed at enhancing algorithm efficiency, most of them focus on the batch problem, where all the data must be available simultaneously to construct a static graph. However, with the growing number of appli…
▽ More
Multi-object tracking (MOT) or global data association problem is commonly approached as a minimum-cost-flow or minimum-cost-circulation problem on a graph. While there have been numerous studies aimed at enhancing algorithm efficiency, most of them focus on the batch problem, where all the data must be available simultaneously to construct a static graph. However, with the growing number of applications that generate streaming data, an efficient online algorithm is required to handle the streaming nature of the input. In this paper, we present an online extension of the well-known negative cycle canceling algorithm for solving the multi-object tracking problem with streaming fragmented data. We provide a proof of correctness for the proposed algorithm and demonstrate its efficiency through numerical experiments.
△ Less
Submitted 8 November, 2023;
originally announced November 2023.
-
RDGCN: Reinforced Dependency Graph Convolutional Network for Aspect-based Sentiment Analysis
Authors:
Xusheng Zhao,
Hao Peng,
Qiong Dai,
Xu Bai,
Huailiang Peng,
Yanbing Liu,
Qinglang Guo,
Philip S. Yu
Abstract:
Aspect-based sentiment analysis (ABSA) is dedicated to forecasting the sentiment polarity of aspect terms within sentences. Employing graph neural networks to capture structural patterns from syntactic dependency parsing has been confirmed as an effective approach for boosting ABSA. In most works, the topology of dependency trees or dependency-based attention coefficients is often loosely regarded…
▽ More
Aspect-based sentiment analysis (ABSA) is dedicated to forecasting the sentiment polarity of aspect terms within sentences. Employing graph neural networks to capture structural patterns from syntactic dependency parsing has been confirmed as an effective approach for boosting ABSA. In most works, the topology of dependency trees or dependency-based attention coefficients is often loosely regarded as edges between aspects and opinions, which can result in insufficient and ambiguous syntactic utilization. To address these problems, we propose a new reinforced dependency graph convolutional network (RDGCN) that improves the importance calculation of dependencies in both distance and type views. Initially, we propose an importance calculation criterion for the minimum distances over dependency trees. Under the criterion, we design a distance-importance function that leverages reinforcement learning for weight distribution search and dissimilarity control. Since dependency types often do not have explicit syntax like tree distances, we use global attention and mask mechanisms to design type-importance functions. Finally, we merge these weights and implement feature aggregation and classification. Comprehensive experiments on three popular datasets demonstrate the effectiveness of the criterion and importance functions. RDGCN outperforms state-of-the-art GNN-based baselines in all validations.
△ Less
Submitted 8 November, 2023;
originally announced November 2023.
-
Analytic solution of Balitsky-Kovchegov equation with running coupling constant using homogeneous balance method
Authors:
Yanbing Cai,
Xiaopeng Wang,
Xurong Chen
Abstract:
In this study, we employ the homogeneous balance method to obtain an analytical solution to the Balitsky-Kovchegov equation with running coupling. We utilize two distinct prescriptions of the running coupling scale, namely the saturation scale dependent running coupling and the dipole momentum dependent running coupling. By fitting the proton structure function experimental data, we determine the…
▽ More
In this study, we employ the homogeneous balance method to obtain an analytical solution to the Balitsky-Kovchegov equation with running coupling. We utilize two distinct prescriptions of the running coupling scale, namely the saturation scale dependent running coupling and the dipole momentum dependent running coupling. By fitting the proton structure function experimental data, we determine the free parameters in the analytical solution. The resulting $χ^{2}/d.o.f$ values are determined to be $1.07$ and $1.43$, respectively. With these definitive solutions, we are able to predict exclusive $J/ψ$ production, and demonstrate that analytical solutions with running coupling are in excellent agreement with $J/ψ$ differential and total cross section. Furthermore, our numerical results indicate that the analytical solution of the BK equation with running coupling can provide a reliable description for both the proton structure function and exclusive vector meson production.
△ Less
Submitted 29 December, 2023; v1 submitted 5 November, 2023;
originally announced November 2023.
-
Further acceleration of multiscale simulation of rarefied gas flow via a generalized boundary treatment
Authors:
Wei Liu,
Yanbing Zhang,
Jianan Zeng,
Lei Wu
Abstract:
The recently-developed general synthetic iterative scheme (GSIS) is efficient in simulating multiscale rarefied gas flows due to the coupling of mesoscopic kinetic equation and macroscopic synthetic equation: for linearized Poiseuille flow where the boundary flux is fixed at each iterative step, the steady-state solutions are found within dozens of iterations in solving the gas kinetic equations,…
▽ More
The recently-developed general synthetic iterative scheme (GSIS) is efficient in simulating multiscale rarefied gas flows due to the coupling of mesoscopic kinetic equation and macroscopic synthetic equation: for linearized Poiseuille flow where the boundary flux is fixed at each iterative step, the steady-state solutions are found within dozens of iterations in solving the gas kinetic equations, while for general nonlinear flows the iteration number is increased by about one order of magnitude, caused by the incompatible treatment of the boundary flux for the macroscopic synthetic equation. In this paper, we propose a generalized boundary treatment (GBT) to further accelerate the convergence of GSIS. The main idea is, the truncated velocity distribution function at the boundary, similar to that used in the Grad 13-moment equation, is reconstructed by the macroscopic conserved quantities from the synthetic equation, and the high-order correction of non-equilibrium stress and heat flux from the kinetic equation; therefore, in each inner iteration solving the synthetic equation, the explicit constitutive relations facilitate real-time updates of the macroscopic boundary flux, driving faster information exchange in the flow field, and consequently achieving quicker convergence. Moreover, the high-order correction derived from the kinetic equation can compensate the approximation by the truncation and ensure the boundary accuracy. The accuracy of GSIS-GBT is validated by the direct simulation Monte Carlo method, the previous versions of GSIS, and the unified gas-kinetic wave-particle method. For the efficiency, in the near-continuum flow regime and slip regime, GSIS-GBT can be faster than the conventional iteration scheme in the discrete velocity method and the previous versions of GSIS by two- and one-order of magnitude, respectively.
△ Less
Submitted 5 November, 2023;
originally announced November 2023.
-
Efficient parallel solver for rarefied gas flow using GSIS
Authors:
Yanbing Zhang,
Jianan Zeng,
Ruifeng Yuan,
Wei Liu,
Qi Li,
Lei Wu
Abstract:
Recently, the general synthetic iterative scheme (GSIS) has been proposed to find the steady-state solution of the Boltzmann equation in the whole range of gas rarefaction, where its fast-converging and asymptotic-preserving properties lead to the significant reduction of iteration numbers and spatial cells in the near-continuum flow regime. However, the efficiency and accuracy of GSIS has only be…
▽ More
Recently, the general synthetic iterative scheme (GSIS) has been proposed to find the steady-state solution of the Boltzmann equation in the whole range of gas rarefaction, where its fast-converging and asymptotic-preserving properties lead to the significant reduction of iteration numbers and spatial cells in the near-continuum flow regime. However, the efficiency and accuracy of GSIS has only been demonstrated in two-dimensional problems with small numbers of spatial cells and discrete velocities. Here, a large-scale parallel computing strategy is designed to extend the GSIS to three-dimensional flow problems, including the supersonic flows which are usually difficult to solve by the discrete velocity method. Since the GSIS involves the calculation of the mesoscopic kinetic equation which is defined in six-dimensional phase-space, and the macroscopic high-temperature Navier-Stokes-Fourier equations in three-dimensional physical space, the proper partition of the spatial and velocity spaces, and the allocation of CPU cores to the mesoscopic and macroscopic solvers, are the keys to improving the overall computational efficiency. These factors are systematically tested to achieve optimal performance, up to 100 billion spatial and velocity grids. For hypersonic flows around the Apollo reentry capsule, the X38-like vehicle, and the space station, our parallel solver can obtain the converged solution within one hour.
△ Less
Submitted 16 April, 2024; v1 submitted 29 October, 2023;
originally announced October 2023.
-
Magnetic-field-induced electronic instability of Weyl-like fermions in compressed black phosphorus
Authors:
Lixuan Zheng,
Kaifa Luo,
Zeliang Sun,
Dan Zhao,
Jian Li,
Dianwu Song,
Shunjiao Li,
Baolei Kang,
Linpeng Nie,
Min Shan,
Zhimian Wu,
Yanbing Zhou,
Xi Dai,
Hongming Weng,
Rui Yu,
Tao Wu,
Xianhui Chen
Abstract:
Revealing the role of Coulomb interaction in topological semimetals with Dirac/Weyl-like band dispersion shapes a new frontier in condensed matter physics. Topological node-line semimetals (TNLSMs), anticipated as a fertile ground for exploring electronic correlation effects due to the anisotropy associated with their node-line structure, have recently attracted considerable attention. In this stu…
▽ More
Revealing the role of Coulomb interaction in topological semimetals with Dirac/Weyl-like band dispersion shapes a new frontier in condensed matter physics. Topological node-line semimetals (TNLSMs), anticipated as a fertile ground for exploring electronic correlation effects due to the anisotropy associated with their node-line structure, have recently attracted considerable attention. In this study, we report an experimental observation for correlation effects in TNLSMs realized by black phosphorus (BP) under hydrostatic pressure. By performing a combination of nuclear magnetic resonance measurements and band calculations on compressed BP, a magnetic-field-induced electronic instability of Weyl-like fermions is identified under an external magnetic field parallel to the so-called nodal ring in the reciprocal space. Anomalous spin fluctuations serving as the fingerprint of electronic instability are observed at low temperatures, and they are observed to maximize at approximately 1.0 GPa. This study presents compressed BP as a realistic material platform for exploring the rich physics in strongly coupled Weyl-like fermions.
△ Less
Submitted 24 October, 2023;
originally announced October 2023.
-
MARVEL: Multi-Agent Reinforcement-Learning for Large-Scale Variable Speed Limits
Authors:
Yuhang Zhang,
Marcos Quinones-Grueiro,
Zhiyao Zhang,
Yanbing Wang,
William Barbour,
Gautam Biswas,
Daniel Work
Abstract:
Variable Speed Limit (VSL) control acts as a promising highway traffic management strategy with worldwide deployment, which can enhance traffic safety by dynamically adjusting speed limits according to real-time traffic conditions. Most of the deployed VSL control algorithms so far are rule-based, lacking generalizability under varying and complex traffic scenarios. In this work, we propose MARVEL…
▽ More
Variable Speed Limit (VSL) control acts as a promising highway traffic management strategy with worldwide deployment, which can enhance traffic safety by dynamically adjusting speed limits according to real-time traffic conditions. Most of the deployed VSL control algorithms so far are rule-based, lacking generalizability under varying and complex traffic scenarios. In this work, we propose MARVEL (Multi-Agent Reinforcement-learning for large-scale Variable spEed Limits), a novel framework for large-scale VSL control on highway corridors with real-world deployment settings. MARVEL utilizes only sensing information observable in the real world as state input and learns through a reward structure that incorporates adaptability to traffic conditions, safety, and mobility, thereby enabling multi-agent coordination. With parameter sharing among all VSL agents, the proposed framework scales to cover corridors with many agents. The policies are trained in a microscopic traffic simulation environment, focusing on a short freeway stretch with 8 VSL agents spanning 7 miles. For testing, these policies are applied to a more extensive network with 34 VSL agents spanning 17 miles of I-24 near Nashville, TN, USA. MARVEL-based method improves traffic safety by 63.4% compared to the no control scenario and enhances traffic mobility by 58.6% compared to a state-of-the-practice algorithm that has been deployed on I-24. Besides, we conduct an explainability analysis to examine the decision-making process of the agents and explore the learned policy under different traffic conditions. Finally, we test the response of the policy learned from the simulation-based experiments with real-world data collected from I-24 and illustrate its deployment capability.
△ Less
Submitted 17 March, 2024; v1 submitted 18 October, 2023;
originally announced October 2023.
-
So you think you can track?
Authors:
Derek Gloudemans,
Gergely Zachár,
Yanbing Wang,
Junyi Ji,
Matt Nice,
Matt Bunting,
William Barbour,
Jonathan Sprinkle,
Benedetto Piccoli,
Maria Laura Delle Monache,
Alexandre Bayen,
Benjamin Seibold,
Daniel B. Work
Abstract:
This work introduces a multi-camera tracking dataset consisting of 234 hours of video data recorded concurrently from 234 overlap** HD cameras covering a 4.2 mile stretch of 8-10 lane interstate highway near Nashville, TN. The video is recorded during a period of high traffic density with 500+ objects typically visible within the scene and typical object longevities of 3-15 minutes. GPS trajecto…
▽ More
This work introduces a multi-camera tracking dataset consisting of 234 hours of video data recorded concurrently from 234 overlap** HD cameras covering a 4.2 mile stretch of 8-10 lane interstate highway near Nashville, TN. The video is recorded during a period of high traffic density with 500+ objects typically visible within the scene and typical object longevities of 3-15 minutes. GPS trajectories from 270 vehicle passes through the scene are manually corrected in the video data to provide a set of ground-truth trajectories for recall-oriented tracking metrics, and object detections are provided for each camera in the scene (159 million total before cross-camera fusion). Initial benchmarking of tracking-by-detection algorithms is performed against the GPS trajectories, and a best HOTA of only 9.5% is obtained (best recall 75.9% at IOU 0.1, 47.9 average IDs per ground truth object), indicating the benchmarked trackers do not perform sufficiently well at the long temporal and spatial durations required for traffic scene understanding.
△ Less
Submitted 13 September, 2023;
originally announced September 2023.
-
MIMOCrypt: Multi-User Privacy-Preserving Wi-Fi Sensing via MIMO Encryption
Authors:
Jun Luo,
Hangcheng Cao,
Hongbo Jiang,
Yanbing Yang,
Zhe Chen
Abstract:
Wi-Fi signals may help realize low-cost and non-invasive human sensing, yet it can also be exploited by eavesdroppers to capture private information. Very few studies rise to handle this privacy concern so far; they either jam all sensing attempts or rely on sophisticated technologies to support only a single sensing user, rendering them impractical for multi-user scenarios. Moreover, these propos…
▽ More
Wi-Fi signals may help realize low-cost and non-invasive human sensing, yet it can also be exploited by eavesdroppers to capture private information. Very few studies rise to handle this privacy concern so far; they either jam all sensing attempts or rely on sophisticated technologies to support only a single sensing user, rendering them impractical for multi-user scenarios. Moreover, these proposals all fail to exploit Wi-Fi's multiple-in multiple-out (MIMO) capability. To this end, we propose MIMOCrypt, a privacy-preserving Wi-Fi sensing framework to support realistic multi-user scenarios. To thwart unauthorized eavesdrop** while retaining the sensing and communication capabilities for legitimate users, MIMOCrypt innovates in exploiting MIMO to physically encrypt Wi-Fi channels, treating the sensed human activities as physical plaintexts. The encryption scheme is further enhanced via an optimization framework, aiming to strike a balance among i) risk of eavesdrop**, ii) sensing accuracy, and iii) communication quality, upon securely conveying decryption keys to legitimate users. We implement a prototype of MIMOCrypt on an SDR platform and perform extensive experiments to evaluate its effectiveness in common application scenarios, especially privacy-sensitive human gesture recognition.
△ Less
Submitted 1 September, 2023;
originally announced September 2023.
-
The Interstate-24 3D Dataset: a new benchmark for 3D multi-camera vehicle tracking
Authors:
Derek Gloudemans,
Yanbing Wang,
Gracie Gumm,
William Barbour,
Daniel B. Work
Abstract:
This work presents a novel video dataset recorded from overlap** highway traffic cameras along an urban interstate, enabling multi-camera 3D object tracking in a traffic monitoring context. Data is released from 3 scenes containing video from at least 16 cameras each, totaling 57 minutes in length. 877,000 3D bounding boxes and corresponding object tracklets are fully and accurately annotated fo…
▽ More
This work presents a novel video dataset recorded from overlap** highway traffic cameras along an urban interstate, enabling multi-camera 3D object tracking in a traffic monitoring context. Data is released from 3 scenes containing video from at least 16 cameras each, totaling 57 minutes in length. 877,000 3D bounding boxes and corresponding object tracklets are fully and accurately annotated for each camera field of view and are combined into a spatially and temporally continuous set of vehicle trajectories for each scene. Lastly, existing algorithms are combined to benchmark a number of 3D multi-camera tracking pipelines on the dataset, with results indicating that the dataset is challenging due to the difficulty of matching objects traveling at high speeds across cameras and heavy object occlusion, potentially for hundreds of frames, during congested traffic. This work aims to enable the development of accurate and automatic vehicle trajectory extraction algorithms, which will play a vital role in understanding impacts of autonomous vehicle technologies on the safety and efficiency of traffic.
△ Less
Submitted 28 August, 2023;
originally announced August 2023.
-
Imaging constituent quark shape of proton with exclusive vector meson production at HERA
Authors:
Wenchang Xiang,
Yanbing Cai,
Daicui Zhou
Abstract:
We show within proton hot spot picture that the exclusive vector meson production in electron-proton deeply inelastic scattering is sensitive to the individual width of the constituent quarks of the proton. For comparison, we calculate the exclusive $J/Ψ$ production cross-sections in three cases, $\mathrm{B_u} \geq \mathrm{B_d}$, $\mathrm{B_u} < \mathrm{B_d}$ and…
▽ More
We show within proton hot spot picture that the exclusive vector meson production in electron-proton deeply inelastic scattering is sensitive to the individual width of the constituent quarks of the proton. For comparison, we calculate the exclusive $J/Ψ$ production cross-sections in three cases, $\mathrm{B_u} \geq \mathrm{B_d}$, $\mathrm{B_u} < \mathrm{B_d}$ and $\mathrm{B_u}\neq\mathrm{B^{\prime}_u}\neq\mathrm{B_d}$, where the $\mathrm{B_u}$, $\mathrm{B^{\prime}_u}$ and $\mathrm{B_d}$ denote the widths of two up quarks and down quark. We find that only results calculated with $\mathrm{B_u} \geq \mathrm{B_d}$ can give a reasonable description of the exclusive $J/Ψ$ production cross-section data at HERA. To test that our results are independent of the details of the model, we retain the average width of the three constituent quarks unchanged and compute the exclusive $J/Ψ$ production cross-sections with contribution weight by setting different proportional coefficients ($\mathrm{W_u}$ and $\mathrm{W_d}$) for the up and down quarks, respectively. It shows that the results calculated with $\mathrm{W_u}\geq\mathrm{W_d}$ can well reproduce the exclusive $J/Ψ$ production data at HERA, while the opposite case cannot describe the HERA data. These interesting findings seem to indicate that the up quark has more gluons around it than the down quark at high energy although the spatial distribution of gluons fluctuates event-by-event . To ensure the relevant results independent of the species of the vector meson, we also calculate the $ρ$ production cross-sections with the same group of parameters used in the exclusive $J/Ψ$ production and compare the predictions with the HERA data. It shows that all the results computed in the exclusive $ρ$ productions are consistent with the findings obtained in the exclusive $J/Ψ$ productions.
△ Less
Submitted 12 September, 2023; v1 submitted 19 August, 2023;
originally announced August 2023.
-
Diff-CAPTCHA: An Image-based CAPTCHA with Security Enhanced by Denoising Diffusion Model
Authors:
Ran Jiang,
Sanfeng Zhang,
Linfeng Liu,
Yanbing Peng
Abstract:
To enhance the security of text CAPTCHAs, various methods have been employed, such as adding the interference lines on the text, randomly distorting the characters, and overlap** multiple characters. These methods partly increase the difficulty of automated segmentation and recognition attacks. However, facing the rapid development of the end-to-end breaking algorithms, their security has been g…
▽ More
To enhance the security of text CAPTCHAs, various methods have been employed, such as adding the interference lines on the text, randomly distorting the characters, and overlap** multiple characters. These methods partly increase the difficulty of automated segmentation and recognition attacks. However, facing the rapid development of the end-to-end breaking algorithms, their security has been greatly weakened. The diffusion model is a novel image generation model that can generate the text images with deep fusion of characters and background images. In this paper, an image-click CAPTCHA scheme called Diff-CAPTCHA is proposed based on denoising diffusion models. The background image and characters of the CAPTCHA are treated as a whole to guide the generation process of a diffusion model, thus weakening the character features available for machine learning, enhancing the diversity of character features in the CAPTCHA, and increasing the difficulty of breaking algorithms. To evaluate the security of Diff-CAPTCHA, this paper develops several attack methods, including end-to-end attacks based on Faster R-CNN and two-stage attacks, and Diff-CAPTCHA is compared with three baseline schemes, including commercial CAPTCHA scheme and security-enhanced CAPTCHA scheme based on style transfer. The experimental results show that diffusion models can effectively enhance CAPTCHA security while maintaining good usability in human testing.
△ Less
Submitted 16 August, 2023;
originally announced August 2023.
-
Click-Conversion Multi-Task Model with Position Bias Mitigation for Sponsored Search in eCommerce
Authors:
Yibo Wang,
Yanbing Xue,
Bo Liu,
Musen Wen,
Wenting Zhao,
Stephen Guo,
Philip S. Yu
Abstract:
Position bias, the phenomenon whereby users tend to focus on higher-ranked items of the search result list regardless of the actual relevance to queries, is prevailing in many ranking systems. Position bias in training data biases the ranking model, leading to increasingly unfair item rankings, click-through-rate (CTR), and conversion rate (CVR) predictions. To jointly mitigate position bias in bo…
▽ More
Position bias, the phenomenon whereby users tend to focus on higher-ranked items of the search result list regardless of the actual relevance to queries, is prevailing in many ranking systems. Position bias in training data biases the ranking model, leading to increasingly unfair item rankings, click-through-rate (CTR), and conversion rate (CVR) predictions. To jointly mitigate position bias in both item CTR and CVR prediction, we propose two position-bias-free CTR and CVR prediction models: Position-Aware Click-Conversion (PACC) and PACC via Position Embedding (PACC-PE). PACC is built upon probability decomposition and models position information as a probability. PACC-PE utilizes neural networks to model product-specific position information as embedding. Experiments on the E-commerce sponsored product search dataset show that our proposed models have better ranking effectiveness and can greatly alleviate position bias in both CTR and CVR prediction.
△ Less
Submitted 29 July, 2023;
originally announced July 2023.
-
Automotive Radar Mutual Interference Mitigation Based on Hough Transform in Time-Frequency Domain
Authors:
Yanbing Li,
Weichuan Zhang,
Lianying Ji
Abstract:
With the development of autonomous driving technology, automotive radar has received unprecedented attention due to its day-and-night and all-weather working capability. It is worthwhile to note that more and more vehicles are equipped with automotive radars, resulting in mutual interference between radars. The interference reduces radar target detection performance, making perception information…
▽ More
With the development of autonomous driving technology, automotive radar has received unprecedented attention due to its day-and-night and all-weather working capability. It is worthwhile to note that more and more vehicles are equipped with automotive radars, resulting in mutual interference between radars. The interference reduces radar target detection performance, making perception information unreliable. In this paper, a novel interference mitigation method based on power-weighted Hough transform is proposed for solving the radar mutual interference and improving the safety of autonomous driving systems. Firstly, the frequency modulation characteristics of interference signals and target echo signals are analyzed, and differences between the two signals are introduced. Secondly, based on the straight line detection technique, the power of the mutual interference signal in time-frequency domain is accumulated, and the accurate position of the interference is located. Finally, the target echo is recovered by autoregressive model. Compared with existing state-of-the-art methods, the proposed method has the ability to retain more useful signals after the interference mitigation, and achieve better interference detection robustness under low signal-to-noise ratio conditions. Simulation experiments and real scenario experiments verify the effectiveness of the proposed method and show its superiority.
△ Less
Submitted 9 July, 2023;
originally announced July 2023.
-
Physics-Regulated Deep Reinforcement Learning: Invariant Embeddings
Authors:
Hongpeng Cao,
Yanbing Mao,
Lui Sha,
Marco Caccamo
Abstract:
This paper proposes the Phy-DRL: a physics-regulated deep reinforcement learning (DRL) framework for safety-critical autonomous systems. The Phy-DRL has three distinguished invariant-embedding designs: i) residual action policy (i.e., integrating data-driven-DRL action policy and physics-model-based action policy), ii) automatically constructed safety-embedded reward, and iii) physics-model-guided…
▽ More
This paper proposes the Phy-DRL: a physics-regulated deep reinforcement learning (DRL) framework for safety-critical autonomous systems. The Phy-DRL has three distinguished invariant-embedding designs: i) residual action policy (i.e., integrating data-driven-DRL action policy and physics-model-based action policy), ii) automatically constructed safety-embedded reward, and iii) physics-model-guided neural network (NN) editing, including link editing and activation editing. Theoretically, the Phy-DRL exhibits 1) a mathematically provable safety guarantee and 2) strict compliance of critic and actor networks with physics knowledge about the action-value function and action policy. Finally, we evaluate the Phy-DRL on a cart-pole system and a quadruped robot. The experiments validate our theoretical results and demonstrate that Phy-DRL features guaranteed safety compared to purely data-driven DRL and solely model-based design while offering remarkably fewer learning parameters and fast training towards safety guarantee.
△ Less
Submitted 8 July, 2024; v1 submitted 26 May, 2023;
originally announced May 2023.
-
Enabling and Analyzing How to Efficiently Extract Information from Hybrid Long Documents with LLMs
Authors:
Chongjian Yue,
Xinrun Xu,
Xiaojun Ma,
Lun Du,
Hengyu Liu,
Zhiming Ding,
Yanbing Jiang,
Shi Han,
Dongmei Zhang
Abstract:
Large Language Models (LLMs) demonstrate exceptional performance in textual understanding and tabular reasoning tasks. However, their ability to comprehend and analyze hybrid text, containing textual and tabular data, remains underexplored. In this research, we specialize in harnessing the potential of LLMs to comprehend critical information from financial reports, which are hybrid long-documents.…
▽ More
Large Language Models (LLMs) demonstrate exceptional performance in textual understanding and tabular reasoning tasks. However, their ability to comprehend and analyze hybrid text, containing textual and tabular data, remains underexplored. In this research, we specialize in harnessing the potential of LLMs to comprehend critical information from financial reports, which are hybrid long-documents. We propose an Automated Financial Information Extraction (AFIE) framework that enhances LLMs' ability to comprehend and extract information from financial reports. To evaluate AFIE, we develop a Financial Reports Numerical Extraction (FINE) dataset and conduct an extensive experimental analysis. Our framework is effectively validated on GPT-3.5 and GPT-4, yielding average accuracy increases of 53.94% and 33.77%, respectively, compared to a naive method. These results suggest that the AFIE framework offers accuracy for automated numerical extraction from complex, hybrid documents.
△ Less
Submitted 7 March, 2024; v1 submitted 24 May, 2023;
originally announced May 2023.
-
QCD Light-Cone Distribution Amplitudes of Heavy Mesons from boosted HQET
Authors:
Martin Beneke,
Gael Finauri,
K. Keri Vos,
Yanbing Wei
Abstract:
Light-cone distribution amplitudes (LCDAs) frequently arise in factorization theorems involving light and heavy mesons. The QCD LCDA for heavy mesons includes short-distance physics at energy scales of the heavy-quark mass. In this paper we achieve the separation of this perturbative scale from the purely hadronic effects by matching the QCD LCDA to the convolution of a perturbative function with…
▽ More
Light-cone distribution amplitudes (LCDAs) frequently arise in factorization theorems involving light and heavy mesons. The QCD LCDA for heavy mesons includes short-distance physics at energy scales of the heavy-quark mass. In this paper we achieve the separation of this perturbative scale from the purely hadronic effects by matching the QCD LCDA to the convolution of a perturbative function with the universal, quark-mass independent LCDA defined in heavy-quark effective theory. This factorization allows to resum potentially large logarithms between $Λ_{\rm QCD}$ and $m_Q$ as well as between $m_Q$ and the scale $Q$ of the hard process in the production of boosted heavy mesons at colliders. As an application we derive new theoretical predictions for the branching ratio of the decay $W^\pm \to B^\pm γ$. Furthermore, we provide phenomenological models for the QCD LCDAs of both the $\bar{B}$ and $D$ mesons expressed as expansions in Gegenbauer polynomials.
△ Less
Submitted 10 May, 2023;
originally announced May 2023.
-
Detecting Socially Abnormal Highway Driving Behaviors via Recurrent Graph Attention Networks
Authors:
Yue Hu,
Yuhang Zhang,
Yanbing Wang,
Daniel Work
Abstract:
With the rapid development of Internet of Things technologies, the next generation traffic monitoring infrastructures are connected via the web, to aid traffic data collection and intelligent traffic management. One of the most important tasks in traffic is anomaly detection, since abnormal drivers can reduce traffic efficiency and cause safety issues. This work focuses on detecting abnormal drivi…
▽ More
With the rapid development of Internet of Things technologies, the next generation traffic monitoring infrastructures are connected via the web, to aid traffic data collection and intelligent traffic management. One of the most important tasks in traffic is anomaly detection, since abnormal drivers can reduce traffic efficiency and cause safety issues. This work focuses on detecting abnormal driving behaviors from trajectories produced by highway video surveillance systems. Most of the current abnormal driving behavior detection methods focus on a limited category of abnormal behaviors that deal with a single vehicle without considering vehicular interactions. In this work, we consider the problem of detecting a variety of socially abnormal driving behaviors, i.e., behaviors that do not conform to the behavior of other nearby drivers. This task is complicated by the variety of vehicular interactions and the spatial-temporal varying nature of highway traffic. To solve this problem, we propose an autoencoder with a Recurrent Graph Attention Network that can capture the highway driving behaviors contextualized on the surrounding cars, and detect anomalies that deviate from learned patterns. Our model is scalable to large freeways with thousands of cars. Experiments on data generated from traffic simulation software show that our model is the only one that can spot the exact vehicle conducting socially abnormal behaviors, among the state-of-the-art anomaly detection models. We further show the performance on real world HighD traffic dataset, where our model detects vehicles that violate the local driving norms.
△ Less
Submitted 22 April, 2023;
originally announced April 2023.
-
Practical Lessons on Optimizing Sponsored Products in eCommerce
Authors:
Yanbing Xue,
Bo Liu,
Weizhi Du,
Jayanth Korlimarla,
Musen Men
Abstract:
In this paper, we study multiple problems from sponsored product optimization in ad system, including position-based de-biasing, click-conversion multi-task learning, and calibration on predicted click-through-rate (pCTR). We propose a practical machine learning framework that provides the solutions to such problems without structural change to existing machine learning models, thus can be combine…
▽ More
In this paper, we study multiple problems from sponsored product optimization in ad system, including position-based de-biasing, click-conversion multi-task learning, and calibration on predicted click-through-rate (pCTR). We propose a practical machine learning framework that provides the solutions to such problems without structural change to existing machine learning models, thus can be combined with most machine learning models including shallow models (e.g. gradient boosting decision trees, support vector machines). In this paper, we first propose data and feature engineering techniques to handle the aforementioned problems in ad system; after that, we evaluate the benefit of our practical framework on real-world data sets from our traffic logs from online shop** site. We show that our proposed practical framework with data and feature engineering can also handle the perennial problems in ad systems and bring increments to multiple evaluation metrics.
△ Less
Submitted 5 April, 2023;
originally announced April 2023.
-
Physical Deep Reinforcement Learning Towards Safety Guarantee
Authors:
Hongpeng Cao,
Yanbing Mao,
Lui Sha,
Marco Caccamo
Abstract:
Deep reinforcement learning (DRL) has achieved tremendous success in many complex decision-making tasks of autonomous systems with high-dimensional state and/or action spaces. However, the safety and stability still remain major concerns that hinder the applications of DRL to safety-critical autonomous systems. To address the concerns, we proposed the Phy-DRL: a physical deep reinforcement learnin…
▽ More
Deep reinforcement learning (DRL) has achieved tremendous success in many complex decision-making tasks of autonomous systems with high-dimensional state and/or action spaces. However, the safety and stability still remain major concerns that hinder the applications of DRL to safety-critical autonomous systems. To address the concerns, we proposed the Phy-DRL: a physical deep reinforcement learning framework. The Phy-DRL is novel in two architectural designs: i) Lyapunov-like reward, and ii) residual control (i.e., integration of physics-model-based control and data-driven control). The concurrent physical reward and residual control empower the Phy-DRL the (mathematically) provable safety and stability guarantees. Through experiments on the inverted pendulum, we show that the Phy-DRL features guaranteed safety and stability and enhanced robustness, while offering remarkably accelerated training and enlarged reward.
△ Less
Submitted 29 March, 2023;
originally announced March 2023.
-
A Light Weight Model for Active Speaker Detection
Authors:
Junhua Liao,
Haihan Duan,
Kanghui Feng,
Wanbing Zhao,
Yanbing Yang,
Liangyin Chen
Abstract:
Active speaker detection is a challenging task in audio-visual scenario understanding, which aims to detect who is speaking in one or more speakers scenarios. This task has received extensive attention as it is crucial in applications such as speaker diarization, speaker tracking, and automatic video editing. The existing studies try to improve performance by inputting multiple candidate informati…
▽ More
Active speaker detection is a challenging task in audio-visual scenario understanding, which aims to detect who is speaking in one or more speakers scenarios. This task has received extensive attention as it is crucial in applications such as speaker diarization, speaker tracking, and automatic video editing. The existing studies try to improve performance by inputting multiple candidate information and designing complex models. Although these methods achieved outstanding performance, their high consumption of memory and computational power make them difficult to be applied in resource-limited scenarios. Therefore, we construct a lightweight active speaker detection architecture by reducing input candidates, splitting 2D and 3D convolutions for audio-visual feature extraction, and applying gated recurrent unit (GRU) with low computational complexity for cross-modal modeling. Experimental results on the AVA-ActiveSpeaker dataset show that our framework achieves competitive mAP performance (94.1% vs. 94.2%), while the resource costs are significantly lower than the state-of-the-art method, especially in model parameters (1.0M vs. 22.5M, about 23x) and FLOPs (0.6G vs. 2.6G, about 4x). In addition, our framework also performs well on the Columbia dataset showing good robustness. The code and model weights are available at https://github.com/Junhua-Liao/Light-ASD.
△ Less
Submitted 8 March, 2023;
originally announced March 2023.
-
The performance of SiPM-based gamma-ray detector (GRD) of GECAM-C
Authors:
Dali Zhang,
Chao Zheng,
Jiacong Liu,
Zhenghua An,
Chenwei Wang,
Xiangyang Wen,
Xinqiao Li,
Xilei Sun,
Ke Gong,
Yaqing Liu,
Xiao**g Liu,
Sheng Yang,
Wenxi Peng,
Rui Qiao,
Dongya Guo,
Peiyi Feng,
Yanqiu Zhang,
Wangchen Xue,
Wenjun Tan,
Ce Cai,
Shuo Xiao,
Qibin Yi,
Yanbing Xu,
Min Gao,
**zhou Wang
, et al. (20 additional authors not shown)
Abstract:
As a new member of GECAM mission, the GECAM-C (also called High Energy Burst Searcher, HEBS) is a gamma-ray all-sky monitor onboard SATech-01 satellite, which was launched on July 27th, 2022 to detect gamma-ray transients from 6 keV to 6 MeV, such as Gamma-Ray Bursts (GRBs), high energy counterpart of Gravitational Waves (GWs) and Fast Radio Bursts (FRBs), and Soft Gamma-ray Repeaters (SGRs). Toge…
▽ More
As a new member of GECAM mission, the GECAM-C (also called High Energy Burst Searcher, HEBS) is a gamma-ray all-sky monitor onboard SATech-01 satellite, which was launched on July 27th, 2022 to detect gamma-ray transients from 6 keV to 6 MeV, such as Gamma-Ray Bursts (GRBs), high energy counterpart of Gravitational Waves (GWs) and Fast Radio Bursts (FRBs), and Soft Gamma-ray Repeaters (SGRs). Together with GECAM-A and GECAM-B launched in December 2020, GECAM-C will greatly improve the monitoring coverage, localization, as well as temporal and spectral measurements of gamma-ray transients. GECAM-C employs 12 SiPM-based Gamma-Ray Detectors (GRDs) to detect gamma-ray transients . In this paper, we firstly give a brief description of the design of GECAM-C GRDs, and then focus on the on-ground tests and in-flight performance of GRDs. We also did the comparison study of the SiPM in-flight performance between GECAM-C and GECAM-B. The results show GECAM-C GRD works as expected and is ready to make scientific observations.
△ Less
Submitted 7 March, 2023; v1 submitted 1 March, 2023;
originally announced March 2023.
-
I-24 MOTION: An instrument for freeway traffic science
Authors:
Derek Gloudemans,
Yanbing Wang,
Junyi Ji,
Gergely Zachar,
Will Barbour,
Daniel B. Work
Abstract:
The Interstate-24 MObility Technology Interstate Observation Network (I-24 MOTION) is a new instrument for traffic science located near Nashville, Tennessee. I-24 MOTION consists of 276 pole-mounted high-resolution traffic cameras that provide seamless coverage of approximately 4.2 miles I-24, a 4-5 lane (each direction) freeway with frequently observed congestion. The cameras are connected via fi…
▽ More
The Interstate-24 MObility Technology Interstate Observation Network (I-24 MOTION) is a new instrument for traffic science located near Nashville, Tennessee. I-24 MOTION consists of 276 pole-mounted high-resolution traffic cameras that provide seamless coverage of approximately 4.2 miles I-24, a 4-5 lane (each direction) freeway with frequently observed congestion. The cameras are connected via fiber optic network to a compute facility where vehicle trajectories are extracted from the video imagery using computer vision techniques. Approximately 230 million vehicle miles of travel occur within I-24 MOTION annually. The main output of the instrument are vehicle trajectory datasets that contain the position of each vehicle on the freeway, as well as other supplementary information vehicle dimensions and class. This article describes the design and creation of the instrument, and provides the first publicly available datasets generated from the instrument. The datasets published with this article contains at least 4 hours of vehicle trajectory data for each of 10 days. As the system continues to mature, all trajectory data will be made publicly available at i24motion.org/data.
△ Less
Submitted 30 January, 2023; v1 submitted 26 January, 2023;
originally announced January 2023.
-
Automatic vehicle trajectory data reconstruction at scale
Authors:
Yanbing Wang,
Derek Gloudemans,
Junyi Ji,
Zi Nean Teoh,
Lisa Liu,
Gergely Zachár,
William Barbour,
Daniel Work
Abstract:
In this paper we propose an automatic trajectory data reconciliation to correct common errors in vision-based vehicle trajectory data. Given "raw" vehicle detection and tracking information from automatic video processing algorithms, we propose a pipeline including (a) an online data association algorithm to match fragments that describe the same object (vehicle), which is formulated as a min-cost…
▽ More
In this paper we propose an automatic trajectory data reconciliation to correct common errors in vision-based vehicle trajectory data. Given "raw" vehicle detection and tracking information from automatic video processing algorithms, we propose a pipeline including (a) an online data association algorithm to match fragments that describe the same object (vehicle), which is formulated as a min-cost network circulation problem of a graph, and (b) a one-step trajectory rectification procedure formulated as a quadratic program to enhance raw detection data. The pipeline leverages vehicle dynamics and physical constraints to associate tracked objects when they become fragmented, remove measurement noises and outliers and impute missing data due to fragmentations. We assess the capability of the proposed two-step pipeline to reconstruct three benchmarking datasets: (1) a microsimulation dataset that is artificially downgraded to replicate upstream errors, (2) a 15-min NGSIM data that is manually perturbed, and (3) tracking data consists of 3 scenes from collections of video data recorded from 16-17 cameras on a section of the I-24 MOTION system, and compare with the corresponding manually-labeled ground truth vehicle bounding boxes. All of the experiments show that the reconciled trajectories improve the accuracy on all the tested input data for a wide range of measures. Lastly, we show the design of a software architecture that is currently deployed on the full-scale I-24 MOTION system consisting of 276 cameras that covers 4.2 miles of I-24. We demonstrate the scalability of the proposed reconciliation pipeline to process high-volume data on a daily basis.
△ Less
Submitted 5 November, 2023; v1 submitted 15 December, 2022;
originally announced December 2022.
-
Monolingual Recognizers Fusion for Code-switching Speech Recognition
Authors:
Tongtong Song,
Qiang Xu,
Haoyu Lu,
Longbiao Wang,
Hao Shi,
Yuqin Lin,
Yanbing Yang,
Jianwu Dang
Abstract:
The bi-encoder structure has been intensively investigated in code-switching (CS) automatic speech recognition (ASR). However, most existing methods require the structures of two monolingual ASR models (MAMs) should be the same and only use the encoder of MAMs. This leads to the problem that pre-trained MAMs cannot be timely and fully used for CS ASR. In this paper, we propose a monolingual recogn…
▽ More
The bi-encoder structure has been intensively investigated in code-switching (CS) automatic speech recognition (ASR). However, most existing methods require the structures of two monolingual ASR models (MAMs) should be the same and only use the encoder of MAMs. This leads to the problem that pre-trained MAMs cannot be timely and fully used for CS ASR. In this paper, we propose a monolingual recognizers fusion method for CS ASR. It has two stages: the speech awareness (SA) stage and the language fusion (LF) stage. In the SA stage, acoustic features are mapped to two language-specific predictions by two independent MAMs. To keep the MAMs focused on their own language, we further extend the language-aware training strategy for the MAMs. In the LF stage, the BELM fuses two language-specific predictions to get the final prediction. Moreover, we propose a text simulation strategy to simplify the training process of the BELM and reduce reliance on CS data. Experiments on a Mandarin-English corpus show the efficiency of the proposed method. The mix error rate is significantly reduced on the test set after using open-source pre-trained MAMs.
△ Less
Submitted 2 November, 2022;
originally announced November 2022.
-
Emergence of Layer Stacking Disorder in c-axis Confined MoTe$_2$
Authors:
James L Hart,
Lopa Bhatt,
Yanbing Zhu,
Myung-Geun Han,
Elisabeth Bianco,
Shunran Li,
David J Hynek,
John A Schneeloch,
Yu Tao,
Despina Louca,
Peijun Guo,
Yimei Zhu,
Felipe Jornada,
Evan J Reed,
Lena F Kourkoutis,
Judy J Cha
Abstract:
The layer stacking order in 2D materials strongly affects functional properties and holds promise for next generation electronic devices. In bulk, octahedral MoTe$_2$ possesses two stacking arrangements, the Weyl semimetal T$_d$ phase, and the higher-order topological insulator 1T' phase; however, it remains unclear if thin exfoliated flakes of MoTe$_2$ follow the T$_d$, 1T', or an alternative sta…
▽ More
The layer stacking order in 2D materials strongly affects functional properties and holds promise for next generation electronic devices. In bulk, octahedral MoTe$_2$ possesses two stacking arrangements, the Weyl semimetal T$_d$ phase, and the higher-order topological insulator 1T' phase; however, it remains unclear if thin exfoliated flakes of MoTe$_2$ follow the T$_d$, 1T', or an alternative stacking sequence. Here, we resolve this debate using atomic-resolution imaging within the transmission electron microscope. We find that the layer stacking in thin flakes of MoTe$_2$ is highly disordered and pseudo-random, which we attribute to intrinsic confinement effects. Conversely, WTe$_2$, which is isostructural and isoelectronic to MoTe$_2$, displays ordered stacking even for thin exfoliated flakes. Our results are important for understanding the quantum properties of MoTe$_2$ devices, and suggest that thickness may be used to alter the layer stacking in other 2D materials.
△ Less
Submitted 28 October, 2022;
originally announced October 2022.
-
Misaligned orientations of 4f optical neural network for image classification accuracy on various datasets
Authors:
Yanbing Liu,
Wei Li,
Kun Cheng,
Xun Liu,
Wei Yang
Abstract:
In recent years, the optical 4f system has drawn much attention in building high-speed and ultra-low-power optical neural networks (ONNs). Most optical systems suffer from the misalignment of the optical devices during installment. The performance of ONN based on the optical 4f system (4f-ONN) is considered sensitive to the misalignment in the optical path introduced. In order to comprehensively i…
▽ More
In recent years, the optical 4f system has drawn much attention in building high-speed and ultra-low-power optical neural networks (ONNs). Most optical systems suffer from the misalignment of the optical devices during installment. The performance of ONN based on the optical 4f system (4f-ONN) is considered sensitive to the misalignment in the optical path introduced. In order to comprehensively investigate the influence caused by the misalignment, we proposed a method for estimating the performance of a 4f-ONN in response to various misalignment in the context of the image classification task.The misalignment in numerical simulation is estimated by manipulating the optical intensity distributions in the fourth focus plane in the 4f system. Followed by a series of physical experiments to validate the simulation results. Using our method to test the impact of misalignment of 4f system on the classification accuracy of two popular image classification datasets, MNIST and Quickdraw16. On both datasets, we found that the performances of 4f-ONN generally degraded dramatically as the positioning error increased. Different positioning error tolerance in the misalignment orientations was observed over the two datasets. Classification performance could be preserved by positioning errors up to 200 microns in a specific direction.
△ Less
Submitted 5 October, 2022;
originally announced October 2022.
-
FreGAN: Exploiting Frequency Components for Training GANs under Limited Data
Authors:
Meng** Yang,
Zhe Wang,
Ziqiu Chi,
Yanbing Zhang
Abstract:
Training GANs under limited data often leads to discriminator overfitting and memorization issues, causing divergent training. Existing approaches mitigate the overfitting by employing data augmentations, model regularization, or attention mechanisms. However, they ignore the frequency bias of GANs and take poor consideration towards frequency information, especially high-frequency signals that co…
▽ More
Training GANs under limited data often leads to discriminator overfitting and memorization issues, causing divergent training. Existing approaches mitigate the overfitting by employing data augmentations, model regularization, or attention mechanisms. However, they ignore the frequency bias of GANs and take poor consideration towards frequency information, especially high-frequency signals that contain rich details. To fully utilize the frequency information of limited data, this paper proposes FreGAN, which raises the model's frequency awareness and draws more attention to producing high-frequency signals, facilitating high-quality generation. In addition to exploiting both real and generated images' frequency information, we also involve the frequency signals of real images as a self-supervised constraint, which alleviates the GAN disequilibrium and encourages the generator to synthesize adequate rather than arbitrary frequency signals. Extensive results demonstrate the superiority and effectiveness of our FreGAN in ameliorating generation quality in the low-data regime (especially when training data is less than 100). Besides, FreGAN can be seamlessly applied to existing regularization and attention mechanism models to further boost the performance.
△ Less
Submitted 11 October, 2022;
originally announced October 2022.
-
Specifics of the Elemental Excitations in "True One-Dimensional" MoI$_3$ van der Waals Nanowires
Authors:
Fariborz Kargar,
Zahra Barani,
Nicholas R. Sesing,
Thuc T. Mai,
Topojit Debnath,
Huairuo Zhang,
Yuhang Liu,
Yanbing Zhu,
Subhajit Ghosh,
Adam J. Biacchi,
Felipe H. da Jornada,
Ludwig Bartels,
Tehseen Adel,
Angela R. Hight Walker,
Albert V. Davydov,
Tina T. Salguero,
Roger K. Lake,
Alexander A. Balandin
Abstract:
We report on the temperature evolution of the polarization-dependent Raman spectrum of exfoliated MoI$_3$, a van der Waals material with a "true one-dimensional" crystal structure that can be exfoliated to individual atomic chains. The temperature evolution of several Raman features reveals anomalous behavior suggesting a phase transition of a magnetic origin. Theoretical considerations indicate t…
▽ More
We report on the temperature evolution of the polarization-dependent Raman spectrum of exfoliated MoI$_3$, a van der Waals material with a "true one-dimensional" crystal structure that can be exfoliated to individual atomic chains. The temperature evolution of several Raman features reveals anomalous behavior suggesting a phase transition of a magnetic origin. Theoretical considerations indicate that MoI$_3$ is an easy-plane antiferromagnet with alternating spins along the dimerized chains and with inter-chain helical spin ordering. The calculated frequencies of the phonons and magnons are consistent with the interpretation of the experimental Raman data. The obtained results shed light on the specifics of the phononic and magnonic states in MoI$_3$ and provide a strong motivation for future study of this unique material with potential for spintronic device applications.
△ Less
Submitted 10 October, 2022;
originally announced October 2022.
-
Production of $χ_{c}$ and $η_{c}$ production in ultra-peripheral collisions with two-photon processes
Authors:
Gongming Yu,
Yanbing Cai,
Quangui Gao,
Qiang Hu
Abstract:
We calculate the production of $χ_{c}$ and $η_{c}$ by the semi-coherent and coherent two-photon interaction in ultra-peripheral heavy ion collisions at Relativistic Heavy Ion Collider (RHIC) and Large Hadron Collider (LHC) energies. The differential cross section of transverse momentum distribution and rapidity distribution for $AB\stackrel{γγ}{\longrightarrow}AHB$ (H=$χ_{c}$ and $η_{c}$), are est…
▽ More
We calculate the production of $χ_{c}$ and $η_{c}$ by the semi-coherent and coherent two-photon interaction in ultra-peripheral heavy ion collisions at Relativistic Heavy Ion Collider (RHIC) and Large Hadron Collider (LHC) energies. The differential cross section of transverse momentum distribution and rapidity distribution for $AB\stackrel{γγ}{\longrightarrow}AHB$ (H=$χ_{c}$ and $η_{c}$), are estimated by using the equivalent photon approximation in ultra-peripheral nucleus-nucleus collisions. The numerical results demonstrate that the experimental study of $χ_{c}$ and $η_{c}$ in ultra-peripheral nucleus-nucleus collisions is feasible at RHIC and LHC energies.
△ Less
Submitted 7 October, 2022;
originally announced October 2022.