-
Large matchings and nearly spanning, nearly regular subgraphs of random subgraphs
Authors:
Sahar Diskin,
Joshua Erde,
Mihyun Kang,
Michael Krivelevich
Abstract:
Given a graph $G$ and $p\in [0,1]$, the random subgraph $G_p$ is obtained by retaining each edge of $G$ independently with probability $p$. We show that for every $ε>0$, there exists a constant $C>0$ such that the following holds. Let $d\ge C$ be an integer, let $G$ be a $d$-regular graph and let $p\ge \frac{C}{d}$. Then, with probability tending to one as $|V(G)|$ tends to infinity, there exists…
▽ More
Given a graph $G$ and $p\in [0,1]$, the random subgraph $G_p$ is obtained by retaining each edge of $G$ independently with probability $p$. We show that for every $ε>0$, there exists a constant $C>0$ such that the following holds. Let $d\ge C$ be an integer, let $G$ be a $d$-regular graph and let $p\ge \frac{C}{d}$. Then, with probability tending to one as $|V(G)|$ tends to infinity, there exists a matching in $G_p$ covering at least $(1-ε)|V(G)|$ vertices.
We further show that for a wide family of $d$-regular graphs $G$, which includes the $d$-dimensional hypercube, for any $p\ge \frac{\log^5d}{d}$ with probability tending to one as $d$ tends to infinity, $G_p$ contains an induced subgraph on at least $(1-o(1))|V(G)|$ vertices, whose degrees are tightly concentrated around the expected average degree $dp$.
△ Less
Submitted 23 July, 2024;
originally announced July 2024.
-
Token-Picker: Accelerating Attention in Text Generation with Minimized Memory Transfer via Probability Estimation
Authors:
Junyoung Park,
Myeonggu Kang,
Yunki Han,
Yanggon Kim,
Jaekang Shin,
Lee-Sup Kim
Abstract:
The attention mechanism in text generation is memory-bounded due to its sequential characteristics. Therefore, off-chip memory accesses should be minimized for faster execution. Although previous methods addressed this by pruning unimportant tokens, they fall short in selectively removing tokens with near-zero attention probabilities in each instance. Our method estimates the probability before th…
▽ More
The attention mechanism in text generation is memory-bounded due to its sequential characteristics. Therefore, off-chip memory accesses should be minimized for faster execution. Although previous methods addressed this by pruning unimportant tokens, they fall short in selectively removing tokens with near-zero attention probabilities in each instance. Our method estimates the probability before the softmax function, effectively removing low probability tokens and achieving an 12.1x pruning ratio without fine-tuning. Additionally, we present a hardware design supporting seamless on-demand off-chip access. Our approach shows 2.6x reduced memory accesses, leading to an average 2.3x speedup and a 2.4x energy efficiency.
△ Less
Submitted 21 July, 2024;
originally announced July 2024.
-
V2X-M2C: Efficient Multi-Module Collaborative Perception with Two Connections
Authors:
Hyunchul Bae,
Minhee Kang,
Heejin Ahn
Abstract:
In this paper, we investigate improving the perception performance of autonomous vehicles through communication with other vehicles and road infrastructures. To this end, we introduce a collaborative perception model $\textbf{V2X-M2C}$, consisting of multiple modules, each generating inter-agent complementary information, spatial global context, and spatial local information. Inspired by the quest…
▽ More
In this paper, we investigate improving the perception performance of autonomous vehicles through communication with other vehicles and road infrastructures. To this end, we introduce a collaborative perception model $\textbf{V2X-M2C}$, consisting of multiple modules, each generating inter-agent complementary information, spatial global context, and spatial local information. Inspired by the question of why most existing architectures are sequential, we analyze both the $\textit{sequential}$ and $\textit{parallel}$ connections of the modules. The sequential connection synergizes the modules, whereas the parallel connection independently improves each module. Extensive experiments demonstrate that V2X-M2C achieves state-of-the-art perception performance, increasing the detection accuracy by 8.00% to 10.87% and decreasing the FLOPs by 42.81% to 52.64%.
△ Less
Submitted 16 July, 2024;
originally announced July 2024.
-
Virtual Personas for Language Models via an Anthology of Backstories
Authors:
Suhong Moon,
Marwa Abdulhai,
Minwoo Kang,
Joseph Suh,
Widyadewi Soedarmadji,
Eran Kohen Behar,
David M. Chan
Abstract:
Large language models (LLMs) are trained from vast repositories of text authored by millions of distinct authors, reflecting an enormous diversity of human traits. While these models bear the potential to be used as approximations of human subjects in behavioral studies, prior efforts have been limited in steering model responses to match individual human users. In this work, we introduce "Antholo…
▽ More
Large language models (LLMs) are trained from vast repositories of text authored by millions of distinct authors, reflecting an enormous diversity of human traits. While these models bear the potential to be used as approximations of human subjects in behavioral studies, prior efforts have been limited in steering model responses to match individual human users. In this work, we introduce "Anthology", a method for conditioning LLMs to particular virtual personas by harnessing open-ended life narratives, which we refer to as "backstories." We show that our methodology enhances the consistency and reliability of experimental outcomes while ensuring better representation of diverse sub-populations. Across three nationally representative human surveys conducted as part of Pew Research Center's American Trends Panel (ATP), we demonstrate that Anthology achieves up to 18% improvement in matching the response distributions of human respondents and 27% improvement in consistency metrics. Our code and generated backstories are available at https://github.com/CannyLab/anthology.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
$R^2$-Guard: Robust Reasoning Enabled LLM Guardrail via Knowledge-Enhanced Logical Reasoning
Authors:
Mintong Kang,
Bo Li
Abstract:
As LLMs become increasingly prevalent across various applications, it is critical to establish safety guardrails to moderate input/output content of LLMs. Existing guardrail models treat various safety categories independently and fail to explicitly capture the intercorrelations among them. This has led to limitations such as ineffectiveness due to inadequate training on long-tail data from correl…
▽ More
As LLMs become increasingly prevalent across various applications, it is critical to establish safety guardrails to moderate input/output content of LLMs. Existing guardrail models treat various safety categories independently and fail to explicitly capture the intercorrelations among them. This has led to limitations such as ineffectiveness due to inadequate training on long-tail data from correlated safety categories, susceptibility to jailbreaking attacks, and inflexibility regarding new safety categories. To address these limitations, we propose $R^2$-Guard, a robust reasoning enabled LLM guardrail via knowledge-enhanced logical reasoning. Specifically, $R^2$-Guard comprises two parts: data-driven category-specific learning and reasoning components. The data-driven guardrail models provide unsafety probabilities of moderated content on different safety categories. We then encode safety knowledge among different categories as first-order logical rules and embed them into a probabilistic graphic model (PGM) based reasoning component. The unsafety probabilities of different categories from data-driven guardrail models are sent to the reasoning component for final inference. We employ two types of PGMs: Markov logic networks (MLNs) and probabilistic circuits (PCs), and optimize PCs to achieve precision-efficiency balance via improved graph structure. To further perform stress tests for guardrail models, we employ a pairwise construction method to construct a new safety benchmark TwinSafety, which features principled categories. We demonstrate the effectiveness of $R^2$-Guard by comparisons with eight strong guardrail models on six safety benchmarks, and demonstrate the robustness of $R^2$-Guard against four SOTA jailbreaking attacks. $R^2$-Guard significantly surpasses SOTA method LlamaGuard by 30.2% on ToxicChat and by 59.5% against jailbreaking attacks.
△ Less
Submitted 7 July, 2024;
originally announced July 2024.
-
Cactus: Towards Psychological Counseling Conversations using Cognitive Behavioral Theory
Authors:
Suyeon Lee,
Sunghwan Kim,
Minju Kim,
Dongjin Kang,
Dongil Yang,
Harim Kim,
Minseok Kang,
Dayi Jung,
Min Hee Kim,
Seungbeen Lee,
Kyoung-Mee Chung,
Youngjae Yu,
Dongha Lee,
Jinyoung Yeo
Abstract:
Recently, the demand for psychological counseling has significantly increased as more individuals express concerns about their mental health. This surge has accelerated efforts to improve the accessibility of counseling by using large language models (LLMs) as counselors. To ensure client privacy, training open-source LLMs faces a key challenge: the absence of realistic counseling datasets. To add…
▽ More
Recently, the demand for psychological counseling has significantly increased as more individuals express concerns about their mental health. This surge has accelerated efforts to improve the accessibility of counseling by using large language models (LLMs) as counselors. To ensure client privacy, training open-source LLMs faces a key challenge: the absence of realistic counseling datasets. To address this, we introduce Cactus, a multi-turn dialogue dataset that emulates real-life interactions using the goal-oriented and structured approach of Cognitive Behavioral Therapy (CBT). We create a diverse and realistic dataset by designing clients with varied, specific personas, and having counselors systematically apply CBT techniques in their interactions. To assess the quality of our data, we benchmark against established psychological criteria used to evaluate real counseling sessions, ensuring alignment with expert evaluations. Experimental results demonstrate that Camel, a model trained with Cactus, outperforms other models in counseling skills, highlighting its effectiveness and potential as a counseling agent. We make our data, model, and code publicly available.
△ Less
Submitted 3 July, 2024;
originally announced July 2024.
-
Spatio-Temporal Graphical Counterfactuals: An Overview
Authors:
Mingyu Kang,
Duxin Chen,
Ziyuan Pu,
Jianxi Gao,
Wenwu Yu
Abstract:
Counterfactual thinking is a critical yet challenging topic for artificial intelligence to learn knowledge from data and ultimately improve their performances for new scenarios. Many research works, including Potential Outcome Model and Structural Causal Model, have been proposed to realize it. However, their modelings, theoretical foundations and application approaches are usually different. More…
▽ More
Counterfactual thinking is a critical yet challenging topic for artificial intelligence to learn knowledge from data and ultimately improve their performances for new scenarios. Many research works, including Potential Outcome Model and Structural Causal Model, have been proposed to realize it. However, their modelings, theoretical foundations and application approaches are usually different. Moreover, there is a lack of graphical approach to infer spatio-temporal counterfactuals, that considers spatial and temporal interactions between multiple units. Thus, in this work, our aim is to investigate a survey to compare and discuss different counterfactual models, theories and approaches, and further build a unified graphical causal frameworks to infer the spatio-temporal counterfactuals.
△ Less
Submitted 1 July, 2024;
originally announced July 2024.
-
Orbital Torque in Rare-Earth Transition-Metal Ferrimagnets
Authors:
Shilei Ding,
Min-Gu Kang,
William Legrand,
Pietro Gambardella
Abstract:
Orbital currents have recently emerged as a promising tool to achieve electrical control of the magnetization in thin-film ferromagnets. Efficient orbital-to-spin conversion is required in order to torque the magnetization. Here we show that the injection of an orbital current in a ferrimagnetic GdyCo100-y alloy generates strong orbital torques whose sign and magnitude can be tuned by changing the…
▽ More
Orbital currents have recently emerged as a promising tool to achieve electrical control of the magnetization in thin-film ferromagnets. Efficient orbital-to-spin conversion is required in order to torque the magnetization. Here we show that the injection of an orbital current in a ferrimagnetic GdyCo100-y alloy generates strong orbital torques whose sign and magnitude can be tuned by changing the Gd content and temperature. The effective spin-orbital Hall angle reaches up to -0.25 in a GdyCo100-y/CuOx bilayer compared to +0.03 in Co/CuOx and +0.13 in GdyCo100-y/Pt. This behavior is attributed to the local orbital-to-spin conversion taking place at the Gd sites, which is about five times stronger and of the opposite sign relative to Co. Furthermore, we observe a manyfold increase in the net orbital torque at low temperature, which we attribute to the improved conversion efficiency following the magnetic ordering of the Gd and Co sublattices.
△ Less
Submitted 28 June, 2024;
originally announced June 2024.
-
Universal behaviour of majority bootstrap percolation on high-dimensional geometric graphs
Authors:
Maurício Collares,
Joshua Erde,
Anna Geisler,
Mihyun Kang
Abstract:
Majority bootstrap percolation is a monotone cellular automata that can be thought of as a model of infection spreading in networks. Starting with an initially infected set, new vertices become infected once more than half of their neighbours are infected. The average case behaviour of this process was studied on the $n$-dimensional hypercube by Balogh, Bollobás and Morris, who showed that there i…
▽ More
Majority bootstrap percolation is a monotone cellular automata that can be thought of as a model of infection spreading in networks. Starting with an initially infected set, new vertices become infected once more than half of their neighbours are infected. The average case behaviour of this process was studied on the $n$-dimensional hypercube by Balogh, Bollobás and Morris, who showed that there is a phase transition as the typical density of the initially infected set increases: For small enough densities the spread of infection is typically local, whereas for large enough densities typically the whole graph eventually becomes infected. Perhaps surprisingly, they showed that the critical window in which this phase transition occurs is bounded away from $1/2$, and they gave bounds on its width on a finer scale. In this paper we consider the majority bootstrap percolation process on a class of high-dimensional geometric graphs which includes many of the graph families on which percolation processes are typically considered, such as grids, tori and Hamming graphs, as well as other well-studied families of graphs such as (bipartite) Kneser graphs, including the odd graph and the middle layer graph. We show similar quantitative behaviour in terms of the location and width of the critical window for the majority bootstrap percolation process on this class of graphs.
△ Less
Submitted 25 June, 2024;
originally announced June 2024.
-
ManWav: The First Manchu ASR Model
Authors:
Jean Seo,
Minha Kang,
Sungjoo Byun,
Sangah Lee
Abstract:
This study addresses the widening gap in Automatic Speech Recognition (ASR) research between high resource and extremely low resource languages, with a particular focus on Manchu, a critically endangered language. Manchu exemplifies the challenges faced by marginalized linguistic communities in accessing state-of-the-art technologies. In a pioneering effort, we introduce the first-ever Manchu ASR…
▽ More
This study addresses the widening gap in Automatic Speech Recognition (ASR) research between high resource and extremely low resource languages, with a particular focus on Manchu, a critically endangered language. Manchu exemplifies the challenges faced by marginalized linguistic communities in accessing state-of-the-art technologies. In a pioneering effort, we introduce the first-ever Manchu ASR model ManWav, leveraging Wav2Vec2-XLSR-53. The results of the first Manchu ASR is promising, especially when trained with our augmented data. Wav2Vec2-XLSR-53 fine-tuned with augmented data demonstrates a 0.02 drop in CER and 0.13 drop in WER compared to the same base model fine-tuned with original data.
△ Less
Submitted 19 June, 2024;
originally announced June 2024.
-
Bootstrap percolation on the high-dimensional Hamming graph
Authors:
Mihyun Kang,
Michael Missethan,
Dominik Schmid
Abstract:
In the random $r$-neighbour bootstrap percolation process on a graph $G$, a set of initially infected vertices is chosen at random by retaining each vertex of $G$ independently with probability $p\in (0,1)$, and "healthy" vertices get infected in subsequent rounds if they have at least $r$ infected neighbours. A graph $G$ \emph{percolates} if every vertex becomes eventually infected. A central pro…
▽ More
In the random $r$-neighbour bootstrap percolation process on a graph $G$, a set of initially infected vertices is chosen at random by retaining each vertex of $G$ independently with probability $p\in (0,1)$, and "healthy" vertices get infected in subsequent rounds if they have at least $r$ infected neighbours. A graph $G$ \emph{percolates} if every vertex becomes eventually infected. A central problem in this process is to determine the critical probability $p_c(G,r)$, at which the probability that $G$ percolates passes through one half. In this paper, we study random $2$-neighbour bootstrap percolation on the $n$-dimensional Hamming graph $\square_{i=1}^n K_k$, which is the graph obtained by taking the Cartesian product of $n$ copies of the complete graph $K_k$ on $k$ vertices. We extend a result of Balogh and Bollobás [Bootstrap percolation on the hypercube, Probab. Theory Related Fields. 134 (2006), no. 4, 624-648. MR2214907] about the asymptotic value of the critical probability $p_c(Q^n,2)$ for random $2$-neighbour bootstrap percolation on the $n$-dimensional hypercube $Q^n=\square_{i=1}^n K_2$ to the $n$-dimensional Hamming graph $\square_{i=1}^n K_k$, determining the asymptotic value of $p_c\left(\square_{i=1}^n K_k,2\right)$, up to multiplicative constants (when $n \rightarrow \infty$), for arbitrary $k \in \mathbb N$ satisfying $2 \leq k\leq 2^{\sqrt{n}}$.
△ Less
Submitted 19 June, 2024;
originally announced June 2024.
-
Long-time behavior toward composite wave of shocks for 3D barotropic navier-stokes system
Authors:
Moon-Jin Kang,
Hobin Lee
Abstract:
We consider the barotropic Navier-Stokes system in three space dimensions with periodic boundary condition in the transversal direction. We show the long-time behavior of the 3D barotropic Navier-Stokes flow perturbed from a composition of two shock waves with suitably small amplitudes. We prove that the perturbed Navier-Stokes flow converges, uniformly in space, towards a composition of two plana…
▽ More
We consider the barotropic Navier-Stokes system in three space dimensions with periodic boundary condition in the transversal direction. We show the long-time behavior of the 3D barotropic Navier-Stokes flow perturbed from a composition of two shock waves with suitably small amplitudes. We prove that the perturbed Navier-Stokes flow converges, uniformly in space, towards a composition of two planar viscous shock waves as time goes to infinity, up to dynamical shifts. This is the first result on time-asymptotic stability of composite wave of two shocks for multi-D Navier-Stokes system. The main part of proof is based on the method of a-contraction with shifts.
△ Less
Submitted 17 June, 2024;
originally announced June 2024.
-
Constraints on Ultra Heavy Dark Matter Properties from Dwarf Spheroidal Galaxies with LHAASO Observations
Authors:
Zhen Cao,
F. Aharonian,
Q. An,
Axikegu,
Y. X. Bai,
Y. W. Bao,
D. Bastieri,
X. J. Bi,
Y. J. Bi,
J. T. Cai,
Q. Cao,
W. Y. Cao,
Zhe Cao,
J. Chang,
J. F. Chang,
A. M. Chen,
E. S. Chen,
Liang Chen,
Lin Chen,
Long Chen,
M. J. Chen,
M. L. Chen,
Q. H. Chen,
S. H. Chen,
S. Z. Chen
, et al. (255 additional authors not shown)
Abstract:
In this work we try to search for signals generated by ultra-heavy dark matter at the Large High Altitude Air Shower Observatory (LHAASO) data. We look for possible gamma-ray by dark matter annihilation or decay from 16 dwarf spheroidal galaxies in the field of view of LHAASO. Dwarf spheroidal galaxies are among the most promising targets for indirect detection of dark matter which have low fluxes…
▽ More
In this work we try to search for signals generated by ultra-heavy dark matter at the Large High Altitude Air Shower Observatory (LHAASO) data. We look for possible gamma-ray by dark matter annihilation or decay from 16 dwarf spheroidal galaxies in the field of view of LHAASO. Dwarf spheroidal galaxies are among the most promising targets for indirect detection of dark matter which have low fluxes of astrophysical $γ$-ray background while large amount of dark matter. By analyzing more than 700 days observational data at LHAASO, no significant dark matter signal from 1 TeV to 1 EeV is detected. Accordingly we derive the most stringent constraints on the ultra-heavy dark matter annihilation cross-section up to EeV. The constraints on the lifetime of dark matter in decay mode are also derived.
△ Less
Submitted 12 June, 2024;
originally announced June 2024.
-
Evidence of surface $p$-wave superconductivity and higher-order topology in MoTe$_2$
Authors:
Sangyun Lee,
Myungjun Kang,
Duk Y. Kim,
Jihyun Kim,
Suyeon Cho,
Sangmo Cheon,
Tuson Park
Abstract:
Exploration of nontrivial superconductivity and electronic band topology is at the core of condensed matter physics and applications to quantum information. The transition-metal dichalcogenide (TMDC) MoTe$_2$ has been proposed as an ideal candidate to explore the interplay between topology and superconductivity, but their studies remain limited because of the high-pressure environments required to…
▽ More
Exploration of nontrivial superconductivity and electronic band topology is at the core of condensed matter physics and applications to quantum information. The transition-metal dichalcogenide (TMDC) MoTe$_2$ has been proposed as an ideal candidate to explore the interplay between topology and superconductivity, but their studies remain limited because of the high-pressure environments required to control the topological phase transition. In this work, we demonstrate the tunable superconductivity and the resultant higher-order topology of MoTe$_2$ under extreme pressure. In the pressured T$_d$ phase, Andreev reflection spectroscopy reveals two-gap features, indicating that the Weyl fermions lead to a topological $s^{\pm}$-wave multigap superconductivity. On the other hand, the high-pressure 1T$'$ phase presents $p$-wave surface superconductivity emergent from the second-order topological bands via the bulk-to-surface proximity effect. Our analysis suggests that the topological hinge states generated from second-order topological bands evolve into zero-energy Majorana hinge states in the second-order topological superconductor. These results demonstrate the potential realization of topological superconductivity in MoTe$_2$, thus opening a pathway for studying various topological natures of TMDC materials.
△ Less
Submitted 11 June, 2024;
originally announced June 2024.
-
FLEUR: An Explainable Reference-Free Evaluation Metric for Image Captioning Using a Large Multimodal Model
Authors:
Yebin Lee,
Imseong Park,
Myungjoo Kang
Abstract:
Most existing image captioning evaluation metrics focus on assigning a single numerical score to a caption by comparing it with reference captions. However, these methods do not provide an explanation for the assigned score. Moreover, reference captions are expensive to acquire. In this paper, we propose FLEUR, an explainable reference-free metric to introduce explainability into image captioning…
▽ More
Most existing image captioning evaluation metrics focus on assigning a single numerical score to a caption by comparing it with reference captions. However, these methods do not provide an explanation for the assigned score. Moreover, reference captions are expensive to acquire. In this paper, we propose FLEUR, an explainable reference-free metric to introduce explainability into image captioning evaluation metrics. By leveraging a large multimodal model, FLEUR can evaluate the caption against the image without the need for reference captions, and provide the explanation for the assigned score. We introduce score smoothing to align as closely as possible with human judgment and to be robust to user-defined grading criteria. FLEUR achieves high correlations with human judgment across various image captioning evaluation benchmarks and reaches state-of-the-art results on Flickr8k-CF, COMPOSITE, and Pascal-50S within the domain of reference-free evaluation metrics. Our source code and results are publicly available at: https://github.com/Yebin46/FLEUR.
△ Less
Submitted 9 June, 2024;
originally announced June 2024.
-
Traveling Wave Solutions to Brenner-Navier-Stokes-Fourier system
Authors:
Saehoon Eo,
Namhyun Eun,
Moon-Jin Kang,
HyeonSeop Oh
Abstract:
As a continuum model for compressible fluid flows, Howard Brenner proposed the so-called Brenner-Navier-Stokes-Fourier(BNSF) system that improves some flaws of the Navier-Stokes-Fourier(NSF) system. For BNSF system, the volume velocity concept is introduced and is far different from the mass velocity of NSF, since the density of a compressible fluid is inhomogeneous. Although BNSF was introduced m…
▽ More
As a continuum model for compressible fluid flows, Howard Brenner proposed the so-called Brenner-Navier-Stokes-Fourier(BNSF) system that improves some flaws of the Navier-Stokes-Fourier(NSF) system. For BNSF system, the volume velocity concept is introduced and is far different from the mass velocity of NSF, since the density of a compressible fluid is inhomogeneous. Although BNSF was introduced more than ten years ago, the mathematical study on BNSF is still in its infancy. We consider the BNSF system in the Lagrangian mass coordinates. We prove the existence and uniqueness of monotone traveling wave solutions to the BNSF system. We also present some quantitative estimates for them.
△ Less
Submitted 9 June, 2024;
originally announced June 2024.
-
Certifiably Byzantine-Robust Federated Conformal Prediction
Authors:
Mintong Kang,
Zhen Lin,
Jimeng Sun,
Cao Xiao,
Bo Li
Abstract:
Conformal prediction has shown impressive capacity in constructing statistically rigorous prediction sets for machine learning models with exchangeable data samples. The siloed datasets, coupled with the escalating privacy concerns related to local data sharing, have inspired recent innovations extending conformal prediction into federated environments with distributed data samples. However, this…
▽ More
Conformal prediction has shown impressive capacity in constructing statistically rigorous prediction sets for machine learning models with exchangeable data samples. The siloed datasets, coupled with the escalating privacy concerns related to local data sharing, have inspired recent innovations extending conformal prediction into federated environments with distributed data samples. However, this framework for distributed uncertainty quantification is susceptible to Byzantine failures. A minor subset of malicious clients can significantly compromise the practicality of coverage guarantees. To address this vulnerability, we introduce a novel framework Rob-FCP, which executes robust federated conformal prediction, effectively countering malicious clients capable of reporting arbitrary statistics with the conformal calibration process. We theoretically provide the conformal coverage bound of Rob-FCP in the Byzantine setting and show that the coverage of Rob-FCP is asymptotically close to the desired coverage level. We also propose a malicious client number estimator to tackle a more challenging setting where the number of malicious clients is unknown to the defender and theoretically shows its effectiveness. We empirically demonstrate the robustness of Rob-FCP against diverse proportions of malicious clients under a variety of Byzantine attacks on five standard benchmark and real-world healthcare datasets.
△ Less
Submitted 4 June, 2024;
originally announced June 2024.
-
Sub-symmetry Protected Topology in Topological Insulators and Superconductors
Authors:
Myungjun Kang,
Mingyu Lee,
Sangmo Cheon
Abstract:
Exploration of topology protected by a certain symmetry is central in condensed matter physics. A recent idea of sub-symmetry-protected (SSP) topology--remains of a broken symmetry can still protect specific topological boundary states--has been developed and demonstrated in an optical system [Nat. Phys. 19, 992-998 (2023)]. Here, we extend this idea further by applying sub-symmetry-protecting per…
▽ More
Exploration of topology protected by a certain symmetry is central in condensed matter physics. A recent idea of sub-symmetry-protected (SSP) topology--remains of a broken symmetry can still protect specific topological boundary states--has been developed and demonstrated in an optical system [Nat. Phys. 19, 992-998 (2023)]. Here, we extend this idea further by applying sub-symmetry-protecting perturbation (SSPP) to one-dimensional topological insulating and superconducting systems using the Su-Schrieffer-Hegger (SSH) and Kitaev models. Using the tight-binding and low-energy effective theory, we show that the SSP boundary states retain topological properties while the SSPP results in the asymmetry of boundary states. For the SSH model, an SSP zero-energy edge state localized on one edge possesses quantized polarization. In contrast, the other edge state is perturbed to have non-zero energy, and its polarization is not quantized. For topological superconductors, zero-energy SSP Majorana boundary states for spinful Kitaev models emerge on only one edge, contrary to the conventional belief that Majorana fermions emerge at opposite edges. Our findings can be used as a platform to expand our understanding of topological materials as they broaden our understanding of the symmetry in a topological system and a method to engineer Majorana fermions.
△ Less
Submitted 3 June, 2024;
originally announced June 2024.
-
Subject-Adaptive Transfer Learning Using Resting State EEG Signals for Cross-Subject EEG Motor Imagery Classification
Authors:
Sion An,
Myeongkyun Kang,
Soopil Kim,
Philip Chikontwe,
Li Shen,
Sang Hyun Park
Abstract:
Electroencephalography (EEG) motor imagery (MI) classification is a fundamental, yet challenging task due to the variation of signals between individuals i.e., inter-subject variability. Previous approaches try to mitigate this using task-specific (TS) EEG signals from the target subject in training. However, recording TS EEG signals requires time and limits its applicability in various fields. In…
▽ More
Electroencephalography (EEG) motor imagery (MI) classification is a fundamental, yet challenging task due to the variation of signals between individuals i.e., inter-subject variability. Previous approaches try to mitigate this using task-specific (TS) EEG signals from the target subject in training. However, recording TS EEG signals requires time and limits its applicability in various fields. In contrast, resting state (RS) EEG signals are a viable alternative due to ease of acquisition with rich subject information. In this paper, we propose a novel subject-adaptive transfer learning strategy that utilizes RS EEG signals to adapt models on unseen subject data. Specifically, we disentangle extracted features into task- and subject-dependent features and use them to calibrate RS EEG signals for obtaining task information while preserving subject characteristics. The calibrated signals are then used to adapt the model to the target subject, enabling the model to simulate processing TS EEG signals of the target subject. The proposed method achieves state-of-the-art accuracy on three public benchmarks, demonstrating the effectiveness of our method in cross-subject EEG MI classification. Our findings highlight the potential of leveraging RS EEG signals to advance practical brain-computer interface systems. The code is available at https://github.com/SionAn/MICCAI2024-ResTL.
△ Less
Submitted 9 July, 2024; v1 submitted 17 May, 2024;
originally announced May 2024.
-
TIE: Revolutionizing Text-based Image Editing for Complex-Prompt Following and High-Fidelity Editing
Authors:
Xinyu Zhang,
Mengxue Kang,
Fei Wei,
Shuang Xu,
Yuhe Liu,
Lin Ma
Abstract:
As the field of image generation rapidly advances, traditional diffusion models and those integrated with multimodal large language models (LLMs) still encounter limitations in interpreting complex prompts and preserving image consistency pre and post-editing. To tackle these challenges, we present an innovative image editing framework that employs the robust Chain-of-Thought (CoT) reasoning and l…
▽ More
As the field of image generation rapidly advances, traditional diffusion models and those integrated with multimodal large language models (LLMs) still encounter limitations in interpreting complex prompts and preserving image consistency pre and post-editing. To tackle these challenges, we present an innovative image editing framework that employs the robust Chain-of-Thought (CoT) reasoning and localizing capabilities of multimodal LLMs to aid diffusion models in generating more refined images. We first meticulously design a CoT process comprising instruction decomposition, region localization, and detailed description. Subsequently, we fine-tune the LISA model, a lightweight multimodal LLM, using the CoT process of Multimodal LLMs and the mask of the edited image. By providing the diffusion models with knowledge of the generated prompt and image mask, our models generate images with a superior understanding of instructions. Through extensive experiments, our model has demonstrated superior performance in image generation, surpassing existing state-of-the-art models. Notably, our model exhibits an enhanced ability to understand complex prompts and generate corresponding images, while maintaining high fidelity and consistency in images before and after generation.
△ Less
Submitted 26 May, 2024;
originally announced May 2024.
-
Quantum Simulation of Spin-Boson Models with Structured Bath
Authors:
Ke Sun,
Mingyu Kang,
Hanggai Nuomin,
George Schwartz,
David N. Beratan,
Kenneth R. Brown,
Jungsang Kim
Abstract:
The spin-boson model, involving spins interacting with a bath of quantum harmonic oscillators, is a widely used representation of open quantum systems. Trapped ions present a natural platform for simulating the quantum dynamics of such models, thanks to the presence of both high quality internal qubit states and the motional modes of the ions that can simulate the relevant quantum degrees of freed…
▽ More
The spin-boson model, involving spins interacting with a bath of quantum harmonic oscillators, is a widely used representation of open quantum systems. Trapped ions present a natural platform for simulating the quantum dynamics of such models, thanks to the presence of both high quality internal qubit states and the motional modes of the ions that can simulate the relevant quantum degrees of freedom. In our work, we extend the previous body of work that focused on coherent coupling of the spins and bosons to perform quantum simulations with structured dissipative baths using the motional states of trapped ions. We demonstrate the capability for adjusting the bath's temperature and continuous spectral density by adding randomness to fully programmable control parameters. Subsequently, we simulate the dynamics of various spin-boson models with noise spectral densities constructed from coupling to several dissipative harmonic oscillator modes. The experimental outcomes closely align with theoretical predictions, indicating successful simulation of open quantum systems using a trapped-ion system.
△ Less
Submitted 6 June, 2024; v1 submitted 23 May, 2024;
originally announced May 2024.
-
What is Your Data Worth to GPT? LLM-Scale Data Valuation with Influence Functions
Authors:
Sang Keun Choe,
Hwijeen Ahn,
Juhan Bae,
Kewen Zhao,
Minsoo Kang,
Youngseog Chung,
Adithya Pratapa,
Willie Neiswanger,
Emma Strubell,
Teruko Mitamura,
Jeff Schneider,
Eduard Hovy,
Roger Grosse,
Eric Xing
Abstract:
Large language models (LLMs) are trained on a vast amount of human-written data, but data providers often remain uncredited. In response to this issue, data valuation (or data attribution), which quantifies the contribution or value of each data to the model output, has been discussed as a potential solution. Nevertheless, applying existing data valuation methods to recent LLMs and their vast trai…
▽ More
Large language models (LLMs) are trained on a vast amount of human-written data, but data providers often remain uncredited. In response to this issue, data valuation (or data attribution), which quantifies the contribution or value of each data to the model output, has been discussed as a potential solution. Nevertheless, applying existing data valuation methods to recent LLMs and their vast training datasets has been largely limited by prohibitive compute and memory costs. In this work, we focus on influence functions, a popular gradient-based data valuation method, and significantly improve its scalability with an efficient gradient projection strategy called LoGra that leverages the gradient structure in backpropagation. We then provide a theoretical motivation of gradient projection approaches to influence functions to promote trust in the data valuation process. Lastly, we lower the barrier to implementing data valuation systems by introducing LogIX, a software package that can transform existing training code into data valuation code with minimal effort. In our data valuation experiments, LoGra achieves competitive accuracy against more expensive baselines while showing up to 6,500x improvement in throughput and 5x reduction in GPU memory usage when applied to Llama3-8B-Instruct and the 1B-token dataset.
△ Less
Submitted 22 May, 2024;
originally announced May 2024.
-
Data quality control system and long-term performance monitor of the LHAASO-KM2A
Authors:
Zhen Cao,
F. Aharonian,
Axikegu,
Y. X. Bai,
Y. W. Bao,
D. Bastieri,
X. J. Bi,
Y. J. Bi,
W. Bian,
A. V. Bukevich,
Q. Cao,
W. Y. Cao,
Zhe Cao,
J. Chang,
J. F. Chang,
A. M. Chen,
E. S. Chen,
H. X. Chen,
Liang Chen,
Lin Chen,
Long Chen,
M. J. Chen,
M. L. Chen,
Q. H. Chen,
S. Chen
, et al. (263 additional authors not shown)
Abstract:
The KM2A is the largest sub-array of the Large High Altitude Air Shower Observatory (LHAASO). It consists of 5216 electromagnetic particle detectors (EDs) and 1188 muon detectors (MDs). The data recorded by the EDs and MDs are used to reconstruct primary information of cosmic ray and gamma-ray showers. This information is used for physical analysis in gamma-ray astronomy and cosmic ray physics. To…
▽ More
The KM2A is the largest sub-array of the Large High Altitude Air Shower Observatory (LHAASO). It consists of 5216 electromagnetic particle detectors (EDs) and 1188 muon detectors (MDs). The data recorded by the EDs and MDs are used to reconstruct primary information of cosmic ray and gamma-ray showers. This information is used for physical analysis in gamma-ray astronomy and cosmic ray physics. To ensure the reliability of the LHAASO-KM2A data, a three-level quality control system has been established. It is used to monitor the status of detector units, stability of reconstructed parameters and the performance of the array based on observations of the Crab Nebula and Moon shadow. This paper will introduce the control system and its application on the LHAASO-KM2A data collected from August 2021 to July 2023. During this period, the pointing and angular resolution of the array were stable. From the observations of the Moon shadow and Crab Nebula, the results achieved using the two methods are consistent with each other. According to the observation of the Crab Nebula at energies from 25 TeV to 100 TeV, the time averaged pointing errors are estimated to be $-0.003^{\circ} \pm 0.005^{\circ}$ and $0.001^{\circ} \pm 0.006^{\circ}$ in the R.A. and Dec directions, respectively.
△ Less
Submitted 13 June, 2024; v1 submitted 20 May, 2024;
originally announced May 2024.
-
Discovery of Very-high-energy Gamma-ray Emissions from the Low Luminosity AGN NGC 4278 by LHAASO
Authors:
Zhen Cao,
F. Aharonian,
Q. An,
Axikegu,
Y. X. Bai,
Y. W. Bao,
D. Bastieri,
X. J. Bi,
Y. J. Bi,
J. T. Cai,
Q. Cao,
W. Y. Cao,
Zhe Cao,
J. Chang,
J. F. Chang,
A. M. Chen,
E. S. Chen,
Liang Chen,
Lin Chen,
Long Chen,
M. J. Chen,
M. L. Chen,
Q. H. Chen,
S. H. Chen,
S. Z. Chen
, et al. (255 additional authors not shown)
Abstract:
The first source catalog of Large High Altitude Air Shower Observatory reported the detection of a very-high-energy gamma ray source, 1LHAASO J1219+2915. In this paper a further detailed study of the spectral and temporal behavior of this point-like source have been carried. The best-fit position of the TeV source ($\rm{RA}=185.05^{\circ}\pm0.04^{\circ}$, $\rm{Dec}=29.25^{\circ}\pm0.03^{\circ}$) i…
▽ More
The first source catalog of Large High Altitude Air Shower Observatory reported the detection of a very-high-energy gamma ray source, 1LHAASO J1219+2915. In this paper a further detailed study of the spectral and temporal behavior of this point-like source have been carried. The best-fit position of the TeV source ($\rm{RA}=185.05^{\circ}\pm0.04^{\circ}$, $\rm{Dec}=29.25^{\circ}\pm0.03^{\circ}$) is compatible with NGC 4278 within $\sim0.03$ degree. Variation analysis shows an indication of the variability at a few months level in the TeV band, which is consistent with low frequency observations. Based on these observations, we report the detection of TeV $γ$-ray emissions from this low-luminosity AGN NGC 4278. The observations by LHAASO-WCDA during active period has a significance level of 8.8\,$σ$ with best-fit photon spectral index $\varGamma=2.56\pm0.14$ and a flux $f_{1-10\,\rm{TeV}}=(7.0\pm1.1_{\rm{sta}}\pm0.35_{\rm{syst}})\times10^{-13}\,\rm{photons\,cm^{-2}\,s^{-1}}$, or approximately $5\%$ of the Crab Nebula. The discovery of VHE from NGC 4278 indicates that the compact, weak radio jet can efficiently accelerate particles and emit TeV photons.
△ Less
Submitted 13 May, 2024;
originally announced May 2024.
-
Distilling Diffusion Models into Conditional GANs
Authors:
Minguk Kang,
Richard Zhang,
Connelly Barnes,
Sylvain Paris,
Suha Kwak,
Jaesik Park,
Eli Shechtman,
Jun-Yan Zhu,
Taesung Park
Abstract:
We propose a method to distill a complex multistep diffusion model into a single-step conditional GAN student model, dramatically accelerating inference, while preserving image quality. Our approach interprets diffusion distillation as a paired image-to-image translation task, using noise-to-image pairs of the diffusion model's ODE trajectory. For efficient regression loss computation, we propose…
▽ More
We propose a method to distill a complex multistep diffusion model into a single-step conditional GAN student model, dramatically accelerating inference, while preserving image quality. Our approach interprets diffusion distillation as a paired image-to-image translation task, using noise-to-image pairs of the diffusion model's ODE trajectory. For efficient regression loss computation, we propose E-LatentLPIPS, a perceptual loss operating directly in diffusion model's latent space, utilizing an ensemble of augmentations. Furthermore, we adapt a diffusion model to construct a multi-scale discriminator with a text alignment loss to build an effective conditional GAN-based formulation. E-LatentLPIPS converges more efficiently than many existing distillation methods, even accounting for dataset construction costs. We demonstrate that our one-step generator outperforms cutting-edge one-step diffusion distillation models -- DMD, SDXL-Turbo, and SDXL-Lightning -- on the zero-shot COCO benchmark.
△ Less
Submitted 17 July, 2024; v1 submitted 9 May, 2024;
originally announced May 2024.
-
Optimizing Hardware Resource Partitioning and Job Allocations on Modern GPUs under Power Caps
Authors:
Eishi Arima,
Minjoon Kang,
Issa Saba,
Josef Weidendorfer,
Carsten Trinitis,
Martin Schulz
Abstract:
CPU-GPU heterogeneous systems are now commonly used in HPC (High-Performance Computing). However, improving the utilization and energy-efficiency of such systems is still one of the most critical issues. As one single program typically cannot fully utilize all resources within a node/chip, co-scheduling (or co-locating) multiple programs with complementary resource requirements is a promising solu…
▽ More
CPU-GPU heterogeneous systems are now commonly used in HPC (High-Performance Computing). However, improving the utilization and energy-efficiency of such systems is still one of the most critical issues. As one single program typically cannot fully utilize all resources within a node/chip, co-scheduling (or co-locating) multiple programs with complementary resource requirements is a promising solution. Meanwhile, as power consumption has become the first-class design constraint for HPC systems, such co-scheduling techniques should be well-tailored for power-constrained environments. To this end, the industry recently started supporting hardware-level resource partitioning features on modern GPUs for realizing efficient co-scheduling, which can operate with existing power capping features. For example, NVidia's MIG (Multi-Instance GPU) partitions one single GPU into multiple instances at the granularity of a GPC (Graphics Processing Cluster). In this paper, we explicitly target the combination of hardware-level GPU partitioning features and power capping for power-constrained HPC systems. We provide a systematic methodology to optimize the combination of chip partitioning, job allocations, as well as power capping based on our scalability/interference modeling while taking a variety of aspects into account, such as compute/memory intensity and utilization in heterogeneous computational resources (e.g., Tensor Cores). The experimental result indicates that our approach is successful in selecting a near optimal combination across multiple different workloads.
△ Less
Submitted 6 May, 2024;
originally announced May 2024.
-
Asymptotic behavior toward viscous shock for impermeable wall and inflow problem of barotropic Navier-Stokes equations
Authors:
Xushan Huang,
Moon-Jin Kang,
Jeongho Kim,
Hobin Lee
Abstract:
We consider the compressible barotropic Navier-Stokes equations in a half-line and study the time-asymptotic behavior toward the outgoing viscous shock wave. Precisely, we consider the two boundary problems: impermeable wall and inflow problems, where the velocity at the boundary is given as a constant state. For both problems, when the asymptotic profile determined by the prescribed constant stat…
▽ More
We consider the compressible barotropic Navier-Stokes equations in a half-line and study the time-asymptotic behavior toward the outgoing viscous shock wave. Precisely, we consider the two boundary problems: impermeable wall and inflow problems, where the velocity at the boundary is given as a constant state. For both problems, when the asymptotic profile determined by the prescribed constant states at the boundary and far-fields is a viscous shock, we show that the solution asymptotically converges to the shifted viscous shock profiles uniformly in space, under the condition that initial perturbation is small enough in H1 norm. We do not impose the zero mass condition on initial data, which improves the previous results by Matsumura and Mei [20] for impermeable case, and by Huang, Matsumura and Shi [8] for inflow case. Moreover, for the inflow case, we remove the assumption in [8]. Our results are based on the method of a-contraction with shifts, as the first extension of the method to the boundary value problems.
△ Less
Submitted 6 May, 2024; v1 submitted 6 May, 2024;
originally announced May 2024.
-
Revealing and Utilizing In-group Favoritism for Graph-based Collaborative Filtering
Authors:
Hoin Jung,
Hyunsoo Cho,
Myungje Choi,
Joowon Lee,
Jung Ho Park,
Myungjoo Kang
Abstract:
When it comes to a personalized item recommendation system, It is essential to extract users' preferences and purchasing patterns. Assuming that users in the real world form a cluster and there is common favoritism in each cluster, in this work, we introduce Co-Clustering Wrapper (CCW). We compute co-clusters of users and items with co-clustering algorithms and add CF subnetworks for each cluster…
▽ More
When it comes to a personalized item recommendation system, It is essential to extract users' preferences and purchasing patterns. Assuming that users in the real world form a cluster and there is common favoritism in each cluster, in this work, we introduce Co-Clustering Wrapper (CCW). We compute co-clusters of users and items with co-clustering algorithms and add CF subnetworks for each cluster to extract the in-group favoritism. Combining the features from the networks, we obtain rich and unified information about users. We experimented real world datasets considering two aspects: Finding the number of groups divided according to in-group preference, and measuring the quantity of improvement of the performance.
△ Less
Submitted 23 April, 2024;
originally announced April 2024.
-
Neural Operators Learn the Local Physics of Magnetohydrodynamics
Authors:
Taeyoung Kim,
Youngsoo Ha,
Myungjoo Kang
Abstract:
Magnetohydrodynamics (MHD) plays a pivotal role in describing the dynamics of plasma and conductive fluids, essential for understanding phenomena such as the structure and evolution of stars and galaxies, and in nuclear fusion for plasma motion through ideal MHD equations. Solving these hyperbolic PDEs requires sophisticated numerical methods, presenting computational challenges due to complex str…
▽ More
Magnetohydrodynamics (MHD) plays a pivotal role in describing the dynamics of plasma and conductive fluids, essential for understanding phenomena such as the structure and evolution of stars and galaxies, and in nuclear fusion for plasma motion through ideal MHD equations. Solving these hyperbolic PDEs requires sophisticated numerical methods, presenting computational challenges due to complex structures and high costs. Recent advances introduce neural operators like the Fourier Neural Operator (FNO) as surrogate models for traditional numerical analyses. This study explores a modified Flux Fourier neural operator model to approximate the numerical flux of ideal MHD, offering a novel approach that outperforms existing neural operator models by enabling continuous inference, generalization outside sampled distributions, and faster computation compared to classical numerical schemes.
△ Less
Submitted 24 April, 2024;
originally announced April 2024.
-
Measure-valued death state and local sensitivity analysis for Winfree models with uncertain high-order couplings
Authors:
Seung-Yeal Ha,
Myeongju Kang,
Jaeyoung Yoon,
Mattia Zanella
Abstract:
We study the measure-valued death state and local sensitivity analysis of the Winfree model and its mean-field counterpart with uncertain high-order couplings. The Winfree model is the first mathematical model for synchronization, and it can cast as the effective approximation of the pulse-coupled model for synchronization, and it exhibits diverse asymptotic patterns depending on system parameters…
▽ More
We study the measure-valued death state and local sensitivity analysis of the Winfree model and its mean-field counterpart with uncertain high-order couplings. The Winfree model is the first mathematical model for synchronization, and it can cast as the effective approximation of the pulse-coupled model for synchronization, and it exhibits diverse asymptotic patterns depending on system parameters and initial data. For the proposed models, we present several frameworks leading to oscillator death in terms of system parameters and initial data, and the propagation of regularity in random space. We also present several numerical tests and compare them with analytical results.
△ Less
Submitted 22 April, 2024;
originally announced April 2024.
-
A Multimodal Feature Distillation with CNN-Transformer Network for Brain Tumor Segmentation with Incomplete Modalities
Authors:
Ming Kang,
Fung Fung Ting,
Raphaël C. -W. Phan,
Zongyuan Ge,
Chee-Ming Ting
Abstract:
Existing brain tumor segmentation methods usually utilize multiple Magnetic Resonance Imaging (MRI) modalities in brain tumor images for segmentation, which can achieve better segmentation performance. However, in clinical applications, some modalities are missing due to resource constraints, leading to severe degradation in the performance of methods applying complete modality segmentation. In th…
▽ More
Existing brain tumor segmentation methods usually utilize multiple Magnetic Resonance Imaging (MRI) modalities in brain tumor images for segmentation, which can achieve better segmentation performance. However, in clinical applications, some modalities are missing due to resource constraints, leading to severe degradation in the performance of methods applying complete modality segmentation. In this paper, we propose a Multimodal feature distillation with Convolutional Neural Network (CNN)-Transformer hybrid network (MCTSeg) for accurate brain tumor segmentation with missing modalities. We first design a Multimodal Feature Distillation (MFD) module to distill feature-level multimodal knowledge into different unimodality to extract complete modality information. We further develop a Unimodal Feature Enhancement (UFE) module to model the relationship between global and local information semantically. Finally, we build a Cross-Modal Fusion (CMF) module to explicitly align the global correlations among different modalities even when some modalities are missing. Complementary features within and across different modalities are refined via the CNN-Transformer hybrid architectures in both the UFE and CMF modules, where local and global dependencies are both captured. Our ablation study demonstrates the importance of the proposed modules with CNN-Transformer networks and the convolutional blocks in Transformer for improving the performance of brain tumor segmentation with missing modalities. Extensive experiments on the BraTS2018 and BraTS2020 datasets show that the proposed MCTSeg framework outperforms the state-of-the-art methods in missing modalities cases. Our code is available at: https://github.com/mkang315/MCTSeg.
△ Less
Submitted 22 April, 2024;
originally announced April 2024.
-
Diagnosis of Multiple Fundus Disorders Amidst a Scarcity of Medical Experts Via Self-supervised Machine Learning
Authors:
Yong Liu,
Mengtian Kang,
Shuo Gao,
Chi Zhang,
Ying Liu,
Shiming Li,
Yue Qi,
Arokia Nathan,
Wenjun Xu,
Chenyu Tang,
Edoardo Occhipinti,
Mayinuer Yusufu,
Ningli Wang,
Weiling Bai,
Luigi Occhipinti
Abstract:
Fundus diseases are major causes of visual impairment and blindness worldwide, especially in underdeveloped regions, where the shortage of ophthalmologists hinders timely diagnosis. AI-assisted fundus image analysis has several advantages, such as high accuracy, reduced workload, and improved accessibility, but it requires a large amount of expert-annotated data to build reliable models. To addres…
▽ More
Fundus diseases are major causes of visual impairment and blindness worldwide, especially in underdeveloped regions, where the shortage of ophthalmologists hinders timely diagnosis. AI-assisted fundus image analysis has several advantages, such as high accuracy, reduced workload, and improved accessibility, but it requires a large amount of expert-annotated data to build reliable models. To address this dilemma, we propose a general self-supervised machine learning framework that can handle diverse fundus diseases from unlabeled fundus images. Our method's AUC surpasses existing supervised approaches by 15.7%, and even exceeds performance of a single human expert. Furthermore, our model adapts well to various datasets from different regions, races, and heterogeneous image sources or qualities from multiple cameras or devices. Our method offers a label-free general framework to diagnose fundus diseases, which could potentially benefit telehealth programs for early screening of people at risk of vision loss.
△ Less
Submitted 23 April, 2024; v1 submitted 20 April, 2024;
originally announced April 2024.
-
SSVT: Self-Supervised Vision Transformer For Eye Disease Diagnosis Based On Fundus Images
Authors:
Jiaqi Wang,
Mengtian Kang,
Yong Liu,
Chi Zhang,
Ying Liu,
Shiming Li,
Yue Qi,
Wenjun Xu,
Chenyu Tang,
Edoardo Occhipinti,
Mayinuer Yusufu,
Ningli Wang,
Weiling Bai,
Shuo Gao,
Luigi G. Occhipinti
Abstract:
Machine learning-based fundus image diagnosis technologies trigger worldwide interest owing to their benefits such as reducing medical resource power and providing objective evaluation results. However, current methods are commonly based on supervised methods, bringing in a heavy workload to biomedical staff and hence suffering in expanding effective databases. To address this issue, in this artic…
▽ More
Machine learning-based fundus image diagnosis technologies trigger worldwide interest owing to their benefits such as reducing medical resource power and providing objective evaluation results. However, current methods are commonly based on supervised methods, bringing in a heavy workload to biomedical staff and hence suffering in expanding effective databases. To address this issue, in this article, we established a label-free method, name 'SSVT',which can automatically analyze un-labeled fundus images and generate high evaluation accuracy of 97.0% of four main eye diseases based on six public datasets and two datasets collected by Beijing Tongren Hospital. The promising results showcased the effectiveness of the proposed unsupervised learning method, and the strong application potential in biomedical resource shortage regions to improve global eye health.
△ Less
Submitted 20 April, 2024;
originally announced April 2024.
-
LHAASO-KM2A detector simulation using Geant4
Authors:
Zhen Cao,
F. Aharonian,
Q. An,
Axikegu,
Y. X. Bai,
Y. W. Bao,
D. Bastieri,
X. J. Bi,
Y. J. Bi,
J. T. Cai,
Q. Cao,
W. Y. Cao,
Zhe Cao,
J. Chang,
J. F. Chang,
A. M. Chen,
E. S. Chen,
Liang Chen,
Lin Chen,
Long Chen,
M. J. Chen,
M. L. Chen,
Q. H. Chen,
S. H. Chen,
S. Z. Chen
, et al. (254 additional authors not shown)
Abstract:
KM2A is one of the main sub-arrays of LHAASO, working on gamma ray astronomy and cosmic ray physics at energies above 10 TeV. Detector simulation is the important foundation for estimating detector performance and data analysis. It is a big challenge to simulate the KM2A detector in the framework of Geant4 due to the need to track numerous photons from a large number of detector units (>6000) with…
▽ More
KM2A is one of the main sub-arrays of LHAASO, working on gamma ray astronomy and cosmic ray physics at energies above 10 TeV. Detector simulation is the important foundation for estimating detector performance and data analysis. It is a big challenge to simulate the KM2A detector in the framework of Geant4 due to the need to track numerous photons from a large number of detector units (>6000) with large altitude difference (30 m) and huge coverage (1.3 km^2). In this paper, the design of the KM2A simulation code G4KM2A based on Geant4 is introduced. The process of G4KM2A is optimized mainly in memory consumption to avoid memory overffow. Some simpliffcations are used to signiffcantly speed up the execution of G4KM2A. The running time is reduced by at least 30 times compared to full detector simulation. The particle distributions and the core/angle resolution comparison between simulation and experimental data of the full KM2A array are also presented, which show good agreement.
△ Less
Submitted 7 April, 2024;
originally announced April 2024.
-
Stable Surface Regularization for Fast Few-Shot NeRF
Authors:
Byeongin Joung,
Byeong-Uk Lee,
Jaesung Choe,
Ukcheol Shin,
Minjun Kang,
Taeyeop Lee,
In So Kweon,
Kuk-Jin Yoon
Abstract:
This paper proposes an algorithm for synthesizing novel views under few-shot setup. The main concept is to develop a stable surface regularization technique called Annealing Signed Distance Function (ASDF), which anneals the surface in a coarse-to-fine manner to accelerate convergence speed. We observe that the Eikonal loss - which is a widely known geometric regularization - requires dense traini…
▽ More
This paper proposes an algorithm for synthesizing novel views under few-shot setup. The main concept is to develop a stable surface regularization technique called Annealing Signed Distance Function (ASDF), which anneals the surface in a coarse-to-fine manner to accelerate convergence speed. We observe that the Eikonal loss - which is a widely known geometric regularization - requires dense training signal to shape different level-sets of SDF, leading to low-fidelity results under few-shot training. In contrast, the proposed surface regularization successfully reconstructs scenes and produce high-fidelity geometry with stable training. Our method is further accelerated by utilizing grid representation and monocular geometric priors. Finally, the proposed approach is up to 45 times faster than existing few-shot novel view synthesis methods, and it produces comparable results in the ScanNet dataset and NeRF-Real dataset.
△ Less
Submitted 29 March, 2024;
originally announced March 2024.
-
Enabling Physical Localization of Uncooperative Cellular Devices
Authors:
Taekkyung Oh,
Sangwook Bae,
Junho Ahn,
Yonghwa Lee,
Dinh-Tuan Hoang,
Min Suk Kang,
Nils Ole Tippenhauer,
Yongdae Kim
Abstract:
In cellular networks, it can become necessary for authorities to physically locate user devices for tracking criminals or illegal devices. While cellular operators can provide authorities with cell information the device is camping on, fine-grained localization is still required. Therefore, the authorized agents trace the device by monitoring its uplink signals. However, tracking the uplink signal…
▽ More
In cellular networks, it can become necessary for authorities to physically locate user devices for tracking criminals or illegal devices. While cellular operators can provide authorities with cell information the device is camping on, fine-grained localization is still required. Therefore, the authorized agents trace the device by monitoring its uplink signals. However, tracking the uplink signal source without its cooperation is challenging even for operators and authorities. Particularly, three challenges remain for fine-grained localization: i) localization works only if devices generate enough uplink traffic reliably over time, ii) the target device might generate its uplink traffic with significantly low power, and iii) cellular repeater may add too much noise to true uplink signals. While these challenges present practical hurdles for localization, they have been overlooked in prior works.
In this work, we investigate the impact of these real-world challenges on cellular localization and propose an Uncooperative Multiangulation Attack (UMA) that addresses these challenges. UMA can 1) force a target device to transmit traffic continuously, 2) boost the target's signal strength to the maximum, and 3) uniquely distinguish traffic from the target and the repeaters. Notably, the UMA technique works without privilege on cellular operators or user devices, which makes it operate on any LTE network. Our evaluations show that UMA effectively resolves the challenges in real-world environments when devices are not cooperative for localization. Our approach exploits the current cellular design vulnerabilities, which we have responsibly disclosed to GSMA.
△ Less
Submitted 25 March, 2024; v1 submitted 22 March, 2024;
originally announced March 2024.
-
Bootstrap Percolation on the Binomial Random $k$-uniform Hypergraph
Authors:
Mihyun Kang,
Christoph Koch,
Tamás Makai
Abstract:
We investigate the behaviour of $r$-neighbourhood bootstrap percolation on the binomial $k$-uniform random hypergraph $H_k(n,p)$ for given integers $k\geq 2$ and $r\geq 2$. In $r$-neighbourhood bootstrap percolation, infection spreads through the hypergraph, starting from a set of initially infected vertices, and in each subsequent step of the process every vertex with at least $r$ infected neighb…
▽ More
We investigate the behaviour of $r$-neighbourhood bootstrap percolation on the binomial $k$-uniform random hypergraph $H_k(n,p)$ for given integers $k\geq 2$ and $r\geq 2$. In $r$-neighbourhood bootstrap percolation, infection spreads through the hypergraph, starting from a set of initially infected vertices, and in each subsequent step of the process every vertex with at least $r$ infected neighbours becomes infected. For our analysis the set of initially infected vertices is chosen uniformly at random from all sets of given size. In the regime $n^{-1}\ll n^{k-2}p \ll n^{-1/r}$ we establish a threshold such that if the number of initially infected vertices remains below the threshold, then with high probability only a few additional vertices become infected, while if the number of initially infected vertices exceeds the threshold then with high probability almost every vertex becomes infected. In fact we show that the probability of failure decreases exponentially.
△ Less
Submitted 19 March, 2024;
originally announced March 2024.
-
LogicalDefender: Discovering, Extracting, and Utilizing Common-Sense Knowledge
Authors:
Yuhe Liu,
Mengxue Kang,
Zengchang Qin,
Xiangxiang Chu
Abstract:
Large text-to-image models have achieved astonishing performance in synthesizing diverse and high-quality images guided by texts. With detail-oriented conditioning control, even finer-grained spatial control can be achieved. However, some generated images still appear unreasonable, even with plentiful object features and a harmonious style. In this paper, we delve into the underlying causes and fi…
▽ More
Large text-to-image models have achieved astonishing performance in synthesizing diverse and high-quality images guided by texts. With detail-oriented conditioning control, even finer-grained spatial control can be achieved. However, some generated images still appear unreasonable, even with plentiful object features and a harmonious style. In this paper, we delve into the underlying causes and find that deep-level logical information, serving as common-sense knowledge, plays a significant role in understanding and processing images. Nonetheless, almost all models have neglected the importance of logical relations in images, resulting in poor performance in this aspect. Following this observation, we propose LogicalDefender, which combines images with the logical knowledge already summarized by humans in text. This encourages models to learn logical knowledge faster and better, and concurrently, extracts the widely applicable logical knowledge from both images and human knowledge. Experiments show that our model has achieved better logical performance, and the extracted logical knowledge can be effectively applied to other scenarios.
△ Less
Submitted 18 March, 2024;
originally announced March 2024.
-
COLEP: Certifiably Robust Learning-Reasoning Conformal Prediction via Probabilistic Circuits
Authors:
Mintong Kang,
Nezihe Merve Gürel,
Linyi Li,
Bo Li
Abstract:
Conformal prediction has shown spurring performance in constructing statistically rigorous prediction sets for arbitrary black-box machine learning models, assuming the data is exchangeable. However, even small adversarial perturbations during the inference can violate the exchangeability assumption, challenge the coverage guarantees, and result in a subsequent decline in empirical coverage. In th…
▽ More
Conformal prediction has shown spurring performance in constructing statistically rigorous prediction sets for arbitrary black-box machine learning models, assuming the data is exchangeable. However, even small adversarial perturbations during the inference can violate the exchangeability assumption, challenge the coverage guarantees, and result in a subsequent decline in empirical coverage. In this work, we propose a certifiably robust learning-reasoning conformal prediction framework (COLEP) via probabilistic circuits, which comprise a data-driven learning component that trains statistical models to learn different semantic concepts, and a reasoning component that encodes knowledge and characterizes the relationships among the trained models for logic reasoning. To achieve exact and efficient reasoning, we employ probabilistic circuits (PCs) within the reasoning component. Theoretically, we provide end-to-end certification of prediction coverage for COLEP in the presence of bounded adversarial perturbations. We also provide certified coverage considering the finite size of the calibration set. Furthermore, we prove that COLEP achieves higher prediction coverage and accuracy over a single model as long as the utilities of knowledge models are non-trivial. Empirically, we show the validity and tightness of our certified coverage, demonstrating the robust conformal prediction of COLEP on various datasets, including GTSRB, CIFAR10, and AwA2. We show that COLEP achieves up to 12% improvement in certified coverage on GTSRB, 9% on CIFAR-10, and 14% on AwA2.
△ Less
Submitted 17 March, 2024;
originally announced March 2024.
-
Measurements of All-Particle Energy Spectrum and Mean Logarithmic Mass of Cosmic Rays from 0.3 to 30 PeV with LHAASO-KM2A
Authors:
The LHAASO Collaboration,
Zhen Cao,
F. Aharonian,
Q. An,
A. Axikegu,
Y. X. Bai,
Y. W. Bao,
D. Bastieri,
X. J. Bi,
Y. J. Bi,
J. T. Cai,
Q. Cao,
W. Y. Cao,
Zhe Cao,
J. Chang,
J. F. Chang,
A. M. Chen,
E. S. Chen,
Liang Chen,
Lin Chen,
Long Chen,
M. J. Chen,
M. L. Chen,
Q. H. Chen,
S. H. Chen
, et al. (256 additional authors not shown)
Abstract:
We present the measurements of all-particle energy spectrum and mean logarithmic mass of cosmic rays in the energy range of 0.3-30 PeV using data collected from LHAASO-KM2A between September 2021 and December 2022, which is based on a nearly composition-independent energy reconstruction method, achieving unprecedented accuracy. Our analysis reveals the position of the knee at…
▽ More
We present the measurements of all-particle energy spectrum and mean logarithmic mass of cosmic rays in the energy range of 0.3-30 PeV using data collected from LHAASO-KM2A between September 2021 and December 2022, which is based on a nearly composition-independent energy reconstruction method, achieving unprecedented accuracy. Our analysis reveals the position of the knee at $3.67 \pm 0.05 \pm 0.15$ PeV. Below the knee, the spectral index is found to be -$2.7413 \pm 0.0004 \pm 0.0050$, while above the knee, it is -$3.128 \pm 0.005 \pm 0.027$, with the sharpness of the transition measured with a statistical error of 2%. The mean logarithmic mass of cosmic rays is almost heavier than helium in the whole measured energy range. It decreases from 1.7 at 0.3 PeV to 1.3 at 3 PeV, representing a 24% decline following a power law with an index of -$0.1200 \pm 0.0003 \pm 0.0341$. This is equivalent to an increase in abundance of light components. Above the knee, the mean logarithmic mass exhibits a power law trend towards heavier components, which is reversal to the behavior observed in the all-particle energy spectrum. Additionally, the knee position and the change in power-law index are approximately the same. These findings suggest that the knee observed in the all-particle spectrum corresponds to the knee of the light component, rather than the medium-heavy components.
△ Less
Submitted 26 March, 2024; v1 submitted 15 March, 2024;
originally announced March 2024.
-
$L^2$ decay for large perturbations of viscous shocks for multi-D Burgers equation
Authors:
Moon-Jin Kang,
HyeonSeop Oh
Abstract:
We consider a planar viscous shock of moderate strength for a scalar viscous conservation law in multi-D. We consider a strictly convex flux, as a small perturbation of the Burgers flux, along the normal direction to the shock front. However, for the transversal directions, we do not have any restrictions on flux function. We first show the contraction property for any large perturbations in…
▽ More
We consider a planar viscous shock of moderate strength for a scalar viscous conservation law in multi-D. We consider a strictly convex flux, as a small perturbation of the Burgers flux, along the normal direction to the shock front. However, for the transversal directions, we do not have any restrictions on flux function. We first show the contraction property for any large perturbations in $L^2$ of the planar viscous shock. If the initial $L^2$-perturbation is also in $L^1$, the large perturbation converges to zero in $L^2$ as time goes to infinity with $t^{-1/4}$ decay rate. The contraction and decay estimates hold up to dynamical shift. For the results, we do not impose any smallness conditions on the initial value. This result extends the 1D case \cite{Kang-V-1} by the first author and Vasseur to the multi-dimensional case.
△ Less
Submitted 13 March, 2024;
originally announced March 2024.
-
Hardware-efficient ansatz without barren plateaus in any depth
Authors:
Chae-Yeun Park,
Minhyeok Kang,
Joonsuk Huh
Abstract:
Variational quantum circuits have recently gained much interest due to their relevance in real-world applications, such as combinatorial optimizations, quantum simulations, and modeling a probability distribution. Despite their huge potential, the practical usefulness of those circuits beyond tens of qubits is largely questioned. One of the major problems is the so-called barren plateaus phenomeno…
▽ More
Variational quantum circuits have recently gained much interest due to their relevance in real-world applications, such as combinatorial optimizations, quantum simulations, and modeling a probability distribution. Despite their huge potential, the practical usefulness of those circuits beyond tens of qubits is largely questioned. One of the major problems is the so-called barren plateaus phenomenon. Quantum circuits with a random structure often have a flat cost-function landscape and thus cannot be trained efficiently. In this paper, we propose two novel parameter conditions in which the hardware-efficient ansatz (HEA) is free from barren plateaus for arbitrary circuit depths. In the first condition, the HEA approximates to a time-evolution operator generated by a local Hamiltonian. Utilizing a recent result by [Park and Killoran, Quantum 8, 1239 (2024)], we prove a constant lower bound of gradient magnitudes in any depth both for local and global observables. On the other hand, the HEA is within the many-body localized (MBL) phase in the second parameter condition. We argue that the HEA in this phase has a large gradient component for a local observable using a phenomenological model for the MBL system. By initializing the parameters of the HEA using these conditions, we show that our findings offer better overall performance in solving many-body Hamiltonians. Our results indicate that barren plateaus are not an issue when initial parameters are smartly chosen, and other factors, such as local minima or the expressivity of the circuit, are more crucial.
△ Less
Submitted 7 March, 2024;
originally announced March 2024.
-
A Dual-Level Cancelable Framework for Palmprint Verification and Hack-Proof Data Storage
Authors:
Ziyuan Yang,
Ming Kang,
Andrew Beng Jin Teoh,
Chengrui Gao,
Wen Chen,
Bob Zhang,
Yi Zhang
Abstract:
In recent years, palmprints have been widely used for individual verification. The rich privacy information in palmprint data necessitates its protection to ensure security and privacy without sacrificing system performance. Existing systems often use cancelable technologies to protect templates, but these technologies ignore the potential risk of data leakage. Upon breaching the system and gainin…
▽ More
In recent years, palmprints have been widely used for individual verification. The rich privacy information in palmprint data necessitates its protection to ensure security and privacy without sacrificing system performance. Existing systems often use cancelable technologies to protect templates, but these technologies ignore the potential risk of data leakage. Upon breaching the system and gaining access to the stored database, a hacker could easily manipulate the stored templates, compromising the security of the verification system. To address this issue, we propose a dual-level cancelable palmprint verification framework in this paper. Specifically, the raw template is initially encrypted using a competition hashing network with a first-level token, facilitating the end-to-end generation of cancelable templates. Different from previous works, the protected template undergoes further encryption to differentiate the second-level protected template from the first-level one. The system specifically creates a negative database (NDB) with the second-level token for dual-level protection during the enrollment stage. Reversing the NDB is NP-hard and a fine-grained algorithm for NDB generation is introduced to manage the noise and specified bits. During the verification stage, we propose an NDB matching algorithm based on matrix operation to accelerate the matching process of previous NDB methods caused by dictionary-based matching rules. This approach circumvents the need to store templates identical to those utilized for verification, reducing the risk of potential data leakage. Extensive experiments conducted on public palmprint datasets have confirmed the effectiveness and generality of the proposed framework. Upon acceptance of the paper, the code will be accessible at https://github.com/Deep-Imaging-Group/NPR.
△ Less
Submitted 5 March, 2024;
originally announced March 2024.
-
Neural radiance fields-based holography [Invited]
Authors:
Minsung Kang,
Fan Wang,
Kai Kumano,
Tomoyoshi Ito,
Tomoyoshi Shimobaba
Abstract:
This study presents a novel approach for generating holograms based on the neural radiance fields (NeRF) technique. Generating three-dimensional (3D) data is difficult in hologram computation. NeRF is a state-of-the-art technique for 3D light-field reconstruction from 2D images based on volume rendering. The NeRF can rapidly predict new-view images that do not include a training dataset. In this s…
▽ More
This study presents a novel approach for generating holograms based on the neural radiance fields (NeRF) technique. Generating three-dimensional (3D) data is difficult in hologram computation. NeRF is a state-of-the-art technique for 3D light-field reconstruction from 2D images based on volume rendering. The NeRF can rapidly predict new-view images that do not include a training dataset. In this study, we constructed a rendering pipeline directly from a 3D light field generated from 2D images by NeRF for hologram generation using deep neural networks within a reasonable time. The pipeline comprises three main components: the NeRF, a depth predictor, and a hologram generator, all constructed using deep neural networks. The pipeline does not include any physical calculations. The predicted holograms of a 3D scene viewed from any direction were computed using the proposed pipeline. The simulation and experimental results are presented.
△ Less
Submitted 9 May, 2024; v1 submitted 2 March, 2024;
originally announced March 2024.
-
Enhanced micromotion compensation using a phase modulated light field
Authors:
K. J. Arnold,
N. Jayjong,
M. L. D. Kang,
Qin Qichen,
Zhao Zhang,
Qi Zhao,
M. D. Barrett
Abstract:
We investigate sideband spectroscopy of a trapped ion using a probe laser phase modulated at the trap drive frequency. The enhanced sensitivity of our technique over traditional sideband spectroscopy allows us to detect stray fields of $0.01\,\mathrm{V/m}$ on a timescale of a few minutes and detect differential phases of $5\,μ\mathrm{rad}$ between applied ac potentials. We also demonstrate the abi…
▽ More
We investigate sideband spectroscopy of a trapped ion using a probe laser phase modulated at the trap drive frequency. The enhanced sensitivity of our technique over traditional sideband spectroscopy allows us to detect stray fields of $0.01\,\mathrm{V/m}$ on a timescale of a few minutes and detect differential phases of $5\,μ\mathrm{rad}$ between applied ac potentials. We also demonstrate the ability suppress Doppler shifts from excess motion to well below the limit imposed by the intrinsic motion of the ion in the vibrational ground-state. The technique we introduce can be readily implemented in any ion trap system that utilizes sideband spectroscopy for micromotion compensation and can be seamlessly integrated into experiments in a fully automated way
△ Less
Submitted 28 February, 2024;
originally announced February 2024.
-
The status and challenges for prostate SBRT treatments in United States proton therapy centers: An NRG Oncology practice survey
Authors:
Jiajian Shen,
Paige A. Taylor,
Carlos E. Vargas,
Minglei Kang,
Jatinder Saini,
Jun Zhou,
Peilong Wang,
Wei Liu,
Charles B. Simone II,
Ying Xiao,
Liyong Lin
Abstract:
A survey was designed to inquire about the practice of proton SBRT treatment for prostate cancer. The survey was distributed to all 30 proton therapy centers in the United States that participate in the National Clinical Trial Network in Feb. 2023. The survey focused on usage, patient selection criteria, prescriptions, target contours, dose constraints, treatment plan optimization and evaluation m…
▽ More
A survey was designed to inquire about the practice of proton SBRT treatment for prostate cancer. The survey was distributed to all 30 proton therapy centers in the United States that participate in the National Clinical Trial Network in Feb. 2023. The survey focused on usage, patient selection criteria, prescriptions, target contours, dose constraints, treatment plan optimization and evaluation methods, patient-specific QA, and IGRT methods. Results: We received responses from 25 centers (83% participation). Only 8 respondent proton centers (32%) reported performing SBRT of the prostate. The remaining 17 centers cited three primary reasons for not offering this treatment: no clinical need, lack of volumetric imaging, and/or lack of clinical evidence. Only 1 center cited the reduction in overall reimbursement as a concern for not offering prostate SBRT. Several common practices among the 8 centers offering SBRT for the prostate were noted, such as using Hydrogel spacers, fiducial markers, and MRI for target delineation. Most proton centers (87.5%) utilized pencil beam scanning (PBS) delivery and completed Imaging and Radiation Oncology Core (IROC) phantom credentialing. Treatment planning typically used parallel opposed lateral beams, and consistent parameters for setup and range uncertainties were used for plan optimization and robustness evaluation. Measurements-based patient-specific QA, beam delivery every other day, fiducial contours for IGRT, and total doses of 35-40 GyRBE were consistent across all centers. However, there was no consensus on the risk levels for patient selection. Conclusion: Prostate SBRT is used in about 1/3 of proton centers in the US. There was a significant consistency in practices among proton centers treating with proton SBRT. It is possible that the adoption of proton SBRT may become more common if proton SBRT is more commonly offered in clinical trials.
△ Less
Submitted 27 February, 2024;
originally announced February 2024.
-
Janus Bound States in the Continuum with Asymmetric Topological Charges and Intrinsic Chirality
Authors:
Meng Kang,
Meng Xiao,
C. T. Chan
Abstract:
We propose a novel topological defect called Janus bound states in the continuum (BICs), featuring asymmetric topological charges in upward and downward radiation channels. Our approach involves a photonic crystal slab (PCS) that initially exhibits both out-of-plane and in-plane mirror symmetry, and this PCS possesses one BIC at the $Γ$ point and two BICs off the $Γ$ point. By introducing perturba…
▽ More
We propose a novel topological defect called Janus bound states in the continuum (BICs), featuring asymmetric topological charges in upward and downward radiation channels. Our approach involves a photonic crystal slab (PCS) that initially exhibits both out-of-plane and in-plane mirror symmetry, and this PCS possesses one BIC at the $Γ$ point and two BICs off the $Γ$ point. By introducing perturbations that break the out-of-plane mirror symmetry, the two off-$Γ$ BICs decompose into four circularly polarized states (C points) with identical topological charges. Then, we selectively manipulate the four C points associated with downward radiation channel to converge at the at-$Γ$ BIC, forming a Janus BIC with Janus topological charges. By further introducing in-plane mirror symmetry perturbation, we can bring two of the C points with the same handedness and identical topological charges for upward radiation to merge into the Janus BIC. This process results in a Janus chiral BIC which exhibits large intrinsic chirality and an infinite Q factor. Janus BICs can induce distinct Pancharatnam-Berry phase singularities in momentum space for different incident channels, providing a new approach to control optical angular momentum. Janus chiral BICs hold promise in enhancing direction-dependent and spin-dependent asymmetric light-matter interaction, opening new pathways for improving chirality-dependent operation for on-chip devices.
△ Less
Submitted 19 February, 2024;
originally announced February 2024.
-
Long-time behavior towards viscous-dispersive shock for Navier-Stokes equations of Korteweg type
Authors:
Sungho Han,
Moon-Jin Kang,
Jeongho Kim,
Hobin Lee
Abstract:
We consider the so-called Naiver-Stokes-Korteweg(NSK) equations for the dynamics of compressible barotropic viscous fluids with internal capillarity. We handle the time-asymptotic stability in 1D of the viscous-dispersive shock wave that is a traveling wave solution to NSK as a viscous-dispersive counterpart of a Riemann shock. More precisely, we prove that when the prescribed far-field states of…
▽ More
We consider the so-called Naiver-Stokes-Korteweg(NSK) equations for the dynamics of compressible barotropic viscous fluids with internal capillarity. We handle the time-asymptotic stability in 1D of the viscous-dispersive shock wave that is a traveling wave solution to NSK as a viscous-dispersive counterpart of a Riemann shock. More precisely, we prove that when the prescribed far-field states of NSK are connected by a single Hugoniot curve, then solutions of NSK tend to the viscous-dispersive shock wave as time goes to infinity. To obtain the convergence, we extend the theory of $a$-contraction with shifts, used for the Navier-Stokes equations, to the NSK system. The main difficulty in analysis for NSK is due to the third-order derivative terms of the specific volume in the momentum equation. To resolve the problem, we introduce an auxiliary variable that is equivalent to the derivative of the specific volume.
△ Less
Submitted 15 February, 2024;
originally announced February 2024.
-
Scalable Wasserstein Gradient Flow for Generative Modeling through Unbalanced Optimal Transport
Authors:
Jaemoo Choi,
Jaewoong Choi,
Myungjoo Kang
Abstract:
Wasserstein Gradient Flow (WGF) describes the gradient dynamics of probability density within the Wasserstein space. WGF provides a promising approach for conducting optimization over the probability distributions. Numerically approximating the continuous WGF requires the time discretization method. The most well-known method for this is the JKO scheme. In this regard, previous WGF models employ t…
▽ More
Wasserstein Gradient Flow (WGF) describes the gradient dynamics of probability density within the Wasserstein space. WGF provides a promising approach for conducting optimization over the probability distributions. Numerically approximating the continuous WGF requires the time discretization method. The most well-known method for this is the JKO scheme. In this regard, previous WGF models employ the JKO scheme and parametrize transport map for each JKO step. However, this approach results in quadratic training complexity $O(K^2)$ with the number of JKO step $K$. This severely limits the scalability of WGF models. In this paper, we introduce a scalable WGF-based generative model, called Semi-dual JKO (S-JKO). Our model is based on the semi-dual form of the JKO step, derived from the equivalence between the JKO step and the Unbalanced Optimal Transport. Our approach reduces the training complexity to $O(K)$. We demonstrate that our model significantly outperforms existing WGF-based generative models, achieving FID scores of 2.62 on CIFAR-10 and 5.46 on CelebA-HQ-256, which are comparable to state-of-the-art image generative models.
△ Less
Submitted 3 June, 2024; v1 submitted 8 February, 2024;
originally announced February 2024.
-
Nodal fermions in a strongly spin-orbit coupled frustrated pyrochlore superconductor
Authors:
Dongjin Oh,
Junha Kang,
Yuting Qian,
Shiang Fang,
Mingu Kang,
Chris Jozwiak,
Aaron Bostwick,
Eli Rotenberg,
Joseph G. Checkelsky,
Liang Fu,
Tomasz Klimczuk,
Michal J. Winiarski,
Bohm-Jung Yang,
Riccardo Comin
Abstract:
The pyrochlore lattice, a three-dimensional network of corner-sharing tetrahedra, is a promising material playground for correlated topological phases arising from the interplay between spin-orbit coupling (SOC) and electron-electron interactions. Due to its geometrically frustrated lattice structure, exotic correlated states on the pyrochlore lattice have been extensively studied using various sp…
▽ More
The pyrochlore lattice, a three-dimensional network of corner-sharing tetrahedra, is a promising material playground for correlated topological phases arising from the interplay between spin-orbit coupling (SOC) and electron-electron interactions. Due to its geometrically frustrated lattice structure, exotic correlated states on the pyrochlore lattice have been extensively studied using various spin Hamiltonians in the localized limit. On the other hand, the topological properties of the electronic structure in the pyrochlore lattice have rarely been explored, due to the scarcity of pyrochlore materials in the itinerant paramagnetic limit. Here, we explore the topological electronic band structure of pyrochlore superconductor RbBi$_{2}$ using angle-resolved photoemission spectroscopy. Thanks to the strong SOC of the Bi pyrochlore network, we experimentally confirm the existence of three-dimensional (3D) massless Dirac fermions enforced by nonsymmorphic symmetry, as well as a 3D quadratic band crossing protected by cubic crystalline symmetry. Furthermore, we identify an additional 3D linear Dirac dispersion associated with band inversion protected by threefold rotation symmetry. These observations reveal the rich non-trivial band topology of itinerant pyrochlore lattice systems in the strong SOC regime. Through manipulation of electron correlations and SOC of the frustrated pyrochlore lattices, this material platform is a natural host for exotic phases of matter, including the fractionalized quantum spin Hall effect in the topological Mott insulator phase, as well as axion electrodynamics in the axion insulator phase.
△ Less
Submitted 6 February, 2024;
originally announced February 2024.