74,620 results on '"LI, Yi"'
Search Results
2. YOSO: You-Only-Sample-Once via Compressed Sensing for Graph Neural Network Training
- Author
-
Li, Yi, Guo, Zhichun, Li, Guanpeng, and Li, Bingzhe
- Subjects
Computer Science - Machine Learning - Abstract
Graph neural networks (GNNs) have become essential tools for analyzing non-Euclidean data across various domains. During training stage, sampling plays an important role in reducing latency by limiting the number of nodes processed, particularly in large-scale applications. However, as the demand for better prediction performance grows, existing sampling algorithms become increasingly complex, leading to significant overhead. To mitigate this, we propose YOSO (You-Only-Sample-Once), an algorithm designed to achieve efficient training while preserving prediction accuracy. YOSO introduces a compressed sensing (CS)-based sampling and reconstruction framework, where nodes are sampled once at input layer, followed by a lossless reconstruction at the output layer per epoch. By integrating the reconstruction process with the loss function of specific learning tasks, YOSO not only avoids costly computations in traditional compressed sensing (CS) methods, such as orthonormal basis calculations, but also ensures high-probability accuracy retention which equivalent to full node participation. Experimental results on node classification and link prediction demonstrate the effectiveness and efficiency of YOSO, reducing GNN training by an average of 75\% compared to state-of-the-art methods, while maintaining accuracy on par with top-performing baselines.
- Published
- 2024
3. Statistical Inference on High Dimensional Gaussian Graphical Regression Models
- Author
-
Meng, Xuran, Zhang, Jingfei, and Li, Yi
- Subjects
Statistics - Methodology ,Mathematics - Statistics Theory - Abstract
Gaussian graphical regressions have emerged as a powerful approach for regressing the precision matrix of a Gaussian graphical model on covariates, which, unlike traditional Gaussian graphical models, can help determine how graphs are modulated by high dimensional subject-level covariates, and recover both the population-level and subject-level graphs. To fit the model, a multi-task learning approach {achieves} %has been shown to result in lower error rates compared to node-wise regressions. However, due to the high complexity and dimensionality of the Gaussian graphical regression problem, the important task of statistical inference remains unexplored. We propose a class of debiased estimators based on multi-task learners for statistical inference in Gaussian graphical regressions. We show that debiasing can be performed quickly and separately for the multi-task learners. In a key debiasing step {that estimates} %involving the estimation of the inverse covariance matrix, we propose a novel {projection technique} %diagonalization approach that dramatically reduces computational costs {in optimization} to scale only with the sample size $n$. We show that our debiased estimators enjoy a fast convergence rate and asymptotically follow a normal distribution, enabling valid statistical inference such as constructing confidence intervals and performing hypothesis testing. Simulation studies confirm the practical utility of the proposed approach, and we further apply it to analyze gene co-expression graph data from a brain cancer study, revealing meaningful biological relationships., Comment: 27 Pages, 4 figures, 4 tables
- Published
- 2024
4. Multi-Objective-Optimization Multi-AUV Assisted Data Collection Framework for IoUT Based on Offline Reinforcement Learning
- Author
-
Ding, Yimian, Wang, Xinqi, Xu, Jingzehua, Xie, Guanwen, Liu, Weiyi, and Li, Yi
- Subjects
Electrical Engineering and Systems Science - Systems and Control - Abstract
The Internet of Underwater Things (IoUT) offers significant potential for ocean exploration but encounters challenges due to dynamic underwater environments and severe signal attenuation. Current methods relying on Autonomous Underwater Vehicles (AUVs) based on online reinforcement learning (RL) lead to high computational costs and low data utilization. To address these issues and the constraints of turbulent ocean environments, we propose a multi-AUV assisted data collection framework for IoUT based on multi-agent offline RL. This framework maximizes data rate and the value of information (VoI), minimizes energy consumption, and ensures collision avoidance by utilizing environmental and equipment status data. We introduce a semi-communication decentralized training with decentralized execution (SC-DTDE) paradigm and a multi-agent independent conservative Q-learning algorithm (MAICQL) to effectively tackle the problem. Extensive simulations demonstrate the high applicability, robustness, and data collection efficiency of the proposed framework.
- Published
- 2024
5. EFILN: The Electric Field Inversion-Localization Network for High-Precision Underwater Positioning
- Author
-
Ding, Yimian, Xu, Jingzehua, Xie, Guanwen, Wang, Haoyu, Liu, Weiyi, and Li, Yi
- Subjects
Electrical Engineering and Systems Science - Systems and Control - Abstract
Accurate underwater target localization is essential for underwater exploration. To improve accuracy and efficiency in complex underwater environments, we propose the Electric Field Inversion-Localization Network (EFILN), a deep feedforward neural network that reconstructs position coordinates from underwater electric field signals. By assessing whether the neural network's input-output values satisfy the Coulomb law, the error between the network's inversion solution and the equation's exact solution can be determined. The Adam optimizer was employed first, followed by the L-BFGS optimizer, to progressively improve the output precision of EFILN. A series of noise experiments demonstrated the robustness and practical utility of the proposed method, while small sample data experiments validated its strong small-sample learning (SSL) capabilities. To accelerate relevant research, we have made the codes available as open-source.
- Published
- 2024
6. From Operator Product Expansion to Anomalous Dimensions
- Author
-
Huang, Rijun, Jin, Qingjun, and Li, Yi
- Subjects
High Energy Physics - Theory - Abstract
We propose a new method for computing renormalization functions, which is based on the ideas of operator product expansion and large momentum expansion. In this method, the renormalization $Z$-factors are determined by the ultraviolet finiteness of Wilson coefficients in the dimensional regularization scheme. The ultraviolet divergence is extracted solely from two-point functions at the large momentum limit. We develop this method in scalar field theories and provide a general framework for computing anomalous dimensions of field, mass, couplings and composite operators. In particular, it is applied to 6-dimensional cubic scalar theory and 4-dimensional quartic scalar theory. We demonstrate this method by computing the anomalous dimension of the $\phi^Q$ operator in cubic theory up to four loops for arbitrary $Q$, which is in agreement with the known result in the large $N$ limit. The idea of computing anomalous dimensions from operator production expansion is general and can be extended beyond scalar theories., Comment: 31 pages, 6 figures
- Published
- 2024
7. OptiGrasp: Optimized Grasp Pose Detection Using RGB Images for Warehouse Picking Robots
- Author
-
Atar, Soofiyan, Li, Yi, Grotz, Markus, Wolf, Michael, Fox, Dieter, and Smith, Joshua
- Subjects
Computer Science - Robotics ,Computer Science - Computer Vision and Pattern Recognition - Abstract
In warehouse environments, robots require robust picking capabilities to manage a wide variety of objects. Effective deployment demands minimal hardware, strong generalization to new products, and resilience in diverse settings. Current methods often rely on depth sensors for structural information, which suffer from high costs, complex setups, and technical limitations. Inspired by recent advancements in computer vision, we propose an innovative approach that leverages foundation models to enhance suction grasping using only RGB images. Trained solely on a synthetic dataset, our method generalizes its grasp prediction capabilities to real-world robots and a diverse range of novel objects not included in the training set. Our network achieves an 82.3\% success rate in real-world applications. The project website with code and data will be available at http://optigrasp.github.io., Comment: 8 pages, 6 figures
- Published
- 2024
8. Necessary and Sufficient Condition for Randomness Certification from Incompatibility
- Author
-
Li, Yi, Xiang, Yu, Tura, Jordi, and He, Qiongyi
- Subjects
Quantum Physics - Abstract
Quantum randomness can be certified from probabilistic behaviors demonstrating Bell nonlocality or Einstein-Podolsky-Rosen steering, leveraging outcomes from uncharacterized devices. However, such nonlocal correlations are not always sufficient for this task, necessitating the identification of required minimum quantum resources. In this work, we provide the necessary and sufficient condition for nonzero certifiable randomness in terms of measurement incompatibility and develop approaches to detect them. Firstly, we show that the steering-based randomness can be certified if and only if the correlations arise from a measurement compatibility structure that is not isomorphic to a hypergraph containing a star subgraph. In such a structure, the central measurement is individually compatible with the measurements at branch sites, precluding certifiable randomness in the central measurement outcomes. Subsequently, we generalize this result to the Bell scenario, proving that the violation of any chain inequality involving $m$ inputs and $d$ outputs rules out such a compatibility structure, thereby validating all chain inequalities as credible witnesses for randomness certification. Our results point out the role of incompatibility structure in generating random numbers, offering a way to identify minimum quantum resources for the task., Comment: 15 pages (incl. appendix), 3 figures
- Published
- 2024
9. Contact Compliance Visuo-Proprioceptive Policy for Contact-Rich Manipulation with Cost-Efficient Haptic Hand-Arm Teleoperation System
- Author
-
Zhou, Bo, Jiao, Ruixuan, Li, Yi, Fang, Fang, and Chen, Fu
- Subjects
Computer Science - Robotics - Abstract
Learning robot manipulation skills in real-world environments is extremely challenging. Robots learning manipulation skills in real-world environments is extremely challenging. Recent research on imitation learning and visuomotor policies has significantly enhanced the ability of robots to perform manipulation tasks. In this paper, we propose Admit Policy, a visuo-proprioceptive imitation learning framework with force compliance, designed to reduce contact force fluctuations during robot execution of contact-rich manipulation tasks. This framework also includes a hand-arm teleoperation system with vibrotactile feedback for efficient data collection. Our framework utilizes RGB images, robot joint positions, and contact forces as observations and leverages a consistency-constrained teacher-student probabilistic diffusion model to generate future trajectories for end-effector positions and contact forces. An admittance model is then employed to track these trajectories, enabling effective force-position control across various tasks.We validated our framework on five challenging contact-rich manipulation tasks. Among these tasks, while improving success rates, our approach most significantly reduced the mean contact force required to complete the tasks by up to 53.92% and decreased the standard deviation of contact force fluctuations by 76.51% compared to imitation learning algorithms without dynamic contact force prediction and tracking., Comment: 8 pages, 6 figures. This is the first version of the letter, and it is subject to further revisions. The current submission does not necessarily reflect the final quality or content of the letter
- Published
- 2024
10. ChemEval: A Comprehensive Multi-Level Chemical Evaluation for Large Language Models
- Author
-
Huang, Yuqing, Zhang, Rongyang, He, Xuesong, Zhi, Xuyang, Wang, Hao, Li, Xin, Xu, Feiyang, Liu, Deguang, Liang, Huadong, Li, Yi, Cui, Jian, Liu, Zimu, Wang, Shijin, Hu, Guoping, Liu, Guiquan, Liu, Qi, Lian, Defu, and Chen, Enhong
- Subjects
Computer Science - Computation and Language ,Computer Science - Artificial Intelligence ,Computer Science - Machine Learning ,Physics - Chemical Physics ,Quantitative Biology - Biomolecules - Abstract
There is a growing interest in the role that LLMs play in chemistry which lead to an increased focus on the development of LLMs benchmarks tailored to chemical domains to assess the performance of LLMs across a spectrum of chemical tasks varying in type and complexity. However, existing benchmarks in this domain fail to adequately meet the specific requirements of chemical research professionals. To this end, we propose \textbf{\textit{ChemEval}}, which provides a comprehensive assessment of the capabilities of LLMs across a wide range of chemical domain tasks. Specifically, ChemEval identified 4 crucial progressive levels in chemistry, assessing 12 dimensions of LLMs across 42 distinct chemical tasks which are informed by open-source data and the data meticulously crafted by chemical experts, ensuring that the tasks have practical value and can effectively evaluate the capabilities of LLMs. In the experiment, we evaluate 12 mainstream LLMs on ChemEval under zero-shot and few-shot learning contexts, which included carefully selected demonstration examples and carefully designed prompts. The results show that while general LLMs like GPT-4 and Claude-3.5 excel in literature understanding and instruction following, they fall short in tasks demanding advanced chemical knowledge. Conversely, specialized LLMs exhibit enhanced chemical competencies, albeit with reduced literary comprehension. This suggests that LLMs have significant potential for enhancement when tackling sophisticated tasks in the field of chemistry. We believe our work will facilitate the exploration of their potential to drive progress in chemistry. Our benchmark and analysis will be available at {\color{blue} \url{https://github.com/USTC-StarTeam/ChemEval}}.
- Published
- 2024
11. Adaptive Segmentation-Based Initialization for Steered Mixture of Experts Image Regression
- Author
-
Li, Yi-Hsin, Knorr, Sebastian, Sjöström, Mårten, and Sikora, Thomas
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Kernel image regression methods have shown to provide excellent efficiency in many image processing task, such as image and light-field compression, Gaussian Splatting, denoising and super-resolution. The estimation of parameters for these methods frequently employ gradient descent iterative optimization, which poses significant computational burden for many applications. In this paper, we introduce a novel adaptive segmentation-based initialization method targeted for optimizing Steered-Mixture-of Experts (SMoE) gating networks and Radial-Basis-Function (RBF) networks with steering kernels. The novel initialization method allocates kernels into pre-calculated image segments. The optimal number of kernels, kernel positions, and steering parameters are derived per segment in an iterative optimization and kernel sparsification procedure. The kernel information from "local" segments is then transferred into a "global" initialization, ready for use in iterative optimization of SMoE, RBF, and related kernel image regression methods. Results show that drastic objective and subjective quality improvements are achievable compared to widely used regular grid initialization, "state-of-the-art" K-Means initialization and previously introduced segmentation-based initialization methods, while also drastically improving the sparsity of the regression models. For same quality, the novel initialization results in models with around 50% reduction of kernels. In addition, a significant reduction of convergence time is achieved, with overall run-time savings of up to 50%. The segmentation-based initialization strategy itself admits heavy parallel computation; in theory, it may be divided into as many tasks as there are segments in the images. By accessing only four parallel GPUs, run-time savings of already 50% for initialization are achievable.
- Published
- 2024
12. Berry Phase Enforced Spinor Pairing Order
- Author
-
Li, Yi and Frazier, Grayson R.
- Subjects
Condensed Matter - Superconductivity ,Condensed Matter - Mesoscale and Nanoscale Physics ,Condensed Matter - Strongly Correlated Electrons - Abstract
We introduce a class of topological pairing orders characterized by a half-integer pair monopole charge, leading to Berry phase enforced half-integer partial wave symmetry. This exotic spinor order emerges from pairing between Fermi surfaces with Chern numbers differing by an odd integer. Using tight-binding models, we demonstrate spinor superconducting orders with monopole charges $\pm 1/2$, featuring a single gap node and nontrivial surface states. Additionally, the superfluid velocity follows a fractionalized Mermin-Ho relation in spatially inhomogeneous pairing orders. The concept extends to spinor density waves and excitons., Comment: This article supersedes arXiv:2001.05984
- Published
- 2024
13. CompressedMediQ: Hybrid Quantum Machine Learning Pipeline for High-Dimensional Neuroimaging Data
- Author
-
Chen, Kuan-Cheng, Li, Yi-Tien, Li, Tai-Yu, Liu, Chen-Yu, Li, Po-Heng, and Chen, Cheng-Yu
- Subjects
Quantum Physics ,Computer Science - Distributed, Parallel, and Cluster Computing ,Computer Science - Machine Learning - Abstract
This paper introduces CompressedMediQ, a novel hybrid quantum-classical machine learning pipeline specifically developed to address the computational challenges associated with high-dimensional multi-class neuroimaging data analysis. Standard neuroimaging datasets, such as large-scale MRI data from the Alzheimer's Disease Neuroimaging Initiative (ADNI) and Neuroimaging in Frontotemporal Dementia (NIFD), present significant hurdles due to their vast size and complexity. CompressedMediQ integrates classical high-performance computing (HPC) nodes for advanced MRI pre-processing and Convolutional Neural Network (CNN)-PCA-based feature extraction and reduction, addressing the limited-qubit availability for quantum data encoding in the NISQ (Noisy Intermediate-Scale Quantum) era. This is followed by Quantum Support Vector Machine (QSVM) classification. By utilizing quantum kernel methods, the pipeline optimizes feature mapping and classification, enhancing data separability and outperforming traditional neuroimaging analysis techniques. Experimental results highlight the pipeline's superior accuracy in dementia staging, validating the practical use of quantum machine learning in clinical diagnostics. Despite the limitations of NISQ devices, this proof-of-concept demonstrates the transformative potential of quantum-enhanced learning, paving the way for scalable and precise diagnostic tools in healthcare and signal processing.
- Published
- 2024
14. Real analyticity of the modified Laplacian coflow
- Author
-
Li, Chuanhuan and Li, Yi
- Subjects
Mathematics - Differential Geometry - Abstract
Let (M,\psi(t))_{t\in[0, T]} be a solution of the modified Laplacian coflow (1.3) with coclosed G_{2}-structures on a compact 7-dimensional M. We improve Chen's Shi-type estimate [5] for this flow, and then show that (M,\psi(t),g_{\psi}(t)) is real analytic, where g_{\psi}(t) is the associate Riemannian metric to \psi(t), which answers a question proposed by Grigorian in [13]. Consequently, we obtain the unique-continuation results for this flow., Comment: 28 pages
- Published
- 2024
15. SX-Stitch: An Efficient VMS-UNet Based Framework for Intraoperative Scoliosis X-Ray Image Stitching
- Author
-
Li, Yi, Gao, Heting, He, Mingde, Liang, Jinqian, Gu, Jason, and Liu, Wei
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
In scoliosis surgery, the limited field of view of the C-arm X-ray machine restricts the surgeons' holistic analysis of spinal structures .This paper presents an end-to-end efficient and robust intraoperative X-ray image stitching method for scoliosis surgery,named SX-Stitch. The method is divided into two stages:segmentation and stitching. In the segmentation stage, We propose a medical image segmentation model named Vision Mamba of Spine-UNet (VMS-UNet), which utilizes the state space Mamba to capture long-distance contextual information while maintaining linear computational complexity, and incorporates the SimAM attention mechanism, significantly improving the segmentation performance.In the stitching stage, we simplify the alignment process between images to the minimization of a registration energy function. The total energy function is then optimized to order unordered images, and a hybrid energy function is introduced to optimize the best seam, effectively eliminating parallax artifacts. On the clinical dataset, Sx-Stitch demonstrates superiority over SOTA schemes both qualitatively and quantitatively.
- Published
- 2024
16. Self-Testing Quantum Error Correcting Codes: Analyzing Computational Hardness
- Author
-
Kuo, En-Jui and Hsu, Li-Yi
- Subjects
Quantum Physics - Abstract
We present a generalization of the tilted Bell inequality for quantum [[n,k,d]] error-correcting codes and explicitly utilize the simplest perfect code, the [[5,1,3]] code, the Steane [[7,1,3]] code, and Shor's [[9,1,3]] code, to demonstrate the self-testing property of their respective codespaces. Additionally, we establish a framework for the proof of self-testing, as detailed in \cite{baccari2020device}, which can be generalized to the codespace of CSS stabilizers. Our method provides a self-testing scheme for $\cos\theta \lvert \bar{0} \rangle + \sin\theta \lvert \bar{1} \rangle$, where $\theta \in [0, \frac{\pi}{2}]$, and also discusses its experimental application. We also investigate whether such property can be generalized to qudit and show one no-go theorem. We then define a computational problem called ISSELFTEST and describe how this problem formulation can be interpreted as a statement that maximal violation of a specific Bell-type inequality can self-test a particular entanglement subspace. We also discuss the computational complexity of ISSELFTEST in comparison to other classical complexity challenges and some related open problems.
- Published
- 2024
17. The pole structures of the $X(1840)/X(1835)$ and the $X(1880)$
- Author
-
Niu, Peng-Yu, Zhang, Zhen-Yu, Li, Yi-Yao, Wang, Qian, and Zhao, Qiang
- Subjects
High Energy Physics - Phenomenology - Abstract
Whether the $N\bar{N}$ interaction could form a state or not is a long standing question, even before the observation of the $p\bar{p}$ threshold enhancement in 2003. The recent high statistic measurement in the $J/\psi \to \gamma 3(\pi^+\pi^-)$ channel would provide a good opportunity to probe the nature of the peak structures around the $p\bar{p}$ threshold in various processes. By constructing the $N\bar{N}$ interaction respecting chiral symmetry, we extract the pole positions by fitting the $p\bar{p}$ and $3(\pi^+\pi^-)$ invariant mass distributions of the $J/\psi \to \gamma p \bar p$ and $J/\psi \to \gamma 3(\pi^+\pi^-)$ processes. The threshold enhancement in the $p\bar{p}$ invariant mass distribution is from the pole on the third Riemann sheet, which more couples to the isospin triplet channel. The broader structure in the $3(\pi^+\pi^-)$ invariant mass comes from the pole on the physical Riemann sheet, which more couples to the isospin singlet channel. Furthermore, the large compositeness indicates that there should exit $p\bar{p}$ resonance based on the current experimental data. In addition, we also see a clear threshold enhancement in the $n\bar{n}$ channel, but not as significant as that in $p\bar{p}$ channel, which is useful and compared with further experimental measurement., Comment: 16 pages, 8 figures
- Published
- 2024
18. Community-Centric Graph Unlearning
- Author
-
Li, Yi, Zhang, Shichao, Zhang, Guixian, and Cheng, Debo
- Subjects
Computer Science - Machine Learning ,Computer Science - Social and Information Networks - Abstract
Graph unlearning technology has become increasingly important since the advent of the `right to be forgotten' and the growing concerns about the privacy and security of artificial intelligence. Graph unlearning aims to quickly eliminate the effects of specific data on graph neural networks (GNNs). However, most existing deterministic graph unlearning frameworks follow a balanced partition-submodel training-aggregation paradigm, resulting in a lack of structural information between subgraph neighborhoods and redundant unlearning parameter calculations. To address this issue, we propose a novel Graph Structure Mapping Unlearning paradigm (GSMU) and a novel method based on it named Community-centric Graph Eraser (CGE). CGE maps community subgraphs to nodes, thereby enabling the reconstruction of a node-level unlearning operation within a reduced mapped graph. CGE makes the exponential reduction of both the amount of training data and the number of unlearning parameters. Extensive experiments conducted on five real-world datasets and three widely used GNN backbones have verified the high performance and efficiency of our CGE method, highlighting its potential in the field of graph unlearning.
- Published
- 2024
19. Optimal Sketching for Residual Error Estimation for Matrix and Vector Norms
- Author
-
Li, Yi, Lin, Honghao, and Woodruff, David P.
- Subjects
Computer Science - Data Structures and Algorithms ,Computer Science - Machine Learning - Abstract
We study the problem of residual error estimation for matrix and vector norms using a linear sketch. Such estimates can be used, for example, to quickly assess how useful a more expensive low-rank approximation computation will be. The matrix case concerns the Frobenius norm and the task is to approximate the $k$-residual $\|A - A_k\|_F$ of the input matrix $A$ within a $(1+\epsilon)$-factor, where $A_k$ is the optimal rank-$k$ approximation. We provide a tight bound of $\Theta(k^2/\epsilon^4)$ on the size of bilinear sketches, which have the form of a matrix product $SAT$. This improves the previous $O(k^2/\epsilon^6)$ upper bound in (Andoni et al. SODA 2013) and gives the first non-trivial lower bound, to the best of our knowledge. In our algorithm, our sketching matrices $S$ and $T$ can both be sparse matrices, allowing for a very fast update time. We demonstrate that this gives a substantial advantage empirically, for roughly the same sketch size and accuracy as in previous work. For the vector case, we consider the $\ell_p$-norm for $p>2$, where the task is to approximate the $k$-residual $\|x - x_k\|_p$ up to a constant factor, where $x_k$ is the optimal $k$-sparse approximation to $x$. Such vector norms are frequently studied in the data stream literature and are useful for finding frequent items or so-called heavy hitters. We establish an upper bound of $O(k^{2/p}n^{1-2/p}\operatorname{poly}(\log n))$ for constant $\epsilon$ on the dimension of a linear sketch for this problem. Our algorithm can be extended to the $\ell_p$ sparse recovery problem with the same sketching dimension, which seems to be the first such bound for $p > 2$. We also show an $\Omega(k^{2/p}n^{1-2/p})$ lower bound for the sparse recovery problem, which is tight up to a $\mathrm{poly}(\log n)$ factor., Comment: Published as a conference paper at ICLR 2024
- Published
- 2024
20. Randomness versus Nonlocality in Multi-input and Multi-output Quantum Scenario
- Author
-
Zhang, Chao, Li, Yi, Hu, Xiao-Min, Xiang, Yu, Li, Chuan-Feng, Guo, Guang-Can, Tura, Jordi, Gong, Qihuang, He, Qiongyi, and Liu, Bi-Heng
- Subjects
Quantum Physics - Abstract
Device-independent randomness certification based on Bell nonlocality does not require any assumptions about the devices and therefore provides adequate security. Great effort has been made to demonstrate that nonlocality is necessary for generating quantum randomness, but the minimal resource required for random number generation has not been clarified. Here we first prove and experimentally demonstrate that violating any two-input Bell inequality is both necessary and sufficient for certifying randomness, however, for the multi-input cases, this sufficiency ceases to apply, leading to certain states exhibiting Bell nonlocality without the capability to certify randomness. We examine two typical classes of Bell inequalities with multi-input and multi-output, the facet inequalities and Salavrakos-Augusiak-Tura-Wittek-Ac\'in-Pironio Bell inequalities, in the high-dimensional photonic system, and observe the violation of the latter one can always certify randomness which is not true for the former. The private randomness with a generation rate of 1.867\pm0.018 bits per photon pair is obtained in the scenario of Salavrakos-Augusiak-Tura-Wittek-Ac\'in-Pironio Bell inequalities with 3-input and 4-output. Our work unravels the internal connection between randomness and nonlocality, and effectively enhances the performance of tasks such as device-independent random number generation., Comment: 25 pages, 6 figures
- Published
- 2024
21. Fairness and Bias Mitigation in Computer Vision: A Survey
- Author
-
Dehdashtian, Sepehr, He, Ruozhen, Li, Yi, Balakrishnan, Guha, Vasconcelos, Nuno, Ordonez, Vicente, and Boddeti, Vishnu Naresh
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Computer vision systems have witnessed rapid progress over the past two decades due to multiple advances in the field. As these systems are increasingly being deployed in high-stakes real-world applications, there is a dire need to ensure that they do not propagate or amplify any discriminatory tendencies in historical or human-curated data or inadvertently learn biases from spurious correlations. This paper presents a comprehensive survey on fairness that summarizes and sheds light on ongoing trends and successes in the context of computer vision. The topics we discuss include 1) The origin and technical definitions of fairness drawn from the wider fair machine learning literature and adjacent disciplines. 2) Work that sought to discover and analyze biases in computer vision systems. 3) A summary of methods proposed to mitigate bias in computer vision systems in recent years. 4) A comprehensive summary of resources and datasets produced by researchers to measure, analyze, and mitigate bias and enhance fairness. 5) Discussion of the field's success, continuing trends in the context of multimodal foundation and generative models, and gaps that still need to be addressed. The presented characterization should help researchers understand the importance of identifying and mitigating bias in computer vision and the state of the field and identify potential directions for future research., Comment: 20 pages, 4 figures
- Published
- 2024
22. Designing Phase Sensitive Probes of Monopole Superconducting Order
- Author
-
Frazier, Grayson R., Zhang, Junjia, Zhang, Junyi, Sun, Xinyu, and Li, Yi
- Subjects
Condensed Matter - Superconductivity ,Condensed Matter - Mesoscale and Nanoscale Physics ,Condensed Matter - Strongly Correlated Electrons - Abstract
Distinct from familiar $s$-, $p$-, or $d$-wave pairings, the monopole superconducting order represents a novel class of pairing order arising from nontrivial monopole charge of the Cooper pair. In the weak-coupling regime, this order can emerge when pairing occurs between Fermi surfaces with different Chern numbers in, for example, doped Weyl semimetal systems. However, the phase of monopole pairing order is not well-defined over an entire Fermi surface, making it challenging to design experiments sensitive to both its symmetry and topology. To address this, we propose a scheme based on symmetry and topological principles to identify this elusive pairing order through a set of phase-sensitive Josephson experiments. By examining the discrepancy between global and local angular momentum of the pairing order, we can unveil the monopole charge of the pairing order. We demonstrate the proposed probe of monopole pairing order through analytic and numerical studies of Josephson coupling in models of monopole superconductor junctions. This work opens a promising avenue to uncover the unique topological properties of monopole pairing orders and to distinguish them from known pairing orders based on spherical harmonic symmetry.
- Published
- 2024
23. Topology Optimization of Random Memristors for Input-Aware Dynamic SNN
- Author
-
Wang, Bo, Wang, Shaocong, Lin, Ning, Li, Yi, Yu, Yifei, Zhang, Yue, Yang, Jichang, Wu, Xiaoshan, He, Yangu, Wang, Songqi, Chen, Rui, Li, Guoqi, Qi, Xiaojuan, Wang, Zhongrui, and Shang, Dashan
- Subjects
Computer Science - Emerging Technologies ,Computer Science - Artificial Intelligence ,Computer Science - Neural and Evolutionary Computing - Abstract
There is unprecedented development in machine learning, exemplified by recent large language models and world simulators, which are artificial neural networks running on digital computers. However, they still cannot parallel human brains in terms of energy efficiency and the streamlined adaptability to inputs of different difficulties, due to differences in signal representation, optimization, run-time reconfigurability, and hardware architecture. To address these fundamental challenges, we introduce pruning optimization for input-aware dynamic memristive spiking neural network (PRIME). Signal representation-wise, PRIME employs leaky integrate-and-fire neurons to emulate the brain's inherent spiking mechanism. Drawing inspiration from the brain's structural plasticity, PRIME optimizes the topology of a random memristive spiking neural network without expensive memristor conductance fine-tuning. For runtime reconfigurability, inspired by the brain's dynamic adjustment of computational depth, PRIME employs an input-aware dynamic early stop policy to minimize latency during inference, thereby boosting energy efficiency without compromising performance. Architecture-wise, PRIME leverages memristive in-memory computing, mirroring the brain and mitigating the von Neumann bottleneck. We validated our system using a 40 nm 256 Kb memristor-based in-memory computing macro on neuromorphic image classification and image inpainting. Our results demonstrate the classification accuracy and Inception Score are comparable to the software baseline, while achieving maximal 62.50-fold improvements in energy efficiency, and maximal 77.0% computational load savings. The system also exhibits robustness against stochastic synaptic noise of analogue memristors. Our software-hardware co-designed model paves the way to future brain-inspired neuromorphic computing with brain-like energy efficiency and adaptivity., Comment: 15 pages, 5 figures
- Published
- 2024
24. U-learning for Prediction Inference via Combinatory Multi-Subsampling: With Applications to LASSO and Neural Networks
- Author
-
Fei, Zhe and Li, Yi
- Subjects
Statistics - Machine Learning ,Computer Science - Machine Learning ,Mathematics - Statistics Theory ,Quantitative Biology - Quantitative Methods - Abstract
Epigenetic aging clocks play a pivotal role in estimating an individual's biological age through the examination of DNA methylation patterns at numerous CpG (Cytosine-phosphate-Guanine) sites within their genome. However, making valid inferences on predicted epigenetic ages, or more broadly, on predictions derived from high-dimensional inputs, presents challenges. We introduce a novel U-learning approach via combinatory multi-subsampling for making ensemble predictions and constructing confidence intervals for predictions of continuous outcomes when traditional asymptotic methods are not applicable. More specifically, our approach conceptualizes the ensemble estimators within the framework of generalized U-statistics and invokes the H\'ajek projection for deriving the variances of predictions and constructing confidence intervals with valid conditional coverage probabilities. We apply our approach to two commonly used predictive algorithms, Lasso and deep neural networks (DNNs), and illustrate the validity of inferences with extensive numerical studies. We have applied these methods to predict the DNA methylation age (DNAmAge) of patients with various health conditions, aiming to accurately characterize the aging process and potentially guide anti-aging interventions.
- Published
- 2024
25. Spacetime with prescribed hidden symmetry
- Author
-
He, Song and Li, Yi
- Subjects
General Relativity and Quantum Cosmology ,High Energy Physics - Theory - Abstract
In this paper, we investigate spacetime characterized by a hidden symmetry defined by a given Killing tensor. To exhibit this hidden symmetry, the inverse metric must commute with the Killing tensor under the Schouten-Nijenhuis bracket, which translates into a system of partial differential equations (PDEs) for the inverse metric. For some significant examples, we solve these PDEs directly, deriving spacetimes with prescribed hidden symmetries, including those specified by higher-rank Killing tensors. Utilizing the hidden symmetries, we study related problems such as null geodesics, photon region, and separation of variables of wave equations. Through this work, we aim to demonstrate that hidden symmetry is more accessible than previously believed., Comment: 9 pages, a few references added
- Published
- 2024
26. OpenTracer: A Dynamic Transaction Trace Analyzer for Smart Contract Invariant Generation and Beyond
- Author
-
Chen, Zhiyang, Liu, Ye, Beillahi, Sidi Mohamed, Li, Yi, and Long, Fan
- Subjects
Computer Science - Software Engineering ,Computer Science - Cryptography and Security ,Computer Science - Programming Languages - Abstract
Smart contracts, self-executing programs on the blockchain, facilitate reliable value exchanges without centralized oversight. Despite the recent focus on dynamic analysis of their transaction histories in both industry and academia, no open-source tool currently offers comprehensive tracking of complete transaction information to extract user-desired data such as invariant-related data. This paper introduces OpenTracer, designed to address this gap. OpenTracer guarantees comprehensive tracking of every execution step, providing complete transaction information. OpenTracer has been employed to analyze 350,800 Ethereum transactions, successfully inferring 23 different types of invariant from predefined templates. The tool is fully open-sourced, serving as a valuable resource for developers and researchers aiming to study transaction behaviors or extract and validate new invariants from transaction traces. The source code of OpenTracer is available at https://github.com/jeffchen006/OpenTracer.
- Published
- 2024
27. Self-Supervised Representation Learning for Adversarial Attack Detection
- Author
-
Li, Yi, Angelov, Plamen, and Suri, Neeraj
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Supervised learning-based adversarial attack detection methods rely on a large number of labeled data and suffer significant performance degradation when applying the trained model to new domains. In this paper, we propose a self-supervised representation learning framework for the adversarial attack detection task to address this drawback. Firstly, we map the pixels of augmented input images into an embedding space. Then, we employ the prototype-wise contrastive estimation loss to cluster prototypes as latent variables. Additionally, drawing inspiration from the concept of memory banks, we introduce a discrimination bank to distinguish and learn representations for each individual instance that shares the same or a similar prototype, establishing a connection between instances and their associated prototypes. We propose a parallel axial-attention (PAA)-based encoder to facilitate the training process by parallel training over height- and width-axis of attention maps. Experimental results show that, compared to various benchmark self-supervised vision learning models and supervised adversarial attack detection methods, the proposed model achieves state-of-the-art performance on the adversarial attack detection task across a wide range of images., Comment: ECCV 2024
- Published
- 2024
28. Improving Sample Efficiency of Reinforcement Learning with Background Knowledge from Large Language Models
- Author
-
Zhang, Fuxiang, Li, Junyou, Li, Yi-Chen, Zhang, Zongzhang, Yu, Yang, and Ye, Deheng
- Subjects
Computer Science - Computation and Language ,Computer Science - Machine Learning - Abstract
Low sample efficiency is an enduring challenge of reinforcement learning (RL). With the advent of versatile large language models (LLMs), recent works impart common-sense knowledge to accelerate policy learning for RL processes. However, we note that such guidance is often tailored for one specific task but loses generalizability. In this paper, we introduce a framework that harnesses LLMs to extract background knowledge of an environment, which contains general understandings of the entire environment, making various downstream RL tasks benefit from one-time knowledge representation. We ground LLMs by feeding a few pre-collected experiences and requesting them to delineate background knowledge of the environment. Afterward, we represent the output knowledge as potential functions for potential-based reward shaping, which has a good property for maintaining policy optimality from task rewards. We instantiate three variants to prompt LLMs for background knowledge, including writing code, annotating preferences, and assigning goals. Our experiments show that these methods achieve significant sample efficiency improvements in a spectrum of downstream tasks from Minigrid and Crafter domains.
- Published
- 2024
29. Q-Adapter: Customizing Pre-trained LLMs to New Preferences with Forgetting Mitigation
- Author
-
Li, Yi-Chen, Zhang, Fuxiang, Qiu, Wenjie, Yuan, Lei, Jia, Chengxing, Zhang, Zongzhang, Yu, Yang, and An, Bo
- Subjects
Computer Science - Machine Learning - Abstract
Large Language Models (LLMs), trained on a large amount of corpus, have demonstrated remarkable abilities. However, it may not be sufficient to directly apply open-source LLMs like Llama to certain real-world scenarios, since most of them are trained for \emph{general} purposes. Thus, the demands for customizing publicly available LLMs emerge, but are currently under-studied. In this work, we consider customizing pre-trained LLMs with new human preferences. Specifically, the LLM should not only meet the new preference but also preserve its original capabilities after customization. Drawing inspiration from the observation that human preference can be expressed as a reward model, we propose to cast LLM customization as optimizing the sum of two reward functions, one of which (denoted as $r_1$) was used to pre-train the LLM while the other (denoted as $r_2$) characterizes the new human preference. The obstacle here is that both reward functions are unknown, making the application of modern reinforcement learning methods infeasible. Thanks to the residual Q-learning framework, we can restore the customized LLM with the pre-trained LLM and the \emph{residual Q-function} without the reward function $r_1$. Moreover, we find that for a fixed pre-trained LLM, the reward function $r_2$ can be derived from the residual Q-function, enabling us to directly learn the residual Q-function from the new human preference data upon the Bradley-Terry model. We name our method Q-Adapter as it introduces an adapter module to approximate the residual Q-function for customizing the pre-trained LLM towards the new preference. Experiments based on the Llama-3.1 model on the DSP dataset and HH-RLHF dataset illustrate the superior effectiveness of Q-Adapter on both retaining existing knowledge and learning new preferences. Code is available at \url{https://github.com/mansicer/Q-Adapter}.
- Published
- 2024
30. UNICAD: A Unified Approach for Attack Detection, Noise Reduction and Novel Class Identification
- Author
-
Pellicer, Alvaro Lopez, Giatgong, Kittipos, Li, Yi, Suri, Neeraj, and Angelov, Plamen
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Artificial Intelligence ,Computer Science - Machine Learning - Abstract
As the use of Deep Neural Networks (DNNs) becomes pervasive, their vulnerability to adversarial attacks and limitations in handling unseen classes poses significant challenges. The state-of-the-art offers discrete solutions aimed to tackle individual issues covering specific adversarial attack scenarios, classification or evolving learning. However, real-world systems need to be able to detect and recover from a wide range of adversarial attacks without sacrificing classification accuracy and to flexibly act in {\bf unseen} scenarios. In this paper, UNICAD, is proposed as a novel framework that integrates a variety of techniques to provide an adaptive solution. For the targeted image classification, UNICAD achieves accurate image classification, detects unseen classes, and recovers from adversarial attacks using Prototype and Similarity-based DNNs with denoising autoencoders. Our experiments performed on the CIFAR-10 dataset highlight UNICAD's effectiveness in adversarial mitigation and unseen class classification, outperforming traditional models.
- Published
- 2024
31. Federated Adversarial Learning for Robust Autonomous Landing Runway Detection
- Author
-
Li, Yi, Angelov, Plamen, Yu, Zhengxin, Pellicer, Alvaro Lopez, and Suri, Neeraj
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
As the development of deep learning techniques in autonomous landing systems continues to grow, one of the major challenges is trust and security in the face of possible adversarial attacks. In this paper, we propose a federated adversarial learning-based framework to detect landing runways using paired data comprising of clean local data and its adversarial version. Firstly, the local model is pre-trained on a large-scale lane detection dataset. Then, instead of exploiting large instance-adaptive models, we resort to a parameter-efficient fine-tuning method known as scale and shift deep features (SSF), upon the pre-trained model. Secondly, in each SSF layer, distributions of clean local data and its adversarial version are disentangled for accurate statistics estimation. To the best of our knowledge, this marks the first instance of federated learning work that address the adversarial sample problem in landing runway detection. Our experimental evaluations over both synthesis and real images of Landing Approach Runway Detection (LARD) dataset consistently demonstrate good performance of the proposed federated adversarial learning and robust to adversarial attacks., Comment: ICANN2024
- Published
- 2024
32. PUDD: Towards Robust Multi-modal Prototype-based Deepfake Detection
- Author
-
Pellcier, Alvaro Lopez, Li, Yi, and Angelov, Plamen
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Deepfake techniques generate highly realistic data, making it challenging for humans to discern between actual and artificially generated images. Recent advancements in deep learning-based deepfake detection methods, particularly with diffusion models, have shown remarkable progress. However, there is a growing demand for real-world applications to detect unseen individuals, deepfake techniques, and scenarios. To address this limitation, we propose a Prototype-based Unified Framework for Deepfake Detection (PUDD). PUDD offers a detection system based on similarity, comparing input data against known prototypes for video classification and identifying potential deepfakes or previously unseen classes by analyzing drops in similarity. Our extensive experiments reveal three key findings: (1) PUDD achieves an accuracy of 95.1% on Celeb-DF, outperforming state-of-the-art deepfake detection methods; (2) PUDD leverages image classification as the upstream task during training, demonstrating promising performance in both image classification and deepfake detection tasks during inference; (3) PUDD requires only 2.7 seconds for retraining on new data and emits 10$^{5}$ times less carbon compared to the state-of-the-art model, making it significantly more environmentally friendly., Comment: CVPR2024
- Published
- 2024
33. The association of domain-specific physical activity and sedentary activity with stroke: A prospective cohort study
- Author
-
He, Xinyi, Wang, Shidi, Li, Yi, Wang, Jiucun, Yang, Guangrui, Chen, Jun, and Hu, Zixin
- Subjects
Physics - Medical Physics ,Quantitative Biology - Quantitative Methods - Abstract
Background The incidence of stroke places a heavy burden on both society and individuals. Activity is closely related to cardiovascular health. This study aimed to investigate the relationship between the varying domains of PA, like occupation-related Physical Activity (OPA), transportation-related Physical Activity (TPA), leisure-time Physical Activity (LTPA), and Sedentary Activity (SA) with stroke. Methods Our analysis included 30,400 participants aged 20+ years from 2007 to 2018 National Health and Nutrition Examination Survey (NHANES). Stroke was identified based on the participant's self-reported diagnoses from previous medical consultations, and PA and SA were self-reported. Multivariable logistic and restricted cubic spline models were used to assess the associations. Results Participants achieving PA guidelines (performing PA more than 150 min/week) were 35.7% less likely to have a stroke based on both the total PA (odds ratio [OR] 0.643, 95% confidence interval [CI] 0.523-0.790) and LTPA (OR 0.643, 95% CI 0.514-0.805), while OPA or TPA did not demonstrate lower stroke risk. Furthermore, participants with less than 7.5 h/day SA levels were 21.6% (OR 0.784, 95% CI 0.665-0.925) less likely to have a stroke. The intensities of total PA and LTPA exhibited nonlinear U-shaped associations with stroke risk. In contrast, those of OPA and TPA showed negative linear associations, while SA intensities were positively linearly correlated with stroke risk. Conclusions LTPA, but not OPA or TPA, was associated with a lower risk of stroke at any amount, suggesting that significant cardiovascular health would benefit from increased PA. Additionally, the positive association between SA and stroke indicated that prolonged sitting was detrimental to cardiovascular health. Overall, increased PA within a reasonable range reduces the risk of stroke, while increased SA elevates it.
- Published
- 2024
34. 3DGS.zip: A survey on 3D Gaussian Splatting Compression Methods
- Author
-
Bagdasarian, Milena T., Knoll, Paul, Li, Yi-Hsin, Barthel, Florian, Hilsmann, Anna, Eisert, Peter, and Morgenstern, Wieland
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
3D Gaussian Splatting (3DGS) has emerged as a cutting-edge technique for real-time radiance field rendering, offering state-of-the-art performance in terms of both quality and speed. 3DGS models a scene as a collection of three-dimensional Gaussians, or splats, with additional attributes optimized to conform to the scene's geometric and visual properties. Despite its advantages in rendering speed and image fidelity, 3DGS is limited by its significant storage and memory demands. These high demands make 3DGS impractical for mobile devices or headsets, reducing its applicability in important areas of computer graphics. To address these challenges and advance the practicality of 3DGS, this survey provides a comprehensive and detailed examination of compression and compaction techniques developed to make 3DGS more efficient. We categorize current approaches into compression techniques, which aim at achieving the highest quality at minimal data size, and compaction techniques, which aim for optimal quality with the fewest Gaussians. We introduce the basic mathematical concepts underlying the analyzed methods, as well as key implementation details and design choices. Our report thoroughly discusses similarities and differences among the methods, as well as their respective advantages and disadvantages. We establish a consistent standard for comparing these methods based on key performance metrics and datasets. Specifically, since these methods have been developed in parallel and over a short period of time, currently, no comprehensive comparison exists. This survey, for the first time, presents a unified standard to evaluate 3DGS compression techniques. To facilitate the continuous monitoring of emerging methodologies, we maintain a dedicated website that will be regularly updated with new techniques and revisions of existing findings https://w-m.github.io/3dgs-compression-survey/ ., Comment: 3D Gaussian Splatting compression survey; 3DGS compression; new approaches added
- Published
- 2024
35. Teleporter Theory: A General and Simple Approach for Modeling Cross-World Counterfactual Causality
- Author
-
Li, Jiangmeng, Qin, Bin, Ji, Qirui, Li, Yi, Qiang, Wenwen, Cao, Jianwen, and Xu, Fanjiang
- Subjects
Computer Science - Machine Learning ,Computer Science - Artificial Intelligence ,Statistics - Methodology - Abstract
Leveraging the development of structural causal model (SCM), researchers can establish graphical models for exploring the causal mechanisms behind machine learning techniques. As the complexity of machine learning applications rises, single-world interventionism causal analysis encounters theoretical adaptation limitations. Accordingly, cross-world counterfactual approach extends our understanding of causality beyond observed data, enabling hypothetical reasoning about alternative scenarios. However, the joint involvement of cross-world variables, encompassing counterfactual variables and real-world variables, challenges the construction of the graphical model. Twin network is a subtle attempt, establishing a symbiotic relationship, to bridge the gap between graphical modeling and the introduction of counterfactuals albeit with room for improvement in generalization. In this regard, we demonstrate the theoretical breakdowns of twin networks in certain cross-world counterfactual scenarios. To this end, we propose a novel teleporter theory to establish a general and simple graphical representation of counterfactuals, which provides criteria for determining teleporter variables to connect multiple worlds. In theoretical application, we determine that introducing the proposed teleporter theory can directly obtain the conditional independence between counterfactual variables and real-world variables from the cross-world SCM without requiring complex algebraic derivations. Accordingly, we can further identify counterfactual causal effects through cross-world symbolic derivation. We demonstrate the generality of the teleporter theory to the practical application. Adhering to the proposed theory, we build a plug-and-play module, and the effectiveness of which are substantiated by experiments on benchmarks.
- Published
- 2024
36. Interventional Imbalanced Multi-Modal Representation Learning via $\beta$-Generalization Front-Door Criterion
- Author
-
Li, Yi, Li, Jiangmeng, Song, Fei, Zhu, Qingmeng, Zheng, Changwen, and Qiang, Wenwen
- Subjects
Computer Science - Machine Learning ,Statistics - Methodology - Abstract
Multi-modal methods establish comprehensive superiority over uni-modal methods. However, the imbalanced contributions of different modalities to task-dependent predictions constantly degrade the discriminative performance of canonical multi-modal methods. Based on the contribution to task-dependent predictions, modalities can be identified as predominant and auxiliary modalities. Benchmark methods raise a tractable solution: augmenting the auxiliary modality with a minor contribution during training. However, our empirical explorations challenge the fundamental idea behind such behavior, and we further conclude that benchmark approaches suffer from certain defects: insufficient theoretical interpretability and limited exploration capability of discriminative knowledge. To this end, we revisit multi-modal representation learning from a causal perspective and build the Structural Causal Model. Following the empirical explorations, we determine to capture the true causality between the discriminative knowledge of predominant modality and predictive label while considering the auxiliary modality. Thus, we introduce the $\beta$-generalization front-door criterion. Furthermore, we propose a novel network for sufficiently exploring multi-modal discriminative knowledge. Rigorous theoretical analyses and various empirical evaluations are provided to support the effectiveness of the innate mechanism behind our proposed method.
- Published
- 2024
37. Revisiting Spurious Correlation in Domain Generalization
- Author
-
Qin, Bin, Li, Jiangmeng, Li, Yi, Wu, Xuesong, Wang, Yupeng, Qiang, Wenwen, and Cao, Jianwen
- Subjects
Computer Science - Machine Learning ,Computer Science - Artificial Intelligence - Abstract
Without loss of generality, existing machine learning techniques may learn spurious correlation dependent on the domain, which exacerbates the generalization of models in out-of-distribution (OOD) scenarios. To address this issue, recent works build a structural causal model (SCM) to describe the causality within data generation process, thereby motivating methods to avoid the learning of spurious correlation by models. However, from the machine learning viewpoint, such a theoretical analysis omits the nuanced difference between the data generation process and representation learning process, resulting in that the causal analysis based on the former cannot well adapt to the latter. To this end, we explore to build a SCM for representation learning process and further conduct a thorough analysis of the mechanisms underlying spurious correlation. We underscore that adjusting erroneous covariates introduces bias, thus necessitating the correct selection of spurious correlation mechanisms based on practical application scenarios. In this regard, we substantiate the correctness of the proposed SCM and further propose to control confounding bias in OOD generalization by introducing a propensity score weighted estimator, which can be integrated into any existing OOD method as a plug-and-play module. The empirical results comprehensively demonstrate the effectiveness of our method on synthetic and large-scale real OOD datasets.
- Published
- 2024
38. NICER: A New and Improved Consumed Endurance and Recovery Metric to Quantify Muscle Fatigue of Mid-Air Interactions
- Author
-
Li, Yi, Tag, Benjamin, Dai, Shaozhang, Crowther, Robert, Dwyer, Tim, Irani, Pourang, and Ens, Barrett
- Subjects
Computer Science - Human-Computer Interaction - Abstract
Natural gestures are crucial for mid-air interaction, but predicting and managing muscle fatigue is challenging. Existing torque-based models are limited in their ability to model above-shoulder interactions and to account for fatigue recovery. We introduce a new hybrid model, NICER, which combines a torque-based approach with a new term derived from the empirical measurement of muscle contraction and a recovery factor to account for decreasing fatigue during rest. We evaluated NICER in a mid-air selection task using two interaction methods with different degrees of perceived fatigue. Results show that NICER can accurately model above-shoulder interactions as well as reflect fatigue recovery during rest periods. Moreover, both interaction methods show a stronger correlation with subjective fatigue measurement (r = 0.978/0.976) than a previous model, Cumulative Fatigue (r = 0.966/ 0.923), confirming that NICER is a powerful analytical tool to predict fatigue across a variety of gesture-based interactive applications.
- Published
- 2024
- Full Text
- View/download PDF
39. Continuous-Time Digital Twin with Analogue Memristive Neural Ordinary Differential Equation Solver
- Author
-
Chen, Hegan, Yang, Jichang, Chen, Jia, Wang, Songqi, Wang, Shaocong, Wang, Dingchen, Tian, Xinyu, Yu, Yifei, Chen, Xi, Lin, Yinan, He, Yangu, Wu, Xiaoshan, Li, Yi, Zhang, Xinyuan, Lin, Ning, Xu, Meng, Zhang, Xumeng, Wang, Zhongrui, Wang, Han, Shang, Dashan, Liu, Qi, Cheng, Kwang-Ting, and Liu, Ming
- Subjects
Computer Science - Hardware Architecture ,Computer Science - Artificial Intelligence ,Computer Science - Emerging Technologies ,Computer Science - Neural and Evolutionary Computing - Abstract
Digital twins, the cornerstone of Industry 4.0, replicate real-world entities through computer models, revolutionising fields such as manufacturing management and industrial automation. Recent advances in machine learning provide data-driven methods for developing digital twins using discrete-time data and finite-depth models on digital computers. However, this approach fails to capture the underlying continuous dynamics and struggles with modelling complex system behaviour. Additionally, the architecture of digital computers, with separate storage and processing units, necessitates frequent data transfers and Analogue-Digital (A/D) conversion, thereby significantly increasing both time and energy costs. Here, we introduce a memristive neural ordinary differential equation (ODE) solver for digital twins, which is capable of capturing continuous-time dynamics and facilitates the modelling of complex systems using an infinite-depth model. By integrating storage and computation within analogue memristor arrays, we circumvent the von Neumann bottleneck, thus enhancing both speed and energy efficiency. We experimentally validate our approach by developing a digital twin of the HP memristor, which accurately extrapolates its nonlinear dynamics, achieving a 4.2-fold projected speedup and a 41.4-fold projected decrease in energy consumption compared to state-of-the-art digital hardware, while maintaining an acceptable error margin. Additionally, we demonstrate scalability through experimentally grounded simulations of Lorenz96 dynamics, exhibiting projected performance improvements of 12.6-fold in speed and 189.7-fold in energy efficiency relative to traditional digital approaches. By harnessing the capabilities of fully analogue computing, our breakthrough accelerates the development of digital twins, offering an efficient and rapid solution to meet the demands of Industry 4.0., Comment: 14 pages, 4 figures
- Published
- 2024
40. Demystifying the Characteristics for Smart Contract Upgrades
- Author
-
Liu, Ye, Li, Shuo, Wu, Xiuheng, Li, Yi, Chen, Zhiyang, and Lo, David
- Subjects
Computer Science - Software Engineering - Abstract
Upgradable smart contracts play an important role in the decentralized application ecosystem, to support routine maintenance, security patching, and feature additions. In this paper, we conduct an empirical study on proxy-based upgradable smart contracts to understand the characteristics of contract upgrading. Through our study on 57,118 open source proxy contracts, we found that 583 contracts have ever been upgraded on Ethereum, involving 973 unique implementation contract versions. The results show that developers often intend to improve usability of contracts if upgrading, where functionality addition and update are the most frequent upgrade intentions. We investigated the practical impacts of contract upgrades, e.g., breaking changes causing compatibility issues, storage collisions and initialization risks leading to security vulnerabilities. The results demonstrate that there are 4,334 ABI breaking changes due to the upgrades of 276 proxies, causing real-world broken usages within 584 transactions witnessed by the blockchain; 36 contract upgrades had storage collisions and five proxies with 59 implementation contracts are vulnerable to initialization attacks.
- Published
- 2024
41. Observation of higher-order time-dislocation topological modes
- Author
-
Zhang, Jia-Hui, Mei, Feng, Li, Yi, Lee, Ching Hua, Ma, Jie, Xiao, Liantuan, and Jia, Suotang
- Subjects
Condensed Matter - Mesoscale and Nanoscale Physics ,Physics - Optics - Abstract
Topological dislocation modes resulting from the interplay between spatial dislocations and momentum-space topology have recently attracted significant interest. Here, we theoretically and experimentally demonstrate time-dislocation topological modes which are induced by the interplay between temporal dislocations and Floquet-band topology. By utilizing an extra physical dimension to represent the frequency-space lattice, we implement a two-dimensional Floquet higher-order topological phase and observe time-dislocation induced $\pi$-mode topological corner modes in a three-dimensional circuit metamaterial. Intriguingly, the realized time-dislocation topological modes exhibit spatial localization at the temporal dislocation, despite homogeneous in-plane lattice couplings across it. Our study opens a new avenue to explore the topological phenomena enabled by the interplay between real-space, time-space and momentum-space topology., Comment: 9 pages, 4 figures
- Published
- 2024
42. Impact of chemotherapy delay on long-term prognosis of laparoscopic radical surgery for locally advanced gastric cancer: a pooled analysis of four randomized controlled trials
- Author
-
Zhong, Qing, Liu, Zhi-Yu, Shang-Guan, Zhi-Xin, Li, Yi-Fan, Li, Yi, Wu, Ju, Huang, Qiang, Li, Ping, Xie, Jian-Wei, Chen, Qi-Yue, Huang, Chang-Ming, and Zheng, Chao-Hui
- Published
- 2024
- Full Text
- View/download PDF
43. Polyphenol-stabilized coacervates for enzyme-triggered drug delivery.
- Author
-
Yim, Wonjun, Jin, Zhicheng, Chang, Yu-Ci, Brambila, Carlos, Creyer, Matthew, Ling, Chuxuan, He, Tengyu, Li, Yi, Retout, Maurice, Penny, William, Zhou, Jiajing, and Jokerst, Jesse
- Subjects
Polyphenols ,Thrombin ,Drug Delivery Systems ,Humans ,Tannins ,Heparin ,Drug Liberation ,Peptides ,Proteolysis - Abstract
Stability issues in membrane-free coacervates have been addressed with coating strategies, but these approaches often compromise the permeability of the coacervate. Here we report a facile approach to maintain both stability and permeability using tannic acid and then demonstrate the value of this approach in enzyme-triggered drug release. First, we develop size-tunable coacervates via self-assembly of heparin glycosaminoglycan with tyrosine and arginine-based peptides. A thrombin-recognition site within the peptide building block results in heparin release upon thrombin proteolysis. Notably, polyphenols are integrated within the nano-coacervates to improve stability in biofluids. Phenolic crosslinking at the liquid-liquid interface enables nano-coacervates to maintain exceptional structural integrity across various environments. We discover a pivotal polyphenol threshold for preserving enzymatic activity alongside enhanced stability. The disassembly rate of the nano-coacervates increases as a function of thrombin activity, thus preventing a coagulation cascade. This polyphenol-based approach not only improves stability but also opens the way for applications in biomedicine, protease sensing, and bio-responsive drug delivery.
- Published
- 2024
44. Exceptional cryogenic-to-ambient impact toughness of a low carbon micro-alloyed steel with a multi-heterogeneous structure
- Author
-
Xu, Xiaoning, Kumar, Punit, Cao, Ruqing, Ye, Qibin, Chu, Yuexin, Tian, Yong, Li, Yi, and Ritchie, Robert O
- Subjects
Engineering ,Materials Engineering ,Heterogeneous structure ,Low carbon micro-alloyed steel ,Rolling ,Impact toughness ,Toughening mechanism ,Condensed Matter Physics ,Mechanical Engineering ,Materials ,Materials engineering ,Mechanical engineering ,Condensed matter physics - Abstract
A low-carbon micro-alloyed (LCMA) steel with a body-centered cubic (bcc) crystal structure suitable for extremely low temperatures was developed by overcoming the intrinsic ductile-to-brittle transition in bcc alloys at cryogenic temperatures. The excellent cryogenic-to-ambient impact toughness in the LCMA rolled plate results from its heterogeneous microstructure, which gradually changes from bamboo-like ultrafine grains (∼ 1.1 μm) on the surface to relatively equiaxed coarse grains in the core (∼ 3.4 μm), accompanied by a distinct texture gradient variation. The heterostructured LCMA steel displays a cryogenic impact toughness of ∼200 J/cm2 at 77 K, which is 24 times higher than the coarse-grained LCMA steel. Such high impact toughness of heterostructured LCMA arises from the coordinated deformation mechanisms over different length-scales coupled with delamination toughening. At 77 K, the heterostructured steel plate deforms by forming cellular sub-structures at the core to the surface, which refines the microstructure and promotes hetero-deformation induced (HDI) hardening to improve intrinsic toughening. Moreover, the subsequent delamination process induces extrinsic toughening by shielding and blunting the cracks, with the local plane-stress conditions induced by delamination promoting ductile fracture of the coarse grains in the core regions. This low alloy steel with its heterogeneous microstructure exhibits extraordinary impact toughness at cryogenic temperatures highlights the possibility of materials design strategies for sustainable development.
- Published
- 2024
45. BWArea Model: Learning World Model, Inverse Dynamics, and Policy for Controllable Language Generation
- Author
-
Jia, Chengxing, Wang, Pengyuan, Li, Ziniu, Li, Yi-Chen, Zhang, Zhilong, Tang, Nan, and Yu, Yang
- Subjects
Computer Science - Computation and Language ,Computer Science - Machine Learning - Abstract
Large language models (LLMs) have catalyzed a paradigm shift in natural language processing, yet their limited controllability poses a significant challenge for downstream applications. We aim to address this by drawing inspiration from the neural mechanisms of the human brain, specifically Broca's and Wernicke's areas, which are crucial for language generation and comprehension, respectively. In particular, Broca's area receives cognitive decision signals from Wernicke's area, treating the language generation as an intricate decision-making process, which differs from the fully auto-regressive language generation of existing LLMs. In a similar vein, our proposed system, the BWArea model, conceptualizes language generation as a decision-making task. This model has three components: a language world model, an inverse dynamics model, and a cognitive policy. Like Wernicke's area, the inverse dynamics model is designed to deduce the underlying cognitive intentions, or latent actions, behind each token. The BWArea model is amenable to both pre-training and fine-tuning like existing LLMs. With 30B clean pre-training tokens, we have trained a BWArea model, which achieves competitive performance with LLMs of equal size (1B parameters). Unlike fully auto-regressive LLMs, its pre-training performance does not degenerate if dirty data unintentionally appears. This shows the advantage of a decomposed structure of BWArea model in reducing efforts in laborious data selection and labeling. Finally, we reveal that the BWArea model offers enhanced controllability via fine-tuning the cognitive policy with downstream reward metrics, thereby facilitating alignment with greater simplicity. On 9 out of 10 tasks from two suites, TextWorld and BigBench Hard, our method shows superior performance to auto-regressive LLMs.
- Published
- 2024
46. Any-step Dynamics Model Improves Future Predictions for Online and Offline Reinforcement Learning
- Author
-
Lin, Haoxin, Xu, Yu-Yan, Sun, Yihao, Zhang, Zhilong, Li, Yi-Chen, Jia, Chengxing, Ye, Junyin, Zhang, Jiaji, and Yu, Yang
- Subjects
Computer Science - Machine Learning - Abstract
Model-based methods in reinforcement learning offer a promising approach to enhance data efficiency by facilitating policy exploration within a dynamics model. However, accurately predicting sequential steps in the dynamics model remains a challenge due to the bootstrapping prediction, which attributes the next state to the prediction of the current state. This leads to accumulated errors during model roll-out. In this paper, we propose the Any-step Dynamics Model (ADM) to mitigate the compounding error by reducing bootstrapping prediction to direct prediction. ADM allows for the use of variable-length plans as inputs for predicting future states without frequent bootstrapping. We design two algorithms, ADMPO-ON and ADMPO-OFF, which apply ADM in online and offline model-based frameworks, respectively. In the online setting, ADMPO-ON demonstrates improved sample efficiency compared to previous state-of-the-art methods. In the offline setting, ADMPO-OFF not only demonstrates superior performance compared to recent state-of-the-art offline approaches but also offers better quantification of model uncertainty using only a single ADM.
- Published
- 2024
47. JUNO Sensitivity to Invisible Decay Modes of Neutrons
- Author
-
JUNO Collaboration, Abusleme, Angel, Adam, Thomas, Adamowicz, Kai, Ahmad, Shakeel, Ahmed, Rizwan, Aiello, Sebastiano, An, Fengpeng, An, Qi, Andronico, Giuseppe, Anfimov, Nikolay, Antonelli, Vito, Antoshkina, Tatiana, de André, João Pedro Athayde Marcondes, Auguste, Didier, Bai, Weidong, Balashov, Nikita, Baldini, Wander, Barresi, Andrea, Basilico, Davide, Baussan, Eric, Bellato, Marco, Beretta, Marco, Bergnoli, Antonio, Bick, Daniel, Bieger, Lukas, Biktemerova, Svetlana, Birkenfeld, Thilo, Blake, Iwan, Blyth, Simon, Bolshakova, Anastasia, Bongrand, Mathieu, Breton, Dominique, Brigatti, Augusto, Brugnera, Riccardo, Bruno, Riccardo, Budano, Antonio, Busto, Jose, Cabrera, Anatael, Caccianiga, Barbara, Cai, Hao, Cai, Xiao, Cai, Yanke, Cai, Zhiyan, Callier, Stéphane, Calvez, Steven, Cammi, Antonio, Campeny, Agustin, Cao, Chuanya, Cao, Guofu, Cao, Jun, Caruso, Rossella, Cerna, Cédric, Cerrone, Vanessa, Chang, Jinfan, Chang, Yun, Chatrabhuti, Auttakit, Chen, Chao, Chen, Guoming, Chen, Pingping, Chen, Shaomin, Chen, Xin, Chen, Yiming, Chen, Yixue, Chen, Yu, Chen, Zelin, Chen, Zhangming, Chen, Zhiyuan, Chen, Zikang, Cheng, Jie, Cheng, Yaping, Cheng, Yu Chin, Chepurnov, Alexander, Chetverikov, Alexey, Chiesa, Davide, Chimenti, Pietro, Chin, Yen-Ting, Chou, Po-Lin, Chu, Ziliang, Chukanov, Artem, Claverie, Gérard, Clementi, Catia, Clerbaux, Barbara, Molla, Marta Colomer, Di Lorenzo, Selma Conforti, Coppi, Alberto, Corti, Daniele, Csakli, Simon, Cui, Chenyang, Corso, Flavio Dal, Dalager, Olivia, Datta, Jaydeep, De La Taille, Christophe, Deng, Zhi, Deng, Ziyan, Ding, Xiaoyu, Ding, Xuefeng, Ding, Yayun, Dirgantara, Bayu, Dittrich, Carsten, Dmitrievsky, Sergey, Dohnal, Tadeas, Dolzhikov, Dmitry, Donchenko, Georgy, Dong, Jianmeng, Doroshkevich, Evgeny, Dou, Wei, Dracos, Marcos, Druillole, Frédéric, Du, Ran, Du, Shuxian, Duan, Yujie, Dugas, Katherine, Dusini, Stefano, Duyang, Hongyue, Eck, Jessica, Enqvist, Timo, Fabbri, Andrea, Fahrendholz, Ulrike, Fan, Lei, Fang, Jian, Fang, Wenxing, Fedoseev, Dmitry, Feng, Li-Cheng, Feng, Qichun, Ferraro, Federico, Fournier, Amélie, Fritsch, Fritsch, Gan, Haonan, Gao, Feng, Garfagnini, Alberto, Gavrikov, Arsenii, Giammarchi, Marco, Giudice, Nunzio, Gonchar, Maxim, Gong, Guanghua, Gong, Hui, Gornushkin, Yuri, Grassi, Marco, Gromov, Maxim, Gromov, Vasily, Gu, Minghao, Gu, Xiaofei, Gu, Yu, Guan, Mengyun, Guan, Yuduo, Guardone, Nunzio, Guizzetti, Rosa Maria, Guo, Cong, Guo, Wanlei, Hagner, Caren, Han, Hechong, Han, Ran, Han, Yang, He, Jinhong, He, Miao, He, Wei, He, Xinhai, Heinz, Tobias, Hellmuth, Patrick, Heng, Yuekun, Herrera, Rafael, Hor, YuenKeung, Hou, Shaojing, Hsiung, Yee, Hu, Bei-Zhen, Hu, Hang, Hu, Jun, Hu, Peng, Hu, Shouyang, Hu, Tao, Hu, Yuxiang, Hu, Zhuojun, Huang, Guihong, Huang, Hanxiong, Huang, Jinhao, Huang, Junting, Huang, Kaixuan, Huang, Shengheng, Huang, Wenhao, Huang, Xin, Huang, Xingtao, Huang, Yongbo, Hui, Jiaqi, Huo, Lei, Huo, Wenju, Huss, Cédric, Hussain, Safeer, Imbert, Leonard, Ioannisian, Ara, Isocrate, Roberto, Jafar, Arshak, Jelmini, Beatrice, Jeria, Ignacio, Ji, Xiaolu, Jia, Huihui, Jia, Junji, Jian, Siyu, Jiang, Cailian, Jiang, Di, Jiang, Guangzheng, Jiang, Wei, Jiang, Xiaoshan, Jiang, Xiaozhao, Jiang, Yixuan, Jing, Xiaoping, Jollet, Cécile, Kang, Li, Karaparabil, Rebin, Kazarian, Narine, Khan, Ali, Khatun, Amina, Khosonthongkee, Khanchai, Korablev, Denis, Kouzakov, Konstantin, Krasnoperov, Alexey, Kuleshov, Sergey, Kumaran, Sindhujha, Kutovskiy, Nikolay, Labit, Loïc, Lachenmaier, Tobias, Lai, Haojing, Landini, Cecilia, Leblanc, Sébastien, Lefevre, Frederic, Lei, Ruiting, Leitner, Rupert, Leung, Jason, Li, Demin, Li, Fei, Li, Fule, Li, Gaosong, Li, Hongjian, Li, Huang, Li, Jiajun, Li, Min, Li, Nan, Li, Qingjiang, Li, Ruhui, Li, Rui, Li, Shanfeng, Li, Shuo, Li, Tao, Li, Teng, Li, Weidong, Li, Weiguo, Li, Xiaomei, Li, Xiaonan, Li, Xinglong, Li, Yi, Li, Yichen, Li, Yufeng, Li, Zhaohan, Li, Zhibing, Li, Ziyuan, Li, Zonghai, Liang, An-An, Liang, Hao, Liao, Jiajun, Liao, Yilin, Liao, Yuzhong, Limphirat, Ayut, Lin, Guey-Lin, Lin, Shengxin, Lin, Tao, Ling, Jiajie, Ling, Xin, Lippi, Ivano, Liu, Caimei, Liu, Fang, Liu, Fengcheng, Liu, Haidong, Liu, Haotian, Liu, Hongbang, Liu, Hongjuan, Liu, Hongtao, Liu, Hongyang, Liu, Jianglai, Liu, Jiaxi, Liu, Jinchang, Liu, Min, Liu, Qian, Liu, Qin, Liu, Runxuan, Liu, Shenghui, Liu, Shubin, Liu, Shulin, Liu, Xiaowei, Liu, Xiwen, Liu, Xuewei, Liu, Yankai, Liu, Zhen, Loi, Lorenzo, Lokhov, Alexey, Lombardi, Paolo, Lombardo, Claudio, Loo, Kai, Lu, Chuan, Lu, Haoqi, Lu, Jingbin, Lu, Junguang, Lu, Meishu, Lu, Peizhi, Lu, Shuxiang, Lu, Xianguo, Lubsandorzhiev, Bayarto, Lubsandorzhiev, Sultim, Ludhova, Livia, Lukanov, Arslan, Luo, Fengjiao, Luo, Guang, Luo, Jianyi, Luo, Shu, Luo, Wuming, Luo, Xiaojie, Lyashuk, Vladimir, Ma, Bangzheng, Ma, Bing, Ma, Qiumei, Ma, Si, Ma, Xiaoyan, Ma, Xubo, Maalmi, Jihane, Mai, Jingyu, Malabarba, Marco, Malyshkin, Yury, Mandujano, Roberto Carlos, Mantovani, Fabio, Mao, Xin, Mao, Yajun, Mari, Stefano M., Marini, Filippo, Martini, Agnese, Mayer, Matthias, Mayilyan, Davit, Mednieks, Ints, Meng, Yue, Meraviglia, Anita, Meregaglia, Anselmo, Meroni, Emanuela, Miramonti, Lino, Mohan, Nikhil, Montuschi, Michele, Reveco, Cristobal Morales, Nastasi, Massimiliano, Naumov, Dmitry V., Naumova, Elena, Navas-Nicolas, Diana, Nemchenok, Igor, Thi, Minh Thuan Nguyen, Nikolaev, Alexey, Ning, Feipeng, Ning, Zhe, Nunokawa, Hiroshi, Oberauer, Lothar, Ochoa-Ricoux, Juan Pedro, Olshevskiy, Alexander, Orestano, Domizia, Ortica, Fausto, Othegraven, Rainer, Paoloni, Alessandro, Parker, George, Parmeggiano, Sergio, Patsias, Achilleas, Pei, Yatian, Pelicci, Luca, Peng, Anguo, Peng, Haiping, Peng, Yu, Peng, Zhaoyuan, Percalli, Elisa, Perrin, Willy, Perrot, Frédéric, Petitjean, Pierre-Alexandre, Petrucci, Fabrizio, Pilarczyk, Oliver, Rico, Luis Felipe Piñeres, Popov, Artyom, Poussot, Pascal, Previtali, Ezio, Qi, Fazhi, Qi, Ming, Qi, Xiaohui, Qian, Sen, Qian, Xiaohui, Qian, Zhen, Qiao, Hao, Qin, Zhonghua, Qiu, Shoukang, Qu, Manhao, Qu, Zhenning, Ranucci, Gioacchino, Re, Alessandra, Rebii, Abdel, Redchuk, Mariia, Reina, Gioele, Ren, Bin, Ren, Jie, Ren, Yuhan, Ricci, Barbara, Rientong, Komkrit, Rifai, Mariam, Roche, Mathieu, Rodphai, Narongkiat, Romani, Aldo, Roskovec, Bedřich, Ruan, Xichao, Rybnikov, Arseniy, Sadovsky, Andrey, Saggese, Paolo, Sandanayake, Deshan, Sangka, Anut, Sava, Giuseppe, Sawangwit, Utane, Schever, Michaela, Schwab, Cédric, Schweizer, Konstantin, Selyunin, Alexandr, Serafini, Andrea, Settimo, Mariangela, Shao, Junyu, Sharov, Vladislav, Shi, Hexi, Shi, Jingyan, Shi, Yanan, Shutov, Vitaly, Sidorenkov, Andrey, Šimkovic, Fedor, Singhal, Apeksha, Sirignano, Chiara, Siripak, Jaruchit, Sisti, Monica, Smirnov, Mikhail, Smirnov, Oleg, Sokolov, Sergey, Songwadhana, Julanan, Soonthornthum, Boonrucksar, Sotnikov, Albert, Sreethawong, Warintorn, Stahl, Achim, Stanco, Luca, Stankevich, Konstantin, Steiger, Hans, Steinmann, Jochen, Sterr, Tobias, Stock, Matthias Raphael, Strati, Virginia, Strizh, Michail, Studenikin, Alexander, Su, Aoqi, Su, Jun, Sun, Guangbao, Sun, Shifeng, Sun, Xilei, Sun, Yongjie, Sun, Yongzhao, Sun, Zhengyang, Suwonjandee, Narumon, Takenaka, Akira, Tan, Xiaohan, Tang, Jian, Tang, Jingzhe, Tang, Qiang, Tang, Quan, Tang, Xiao, Hariharan, Vidhya Thara, Tkachev, Igor, Tmej, Tomas, Torri, Marco Danilo Claudio, Triossi, Andrea, Trzaska, Wladyslaw, Tung, Yu-Chen, Tuve, Cristina, Ushakov, Nikita, Vedin, Vadim, Venettacci, Carlo, Verde, Giuseppe, Vialkov, Maxim, Viaud, Benoit, Vollbrecht, Cornelius Moritz, von Sturm, Katharina, Vorobel, Vit, Voronin, Dmitriy, Votano, Lucia, Walker, Pablo, Wang, Caishen, Wang, Chung-Hsiang, Wang, En, Wang, Guoli, Wang, Hanwen, Wang, Jian, Wang, Jun, Wang, Li, Wang, Lu, Wang, Meng, Wang, Mingyuan, Wang, Qianchuan, Wang, Ruiguang, Wang, Sibo, Wang, Siguang, Wang, Wei, Wang, Wenshuai, Wang, Xi, Wang, Xiangyue, Wang, Yangfu, Wang, Yaoguang, Wang, Yi, Wang, Yifang, Wang, Yuanqing, Wang, Yuyi, Wang, Zhe, Wang, Zheng, Wang, Zhimin, Watcharangkool, Apimook, Wei, Wei, Wei, Wenlu, Wei, Yadong, Wei, Yuehuan, Wen, Liangjian, Weng, Jun, Wiebusch, Christopher, Wirth, Rosmarie, Wu, Chengxin, Wu, Diru, Wu, Qun, Wu, Yinhui, Wu, Yiyang, Wu, Zhi, Wurm, Michael, Wurtz, Jacques, Wysotzki, Christian, Xi, Yufei, Xia, Dongmei, Xian, Shishen, Xiang, Ziqian, Xiao, Fei, Xiao, Xiang, Xie, Xiaochuan, Xie, Yijun, Xie, Yuguang, Xin, Zhao, Xing, Zhizhong, Xu, Benda, Xu, Cheng, Xu, Donglian, Xu, Fanrong, Xu, Hangkun, Xu, Jiayang, Xu, Jilei, Xu, Jing, Xu, Jinghuan, Xu, Meihang, Xu, Xunjie, Xu, Yin, Xu, Yu, Yan, Baojun, Yan, Qiyu, Yan, Taylor, Yan, Xiongbo, Yan, Yupeng, Yang, Changgen, Yang, Chengfeng, Yang, Fengfan, Yang, Jie, Yang, Lei, Yang, Pengfei, Yang, Xiaoyu, Yang, Yifan, Yang, Yixiang, Yang, Zekun, Yao, Haifeng, Ye, Jiaxuan, Ye, Mei, Ye, Ziping, Yermia, Frédéric, You, Zhengyun, Yu, Boxiang, Yu, Chiye, Yu, Chunxu, Yu, Guojun, Yu, Hongzhao, Yu, Miao, Yu, Xianghui, Yu, Zeyuan, Yu, Zezhong, Yuan, Cenxi, Yuan, Chengzhuo, Yuan, Ying, Yuan, Zhenxiong, Yue, Baobiao, Zafar, Noman, Zamogilnyi, Kirill, Zavadskyi, Vitalii, Zeng, Fanrui, Zeng, Shan, Zeng, Tingxuan, Zeng, Yuda, Zhan, Liang, Zhang, Aiqiang, Zhang, Bin, Zhang, Binting, Zhang, Feiyang, Zhang, Hangchang, Zhang, Haosen, Zhang, Honghao, Zhang, Jialiang, Zhang, Jiawen, Zhang, Jie, Zhang, Jingbo, Zhang, Jinnan, Zhang, Junwei, Zhang, Lei, Zhang, Peng, Zhang, Ping, Zhang, Qingmin, Zhang, Shiqi, Zhang, Shu, Zhang, Shuihan, Zhang, Siyuan, Zhang, Tao, Zhang, Xiaomei, Zhang, Xin, Zhang, Xuantong, Zhang, Yibing, Zhang, Yinhong, Zhang, Yiyu, Zhang, Yongpeng, Zhang, Yu, Zhang, Yuanyuan, Zhang, Yumei, Zhang, Zhenyu, Zhang, Zhijian, Zhao, Jie, Zhao, Rong, Zhao, Runze, Zhao, Shujun, Zhao, Tianhao, Zheng, Hua, Zheng, Yangheng, Zhou, Jing, Zhou, Li, Zhou, Nan, Zhou, Shun, Zhou, Tong, Zhou, Xiang, Zhou, Xing, Zhu, Jingsen, Zhu, Kangfu, Zhu, Kejun, Zhu, Zhihang, Zhuang, Bo, Zhuang, Honglin, Zong, Liang, and Zou, Jiaheng
- Subjects
High Energy Physics - Experiment ,High Energy Physics - Phenomenology - Abstract
We explore the bound neutrons decay into invisible particles (e.g., $n\rightarrow 3 \nu$ or $nn \rightarrow 2 \nu$) in the JUNO liquid scintillator detector. The invisible decay includes two decay modes: $ n \rightarrow { inv} $ and $ nn \rightarrow { inv} $. The invisible decays of $s$-shell neutrons in $^{12}{\rm C}$ will leave a highly excited residual nucleus. Subsequently, some de-excitation modes of the excited residual nuclei can produce a time- and space-correlated triple coincidence signal in the JUNO detector. Based on a full Monte Carlo simulation informed with the latest available data, we estimate all backgrounds, including inverse beta decay events of the reactor antineutrino $\bar{\nu}_e$, natural radioactivity, cosmogenic isotopes and neutral current interactions of atmospheric neutrinos. Pulse shape discrimination and multivariate analysis techniques are employed to further suppress backgrounds. With two years of exposure, JUNO is expected to give an order of magnitude improvement compared to the current best limits. After 10 years of data taking, the JUNO expected sensitivities at a 90% confidence level are $\tau/B( n \rightarrow { inv} ) > 5.0 \times 10^{31} \, {\rm yr}$ and $\tau/B( nn \rightarrow { inv} ) > 1.4 \times 10^{32} \, {\rm yr}$., Comment: 28 pages, 7 figures, 4 tables
- Published
- 2024
48. One-shot Active Learning Based on Lewis Weight Sampling for Multiple Deep Models
- Author
-
Huang, Sheng-Jun, Li, Yi, Sun, Yiming, and Tang, Ying-Peng
- Subjects
Computer Science - Machine Learning - Abstract
Active learning (AL) for multiple target models aims to reduce labeled data querying while effectively training multiple models concurrently. Existing AL algorithms often rely on iterative model training, which can be computationally expensive, particularly for deep models. In this paper, we propose a one-shot AL method to address this challenge, which performs all label queries without repeated model training. Specifically, we extract different representations of the same dataset using distinct network backbones, and actively learn the linear prediction layer on each representation via an $\ell_p$-regression formulation. The regression problems are solved approximately by sampling and reweighting the unlabeled instances based on their maximum Lewis weights across the representations. An upper bound on the number of samples needed is provided with a rigorous analysis for $p\in [1, +\infty)$. Experimental results on 11 benchmarks show that our one-shot approach achieves competitive performances with the state-of-the-art AL methods for multiple target models., Comment: The proof of Lemma 3.11 is fixed
- Published
- 2024
49. Agnostic Active Learning of Single Index Models with Linear Sample Complexity
- Author
-
Gajjar, Aarshvi, Tai, Wai Ming, Xu, Xingyu, Hegde, Chinmay, Li, Yi, and Musco, Christopher
- Subjects
Computer Science - Machine Learning - Abstract
We study active learning methods for single index models of the form $F({\mathbf x}) = f(\langle {\mathbf w}, {\mathbf x}\rangle)$, where $f:\mathbb{R} \to \mathbb{R}$ and ${\mathbf x,\mathbf w} \in \mathbb{R}^d$. In addition to their theoretical interest as simple examples of non-linear neural networks, single index models have received significant recent attention due to applications in scientific machine learning like surrogate modeling for partial differential equations (PDEs). Such applications require sample-efficient active learning methods that are robust to adversarial noise. I.e., that work even in the challenging agnostic learning setting. We provide two main results on agnostic active learning of single index models. First, when $f$ is known and Lipschitz, we show that $\tilde{O}(d)$ samples collected via {statistical leverage score sampling} are sufficient to learn a near-optimal single index model. Leverage score sampling is simple to implement, efficient, and already widely used for actively learning linear models. Our result requires no assumptions on the data distribution, is optimal up to log factors, and improves quadratically on a recent ${O}(d^{2})$ bound of \cite{gajjar2023active}. Second, we show that $\tilde{O}(d)$ samples suffice even in the more difficult setting when $f$ is \emph{unknown}. Our results leverage tools from high dimensional probability, including Dudley's inequality and dual Sudakov minoration, as well as a novel, distribution-aware discretization of the class of Lipschitz functions.
- Published
- 2024
50. LogoMotion: Visually Grounded Code Generation for Content-Aware Animation
- Author
-
Liu, Vivian, Kazi, Rubaiat Habib, Wei, Li-Yi, Fisher, Matthew, Langlois, Timothy, Walker, Seth, and Chilton, Lydia
- Subjects
Computer Science - Human-Computer Interaction - Abstract
Animated logos are a compelling and ubiquitous way individuals and brands represent themselves online. Manually authoring these logos can require significant artistic skill and effort. To help novice designers animate logos, design tools currently offer templates and animation presets. However, these solutions can be limited in their expressive range. Large language models have the potential to help novice designers create animated logos by generating animation code that is tailored to their content. In this paper, we introduce LogoMotion, an LLM-based system that takes in a layered document and generates animated logos through visually-grounded program synthesis. We introduce techniques to create an HTML representation of a canvas, identify primary and secondary elements, synthesize animation code, and visually debug animation errors. When compared with an industry standard tool, we find that LogoMotion produces animations that are more content-aware and are on par in terms of quality. We conclude with a discussion of the implications of LLM-generated animation for motion design.
- Published
- 2024
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.