id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
3
62.8k
title
stringlengths
1
382
comments
stringlengths
1
1.15k
journal-ref
stringlengths
1
557
doi
stringlengths
7
153
report-no
stringlengths
1
509
categories
stringlengths
5
125
license
stringclasses
9 values
abstract
stringlengths
6
6.09k
versions
listlengths
1
187
update_date
timestamp[s]date
2007-05-23 00:00:00
2025-04-21 00:00:00
authors_parsed
sequencelengths
1
2.83k
2504.13348
Zhenhua Yu
Xiao Jin, Zihan Wang, Zhenhua Yu, Changrak Choi, Kalind Carpenter, Thrishantha Nanayakkara
Physical Reservoir Computing in Hook-Shaped Rover Wheel Spokes for Real-Time Terrain Identification
null
null
null
null
cs.RO
http://creativecommons.org/licenses/by-sa/4.0/
Effective terrain detection in unknown environments is crucial for safe and efficient robotic navigation. Traditional methods often rely on computationally intensive data processing, requiring extensive onboard computational capacity and limiting real-time performance for rovers. This study presents a novel approach that combines physical reservoir computing with piezoelectric sensors embedded in rover wheel spokes for real-time terrain identification. By leveraging wheel dynamics, terrain-induced vibrations are transformed into high-dimensional features for machine learning-based classification. Experimental results show that strategically placing three sensors on the wheel spokes achieves 90$\%$ classification accuracy, which demonstrates the accuracy and feasibility of the proposed method. The experiment results also showed that the system can effectively distinguish known terrains and identify unknown terrains by analyzing their similarity to learned categories. This method provides a robust, low-power framework for real-time terrain classification and roughness estimation in unstructured environments, enhancing rover autonomy and adaptability.
[ { "version": "v1", "created": "Thu, 17 Apr 2025 21:29:17 GMT" } ]
2025-04-21T00:00:00
[ [ "Jin", "Xiao", "" ], [ "Wang", "Zihan", "" ], [ "Yu", "Zhenhua", "" ], [ "Choi", "Changrak", "" ], [ "Carpenter", "Kalind", "" ], [ "Nanayakkara", "Thrishantha", "" ] ]
2504.13349
Muralidhar Madabhushi Balaji
Muralidhar Madabhushi Balaji, Danyal Ahsanullah and Prasanna Rangarajan
A Multisensory Approach to Probing Scattering Media
null
null
null
null
physics.optics
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Non-invasive detection of objects embedded inside an optically scattering medium is essential for numerous applications in engineering and sciences. However, in most applications light at visible or near-infrared wavebands is scattered by the medium resulting in the obscuration of the embedded objects. Existing methods to overcome scattering generally rely on point-by-point scanning strategies, which limit spatial sampling density. In this work, we address the sampling limitations by drawing inspiration from multisensory integration mechanisms observed in nature, wherein distinct sensing modalities work together to enhance the perception of the surroundings. Our multisensory approach leverages the unique advantages of coherent light by combining the sensitivity of an interferometric LiDAR with a wide field neuromorphic sensor to probe objects inside a densely scattering medium. The neuromorphic camera provides wide field spatial cues of the embedded object, by monitoring the fluctuations in the speckle patterns produced by tuning the laser frequency. These spatial cues are used to guide a point-scanning FMCW LiDAR to retrieve high-resolution images. Using this approach, we imaged objects embedded within an 8 cm thick (>100 transport mean free paths), tissue-like scattering medium with a 10x improvement in sampling density compared to traditional uniform sampling.
[ { "version": "v1", "created": "Thu, 17 Apr 2025 21:30:03 GMT" } ]
2025-04-21T00:00:00
[ [ "Balaji", "Muralidhar Madabhushi", "" ], [ "Ahsanullah", "Danyal", "" ], [ "Rangarajan", "Prasanna", "" ] ]
2504.13350
Pablo Manuel Bern\'a
Miguel Berasategui, Pablo M. Bern\'a, Stephen J. Dilworth, Denka Kutzarova
Summability Methods for the Greedy Algorithm in Banach spaces
null
null
null
null
math.FA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For the past 25 years, one of the most studied algorithms in the field of Nonlinear Approximation Theory has been the Thresholding Greedy Algorithm. In this paper, we propose new summability methods for this algorithm, generating two new types of greedy-like bases - namley Ces\`aro quasi-greedy and de la Vall\'ee-Poussin-quasi-greedy bases. We will analyze the connection between these types of bases and the well-known quasi-greedy bases, and leave some open problems for future research.
[ { "version": "v1", "created": "Thu, 17 Apr 2025 21:30:09 GMT" } ]
2025-04-21T00:00:00
[ [ "Berasategui", "Miguel", "" ], [ "Berná", "Pablo M.", "" ], [ "Dilworth", "Stephen J.", "" ], [ "Kutzarova", "Denka", "" ] ]
2504.13351
Chen Wang
Chen Wang, Fei Xia, Wenhao Yu, Tingnan Zhang, Ruohan Zhang, C. Karen Liu, Li Fei-Fei, Jie Tan, Jacky Liang
Chain-of-Modality: Learning Manipulation Programs from Multimodal Human Videos with Vision-Language-Models
ICRA 2025
null
null
null
cs.RO cs.AI cs.HC cs.LG cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Learning to perform manipulation tasks from human videos is a promising approach for teaching robots. However, many manipulation tasks require changing control parameters during task execution, such as force, which visual data alone cannot capture. In this work, we leverage sensing devices such as armbands that measure human muscle activities and microphones that record sound, to capture the details in the human manipulation process, and enable robots to extract task plans and control parameters to perform the same task. To achieve this, we introduce Chain-of-Modality (CoM), a prompting strategy that enables Vision Language Models to reason about multimodal human demonstration data -- videos coupled with muscle or audio signals. By progressively integrating information from each modality, CoM refines a task plan and generates detailed control parameters, enabling robots to perform manipulation tasks based on a single multimodal human video prompt. Our experiments show that CoM delivers a threefold improvement in accuracy for extracting task plans and control parameters compared to baselines, with strong generalization to new task setups and objects in real-world robot experiments. Videos and code are available at https://chain-of-modality.github.io
[ { "version": "v1", "created": "Thu, 17 Apr 2025 21:31:23 GMT" } ]
2025-04-21T00:00:00
[ [ "Wang", "Chen", "" ], [ "Xia", "Fei", "" ], [ "Yu", "Wenhao", "" ], [ "Zhang", "Tingnan", "" ], [ "Zhang", "Ruohan", "" ], [ "Liu", "C. Karen", "" ], [ "Fei-Fei", "Li", "" ], [ "Tan", "Jie", "" ], [ "Liang", "Jacky", "" ] ]
2504.13352
Jarett LeVan
Jarett LeVan and Scott Baalrud
Foundations of magnetohydrodynamics
null
null
null
null
physics.plasm-ph
http://creativecommons.org/licenses/by/4.0/
In this tutorial, a derivation of magnetohydrodynamics (MHD) valid beyond the usual ideal gas approximation is presented. Non-equilibrium thermodynamics is used to obtain conservation equations and linear constitutive relations. When coupled with Maxwell's equations, this provides closed fluid equations in terms of material properties of the plasma, described by the equation of state and transport coefficients. These properties are connected to microscopic dynamics using the Irving-Kirkwood procedure and Green-Kubo relations. Symmetry arguments and the Onsager-Casimir relations allow one to vastly simplify the number of independent coefficients. Importantly, expressions for current density, heat flux, and stress (conventionally Ohm's law, Fourier's law, and Newton's law) take different forms in systems with a non-ideal equation of state. The traditional form of the MHD equations, which is usually obtained from a Chapman-Enskog solution of the Boltzmann equation, corresponds to the ideal gas limit of the general equations.
[ { "version": "v1", "created": "Thu, 17 Apr 2025 21:35:13 GMT" } ]
2025-04-21T00:00:00
[ [ "LeVan", "Jarett", "" ], [ "Baalrud", "Scott", "" ] ]
2504.13353
Harald W. Griesshammer
Harald W. Griesshammer (George Washington U.)
The Unitarity-Limit Expansion for Two Nucleons with Perturbative Pions: Digest and Ideas
10 pages LaTeX2e (pdflatex) in pos.sty including 7 figures as 9 .pdf files using includegraphics. arXiv admin note: text overlap with arXiv:2410.09653
null
null
null
hep-ph nucl-th physics.atom-ph
http://creativecommons.org/licenses/by/4.0/
In the Unitarity Limit, the NN S-wave binding energies are zero, the scattering lengths infinite, Physics is universal, i.e. insensitive to details of the interactions, and observables display richer symmetries, namely invariance under both scaling and Wigner's combined SU(4) transformation of spin and isospin. This presentation is a digest of the first quantitative exploration of corrections to this picture when pions are included [1] (see there for a more comprehensive list of references). Since the pion mass and decay constant introduce dimensionful scales in the NN system, they explicitly break the symmetries of the Unitarity fixed point. In $\chi$EFT, these symmetries must therefore be classified as emergent. This text focuses on the $\chi$EFT variant with Perturbative ("KSW") Pions at next-to-next-to leading order (N2LO). This leads to the Hypothesis that both scale invariance and Wigner-SU(4) symmetry in the Unitarity Expansion show persistence, i.e. the footprint of both combined dominates even for $k\gtrsim m_\pi$ and is more relevant than chiral symmetry, so that the tensor/Wigner-SU(4) symmetry-breaking part of OPE is suppressed and does not enter before N3LO. Included are also ideas about underlying mechanisms and LO results of $\chi$EFT with Nonperturbative Pions in the expansion about Unitarity.
[ { "version": "v1", "created": "Thu, 17 Apr 2025 21:44:30 GMT" } ]
2025-04-21T00:00:00
[ [ "Griesshammer", "Harald W.", "", "George Washington U." ] ]
2504.13354
Max Wiedenh\"oft
Da-Jung Cho, Szil\'ard Zsolt Fazekas, Shinnosuke Seki, Max Wiedenh\"oft
A Formalization of Co-Transcriptional Splicing as an Operation on Formal Languages
30 pages, 2 tables, 1 figure, under review in Natural Computing
null
null
null
cs.FL
http://creativecommons.org/licenses/by/4.0/
RNA co-transcriptionality is the process where RNA sequences are spliced while being transcribed from DNA templates. This process holds potential as a key tool for molecular programming. Co-transcriptional folding has been shown to be programmable for assembling nano-scale RNA structures, and recent advances have proven its Turing universality. While post-transcriptional splicing has been extensively studied, co-transcriptional splicing is gaining attention for its potential to save resources and space in molecular systems. However, its unpredictability has limited its practical applications. In this paper, we focus on engineering co-transcriptional splicing, moving beyond natural occurrences to program RNA sequences that produce specific target sequences through DNA templates. We introduce a formal model of co-transcriptional splicing, defined by constant-, linear-, and logarithmic-bounded hairpin deletion operations, as well as an unbounded hairpin deletion operation. We examine the complexity of the template constructability problem associated with these operations and study the closure properties of the languages they generate, providing insights for RNA template design in molecular programming systems.
[ { "version": "v1", "created": "Thu, 17 Apr 2025 21:44:37 GMT" } ]
2025-04-21T00:00:00
[ [ "Cho", "Da-Jung", "" ], [ "Fazekas", "Szilárd Zsolt", "" ], [ "Seki", "Shinnosuke", "" ], [ "Wiedenhöft", "Max", "" ] ]
2504.13355
Omid Sedehi
Omid Sedehi, Manish Yadav, Merten Stender, Sebastian Oberst
Denoising and Reconstruction of Nonlinear Dynamics using Truncated Reservoir Computing
null
null
null
null
cs.LG cs.NE nlin.CD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Measurements acquired from distributed physical systems are often sparse and noisy. Therefore, signal processing and system identification tools are required to mitigate noise effects and reconstruct unobserved dynamics from limited sensor data. However, this process is particularly challenging because the fundamental equations governing the dynamics are largely unavailable in practice. Reservoir Computing (RC) techniques have shown promise in efficiently simulating dynamical systems through an unstructured and efficient computation graph comprising a set of neurons with random connectivity. However, the potential of RC to operate in noisy regimes and distinguish noise from the primary dynamics of the system has not been fully explored. This paper presents a novel RC method for noise filtering and reconstructing nonlinear dynamics, offering a novel learning protocol associated with hyperparameter optimization. The performance of the RC in terms of noise intensity, noise frequency content, and drastic shifts in dynamical parameters are studied in two illustrative examples involving the nonlinear dynamics of the Lorenz attractor and adaptive exponential integrate-and-fire system (AdEx). It is shown that the denoising performance improves via truncating redundant nodes and edges of the computing reservoir, as well as properly optimizing the hyperparameters, e.g., the leakage rate, the spectral radius, the input connectivity, and the ridge regression parameter. Furthermore, the presented framework shows good generalization behavior when tested for reconstructing unseen attractors from the bifurcation diagram. Compared to the Extended Kalman Filter (EKF), the presented RC framework yields competitive accuracy at low signal-to-noise ratios (SNRs) and high-frequency ranges.
[ { "version": "v1", "created": "Thu, 17 Apr 2025 21:47:13 GMT" } ]
2025-04-21T00:00:00
[ [ "Sedehi", "Omid", "" ], [ "Yadav", "Manish", "" ], [ "Stender", "Merten", "" ], [ "Oberst", "Sebastian", "" ] ]
2504.13356
Nicolas Delfosse
Edwin Tham and Nicolas Delfosse
Optimized Clifford Noise Reduction: Theory, Simulations and Experiments
13 pages
null
null
null
quant-ph
http://creativecommons.org/licenses/by/4.0/
We propose several optimizations of the CliNR partial error correction scheme which implements Clifford circuits by consuming a resource state. Errors are corrected by measuring a sequence of Pauli operators that we refer to as the verification sequence. We first propose a global optimization algorithm searching for a verification sequence resulting in a low logical error rate using tabu search. Then, we introduce a proxy for the logical error rate which is easier to evaluate and we design a two-step optimization algorithm. First, a verification sequence minimizing the proxy is computed, then this sequence is refined by reintroducing the logical error rate. Finally, we identify a large group of automorphisms of the search space which preserve the proxy and we use this symmetry to reduce the size of the search space. This results in a 168 $\times$ (respectively 20,160 $\times$) reduction of the size of the search space for the optimization of verification sequences with three (respectively four) Pauli operators. Our numerical simulations for 20-qubit Clifford circuits with size 400 under the ion chain model show that our optimization algorithms improve the performance of CliNR by 25% and that the two-step optimization achieves the same results as the global optimization with 64% fewer evaluations of the logical error rate. Finally, we perform experiments on a 36-qubit trapped ion quantum computer, without mid-circuit measurements, showing that the CZNR variant of CliNR is at breakeven.
[ { "version": "v1", "created": "Thu, 17 Apr 2025 21:47:38 GMT" } ]
2025-04-21T00:00:00
[ [ "Tham", "Edwin", "" ], [ "Delfosse", "Nicolas", "" ] ]
2504.13357
\.Izzet Sakall{\i}
Faizuddin Ahmed, Ahmad Al-Badawi, and \.Izzet Sakall{\i}
Geometric and Thermodynamic Properties of Frolov Black Holes with Topological Defects
23 pages, 18 figures, 8 tables
null
null
null
gr-qc astro-ph.HE hep-th physics.space-ph
http://creativecommons.org/licenses/by/4.0/
We investigated a modified Frolov black hole (BH) model that incorporates both a global monopole (GM) and a cosmic string (CS) to explore the interplay between non-singular BH regularization and topological defect effects. In our study, we derived a spacetime metric characterized by a regulated core through a length scale parameter $\alpha$ and introduced additional modifications via the GM parameter $\eta$ and the CS parameter $a$, which collectively alter the horizon structure and causal geometry of the BH. We analyzed the thermodynamic properties by deriving expressions for the mass function, Hawking temperature, and entropy, and found that the inclusion of GM and CS significantly deviates the BH entropy from the conventional Bekenstein-Hawking area law, while numerical investigations showed that the shadow radius exhibits contrasting behaviors: the Frolov parameters tend to reduce the shadow size whereas the topological defects enhance it. Furthermore, we examined the dynamics of scalar and electromagnetic perturbations by solving the massless Klein-Gordon equation in the BH background and computed the quasinormal modes (QNMs) using the WKB approximation, which confirmed the BH's stability and revealed that the oscillation frequencies and damping rates are strongly dependent on the parameters $\alpha$, $q$, $\eta$, and $a$. Our results suggest that the distinct observational signatures arising from this composite BH model may provide a promising avenue for testing modified gravity theories in the strong-field regime.
[ { "version": "v1", "created": "Thu, 17 Apr 2025 21:54:40 GMT" } ]
2025-04-21T00:00:00
[ [ "Ahmed", "Faizuddin", "" ], [ "Al-Badawi", "Ahmad", "" ], [ "Sakallı", "İzzet", "" ] ]
2504.13358
Hung An Tsai
Omar Tsai, Jianing Li, Tsz Tung Cheung, Lejing Huang, Hao Zhu, Jianrui Xiao, Iman Sharafaldin and Mohammad A. Tayebi
GraphQLer: Enhancing GraphQL Security with Context-Aware API Testing
Publicly available on: https://github.com/omar2535/GraphQLer
null
null
null
cs.CR cs.SE
http://creativecommons.org/licenses/by/4.0/
GraphQL is an open-source data query and manipulation language for web applications, offering a flexible alternative to RESTful APIs. However, its dynamic execution model and lack of built-in security mechanisms expose it to vulnerabilities such as unauthorized data access, denial-of-service (DoS) attacks, and injections. Existing testing tools focus on functional correctness, often overlooking security risks stemming from query interdependencies and execution context. This paper presents GraphQLer, the first context-aware security testing framework for GraphQL APIs. GraphQLer constructs a dependency graph to analyze relationships among mutations, queries, and objects, capturing critical interdependencies. It chains related queries and mutations to reveal authentication and authorization flaws, access control bypasses, and resource misuse. Additionally, GraphQLer tracks internal resource usage to uncover data leakage, privilege escalation, and replay attack vectors. We assess GraphQLer on various GraphQL APIs, demonstrating improved testing coverage - averaging a 35% increase, with up to 84% in some cases - compared to top-performing baselines. Remarkably, this is achieved in less time, making GraphQLer suitable for time-sensitive contexts. GraphQLer also successfully detects a known CVE and potential vulnerabilities in large-scale production APIs. These results underline GraphQLer's utility in proactively securing GraphQL APIs through automated, context-aware vulnerability detection.
[ { "version": "v1", "created": "Thu, 17 Apr 2025 21:58:15 GMT" } ]
2025-04-21T00:00:00
[ [ "Tsai", "Omar", "" ], [ "Li", "Jianing", "" ], [ "Cheung", "Tsz Tung", "" ], [ "Huang", "Lejing", "" ], [ "Zhu", "Hao", "" ], [ "Xiao", "Jianrui", "" ], [ "Sharafaldin", "Iman", "" ], [ "Tayebi", "Mohammad A.", "" ] ]
2504.13359
Mehmet Hamza Erol
Mehmet Hamza Erol, Batu El, Mirac Suzgun, Mert Yuksekgonul, James Zou
Cost-of-Pass: An Economic Framework for Evaluating Language Models
Code is available at: https://github.com/mhamzaerol/Cost-of-Pass
null
null
null
cs.AI cs.CL
http://creativecommons.org/licenses/by/4.0/
The widespread adoption of AI systems in the economy hinges on their ability to generate economic value that outweighs their inference costs. Evaluating this tradeoff requires metrics that account for both performance and costs. We propose a framework grounded in production theory for evaluating language models by combining accuracy and inference cost. We introduce "cost-of-pass", the expected monetary cost of generating a correct solution. We then define the "frontier cost-of-pass" as the minimum cost-of-pass achievable across available models or the "human-expert, using the approximate cost of hiring an expert. Our analysis reveals distinct economic insights. First, lightweight models are most cost-effective for basic quantitative tasks, large models for knowledge-intensive ones, and reasoning models for complex quantitative problems, despite higher per-token costs. Second, tracking this frontier cost-of-pass over the past year reveals significant progress, particularly for complex quantitative tasks where the cost has roughly halved every few months. Third, to trace key innovations driving this progress, we examine counterfactual frontiers: estimates of cost-efficiency without specific model classes. We find that innovations in lightweight, large, and reasoning models have been essential for pushing the frontier in basic quantitative, knowledge-intensive, and complex quantitative tasks, respectively. Finally, we assess the cost-reductions afforded by common inference-time techniques like majority voting and self-refinement, finding that their marginal accuracy gains rarely justify their costs. Our findings underscore that complementary model-level innovations are the primary drivers of cost-efficiency, and our economic framework provides a principled tool for measuring this progress and guiding deployment.
[ { "version": "v1", "created": "Thu, 17 Apr 2025 21:58:29 GMT" } ]
2025-04-21T00:00:00
[ [ "Erol", "Mehmet Hamza", "" ], [ "El", "Batu", "" ], [ "Suzgun", "Mirac", "" ], [ "Yuksekgonul", "Mert", "" ], [ "Zou", "James", "" ] ]
2504.13360
Razvan Diaconescu
R\u{a}zvan Diaconescu
In between myth and reality: AI for math -- a case study in category theory
null
null
null
null
cs.AI math.HO math.LO
http://creativecommons.org/licenses/by/4.0/
Recently, there is an increasing interest in understanding the performance of AI systems in solving math problems. A multitude of tests have been performed, with mixed conclusions. In this paper we discuss an experiment we have made in the direction of mathematical research, with two of the most prominent contemporary AI systems. One of the objective of this experiment is to get an understanding of how AI systems can assist mathematical research. Another objective is to support the AI systems developers by formulating suggestions for directions of improvement.
[ { "version": "v1", "created": "Thu, 17 Apr 2025 21:58:30 GMT" } ]
2025-04-21T00:00:00
[ [ "Diaconescu", "Răzvan", "" ] ]
2504.13361
Linh Ma Van
Linh Van Ma, Shoaib Azam, Farzeen Munir, Moongu Jeon
Automated Taxi Booking Operations for Autonomous Vehicles
International Conference on Signal Processing and Communication Systems, ICSPCS 2019 (http://www.dspcs-witsp.com/icspcs_2019/index.html)
ICSPCS 2019
null
null
cs.NI
http://creativecommons.org/licenses/by/4.0/
In a conventional taxi booking system, all taxi operations are mostly done by a decision made by drivers which is hard to implement in unmanned vehicles. To address this challenge, we introduce a taxi booking system which assists autonomous vehicles to pick up customers. The system can allocate an autonomous vehicle (AV) as well as plan service trips for a customer request. We use our own AV to serve a customer who uses a mobile application to make his taxi request. Apart from customer and AV, we build a server to monitor customers and AVs. It also supports inter-communication between a customer and an AV once AV decided to pick up a customer.
[ { "version": "v1", "created": "Thu, 17 Apr 2025 22:00:26 GMT" } ]
2025-04-21T00:00:00
[ [ "Van Ma", "Linh", "" ], [ "Azam", "Shoaib", "" ], [ "Munir", "Farzeen", "" ], [ "Jeon", "Moongu", "" ] ]
2504.13362
Owen Goff
Owen Goff
Using the quantum torus to investigate the $q$-Onsager algebra
25 pages
null
null
null
math.QA math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The $q$-Onsager algebra, denoted by $O_q$, is defined by generators $W_0, W_1$ and two relations called the $q$-Dolan-Grady relations. In 2017, Baseilhac and Kolb gave some elements of $O_q$ that form a Poincar\'e-Birkhoff-Witt basis. The quantum torus, denoted by $T_q$, is defined by generators $x, y, x^{-1}, y^{-1}$ and relations $$xx^{-1} = 1 = x^{-1}x, \qquad yy^{-1} = 1 = y^{-1}y, \qquad xy=q^2yx.$$ The set $\{x^iy^j | i,j \in \mathbb{Z} \}$ is a basis for $T_q$. It is known that there is an algebra homomorphism $p: O_q \mapsto T_q$ that sends $W_0 \mapsto x+x^{-1}$ and $W_1 \mapsto y+y^{-1}.$ In 2020, Lu and Wang displayed a variation of $O_q$, denoted by $\tilde{\mathbf{U}}^{\imath}$. Lu and Wang gave a surjective algebra homomorphism $\upsilon : \tilde{\mathbf{U}}^{\imath} \mapsto O_q.$ \medskip In their consideration of $\tilde{\mathbf{U}}^{\imath}$, Lu and Wang introduced some elements \begin{equation} \label{intrp503} \{B_{1,r}\}_{r \in \mathbb{Z}}, \qquad \{H'_n\}_{n=1}^{\infty}, \qquad \{H_n\}_{n=1}^{\infty}, \qquad \{\Theta'_n\}_{n=1}^{\infty}, \qquad \{\Theta_n\}_{n=1}^{\infty}. \nonumber \end{equation} These elements are defined using recursive formulas and generating functions, and it is difficult to express them in closed form. A similar problem applies to the Baseilhac-Kolb elements of $O_q$. To mitigate this difficulty, we map everything to $T_q$ using $p$ and $\upsilon$. In our main results, we express the resulting images in the basis for $T_q$ and also in an attractive closed form.
[ { "version": "v1", "created": "Thu, 17 Apr 2025 22:01:00 GMT" } ]
2025-04-21T00:00:00
[ [ "Goff", "Owen", "" ] ]
2504.13363
Mojtaba Vaezi
Mojtaba Vaezi, Gayan Aruma Baduge, Esa Ollila and Sergiy A. Vorobyov
AI-Empowered Integrated Sensing and Communications
26 pages, 10 figures, 6 tables
null
null
null
cs.IT eess.SP math.IT
http://creativecommons.org/licenses/by/4.0/
Integrating sensing and communication (ISAC) can help overcome the challenges of limited spectrum and expensive hardware, leading to improved energy and cost efficiency. While full cooperation between sensing and communication can result in significant performance gains, achieving optimal performance requires efficient designs of unified waveforms and beamformers for joint sensing and communication. Sophisticated statistical signal processing and multi-objective optimization techniques are necessary to balance the competing design requirements of joint sensing and communication tasks. Since model-based analytical approaches may be suboptimal or overly complex, deep learning emerges as a powerful tool for developing data-driven signal processing algorithms, particularly when optimal algorithms are unknown or when known algorithms are too complex for real-time implementation. Unified waveform and beamformer design problems for ISAC fall into this category, where fundamental design trade-offs exist between sensing and communication performance metrics, and the underlying models may be inadequate or incomplete. This article explores the application of artificial intelligence (AI) in ISAC designs to enhance efficiency and reduce complexity. We emphasize the integration benefits through AI-driven ISAC designs, prioritizing the development of unified waveforms, constellations, and beamforming strategies for both sensing and communication. To illustrate the practical potential of AI-driven ISAC, we present two case studies on waveform and beamforming design, demonstrating how unsupervised learning and neural network-based optimization can effectively balance performance, complexity, and implementation constraints.
[ { "version": "v1", "created": "Thu, 17 Apr 2025 22:03:43 GMT" } ]
2025-04-21T00:00:00
[ [ "Vaezi", "Mojtaba", "" ], [ "Baduge", "Gayan Aruma", "" ], [ "Ollila", "Esa", "" ], [ "Vorobyov", "Sergiy A.", "" ] ]
2504.13364
Angelo Rosa Prof. Dr.
Pieter H. W. van der Hoek and Angelo Rosa and Ralf Everaers
The configurational entropy of random trees
14 pages, 5 main figures, 1 suppl. figure
null
null
null
cond-mat.stat-mech cond-mat.soft
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a graph theoretical approach to the configurational statistics of random tree-like objects, such as randomly branching polymers. In particular, we show that Pr\"ufer labelling provides: (i) direct access to the exact configurational entropy as a function of the tree composition, (ii) computable exact expressions for partition functions and important experimental observables for tree ensembles with controlled branching activity and (iii) an efficient sampling scheme for corresponding tree configurations and arbitrary static properties.
[ { "version": "v1", "created": "Thu, 17 Apr 2025 22:07:47 GMT" } ]
2025-04-21T00:00:00
[ [ "van der Hoek", "Pieter H. W.", "" ], [ "Rosa", "Angelo", "" ], [ "Everaers", "Ralf", "" ] ]
2504.13365
Long Li
Long Li, Jiajia Li, Dong Chen, Lina Pu, Haibo Yao, Yanbo Huang
VLLFL: A Vision-Language Model Based Lightweight Federated Learning Framework for Smart Agriculture
null
null
null
null
cs.CV cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In modern smart agriculture, object detection plays a crucial role by enabling automation, precision farming, and monitoring of resources. From identifying crop health and pest infestations to optimizing harvesting processes, accurate object detection enhances both productivity and sustainability. However, training object detection models often requires large-scale data collection and raises privacy concerns, particularly when sensitive agricultural data is distributed across farms. To address these challenges, we propose VLLFL, a vision-language model-based lightweight federated learning framework (VLLFL). It harnesses the generalization and context-aware detection capabilities of the vision-language model (VLM) and leverages the privacy-preserving nature of federated learning. By training a compact prompt generator to boost the performance of the VLM deployed across different farms, VLLFL preserves privacy while reducing communication overhead. Experimental results demonstrate that VLLFL achieves 14.53% improvement in the performance of VLM while reducing 99.3% communication overhead. Spanning tasks from identifying a wide variety of fruits to detecting harmful animals in agriculture, the proposed framework offers an efficient, scalable, and privacy-preserving solution specifically tailored to agricultural applications.
[ { "version": "v1", "created": "Thu, 17 Apr 2025 22:14:31 GMT" } ]
2025-04-21T00:00:00
[ [ "Li", "Long", "" ], [ "Li", "Jiajia", "" ], [ "Chen", "Dong", "" ], [ "Pu", "Lina", "" ], [ "Yao", "Haibo", "" ], [ "Huang", "Yanbo", "" ] ]
2504.13366
Alexander A. Kubasch
Alexander A. Kubasch and Gerg\H{o} Schefler
Lattice cohomology and the embedded topological type of plane curve singularities
null
null
null
null
math.AG
http://creativecommons.org/licenses/by/4.0/
Analytic lattice cohomology is a new invariant of reduced curve singularities. In the case of plane curves, it is an algebro-geometric analogue of Heegaard Floer Link homology. However, by the rigidity of the analytic structure, lattice cohomology can be naturally defined in higher codimensions as well. In this paper we show that in the case of irreducible plane curve singularities the lattice cohomology is a complete embedded topological invariant. We also compare it to the integral Seifert form in the case of multiple branches.
[ { "version": "v1", "created": "Thu, 17 Apr 2025 22:16:23 GMT" } ]
2025-04-21T00:00:00
[ [ "Kubasch", "Alexander A.", "" ], [ "Schefler", "Gergő", "" ] ]
2504.13367
Xiao Pu
Xiao Pu, Michael Saxon, Wenyue Hua, William Yang Wang
THOUGHTTERMINATOR: Benchmarking, Calibrating, and Mitigating Overthinking in Reasoning Models
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Reasoning models have demonstrated impressive performance on difficult tasks that traditional language models struggle at. However, many are plagued with the problem of overthinking--generating large amounts of unnecessary tokens which don't improve accuracy on a question. We introduce approximate measures of problem-level difficulty and demonstrate that a clear relationship between problem difficulty and optimal token spend exists, and evaluate how well calibrated a variety of reasoning models are in terms of efficiently allocating the optimal token count. We find that in general, reasoning models are poorly calibrated, particularly on easy problems. To evaluate calibration on easy questions we introduce DUMB500, a dataset of extremely easy math, reasoning, code, and task problems, and jointly evaluate reasoning model on these simple examples and extremely difficult examples from existing frontier benchmarks on the same task domain. Finally, we introduce THOUGHTTERMINATOR, a training-free black box decoding technique that significantly improves reasoning model calibration.
[ { "version": "v1", "created": "Thu, 17 Apr 2025 22:16:30 GMT" } ]
2025-04-21T00:00:00
[ [ "Pu", "Xiao", "" ], [ "Saxon", "Michael", "" ], [ "Hua", "Wenyue", "" ], [ "Wang", "William Yang", "" ] ]
2504.13368
Haoran Xu
Haoran Xu, Shuozhe Li, Harshit Sikchi, Scott Niekum, Amy Zhang
An Optimal Discriminator Weighted Imitation Perspective for Reinforcement Learning
ICLR 2025
null
null
null
cs.LG cs.AI
http://creativecommons.org/licenses/by/4.0/
We introduce Iterative Dual Reinforcement Learning (IDRL), a new method that takes an optimal discriminator-weighted imitation view of solving RL. Our method is motivated by a simple experiment in which we find training a discriminator using the offline dataset plus an additional expert dataset and then performing discriminator-weighted behavior cloning gives strong results on various types of datasets. That optimal discriminator weight is quite similar to the learned visitation distribution ratio in Dual-RL, however, we find that current Dual-RL methods do not correctly estimate that ratio. In IDRL, we propose a correction method to iteratively approach the optimal visitation distribution ratio in the offline dataset given no addtional expert dataset. During each iteration, IDRL removes zero-weight suboptimal transitions using the learned ratio from the previous iteration and runs Dual-RL on the remaining subdataset. This can be seen as replacing the behavior visitation distribution with the optimized visitation distribution from the previous iteration, which theoretically gives a curriculum of improved visitation distribution ratios that are closer to the optimal discriminator weight. We verify the effectiveness of IDRL on various kinds of offline datasets, including D4RL datasets and more realistic corrupted demonstrations. IDRL beats strong Primal-RL and Dual-RL baselines in terms of both performance and stability, on all datasets.
[ { "version": "v1", "created": "Thu, 17 Apr 2025 22:21:35 GMT" } ]
2025-04-21T00:00:00
[ [ "Xu", "Haoran", "" ], [ "Li", "Shuozhe", "" ], [ "Sikchi", "Harshit", "" ], [ "Niekum", "Scott", "" ], [ "Zhang", "Amy", "" ] ]
2504.13369
Carlos Soares
Carlos C. Soares, Thiago J. A. Mori, Fanny B\'eron, Jagadeesh S. Moodera, J\'ulio C. Cezar, Jeovani Brand\~ao, and Gilv\^ania Vilela
Compensation-Like Temperature and Spin-Flip Switch in Strained Thulium Iron Garnet Thin Films: Tuning Sublattice Interactions for Ferrimagnetic Spintronics
23 pages, 4 figures, submitted to ACS Applied Nano Materials
null
null
null
cond-mat.mtrl-sci
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Certain rare-earth iron garnet (RIG) thin films combine desirable properties such as low magnetic damping, high magnetostriction, and, in some cases, perpendicular magnetic anisotropy (PMA), making them attractive for spintronics applications. However, the interplay between their magnetic sublattices in confined films remains poorly explored, particularly the coupling between 3d and 4f electrons. Here, we investigate the magnetic properties of a 30 nm-thick thulium iron garnet (TmIG) thin film, where tensile strain promotes PMA. SQUID magnetometry and X-ray Magnetic Circular Dichroism measurements reveal a magnetization minimum near 50 K under moderate magnetic fields, leading to a compensation-like temperature (Tcomp-like), a feature absent in bulk TmIG. The presence of Tcomp-like is particularly relevant for controlling magnetization dynamics through compensation phenomena. Additionally, we observe a field-induced spin-flip transition in the Tm sublattice, where Tm moments reorient and align ferromagnetically concerning the Fe sublattices. This mechanism can be exploited for energy-efficient magnetization reversal. These findings provide new insights into strain-driven magnetic phenomena in rare-earth iron garnet thin films, highlighting the interplay between exchange interactions and anisotropy in confined geometries, which is crucial for the development of spintronic and magnonic devices.
[ { "version": "v1", "created": "Thu, 17 Apr 2025 22:25:29 GMT" } ]
2025-04-21T00:00:00
[ [ "Soares", "Carlos C.", "" ], [ "Mori", "Thiago J. A.", "" ], [ "Béron", "Fanny", "" ], [ "Moodera", "Jagadeesh S.", "" ], [ "Cezar", "Júlio C.", "" ], [ "Brandão", "Jeovani", "" ], [ "Vilela", "Gilvânia", "" ] ]
2504.13370
Zhenhua Yu
Xiao Jin, Bo Xiao, Huijiang Wang, Wendong Wang, Zhenhua Yu
Multi-Sensor Fusion-Based Mobile Manipulator Remote Control for Intelligent Smart Home Assistance
null
null
null
null
cs.RO cs.HC
http://creativecommons.org/licenses/by-nc-nd/4.0/
This paper proposes a wearable-controlled mobile manipulator system for intelligent smart home assistance, integrating MEMS capacitive microphones, IMU sensors, vibration motors, and pressure feedback to enhance human-robot interaction. The wearable device captures forearm muscle activity and converts it into real-time control signals for mobile manipulation. The wearable device achieves an offline classification accuracy of 88.33\%\ across six distinct movement-force classes for hand gestures by using a CNN-LSTM model, while real-world experiments involving five participants yield a practical accuracy of 83.33\%\ with an average system response time of 1.2 seconds. In Human-Robot synergy in navigation and grasping tasks, the robot achieved a 98\%\ task success rate with an average trajectory deviation of only 3.6 cm. Finally, the wearable-controlled mobile manipulator system achieved a 93.3\%\ gripping success rate, a transfer success of 95.6\%\, and a full-task success rate of 91.1\%\ during object grasping and transfer tests, in which a total of 9 object-texture combinations were evaluated. These three experiments' results validate the effectiveness of MEMS-based wearable sensing combined with multi-sensor fusion for reliable and intuitive control of assistive robots in smart home scenarios.
[ { "version": "v1", "created": "Thu, 17 Apr 2025 22:33:38 GMT" } ]
2025-04-21T00:00:00
[ [ "Jin", "Xiao", "" ], [ "Xiao", "Bo", "" ], [ "Wang", "Huijiang", "" ], [ "Wang", "Wendong", "" ], [ "Yu", "Zhenhua", "" ] ]
2504.13371
Andrew Lohn
Andrew J. Lohn
The Impact of AI on the Cyber Offense-Defense Balance and the Character of Cyber Conflict
null
null
null
null
cs.CR cs.AI cs.CY
http://creativecommons.org/licenses/by/4.0/
Unlike other domains of conflict, and unlike other fields with high anticipated risk from AI, the cyber domain is intrinsically digital with a tight feedback loop between AI training and cyber application. Cyber may have some of the largest and earliest impacts from AI, so it is important to understand how the cyber domain may change as AI continues to advance. Our approach reviewed the literature, collecting nine arguments that have been proposed for offensive advantage in cyber conflict and nine proposed arguments for defensive advantage. We include an additional forty-eight arguments that have been proposed to give cyber conflict and competition its character as collected separately by Healey, Jervis, and Nandrajog. We then consider how each of those arguments and propositions might change with varying degrees of AI advancement. We find that the cyber domain is too multifaceted for a single answer to whether AI will enhance offense or defense broadly. AI will improve some aspects, hinder others, and leave some aspects unchanged. We collect and present forty-four ways that we expect AI to impact the cyber offense-defense balance and the character of cyber conflict and competition.
[ { "version": "v1", "created": "Thu, 17 Apr 2025 22:40:14 GMT" } ]
2025-04-21T00:00:00
[ [ "Lohn", "Andrew J.", "" ] ]
2504.13372
Joshua Robbins
Joshua A. Robbins, Stephen J. Harnett, Andrew F. Thompson, Sean Brennan, Herschel C. Pangborn
Integration of a Graph-Based Path Planner and Mixed-Integer MPC for Robot Navigation in Cluttered Environments
null
null
null
null
eess.SY cs.RO cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The ability to update a path plan is a required capability for autonomous mobile robots navigating through uncertain environments. This paper proposes a re-planning strategy using a multilayer planning and control framework for cases where the robot's environment is partially known. A medial axis graph-based planner defines a global path plan based on known obstacles where each edge in the graph corresponds to a unique corridor. A mixed-integer model predictive control (MPC) method detects if a terminal constraint derived from the global plan is infeasible, subject to a non-convex description of the local environment. Infeasibility detection is used to trigger efficient global re-planning via medial axis graph edge deletion. The proposed re-planning strategy is demonstrated experimentally.
[ { "version": "v1", "created": "Thu, 17 Apr 2025 22:42:03 GMT" } ]
2025-04-21T00:00:00
[ [ "Robbins", "Joshua A.", "" ], [ "Harnett", "Stephen J.", "" ], [ "Thompson", "Andrew F.", "" ], [ "Brennan", "Sean", "" ], [ "Pangborn", "Herschel C.", "" ] ]
2504.13373
Yulong Pan
Yulong Pan, Michael Lindsey and Per-Olof Persson
Geometric adaptive smoothed aggregation multigrid for discontinuous Galerkin discretisations
null
null
null
null
math.NA cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a geometric multigrid solver based on adaptive smoothed aggregation suitable for Discontinuous Galerkin (DG) discretisations. Mesh hierarchies are formed via domain decomposition techniques, and the method is applicable to fully unstructured meshes using arbitrary element shapes. Furthermore, the method can be employed for a wide range of commonly used DG numerical fluxes for first- and second-order PDEs including the Interior Penalty and the Local Discontinuous Galerkin methods. We demonstrate excellent and mesh-independent convergence for a range of problems including the Poisson equation, and convection-diffusion for a range of P\'eclet numbers.
[ { "version": "v1", "created": "Thu, 17 Apr 2025 22:50:33 GMT" } ]
2025-04-21T00:00:00
[ [ "Pan", "Yulong", "" ], [ "Lindsey", "Michael", "" ], [ "Persson", "Per-Olof", "" ] ]
2504.13374
Andreas Wagner
Andreas Wagner and Barbara Wohlmuth and Jan Zawallich
The generalized scalar auxiliary variable applied to the incompressible Boussinesq Equation
null
null
null
null
math.NA cs.NA
http://creativecommons.org/licenses/by/4.0/
This paper introduces a second-order time discretization for solving the incompressible Boussinesq equation. It uses the generalized scalar auxiliary variable (GSAV) and a backward differentiation formula (BDF), based on a Taylor expansion around $t^{n+k}$ for $k\geq3$. An exponential time integrator is used for the auxiliary variable to ensure stability independent of the time step size. We give rigorous asymptotic error estimates of the time-stepping scheme, thereby justifying its accuracy and stability. The scheme is reformulated into one amenable to a $H^1$-conforming finite element discretization. Finally, we validate our theoretical results with numerical experiments using a Taylor--Hood-based finite element discretization and show its applicability to large-scale 3-dimensional problems.
[ { "version": "v1", "created": "Thu, 17 Apr 2025 22:55:09 GMT" } ]
2025-04-21T00:00:00
[ [ "Wagner", "Andreas", "" ], [ "Wohlmuth", "Barbara", "" ], [ "Zawallich", "Jan", "" ] ]
2504.13375
Nikhil Kumar
Nikhil Kumar
Pricing AI Model Accuracy
null
null
null
null
econ.TH cs.AI
http://creativecommons.org/licenses/by/4.0/
This paper examines the market for AI models in which firms compete to provide accurate model predictions and consumers exhibit heterogeneous preferences for model accuracy. We develop a consumer-firm duopoly model to analyze how competition affects firms' incentives to improve model accuracy. Each firm aims to minimize its model's error, but this choice can often be suboptimal. Counterintuitively, we find that in a competitive market, firms that improve overall accuracy do not necessarily improve their profits. Rather, each firm's optimal decision is to invest further on the error dimension where it has a competitive advantage. By decomposing model errors into false positive and false negative rates, firms can reduce errors in each dimension through investments. Firms are strictly better off investing on their superior dimension and strictly worse off with investments on their inferior dimension. Profitable investments adversely affect consumers but increase overall welfare.
[ { "version": "v1", "created": "Thu, 17 Apr 2025 23:09:04 GMT" } ]
2025-04-21T00:00:00
[ [ "Kumar", "Nikhil", "" ] ]
2504.13376
Eneko Osaba
Aitor G\'omez-Tejedor, Eneko Osaba and Esther Villar-Rodriguez
Addressing the Minor-Embedding Problem in Quantum Annealing and Evaluating State-of-the-Art Algorithm Performance
Paper submitted for review in the Future Generation Computer Systems journal
null
null
null
quant-ph cs.AI cs.ET
http://creativecommons.org/licenses/by/4.0/
This study addresses the minor-embedding problem, which involves mapping the variables of an Ising model onto a quantum annealing processor. The primary motivation stems from the observed performance disparity of quantum annealers when solving problems suited to the processor's architecture versus those with non-hardware-native topologies. Our research has two main objectives: i) to analyze the impact of embedding quality on the performance of D-Wave Systems quantum annealers, and ii) to evaluate the quality of the embeddings generated by Minorminer, an algorithm provided by D-Wave and widely recognized as the standard minor-embedding technique in the literature. Regarding the first objective, our experiments reveal a clear correlation between the average chain length of embeddings and the relative errors of the solutions sampled. This underscores the critical influence of embedding quality on quantum annealing performance. For the second objective, we focus on the Minorminer technique, assessing its capacity to embed problems, the quality of the embeddings produced, and the robustness of the results. We also compare its performance with Clique Embedding, another algorithm developed by D-Wave, which is deterministic and designed to embed fully connected Ising models into quantum annealing processors, serving as a worst-case scenario. The results demonstrate that there is significant room for improvement for Minorminer, as it has not consistently outperformed the worst-case scenario.
[ { "version": "v1", "created": "Thu, 17 Apr 2025 23:13:14 GMT" } ]
2025-04-21T00:00:00
[ [ "Gómez-Tejedor", "Aitor", "" ], [ "Osaba", "Eneko", "" ], [ "Villar-Rodriguez", "Esther", "" ] ]
2504.13377
Andrea Banzatti Dr.
Sarah A. Smith, Carlos E. Romero-Mirza, Andrea Banzatti, Christian Rab, Peter Abraham, Agnes Kospal, Rik Claes, Carlo F. Manara, Karin I. Oberg, Jeroen Bouwman, Fernando Cruz-Saenz de Miera, and Joel D. Green
JWST's sharper view of EX Lup: cold water from ice sublimation during accretion outbursts
Accepted for publication in ApJ Letters
null
null
null
astro-ph.EP astro-ph.SR
http://creativecommons.org/licenses/by/4.0/
The unstable accretion phases during pre-main-sequence evolution of T Tauri stars produce variable irradiation and heating of planet-forming regions. A strong accretion outburst was observed with Spitzer-IRS in 2008 in EX Lup, the prototype of EXor variables, and found to increase the mid-infrared water and OH emission and decrease organic emission, suggesting large chemical changes. We present here two JWST-MIRI epochs of quiescent EX Lup in 2022 and 2023 obtained over a decade after the 2008 outburst and several months after a moderate burst in 2022. With JWST's sharper spectral view, we can now analyze water emission as a function of temperature in the two MIRI epochs and, approximately, also in the previous Spitzer epochs. This new analysis shows a strong cold water vapor ``burst" in low-energy lines during the 2008 outburst, which we consider clear evidence for enhanced ice sublimation due to a recession of the snowline, as found in protostellar envelopes. JWST shows that EX Lup still has an unusually strong emission from cold water in comparison to other T Tauri disks, suggesting > 10-yr-long freeze-out timescales in the inner disk surface. EX Lup demonstrates that outbursts can significantly change the observed organic-to-water ratios and increase the cold water reservoir, providing chemical signatures to study the recent accretion history of disks. This study provides an unprecedented demonstration of the chemical evolution triggered by accretion outbursts in the Class II phase and of the high potential of time-domain experiments to reveal processes that may have fundamental implications on planet-forming bodies near the snowline.
[ { "version": "v1", "created": "Thu, 17 Apr 2025 23:16:30 GMT" } ]
2025-04-21T00:00:00
[ [ "Smith", "Sarah A.", "" ], [ "Romero-Mirza", "Carlos E.", "" ], [ "Banzatti", "Andrea", "" ], [ "Rab", "Christian", "" ], [ "Abraham", "Peter", "" ], [ "Kospal", "Agnes", "" ], [ "Claes", "Rik", "" ], [ "Manara", "Carlo F.", "" ], [ "Oberg", "Karin I.", "" ], [ "Bouwman", "Jeroen", "" ], [ "de Miera", "Fernando Cruz-Saenz", "" ], [ "Green", "Joel D.", "" ] ]
2504.13378
Shuchang Ye
Mingxiao Tu, Shuchang Ye, Hoijoon Jung, Jinman Kim
SMPL-GPTexture: Dual-View 3D Human Texture Estimation using Text-to-Image Generation Models
null
null
null
null
cs.GR cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Generating high-quality, photorealistic textures for 3D human avatars remains a fundamental yet challenging task in computer vision and multimedia field. However, real paired front and back images of human subjects are rarely available with privacy, ethical and cost of acquisition, which restricts scalability of the data. Additionally, learning priors from image inputs using deep generative models, such as GANs or diffusion models, to infer unseen regions such as the human back often leads to artifacts, structural inconsistencies, or loss of fine-grained detail. To address these issues, we present SMPL-GPTexture (skinned multi-person linear model - general purpose Texture), a novel pipeline that takes natural language prompts as input and leverages a state-of-the-art text-to-image generation model to produce paired high-resolution front and back images of a human subject as the starting point for texture estimation. Using the generated paired dual-view images, we first employ a human mesh recovery model to obtain a robust 2D-to-3D SMPL alignment between image pixels and the 3D model's UV coordinates for each views. Second, we use an inverted rasterization technique that explicitly projects the observed colour from the input images into the UV space, thereby producing accurate, complete texture maps. Finally, we apply a diffusion-based inpainting module to fill in the missing regions, and the fusion mechanism then combines these results into a unified full texture map. Extensive experiments shows that our SMPL-GPTexture can generate high resolution texture aligned with user's prompts.
[ { "version": "v1", "created": "Thu, 17 Apr 2025 23:28:38 GMT" } ]
2025-04-21T00:00:00
[ [ "Tu", "Mingxiao", "" ], [ "Ye", "Shuchang", "" ], [ "Jung", "Hoijoon", "" ], [ "Kim", "Jinman", "" ] ]
2504.13379
Zachary Kilpatrick PhD
Sage B Shaw, Zachary P Kilpatrick, and Daniele Avitabile
Radial Basis Function Techniques for Neural Field Models on Surfaces
25 pages, 8 figures
null
null
null
math.NA cs.NA nlin.PS q-bio.NC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a numerical framework for solving neural field equations on surfaces using Radial Basis Function (RBF) interpolation and quadrature. Neural field models describe the evolution of macroscopic brain activity, but modeling studies often overlook the complex geometry of curved cortical domains. Traditional numerical methods, such as finite element or spectral methods, can be computationally expensive and challenging to implement on irregular domains. In contrast, RBF-based methods provide a flexible alternative by offering interpolation and quadrature schemes that efficiently handle arbitrary geometries with high-order accuracy. We first develop an RBF-based interpolatory projection framework for neural field models on general surfaces. Quadrature for both flat and curved domains are derived in detail, ensuring high-order accuracy and stability as they depend on RBF hyperparameters (basis functions, augmenting polynomials, and stencil size). Through numerical experiments, we demonstrate the convergence of our method, highlighting its advantages over traditional approaches in terms of flexibility and accuracy. We conclude with an exposition of numerical simulations of spatiotemporal activity on complex surfaces, illustrating the method's ability to capture complex wave propagation patterns.
[ { "version": "v1", "created": "Thu, 17 Apr 2025 23:50:33 GMT" } ]
2025-04-21T00:00:00
[ [ "Shaw", "Sage B", "" ], [ "Kilpatrick", "Zachary P", "" ], [ "Avitabile", "Daniele", "" ] ]
2504.13380
Hao Wei
Jing-Yi Jia, Jia-Lei Niu, Da-Chun Qiang, Hao Wei
Alleviating the Hubble Tension with a Local Void and Transitions of the Absolute Magnitude
17 pages, 8 figures, 3 tables, revtex4
null
null
null
astro-ph.CO gr-qc hep-th
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Nowadays, one of the well-known serious challenges in cosmology is the Hubble tension, namely the discrepancy between the Hubble constants from the local observation of Type Ia supernova (SNIa) and the high-$z$ observation of cosmic microwave background (CMB). Here, we are interested in alleviating the Hubble tension with a local void. The key idea is assuming that we live in a locally underdense void, where one will feel a faster expansion rate compared to the cosmic average. In the literature, it was found that a local void cannot satisfyingly alleviate the Hubble tension, since it is not preferred over the $\Lambda$CDM model by the observations such as the Pantheon SNIa sample, especially in terms of the information criteria AIC and BIC. In the present work, we try to alleviate the Hubble tension with a local void and transitions of the absolute magnitude $M$, by using the Pantheon+ SNIa sample alone or jointly with the CMB data of Planck 2018. We find that the Hubble tension can be satisfyingly alleviated, while the $\Lambda$LTB void models are strongly preferred by the observations.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 00:00:00 GMT" } ]
2025-04-21T00:00:00
[ [ "Jia", "Jing-Yi", "" ], [ "Niu", "Jia-Lei", "" ], [ "Qiang", "Da-Chun", "" ], [ "Wei", "Hao", "" ] ]
2504.13381
Hermann Tchatchiem Kamche
Hermann Tchatchiem Kamche
Improved Decoding Algorithm of BD-LRPC Codes
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A Bounded-Degree Low-Rank Parity-Check (BD-LRPC) code is a rank-metric code that admits a parity-check matrix whose support is generated by a set of powers of an element. This specific structure of the parity-check matrix was employed to enhance the first phase of the decoding algorithm through the expansion of the syndrome support. However, this expansion decreases the probability of recovering the error support in the second phase of the decoding algorithm. This paper introduces a novel method based on successive intersections to recover the error support. This method offers two key advantages: it increases the probability of successful decoding and enables the decoding of a greater number of errors.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 00:00:55 GMT" } ]
2025-04-21T00:00:00
[ [ "Kamche", "Hermann Tchatchiem", "" ] ]
2504.13382
Jiankan Liao
Jiankan Liao, Xun Huan and Daniel Cooper
Intelligent data collection for network discrimination in material flow analysis using Bayesian optimal experimental design
21 pages for manuscript, 8 pages for supporting information and bibliography, 8 figures
null
null
null
stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Material flow analyses (MFAs) are powerful tools for highlighting resource efficiency opportunities in supply chains. MFAs are often represented as directed graphs, with nodes denoting processes and edges representing mass flows. However, network structure uncertainty -- uncertainty in the presence or absence of flows between nodes -- is common and can compromise flow predictions. While collection of more MFA data can reduce network structure uncertainty, an intelligent data acquisition strategy is crucial to optimize the resources (person-hours and money spent on collecting and purchasing data) invested in constructing an MFA. In this study, we apply Bayesian optimal experimental design (BOED), based on the Kullback-Leibler divergence, to efficiently target high-utility MFA data -- data that minimizes network structure uncertainty. We introduce a new method with reduced bias for estimating expected utility, demonstrating its superior accuracy over traditional approaches. We illustrate these advances with a case study on the U.S. steel sector MFA, where the expected utility of collecting specific single pieces of steel mass flow data aligns with the actual reduction in network structure uncertainty achieved by collecting said data from the United States Geological Survey and the World Steel Association. The results highlight that the optimal MFA data to collect depends on the total amount of data being gathered, making it sensitive to the scale of the data collection effort. Overall, our methods support intelligent data acquisition strategies, accelerating uncertainty reduction in MFAs and enhancing their utility for impact quantification and informed decision-making.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 00:04:12 GMT" } ]
2025-04-21T00:00:00
[ [ "Liao", "Jiankan", "" ], [ "Huan", "Xun", "" ], [ "Cooper", "Daniel", "" ] ]
2504.13383
Mahnaz Jafarzadeh
Mahnaz Jafarzadeh, Jonathan Conrad, Rafael N. Alexander, and Ben Q. Baragiola
Logical channels in approximate Gottesman-Kitaev-Preskill error correction
31 pages, 7 figures
null
null
null
quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The GKP encoding is a top contender among bosonic codes for fault-tolerant quantum computation. Analysis of the GKP code is complicated by the fact that finite-energy code states leak out of the ideal GKP code space and are not orthogonal. We analyze a variant of the GKP stabilizer measurement circuit using damped, approximate GKP states that virtually project onto the ideal GKP code space between rounds of error correction even when finite-energy GKP states are used. This allows us to identify logical maps between projectors; however, due to finite-energy effects, these maps fail to resolve completely positive, trace-preserving channels on the logical code space. We present two solutions to this problem based on channel twirling the damping operator. The first twirls over the full stabilizer group motivated by standard binning (SB) decoding that converts small amounts of damping into Gaussian random noise. The second twirls over a set of representative Pauli shifts that keeps the energy in the code finite and allow for arbitrary decoding. This approach is not limited to small damping, can be applied when logical GKP unitaries or other sources of CV noise are present, and allows us to study general decoding, which can be optimized to the noise in the circuit. Focusing on damping, we compare decoding strategies tailored to different levels of effective squeezing. While our results indicate that SB decoding is suboptimal for finite-energy GKP states, the advantage of optimized decoding over SB decoding shrinks as the energy in the code increases, and moreover the performance of both strategies converges to that of the stabilizer-twirled logical channel. These studies provide stronger arguments for commonplace procedures in the analysis of GKP error correction:(i) using stochastically shifted GKP states in place of coherently damped ones, and(ii) the use of SB decoding.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 00:13:42 GMT" } ]
2025-04-21T00:00:00
[ [ "Jafarzadeh", "Mahnaz", "" ], [ "Conrad", "Jonathan", "" ], [ "Alexander", "Rafael N.", "" ], [ "Baragiola", "Ben Q.", "" ] ]
2504.13384
Trevor Bowen
Trevor A. Bowen, Alfred Mallet, Corina I. Dunn, Jonathan Squire, Benjamin D. G. Chandran, Romain Meyrand, Nooshin Davis, Thierry Dudok de Wit, Stuart D. Bale, Samuel T. Badman, and Nikos Sioulas
Formation of Magnetic Switchbacks via expanding Alfv\'en Waves
null
null
null
null
astro-ph.SR physics.plasm-ph physics.space-ph
http://creativecommons.org/licenses/by/4.0/
Context. Large-amplitude inversions of the solar wind's interplanetary magnetic field have long been documented; however, observations from the Parker Solar Probe (PSP) mission have renewed interest in this phenomenon as such features, often termed switchbacks, may constrain both the sources of the solar wind as well as in-situ nonlinear dynamics and turbulent heating. Aims. We aim to show that magnetic field fluctuations in the solar wind are consistent with Alfv\'enic fluctuations that naturally form switchback inversions in the magnetic field through expansion effects. Methods. We examine PSP observations of the evolution of a single stream of solar wind in a radial scan from PSP's tenth perihelion encounter from approximately 15-50 solar radii. We study the growth and radial scaling of normalized fluctuation amplitudes in the magnetic field, $\delta B/B$, within the framework of spherical polarization. We compare heating rates computed via outer-scale decay from consideration of wave-action to proton heating rates empirically observed through considering adiabatic expansion. Results. We find that the magnetic field fluctuations are largely spherically polarized and that the normalized amplitudes of the magnetic field, $\delta B/B$, increases with amplitude. The growth of the magnetic field amplitude leads to switchback inversions in the magnetic field. While the amplitudes do not grow as fast as predicted by the conservation of wave action, the deviation from the expected scaling yields an effective heating rate, which is close to the empirically observed proton heating rate. Conclusions. The observed scaling of fluctuation amplitudes is largely consistent with a picture of expanding Alfv\'en waves that seed turbulence leading to dissipation. The expansion of the waves leads to the growth of wave-amplitudes, resulting in the formation of switchbacks.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 00:17:56 GMT" } ]
2025-04-21T00:00:00
[ [ "Bowen", "Trevor A.", "" ], [ "Mallet", "Alfred", "" ], [ "Dunn", "Corina I.", "" ], [ "Squire", "Jonathan", "" ], [ "Chandran", "Benjamin D. G.", "" ], [ "Meyrand", "Romain", "" ], [ "Davis", "Nooshin", "" ], [ "de Wit", "Thierry Dudok", "" ], [ "Bale", "Stuart D.", "" ], [ "Badman", "Samuel T.", "" ], [ "Sioulas", "Nikos", "" ] ]
2504.13385
Tianhong Xu
Tianhong Xu, Aidong Adam Ding and Yunsi Fei
EXAM: Exploiting Exclusive System-Level Cache in Apple M-Series SoCs for Enhanced Cache Occupancy Attacks
Accepted to ACM ASIA CCS 2025
null
null
null
cs.CR cs.AR
http://creativecommons.org/licenses/by/4.0/
Cache occupancy attacks exploit the shared nature of cache hierarchies to infer a victim's activities by monitoring overall cache usage, unlike access-driven cache attacks that focus on specific cache lines or sets. There exists some prior work that target the last-level cache (LLC) of Intel processors, which is inclusive of higher-level caches, and L2 caches of ARM systems. In this paper, we target the System-Level Cache (SLC) of Apple M-series SoCs, which is exclusive to higher-level CPU caches. We address the challenges of the exclusiveness and propose a suite of SLC-cache occupancy attacks, the first of its kind, where an adversary can monitor GPU and other CPU cluster activities from their own CPU cluster. We first discover the structure of SLC in Apple M1 SOC and various policies pertaining to access and sharing through reverse engineering. We propose two attacks against websites. One is a coarse-grained fingerprinting attack, recognizing which website is accessed based on their different GPU memory access patterns monitored through the SLC occupancy channel. The other attack is a fine-grained pixel stealing attack, which precisely monitors the GPU memory usage for rendering different pixels, through the SLC occupancy channel. Third, we introduce a novel screen capturing attack which works beyond webpages, with the monitoring granularity of 57 rows of pixels (there are 1600 rows for the screen). This significantly expands the attack surface, allowing the adversary to retrieve any screen display, posing a substantial new threat to system security. Our findings reveal critical vulnerabilities in Apple's M-series SoCs and emphasize the urgent need for effective countermeasures against cache occupancy attacks in heterogeneous computing environments.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 00:21:00 GMT" } ]
2025-04-21T00:00:00
[ [ "Xu", "Tianhong", "" ], [ "Ding", "Aidong Adam", "" ], [ "Fei", "Yunsi", "" ] ]
2504.13386
Radek Dan\v{e}\v{c}ek
Radek Dan\v{e}\v{c}ek, Carolin Schmitt, Senya Polikovsky, Michael J. Black
Supervising 3D Talking Head Avatars with Analysis-by-Audio-Synthesis
null
null
null
null
cs.GR cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In order to be widely applicable, speech-driven 3D head avatars must articulate their lips in accordance with speech, while also conveying the appropriate emotions with dynamically changing facial expressions. The key problem is that deterministic models produce high-quality lip-sync but without rich expressions, whereas stochastic models generate diverse expressions but with lower lip-sync quality. To get the best of both, we seek a stochastic model with accurate lip-sync. To that end, we develop a new approach based on the following observation: if a method generates realistic 3D lip motions, it should be possible to infer the spoken audio from the lip motion. The inferred speech should match the original input audio, and erroneous predictions create a novel supervision signal for training 3D talking head avatars with accurate lip-sync. To demonstrate this effect, we propose THUNDER (Talking Heads Under Neural Differentiable Elocution Reconstruction), a 3D talking head avatar framework that introduces a novel supervision mechanism via differentiable sound production. First, we train a novel mesh-to-speech model that regresses audio from facial animation. Then, we incorporate this model into a diffusion-based talking avatar framework. During training, the mesh-to-speech model takes the generated animation and produces a sound that is compared to the input speech, creating a differentiable analysis-by-audio-synthesis supervision loop. Our extensive qualitative and quantitative experiments demonstrate that THUNDER significantly improves the quality of the lip-sync of talking head avatars while still allowing for generation of diverse, high-quality, expressive facial animations.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 00:24:52 GMT" } ]
2025-04-21T00:00:00
[ [ "Daněček", "Radek", "" ], [ "Schmitt", "Carolin", "" ], [ "Polikovsky", "Senya", "" ], [ "Black", "Michael J.", "" ] ]
2504.13387
Lingfeng Bao
Lingfeng Bao, Jiameng Yang, Xiaohu Yang, Chunming Rong
Bibliometric Analysis of Scientific Publications on Blockchain Research and Applications
null
null
null
null
cs.DL cs.DC
http://creativecommons.org/licenses/by/4.0/
Since the introduction of Bitcoin in 2008, blockchain technology has garnered widespread attention. Scholars from various research fields, countries, and institutions have published a significant number of papers on this subject. However, there is currently a lack of comprehensive analysis specifically focusing on the scientific publications in the field of blockchain. To conduct a comprehensive analysis, we compiled a corpus of 41,497 publications in blockchain research from 2008 to 2023 using the Clarivate databases. Through bibliometric and citation analyses, we gained valuable insights into the field. Our study offers an overview of the blockchain research landscape, including country, institution, authorship, and subject categories. Additionally, we identified Emerging Research Areas (ERA) using the co-citation clustering approach, examining factors such as recency, growth, and contributions from different countries/regions. Furthermore, we identified influential publications based on citation velocity and analyzed five representative Research Fronts in detail. This analysis provides a fine-grained examination of specific areas within blockchain research. Our findings contribute to understanding evolving trends, emerging applications, and potential directions for future research in the multidisciplinary field of blockchain.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 00:29:13 GMT" } ]
2025-04-21T00:00:00
[ [ "Bao", "Lingfeng", "" ], [ "Yang", "Jiameng", "" ], [ "Yang", "Xiaohu", "" ], [ "Rong", "Chunming", "" ] ]
2504.13388
Yegor Klochkov
Yegor Klochkov
A mean teacher algorithm for unlearning of language models
null
null
null
null
cs.LG cs.CL
http://creativecommons.org/licenses/by/4.0/
One of the goals of language model unlearning is to reduce memorization of selected text instances while retaining the model's general abilities. Despite various proposed methods, reducing memorization of large datasets without noticeable degradation in model utility remains challenging. In this paper, we investigate the mean teacher algorithm (Tarvainen & Valpola, 2017), a simple proximal optimization method from continual learning literature that gradually modifies the teacher model. We show that the mean teacher can approximate a trajectory of a slow natural gradient descent (NGD), which inherently seeks low-curvature updates that are less likely to degrade the model utility. While slow NGD can suffer from vanishing gradients, we introduce a new unlearning loss called "negative log-unlikelihood" (NLUL) that avoids this problem. We show that the combination of mean teacher and NLUL improves some metrics on the MUSE benchmarks (Shi et al., 2024).
[ { "version": "v1", "created": "Fri, 18 Apr 2025 00:34:19 GMT" } ]
2025-04-21T00:00:00
[ [ "Klochkov", "Yegor", "" ] ]
2504.13389
Jamie Lee
Jamie Lee, Kyuha Jung, Erin Gregg Newman, Emilie Chow, and Yunan Chen
Understanding Adolescents' Perceptions of Benefits and Risks in Health AI Technologies through Design Fiction
null
null
null
null
cs.HC cs.CY
http://creativecommons.org/licenses/by/4.0/
Despite the growing research on users' perceptions of health AI, adolescents' perspectives remain underexplored. This study explores adolescents' perceived benefits and risks of health AI technologies in clinical and personal health settings. Employing Design Fiction, we conducted interviews with 16 adolescents (aged 13-17) using four fictional design scenarios that represent current and future health AI technologies as probes. Our findings reveal that with a positive yet cautious attitude, adolescents envision unique benefits and risks specific to their age group. While health AI technologies were seen as valuable learning resources, they also raised concerns about confidentiality with their parents. Additionally, we identified several factors, such as severity of health conditions and previous experience with AI, influencing their perceptions of trust and privacy in health AI. We explore how these insights can inform the future of design of health AI technologies to support learning, engagement, and trust as adolescents navigate their healthcare journey.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 00:41:11 GMT" } ]
2025-04-21T00:00:00
[ [ "Lee", "Jamie", "" ], [ "Jung", "Kyuha", "" ], [ "Newman", "Erin Gregg", "" ], [ "Chow", "Emilie", "" ], [ "Chen", "Yunan", "" ] ]
2504.13390
Mahrokh Najaf
Mahrokh Najaf, Gregory Ongie
Accelerated Optimization of Implicit Neural Representations for CT Reconstruction
IEEE ISBI 2025
null
null
null
eess.IV cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Inspired by their success in solving challenging inverse problems in computer vision, implicit neural representations (INRs) have been recently proposed for reconstruction in low-dose/sparse-view X-ray computed tomography (CT). An INR represents a CT image as a small-scale neural network that takes spatial coordinates as inputs and outputs attenuation values. Fitting an INR to sinogram data is similar to classical model-based iterative reconstruction methods. However, training INRs with losses and gradient-based algorithms can be prohibitively slow, taking many thousands of iterations to converge. This paper investigates strategies to accelerate the optimization of INRs for CT reconstruction. In particular, we propose two approaches: (1) using a modified loss function with improved conditioning, and (2) an algorithm based on the alternating direction method of multipliers. We illustrate that both of these approaches significantly accelerate INR-based reconstruction of a synthetic breast CT phantom in a sparse-view setting.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 00:52:56 GMT" } ]
2025-04-21T00:00:00
[ [ "Najaf", "Mahrokh", "" ], [ "Ongie", "Gregory", "" ] ]
2504.13391
Racheal Mukisa
Racheal Mukisa and Arvind K. Bansal
Cardiac MRI Semantic Segmentation for Ventricles and Myocardium using Deep Learning
20 pages, 8 figures
null
null
null
eess.IV cs.AI cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Automated noninvasive cardiac diagnosis plays a critical role in the early detection of cardiac disorders and cost-effective clinical management. Automated diagnosis involves the automated segmentation and analysis of cardiac images. Precise delineation of cardiac substructures and extraction of their morphological attributes are essential for evaluating the cardiac function, and diagnosing cardiovascular disease such as cardiomyopathy, valvular diseases, abnormalities related to septum perforations, and blood-flow rate. Semantic segmentation labels the CMR image at the pixel level, and localizes its subcomponents to facilitate the detection of abnormalities, including abnormalities in cardiac wall motion in an aging heart with muscle abnormalities, vascular abnormalities, and valvular abnormalities. In this paper, we describe a model to improve semantic segmentation of CMR images. The model extracts edge-attributes and context information during down-sampling of the U-Net and infuses this information during up-sampling to localize three major cardiac structures: left ventricle cavity (LV); right ventricle cavity (RV); and LV myocardium (LMyo). We present an algorithm and performance results. A comparison of our model with previous leading models, using similarity metrics between actual image and segmented image, shows that our approach improves Dice similarity coefficient (DSC) by 2%-11% and lowers Hausdorff distance (HD) by 1.6 to 5.7 mm.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 00:54:30 GMT" } ]
2025-04-21T00:00:00
[ [ "Mukisa", "Racheal", "" ], [ "Bansal", "Arvind K.", "" ] ]
2504.13392
Evans Xu Han
Evans Xu Han, Alice Qian Zhang, Hong Shen, Haiyi Zhu, Paul Pu Liang, Jane Hsieh
POET: Supporting Prompting Creativity and Personalization with Automated Expansion of Text-to-Image Generation
null
null
null
null
cs.CV cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
State-of-the-art visual generative AI tools hold immense potential to assist users in the early ideation stages of creative tasks -- offering the ability to generate (rather than search for) novel and unprecedented (instead of existing) images of considerable quality that also adhere to boundless combinations of user specifications. However, many large-scale text-to-image systems are designed for broad applicability, yielding conventional output that may limit creative exploration. They also employ interaction methods that may be difficult for beginners. Given that creative end users often operate in diverse, context-specific ways that are often unpredictable, more variation and personalization are necessary. We introduce POET, a real-time interactive tool that (1) automatically discovers dimensions of homogeneity in text-to-image generative models, (2) expands these dimensions to diversify the output space of generated images, and (3) learns from user feedback to personalize expansions. An evaluation with 28 users spanning four creative task domains demonstrated POET's ability to generate results with higher perceived diversity and help users reach satisfaction in fewer prompts during creative tasks, thereby prompting them to deliberate and reflect more on a wider range of possible produced results during the co-creative process. Focusing on visual creativity, POET offers a first glimpse of how interaction techniques of future text-to-image generation tools may support and align with more pluralistic values and the needs of end users during the ideation stages of their work.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 00:54:36 GMT" } ]
2025-04-21T00:00:00
[ [ "Han", "Evans Xu", "" ], [ "Zhang", "Alice Qian", "" ], [ "Shen", "Hong", "" ], [ "Zhu", "Haiyi", "" ], [ "Liang", "Paul Pu", "" ], [ "Hsieh", "Jane", "" ] ]
2504.13393
S M Rayeed
S M Rayeed, Alyson East, Samuel Stevens, Sydne Record, Charles V Stewart
BeetleVerse: A study on taxonomic classification of ground beetles
null
null
null
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
Ground beetles are a highly sensitive and speciose biological indicator, making them vital for monitoring biodiversity. However, they are currently an underutilized resource due to the manual effort required by taxonomic experts to perform challenging species differentiations based on subtle morphological differences, precluding widespread applications. In this paper, we evaluate 12 vision models on taxonomic classification across four diverse, long-tailed datasets spanning over 230 genera and 1769 species, with images ranging from controlled laboratory settings to challenging field-collected (in-situ) photographs. We further explore taxonomic classification in two important real-world contexts: sample efficiency and domain adaptation. Our results show that the Vision and Language Transformer combined with an MLP head is the best performing model, with 97\% accuracy at genus and 94\% at species level. Sample efficiency analysis shows that we can reduce train data requirements by up to 50\% with minimal compromise in performance. The domain adaptation experiments reveal significant challenges when transferring models from lab to in-situ images, highlighting a critical domain gap. Overall, our study lays a foundation for large-scale automated taxonomic classification of beetles, and beyond that, advances sample-efficient learning and cross-domain adaptation for diverse long-tailed ecological datasets.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 01:06:37 GMT" } ]
2025-04-21T00:00:00
[ [ "Rayeed", "S M", "" ], [ "East", "Alyson", "" ], [ "Stevens", "Samuel", "" ], [ "Record", "Sydne", "" ], [ "Stewart", "Charles V", "" ] ]
2504.13394
Bo Zhou
Bo Zhou, Kaijie Xu, Yinghui Quan and Mengdao Xing
A Deep Learning-Based Supervised Transfer Learning Framework for DOA Estimation with Array Imperfections
null
null
null
null
eess.SP
http://creativecommons.org/licenses/by/4.0/
In practical scenarios, processes such as sensor design, manufacturing, and installation will introduce certain errors. Furthermore, mutual interference occurs when the sensors receive signals. These defects in array systems are referred to as array imperfections, which can significantly degrade the performance of Direction of Arrival (DOA) estimation. In this study, we propose a deep-learning based transfer learning approach, which effectively mitigates the degradation of deep-learning based DOA estimation performance caused by array imperfections. In the proposed approach, we highlight three major contributions. First, we propose a Vision Transformer (ViT) based method for DOA estimation, which achieves excellent performance in scenarios with low signal-to-noise ratios (SNR) and limited snapshots. Second, we introduce a transfer learning framework that extends deep learning models from ideal simulation scenarios to complex real-world scenarios with array imperfections. By leveraging prior knowledge from ideal simulation data, the proposed transfer learning framework significantly improves deep learning-based DOA estimation performance in the presence of array imperfections, without the need for extensive real-world data. Finally, we incorporate visualization and evaluation metrics to assess the performance of DOA estimation algorithms, which allow for a more thorough evaluation of algorithms and further validate the proposed method. Our code can be accessed at https://github.com/zzb-nice/DOA_est_Master.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 01:09:38 GMT" } ]
2025-04-21T00:00:00
[ [ "Zhou", "Bo", "" ], [ "Xu", "Kaijie", "" ], [ "Quan", "Yinghui", "" ], [ "Xing", "Mengdao", "" ] ]
2504.13395
Doris Stoppacher
D. Stoppacher, P. Tissera, Y. Rosas-Guevara, G. Galaz, and J. O\~norbe
Hidden Figures in the Sky: Evolution of low-surface brightness galaxies from a hydro-dynamical perspective
18 pages, submitted to A&A
null
null
null
astro-ph.GA
http://creativecommons.org/licenses/by/4.0/
Low-surface brightness galaxies (LSBGs) are defined as galaxies with central surface brightness levels fainter than the night sky, making them challenging to observe. A key open question is whether their faint appearance arises from intrinsic properties or stochastic events in their formation histories. We aim to trace the formation histories of LSBGs to assess whether their evolutionary paths differ from those of high-surface brightness galaxies (HSBGs), and to identify the key physical drivers behind these differences. We present a fast and efficient method to estimate stellar surface brightness densities in hydro-dynamical simulations and a statistically robust exploration of over 150 properties in the reference run \textsc{Ref-L0100N1504} of the \texttt{EAGLE} simulation. To minimise biases, we carefully match the stellar and halo mass distributions of the selected LSB and HSB samples. At $z=0$, LSBGs are typically extended, rotation-supported systems with lower stellar densities, older stellar populations, reduced star formation activity, and higher specific stellar angular momenta $j_*$ than their HSBG counterparts. They also exhibit larger radii of maximum circular velocity ($R_{\mathrm{Vmax}}$). We identify key transition redshifts that mark the divergence of LSBG and HSBG properties: $j_*$ diverges at $z\sim5-7$ and $R_{\mathrm{Vmax}}$ at $z\sim2-3$. Star formation activity and large-scale environment seem to play only a minimal role in the development of LSB features. LSBGs follow mass-dependent evolutionary pathways, where early rapid formation and later slowdowns, combined with their distinct structural properties, influence their response to external factors like mergers and gas accretion. Their LSB nature emerges from intrinsic dynamical and structural factors rather than environmental influences, with angular momentum as a key driver of divergence at high redshifts.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 01:11:14 GMT" } ]
2025-04-21T00:00:00
[ [ "Stoppacher", "D.", "" ], [ "Tissera", "P.", "" ], [ "Rosas-Guevara", "Y.", "" ], [ "Galaz", "G.", "" ], [ "Oñorbe", "J.", "" ] ]
2504.13396
Jianyu Hu
Jianyu Hu, Juan-Pablo Ortega, and Daiying Yin
A global structure-preserving kernel method for the learning of Poisson systems
null
null
null
null
math.NA cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A structure-preserving kernel ridge regression method is presented that allows the recovery of globally defined, potentially high-dimensional, and nonlinear Hamiltonian functions on Poisson manifolds out of datasets made of noisy observations of Hamiltonian vector fields. The proposed method is based on finding the solution of a non-standard kernel ridge regression where the observed data is generated as the noisy image by a vector bundle map of the differential of the function that one is trying to estimate. Additionally, it is shown how a suitable regularization solves the intrinsic non-identifiability of the learning problem due to the degeneracy of the Poisson tensor and the presence of Casimir functions. A full error analysis is conducted that provides convergence rates using fixed and adaptive regularization parameters. The good performance of the proposed estimator is illustrated with several numerical experiments.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 01:12:08 GMT" } ]
2025-04-21T00:00:00
[ [ "Hu", "Jianyu", "" ], [ "Ortega", "Juan-Pablo", "" ], [ "Yin", "Daiying", "" ] ]
2504.13397
Junyu Liu
Yu Gan, Mohadeseh Azar, Nitish Kumar Chandra, Xin Jin, Jinglei Cheng, Kaushik P. Seshadreesan, Junyu Liu
Quantum repeaters enhanced by vacuum beam guides
10 pages
null
null
null
quant-ph cs.DC cs.LG cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The development of large-scale quantum communication networks faces critical challenges due to photon loss and decoherence in optical fiber channels. These fundamentally limit transmission distances and demand dense networks of repeater stations. This work investigates using vacuum beam guides (VBGs)-a promising ultra-low-loss transmission platform-as an alternative to traditional fiber links. By incorporating VBGs into repeater-based architectures, we demonstrate that the inter-repeater spacing can be substantially extended, resulting in fewer required nodes and significantly reducing hardware and operational complexity. We perform a cost-function analysis to quantify performance trade-offs across first, second, and third-generation repeaters. Our results show that first-generation repeaters reduce costs dramatically by eliminating entanglement purification. Third-generation repeaters benefit from improved link transmission success, which is crucial for quantum error correction. In contrast, second-generation repeaters exhibit a more nuanced response; although transmission loss is reduced, their performance remains primarily limited by logical gate errors rather than channel loss. These findings highlight that while all repeater generations benefit from reduced photon loss, the magnitude of improvement depends critically on the underlying error mechanisms. Vacuum beam guides thus emerge as a powerful enabler for scalable, high-performance quantum networks, particularly in conjunction with near-term quantum hardware capabilities.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 01:19:12 GMT" } ]
2025-04-21T00:00:00
[ [ "Gan", "Yu", "" ], [ "Azar", "Mohadeseh", "" ], [ "Chandra", "Nitish Kumar", "" ], [ "Jin", "Xin", "" ], [ "Cheng", "Jinglei", "" ], [ "Seshadreesan", "Kaushik P.", "" ], [ "Liu", "Junyu", "" ] ]
2504.13398
Sen Yang
Sen Yang, Kaihua Qin, Aviv Yaish, Fan Zhang
Insecurity Through Obscurity: Veiled Vulnerabilities in Closed-Source Contracts
null
null
null
null
cs.CR
http://creativecommons.org/licenses/by/4.0/
Most blockchains cannot hide the binary code of programs (i.e., smart contracts) running on them. To conceal proprietary business logic and to potentially deter attacks, many smart contracts are closed-source and employ layers of obfuscation. However, we demonstrate that such obfuscation can obscure critical vulnerabilities rather than enhance security, a phenomenon we term insecurity through obscurity. To systematically analyze these risks on a large scale, we present SKANF, a novel EVM bytecode analysis tool tailored for closed-source and obfuscated contracts. SKANF combines control-flow deobfuscation, symbolic execution, and concolic execution based on historical transactions to identify and exploit asset management vulnerabilities. Our evaluation on real-world Maximal Extractable Value (MEV) bots reveals that SKANF detects vulnerabilities in 1,028 contracts and successfully generates exploits for 373 of them, with potential losses exceeding \$9.0M. Additionally, we uncover 40 real-world MEV bot attacks that collectively resulted in \$900K in losses.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 01:22:58 GMT" } ]
2025-04-21T00:00:00
[ [ "Yang", "Sen", "" ], [ "Qin", "Kaihua", "" ], [ "Yaish", "Aviv", "" ], [ "Zhang", "Fan", "" ] ]
2504.13399
Shashank Shriram
Shashank Shriram, Srinivasa Perisetla, Aryan Keskar, Harsha Krishnaswamy, Tonko Emil Westerhof Bossen, Andreas M{\o}gelmose, Ross Greer
Towards a Multi-Agent Vision-Language System for Zero-Shot Novel Hazardous Object Detection for Autonomous Driving Safety
null
null
null
null
cs.CV cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Detecting anomalous hazards in visual data, particularly in video streams, is a critical challenge in autonomous driving. Existing models often struggle with unpredictable, out-of-label hazards due to their reliance on predefined object categories. In this paper, we propose a multimodal approach that integrates vision-language reasoning with zero-shot object detection to improve hazard identification and explanation. Our pipeline consists of a Vision-Language Model (VLM), a Large Language Model (LLM), in order to detect hazardous objects within a traffic scene. We refine object detection by incorporating OpenAI's CLIP model to match predicted hazards with bounding box annotations, improving localization accuracy. To assess model performance, we create a ground truth dataset by denoising and extending the foundational COOOL (Challenge-of-Out-of-Label) anomaly detection benchmark dataset with complete natural language descriptions for hazard annotations. We define a means of hazard detection and labeling evaluation on the extended dataset using cosine similarity. This evaluation considers the semantic similarity between the predicted hazard description and the annotated ground truth for each video. Additionally, we release a set of tools for structuring and managing large-scale hazard detection datasets. Our findings highlight the strengths and limitations of current vision-language-based approaches, offering insights into future improvements in autonomous hazard detection systems. Our models, scripts, and data can be found at https://github.com/mi3labucm/COOOLER.git
[ { "version": "v1", "created": "Fri, 18 Apr 2025 01:25:02 GMT" } ]
2025-04-21T00:00:00
[ [ "Shriram", "Shashank", "" ], [ "Perisetla", "Srinivasa", "" ], [ "Keskar", "Aryan", "" ], [ "Krishnaswamy", "Harsha", "" ], [ "Bossen", "Tonko Emil Westerhof", "" ], [ "Møgelmose", "Andreas", "" ], [ "Greer", "Ross", "" ] ]
2504.13400
Tabish Qureshi
Suvrajyoti Chatterjee, Saba Firoze, Tabish Qureshi
Diffusion Limited Aggregation in Ants Biting off Wall Paint
4 pages
null
null
null
nlin.PS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Diffusion limited aggregation (DLA) is a well studied phenomenon in which diffusing particles cumulatively aggregate on a starting fixed seed point, forming a pattern which is fractal in structure. Here we report an interesting DLA process arising from ants biting off wall paint. The structures arising from this long process are analyzed and found to have a fractional dimension between 1 and 2. The DLA formations observed in nature are mostly a result of various kinds of inanimate particles diffusing and aggregating. What makes the present observation interesting is that it involves live beings which may be guided by sight, smell etc. A simple theoretical model of the process is simulated, and the results agree well with the experimental observations.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 01:32:45 GMT" } ]
2025-04-21T00:00:00
[ [ "Chatterjee", "Suvrajyoti", "" ], [ "Firoze", "Saba", "" ], [ "Qureshi", "Tabish", "" ] ]
2504.13401
Er-Jia Guo
Ting Cui, Ying Zhou, Qianying Wang, Dongke Rong, Haitao Hong, Axin Xie, Jun-Jie Zhang, Qinghua Zhang, Can Wang, Chen Ge, Lin Gu, Shanmin Wang, Kuijuan Jin, Shuai Dong, and Er-Jia Guo
Charge transfer induced insulating state at antiperovskite/perovskite heterointerfaces
15 pages; 4 figures
null
null
null
cond-mat.mtrl-sci
http://creativecommons.org/licenses/by/4.0/
Heterointerfaces have been pivotal in unveiling extraordinary interfacial properties and enabling multifunctional material platforms. Despite extensive research on all-oxide interfaces, heterointerfaces between different material classes, such as oxides and nitrides, remain underexplored. Here we present the fabrication of a high-quality Dirac metal antiperovskite Ni3InN, characterized by an extremely low temperature coefficient of resistivity, approximately 1.8*10^-8 {\Omega}*cm/K, over a broad temperature range. Atomically sharp heterointerfaces between Ni3InN and SrVO3 were constructed, revealing intriguing interfacial phenomena. Leveraging layer-resolved scanning transmission electron microscopy and electron energy loss spectroscopy, we identified pronounced charge transfer across the well-ordered interface. Remarkably, this interfacial electron transfer from Ni3InN to SrVO3 induces an insulating interfacial layer and an emergent magnetic moment within the Ni3InN layer, consistent with first-principles calculations. These findings pave the way for novel electronic and spintronic applications by enabling tunable interfacial properties in nitride/oxide systems.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 01:36:35 GMT" } ]
2025-04-21T00:00:00
[ [ "Cui", "Ting", "" ], [ "Zhou", "Ying", "" ], [ "Wang", "Qianying", "" ], [ "Rong", "Dongke", "" ], [ "Hong", "Haitao", "" ], [ "Xie", "Axin", "" ], [ "Zhang", "Jun-Jie", "" ], [ "Zhang", "Qinghua", "" ], [ "Wang", "Can", "" ], [ "Ge", "Chen", "" ], [ "Gu", "Lin", "" ], [ "Wang", "Shanmin", "" ], [ "Jin", "Kuijuan", "" ], [ "Dong", "Shuai", "" ], [ "Guo", "Er-Jia", "" ] ]
2504.13402
Vedrana Ivezic
Vedrana Ivezi\'c, Ashwath Radhachandran, Ekaterina Redekop, Shreeram Athreya, Dongwoo Lee, Vivek Sant, Corey Arnold, William Speier
CytoFM: The first cytology foundation model
null
null
null
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
Cytology is essential for cancer diagnostics and screening due to its minimally invasive nature. However, the development of robust deep learning models for digital cytology is challenging due to the heterogeneity in staining and preparation methods of samples, differences across organs, and the limited availability of large, diverse, annotated datasets. Developing a task-specific model for every cytology application is impractical and non-cytology-specific foundation models struggle to generalize to tasks in this domain where the emphasis is on cell morphology. To address these challenges, we introduce CytoFM, the first cytology self-supervised foundation model. Using iBOT, a self-supervised Vision Transformer (ViT) training framework incorporating masked image modeling and self-distillation, we pretrain CytoFM on a diverse collection of cytology datasets to learn robust, transferable representations. We evaluate CytoFM on multiple downstream cytology tasks, including breast cancer classification and cell type identification, using an attention-based multiple instance learning framework. Our results demonstrate that CytoFM performs better on two out of three downstream tasks than existing foundation models pretrained on histopathology (UNI) or natural images (iBOT-Imagenet). Visualizations of learned representations demonstrate our model is able to attend to cytologically relevant features. Despite a small pre-training dataset, CytoFM's promising results highlight the ability of task-agnostic pre-training approaches to learn robust and generalizable features from cytology data.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 01:37:50 GMT" } ]
2025-04-21T00:00:00
[ [ "Ivezić", "Vedrana", "" ], [ "Radhachandran", "Ashwath", "" ], [ "Redekop", "Ekaterina", "" ], [ "Athreya", "Shreeram", "" ], [ "Lee", "Dongwoo", "" ], [ "Sant", "Vivek", "" ], [ "Arnold", "Corey", "" ], [ "Speier", "William", "" ] ]
2504.13403
Yeongjun Jang
Yeongjun Jang, Joowon Lee, and Junsoo Kim
Documentation on Encrypted Dynamic Control Simulation Code using Ring-LWE based Cryptosystems
6 pages
Journal of The Society of Instrument and Control Engineers, vol. 64, no. 4, pp. 248-254, 2025
10.11499/sicejl.64.248
null
eess.SY cs.SY
http://creativecommons.org/licenses/by/4.0/
Encrypted controllers offer secure computation by employing modern cryptosystems to execute control operations directly over encrypted data without decryption. However, incorporating cryptosystems into dynamic controllers significantly increases the computational load. This paper aims to provide an accessible guideline for running encrypted controllers using an open-source library Lattigo, which supports an efficient implementation of Ring-Learing With Errors (LWE) based encrypted controllers, and our explanations are assisted with example codes that are fully available at https://github.com/CDSL-EncryptedControl/CDSL.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 01:47:48 GMT" } ]
2025-04-21T00:00:00
[ [ "Jang", "Yeongjun", "" ], [ "Lee", "Joowon", "" ], [ "Kim", "Junsoo", "" ] ]
2504.13404
Rui Shang
Rui Shang, Bingjie Huang
Design Priorities in Digital Gateways: A Comparative Study of Authentication and Usability in Academic Library Alliances
null
null
null
null
cs.HC cs.DL
http://creativecommons.org/licenses/by-nc-sa/4.0/
Purpose: This study examines the design and functionality of university library login pages across academic alliances (IVY Plus, BTAA, JULAC, JVU) to identify how these interfaces align with institutional priorities and user needs. It explores consensus features, design variations, and emerging trends in authentication, usability, and security. Methodology: A multi-method approach was employed: screenshots and HTML files from 46 institutions were analyzed through categorization, statistical analysis, and comparative evaluation. Features were grouped into authentication mechanisms, usability, security/compliance, and library-specific elements. Findings: Core functionalities (e.g., ID/password, privacy policies) were consistent across alliances. Divergences emerged in feature emphasis: mature alliances (e.g., BTAA) prioritized resource accessibility with streamlined interfaces, while emerging consortia (e.g., JVU) emphasized cybersecurity (IP restrictions, third-party integrations). Usability features, particularly multilingual support, drove cross-alliance differences. The results highlighted regional and institutional influences, with older alliances favoring simplicity and newer ones adopting security-centric designs. Originality/Value: This is the first systematic comparison of login page designs across academic alliances, offering insights into how regional, technological, and institutional factors shape digital resource access. Findings inform best practices for balancing security, usability, and accessibility in library interfaces. **Keywords**: Academic library consortia, Login page design, User authentication, User experience, Security compliance.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 01:52:52 GMT" } ]
2025-04-21T00:00:00
[ [ "Shang", "Rui", "" ], [ "Huang", "Bingjie", "" ] ]
2504.13405
Shengqin Jiang
Shengqin Jiang, Linfei Li, Haokui Zhang, Qingshan Liu, Amin Beheshti, Jian Yang, Anton van den Hengel, Quan Z. Sheng, Yuankai Qi
ProgRoCC: A Progressive Approach to Rough Crowd Counting
Under review
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As the number of individuals in a crowd grows, enumeration-based techniques become increasingly infeasible and their estimates increasingly unreliable. We propose instead an estimation-based version of the problem: we label Rough Crowd Counting that delivers better accuracy on the basis of training data that is easier to acquire. Rough crowd counting requires only rough annotations of the number of targets in an image, instead of the more traditional, and far more expensive, per-target annotations. We propose an approach to the rough crowd counting problem based on CLIP, termed ProgRoCC. Specifically, we introduce a progressive estimation learning strategy that determines the object count through a coarse-to-fine approach. This approach delivers answers quickly, outperforms the state-of-the-art in semi- and weakly-supervised crowd counting. In addition, we design a vision-language matching adapter that optimizes key-value pairs by mining effective matches of two modalities to refine the visual features, thereby improving the final performance. Extensive experimental results on three widely adopted crowd counting datasets demonstrate the effectiveness of our method.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 01:57:42 GMT" } ]
2025-04-21T00:00:00
[ [ "Jiang", "Shengqin", "" ], [ "Li", "Linfei", "" ], [ "Zhang", "Haokui", "" ], [ "Liu", "Qingshan", "" ], [ "Beheshti", "Amin", "" ], [ "Yang", "Jian", "" ], [ "Hengel", "Anton van den", "" ], [ "Sheng", "Quan Z.", "" ], [ "Qi", "Yuankai", "" ] ]
2504.13406
Xiangbo Gao
Xiangbo Gao, Yuheng Wu, Rujia Wang, Chenxi Liu, Yang Zhou, and Zhengzhong Tu
LangCoop: Collaborative Driving with Language
null
CVPRW 2025
null
null
cs.RO cs.AI cs.CL cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multi-agent collaboration holds great promise for enhancing the safety, reliability, and mobility of autonomous driving systems by enabling information sharing among multiple connected agents. However, existing multi-agent communication approaches are hindered by limitations of existing communication media, including high bandwidth demands, agent heterogeneity, and information loss. To address these challenges, we introduce LangCoop, a new paradigm for collaborative autonomous driving that leverages natural language as a compact yet expressive medium for inter-agent communication. LangCoop features two key innovations: Mixture Model Modular Chain-of-thought (M$^3$CoT) for structured zero-shot vision-language reasoning and Natural Language Information Packaging (LangPack) for efficiently packaging information into concise, language-based messages. Through extensive experiments conducted in the CARLA simulations, we demonstrate that LangCoop achieves a remarkable 96\% reduction in communication bandwidth (< 2KB per message) compared to image-based communication, while maintaining competitive driving performance in the closed-loop evaluation.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 02:03:14 GMT" } ]
2025-04-21T00:00:00
[ [ "Gao", "Xiangbo", "" ], [ "Wu", "Yuheng", "" ], [ "Wang", "Rujia", "" ], [ "Liu", "Chenxi", "" ], [ "Zhou", "Yang", "" ], [ "Tu", "Zhengzhong", "" ] ]
2504.13407
Shimou Ling
Shimou Ling, Liang Zhang, Jiangwei Zhao, Lili Pan, Hongliang Li
LoRA-Based Continual Learning with Constraints on Critical Parameter Changes
null
null
null
null
cs.CV cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
LoRA-based continual learning represents a promising avenue for leveraging pre-trained models in downstream continual learning tasks. Recent studies have shown that orthogonal LoRA tuning effectively mitigates forgetting. However, this work unveils that under orthogonal LoRA tuning, the critical parameters for pre-tasks still change notably after learning post-tasks. To address this problem, we directly propose freezing the most critical parameter matrices in the Vision Transformer (ViT) for pre-tasks before learning post-tasks. In addition, building on orthogonal LoRA tuning, we propose orthogonal LoRA composition (LoRAC) based on QR decomposition, which may further enhance the plasticity of our method. Elaborate ablation studies and extensive comparisons demonstrate the effectiveness of our proposed method. Our results indicate that our method achieves state-of-the-art (SOTA) performance on several well-known continual learning benchmarks. For instance, on the Split CIFAR-100 dataset, our method shows a 6.35\% improvement in accuracy and a 3.24\% reduction in forgetting compared to previous methods. Our code is available at https://github.com/learninginvision/LoRAC-IPC.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 02:08:19 GMT" } ]
2025-04-21T00:00:00
[ [ "Ling", "Shimou", "" ], [ "Zhang", "Liang", "" ], [ "Zhao", "Jiangwei", "" ], [ "Pan", "Lili", "" ], [ "Li", "Hongliang", "" ] ]
2504.13408
Rudraksh Gupta
Varij Saini, Rudraksh Gupta, Neel Soni
OpCode-Based Malware Classification Using Machine Learning and Deep Learning Techniques
11 pages
null
null
null
cs.CR cs.LG
http://creativecommons.org/licenses/by/4.0/
This technical report presents a comprehensive analysis of malware classification using OpCode sequences. Two distinct approaches are evaluated: traditional machine learning using n-gram analysis with Support Vector Machine (SVM), K-Nearest Neighbors (KNN), and Decision Tree classifiers; and a deep learning approach employing a Convolutional Neural Network (CNN). The traditional machine learning approach establishes a baseline using handcrafted 1-gram and 2-gram features from disassembled malware samples. The deep learning methodology builds upon the work proposed in "Deep Android Malware Detection" by McLaughlin et al. and evaluates the performance of a CNN model trained to automatically extract features from raw OpCode data. Empirical results are compared using standard performance metrics (accuracy, precision, recall, and F1-score). While the SVM classifier outperforms other traditional techniques, the CNN model demonstrates competitive performance with the added benefit of automated feature extraction.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 02:09:57 GMT" } ]
2025-04-21T00:00:00
[ [ "Saini", "Varij", "" ], [ "Gupta", "Rudraksh", "" ], [ "Soni", "Neel", "" ] ]
2504.13409
Mai Liao
Mai Liao, Roberto J. Assef, Chao-Wei Tsai, Manuel Aravena, Rom\'an Fern\'andez Aranda, Andrew W. Blain, Tanio D\'iaz-Santos, Peter Eisenhardt, Jorge Gonz\'alez-L\'opez, Hyunsung D. Jun, Xiaofeng Li, Guodong Li, Lee R. Martin, Ana Posses, Devika Shobhana, Manuel Solimano, Daniel Stern, Andrey Vayner, Jingwen Wu, Dejene Zewdie
Resolving the black hole sphere of influence in a hyper-luminous obscured quasar at redshift 4.6
36 pages, 13 figures, submitted, comments welcome
null
null
null
astro-ph.GA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Supermassive black holes (SMBHs) imprint gravitational signatures on the matter within their sphere of influence (SoI). Nuclear gas dynamics can hence be used to accurately measure the mass of an SMBH, yet such measurements remain elusive in the early Universe. We report the first dynamical measurement of an SMBH mass at $z >$ 2, based on high spatial resolution observations of the [C II] emission line that resolve the SoI in an obscured quasar at $z$ = 4.6. The velocity dispersion rises radially toward the center, requiring the presence of a 6.3$~\pm~0.14$ $\times$ 10$^9~\rm M_{\odot}$ SMBH. We propose that obscured quasars allow [C II] survivability in the inner regions, and may be ideal targets for increasing dynamical SMBH mass estimates in the early Universe.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 02:12:09 GMT" } ]
2025-04-21T00:00:00
[ [ "Liao", "Mai", "" ], [ "Assef", "Roberto J.", "" ], [ "Tsai", "Chao-Wei", "" ], [ "Aravena", "Manuel", "" ], [ "Aranda", "Román Fernández", "" ], [ "Blain", "Andrew W.", "" ], [ "Díaz-Santos", "Tanio", "" ], [ "Eisenhardt", "Peter", "" ], [ "González-López", "Jorge", "" ], [ "Jun", "Hyunsung D.", "" ], [ "Li", "Xiaofeng", "" ], [ "Li", "Guodong", "" ], [ "Martin", "Lee R.", "" ], [ "Posses", "Ana", "" ], [ "Shobhana", "Devika", "" ], [ "Solimano", "Manuel", "" ], [ "Stern", "Daniel", "" ], [ "Vayner", "Andrey", "" ], [ "Wu", "Jingwen", "" ], [ "Zewdie", "Dejene", "" ] ]
2504.13410
Ning Wang
Ning Wang
Refinement of an analytical capture cross section formula
4 figures, 1 table
null
null
null
nucl-th nucl-ex
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An analytical formula with high accuracy is proposed for a systematic description of the capture cross sections from light to superheavy reaction systems. Based on the empirical barrier distribution (EBD) method, three key input quantities are refined by introducing the Coulomb exchange term to the Coulomb parameter $z$ for calculating the barrier height, incorporating the $Q$-value into the barrier distribution width calculations, and considering the surface effects of light nuclei and the deep inelastic scattering effects of superheavy systems on the barrier radius. These refinements substantially improve the model accuracy, not only the accuracy of the barrier height but also the accruacy of the capture cross sections at energies around the Coulomb barrier. The mean value of the deviations (in logarithmic scale) between the predicted cross sections and the data for a total of 426 reaction systems with $ 35 < Z_1 Z_2 < 2600$ is sharply reduced from 3.485 to 0.166.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 02:12:39 GMT" } ]
2025-04-21T00:00:00
[ [ "Wang", "Ning", "" ] ]
2504.13411
Shin Nishihara
Shin Nishihara and Toru Ohira
Local Ridge Formation and Domain Delimitation in Aggregation-Diffusion Equations
null
null
null
null
physics.bio-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
On the carapace of turtles such as Mauremys japonica, raised linear structures called keels form along the midline during embryonic development. This study investigates the underlying mechanisms of keel formation and domain delimitation on the carapace using a theoretical framework based on aggregation-diffusion equations. In this model, outward tissue growth is represented by density-dependent diffusion, while local ridge formation is modeled as distance-dependent aggregation potentially driven by haptotaxis. Analytical and numerical investigations reveal that distance sensitivity in aggregation plays a critical role in shaping ridge patterns and domain boundaries: low sensitivity promotes uniform density, whereas high sensitivity leads to localized high-density regions. The model may reproduce species-specific variations in keel formation, including the emergence of single or multiple keels, and accounts for the consistent appearance of the midline keel across diverse turtle species. Furthermore, the emergence of multiple high-density regions is shown to occur at points where the aggregation flux changes sign. These findings imply that cellular responses to structural gradients may underlie both ridge formation and boundary determination. This study helps possibly providing new insight into morphogenetic patterning on the turtle carapace and highlighting the role of distance-dependent cell aggregation in shaping complex biological structures.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 02:13:14 GMT" } ]
2025-04-21T00:00:00
[ [ "Nishihara", "Shin", "" ], [ "Ohira", "Toru", "" ] ]
2504.13412
Samuel Audia
Samuel Audia, Soheil Feizi, Matthias Zwicker, Dinesh Manocha
How Learnable Grids Recover Fine Detail in Low Dimensions: A Neural Tangent Kernel Analysis of Multigrid Parametric Encodings
null
null
null
null
cs.CV cs.LG
http://creativecommons.org/licenses/by/4.0/
Neural networks that map between low dimensional spaces are ubiquitous in computer graphics and scientific computing; however, in their naive implementation, they are unable to learn high frequency information. We present a comprehensive analysis comparing the two most common techniques for mitigating this spectral bias: Fourier feature encodings (FFE) and multigrid parametric encodings (MPE). FFEs are seen as the standard for low dimensional mappings, but MPEs often outperform them and learn representations with higher resolution and finer detail. FFE's roots in the Fourier transform, make it susceptible to aliasing if pushed too far, while MPEs, which use a learned grid structure, have no such limitation. To understand the difference in performance, we use the neural tangent kernel (NTK) to evaluate these encodings through the lens of an analogous kernel regression. By finding a lower bound on the smallest eigenvalue of the NTK, we prove that MPEs improve a network's performance through the structure of their grid and not their learnable embedding. This mechanism is fundamentally different from FFEs, which rely solely on their embedding space to improve performance. Results are empirically validated on a 2D image regression task using images taken from 100 synonym sets of ImageNet and 3D implicit surface regression on objects from the Stanford graphics dataset. Using peak signal-to-noise ratio (PSNR) and multiscale structural similarity (MS-SSIM) to evaluate how well fine details are learned, we show that the MPE increases the minimum eigenvalue by 8 orders of magnitude over the baseline and 2 orders of magnitude over the FFE. The increase in spectrum corresponds to a 15 dB (PSNR) / 0.65 (MS-SSIM) increase over baseline and a 12 dB (PSNR) / 0.33 (MS-SSIM) increase over the FFE.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 02:18:08 GMT" } ]
2025-04-21T00:00:00
[ [ "Audia", "Samuel", "" ], [ "Feizi", "Soheil", "" ], [ "Zwicker", "Matthias", "" ], [ "Manocha", "Dinesh", "" ] ]
2504.13413
Haldun Balim
Haldun Balim, Yang Hu, Yuyang Zhang, Na Li
A Model-Based Approach to Imitation Learning through Multi-Step Predictions
null
null
null
null
cs.LG cs.RO cs.SY eess.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Imitation learning is a widely used approach for training agents to replicate expert behavior in complex decision-making tasks. However, existing methods often struggle with compounding errors and limited generalization, due to the inherent challenge of error correction and the distribution shift between training and deployment. In this paper, we present a novel model-based imitation learning framework inspired by model predictive control, which addresses these limitations by integrating predictive modeling through multi-step state predictions. Our method outperforms traditional behavior cloning numerical benchmarks, demonstrating superior robustness to distribution shift and measurement noise both in available data and during execution. Furthermore, we provide theoretical guarantees on the sample complexity and error bounds of our method, offering insights into its convergence properties.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 02:19:30 GMT" } ]
2025-04-21T00:00:00
[ [ "Balim", "Haldun", "" ], [ "Hu", "Yang", "" ], [ "Zhang", "Yuyang", "" ], [ "Li", "Na", "" ] ]
2504.13414
Hsin-Yi Lin
Hsin-Yi Lin, Huan-Hsin Tseng, Samuel Yen-Chi Chen, Shinjae Yoo
Adaptive Non-local Observable on Quantum Neural Networks
null
null
null
null
quant-ph cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Conventional Variational Quantum Circuits (VQCs) for Quantum Machine Learning typically rely on a fixed Hermitian observable, often built from Pauli operators. Inspired by the Heisenberg picture, we propose an adaptive non-local measurement framework that substantially increases the model complexity of the quantum circuits. Our introduction of dynamical Hermitian observables with evolving parameters shows that optimizing VQC rotations corresponds to tracing a trajectory in the observable space. This viewpoint reveals that standard VQCs are merely a special case of the Heisenberg representation. Furthermore, we show that properly incorporating variational rotations with non-local observables enhances qubit interaction and information mixture, admitting flexible circuit designs. Two non-local measurement schemes are introduced, and numerical simulations on classification tasks confirm that our approach outperforms conventional VQCs, yielding a more powerful and resource-efficient approach as a Quantum Neural Network.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 02:20:12 GMT" } ]
2025-04-21T00:00:00
[ [ "Lin", "Hsin-Yi", "" ], [ "Tseng", "Huan-Hsin", "" ], [ "Chen", "Samuel Yen-Chi", "" ], [ "Yoo", "Shinjae", "" ] ]
2504.13415
Racheal Mukisa
Racheal Mukisa and Arvind K. Bansal
DADU: Dual Attention-based Deep Supervised UNet for Automated Semantic Segmentation of Cardiac Images
20 pages, 8 figures
null
null
null
eess.IV cs.AI cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose an enhanced deep learning-based model for image segmentation of the left and right ventricles and myocardium scar tissue from cardiac magnetic resonance (CMR) images. The proposed technique integrates UNet, channel and spatial attention, edge-detection based skip-connection and deep supervised learning to improve the accuracy of the CMR image-segmentation. Images are processed using multiple channels to generate multiple feature-maps. We built a dual attention-based model to integrate channel and spatial attention. The use of extracted edges in skip connection improves the reconstructed images from feature-maps. The use of deep supervision reduces vanishing gradient problems inherent in classification based on deep neural networks. The algorithms for dual attention-based model, corresponding implementation and performance results are described. The performance results show that this approach has attained high accuracy: 98% Dice Similarity Score (DSC) and significantly lower Hausdorff Distance (HD). The performance results outperform other leading techniques both in DSC and HD.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 02:22:45 GMT" } ]
2025-04-21T00:00:00
[ [ "Mukisa", "Racheal", "" ], [ "Bansal", "Arvind K.", "" ] ]
2504.13416
Saksham Rastogi
Saksham Rastogi, Pratyush Maini, Danish Pruthi
STAMP Your Content: Proving Dataset Membership via Watermarked Rephrasings
Accepted at DATA-FM, WMark @ ICLR 2025. Project page at see https://codeboy5.github.io/stamp
null
null
null
cs.LG cs.CL cs.CR
http://creativecommons.org/licenses/by/4.0/
Given how large parts of publicly available text are crawled to pretrain large language models (LLMs), data creators increasingly worry about the inclusion of their proprietary data for model training without attribution or licensing. Their concerns are also shared by benchmark curators whose test-sets might be compromised. In this paper, we present STAMP, a framework for detecting dataset membership-i.e., determining the inclusion of a dataset in the pretraining corpora of LLMs. Given an original piece of content, our proposal involves first generating multiple rephrases, each embedding a watermark with a unique secret key. One version is to be released publicly, while others are to be kept private. Subsequently, creators can compare model likelihoods between public and private versions using paired statistical tests to prove membership. We show that our framework can successfully detect contamination across four benchmarks which appear only once in the training data and constitute less than 0.001% of the total tokens, outperforming several contamination detection and dataset inference baselines. We verify that STAMP preserves both the semantic meaning and the utility of the original data in comparing different models. We apply STAMP to two real-world scenarios to confirm the inclusion of paper abstracts and blog articles in the pretraining corpora.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 02:25:08 GMT" } ]
2025-04-21T00:00:00
[ [ "Rastogi", "Saksham", "" ], [ "Maini", "Pratyush", "" ], [ "Pruthi", "Danish", "" ] ]
2504.13417
Tamitake Itoh Dr.
Tamitake Itoh and Yuko S. Yamamoto
Ultrabroad resonance of localized plasmon on a nanoparticle coupled with surface plasmon on a nanowire enabling two-photon excited emission via continuous-wave laser
54 pages, 18 figures
null
null
null
physics.optics quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This study found that plasmonic hotspots (HSs) between silver nanoparticles (NPs) and silver nanowires (NWs) generated two-photon excited emissions, including hyper-Rayleigh, hyper-Raman, and two-photon fluorescence of dye molecules with continuous-wave (CW) near-infrared (NIR) laser excitation. A comparison between experimental results and electromagnetic (EM) calculations revealed that a large EM enhancement factor (FR) at the HS appears in the visible to NIR regions owing to EM coupling between localized plasmons of the NP and surface plasmons of the NW. This ultrabroad resonance of the coupled plasmons enables the observation of two-photon-excited emissions with CW laser excitation. A comparison of the dependence of the NP diameter, NW diameter, and gap distance on two-photon-excited emissions further demonstrated that the large HS-by-HS variations in the emission intensities were mainly induced by the sensitivity of FR to the gap distance at the HSs. We also experimentally and theoretically investigated the propagation of two-photon-excited emission light to a neighboring NP on the NW via surface plasmons.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 02:26:29 GMT" } ]
2025-04-21T00:00:00
[ [ "Itoh", "Tamitake", "" ], [ "Yamamoto", "Yuko S.", "" ] ]
2504.13418
Pedro Rosario
Pedro Rosario, Luiz O.R. Solak, A. Cidrim, R. Bachelard, Johannes Schachenmayer
Unraveling Dicke Superradiant Decay with Separable Coherent Spin States
null
null
null
null
quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that Dicke superradiant decay from a fully inverted state can at all times be described by a positive statistical mixture of coherent spin states (CSS). Since CSS are separable, this implies that no entanglement is involved in Dicke decay. Based on this result, we introduce a new numerical quantum trajectory approach leading to low-entanglement unravelings. This opens up possibilities for large-scale numerical simulations of collective decay processes.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 02:32:09 GMT" } ]
2025-04-21T00:00:00
[ [ "Rosario", "Pedro", "" ], [ "Solak", "Luiz O. R.", "" ], [ "Cidrim", "A.", "" ], [ "Bachelard", "R.", "" ], [ "Schachenmayer", "Johannes", "" ] ]
2504.13419
Wenyu Li
Wenyu Li, Sidun Liu, Peng Qiao, Yong Dou
Mono3R: Exploiting Monocular Cues for Geometric 3D Reconstruction
null
null
null
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
Recent advances in data-driven geometric multi-view 3D reconstruction foundation models (e.g., DUSt3R) have shown remarkable performance across various 3D vision tasks, facilitated by the release of large-scale, high-quality 3D datasets. However, as we observed, constrained by their matching-based principles, the reconstruction quality of existing models suffers significant degradation in challenging regions with limited matching cues, particularly in weakly textured areas and low-light conditions. To mitigate these limitations, we propose to harness the inherent robustness of monocular geometry estimation to compensate for the inherent shortcomings of matching-based methods. Specifically, we introduce a monocular-guided refinement module that integrates monocular geometric priors into multi-view reconstruction frameworks. This integration substantially enhances the robustness of multi-view reconstruction systems, leading to high-quality feed-forward reconstructions. Comprehensive experiments across multiple benchmarks demonstrate that our method achieves substantial improvements in both mutli-view camera pose estimation and point cloud accuracy.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 02:33:12 GMT" } ]
2025-04-21T00:00:00
[ [ "Li", "Wenyu", "" ], [ "Liu", "Sidun", "" ], [ "Qiao", "Peng", "" ], [ "Dou", "Yong", "" ] ]
2504.13420
Haoxiang Tian
Haoxiang Tian, Wenqiang Ding, Xingshuo Han, Guoquan Wu, An Guo, Junqi Zhang. Wei Chen, Jun Wei, Tianwei Zhang
Testing the Fault-Tolerance of Multi-Sensor Fusion Perception in Autonomous Driving Systems
null
null
null
null
cs.RO cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
High-level Autonomous Driving Systems (ADSs), such as Google Waymo and Baidu Apollo, typically rely on multi-sensor fusion (MSF) based approaches to perceive their surroundings. This strategy increases perception robustness by combining the respective strengths of the camera and LiDAR and directly affects the safety-critical driving decisions of autonomous vehicles (AVs). However, in real-world autonomous driving scenarios, cameras and LiDAR are subject to various faults, which can probably significantly impact the decision-making and behaviors of ADSs. Existing MSF testing approaches only discovered corner cases that the MSF-based perception cannot accurately detected by MSF-based perception, while lacking research on how sensor faults affect the system-level behaviors of ADSs. To address this gap, we conduct the first exploration of the fault tolerance of MSF perception-based ADS for sensor faults. In this paper, we systematically and comprehensively build fault models for cameras and LiDAR in AVs and inject them into the MSF perception-based ADS to test its behaviors in test scenarios. To effectively and efficiently explore the parameter spaces of sensor fault models, we design a feedback-guided differential fuzzer to discover the safety violations of MSF perception-based ADS caused by the injected sensor faults. We evaluate FADE on the representative and practical industrial ADS, Baidu Apollo. Our evaluation results demonstrate the effectiveness and efficiency of FADE, and we conclude some useful findings from the experimental results. To validate the findings in the physical world, we use a real Baidu Apollo 6.0 EDU autonomous vehicle to conduct the physical experiments, and the results show the practical significance of our findings.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 02:37:55 GMT" } ]
2025-04-21T00:00:00
[ [ "Tian", "Haoxiang", "" ], [ "Ding", "Wenqiang", "" ], [ "Han", "Xingshuo", "" ], [ "Wu", "Guoquan", "" ], [ "Guo", "An", "" ], [ "Chen", "Junqi Zhang. Wei", "" ], [ "Wei", "Jun", "" ], [ "Zhang", "Tianwei", "" ] ]
2504.13421
Ken Jen Lee
Ken Jen Lee, PiaoHong Wang and Zhicong Lu
"Can't believe I'm crying over an anime girl": Public Parasocial Grieving and Coping Towards VTuber Graduation and Termination
23 pages, 3 figures, Proceedings of CHI Conference on Human Factors in Computing Systems (CHI '25)
Proceedings of CHI Conference on Human Factors in Computing Systems (CHI 2025), 23 pages
null
null
cs.HC cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Despite the significant increase in popularity of Virtual YouTubers (VTubers), research on the unique dynamics of viewer-VTuber parasocial relationships is nascent. This work investigates how English-speaking viewers grieved VTubers whose identities are no longer used, an interesting context as the nakanohito (i.e., the person behind the VTuber identity) is usually alive post-retirement and might "reincarnate" as another VTuber. We propose a typology for VTuber retirements and analyzed 13,655 Reddit posts and comments spanning nearly three years using mixed-methods. Findings include how viewers coped using methods similar to when losing loved ones, alongside novel coping methods reflecting different attachment styles. Although emotions like sadness, shock, concern, disapproval, confusion, and love decreased with time, regret and loyalty showed opposite trends. Furthermore, viewers' reactions situated a VTuber identity within a community of content creators and viewers. We also discuss design implications alongside implications on the VTuber ecosystem and future research directions.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 02:40:42 GMT" } ]
2025-04-21T00:00:00
[ [ "Lee", "Ken Jen", "" ], [ "Wang", "PiaoHong", "" ], [ "Lu", "Zhicong", "" ] ]
2504.13422
Vivek Oommen
Vivek Oommen, Andreas E. Robertson, Daniel Diaz, Coleman Alleman, Zhen Zhang, Anthony D. Rollett, George E. Karniadakis, R\'emi Dingreville
Equilibrium Conserving Neural Operators for Super-Resolution Learning
null
null
null
null
cs.LG physics.comp-ph
http://creativecommons.org/licenses/by/4.0/
Neural surrogate solvers can estimate solutions to partial differential equations in physical problems more efficiently than standard numerical methods, but require extensive high-resolution training data. In this paper, we break this limitation; we introduce a framework for super-resolution learning in solid mechanics problems. Our approach allows one to train a high-resolution neural network using only low-resolution data. Our Equilibrium Conserving Operator (ECO) architecture embeds known physics directly into the network to make up for missing high-resolution information during training. We evaluate this ECO-based super-resolution framework that strongly enforces conservation-laws in the predicted solutions on two working examples: embedded pores in a homogenized matrix and randomly textured polycrystalline materials. ECO eliminates the reliance on high-fidelity data and reduces the upfront cost of data collection by two orders of magnitude, offering a robust pathway for resource-efficient surrogate modeling in materials modeling. ECO is readily generalizable to other physics-based problems.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 02:47:53 GMT" } ]
2025-04-21T00:00:00
[ [ "Oommen", "Vivek", "" ], [ "Robertson", "Andreas E.", "" ], [ "Diaz", "Daniel", "" ], [ "Alleman", "Coleman", "" ], [ "Zhang", "Zhen", "" ], [ "Rollett", "Anthony D.", "" ], [ "Karniadakis", "George E.", "" ], [ "Dingreville", "Rémi", "" ] ]
2504.13423
William Cook
William Cook
Mixed Fractional Information: Consistency of Dissipation Measures for Stable Laws
20 pages, 1 figure
null
null
null
cs.IT math.FA math.IT math.PR math.ST stat.TH
http://creativecommons.org/licenses/by/4.0/
Symmetric alpha-stable (S alpha S) distributions with alpha<2 lack finite classical Fisher information. Building on Johnson's framework, we define Mixed Fractional Information (MFI) via the initial rate of relative entropy dissipation during interpolation between S alpha S laws with differing scales, v and s. We demonstrate two equivalent formulations for MFI in this specific S alpha S-to-S alpha S setting. The first involves the derivative D'(v) of the relative entropy between the two S alpha S densities. The second uses an integral expectation E_gv[u(x,0) (pF_v(x) - pF_s(x))] involving the difference between Fisher scores (pF_v, pF_s) and a specific MMSE-related score function u(x,0) derived from the interpolation dynamics. Our central contribution is a rigorous proof of the consistency identity: D'(v) = (1/(alpha v)) E_gv[X (pF_v(X) - pF_s(X))]. This identity mathematically validates the equivalence of the two MFI formulations for S alpha S inputs, establishing MFI's internal coherence and directly linking entropy dissipation rates to score function differences. We further establish MFI's non-negativity (zero if and only if v=s), derive its closed-form expression for the Cauchy case (alpha=1), and numerically validate the consistency identity. MFI provides a finite, coherent, and computable information-theoretic measure for comparing S alpha S distributions where classical Fisher information fails, connecting entropy dynamics to score functions and estimation concepts. This work lays a foundation for exploring potential fractional I-MMSE relations and new functional inequalities tailored to heavy-tailed systems.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 02:49:24 GMT" } ]
2025-04-21T00:00:00
[ [ "Cook", "William", "" ] ]
2504.13424
Yang Shen
Yang Shen, Shuqi Chai, Bing Li, Xiaodong Luo, Qingjiang Shi, and Rongqing Zhang
Decentralized Handover Parameter Optimization with MARL for Load Balancing in 5G Networks
12 pages, 11 figures
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In cellular networks, cell handover refers to the process where a device switches from one base station to another, and this mechanism is crucial for balancing the load among different cells. Traditionally, engineers would manually adjust parameters based on experience. However, the explosive growth in the number of cells has rendered manual tuning impractical. Existing research tends to overlook critical engineering details in order to simplify handover problems. In this paper, we classify cell handover into three types, and jointly model their mutual influence. To achieve load balancing, we propose a multi-agent-reinforcement-learning (MARL)-based scheme to automatically optimize the parameters. To reduce the agent interaction costs, a distributed training is implemented based on consensus approximation of global average load, and it is shown that the approximation error is bounded. Experimental results show that our proposed scheme outperforms existing benchmarks in balancing load and improving network performance.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 02:49:45 GMT" } ]
2025-04-21T00:00:00
[ [ "Shen", "Yang", "" ], [ "Chai", "Shuqi", "" ], [ "Li", "Bing", "" ], [ "Luo", "Xiaodong", "" ], [ "Shi", "Qingjiang", "" ], [ "Zhang", "Rongqing", "" ] ]
2504.13425
Grace Byun
Grace Byun, Shinsun Lee, Nayoung Choi, Jinho Choi
Secure Multifaceted-RAG for Enterprise: Hybrid Knowledge Retrieval with Security Filtering
null
null
null
null
cs.CL
http://creativecommons.org/licenses/by/4.0/
Existing Retrieval-Augmented Generation (RAG) systems face challenges in enterprise settings due to limited retrieval scope and data security risks. When relevant internal documents are unavailable, the system struggles to generate accurate and complete responses. Additionally, using closed-source Large Language Models (LLMs) raises concerns about exposing proprietary information. To address these issues, we propose the Secure Multifaceted-RAG (SecMulti-RAG) framework, which retrieves not only from internal documents but also from two supplementary sources: pre-generated expert knowledge for anticipated queries and on-demand external LLM-generated knowledge. To mitigate security risks, we adopt a local open-source generator and selectively utilize external LLMs only when prompts are deemed safe by a filtering mechanism. This approach enhances completeness, prevents data leakage, and reduces costs. In our evaluation on a report generation task in the automotive industry, SecMulti-RAG significantly outperforms traditional RAG - achieving 79.3 to 91.9 percent win rates across correctness, richness, and helpfulness in LLM-based evaluation, and 56.3 to 70.4 percent in human evaluation. This highlights SecMulti-RAG as a practical and secure solution for enterprise RAG.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 02:51:29 GMT" } ]
2025-04-21T00:00:00
[ [ "Byun", "Grace", "" ], [ "Lee", "Shinsun", "" ], [ "Choi", "Nayoung", "" ], [ "Choi", "Jinho", "" ] ]
2504.13426
Jielong Lu
Jielong LuZhihao Wu, Zhiling Cai, Yueyang Pi, Shiping Wang
Simplifying Graph Convolutional Networks with Redundancy-Free Neighbors
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In recent years, Graph Convolutional Networks (GCNs) have gained popularity for their exceptional ability to process graph-structured data. Existing GCN-based approaches typically employ a shallow model architecture due to the over-smoothing phenomenon. Current approaches to mitigating over-smoothing primarily involve adding supplementary components to GCN architectures, such as residual connections and random edge-dropping strategies. However, these improvements toward deep GCNs have achieved only limited success. In this work, we analyze the intrinsic message passing mechanism of GCNs and identify a critical issue: messages originating from high-order neighbors must traverse through low-order neighbors to reach the target node. This repeated reliance on low-order neighbors leads to redundant information aggregation, a phenomenon we term over-aggregation. Our analysis demonstrates that over-aggregation not only introduces significant redundancy but also serves as the fundamental cause of over-smoothing in GCNs.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 02:56:21 GMT" } ]
2025-04-21T00:00:00
[ [ "Wu", "Jielong LuZhihao", "" ], [ "Cai", "Zhiling", "" ], [ "Pi", "Yueyang", "" ], [ "Wang", "Shiping", "" ] ]
2504.13427
Ming Li
Guannan Zhang, Jiamin Xu, Ming Li, Shuqian Shen, Lei Li, and Shao-ming Fei
Tight upper bound and monogamy relation for the maximum quantum value of the parity-CHSH inequality and applied to device-independent randomness
7 pages, 1 figure
Laser Phys. Lett. 22, 055201(2025)
null
null
quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Based on the violation of Bell inequalities, we can verify quantum random numbers by examining the correlation between device inputs and outputs. In this paper, we derive the maximum quantum value of the parity-CHSH inequality for a three-qubit system, establishing a tight upper bound applicable to any quantum state. Simultaneously, the necessary constraints for achieving saturation are analyzed. Utilizing this method, we present necessary and sufficient conditions for certain states to violate the parity-CHSH inequality. Building upon our proposal, the relationship between the noise parameter and the certifiable randomness in a bipartite entangled state is probed. Furthermore, we derive a monogamy relationship between the average values of the parity-CHSH inequality associated with the reduced three-qubit density matrices of GHZ-class states comprising four qubits.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 02:58:59 GMT" } ]
2025-04-21T00:00:00
[ [ "Zhang", "Guannan", "" ], [ "Xu", "Jiamin", "" ], [ "Li", "Ming", "" ], [ "Shen", "Shuqian", "" ], [ "Li", "Lei", "" ], [ "Fei", "Shao-ming", "" ] ]
2504.13428
Qi'ao Xu
Qi'ao Xu, Pengfei Wang, Yanjun Li, Tianwen Qian, Xiaoling Wang
HSACNet: Hierarchical Scale-Aware Consistency Regularized Semi-Supervised Change Detection
7 pages, 8 figures, accepted by ICME 2025
null
null
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
Semi-supervised change detection (SSCD) aims to detect changes between bi-temporal remote sensing images by utilizing limited labeled data and abundant unlabeled data. Existing methods struggle in complex scenarios, exhibiting poor performance when confronted with noisy data. They typically neglect intra-layer multi-scale features while emphasizing inter-layer fusion, harming the integrity of change objects with different scales. In this paper, we propose HSACNet, a Hierarchical Scale-Aware Consistency regularized Network for SSCD. Specifically, we integrate Segment Anything Model 2 (SAM2), using its Hiera backbone as the encoder to extract inter-layer multi-scale features and applying adapters for parameter-efficient fine-tuning. Moreover, we design a Scale-Aware Differential Attention Module (SADAM) that can precisely capture intra-layer multi-scale change features and suppress noise. Additionally, a dual-augmentation consistency regularization strategy is adopted to effectively utilize the unlabeled data. Extensive experiments across four CD benchmarks demonstrate that our HSACNet achieves state-of-the-art performance, with reduced parameters and computational cost.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 03:00:52 GMT" } ]
2025-04-21T00:00:00
[ [ "Xu", "Qi'ao", "" ], [ "Wang", "Pengfei", "" ], [ "Li", "Yanjun", "" ], [ "Qian", "Tianwen", "" ], [ "Wang", "Xiaoling", "" ] ]
2504.13429
Shenzhi Yang
Shenzhi Yang, Bin Liang, An Liu, Lin Gui, Xingkai Yao, Xiaofang Zhang
Bounded and Uniform Energy-based Out-of-distribution Detection for Graphs
arXiv admin note: text overlap with arXiv:2302.02914 by other authors
null
null
null
cs.LG cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given the critical role of graphs in real-world applications and their high-security requirements, improving the ability of graph neural networks (GNNs) to detect out-of-distribution (OOD) data is an urgent research problem. The recent work GNNSAFE proposes a framework based on the aggregation of negative energy scores that significantly improves the performance of GNNs to detect node-level OOD data. However, our study finds that score aggregation among nodes is susceptible to extreme values due to the unboundedness of the negative energy scores and logit shifts, which severely limits the accuracy of GNNs in detecting node-level OOD data. In this paper, we propose NODESAFE: reducing the generation of extreme scores of nodes by adding two optimization terms that make the negative energy scores bounded and mitigate the logit shift. Experimental results show that our approach dramatically improves the ability of GNNs to detect OOD data at the node level, e.g., in detecting OOD data induced by Structure Manipulation, the metric of FPR95 (lower is better) in scenarios without (with) OOD data exposure are reduced from the current SOTA by 28.4% (22.7%).
[ { "version": "v1", "created": "Fri, 18 Apr 2025 03:01:00 GMT" } ]
2025-04-21T00:00:00
[ [ "Yang", "Shenzhi", "" ], [ "Liang", "Bin", "" ], [ "Liu", "An", "" ], [ "Gui", "Lin", "" ], [ "Yao", "Xingkai", "" ], [ "Zhang", "Xiaofang", "" ] ]
2504.13430
Chui Shan Lee
Zhiyi Huang, Chui Shan Lee, Xinkai Shu, Zhaozi Wang
The Long Arm of Nashian Allocation in Online $p$-Mean Welfare Maximization
null
null
null
null
cs.GT cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the online allocation of divisible items to $n$ agents with additive valuations for $p$-mean welfare maximization, a problem introduced by Barman, Khan, and Maiti~(2022). Our algorithmic and hardness results characterize the optimal competitive ratios for the entire spectrum of $-\infty \le p \le 1$. Surprisingly, our improved algorithms for all $p \le \frac{1}{\log n}$ are simply the greedy algorithm for the Nash welfare, supplemented with two auxiliary components to ensure all agents have non-zero utilities and to help a small number of agents with low utilities. In this sense, the long arm of Nashian allocation achieves near-optimal competitive ratios not only for Nash welfare but also all the way to egalitarian welfare.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 03:01:18 GMT" } ]
2025-04-21T00:00:00
[ [ "Huang", "Zhiyi", "" ], [ "Lee", "Chui Shan", "" ], [ "Shu", "Xinkai", "" ], [ "Wang", "Zhaozi", "" ] ]
2504.13431
Jun-Chao Su
Jun-Chao Su, Qing-Fu Song, Qi-Fang L\"u and Jingya Zhu
An analysis on doubly bottom molecular tetraquarks composed of $H_{(s)}$ and $T_{(s)}$ doublets
null
null
null
null
hep-ph
http://creativecommons.org/licenses/by/4.0/
In this work, we investigate the doubly bottom $H_{(s)}\bar{T}_{(s)}$ and $H_{(s)}T_{(s)}$ systems by adopting the one-boson-exchange model, where $H_{(s)}$ and $T_{(s)}$ represent $S$-wave $B^{(*)}_{(s)}$ and $P$-wave $B^{(*)}_{(s)1,2}$ doublets, respectively. For the $H\bar{T}$ systems, we predict some loosely bound states in the $I(J^{PC})=0(1^{-\pm})$ $B\bar{B}_{1}$, $I(J^{PC})=0(2^{--})$ $B\bar{B}_{2}^{*}$, and $I(J^{PC})=0(1^{-\pm})$ $B^*\bar{B}_{1}$ channels, which are the most promising hidden bottom molecular tetraquarks. For the $HT$ systems, the $I(J^{PC})=0(1^{-\pm})$ $B^*B_1$ and $I(J^{PC})=0(2^{-+})$ $B^{*}B^{*}_2$ channels are also likely to form molecular tetraquarks. In contrast, no molecular candidates have been identified in the bottom-strange sectors. One can hope that our predictions will provide valuable insights to the LHCb and Belle II Collaborations as they continue to explore this fascinating field through experimental research.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 03:06:05 GMT" } ]
2025-04-21T00:00:00
[ [ "Su", "Jun-Chao", "" ], [ "Song", "Qing-Fu", "" ], [ "Lü", "Qi-Fang", "" ], [ "Zhu", "Jingya", "" ] ]
2504.13432
Chu Chen
Chu Chen, Han Zhang, Lok Ming Lui
Circular Image Deturbulence using Quasi-conformal Geometry
null
null
null
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
The presence of inhomogeneous media between optical sensors and objects leads to distorted imaging outputs, significantly complicating downstream image-processing tasks. A key challenge in image restoration is the lack of high-quality, paired-label images required for training supervised models. In this paper, we introduce the Circular Quasi-Conformal Deturbulence (CQCD) framework, an unsupervised approach for removing image distortions through a circular architecture. This design ensures that the restored image remains both geometrically accurate and visually faithful while preventing the accumulation of incorrect estimations.The circular restoration process involves both forward and inverse mapping. To ensure the bijectivity of the estimated non-rigid deformations, computational quasi-conformal geometry theories are leveraged to regularize the mapping, enforcing its homeomorphic properties. This guarantees a well-defined transformation that preserves structural integrity and prevents unwanted artifacts. Furthermore, tight-frame blocks are integrated to encode distortion-sensitive features for precise recovery. To validate the performance of our approach, we conduct evaluations on various synthetic and real-world captured images. Experimental results demonstrate that CQCD not only outperforms existing state-of-the-art deturbulence methods in terms of image restoration quality but also provides highly accurate deformation field estimations.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 03:07:25 GMT" } ]
2025-04-21T00:00:00
[ [ "Chen", "Chu", "" ], [ "Zhang", "Han", "" ], [ "Lui", "Lok Ming", "" ] ]
2504.13433
William Cook
William Cook
A Recursive Block Pillar Structure in the Kolakoski Sequence K(1,3)
8 pages, no figures. Undergraduate research. Includes full proofs and references
null
null
null
math.CO cs.FL math.DS
http://creativecommons.org/licenses/by/4.0/
The Kolakoski sequence K(a,b) over {a, b} is the unique sequence starting with a that equals its own run-length encoding. While the classical case K(1,2) remains deeply enigmatic, generalizations exhibit markedly different behaviors depending on the parity of a and b. The sequence K(1,3), a same-parity case over the alphabet {1,3}, is known to possess regular structure and a calculable symbol frequency. This paper reveals a complementary structural property: a nested block-pillar recursion of the form B_{n+1} = B_n + P_n + B_n, and P_{n+1} = G(P_n, 3), where each B_n is a prefix of K(1,3), and G is a generation operator based on run-length encoding. We show that B_{n+1} = G(B_n, 1), leading to a self-replicating description of K(1,3). This structure allows derivation of exact recurrences for length, symbol counts, and density, proving exponential growth and convergence to the known limit d = (5 - sqrt(5)) / 10. Our analysis highlights the structured nature of same-parity Kolakoski sequences and offers a constructive alternative to morphic generation.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 03:08:46 GMT" } ]
2025-04-21T00:00:00
[ [ "Cook", "William", "" ] ]
2504.13434
Ky Ho
Hoang Hai Ha, Ky Ho, Bui The Quan, Inbo Sim
Global boundedness for Generalized Schr\"odinger-Type Double Phase Problems in $\mathbb{R}^N$ and Applications to Supercritical Double Phase Problems
null
null
null
null
math.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We establish two global boundedness results for weak solutions to generalized Schr\"{o}dinger-type double phase problems with variable exponents in $\mathbb{R}^N$ under new critical growth conditions optimally introduced in [26, 32]. More precisely, for the case of subcritical growth, we employ the De Giorgi iteration with a suitable localization method in $\mathbb{R}^N$ to obtain a-priori bounds. As a byproduct, we derive the decay property of weak solutions. For the case of critical growth, using the De Giorgi iteration with a localization adapted to the critical growth, we prove the global boundedness. As an interesting application of these results, the existence of weak solutions for supercritical double phase problems is shown. These results are new even for problems with constant exponents in $\mathbb{R}^N$.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 03:17:38 GMT" } ]
2025-04-21T00:00:00
[ [ "Ha", "Hoang Hai", "" ], [ "Ho", "Ky", "" ], [ "Quan", "Bui The", "" ], [ "Sim", "Inbo", "" ] ]
2504.13435
N. R. Sree Harsha
Jack K. Wright, N. R. Sree Harsha, and Allen L. Garner
A generalized equation for the critical current for a one-dimensional crossed-field gap in an orthogonal coordinate system
36 pages, 10 figures
null
null
null
physics.plasm-ph physics.app-ph
http://creativecommons.org/licenses/by/4.0/
Recent studies have applied variational calculus, conformal mapping, and point transformations to extend the one-dimensional SCLC from planar gaps to more complicated geometries. However, introducing a magnetic field orthogonal to the diode's electric field complicates these calculations due to changes in the electron trajectory. This paper extends a recent study that applied variational calculus to determine the SCLC for a cylindrical crossed-field diode to derive an equation that is valid for any orthogonal coordinate system. We then derive equations for the SCLC for crossed-field gaps in spherical, tip-to-tip, and tip-to-plane geometries that can be solved numerically. These calculations exhibit a discontinuity at the Hull cutoff magnetic field $B_H$ corresponding to the transition to magnetic insulation as observed analytically for a planar geometry. The ratio of the crossed-field SCLC to the nonmagnetic SCLC becomes essentially independent of geometry when we fix $\delta = D/D_M > 0.6$, where $D$ is the canonical gap distance accounting for geometric effects on electric potential and $D_M$ is the effective gap distance that accounts for magnetic field and geometry. The solutions for these geometries overlap as $\delta \to 1$ since the geometric corrections for electric potential and magnetic field match. This indicates the possibility of more generally accounting for the combination of geometric and magnetic effects when calculating $B_H$ and SCLC.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 03:20:46 GMT" } ]
2025-04-21T00:00:00
[ [ "Wright", "Jack K.", "" ], [ "Harsha", "N. R. Sree", "" ], [ "Garner", "Allen L.", "" ] ]
2504.13436
Duksu Kim
YoungWoo Kim, Jaehong Lee, Duksu Kim
RT-HDIST: Ray-Tracing Core-based Hausdorff Distance Computation
8 pages, 7 figures
null
null
null
cs.GR cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Hausdorff distance is a fundamental metric with widespread applications across various fields. However, its computation remains computationally expensive, especially for large-scale datasets. In this work, we present RT-HDIST, the first Hausdorff distance algorithm accelerated by ray-tracing cores (RT-cores). By reformulating the Hausdorff distance problem as a series of nearest-neighbor searches and introducing a novel quantized index space, RT-HDIST achieves significant reductions in computational overhead while maintaining exact results. Extensive benchmarks demonstrate up to a two-order-of-magnitude speedup over prior state-of-the-art methods, underscoring RT-HDIST's potential for real-time and large-scale applications.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 03:21:34 GMT" } ]
2025-04-21T00:00:00
[ [ "Kim", "YoungWoo", "" ], [ "Lee", "Jaehong", "" ], [ "Kim", "Duksu", "" ] ]
2504.13437
Zimo Zhang
Zimo Zhang, Zhongxiao Xu, Ran Huang, Xingda Lu, Fengbo Zhang, Donghao Li, \c{S}ahin K. \"Ozdemir, Franco Nori, Han Bao, Yanhong Xiao, Bing Chen, Hui Jing, and Heng Shen
Chirality-induced quantum nonreciprocity
Accepted by Nature Photonic
null
null
null
quant-ph physics.atom-ph physics.optics
http://creativecommons.org/licenses/by/4.0/
Chirality, nonreciprocity, and quantum correlations are at the center of a wide range of intriguing effects and applications across natural sciences and emerging quantum technologies. However, the direct link combining these three essential concepts has remained unknown till now. Here, we establish a chiral non-Hermitian platform with flying atoms and demonstrate chirality-induced nonreciprocal bipartite quantum correlations between two channels: Quantum correlation emerges when two spatially separated light beams of the same polarization propagate in opposite directions in the atomic cloud, and it becomes zero when they travel in the same direction. Thus, just by flipping the propagation direction of one of the beams while keeping its polarization the same as the other beam, we can create or annihilate quantum correlations between two channels. We also show that this nonreciprocal quantum correlation can be extended to multi-color sidebands with Floquet engineering. Our findings may pave the road for realizing one-way quantum effects, such as nonreciprocal squeezing or entanglement, with a variety of chiral devices, for the emerging applications of e.g., directional quantum network or nonreciprocal quantum metrology.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 03:34:16 GMT" } ]
2025-04-21T00:00:00
[ [ "Zhang", "Zimo", "" ], [ "Xu", "Zhongxiao", "" ], [ "Huang", "Ran", "" ], [ "Lu", "Xingda", "" ], [ "Zhang", "Fengbo", "" ], [ "Li", "Donghao", "" ], [ "Özdemir", "Şahin K.", "" ], [ "Nori", "Franco", "" ], [ "Bao", "Han", "" ], [ "Xiao", "Yanhong", "" ], [ "Chen", "Bing", "" ], [ "Jing", "Hui", "" ], [ "Shen", "Heng", "" ] ]
2504.13438
Swadesh Pal
Swadesh Pal and Roderick Melnik
Adaptive modelling of anti-tau treatments for neurodegenerative disorders based on the Bayesian approach with physics-informed neural networks
22 pages, 8 figures
null
null
null
q-bio.NC q-bio.QM
http://creativecommons.org/licenses/by-nc-nd/4.0/
Alzheimer's disease (AD) is a complex neurodegenerative disorder characterized by the accumulation of amyloid-beta (A$\beta$) and phosphorylated tau (p-tau) proteins, leading to cognitive decline measured by the Alzheimer's Disease Assessment Scale (ADAS) score. In this study, we develop and analyze a system of ordinary differential equation models to describe the interactions between A$\beta$, p-tau, and ADAS score, providing a mechanistic understanding of disease progression. To ensure accurate model calibration, we employ Bayesian inference and Physics-Informed Neural Networks (PINNs) for parameter estimation based on Alzheimer's Disease Neuroimaging Initiative data. The data-driven Bayesian approach enables uncertainty quantification, improving confidence in model predictions, while the PINN framework leverages neural networks to capture complex dynamics directly from data. Furthermore, we implement an optimal control strategy to assess the efficacy of an anti-tau therapeutic intervention aimed at reducing p-tau levels and mitigating cognitive decline. Our data-driven solutions indicate that while optimal drug administration effectively decreases p-tau concentration, its impact on cognitive decline, as reflected in the ADAS score, remains limited. These findings suggest that targeting p-tau alone may not be sufficient for significant cognitive improvement, highlighting the need for multi-target therapeutic strategies. The integration of mechanistic modelling, advanced parameter estimation, and control-based therapeutic optimization provides a comprehensive framework for improving treatment strategies for AD.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 03:35:11 GMT" } ]
2025-04-21T00:00:00
[ [ "Pal", "Swadesh", "" ], [ "Melnik", "Roderick", "" ] ]
2504.13439
Grace Byun
Grace Byun, Jinho Choi
D-GEN: Automatic Distractor Generation and Evaluation for Reliable Assessment of Generative Model
null
null
null
null
cs.CL
http://creativecommons.org/licenses/by/4.0/
Evaluating generative models with open-ended generation is challenging due to inconsistencies in response formats. Multiple-choice (MC) evaluation mitigates this issue, but generating high-quality distractors is time-consuming and labor-intensive. We introduce D-GEN, the first open-source distractor generator model that transforms open-ended data into an MC format. To evaluate distractor quality, we propose two novel methods: (1) ranking alignment, ensuring generated distractors retain the discriminatory power of ground-truth distractors, and (2) entropy analysis, comparing model confidence distributions. Our results show that D-GEN preserves ranking consistency (Spearman's rho 0.99, Kendall's tau 0.94) and closely matches the entropy distribution of ground-truth distractors. Human evaluation further confirms the fluency, coherence, distractiveness, and incorrectness. Our work advances robust and efficient distractor generation with automated evaluation, setting a new standard for MC evaluation.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 03:40:11 GMT" } ]
2025-04-21T00:00:00
[ [ "Byun", "Grace", "" ], [ "Choi", "Jinho", "" ] ]
2504.13440
Cheng Yuan
Cheng Yuan, Yutong Ban
Temporal Propagation of Asymmetric Feature Pyramid for Surgical Scene Segmentation
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Surgical scene segmentation is crucial for robot-assisted laparoscopic surgery understanding. Current approaches face two challenges: (i) static image limitations including ambiguous local feature similarities and fine-grained structural details, and (ii) dynamic video complexities arising from rapid instrument motion and persistent visual occlusions. While existing methods mainly focus on spatial feature extraction, they fundamentally overlook temporal dependencies in surgical video streams. To address this, we present temporal asymmetric feature propagation network, a bidirectional attention architecture enabling cross-frame feature propagation. The proposed method contains a temporal query propagator that integrates multi-directional consistency constraints to enhance frame-specific feature representation, and an aggregated asymmetric feature pyramid module that preserves discriminative features for anatomical structures and surgical instruments. Our framework uniquely enables both temporal guidance and contextual reasoning for surgical scene understanding. Comprehensive evaluations on two public benchmarks show the proposed method outperforms the current SOTA methods by a large margin, with +16.4\% mIoU on EndoVis2018 and +3.3\% mAP on Endoscapes2023. The code will be publicly available after paper acceptance.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 03:41:23 GMT" } ]
2025-04-21T00:00:00
[ [ "Yuan", "Cheng", "" ], [ "Ban", "Yutong", "" ] ]
2504.13441
Devon Lin Professor
Anita Shahrokhian, Xinwei Deng and C. Devon Lin
Active Learning of Computer Experiment with both Quantitative and Qualitative Inputs
arXiv admin note: text overlap with arXiv:2504.05498
null
null
null
stat.ME
http://creativecommons.org/licenses/by/4.0/
Computer experiments refer to the study of real systems using complex simulation models. They have been widely used as alternatives to physical experiments. Design and analysis of computer experiments have attracted great attention in past three decades. The bulk of the work, however, often focus on experiments with only quantitative inputs. In recent years, research on design and analysis for computer experiments have gain momentum. Statistical methodology for design, modeling and inference of such experiments have been developed. In this chapter, we review some of those key developments, and propose active learning approaches for modeling, optimization, contour estimation of computer experiments with both types of inputs. Numerical studies are conducted to evaluate the performance of the proposed methods in comparison with other existing methods.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 03:46:50 GMT" } ]
2025-04-21T00:00:00
[ [ "Shahrokhian", "Anita", "" ], [ "Deng", "Xinwei", "" ], [ "Lin", "C. Devon", "" ] ]
2504.13442
Zhenyu Yu
Zhenyu Yu, Mohd. Yamani Idna Idris, Pei Wang
SatelliteCalculator: A Multi-Task Vision Foundation Model for Quantitative Remote Sensing Inversion
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Quantitative remote sensing inversion plays a critical role in environmental monitoring, enabling the estimation of key ecological variables such as vegetation indices, canopy structure, and carbon stock. Although vision foundation models have achieved remarkable progress in classification and segmentation tasks, their application to physically interpretable regression remains largely unexplored. Furthermore, the multi-spectral nature and geospatial heterogeneity of remote sensing data pose significant challenges for generalization and transferability. To address these issues, we introduce SatelliteCalculator, the first vision foundation model tailored for quantitative remote sensing inversion. By leveraging physically defined index formulas, we automatically construct a large-scale dataset of over one million paired samples across eight core ecological indicators. The model integrates a frozen Swin Transformer backbone with a prompt-guided architecture, featuring cross-attentive adapters and lightweight task-specific MLP decoders. Experiments on the Open-Canopy benchmark demonstrate that SatelliteCalculator achieves competitive accuracy across all tasks while significantly reducing inference cost. Our results validate the feasibility of applying foundation models to quantitative inversion, and provide a scalable framework for task-adaptive remote sensing estimation.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 03:48:04 GMT" } ]
2025-04-21T00:00:00
[ [ "Yu", "Zhenyu", "" ], [ "Idris", "Mohd. Yamani Idna", "" ], [ "Wang", "Pei", "" ] ]
2504.13443
Michael Juntao Yuan
Michael J. Yuan, Carlos Campoy, Sydney Lai, James Snewin, Ju Long
Trust, but verify
null
null
null
null
cs.AI cs.DC cs.MA econ.GN q-fin.EC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Decentralized AI agent networks, such as Gaia, allows individuals to run customized LLMs on their own computers and then provide services to the public. However, in order to maintain service quality, the network must verify that individual nodes are running their designated LLMs. In this paper, we demonstrate that in a cluster of mostly honest nodes, we can detect nodes that run unauthorized or incorrect LLM through social consensus of its peers. We will discuss the algorithm and experimental data from the Gaia network. We will also discuss the intersubjective validation system, implemented as an EigenLayer AVS to introduce financial incentives and penalties to encourage honest behavior from LLM nodes.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 03:49:53 GMT" } ]
2025-04-21T00:00:00
[ [ "Yuan", "Michael J.", "" ], [ "Campoy", "Carlos", "" ], [ "Lai", "Sydney", "" ], [ "Snewin", "James", "" ], [ "Long", "Ju", "" ] ]
2504.13444
Mengjie (Magie) Cheng
Mengjie (Magie) Cheng, Elie Ofek, Hema Yoganarasimhan
Balancing Engagement and Polarization: Multi-Objective Alignment of News Content Using LLMs
73 pages
null
null
null
econ.GN q-fin.EC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study how media firms can use LLMs to generate news content that aligns with multiple objectives -- making content more engaging while maintaining a preferred level of polarization/slant consistent with the firm's editorial policy. Using news articles from The New York Times, we first show that more engaging human-written content tends to be more polarizing. Further, naively employing LLMs (with prompts or standard Direct Preference Optimization approaches) to generate more engaging content can also increase polarization. This has an important managerial and policy implication: using LLMs without building in controls for limiting slant can exacerbate news media polarization. We present a constructive solution to this problem based on the Multi-Objective Direct Preference Optimization (MODPO) algorithm, a novel approach that integrates Direct Preference Optimization with multi-objective optimization techniques. We build on open-source LLMs and develop a new language model that simultaneously makes content more engaging while maintaining a preferred editorial stance. Our model achieves this by modifying content characteristics strongly associated with polarization but that have a relatively smaller impact on engagement. Our approach and findings apply to other settings where firms seek to use LLMs for content creation to achieve multiple objectives, e.g., advertising and social media.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 03:50:56 GMT" } ]
2025-04-21T00:00:00
[ [ "Mengjie", "", "", "Magie" ], [ "Cheng", "", "" ], [ "Ofek", "Elie", "" ], [ "Yoganarasimhan", "Hema", "" ] ]
2504.13445
Daichi Amagata
Daichi Amagata, Kazuyoshi Aoayama, Keito Kido, Sumio Fujita
How to Mine Potentially Popular Items? A Reverse MIPS-based Approach
Accepted to SSDBM2025
null
null
null
cs.DB
http://creativecommons.org/licenses/by-nc-nd/4.0/
The $k$-MIPS ($k$ Maximum Inner Product Search) problem has been employed in many fields. Recently, its reverse version, the reverse $k$-MIPS problem, has been proposed. Given an item vector (i.e., query), it retrieves all user vectors such that their $k$-MIPS results contain the item vector. Consider the cardinality of a reverse $k$-MIPS result. A large cardinality means that the item is potentially popular, because it is included in the $k$-MIPS results of many users. This mining is important in recommender systems, market analysis, and new item development. Motivated by this, we formulate a new problem. In this problem, the score of each item is defined as the cardinality of its reverse $k$-MIPS result, and the $N$ items with the highest score are retrieved. A straightforward approach is to compute the scores of all items, but this is clearly prohibitive for large numbers of users and items. We remove this inefficiency issue and propose a fast algorithm for this problem. Because the main bottleneck of the problem is to compute the score of each item, we devise a new upper-bounding technique that is specific to our problem and filters unnecessary score computations. We conduct extensive experiments on real datasets and show the superiority of our algorithm over competitors.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 03:56:00 GMT" } ]
2025-04-21T00:00:00
[ [ "Amagata", "Daichi", "" ], [ "Aoayama", "Kazuyoshi", "" ], [ "Kido", "Keito", "" ], [ "Fujita", "Sumio", "" ] ]
2504.13446
Daichi Amagata
Daichi Amagata, Kazuyoshi Aoyama, Keito Kido, Sumio Fujita
Approximate Reverse $k$-Ranks Queries in High Dimensions
Accepted to SSDBM2025
null
null
null
cs.DB
http://creativecommons.org/licenses/by-nc-nd/4.0/
Many objects are represented as high-dimensional vectors nowadays. In this setting, the relevance between two objects (vectors) is usually evaluated by their inner product. Recently, item-centric searches, which search for users relevant to query items, have received attention and find important applications, such as product promotion and market analysis. To support these applications, this paper considers reverse $k$-ranks queries. Given a query vector $\mathbf{q}$, $k$, a set $\mathbf{U}$ of user vectors, and a set $\mathbf{P}$ of item vectors, this query retrieves the $k$ user vectors $\mathbf{u} \in \mathbf{U}$ with the highest $r(\mathbf{q},\mathbf{u},\mathbf{P})$, where $r(\mathbf{q},\mathbf{u},\mathbf{P})$ shows the rank of $\mathbf{q}$ for $\mathbf{u}$ among $\mathbf{P}$. Because efficiently computing the exact answer for this query is difficult in high dimensions, we address the problem of approximate reverse $k$-ranks queries. Informally, given an approximation factor $c$, this problem allows, as an output, a user $\mathbf{u}'$ such that $r(\mathbf{q},\mathbf{u}',\mathbf{P}) > \tau$ but $r(\mathbf{q},\mathbf{u}',\mathbf{P}) \leq c \times \tau$, where $\tau$ is the rank threshold for the exact answer. We propose a new algorithm for solving this problem efficiently. Through theoretical and empirical analyses, we confirm the efficiency and effectiveness of our algorithm.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 03:56:07 GMT" } ]
2025-04-21T00:00:00
[ [ "Amagata", "Daichi", "" ], [ "Aoyama", "Kazuyoshi", "" ], [ "Kido", "Keito", "" ], [ "Fujita", "Sumio", "" ] ]
2504.13447
Guobin Liu Dr
Erwei Li, Qianjin Ma, Weiyu Wang, Bobo Du and Guobin Liu
Laser power stabilization using conservation law in acoustic optical modulator
6 pages, 7 figures
null
null
null
physics.optics physics.atom-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An active method of laser power stabilization is realized utilizing an acoustic optical modulator (AOM). Under Bragg diffraction conditions, the total output power of AOM equals the combined power of the 0th and 1st order beams, which are expressed as the sum of the sampling beam power and a temperature-sensitive term. Based on this conservation law, we designed a digital PID control system that dynamically adjusts the 1st order beam power to maintain a stable output of the 0th order application beam. The method allows high availability and deep engagement of the application beam. Experimental result demonstrates that the relative power noise of controlled application beam is reduced by a factor of 200, reaching $4 \times 10^{-6} $ Hz$^{-1/2}$ at 0.0001 Hz compared with the uncontrolled total power. Allan deviation shows that the application beam reaches a relative power instability of 3.28$\times 10^{-6}$ at 500 s averaging time. This active digital control method of laser power in long term can be used for applications requiring ultra-stable laser sources, such as the atomic clocks, interferometers and gyroscopes.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 03:56:44 GMT" } ]
2025-04-21T00:00:00
[ [ "Li", "Erwei", "" ], [ "Ma", "Qianjin", "" ], [ "Wang", "Weiyu", "" ], [ "Du", "Bobo", "" ], [ "Liu", "Guobin", "" ] ]