-
Discover the Hidden Attack Path in Multi-domain Cyberspace Based on Reinforcement Learning
Authors:
Lei Zhang,
Wei Bai,
Wei Li,
Shiming Xia,
Qibin Zheng
Abstract:
In this work, we present a learning-based approach to analysis cyberspace security configuration. Unlike prior methods, our approach has the ability to learn from past experience and improve over time. In particular, as we train over a greater number of agents as attackers, our method becomes better at discovering hidden attack paths for previously methods, especially in multi-domain cyberspace. T…
▽ More
In this work, we present a learning-based approach to analysis cyberspace security configuration. Unlike prior methods, our approach has the ability to learn from past experience and improve over time. In particular, as we train over a greater number of agents as attackers, our method becomes better at discovering hidden attack paths for previously methods, especially in multi-domain cyberspace. To achieve these results, we pose discovering attack paths as a Reinforcement Learning (RL) problem and train an agent to discover multi-domain cyberspace attack paths. To enable our RL policy to discover more hidden attack paths and shorter attack paths, we ground representation introduction an multi-domain action select module in RL. Our objective is to discover more hidden attack paths and shorter attack paths by our proposed method, to analysis the weakness of cyberspace security configuration. At last, we designed a simulated cyberspace experimental environment to verify our proposed method, the experimental results show that our method can discover more hidden multi-domain attack paths and shorter attack paths than existing baseline methods.
△ Less
Submitted 14 April, 2021;
originally announced April 2021.
-
Annotation of Chinese Predicate Heads and Relevant Elements
Authors:
Yan** Chen,
Wenfan **,
Yongbin Qin,
Ruizhang Huang,
Qinghua Zheng,
** Chen
Abstract:
A predicate head is a verbal expression that plays a role as the structural center of a sentence. Identifying predicate heads is critical to understanding a sentence. It plays the leading role in organizing the relevant syntactic elements in a sentence, including subject elements, adverbial elements, etc. For some languages, such as English, word morphologies are valuable for identifying predicate…
▽ More
A predicate head is a verbal expression that plays a role as the structural center of a sentence. Identifying predicate heads is critical to understanding a sentence. It plays the leading role in organizing the relevant syntactic elements in a sentence, including subject elements, adverbial elements, etc. For some languages, such as English, word morphologies are valuable for identifying predicate heads. However, Chinese offers no morphological information to indicate words` grammatical roles. A Chinese sentence often contains several verbal expressions; identifying the expression that plays the role of the predicate head is not an easy task. Furthermore, Chinese sentences are inattentive to structure and provide no delimitation between words. Therefore, identifying Chinese predicate heads involves significant challenges. In Chinese information extraction, little work has been performed in predicate head recognition. No generally accepted evaluation dataset supports work in this important area. This paper presents the first attempt to develop an annotation guideline for Chinese predicate heads and their relevant syntactic elements. This annotation guideline emphasizes the role of the predicate as the structural center of a sentence. The design of relevant syntactic element annotation also follows this principle. Many considerations are proposed to achieve this goal, e.g., patterns of predicate heads, a flattened annotation structure, and a simpler syntactic unit type. Based on the proposed annotation guideline, more than 1,500 documents were manually annotated. The corpus will be available online for public access. With this guideline and annotated corpus, our goal is to broadly impact and advance the research in the area of Chinese information extraction and to provide the research community with a critical resource that has been lacking for a long time.
△ Less
Submitted 1 April, 2021; v1 submitted 22 March, 2021;
originally announced March 2021.
-
Interpretation-enabled Software Reuse Detection Based on a Multi-Level Birthmark Model
Authors:
Xi Xu,
Qinghua Zheng,
Zheng Yan,
Ming Fan,
Ang Jia,
Ting Liu
Abstract:
Software reuse, especially partial reuse, poses legal and security threats to software development. Since its source codes are usually unavailable, software reuse is hard to be detected with interpretation. On the other hand, current approaches suffer from poor detection accuracy and efficiency, far from satisfying practical demands. To tackle these problems, in this paper, we propose \textit{ISRD…
▽ More
Software reuse, especially partial reuse, poses legal and security threats to software development. Since its source codes are usually unavailable, software reuse is hard to be detected with interpretation. On the other hand, current approaches suffer from poor detection accuracy and efficiency, far from satisfying practical demands. To tackle these problems, in this paper, we propose \textit{ISRD}, an interpretation-enabled software reuse detection approach based on a multi-level birthmark model that contains function level, basic block level, and instruction level. To overcome obfuscation caused by cross-compilation, we represent function semantics with Minimum Branch Path (MBP) and perform normalization to extract core semantics of instructions. For efficiently detecting reused functions, a process for "intent search based on anchor recognition" is designed to speed up reuse detection. It uses strict instruction match and identical library call invocation check to find anchor functions (in short anchors) and then traverses neighbors of the anchors to explore potentially matched function pairs. Extensive experiments based on two real-world binary datasets reveal that \textit{ISRD} is interpretable, effective, and efficient, which achieves $97.2\%$ precision and $94.8\%$ recall. Moreover, it is resilient to cross-compilation, outperforming state-of-the-art approaches.
△ Less
Submitted 18 March, 2021;
originally announced March 2021.
-
A Theorem of the Alternative for Personalized Federated Learning
Authors:
Shuxiao Chen,
Qinqing Zheng,
Qi Long,
Weijie J. Su
Abstract:
A widely recognized difficulty in federated learning arises from the statistical heterogeneity among clients: local datasets often come from different but not entirely unrelated distributions, and personalization is, therefore, necessary to achieve optimal results from each individual's perspective. In this paper, we show how the excess risks of personalized federated learning with a smooth, stron…
▽ More
A widely recognized difficulty in federated learning arises from the statistical heterogeneity among clients: local datasets often come from different but not entirely unrelated distributions, and personalization is, therefore, necessary to achieve optimal results from each individual's perspective. In this paper, we show how the excess risks of personalized federated learning with a smooth, strongly convex loss depend on data heterogeneity from a minimax point of view. Our analysis reveals a surprising theorem of the alternative for personalized federated learning: there exists a threshold such that (a) if a certain measure of data heterogeneity is below this threshold, the FedAvg algorithm [McMahan et al., 2017] is minimax optimal; (b) when the measure of heterogeneity is above this threshold, then doing pure local training (i.e., clients solve empirical risk minimization problems on their local datasets without any communication) is minimax optimal. As an implication, our results show that the presumably difficult (infinite-dimensional) problem of adapting to client-wise heterogeneity can be reduced to a simple binary decision problem of choosing between the two baseline algorithms. Our analysis relies on a new notion of algorithmic stability that takes into account the nature of federated learning.
△ Less
Submitted 2 March, 2021;
originally announced March 2021.
-
Federated $f$-Differential Privacy
Authors:
Qinqing Zheng,
Shuxiao Chen,
Qi Long,
Weijie J. Su
Abstract:
Federated learning (FL) is a training paradigm where the clients collaboratively learn models by repeatedly sharing information without compromising much on the privacy of their local sensitive data. In this paper, we introduce federated $f$-differential privacy, a new notion specifically tailored to the federated setting, based on the framework of Gaussian differential privacy. Federated $f$-diff…
▽ More
Federated learning (FL) is a training paradigm where the clients collaboratively learn models by repeatedly sharing information without compromising much on the privacy of their local sensitive data. In this paper, we introduce federated $f$-differential privacy, a new notion specifically tailored to the federated setting, based on the framework of Gaussian differential privacy. Federated $f$-differential privacy operates on record level: it provides the privacy guarantee on each individual record of one client's data against adversaries. We then propose a generic private federated learning framework {PriFedSync} that accommodates a large family of state-of-the-art FL algorithms, which provably achieves federated $f$-differential privacy. Finally, we empirically demonstrate the trade-off between privacy guarantee and prediction performance for models trained by {PriFedSync} in computer vision tasks.
△ Less
Submitted 22 February, 2021;
originally announced February 2021.
-
Determination of responses of liquid xenon to low energy electron and nuclear recoils using the PandaX-II detector
Authors:
Binbin Yan,
Abdusalam Abdukerim,
Wei Chen,
Xun Chen,
Yunhua Chen,
Chen Cheng,
Xiangyi Cui,
Yingjie Fan,
Deqing Fang,
Changbo Fu,
Mengting Fu,
Lisheng Geng,
Karl Giboni,
Linhui Gu,
Xuyuan Guo,
Ke Han,
Changda He,
Di Huang,
Peiyao Huang,
Yan Huang,
Yanlin Huang,
Zhou Huang,
Xiangdong Ji,
Yonglin Ju,
Shuaijie Li
, et al. (41 additional authors not shown)
Abstract:
We report a systematic determination of the responses of PandaX-II, a dual phase xenon time projection chamber detector, to low energy recoils. The electron recoil (ER) and nuclear recoil (NR) responses are calibrated, respectively, with injected tritiated methane or $^{220}$Rn source, and with $^{241}$Am-Be neutron source, within an energy range from $1-25$ keV (ER) and $4-80$ keV (NR), under the…
▽ More
We report a systematic determination of the responses of PandaX-II, a dual phase xenon time projection chamber detector, to low energy recoils. The electron recoil (ER) and nuclear recoil (NR) responses are calibrated, respectively, with injected tritiated methane or $^{220}$Rn source, and with $^{241}$Am-Be neutron source, within an energy range from $1-25$ keV (ER) and $4-80$ keV (NR), under the two drift fields of 400 and 317 V/cm. An empirical model is used to fit the light yield and charge yield for both types of recoils. The best fit models can well describe the calibration data. The systematic uncertainties of the fitted models are obtained via statistical comparison against the data.
△ Less
Submitted 18 February, 2021;
originally announced February 2021.
-
Progressive Localization Networks for Language-based Moment Localization
Authors:
Qi Zheng,
Jianfeng Dong,
Xiaoye Qu,
Xun Yang,
Yabing Wang,
Pan Zhou,
Baolong Liu,
Xun Wang
Abstract:
This paper targets the task of language-based video moment localization. The language-based setting of this task allows for an open set of target activities, resulting in a large variation of the temporal lengths of video moments. Most existing methods prefer to first sample sufficient candidate moments with various temporal lengths, and then match them with the given query to determine the target…
▽ More
This paper targets the task of language-based video moment localization. The language-based setting of this task allows for an open set of target activities, resulting in a large variation of the temporal lengths of video moments. Most existing methods prefer to first sample sufficient candidate moments with various temporal lengths, and then match them with the given query to determine the target moment. However, candidate moments generated with a fixed temporal granularity may be suboptimal to handle the large variation in moment lengths. To this end, we propose a novel multi-stage Progressive Localization Network (PLN) which progressively localizes the target moment in a coarse-to-fine manner. Specifically, each stage of PLN has a localization branch, and focuses on candidate moments that are generated with a specific temporal granularity. The temporal granularities of candidate moments are different across the stages. Moreover, we devise a conditional feature manipulation module and an upsampling connection to bridge the multiple localization branches. In this fashion, the later stages are able to absorb the previously learned information, thus facilitating the more fine-grained localization. Extensive experiments on three public datasets demonstrate the effectiveness of our proposed PLN for language-based moment localization, especially for localizing short moments in long videos.
△ Less
Submitted 3 March, 2022; v1 submitted 1 February, 2021;
originally announced February 2021.
-
Towards Entity Alignment in the Open World: An Unsupervised Approach
Authors:
Weixin Zeng,
Xiang Zhao,
Jiuyang Tang,
Xinyi Li,
Minnan Luo,
Qinghua Zheng
Abstract:
Entity alignment (EA) aims to discover the equivalent entities in different knowledge graphs (KGs). It is a pivotal step for integrating KGs to increase knowledge coverage and quality. Recent years have witnessed a rapid increase of EA frameworks. However, state-of-the-art solutions tend to rely on labeled data for model training. Additionally, they work under the closed-domain setting and cannot…
▽ More
Entity alignment (EA) aims to discover the equivalent entities in different knowledge graphs (KGs). It is a pivotal step for integrating KGs to increase knowledge coverage and quality. Recent years have witnessed a rapid increase of EA frameworks. However, state-of-the-art solutions tend to rely on labeled data for model training. Additionally, they work under the closed-domain setting and cannot deal with entities that are unmatchable. To address these deficiencies, we offer an unsupervised framework that performs entity alignment in the open world. Specifically, we first mine useful features from the side information of KGs. Then, we devise an unmatchable entity prediction module to filter out unmatchable entities and produce preliminary alignment results. These preliminary results are regarded as the pseudo-labeled data and forwarded to the progressive learning framework to generate structural representations, which are integrated with the side information to provide a more comprehensive view for alignment. Finally, the progressive learning framework gradually improves the quality of structural embeddings and enhances the alignment performance by enriching the pseudo-labeled data with alignment results from the previous round. Our solution does not require labeled data and can effectively filter out unmatchable entities. Comprehensive experimental evaluations validate its superiority.
△ Less
Submitted 25 January, 2021;
originally announced January 2021.
-
Search for Light Dark Matter-Electron Scatterings in the PandaX-II Experiment
Authors:
Chen Cheng,
Pengwei Xie,
Abdusalam Abdukerim,
Wei Chen,
Xun Chen,
Yunhua Chen,
Xiangyi Cui,
Yingjie Fan,
Deqing Fang,
Changbo Fu,
Mengting Fu,
Lisheng Geng,
Karl Giboni,
Linhui Gu,
Xuyuan Guo,
Ke Han,
Changda He,
Di Huang,
Yan Huang,
Yanlin Huang,
Zhou Huang,
Xiangdong Ji,
Yonglin Ju,
Shuaijie Li,
Qing Lin
, et al. (45 additional authors not shown)
Abstract:
We report constraints on light dark matter through its interactions with shell electrons in the PandaX-II liquid xenon detector with a total 46.9 tonne$\cdot$day exposure. To effectively search for these very low energy electron recoils, ionization-only signals are selected from the data. 1821 candidates are identified within ionization signal range between 50 to 75 photoelectrons, corresponding t…
▽ More
We report constraints on light dark matter through its interactions with shell electrons in the PandaX-II liquid xenon detector with a total 46.9 tonne$\cdot$day exposure. To effectively search for these very low energy electron recoils, ionization-only signals are selected from the data. 1821 candidates are identified within ionization signal range between 50 to 75 photoelectrons, corresponding to a mean electronic recoil energy from 0.08 to 0.15 keV. The 90% C.L. exclusion limit on the scattering cross section between the dark matter and electron is calculated based on Poisson statistics. Under the assumption of point interaction, we provide the world's most stringent limit within the dark matter mass range from 15 to 30 $\rm MeV/c^2$, with the corresponding cross section from $2.5\times10^{-37}$ to $3.1\times10^{-38}$ cm$^2$.
△ Less
Submitted 7 May, 2021; v1 submitted 19 January, 2021;
originally announced January 2021.
-
Two distinct superconducting states controlled by orientation of local wrinkles in LiFeAs
Authors:
Lu Cao,
Wenyao Liu,
Geng Li,
Guangyang Dai,
Qi Zheng,
Kun Jiang,
Shiyu Zhu,
Li Huang,
Lingyuan Kong,
Fazhi Yang,
Xiancheng Wang,
Wu Zhou,
Xiao Lin,
Jiang** Hu,
Changqing **,
Hong Ding,
Hong-Jun Gao
Abstract:
We observe two types of superconducting states controlled by orientations of local wrinkles on the surface of LiFeAs. Using scanning tunneling microscopy/spectroscopy, we find type-I wrinkles enlarge the superconducting gaps and enhance the transition temperature, whereas type-II wrinkles significantly suppress the superconducting gaps. The vortices on wrinkles show a C2 symmetry, indicating the s…
▽ More
We observe two types of superconducting states controlled by orientations of local wrinkles on the surface of LiFeAs. Using scanning tunneling microscopy/spectroscopy, we find type-I wrinkles enlarge the superconducting gaps and enhance the transition temperature, whereas type-II wrinkles significantly suppress the superconducting gaps. The vortices on wrinkles show a C2 symmetry, indicating the strain effects on the wrinkles. A discontinuous switch of superconductivity occurs at the border between two different wrinkles. Our results demonstrate that the local strain effect could affect superconducting order parameter of LiFeAs with a possible Lifshitz transition, by alternating crystal structure in different directions.
△ Less
Submitted 9 February, 2021; v1 submitted 7 January, 2021;
originally announced January 2021.
-
Slow Control System for PandaX-III experiment
Authors:
Xiyu Yan,
Xun Chen,
Yu Chen,
Bo Dai,
Heng Lin,
Tao Li,
Ke Han,
Kaixiang Ni,
Fusang Wang,
Shaobo Wang,
Qibin Zheng,
Xinning Zeng
Abstract:
The PandaX-III experiment uses high pressure gaseous time projection chamber to search for the neutrinoless double beta decay of $^{136}$Xe. A modular slow control system~(SCS) has been designed to monitor all the critical parameters of the experiment. It ensures the proper operation of the experiment as well as to provide necessary information for data corrections. The main subsystems of the expe…
▽ More
The PandaX-III experiment uses high pressure gaseous time projection chamber to search for the neutrinoless double beta decay of $^{136}$Xe. A modular slow control system~(SCS) has been designed to monitor all the critical parameters of the experiment. It ensures the proper operation of the experiment as well as to provide necessary information for data corrections. The main subsystems of the experiment will be constantly monitored by the data collection module of the SCS, which collects data from sensors and sends them to the centralized database. When an alarm message is generated by the anomaly detection module, it will be sent to an alert website and related on-call experts immediately. A demonstrator of the SCS has been built for the PandaX-III prototype detector. The long-term test of it provided valuable experience for the final design of the SCS for PandaX-III.
△ Less
Submitted 5 March, 2021; v1 submitted 24 December, 2020;
originally announced December 2020.
-
Uniform Complex Time Heat Kernel Estimates Without Gaussian Bounds
Authors:
Shiliang Zhao,
Quan Zheng
Abstract:
In this paper, first we consider the uniform complex time heat kernel estimates of $e^{-z(-Δ)^{\fracα{2}}}$ for $α>0, z\in \mathbb{C}^+$. When $\fracα{2}$ is not an integer, generally the heat kernel doest not have the Gaussian upper bounds for real time. Thus the Phragmén-Lindelöf methods fail to give the uniform complex time estimates. Instead, our first result gives the asymptotic estimates for…
▽ More
In this paper, first we consider the uniform complex time heat kernel estimates of $e^{-z(-Δ)^{\fracα{2}}}$ for $α>0, z\in \mathbb{C}^+$. When $\fracα{2}$ is not an integer, generally the heat kernel doest not have the Gaussian upper bounds for real time. Thus the Phragmén-Lindelöf methods fail to give the uniform complex time estimates. Instead, our first result gives the asymptotic estimates for $P(z, x)$ as $z$ tending to the imaginary axis. Then we prove the uniform complex time heat kernel estimates. Finally we also show the uniform estimates of analytic semigroup generated by $H=(-Δ)^{\fracα{2}}+V$ where $V$ belongs to higher order Kato class.
△ Less
Submitted 26 September, 2022; v1 submitted 16 December, 2020;
originally announced December 2020.
-
Digital rock reconstruction with user-defined properties using conditional generative adversarial networks
Authors:
Qiang Zheng,
Dongxiao Zhang
Abstract:
Uncertainty is ubiquitous with flow in subsurface rocks because of their inherent heterogeneity and lack of in-situ measurements. To complete uncertainty analysis in a multi-scale manner, it is a prerequisite to provide sufficient rock samples. Even though the advent of digital rock technology offers opportunities to reproduce rocks, it still cannot be utilized to provide massive samples due to it…
▽ More
Uncertainty is ubiquitous with flow in subsurface rocks because of their inherent heterogeneity and lack of in-situ measurements. To complete uncertainty analysis in a multi-scale manner, it is a prerequisite to provide sufficient rock samples. Even though the advent of digital rock technology offers opportunities to reproduce rocks, it still cannot be utilized to provide massive samples due to its high cost, thus leading to the development of diversified mathematical methods. Among them, two-point statistics (TPS) and multi-point statistics (MPS) are commonly utilized, which feature incorporating low-order and high-order statistical information, respectively. Recently, generative adversarial networks (GANs) are becoming increasingly popular since they can reproduce training images with excellent visual and consequent geologic realism. However, standard GANs can only incorporate information from data, while leaving no interface for user-defined properties, and thus may limit the representativeness of reconstructed samples. In this study, we propose conditional GANs for digital rock reconstruction, aiming to reproduce samples not only similar to the real training data, but also satisfying user-specified properties. In fact, the proposed framework can realize the targets of MPS and TPS simultaneously by incorporating high-order information directly from rock images with the GANs scheme, while preserving low-order counterparts through conditioning. We conduct three reconstruction experiments, and the results demonstrate that rock type, rock porosity, and correlation length can be successfully conditioned to affect the reconstructed rock images. Furthermore, in contrast to existing GANs, the proposed conditioning enables learning of multiple rock types simultaneously, and thus invisibly saves computational cost.
△ Less
Submitted 1 June, 2021; v1 submitted 29 November, 2020;
originally announced December 2020.
-
On Convergence of Gradient Expected Sarsa($λ$)
Authors:
Long Yang,
Gang Zheng,
Yu Zhang,
Qian Zheng,
Pengfei Li,
Gang Pan
Abstract:
We study the convergence of $\mathtt{Expected~Sarsa}(λ)$ with linear function approximation. We show that applying the off-line estimate (multi-step bootstrap**) to $\mathtt{Expected~Sarsa}(λ)$ is unstable for off-policy learning. Furthermore, based on convex-concave saddle-point framework, we propose a convergent $\mathtt{Gradient~Expected~Sarsa}(λ)$ ($\mathtt{GES}(λ)$) algorithm. The theoretic…
▽ More
We study the convergence of $\mathtt{Expected~Sarsa}(λ)$ with linear function approximation. We show that applying the off-line estimate (multi-step bootstrap**) to $\mathtt{Expected~Sarsa}(λ)$ is unstable for off-policy learning. Furthermore, based on convex-concave saddle-point framework, we propose a convergent $\mathtt{Gradient~Expected~Sarsa}(λ)$ ($\mathtt{GES}(λ)$) algorithm. The theoretical analysis shows that our $\mathtt{GES}(λ)$ converges to the optimal solution at a linear convergence rate, which is comparable to extensive existing state-of-the-art gradient temporal difference learning algorithms. Furthermore, we develop a Lyapunov function technique to investigate how the step-size influences finite-time performance of $\mathtt{GES}(λ)$, such technique of Lyapunov function can be potentially generalized to other GTD algorithms. Finally, we conduct experiments to verify the effectiveness of our $\mathtt{GES}(λ)$.
△ Less
Submitted 13 December, 2020;
originally announced December 2020.
-
An improved design of the readout base board of the photomultiplier tube for future PandaX dark matter experiments
Authors:
Qibin Zheng,
Yanlin Huang,
Di Huang,
Jianglai Liu,
Xiangxiang Ren,
Anqing Wang,
Meng Wang,
Jijun Yang,
Binbin Yan,
Yong Yang
Abstract:
The PandaX project consists of a series of xenon-based experiments that are used to search for dark matter (DM) particles and to study the fundamental properties of neutrinos. The next DM experiment PandaX-4T will be using 4 ton liquid xenon in the sensitive volume, which is nearly a factor of seven larger than that of the previous experiment PandaX-II. Due to the increasing target mass, the sensi…
▽ More
The PandaX project consists of a series of xenon-based experiments that are used to search for dark matter (DM) particles and to study the fundamental properties of neutrinos. The next DM experiment PandaX-4T will be using 4 ton liquid xenon in the sensitive volume, which is nearly a factor of seven larger than that of the previous experiment PandaX-II. Due to the increasing target mass, the sensitivity of searching for both DM and neutrinoless double-beta decay ($0νββ$) signals in the same detector will be significantly improved. However, the typical energy of interest for $0νββ$ signals is at the MeV scale, which is much higher than that of most popular DM signals. In the baseline readout scheme of the photomultiplier tubes (PMTs), the dynamic range is very limited. Signals from the majority of PMTs in the top array of the detector are heavily saturated at MeV energies. This deteriorates the $0νββ$ search sensitivity. In this paper we report a new design of the readout base board of the PMTs for future PandaX DM experiments and present its improved performance on the dynamic range.
△ Less
Submitted 6 December, 2020;
originally announced December 2020.
-
Observation of many-body quantum phase transitions beyond the Kibble-Zurek mechanism
Authors:
Qi Huang,
Ruixiao Yao,
Libo Liang,
Shuai Wang,
Qinpei Zheng,
Ding** Li,
Wei Xiong,
Xiaoji Zhou,
Wenlan Chen,
Xuzong Chen,
Jiazhong Hu
Abstract:
Quantum critical behavior of many-body phase transitions is one of the most fascinating yet challenging questions in quantum physics. Here, we improved the band-map** method to investigate the quantum phase transition from superfluid to Mott insulators, and we observed the critical behaviors of quantum phase transitions in both dynamical steady-state-relaxation region and phase-oscillation regio…
▽ More
Quantum critical behavior of many-body phase transitions is one of the most fascinating yet challenging questions in quantum physics. Here, we improved the band-map** method to investigate the quantum phase transition from superfluid to Mott insulators, and we observed the critical behaviors of quantum phase transitions in both dynamical steady-state-relaxation region and phase-oscillation region. Based on various observables, two different values for the same quantum critical parameter are observed. This result is beyond a universal-scaling-law description of quantum phase transitions known as the Kibble-Zurek mechanism, and suggests that multiple quantum critical mechanisms are competing in many-body quantum phase transition experiments in inhomogeneous systems.
△ Less
Submitted 2 November, 2021; v1 submitted 3 December, 2020;
originally announced December 2020.
-
Sample Complexity of Policy Gradient Finding Second-Order Stationary Points
Authors:
Long Yang,
Qian Zheng,
Gang Pan
Abstract:
The goal of policy-based reinforcement learning (RL) is to search the maximal point of its objective. However, due to the inherent non-concavity of its objective, convergence to a first-order stationary point (FOSP) can not guarantee the policy gradient methods finding a maximal point. A FOSP can be a minimal or even a saddle point, which is undesirable for RL. Fortunately, if all the saddle point…
▽ More
The goal of policy-based reinforcement learning (RL) is to search the maximal point of its objective. However, due to the inherent non-concavity of its objective, convergence to a first-order stationary point (FOSP) can not guarantee the policy gradient methods finding a maximal point. A FOSP can be a minimal or even a saddle point, which is undesirable for RL. Fortunately, if all the saddle points are \emph{strict}, all the second-order stationary points (SOSP) are exactly equivalent to local maxima. Instead of FOSP, we consider SOSP as the convergence criteria to character the sample complexity of policy gradient. Our result shows that policy gradient converges to an $(ε,\sqrt{εχ})$-SOSP with probability at least $1-\widetilde{\mathcal{O}}(δ)$ after the total cost of $\mathcal{O}\left(\dfrac{ε^{-\frac{9}{2}}}{(1-γ)\sqrtχ}\log\dfrac{1}δ\right)$, where $γ\in(0,1)$. Our result improves the state-of-the-art result significantly where it requires $\mathcal{O}\left(\dfrac{ε^{-9}χ^{\frac{3}{2}}}δ\log\dfrac{1}{εχ}\right)$. Our analysis is based on the key idea that decomposes the parameter space $\mathbb{R}^p$ into three non-intersected regions: non-stationary point, saddle point, and local optimal region, then making a local improvement of the objective of RL in each region. This technique can be potentially generalized to extensive policy gradient methods.
△ Less
Submitted 2 December, 2020;
originally announced December 2020.
-
A Boundary Regression Model for Nested Named Entity Recognition
Authors:
Yan** Chen,
Lefei Wu,
Qinghua Zheng,
Ruizhang Huang,
Jun Liu,
Liyuan Deng,
Junhui Yu,
Yongbin Qing,
Bo Dong,
** Chen
Abstract:
Recognizing named entities (NEs) is commonly conducted as a classification problem that predicts a class tag for a word or a NE candidate in a sentence. In shallow structures, categorized features are weighted to support the prediction. Recent developments in neural networks have adopted deep structures that map categorized features into continuous representations. This approach unfolds a dense sp…
▽ More
Recognizing named entities (NEs) is commonly conducted as a classification problem that predicts a class tag for a word or a NE candidate in a sentence. In shallow structures, categorized features are weighted to support the prediction. Recent developments in neural networks have adopted deep structures that map categorized features into continuous representations. This approach unfolds a dense space saturated with high-order abstract semantic information, where the prediction is based on distributed feature representations. In this paper, positions of NEs in a sentence are represented as continuous values. Then, a regression operation is introduced to regress boundaries of NEs in a sentence. Based on boundary regression, we design a boundary regression model to support nested NE recognition. It is a multiobjective learning framework, which simultaneously predicts the classification score of a NE candidate and refine its spatial location in a sentence. It has the advantage to resolve nested NEs and support boundary regression for locating NEs in a sntence. By sharing parameters for predicting and locating, this model enables more potent nonlinear function approximators to enhance model discriminability. Experiments demonstrate state-of-the-art performance for nested NE recognition\footnote{Our codes to implement the BR model are available at: \url{https://github.com/wuyuefei3/BR}.}.
△ Less
Submitted 30 January, 2022; v1 submitted 29 November, 2020;
originally announced November 2020.
-
XTQA: Span-Level Explanations of the Textbook Question Answering
Authors:
Jie Ma,
Qi Chai,
Jun Liu,
Qingyu Yin,
**hui Wang,
Qinghua Zheng
Abstract:
Textbook Question Answering (TQA) is a task that one should answer a diagram/non-diagram question given a large multi-modal context consisting of abundant essays and diagrams. We argue that the explainability of this task should place students as a key aspect to be considered. To address this issue, we devise a novel architecture towards span-level eXplanations of the TQA (XTQA) based on our propo…
▽ More
Textbook Question Answering (TQA) is a task that one should answer a diagram/non-diagram question given a large multi-modal context consisting of abundant essays and diagrams. We argue that the explainability of this task should place students as a key aspect to be considered. To address this issue, we devise a novel architecture towards span-level eXplanations of the TQA (XTQA) based on our proposed coarse-to-fine grained algorithm, which can provide not only the answers but also the span-level evidences to choose them for students. This algorithm first coarsely chooses top $M$ paragraphs relevant to questions using the TF-IDF method, and then chooses top $K$ evidence spans finely from all candidate spans within these paragraphs by computing the information gain of each span to questions. Experimental results shows that XTQA significantly improves the state-of-the-art performance compared with baselines. The source code is available at https://github.com/keep-smile-001/opentqa
△ Less
Submitted 24 July, 2023; v1 submitted 25 November, 2020;
originally announced November 2020.
-
Symmetry-protected topological phase transitions and robust chiral order on a tunable zigzag lattice
Authors:
Qibin Zheng,
Xing Li,
Haiyuan Zou
Abstract:
Symmetry fractionalization, generating a large amount of symmetry-protected topological phases, provides scenarios for continuous phase transitions different from spontaneous symmetry breaking. However, it is hard to detect these symmetry-protected topological phase transitions experimentally. Motivated by the recent development of highly tunable ultracold polar molecules, we show that the setup i…
▽ More
Symmetry fractionalization, generating a large amount of symmetry-protected topological phases, provides scenarios for continuous phase transitions different from spontaneous symmetry breaking. However, it is hard to detect these symmetry-protected topological phase transitions experimentally. Motivated by the recent development of highly tunable ultracold polar molecules, we show that the setup in a zigzag optical lattice of this system provides a perfect platform to realize symmetry-protected topological phase transitions. By using infinite time-evolving block decimation, we obtain the phase diagram in a large parameter regions and find another scheme to realize the long-sought vector chiral phase, which is robust from quantum fluctuations. We discuss the existence of the chiral phase by an effective field analysis.
△ Less
Submitted 12 November, 2020;
originally announced November 2020.
-
SeqTrans: Automatic Vulnerability Fix via Sequence to Sequence Learning
Authors:
Jianlei Chi,
Yu Qu,
Ting Liu,
Qinghua Zheng,
Heng Yin
Abstract:
Software vulnerabilities are now reported at an unprecedented speed due to the recent development of automated vulnerability hunting tools. However, fixing vulnerabilities still mainly depends on programmers' manual efforts. Developers need to deeply understand the vulnerability and try to affect the system's functions as little as possible.
In this paper, with the advancement of Neural Machine…
▽ More
Software vulnerabilities are now reported at an unprecedented speed due to the recent development of automated vulnerability hunting tools. However, fixing vulnerabilities still mainly depends on programmers' manual efforts. Developers need to deeply understand the vulnerability and try to affect the system's functions as little as possible.
In this paper, with the advancement of Neural Machine Translation (NMT) techniques, we provide a novel approach called SeqTrans to exploit historical vulnerability fixes to provide suggestions and automatically fix the source code. To capture the contextual information around the vulnerable code, we propose to leverage data flow dependencies to construct code sequences and fed them into the state-of-the-art transformer model. The fine-tuning strategy has been introduced to overcome the small sample size problem. We evaluate SeqTrans on a dataset containing 1,282 commits that fix 624 vulnerabilities in 205 Java projects. Results show that the accuracy of SeqTrans outperforms the latest techniques and achieves 23.3% in statement-level fix and 25.3% in CVE-level fix. In the meantime, we look deep inside the result and observe that NMT model performs very well in certain kinds of vulnerabilities like CWE-287 (Improper Authentication) and CWE-863 (Incorrect Authorization).
△ Less
Submitted 22 March, 2022; v1 submitted 21 October, 2020;
originally announced October 2020.
-
Multi-view Subspace Clustering Networks with Local and Global Graph Information
Authors:
Qinghai Zheng,
Jihua Zhu,
Yuanyuan Ma,
Zhongyu Li,
Zhiqiang Tian
Abstract:
This study investigates the problem of multi-view subspace clustering, the goal of which is to explore the underlying grou** structure of data collected from different fields or measurements. Since data do not always comply with the linear subspace models in many real-world applications, most existing multi-view subspace clustering methods that based on the shallow linear subspace models may fai…
▽ More
This study investigates the problem of multi-view subspace clustering, the goal of which is to explore the underlying grou** structure of data collected from different fields or measurements. Since data do not always comply with the linear subspace models in many real-world applications, most existing multi-view subspace clustering methods that based on the shallow linear subspace models may fail in practice. Furthermore, underlying graph information of multi-view data is always ignored in most existing multi-view subspace clustering methods. To address aforementioned limitations, we proposed the novel multi-view subspace clustering networks with local and global graph information, termed MSCNLG, in this paper. Specifically, autoencoder networks are employed on multiple views to achieve latent smooth representations that are suitable for the linear assumption. Simultaneously, by integrating fused multi-view graph information into self-expressive layers, the proposed MSCNLG obtains the common shared multi-view subspace representation, which can be used to get clustering results by employing the standard spectral clustering algorithm. As an end-to-end trainable framework, the proposed method fully investigates the valuable information of multiple views. Comprehensive experiments on six benchmark datasets validate the effectiveness and superiority of the proposed MSCNLG.
△ Less
Submitted 24 March, 2021; v1 submitted 19 October, 2020;
originally announced October 2020.
-
Tensor-based Intrinsic Subspace Representation Learning for Multi-view Clustering
Authors:
Qinghai Zheng,
Yu Zhang,
Jihua Zhu,
Zhongyu Li,
Haoyu Tang,
Shuangxun Ma
Abstract:
As a hot research topic, many multi-view clustering approaches are proposed over the past few years. Nevertheless, most existing algorithms merely take the consensus information among different views into consideration for clustering. Actually, it may hinder the multi-view clustering performance in real-life applications, since different views usually contain diverse statistic properties. To addre…
▽ More
As a hot research topic, many multi-view clustering approaches are proposed over the past few years. Nevertheless, most existing algorithms merely take the consensus information among different views into consideration for clustering. Actually, it may hinder the multi-view clustering performance in real-life applications, since different views usually contain diverse statistic properties. To address this problem, we propose a novel Tensor-based Intrinsic Subspace Representation Learning (TISRL) for multi-view clustering in this paper. Concretely, the rank preserving decomposition is proposed firstly to effectively deal with the diverse statistic information contained in different views. Then, to achieve the intrinsic subspace representation, the tensor-singular value decomposition based low-rank tensor constraint is also utilized in our method. It can be seen that specific information contained in different views is fully investigated by the rank preserving decomposition, and the high-order correlations of multi-view data are also mined by the low-rank tensor constraint. The objective function can be optimized by an augmented Lagrangian multiplier based alternating direction minimization algorithm. Experimental results on nine common used real-world multi-view datasets illustrate the superiority of TISRL.
△ Less
Submitted 7 November, 2022; v1 submitted 18 October, 2020;
originally announced October 2020.
-
Integrating Coarse Granularity Part-level Features with Supervised Global-level Features for Person Re-identification
Authors:
Xiaofei Mao,
Jiahao Cao,
Dongfang Li,
Xia Jia,
Qingfang Zheng
Abstract:
Holistic person re-identification (Re-ID) and partial person re-identification have achieved great progress respectively in recent years. However, scenarios in reality often include both holistic and partial pedestrian images, which makes single holistic or partial person Re-ID hard to work. In this paper, we propose a robust coarse granularity part-level person Re-ID network (CGPN), which not onl…
▽ More
Holistic person re-identification (Re-ID) and partial person re-identification have achieved great progress respectively in recent years. However, scenarios in reality often include both holistic and partial pedestrian images, which makes single holistic or partial person Re-ID hard to work. In this paper, we propose a robust coarse granularity part-level person Re-ID network (CGPN), which not only extracts robust regional level body features, but also integrates supervised global features for both holistic and partial person images. CGPN gains two-fold benefit toward higher accuracy for person Re-ID. On one hand, CGPN learns to extract effective body part features for both holistic and partial person images. On the other hand, compared with extracting global features directly by backbone network, CGPN learns to extract more accurate global features with a supervision strategy. The single model trained on three Re-ID datasets including Market-1501, DukeMTMC-reID and CUHK03 achieves state-of-the-art performances and outperforms any existing approaches. Especially on CUHK03, which is the most challenging dataset for person Re-ID, in single query mode, we obtain a top result of Rank-1/mAP=87.1\%/83.6\% with this method without re-ranking, outperforming the current best method by +7.0\%/+6.7\%.
△ Less
Submitted 15 October, 2020;
originally announced October 2020.
-
Multi-view Hierarchical Clustering
Authors:
Qinghai Zheng,
Jihua Zhu,
Shuangxun Ma
Abstract:
This paper focuses on the multi-view clustering, which aims to promote clustering results with multi-view data. Usually, most existing works suffer from the issues of parameter selection and high computational complexity. To overcome these limitations, we propose a Multi-view Hierarchical Clustering (MHC), which partitions multi-view data recursively at multiple levels of granularity. Specifically…
▽ More
This paper focuses on the multi-view clustering, which aims to promote clustering results with multi-view data. Usually, most existing works suffer from the issues of parameter selection and high computational complexity. To overcome these limitations, we propose a Multi-view Hierarchical Clustering (MHC), which partitions multi-view data recursively at multiple levels of granularity. Specifically, MHC consists of two important components: the cosine distance integration (CDI) and the nearest neighbor agglomeration (NNA). The CDI can explore the underlying complementary information of multi-view data so as to learn an essential distance matrix, which is utilized in NNA to obtain the clustering results. Significantly, the proposed MHC can be easily and effectively employed in real-world applications without parameter selection. Experiments on nine benchmark datasets illustrate the superiority of our method comparing to several state-of-the-art multi-view clustering methods.
△ Less
Submitted 15 October, 2020;
originally announced October 2020.
-
Self-Weighted Robust LDA for Multiclass Classification with Edge Classes
Authors:
Caixia Yan,
Xiaojun Chang,
Minnan Luo,
Qinghua Zheng,
Xiaoqin Zhang,
Zhihui Li,
Fei** Nie
Abstract:
Linear discriminant analysis (LDA) is a popular technique to learn the most discriminative features for multi-class classification. A vast majority of existing LDA algorithms are prone to be dominated by the class with very large deviation from the others, i.e., edge class, which occurs frequently in multi-class classification. First, the existence of edge classes often makes the total mean biased…
▽ More
Linear discriminant analysis (LDA) is a popular technique to learn the most discriminative features for multi-class classification. A vast majority of existing LDA algorithms are prone to be dominated by the class with very large deviation from the others, i.e., edge class, which occurs frequently in multi-class classification. First, the existence of edge classes often makes the total mean biased in the calculation of between-class scatter matrix. Second, the exploitation of l2-norm based between-class distance criterion magnifies the extremely large distance corresponding to edge class. In this regard, a novel self-weighted robust LDA with l21-norm based pairwise between-class distance criterion, called SWRLDA, is proposed for multi-class classification especially with edge classes. SWRLDA can automatically avoid the optimal mean calculation and simultaneously learn adaptive weights for each class pair without setting any additional parameter. An efficient re-weighted algorithm is exploited to derive the global optimum of the challenging l21-norm maximization problem. The proposed SWRLDA is easy to implement, and converges fast in practice. Extensive experiments demonstrate that SWRLDA performs favorably against other compared methods on both synthetic and real-world datasets, while presenting superior computational efficiency in comparison with other techniques.
△ Less
Submitted 24 September, 2020;
originally announced September 2020.
-
The Impact of Tandem Redundant/Sky-Based Calibration in MWA Phase II Data Analysis
Authors:
Zheng Zhang,
Jonathan C. Pober,
Wenyang Li,
Bryna J. Hazelton,
Miguel F. Morales,
Cathryn M. Trott,
Christopher H. Jordan,
Ronniy C. Joseph,
Adam Beardsley,
Nichole Barry,
Ruby Byrne,
Steven J. Tingay,
Aman Chokshi,
Kenji Hasegawa,
Daniel C. Jacobs,
Adam Lanman,
Jack L. B. Line,
Christene Lynch,
Benjamin McKinley,
Daniel A. Mitchell,
Steven Murray,
Bart Pindor,
Mahsa Rahimi,
Keitaro Takahashi,
Randall B. Wayth
, et al. (4 additional authors not shown)
Abstract:
Precise instrumental calibration is of crucial importance to 21-cm cosmology experiments. The Murchison Widefield Array's (MWA) Phase II compact configuration offers us opportunities for both redundant calibration and sky-based calibration algorithms; using the two in tandem is a potential approach to mitigate calibration errors caused by inaccurate sky models. The MWA Epoch of Reionization (EoR)…
▽ More
Precise instrumental calibration is of crucial importance to 21-cm cosmology experiments. The Murchison Widefield Array's (MWA) Phase II compact configuration offers us opportunities for both redundant calibration and sky-based calibration algorithms; using the two in tandem is a potential approach to mitigate calibration errors caused by inaccurate sky models. The MWA Epoch of Reionization (EoR) experiment targets three patches of the sky (dubbed EoR0, EoR1, and EoR2) with deep observations. Previous work in \cite{Li_2018} and \cite{Wenyang_2019} studied the effect of tandem calibration on the EoR0 field and found that it yielded no significant improvement in the power spectrum over sky-based calibration alone. In this work, we apply similar techniques to the EoR1 field and find a distinct result: the improvements in the power spectrum from tandem calibration are significant. To understand this result, we analyze both the calibration solutions themselves and the effects on the power spectrum over three nights of EoR1 observations. We conclude that the presence of the bright radio galaxy Fornax A in EoR1 degrades the performance of sky-based calibration, which in turn enables redundant calibration to have a larger impact. These results suggest that redundant calibration can indeed mitigate some level of model-incompleteness error.
△ Less
Submitted 19 September, 2020;
originally announced September 2020.
-
Superlubric Schottky Generator in Microscale with High Current Density and Ultralong Life
Authors:
Xuanyu Huang,
Xiaojian Xiang,
Deli Peng,
Fuwei Yang,
Haiyang Jiang,
Zhanghui Wu,
Zhi** Xu,
Quanshui Zheng
Abstract:
Miniaturized or even microscale generators that could effectively and persistently converse weak and random mechanical energy from environments into electricity promise huge applications in the internet of things, sensor networks, big data, personal health systems, artificial intelligence, etc. However, such generators haven't appeared yet because either the current density, or persistence, or bot…
▽ More
Miniaturized or even microscale generators that could effectively and persistently converse weak and random mechanical energy from environments into electricity promise huge applications in the internet of things, sensor networks, big data, personal health systems, artificial intelligence, etc. However, such generators haven't appeared yet because either the current density, or persistence, or both of all reported attempts were too low to real applications. Here, we demonstrate a superlubric Schottky generator (SLSG) in microscale such that the sliding contact between a microsized graphite flake and an n-type silicon is in a structural superlubric state, namely a ultralow friction and wearless state. This SLSG generates a stable electrical current at a high density (~119 Am-2) for at least 5,000 cycles. Since no current decay and wear were observed during the entire experiment, we believe that the real persistence of the SLSG should be enduring or substantively unlimited. In addition, the observed results exclude the mechanism of friction excitation in our Schottky generator, and provide the first experimental support of the conjectured mechanism of depletion layer establishment and destruction (DLED). Furthermore, we demonstrate a physical process of the DLED mechanism by the use of a quasi-static semiconductor finite element simulation. Our work may guide and accelerate future SLSGs into real applications.
△ Less
Submitted 9 September, 2020;
originally announced September 2020.
-
TaxThemis: Interactive Mining and Exploration of Suspicious Tax Evasion Group
Authors:
Yating Lin,
Kamkwai Wong,
Yong Wang,
Rong Zhang,
Bo Dong,
Huamin Qu,
Qinghua Zheng
Abstract:
Tax evasion is a serious economic problem for many countries, as it can undermine the government' s tax system and lead to an unfair business competition environment. Recent research has applied data analytics techniques to analyze and detect tax evasion behaviors of individual taxpayers. However, they failed to support the analysis and exploration of the uprising related party transaction tax eva…
▽ More
Tax evasion is a serious economic problem for many countries, as it can undermine the government' s tax system and lead to an unfair business competition environment. Recent research has applied data analytics techniques to analyze and detect tax evasion behaviors of individual taxpayers. However, they failed to support the analysis and exploration of the uprising related party transaction tax evasion (RPTTE) behaviors (e.g., transfer pricing), where a group of taxpayers is involved. In this paper, we present TaxThemis, an interactive visual analytics system to help tax officers mine and explore suspicious tax evasion groups through analyzing heterogeneous tax-related data. A taxpayer network is constructed and fused with the trade network to detect suspicious RPTTE groups. Rich visualizations are designed to facilitate the exploration and investigation of suspicious transactions between related taxpayers with profit and topological data analysis. Specifically, we propose a calendar heatmap with a carefully-designed encoding scheme to intuitively show the evidence of transferring revenue through related party transactions. We demonstrate the usefulness and effectiveness of TaxThemis through two case studies on real-world tax-related data, and interviews with domain experts.
△ Less
Submitted 7 September, 2020;
originally announced September 2020.
-
Object Properties Inferring from and Transfer for Human Interaction Motions
Authors:
Qian Zheng,
Weikai Wu,
Hanting Pan,
Niloy Mitra,
Daniel Cohen-Or,
Hui Huang
Abstract:
Humans regularly interact with their surrounding objects. Such interactions often result in strongly correlated motion between humans and the interacting objects. We thus ask: "Is it possible to infer object properties from skeletal motion alone, even without seeing the interacting object itself?" In this paper, we present a fine-grained action recognition method that learns to infer such latent o…
▽ More
Humans regularly interact with their surrounding objects. Such interactions often result in strongly correlated motion between humans and the interacting objects. We thus ask: "Is it possible to infer object properties from skeletal motion alone, even without seeing the interacting object itself?" In this paper, we present a fine-grained action recognition method that learns to infer such latent object properties from human interaction motion alone. This inference allows us to disentangle the motion from the object property and transfer object properties to a given motion. We collected a large number of videos and 3D skeletal motions of the performing actors using an inertial motion capture device. We analyze similar actions and learn subtle differences among them to reveal latent properties of the interacting objects. In particular, we learn to identify the interacting object, by estimating its weight, or its fragility or delicacy. Our results clearly demonstrate that the interaction motions and interacting objects are highly correlated and indeed relative object latent properties can be inferred from the 3D skeleton sequences alone, leading to new synthesis possibilities for human interaction motions. Dataset will be available at http://vcc.szu.edu.cn/research/2020/IT.
△ Less
Submitted 20 August, 2020;
originally announced August 2020.
-
A search for solar axions and anomalous neutrino magnetic moment with the complete PandaX-II data
Authors:
Xiaopeng Zhou,
Xinning Zeng,
Xuyang Ning,
Abdusalam Abdukerim,
Wei Chen,
Xun Chen,
Yunhua Chen,
Chen Cheng,
Xiangyi Cui,
Yingjie Fan,
Deqing Fang,
Changbo Fu,
Mengting Fu,
Lisheng Geng,
Karl Giboni,
Linhui Gu,
Xuyuan Guo,
Ke Han,
Changda He,
Di Huang,
Yan Huang,
Yanlin Huang,
Zhou Huang,
Xiangdong Ji,
Yonglin Ju
, et al. (41 additional authors not shown)
Abstract:
We report a search for new physics signals using the low energy electron recoil events in the complete data set from PandaX-II, in light of the recent event excess reported by XENON1T. The data correspond to a total exposure of 100.7 ton-day with liquid xenon. With robust estimates of the dominant background spectra, we perform sensitive searches on solar axions and neutrinos with enhanced magneti…
▽ More
We report a search for new physics signals using the low energy electron recoil events in the complete data set from PandaX-II, in light of the recent event excess reported by XENON1T. The data correspond to a total exposure of 100.7 ton-day with liquid xenon. With robust estimates of the dominant background spectra, we perform sensitive searches on solar axions and neutrinos with enhanced magnetic moment. We find that the axion-electron coupling $g_{Ae}<4.6\times 10^{-12}$ for an axion mass less than $\rm 0.1~keV/c^2$ and the neutrino magnetic moment $μ_ν<4.9\times 10^{-11}μ_{B}$ at 90% confidence level. The observed excess from XENON1T is within our experimental constraints.
△ Less
Submitted 23 November, 2021; v1 submitted 14 August, 2020;
originally announced August 2020.
-
Results of Dark Matter Search using the Full PandaX-II Exposure
Authors:
Qiuhong Wang,
Abdusalam Abdukerim,
Wei Chen,
Xun Chen,
Yunhua Chen,
Chen Cheng,
Xiangyi Cui,
Yingjie Fan,
Deqing Fang,
Changbo Fu,
Mengting Fu,
Lisheng Geng,
Karl Giboni,
Linhui Gu,
Xuyuan Guo,
Ke Han,
Changda He,
Di Huang,
Yan Huang,
Yanlin Huang,
Zhou Huang,
Xiangdong Ji,
Yonglin Ju,
Shuaijie Li,
Huaxuan Liu
, et al. (40 additional authors not shown)
Abstract:
We report the dark matter search results obtained using the full 132 ton$\cdot$day exposure of the PandaX-II experiment, including all data from March 2016 to August 2018. No significant excess of events is identified above the expected background. Upper limits are set on the spin-independent dark matter-nucleon interactions. The lowest 90% confidence level exclusion on the spin-independent cross…
▽ More
We report the dark matter search results obtained using the full 132 ton$\cdot$day exposure of the PandaX-II experiment, including all data from March 2016 to August 2018. No significant excess of events is identified above the expected background. Upper limits are set on the spin-independent dark matter-nucleon interactions. The lowest 90% confidence level exclusion on the spin-independent cross section is $2.2\times 10^{-46}$ cm$^2$ at a WIMP mass of 30 GeV/$c^2$.
△ Less
Submitted 1 January, 2021; v1 submitted 30 July, 2020;
originally announced July 2020.
-
Site Mixing for Engineering Magnetic Topological Insulators
Authors:
Yaohua Liu,
Lin-Lin Wang,
Qiang Zheng,
Zengle Huang,
** Wang,
Miaofang Chi,
Yan Wu,
Bryan C. Chakoumakos,
Michael A. McGuire,
Brian C. Sales,
Weida Wu,
Jiaqiang Yan
Abstract:
The van der Waals compound, MnBi$_2$Te$_4$, is the first intrinsic magnetic topological insulator, providing a materials platform for exploring exotic quantum phenomena such as the axion insulator state and the quantum anomalous Hall effect. However, intrinsic structural imperfections lead to bulk conductivity, and the roles of magnetic defects are still unknown. With higher concentrations of same…
▽ More
The van der Waals compound, MnBi$_2$Te$_4$, is the first intrinsic magnetic topological insulator, providing a materials platform for exploring exotic quantum phenomena such as the axion insulator state and the quantum anomalous Hall effect. However, intrinsic structural imperfections lead to bulk conductivity, and the roles of magnetic defects are still unknown. With higher concentrations of same types of magnetic defects, the isostructural compound MnSb$_2$Te$_4$ is a better model system for a systematic investigation of the connections among magnetic, topology and lattice defects. In this work, the impact of antisite defects on the magnetism and electronic structure is studied in MnSb$_2$Te$_4$. Mn-Sb site mixing leads to complex magnetic structures and tunes the interlayer magnetic coupling between antiferromagnetic and ferromagnetic. The detailed nonstoichiometry and site-mixing of MnSb$_2$Te$_4$ crystals depend on the growth parameters, which can lead to $\approx$40\% of Mn sites occupied by Sb and $\approx$15\% of Sb sites by Mn in as-grown crystals. Single crystal neutron diffraction and electron microscopy studies show nearly random distribution of the antisite defects. Band structure calculations suggest that the Mn-Sb site-mixing favors a FM interlayer coupling, consistent with experimental observation, but is detrimental to the band inversion required for a nontrivial topology. Our results suggest a long range magnetic order of Mn ions sitting on Bi sites in MnBi$_2$Te$_4$. The effects of site mixing should be considered in all layered heterostructures that consist of alternating magnetic and topological layers, including the entire family of MnTe(Bi$_2$Te$_3$)$_n$, its Sb analogs and their solid solution.
△ Less
Submitted 8 April, 2021; v1 submitted 23 July, 2020;
originally announced July 2020.
-
DWMD: Dimensional Weighted Orderwise Moment Discrepancy for Domain-specific Hidden Representation Matching
Authors:
Rongzhe Wei,
Fa Zhang,
Bo Dong,
Qinghua Zheng
Abstract:
Knowledge transfer from a source domain to a different but semantically related target domain has long been an important topic in the context of unsupervised domain adaptation (UDA). A key challenge in this field is establishing a metric that can exactly measure the data distribution discrepancy between two homogeneous domains and adopt it in distribution alignment, especially in the matching of f…
▽ More
Knowledge transfer from a source domain to a different but semantically related target domain has long been an important topic in the context of unsupervised domain adaptation (UDA). A key challenge in this field is establishing a metric that can exactly measure the data distribution discrepancy between two homogeneous domains and adopt it in distribution alignment, especially in the matching of feature representations in the hidden activation space. Existing distribution matching approaches can be interpreted as failing to either explicitly orderwise align higher-order moments or satisfy the prerequisite of certain assumptions in practical uses. We propose a novel moment-based probability distribution metric termed dimensional weighted orderwise moment discrepancy (DWMD) for feature representation matching in the UDA scenario. Our metric function takes advantage of a series for high-order moment alignment, and we theoretically prove that our DWMD metric function is error-free, which means that it can strictly reflect the distribution differences between domains and is valid without any feature distribution assumption. In addition, since the discrepancies between probability distributions in each feature dimension are different, dimensional weighting is considered in our function. We further calculate the error bound of the empirical estimate of the DWMD metric in practical applications. Comprehensive experiments on benchmark datasets illustrate that our method yields state-of-the-art distribution metrics.
△ Less
Submitted 17 July, 2020;
originally announced July 2020.
-
Bidirectional Loss Function for Label Enhancement and Distribution Learning
Authors:
Xinyuan Liu,
Jihua Zhu,
Qinghai Zheng,
Zhongyu Li,
Ruixin Liu,
Jun Wang
Abstract:
Label distribution learning (LDL) is an interpretable and general learning paradigm that has been applied in many real-world applications. In contrast to the simple logical vector in single-label learning (SLL) and multi-label learning (MLL), LDL assigns labels with a description degree to each instance. In practice, two challenges exist in LDL, namely, how to address the dimensional gap problem d…
▽ More
Label distribution learning (LDL) is an interpretable and general learning paradigm that has been applied in many real-world applications. In contrast to the simple logical vector in single-label learning (SLL) and multi-label learning (MLL), LDL assigns labels with a description degree to each instance. In practice, two challenges exist in LDL, namely, how to address the dimensional gap problem during the learning process of LDL and how to exactly recover label distributions from existing logical labels, i.e., Label Enhancement (LE). For most existing LDL and LE algorithms, the fact that the dimension of the input matrix is much higher than that of the output one is alway ignored and it typically leads to the dimensional reduction owing to the unidirectional projection. The valuable information hidden in the feature space is lost during the map** process. To this end, this study considers bidirectional projections function which can be applied in LE and LDL problems simultaneously. More specifically, this novel loss function not only considers the map** errors generated from the projection of the input space into the output one but also accounts for the reconstruction errors generated from the projection of the output space back to the input one. This loss function aims to potentially reconstruct the input data from the output data. Therefore, it is expected to obtain more accurate results. Finally, experiments on several real-world datasets are carried out to demonstrate the superiority of the proposed method for both LE and LDL.
△ Less
Submitted 6 July, 2020;
originally announced July 2020.
-
Optimization of the JUNO liquid scintillator composition using a Daya Bay antineutrino detector
Authors:
Daya Bay,
JUNO collaborations,
:,
A. Abusleme,
T. Adam,
S. Ahmad,
S. Aiello,
M. Akram,
N. Ali,
F. P. An,
G. P. An,
Q. An,
G. Andronico,
N. Anfimov,
V. Antonelli,
T. Antoshkina,
B. Asavapibhop,
J. P. A. M. de André,
A. Babic,
A. B. Balantekin,
W. Baldini,
M. Baldoncini,
H. R. Band,
A. Barresi,
E. Baussan
, et al. (642 additional authors not shown)
Abstract:
To maximize the light yield of the liquid scintillator (LS) for the Jiangmen Underground Neutrino Observatory (JUNO), a 20 t LS sample was produced in a pilot plant at Daya Bay. The optical properties of the new LS in various compositions were studied by replacing the gadolinium-loaded LS in one antineutrino detector. The concentrations of the fluor, PPO, and the wavelength shifter, bis-MSB, were…
▽ More
To maximize the light yield of the liquid scintillator (LS) for the Jiangmen Underground Neutrino Observatory (JUNO), a 20 t LS sample was produced in a pilot plant at Daya Bay. The optical properties of the new LS in various compositions were studied by replacing the gadolinium-loaded LS in one antineutrino detector. The concentrations of the fluor, PPO, and the wavelength shifter, bis-MSB, were increased in 12 steps from 0.5 g/L and <0.01 mg/L to 4 g/L and 13 mg/L, respectively. The numbers of total detected photoelectrons suggest that, with the optically purified solvent, the bis-MSB concentration does not need to be more than 4 mg/L. To bridge the one order of magnitude in the detector size difference between Daya Bay and JUNO, the Daya Bay data were used to tune the parameters of a newly developed optical model. Then, the model and tuned parameters were used in the JUNO simulation. This enabled to determine the optimal composition for the JUNO LS: purified solvent LAB with 2.5 g/L PPO, and 1 to 4 mg/L bis-MSB.
△ Less
Submitted 1 July, 2020;
originally announced July 2020.
-
Internal Calibration of the PandaX-II Detector with Radon Gaseous Sources
Authors:
Wenbo Ma,
Abdusalam Abdukerim,
Zihao Bo,
Wei Chen,
Xun Chen,
Yunhua Chen,
Chen Cheng,
Xiangyi Cui,
Yingjie Fan,
Deqing Fang,
Changbo Fu,
Mengting Fu,
Lisheng Geng,
Karl Giboni,
Linhui Gu,
Xuyuan Guo,
Ke Han,
Changda He,
Shengming He,
Di Huang,
Yan Huang,
Yanlin Huang,
Zhou Huang,
Xiangdong Ji,
Yonglin Ju
, et al. (43 additional authors not shown)
Abstract:
We have developed a low-energy electron recoil (ER) calibration method with $^{220}$Rn for the PandaX-II detector. $^{220}$Rn, emanated from natural thorium compounds, was fed into the detector through the xenon purification system. From 2017 to 2019, we performed three dedicated calibration campaigns with different radon sources. We studied the detector response to $α$, $β$, and $γ$ particles wit…
▽ More
We have developed a low-energy electron recoil (ER) calibration method with $^{220}$Rn for the PandaX-II detector. $^{220}$Rn, emanated from natural thorium compounds, was fed into the detector through the xenon purification system. From 2017 to 2019, we performed three dedicated calibration campaigns with different radon sources. We studied the detector response to $α$, $β$, and $γ$ particles with focus on low energy ER events. During the runs in 2017 and 2018, the amount of radioactivity of $^{222}$Rn were on the order of 1\% of that of $^{220}$Rn and thorium particulate contamination was negligible, especially in 2018. We also measured the background contribution from $^{214}$Pb for the first time in PandaX-II with the help from a $^{222}$Rn injection. Calibration strategy with $^{220}$Rn and $^{222}$Rn will be implemented in the upcoming PandaX-4T experiment and can be useful for other xenon-based detectors as well.
△ Less
Submitted 4 January, 2021; v1 submitted 16 June, 2020;
originally announced June 2020.
-
Near-Optimal Confidence Sequences for Bounded Random Variables
Authors:
Arun Kumar Kuchibhotla,
Qinqing Zheng
Abstract:
Many inference problems, such as sequential decision problems like A/B testing, adaptive sampling schemes like bandit selection, are often online in nature. The fundamental problem for online inference is to provide a sequence of confidence intervals that are valid uniformly over the growing-into-infinity sample sizes. To address this question, we provide a near-optimal confidence sequence for bou…
▽ More
Many inference problems, such as sequential decision problems like A/B testing, adaptive sampling schemes like bandit selection, are often online in nature. The fundamental problem for online inference is to provide a sequence of confidence intervals that are valid uniformly over the growing-into-infinity sample sizes. To address this question, we provide a near-optimal confidence sequence for bounded random variables by utilizing Bentkus' concentration results. We show that it improves on the existing approaches that use the Cram{é}r-Chernoff technique such as the Hoeffding, Bernstein, and Bennett inequalities. The resulting confidence sequence is confirmed to be favorable in both synthetic coverage problems and an application to adaptive stop** algorithms.
△ Less
Submitted 3 June, 2021; v1 submitted 8 June, 2020;
originally announced June 2020.
-
Mitigating Advanced Adversarial Attacks with More Advanced Gradient Obfuscation Techniques
Authors:
Han Qiu,
Yi Zeng,
Qinkai Zheng,
Tianwei Zhang,
Meikang Qiu,
Gerard Memmi
Abstract:
Deep Neural Networks (DNNs) are well-known to be vulnerable to Adversarial Examples (AEs). A large amount of efforts have been spent to launch and heat the arms race between the attackers and defenders. Recently, advanced gradient-based attack techniques were proposed (e.g., BPDA and EOT), which have defeated a considerable number of existing defense methods. Up to today, there are still no satisf…
▽ More
Deep Neural Networks (DNNs) are well-known to be vulnerable to Adversarial Examples (AEs). A large amount of efforts have been spent to launch and heat the arms race between the attackers and defenders. Recently, advanced gradient-based attack techniques were proposed (e.g., BPDA and EOT), which have defeated a considerable number of existing defense methods. Up to today, there are still no satisfactory solutions that can effectively and efficiently defend against those attacks.
In this paper, we make a steady step towards mitigating those advanced gradient-based attacks with two major contributions. First, we perform an in-depth analysis about the root causes of those attacks, and propose four properties that can break the fundamental assumptions of those attacks. Second, we identify a set of operations that can meet those properties. By integrating these operations, we design two preprocessing functions that can invalidate these powerful attacks. Extensive evaluations indicate that our solutions can effectively mitigate all existing standard and advanced attack techniques, and beat 11 state-of-the-art defense solutions published in top-tier conferences over the past 2 years. The defender can employ our solutions to constrain the attack success rate below 7% for the strongest attacks even the adversary has spent dozens of GPU hours.
△ Less
Submitted 27 May, 2020;
originally announced May 2020.
-
Anticipative Tracking with the Short-Term Synaptic Plasticity of Spintronic Devices
Authors:
Qi Zheng,
Yuanyuan Mi,
Xiaorui Zhu,
Zhe Yuan,
Ke Xia
Abstract:
Real-time tracking of high-speed objects in cognitive tasks is challenging in the present artificial intelligence techniques because the data processing and computation are time-consuming resulting in impeditive time delays. A brain-inspired continuous attractor neural network (CANN) can be used to track quickly moving targets, where the time delays are intrinsically compensated if the dynamical s…
▽ More
Real-time tracking of high-speed objects in cognitive tasks is challenging in the present artificial intelligence techniques because the data processing and computation are time-consuming resulting in impeditive time delays. A brain-inspired continuous attractor neural network (CANN) can be used to track quickly moving targets, where the time delays are intrinsically compensated if the dynamical synapses in the network have the short-term plasticity. Here, we show that synapses with short-term depression can be realized by a magnetic tunnel junction, which perfectly reproduces the dynamics of the synaptic weight in a widely applied mathematical model. Then, these dynamical synapses are incorporated into one-dimensional and two-dimensional CANNs, which are demonstrated to have the ability to predict a moving object via micromagnetic simulations. This portable spintronics-based hardware for neuromorphic computing needs no training and is therefore very promising for the tracking technology for moving targets.
△ Less
Submitted 14 October, 2020; v1 submitted 5 May, 2020;
originally announced May 2020.
-
Scalable Attack on Graph Data by Injecting Vicious Nodes
Authors:
Jihong Wang,
Minnan Luo,
Fnu Suya,
Jundong Li,
Zijiang Yang,
Qinghua Zheng
Abstract:
Recent studies have shown that graph convolution networks (GCNs) are vulnerable to carefully designed attacks, which aim to cause misclassification of a specific node on the graph with unnoticeable perturbations. However, a vast majority of existing works cannot handle large-scale graphs because of their high time complexity. Additionally, existing works mainly focus on manipulating existing nodes…
▽ More
Recent studies have shown that graph convolution networks (GCNs) are vulnerable to carefully designed attacks, which aim to cause misclassification of a specific node on the graph with unnoticeable perturbations. However, a vast majority of existing works cannot handle large-scale graphs because of their high time complexity. Additionally, existing works mainly focus on manipulating existing nodes on the graph, while in practice, attackers usually do not have the privilege to modify information of existing nodes. In this paper, we develop a more scalable framework named Approximate Fast Gradient Sign Method (AFGSM) which considers a more practical attack scenario where adversaries can only inject new vicious nodes to the graph while having no control over the original graph. Methodologically, we provide an approximation strategy to linearize the model we attack and then derive an approximate closed-from solution with a lower time cost. To have a fair comparison with existing attack methods that manipulate the original graph, we adapt them to the new attack scenario by injecting vicious nodes. Empirical experimental results show that our proposed attack method can significantly reduce the classification accuracy of GCNs and is much faster than existing methods without jeopardizing the attack performance.
△ Less
Submitted 21 April, 2020;
originally announced April 2020.
-
Response to Comment on "Low-frequency lattice phonons in halide perovskites explain high defect tolerance toward electron-hole recombination"
Authors:
Weibin Chu,
Qi**g Zheng,
Oleg V. Prezhdo,
** Zhao,
Wissam A. Saidi
Abstract:
Recently we proposed that defect tolerance in the hybrid perovskites is due to their characteristic low-frequency lattice phonon modes that decrease the non-adiabatic coupling and weaken the overlap between the free carrier and defect states [Sci. Adv. 6 7, eaaw7453 (2020)]. Kim and Walsh disagree with the interpretation and argue that there are flaws in our employed methodology. Herein we address…
▽ More
Recently we proposed that defect tolerance in the hybrid perovskites is due to their characteristic low-frequency lattice phonon modes that decrease the non-adiabatic coupling and weaken the overlap between the free carrier and defect states [Sci. Adv. 6 7, eaaw7453 (2020)]. Kim and Walsh disagree with the interpretation and argue that there are flaws in our employed methodology. Herein we address their concerns and show that their conclusions are not valid due to misunderstandings of nonadiabatic transition.
△ Less
Submitted 26 April, 2020;
originally announced April 2020.
-
Consistent and Complementary Graph Regularized Multi-view Subspace Clustering
Authors:
Qinghai Zheng,
Jihua Zhu,
Zhongyu Li,
Shanmin Pang,
Jun Wang,
Lei Chen
Abstract:
This study investigates the problem of multi-view clustering, where multiple views contain consistent information and each view also includes complementary information. Exploration of all information is crucial for good multi-view clustering. However, most traditional methods blindly or crudely combine multiple views for clustering and are unable to fully exploit the valuable information. Therefor…
▽ More
This study investigates the problem of multi-view clustering, where multiple views contain consistent information and each view also includes complementary information. Exploration of all information is crucial for good multi-view clustering. However, most traditional methods blindly or crudely combine multiple views for clustering and are unable to fully exploit the valuable information. Therefore, we propose a method that involves consistent and complementary graph-regularized multi-view subspace clustering (GRMSC), which simultaneously integrates a consistent graph regularizer with a complementary graph regularizer into the objective function. In particular, the consistent graph regularizer learns the intrinsic affinity relationship of data points shared by all views. The complementary graph regularizer investigates the specific information of multiple views. It is noteworthy that the consistent and complementary regularizers are formulated by two different graphs constructed from the first-order proximity and second-order proximity of multiple views, respectively. The objective function is optimized by the augmented Lagrangian multiplier method in order to achieve multi-view clustering. Extensive experiments on six benchmark datasets serve to validate the effectiveness of the proposed method over other state-of-the-art multi-view clustering methods.
△ Less
Submitted 6 April, 2020;
originally announced April 2020.
-
Generalized Label Enhancement with Sample Correlations
Authors:
Qinghai Zheng,
Jihua Zhu,
Haoyu Tang,
Xinyuan Liu,
Zhongyu Li,
Huimin Lu
Abstract:
Recently, label distribution learning (LDL) has drawn much attention in machine learning, where LDL model is learned from labelel instances. Different from single-label and multi-label annotations, label distributions describe the instance by multiple labels with different intensities and accommodate to more general scenes. Since most existing machine learning datasets merely provide logical label…
▽ More
Recently, label distribution learning (LDL) has drawn much attention in machine learning, where LDL model is learned from labelel instances. Different from single-label and multi-label annotations, label distributions describe the instance by multiple labels with different intensities and accommodate to more general scenes. Since most existing machine learning datasets merely provide logical labels, label distributions are unavailable in many real-world applications. To handle this problem, we propose two novel label enhancement methods, i.e., Label Enhancement with Sample Correlations (LESC) and generalized Label Enhancement with Sample Correlations (gLESC). More specifically, LESC employs a low-rank representation of samples in the feature space, and gLESC leverages a tensor multi-rank minimization to further investigate the sample correlations in both the feature space and label space. Benefitting from the sample correlations, the proposed methods can boost the performance of label enhancement. Extensive experiments on 14 benchmark datasets demonstrate the effectiveness and superiority of our methods.
△ Less
Submitted 11 April, 2021; v1 submitted 6 April, 2020;
originally announced April 2020.
-
Investigating Image Applications Based on Spatial-Frequency Transform and Deep Learning Techniques
Authors:
Qinkai Zheng,
Han Qiu,
Gerard Memmi,
Isabelle Bloch
Abstract:
This is the report for the PRIM project in Telecom Paris. This report is about applications based on spatial-frequency transform and deep learning techniques. In this report, there are two main works. The first work is about the enhanced JPEG compression method based on deep learning. we propose a novel method to highly enhance the JPEG compression by transmitting fewer image data at the sender's…
▽ More
This is the report for the PRIM project in Telecom Paris. This report is about applications based on spatial-frequency transform and deep learning techniques. In this report, there are two main works. The first work is about the enhanced JPEG compression method based on deep learning. we propose a novel method to highly enhance the JPEG compression by transmitting fewer image data at the sender's end. At the receiver's end, we propose a DC recovery algorithm together with the deep residual learning framework to recover images with high quality. The second work is about adversarial examples defenses based on signal processing. We propose the wavelet extension method to extend image data features, which makes it more difficult to generate adversarial examples. We further adopt wavelet denoising to reduce the influence of the adversarial perturbations. With intensive experiments, we demonstrate that both works are effective in their application scenarios.
△ Less
Submitted 20 March, 2020;
originally announced April 2020.
-
Searching for Dark Matter Signals from Local Dwarf Spheroidal Galaxies at Low Radio Frequencies in the GLEAM Survey
Authors:
Robin H. W. Cook,
Nick Seymour,
Kristine Spekkens,
Natasha Hurley-Walker,
Paul J. Hancock,
Martin E. Bell,
Joseph R. Callingham,
Bi-Qing For,
Thomas M. O. Franzen,
Bryan M. Gaensler,
Luke Hindson,
Carole A. Jackson,
Melanie Johnston-Hollitt,
Anna D. Kapińska,
John Morgan,
André R. Offringa,
Pietro Procopio,
Lister Staveley-Smith,
Randall B. Wayth,
Chen Wu,
Qian Zheng
Abstract:
The search for emission from weakly interacting massive particle (WIMP) dark matter annihilation and decay has become a multi-pronged area of research not only targeting a diverse selection of astrophysical objects, but also taking advantage of the entire electromagnetic spectrum. The decay of WIMP particles into standard model particles has been suggested as a possible channel for synchrotron emi…
▽ More
The search for emission from weakly interacting massive particle (WIMP) dark matter annihilation and decay has become a multi-pronged area of research not only targeting a diverse selection of astrophysical objects, but also taking advantage of the entire electromagnetic spectrum. The decay of WIMP particles into standard model particles has been suggested as a possible channel for synchrotron emission to be detected at low radio frequencies. Here, we present the stacking analysis of a sample of 33 dwarf spheroidal (dSph) galaxies with low-frequency (72 - 231 MHz) radio images from the GaLactic and Extragalactic All-sky Murchison Widefield Array (GLEAM) survey. We produce radial surface brightness profiles of images centred upon each dSph galaxy with background radio sources masked. We remove ten fields from the stacking due to contamination from either poorly subtracted, bright radio sources or strong background gradients across the field. The remaining 23 dSph galaxies are stacked in an attempt to obtain a statistical detection of any WIMP-induced synchrotron emission in these systems. We find that the stacked radial brightness profile does not exhibit a statistically significant detection above the 95% confidence level of $\sim$1.5 mJy beam$^{-1}$. This novel technique shows the potential of using low-frequency radio images to constrain fundamental properties of particle dark matter.
△ Less
Submitted 13 March, 2020;
originally announced March 2020.
-
Sharp Composition Bounds for Gaussian Differential Privacy via Edgeworth Expansion
Authors:
Qinqing Zheng,
**shuo Dong,
Qi Long,
Weijie J. Su
Abstract:
Datasets containing sensitive information are often sequentially analyzed by many algorithms. This raises a fundamental question in differential privacy regarding how the overall privacy bound degrades under composition. To address this question, we introduce a family of analytical and sharp privacy bounds under composition using the Edgeworth expansion in the framework of the recently proposed f-…
▽ More
Datasets containing sensitive information are often sequentially analyzed by many algorithms. This raises a fundamental question in differential privacy regarding how the overall privacy bound degrades under composition. To address this question, we introduce a family of analytical and sharp privacy bounds under composition using the Edgeworth expansion in the framework of the recently proposed f-differential privacy. In contrast to the existing composition theorems using the central limit theorem, our new privacy bounds under composition gain improved tightness by leveraging the refined approximation accuracy of the Edgeworth expansion. Our approach is easy to implement and computationally efficient for any number of compositions. The superiority of these new bounds is confirmed by an asymptotic error analysis and an application to quantifying the overall privacy guarantees of noisy stochastic gradient descent used in training private deep neural networks.
△ Less
Submitted 25 March, 2020; v1 submitted 9 March, 2020;
originally announced March 2020.
-
ShadowSync: Performing Synchronization in the Background for Highly Scalable Distributed Training
Authors:
Qinqing Zheng,
Bor-Yiing Su,
Jiyan Yang,
Alisson Azzolini,
Qiang Wu,
Ou **,
Shri Karandikar,
Hagay Lupesko,
Liang Xiong,
Eric Zhou
Abstract:
Recommendation systems are often trained with a tremendous amount of data, and distributed training is the workhorse to shorten the training time. While the training throughput can be increased by simply adding more workers, it is also increasingly challenging to preserve the model quality. In this paper, we present \shadowsync, a distributed framework specifically tailored to modern scale recomme…
▽ More
Recommendation systems are often trained with a tremendous amount of data, and distributed training is the workhorse to shorten the training time. While the training throughput can be increased by simply adding more workers, it is also increasingly challenging to preserve the model quality. In this paper, we present \shadowsync, a distributed framework specifically tailored to modern scale recommendation system training. In contrast to previous works where synchronization happens as part of the training process, \shadowsync separates the synchronization from training and runs it in the background. Such isolation significantly reduces the synchronization overhead and increases the synchronization frequency, so that we are able to obtain both high throughput and excellent model quality when training at scale. The superiority of our procedure is confirmed by experiments on training deep neural networks for click-through-rate prediction tasks. Our framework is capable to express data parallelism and/or model parallelism, generic to host various types of synchronization algorithms, and readily applicable to large scale problems in other areas.
△ Less
Submitted 23 February, 2021; v1 submitted 6 March, 2020;
originally announced March 2020.
-
Self-Supervised Graph Representation Learning via Global Context Prediction
Authors:
Zhen Peng,
Yixiang Dong,
Minnan Luo,
Xiao-Ming Wu,
Qinghua Zheng
Abstract:
To take full advantage of fast-growing unlabeled networked data, this paper introduces a novel self-supervised strategy for graph representation learning by exploiting natural supervision provided by the data itself. Inspired by human social behavior, we assume that the global context of each node is composed of all nodes in the graph since two arbitrary entities in a connected network could inter…
▽ More
To take full advantage of fast-growing unlabeled networked data, this paper introduces a novel self-supervised strategy for graph representation learning by exploiting natural supervision provided by the data itself. Inspired by human social behavior, we assume that the global context of each node is composed of all nodes in the graph since two arbitrary entities in a connected network could interact with each other via paths of varying length. Based on this, we investigate whether the global context can be a source of free and effective supervisory signals for learning useful node representations. Specifically, we randomly select pairs of nodes in a graph and train a well-designed neural net to predict the contextual position of one node relative to the other. Our underlying hypothesis is that the representations learned from such within-graph context would capture the global topology of the graph and finely characterize the similarity and differentiation between nodes, which is conducive to various downstream learning tasks. Extensive benchmark experiments including node classification, clustering, and link prediction demonstrate that our approach outperforms many state-of-the-art unsupervised methods and sometimes even exceeds the performance of supervised counterparts.
△ Less
Submitted 3 March, 2020;
originally announced March 2020.
-
Disorder dependent spin-orbit torques in L10 FePt single layer
Authors:
S. Q. Zheng,
K. K. Meng,
Q. B. Liu,
J. Miao,
X. G. Xu,
Y. Jiang
Abstract:
We report spin-orbit torques (SOT) in L10-ordered perpendicularly magnetized FePt single layer, which is significantly influenced by disorder. Recently, self-induced SOT in L10-FePt single layer has been investigated, which is ascribed to the composition gradient along the film normal direction. However, the determined mechanisms for magnetization switching have not been fully studied. With varyin…
▽ More
We report spin-orbit torques (SOT) in L10-ordered perpendicularly magnetized FePt single layer, which is significantly influenced by disorder. Recently, self-induced SOT in L10-FePt single layer has been investigated, which is ascribed to the composition gradient along the film normal direction. However, the determined mechanisms for magnetization switching have not been fully studied. With varying growth temperatures, we have prepared FePt single layers with same thickness (3 nm) but with different disordering. We have found that nearly full magnetization switching only happens in more disordered films, and the magnetization switching ratio becomes smaller as increasing L10 ordering. The method for deriving effective spin torque fields in the previous studies cannot fully explain the spin current generation and self-induced SOT in L10-FePt single layer. Combined with Magneto-Optical Kerr Effect microscopy and anomalous Hall effect measurements, we concluded that the disorder should determine the formation of domain walls, as well as the spin current generation.
△ Less
Submitted 9 December, 2020; v1 submitted 28 February, 2020;
originally announced March 2020.