-
DeepSeer: Interactive RNN Explanation and Debugging via State Abstraction
Authors:
Zhijie Wang,
Yuheng Huang,
Da Song,
Lei Ma,
Tianyi Zhang
Abstract:
Recurrent Neural Networks (RNNs) have been widely used in Natural Language Processing (NLP) tasks given its superior performance on processing sequential data. However, it is challenging to interpret and debug RNNs due to the inherent complexity and the lack of transparency of RNNs. While many explainable AI (XAI) techniques have been proposed for RNNs, most of them only support local explanations…
▽ More
Recurrent Neural Networks (RNNs) have been widely used in Natural Language Processing (NLP) tasks given its superior performance on processing sequential data. However, it is challenging to interpret and debug RNNs due to the inherent complexity and the lack of transparency of RNNs. While many explainable AI (XAI) techniques have been proposed for RNNs, most of them only support local explanations rather than global explanations. In this paper, we present DeepSeer, an interactive system that provides both global and local explanations of RNN behavior in multiple tightly-coordinated views for model understanding and debugging. The core of DeepSeer is a state abstraction method that bundles semantically similar hidden states in an RNN model and abstracts the model as a finite state machine. Users can explore the global model behavior by inspecting text patterns associated with each state and the transitions between states. Users can also dive into individual predictions by inspecting the state trace and intermediate prediction results of a given input. A between-subjects user study with 28 participants shows that, compared with a popular XAI technique, LIME, participants using DeepSeer made a deeper and more comprehensive assessment of RNN model behavior, identified the root causes of incorrect predictions more accurately, and came up with more actionable plans to improve the model performance.
△ Less
Submitted 2 March, 2023;
originally announced March 2023.
-
Unique Identification of 50,000+ Virtual Reality Users from Head & Hand Motion Data
Authors:
Vivek Nair,
Wenbo Guo,
Justus Mattern,
Rui Wang,
James F. O'Brien,
Louis Rosenberg,
Dawn Song
Abstract:
With the recent explosive growth of interest and investment in virtual reality (VR) and the so-called "metaverse," public attention has rightly shifted toward the unique security and privacy threats that these platforms may pose. While it has long been known that people reveal information about themselves via their motion, the extent to which this makes an individual globally identifiable within v…
▽ More
With the recent explosive growth of interest and investment in virtual reality (VR) and the so-called "metaverse," public attention has rightly shifted toward the unique security and privacy threats that these platforms may pose. While it has long been known that people reveal information about themselves via their motion, the extent to which this makes an individual globally identifiable within virtual reality has not yet been widely understood. In this study, we show that a large number of real VR users (N=55,541) can be uniquely and reliably identified across multiple sessions using just their head and hand motion relative to virtual objects. After training a classification model on 5 minutes of data per person, a user can be uniquely identified amongst the entire pool of 50,000+ with 94.33% accuracy from 100 seconds of motion, and with 73.20% accuracy from just 10 seconds of motion. This work is the first to truly demonstrate the extent to which biomechanics may serve as a unique identifier in VR, on par with widely used biometrics such as facial or fingerprint recognition.
△ Less
Submitted 17 February, 2023;
originally announced February 2023.
-
Dialogue State Distillation Network with Inter-slot Contrastive Learning for Dialogue State Tracking
Authors:
**g Xu,
Dandan Song,
Chong Liu,
Siu Cheung Hui,
Fei Li,
Qiang Ju,
Xiaonan He,
Jian Xie
Abstract:
In task-oriented dialogue systems, Dialogue State Tracking (DST) aims to extract users' intentions from the dialogue history. Currently, most existing approaches suffer from error propagation and are unable to dynamically select relevant information when utilizing previous dialogue states. Moreover, the relations between the updates of different slots provide vital clues for DST. However, the exis…
▽ More
In task-oriented dialogue systems, Dialogue State Tracking (DST) aims to extract users' intentions from the dialogue history. Currently, most existing approaches suffer from error propagation and are unable to dynamically select relevant information when utilizing previous dialogue states. Moreover, the relations between the updates of different slots provide vital clues for DST. However, the existing approaches rely only on predefined graphs to indirectly capture the relations. In this paper, we propose a Dialogue State Distillation Network (DSDN) to utilize relevant information of previous dialogue states and migrate the gap of utilization between training and testing. Thus, it can dynamically exploit previous dialogue states and avoid introducing error propagation simultaneously. Further, we propose an inter-slot contrastive learning loss to effectively capture the slot co-update relations from dialogue context. Experiments are conducted on the widely used MultiWOZ 2.0 and MultiWOZ 2.1 datasets. The experimental results show that our proposed model achieves the state-of-the-art performance for DST.
△ Less
Submitted 7 March, 2023; v1 submitted 16 February, 2023;
originally announced February 2023.
-
Evidence for the Operation of the Hanle and Magneto-Optical Effects in the Scattering Polarization Signals Observed by CLASP2 Across the Mg II h and k Lines
Authors:
Ryohko Ishikawa,
Javier Trujillo Bueno,
Ernest Alsina Ballester,
Luca Belluzzi,
Tanausú del Pino Alemán,
David E. McKenzie,
Frédéric Auchère,
Ken Kobayashi,
Takenori J. Okamoto,
Laurel A. Rachmeler,
Donguk Song
Abstract:
Radiative transfer investigations of the solar Mg II h and k resonance lines around 280~nm showed that, while their circular polarization (Stokes V) signals arise from the Zeeman effect, the linear polarization profiles (Stokes Q and U) are dominated by the scattering of anisotropic radiation and the Hanle and magneto-optical (MO) effects. Using the unprecedented observations of the Mg II and Mn I…
▽ More
Radiative transfer investigations of the solar Mg II h and k resonance lines around 280~nm showed that, while their circular polarization (Stokes V) signals arise from the Zeeman effect, the linear polarization profiles (Stokes Q and U) are dominated by the scattering of anisotropic radiation and the Hanle and magneto-optical (MO) effects. Using the unprecedented observations of the Mg II and Mn I resonance lines obtained by the Chromospheric LAyer Spectro-Polarimeter (CLASP2), here we investigate how the linear polarization signals at different wavelengths (i.e., at the center, and at the near and far wings of the k line) vary with the longitudinal component of the magnetic field ($B_{L}$) at their approximate height of formation. The $B_{L}$ is estimated from the V signals in the aforementioned spectral lines. Particular attention is given to the following quantities that are expected to be influenced by the presence of magnetic fields through the Hanle and MO effects: the sign of the U signals, the total linear polarization amplitude ($LP$) and its direction ($χ$) with respect to a reference direction. We find that at the center and near wings of the $k$ line, the behavior of these quantities is significantly different in the observed quiet and plage regions, and that both $LP$ and $χ$ seem to depend on $B_{L}$. These observational results are indicative of the operation of the Hanle effect
△ Less
Submitted 7 February, 2023;
originally announced February 2023.
-
On Separability of Covariance in Multiway Data Analysis
Authors:
Dogyoon Song,
Alfred O. Hero
Abstract:
Multiway data analysis aims to uncover patterns in data structured as multi-indexed arrays, and the covariance of such data plays a crucial role in various machine learning applications. However, the intrinsically high dimension of multiway covariance presents significant challenges. To address these challenges, factorized covariance models have been proposed that rely on a separability assumption…
▽ More
Multiway data analysis aims to uncover patterns in data structured as multi-indexed arrays, and the covariance of such data plays a crucial role in various machine learning applications. However, the intrinsically high dimension of multiway covariance presents significant challenges. To address these challenges, factorized covariance models have been proposed that rely on a separability assumption: the multiway covariance can be accurately expressed as a sum of Kronecker products of mode-wise covariances. This paper is concerned with the accuracy of such separable models for representing multiway covariances. We reduce the question of whether a given covariance can be represented as a separable multiway covariance to an equivalent question about separability of quantum states. Based on this equivalence, we establish that generic multiway covariances tend to be not separable. Moreover, we show that determining the best separable approximation of a generic covariance is NP-hard. Our results suggest that factorized covariance models might not accurately approximate covariance, without additional assumptions ensuring separability. To balance these negative results, we propose an iterative Frank-Wolfe algorithm for computing Kronecker-separable covariance approximations with some additional side information. We establish an oracle complexity bound and empirically observe its consistent convergence to a separable limit point, often close to the ``best'' separable approximation. These results suggest that practical methods may be able to find a Kronecker-separable approximation of covariances, despite the worst-case NP hardness results.
△ Less
Submitted 4 October, 2023; v1 submitted 5 February, 2023;
originally announced February 2023.
-
Photonic realization of a generic type of graphene edge states exhibiting topological flat band
Authors:
Shiqi Xia,
Yongsheng Liang,
Liqin Tang,
Daohong Song,
**gjun Xu,
Zhigang Chen
Abstract:
Cutting a honeycomb lattice (HCL) can end up with three types of edges (zigzag, bearded and armchair), as is well known in the study of graphene edge states. Here we theoretically investigate and experimentally demonstrate a class of graphene edges, namely, the twig-shaped edges, using a photonic platform, thereby observing edge states distinctive from those observed before. Our main findings are:…
▽ More
Cutting a honeycomb lattice (HCL) can end up with three types of edges (zigzag, bearded and armchair), as is well known in the study of graphene edge states. Here we theoretically investigate and experimentally demonstrate a class of graphene edges, namely, the twig-shaped edges, using a photonic platform, thereby observing edge states distinctive from those observed before. Our main findings are: (i) the twig edge is a generic type of HCL edges complementary to the armchair edge, formed by choosing the right primitive cell rather than simple lattice cutting or Klein edge modification; (ii) the twig edge states form a complete flat band across the Brillouin zone with zero-energy degeneracy, characterized by nontrivial topological winding of the lattice Hamiltonian; (iii) the twig edge states can be elongated or compactly localized along the boundary, manifesting both flat band and topological features. Such new edge states are realized in a laser-written photonic graphene and well corroborated by numerical simulations. Our results may broaden the understanding of graphene edge states, bringing about new possibilities for wave localization in artificial Dirac-like materials.
△ Less
Submitted 3 February, 2023;
originally announced February 2023.
-
Tomography of a solar plage with the Tenerife Inversion Code
Authors:
Hao Li,
T. del Pino Alemán,
J. Trujillo Bueno,
R. Ishikawa,
E. Alsina Ballester,
David E. McKenzie,
Frédéric Auchère,
Ken Kobayashi,
Takenori J. Okamoto,
Laurel A. Rachmeler,
Donguk Song
Abstract:
We apply the Tenerife Inversion Code (TIC) to the plage spectropolarimetric observations obtained by the Chromospheric LAyer SpectroPolarimeter (CLASP2). These unprecedented data consist of full Stokes profiles in the spectral region around the Mg II h and k lines for a single slit position, with around two thirds of the 200 arcsec slit crossing a plage region and the rest crossing an enhanced net…
▽ More
We apply the Tenerife Inversion Code (TIC) to the plage spectropolarimetric observations obtained by the Chromospheric LAyer SpectroPolarimeter (CLASP2). These unprecedented data consist of full Stokes profiles in the spectral region around the Mg II h and k lines for a single slit position, with around two thirds of the 200 arcsec slit crossing a plage region and the rest crossing an enhanced network. A former analysis of these data had allowed us to infer the longitudinal component of the magnetic field by applying the weak field approximation (WFA) to the circular polarization profiles, and to assign the inferred magnetic fields to different layers of the solar atmosphere based on the results of previous theoretical radiative transfer investigations. In this work, we apply the recently developed TIC to the same data. We obtain the stratified model atmosphere that fits the intensity and circular polarization profiles at each position along the spectrograph slit and we compare our results for the longitudinal component of the magnetic field with the previously obtained WFA results, highlighting the generally good agreement in spite of the fact that the WFA is known to produce an underestimation when applied to the outer lobes of the Mg II h and k circular polarization profiles. Finally, we use the inverted model atmospheres to give a rough estimation of the energy that could be carried by Alfvèn waves propagating along the chromosphere in the plage and network regions, showing that it is sufficient to compensate the estimated energy losses in the chromosphere of solar active regions.
△ Less
Submitted 31 January, 2023; v1 submitted 30 January, 2023;
originally announced January 2023.
-
Stripe Symmetry of Short-range Charge Density Waves in Cuprate Superconductors
Authors:
Jaewon Choi,
Jiemin Li,
Abhishek Nag,
Jonathan Pelliciari,
Hannah Robarts,
Charles C. Tam,
Andrew Walters,
Stefano Agrestini,
Mirian García-Fernández,
Dongjoon Song,
Hiroshi Eisaki,
Steven Johnston,
Riccardo Comin,
Hong Ding,
Ke-** Zhou
Abstract:
The omnipresence of charge density waves (CDWs) across almost all cuprate families underpins a common organizing principle. However, a longstanding debate of whether its spatial symmetry is stripe or checkerboard remains unresolved. While CDWs in lanthanum- and yttrium-based cuprates possess a stripe symmetry, distinguishing these two scenarios has been challenging for the short-range CDW in bismu…
▽ More
The omnipresence of charge density waves (CDWs) across almost all cuprate families underpins a common organizing principle. However, a longstanding debate of whether its spatial symmetry is stripe or checkerboard remains unresolved. While CDWs in lanthanum- and yttrium-based cuprates possess a stripe symmetry, distinguishing these two scenarios has been challenging for the short-range CDW in bismuth-based cuprates. Here, we employed high-resolution resonant inelastic x-ray scattering to uncover the spatial symmetry of the CDW in Bi$_2$Sr$_{2-x}$La$_{x}$CuO$_{6+δ}$. Across a wide range of do** and temperature, anisotropic CDW peaks with elliptical shapes were found in reciprocal space. Based on Fourier transform analysis of real-space models, we interpret the results as evidence of unidirectional charge stripes, hosted by mutually 90$^\circ$-rotated anisotropic domains. Our work paves the way for a unified symmetry and microscopic description of CDW order in cuprates.
△ Less
Submitted 18 January, 2023;
originally announced January 2023.
-
SoK: Data Privacy in Virtual Reality
Authors:
Gonzalo Munilla Garrido,
Vivek Nair,
Dawn Song
Abstract:
The adoption of virtual reality (VR) technologies has rapidly gained momentum in recent years as companies around the world begin to position the so-called "metaverse" as the next major medium for accessing and interacting with the internet. While consumers have become accustomed to a degree of data harvesting on the web, the real-time nature of data sharing in the metaverse indicates that privacy…
▽ More
The adoption of virtual reality (VR) technologies has rapidly gained momentum in recent years as companies around the world begin to position the so-called "metaverse" as the next major medium for accessing and interacting with the internet. While consumers have become accustomed to a degree of data harvesting on the web, the real-time nature of data sharing in the metaverse indicates that privacy concerns are likely to be even more prevalent in the new "Web 3.0." Research into VR privacy has demonstrated that a plethora of sensitive personal information is observable by various would-be adversaries from just a few minutes of telemetry data. On the other hand, we have yet to see VR parallels for many privacy-preserving tools aimed at mitigating threats on conventional platforms. This paper aims to systematize knowledge on the landscape of VR privacy threats and countermeasures by proposing a comprehensive taxonomy of data attributes, protections, and adversaries based on the study of 68 collected publications. We complement our qualitative discussion with a statistical analysis of the risk associated with various data sources inherent to VR in consideration of the known attacks and defenses. By focusing on highlighting the clear outstanding opportunities, we hope to motivate and guide further research into this increasingly important field.
△ Less
Submitted 18 May, 2023; v1 submitted 14 January, 2023;
originally announced January 2023.
-
Text classification in ship** industry using unsupervised models and Transformer based supervised models
Authors:
Ying Xie,
Dong** Song
Abstract:
Obtaining labelled data in a particular context could be expensive and time consuming. Although different algorithms, including unsupervised learning, semi-supervised learning, self-learning have been adopted, the performance of text classification varies with context. Given the lack of labelled dataset, we proposed a novel and simple unsupervised text classification model to classify cargo conten…
▽ More
Obtaining labelled data in a particular context could be expensive and time consuming. Although different algorithms, including unsupervised learning, semi-supervised learning, self-learning have been adopted, the performance of text classification varies with context. Given the lack of labelled dataset, we proposed a novel and simple unsupervised text classification model to classify cargo content in international ship** industry using the Standard International Trade Classification (SITC) codes. Our method stems from representing words using pretrained Glove Word Embeddings and finding the most likely label using Cosine Similarity. To compare unsupervised text classification model with supervised classification, we also applied several Transformer models to classify cargo content. Due to lack of training data, the SITC numerical codes and the corresponding textual descriptions were used as training data. A small number of manually labelled cargo content data was used to evaluate the classification performances of the unsupervised classification and the Transformer based supervised classification. The comparison reveals that unsupervised classification significantly outperforms Transformer based supervised classification even after increasing the size of the training dataset by 30%. Lacking training data is a key bottleneck that prohibits deep learning models (such as Transformers) from successful practical applications. Unsupervised classification can provide an alternative efficient and effective method to classify text when there is scarce training data.
△ Less
Submitted 21 December, 2022;
originally announced December 2022.
-
Map** and manipulation of topological singularities: from photonic graphene to T-graphene
Authors:
Sihong Lei,
Shiqi Xia,
Junqian Wang,
Xiuying Liu,
Liqin Tang,
Daohong Song,
**gjun Xu,
Hrvoje Buljan,
Zhigang Chen
Abstract:
Topological singularities (TSs) in momentum space give rise to intriguing fundamental phenomena as well as unusual material properties, attracting a great deal of interest in the past decade. Recently, we have demonstrated universal momentum-to-real-space map** of TSs and pseudospin angular momentum conversion using photonic honeycomb (graphene-like) and Lieb lattices. Such map** arises from t…
▽ More
Topological singularities (TSs) in momentum space give rise to intriguing fundamental phenomena as well as unusual material properties, attracting a great deal of interest in the past decade. Recently, we have demonstrated universal momentum-to-real-space map** of TSs and pseudospin angular momentum conversion using photonic honeycomb (graphene-like) and Lieb lattices. Such map** arises from the Berry phase encircling the Dirac or Dirac-like cones, and is thus of topological origin. In this paper, we briefly present previous observations of topological charge conversion, and then we present our first theoretical analysis and experimental demonstration of TS map** in a new T-graphene lattice. Unlike other lattices, there are two coexisting but distinct TSs located at different high-symmetry points in the first Brillouin zone of T-graphene, which enables controlled topological charge conversion in the same lattice. We show active manipulation of the TS map**, turning the two TSs into vortices of different helicities, or one into a high-order vortex but the other into a quadrupole. Such TS manipulation and pseudospin-to-orbital conversion may find applications in optical communications and quantum information, and may bring insight into the study of other Dirac-like structures with multiple TSs beyond the 2D photonic platform.
△ Less
Submitted 22 December, 2022;
originally announced December 2022.
-
ThreatKG: A Threat Knowledge Graph for Automated Open-Source Cyber Threat Intelligence Gathering and Management
Authors:
Peng Gao,
Xiaoyuan Liu,
Edward Choi,
Sibo Ma,
Xinyu Yang,
Zhengjie Ji,
Zilin Zhang,
Dawn Song
Abstract:
Despite the increased adoption of open-source cyber threat intelligence (OSCTI) for acquiring knowledge about cyber threats, little effort has been made to harvest knowledge from a large number of unstructured OSCTI reports available in the wild (e.g., security articles, threat reports). These reports provide comprehensive threat knowledge in a variety of entities (e.g., IOCs, threat actors, TTPs)…
▽ More
Despite the increased adoption of open-source cyber threat intelligence (OSCTI) for acquiring knowledge about cyber threats, little effort has been made to harvest knowledge from a large number of unstructured OSCTI reports available in the wild (e.g., security articles, threat reports). These reports provide comprehensive threat knowledge in a variety of entities (e.g., IOCs, threat actors, TTPs) and relations, which, however, are hard to gather due to diverse report formats, large report quantities, and complex structures and nuances in the natural language report text.
To bridge the gap, we propose ThreatKG, a system for automated open-source cyber threat knowledge gathering and management. ThreatKG automatically collects a large number of OSCTI reports from various sources, extracts high-fidelity threat knowledge, constructs a threat knowledge graph, and updates the knowledge graph by continuously ingesting new knowledge. To address multiple challenges, ThreatKG provides: (1) a hierarchical ontology for modeling a variety of threat knowledge entities and relations; (2) an accurate deep learning-based pipeline for threat knowledge extraction; (3) a scalable and extensible system architecture for threat knowledge graph construction, persistence, updating, and exploration. Evaluations on a large number of reports demonstrate the effectiveness of ThreatKG in threat knowledge gathering and management
△ Less
Submitted 20 December, 2022;
originally announced December 2022.
-
Asynchronous Distributed Bilevel Optimization
Authors:
Yang Jiao,
Kai Yang,
Tiancheng Wu,
Dong** Song,
Chengtao Jian
Abstract:
Bilevel optimization plays an essential role in many machine learning tasks, ranging from hyperparameter optimization to meta-learning. Existing studies on bilevel optimization, however, focus on either centralized or synchronous distributed setting. The centralized bilevel optimization approaches require collecting massive amount of data to a single server, which inevitably incur significant comm…
▽ More
Bilevel optimization plays an essential role in many machine learning tasks, ranging from hyperparameter optimization to meta-learning. Existing studies on bilevel optimization, however, focus on either centralized or synchronous distributed setting. The centralized bilevel optimization approaches require collecting massive amount of data to a single server, which inevitably incur significant communication expenses and may give rise to data privacy risks. Synchronous distributed bilevel optimization algorithms, on the other hand, often face the straggler problem and will immediately stop working if a few workers fail to respond. As a remedy, we propose Asynchronous Distributed Bilevel Optimization (ADBO) algorithm. The proposed ADBO can tackle bilevel optimization problems with both nonconvex upper-level and lower-level objective functions, and its convergence is theoretically guaranteed. Furthermore, it is revealed through theoretic analysis that the iteration complexity of ADBO to obtain the $ε$-stationary point is upper bounded by $\mathcal{O}(\frac{1}{ε^2})$. Thorough empirical studies on public datasets have been conducted to elucidate the effectiveness and efficiency of the proposed ADBO.
△ Less
Submitted 23 February, 2023; v1 submitted 20 December, 2022;
originally announced December 2022.
-
Experimental observation of one-dimensional motion of interstitial skyrmion in FeGe
Authors:
Dongsheng Song,
Weiwei Wang,
Jie-Xiang Yu,
Peng Zhang,
Sergey S. Pershoguba,
Gen Yin,
Wensen Wei,
Jialiang Jiang,
Binghui Ge,
Xiaolong Fan,
Mingliang Tian,
Achim Rosch,
Jiadong Zang,
Haifeng Du
Abstract:
The interplay between dimensionality and topology manifests in magnetism via both exotic texture morphology and novel dynamics. A free magnetic skyrmion exhibits the skyrmion Hall effect under electric currents. Once it is confined in one-dimensional (1D) channels, the skyrmion Hall effect would be suppressed, and the current-driven skyrmion speed should be boosted by the non-adiabatic spin transf…
▽ More
The interplay between dimensionality and topology manifests in magnetism via both exotic texture morphology and novel dynamics. A free magnetic skyrmion exhibits the skyrmion Hall effect under electric currents. Once it is confined in one-dimensional (1D) channels, the skyrmion Hall effect would be suppressed, and the current-driven skyrmion speed should be boosted by the non-adiabatic spin transfer torque \b{eta}. Here, we experimentally demonstrate that stripes of a spatially modulated spin helix serve as natural 1D channels to restrict skyrmion. Using FeGe as a benchmark, an interstitial skyrmion is created by geometry notch and further moves steadily without the skyrmion Hall effect. The slope of the current-velocity curve for 1D skyrmion is enhanced almost by an order of magnitude owing to a large \b{eta} in FeGe. This feature is also observed in other topological defects. Utilizing the 1D skyrmion dynamics would be a highly promising route to implement topological spintronic devices.
△ Less
Submitted 17 December, 2022;
originally announced December 2022.
-
Performance assessment of helicon wave heating and current drive in EXL-50 spherical torus plasmas
Authors:
G. J. Qiao,
D. Luo,
S. D. Song,
J. Q. Dong,
Y. J. Shi,
J. C. Li,
D. Du,
Y. K. Martin Peng,
M. S. Liu,
EXL-50 team
Abstract:
Analysis of helicon wave heating and current drive capability in EXL-50 spherical torus plasmas has been conducted. It is found that the driven current increases with the launched parallel refractive index $n_{||}$ and peaks around $n_{||} = 4.0$ when the frequency of the helicon wave is between 300~MHz and 380~MHz. The helicon wave current drive efficiency shows a relatively stable upward trend w…
▽ More
Analysis of helicon wave heating and current drive capability in EXL-50 spherical torus plasmas has been conducted. It is found that the driven current increases with the launched parallel refractive index $n_{||}$ and peaks around $n_{||} = 4.0$ when the frequency of the helicon wave is between 300~MHz and 380~MHz. The helicon wave current drive efficiency shows a relatively stable upward trend with increasing plasma temperature. Moreover, the driven current decreases as the plasma density increases. We also analyzed the current drive with helicon waves of 150~MHz and 170~MHz and found that the driven current at a lower frequency was lower than that at a higher frequency. A positive proportional relationship exists between the driven current and $n_{||}$. Besides, as $n_{||}$ increases, the profile of the driven current becomes wider. Finally, the effect of the scrape-off layer (SOL) region on the helicon wave current drive was also investigated.
△ Less
Submitted 17 December, 2022;
originally announced December 2022.
-
Specular: Towards Secure, Trust-minimized Optimistic Blockchain Execution
Authors:
Zhe Ye,
Ujval Misra,
Jiajun Cheng,
Wenyang Zhou,
Dawn Song
Abstract:
An optimistic rollup (ORU) scales a blockchain's throughput by delegating computation to an untrusted remote chain (L2), refereeing any state claim disagreements between mutually distrusting L2 operators via an interactive dispute resolution protocol. State-of-the-art ORUs employ a monolithic dispute resolution protocol that tightly couples an L1 referee with a specific L2 client binary--oblivious…
▽ More
An optimistic rollup (ORU) scales a blockchain's throughput by delegating computation to an untrusted remote chain (L2), refereeing any state claim disagreements between mutually distrusting L2 operators via an interactive dispute resolution protocol. State-of-the-art ORUs employ a monolithic dispute resolution protocol that tightly couples an L1 referee with a specific L2 client binary--oblivious to the system's higher-level semantics. We argue that this approach (1) magnifies monoculture failure risk, by precluding trust-minimized and permissionless participation using operator-chosen client software; (2) leads to an unnecessarily large and difficult-to-audit TCB; and, (3) suffers from a frequently-triggered, yet opaque upgrade process--both further increasing auditing overhead, and broadening the governance attack surface. To address these concerns, we outline a methodology for designing a secure and resilient ORU with a minimal TCB, by facilitating opportunistic 1-of-N-version programming. Due to its unique challenges and opportunities, we ground this work concretely in the context of the Ethereum ecosystem--where ORUs have gained significant traction. Specifically, we design a semantically-aware proof system, natively targeting the EVM and its instruction set. We present an implementation in a new ORU, Specular, that opportunistically leverages Ethereum's existing client diversity with minimal source modification, demonstrating our approach's feasibility.
△ Less
Submitted 3 January, 2024; v1 submitted 10 December, 2022;
originally announced December 2022.
-
Higher Chern-Simons based on (2-)crossed modules
Authors:
Danhua Song,
Mengyao Wu,
Ke Wu,
Jie Yang
Abstract:
We present higher Chern-Simons theories based on (2-)crossed modules. We start from the generalized differential forms in Generalized Differential Calculus and define the corresponding generalized connections which consist of higher connections. Then we establish the generalized Chern-Simons forms to get the higher Chern-Simons actions. Finally, we develop the higher second Chern forms and Chern-W…
▽ More
We present higher Chern-Simons theories based on (2-)crossed modules. We start from the generalized differential forms in Generalized Differential Calculus and define the corresponding generalized connections which consist of higher connections. Then we establish the generalized Chern-Simons forms to get the higher Chern-Simons actions. Finally, we develop the higher second Chern forms and Chern-Weil theorems.
△ Less
Submitted 19 July, 2023; v1 submitted 8 December, 2022;
originally announced December 2022.
-
Kronecker-structured Covariance Models for Multiway Data
Authors:
Yu Wang,
Zeyu Sun,
Dogyoon Song,
Alfred Hero
Abstract:
Many applications produce multiway data of exceedingly high dimension. Modeling such multi-way data is important in multichannel signal and video processing where sensors produce multi-indexed data, e.g. over spatial, frequency, and temporal dimensions. We will address the challenges of covariance representation of multiway data and review some of the progress in statistical modeling of multiway c…
▽ More
Many applications produce multiway data of exceedingly high dimension. Modeling such multi-way data is important in multichannel signal and video processing where sensors produce multi-indexed data, e.g. over spatial, frequency, and temporal dimensions. We will address the challenges of covariance representation of multiway data and review some of the progress in statistical modeling of multiway covariance over the past two decades, focusing on tensor-valued covariance models and their inference. We will illustrate through a space weather application: predicting the evolution of solar active regions over time.
△ Less
Submitted 3 December, 2022;
originally announced December 2022.
-
An Augmented Reality Application and User Study for Understanding and Learning Spatial Transformation Matrices
Authors:
Zohreh Shaghaghian,
Heather Burte,
Dezhen Song,
Wei Yan
Abstract:
Understanding spatial transformations and their mathematical representations are essential in computer-aided design, robotics, etc. This research has developed and tested an Augmented Reality (AR) application (BRICKxAR/T) to enhance students' learning of spatial transformation matrices. BRICKxAR/T leverages AR features, including information augmentation, physical-virtual object interplay, and emb…
▽ More
Understanding spatial transformations and their mathematical representations are essential in computer-aided design, robotics, etc. This research has developed and tested an Augmented Reality (AR) application (BRICKxAR/T) to enhance students' learning of spatial transformation matrices. BRICKxAR/T leverages AR features, including information augmentation, physical-virtual object interplay, and embodied learning, to create a novel and effective visualization experience for learning. BRICKxAR T has been evaluated as a learning intervention using LEGO models as example physical and virtual manipulatives in a user study to assess students' learning gains. The study compared AR (N=29) vs. non-AR (N=30) learning workshops with pre- and post-tests on Purdue Visualization of Rotations Test and math questions. Students' math scores significantly improved after participating in both workshops with the AR workshop tending to show greater improvements. The post-workshop survey showed students were inclined to think BRICKxAR/T an interesting and useful application, and they spent more time learning in AR than non-AR.
△ Less
Submitted 16 November, 2022;
originally announced December 2022.
-
TCBERT: A Technical Report for Chinese Topic Classification BERT
Authors:
Ting Han,
Kunhao Pan,
Xinyu Chen,
Dingjie Song,
Yuchen Fan,
Xinyu Gao,
Ruyi Gan,
Jiaxing Zhang
Abstract:
Bidirectional Encoder Representations from Transformers or BERT~\cite{devlin-etal-2019-bert} has been one of the base models for various NLP tasks due to its remarkable performance. Variants customized for different languages and tasks are proposed to further improve the performance. In this work, we investigate supervised continued pre-training~\cite{gururangan-etal-2020-dont} on BERT for Chinese…
▽ More
Bidirectional Encoder Representations from Transformers or BERT~\cite{devlin-etal-2019-bert} has been one of the base models for various NLP tasks due to its remarkable performance. Variants customized for different languages and tasks are proposed to further improve the performance. In this work, we investigate supervised continued pre-training~\cite{gururangan-etal-2020-dont} on BERT for Chinese topic classification task. Specifically, we incorporate prompt-based learning and contrastive learning into the pre-training. To adapt to the task of Chinese topic classification, we collect around 2.1M Chinese data spanning various topics. The pre-trained Chinese Topic Classification BERTs (TCBERTs) with different parameter sizes are open-sourced at \url{https://huggingface.co/IDEA-CCNL}.
△ Less
Submitted 21 November, 2022;
originally announced November 2022.
-
External Inverse-Compton and Proton Synchrotron Emission from the Reverse Shock as the Origin of VHE Gamma-Rays from the Hyper-Bright GRB 221009A
Authors:
B. Theodore Zhang,
Kohta Murase,
Kunihito Ioka,
Deheng Song,
Chengchao Yuan,
Péter Mészáros
Abstract:
The detection of the hyper-bright gamma-ray burst (GRB) 221009A enables us to explore the nature of GRB emission and the origin of very-high-energy (VHE) gamma-rays. We analyze the ${\it Fermi}$-LAT data and investigate GeV-TeV emission in the framework of the external reverse shock model. We show that early $\sim1-10$ GeV emission can be explained by the external inverse-Compton mechanism via ups…
▽ More
The detection of the hyper-bright gamma-ray burst (GRB) 221009A enables us to explore the nature of GRB emission and the origin of very-high-energy (VHE) gamma-rays. We analyze the ${\it Fermi}$-LAT data and investigate GeV-TeV emission in the framework of the external reverse shock model. We show that early $\sim1-10$ GeV emission can be explained by the external inverse-Compton mechanism via upscattering MeV gamma-rays by electrons accelerated at the reverse shock, in addition to the synchrotron self-Compton component. The predicted early optical flux could have been brighter than the naked-eye GRB 080319B. We also show that proton synchrotron emission from accelerated ultra-high-energy cosmic rays (UHECRs) is detectable, and could potentially explain $\gtrsim \rm TeV$ photons detected by LHAASO or UHECR acceleration can be constrained. Our model suggests that the detection of $\mathcal{O}(10\rm~TeV)$ photons with energy up to $\sim18$ TeV is possible for reasonable models of the extragalactic background light without invoking new physics, and predicts anti-correlations between MeV photons and TeV photons, which can be tested with the LHAASO data.
△ Less
Submitted 27 March, 2023; v1 submitted 10 November, 2022;
originally announced November 2022.
-
Lessons Learned: Surveying the Practicality of Differential Privacy in the Industry
Authors:
Gonzalo Munilla Garrido,
Xiaoyuan Liu,
Florian Matthes,
Dawn Song
Abstract:
Since its introduction in 2006, differential privacy has emerged as a predominant statistical tool for quantifying data privacy in academic works. Yet despite the plethora of research and open-source utilities that have accompanied its rise, with limited exceptions, differential privacy has failed to achieve widespread adoption in the enterprise domain. Our study aims to shed light on the fundamen…
▽ More
Since its introduction in 2006, differential privacy has emerged as a predominant statistical tool for quantifying data privacy in academic works. Yet despite the plethora of research and open-source utilities that have accompanied its rise, with limited exceptions, differential privacy has failed to achieve widespread adoption in the enterprise domain. Our study aims to shed light on the fundamental causes underlying this academic-industrial utilization gap through detailed interviews of 24 privacy practitioners across 9 major companies. We analyze the results of our survey to provide key findings and suggestions for companies striving to improve privacy protection in their data workflows and highlight the necessary and missing requirements of existing differential privacy tools, with the goal of guiding researchers working towards the broader adoption of differential privacy. Our findings indicate that analysts suffer from lengthy bureaucratic processes for requesting access to sensitive data, yet once granted, only scarcely-enforced privacy policies stand between rogue practitioners and misuse of private information. We thus argue that differential privacy can significantly improve the processes of requesting and conducting data exploration across silos, and conclude that with a few of the improvements suggested herein, the practical use of differential privacy across the enterprise is within striking distance.
△ Less
Submitted 7 November, 2022;
originally announced November 2022.
-
Generalization and Personalization of Mobile Sensing-Based Mood Inference Models: An Analysis of College Students in Eight Countries
Authors:
Lakmal Meegahapola,
William Droz,
Peter Kun,
Amalia de Gotzen,
Chaitanya Nutakki,
Shyam Diwakar,
Salvador Ruiz Correa,
Donglei Song,
Hao Xu,
Miriam Bidoglia,
George Gaskell,
Altangerel Chagnaa,
Amarsanaa Ganbold,
Tsolmon Zundui,
Carlo Caprini,
Daniele Miorandi,
Alethia Hume,
Jose Luis Zarza,
Luca Cernuzzi,
Ivano Bison,
Marcelo Rodas Britez,
Matteo Busso,
Ronald Chenu-Abente,
Can Gunel,
Fausto Giunchiglia
, et al. (2 additional authors not shown)
Abstract:
Mood inference with mobile sensing data has been studied in ubicomp literature over the last decade. This inference enables context-aware and personalized user experiences in general mobile apps and valuable feedback and interventions in mobile health apps. However, even though model generalization issues have been highlighted in many studies, the focus has always been on improving the accuracies…
▽ More
Mood inference with mobile sensing data has been studied in ubicomp literature over the last decade. This inference enables context-aware and personalized user experiences in general mobile apps and valuable feedback and interventions in mobile health apps. However, even though model generalization issues have been highlighted in many studies, the focus has always been on improving the accuracies of models using different sensing modalities and machine learning techniques, with datasets collected in homogeneous populations. In contrast, less attention has been given to studying the performance of mood inference models to assess whether models generalize to new countries. In this study, we collected a mobile sensing dataset with 329K self-reports from 678 participants in eight countries (China, Denmark, India, Italy, Mexico, Mongolia, Paraguay, UK) to assess the effect of geographical diversity on mood inference models. We define and evaluate country-specific (trained and tested within a country), continent-specific (trained and tested within a continent), country-agnostic (tested on a country not seen on training data), and multi-country (trained and tested with multiple countries) approaches trained on sensor data for two mood inference tasks with population-level (non-personalized) and hybrid (partially personalized) models. We show that partially personalized country-specific models perform the best yielding area under the receiver operating characteristic curve (AUROC) scores of the range 0.78-0.98 for two-class (negative vs. positive valence) and 0.76-0.94 for three-class (negative vs. neutral vs. positive valence) inference. Overall, we uncover generalization issues of mood inference models to new countries and how the geographical similarity of countries might impact mood inference.
△ Less
Submitted 5 November, 2022;
originally announced November 2022.
-
DensePure: Understanding Diffusion Models towards Adversarial Robustness
Authors:
Chaowei Xiao,
Zhongzhu Chen,
Kun **,
Jiongxiao Wang,
Weili Nie,
Mingyan Liu,
Anima Anandkumar,
Bo Li,
Dawn Song
Abstract:
Diffusion models have been recently employed to improve certified robustness through the process of denoising. However, the theoretical understanding of why diffusion models are able to improve the certified robustness is still lacking, preventing from further improvement. In this study, we close this gap by analyzing the fundamental properties of diffusion models and establishing the conditions u…
▽ More
Diffusion models have been recently employed to improve certified robustness through the process of denoising. However, the theoretical understanding of why diffusion models are able to improve the certified robustness is still lacking, preventing from further improvement. In this study, we close this gap by analyzing the fundamental properties of diffusion models and establishing the conditions under which they can enhance certified robustness. This deeper understanding allows us to propose a new method DensePure, designed to improve the certified robustness of a pretrained model (i.e. classifier). Given an (adversarial) input, DensePure consists of multiple runs of denoising via the reverse process of the diffusion model (with different random seeds) to get multiple reversed samples, which are then passed through the classifier, followed by majority voting of inferred labels to make the final prediction. This design of using multiple runs of denoising is informed by our theoretical analysis of the conditional distribution of the reversed sample. Specifically, when the data density of a clean sample is high, its conditional density under the reverse process in a diffusion model is also high; thus sampling from the latter conditional distribution can purify the adversarial example and return the corresponding clean sample with a high probability. By using the highest density point in the conditional distribution as the reversed sample, we identify the robust region of a given instance under the diffusion model's reverse process. We show that this robust region is a union of multiple convex sets, and is potentially much larger than the robust regions identified in previous works. In practice, DensePure can approximate the label of the high density region in the conditional distribution so that it can enhance certified robustness.
△ Less
Submitted 1 November, 2022;
originally announced November 2022.
-
Symmetry Breaking with the SCAN Density Functional Describes Strong Correlation in the Singlet Carbon Dimer
Authors:
John P. Perdew,
Shah Tanvir ur Rahman Chowdhury,
Chandra Shahi,
Aaron D. Kaplan,
Duo Song,
Eric J. Bylaska
Abstract:
The SCAN (strongly constrained and appropriately normed) meta-generalized gradient approximation (meta-GGA), which satisfies all 17 exact constraints that a meta-GGA can satisfy, accurately describes equilibrium bonds that are normally correlated. With symmetry breaking, it also accurately describes some sd equilibrium bonds that are strongly correlated. While sp equilibrium bonds are nearly alway…
▽ More
The SCAN (strongly constrained and appropriately normed) meta-generalized gradient approximation (meta-GGA), which satisfies all 17 exact constraints that a meta-GGA can satisfy, accurately describes equilibrium bonds that are normally correlated. With symmetry breaking, it also accurately describes some sd equilibrium bonds that are strongly correlated. While sp equilibrium bonds are nearly always normally correlated, the C2 singlet ground state is known to be a rare case of strong correlation in an sp equilibrium bond. Earlier work that calculated atomization energies of the molecular sequence B2, C2, O2, and F2 in the local spin density approximation (LSDA), the Perdew-Burke-Ernzerhof (PBE) GGA, and the SCAN meta-GGA, without symmetry breaking in the molecule, found that only SCAN was accurate enough to reveal an anomalous under-binding for C2. This work shows that spin symmetry breaking in singlet C2, the appearance of net up- and down-spin densities on opposite sides (not ends) of the bond, corrects that under-binding, with a small SCAN atomization-energy error more like that of the other three molecules, suggesting that symmetry-breaking with an advanced density functional might reliably describe strong correlation. This article also discusses some general aspects of symmetry breaking, and the insights into strong correlation that symmetry-breaking can bring.
△ Less
Submitted 26 October, 2022;
originally announced October 2022.
-
Benchmarking Language Models for Code Syntax Understanding
Authors:
Da Shen,
Xinyun Chen,
Chenguang Wang,
Koushik Sen,
Dawn Song
Abstract:
Pre-trained language models have demonstrated impressive performance in both natural language processing and program understanding, which represent the input as a token sequence without explicitly modeling its structure. Some prior works show that pre-trained language models can capture the syntactic rules of natural languages without finetuning on syntax understanding tasks. However, there is lim…
▽ More
Pre-trained language models have demonstrated impressive performance in both natural language processing and program understanding, which represent the input as a token sequence without explicitly modeling its structure. Some prior works show that pre-trained language models can capture the syntactic rules of natural languages without finetuning on syntax understanding tasks. However, there is limited understanding of how well pre-trained models understand the code structure so far. In this work, we perform the first thorough benchmarking of the state-of-the-art pre-trained models for identifying the syntactic structures of programs. Specifically, we introduce CodeSyntax, a large-scale dataset of programs annotated with the syntactic relationships in their corresponding abstract syntax trees. Our key observation is that existing language models pretrained on code still lack the understanding of code syntax. In fact, these pre-trained programming language models fail to match the performance of simple baselines based on positional offsets and keywords. We also present a natural language benchmark to highlight the differences between natural languages and programming languages in terms of syntactic structure understanding. Our findings point out key limitations of existing pre-training methods for programming languages, and suggest the importance of modeling code syntactic structures.
△ Less
Submitted 26 October, 2022;
originally announced October 2022.
-
Direct observation of two-dimensional small polarons at correlated oxide interface
Authors:
Chi Sin Tang,
Shengwei Zeng,
**g Wu,
Shunfeng Chen,
Dongsheng Song,
Milošević,
** Yang,
Caozheng Diao,
Jun Zhou,
Stephen J. Pennycook,
Mark B. H. Breese,
Chuanbing Cai,
Thirumalai Venkatesan,
Ariando Ariando,
Ming Yang,
Andrew T. S. Wee,
Xinmao Yin
Abstract:
Two-dimensional (2D) perovskite oxide interfaces are ideal systems where diverse emergent properties can be uncovered.The formation and modification of polaronic properties due to short-range strong charge-lattice interactions of 2D interfaces remains hugely intriguing.Here, we report the direct observation of small-polarons at the LaAlO3/SrTiO3 (LAO/STO) conducting interface using high-resolution…
▽ More
Two-dimensional (2D) perovskite oxide interfaces are ideal systems where diverse emergent properties can be uncovered.The formation and modification of polaronic properties due to short-range strong charge-lattice interactions of 2D interfaces remains hugely intriguing.Here, we report the direct observation of small-polarons at the LaAlO3/SrTiO3 (LAO/STO) conducting interface using high-resolution spectroscopic ellipsometry.First-principles investigations further reveals that strong coupling between the interfacial electrons and the Ti-lattice result in the formation of localized 2D small polarons.These findings resolve the longstanding issue where the excess experimentally measured interfacial carrier density is significantly lower than theoretically predicted values.The charge-phonon induced lattice distortion further provides an analogue to the superconductive states in magic-angle twisted bilayer graphene attributed to the many-body correlations induced by broken periodic lattice symmetry.Our study sheds light on the multifaceted complexity of broken periodic lattice induced quasi-particle effects and its relationship with superconductivity.
△ Less
Submitted 6 July, 2023; v1 submitted 25 October, 2022;
originally announced October 2022.
-
IELM: An Open Information Extraction Benchmark for Pre-Trained Language Models
Authors:
Chenguang Wang,
Xiao Liu,
Dawn Song
Abstract:
We introduce a new open information extraction (OIE) benchmark for pre-trained language models (LM). Recent studies have demonstrated that pre-trained LMs, such as BERT and GPT, may store linguistic and relational knowledge. In particular, LMs are able to answer ``fill-in-the-blank'' questions when given a pre-defined relation category. Instead of focusing on pre-defined relations, we create an OI…
▽ More
We introduce a new open information extraction (OIE) benchmark for pre-trained language models (LM). Recent studies have demonstrated that pre-trained LMs, such as BERT and GPT, may store linguistic and relational knowledge. In particular, LMs are able to answer ``fill-in-the-blank'' questions when given a pre-defined relation category. Instead of focusing on pre-defined relations, we create an OIE benchmark aiming to fully examine the open relational information present in the pre-trained LMs. We accomplish this by turning pre-trained LMs into zero-shot OIE systems. Surprisingly, pre-trained LMs are able to obtain competitive performance on both standard OIE datasets (CaRB and Re-OIE2016) and two new large-scale factual OIE datasets (TAC KBP-OIE and Wikidata-OIE) that we establish via distant supervision. For instance, the zero-shot pre-trained LMs outperform the F1 score of the state-of-the-art supervised OIE methods on our factual OIE datasets without needing to use any training sets. Our code and datasets are available at https://github.com/cgraywang/IELM
△ Less
Submitted 25 October, 2022;
originally announced October 2022.
-
PALT: Parameter-Lite Transfer of Language Models for Knowledge Graph Completion
Authors:
Jianhao Shen,
Chenguang Wang,
Ye Yuan,
Jiawei Han,
Heng Ji,
Koushik Sen,
Ming Zhang,
Dawn Song
Abstract:
This paper presents a parameter-lite transfer learning approach of pretrained language models (LM) for knowledge graph (KG) completion. Instead of finetuning, which modifies all LM parameters, we only tune a few new parameters while kee** the original LM parameters fixed. We establish this via reformulating KG completion as a "fill-in-the-blank" task, and introducing a parameter-lite encoder on…
▽ More
This paper presents a parameter-lite transfer learning approach of pretrained language models (LM) for knowledge graph (KG) completion. Instead of finetuning, which modifies all LM parameters, we only tune a few new parameters while kee** the original LM parameters fixed. We establish this via reformulating KG completion as a "fill-in-the-blank" task, and introducing a parameter-lite encoder on top of the original LMs. We show that, by tuning far fewer parameters than finetuning, LMs transfer non-trivially to most tasks and reach competitiveness with prior state-of-the-art approaches. For instance, we outperform the fully finetuning approaches on a KG completion benchmark by tuning only 1% of the parameters. The code and datasets are available at \url{https://github.com/yuanyehome/PALT}.
△ Less
Submitted 24 October, 2022;
originally announced October 2022.
-
Identification of a Critical Do** for Charge Order Phenomena in Bi-2212 Cuprates via RIXS
Authors:
Haiyu Lu,
Makoto Hashimoto,
Su-Di Chen,
Shigeyuki Ishida,
Dongjoon Song,
Hiroshi Eisaki,
Abhishek Nag,
Mirian Garcia-Fernandez,
Riccardo Arpaia,
Giacomo Ghiringhelli,
Lucio Braicovich,
Jan Zaanen,
Brian Moritz,
Kurt Kummer,
Nicholas B. Brookes,
Ke-** Zhou,
Zhi-Xun Shen,
Thomas P. Devereaux,
Wei-Sheng Lee
Abstract:
Identifying quantum critical points (QCPs) and their associated fluctuations may hold the key to unraveling the unusual electronic phenomena observed in cuprate superconductors. Recently, signatures of quantum fluctuations associated with charge order (CO) have been inferred from the anomalous enhancement of CO excitations that accompany the reduction of the CO order parameter in the superconducti…
▽ More
Identifying quantum critical points (QCPs) and their associated fluctuations may hold the key to unraveling the unusual electronic phenomena observed in cuprate superconductors. Recently, signatures of quantum fluctuations associated with charge order (CO) have been inferred from the anomalous enhancement of CO excitations that accompany the reduction of the CO order parameter in the superconducting state. To gain more insight about the interplay between CO and superconductivity, here we investigate the do** dependence of this phenomenon throughout the Bi-2212 cuprate phase diagram using resonant inelastic x-ray scattering (RIXS) at the Cu L3- edge. As do** increases, the CO wavevector decreases, saturating at a commensurate value of 0.25 r.l.u. beyond a characteristic do** pc, where the correlation length becomes shorter than the apparent periodicity (4a0). Such behavior is indicative of the fluctuating nature of the CO; and the proliferation of CO excitations in the superconducting state also appears strongest at pc, consistent with expected behavior at a CO QCP. Intriguingly, pc appears to be near optimal do**, where the superconducting transition temperature Tc is maximal.
△ Less
Submitted 18 October, 2022;
originally announced October 2022.
-
How Would The Viewer Feel? Estimating Wellbeing From Video Scenarios
Authors:
Mantas Mazeika,
Eric Tang,
Andy Zou,
Steven Basart,
Jun Shern Chan,
Dawn Song,
David Forsyth,
Jacob Steinhardt,
Dan Hendrycks
Abstract:
In recent years, deep neural networks have demonstrated increasingly strong abilities to recognize objects and activities in videos. However, as video understanding becomes widely used in real-world applications, a key consideration is develo** human-centric systems that understand not only the content of the video but also how it would affect the wellbeing and emotional state of viewers. To fac…
▽ More
In recent years, deep neural networks have demonstrated increasingly strong abilities to recognize objects and activities in videos. However, as video understanding becomes widely used in real-world applications, a key consideration is develo** human-centric systems that understand not only the content of the video but also how it would affect the wellbeing and emotional state of viewers. To facilitate research in this setting, we introduce two large-scale datasets with over 60,000 videos manually annotated for emotional response and subjective wellbeing. The Video Cognitive Empathy (VCE) dataset contains annotations for distributions of fine-grained emotional responses, allowing models to gain a detailed understanding of affective states. The Video to Valence (V2V) dataset contains annotations of relative pleasantness between videos, which enables predicting a continuous spectrum of wellbeing. In experiments, we show how video models that are primarily trained to recognize actions and find contours of objects can be repurposed to understand human preferences and the emotional content of videos. Although there is room for improvement, predicting wellbeing and emotional response is on the horizon for state-of-the-art models. We hope our datasets can help foster further advances at the intersection of commonsense video understanding and human preference learning.
△ Less
Submitted 18 October, 2022;
originally announced October 2022.
-
DisCup: Discriminator Cooperative Unlikelihood Prompt-tuning for Controllable Text Generation
Authors:
Hanqing Zhang,
Dawei Song
Abstract:
Prompt learning with immensely large Casual Language Models (CLMs) has been shown promising for attribute-controllable text generation (CTG). However, vanilla prompt tuning tends to imitate training corpus characteristics beyond the control attributes, resulting in a poor generalization ability. Moreover, it is less able to capture the relationship between different attributes, further limiting th…
▽ More
Prompt learning with immensely large Casual Language Models (CLMs) has been shown promising for attribute-controllable text generation (CTG). However, vanilla prompt tuning tends to imitate training corpus characteristics beyond the control attributes, resulting in a poor generalization ability. Moreover, it is less able to capture the relationship between different attributes, further limiting the control performance. In this paper, we propose a new CTG approach, namely DisCup, which incorporates the attribute knowledge of discriminator to optimize the control-prompts, steering a frozen CLM to produce attribute-specific texts. Specifically, the frozen CLM model, capable of producing multitudinous texts, is first used to generate the next-token candidates based on the context, so as to ensure the diversity of tokens to be predicted. Then, we leverage an attribute-discriminator to select desired/undesired tokens from those candidates, providing the inter-attribute knowledge. Finally, we bridge the above two traits by an unlikelihood objective for prompt-tuning. Extensive experimental results show that DisCup can achieve a new state-of-the-art control performance while maintaining an efficient and high-quality text generation, only relying on around 10 virtual tokens.
△ Less
Submitted 17 October, 2022;
originally announced October 2022.
-
TSP-Bot: Robotic TSP Pen Art using High-DoF Manipulators
Authors:
Daeun Song,
Eunjung Lim,
Jiyoon Park,
Minjung Jung,
Young J. Kim
Abstract:
TSP art is an art form for drawing an image using piecewise-continuous line segments. We present TSP-Bot, a robotic pen drawing system capable of creating complicated TSP pen art on a planar surface using multiple colors. The system begins by converting a colored raster image into a set of points that represent the image's tone, which can be controlled by adjusting the point density. Next, the sys…
▽ More
TSP art is an art form for drawing an image using piecewise-continuous line segments. We present TSP-Bot, a robotic pen drawing system capable of creating complicated TSP pen art on a planar surface using multiple colors. The system begins by converting a colored raster image into a set of points that represent the image's tone, which can be controlled by adjusting the point density. Next, the system finds a piecewise-continuous linear path that visits each point exactly once, which is equivalent to solving a Traveling Salesman Problem (TSP). The path is simplified with fewer points using bounded approximation and smoothed and optimized using Bezier spline curves with bounded curvature. Our robotic drawing system consisting of single or dual manipulators with fingered grippers and a mobile platform performs the drawing task by following the resulting complex and sophisticated path composed of thousands of TSP sites. As a result, our system can draw complicated and visually pleasing TSP pen art.
△ Less
Submitted 10 April, 2024; v1 submitted 14 October, 2022;
originally announced October 2022.
-
Stroke-based Rendering and Planning for Robotic Performance of Artistic Drawing
Authors:
Ivaylo Ilinkin,
Daeun Song,
Young J. Kim
Abstract:
We present a new robotic drawing system based on stroke-based rendering (SBR). Our motivation is the artistic quality of the whole performance. Not only should the generated strokes in the final drawing resemble the input image, but the stroke sequence should also exhibit a human artist's planning process. Thus, when a robot executes the drawing task, both the drawing results and the way the robot…
▽ More
We present a new robotic drawing system based on stroke-based rendering (SBR). Our motivation is the artistic quality of the whole performance. Not only should the generated strokes in the final drawing resemble the input image, but the stroke sequence should also exhibit a human artist's planning process. Thus, when a robot executes the drawing task, both the drawing results and the way the robot executes would look artistic. Our SBR system is based on image segmentation and depth estimation. It generates the drawing strokes in an order that allows for the intended shape to be perceived quickly and for its detailed features to be filled in and emerge gradually when observed by the human. This ordering represents a stroke plan that the drawing robot should follow to create an artistic rendering of images. We experimentally demonstrate that our SBR-based drawing makes visually pleasing artistic images, and our robotic system can replicate the result with proper sequences of stroke drawing.
△ Less
Submitted 3 March, 2023; v1 submitted 14 October, 2022;
originally announced October 2022.
-
Distributed Distributionally Robust Optimization with Non-Convex Objectives
Authors:
Yang Jiao,
Kai Yang,
Dong** Song
Abstract:
Distributionally Robust Optimization (DRO), which aims to find an optimal decision that minimizes the worst case cost over the ambiguity set of probability distribution, has been widely applied in diverse applications, e.g., network behavior analysis, risk management, etc. However, existing DRO techniques face three key challenges: 1) how to deal with the asynchronous updating in a distributed env…
▽ More
Distributionally Robust Optimization (DRO), which aims to find an optimal decision that minimizes the worst case cost over the ambiguity set of probability distribution, has been widely applied in diverse applications, e.g., network behavior analysis, risk management, etc. However, existing DRO techniques face three key challenges: 1) how to deal with the asynchronous updating in a distributed environment; 2) how to leverage the prior distribution effectively; 3) how to properly adjust the degree of robustness according to different scenarios. To this end, we propose an asynchronous distributed algorithm, named Asynchronous Single-looP alternatIve gRadient projEction (ASPIRE) algorithm with the itErative Active SEt method (EASE) to tackle the distributed distributionally robust optimization (DDRO) problem. Furthermore, a new uncertainty set, i.e., constrained D-norm uncertainty set, is developed to effectively leverage the prior distribution and flexibly control the degree of robustness. Finally, our theoretical analysis elucidates that the proposed algorithm is guaranteed to converge and the iteration complexity is also analyzed. Extensive empirical studies on real-world datasets demonstrate that the proposed method can not only achieve fast convergence, and remain robust against data heterogeneity as well as malicious attacks, but also tradeoff robustness with performance.
△ Less
Submitted 17 December, 2022; v1 submitted 14 October, 2022;
originally announced October 2022.
-
XPrompt: Exploring the Extreme of Prompt Tuning
Authors:
Fang Ma,
Chen Zhang,
Lei Ren,
**gang Wang,
Qifan Wang,
Wei Wu,
Xiaojun Quan,
Dawei Song
Abstract:
Prompt tuning learns soft prompts to condition frozen Pre-trained Language Models (PLMs) for performing downstream tasks in a parameter-efficient manner. While prompt tuning has gradually reached the performance level of fine-tuning as the model scale increases, there is still a large performance gap between prompt tuning and fine-tuning for models of moderate and small scales (typically less than…
▽ More
Prompt tuning learns soft prompts to condition frozen Pre-trained Language Models (PLMs) for performing downstream tasks in a parameter-efficient manner. While prompt tuning has gradually reached the performance level of fine-tuning as the model scale increases, there is still a large performance gap between prompt tuning and fine-tuning for models of moderate and small scales (typically less than 11B parameters). In this paper, we empirically show that the trained prompt tokens can have a negative impact on a downstream task and thus degrade its performance. To bridge the gap, we propose a novel Prompt tuning model with an eXtremely small scale (XPrompt) under the regime of lottery tickets hypothesis. Specifically, XPrompt eliminates the negative prompt tokens at different granularity levels through a hierarchical structured pruning, yielding a more parameter-efficient prompt yet with a competitive performance. Comprehensive experiments are carried out on SuperGLUE tasks, and the extensive results indicate that XPrompt is able to close the performance gap at smaller model scales.
△ Less
Submitted 10 October, 2022;
originally announced October 2022.
-
Sparse Teachers Can Be Dense with Knowledge
Authors:
Yi Yang,
Chen Zhang,
Dawei Song
Abstract:
Recent advances in distilling pretrained language models have discovered that, besides the expressiveness of knowledge, the student-friendliness should be taken into consideration to realize a truly knowledgable teacher. Based on a pilot study, we find that over-parameterized teachers can produce expressive yet student-unfriendly knowledge and are thus limited in overall knowledgableness. To remov…
▽ More
Recent advances in distilling pretrained language models have discovered that, besides the expressiveness of knowledge, the student-friendliness should be taken into consideration to realize a truly knowledgable teacher. Based on a pilot study, we find that over-parameterized teachers can produce expressive yet student-unfriendly knowledge and are thus limited in overall knowledgableness. To remove the parameters that result in student-unfriendliness, we propose a sparse teacher trick under the guidance of an overall knowledgable score for each teacher parameter. The knowledgable score is essentially an interpolation of the expressiveness and student-friendliness scores. The aim is to ensure that the expressive parameters are retained while the student-unfriendly ones are removed. Extensive experiments on the GLUE benchmark show that the proposed sparse teachers can be dense with knowledge and lead to students with compelling performance in comparison with a series of competitive baselines.
△ Less
Submitted 17 October, 2022; v1 submitted 8 October, 2022;
originally announced October 2022.
-
zkBridge: Trustless Cross-chain Bridges Made Practical
Authors:
Tiancheng Xie,
Jiaheng Zhang,
Zerui Cheng,
Fan Zhang,
Yupeng Zhang,
Yongzheng Jia,
Dan Boneh,
Dawn Song
Abstract:
Blockchains have seen growing traction with cryptocurrencies reaching a market cap of over 1 trillion dollars, major institution investors taking interests, and global impacts on governments, businesses, and individuals. Also growing significantly is the heterogeneity of the ecosystem where a variety of blockchains co-exist. Cross-chain bridge is a necessary building block in this multi-chain ecos…
▽ More
Blockchains have seen growing traction with cryptocurrencies reaching a market cap of over 1 trillion dollars, major institution investors taking interests, and global impacts on governments, businesses, and individuals. Also growing significantly is the heterogeneity of the ecosystem where a variety of blockchains co-exist. Cross-chain bridge is a necessary building block in this multi-chain ecosystem. Existing solutions, however, either suffer from performance issues or rely on trust assumptions of committees that significantly lower the security. Recurring attacks against bridges have cost users more than 1.5 billion USD. In this paper, we introduce zkBridge, an efficient cross-chain bridge that guarantees strong security without external trust assumptions. With succinct proofs, zkBridge not only guarantees correctness, but also significantly reduces on-chain verification cost. We propose novel succinct proof protocols that are orders-of-magnitude faster than existing solutions for workload in zkBridge. With a modular design, zkBridge enables a broad spectrum of use cases and capabilities, including message passing, token transferring, and other computational logic operating on state changes from different chains. To demonstrate the practicality of zkBridge, we implemented a prototype bridge from Cosmos to Ethereum, a particularly challenging direction that involves large proof circuits that existing systems cannot efficiently handle. Our evaluation shows that zkBridge achieves practical performance: proof generation takes less than 20 seconds, while verifying proofs on-chain costs less than 230K gas. For completeness, we also implemented and evaluated the direction from Ethereum to other EVM-compatible chains (such as BSC) which involves smaller circuits and incurs much less overhead.
△ Less
Submitted 1 October, 2022;
originally announced October 2022.
-
Cerberus: A Formal Approach to Secure and Efficient Enclave Memory Sharing
Authors:
Dayeol Lee,
Kevin Cheang,
Alexander Thomas,
Catherine Lu,
Pranav Gaddamadugu,
Anjo Vahldiek-Oberwagner,
Mona Vij,
Dawn Song,
Sanjit A. Seshia,
Krste Asanović
Abstract:
Hardware enclaves rely on a disjoint memory model, which maps each physical address to an enclave to achieve strong memory isolation. However, this severely limits the performance and programmability of enclave programs. While some prior work proposes enclave memory sharing, it does not provide a formal model or verification of their designs. This paper presents Cerberus, a formal approach to secu…
▽ More
Hardware enclaves rely on a disjoint memory model, which maps each physical address to an enclave to achieve strong memory isolation. However, this severely limits the performance and programmability of enclave programs. While some prior work proposes enclave memory sharing, it does not provide a formal model or verification of their designs. This paper presents Cerberus, a formal approach to secure and efficient enclave memory sharing. To reduce the burden of formal verification, we compare different sharing models and choose a simple yet powerful sharing model. Based on the sharing model, Cerberus extends an enclave platform such that enclave memory can be made immutable and shareable across multiple enclaves via additional operations. We use incremental verification starting with an existing formal model called the Trusted Abstract Platform (TAP). Using our extended TAP model, we formally verify that Cerberus does not break or weaken the security guarantees of the enclaves despite allowing memory sharing. More specifically, we prove the Secure Remote Execution (SRE) property on our formal model. Finally, the paper shows the feasibility of Cerberus by implementing it in an existing enclave platform, RISC-V Keystone.
△ Less
Submitted 14 November, 2022; v1 submitted 30 September, 2022;
originally announced September 2022.
-
Joint Language Semantic and Structure Embedding for Knowledge Graph Completion
Authors:
Jianhao Shen,
Chenguang Wang,
Linyuan Gong,
Dawn Song
Abstract:
The task of completing knowledge triplets has broad downstream applications. Both structural and semantic information plays an important role in knowledge graph completion. Unlike previous approaches that rely on either the structures or semantics of the knowledge graphs, we propose to jointly embed the semantics in the natural language description of the knowledge triplets with their structure in…
▽ More
The task of completing knowledge triplets has broad downstream applications. Both structural and semantic information plays an important role in knowledge graph completion. Unlike previous approaches that rely on either the structures or semantics of the knowledge graphs, we propose to jointly embed the semantics in the natural language description of the knowledge triplets with their structure information. Our method embeds knowledge graphs for the completion task via fine-tuning pre-trained language models with respect to a probabilistic structured loss, where the forward pass of the language models captures semantics and the loss reconstructs structures. Our extensive experiments on a variety of knowledge graph benchmarks have demonstrated the state-of-the-art performance of our method. We also show that our method can significantly improve the performance in a low-resource regime, thanks to the better use of semantics. The code and datasets are available at https://github.com/pkusjh/LASS.
△ Less
Submitted 18 September, 2022;
originally announced September 2022.
-
Single quantum dot selection and tailor-made photonic device integration using nanoscale focus pinspot
Authors:
Minho Choi,
Mireu Lee,
Sung-Yul L. Park,
Byung Su Kim,
Seongmoon Jun,
Suk In Park,
** Dong Song,
Young-Ho Ko,
Yong-Hoon Cho
Abstract:
Among the diverse platforms of quantum light sources, epitaxially grown semiconductor quantum dots (QDs) are one of the most attractive workhorses for realizing various quantum photonic technologies owing to their outstanding brightness and scalability. There exist various material systems for these QDs based on their appropriate emission bandwidth; however, only a few material systems have succes…
▽ More
Among the diverse platforms of quantum light sources, epitaxially grown semiconductor quantum dots (QDs) are one of the most attractive workhorses for realizing various quantum photonic technologies owing to their outstanding brightness and scalability. There exist various material systems for these QDs based on their appropriate emission bandwidth; however, only a few material systems have successfully grown single or low-density QDs, which are essential for quantum light sources. In most other material systems, it is difficult to realize low-density QDs, and the mesa-etching process is usually undergone in order to reduce their density. Nevertheless, the etching process irreversibly destroys the medium near the QD, which is detrimental to in-plane device integration. In this study, we apply a nondestructive luminescence picking method termed as nanoscale focus pinspot (NFP) using helium ion microscopy to reduce the luminous QD density while retaining the surrounding medium. Given that the NFP can precisely manipulate the luminescence at nanoscale resolution, a photonic device can be deterministically fabricated on the target QD matched from both spatial and spectral points of view. After applying the NFP, we extract only a single QD emission out of the high-density ensemble QD emission. Moreover, the photonic structure of a circular Bragg reflector is deterministically integrated with the selected QD, and the extraction efficiency of the QD emission has been improved 27 times. Furthermore, this technique does not destroy the medium and only controls the luminescence. Hence, it is highly applicable to various photonic structures, including photonic waveguides or photonic crystal cavities regardless of their materials.
△ Less
Submitted 16 September, 2022;
originally announced September 2022.
-
A Multi-turn Machine Reading Comprehension Framework with Rethink Mechanism for Emotion-Cause Pair Extraction
Authors:
Changzhi Zhou,
Dandan Song,
**g Xu,
Zhi**g Wu
Abstract:
Emotion-cause pair extraction (ECPE) is an emerging task in emotion cause analysis, which extracts potential emotion-cause pairs from an emotional document. Most recent studies use end-to-end methods to tackle the ECPE task. However, these methods either suffer from a label sparsity problem or fail to model complicated relations between emotions and causes. Furthermore, they all do not consider ex…
▽ More
Emotion-cause pair extraction (ECPE) is an emerging task in emotion cause analysis, which extracts potential emotion-cause pairs from an emotional document. Most recent studies use end-to-end methods to tackle the ECPE task. However, these methods either suffer from a label sparsity problem or fail to model complicated relations between emotions and causes. Furthermore, they all do not consider explicit semantic information of clauses. To this end, we transform the ECPE task into a document-level machine reading comprehension (MRC) task and propose a Multi-turn MRC framework with Rethink mechanism (MM-R). Our framework can model complicated relations between emotions and causes while avoiding generating the pairing matrix (the leading cause of the label sparsity problem). Besides, the multi-turn structure can fuse explicit semantic information flow between emotions and causes. Extensive experiments on the benchmark emotion cause corpus demonstrate the effectiveness of our proposed framework, which outperforms existing state-of-the-art methods.
△ Less
Submitted 16 September, 2022;
originally announced September 2022.
-
Emergent charge order and unconventional superconductivity in pressurized kagome superconductor CsV3Sb5
Authors:
Lixuan Zheng,
Zhimian Wu,
Ye Yang,
Linpeng Nie,
Min Shan,
Kuanglv Sun,
Dianwu Song,
Fanghang Yu,
Jian Li,
Dan Zhao,
Shunjiao Li,
Baolei Kang,
Yanbing Zhou,
Kai Liu,
Ziji Xiang,
Jianjun Ying,
Zhenyu Wang,
Tao Wu,
Xianhui Chen
Abstract:
The discovery of multiple electronic orders in kagome superconductors AV3Sb5 (A = K, Rb, Cs) provides a promising platform for exploring unprecedented emergent physics. Under moderate pressure (< 2.2 GPa), the triple-Q charge density wave (CDW) order is monotonically suppressed by pressure, while the superconductivity displays a two-dome-like behavior, suggesting an unusual interplay between super…
▽ More
The discovery of multiple electronic orders in kagome superconductors AV3Sb5 (A = K, Rb, Cs) provides a promising platform for exploring unprecedented emergent physics. Under moderate pressure (< 2.2 GPa), the triple-Q charge density wave (CDW) order is monotonically suppressed by pressure, while the superconductivity displays a two-dome-like behavior, suggesting an unusual interplay between superconductivity and CDW order. Given that time-reversal symmetry breaking and electronic nematicity have been revealed inside the triple-Q CDW phase, understanding this CDW order and its interplay with superconductivity becomes one of the core questions in AV3Sb5. Here, we report the evolution of CDW and superconductivity with pressure in CsV3Sb5 by 51V nuclear magnetic resonance measurements. An emergent CDW phase, ascribed to a possible stripe-like CDW order with a unidirectional 4a0 modulation, is observed between Pc1 ~ 0.58 GPa and Pc2 ~ 2.0 GPa, which explains the two-dome-like superconducting behavior under pressure. Furthermore, the nuclear spin-lattice relaxation measurement reveals evidence for pressure-independent charge fluctuations above the CDW transition temperature and unconventional superconducting pairing above Pc2. Our results not only shed new light on the interplay of superconductivity and CDW but also reveal novel electronic correlation effects in kagome superconductors AV3Sb5.
△ Less
Submitted 15 September, 2022;
originally announced September 2022.
-
Weakly-Supervised Stitching Network for Real-World Panoramic Image Generation
Authors:
Dae-Young Song,
Geonsoo Lee,
HeeKyung Lee,
Gi-Mun Um,
Donghyeon Cho
Abstract:
Recently, there has been growing attention on an end-to-end deep learning-based stitching model. However, the most challenging point in deep learning-based stitching is to obtain pairs of input images with a narrow field of view and ground truth images with a wide field of view captured from real-world scenes. To overcome this difficulty, we develop a weakly-supervised learning mechanism to train…
▽ More
Recently, there has been growing attention on an end-to-end deep learning-based stitching model. However, the most challenging point in deep learning-based stitching is to obtain pairs of input images with a narrow field of view and ground truth images with a wide field of view captured from real-world scenes. To overcome this difficulty, we develop a weakly-supervised learning mechanism to train the stitching model without requiring genuine ground truth images. In addition, we propose a stitching model that takes multiple real-world fisheye images as inputs and creates a 360 output image in an equirectangular projection format. In particular, our model consists of color consistency corrections, war**, and blending, and is trained by perceptual and SSIM losses. The effectiveness of the proposed algorithm is verified on two real-world stitching datasets.
△ Less
Submitted 13 September, 2022;
originally announced September 2022.
-
Structural Bias for Aspect Sentiment Triplet Extraction
Authors:
Chen Zhang,
Lei Ren,
Fang Ma,
**gang Wang,
Wei Wu,
Dawei Song
Abstract:
Structural bias has recently been exploited for aspect sentiment triplet extraction (ASTE) and led to improved performance. On the other hand, it is recognized that explicitly incorporating structural bias would have a negative impact on efficiency, whereas pretrained language models (PLMs) can already capture implicit structures. Thus, a natural question arises: Is structural bias still a necessi…
▽ More
Structural bias has recently been exploited for aspect sentiment triplet extraction (ASTE) and led to improved performance. On the other hand, it is recognized that explicitly incorporating structural bias would have a negative impact on efficiency, whereas pretrained language models (PLMs) can already capture implicit structures. Thus, a natural question arises: Is structural bias still a necessity in the context of PLMs? To answer the question, we propose to address the efficiency issues by using an adapter to integrate structural bias in the PLM and using a cheap-to-compute relative position structure in place of the syntactic dependency structure. Benchmarking evaluation is conducted on the SemEval datasets. The results show that our proposed structural adapter is beneficial to PLMs and achieves state-of-the-art performance over a range of strong baselines, yet with a light parameter demand and low latency. Meanwhile, we give rise to the concern that the current evaluation default with data of small scale is under-confident. Consequently, we release a large-scale dataset for ASTE. The results on the new dataset hint that the structural adapter is confidently effective and efficient to a large scale. Overall, we draw the conclusion that structural bias shall still be a necessity even with PLMs.
△ Less
Submitted 2 September, 2022;
originally announced September 2022.
-
SoK: Decentralized Finance (DeFi) Attacks
Authors:
Liyi Zhou,
Xihan Xiong,
Jens Ernstberger,
Stefanos Chaliasos,
Zhipeng Wang,
Ye Wang,
Kaihua Qin,
Roger Wattenhofer,
Dawn Song,
Arthur Gervais
Abstract:
Within just four years, the blockchain-based Decentralized Finance (DeFi) ecosystem has accumulated a peak total value locked (TVL) of more than 253 billion USD. This surge in DeFi's popularity has, unfortunately, been accompanied by many impactful incidents. According to our data, users, liquidity providers, speculators, and protocol operators suffered a total loss of at least 3.24 billion USD fr…
▽ More
Within just four years, the blockchain-based Decentralized Finance (DeFi) ecosystem has accumulated a peak total value locked (TVL) of more than 253 billion USD. This surge in DeFi's popularity has, unfortunately, been accompanied by many impactful incidents. According to our data, users, liquidity providers, speculators, and protocol operators suffered a total loss of at least 3.24 billion USD from Apr 30, 2018 to Apr 30, 2022. Given the blockchain's transparency and increasing incident frequency, two questions arise: How can we systematically measure, evaluate, and compare DeFi incidents? How can we learn from past attacks to strengthen DeFi security?
In this paper, we introduce a common reference frame to systematically evaluate and compare DeFi incidents, including both attacks and accidents. We investigate 77 academic papers, 30 audit reports, and 181 real-world incidents. Our data reveals several gaps between academia and the practitioners' community. For example, few academic papers address "price oracle attacks" and "permissonless interactions", while our data suggests that they are the two most frequent incident types (15% and 10.5% correspondingly). We also investigate potential defenses, and find that: (i) 103 (56%) of the attacks are not executed atomically, granting a rescue time frame for defenders; (ii) SoTA bytecode similarity analysis can at least detect 31 vulnerable/23 adversarial contracts; and (iii) 33 (15.3%) of the adversaries leak potentially identifiable information by interacting with centralized exchanges.
△ Less
Submitted 7 April, 2023; v1 submitted 27 August, 2022;
originally announced August 2022.
-
The Lyman-$α$ Emission in a C1.4 Solar Flare Observed by the Extreme Ultraviolet Imager aboard Solar Orbiter
Authors:
Ying Li,
Qiao Li,
De-Chao Song,
Andrea Francesco Battaglia,
Hualin Xiao,
Säm Krucker,
Udo Schühle,
Hui Li,
Weiqun Gan,
M. D. Ding
Abstract:
The hydrogen Lyman-$α$ (H {\sc i} Ly$α$) emission during solar flares has rarely been studied in spatially resolved images and its physical origin has not been fully understood. In this paper, we present novel Ly$α$ images for a C1.4 solar flare (SOL2021-08-20T22:00) from the Extreme Ultraviolet Imager aboard Solar Orbiter, together with multi-waveband and multi-perspective observations from the S…
▽ More
The hydrogen Lyman-$α$ (H {\sc i} Ly$α$) emission during solar flares has rarely been studied in spatially resolved images and its physical origin has not been fully understood. In this paper, we present novel Ly$α$ images for a C1.4 solar flare (SOL2021-08-20T22:00) from the Extreme Ultraviolet Imager aboard Solar Orbiter, together with multi-waveband and multi-perspective observations from the Solar Terrestrial Relations Observatory Ahead and the Solar Dynamics Observatory spacecraft. It is found that the Ly$α$ emission has a good temporal correlation with the thermal emissions at 1--8 Å and 5--7 keV, indicating that the flaring Ly$α$ is mainly produced by a thermal process in this small event. However, nonthermal electrons play a minor role in generating Ly$α$ at flare ribbons during the rise phase of the flare, as revealed by the hard X-ray imaging and spectral fitting. Besides originating from flare ribbons, the Ly$α$ emission can come from flare loops, likely caused by plasma heating and also cooling that happen in different flare phases. It is also found that the Ly$α$ emission shows fairly similar features with the He {\sc ii} 304 Å emission in light curve and spatio-temporal variation along with small differences. These observational results improve our understanding of the Ly$α$ emission in solar flares and also provide some insights for investigating the Ly$α$ emission in stellar flares.
△ Less
Submitted 12 August, 2022;
originally announced August 2022.
-
Photonic p-orbital higher-order topological insulators
Authors:
Yahui Zhang,
Domenico Bongiovanni,
Ziteng Wang,
Xiangdong Wang,
Shiqi Xia,
Zhichan Hu,
Daohong Song,
Dario Jukić,
**gjun Xu,
Roberto Morandotti,
Hrvoje Buljan,
Zhigang Chen
Abstract:
The orbital degrees of freedom play a pivotal role in understanding fundamental phenomena in solid-state materials as well as exotic quantum states of matter including orbital superfluidity and topological semimetals. Despite tremendous efforts in engineering synthetic cold-atom, electronic and photonic lattices to explore orbital physics, thus far high orbitals in an important class of materials,…
▽ More
The orbital degrees of freedom play a pivotal role in understanding fundamental phenomena in solid-state materials as well as exotic quantum states of matter including orbital superfluidity and topological semimetals. Despite tremendous efforts in engineering synthetic cold-atom, electronic and photonic lattices to explore orbital physics, thus far high orbitals in an important class of materials, namely, the higher-order topological insulators (HOTIs), have not been realized. Here, we demonstrate p-orbital corner states in a photonic HOTI, unveiling their underlying topological invariant, symmetry protection, and nonlinearity-induced dynamical rotation. In a Kagome-type HOTI, we find that topological protection of the p-orbital corner states demands an orbital-hop** symmetry, in addition to the generalized chiral symmetry. Due to orbital hybridization, the nontrivial topology of the p-orbital HOTI is hidden if bulk polarization is used as the topological invariant, but well manifested by the generalized winding number. Our work opens a pathway for the exploration of intriguing orbital phenomena mediated by higher band topology applicable to a broad spectrum of systems.
△ Less
Submitted 11 August, 2022;
originally announced August 2022.
-
Going Incognito in the Metaverse: Achieving Theoretically Optimal Privacy-Usability Tradeoffs in VR
Authors:
Vivek Nair,
Gonzalo Munilla Garrido,
Dawn Song
Abstract:
Virtual reality (VR) telepresence applications and the so-called "metaverse" promise to be the next major medium of human-computer interaction. However, with recent studies demonstrating the ease at which VR users can be profiled and deanonymized, metaverse platforms carry many of the privacy risks of the conventional internet (and more) while at present offering few of the defensive utilities tha…
▽ More
Virtual reality (VR) telepresence applications and the so-called "metaverse" promise to be the next major medium of human-computer interaction. However, with recent studies demonstrating the ease at which VR users can be profiled and deanonymized, metaverse platforms carry many of the privacy risks of the conventional internet (and more) while at present offering few of the defensive utilities that users are accustomed to having access to. To remedy this, we present the first known method of implementing an "incognito mode" for VR. Our technique leverages local differential privacy to quantifiably obscure sensitive user data attributes, with a focus on intelligently adding noise when and where it is needed most to maximize privacy while minimizing usability impact. Our system is capable of flexibly adapting to the unique needs of each VR application to further optimize this trade-off. We implement our solution as a universal Unity (C#) plugin that we then evaluate using several popular VR applications. Upon faithfully replicating the most well-known VR privacy attack studies, we show a significant degradation of attacker capabilities when using our solution.
△ Less
Submitted 23 October, 2023; v1 submitted 10 August, 2022;
originally announced August 2022.
-
Multi-Factor Key Derivation Function (MFKDF) for Fast, Flexible, Secure, & Practical Key Management
Authors:
Vivek Nair,
Dawn Song
Abstract:
We present the first general construction of a Multi-Factor Key Derivation Function (MFKDF). Our function expands upon password-based key derivation functions (PBKDFs) with support for using other popular authentication factors like TOTP, HOTP, and hardware tokens in the key derivation process. In doing so, it provides an exponential security improvement over PBKDFs with less than 12 ms of additio…
▽ More
We present the first general construction of a Multi-Factor Key Derivation Function (MFKDF). Our function expands upon password-based key derivation functions (PBKDFs) with support for using other popular authentication factors like TOTP, HOTP, and hardware tokens in the key derivation process. In doing so, it provides an exponential security improvement over PBKDFs with less than 12 ms of additional computational overhead in a typical web browser. We further present a threshold MFKDF construction, allowing for client-side key recovery and reconstitution if a factor is lost. Finally, by "stacking" derived keys, we provide a means of cryptographically enforcing arbitrarily specific key derivation policies. The result is a paradigm shift toward direct cryptographic protection of user data using all available authentication factors, with no noticeable change to the user experience. We demonstrate the ability of our solution to not only significantly improve the security of existing systems implementing PBKDFs, but also to enable new applications where PBKDFs would not be considered a feasible approach.
△ Less
Submitted 16 February, 2023; v1 submitted 10 August, 2022;
originally announced August 2022.