-
Fully discrete energy-dissipative and conservative discrete gradient particle methods for a class of continuity equations
Authors:
**gwei Hu,
Samuel Q. Van Fleet,
Andy T. S. Wan
Abstract:
Structure-preserving particle methods have recently been proposed for a class of nonlinear continuity equations, including aggregation-diffusion equation in [J. Carrillo, K. Craig, F. Patacchini, Calc. Var., 58 (2019), pp. 53] and the Landau equation in [J. Carrillo, J. Hu., L. Wang, J. Wu, J. Comput. Phys. X, 7 (2020), pp. 100066]. One common feature to these equations is that they both admit som…
▽ More
Structure-preserving particle methods have recently been proposed for a class of nonlinear continuity equations, including aggregation-diffusion equation in [J. Carrillo, K. Craig, F. Patacchini, Calc. Var., 58 (2019), pp. 53] and the Landau equation in [J. Carrillo, J. Hu., L. Wang, J. Wu, J. Comput. Phys. X, 7 (2020), pp. 100066]. One common feature to these equations is that they both admit some variational formulation, which upon proper regularization, leads to particle approximations dissipating the energy and conserving some quantities simultaneously at the semi-discrete level. In this paper, we formulate continuity equations with a density dependent bilinear form associated with the variational derivative of the energy functional and prove that appropriate particle methods satisfy a compatibility condition with its regularized energy. This enables us to utilize discrete gradient time integrators and show that the energy can be dissipated and the mass conserved simultaneously at the fully discrete level. In the case of the Landau equation, we prove that our approach also conserves the momentum and kinetic energy at the fully discrete level. Several numerical examples are presented to demonstrate the dissipative and conservative properties of our proposed method.
△ Less
Submitted 29 June, 2024;
originally announced July 2024.
-
VarBench: Robust Language Model Benchmarking Through Dynamic Variable Perturbation
Authors:
Kun Qian,
Shunji Wan,
Claudia Tang,
Youzhi Wang,
Xuanming Zhang,
Maximillian Chen,
Zhou Yu
Abstract:
As large language models achieve impressive scores on traditional benchmarks, an increasing number of researchers are becoming concerned about benchmark data leakage during pre-training, commonly known as the data contamination problem. To ensure fair evaluation, recent benchmarks release only the training and validation sets, kee** the test set labels closed-source. They require anyone wishing…
▽ More
As large language models achieve impressive scores on traditional benchmarks, an increasing number of researchers are becoming concerned about benchmark data leakage during pre-training, commonly known as the data contamination problem. To ensure fair evaluation, recent benchmarks release only the training and validation sets, kee** the test set labels closed-source. They require anyone wishing to evaluate his language model to submit the model's predictions for centralized processing and then publish the model's result on their leaderboard. However, this submission process is inefficient and prevents effective error analysis. To address this issue, we propose to variabilize benchmarks and evaluate language models dynamically. Specifically, we extract variables from each test case and define a value range for each variable. For each evaluation, we sample new values from these value ranges to create unique test cases, thus ensuring a fresh evaluation each time. We applied this variable perturbation method to four datasets: GSM8K, ARC, CommonsenseQA, and TruthfulQA, which cover mathematical generation and multiple-choice tasks. Our experimental results demonstrate that this approach provides a more accurate assessment of the true capabilities of language models, effectively mitigating the contamination problem.
△ Less
Submitted 26 June, 2024; v1 submitted 25 June, 2024;
originally announced June 2024.
-
Crowd-Sourced NeRF: Collecting Data from Production Vehicles for 3D Street View Reconstruction
Authors:
Tong Qin,
Changze Li,
Haoyang Ye,
Shaowei Wan,
Minzhen Li,
Hongwei Liu,
Ming Yang
Abstract:
Recently, Neural Radiance Fields (NeRF) achieved impressive results in novel view synthesis. Block-NeRF showed the capability of leveraging NeRF to build large city-scale models. For large-scale modeling, a mass of image data is necessary. Collecting images from specially designed data-collection vehicles can not support large-scale applications. How to acquire massive high-quality data remains an…
▽ More
Recently, Neural Radiance Fields (NeRF) achieved impressive results in novel view synthesis. Block-NeRF showed the capability of leveraging NeRF to build large city-scale models. For large-scale modeling, a mass of image data is necessary. Collecting images from specially designed data-collection vehicles can not support large-scale applications. How to acquire massive high-quality data remains an opening problem. Noting that the automotive industry has a huge amount of image data, crowd-sourcing is a convenient way for large-scale data collection. In this paper, we present a crowd-sourced framework, which utilizes substantial data captured by production vehicles to reconstruct the scene with the NeRF model. This approach solves the key problem of large-scale reconstruction, that is where the data comes from and how to use them. Firstly, the crowd-sourced massive data is filtered to remove redundancy and keep a balanced distribution in terms of time and space. Then a structure-from-motion module is performed to refine camera poses. Finally, images, as well as poses, are used to train the NeRF model in a certain block. We highlight that we present a comprehensive framework that integrates multiple modules, including data selection, sparse 3D reconstruction, sequence appearance embedding, depth supervision of ground surface, and occlusion completion. The complete system is capable of effectively processing and reconstructing high-quality 3D scenes from crowd-sourced data. Extensive quantitative and qualitative experiments were conducted to validate the performance of our system. Moreover, we proposed an application, named first-view navigation, which leveraged the NeRF model to generate 3D street view and guide the driver with a synthesized video.
△ Less
Submitted 23 June, 2024;
originally announced June 2024.
-
The projected sensitivity of SCEP experiment to Magnetic Monopole
Authors:
Changqing Ye,
Beige Liu,
Zhe Cao,
Lingzhi Han,
Xinming Huang,
Min Jiang,
Dong Liu,
Qing Lin,
Shitian Wan,
Yusheng Wu,
Lei Zhao,
Yue Zhang,
Xinhua Peng,
Zhengguo Zhao
Abstract:
The investigation of beyond-Standard-Model particles is a compelling direction in the pursuit of new physics. One such hypothetical particle, the magnetic monopole, has garnered considerable attention due to its strong theoretical motivation and potential to unveil profound physical phenomena. The magnetic monopole is intricately linked to the long-standing enigma surrounding the quantization of e…
▽ More
The investigation of beyond-Standard-Model particles is a compelling direction in the pursuit of new physics. One such hypothetical particle, the magnetic monopole, has garnered considerable attention due to its strong theoretical motivation and potential to unveil profound physical phenomena. The magnetic monopole is intricately linked to the long-standing enigma surrounding the quantization of electric charge. In this manuscript, we propose a novel detection scenario for magnetic monopoles by employing a coincidence measurement technique that combines a room-temperature magnetometer with plastic scintillators. This setup allows for the collection of both the induction and scintillation signals generated by the passage of a monopole. The estimation of the sensitivity using a simple benchmark setup is given.
△ Less
Submitted 19 June, 2024; v1 submitted 18 June, 2024;
originally announced June 2024.
-
SeMOPO: Learning High-quality Model and Policy from Low-quality Offline Visual Datasets
Authors:
Shenghua Wan,
Ziyuan Chen,
Le Gan,
Shuai Feng,
De-Chuan Zhan
Abstract:
Model-based offline reinforcement Learning (RL) is a promising approach that leverages existing data effectively in many real-world applications, especially those involving high-dimensional inputs like images and videos. To alleviate the distribution shift issue in offline RL, existing model-based methods heavily rely on the uncertainty of learned dynamics. However, the model uncertainty estimatio…
▽ More
Model-based offline reinforcement Learning (RL) is a promising approach that leverages existing data effectively in many real-world applications, especially those involving high-dimensional inputs like images and videos. To alleviate the distribution shift issue in offline RL, existing model-based methods heavily rely on the uncertainty of learned dynamics. However, the model uncertainty estimation becomes significantly biased when observations contain complex distractors with non-trivial dynamics. To address this challenge, we propose a new approach - \emph{Separated Model-based Offline Policy Optimization} (SeMOPO) - decomposing latent states into endogenous and exogenous parts via conservative sampling and estimating model uncertainty on the endogenous states only. We provide a theoretical guarantee of model uncertainty and performance bound of SeMOPO. To assess the efficacy, we construct the Low-Quality Vision Deep Data-Driven Datasets for RL (LQV-D4RL), where the data are collected by non-expert policy and the observations include moving distractors. Experimental results show that our method substantially outperforms all baseline methods, and further analytical experiments validate the critical designs in our method. The project website is \href{https://sites.google.com/view/semopo}{https://sites.google.com/view/semopo}.
△ Less
Submitted 13 June, 2024;
originally announced June 2024.
-
Targeted marine cloud brightening can dampen El Niño
Authors:
Jessica S. Wan,
John T. Fasullo,
Nan Rosenbloom,
Chih-Chieh Jack Chen,
Katharine Ricke
Abstract:
Many record-breaking climate extremes arise from both greenhouse gas-induced warming and natural climate variability. Marine cloud brightening, a solar geoengineering strategy originally proposed to reduce long-term warming, could potentially mitigate extreme events by instead targeting seasonal phenomena, such as El Niño-Southern Oscillation (ENSO). By exploiting the 2019-2020 Australian wildfire…
▽ More
Many record-breaking climate extremes arise from both greenhouse gas-induced warming and natural climate variability. Marine cloud brightening, a solar geoengineering strategy originally proposed to reduce long-term warming, could potentially mitigate extreme events by instead targeting seasonal phenomena, such as El Niño-Southern Oscillation (ENSO). By exploiting the 2019-2020 Australian wildfire experiment-of-opportunity, we show that simulated marine cloud brightening in the southeast Pacific reproduces observed cloud changes and induces La Niña-like responses. We then explore how cloud brightening timing and duration modifies the 1997-1998 and 2015-2016 El Niño events. We find the earliest and longest interventions effectively restore neutral ENSO conditions and dampen El Niño's impacts. Solar geoengineering that targets climate variability could complement tools such as ENSO forecasting and provide a pathway for climate risk mitigation.
△ Less
Submitted 11 June, 2024;
originally announced June 2024.
-
Self-locked broadband Raman-electro-optic microcomb
Authors:
Shuai Wan,
Pi-Yu Wang,
Ming Li,
Rui Ma,
Rui Niu,
Fang-Wen Sun,
Fang Bo,
Guang-Can Guo,
Chun-Hua Dong
Abstract:
Optical frequency combs (OFCs), composed of equally spaced frequency tones, have spurred advancements in communications, spectroscopy, precision measurement and fundamental physics research. A prevalent method for generating OFCs involves the electro-optic (EO) effect, i.e., EO comb, renowned for its rapid tunability via precise microwave field control. Recent advances in integrated lithium niobat…
▽ More
Optical frequency combs (OFCs), composed of equally spaced frequency tones, have spurred advancements in communications, spectroscopy, precision measurement and fundamental physics research. A prevalent method for generating OFCs involves the electro-optic (EO) effect, i.e., EO comb, renowned for its rapid tunability via precise microwave field control. Recent advances in integrated lithium niobate (LN) photonics have greatly enhanced the efficiency of EO effect, enabling the generation of broadband combs with reduced microwave power. However, parasitic nonlinear effects, such as Raman scattering and four-wave mixing, often emerge in high quality nonlinear devices, impeding the expansion of comb bandwidth and the minimization of frequency noise. Here, we tame these nonlinear effects and present a novel type of OFC, i.e., the self-locked Raman-electro-optic (REO) microcomb by leveraging the collaboration of EO, Kerr and Raman scattering processes. The spectral width of the REO microcomb benefits from the Raman gain and Kerr effect, encompassing nearly 1400 comb lines spanning over 300 nm with a fine repetition rate of 26.03 GHz, much larger than the pure EO combs. Remarkably, the system can maintain a self-locked low-noise state in the presence of multiple nonlinearities without the need for external active feedback. Our approach points to a direction for improving the performance of microcombs and paves the way for exploring new nonlinear physics, such as new laser locking techniques, through the collaboration of inevitable multiple nonlinear effects in integrated photonics.
△ Less
Submitted 30 May, 2024;
originally announced May 2024.
-
A characterization of contact elements
Authors:
Zhenkun Li,
Shunyu Wan
Abstract:
We show that for a non-trivial element $c$ in $\widehat{HF}(-Y)$, there exists a tight contact structure $ξ$ on $Y$ whose contact invariant realizes $c$ if and only if there exists a non-trivial fibered knot $K$ such that $-τ_c(K)=g(K)$. Moreover, when such a fibered knot $K$ does exist, $ξ$ can be chosen to satisfy the extra condition that $K$ admits a Legendrian representative with Thurston-Benn…
▽ More
We show that for a non-trivial element $c$ in $\widehat{HF}(-Y)$, there exists a tight contact structure $ξ$ on $Y$ whose contact invariant realizes $c$ if and only if there exists a non-trivial fibered knot $K$ such that $-τ_c(K)=g(K)$. Moreover, when such a fibered knot $K$ does exist, $ξ$ can be chosen to satisfy the extra condition that $K$ admits a Legendrian representative with Thurston-Bennequin number tb$(K)$ equal to $0$ in $(Y,ξ)$.
△ Less
Submitted 7 July, 2024; v1 submitted 26 May, 2024;
originally announced May 2024.
-
Networked Integrated Sensing and Communications for 6G Wireless Systems
Authors:
Jiapeng Li,
Xiaodan Shao,
Feng Chen,
Shaohua Wan,
Chang Liu,
Zhiqiang Wei,
Derrick Wing Kwan Ng
Abstract:
Integrated sensing and communication (ISAC) is envisioned as a key pillar for enabling the upcoming sixth generation (6G) communication systems, requiring not only reliable communication functionalities but also highly accurate environmental sensing capabilities. In this paper, we design a novel networked ISAC framework to explore the collaboration among multiple users for environmental sensing. S…
▽ More
Integrated sensing and communication (ISAC) is envisioned as a key pillar for enabling the upcoming sixth generation (6G) communication systems, requiring not only reliable communication functionalities but also highly accurate environmental sensing capabilities. In this paper, we design a novel networked ISAC framework to explore the collaboration among multiple users for environmental sensing. Specifically, multiple users can serve as powerful sensors, capturing back scattered signals from a target at various angles to facilitate reliable computational imaging. Centralized sensing approaches are extremely sensitive to the capability of the leader node because it requires the leader node to process the signals sent by all the users. To this end, we propose a two-step distributed cooperative sensing algorithm that allows low-dimensional intermediate estimate exchange among neighboring users, thus eliminating the reliance on the centralized leader node and improving the robustness of sensing. This way, multiple users can cooperatively sense a target by exploiting the block-wise environment sparsity and the interference cancellation technique. Furthermore, we analyze the mean square error of the proposed distributed algorithm as a networked sensing performance metric and propose a beamforming design for the proposed network ISAC scheme to maximize the networked sensing accuracy and communication performance subject to a transmit power constraint. Simulation results validate the effectiveness of the proposed algorithm compared with the state-of-the-art algorithms.
△ Less
Submitted 25 May, 2024;
originally announced May 2024.
-
Bridging the Gap: A Study of AI-based Vulnerability Management between Industry and Academia
Authors:
Shengye Wan,
Joshua Saxe,
Craig Gomes,
Sahana Chennabasappa,
Avilash Rath,
Kun Sun,
Xinda Wang
Abstract:
Recent research advances in Artificial Intelligence (AI) have yielded promising results for automated software vulnerability management. AI-based models are reported to greatly outperform traditional static analysis tools, indicating a substantial workload relief for security engineers. However, the industry remains very cautious and selective about integrating AI-based techniques into their secur…
▽ More
Recent research advances in Artificial Intelligence (AI) have yielded promising results for automated software vulnerability management. AI-based models are reported to greatly outperform traditional static analysis tools, indicating a substantial workload relief for security engineers. However, the industry remains very cautious and selective about integrating AI-based techniques into their security vulnerability management workflow. To understand the reasons, we conducted a discussion-based study, anchored in the authors' extensive industrial experience and keen observations, to uncover the gap between research and practice in this field. We empirically identified three main barriers preventing the industry from adopting academic models, namely, complicated requirements of scalability and prioritization, limited customization flexibility, and unclear financial implications. Meanwhile, research works are significantly impacted by the lack of extensive real-world security data and expertise. We proposed a set of future directions to help better understand industry expectations, improve the practical usability of AI-based security vulnerability research, and drive a synergistic relationship between industry and academia.
△ Less
Submitted 3 May, 2024;
originally announced May 2024.
-
Negative contact surgery on Legendrian non-simple knots
Authors:
Shunyu Wan,
Hugo Zhou
Abstract:
We prove that for any pair of Legendrian representatives of the Chekanov-Eliashberg twist knots with different LOSS invariants, any negative rational contact $r$-surgery with $r\neq -1$ always gives rise to different contact 3-manifolds distinguished by their contact invariants. This gives the first examples of pairs ofLegendrian knots with the same classical invariants but distinct contact $r$-su…
▽ More
We prove that for any pair of Legendrian representatives of the Chekanov-Eliashberg twist knots with different LOSS invariants, any negative rational contact $r$-surgery with $r\neq -1$ always gives rise to different contact 3-manifolds distinguished by their contact invariants. This gives the first examples of pairs ofLegendrian knots with the same classical invariants but distinct contact $r$-surgeries for all negative rational number $r$. We also generalize the statement from the twist knots to a certain families of two bridge knots.
△ Less
Submitted 1 May, 2024;
originally announced May 2024.
-
CyberSecEval 2: A Wide-Ranging Cybersecurity Evaluation Suite for Large Language Models
Authors:
Manish Bhatt,
Sahana Chennabasappa,
Yue Li,
Cyrus Nikolaidis,
Daniel Song,
Shengye Wan,
Faizan Ahmad,
Cornelius Aschermann,
Yaohui Chen,
Dhaval Kapil,
David Molnar,
Spencer Whitman,
Joshua Saxe
Abstract:
Large language models (LLMs) introduce new security risks, but there are few comprehensive evaluation suites to measure and reduce these risks. We present BenchmarkName, a novel benchmark to quantify LLM security risks and capabilities. We introduce two new areas for testing: prompt injection and code interpreter abuse. We evaluated multiple state-of-the-art (SOTA) LLMs, including GPT-4, Mistral,…
▽ More
Large language models (LLMs) introduce new security risks, but there are few comprehensive evaluation suites to measure and reduce these risks. We present BenchmarkName, a novel benchmark to quantify LLM security risks and capabilities. We introduce two new areas for testing: prompt injection and code interpreter abuse. We evaluated multiple state-of-the-art (SOTA) LLMs, including GPT-4, Mistral, Meta Llama 3 70B-Instruct, and Code Llama. Our results show that conditioning away risk of attack remains an unsolved problem; for example, all tested models showed between 26% and 41% successful prompt injection tests. We further introduce the safety-utility tradeoff: conditioning an LLM to reject unsafe prompts can cause the LLM to falsely reject answering benign prompts, which lowers utility. We propose quantifying this tradeoff using False Refusal Rate (FRR). As an illustration, we introduce a novel test set to quantify FRR for cyberattack helpfulness risk. We find many LLMs able to successfully comply with "borderline" benign requests while still rejecting most unsafe requests. Finally, we quantify the utility of LLMs for automating a core cybersecurity task, that of exploiting software vulnerabilities. This is important because the offensive capabilities of LLMs are of intense interest; we quantify this by creating novel test sets for four representative problems. We find that models with coding capabilities perform better than those without, but that further work is needed for LLMs to become proficient at exploit generation. Our code is open source and can be used to evaluate other LLMs.
△ Less
Submitted 19 April, 2024;
originally announced April 2024.
-
Meply: A Large-scale Dataset and Baseline Evaluations for Metastatic Perirectal Lymph Node Detection and Segmentation
Authors:
Weidong Guo,
Hantao Zhang,
Shouhong Wan,
Bingbing Zou,
Wanqin Wang,
Chenyang Qiu,
Jun Li,
Peiquan **
Abstract:
Accurate segmentation of metastatic lymph nodes in rectal cancer is crucial for the staging and treatment of rectal cancer. However, existing segmentation approaches face challenges due to the absence of pixel-level annotated datasets tailored for lymph nodes around the rectum. Additionally, metastatic lymph nodes are characterized by their relatively small size, irregular shapes, and lower contra…
▽ More
Accurate segmentation of metastatic lymph nodes in rectal cancer is crucial for the staging and treatment of rectal cancer. However, existing segmentation approaches face challenges due to the absence of pixel-level annotated datasets tailored for lymph nodes around the rectum. Additionally, metastatic lymph nodes are characterized by their relatively small size, irregular shapes, and lower contrast compared to the background, further complicating the segmentation task. To address these challenges, we present the first large-scale perirectal metastatic lymph node CT image dataset called Meply, which encompasses pixel-level annotations of 269 patients diagnosed with rectal cancer. Furthermore, we introduce a novel lymph-node segmentation model named CoSAM. The CoSAM utilizes sequence-based detection to guide the segmentation of metastatic lymph nodes in rectal cancer, contributing to improved localization performance for the segmentation model. It comprises three key components: sequence-based detection module, segmentation module, and collaborative convergence unit. To evaluate the effectiveness of CoSAM, we systematically compare its performance with several popular segmentation methods using the Meply dataset. Our code and dataset will be publicly available at: https://github.com/kanydao/CoSAM.
△ Less
Submitted 13 April, 2024;
originally announced April 2024.
-
SENSOR: Imitate Third-Person Expert's Behaviors via Active Sensoring
Authors:
Kaichen Huang,
Minghao Shao,
Shenghua Wan,
Hai-Hang Sun,
Shuai Feng,
Le Gan,
De-Chuan Zhan
Abstract:
In many real-world visual Imitation Learning (IL) scenarios, there is a misalignment between the agent's and the expert's perspectives, which might lead to the failure of imitation. Previous methods have generally solved this problem by domain alignment, which incurs extra computation and storage costs, and these methods fail to handle the \textit{hard cases} where the viewpoint gap is too large.…
▽ More
In many real-world visual Imitation Learning (IL) scenarios, there is a misalignment between the agent's and the expert's perspectives, which might lead to the failure of imitation. Previous methods have generally solved this problem by domain alignment, which incurs extra computation and storage costs, and these methods fail to handle the \textit{hard cases} where the viewpoint gap is too large. To alleviate the above problems, we introduce active sensoring in the visual IL setting and propose a model-based SENSory imitatOR (SENSOR) to automatically change the agent's perspective to match the expert's. SENSOR jointly learns a world model to capture the dynamics of latent states, a sensor policy to control the camera, and a motor policy to control the agent. Experiments on visual locomotion tasks show that SENSOR can efficiently simulate the expert's perspective and strategy, and outperforms most baseline methods.
△ Less
Submitted 4 April, 2024;
originally announced April 2024.
-
DIDA: Denoised Imitation Learning based on Domain Adaptation
Authors:
Kaichen Huang,
Hai-Hang Sun,
Shenghua Wan,
Minghao Shao,
Shuai Feng,
Le Gan,
De-Chuan Zhan
Abstract:
Imitating skills from low-quality datasets, such as sub-optimal demonstrations and observations with distractors, is common in real-world applications. In this work, we focus on the problem of Learning from Noisy Demonstrations (LND), where the imitator is required to learn from data with noise that often occurs during the processes of data collection or transmission. Previous IL methods improve t…
▽ More
Imitating skills from low-quality datasets, such as sub-optimal demonstrations and observations with distractors, is common in real-world applications. In this work, we focus on the problem of Learning from Noisy Demonstrations (LND), where the imitator is required to learn from data with noise that often occurs during the processes of data collection or transmission. Previous IL methods improve the robustness of learned policies by injecting an adversarially learned Gaussian noise into pure expert data or utilizing additional ranking information, but they may fail in the LND setting. To alleviate the above problems, we propose Denoised Imitation learning based on Domain Adaptation (DIDA), which designs two discriminators to distinguish the noise level and expertise level of data, facilitating a feature encoder to learn task-related but domain-agnostic representations. Experiment results on MuJoCo demonstrate that DIDA can successfully handle challenging imitation tasks from demonstrations with various types of noise, outperforming most baseline methods.
△ Less
Submitted 4 April, 2024;
originally announced April 2024.
-
What Causes the Failure of Explicit to Implicit Discourse Relation Recognition?
Authors:
Wei Liu,
Stephen Wan,
Michael Strube
Abstract:
We consider an unanswered question in the discourse processing community: why do relation classifiers trained on explicit examples (with connectives removed) perform poorly in real implicit scenarios? Prior work claimed this is due to linguistic dissimilarity between explicit and implicit examples but provided no empirical evidence. In this study, we show that one cause for such failure is a label…
▽ More
We consider an unanswered question in the discourse processing community: why do relation classifiers trained on explicit examples (with connectives removed) perform poorly in real implicit scenarios? Prior work claimed this is due to linguistic dissimilarity between explicit and implicit examples but provided no empirical evidence. In this study, we show that one cause for such failure is a label shift after connectives are eliminated. Specifically, we find that the discourse relations expressed by some explicit instances will change when connectives disappear. Unlike previous work manually analyzing a few examples, we present empirical evidence at the corpus level to prove the existence of such shift. Then, we analyze why label shift occurs by considering factors such as the syntactic role played by connectives, ambiguity of connectives, and more. Finally, we investigate two strategies to mitigate the label shift: filtering out noisy data and joint learning with connectives. Experiments on PDTB 2.0, PDTB 3.0, and the GUM dataset demonstrate that classifiers trained with our strategies outperform strong baselines.
△ Less
Submitted 1 April, 2024;
originally announced April 2024.
-
Connection Heat Kernel On Connection Lattices And Connection Discrete Torus
Authors:
Yong Lin,
Shi Wan
Abstract:
By the connection graph we mean an underlying weighted graph with a connection which associates edge set with an orthogonal group. This paper centers its investigation on the connection heat kernels on connection lattices and connection discrete torus. For one dimensional connection lattice, we derive the connection heat kernel expression by doing the Taylor expansion on the exponential function i…
▽ More
By the connection graph we mean an underlying weighted graph with a connection which associates edge set with an orthogonal group. This paper centers its investigation on the connection heat kernels on connection lattices and connection discrete torus. For one dimensional connection lattice, we derive the connection heat kernel expression by doing the Taylor expansion on the exponential function involving normalized connection Laplacian. We introduce a novel connection called product connection and prove that the connection heat kernel on arbitrary high dimensional lattice with product connection equals the Kronecker sum of one dimensional connection lattices' connection heat kernels. Furthermore, if the connection graph is consistent, we substantiate the interrelation between its connection heat kernel and its underlying graph's heat kernel. We define a connection called quotient connection such that discrete torus with quotient connection can be considered as a quotient graph of connection lattice, whose connection heat kernel is demonstrated to be the sum of connection lattices' connection heat kernels. In addition, we derive an alternative expression of connection heat kernel on discrete torus whenever its quotient connection is a constant connection, yielding an equation as a connection graph's trace formula.
△ Less
Submitted 31 March, 2024;
originally announced April 2024.
-
LeFusion: Synthesizing Myocardial Pathology on Cardiac MRI via Lesion-Focus Diffusion Models
Authors:
Hantao Zhang,
Jiancheng Yang,
Shouhong Wan,
Pascal Fua
Abstract:
Data generated in clinical practice often exhibits biases, such as long-tail imbalance and algorithmic unfairness. This study aims to mitigate these challenges through data synthesis. Previous efforts in medical imaging synthesis have struggled with separating lesion information from background context, leading to difficulties in generating high-quality backgrounds and limited control over the syn…
▽ More
Data generated in clinical practice often exhibits biases, such as long-tail imbalance and algorithmic unfairness. This study aims to mitigate these challenges through data synthesis. Previous efforts in medical imaging synthesis have struggled with separating lesion information from background context, leading to difficulties in generating high-quality backgrounds and limited control over the synthetic output. Inspired by diffusion-based image inpainting, we propose LeFusion, lesion-focused diffusion models. By redesigning the diffusion learning objectives to concentrate on lesion areas, it simplifies the model learning process and enhance the controllability of the synthetic output, while preserving background by integrating forward-diffused background contexts into the reverse diffusion process. Furthermore, we generalize it to jointly handle multi-class lesions, and further introduce a generative model for lesion masks to increase synthesis diversity. Validated on the DE-MRI cardiac lesion segmentation dataset (Emidec), our methodology employs the popular nnUNet to demonstrate that the synthetic data make it possible to effectively enhance a state-of-the-art model. Code and model are available at https://github.com/M3DV/LeFusion.
△ Less
Submitted 20 March, 2024;
originally announced March 2024.
-
AD3: Implicit Action is the Key for World Models to Distinguish the Diverse Visual Distractors
Authors:
Yucen Wang,
Shenghua Wan,
Le Gan,
Shuai Feng,
De-Chuan Zhan
Abstract:
Model-based methods have significantly contributed to distinguishing task-irrelevant distractors for visual control. However, prior research has primarily focused on heterogeneous distractors like noisy background videos, leaving homogeneous distractors that closely resemble controllable agents largely unexplored, which poses significant challenges to existing methods. To tackle this problem, we p…
▽ More
Model-based methods have significantly contributed to distinguishing task-irrelevant distractors for visual control. However, prior research has primarily focused on heterogeneous distractors like noisy background videos, leaving homogeneous distractors that closely resemble controllable agents largely unexplored, which poses significant challenges to existing methods. To tackle this problem, we propose Implicit Action Generator (IAG) to learn the implicit actions of visual distractors, and present a new algorithm named implicit Action-informed Diverse visual Distractors Distinguisher (AD3), that leverages the action inferred by IAG to train separated world models. Implicit actions effectively capture the behavior of background distractors, aiding in distinguishing the task-irrelevant components, and the agent can optimize the policy within the task-relevant state space. Our method achieves superior performance on various visual control tasks featuring both heterogeneous and homogeneous distractors. The indispensable role of implicit actions learned by IAG is also empirically validated.
△ Less
Submitted 5 June, 2024; v1 submitted 14 March, 2024;
originally announced March 2024.
-
Spin relaxation in inhomogeneous magnetic fields with depolarizing boundaries
Authors:
Yue Chang,
Shuangai Wan,
Shichao Dong,
Jie Qin
Abstract:
Field-inhomogeneity-induced relaxation of atomic spins confined in vapor cells with depolarizing walls is studied. In contrast to nuclear spins, such as noble-gas spins, which experience minimal polarization loss at cell walls, atomic spins in uncoated cells undergo randomization at the boundaries. This distinct boundary condition results in a varied dependence of the relaxation rate on the field…
▽ More
Field-inhomogeneity-induced relaxation of atomic spins confined in vapor cells with depolarizing walls is studied. In contrast to nuclear spins, such as noble-gas spins, which experience minimal polarization loss at cell walls, atomic spins in uncoated cells undergo randomization at the boundaries. This distinct boundary condition results in a varied dependence of the relaxation rate on the field gradient. By solving the Bloch-Torrey equation under fully depolarizing boundary conditions, we illustrate that the relaxation rate induced by field inhomogeneity is more pronounced for spins with a smaller original relaxation rate (in the absence of the inhomogeneous field). We establish an upper limit for the relaxation rate through calculations in the perturbation regime. Moreover, we connect it to the spin-exchange-relaxation-free magnetometers, demonstrating that its linewidth is most sensitive to inhomogeneous fields along the magnetometer's sensitive axis. Our theoretical result agrees with the experimental data for cells subjected to small pump power. However, deviations in larger input-power scenarios underscore the importance of considering pump field attenuation, which leads to uniformly distributed light shift that behaves as an inhomogeneous magnetic field.
△ Less
Submitted 13 March, 2024;
originally announced March 2024.
-
Connection Laplacian on discrete tori with converging property
Authors:
Yong Lin,
Shi Wan,
Haohang Zhang
Abstract:
This paper presents a comprehensive analysis of the spectral properties of the connection Laplacian for both real and discrete tori. We introduce novel methods to examine these eigenvalues by employing parallel orthonormal basis in the pullback bundle on universal covering spaces. Our main results reveal that the eigenvalues of the connection Laplacian on a real torus can be expressed in terms of…
▽ More
This paper presents a comprehensive analysis of the spectral properties of the connection Laplacian for both real and discrete tori. We introduce novel methods to examine these eigenvalues by employing parallel orthonormal basis in the pullback bundle on universal covering spaces. Our main results reveal that the eigenvalues of the connection Laplacian on a real torus can be expressed in terms of standard Laplacian eigenvalues, with a unique twist encapsulated in the torsion matrix. This connection is further investigated in the context of discrete tori, where we demonstrate similar results.
A significant portion of the paper is dedicated to exploring the convergence properties of a family of discrete tori towards a real torus. We extend previous findings on the spectrum of the standard Laplacian to include the connection Laplacian, revealing that the rescaled eigenvalues of discrete tori converge to those of the real torus. Furthermore, our analysis of the discrete torus occurs within a broader context, where it is not constrained to being a product of cyclic groups. Additionally, we delve into the theta functions associated with these structures, providing a detailed analysis of their behavior and convergence.
The paper culminates in a study of the regularized log-determinant of the connection Laplacian and the converging results of it. We derive formulae for both real and discrete tori, emphasizing their dependence on the spectral zeta function and theta functions.
△ Less
Submitted 10 March, 2024;
originally announced March 2024.
-
Postharvest litchi (Litchi chinensis Sonn.) quality preservation by alginate oligosaccharides
Authors:
Jianlie Shen,
Shulin Wan,
Haidong Tan
Abstract:
This study investigates the efficacy of alginate oligosaccharides, derived from a novel alginate lyase expressed in E. coli (Pet21a-alginate lyase), in preserving the postharvest quality of litchi (Litchi chinensis Sonn.) fruits. The alginate lyase, characterized by Huang et al. (2013), was employed to produce AOS through enzymatic degradation of alginate. The resulting oligosaccharides were appli…
▽ More
This study investigates the efficacy of alginate oligosaccharides, derived from a novel alginate lyase expressed in E. coli (Pet21a-alginate lyase), in preserving the postharvest quality of litchi (Litchi chinensis Sonn.) fruits. The alginate lyase, characterized by Huang et al. (2013), was employed to produce AOS through enzymatic degradation of alginate. The resulting oligosaccharides were applied to litchi fruits harvested from Guangzhou Zengcheng to evaluate their impact on various quality parameters under controlled storage conditions. The study focused on measuring the effects of alginate oligosaccharide treatment on the fruits' color retention, water loss rate, hardness, and susceptibility to mold infection, under a set relative humidity and temperature. Results demonstrated significant improvements in the treated fruits, with enhanced color retention, reduced water loss, maintained hardness, and lower rates of mold infection compared to untreated controls. These findings suggest that AOS offer a promising natural alternative for extending the shelf life and maintaining the quality of litchi fruits postharvest.
△ Less
Submitted 2 March, 2024;
originally announced March 2024.
-
Effects of zero and reversed magnetic shear on resistive wall modes in a limiter tokamak plasma
Authors:
Sui Wan,
** Zhu,
Haolong Li,
Rui Han
Abstract:
Advanced tokamak scenarios often feature equilibriums with zero and reversed magnetic shear. To isolate and investigate their impacts on the resistive wall mode (RWM) instability analytically, we construct a series of cylindrical limiter equilibriums with reversed magnetic shear in the core and zero magnetic shear towards plasma edge, as a prototype of the configurations in advanced tokamak scenar…
▽ More
Advanced tokamak scenarios often feature equilibriums with zero and reversed magnetic shear. To isolate and investigate their impacts on the resistive wall mode (RWM) instability analytically, we construct a series of cylindrical limiter equilibriums with reversed magnetic shear in the core and zero magnetic shear towards plasma edge, as a prototype of the configurations in advanced tokamak scenarios. Uniform plasma pressure is assumed, so that we can focus our analysis on the current-driven RWMs. Based on the reduced ideal MHD equations, analytical solutions for the $n=1$ resistive wall mode are obtained, which indicate that increasing the reversal of magnetic shear in the core region enhances the RWM instability, whereas the widened region of zero shear near edge leads to lower growth rate of RWM, except when the $q$ value with zero magnetic shear approaches rational values. On the other hand, enhanced positive shear at plasma edge is found to be stabilizing on RWM. NIMROD calculation results confirm these analytical findings.
△ Less
Submitted 11 January, 2024;
originally announced January 2024.
-
Comparing discriminating abilities of evaluation metrics in link prediction
Authors:
Xinshan Jiao,
Shuyan Wan,
Qian Liu,
Yilin Bi,
Yan-Li Lee,
En Xu,
Dong Hao,
Tao Zhou
Abstract:
Link prediction aims to predict the potential existence of links between two unconnected nodes within a network based on the known topological characteristics. Evaluation metrics are used to assess the effectiveness of algorithms in link prediction. The discriminating ability of these evaluation metrics is vitally important for accurately evaluating link prediction algorithms. In this study, we pr…
▽ More
Link prediction aims to predict the potential existence of links between two unconnected nodes within a network based on the known topological characteristics. Evaluation metrics are used to assess the effectiveness of algorithms in link prediction. The discriminating ability of these evaluation metrics is vitally important for accurately evaluating link prediction algorithms. In this study, we propose an artificial network model, based on which one can adjust a single parameter to monotonically and continuously turn the prediction accuracy of the specifically designed link prediction algorithm. Building upon this foundation, we show a framework to depict the effectiveness of evaluating metrics by focusing on their discriminating ability. Specifically, a quantitative comparison in the abilities of correctly discerning varying prediction accuracies was conducted encompassing nine evaluation metrics: Precision, Recall, F1-Measure, Matthews Correlation Coefficient (MCC), Balanced Precision (BP), the Area Under the receiver operating characteristic Curve (AUC), the Area Under the Precision-Recall curve (AUPR), Normalized Discounted Cumulative Gain (NDCG), and the Area Under the magnified ROC (AUC-mROC). The results indicate that the discriminating abilities of the three metrics, AUC, AUPR, and NDCG, are significantly higher than those of other metrics.
△ Less
Submitted 8 January, 2024;
originally announced January 2024.
-
Purple Llama CyberSecEval: A Secure Coding Benchmark for Language Models
Authors:
Manish Bhatt,
Sahana Chennabasappa,
Cyrus Nikolaidis,
Shengye Wan,
Ivan Evtimov,
Dominik Gabi,
Daniel Song,
Faizan Ahmad,
Cornelius Aschermann,
Lorenzo Fontana,
Sasha Frolov,
Ravi Prakash Giri,
Dhaval Kapil,
Yiannis Kozyrakis,
David LeBlanc,
James Milazzo,
Aleksandar Straumann,
Gabriel Synnaeve,
Varun Vontimitta,
Spencer Whitman,
Joshua Saxe
Abstract:
This paper presents CyberSecEval, a comprehensive benchmark developed to help bolster the cybersecurity of Large Language Models (LLMs) employed as coding assistants. As what we believe to be the most extensive unified cybersecurity safety benchmark to date, CyberSecEval provides a thorough evaluation of LLMs in two crucial security domains: their propensity to generate insecure code and their lev…
▽ More
This paper presents CyberSecEval, a comprehensive benchmark developed to help bolster the cybersecurity of Large Language Models (LLMs) employed as coding assistants. As what we believe to be the most extensive unified cybersecurity safety benchmark to date, CyberSecEval provides a thorough evaluation of LLMs in two crucial security domains: their propensity to generate insecure code and their level of compliance when asked to assist in cyberattacks. Through a case study involving seven models from the Llama 2, Code Llama, and OpenAI GPT large language model families, CyberSecEval effectively pinpointed key cybersecurity risks. More importantly, it offered practical insights for refining these models. A significant observation from the study was the tendency of more advanced models to suggest insecure code, highlighting the critical need for integrating security considerations in the development of sophisticated LLMs. CyberSecEval, with its automated test case generation and evaluation pipeline covers a broad scope and equips LLM designers and researchers with a tool to broadly measure and enhance the cybersecurity safety properties of LLMs, contributing to the development of more secure AI systems.
△ Less
Submitted 7 December, 2023;
originally announced December 2023.
-
Multi-modal Instance Refinement for Cross-domain Action Recognition
Authors:
Yuan Qing,
Naixing Wu,
Shaohua Wan,
Lixin Duan
Abstract:
Unsupervised cross-domain action recognition aims at adapting the model trained on an existing labeled source domain to a new unlabeled target domain. Most existing methods solve the task by directly aligning the feature distributions of source and target domains. However, this would cause negative transfer during domain adaptation due to some negative training samples in both domains. In the sour…
▽ More
Unsupervised cross-domain action recognition aims at adapting the model trained on an existing labeled source domain to a new unlabeled target domain. Most existing methods solve the task by directly aligning the feature distributions of source and target domains. However, this would cause negative transfer during domain adaptation due to some negative training samples in both domains. In the source domain, some training samples are of low-relevance to target domain due to the difference in viewpoints, action styles, etc. In the target domain, there are some ambiguous training samples that can be easily classified as another type of action under the case of source domain. The problem of negative transfer has been explored in cross-domain object detection, while it remains under-explored in cross-domain action recognition. Therefore, we propose a Multi-modal Instance Refinement (MMIR) method to alleviate the negative transfer based on reinforcement learning. Specifically, a reinforcement learning agent is trained in both domains for every modality to refine the training data by selecting out negative samples from each domain. Our method finally outperforms several other state-of-the-art baselines in cross-domain action recognition on the benchmark EPIC-Kitchens dataset, which demonstrates the advantage of MMIR in reducing negative transfer.
△ Less
Submitted 24 November, 2023;
originally announced November 2023.
-
Multimodal Large Language Models: A Survey
Authors:
Jiayang Wu,
Wensheng Gan,
Zefeng Chen,
Shicheng Wan,
Philip S. Yu
Abstract:
The exploration of multimodal language models integrates multiple data types, such as images, text, language, audio, and other heterogeneity. While the latest large language models excel in text-based tasks, they often struggle to understand and process other data types. Multimodal models address this limitation by combining various modalities, enabling a more comprehensive understanding of divers…
▽ More
The exploration of multimodal language models integrates multiple data types, such as images, text, language, audio, and other heterogeneity. While the latest large language models excel in text-based tasks, they often struggle to understand and process other data types. Multimodal models address this limitation by combining various modalities, enabling a more comprehensive understanding of diverse data. This paper begins by defining the concept of multimodal and examining the historical development of multimodal algorithms. Furthermore, we introduce a range of multimodal products, focusing on the efforts of major technology companies. A practical guide is provided, offering insights into the technical aspects of multimodal models. Moreover, we present a compilation of the latest algorithms and commonly used datasets, providing researchers with valuable resources for experimentation and evaluation. Lastly, we explore the applications of multimodal models and discuss the challenges associated with their development. By addressing these aspects, this paper aims to facilitate a deeper understanding of multimodal models and their potential in various domains.
△ Less
Submitted 22 November, 2023;
originally announced November 2023.
-
Tight contact structures on some families of small Seifert fiber spaces
Authors:
Shunyu Wan
Abstract:
Suppose $K$ is a knot in a 3-manifold $Y$, and that $Y$ admits a pair of distinct contact structures. Assume that $K$ has Legendrian representatives in each of these contact structures, such that the corresponding Thurston-Bennequin framings are equivalent. This paper provides a method to prove that the contact structures resulting from Legendrian surgery along these two representatives remain dis…
▽ More
Suppose $K$ is a knot in a 3-manifold $Y$, and that $Y$ admits a pair of distinct contact structures. Assume that $K$ has Legendrian representatives in each of these contact structures, such that the corresponding Thurston-Bennequin framings are equivalent. This paper provides a method to prove that the contact structures resulting from Legendrian surgery along these two representatives remain distinct. Applying this method to the situation where the starting manifold is $-Σ(2,3,6m+1)$ and the knot is a singular fiber, together with convex surface theory we can classify the tight contact structures on certain families of Seifert fiber spaces.
△ Less
Submitted 9 April, 2024; v1 submitted 16 November, 2023;
originally announced November 2023.
-
Model-as-a-Service (MaaS): A Survey
Authors:
Wensheng Gan,
Shicheng Wan,
Philip S. Yu
Abstract:
Due to the increased number of parameters and data in the pre-trained model exceeding a certain level, a foundation model (e.g., a large language model) can significantly improve downstream task performance and emerge with some novel special abilities (e.g., deep learning, complex reasoning, and human alignment) that were not present before. Foundation models are a form of generative artificial in…
▽ More
Due to the increased number of parameters and data in the pre-trained model exceeding a certain level, a foundation model (e.g., a large language model) can significantly improve downstream task performance and emerge with some novel special abilities (e.g., deep learning, complex reasoning, and human alignment) that were not present before. Foundation models are a form of generative artificial intelligence (GenAI), and Model-as-a-Service (MaaS) has emerged as a groundbreaking paradigm that revolutionizes the deployment and utilization of GenAI models. MaaS represents a paradigm shift in how we use AI technologies and provides a scalable and accessible solution for developers and users to leverage pre-trained AI models without the need for extensive infrastructure or expertise in model training. In this paper, the introduction aims to provide a comprehensive overview of MaaS, its significance, and its implications for various industries. We provide a brief review of the development history of "X-as-a-Service" based on cloud computing and present the key technologies involved in MaaS. The development of GenAI models will become more democratized and flourish. We also review recent application studies of MaaS. Finally, we highlight several challenges and future issues in this promising area. MaaS is a new deployment and service paradigm for different AI-based models. We hope this review will inspire future research in the field of MaaS.
△ Less
Submitted 9 November, 2023;
originally announced November 2023.
-
Locally Resonant Metagrating by Elastic Impedance Modulation
Authors:
Liyun Cao,
Sheng Wan,
Badreddine Assouar
Abstract:
The optical and acoustic metagratings have addressed the limitations of low-efficiency wave manipulation and high-complexity fabrication of metamaterials and metasurfaces. In this research, we introduce the concept of elastic metagrating and present the theoretical and experimental demonstration of locally resonant elastic metagrating (LREM). Remarkably, the LREM, with dimensions two orders of mag…
▽ More
The optical and acoustic metagratings have addressed the limitations of low-efficiency wave manipulation and high-complexity fabrication of metamaterials and metasurfaces. In this research, we introduce the concept of elastic metagrating and present the theoretical and experimental demonstration of locally resonant elastic metagrating (LREM). Remarkably, the LREM, with dimensions two orders of magnitude smaller than the relevant wavelength, overcomes the size limitations of conventional metagratings and offers a unique design paradigm for highly efficient wave manipulation with an extremely compact structure in elastic wave systems. Based on a distinctive elastic impedance engineering with hybridization of intrinsic evanescent waves, the proposed LREM achieves wide-angle perfect absorption. This tackles a fundamental challenge faced by all elastic metastructures designed for wave manipulation, which consists in the unavoidable vibration modes in finite structures hindering their implementations in real-world applications.
△ Less
Submitted 19 October, 2023;
originally announced October 2023.
-
SGA: A Graph Augmentation Method for Signed Graph Neural Networks
Authors:
Zeyu Zhang,
Shuyan Wan,
Sijie Wang,
Xianda Zheng,
Xinrui Zhang,
Kaiqi Zhao,
Jiamou Liu,
Dong Hao
Abstract:
Signed Graph Neural Networks (SGNNs) are vital for analyzing complex patterns in real-world signed graphs containing positive and negative links. However, three key challenges hinder current SGNN-based signed graph representation learning: sparsity in signed graphs leaves latent structures undiscovered, unbalanced triangles pose representation difficulties for SGNN models, and real-world signed gr…
▽ More
Signed Graph Neural Networks (SGNNs) are vital for analyzing complex patterns in real-world signed graphs containing positive and negative links. However, three key challenges hinder current SGNN-based signed graph representation learning: sparsity in signed graphs leaves latent structures undiscovered, unbalanced triangles pose representation difficulties for SGNN models, and real-world signed graph datasets often lack supplementary information like node labels and features. These constraints limit the potential of SGNN-based representation learning. We address these issues with data augmentation techniques. Despite many graph data augmentation methods existing for unsigned graphs, none are tailored for signed graphs. Our paper introduces the novel Signed Graph Augmentation framework (SGA), comprising three main components. First, we employ the SGNN model to encode the signed graph, extracting latent structural information for candidate augmentation structures. Second, we evaluate these candidate samples (edges) and select the most beneficial ones for modifying the original training set. Third, we propose a novel augmentation perspective that assigns varying training difficulty to training samples, enabling the design of a new training strategy. Extensive experiments on six real-world datasets (Bitcoin-alpha, Bitcoin-otc, Epinions, Slashdot, Wiki-elec, and Wiki-RfA) demonstrate that SGA significantly improves performance across multiple benchmarks. Our method outperforms baselines by up to 22.2% in AUC for SGCN on Wiki-RfA, 33.3% in F1-binary, 48.8% in F1-micro, and 36.3% in F1-macro for GAT on Bitcoin-alpha in link sign prediction.
△ Less
Submitted 14 October, 2023;
originally announced October 2023.
-
CARE: A Large Scale CT Image Dataset and Clinical Applicable Benchmark Model for Rectal Cancer Segmentation
Authors:
Hantao Zhang,
Weidong Guo,
Chenyang Qiu,
Shouhong Wan,
Bingbing Zou,
Wanqin Wang,
Peiquan **
Abstract:
Rectal cancer segmentation of CT image plays a crucial role in timely clinical diagnosis, radiotherapy treatment, and follow-up. Although current segmentation methods have shown promise in delineating cancerous tissues, they still encounter challenges in achieving high segmentation precision. These obstacles arise from the intricate anatomical structures of the rectum and the difficulties in perfo…
▽ More
Rectal cancer segmentation of CT image plays a crucial role in timely clinical diagnosis, radiotherapy treatment, and follow-up. Although current segmentation methods have shown promise in delineating cancerous tissues, they still encounter challenges in achieving high segmentation precision. These obstacles arise from the intricate anatomical structures of the rectum and the difficulties in performing differential diagnosis of rectal cancer. Additionally, a major obstacle is the lack of a large-scale, finely annotated CT image dataset for rectal cancer segmentation. To address these issues, this work introduces a novel large scale rectal cancer CT image dataset CARE with pixel-level annotations for both normal and cancerous rectum, which serves as a valuable resource for algorithm research and clinical application development. Moreover, we propose a novel medical cancer lesion segmentation benchmark model named U-SAM. The model is specifically designed to tackle the challenges posed by the intricate anatomical structures of abdominal organs by incorporating prompt information. U-SAM contains three key components: promptable information (e.g., points) to aid in target area localization, a convolution module for capturing low-level lesion details, and skip-connections to preserve and recover spatial information during the encoding-decoding process. To evaluate the effectiveness of U-SAM, we systematically compare its performance with several popular segmentation methods on the CARE dataset. The generalization of the model is further verified on the WORD dataset. Extensive experiments demonstrate that the proposed U-SAM outperforms state-of-the-art methods on these two datasets. These experiments can serve as the baseline for future research and clinical application development.
△ Less
Submitted 16 August, 2023;
originally announced August 2023.
-
A 3D deep learning classifier and its explainability when assessing coronary artery disease
Authors:
Wing Keung Cheung,
Jeremy Kalindjian,
Robert Bell,
Arjun Nair,
Leon J. Menezes,
Riyaz Patel,
Simon Wan,
Kacy Chou,
Jiahang Chen,
Ryo Torii,
Rhodri H. Davies,
James C. Moon,
Daniel C. Alexander,
Joseph Jacob
Abstract:
Early detection and diagnosis of coronary artery disease (CAD) could save lives and reduce healthcare costs. In this study, we propose a 3D Resnet-50 deep learning model to directly classify normal subjects and CAD patients on computed tomography coronary angiography images. Our proposed method outperforms a 2D Resnet-50 model by 23.65%. Explainability is also provided by using a Grad-GAM. Further…
▽ More
Early detection and diagnosis of coronary artery disease (CAD) could save lives and reduce healthcare costs. In this study, we propose a 3D Resnet-50 deep learning model to directly classify normal subjects and CAD patients on computed tomography coronary angiography images. Our proposed method outperforms a 2D Resnet-50 model by 23.65%. Explainability is also provided by using a Grad-GAM. Furthermore, we link the 3D CAD classification to a 2D two-class semantic segmentation for improved explainability and accurate abnormality localisation.
△ Less
Submitted 29 July, 2023;
originally announced August 2023.
-
SeMAIL: Eliminating Distractors in Visual Imitation via Separated Models
Authors:
Shenghua Wan,
Yucen Wang,
Minghao Shao,
Ruying Chen,
De-Chuan Zhan
Abstract:
Model-based imitation learning (MBIL) is a popular reinforcement learning method that improves sample efficiency on high-dimension input sources, such as images and videos. Following the convention of MBIL research, existing algorithms are highly deceptive by task-irrelevant information, especially moving distractors in videos. To tackle this problem, we propose a new algorithm - named Separated M…
▽ More
Model-based imitation learning (MBIL) is a popular reinforcement learning method that improves sample efficiency on high-dimension input sources, such as images and videos. Following the convention of MBIL research, existing algorithms are highly deceptive by task-irrelevant information, especially moving distractors in videos. To tackle this problem, we propose a new algorithm - named Separated Model-based Adversarial Imitation Learning (SeMAIL) - decoupling the environment dynamics into two parts by task-relevant dependency, which is determined by agent actions, and training separately. In this way, the agent can imagine its trajectories and imitate the expert behavior efficiently in task-relevant state space. Our method achieves near-expert performance on various visual control tasks with complex observations and the more challenging tasks with different backgrounds from expert observations.
△ Less
Submitted 19 June, 2023;
originally announced June 2023.
-
Boosting the Performance of Degraded Reads in RS-coded Distributed Storage Systems
Authors:
Tian Xie,
Juntao Fang,
Shenggang wan,
Changsheng Xie,
Xubin He
Abstract:
Reed-Solomon (RS) codes have been increasingly adopted by distributed storage systems in place of replication,because they provide the same level of availability with much lower storage overhead. However, a key drawback of those RS-coded distributed storage systems is the poor latency of degraded reads, which can be incurred by data failures or hot spots,and are not rare in production environments…
▽ More
Reed-Solomon (RS) codes have been increasingly adopted by distributed storage systems in place of replication,because they provide the same level of availability with much lower storage overhead. However, a key drawback of those RS-coded distributed storage systems is the poor latency of degraded reads, which can be incurred by data failures or hot spots,and are not rare in production environments. To address this issue, we propose a novel parallel reconstruction solution called APLS. APLS leverages all surviving source nodes to send the data needed by degraded reads and chooses light-loaded starter nodes to receive the reconstructed data of those degraded reads. Hence, the latency of the degraded reads can be improved.Prototy**-based experiments are conducted to compare APLS with ECPipe, the state-of-the-art solution of improving the latency of degraded reads. The experimental results demonstrate that APLS effectively reduces the latency, particularly under heavy or medium workloads.
△ Less
Submitted 18 June, 2023;
originally announced June 2023.
-
Naturality of Legendrian LOSS invariant under positive contact surgery
Authors:
Shunyu Wan
Abstract:
Ozsvath and Stipsicz showed that the LOSS invariant is natural under +1 contact surgery. We extend their result and prove the naturality of the LOSS invariant of a Legendrian L under any positive integer contact surgery along another Legendrian S . In addition, when S is rationally null-homologous, we also entirely characterize the Spin^c structure in the surgery cobordism that makes the naturalit…
▽ More
Ozsvath and Stipsicz showed that the LOSS invariant is natural under +1 contact surgery. We extend their result and prove the naturality of the LOSS invariant of a Legendrian L under any positive integer contact surgery along another Legendrian S . In addition, when S is rationally null-homologous, we also entirely characterize the Spin^c structure in the surgery cobordism that makes the naturality of contact invariant or LOSS invariant (without conjugation ambiguity). In particular this implies that contact invariant of the +n contact surgery along a rationally null-homologous Legendrian S depends only on the classical invariants of S. The additional generalityprovided by those results allows us to prove that if two Legendrian knots have different LOSS invariants then after adding the same positive twists to each in a suitable sense, the two new Legendrian knots will also have different LOSS invariants. This leads to new infinite families of examples of Legendrian (or transverse) non-simple knots that are distinguished by their LOSS invariants.
△ Less
Submitted 29 March, 2024; v1 submitted 15 June, 2023;
originally announced June 2023.
-
The Spectral Integral Method (SIM) for the Scattering from an Arbitrary Number of Circular PEC Cylinders
Authors:
Qing Huo Liu,
Siwei Wan,
Chunhui Zhu
Abstract:
We present an accurate spectral integral method (SIM) for the analyses of scattering from multiple circular perfect electric conductor (PEC) cylinders. It solves the coupled surface integral equations by using the Fourier series and addition theorem to decouple the system. The SIM has exponential convergence so that the error decreases exponentially with the sample density on the surfaces, and req…
▽ More
We present an accurate spectral integral method (SIM) for the analyses of scattering from multiple circular perfect electric conductor (PEC) cylinders. It solves the coupled surface integral equations by using the Fourier series and addition theorem to decouple the system. The SIM has exponential convergence so that the error decreases exponentially with the sample density on the surfaces, and requires only about 2-3 points per wavelength (PPW) to reach engineering accuracy with less than 1% error. Numerical results demonstrate that the SIM is much more accurate and efficient than the method of moments (MoM), and thus can be potentially used as the exact radiation boundary condition in the finite element and spectral element methods.
△ Less
Submitted 19 May, 2023;
originally announced May 2023.
-
FedPDD: A Privacy-preserving Double Distillation Framework for Cross-silo Federated Recommendation
Authors:
Sheng Wan,
Dashan Gao,
Hanlin Gu,
Daning Hu
Abstract:
Cross-platform recommendation aims to improve recommendation accuracy by gathering heterogeneous features from different platforms. However, such cross-silo collaborations between platforms are restricted by increasingly stringent privacy protection regulations, thus data cannot be aggregated for training. Federated learning (FL) is a practical solution to deal with the data silo problem in recomm…
▽ More
Cross-platform recommendation aims to improve recommendation accuracy by gathering heterogeneous features from different platforms. However, such cross-silo collaborations between platforms are restricted by increasingly stringent privacy protection regulations, thus data cannot be aggregated for training. Federated learning (FL) is a practical solution to deal with the data silo problem in recommendation scenarios. Existing cross-silo FL methods transmit model information to collaboratively build a global model by leveraging the data of overlapped users. However, in reality, the number of overlapped users is often very small, thus largely limiting the performance of such approaches. Moreover, transmitting model information during training requires high communication costs and may cause serious privacy leakage. In this paper, we propose a novel privacy-preserving double distillation framework named FedPDD for cross-silo federated recommendation, which efficiently transfers knowledge when overlapped users are limited. Specifically, our double distillation strategy enables local models to learn not only explicit knowledge from the other party but also implicit knowledge from its past predictions. Moreover, to ensure privacy and high efficiency, we employ an offline training scheme to reduce communication needs and privacy leakage risk. In addition, we adopt differential privacy to further protect the transmitted information. The experiments on two real-world recommendation datasets, HetRec-MovieLens and Criteo, demonstrate the effectiveness of FedPDD compared to the state-of-the-art approaches.
△ Less
Submitted 30 January, 2024; v1 submitted 9 May, 2023;
originally announced May 2023.
-
Photorefraction-assisted self-emergence of dissipative Kerr solitons
Authors:
Shuai Wan,
Pi-Yu Wang,
Rui Ma,
Zheng-Yu Wang,
Rui Niu,
De-Yong He,
Guang-Can Guo,
Fang Bo,
Junqiu Liu,
Chun-Hua Dong
Abstract:
Generated in high-Q optical microresonators, dissipative Kerr soliton microcombs constitute broadband optical frequency combs with chip sizes and repetition rates in the microwave to millimeter-wave range. For frequency metrology applications such as spectroscopy, optical atomic clocks and frequency synthesizers, octave-spanning soliton microcombs generated in dispersion optimized microresonator a…
▽ More
Generated in high-Q optical microresonators, dissipative Kerr soliton microcombs constitute broadband optical frequency combs with chip sizes and repetition rates in the microwave to millimeter-wave range. For frequency metrology applications such as spectroscopy, optical atomic clocks and frequency synthesizers, octave-spanning soliton microcombs generated in dispersion optimized microresonator are required, which allow self-referencing for full frequency stabilization. In addition, field-deployable applications require the generation of such soliton microcombs simple, deterministic, and reproducible. Here, we demonstrate a novel scheme to generate self-emerging solitons in integrated lithium niobate microresonators. The single soliton features a broadband spectral bandwidth with dual dispersive waves, allowing 2f-3f self-referencing. Via harnessing the photorefractive effect of lithium niobate to significantly extend the soliton existence range, we observe a spontaneous yet deterministic single-soliton formation. The soliton is immune to external perturbation and can operate continuously over 13 hours without active feedback control. Finally, via integration with a pre-programed DFB laser, we demonstrate turnkey soliton generation. With further improvement of microresonator Q and hybrid integration with chip-scale laser chips, compact soliton microcomb devices with electronic actuation can be created, which can become central elements for future LiDAR, microwave photonics and optical telecommunications.
△ Less
Submitted 4 May, 2023;
originally announced May 2023.
-
Hedonic Prices and Quality Adjusted Price Indices Powered by AI
Authors:
Patrick Bajari,
Zhihao Cen,
Victor Chernozhukov,
Manoj Manukonda,
Suhas Vijaykumar,
** Wang,
Ramon Huerta,
Junbo Li,
Ling Leng,
George Monokroussos,
Shan Wan
Abstract:
Accurate, real-time measurements of price index changes using electronic records are essential for tracking inflation and productivity in today's economic environment. We develop empirical hedonic models that can process large amounts of unstructured product data (text, images, prices, quantities) and output accurate hedonic price estimates and derived indices. To accomplish this, we generate abst…
▽ More
Accurate, real-time measurements of price index changes using electronic records are essential for tracking inflation and productivity in today's economic environment. We develop empirical hedonic models that can process large amounts of unstructured product data (text, images, prices, quantities) and output accurate hedonic price estimates and derived indices. To accomplish this, we generate abstract product attributes, or ``features,'' from text descriptions and images using deep neural networks, and then use these attributes to estimate the hedonic price function. Specifically, we convert textual information about the product to numeric features using large language models based on transformers, trained or fine-tuned using product descriptions, and convert the product image to numeric features using a residual network model. To produce the estimated hedonic price function, we again use a multi-task neural network trained to predict a product's price in all time periods simultaneously. To demonstrate the performance of this approach, we apply the models to Amazon's data for first-party apparel sales and estimate hedonic prices. The resulting models have high predictive accuracy, with $R^2$ ranging from $80\%$ to $90\%$. Finally, we construct the AI-based hedonic Fisher price index, chained at the year-over-year frequency. We contrast the index with the CPI and other electronic indices.
△ Less
Submitted 28 April, 2023;
originally announced May 2023.
-
DEIR: Efficient and Robust Exploration through Discriminative-Model-Based Episodic Intrinsic Rewards
Authors:
Shanchuan Wan,
Yu** Tang,
Yingtao Tian,
Tomoyuki Kaneko
Abstract:
Exploration is a fundamental aspect of reinforcement learning (RL), and its effectiveness is a deciding factor in the performance of RL algorithms, especially when facing sparse extrinsic rewards. Recent studies have shown the effectiveness of encouraging exploration with intrinsic rewards estimated from novelties in observations. However, there is a gap between the novelty of an observation and a…
▽ More
Exploration is a fundamental aspect of reinforcement learning (RL), and its effectiveness is a deciding factor in the performance of RL algorithms, especially when facing sparse extrinsic rewards. Recent studies have shown the effectiveness of encouraging exploration with intrinsic rewards estimated from novelties in observations. However, there is a gap between the novelty of an observation and an exploration, as both the stochasticity in the environment and the agent's behavior may affect the observation. To evaluate exploratory behaviors accurately, we propose DEIR, a novel method in which we theoretically derive an intrinsic reward with a conditional mutual information term that principally scales with the novelty contributed by agent explorations, and then implement the reward with a discriminative forward model. Extensive experiments on both standard and advanced exploration tasks in MiniGrid show that DEIR quickly learns a better policy than the baselines. Our evaluations on ProcGen demonstrate both the generalization capability and the general applicability of our intrinsic reward. Our source code is available at https://github.com/swan-utokyo/deir.
△ Less
Submitted 18 May, 2023; v1 submitted 21 April, 2023;
originally announced April 2023.
-
AI-Generated Content (AIGC): A Survey
Authors:
Jiayang Wu,
Wensheng Gan,
Zefeng Chen,
Shicheng Wan,
Hong Lin
Abstract:
To address the challenges of digital intelligence in the digital economy, artificial intelligence-generated content (AIGC) has emerged. AIGC uses artificial intelligence to assist or replace manual content generation by generating content based on user-inputted keywords or requirements. The development of large model algorithms has significantly strengthened the capabilities of AIGC, which makes A…
▽ More
To address the challenges of digital intelligence in the digital economy, artificial intelligence-generated content (AIGC) has emerged. AIGC uses artificial intelligence to assist or replace manual content generation by generating content based on user-inputted keywords or requirements. The development of large model algorithms has significantly strengthened the capabilities of AIGC, which makes AIGC products a promising generative tool and adds convenience to our lives. As an upstream technology, AIGC has unlimited potential to support different downstream applications. It is important to analyze AIGC's current capabilities and shortcomings to understand how it can be best utilized in future applications. Therefore, this paper provides an extensive overview of AIGC, covering its definition, essential conditions, cutting-edge capabilities, and advanced features. Moreover, it discusses the benefits of large-scale pre-trained models and the industrial chain of AIGC. Furthermore, the article explores the distinctions between auxiliary generation and automatic generation within AIGC, providing examples of text generation. The paper also examines the potential integration of AIGC with the Metaverse. Lastly, the article highlights existing issues and suggests some future directions for application.
△ Less
Submitted 25 March, 2023;
originally announced April 2023.
-
Web3: The Next Internet Revolution
Authors:
Shicheng Wan,
Hong Lin,
Wensheng Gan,
Jiahui Chen,
Philip S. Yu
Abstract:
Since the first appearance of the World Wide Web, people more rely on the Web for their cyber social activities. The second phase of World Wide Web, named Web 2.0, has been extensively attracting worldwide people that participate in building and enjoying the virtual world. Nowadays, the next internet revolution: Web3 is going to open new opportunities for traditional social models. The decentraliz…
▽ More
Since the first appearance of the World Wide Web, people more rely on the Web for their cyber social activities. The second phase of World Wide Web, named Web 2.0, has been extensively attracting worldwide people that participate in building and enjoying the virtual world. Nowadays, the next internet revolution: Web3 is going to open new opportunities for traditional social models. The decentralization property of Web3 is capable of breaking the monopoly of the internet companies. Moreover, Web3 will lead a paradigm shift from the Web as a publishing medium to a medium of interaction and participation. This change will deeply transform the relations among users and platforms, forces and relations of production, and the global economy. Therefore, it is necessary that we technically, practically, and more broadly take an overview of Web3. In this paper, we present a comprehensive survey of Web3, with a focus on current technologies, challenges, opportunities, and outlook. This article first introduces several major technologies of Web3. Then, we illustrate the type of Web3 applications in detail. Blockchain and smart contracts ensure that decentralized organizations will be less trusted and more truthful than that centralized organizations. Decentralized finance will be global, and open with financial inclusiveness for unbanked people. This paper also discusses the relationship between the Metaverse and Web3, as well as the differences and similarities between Web 3.0 and Web3. Inspired by the Maslow's hierarchy of needs theory, we further conduct a novel hierarchy of needs theory within Web3. Finally, several worthwhile future research directions of Web3 are discussed.
△ Less
Submitted 22 March, 2023;
originally announced April 2023.
-
Web 3.0: The Future of Internet
Authors:
Wensheng Gan,
Zhenqiang Ye,
Shicheng Wan,
Philip S. Yu
Abstract:
With the rapid growth of the Internet, human daily life has become deeply bound to the Internet. To take advantage of massive amounts of data and information on the internet, the Web architecture is continuously being reinvented and upgraded. From the static informative characteristics of Web 1.0 to the dynamic interactive features of Web 2.0, scholars and engineers have worked hard to make the in…
▽ More
With the rapid growth of the Internet, human daily life has become deeply bound to the Internet. To take advantage of massive amounts of data and information on the internet, the Web architecture is continuously being reinvented and upgraded. From the static informative characteristics of Web 1.0 to the dynamic interactive features of Web 2.0, scholars and engineers have worked hard to make the internet world more open, inclusive, and equal. Indeed, the next generation of Web evolution (i.e., Web 3.0) is already coming and sha** our lives. Web 3.0 is a decentralized Web architecture that is more intelligent and safer than before. The risks and ruin posed by monopolists or criminals will be greatly reduced by a complete reconstruction of the Internet and IT infrastructure. In a word, Web 3.0 is capable of addressing web data ownership according to distributed technology. It will optimize the internet world from the perspectives of economy, culture, and technology. Then it promotes novel content production methods, organizational structures, and economic forms. However, Web 3.0 is not mature and is now being disputed. Herein, this paper presents a comprehensive survey of Web 3.0, with a focus on current technologies, challenges, opportunities, and outlook. This article first introduces a brief overview of the history of World Wide Web as well as several differences among Web 1.0, Web 2.0, Web 3.0, and Web3. Then, some technical implementations of Web 3.0 are illustrated in detail. We discuss the revolution and benefits that Web 3.0 brings. Finally, we explore several challenges and issues in this promising area.
△ Less
Submitted 23 March, 2023;
originally announced April 2023.
-
Atom-referenced on-chip soliton microcomb
Authors:
Rui Niu,
Shuai Wan,
Tian-Peng Hua,
Wei-Qiang Wang,
Zheng-Yu Wang,
** Li,
Zhu-Bo Wang,
Ming Li,
Zhen Shen,
Y. R. Sun,
Shui-Ming Hu,
B. E. Little,
S. T. Chu,
Wei Zhao,
Guang-Can Guo,
Chang-Ling Zou,
Yun-Feng Xiao,
Wen-Fu Zhang,
Chun-Hua Dong
Abstract:
For the applications of the frequency comb in microresonators, it is essential to obtain a fully frequency-stabilized microcomb laser source. Here, we demonstrate an atom-referenced stabilized soliton microcomb generation system based on the integrated microring resonator. The pump light around $1560.48\,\mathrm{nm}$ locked to an ultra-low-expansion (ULE) cavity, is frequency-doubled and reference…
▽ More
For the applications of the frequency comb in microresonators, it is essential to obtain a fully frequency-stabilized microcomb laser source. Here, we demonstrate an atom-referenced stabilized soliton microcomb generation system based on the integrated microring resonator. The pump light around $1560.48\,\mathrm{nm}$ locked to an ultra-low-expansion (ULE) cavity, is frequency-doubled and referenced to the atomic transition of $^{87}\mathrm{Rb}$. The repetition rate of the soliton microcomb is injection-locked to an atomic-clock-stabilized radio frequency (RF) source, leading to mHz stabilization at $1$ seconds. As a result, all comb lines have been frequency-stabilized based on the atomic reference and could be determined with very high precision reaching $\sim18\,\mathrm{Hz}$ at 1 second, corresponding to the frequency stability of $9.5\times10^{-14}$. Our approach provides an integrated and fully stabilized microcomb experiment scheme with no requirement of $f-2f$ technique, which could be easily implemented and generalized to various photonic platforms, thus paving the way towards the portable and ultraprecise optical sources for high precision spectroscopy.
△ Less
Submitted 4 May, 2023; v1 submitted 3 April, 2023;
originally announced April 2023.
-
Tunneling magnetoresistance in Mn$_2$Au-based pure antiferromagnetic tunnel junction
Authors:
Xingtao Jia,
Hui-Min Tang,
Shi-Zhuo Wan
Abstract:
Antiferromagnetic (AF) spintronics is merit on ultra-high operator speed and stability in the presence of magnetic field. To fully use the merit, the device should be pure rather than hybrid with ferromagnet or ferrimagnet. For the magnetism in the antiferromagnet is canceled by that of different sublattices, breaking the symmetry in the material can revive the native magnetism, which can be detec…
▽ More
Antiferromagnetic (AF) spintronics is merit on ultra-high operator speed and stability in the presence of magnetic field. To fully use the merit, the device should be pure rather than hybrid with ferromagnet or ferrimagnet. For the magnetism in the antiferromagnet is canceled by that of different sublattices, breaking the symmetry in the material can revive the native magnetism, which can be detected by the magnetoresistance (MR) effect. Achieving noticeable MR effect in the pure AF device is diffcult but essential for the AF spintronic applications. Here, we study the tunnel magnetoresistance(TMR) effect in the Nb/Mn$_2$Au/CdO/Mn$_2$Au/Nb pure AF magnetic tunnel junctions (AF-MTJs) based on a first-principle scattering theory. Giant TMRs with order of 1000% are predicted in some symmetric junctions, which is originated from the interfacial resonance tunneling effect related with the k dependent complex band structures of CdO and Mn$_2$Au in companion with the enhanced spin polarization of the interfacial magnetic atoms. The effect of voltage bias and interfacial disorder such as Oxygen vacancy, Manganese vacancy, and Manganese-Cadmium exchanges at Mn2Au/CdO interfaces are studied also. Our studies suggest Nb/Mn$_2$Au/CdO/Mn$_2$Au/Nb AFMTJs promising material for AF spintronic application, and rocksalt CdO a potential symmetry filtering material for spintronic applications.
△ Less
Submitted 18 March, 2023;
originally announced March 2023.
-
Fairness-driven Skilled Task Assignment with Extra Budget in Spatial Crowdsourcing
Authors:
Yunjun Zhou,
Shuhan Wan,
Detian Zhang,
Shiting Wen
Abstract:
With the prevalence of mobile devices and ubiquitous wireless networks, spatial crowdsourcing has attracted much attention from both academic and industry communities. On spatial crowdsourcing platforms, task requesters can publish spatial tasks and workers need to move to destinations to perform them. In this paper, we formally define the Skilled Task Assignment with Extra Budget (STAEB), which a…
▽ More
With the prevalence of mobile devices and ubiquitous wireless networks, spatial crowdsourcing has attracted much attention from both academic and industry communities. On spatial crowdsourcing platforms, task requesters can publish spatial tasks and workers need to move to destinations to perform them. In this paper, we formally define the Skilled Task Assignment with Extra Budget (STAEB), which aims to maximize total platform revenue and achieve fairness for workers and task requesters. In the STAEB problem, the complex task needs more than one worker to satisfy its skill requirement and has the extra budget to subsidize extra travel cost of workers to attract more workers. We prove that the STAEB problem is NP-complete. Therefore, two approximation algorithms are proposed to solve it, including a greedy approach and a game-theoretic approach. Extensive experiments on both real and synthetic datasets demonstrate the efficiency and effectiveness of our proposed approaches.
△ Less
Submitted 8 March, 2023;
originally announced March 2023.
-
Tuning the Interlayer Microstructure and Residual Stress of Buffer-Free Direct Bonding GaN/Si Heterostructures
Authors:
Yan Zhou,
Shi Zhou,
Shun Wan,
Bo Zou,
Yuxia Feng,
Rui Mei,
Heng Wu,
**heng Tan,
Naoteru Shigekawa,
Jianbo Liang,
Martin Kuball
Abstract:
The direct integration of GaN with Si can boost great potential for low-cost, large-scale, and high-power device applications. However, it is still challengeable to directly grow GaN on Si without using thick strain relief buffer layers due to their large lattice and thermal-expansion-coefficient mismatches. In this work, a GaN/Si heterointerface without any buffer layer is successfully fabricated…
▽ More
The direct integration of GaN with Si can boost great potential for low-cost, large-scale, and high-power device applications. However, it is still challengeable to directly grow GaN on Si without using thick strain relief buffer layers due to their large lattice and thermal-expansion-coefficient mismatches. In this work, a GaN/Si heterointerface without any buffer layer is successfully fabricated at room temperature via surface activated bonding (SAB). The residual stress states and interfacial microstructures of GaN/Si heterostructures were systematically investigated through micro-Raman spectroscopy and transmission electron microscopy. Compared to the large compressive stress that existed in GaN layers grown-on-Si by MOCVD, a significantly relaxed and uniform small tensile stress was observed in GaN layers bonded-to-Si by SAB; this is mainly ascribed to the amorphous layer formed at the bonding interface. In addition, the interfacial microstructure and stress states of bonded GaN/Si heterointerfaces was found can be significantly tuned by appropriate thermal annealing. This work moves an important step forward directly integrating GaN to the present Si CMOS technology with high quality thin interfaces, and brings great promises for wafer-scale low-cost fabrication of GaN electronics.
△ Less
Submitted 2 February, 2023;
originally announced February 2023.
-
EEG Opto-processor: epileptic seizure detection using diffractive photonic computing units
Authors:
Tao Yan,
Maoqi Zhang,
Sen Wan,
Kaifeng Shang,
Haiou Zhang,
Xun Cao,
Xing Lin,
Qionghai Dai
Abstract:
Electroencephalography (EEG) analysis extracts critical information from brain signals, which has provided fundamental support for various applications, including brain-disease diagnosis and brain-computer interface. However, the real-time processing of large-scale EEG signals at high energy efficiency has placed great challenges for electronic processors on edge computing devices. Here, we propos…
▽ More
Electroencephalography (EEG) analysis extracts critical information from brain signals, which has provided fundamental support for various applications, including brain-disease diagnosis and brain-computer interface. However, the real-time processing of large-scale EEG signals at high energy efficiency has placed great challenges for electronic processors on edge computing devices. Here, we propose the EEG opto-processor based on diffractive photonic computing units (DPUs) to effectively process the extracranial and intracranial EEG signals and perform epileptic seizure detection. The signals of EEG channels within a second-time window are optically encoded as inputs to the constructed diffractive neural networks for classification, which monitors the brain state to determine whether it's the symptom of an epileptic seizure or not. We developed both the free-space and integrated DPUs as edge computing systems and demonstrated their applications for real-time epileptic seizure detection with the benchmark datasets, i.e., the CHB-MIT extracranial EEG dataset and Epilepsy-iEEG-Multicenter intracranial EEG dataset, at high computing performance. Along with the channel selection mechanism, both the numerical evaluations and experimental results validated the sufficient high classification accuracies of the proposed opto-processors for supervising the clinical diagnosis. Our work opens up a new research direction of utilizing photonic computing techniques for processing large-scale EEG signals in promoting its broader applications.
△ Less
Submitted 9 December, 2022;
originally announced January 2023.
-
MDL-based Compressing Sequential Rules
Authors:
Xinhong Chen,
Wensheng Gan,
Shicheng Wan,
Tianlong Gu
Abstract:
Nowadays, with the rapid development of the Internet, the era of big data has come. The Internet generates huge amounts of data every day. However, extracting meaningful information from massive data is like looking for a needle in a haystack. Data mining techniques can provide various feasible methods to solve this problem. At present, many sequential rule mining (SRM) algorithms are presented to…
▽ More
Nowadays, with the rapid development of the Internet, the era of big data has come. The Internet generates huge amounts of data every day. However, extracting meaningful information from massive data is like looking for a needle in a haystack. Data mining techniques can provide various feasible methods to solve this problem. At present, many sequential rule mining (SRM) algorithms are presented to find sequential rules in databases with sequential characteristics. These rules help people extract a lot of meaningful information from massive amounts of data. How can we achieve compression of mined results and reduce data size to save storage space and transmission time? Until now, there has been little research on the compression of SRM. In this paper, combined with the Minimum Description Length (MDL) principle and under the two metrics (support and confidence), we introduce the problem of compression of SRM and also propose a solution named ComSR for MDL-based compressing of sequential rules based on the designed sequential rule coding scheme. To our knowledge, we are the first to use sequential rules to encode an entire database. A heuristic method is proposed to find a set of compact and meaningful sequential rules as much as possible. ComSR has two trade-off algorithms, ComSR_non and ComSR_ful, based on whether the database can be completely compressed. Experiments done on a real dataset with different thresholds show that a set of compact and meaningful sequential rules can be found. This shows that the proposed method works.
△ Less
Submitted 20 December, 2022;
originally announced December 2022.