12,115 results on '"LIU Fan"'
Search Results
2. An Overview on IRS-Enabled Sensing and Communications for 6G: Architectures, Fundamental Limits, and Joint Beamforming Designs
- Author
-
Song, Xianxin, Fang, Yuan, Wang, Feng, Ren, Zixiang, Yu, Xianghao, Zhang, Ye, Liu, Fan, Xu, Jie, Ng, Derrick Wing Kwan, Zhang, Rui, and Cui, Shuguang
- Subjects
Electrical Engineering and Systems Science - Signal Processing - Abstract
This paper presents an overview on intelligent reflecting surface (IRS)-enabled sensing and communication for the forthcoming sixth-generation (6G) wireless networks, in which IRSs are strategically deployed to proactively reconfigure wireless environments to improve both sensing and communication (S&C) performance. First, we exploit a single IRS to enable wireless sensing in the base station's (BS's) non-line-of-sight (NLoS) area. In particular, we present three IRS-enabled NLoS target sensing architectures with fully-passive, semi-passive, and active IRSs, respectively. We compare their pros and cons by analyzing the fundamental sensing performance limits for target detection and parameter estimation. Next, we consider a single IRS to facilitate integrated sensing and communication (ISAC), in which the transmit signals at the BS are used for achieving both S&C functionalities, aided by the IRS through reflective beamforming. We present joint transmit signal and receiver processing designs for realizing efficient ISAC, and jointly optimize the transmit beamforming at the BS and reflective beamforming at the IRS to balance the fundamental performance tradeoff between S&C. Furthermore, we discuss multi-IRS networked ISAC, by particularly focusing on multi-IRS-enabled multi-link ISAC, multi-region ISAC, and ISAC signal routing, respectively. Finally, we highlight various promising research topics in this area to motivate future work., Comment: 22 pages,7 figures
- Published
- 2024
3. C3PO III: On the Lithium Signatures Following Planet Engulfment by Stars
- Author
-
Sun, Qinghui, Ting, Yuan-Sen, Liu, Fan, Wang, Sharon Xuesong, Anthony-Twarog, Barbara J., Twarog, Bruce A., Yang, Jia-Yi, Chen, Di-Chang, Karakas, Amanda I., Xie, Ji-Wei, and Yong, David
- Subjects
Astrophysics - Earth and Planetary Astrophysics ,Astrophysics - Solar and Stellar Astrophysics - Abstract
Planet engulfment has been identified as one of the mechanisms for enhancing lithium abundance in stars. However, comprehensive investigations into lithium signatures following such events remain limited. Stars born together, sharing a common origin and stellar characteristics, provide a unique opportunity to study these signatures and compare lithium abundances. We demonstrate that the distinctive signature of planet engulfment in lithium abundance is only discernible among highly similar stellar twins. We present lithium abundance measurements for 125 co-moving pairs of stars, representing the largest sample to date with a single, homogeneous assessment of high-precision lithium abundance. While lithium abundance enhancements in pairs showing planet engulfment signatures are within 0.35 dex, we find that even at fixed stellar parameters (temperature and age), the intrinsic scatter in lithium abundance is typically 0.35 dex for G/F dwarfs and can be as large as 0.6 dex for older and cooler stars due to internal stellar evolution processes. Since the planet engulfment signature from lithium can be masked by stellar intrinsic scatter, our findings raise questions about relying solely on lithium as an indicator for planet engulfment or attributing lithium-richness in stars primarily to planet engulfment events., Comment: 19 pages, 8 figures, 2 tables, accepted for publication in ApJ
- Published
- 2024
4. Low-Complexity Minimum BER Precoder Design for ISAC Systems: A Delay-Doppler Perspective
- Author
-
Wu, Jun, Yuan, Weijie, Wei, Zhiqiang, Zhang, Kecheng, Liu, Fan, and Ng, Derrick Wing Kwan
- Subjects
Electrical Engineering and Systems Science - Signal Processing - Abstract
Orthogonal time frequency space (OTFS) modulation is anticipated to be a promising candidate for supporting integrated sensing and communications (ISAC) systems, which is considered as a pivotal technique for realizing next generation wireless networks. In this paper, we develop a minimum bit error rate (BER) precoder design for an OTFS-based ISAC system. In particular, the BER minimization problem takes into account the maximum available transmission power budget and the required sensing performance. Different from prior studies that considered ISAC in the time-frequency (TF) domain, we devise the precoder from the perspective of the delay-Doppler (DD) domain by exploiting the equivalent DD domain channel due to the fact that the DD domain channel generally tends to be sparse and quasi-static, which can facilitate a low-overhead ISAC system design. To address the non-convex optimization design problem, we resort to optimizing the lower bound of the derived average BER by adopting Jensen's inequality. Subsequently, the formulated problem is decoupled into two independent sub-problems via singular value decomposition (SVD) methodology. We then theoretically analyze the feasibility conditions of the proposed problem and present a low-complexity iterative solution via leveraging the Lagrangian duality approach. Simulation results verify the effectiveness of our proposed precoder compared to the benchmark schemes and reveal the interplay between sensing and communication for dual-functional precoder design, indicating a trade-off where transmission efficiency is sacrificed for increasing transmission reliability and sensing accuracy.
- Published
- 2024
5. Fundamental Limits of Pulse Based UWB ISAC Systems: A Parameter Estimation Perspective
- Author
-
Liu, Fan, Zhang, Tingting, Zhang, Zenan, Cao, Bin, Shen, Yuan, and Zhang, Qinyu
- Subjects
Electrical Engineering and Systems Science - Signal Processing - Abstract
Impulse radio ultra-wideband (IR-UWB) signals stand out for their high temporal resolution, low cost, and large bandwidth, making them a highly promising option for integrated sensing and communication (ISAC) systems. In this paper, we design an ISAC system for a bi-static passive sensing scenario that accommodates multiple targets. Specifically, we introduce two typical modulation schemes, PPM and BPSK, for data transmission. The essential coupling between sensing and communication is examined through the Fisher information matrix (FIM). Accordingly, we introduce a pilot-based decoupling approach that relies on known time-delays, as well as a differential decoupling strategy that uses a known starting symbol position. Finally, we assess the sensing and communication performance under various modulation and demodulation schemes under the constraints of current UWB standards. This assessment utilizes the Cramer-Rao Lower Bound (CRLB) for sensing and the Shannon capacity limit for communication, offering theoretical insights into choosing suitable data signal processing methods in real-world applications.
- Published
- 2024
6. JAILJUDGE: A Comprehensive Jailbreak Judge Benchmark with Multi-Agent Enhanced Explanation Evaluation Framework
- Author
-
Liu, Fan, Feng, Yue, Xu, Zhao, Su, Lixin, Ma, Xinyu, Yin, Dawei, and Liu, Hao
- Subjects
Computer Science - Computation and Language ,Computer Science - Artificial Intelligence - Abstract
Despite advancements in enhancing LLM safety against jailbreak attacks, evaluating LLM defenses remains a challenge, with current methods often lacking explainability and generalization to complex scenarios, leading to incomplete assessments (e.g., direct judgment without reasoning, low F1 score of GPT-4 in complex cases, bias in multilingual scenarios). To address this, we present JAILJUDGE, a comprehensive benchmark featuring diverse risk scenarios, including synthetic, adversarial, in-the-wild, and multilingual prompts, along with high-quality human-annotated datasets. The JAILJUDGE dataset includes over 35k+ instruction-tune data with reasoning explainability and JAILJUDGETEST, a 4.5k+ labeled set for risk scenarios, and a 6k+ multilingual set across ten languages. To enhance evaluation with explicit reasoning, we propose the JailJudge MultiAgent framework, which enables explainable, fine-grained scoring (1 to 10). This framework supports the construction of instruction-tuning ground truth and facilitates the development of JAILJUDGE Guard, an end-to-end judge model that provides reasoning and eliminates API costs. Additionally, we introduce JailBoost, an attacker-agnostic attack enhancer, and GuardShield, a moderation defense, both leveraging JAILJUDGE Guard. Our experiments demonstrate the state-of-the-art performance of JailJudge methods (JailJudge MultiAgent, JAILJUDGE Guard) across diverse models (e.g., GPT-4, Llama-Guard) and zero-shot scenarios. JailBoost and GuardShield significantly improve jailbreak attack and defense tasks under zero-shot settings, with JailBoost enhancing performance by 29.24% and GuardShield reducing defense ASR from 40.46% to 0.15%.
- Published
- 2024
7. Prompting DirectSAM for Semantic Contour Extraction in Remote Sensing Images
- Author
-
Miao, Shiyu, Chen, Delong, Liu, Fan, Zhang, Chuanyi, Gu, Yanhui, Guo, Shengjie, and Zhou, Jun
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
The Direct Segment Anything Model (DirectSAM) excels in class-agnostic contour extraction. In this paper, we explore its use by applying it to optical remote sensing imagery, where semantic contour extraction-such as identifying buildings, road networks, and coastlines-holds significant practical value. Those applications are currently handled via training specialized small models separately on small datasets in each domain. We introduce a foundation model derived from DirectSAM, termed DirectSAM-RS, which not only inherits the strong segmentation capability acquired from natural images, but also benefits from a large-scale dataset we created for remote sensing semantic contour extraction. This dataset comprises over 34k image-text-contour triplets, making it at least 30 times larger than individual dataset. DirectSAM-RS integrates a prompter module: a text encoder and cross-attention layers attached to the DirectSAM architecture, which allows flexible conditioning on target class labels or referring expressions. We evaluate the DirectSAM-RS in both zero-shot and fine-tuning setting, and demonstrate that it achieves state-of-the-art performance across several downstream benchmarks.
- Published
- 2024
8. E-Healthcare Systems: Integrated Sensing, Computing, and Semantic Communication with Physical Layer Security
- Author
-
Yang, Yinchao, Yang, Zhaohui, Yuan, Weijie, Liu, Fan, Cao, Xiaowen, Huang, Chongwen, Zhang, Zhaoyang, and Shikh-Bahaei, Mohammad
- Subjects
Electrical Engineering and Systems Science - Signal Processing - Abstract
This paper introduces an integrated sensing, computing, and semantic communication (ISCSC) framework tailored for smart healthcare systems. The framework is evaluated in the context of smart healthcare, optimising the transmit beamforming matrix and semantic extraction ratio for improved data rates, sensing accuracy, and general data protection regulation (GDPR) compliance, while considering IoRT device computing capabilities. Semantic metrics such as semantic transmission rate and semantic secrecy rate are derived to evaluate data rate performance and GDPR risk, respectively, while the Cram\'er-Rao Bound (CRB) assesses sensing performance. Simulation results demonstrate the framework's effectiveness in ensuring reliable sensing, high data rates, and secure communication., Comment: This paper has been accepted by GLOBECOM 2024
- Published
- 2024
9. Performance Comparison of HTTP/3 and HTTP/2: Proxy vs. Non-Proxy Environments
- Author
-
Liu, Fan, Dehart, John, Parwatikar, Jyoti, Farkiani, Behrooz, and Crowley, Patrick
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
This paper systematically evaluates the performance of QUIC/HTTP3 (H3) and TCP/HTTP2 (H2) protocols in proxy-enhanced environments. H3 leverages features such as UDP-based flow-controlled streams, integrated TLS, multiplexed connections, and connection migration, offering the potential for improved web communication. Despite extensive research, the impact of proxy integration and connection migration remains underexplored. This study addresses this gap by evaluating H3 and H2 across various scenarios, particularly in noisy networks and proxy setups. Our findings show that H3 excels under high loss and high latency conditions, significantly benefiting from its connection migration and multiplexing features, with improvements of up to 88.36% under high-loss and high-latency conditions, and 81.5% under extreme loss conditions, respectively. H3's connection migration remains robust, maintaining stable performance even in proxy-enhanced environments, ensuring seamless network transitions. The proxy has a more neutral impact on H3, while it significantly enhances H2 performance, particularly when paired with BBR, resulting in a 90% improvement in the single-stream file download experiment under severe network impairments. Any improvements observed in H3 under a proxy are minor and do not fundamentally alter H3's performance as they do for H2. Importantly, while H2 with the right congestion control algorithm (CCA) can achieve performance comparable to H3, H3's performance is more robust, as it is less impacted by network conditions, proxy settings, and CCA variations.
- Published
- 2024
10. Spatial-Temporal Mixture-of-Graph-Experts for Multi-Type Crime Prediction
- Author
-
Wu, Ziyang, Liu, Fan, Han, Jindong, Liang, Yuxuan, and Liu, Hao
- Subjects
Computer Science - Machine Learning ,Computer Science - Artificial Intelligence - Abstract
As various types of crime continue to threaten public safety and economic development, predicting the occurrence of multiple types of crimes becomes increasingly vital for effective prevention measures. Although extensive efforts have been made, most of them overlook the heterogeneity of different crime categories and fail to address the issue of imbalanced spatial distribution. In this work, we propose a Spatial-Temporal Mixture-of-Graph-Experts (ST-MoGE) framework for collective multiple-type crime prediction. To enhance the model's ability to identify diverse spatial-temporal dependencies and mitigate potential conflicts caused by spatial-temporal heterogeneity of different crime categories, we introduce an attentive-gated Mixture-of-Graph-Experts (MGEs) module to capture the distinctive and shared crime patterns of each crime category. Then, we propose Cross-Expert Contrastive Learning(CECL) to update the MGEs and force each expert to focus on specific pattern modeling, thereby reducing blending and redundancy. Furthermore, to address the issue of imbalanced spatial distribution, we propose a Hierarchical Adaptive Loss Re-weighting (HALR) approach to eliminate biases and insufficient learning of data-scarce regions. To evaluate the effectiveness of our methods, we conduct comprehensive experiments on two real-world crime datasets and compare our results with twelve advanced baselines. The experimental results demonstrate the superiority of our methods.
- Published
- 2024
11. Power Line Aerial Image Restoration under dverse Weather: Datasets and Baselines
- Author
-
Yang, Sai, Hu, Bin, Zhou, Bojun, Liu, Fan, Wu, Xiaoxin, Zhang, Xinsong, Gu, Juping, and Zhou, Jun
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Power Line Autonomous Inspection (PLAI) plays a crucial role in the construction of smart grids due to its great advantages of low cost, high efficiency, and safe operation. PLAI is completed by accurately detecting the electrical components and defects in the aerial images captured by Unmanned Aerial Vehicles (UAVs). However, the visible quality of aerial images is inevitably degraded by adverse weather like haze, rain, or snow, which are found to drastically decrease the detection accuracy in our research. To circumvent this problem, we propose a new task of Power Line Aerial Image Restoration under Adverse Weather (PLAIR-AW), which aims to recover clean and high-quality images from degraded images with bad weather thus improving detection performance for PLAI. In this context, we are the first to release numerous corresponding datasets, namely, HazeCPLID, HazeTTPLA, HazeInsPLAD for power line aerial image dehazing, RainCPLID, RainTTPLA, RainInsPLAD for power line aerial image deraining, SnowCPLID, SnowInsPLAD for power line aerial image desnowing, which are synthesized upon the public power line aerial image datasets of CPLID, TTPLA, InsPLAD following the mathematical models. Meanwhile, we select numerous state-of-the-art methods from image restoration community as the baseline methods for PLAIR-AW. At last, we conduct large-scale empirical experiments to evaluate the performance of baseline methods on the proposed datasets. The proposed datasets and trained models are available at https://github.com/ntuhubin/PLAIR-AW.
- Published
- 2024
12. Communication-Assisted Sensing Systems: Fundamental Limits and ISAC Waveform Design
- Author
-
Dong, Fuwang, Liu, Fan, Xiong, Yifeng, Cui, Yuanhao, Wang, Wei, and Jin, Shi
- Subjects
Computer Science - Information Theory - Abstract
The communication-assisted sensing (CAS) systems are expected to endow the users with beyond-line-of-sight sensing capabilities without the aid of additional sensors. In this paper, we study the dual-functional signaling strategy, focusing on three primary aspects, namely, the information-theoretic framework, the optimal distribution of channel input, and the optimal waveform design for Gaussian signals. First, we establish the information-theoretic framework and develop a modified source-channel separation theorem (MSST) tailored for CAS systems. The proposed MSST elucidates the relationship between achievable distortion, coding rate, and communication channel capacity in cases where the distortion metric is separable for sensing and communication (S\&C) processes. Second, we present an optimal channel input design for dual-functional signaling, which aims to minimize total distortion under the constraints of the MSST and resource budget. We then conceive a two-step Blahut-Arimoto (BA)-based optimal search algorithm to numerically solve the functional optimization problem. Third, in light of the current signaling strategy, we further propose an optimal waveform design for Gaussian signaling in multi-input multi-output (MIMO) CAS systems. The associated covariance matrix optimization problem is addressed using a successive convex approximation (SCA)-based waveform design algorithm. Finally, we provide numerical simulation results to demonstrate the effectiveness of the proposed algorithms and to show the unique performance tradeoff between S\&C processes.
- Published
- 2024
13. DiVE: DiT-based Video Generation with Enhanced Control
- Author
-
Jiang, Junpeng, Hong, Gangyi, Zhou, Lijun, Ma, Enhui, Hu, Hengtong, Zhou, Xia, Xiang, Jie, Liu, Fan, Yu, Kaicheng, Sun, Haiyang, Zhan, Kun, Jia, Peng, and Zhang, Miao
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Generating high-fidelity, temporally consistent videos in autonomous driving scenarios faces a significant challenge, e.g. problematic maneuvers in corner cases. Despite recent video generation works are proposed to tackcle the mentioned problem, i.e. models built on top of Diffusion Transformers (DiT), works are still missing which are targeted on exploring the potential for multi-view videos generation scenarios. Noticeably, we propose the first DiT-based framework specifically designed for generating temporally and multi-view consistent videos which precisely match the given bird's-eye view layouts control. Specifically, the proposed framework leverages a parameter-free spatial view-inflated attention mechanism to guarantee the cross-view consistency, where joint cross-attention modules and ControlNet-Transformer are integrated to further improve the precision of control. To demonstrate our advantages, we extensively investigate the qualitative comparisons on nuScenes dataset, particularly in some most challenging corner cases. In summary, the effectiveness of our proposed method in producing long, controllable, and highly consistent videos under difficult conditions is proven to be effective.
- Published
- 2024
14. Domain-invariant Progressive Knowledge Distillation for UAV-based Object Detection
- Author
-
Yao, Liang, Liu, Fan, Zhang, Chuanyi, Ou, Zhiquan, and Wu, Ting
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Knowledge distillation (KD) is an effective method for compressing models in object detection tasks. Due to limited computational capability, UAV-based object detection (UAV-OD) widely adopt the KD technique to obtain lightweight detectors. Existing methods often overlook the significant differences in feature space caused by the large gap in scale between the teacher and student models. This limitation hampers the efficiency of knowledge transfer during the distillation process. Furthermore, the complex backgrounds in UAV images make it challenging for the student model to efficiently learn the object features. In this paper, we propose a novel knowledge distillation framework for UAV-OD. Specifically, a progressive distillation approach is designed to alleviate the feature gap between teacher and student models. Then a new feature alignment method is provided to extract object-related features for enhancing student model's knowledge reception efficiency. Finally, extensive experiments are conducted to validate the effectiveness of our proposed approach. The results demonstrate that our proposed method achieves state-of-the-art (SoTA) performance in two UAV-OD datasets.
- Published
- 2024
15. Making Large Vision Language Models to be Good Few-shot Learners
- Author
-
Liu, Fan, Cai, Wenwen, Huo, Jian, Zhang, Chuanyi, Chen, Delong, and Zhou, Jun
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Few-shot classification (FSC) is a fundamental yet challenging task in computer vision that involves recognizing novel classes from limited data. While previous methods have focused on enhancing visual features or incorporating additional modalities, Large Vision Language Models (LVLMs) offer a promising alternative due to their rich knowledge and strong visual perception. However, LVLMs risk learning specific response formats rather than effectively extracting useful information from support data in FSC tasks. In this paper, we investigate LVLMs' performance in FSC and identify key issues such as insufficient learning and the presence of severe positional biases. To tackle the above challenges, we adopt the meta-learning strategy to teach models "learn to learn". By constructing a rich set of meta-tasks for instruction fine-tuning, LVLMs enhance the ability to extract information from few-shot support data for classification. Additionally, we further boost LVLM's few-shot learning capabilities through label augmentation and candidate selection in the fine-tuning and inference stage, respectively. Label augmentation is implemented via a character perturbation strategy to ensure the model focuses on support information. Candidate selection leverages attribute descriptions to filter out unreliable candidates and simplify the task. Extensive experiments demonstrate that our approach achieves superior performance on both general and fine-grained datasets. Furthermore, our candidate selection strategy has been proven beneficial for training-free LVLMs.
- Published
- 2024
16. Comprehensive characterization of tumor therapeutic response with simultaneous mapping cell size, density, and transcytolemmal water exchange
- Author
-
Shi, Diwei, Li, Sisi, Liu, Fan, Jiang, Xiaoyu, Wu, Lei, Chen, Li, Zheng, Quanshui, Bao, Haihua, Guo, Hua, and Xu, Junzhong
- Subjects
Physics - Medical Physics - Abstract
Early assessment of tumor therapeutic response is an important topic in precision medicine to optimize personalized treatment regimens and reduce unnecessary toxicity, cost, and delay. Although diffusion MRI (dMRI) has shown potential to address this need, its predictive accuracy is limited, likely due to its unspecific sensitivity to overall pathological changes. In this work, we propose a new quantitative dMRI-based method dubbed EXCHANGE (MRI of water Exchange, Confined and Hindered diffusion under Arbitrary Gradient waveform Encodings) for simultaneous mapping of cell size, cell density, and transcytolemmal water exchange. Such rich microstructural information comprehensively evaluates tumor pathologies at the cellular level. Validations using numerical simulations and in vitro cell experiments confirmed that the EXCHANGE method can accurately estimate mean cell size, density, and water exchange rate constants. The results from in vivo animal experiments show the potential of EXCHANGE for monitoring tumor treatment response. Finally, the EXCHANGE method was implemented in breast cancer patients with neoadjuvant chemotherapy, demonstrating its feasibility in assessing tumor therapeutic response in clinics. In summary, a new, quantitative dMRI-based EXCHANGE method was proposed to comprehensively characterize tumor microstructural properties at the cellular level, suggesting a unique means to monitor tumor treatment response in clinical practice., Comment: 40 pages, 6 figures
- Published
- 2024
17. (PASS) Visual Prompt Locates Good Structure Sparsity through a Recurrent HyperNetwork
- Author
-
Huang, Tianjin, Meng, Fang, Shen, Li, Liu, Fan, Pei, Yulong, Pechenizkiy, Mykola, Liu, Shiwei, and Chen, Tianlong
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Artificial Intelligence - Abstract
Large-scale neural networks have demonstrated remarkable performance in different domains like vision and language processing, although at the cost of massive computation resources. As illustrated by compression literature, structural model pruning is a prominent algorithm to encourage model efficiency, thanks to its acceleration-friendly sparsity patterns. One of the key questions of structural pruning is how to estimate the channel significance. In parallel, work on data-centric AI has shown that prompting-based techniques enable impressive generalization of large language models across diverse downstream tasks. In this paper, we investigate a charming possibility - \textit{leveraging visual prompts to capture the channel importance and derive high-quality structural sparsity}. To this end, we propose a novel algorithmic framework, namely \texttt{PASS}. It is a tailored hyper-network to take both visual prompts and network weight statistics as input, and output layer-wise channel sparsity in a recurrent manner. Such designs consider the intrinsic channel dependency between layers. Comprehensive experiments across multiple network architectures and six datasets demonstrate the superiority of \texttt{PASS} in locating good structural sparsity. For example, at the same FLOPs level, \texttt{PASS} subnetworks achieve $1\%\sim 3\%$ better accuracy on Food101 dataset; or with a similar performance of $80\%$ accuracy, \texttt{PASS} subnetworks obtain $0.35\times$ more speedup than the baselines., Comment: Under review
- Published
- 2024
18. Pulse Shaping for Random ISAC Signals: The Ambiguity Function Between Symbols Matters
- Author
-
Liao, Zihan, Liu, Fan, Li, Shuangyang, Xiong, Yifeng, Yuan, Weijie, Masouros, Christos, and Lops, Marco
- Subjects
Electrical Engineering and Systems Science - Signal Processing - Abstract
Integrated sensing and communications (ISAC) has emerged as a pivotal enabling technology for next-generation wireless networks. Despite the distinct signal design requirements of sensing and communication (S&C) systems, shifting the symbol-wise pulse shaping (SWiPS) framework from communication-only systems to ISAC poses significant challenges in signal design and processing This paper addresses these challenges by examining the ambiguity function (AF) of the SWiPS ISAC signal and introducing a novel pulse shaping design for single-carrier ISAC transmission. We formulate optimization problems to minimize the average integrated sidelobe level (ISL) of the AF, as well as the weighted ISL (WISL) while satisfying inter-symbol interference (ISI), out-of-band emission (OOBE), and power constraints. Our contributions include establishing the relationship between the AFs of both the random data symbols and signaling pulses, analyzing the statistical characteristics of the AF, and developing algorithmic frameworks for pulse shaping optimization using successive convex approximation (SCA) and alternating direction method of multipliers (ADMM) approaches. Numerical results are provided to validate our theoretical analysis, which demonstrate significant performance improvements in the proposed SWiPS design compared to the root-raised cosine (RRC) pulse shaping for conventional communication systems.
- Published
- 2024
19. Cooperative Integrated Sensing and Communication Networks: Analysis and Distributed Design
- Author
-
Wang, Bowen, Li, Hongyu, Liu, Fan, Cheng, Ziyang, and Shen, Shanpu
- Subjects
Electrical Engineering and Systems Science - Signal Processing - Abstract
This paper proposes a cooperative integrated sensing and communication network (Co-ISACNet) adopting hybrid beamforming (HBF) architecture, which improves both radar sensing and communication performance. The main contributions of this work are four-fold. First, we introduce a novel cooperative sensing method for the considered Co-ISACNet, followed by a comprehensive analysis of this method. This analysis mathematically verifies the benefits of Co-ISACNet and provides insightful design guidelines. Second, to show the benefits of Co-ISACNet, we propose to jointly design the HBF to maximize the network communication capacity while satisfying the constraint of beampattern similarity for radar sensing, which results in a highly dimensional and non-convex problem. Third, to facilitate the joint design, we propose a novel distributed optimization framework based on proximal gradient and alternating direction method of multipliers, namely PANDA. Fourth, we further adopt the proposed PANDA framework to solve the joint HBF design problem for the Co-ISACNet. By using the proposed PANDA framework, all access points (APs) optimize the HBF in parallel, where each AP only requires local channel state information and limited message exchange among the APs. Such framework reduces significantly the computational complexity and thus has pronounced benefits in practical scenarios. Simulation results verify the effectiveness of the proposed algorithm compared with the conventional centralized algorithm and show the remarkable performance improvement of radar sensing and communication by deploying Co-ISACNet.
- Published
- 2024
20. 6D Motion Parameters Estimation in Monostatic Integrated Sensing and Communications System
- Author
-
Luo, Hongliang, Gao, Feifei, Liu, Fan, and Jin, Shi
- Subjects
Electrical Engineering and Systems Science - Signal Processing - Abstract
In this paper, we propose a novel scheme to estimate the six dimensional (6D) motion parameters of dynamic target for monostatic integrated sensing and communications (ISAC) system. We first provide a generic ISAC framework for dynamic target sensing based on massive multiple input and multiple output (MIMO) array. Next, we derive the relationship between the sensing channel of ISAC base station (BS) and the 6D motion parameters of dynamic target. Then, we employ the array signal processing methods to estimate the horizontal angle, pitch angle, distance, and virtual velocity of dynamic target. Since the virtual velocities observed by different antennas are different, we adopt plane fitting to estimate the dynamic target's radial velocity, horizontal angular velocity, and pitch angular velocity from these virtual velocities. Simulation results demonstrate the effectiveness of the proposed 6D motion parameters estimation scheme, which also confirms a new finding that one single BS with massive MIMO array is capable of estimating the horizontal angular velocity and pitch angular velocity of dynamic target., Comment: arXiv admin note: substantial text overlap with arXiv:2312.16441
- Published
- 2024
21. OFDM Achieves the Lowest Ranging Sidelobe Under Random ISAC Signaling
- Author
-
Liu, Fan, Zhang, Ying, Xiong, Yifeng, Li, Shuangyang, Yuan, Weijie, Gao, Feifei, Jin, Shi, and Caire, Giuseppe
- Subjects
Computer Science - Information Theory ,Electrical Engineering and Systems Science - Signal Processing - Abstract
This paper aims to answer a fundamental question in the area of Integrated Sensing and Communications (ISAC): What is the optimal communication-centric ISAC waveform for ranging? Towards that end, we first established a generic framework to analyze the sensing performance of communication-centric ISAC waveforms built upon orthonormal signaling bases and random data symbols. Then, we evaluated their ranging performance by adopting both the periodic and aperiodic auto-correlation functions (P-ACF and A-ACF), and defined the expectation of the integrated sidelobe level (EISL) as a sensing performance metric. On top of that, we proved that among all communication waveforms with cyclic prefix (CP), the orthogonal frequency division multiplexing (OFDM) modulation is the only globally optimal waveform that achieves the lowest ranging sidelobe for quadrature amplitude modulation (QAM) and phase shift keying (PSK) constellations, in terms of both the EISL and the sidelobe level at each individual lag of the P-ACF. As a step forward, we proved that among all communication waveforms without CP, OFDM is a locally optimal waveform for QAM/PSK in the sense that it achieves a local minimum of the EISL of the A-ACF. Finally, we demonstrated by numerical results that under QAM/PSK constellations, there is no other orthogonal communication-centric waveform that achieves a lower ranging sidelobe level than that of the OFDM, in terms of both P-ACF and A-ACF cases., Comment: 16 pages, 11 figures, submitted to IEEE for possible publication
- Published
- 2024
22. Bag of Tricks: Benchmarking of Jailbreak Attacks on LLMs
- Author
-
Xu, Zhao, Liu, Fan, and Liu, Hao
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Artificial Intelligence ,Computer Science - Computation and Language - Abstract
Although Large Language Models (LLMs) have demonstrated significant capabilities in executing complex tasks in a zero-shot manner, they are susceptible to jailbreak attacks and can be manipulated to produce harmful outputs. Recently, a growing body of research has categorized jailbreak attacks into token-level and prompt-level attacks. However, previous work primarily overlooks the diverse key factors of jailbreak attacks, with most studies concentrating on LLM vulnerabilities and lacking exploration of defense-enhanced LLMs. To address these issues, we introduced $\textbf{JailTrickBench}$ to evaluate the impact of various attack settings on LLM performance and provide a baseline for jailbreak attacks, encouraging the adoption of a standardized evaluation framework. Specifically, we evaluate the eight key factors of implementing jailbreak attacks on LLMs from both target-level and attack-level perspectives. We further conduct seven representative jailbreak attacks on six defense methods across two widely used datasets, encompassing approximately 354 experiments with about 55,000 GPU hours on A800-80G. Our experimental results highlight the need for standardized benchmarking to evaluate these attacks on defense-enhanced LLMs. Our code is available at https://github.com/usail-hkust/JailTrickBench., Comment: Accepted by NeurIPS 2024
- Published
- 2024
23. UEMM-Air: A Synthetic Multi-modal Dataset for Unmanned Aerial Vehicle Object Detection
- Author
-
Liu, Fan, Yao, Liang, Xu, Shengxiang, Zhang, Chuanyi, Zhang, Xinlei, and Wu, Ting
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
The development of multi-modal object detection for Unmanned Aerial Vehicles (UAVs) typically relies on a large amount of pixel-aligned multi-modal image data. However, existing datasets face challenges such as limited modalities, high construction costs, and imprecise annotations. To this end, we propose a synthetic multi-modal UAV-based object detection dataset, UEMM-Air. Specially, we simulate various UAV flight scenarios and object types using the Unreal Engine (UE). Then we design the UAV's flight logic to automatically collect data from different scenarios, perspectives, and altitudes. Finally, we propose a novel heuristic automatic annotation algorithm to generate accurate object detection labels. In total, our UEMM-Air consists of 20k pairs of images with 5 modalities and precise annotations. Moreover, we conduct numerous experiments and establish new benchmark results on our dataset. We found that models pre-trained on UEMM-Air exhibit better performance on downstream tasks compared to other similar datasets. The dataset is publicly available (https://github.com/1e12Leon/UEMM-Air) to support the research of multi-modal UAV object detection models.
- Published
- 2024
24. Adversarial Tuning: Defending Against Jailbreak Attacks for LLMs
- Author
-
Liu, Fan, Xu, Zhao, and Liu, Hao
- Subjects
Computer Science - Computation and Language ,Computer Science - Artificial Intelligence ,Computer Science - Cryptography and Security - Abstract
Although safely enhanced Large Language Models (LLMs) have achieved remarkable success in tackling various complex tasks in a zero-shot manner, they remain susceptible to jailbreak attacks, particularly the unknown jailbreak attack. To enhance LLMs' generalized defense capabilities, we propose a two-stage adversarial tuning framework, which generates adversarial prompts to explore worst-case scenarios by optimizing datasets containing pairs of adversarial prompts and their safe responses. In the first stage, we introduce the hierarchical meta-universal adversarial prompt learning to efficiently and effectively generate token-level adversarial prompts. In the second stage, we propose the automatic adversarial prompt learning to iteratively refine semantic-level adversarial prompts, further enhancing LLM's defense capabilities. We conducted comprehensive experiments on three widely used jailbreak datasets, comparing our framework with six defense baselines under five representative attack scenarios. The results underscore the superiority of our proposed methods. Furthermore, our adversarial tuning framework exhibits empirical generalizability across various attack strategies and target LLMs, highlighting its potential as a transferable defense mechanism.
- Published
- 2024
25. Scale-Invariant Feature Disentanglement via Adversarial Learning for UAV-based Object Detection
- Author
-
Liu, Fan, Yao, Liang, Zhang, Chuanyi, Wu, Ting, Zhang, Xinlei, Jiang, Xiruo, and Zhou, Jun
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Detecting objects from Unmanned Aerial Vehicles (UAV) is often hindered by a large number of small objects, resulting in low detection accuracy. To address this issue, mainstream approaches typically utilize multi-stage inferences. Despite their remarkable detecting accuracies, real-time efficiency is sacrificed, making them less practical to handle real applications. To this end, we propose to improve the single-stage inference accuracy through learning scale-invariant features. Specifically, a Scale-Invariant Feature Disentangling module is designed to disentangle scale-related and scale-invariant features. Then an Adversarial Feature Learning scheme is employed to enhance disentanglement. Finally, scale-invariant features are leveraged for robust UAV-based object detection. Furthermore, we construct a multi-modal UAV object detection dataset, State-Air, which incorporates annotated UAV state parameters. We apply our approach to three state-of-the-art lightweight detection frameworks on three benchmark datasets, including State-Air. Extensive experiments demonstrate that our approach can effectively improve model accuracy. Our code and dataset are provided in Supplementary Materials and will be publicly available once the paper is accepted.
- Published
- 2024
26. Generalized $\beta$ and $(q,t)$-deformed partition functions with $W$-representations and Nekrasov partition functions
- Author
-
Liu, Fan, Wang, Rui, Yang, Jie, and Zhao, Wei-Zhong
- Subjects
High Energy Physics - Theory ,Mathematical Physics - Abstract
We construct the generalized $\beta$ and $(q,t)$-deformed partition functions through $W$ representations, where the expansions are respectively with respect to the generalized Jack and Macdonald polynomials labeled by $N$-tuple of Young diagrams. We find that there are the profound interrelations between our deformed partition functions and the $4d$ and $5d$ Nekrasov partition functions. Since the corresponding Nekrasov partition functions can be given by vertex operators, the remarkable connection between our $\beta$ and $(q,t)$-deformed $W$-operators and vertex operators is revealed in this paper. In addition, we investigate the higher Hamiltonians for the generalized Jack and Macdonald polynomials., Comment: 29 pages. Revised version accepted for publication in Eur. Phys. J. C
- Published
- 2024
27. Revealing the Trade-off in ISAC Systems: The KL Divergence Perspective
- Author
-
Fei, Zesong, Tang, Shuntian, Wang, Xinyi, Xia, Fanghao, Liu, Fan, and Zhang, J. Andrew
- Subjects
Electrical Engineering and Systems Science - Signal Processing - Abstract
Integrated sensing and communication (ISAC) is regarded as a promising technique for 6G communication network. In this letter, we investigate the Pareto bound of the ISAC system in terms of a unified Kullback-Leibler (KL) divergence performance metric. We firstly present the relationship between KL divergence and explicit ISAC performance metric, i.e., demodulation error and probability of detection. Thereafter, we investigate the impact of constellation and beamforming design on the Pareto bound via deep learning and semi-definite relaxation (SDR) techniques. Simulation results show the trade-off between sensing and communication performance in terms of bit error rate (BER) and probability of detection under different parameter set-ups., Comment: 5 pages, 5 figures; submitted to IEEE journals for possible publication
- Published
- 2024
28. Improving the Ranging Performance of Random ISAC Signals Through Pulse Shaping Design
- Author
-
Liao, Zihan, Liu, Fan, Li, Shuangyang, Xiong, Yifeng, Yuan, Weijie, and Lops, Marco
- Subjects
Electrical Engineering and Systems Science - Signal Processing - Abstract
In this paper, we propose a novel pulse shaping design for single-carrier integrated sensing and communication (ISAC) transmission. Due to the communication information embedded in the ISAC signal, the resulting auto-correlation function (ACF) is determined by both the information-conveying random symbol sequence and the signaling pulse, where the former leads to random fluctuations in the sidelobes of the ACF, impairing the range estimation performance. To overcome this challenge, we first analyze the statistical characteristics of the random ACF under the symbol-wise pulse shaping (SWPS) regime. As a step further, we formulate an optimization problem to design ISAC pulse shaping filters, which minimizes the average integrated sidelobe level ratio (ISLR) while meeting the Nyquist criterion, subject to power and bandwidth constraints. We then show that the problem can be recast as a convex quadratic program by expressing it in the frequency domain, which can be readily solved through standard tools. Numerical results demonstrate that the proposed pulse shaping design achieves substantial ranging sidelobe reduction compared to the celebrated root-raised cosine (RRC) pulse shaping, given that the communication throughput is unchanged.
- Published
- 2024
29. Behavior-Contextualized Item Preference Modeling for Multi-Behavior Recommendation
- Author
-
Yan, Mingshi, Liu, Fan, Sun, Jing, Sun, Fuming, Cheng, Zhiyong, and Han, Yahong
- Subjects
Computer Science - Information Retrieval - Abstract
In recommender systems, multi-behavior methods have demonstrated their effectiveness in mitigating issues like data sparsity, a common challenge in traditional single-behavior recommendation approaches. These methods typically infer user preferences from various auxiliary behaviors and apply them to the target behavior for recommendations. However, this direct transfer can introduce noise to the target behavior in recommendation, due to variations in user attention across different behaviors. To address this issue, this paper introduces a novel approach, Behavior-Contextualized Item Preference Modeling (BCIPM), for multi-behavior recommendation. Our proposed Behavior-Contextualized Item Preference Network discerns and learns users' specific item preferences within each behavior. It then considers only those preferences relevant to the target behavior for final recommendations, significantly reducing noise from auxiliary behaviors. These auxiliary behaviors are utilized solely for training the network parameters, thereby refining the learning process without compromising the accuracy of the target behavior recommendations. To further enhance the effectiveness of BCIPM, we adopt a strategy of pre-training the initial embeddings. This step is crucial for enriching the item-aware preferences, particularly in scenarios where data related to the target behavior is sparse. Comprehensive experiments conducted on four real-world datasets demonstrate BCIPM's superior performance compared to several leading state-of-the-art models, validating the robustness and efficiency of our proposed approach., Comment: This paper has been accepted by SIGIR 2024
- Published
- 2024
30. Disentangled Cascaded Graph Convolution Networks for Multi-Behavior Recommendation
- Author
-
Cheng, Zhiyong, Dong, Jianhua, Liu, Fan, Zhu, Lei, Yang, Xun, and Wang, Meng
- Subjects
Computer Science - Information Retrieval - Abstract
Multi-behavioral recommender systems have emerged as a solution to address data sparsity and cold-start issues by incorporating auxiliary behaviors alongside target behaviors. However, existing models struggle to accurately capture varying user preferences across different behaviors and fail to account for diverse item preferences within behaviors. Various user preference factors (such as price or quality) entangled in the behavior may lead to sub-optimization problems. Furthermore, these models overlook the personalized nature of user behavioral preferences by employing uniform transformation networks for all users and items. To tackle these challenges, we propose the Disentangled Cascaded Graph Convolutional Network (Disen-CGCN), a novel multi-behavior recommendation model. Disen-CGCN employs disentangled representation techniques to effectively separate factors within user and item representations, ensuring their independence. In addition, it incorporates a multi-behavioral meta-network, enabling personalized feature transformation across user and item behaviors. Furthermore, an attention mechanism captures user preferences for different item factors within each behavior. By leveraging attention weights, we aggregate user and item embeddings separately for each behavior, computing preference scores that predict overall user preferences for items. Our evaluation on benchmark datasets demonstrates the superiority of Disen-CGCN over state-of-the-art models, showcasing an average performance improvement of 7.07% and 9.00% on respective datasets. These results highlight Disen-CGCN's ability to effectively leverage multi-behavioral data, leading to more accurate recommendations.
- Published
- 2024
31. Cluster-based Graph Collaborative Filtering
- Author
-
Liu, Fan, Zhao, Shuai, Cheng, Zhiyong, Nie, Liqiang, and Kankanhalli, Mohan
- Subjects
Computer Science - Information Retrieval ,H.3.3 - Abstract
Graph Convolution Networks (GCNs) have significantly succeeded in learning user and item representations for recommendation systems. The core of their efficacy is the ability to explicitly exploit the collaborative signals from both the first- and high-order neighboring nodes. However, most existing GCN-based methods overlook the multiple interests of users while performing high-order graph convolution. Thus, the noisy information from unreliable neighbor nodes (e.g., users with dissimilar interests) negatively impacts the representation learning of the target node. Additionally, conducting graph convolution operations without differentiating high-order neighbors suffers the over-smoothing issue when stacking more layers, resulting in performance degradation. In this paper, we aim to capture more valuable information from high-order neighboring nodes while avoiding noise for better representation learning of the target node. To achieve this goal, we propose a novel GCN-based recommendation model, termed Cluster-based Graph Collaborative Filtering (ClusterGCF). This model performs high-order graph convolution on cluster-specific graphs, which are constructed by capturing the multiple interests of users and identifying the common interests among them. Specifically, we design an unsupervised and optimizable soft node clustering approach to classify user and item nodes into multiple clusters. Based on the soft node clustering results and the topology of the user-item interaction graph, we assign the nodes with probabilities for different clusters to construct the cluster-specific graphs. To evaluate the effectiveness of ClusterGCF, we conducted extensive experiments on four publicly available datasets. Experimental results demonstrate that our model can significantly improve recommendation performance., Comment: Accepted by ACM TOIS
- Published
- 2024
32. Fundamental Limits of Communication-Assisted Sensing in ISAC Systems
- Author
-
Dong, Fuwang, Liu, Fan, Liu, Shihang, Xiong, Yifeng, Yuan, Weijie, and Cui, Yuanhao
- Subjects
Computer Science - Information Theory ,Electrical Engineering and Systems Science - Signal Processing - Abstract
In this paper, we introduce a novel communication-assisted sensing (CAS) framework that explores the potential coordination gains offered by the integrated sensing and communication technique. The CAS system endows users with beyond-line-of-the-sight sensing capabilities, supported by a dual-functional base station that enables simultaneous sensing and communication. To delve into the system's fundamental limits, we characterize the information-theoretic framework of the CAS system in terms of rate-distortion theory. We reveal the achievable overall distortion between the target's state and the reconstructions at the end-user, referred to as the sensing quality of service, within a special case where the distortion metric is separable for sensing and communication processes. As a case study, we employ a typical application to demonstrate distortion minimization under the ISAC signaling strategy, showcasing the potential of CAS in enhancing sensing capabilities., Comment: This paper has been accepted by ISIT. The updated version will be coming soon
- Published
- 2024
33. Restriction-induced time-dependent transcytolemmal water exchange: Revisiting the K\'arger exchange model
- Author
-
Shi, Diwei, Liu, Fan, Li, Sisi, Chen, Li, Jiang, Xiaoyu, Gore, John C., Zheng, Quanshui, Guo, Hua, and Xu, Junzhong
- Subjects
Physics - Medical Physics ,Physics - Biological Physics - Abstract
The K\"arger model and its derivatives have been widely used to incorporate transcytolemmal water exchange rate, an essential characteristic of living cells, into analyses of diffusion MRI (dMRI) signals from tissues. The K\"arger model consists of two homogeneous exchanging components coupled by an exchange rate constant and assumes measurements are made with sufficiently long diffusion time and slow water exchange. Despite successful applications, it remains unclear whether these assumptions are generally valid for practical dMRI sequences and biological tissues. In particular, barrier-induced restrictions to diffusion produce inhomogeneous magnetization distributions in relatively large-sized compartments such as cancer cells, violating the above assumptions. The effects of this inhomogeneity are usually overlooked. We performed computer simulations to quantify how restriction effects, which in images produce edge enhancements at compartment boundaries, influence different variants of the K\"arger-model. The results show that the edge enhancement effect will produce larger, time-dependent estimates of exchange rates in e.g., tumors with relatively large cell sizes (>10 {\mu}m), resulting in overestimations of water exchange as previously reported. Moreover, stronger diffusion gradients, longer diffusion gradient durations, and larger cell sizes, all cause more pronounced edge enhancement effects. This helps us to better understand the feasibility of the K\"arger model in estimating water exchange in different tissue types and provides useful guidance on signal acquisition methods that may mitigate the edge enhancement effect. This work also indicates the need to correct the overestimated transcytolemmal water exchange rates obtained assuming the K\"arger-model., Comment: 37 pages, 8 figures
- Published
- 2024
- Full Text
- View/download PDF
34. Efficient Global Algorithms for Transmit Beamforming Design in ISAC Systems
- Author
-
Wu, Jiageng, Wang, Zhiguo, Liu, Ya-Feng, and Liu, Fan
- Subjects
Mathematics - Optimization and Control - Abstract
In this paper, we propose a multi-input multi-output transmit beamforming optimization model for joint radar sensing and multi-user communications, where the design of the beamformers is formulated as an optimization problem whose objective is a weighted combination of the sum rate and the Cram\'{e}r-Rao bound, subject to the transmit power budget. Obtaining the global solution for the formulated nonconvex problem is a challenging task, since the sum-rate maximization problem itself (even without considering the sensing metric) is known to be NP-hard. The main contributions of this paper are threefold. Firstly, we derive an optimal closed-form solution to the formulated problem in the single-user case and the multi-user case where the channel vectors of different users are orthogonal. Secondly, for the general multi-user case, we propose a novel branch and bound (B\&B) algorithm based on the McCormick envelope relaxation. The proposed algorithm is guaranteed to find the globally optimal solution to the formulated problem. Thirdly, we design a graph neural network (GNN) based pruning policy to determine irrelevant nodes that can be directly pruned in the proposed B\&B algorithm, thereby significantly reducing the number of unnecessary enumerations therein and improving its computational efficiency. Simulation results show the efficiency of the proposed vanilla and GNN-based accelerated B\&B algorithms., Comment: Submitted for possible publication
- Published
- 2024
35. Waveform Design for Joint Communication and SAR Imaging Under Random Signaling
- Author
-
Zheng, Bowen and Liu, Fan
- Subjects
Electrical Engineering and Systems Science - Signal Processing - Abstract
Conventional synthetic aperture radar (SAR) imaging systems typically employ deterministic signal designs, which lack the capability to convey communication information and are thus not suitable for integrated sensing and communication (ISAC) scenarios. In this letter, we propose a joint communication and SAR imaging (JCASAR) system based on orthogonal frequency-division multiplexing (OFDM) signal with cyclic prefix (CP), which is capable of reconstructing the target profile while serving a communication user. In contrast to traditional matched filters, we propose a least squares (LS) estimator for range profiling. Then the SAR image is obtained followed by range cell migration correction (RCMC) and azimuth processing. By minimizing the mean squared error (MSE) of the proposed LS estimator, we investigate the optimal waveform design for SAR imaging, and JCASAR under random signaling, where power allocation strategies are conceived for Gaussian-distributed ISAC signals, in an effort to strike a flexible performance tradeoff between the communication and SAR imaging tasks. Numerical results are provided to validate the effectiveness of the proposed ISAC waveform design for JCASAR systems., Comment: 5 pages
- Published
- 2024
36. At least one in a dozen stars exhibits evidence of planetary ingestion
- Author
-
Liu, Fan, Ting, Yuan-Sen, Yong, David, Bitsch, Bertram, Karakas, Amanda, Murphy, Michael T., Joyce, Meridith, Dotter, Aaron, and Dai, Fei
- Subjects
Astrophysics - Solar and Stellar Astrophysics ,Astrophysics - Earth and Planetary Astrophysics - Abstract
Stellar chemical compositions can be altered by ingestion of planetary material and/or planet formation which removes refractory material from the proto-stellar disc. These "planet signatures" appear as correlations between elemental abundance differences and the dust condensation temperature. Detecting these planet signatures, however, is challenging due to unknown occurrence rates, small amplitudes, and heterogeneous star samples with large differences in stellar ages, and therefore stars born together (i.e., co-natal) with identical compositions can facilitate such detections. While previous spectroscopic studies were limited to small number of binary stars, the Gaia satellite provides new opportunities for detecting stellar chemical signatures of planets among co-moving pairs of stars confirmed to be co-natal. Here we report high-precision chemical abundances for a homogeneous sample of 91 co-natal pairs of stars with a well-defined selection function and identify at least seven new instances of planetary ingestion, corresponding to an occurrence rate of 8%. An independent Bayesian indicator is deployed, which can effectively disentangle the planet signatures from other factors, such as random abundance variation and atomic diffusion. Our study provides new evidence of planet signatures and facilitates a deeper understanding of the star-planet-chemistry connection by providing new observational constraints on the mechanisms of planet engulfment, formation and evolution., Comment: 29 pages, 11 figures. Author's submitted version before final edits. Published in Nature on March 21, 2024: https://www.nature.com/articles/s41586-024-07091-y
- Published
- 2024
- Full Text
- View/download PDF
37. Task-Based Quantizer Design for Sensing With Random Signals
- Author
-
Ruan, Hang and Liu, Fan
- Subjects
Computer Science - Information Theory ,Electrical Engineering and Systems Science - Signal Processing - Abstract
In integrated sensing and communication (ISAC) systems, random signaling is used to convey useful information as well as sense the environment. Such randomness poses challenges in various components in sensing signal processing. In this paper, we investigate quantizer design for sensing in ISAC systems. Unlike quantizers for channel estimation in massive multiple-input-multiple-out (MIMO) communication systems, sensing in ISAC systems needs to deal with random nonorthogonal transmitted signals rather than a fixed orthogonal pilot. Considering sensing performance and hardware implementation, we focus on task-based hardware-limited quantization with spatial analog combining. We propose two strategies of quantizer optimization, i.e., data-dependent (DD) and data-independent (DI). The former achieves optimized sensing performance with high implementation overhead. To reduce hardware complexity, the latter optimizes the quantizer with respect to the random signal from a stochastic perspective. We derive the optimal quantizers for both strategies and formulate an algorithm based on sample average approximation (SAA) to solve the optimization in the DI strategy. Numerical results show that the optimized quantizers outperform digital-only quantizers in terms of sensing performance. Additionally, the DI strategy, despite its lower computational complexity compared to the DD strategy, achieves near-optimal sensing performance.
- Published
- 2024
38. Deep Cooperation in ISAC System: Resource, Node and Infrastructure Perspectives
- Author
-
Wei, Zhiqing, Liu, Haotian, Feng, Zhiyong, Wu, Huici, Liu, Fan, Zhang, Qixun, and Du, Yucong
- Subjects
Electrical Engineering and Systems Science - Signal Processing - Abstract
With the emerging Integrated Sensing and Communication (ISAC) technique, exploiting the mobile communication system with multi-domain resources, multiple network elements, and large-scale infrastructures to realize cooperative sensing is a crucial approach satisfying the requirements of high-accuracy and large-scale sensing in IoE. In this article, the deep cooperation in ISAC system including three perspectives is investigated. In the microscopic perspective, namely, within a single node, the sensing information carried by time-frequency-space-code domain resources is processed, such as phase compensation, coherent accumulation and other operations, thereby improving the sensing accuracy. In the mesoscopic perspective, the sensing accuracy could be improved through the cooperation of multiple nodes. We explore various multi-node cooperative sensing scenarios and present the corresponding challenges and future research trends. In the macroscopic perspective, the massive number of infrastructures from the same operator or different operators could perform cooperative sensing to extend the sensing coverage and improve the sensing continuity. We investigate network architecture, target tracking methods, and the large-scale sensing assisted digital twin construction. Simulation results demonstrate the superiority of multi-nodes and multi-resources cooperative sensing over single resource or node sensing. This article may provide a deep and comprehensive view on the cooperative sensing in ISAC system to enhance the performance of sensing, supporting the applications of IoE., Comment: 8 pages and 6 figures, Accepted by IEEE Internet of Things Magazine
- Published
- 2024
39. Video security in logistics monitoring systems: a blockchain based secure storage and access control scheme
- Author
-
Chen, Zigang, Liu, Fan, Li, Danlong, Liu, Yuhong, Yang, Xingchun, and Zhu, Haihua
- Published
- 2024
- Full Text
- View/download PDF
40. Proteome-scale recombinant standards and a robust high-speed search engine to advance cross-linking MS-based interactomics
- Author
-
Clasen, Milan Avila, Ruwolt, Max, Wang, Cong, Ruta, Julia, Bogdanow, Boris, Kurt, Louise U., Zhang, Zehong, Wang, Shuai, Gozzo, Fabio C., Chen, Tao, Carvalho, Paulo C., Lima, Diogo Borges, and Liu, Fan
- Published
- 2024
- Full Text
- View/download PDF
41. Elongational Flow-induced Crystallization of Poly(L-lactic acid) Telechelic Ionomers
- Author
-
Liu, Fan, Huang, Shao-Yong, Tang, Jian, and Chen, Quan
- Published
- 2024
- Full Text
- View/download PDF
42. The Integrated Transcriptome Bioinformatics Analysis of Energy Metabolism-Related Profiles for Dorsal Root Ganglion of Neuropathic Pain
- Author
-
Chen, Yongmei, Liu, Fan, Shi, Shengnan, Xiao, Shugen, and Gong, Xingrui
- Published
- 2024
- Full Text
- View/download PDF
43. Extensive protein pyrophosphorylation revealed in human cell lines
- Author
-
Morgan, Jeremy A. M., Singh, Arpita, Kurz, Leonie, Nadler-Holly, Michal, Ruwolt, Max, Ganguli, Shubhra, Sharma, Sheenam, Penkert, Martin, Krause, Eberhard, Liu, Fan, Bhandari, Rashna, and Fiedler, Dorothea
- Published
- 2024
- Full Text
- View/download PDF
44. High-strength and high-toughness tannic acid-modified cellulose films for food preservation
- Author
-
Liu, Dongqi, Ma, Jifeng, Wang, Xi, and Liu, Fan
- Published
- 2024
- Full Text
- View/download PDF
45. Untypical Electrochemical Corrosion Behavior of High-Nitrogen Austenitic Stainless Steel: Non-Pitting in Transpassivation
- Author
-
Wang, Qisi, Wang, Qingchuan, Wang, Xingxing, Liu, Fan, and Yang, Ke
- Published
- 2024
- Full Text
- View/download PDF
46. Degradation of Bisphenols by Micro-Nano Bubbles Assisted Laccase: Kinetics, Michaelis–Menten Kinetics, Degradation Pathway, and Transformation Relationship
- Author
-
Wu, Hong, Liu, Jiongna, Zhou, Xing, Liu, Fan, Bai, Xiaoxia, Wang, Ruiqi, Xu, Hui, Tan, Lirong, and Zhang, Jie
- Published
- 2024
- Full Text
- View/download PDF
47. Enhanced Nitriding of 38CrMoAl Steels with Laser Vibrational Excitation of Ammonia
- Author
-
Fan, Lisha, Lv, Yifeng, Wu, Ling, Zhang, Shuowen, Wang, Tingbin, Liu, Fan, Ding, Xiaoyu, and Yao, Jianhua
- Published
- 2024
- Full Text
- View/download PDF
48. Enhancing pile bearing capacity estimation through random forest-based hybridization approach
- Author
-
Liu, Fan, Peng, Xiongzhi, Su, Pingyu, Yang, Fuzhong, and Li, Kun
- Published
- 2024
- Full Text
- View/download PDF
49. Sensing Mutual Information with Random Signals in Gaussian Channels: Bridging Sensing and Communication Metrics
- Author
-
Xie, Lei, Liu, Fan, Luo, Jiajin, and Song, Shenghui
- Subjects
Computer Science - Information Theory ,Electrical Engineering and Systems Science - Signal Processing - Abstract
Sensing performance is typically evaluated by classical radar metrics, such as Cramer-Rao bound and signal-to-clutter-plus-noise ratio. The recent development of the integrated sensing and communication (ISAC) framework motivated the efforts to unify the performance metric for sensing and communication, where mutual information (MI) was proposed as a sensing performance metric with deterministic signals. However, the need of communication in ISAC systems necessitates the transmission of random signals for sensing applications, whereas an explicit evaluation for the sensing mutual information (SMI) with random signals is not yet available in the literature. This paper aims to fill the research gap and investigate the unification of sensing and communication performance metrics. For that purpose, we first derive the explicit expression for the SMI with random signals utilizing random matrix theory. On top of that, we further build up the connections between SMI and traditional sensing metrics, such as ergodic minimum mean square error (EMMSE), ergodic linear minimum mean square error (ELMMSE), and ergodic Bayesian Cram\'{e}r-Rao bound (EBCRB). Such connections open up the opportunity to unify sensing and communication performance metrics, which facilitates the analysis and design for ISAC systems. Finally, SMI is utilized to optimize the precoder for both sensing-only and ISAC applications. Simulation results validate the accuracy of the theoretical results and the effectiveness of the proposed precoding designs., Comment: arXiv admin note: substantial text overlap with arXiv:2311.07081
- Published
- 2024
50. Secure ISAC MIMO Systems: Exploiting Interference With Bayesian Cram\'er-Rao Bound Optimization
- Author
-
Su, Nanchi, Liu, Fan, Masouros, Christos, Alexandropoulos, George C., Xiong, Yifeng, and Zhang, Qinyu
- Subjects
Computer Science - Information Theory ,Electrical Engineering and Systems Science - Signal Processing - Abstract
In this paper, we present a signaling design for secure integrated sensing and communication (ISAC) systems comprising a dual-functional multi-input multi-output (MIMO) base station (BS) that simultaneously communicates with multiple users while detecting targets present in their vicinity, which are regarded as potential eavesdroppers. In particular, assuming that the distribution of each parameter to be estimated is known \textit{a priori}, we focus on optimizing the targets' sensing performance. To this end, we derive and minimize the Bayesian Cram\'er-Rao bound (BCRB), while ensuring certain communication quality of service (QoS) by exploiting constructive interference (CI). The latter scheme enforces that the received signals at the eavesdropping targets fall into the destructive region of the signal constellation, to deteriorate their decoding probability, thus enhancing the ISAC's system physical-layer security (PLS) capability. To tackle the nonconvexity of the formulated problem, a tailored successive convex approximation method is proposed for its efficient solution. Our extensive numerical results verify the effectiveness of the proposed secure ISAC design showing that the proposed algorithm outperforms block-level precoding techniques., Comment: 6 pages, 4 figures, submitted for journal publication
- Published
- 2024
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.