20,175 results on '"Xu,Ke"'
Search Results
102. Robust NOMA-assisted OTFS-ISAC Network Design with 3D Motion Prediction Topology
- Author
-
Xiang, Luping, Xu, Ke, Hu, Jie, Masouros, Christos, and Yang, Kun
- Subjects
Electrical Engineering and Systems Science - Signal Processing - Abstract
This paper proposes a novel non-orthogonal multiple access (NOMA)-assisted orthogonal time-frequency space (OTFS)-integrated sensing and communication (ISAC) network, which uses unmanned aerial vehicles (UAVs) as air base stations to support multiple users. By employing ISAC, the UAV extracts position and velocity information from the user's echo signals, and non-orthogonal power allocation is conducted to achieve a superior achievable rate. A 3D motion prediction topology is used to guide the NOMA transmission for multiple users, and a robust power allocation solution is proposed under perfect and imperfect channel estimation for Maxi-min Fairness (MMF) and Maximum sum-Rate (SR) problems. Simulation results demonstrate the superiority of the proposed NOMA-assisted OTFS-ISAC system over other systems in terms of achievable rate under both perfect and imperfect channel conditions with the aid of 3D motion prediction topology.
- Published
- 2023
103. Mechanisms of temperature-dependent thermal transport in amorphous silica from machine-learning molecular dynamics
- Author
-
Liang, Ting, Ying, Penghua, Xu, Ke, Ye, Zhenqiang, Ling, Chao, Fan, Zheyong, and Xu, Jianbin
- Subjects
Condensed Matter - Materials Science ,Physics - Atomic Physics ,Physics - Computational Physics - Abstract
Amorphous silica (a-SiO$_2$) is a foundational disordered material for which the thermal transport properties are important for various applications. To accurately model the interatomic interactions in classical molecular dynamics (MD) simulations of thermal transport in a-SiO$_2$, we herein develop an accurate yet highly efficient machine-learned potential model that allowed us to generate a-SiO$_2$ samples closely resembling experimentally produced ones. Using the homogeneous nonequilibrium MD method and a proper quantum-statistical correction to the classical MD results, quantitative agreement with experiments is achieved for the thermal conductivities of bulk and 190 nm-thick a-SiO$_2$ films over a wide range of temperatures. To interrogate the thermal vibrations at different temperatures, we calculated the current correlation functions corresponding to the transverse acoustic (TA) and longitudinal acoustic (LA) collective vibrations. The results reveal that below the Ioffe-Regel crossover frequency, phonons as well-defined excitations, remain applicable in a-SiO$_2$ and play a predominant role at low temperatures, resulting in a temperature-dependent increase in thermal conductivity. In the high-temperature region, more phonons are excited, accompanied by a more intense liquid-like diffusion event. We attribute the temperature-independent thermal conductivity in the high-temperature range of a-SiO$_2$ to the collaborative involvement of excited phonon scattering and liquid-like diffusion in heat conduction. These findings provide physical insights into the thermal transport of a-SiO$_2$ and are expected to be applied to a vast range of amorphous materials., Comment: 12 pages, 7 figures in main text; 15 pages, 12 figures in Supplemental Material
- Published
- 2023
- Full Text
- View/download PDF
104. A Geometrical Approach to Evaluate the Adversarial Robustness of Deep Neural Networks
- Author
-
Wang, Yang, Dong, Bo, Xu, Ke, Piao, Haiyin, Ding, Yufei, Yin, Baocai, and Yang, Xin
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Deep Neural Networks (DNNs) are widely used for computer vision tasks. However, it has been shown that deep models are vulnerable to adversarial attacks, i.e., their performances drop when imperceptible perturbations are made to the original inputs, which may further degrade the following visual tasks or introduce new problems such as data and privacy security. Hence, metrics for evaluating the robustness of deep models against adversarial attacks are desired. However, previous metrics are mainly proposed for evaluating the adversarial robustness of shallow networks on the small-scale datasets. Although the Cross Lipschitz Extreme Value for nEtwork Robustness (CLEVER) metric has been proposed for large-scale datasets (e.g., the ImageNet dataset), it is computationally expensive and its performance relies on a tractable number of samples. In this paper, we propose the Adversarial Converging Time Score (ACTS), an attack-dependent metric that quantifies the adversarial robustness of a DNN on a specific input. Our key observation is that local neighborhoods on a DNN's output surface would have different shapes given different inputs. Hence, given different inputs, it requires different time for converging to an adversarial sample. Based on this geometry meaning, ACTS measures the converging time as an adversarial robustness metric. We validate the effectiveness and generalization of the proposed ACTS metric against different adversarial attacks on the large-scale ImageNet dataset using state-of-the-art deep networks. Extensive experiments show that our ACTS metric is an efficient and effective adversarial metric over the previous CLEVER metric., Comment: ACM Transactions on Multimedia Computing, Communications, and Applications (ACM TOMM)
- Published
- 2023
- Full Text
- View/download PDF
105. Antenna Response Consistency Driven Self-supervised Learning for WIFI-based Human Activity Recognition
- Author
-
Xu, Ke, Wang, Jiangtao, Zhu, Hongyuan, and Zheng, Dingchang
- Subjects
Computer Science - Machine Learning ,Electrical Engineering and Systems Science - Signal Processing - Abstract
Self-supervised learning (SSL) for WiFi-based human activity recognition (HAR) holds great promise due to its ability to address the challenge of insufficient labeled data. However, directly transplanting SSL algorithms, especially contrastive learning, originally designed for other domains to CSI data, often fails to achieve the expected performance. We attribute this issue to the inappropriate alignment criteria, which disrupt the semantic distance consistency between the feature space and the input space. To address this challenge, we introduce \textbf{A}ntenna \textbf{R}esponse \textbf{C}onsistency (ARC) as a solution to define proper alignment criteria. ARC is designed to retain semantic information from the input space while introducing robustness to real-world noise. Moreover, we substantiate the effectiveness of ARC through a comprehensive set of experiments, demonstrating its capability to enhance the performance of self-supervised learning for WiFi-based HAR by achieving an increase of over 5\% in accuracy in most cases and achieving a best accuracy of 94.97\%.
- Published
- 2023
106. AdvSV: An Over-the-Air Adversarial Attack Dataset for Speaker Verification
- Author
-
Wang, Li, Li, Jiaqi, Luo, Yuhao, Zheng, Jiahao, Wang, Lei, Li, Hao, Xu, Ke, Fang, Chengfang, Shi, Jie, and Wu, Zhizheng
- Subjects
Computer Science - Sound ,Electrical Engineering and Systems Science - Audio and Speech Processing - Abstract
It is known that deep neural networks are vulnerable to adversarial attacks. Although Automatic Speaker Verification (ASV) built on top of deep neural networks exhibits robust performance in controlled scenarios, many studies confirm that ASV is vulnerable to adversarial attacks. The lack of a standard dataset is a bottleneck for further research, especially reproducible research. In this study, we developed an open-source adversarial attack dataset for speaker verification research. As an initial step, we focused on the over-the-air attack. An over-the-air adversarial attack involves a perturbation generation algorithm, a loudspeaker, a microphone, and an acoustic environment. The variations in the recording configurations make it very challenging to reproduce previous research. The AdvSV dataset is constructed using the Voxceleb1 Verification test set as its foundation. This dataset employs representative ASV models subjected to adversarial attacks and records adversarial samples to simulate over-the-air attack settings. The scope of the dataset can be easily extended to include more types of adversarial attacks. The dataset will be released to the public under the CC BY-SA 4.0. In addition, we also provide a detection baseline for reproducible research., Comment: Accepted by ICASSP2024
- Published
- 2023
107. RoleLLM: Benchmarking, Eliciting, and Enhancing Role-Playing Abilities of Large Language Models
- Author
-
Wang, Zekun Moore, Peng, Zhongyuan, Que, Haoran, Liu, Jiaheng, Zhou, Wangchunshu, Wu, Yuhan, Guo, Hongcheng, Gan, Ruitong, Ni, Zehao, Yang, Jian, Zhang, Man, Zhang, Zhaoxiang, Ouyang, Wanli, Xu, Ke, Huang, Stephen W., Fu, Jie, and Peng, Junran
- Subjects
Computer Science - Computation and Language ,Computer Science - Artificial Intelligence - Abstract
The advent of Large Language Models (LLMs) has paved the way for complex tasks such as role-playing, which enhances user interactions by enabling models to imitate various characters. However, the closed-source nature of state-of-the-art LLMs and their general-purpose training limit role-playing optimization. In this paper, we introduce RoleLLM, a framework to benchmark, elicit, and enhance role-playing abilities in LLMs. RoleLLM comprises four stages: (1) Role Profile Construction for 100 roles; (2) Context-Based Instruction Generation (Context-Instruct) for role-specific knowledge extraction; (3) Role Prompting using GPT (RoleGPT) for speaking style imitation; and (4) Role-Conditioned Instruction Tuning (RoCIT) for fine-tuning open-source models along with role customization. By Context-Instruct and RoleGPT, we create RoleBench, the first systematic and fine-grained character-level benchmark dataset for role-playing with 168,093 samples. Moreover, RoCIT on RoleBench yields RoleLLaMA (English) and RoleGLM (Chinese), significantly enhancing role-playing abilities and even achieving comparable results with RoleGPT (using GPT-4)., Comment: 30 pages, repo at https://github.com/InteractiveNLP-Team/RoleLLM-public
- Published
- 2023
108. Secure Inter-domain Routing and Forwarding via Verifiable Forwarding Commitments
- Author
-
Wang, Xiaoliang, Liu, Zhuotao, Li, Qi, Guo, Yangfei, Ling, Sitong, Zhan, Jiangou, Xu, Yi, Xu, Ke, and Wu, Jianping
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
The Internet inter-domain routing system is vulnerable. On the control plane, the de facto Border Gateway Protocol (BGP) does not have built-in mechanisms to authenticate routing announcements, so an adversary can announce virtually arbitrary paths to hijack network traffic; on the data plane, it is difficult to ensure that actual forwarding path complies with the control plane decisions. The community has proposed significant research to secure the routing system. Yet, existing secure BGP protocols (e.g., BGPsec) are not incrementally deployable, and existing path authorization protocols are not compatible with the current Internet routing infrastructure. In this paper, we propose FC-BGP, the first secure Internet inter-domain routing system that can simultaneously authenticate BGP announcements and validate data plane forwarding in an efficient and incrementally-deployable manner. FC-BGP is built upon a novel primitive, name Forwarding Commitment, to certify an AS's routing intent on its directly connected hops. We analyze the security benefits of FC-BGP in the Internet at different deployment rates. Further, we implement a prototype of FC-BGP and extensively evaluate it over a large-scale overlay network with 100 virtual machines deployed globally. The results demonstrate that FC-BGP saves roughly 55% of the overhead required to validate BGP announcements compared with BGPsec, and meanwhile FC-BGP introduces a small overhead for building a globally-consistent view on the desirable forwarding paths., Comment: 16 pages, 17 figures
- Published
- 2023
109. Anomalous normal state gap in an electron-doped cuprate
- Author
-
Xu, Ke-Jun, He, Junfeng, Chen, Su-Di, He, Yu, Abadi, Sebastien N., Rotundu, Costel. R., Lee, Young S., Lu, Dong-Hui, Guo, Qinda, Tjernberg, Oscar, Devereaux, Thomas P., Lee, Dung-Hai, Hashimoto, Makoto, and Shen, Zhi-Xun
- Subjects
Condensed Matter - Superconductivity ,Condensed Matter - Strongly Correlated Electrons - Abstract
In the underdoped n-type cuprate Nd2-xCexCuO4, long-ranged antiferromagnetic order reconstructs the Fermi surface, resulting in a putative antiferromagnetic metal with small pockets. Using angle-resolved photoemission spectroscopy, we observe an anomalous energy gap, an order of magnitude smaller than the antiferromagnetic gap, in a wide range of the underdoped regime and smoothly connecting to the superconducting gap at optimal doping. After carefully considering all the known ordering tendencies in tandem with the phase diagram, we hypothesize that the normal state gap in the underdoped n-type cuprates originates from Cooper pairing. The high temperature scale of the normal state gap raises the prospect of engineering higher transition temperatures in the n-type cuprates comparable to that of the p-type cuprates.
- Published
- 2023
- Full Text
- View/download PDF
110. OWL: A Large Language Model for IT Operations
- Author
-
Guo, Hongcheng, Yang, Jian, Liu, Jiaheng, Yang, Liqun, Chai, Linzheng, Bai, Jiaqi, Peng, Junran, Hu, Xiaorong, Chen, Chao, Zhang, Dongfeng, Shi, Xu, Zheng, Tieqiao, Zheng, Liangfan, Zhang, Bo, Xu, Ke, and Li, Zhoujun
- Subjects
Computer Science - Computation and Language - Abstract
With the rapid development of IT operations, it has become increasingly crucial to efficiently manage and analyze large volumes of data for practical applications. The techniques of Natural Language Processing (NLP) have shown remarkable capabilities for various tasks, including named entity recognition, machine translation and dialogue systems. Recently, Large Language Models (LLMs) have achieved significant improvements across various NLP downstream tasks. However, there is a lack of specialized LLMs for IT operations. In this paper, we introduce the OWL, a large language model trained on our collected OWL-Instruct dataset with a wide range of IT-related information, where the mixture-of-adapter strategy is proposed to improve the parameter-efficient tuning across different domains or tasks. Furthermore, we evaluate the performance of our OWL on the OWL-Bench established by us and open IT-related benchmarks. OWL demonstrates superior performance results on IT tasks, which outperforms existing models by significant margins. Moreover, we hope that the findings of our work will provide more insights to revolutionize the techniques of IT operations with specialized LLMs., Comment: ICLR 2024
- Published
- 2023
111. Large Language Model for Science: A Study on P vs. NP
- Author
-
Dong, Qingxiu, Dong, Li, Xu, Ke, Zhou, Guangyan, Hao, Yaru, Sui, Zhifang, and Wei, Furu
- Subjects
Computer Science - Computation and Language ,Computer Science - Artificial Intelligence - Abstract
In this work, we use large language models (LLMs) to augment and accelerate research on the P versus NP problem, one of the most important open problems in theoretical computer science and mathematics. Specifically, we propose Socratic reasoning, a general framework that promotes in-depth thinking with LLMs for complex problem-solving. Socratic reasoning encourages LLMs to recursively discover, solve, and integrate problems while facilitating self-evaluation and refinement. Our pilot study on the P vs. NP problem shows that GPT-4 successfully produces a proof schema and engages in rigorous reasoning throughout 97 dialogue turns, concluding "P $\neq$ NP", which is in alignment with (Xu and Zhou, 2023). The investigation uncovers novel insights within the extensive solution space of LLMs, shedding light on LLM for Science., Comment: 73 pages
- Published
- 2023
112. Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic
- Author
-
Qing, Yuqi, Yin, Qilei, Deng, Xinhao, Chen, Yihao, Liu, Zhuotao, Sun, Kun, Xu, Ke, Zhang, Jia, and Li, Qi
- Subjects
Computer Science - Cryptography and Security - Abstract
Machine learning (ML) is promising in accurately detecting malicious flows in encrypted network traffic; however, it is challenging to collect a training dataset that contains a sufficient amount of encrypted malicious data with correct labels. When ML models are trained with low-quality training data, they suffer degraded performance. In this paper, we aim at addressing a real-world low-quality training dataset problem, namely, detecting encrypted malicious traffic generated by continuously evolving malware. We develop RAPIER that fully utilizes different distributions of normal and malicious traffic data in the feature space, where normal data is tightly distributed in a certain area and the malicious data is scattered over the entire feature space to augment training data for model training. RAPIER includes two pre-processing modules to convert traffic into feature vectors and correct label noises. We evaluate our system on two public datasets and one combined dataset. With 1000 samples and 45% noises from each dataset, our system achieves the F1 scores of 0.770, 0.776, and 0.855, respectively, achieving average improvements of 352.6%, 284.3%, and 214.9% over the existing methods, respectively. Furthermore, We evaluate RAPIER with a real-world dataset obtained from a security enterprise. RAPIER effectively achieves encrypted malicious traffic detection with the best F1 score of 0.773 and improves the F1 score of existing methods by an average of 272.5%.
- Published
- 2023
- Full Text
- View/download PDF
113. Learning from Limited Heterogeneous Training Data: Meta-Learning for Unsupervised Zero-Day Web Attack Detection across Web Domains
- Author
-
Li, Peiyang, Wang, Ye, Li, Qi, Liu, Zhuotao, Xu, Ke, Ren, Ju, Liu, Zhiying, and Lin, Ruilin
- Subjects
Computer Science - Cryptography and Security - Abstract
Recently unsupervised machine learning based systems have been developed to detect zero-day Web attacks, which can effectively enhance existing Web Application Firewalls (WAFs). However, prior arts only consider detecting attacks on specific domains by training particular detection models for the domains. These systems require a large amount of training data, which causes a long period of time for model training and deployment. In this paper, we propose RETSINA, a novel meta-learning based framework that enables zero-day Web attack detection across different domains in an organization with limited training data. Specifically, it utilizes meta-learning to share knowledge across these domains, e.g., the relationship between HTTP requests in heterogeneous domains, to efficiently train detection models. Moreover, we develop an adaptive preprocessing module to facilitate semantic analysis of Web requests across different domains and design a multi-domain representation method to capture semantic correlations between different domains for cross-domain model training. We conduct experiments using four real-world datasets on different domains with a total of 293M Web requests. The experimental results demonstrate that RETSINA outperforms the existing unsupervised Web attack detection methods with limited training data, e.g., RETSINA needs only 5-minute training data to achieve comparable detection performance to the existing methods that train separate models for different domains using 1-day training data. We also conduct real-world deployment in an Internet company. RETSINA captures on average 126 and 218 zero-day attack requests per day in two domains, respectively, in one month.
- Published
- 2023
114. martFL: Enabling Utility-Driven Data Marketplace with a Robust and Verifiable Federated Learning Architecture
- Author
-
Li, Qi, Liu, Zhuotao, and Xu, Ke
- Subjects
Computer Science - Cryptography and Security - Abstract
The development of machine learning models requires a large amount of training data. Data marketplaces are essential for trading high-quality, private-domain data not publicly available online. However, due to growing data privacy concerns, direct data exchange is inappropriate. Federated Learning (FL) is a distributed machine learning paradigm that exchanges data utilities (in form of local models or gradients) among multiple parties without directly sharing the raw data. However, several challenges exist when applying existing FL architectures to construct a data marketplace: (i) In existing FL architectures, Data Acquirers (DAs) cannot privately evaluate local models from Data Providers (DPs) prior to trading; (ii) Model aggregation protocols in existing FL designs struggle to exclude malicious DPs without "overfitting" to the DA's (possibly biased) root dataset; (iii) Prior FL designs lack a proper billing mechanism to enforce the DA to fairly allocate the reward according to contributions made by different DPs. To address above challenges, we propose martFL, the first federated learning architecture that is specifically designed to enable a secure utility-driven data marketplace. At a high level, martFL is powered by two innovative designs: (i) a quality-aware model aggregation protocol that achieves robust local model aggregation even when the DA's root dataset is biased; (ii) a verifiable data transaction protocol that enables the DA to prove, both succinctly and in zero-knowledge, that it has faithfully aggregates the local models submitted by different DPs according to the committed aggregation weights, based on which the DPs can unambiguously claim the corresponding reward. We implement a prototype of martFL and evaluate it extensively over various tasks. The results show that martFL can improve the model accuracy by up to 25% while saving up to 64% data acquisition cost., Comment: Another version of this paper is published in the proceedings of ACM Conference on Computer and Communications Security (CCS) 2023
- Published
- 2023
115. Mapping super-resolution image quality.
- Author
-
Steves, Megan and Xu, Ke
- Abstract
The local quality of super-resolution microscopy images can be assessed and mapped by rolling Fourier ring correlation, even when image quality varies within a single image.
- Published
- 2024
116. Transcriptome-wide identification of the Hsp70 gene family in Pugionium cornutum and functional analysis of PcHsp70-5 under drought stress
- Author
-
Xu, Ke and Wang, Ping
- Published
- 2024
- Full Text
- View/download PDF
117. Multi-ancestry study of the genetics of problematic alcohol use in over 1 million individuals.
- Author
-
Zhou, Hang, Kember, Rachel, Deak, Joseph, Xu, Heng, Toikumo, Sylvanus, Yuan, Kai, Lind, Penelope, Farajzadeh, Leila, Wang, Lu, Hatoum, Alexander, Johnson, Jessica, Lee, Hyunjoon, Mallard, Travis, Xu, Jiayi, Johnston, Keira, Johnson, Emma, Nielsen, Trine, Galimberti, Marco, Dao, Cecilia, Levey, Daniel, Overstreet, Cassie, Byrne, Enda, Gillespie, Nathan, Gordon, Scott, Hickie, Ian, Whitfield, John, Xu, Ke, Zhao, Hongyu, Huckins, Laura, Davis, Lea, Sanchez-Roige, Sandra, Madden, Pamela, Heath, Andrew, Medland, Sarah, Martin, Nicholas, Ge, Tian, Smoller, Jordan, Hougaard, David, Børglum, Anders, Demontis, Ditte, Krystal, John, Gaziano, J, Edenberg, Howard, Agrawal, Arpana, Justice, Amy, Stein, Murray, Kranzler, Henry, and Gelernter, Joel
- Subjects
Humans ,Genetic Predisposition to Disease ,Genome-Wide Association Study ,Phenotype ,Polymorphism ,Single Nucleotide ,Racial Groups ,Alcoholism - Abstract
Problematic alcohol use (PAU), a trait that combines alcohol use disorder and alcohol-related problems assessed with a questionnaire, is a leading cause of death and morbidity worldwide. Here we conducted a large cross-ancestry meta-analysis of PAU in 1,079,947 individuals (European, N = 903,147; African, N = 122,571; Latin American, N = 38,962; East Asian, N = 13,551; and South Asian, N = 1,716 ancestries). We observed a high degree of cross-ancestral similarity in the genetic architecture of PAU and identified 110 independent risk variants in within- and cross-ancestry analyses. Cross-ancestry fine mapping improved the identification of likely causal variants. Prioritizing genes through gene expression and chromatin interaction in brain tissues identified multiple genes associated with PAU. We identified existing medications for potential pharmacological studies by a computational drug repurposing analysis. Cross-ancestry polygenic risk scores showed better performance of association in independent samples than single-ancestry polygenic risk scores. Genetic correlations between PAU and other traits were observed in multiple ancestries, with other substance use traits having the highest correlations. This study advances our knowledge of the genetic etiology of PAU, and these findings may bring possible clinical applicability of genetics insights-together with neuroscience, biology and data science-closer.
- Published
- 2023
118. 色谱法提纯鱼油中EPA/DHA生产过程甲醇回收工艺对比Comparison of methanol recovery processes in the production of EPA/DHA purified from fish oil by chromatography
- Author
-
陈利斌,郑高吉,朱志坤,许可 CHEN Libin, ZHENG Gaoji, ZHU Zhikun, XU Ke
- Subjects
鱼油;甲醇;能耗;热泵精馏;压缩机 ,fish oil ,methanol ,energy consumption ,heat pump distillation ,compressor ,Oils, fats, and waxes ,TP670-699 - Abstract
旨在为色谱法从鱼油中进一步分离纯化DHA和EPA生产企业甲醇废液回收工艺方案选择提供参考,介绍了普通单塔精馏、双效精馏、单塔热泵精馏和双塔热泵精馏4种甲醇回收工艺流程和主要参数,并以40 t/h甲醇废液为例,利用Aspen Plus软件对4种甲醇回收工艺路线的运行能耗做了模拟计算,对其成本进行了对比分析。结果表明:普通单塔精馏、双效精馏、双塔热泵精馏和单塔热泵精馏的冷却能耗和加热能耗依次降低;对比压缩机电耗在内的综合能耗(折合标煤),普通单塔精馏最高,双塔热泵精馏、单塔热泵精馏和双效精馏综合能耗分别是普通单塔精馏的34.2%、35.3%和56.5%;普通单塔精馏、双效精馏、单塔热泵精馏和双塔热泵精馏吨废液处理成本分别为137.8、78.0、577、51.2 元/t;与单塔热泵精馏相比,双塔热泵精馏压缩机的压缩比可大大减小,可选机型多且技术成熟,设备采购费用降低。综上,双塔热泵精馏是最具竞争力的甲醇回收方案。To provide reference for the selection of methanol recovery process schemes for further separation and purification of DHA and EPA from fish oil using chromatography. Four methanol recovery process flows and main parameters including common single-column distillation, double-effect distillation, single-column heat pump distillation and double-column heat pump distillation were introduced. Taking 40 t/h methanol waste liquid as an example, using Aspen Plus software, the operation energy consumption of the four methanol recovery process routes was simulated and calculated, and their costs were compared and analyzed. The results showed that the cooling energy consumption and heating energy consumption of common single-column distillation, double-effect distillation, double-column heat pump distillation and single-column heat pump distillation decreased in turn. Compared in the comprehensive energy consumption (converted to standard coal) including the electricity consumption of the compressor, the common single-column distillation was the highest, and the comprehensive energy consumption of double-column heat pump distillation, single-column heat pump distillation and double-effect distillation was 34.2%, 353% and 56.5% of that of common single-column distillation respectively. The treatment cost of single-column distillation, double-effect distillation, single-column heat pump distillation and double-column heat pump distillation was 137.8, 78.0, 57.7, 51.2 yuan/t, respectively. Compared with single-column heat pump distillation, the compression ratio of the compressor in double-column heat pump distillation could be greatly reduced, the optional models were more and the technology was mature, and the equipment procurement cost was reduced. In conclusion, double-column heat pump distillation is the most competitive methanol recovery scheme.
- Published
- 2024
- Full Text
- View/download PDF
119. Risk factors,pathogenic mechanisms and treatment progress of coronary in-stent restenosis
- Author
-
Zha Lingfeng, Wang Jinglin, and Xu Ke
- Subjects
coronary in-stent restenosis ,percutaneous coronary intervention ,stent implantation ,Medicine ,Biotechnology ,TP248.13-248.65 - Abstract
Coronary artery disease (CAD) has become one of the leading causes of death worldwide.Percutaneous coronary intervention (PCI) is one of the main treatments for CAD. Coronary in-stent restenosis(ISR) refers to the re-narrowing of the artery following PCI, occurring in approximately 10% of cases. Coronary ISR is a highly complex condition, and while its exact pathogenesis remains unclear, it is widely believed to involve processes such as inflammation, proliferation and stromal vascular remodeling. Several risk factors have been identified as being associated with coronary ISR, including inflammation, genetic predisposition, plaque heterogeneity, and improper stent placement during PCI. These factors not only help categorize patient risk but also deepen our understanding of coronary ISR,aiding in the development of individualized treatment plans.Over the past four decades, numerous new materials and techniques have been employed to prevent and treat coronary ISR, including drug eluting stents, innovative pharmacotherapies, advanced intravascular imaging techniques,biodegradable stents, as well as cell and gene therapies. Despite these advancements, coronary ISR remains a significant PCI complication. Thus, recognizing the risk factors, understanding the pathogenic mechanisms, and exploring new treatment strategies for coronary ISR are critical. This article aims to review the latest advancements in the risk factors, pathogenic mechanisms, and treatment of coronary ISR, providing reference for clinicians and future researchers.
- Published
- 2024
- Full Text
- View/download PDF
120. Referring Image Segmentation Using Text Supervision
- Author
-
Liu, Fang, Liu, Yuhao, Kong, Yuqiu, Xu, Ke, Zhang, Lihe, Yin, Baocai, Hancke, Gerhard, and Lau, Rynson
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Existing Referring Image Segmentation (RIS) methods typically require expensive pixel-level or box-level annotations for supervision. In this paper, we observe that the referring texts used in RIS already provide sufficient information to localize the target object. Hence, we propose a novel weakly-supervised RIS framework to formulate the target localization problem as a classification process to differentiate between positive and negative text expressions. While the referring text expressions for an image are used as positive expressions, the referring text expressions from other images can be used as negative expressions for this image. Our framework has three main novelties. First, we propose a bilateral prompt method to facilitate the classification process, by harmonizing the domain discrepancy between visual and linguistic features. Second, we propose a calibration method to reduce noisy background information and improve the correctness of the response maps for target object localization. Third, we propose a positive response map selection strategy to generate high-quality pseudo-labels from the enhanced response maps, for training a segmentation network for RIS inference. For evaluation, we propose a new metric to measure localization accuracy. Experiments on four benchmarks show that our framework achieves promising performances to existing fully-supervised RIS methods while outperforming state-of-the-art weakly-supervised methods adapted from related areas. Code is available at https://github.com/fawnliu/TRIS., Comment: ICCV 2023
- Published
- 2023
121. SYENet: A Simple Yet Effective Network for Multiple Low-Level Vision Tasks with Real-time Performance on Mobile Device
- Author
-
Gou, Weiran, Yi, Ziyao, Xiang, Yan, Li, Shaoqing, Liu, Zibin, Kong, Dehui, and Xu, Ke
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Artificial Intelligence - Abstract
With the rapid development of AI hardware accelerators, applying deep learning-based algorithms to solve various low-level vision tasks on mobile devices has gradually become possible. However, two main problems still need to be solved: task-specific algorithms make it difficult to integrate them into a single neural network architecture, and large amounts of parameters make it difficult to achieve real-time inference. To tackle these problems, we propose a novel network, SYENet, with only $~$6K parameters, to handle multiple low-level vision tasks on mobile devices in a real-time manner. The SYENet consists of two asymmetrical branches with simple building blocks. To effectively connect the results by asymmetrical branches, a Quadratic Connection Unit(QCU) is proposed. Furthermore, to improve performance, a new Outlier-Aware Loss is proposed to process the image. The proposed method proves its superior performance with the best PSNR as compared with other networks in real-time applications such as Image Signal Processing(ISP), Low-Light Enhancement(LLE), and Super-Resolution(SR) with 2K60FPS throughput on Qualcomm 8 Gen 1 mobile SoC(System-on-Chip). Particularly, for ISP task, SYENet got the highest score in MAI 2022 Learned Smartphone ISP challenge.
- Published
- 2023
122. FedCache: A Knowledge Cache-driven Federated Learning Architecture for Personalized Edge Intelligence
- Author
-
Wu, Zhiyuan, Sun, Sheng, Wang, Yuwei, Liu, Min, Xu, Ke, Wang, Wen, Jiang, Xuefeng, Gao, Bo, and Lu, Jinda
- Subjects
Computer Science - Distributed, Parallel, and Cluster Computing - Abstract
Edge Intelligence (EI) allows Artificial Intelligence (AI) applications to run at the edge, where data analysis and decision-making can be performed in real-time and close to data sources. To protect data privacy and unify data silos among end devices in EI, Federated Learning (FL) is proposed for collaborative training of shared AI models across devices without compromising data privacy. However, the prevailing FL approaches cannot guarantee model generalization and adaptation on heterogeneous clients. Recently, Personalized Federated Learning (PFL) has drawn growing awareness in EI, as it enables a productive balance between local-specific training requirements inherent in devices and global-generalized optimization objectives for satisfactory performance. However, most existing PFL methods are based on the Parameters Interaction-based Architecture (PIA) represented by FedAvg, which causes unaffordable communication burdens due to large-scale parameters transmission between devices and the edge server. In contrast, Logits Interaction-based Architecture (LIA) allows to update model parameters with logits transfer and gains the advantages of communication lightweight and heterogeneous on-device model allowance compared to PIA. Nevertheless, previous LIA methods attempt to achieve satisfactory performance either relying on unrealistic public datasets or increasing communication overhead for additional information transmission other than logits. To tackle this dilemma, we propose a knowledge cache-driven PFL architecture, named FedCache, which reserves a knowledge cache on the server for fetching personalized knowledge from the samples with similar hashes to each given on-device sample. During the training phase, ensemble distillation is applied to on-device models for constructive optimization with personalized knowledge transferred from the server-side knowledge cache., Comment: Accepted by IEEE Transactions on Mobile Computing (TMC)
- Published
- 2023
123. EQ-Net: Elastic Quantization Neural Networks
- Author
-
Xu, Ke, Han, Lei, Tian, Ye, Yang, Shangshang, and Zhang, Xingyi
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Artificial Intelligence - Abstract
Current model quantization methods have shown their promising capability in reducing storage space and computation complexity. However, due to the diversity of quantization forms supported by different hardware, one limitation of existing solutions is that usually require repeated optimization for different scenarios. How to construct a model with flexible quantization forms has been less studied. In this paper, we explore a one-shot network quantization regime, named Elastic Quantization Neural Networks (EQ-Net), which aims to train a robust weight-sharing quantization supernet. First of all, we propose an elastic quantization space (including elastic bit-width, granularity, and symmetry) to adapt to various mainstream quantitative forms. Secondly, we propose the Weight Distribution Regularization Loss (WDR-Loss) and Group Progressive Guidance Loss (GPG-Loss) to bridge the inconsistency of the distribution for weights and output logits in the elastic quantization space gap. Lastly, we incorporate genetic algorithms and the proposed Conditional Quantization-Aware Accuracy Predictor (CQAP) as an estimator to quickly search mixed-precision quantized neural networks in supernet. Extensive experiments demonstrate that our EQ-Net is close to or even better than its static counterparts as well as state-of-the-art robust bit-width methods. Code can be available at \href{https://github.com/xuke225/EQ-Net.git}{https://github.com/xuke225/EQ-Net}.
- Published
- 2023
124. Bogoliubov Quasiparticle on the Gossamer Fermi Surface in Electron-Doped Cuprates
- Author
-
Xu, Ke-Jun, Guo, Qinda, Hashimoto, Makoto, Li, Zi-Xiang, Chen, Su-Di, He, Junfeng, He, Yu, Li, Cong, Berntsen, Magnus H., Rotundu, Costel R., Lee, Young S., Devereaux, Thomas P., Rydh, Andreas, Lu, Dong-Hui, Lee, Dung-Hai, Tjernberg, Oscar, and Shen, Zhi-Xun
- Subjects
Condensed Matter - Superconductivity ,Condensed Matter - Strongly Correlated Electrons - Abstract
In contrast to hole-doped cuprates, electron-doped cuprates consistently exhibit strong antiferromagnetic correlations with a commensurate ({\pi}, {\pi}) ordering wave vector, leading to the prevalent belief that antiferromagnetic spin fluctuations mediate Cooper pairing in these unconventional superconductors. However, early investigations produced two paradoxical findings: while antiferromagnetic spin fluctuations create the largest pseudogap at "hot spots" in momentum space, Raman scattering and angle-resolved photoemission spectroscopy measurements using the leading-edge method seem to suggest the superconducting gap is also maximized at these locations. This presented a dilemma for spin-fluctuation-mediated pairing: Cooper pairing is strongest at momenta where normal state low energy spectral weight is most suppressed. Here we investigate this dilemma in Nd2-xCexCuO4 using angle-resolved photoemission spectroscopy under significantly improved experimental conditions. The unprecedented signal-to-noise ratio and resolution allow us to directly observe the Bogoliubov quasiparticles, demonstrating the existence and importance of two sectors of states: 1. The reconstructed main band and the states gapped by the antiferromagnetic pseudogap around the hot spots. 2. The gossamer Fermi surface states with distinct dispersion inside the pseudogap, from which Bogoliubov quasiparticle coherence peaks emerge below Tc. Supported by numerical results, we propose that the non-zero modulus of the antiferromagnetic order parameter causes the former, while fluctuations in the antiferromagnetic order parameter orientation are responsible for the latter. Our revelations of the gossamer Fermi surface reconcile the paradoxical observations, deepening our understanding of superconductivity in electron-doped cuprates in particular, and unconventional superconductivity in general., Comment: Submitted version 30 pages, 4 main figures, 8 extended data figures. Accepted version in press at Nature Physics
- Published
- 2023
- Full Text
- View/download PDF
125. Different reverse leakage current transport mechanismsof planar Schottky barrier diodes(SBDs) on Sapphire and GaN Substrate
- Author
-
Wang, Xiao, Lin, Zhi-Yu, Zhang, Yu-Min, Ren, Guo-Qiang, and Xu, Ke
- Subjects
Physics - Applied Physics - Abstract
The effects of different substrates on the off state leakage current in gallium nitride planar diodes are experimentally demonstrated and studied by analyzing temperature-dependent current voltage characteristics.
- Published
- 2023
126. New Covert and Side Channels Based on Retirement
- Author
-
Xu, Ke, Tang, Ming, Wang, Quancheng, and Wang, Han
- Subjects
Computer Science - Cryptography and Security ,C.1.2 - Abstract
Intel processors utilize the retirement to orderly retire the micro-ops that have been executed out of order. To enhance retirement utilization, the retirement is dynamically shared between two logical cores on the same physical core. However, this shared retirement mechanism creates a potential vulnerability wherein an attacker can exploit the competition for retirement to infer the data of a victim on another logical core on the same physical core. Based on this leakage, we propose two new covert channels: the Different Instructions (DI) covert channel using different instructions for information transmission, and the Same Instructions (SI) covert channel using the same instructions to transmit information. The DI covert channel can achieve 98.5% accuracy with a bandwidth of 1450 Kbps, while the SI covert channel can achieve 94.85% accuracy with a bandwidth of 483.33 Kbps. Furthermore, this paper explores additional applications of retirement: Firstly, retirement is applied to Spectre attacks, resulting in a new variant of Spectre v1, which can achieve 94.17% accuracy with a bandwidth of 29 Kbps; Secondly, retirement is leveraged to infer the programs being executed by the victim, which can infer 10 integer benchmarks of SPEC with 89.28% accuracy. Finally, we discuss possible protection against new covert channels., Comment: 13 pages and 17 figures
- Published
- 2023
127. Lighting up NeRF via Unsupervised Decomposition and Enhancement
- Author
-
Wang, Haoyuan, Xu, Xiaogang, Xu, Ke, and Lau, Rynson WH.
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Graphics - Abstract
Neural Radiance Field (NeRF) is a promising approach for synthesizing novel views, given a set of images and the corresponding camera poses of a scene. However, images photographed from a low-light scene can hardly be used to train a NeRF model to produce high-quality results, due to their low pixel intensities, heavy noise, and color distortion. Combining existing low-light image enhancement methods with NeRF methods also does not work well due to the view inconsistency caused by the individual 2D enhancement process. In this paper, we propose a novel approach, called Low-Light NeRF (or LLNeRF), to enhance the scene representation and synthesize normal-light novel views directly from sRGB low-light images in an unsupervised manner. The core of our approach is a decomposition of radiance field learning, which allows us to enhance the illumination, reduce noise and correct the distorted colors jointly with the NeRF optimization process. Our method is able to produce novel view images with proper lighting and vivid colors and details, given a collection of camera-finished low dynamic range (8-bits/channel) images from a low-light scene. Experiments demonstrate that our method outperforms existing low-light enhancement methods and NeRF methods., Comment: ICCV 2023. Project website: https://whyy.site/paper/llnerf
- Published
- 2023
128. Self-Supervised Learning for WiFi CSI-Based Human Activity Recognition: A Systematic Study
- Author
-
Xu, Ke, Wang, Jiangtao, Zhu, Hongyuan, and Zheng, Dingchang
- Subjects
Electrical Engineering and Systems Science - Signal Processing ,Computer Science - Artificial Intelligence ,Computer Science - Human-Computer Interaction ,Computer Science - Machine Learning - Abstract
Recently, with the advancement of the Internet of Things (IoT), WiFi CSI-based HAR has gained increasing attention from academic and industry communities. By integrating the deep learning technology with CSI-based HAR, researchers achieve state-of-the-art performance without the need of expert knowledge. However, the scarcity of labeled CSI data remains the most prominent challenge when applying deep learning models in the context of CSI-based HAR due to the privacy and incomprehensibility of CSI-based HAR data. On the other hand, SSL has emerged as a promising approach for learning meaningful representations from data without heavy reliance on labeled examples. Therefore, considerable efforts have been made to address the challenge of insufficient data in deep learning by leveraging SSL algorithms. In this paper, we undertake a comprehensive inventory and analysis of the potential held by different categories of SSL algorithms, including those that have been previously studied and those that have not yet been explored, within the field. We provide an in-depth investigation of SSL algorithms in the context of WiFi CSI-based HAR. We evaluate four categories of SSL algorithms using three publicly available CSI HAR datasets, each encompassing different tasks and environmental settings. To ensure relevance to real-world applications, we design performance metrics that align with specific requirements. Furthermore, our experimental findings uncover several limitations and blind spots in existing work, highlighting the barriers that need to be addressed before SSL can be effectively deployed in real-world WiFi-based HAR applications. Our results also serve as a practical guideline for industry practitioners and provide valuable insights for future research endeavors in this field.
- Published
- 2023
129. Accelerated structural evolution of galaxies in a starbursting cluster at z=2.51
- Author
-
Xu, Can, Wang, Tao, Gu, Qiusheng, Zanella, Anita, Xu, Ke, Sun, Hanwen, Strazzullo, Veronica, Valentino, Francesco, Gobat, Raphael, Daddi, Emanuele, Elbaz, David, Xiao, Mengyuan, Lu, Shiying, and Zhou, Luwenjia
- Subjects
Astrophysics - Astrophysics of Galaxies - Abstract
Structural properties of cluster galaxies during their peak formation epoch, $z \sim 2-4$ provide key information on whether and how environment affects galaxy formation and evolution. Based on deep HST/WFC3 imaging towards the z=2.51 cluster, J1001, we explore environmental effects on the structure, color gradients, and stellar populations of a statistical sample of cluster SFGs. We find that the cluster SFGs are on average smaller than their field counterparts. This difference is most pronounced at the high-mass end ($M_{\star} > 10^{10.5} M_{\odot}$) with nearly all of them lying below the mass-size relation of field galaxies. The high-mass cluster SFGs are also generally old with a steep negative color gradient, indicating an early formation time likely associated with strong dissipative collapse. For low-mass cluster SFGs, we unveil a population of compact galaxies with steep positive color gradients that are not seen in the field. This suggests that the low-mass compact cluster SFGs may have already experienced strong environmental effects, e.g., tidal/ram pressure stripping, in this young cluster. These results provide evidence on the environmental effects at work in the earliest formed clusters with different roles in the formation of low and high-mass galaxies., Comment: 13 pages, 10 figures, 1 table
- Published
- 2023
- Full Text
- View/download PDF
130. A multiphase-field model for simulating the hydrogen-induced multi-spot corrosion on the surface of polycrystalline metals: Application to uranium metal
- Author
-
Sheng, Jie, Liu, Yu, Shi, Xiao-Ming, Wang, Yue-Chao, Chen, Zi-Hang, Xu, Ke, Wu, Shuai, Huang, Hou-Bing, Sun, Bo, Liu, Hai-Feng, and Song, Hai-Feng
- Subjects
Condensed Matter - Materials Science ,Physics - Computational Physics - Abstract
Hydrogen-induced multi-spot corrosion on the surface of polycrystalline rare metals is a complex process, which involves the interactions between phases (metal, hydride and oxide), grain orientations, grain boundaries, and corrosion spots. To accurately simulate this process and comprehend the underlying physics, a theoretical method is required that includes the following mechanisms: i) hydrogen diffusion, ii) phase transformation, iii) elastic interactions between phases, especially, the interactions between the oxide film and the hydride, iv) elastic interactions between grains, and v) interactions between hydrogen solutes and grain boundaries. In this study, we report a multiphase-field model that incorporates all these requirements, and conduct a comprehensive study of hydrogen-induced spot corrosion on the uranium metal surface, including the investigation of the oxide film, multi-spot corrosion, grain orientation, and grain boundary in the monocrystal, bicrystal, and polycrystal systems. The results indicate that the oxide film can inhibit the growth of hydrides and plays a crucial role in determining the correct morphology of the hydride at the triple junction of phases. The elastic interaction between multiple corrosion spots causes the merging of corrosion spots and promotes the growth of hydrides. The introduction of grain orientations and grain boundaries results in a variety of intriguing intracrystalline and intergranular hydride morphologies. The model presented here is generally applicable to the hydrogen-induced multi-spot corrosion on any rare metal surface., Comment: 22 pages (text), 16 figures (text), 2 tables (text), 9 pages (SI), 13 figures (SI)
- Published
- 2023
- Full Text
- View/download PDF
131. Explainable Multimodal Emotion Recognition
- Author
-
Lian, Zheng, Sun, Haiyang, Sun, Licai, Gu, Hao, Wen, Zhuofan, Zhang, Siyuan, Chen, Shun, Xu, Mingyu, Xu, Ke, Chen, Kang, Chen, Lan, Liang, Shan, Li, Ya, Yi, Jiangyan, Liu, Bin, and Tao, Jianhua
- Subjects
Computer Science - Multimedia ,Computer Science - Human-Computer Interaction - Abstract
Multimodal emotion recognition is an important research topic in artificial intelligence, whose main goal is to integrate multimodal clues to identify human emotional states. Current works generally assume accurate labels for benchmark datasets and focus on developing more effective architectures. However, emotion annotation relies on subjective judgment. To obtain more reliable labels, existing datasets usually restrict the label space to some basic categories, then hire plenty of annotators and use majority voting to select the most likely label. However, this process may result in some correct but non-candidate or non-majority labels being ignored. To ensure reliability without ignoring subtle emotions, we propose a new task called ``Explainable Multimodal Emotion Recognition (EMER)''. Unlike traditional emotion recognition, EMER takes a step further by providing explanations for these predictions. Through this task, we can extract relatively reliable labels since each label has a certain basis. Meanwhile, we borrow large language models (LLMs) to disambiguate unimodal clues and generate more complete multimodal explanations. From them, we can extract richer emotions in an open-vocabulary manner. This paper presents our initial attempt at this task, including introducing a new dataset, establishing baselines, and defining evaluation metrics. In addition, EMER can serve as a benchmark task to evaluate the audio-video-text understanding performance of multimodal LLMs.
- Published
- 2023
132. Pulse Shape-Aided Multipath Delay Estimation for Fine-Grained WiFi Sensing
- Author
-
Xu, Ke, Chen, He, and Wu, Chenshu
- Subjects
Electrical Engineering and Systems Science - Signal Processing - Abstract
Due to the finite bandwidth of practical wireless systems, one multipath component can manifest itself as a discrete pulse consisting of multiple taps in the digital delay domain. This effect is called channel leakage, which complicates the multipath delay estimation problem. In this paper, we develop a new algorithm to estimate multipath delays of leaked channels by leveraging the knowledge of pulse-shaping functions, which can be used to support fine-grained WiFi sensing applications. Specifically, we express the channel impulse response (CIR) as a linear combination of overcomplete basis vectors corresponding to different delays. Considering the limited number of paths in physical environments, we formulate the multipath delay estimation as a sparse recovery problem. We then propose a sparse Bayesian learning (SBL) method to estimate the sparse vector and determine the number of physical paths and their associated delay parameters from the positions of the nonzero entries in the sparse vector. Simulation results show that our algorithm can accurately determine the number of paths, and achieve superior accuracy in path delay estimation and channel reconstruction compared to two benchmarking schemes.
- Published
- 2023
133. RF-Based Simultaneous Localization and Source Seeking for Multi-Robot Systems
- Author
-
Xu, Ke, Zhang, Rui, and Chen, He
- Subjects
Electrical Engineering and Systems Science - Signal Processing - Abstract
This paper considers a radio-frequency (RF)-based simultaneous localization and source-seeking (SLASS) problem in multi-robot systems, where multiple robots jointly localize themselves and an RF source using distance-only measurements extracted from RF signals and then control themselves to approach the source. We design a Rao-Blackwellized particle filter-based algorithm to realize the joint localization of the robots and the source. We also devise an information-theoretic control policy for the robots to approach the source. In our control policy, we maximize the predicted mutual information between the source position and the distance measurements, conditioned on the robot positions, to incorporate the robot localization uncertainties. A projected gradient ascent method is adopted to solve the mutual information maximization problem. Simulation results show that the proposed SLASS framework outperforms two benchmarks in terms of the root mean square error (RMSE) of the estimated source position and the decline of the distances between the robots and the source, indicating more effective approaching of the robots to the source.
- Published
- 2023
134. Macroscopic Bell state between a millimeter-sized spin system and a superconducting qubit
- Author
-
Xu, Da, Gu, Xu-Ke, Weng, Yuan-Chao, Li, He-Kang, Wang, Yi-Pu, Zhu, Shi-Yao, and You, J. Q.
- Subjects
Quantum Physics - Abstract
Entanglement is a fundamental property in quantum mechanics that systems share inseparable quantum correlation regardless of their mutual distances. Owing to the fundamental significance and versatile applications, the generation of quantum entanglement between {\it macroscopic} systems has been a focus of current research. Here we report on the deterministic generation and tomography of the macroscopically entangled Bell state in a hybrid quantum system containing a millimeter-sized spin system ($\sim 1\times10^{19}$ atoms) and a micrometer-sized superconducting qubit. The deterministic generation is realized by coupling the macroscopic spin system and the qubit via a microwave cavity. Also, we develop a joint tomography approach to confirming the deterministic generation of the Bell state, which gives a generation fidelity of $0.90\pm0.01$. Our work makes the macroscopic spin system the {\it largest} system (in the sense of atom number) capable of generating the maximally entangled quantum state., Comment: 8 pages, 5 figures
- Published
- 2023
- Full Text
- View/download PDF
135. Sub-micrometer phonon mean free paths in metal-organic frameworks revealed by machine-learning molecular dynamics simulations
- Author
-
Ying, Penghua, Liang, Ting, Xu, Ke, Zhang, Jin, Xu, Jianbin, Zhong, Zheng, and Fan, Zheyong
- Subjects
Condensed Matter - Materials Science - Abstract
Metal-organic frameworks (MOFs) are a family of materials that have high porosity and structural tunability and hold great potential in various applications, many of which requiring a proper understanding of the thermal transport properties. Molecular dynamics (MD) simulations play an important role in characterizing the thermal transport properties of various materials. However, due to the complexity of the structures, it is difficult to construct accurate empirical interatomic potentials for reliable MD simulations of MOFs. To this end, we develop a set of accurate yet highly efficient machine-learned potentials for three typical MOFs, including MOF-5, HKUST-1, and ZIF-8, using the neuroevolution potential approach as implemented in the GPUMD package, and perform extensive MD simulations to study thermal transport in the three MOFs. Although the lattice thermal conductivity (LTC) values of the three MOFs are all predicted to be smaller than 1 $\rm{W/(m\ K)}$ at room temperature, the phonon mean free paths (MFPs) are found to reach the sub-micrometer scale in the low-frequency region. As a consequence, the apparent LTC only converges to the diffusive limit for micrometer single crystals, which means that the LTC is heavily reduced in nanocrystalline MOFs. The sub-micrometer phonon MFPs are also found to be correlated with a moderate temperature dependence of LTC between those in typical crystalline and amorphous materials. Both the large phonon MFPs and the moderate temperature dependence of LTC fundamentally change our understanding of thermal transport in MOFs., Comment: 12 pages, 9 figures
- Published
- 2023
- Full Text
- View/download PDF
136. BandwidthBreach: Unleashing Covert and Side Channels through Cache Bandwidth Exploitation
- Author
-
Wang, Han, Tang, Ming, Xu, Ke, and Wang, Quancheng
- Subjects
Computer Science - Cryptography and Security - Abstract
In the modern CPU architecture, enhancements such as the Line Fill Buffer (LFB) and Super Queue (SQ), which are designed to track pending cache requests, have significantly boosted performance. To exploit this structures, we deliberately engineered blockages in the L2 to L1d route by controlling LFB conflict and triggering prefetch prediction failures, while consciously dismissing other plausible influencing factors. This approach was subsequently extended to the L3 to L2 and L2 to L1i pathways, resulting in three potent covert channels, termed L2CC, L3CC, and LiCC, with capacities of 10.02 Mbps, 10.37 Mbps, and 1.83 Mbps, respectively. Strikingly, the capacities of L2CC and L3CC surpass those of earlier non-shared-memory-based covert channels, reaching a level comparable to their shared memory-dependent equivalents. Leveraging this congestion further facilitated the extraction of key bits from RSA and EdDSA implementations. Coupled with SpectreV1 and V2, our covert channels effectively evade the majority of traditional Spectre defenses. Their confluence with Branch Prediction (BP) Timing assaults additionally undercuts balanced branch protections, hence broadening their capability to infiltrate a wide range of cryptography libraries.
- Published
- 2023
137. A composite electrodynamic mechanism to reconcile spatiotemporally resolved exciton transport in quantum dot superlattices
- Author
-
Yuan, Rongfeng, Roberts, Trevor D, Brinn, Rafaela M, Choi, Alexander A, Park, Ha H, Yan, Chang, Ondry, Justin C, Khorasani, Siamak, Masiello, David J, Xu, Ke, Alivisatos, A Paul, and Ginsberg, Naomi S
- Subjects
Quantum Physics ,Physical Sciences - Abstract
Quantum dot (QD) solids are promising optoelectronic materials; further advancing their device functionality requires understanding their energy transport mechanisms. The commonly invoked near-field Förster resonance energy transfer (FRET) theory often underestimates the exciton hopping rate in QD solids, yet no consensus exists on the underlying cause. In response, we use time-resolved ultrafast stimulated emission depletion (STED) microscopy, an ultrafast transformation of STED to spatiotemporally resolve exciton diffusion in tellurium-doped cadmium selenide-core/cadmium sulfide-shell QD superlattices. We measure the concomitant time-resolved exciton energy decay due to excitons sampling a heterogeneous energetic landscape within the superlattice. The heterogeneity is quantified by single-particle emission spectroscopy. This powerful multimodal set of observables provides sufficient constraints on a kinetic Monte Carlo simulation of exciton transport to elucidate a composite transport mechanism that includes both near-field FRET and previously neglected far-field emission/reabsorption contributions. Uncovering this mechanism offers a much-needed unified framework in which to characterize transport in QD solids and additional principles for device design.
- Published
- 2023
138. General-purpose machine-learned potential for 16 elemental metals and their alloys
- Author
-
Song, Keke, Zhao, Rui, Liu, Jiahui, Wang, Yanzhou, Lindgren, Eric, Wang, Yong, Chen, Shunda, Xu, Ke, Liang, Ting, Ying, Penghua, Xu, Nan, Zhao, Zhiqiang, Shi, Jiuyang, Wang, Junjie, Lyu, Shuang, Zeng, Zezhu, Liang, Shirong, Dong, Haikuan, Sun, Ligang, Chen, Yue, Zhang, Zhuhua, Guo, Wanlin, Qian, Ping, Sun, Jian, Erhart, Paul, Ala-Nissila, Tapio, Su, Yanjing, and Fan, Zheyong
- Published
- 2024
- Full Text
- View/download PDF
139. UGT708S6 from Dendrobium catenatum, catalyzes the formation of flavonoid C-glycosides
- Author
-
Yu, Luyao, He, Kun, Wu, Yu, Hao, Kai, Wang, Yun, Yao, Jinbo, Zhao, Yuxue, Yu, Qiaoxian, Shen, Yanghui, Chen, Mengxuan, Xu, Ke, Zhang, Xinfeng, and Zhang, Lei
- Published
- 2024
- Full Text
- View/download PDF
140. Turnover intention among healthcare workers in Shenzhen, China: the mediating effect of job satisfaction and work engagement
- Author
-
Xu, Ke, Lei, Lin, Guo, Zhuang, Liu, Xiaoying, Shi, Yu, Han, Guiyuan, Lin, Kaihao, Cai, Weicong, Lu, Chenxi, Li, Xinying, Li, Yichong, and Peng, Ke
- Published
- 2024
- Full Text
- View/download PDF
141. Is there a genetic relationship between blood glucose and osteoarthritis? A mendelian randomization study
- Author
-
Wang, Junxiang, Peng, Leixuan, Yang, Mingyi, Wang, Jiachen, Feng, Ruoyang, Xu, Ke, and Xu, Peng
- Published
- 2024
- Full Text
- View/download PDF
142. Robot-assisted technique can achieve accurate screw placement in four-corner fusion and reduce operative difficulty: a cadaver study
- Author
-
Wang, Zhixin, Liu, Bo, Yi, Zhe, Xu, Ke, Jia, Shijie, Wang, Qianqian, and Yin, Yaobin
- Published
- 2024
- Full Text
- View/download PDF
143. Effect of additional free sustentaculum tali screw fixation through modified sinus tarsi approach on intra-articular calcaneal fractures
- Author
-
Sun, Yongyang, Gu, Yingluo, Xu, Ke, Yi, Nan, Zhao, Jiaju, Zhang, Yong, and Jiang, Bo
- Published
- 2024
- Full Text
- View/download PDF
144. International Alliance of Urolithiasis (IAU) consensus on miniaturized percutaneous nephrolithotomy
- Author
-
Zeng, Guo-Hua, Zhong, Wen, Mazzon, Giorgio, Zhu, Wei, Lahme, Sven, Khadgi, Sanjay, Desai, Janak, Agrawal, Madhu, Schulsinger, David, Gupta, Mantu, Montanari, Emanuele, Martinez, Juan Manuel Lopez, Almousawi, Shabir, Malonzo, Vincent Emanuel F., Sriprasad, Seshadri, Durutovic, Otas, Arumuham, Vimoshan, Ferretti, Stefania, Kamal, Wissam, Xu, Ke-Wei, Cheng, Fan, Gao, Xiao-Feng, Cheng, Ji-Wen, Somani, Bhaskar, Duvdevani, Mordechai, Git, Kah Ann, Seitz, Christian, Bernardo, Norberto, Ibrahim, Tarek Ahmed Amin, Aquino, Albert, Yasui, Takahiro, Fiori, Cristian, Knoll, Thomas, Papatsoris, Athanasios, Gadzhiev, Nariman, Zhanbyrbekuly, Ulanbek, Angerri, Oriol, Ramos, Hugo Lopez, Saltirov, Iliya, Moussa, Mohamad, Giusti, Guido, Vicentini, Fabio, Suarez, Edgar Beltran, Pearle, Margaret, Preminger, Glenn M., Wu, Qing-Hui, Durutovic, Otas, Ghani, Khurshid, Maroccolo, Marcus, Brehmer, Marianne, Osther, Palle J., Zawadzki, Marek, Tursunkulov, Azimdjon, Kytaibekovich, Monolov Nurbek, Abuvohidov, Abdusamad Abdukakhorovich, Lara, Cesar Antonio Recalde, Noori, Zamari, Zanetti, Stefano Paolo, Shrestha, Sunil, de la Rosette, Jean, Denstedt, John, Ye, Zhang-Qun, Sarica, Kemal, and Choong, Simon
- Published
- 2024
- Full Text
- View/download PDF
145. A multi-trait epigenome-wide association study identified DNA methylation signature of inflammation among men with HIV
- Author
-
Chen, Junyu, Hui, Qin, Titanji, Boghuma K., So-Armah, Kaku, Freiberg, Matthew, Justice, Amy C., Xu, Ke, Zhu, Xiaofeng, Gwinn, Marta, Marconi, Vincent C., and Sun, Yan V.
- Published
- 2024
- Full Text
- View/download PDF
146. The two-sided battlefield of tumour-associated macrophages in glioblastoma: unravelling their therapeutic potential
- Author
-
Xiong, Jingwen, Zhou, Xuancheng, Su, Lanqian, Jiang, Lai, Ming, Ziwei, Pang, Can, Fuller, Claire, Xu, Ke, Chi, Hao, and Zheng, Xiaomei
- Published
- 2024
- Full Text
- View/download PDF
147. Efficacy and toxicity of lurbinectedin in subsequent systemic therapy of extensive-stage small cell lung cancer: a meta-analysis
- Author
-
Tang, Jiayi, Wang, Tianlei, Wu, Hongwei, Bao, Xinrui, Xu, Ke, and Ren, Tao
- Published
- 2024
- Full Text
- View/download PDF
148. Epidemiological characteristics of influenza outbreaks in schools in Jiangsu Province, China, 2020–2023 post-COVID-19 pandemic
- Author
-
Peng, Jia-Le, Xu, Ke, Tong, Ye, Wang, Shi-Zhi, Huang, Hao-Di, Bao, Chang-Jun, and Dai, Qi-Gang
- Published
- 2024
- Full Text
- View/download PDF
149. Tumor-microenvironment-on-a-chip: the construction and application
- Author
-
Xu, Hanzheng, Wen, Jiangtao, Yang, Jiahua, Zhou, Shufen, Li, Yijie, Xu, Ke, Li, Wei, and Li, Sen
- Published
- 2024
- Full Text
- View/download PDF
150. HBI: a hierarchical Bayesian interaction model to estimate cell-type-specific methylation quantitative trait loci incorporating priors from cell-sorted bisulfite sequencing data
- Author
-
Cheng, Youshu, Cai, Biao, Li, Hongyu, Zhang, Xinyu, D’Souza, Gypsyamber, Shrestha, Sadeep, Edmonds, Andrew, Meyers, Jacquelyn, Fischl, Margaret, Kassaye, Seble, Anastos, Kathryn, Cohen, Mardge, Aouizerat, Bradley E., Xu, Ke, and Zhao, Hongyu
- Published
- 2024
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.