id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-04-21 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2504.13348 | Zhenhua Yu | Xiao Jin, Zihan Wang, Zhenhua Yu, Changrak Choi, Kalind Carpenter,
Thrishantha Nanayakkara | Physical Reservoir Computing in Hook-Shaped Rover Wheel Spokes for
Real-Time Terrain Identification | null | null | null | null | cs.RO | http://creativecommons.org/licenses/by-sa/4.0/ | Effective terrain detection in unknown environments is crucial for safe and
efficient robotic navigation. Traditional methods often rely on computationally
intensive data processing, requiring extensive onboard computational capacity
and limiting real-time performance for rovers. This study presents a novel
approach that combines physical reservoir computing with piezoelectric sensors
embedded in rover wheel spokes for real-time terrain identification. By
leveraging wheel dynamics, terrain-induced vibrations are transformed into
high-dimensional features for machine learning-based classification.
Experimental results show that strategically placing three sensors on the wheel
spokes achieves 90$\%$ classification accuracy, which demonstrates the accuracy
and feasibility of the proposed method. The experiment results also showed that
the system can effectively distinguish known terrains and identify unknown
terrains by analyzing their similarity to learned categories. This method
provides a robust, low-power framework for real-time terrain classification and
roughness estimation in unstructured environments, enhancing rover autonomy and
adaptability.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 21:29:17 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Jin",
"Xiao",
""
],
[
"Wang",
"Zihan",
""
],
[
"Yu",
"Zhenhua",
""
],
[
"Choi",
"Changrak",
""
],
[
"Carpenter",
"Kalind",
""
],
[
"Nanayakkara",
"Thrishantha",
""
]
] |
2504.13349 | Muralidhar Madabhushi Balaji | Muralidhar Madabhushi Balaji, Danyal Ahsanullah and Prasanna
Rangarajan | A Multisensory Approach to Probing Scattering Media | null | null | null | null | physics.optics | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Non-invasive detection of objects embedded inside an optically scattering
medium is essential for numerous applications in engineering and sciences.
However, in most applications light at visible or near-infrared wavebands is
scattered by the medium resulting in the obscuration of the embedded objects.
Existing methods to overcome scattering generally rely on point-by-point
scanning strategies, which limit spatial sampling density. In this work, we
address the sampling limitations by drawing inspiration from multisensory
integration mechanisms observed in nature, wherein distinct sensing modalities
work together to enhance the perception of the surroundings. Our multisensory
approach leverages the unique advantages of coherent light by combining the
sensitivity of an interferometric LiDAR with a wide field neuromorphic sensor
to probe objects inside a densely scattering medium. The neuromorphic camera
provides wide field spatial cues of the embedded object, by monitoring the
fluctuations in the speckle patterns produced by tuning the laser frequency.
These spatial cues are used to guide a point-scanning FMCW LiDAR to retrieve
high-resolution images. Using this approach, we imaged objects embedded within
an 8 cm thick (>100 transport mean free paths), tissue-like scattering medium
with a 10x improvement in sampling density compared to traditional uniform
sampling.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 21:30:03 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Balaji",
"Muralidhar Madabhushi",
""
],
[
"Ahsanullah",
"Danyal",
""
],
[
"Rangarajan",
"Prasanna",
""
]
] |
2504.13350 | Pablo Manuel Bern\'a | Miguel Berasategui, Pablo M. Bern\'a, Stephen J. Dilworth, Denka
Kutzarova | Summability Methods for the Greedy Algorithm in Banach spaces | null | null | null | null | math.FA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For the past 25 years, one of the most studied algorithms in the field of
Nonlinear Approximation Theory has been the Thresholding Greedy Algorithm. In
this paper, we propose new summability methods for this algorithm, generating
two new types of greedy-like bases - namley Ces\`aro quasi-greedy and de la
Vall\'ee-Poussin-quasi-greedy bases. We will analyze the connection between
these types of bases and the well-known quasi-greedy bases, and leave some open
problems for future research.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 21:30:09 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Berasategui",
"Miguel",
""
],
[
"Berná",
"Pablo M.",
""
],
[
"Dilworth",
"Stephen J.",
""
],
[
"Kutzarova",
"Denka",
""
]
] |
2504.13351 | Chen Wang | Chen Wang, Fei Xia, Wenhao Yu, Tingnan Zhang, Ruohan Zhang, C. Karen
Liu, Li Fei-Fei, Jie Tan, Jacky Liang | Chain-of-Modality: Learning Manipulation Programs from Multimodal Human
Videos with Vision-Language-Models | ICRA 2025 | null | null | null | cs.RO cs.AI cs.HC cs.LG cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Learning to perform manipulation tasks from human videos is a promising
approach for teaching robots. However, many manipulation tasks require changing
control parameters during task execution, such as force, which visual data
alone cannot capture. In this work, we leverage sensing devices such as
armbands that measure human muscle activities and microphones that record
sound, to capture the details in the human manipulation process, and enable
robots to extract task plans and control parameters to perform the same task.
To achieve this, we introduce Chain-of-Modality (CoM), a prompting strategy
that enables Vision Language Models to reason about multimodal human
demonstration data -- videos coupled with muscle or audio signals. By
progressively integrating information from each modality, CoM refines a task
plan and generates detailed control parameters, enabling robots to perform
manipulation tasks based on a single multimodal human video prompt. Our
experiments show that CoM delivers a threefold improvement in accuracy for
extracting task plans and control parameters compared to baselines, with strong
generalization to new task setups and objects in real-world robot experiments.
Videos and code are available at https://chain-of-modality.github.io
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 21:31:23 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Wang",
"Chen",
""
],
[
"Xia",
"Fei",
""
],
[
"Yu",
"Wenhao",
""
],
[
"Zhang",
"Tingnan",
""
],
[
"Zhang",
"Ruohan",
""
],
[
"Liu",
"C. Karen",
""
],
[
"Fei-Fei",
"Li",
""
],
[
"Tan",
"Jie",
""
],
[
"Liang",
"Jacky",
""
]
] |
2504.13352 | Jarett LeVan | Jarett LeVan and Scott Baalrud | Foundations of magnetohydrodynamics | null | null | null | null | physics.plasm-ph | http://creativecommons.org/licenses/by/4.0/ | In this tutorial, a derivation of magnetohydrodynamics (MHD) valid beyond the
usual ideal gas approximation is presented. Non-equilibrium thermodynamics is
used to obtain conservation equations and linear constitutive relations. When
coupled with Maxwell's equations, this provides closed fluid equations in terms
of material properties of the plasma, described by the equation of state and
transport coefficients. These properties are connected to microscopic dynamics
using the Irving-Kirkwood procedure and Green-Kubo relations. Symmetry
arguments and the Onsager-Casimir relations allow one to vastly simplify the
number of independent coefficients. Importantly, expressions for current
density, heat flux, and stress (conventionally Ohm's law, Fourier's law, and
Newton's law) take different forms in systems with a non-ideal equation of
state. The traditional form of the MHD equations, which is usually obtained
from a Chapman-Enskog solution of the Boltzmann equation, corresponds to the
ideal gas limit of the general equations.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 21:35:13 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"LeVan",
"Jarett",
""
],
[
"Baalrud",
"Scott",
""
]
] |
2504.13353 | Harald W. Griesshammer | Harald W. Griesshammer (George Washington U.) | The Unitarity-Limit Expansion for Two Nucleons with Perturbative Pions:
Digest and Ideas | 10 pages LaTeX2e (pdflatex) in pos.sty including 7 figures as 9 .pdf
files using includegraphics. arXiv admin note: text overlap with
arXiv:2410.09653 | null | null | null | hep-ph nucl-th physics.atom-ph | http://creativecommons.org/licenses/by/4.0/ | In the Unitarity Limit, the NN S-wave binding energies are zero, the
scattering lengths infinite, Physics is universal, i.e. insensitive to details
of the interactions, and observables display richer symmetries, namely
invariance under both scaling and Wigner's combined SU(4) transformation of
spin and isospin. This presentation is a digest of the first quantitative
exploration of corrections to this picture when pions are included [1] (see
there for a more comprehensive list of references). Since the pion mass and
decay constant introduce dimensionful scales in the NN system, they explicitly
break the symmetries of the Unitarity fixed point. In $\chi$EFT, these
symmetries must therefore be classified as emergent. This text focuses on the
$\chi$EFT variant with Perturbative ("KSW") Pions at next-to-next-to leading
order (N2LO). This leads to the Hypothesis that both scale invariance and
Wigner-SU(4) symmetry in the Unitarity Expansion show persistence, i.e. the
footprint of both combined dominates even for $k\gtrsim m_\pi$ and is more
relevant than chiral symmetry, so that the tensor/Wigner-SU(4)
symmetry-breaking part of OPE is suppressed and does not enter before N3LO.
Included are also ideas about underlying mechanisms and LO results of $\chi$EFT
with Nonperturbative Pions in the expansion about Unitarity.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 21:44:30 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Griesshammer",
"Harald W.",
"",
"George Washington U."
]
] |
2504.13354 | Max Wiedenh\"oft | Da-Jung Cho, Szil\'ard Zsolt Fazekas, Shinnosuke Seki, Max
Wiedenh\"oft | A Formalization of Co-Transcriptional Splicing as an Operation on Formal
Languages | 30 pages, 2 tables, 1 figure, under review in Natural Computing | null | null | null | cs.FL | http://creativecommons.org/licenses/by/4.0/ | RNA co-transcriptionality is the process where RNA sequences are spliced
while being transcribed from DNA templates. This process holds potential as a
key tool for molecular programming. Co-transcriptional folding has been shown
to be programmable for assembling nano-scale RNA structures, and recent
advances have proven its Turing universality. While post-transcriptional
splicing has been extensively studied, co-transcriptional splicing is gaining
attention for its potential to save resources and space in molecular systems.
However, its unpredictability has limited its practical applications. In this
paper, we focus on engineering co-transcriptional splicing, moving beyond
natural occurrences to program RNA sequences that produce specific target
sequences through DNA templates. We introduce a formal model of
co-transcriptional splicing, defined by constant-, linear-, and
logarithmic-bounded hairpin deletion operations, as well as an unbounded
hairpin deletion operation. We examine the complexity of the template
constructability problem associated with these operations and study the closure
properties of the languages they generate, providing insights for RNA template
design in molecular programming systems.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 21:44:37 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Cho",
"Da-Jung",
""
],
[
"Fazekas",
"Szilárd Zsolt",
""
],
[
"Seki",
"Shinnosuke",
""
],
[
"Wiedenhöft",
"Max",
""
]
] |
2504.13355 | Omid Sedehi | Omid Sedehi, Manish Yadav, Merten Stender, Sebastian Oberst | Denoising and Reconstruction of Nonlinear Dynamics using Truncated
Reservoir Computing | null | null | null | null | cs.LG cs.NE nlin.CD | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Measurements acquired from distributed physical systems are often sparse and
noisy. Therefore, signal processing and system identification tools are
required to mitigate noise effects and reconstruct unobserved dynamics from
limited sensor data. However, this process is particularly challenging because
the fundamental equations governing the dynamics are largely unavailable in
practice. Reservoir Computing (RC) techniques have shown promise in efficiently
simulating dynamical systems through an unstructured and efficient computation
graph comprising a set of neurons with random connectivity. However, the
potential of RC to operate in noisy regimes and distinguish noise from the
primary dynamics of the system has not been fully explored. This paper presents
a novel RC method for noise filtering and reconstructing nonlinear dynamics,
offering a novel learning protocol associated with hyperparameter optimization.
The performance of the RC in terms of noise intensity, noise frequency content,
and drastic shifts in dynamical parameters are studied in two illustrative
examples involving the nonlinear dynamics of the Lorenz attractor and adaptive
exponential integrate-and-fire system (AdEx). It is shown that the denoising
performance improves via truncating redundant nodes and edges of the computing
reservoir, as well as properly optimizing the hyperparameters, e.g., the
leakage rate, the spectral radius, the input connectivity, and the ridge
regression parameter. Furthermore, the presented framework shows good
generalization behavior when tested for reconstructing unseen attractors from
the bifurcation diagram. Compared to the Extended Kalman Filter (EKF), the
presented RC framework yields competitive accuracy at low signal-to-noise
ratios (SNRs) and high-frequency ranges.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 21:47:13 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Sedehi",
"Omid",
""
],
[
"Yadav",
"Manish",
""
],
[
"Stender",
"Merten",
""
],
[
"Oberst",
"Sebastian",
""
]
] |
2504.13356 | Nicolas Delfosse | Edwin Tham and Nicolas Delfosse | Optimized Clifford Noise Reduction: Theory, Simulations and Experiments | 13 pages | null | null | null | quant-ph | http://creativecommons.org/licenses/by/4.0/ | We propose several optimizations of the CliNR partial error correction scheme
which implements Clifford circuits by consuming a resource state. Errors are
corrected by measuring a sequence of Pauli operators that we refer to as the
verification sequence. We first propose a global optimization algorithm
searching for a verification sequence resulting in a low logical error rate
using tabu search. Then, we introduce a proxy for the logical error rate which
is easier to evaluate and we design a two-step optimization algorithm. First, a
verification sequence minimizing the proxy is computed, then this sequence is
refined by reintroducing the logical error rate. Finally, we identify a large
group of automorphisms of the search space which preserve the proxy and we use
this symmetry to reduce the size of the search space. This results in a 168
$\times$ (respectively 20,160 $\times$) reduction of the size of the search
space for the optimization of verification sequences with three (respectively
four) Pauli operators. Our numerical simulations for 20-qubit Clifford circuits
with size 400 under the ion chain model show that our optimization algorithms
improve the performance of CliNR by 25% and that the two-step optimization
achieves the same results as the global optimization with 64% fewer evaluations
of the logical error rate. Finally, we perform experiments on a 36-qubit
trapped ion quantum computer, without mid-circuit measurements, showing that
the CZNR variant of CliNR is at breakeven.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 21:47:38 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Tham",
"Edwin",
""
],
[
"Delfosse",
"Nicolas",
""
]
] |
2504.13357 | \.Izzet Sakall{\i} | Faizuddin Ahmed, Ahmad Al-Badawi, and \.Izzet Sakall{\i} | Geometric and Thermodynamic Properties of Frolov Black Holes with
Topological Defects | 23 pages, 18 figures, 8 tables | null | null | null | gr-qc astro-ph.HE hep-th physics.space-ph | http://creativecommons.org/licenses/by/4.0/ | We investigated a modified Frolov black hole (BH) model that incorporates
both a global monopole (GM) and a cosmic string (CS) to explore the interplay
between non-singular BH regularization and topological defect effects. In our
study, we derived a spacetime metric characterized by a regulated core through
a length scale parameter $\alpha$ and introduced additional modifications via
the GM parameter $\eta$ and the CS parameter $a$, which collectively alter the
horizon structure and causal geometry of the BH. We analyzed the thermodynamic
properties by deriving expressions for the mass function, Hawking temperature,
and entropy, and found that the inclusion of GM and CS significantly deviates
the BH entropy from the conventional Bekenstein-Hawking area law, while
numerical investigations showed that the shadow radius exhibits contrasting
behaviors: the Frolov parameters tend to reduce the shadow size whereas the
topological defects enhance it. Furthermore, we examined the dynamics of scalar
and electromagnetic perturbations by solving the massless Klein-Gordon equation
in the BH background and computed the quasinormal modes (QNMs) using the WKB
approximation, which confirmed the BH's stability and revealed that the
oscillation frequencies and damping rates are strongly dependent on the
parameters $\alpha$, $q$, $\eta$, and $a$. Our results suggest that the
distinct observational signatures arising from this composite BH model may
provide a promising avenue for testing modified gravity theories in the
strong-field regime.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 21:54:40 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Ahmed",
"Faizuddin",
""
],
[
"Al-Badawi",
"Ahmad",
""
],
[
"Sakallı",
"İzzet",
""
]
] |
2504.13358 | Hung An Tsai | Omar Tsai, Jianing Li, Tsz Tung Cheung, Lejing Huang, Hao Zhu, Jianrui
Xiao, Iman Sharafaldin and Mohammad A. Tayebi | GraphQLer: Enhancing GraphQL Security with Context-Aware API Testing | Publicly available on: https://github.com/omar2535/GraphQLer | null | null | null | cs.CR cs.SE | http://creativecommons.org/licenses/by/4.0/ | GraphQL is an open-source data query and manipulation language for web
applications, offering a flexible alternative to RESTful APIs. However, its
dynamic execution model and lack of built-in security mechanisms expose it to
vulnerabilities such as unauthorized data access, denial-of-service (DoS)
attacks, and injections. Existing testing tools focus on functional
correctness, often overlooking security risks stemming from query
interdependencies and execution context. This paper presents GraphQLer, the
first context-aware security testing framework for GraphQL APIs. GraphQLer
constructs a dependency graph to analyze relationships among mutations,
queries, and objects, capturing critical interdependencies. It chains related
queries and mutations to reveal authentication and authorization flaws, access
control bypasses, and resource misuse. Additionally, GraphQLer tracks internal
resource usage to uncover data leakage, privilege escalation, and replay attack
vectors. We assess GraphQLer on various GraphQL APIs, demonstrating improved
testing coverage - averaging a 35% increase, with up to 84% in some cases -
compared to top-performing baselines. Remarkably, this is achieved in less
time, making GraphQLer suitable for time-sensitive contexts. GraphQLer also
successfully detects a known CVE and potential vulnerabilities in large-scale
production APIs. These results underline GraphQLer's utility in proactively
securing GraphQL APIs through automated, context-aware vulnerability detection.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 21:58:15 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Tsai",
"Omar",
""
],
[
"Li",
"Jianing",
""
],
[
"Cheung",
"Tsz Tung",
""
],
[
"Huang",
"Lejing",
""
],
[
"Zhu",
"Hao",
""
],
[
"Xiao",
"Jianrui",
""
],
[
"Sharafaldin",
"Iman",
""
],
[
"Tayebi",
"Mohammad A.",
""
]
] |
2504.13359 | Mehmet Hamza Erol | Mehmet Hamza Erol, Batu El, Mirac Suzgun, Mert Yuksekgonul, James Zou | Cost-of-Pass: An Economic Framework for Evaluating Language Models | Code is available at: https://github.com/mhamzaerol/Cost-of-Pass | null | null | null | cs.AI cs.CL | http://creativecommons.org/licenses/by/4.0/ | The widespread adoption of AI systems in the economy hinges on their ability
to generate economic value that outweighs their inference costs. Evaluating
this tradeoff requires metrics that account for both performance and costs. We
propose a framework grounded in production theory for evaluating language
models by combining accuracy and inference cost. We introduce "cost-of-pass",
the expected monetary cost of generating a correct solution. We then define the
"frontier cost-of-pass" as the minimum cost-of-pass achievable across available
models or the "human-expert, using the approximate cost of hiring an expert.
Our analysis reveals distinct economic insights. First, lightweight models are
most cost-effective for basic quantitative tasks, large models for
knowledge-intensive ones, and reasoning models for complex quantitative
problems, despite higher per-token costs. Second, tracking this frontier
cost-of-pass over the past year reveals significant progress, particularly for
complex quantitative tasks where the cost has roughly halved every few months.
Third, to trace key innovations driving this progress, we examine
counterfactual frontiers: estimates of cost-efficiency without specific model
classes. We find that innovations in lightweight, large, and reasoning models
have been essential for pushing the frontier in basic quantitative,
knowledge-intensive, and complex quantitative tasks, respectively. Finally, we
assess the cost-reductions afforded by common inference-time techniques like
majority voting and self-refinement, finding that their marginal accuracy gains
rarely justify their costs. Our findings underscore that complementary
model-level innovations are the primary drivers of cost-efficiency, and our
economic framework provides a principled tool for measuring this progress and
guiding deployment.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 21:58:29 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Erol",
"Mehmet Hamza",
""
],
[
"El",
"Batu",
""
],
[
"Suzgun",
"Mirac",
""
],
[
"Yuksekgonul",
"Mert",
""
],
[
"Zou",
"James",
""
]
] |
2504.13360 | Razvan Diaconescu | R\u{a}zvan Diaconescu | In between myth and reality: AI for math -- a case study in category
theory | null | null | null | null | cs.AI math.HO math.LO | http://creativecommons.org/licenses/by/4.0/ | Recently, there is an increasing interest in understanding the performance of
AI systems in solving math problems. A multitude of tests have been performed,
with mixed conclusions. In this paper we discuss an experiment we have made in
the direction of mathematical research, with two of the most prominent
contemporary AI systems. One of the objective of this experiment is to get an
understanding of how AI systems can assist mathematical research. Another
objective is to support the AI systems developers by formulating suggestions
for directions of improvement.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 21:58:30 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Diaconescu",
"Răzvan",
""
]
] |
2504.13361 | Linh Ma Van | Linh Van Ma, Shoaib Azam, Farzeen Munir, Moongu Jeon | Automated Taxi Booking Operations for Autonomous Vehicles | International Conference on Signal Processing and Communication
Systems, ICSPCS 2019 (http://www.dspcs-witsp.com/icspcs_2019/index.html) | ICSPCS 2019 | null | null | cs.NI | http://creativecommons.org/licenses/by/4.0/ | In a conventional taxi booking system, all taxi operations are mostly done by
a decision made by drivers which is hard to implement in unmanned vehicles. To
address this challenge, we introduce a taxi booking system which assists
autonomous vehicles to pick up customers. The system can allocate an autonomous
vehicle (AV) as well as plan service trips for a customer request. We use our
own AV to serve a customer who uses a mobile application to make his taxi
request. Apart from customer and AV, we build a server to monitor customers and
AVs. It also supports inter-communication between a customer and an AV once AV
decided to pick up a customer.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 22:00:26 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Van Ma",
"Linh",
""
],
[
"Azam",
"Shoaib",
""
],
[
"Munir",
"Farzeen",
""
],
[
"Jeon",
"Moongu",
""
]
] |
2504.13362 | Owen Goff | Owen Goff | Using the quantum torus to investigate the $q$-Onsager algebra | 25 pages | null | null | null | math.QA math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The $q$-Onsager algebra, denoted by $O_q$, is defined by generators $W_0,
W_1$ and two relations called the $q$-Dolan-Grady relations. In 2017, Baseilhac
and Kolb gave some elements of $O_q$ that form a Poincar\'e-Birkhoff-Witt
basis. The quantum torus, denoted by $T_q$, is defined by generators $x, y,
x^{-1}, y^{-1}$ and relations $$xx^{-1} = 1 = x^{-1}x, \qquad yy^{-1} = 1 =
y^{-1}y, \qquad xy=q^2yx.$$ The set $\{x^iy^j | i,j \in \mathbb{Z} \}$ is a
basis for $T_q$. It is known that there is an algebra homomorphism $p: O_q
\mapsto T_q$ that sends $W_0 \mapsto x+x^{-1}$ and $W_1 \mapsto y+y^{-1}.$ In
2020, Lu and Wang displayed a variation of $O_q$, denoted by
$\tilde{\mathbf{U}}^{\imath}$. Lu and Wang gave a surjective algebra
homomorphism $\upsilon : \tilde{\mathbf{U}}^{\imath} \mapsto O_q.$ \medskip In
their consideration of $\tilde{\mathbf{U}}^{\imath}$, Lu and Wang introduced
some elements \begin{equation} \label{intrp503} \{B_{1,r}\}_{r \in \mathbb{Z}},
\qquad \{H'_n\}_{n=1}^{\infty}, \qquad \{H_n\}_{n=1}^{\infty}, \qquad
\{\Theta'_n\}_{n=1}^{\infty}, \qquad \{\Theta_n\}_{n=1}^{\infty}. \nonumber
\end{equation} These elements are defined using recursive formulas and
generating functions, and it is difficult to express them in closed form. A
similar problem applies to the Baseilhac-Kolb elements of $O_q$. To mitigate
this difficulty, we map everything to $T_q$ using $p$ and $\upsilon$. In our
main results, we express the resulting images in the basis for $T_q$ and also
in an attractive closed form.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 22:01:00 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Goff",
"Owen",
""
]
] |
2504.13363 | Mojtaba Vaezi | Mojtaba Vaezi, Gayan Aruma Baduge, Esa Ollila and Sergiy A. Vorobyov | AI-Empowered Integrated Sensing and Communications | 26 pages, 10 figures, 6 tables | null | null | null | cs.IT eess.SP math.IT | http://creativecommons.org/licenses/by/4.0/ | Integrating sensing and communication (ISAC) can help overcome the challenges
of limited spectrum and expensive hardware, leading to improved energy and cost
efficiency. While full cooperation between sensing and communication can result
in significant performance gains, achieving optimal performance requires
efficient designs of unified waveforms and beamformers for joint sensing and
communication. Sophisticated statistical signal processing and multi-objective
optimization techniques are necessary to balance the competing design
requirements of joint sensing and communication tasks. Since model-based
analytical approaches may be suboptimal or overly complex, deep learning
emerges as a powerful tool for developing data-driven signal processing
algorithms, particularly when optimal algorithms are unknown or when known
algorithms are too complex for real-time implementation. Unified waveform and
beamformer design problems for ISAC fall into this category, where fundamental
design trade-offs exist between sensing and communication performance metrics,
and the underlying models may be inadequate or incomplete. This article
explores the application of artificial intelligence (AI) in ISAC designs to
enhance efficiency and reduce complexity. We emphasize the integration benefits
through AI-driven ISAC designs, prioritizing the development of unified
waveforms, constellations, and beamforming strategies for both sensing and
communication. To illustrate the practical potential of AI-driven ISAC, we
present two case studies on waveform and beamforming design, demonstrating how
unsupervised learning and neural network-based optimization can effectively
balance performance, complexity, and implementation constraints.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 22:03:43 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Vaezi",
"Mojtaba",
""
],
[
"Baduge",
"Gayan Aruma",
""
],
[
"Ollila",
"Esa",
""
],
[
"Vorobyov",
"Sergiy A.",
""
]
] |
2504.13364 | Angelo Rosa Prof. Dr. | Pieter H. W. van der Hoek and Angelo Rosa and Ralf Everaers | The configurational entropy of random trees | 14 pages, 5 main figures, 1 suppl. figure | null | null | null | cond-mat.stat-mech cond-mat.soft | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a graph theoretical approach to the configurational statistics of
random tree-like objects, such as randomly branching polymers. In particular,
we show that Pr\"ufer labelling provides: (i) direct access to the exact
configurational entropy as a function of the tree composition, (ii) computable
exact expressions for partition functions and important experimental
observables for tree ensembles with controlled branching activity and (iii) an
efficient sampling scheme for corresponding tree configurations and arbitrary
static properties.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 22:07:47 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"van der Hoek",
"Pieter H. W.",
""
],
[
"Rosa",
"Angelo",
""
],
[
"Everaers",
"Ralf",
""
]
] |
2504.13365 | Long Li | Long Li, Jiajia Li, Dong Chen, Lina Pu, Haibo Yao, Yanbo Huang | VLLFL: A Vision-Language Model Based Lightweight Federated Learning
Framework for Smart Agriculture | null | null | null | null | cs.CV cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In modern smart agriculture, object detection plays a crucial role by
enabling automation, precision farming, and monitoring of resources. From
identifying crop health and pest infestations to optimizing harvesting
processes, accurate object detection enhances both productivity and
sustainability. However, training object detection models often requires
large-scale data collection and raises privacy concerns, particularly when
sensitive agricultural data is distributed across farms. To address these
challenges, we propose VLLFL, a vision-language model-based lightweight
federated learning framework (VLLFL). It harnesses the generalization and
context-aware detection capabilities of the vision-language model (VLM) and
leverages the privacy-preserving nature of federated learning. By training a
compact prompt generator to boost the performance of the VLM deployed across
different farms, VLLFL preserves privacy while reducing communication overhead.
Experimental results demonstrate that VLLFL achieves 14.53% improvement in the
performance of VLM while reducing 99.3% communication overhead. Spanning tasks
from identifying a wide variety of fruits to detecting harmful animals in
agriculture, the proposed framework offers an efficient, scalable, and
privacy-preserving solution specifically tailored to agricultural applications.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 22:14:31 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Li",
"Long",
""
],
[
"Li",
"Jiajia",
""
],
[
"Chen",
"Dong",
""
],
[
"Pu",
"Lina",
""
],
[
"Yao",
"Haibo",
""
],
[
"Huang",
"Yanbo",
""
]
] |
2504.13366 | Alexander A. Kubasch | Alexander A. Kubasch and Gerg\H{o} Schefler | Lattice cohomology and the embedded topological type of plane curve
singularities | null | null | null | null | math.AG | http://creativecommons.org/licenses/by/4.0/ | Analytic lattice cohomology is a new invariant of reduced curve
singularities. In the case of plane curves, it is an algebro-geometric analogue
of Heegaard Floer Link homology. However, by the rigidity of the analytic
structure, lattice cohomology can be naturally defined in higher codimensions
as well.
In this paper we show that in the case of irreducible plane curve
singularities the lattice cohomology is a complete embedded topological
invariant. We also compare it to the integral Seifert form in the case of
multiple branches.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 22:16:23 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Kubasch",
"Alexander A.",
""
],
[
"Schefler",
"Gergő",
""
]
] |
2504.13367 | Xiao Pu | Xiao Pu, Michael Saxon, Wenyue Hua, William Yang Wang | THOUGHTTERMINATOR: Benchmarking, Calibrating, and Mitigating
Overthinking in Reasoning Models | null | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Reasoning models have demonstrated impressive performance on difficult tasks
that traditional language models struggle at. However, many are plagued with
the problem of overthinking--generating large amounts of unnecessary tokens
which don't improve accuracy on a question. We introduce approximate measures
of problem-level difficulty and demonstrate that a clear relationship between
problem difficulty and optimal token spend exists, and evaluate how well
calibrated a variety of reasoning models are in terms of efficiently allocating
the optimal token count. We find that in general, reasoning models are poorly
calibrated, particularly on easy problems. To evaluate calibration on easy
questions we introduce DUMB500, a dataset of extremely easy math, reasoning,
code, and task problems, and jointly evaluate reasoning model on these simple
examples and extremely difficult examples from existing frontier benchmarks on
the same task domain. Finally, we introduce THOUGHTTERMINATOR, a training-free
black box decoding technique that significantly improves reasoning model
calibration.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 22:16:30 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Pu",
"Xiao",
""
],
[
"Saxon",
"Michael",
""
],
[
"Hua",
"Wenyue",
""
],
[
"Wang",
"William Yang",
""
]
] |
2504.13368 | Haoran Xu | Haoran Xu, Shuozhe Li, Harshit Sikchi, Scott Niekum, Amy Zhang | An Optimal Discriminator Weighted Imitation Perspective for
Reinforcement Learning | ICLR 2025 | null | null | null | cs.LG cs.AI | http://creativecommons.org/licenses/by/4.0/ | We introduce Iterative Dual Reinforcement Learning (IDRL), a new method that
takes an optimal discriminator-weighted imitation view of solving RL. Our
method is motivated by a simple experiment in which we find training a
discriminator using the offline dataset plus an additional expert dataset and
then performing discriminator-weighted behavior cloning gives strong results on
various types of datasets. That optimal discriminator weight is quite similar
to the learned visitation distribution ratio in Dual-RL, however, we find that
current Dual-RL methods do not correctly estimate that ratio. In IDRL, we
propose a correction method to iteratively approach the optimal visitation
distribution ratio in the offline dataset given no addtional expert dataset.
During each iteration, IDRL removes zero-weight suboptimal transitions using
the learned ratio from the previous iteration and runs Dual-RL on the remaining
subdataset. This can be seen as replacing the behavior visitation distribution
with the optimized visitation distribution from the previous iteration, which
theoretically gives a curriculum of improved visitation distribution ratios
that are closer to the optimal discriminator weight. We verify the
effectiveness of IDRL on various kinds of offline datasets, including D4RL
datasets and more realistic corrupted demonstrations. IDRL beats strong
Primal-RL and Dual-RL baselines in terms of both performance and stability, on
all datasets.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 22:21:35 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Xu",
"Haoran",
""
],
[
"Li",
"Shuozhe",
""
],
[
"Sikchi",
"Harshit",
""
],
[
"Niekum",
"Scott",
""
],
[
"Zhang",
"Amy",
""
]
] |
2504.13369 | Carlos Soares | Carlos C. Soares, Thiago J. A. Mori, Fanny B\'eron, Jagadeesh S.
Moodera, J\'ulio C. Cezar, Jeovani Brand\~ao, and Gilv\^ania Vilela | Compensation-Like Temperature and Spin-Flip Switch in Strained Thulium
Iron Garnet Thin Films: Tuning Sublattice Interactions for Ferrimagnetic
Spintronics | 23 pages, 4 figures, submitted to ACS Applied Nano Materials | null | null | null | cond-mat.mtrl-sci | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Certain rare-earth iron garnet (RIG) thin films combine desirable properties
such as low magnetic damping, high magnetostriction, and, in some cases,
perpendicular magnetic anisotropy (PMA), making them attractive for spintronics
applications. However, the interplay between their magnetic sublattices in
confined films remains poorly explored, particularly the coupling between 3d
and 4f electrons. Here, we investigate the magnetic properties of a 30 nm-thick
thulium iron garnet (TmIG) thin film, where tensile strain promotes PMA. SQUID
magnetometry and X-ray Magnetic Circular Dichroism measurements reveal a
magnetization minimum near 50 K under moderate magnetic fields, leading to a
compensation-like temperature (Tcomp-like), a feature absent in bulk TmIG. The
presence of Tcomp-like is particularly relevant for controlling magnetization
dynamics through compensation phenomena. Additionally, we observe a
field-induced spin-flip transition in the Tm sublattice, where Tm moments
reorient and align ferromagnetically concerning the Fe sublattices. This
mechanism can be exploited for energy-efficient magnetization reversal. These
findings provide new insights into strain-driven magnetic phenomena in
rare-earth iron garnet thin films, highlighting the interplay between exchange
interactions and anisotropy in confined geometries, which is crucial for the
development of spintronic and magnonic devices.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 22:25:29 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Soares",
"Carlos C.",
""
],
[
"Mori",
"Thiago J. A.",
""
],
[
"Béron",
"Fanny",
""
],
[
"Moodera",
"Jagadeesh S.",
""
],
[
"Cezar",
"Júlio C.",
""
],
[
"Brandão",
"Jeovani",
""
],
[
"Vilela",
"Gilvânia",
""
]
] |
2504.13370 | Zhenhua Yu | Xiao Jin, Bo Xiao, Huijiang Wang, Wendong Wang, Zhenhua Yu | Multi-Sensor Fusion-Based Mobile Manipulator Remote Control for
Intelligent Smart Home Assistance | null | null | null | null | cs.RO cs.HC | http://creativecommons.org/licenses/by-nc-nd/4.0/ | This paper proposes a wearable-controlled mobile manipulator system for
intelligent smart home assistance, integrating MEMS capacitive microphones, IMU
sensors, vibration motors, and pressure feedback to enhance human-robot
interaction. The wearable device captures forearm muscle activity and converts
it into real-time control signals for mobile manipulation. The wearable device
achieves an offline classification accuracy of 88.33\%\ across six distinct
movement-force classes for hand gestures by using a CNN-LSTM model, while
real-world experiments involving five participants yield a practical accuracy
of 83.33\%\ with an average system response time of 1.2 seconds. In Human-Robot
synergy in navigation and grasping tasks, the robot achieved a 98\%\ task
success rate with an average trajectory deviation of only 3.6 cm. Finally, the
wearable-controlled mobile manipulator system achieved a 93.3\%\ gripping
success rate, a transfer success of 95.6\%\, and a full-task success rate of
91.1\%\ during object grasping and transfer tests, in which a total of 9
object-texture combinations were evaluated. These three experiments' results
validate the effectiveness of MEMS-based wearable sensing combined with
multi-sensor fusion for reliable and intuitive control of assistive robots in
smart home scenarios.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 22:33:38 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Jin",
"Xiao",
""
],
[
"Xiao",
"Bo",
""
],
[
"Wang",
"Huijiang",
""
],
[
"Wang",
"Wendong",
""
],
[
"Yu",
"Zhenhua",
""
]
] |
2504.13371 | Andrew Lohn | Andrew J. Lohn | The Impact of AI on the Cyber Offense-Defense Balance and the Character
of Cyber Conflict | null | null | null | null | cs.CR cs.AI cs.CY | http://creativecommons.org/licenses/by/4.0/ | Unlike other domains of conflict, and unlike other fields with high
anticipated risk from AI, the cyber domain is intrinsically digital with a
tight feedback loop between AI training and cyber application. Cyber may have
some of the largest and earliest impacts from AI, so it is important to
understand how the cyber domain may change as AI continues to advance. Our
approach reviewed the literature, collecting nine arguments that have been
proposed for offensive advantage in cyber conflict and nine proposed arguments
for defensive advantage. We include an additional forty-eight arguments that
have been proposed to give cyber conflict and competition its character as
collected separately by Healey, Jervis, and Nandrajog. We then consider how
each of those arguments and propositions might change with varying degrees of
AI advancement. We find that the cyber domain is too multifaceted for a single
answer to whether AI will enhance offense or defense broadly. AI will improve
some aspects, hinder others, and leave some aspects unchanged. We collect and
present forty-four ways that we expect AI to impact the cyber offense-defense
balance and the character of cyber conflict and competition.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 22:40:14 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Lohn",
"Andrew J.",
""
]
] |
2504.13372 | Joshua Robbins | Joshua A. Robbins, Stephen J. Harnett, Andrew F. Thompson, Sean
Brennan, Herschel C. Pangborn | Integration of a Graph-Based Path Planner and Mixed-Integer MPC for
Robot Navigation in Cluttered Environments | null | null | null | null | eess.SY cs.RO cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The ability to update a path plan is a required capability for autonomous
mobile robots navigating through uncertain environments. This paper proposes a
re-planning strategy using a multilayer planning and control framework for
cases where the robot's environment is partially known. A medial axis
graph-based planner defines a global path plan based on known obstacles where
each edge in the graph corresponds to a unique corridor. A mixed-integer model
predictive control (MPC) method detects if a terminal constraint derived from
the global plan is infeasible, subject to a non-convex description of the local
environment. Infeasibility detection is used to trigger efficient global
re-planning via medial axis graph edge deletion. The proposed re-planning
strategy is demonstrated experimentally.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 22:42:03 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Robbins",
"Joshua A.",
""
],
[
"Harnett",
"Stephen J.",
""
],
[
"Thompson",
"Andrew F.",
""
],
[
"Brennan",
"Sean",
""
],
[
"Pangborn",
"Herschel C.",
""
]
] |
2504.13373 | Yulong Pan | Yulong Pan, Michael Lindsey and Per-Olof Persson | Geometric adaptive smoothed aggregation multigrid for discontinuous
Galerkin discretisations | null | null | null | null | math.NA cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a geometric multigrid solver based on adaptive smoothed
aggregation suitable for Discontinuous Galerkin (DG) discretisations. Mesh
hierarchies are formed via domain decomposition techniques, and the method is
applicable to fully unstructured meshes using arbitrary element shapes.
Furthermore, the method can be employed for a wide range of commonly used DG
numerical fluxes for first- and second-order PDEs including the Interior
Penalty and the Local Discontinuous Galerkin methods. We demonstrate excellent
and mesh-independent convergence for a range of problems including the Poisson
equation, and convection-diffusion for a range of P\'eclet numbers.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 22:50:33 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Pan",
"Yulong",
""
],
[
"Lindsey",
"Michael",
""
],
[
"Persson",
"Per-Olof",
""
]
] |
2504.13374 | Andreas Wagner | Andreas Wagner and Barbara Wohlmuth and Jan Zawallich | The generalized scalar auxiliary variable applied to the incompressible
Boussinesq Equation | null | null | null | null | math.NA cs.NA | http://creativecommons.org/licenses/by/4.0/ | This paper introduces a second-order time discretization for solving the
incompressible Boussinesq equation. It uses the generalized scalar auxiliary
variable (GSAV) and a backward differentiation formula (BDF), based on a Taylor
expansion around $t^{n+k}$ for $k\geq3$. An exponential time integrator is used
for the auxiliary variable to ensure stability independent of the time step
size. We give rigorous asymptotic error estimates of the time-stepping scheme,
thereby justifying its accuracy and stability. The scheme is reformulated into
one amenable to a $H^1$-conforming finite element discretization. Finally, we
validate our theoretical results with numerical experiments using a
Taylor--Hood-based finite element discretization and show its applicability to
large-scale 3-dimensional problems.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 22:55:09 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Wagner",
"Andreas",
""
],
[
"Wohlmuth",
"Barbara",
""
],
[
"Zawallich",
"Jan",
""
]
] |
2504.13375 | Nikhil Kumar | Nikhil Kumar | Pricing AI Model Accuracy | null | null | null | null | econ.TH cs.AI | http://creativecommons.org/licenses/by/4.0/ | This paper examines the market for AI models in which firms compete to
provide accurate model predictions and consumers exhibit heterogeneous
preferences for model accuracy. We develop a consumer-firm duopoly model to
analyze how competition affects firms' incentives to improve model accuracy.
Each firm aims to minimize its model's error, but this choice can often be
suboptimal. Counterintuitively, we find that in a competitive market, firms
that improve overall accuracy do not necessarily improve their profits. Rather,
each firm's optimal decision is to invest further on the error dimension where
it has a competitive advantage. By decomposing model errors into false positive
and false negative rates, firms can reduce errors in each dimension through
investments. Firms are strictly better off investing on their superior
dimension and strictly worse off with investments on their inferior dimension.
Profitable investments adversely affect consumers but increase overall welfare.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 23:09:04 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Kumar",
"Nikhil",
""
]
] |
2504.13376 | Eneko Osaba | Aitor G\'omez-Tejedor, Eneko Osaba and Esther Villar-Rodriguez | Addressing the Minor-Embedding Problem in Quantum Annealing and
Evaluating State-of-the-Art Algorithm Performance | Paper submitted for review in the Future Generation Computer Systems
journal | null | null | null | quant-ph cs.AI cs.ET | http://creativecommons.org/licenses/by/4.0/ | This study addresses the minor-embedding problem, which involves mapping the
variables of an Ising model onto a quantum annealing processor. The primary
motivation stems from the observed performance disparity of quantum annealers
when solving problems suited to the processor's architecture versus those with
non-hardware-native topologies. Our research has two main objectives: i) to
analyze the impact of embedding quality on the performance of D-Wave Systems
quantum annealers, and ii) to evaluate the quality of the embeddings generated
by Minorminer, an algorithm provided by D-Wave and widely recognized as the
standard minor-embedding technique in the literature. Regarding the first
objective, our experiments reveal a clear correlation between the average chain
length of embeddings and the relative errors of the solutions sampled. This
underscores the critical influence of embedding quality on quantum annealing
performance. For the second objective, we focus on the Minorminer technique,
assessing its capacity to embed problems, the quality of the embeddings
produced, and the robustness of the results. We also compare its performance
with Clique Embedding, another algorithm developed by D-Wave, which is
deterministic and designed to embed fully connected Ising models into quantum
annealing processors, serving as a worst-case scenario. The results demonstrate
that there is significant room for improvement for Minorminer, as it has not
consistently outperformed the worst-case scenario.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 23:13:14 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Gómez-Tejedor",
"Aitor",
""
],
[
"Osaba",
"Eneko",
""
],
[
"Villar-Rodriguez",
"Esther",
""
]
] |
2504.13377 | Andrea Banzatti Dr. | Sarah A. Smith, Carlos E. Romero-Mirza, Andrea Banzatti, Christian
Rab, Peter Abraham, Agnes Kospal, Rik Claes, Carlo F. Manara, Karin I. Oberg,
Jeroen Bouwman, Fernando Cruz-Saenz de Miera, and Joel D. Green | JWST's sharper view of EX Lup: cold water from ice sublimation during
accretion outbursts | Accepted for publication in ApJ Letters | null | null | null | astro-ph.EP astro-ph.SR | http://creativecommons.org/licenses/by/4.0/ | The unstable accretion phases during pre-main-sequence evolution of T Tauri
stars produce variable irradiation and heating of planet-forming regions. A
strong accretion outburst was observed with Spitzer-IRS in 2008 in EX Lup, the
prototype of EXor variables, and found to increase the mid-infrared water and
OH emission and decrease organic emission, suggesting large chemical changes.
We present here two JWST-MIRI epochs of quiescent EX Lup in 2022 and 2023
obtained over a decade after the 2008 outburst and several months after a
moderate burst in 2022. With JWST's sharper spectral view, we can now analyze
water emission as a function of temperature in the two MIRI epochs and,
approximately, also in the previous Spitzer epochs. This new analysis shows a
strong cold water vapor ``burst" in low-energy lines during the 2008 outburst,
which we consider clear evidence for enhanced ice sublimation due to a
recession of the snowline, as found in protostellar envelopes. JWST shows that
EX Lup still has an unusually strong emission from cold water in comparison to
other T Tauri disks, suggesting > 10-yr-long freeze-out timescales in the inner
disk surface. EX Lup demonstrates that outbursts can significantly change the
observed organic-to-water ratios and increase the cold water reservoir,
providing chemical signatures to study the recent accretion history of disks.
This study provides an unprecedented demonstration of the chemical evolution
triggered by accretion outbursts in the Class II phase and of the high
potential of time-domain experiments to reveal processes that may have
fundamental implications on planet-forming bodies near the snowline.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 23:16:30 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Smith",
"Sarah A.",
""
],
[
"Romero-Mirza",
"Carlos E.",
""
],
[
"Banzatti",
"Andrea",
""
],
[
"Rab",
"Christian",
""
],
[
"Abraham",
"Peter",
""
],
[
"Kospal",
"Agnes",
""
],
[
"Claes",
"Rik",
""
],
[
"Manara",
"Carlo F.",
""
],
[
"Oberg",
"Karin I.",
""
],
[
"Bouwman",
"Jeroen",
""
],
[
"de Miera",
"Fernando Cruz-Saenz",
""
],
[
"Green",
"Joel D.",
""
]
] |
2504.13378 | Shuchang Ye | Mingxiao Tu, Shuchang Ye, Hoijoon Jung, Jinman Kim | SMPL-GPTexture: Dual-View 3D Human Texture Estimation using
Text-to-Image Generation Models | null | null | null | null | cs.GR cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Generating high-quality, photorealistic textures for 3D human avatars remains
a fundamental yet challenging task in computer vision and multimedia field.
However, real paired front and back images of human subjects are rarely
available with privacy, ethical and cost of acquisition, which restricts
scalability of the data. Additionally, learning priors from image inputs using
deep generative models, such as GANs or diffusion models, to infer unseen
regions such as the human back often leads to artifacts, structural
inconsistencies, or loss of fine-grained detail. To address these issues, we
present SMPL-GPTexture (skinned multi-person linear model - general purpose
Texture), a novel pipeline that takes natural language prompts as input and
leverages a state-of-the-art text-to-image generation model to produce paired
high-resolution front and back images of a human subject as the starting point
for texture estimation. Using the generated paired dual-view images, we first
employ a human mesh recovery model to obtain a robust 2D-to-3D SMPL alignment
between image pixels and the 3D model's UV coordinates for each views. Second,
we use an inverted rasterization technique that explicitly projects the
observed colour from the input images into the UV space, thereby producing
accurate, complete texture maps. Finally, we apply a diffusion-based inpainting
module to fill in the missing regions, and the fusion mechanism then combines
these results into a unified full texture map. Extensive experiments shows that
our SMPL-GPTexture can generate high resolution texture aligned with user's
prompts.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 23:28:38 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Tu",
"Mingxiao",
""
],
[
"Ye",
"Shuchang",
""
],
[
"Jung",
"Hoijoon",
""
],
[
"Kim",
"Jinman",
""
]
] |
2504.13379 | Zachary Kilpatrick PhD | Sage B Shaw, Zachary P Kilpatrick, and Daniele Avitabile | Radial Basis Function Techniques for Neural Field Models on Surfaces | 25 pages, 8 figures | null | null | null | math.NA cs.NA nlin.PS q-bio.NC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a numerical framework for solving neural field equations on
surfaces using Radial Basis Function (RBF) interpolation and quadrature. Neural
field models describe the evolution of macroscopic brain activity, but modeling
studies often overlook the complex geometry of curved cortical domains.
Traditional numerical methods, such as finite element or spectral methods, can
be computationally expensive and challenging to implement on irregular domains.
In contrast, RBF-based methods provide a flexible alternative by offering
interpolation and quadrature schemes that efficiently handle arbitrary
geometries with high-order accuracy. We first develop an RBF-based
interpolatory projection framework for neural field models on general surfaces.
Quadrature for both flat and curved domains are derived in detail, ensuring
high-order accuracy and stability as they depend on RBF hyperparameters (basis
functions, augmenting polynomials, and stencil size). Through numerical
experiments, we demonstrate the convergence of our method, highlighting its
advantages over traditional approaches in terms of flexibility and accuracy. We
conclude with an exposition of numerical simulations of spatiotemporal activity
on complex surfaces, illustrating the method's ability to capture complex wave
propagation patterns.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 23:50:33 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Shaw",
"Sage B",
""
],
[
"Kilpatrick",
"Zachary P",
""
],
[
"Avitabile",
"Daniele",
""
]
] |
2504.13380 | Hao Wei | Jing-Yi Jia, Jia-Lei Niu, Da-Chun Qiang, Hao Wei | Alleviating the Hubble Tension with a Local Void and Transitions of the
Absolute Magnitude | 17 pages, 8 figures, 3 tables, revtex4 | null | null | null | astro-ph.CO gr-qc hep-th | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Nowadays, one of the well-known serious challenges in cosmology is the Hubble
tension, namely the discrepancy between the Hubble constants from the local
observation of Type Ia supernova (SNIa) and the high-$z$ observation of cosmic
microwave background (CMB). Here, we are interested in alleviating the Hubble
tension with a local void. The key idea is assuming that we live in a locally
underdense void, where one will feel a faster expansion rate compared to the
cosmic average. In the literature, it was found that a local void cannot
satisfyingly alleviate the Hubble tension, since it is not preferred over the
$\Lambda$CDM model by the observations such as the Pantheon SNIa sample,
especially in terms of the information criteria AIC and BIC. In the present
work, we try to alleviate the Hubble tension with a local void and transitions
of the absolute magnitude $M$, by using the Pantheon+ SNIa sample alone or
jointly with the CMB data of Planck 2018. We find that the Hubble tension can
be satisfyingly alleviated, while the $\Lambda$LTB void models are strongly
preferred by the observations.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 00:00:00 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Jia",
"Jing-Yi",
""
],
[
"Niu",
"Jia-Lei",
""
],
[
"Qiang",
"Da-Chun",
""
],
[
"Wei",
"Hao",
""
]
] |
2504.13381 | Hermann Tchatchiem Kamche | Hermann Tchatchiem Kamche | Improved Decoding Algorithm of BD-LRPC Codes | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A Bounded-Degree Low-Rank Parity-Check (BD-LRPC) code is a rank-metric code
that admits a parity-check matrix whose support is generated by a set of powers
of an element. This specific structure of the parity-check matrix was employed
to enhance the first phase of the decoding algorithm through the expansion of
the syndrome support. However, this expansion decreases the probability of
recovering the error support in the second phase of the decoding algorithm.
This paper introduces a novel method based on successive intersections to
recover the error support. This method offers two key advantages: it increases
the probability of successful decoding and enables the decoding of a greater
number of errors.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 00:00:55 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Kamche",
"Hermann Tchatchiem",
""
]
] |
2504.13382 | Jiankan Liao | Jiankan Liao, Xun Huan and Daniel Cooper | Intelligent data collection for network discrimination in material flow
analysis using Bayesian optimal experimental design | 21 pages for manuscript, 8 pages for supporting information and
bibliography, 8 figures | null | null | null | stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Material flow analyses (MFAs) are powerful tools for highlighting resource
efficiency opportunities in supply chains. MFAs are often represented as
directed graphs, with nodes denoting processes and edges representing mass
flows. However, network structure uncertainty -- uncertainty in the presence or
absence of flows between nodes -- is common and can compromise flow
predictions. While collection of more MFA data can reduce network structure
uncertainty, an intelligent data acquisition strategy is crucial to optimize
the resources (person-hours and money spent on collecting and purchasing data)
invested in constructing an MFA. In this study, we apply Bayesian optimal
experimental design (BOED), based on the Kullback-Leibler divergence, to
efficiently target high-utility MFA data -- data that minimizes network
structure uncertainty. We introduce a new method with reduced bias for
estimating expected utility, demonstrating its superior accuracy over
traditional approaches. We illustrate these advances with a case study on the
U.S. steel sector MFA, where the expected utility of collecting specific single
pieces of steel mass flow data aligns with the actual reduction in network
structure uncertainty achieved by collecting said data from the United States
Geological Survey and the World Steel Association. The results highlight that
the optimal MFA data to collect depends on the total amount of data being
gathered, making it sensitive to the scale of the data collection effort.
Overall, our methods support intelligent data acquisition strategies,
accelerating uncertainty reduction in MFAs and enhancing their utility for
impact quantification and informed decision-making.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 00:04:12 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Liao",
"Jiankan",
""
],
[
"Huan",
"Xun",
""
],
[
"Cooper",
"Daniel",
""
]
] |
2504.13383 | Mahnaz Jafarzadeh | Mahnaz Jafarzadeh, Jonathan Conrad, Rafael N. Alexander, and Ben Q.
Baragiola | Logical channels in approximate Gottesman-Kitaev-Preskill error
correction | 31 pages, 7 figures | null | null | null | quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The GKP encoding is a top contender among bosonic codes for fault-tolerant
quantum computation. Analysis of the GKP code is complicated by the fact that
finite-energy code states leak out of the ideal GKP code space and are not
orthogonal. We analyze a variant of the GKP stabilizer measurement circuit
using damped, approximate GKP states that virtually project onto the ideal GKP
code space between rounds of error correction even when finite-energy GKP
states are used. This allows us to identify logical maps between projectors;
however, due to finite-energy effects, these maps fail to resolve completely
positive, trace-preserving channels on the logical code space. We present two
solutions to this problem based on channel twirling the damping operator. The
first twirls over the full stabilizer group motivated by standard binning (SB)
decoding that converts small amounts of damping into Gaussian random noise. The
second twirls over a set of representative Pauli shifts that keeps the energy
in the code finite and allow for arbitrary decoding. This approach is not
limited to small damping, can be applied when logical GKP unitaries or other
sources of CV noise are present, and allows us to study general decoding, which
can be optimized to the noise in the circuit. Focusing on damping, we compare
decoding strategies tailored to different levels of effective squeezing. While
our results indicate that SB decoding is suboptimal for finite-energy GKP
states, the advantage of optimized decoding over SB decoding shrinks as the
energy in the code increases, and moreover the performance of both strategies
converges to that of the stabilizer-twirled logical channel. These studies
provide stronger arguments for commonplace procedures in the analysis of GKP
error correction:(i) using stochastically shifted GKP states in place of
coherently damped ones, and(ii) the use of SB decoding.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 00:13:42 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Jafarzadeh",
"Mahnaz",
""
],
[
"Conrad",
"Jonathan",
""
],
[
"Alexander",
"Rafael N.",
""
],
[
"Baragiola",
"Ben Q.",
""
]
] |
2504.13384 | Trevor Bowen | Trevor A. Bowen, Alfred Mallet, Corina I. Dunn, Jonathan Squire,
Benjamin D. G. Chandran, Romain Meyrand, Nooshin Davis, Thierry Dudok de Wit,
Stuart D. Bale, Samuel T. Badman, and Nikos Sioulas | Formation of Magnetic Switchbacks via expanding Alfv\'en Waves | null | null | null | null | astro-ph.SR physics.plasm-ph physics.space-ph | http://creativecommons.org/licenses/by/4.0/ | Context. Large-amplitude inversions of the solar wind's interplanetary
magnetic field have long been documented; however, observations from the Parker
Solar Probe (PSP) mission have renewed interest in this phenomenon as such
features, often termed switchbacks, may constrain both the sources of the solar
wind as well as in-situ nonlinear dynamics and turbulent heating. Aims. We aim
to show that magnetic field fluctuations in the solar wind are consistent with
Alfv\'enic fluctuations that naturally form switchback inversions in the
magnetic field through expansion effects. Methods. We examine PSP observations
of the evolution of a single stream of solar wind in a radial scan from PSP's
tenth perihelion encounter from approximately 15-50 solar radii. We study the
growth and radial scaling of normalized fluctuation amplitudes in the magnetic
field, $\delta B/B$, within the framework of spherical polarization. We compare
heating rates computed via outer-scale decay from consideration of wave-action
to proton heating rates empirically observed through considering adiabatic
expansion. Results. We find that the magnetic field fluctuations are largely
spherically polarized and that the normalized amplitudes of the magnetic field,
$\delta B/B$, increases with amplitude. The growth of the magnetic field
amplitude leads to switchback inversions in the magnetic field. While the
amplitudes do not grow as fast as predicted by the conservation of wave action,
the deviation from the expected scaling yields an effective heating rate, which
is close to the empirically observed proton heating rate. Conclusions. The
observed scaling of fluctuation amplitudes is largely consistent with a picture
of expanding Alfv\'en waves that seed turbulence leading to dissipation. The
expansion of the waves leads to the growth of wave-amplitudes, resulting in the
formation of switchbacks.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 00:17:56 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Bowen",
"Trevor A.",
""
],
[
"Mallet",
"Alfred",
""
],
[
"Dunn",
"Corina I.",
""
],
[
"Squire",
"Jonathan",
""
],
[
"Chandran",
"Benjamin D. G.",
""
],
[
"Meyrand",
"Romain",
""
],
[
"Davis",
"Nooshin",
""
],
[
"de Wit",
"Thierry Dudok",
""
],
[
"Bale",
"Stuart D.",
""
],
[
"Badman",
"Samuel T.",
""
],
[
"Sioulas",
"Nikos",
""
]
] |
2504.13385 | Tianhong Xu | Tianhong Xu, Aidong Adam Ding and Yunsi Fei | EXAM: Exploiting Exclusive System-Level Cache in Apple M-Series SoCs for
Enhanced Cache Occupancy Attacks | Accepted to ACM ASIA CCS 2025 | null | null | null | cs.CR cs.AR | http://creativecommons.org/licenses/by/4.0/ | Cache occupancy attacks exploit the shared nature of cache hierarchies to
infer a victim's activities by monitoring overall cache usage, unlike
access-driven cache attacks that focus on specific cache lines or sets. There
exists some prior work that target the last-level cache (LLC) of Intel
processors, which is inclusive of higher-level caches, and L2 caches of ARM
systems. In this paper, we target the System-Level Cache (SLC) of Apple
M-series SoCs, which is exclusive to higher-level CPU caches. We address the
challenges of the exclusiveness and propose a suite of SLC-cache occupancy
attacks, the first of its kind, where an adversary can monitor GPU and other
CPU cluster activities from their own CPU cluster. We first discover the
structure of SLC in Apple M1 SOC and various policies pertaining to access and
sharing through reverse engineering. We propose two attacks against websites.
One is a coarse-grained fingerprinting attack, recognizing which website is
accessed based on their different GPU memory access patterns monitored through
the SLC occupancy channel. The other attack is a fine-grained pixel stealing
attack, which precisely monitors the GPU memory usage for rendering different
pixels, through the SLC occupancy channel. Third, we introduce a novel screen
capturing attack which works beyond webpages, with the monitoring granularity
of 57 rows of pixels (there are 1600 rows for the screen). This significantly
expands the attack surface, allowing the adversary to retrieve any screen
display, posing a substantial new threat to system security. Our findings
reveal critical vulnerabilities in Apple's M-series SoCs and emphasize the
urgent need for effective countermeasures against cache occupancy attacks in
heterogeneous computing environments.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 00:21:00 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Xu",
"Tianhong",
""
],
[
"Ding",
"Aidong Adam",
""
],
[
"Fei",
"Yunsi",
""
]
] |
2504.13386 | Radek Dan\v{e}\v{c}ek | Radek Dan\v{e}\v{c}ek, Carolin Schmitt, Senya Polikovsky, Michael J.
Black | Supervising 3D Talking Head Avatars with Analysis-by-Audio-Synthesis | null | null | null | null | cs.GR cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In order to be widely applicable, speech-driven 3D head avatars must
articulate their lips in accordance with speech, while also conveying the
appropriate emotions with dynamically changing facial expressions. The key
problem is that deterministic models produce high-quality lip-sync but without
rich expressions, whereas stochastic models generate diverse expressions but
with lower lip-sync quality. To get the best of both, we seek a stochastic
model with accurate lip-sync. To that end, we develop a new approach based on
the following observation: if a method generates realistic 3D lip motions, it
should be possible to infer the spoken audio from the lip motion. The inferred
speech should match the original input audio, and erroneous predictions create
a novel supervision signal for training 3D talking head avatars with accurate
lip-sync. To demonstrate this effect, we propose THUNDER (Talking Heads Under
Neural Differentiable Elocution Reconstruction), a 3D talking head avatar
framework that introduces a novel supervision mechanism via differentiable
sound production. First, we train a novel mesh-to-speech model that regresses
audio from facial animation. Then, we incorporate this model into a
diffusion-based talking avatar framework. During training, the mesh-to-speech
model takes the generated animation and produces a sound that is compared to
the input speech, creating a differentiable analysis-by-audio-synthesis
supervision loop. Our extensive qualitative and quantitative experiments
demonstrate that THUNDER significantly improves the quality of the lip-sync of
talking head avatars while still allowing for generation of diverse,
high-quality, expressive facial animations.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 00:24:52 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Daněček",
"Radek",
""
],
[
"Schmitt",
"Carolin",
""
],
[
"Polikovsky",
"Senya",
""
],
[
"Black",
"Michael J.",
""
]
] |
2504.13387 | Lingfeng Bao | Lingfeng Bao, Jiameng Yang, Xiaohu Yang, Chunming Rong | Bibliometric Analysis of Scientific Publications on Blockchain Research
and Applications | null | null | null | null | cs.DL cs.DC | http://creativecommons.org/licenses/by/4.0/ | Since the introduction of Bitcoin in 2008, blockchain technology has garnered
widespread attention. Scholars from various research fields, countries, and
institutions have published a significant number of papers on this subject.
However, there is currently a lack of comprehensive analysis specifically
focusing on the scientific publications in the field of blockchain.
To conduct a comprehensive analysis, we compiled a corpus of 41,497
publications in blockchain research from 2008 to 2023 using the Clarivate
databases. Through bibliometric and citation analyses, we gained valuable
insights into the field. Our study offers an overview of the blockchain
research landscape, including country, institution, authorship, and subject
categories. Additionally, we identified Emerging Research Areas (ERA) using the
co-citation clustering approach, examining factors such as recency, growth, and
contributions from different countries/regions. Furthermore, we identified
influential publications based on citation velocity and analyzed five
representative Research Fronts in detail. This analysis provides a fine-grained
examination of specific areas within blockchain research. Our findings
contribute to understanding evolving trends, emerging applications, and
potential directions for future research in the multidisciplinary field of
blockchain.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 00:29:13 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Bao",
"Lingfeng",
""
],
[
"Yang",
"Jiameng",
""
],
[
"Yang",
"Xiaohu",
""
],
[
"Rong",
"Chunming",
""
]
] |
2504.13388 | Yegor Klochkov | Yegor Klochkov | A mean teacher algorithm for unlearning of language models | null | null | null | null | cs.LG cs.CL | http://creativecommons.org/licenses/by/4.0/ | One of the goals of language model unlearning is to reduce memorization of
selected text instances while retaining the model's general abilities. Despite
various proposed methods, reducing memorization of large datasets without
noticeable degradation in model utility remains challenging. In this paper, we
investigate the mean teacher algorithm (Tarvainen & Valpola, 2017), a simple
proximal optimization method from continual learning literature that gradually
modifies the teacher model. We show that the mean teacher can approximate a
trajectory of a slow natural gradient descent (NGD), which inherently seeks
low-curvature updates that are less likely to degrade the model utility. While
slow NGD can suffer from vanishing gradients, we introduce a new unlearning
loss called "negative log-unlikelihood" (NLUL) that avoids this problem. We
show that the combination of mean teacher and NLUL improves some metrics on the
MUSE benchmarks (Shi et al., 2024).
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 00:34:19 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Klochkov",
"Yegor",
""
]
] |
2504.13389 | Jamie Lee | Jamie Lee, Kyuha Jung, Erin Gregg Newman, Emilie Chow, and Yunan Chen | Understanding Adolescents' Perceptions of Benefits and Risks in Health
AI Technologies through Design Fiction | null | null | null | null | cs.HC cs.CY | http://creativecommons.org/licenses/by/4.0/ | Despite the growing research on users' perceptions of health AI, adolescents'
perspectives remain underexplored. This study explores adolescents' perceived
benefits and risks of health AI technologies in clinical and personal health
settings. Employing Design Fiction, we conducted interviews with 16 adolescents
(aged 13-17) using four fictional design scenarios that represent current and
future health AI technologies as probes. Our findings reveal that with a
positive yet cautious attitude, adolescents envision unique benefits and risks
specific to their age group. While health AI technologies were seen as valuable
learning resources, they also raised concerns about confidentiality with their
parents. Additionally, we identified several factors, such as severity of
health conditions and previous experience with AI, influencing their
perceptions of trust and privacy in health AI. We explore how these insights
can inform the future of design of health AI technologies to support learning,
engagement, and trust as adolescents navigate their healthcare journey.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 00:41:11 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Lee",
"Jamie",
""
],
[
"Jung",
"Kyuha",
""
],
[
"Newman",
"Erin Gregg",
""
],
[
"Chow",
"Emilie",
""
],
[
"Chen",
"Yunan",
""
]
] |
2504.13390 | Mahrokh Najaf | Mahrokh Najaf, Gregory Ongie | Accelerated Optimization of Implicit Neural Representations for CT
Reconstruction | IEEE ISBI 2025 | null | null | null | eess.IV cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Inspired by their success in solving challenging inverse problems in computer
vision, implicit neural representations (INRs) have been recently proposed for
reconstruction in low-dose/sparse-view X-ray computed tomography (CT). An INR
represents a CT image as a small-scale neural network that takes spatial
coordinates as inputs and outputs attenuation values. Fitting an INR to
sinogram data is similar to classical model-based iterative reconstruction
methods. However, training INRs with losses and gradient-based algorithms can
be prohibitively slow, taking many thousands of iterations to converge. This
paper investigates strategies to accelerate the optimization of INRs for CT
reconstruction. In particular, we propose two approaches: (1) using a modified
loss function with improved conditioning, and (2) an algorithm based on the
alternating direction method of multipliers. We illustrate that both of these
approaches significantly accelerate INR-based reconstruction of a synthetic
breast CT phantom in a sparse-view setting.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 00:52:56 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Najaf",
"Mahrokh",
""
],
[
"Ongie",
"Gregory",
""
]
] |
2504.13391 | Racheal Mukisa | Racheal Mukisa and Arvind K. Bansal | Cardiac MRI Semantic Segmentation for Ventricles and Myocardium using
Deep Learning | 20 pages, 8 figures | null | null | null | eess.IV cs.AI cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Automated noninvasive cardiac diagnosis plays a critical role in the early
detection of cardiac disorders and cost-effective clinical management.
Automated diagnosis involves the automated segmentation and analysis of cardiac
images. Precise delineation of cardiac substructures and extraction of their
morphological attributes are essential for evaluating the cardiac function, and
diagnosing cardiovascular disease such as cardiomyopathy, valvular diseases,
abnormalities related to septum perforations, and blood-flow rate. Semantic
segmentation labels the CMR image at the pixel level, and localizes its
subcomponents to facilitate the detection of abnormalities, including
abnormalities in cardiac wall motion in an aging heart with muscle
abnormalities, vascular abnormalities, and valvular abnormalities. In this
paper, we describe a model to improve semantic segmentation of CMR images. The
model extracts edge-attributes and context information during down-sampling of
the U-Net and infuses this information during up-sampling to localize three
major cardiac structures: left ventricle cavity (LV); right ventricle cavity
(RV); and LV myocardium (LMyo). We present an algorithm and performance
results. A comparison of our model with previous leading models, using
similarity metrics between actual image and segmented image, shows that our
approach improves Dice similarity coefficient (DSC) by 2%-11% and lowers
Hausdorff distance (HD) by 1.6 to 5.7 mm.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 00:54:30 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Mukisa",
"Racheal",
""
],
[
"Bansal",
"Arvind K.",
""
]
] |
2504.13392 | Evans Xu Han | Evans Xu Han, Alice Qian Zhang, Hong Shen, Haiyi Zhu, Paul Pu Liang,
Jane Hsieh | POET: Supporting Prompting Creativity and Personalization with Automated
Expansion of Text-to-Image Generation | null | null | null | null | cs.CV cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | State-of-the-art visual generative AI tools hold immense potential to assist
users in the early ideation stages of creative tasks -- offering the ability to
generate (rather than search for) novel and unprecedented (instead of existing)
images of considerable quality that also adhere to boundless combinations of
user specifications. However, many large-scale text-to-image systems are
designed for broad applicability, yielding conventional output that may limit
creative exploration. They also employ interaction methods that may be
difficult for beginners. Given that creative end users often operate in
diverse, context-specific ways that are often unpredictable, more variation and
personalization are necessary. We introduce POET, a real-time interactive tool
that (1) automatically discovers dimensions of homogeneity in text-to-image
generative models, (2) expands these dimensions to diversify the output space
of generated images, and (3) learns from user feedback to personalize
expansions. An evaluation with 28 users spanning four creative task domains
demonstrated POET's ability to generate results with higher perceived diversity
and help users reach satisfaction in fewer prompts during creative tasks,
thereby prompting them to deliberate and reflect more on a wider range of
possible produced results during the co-creative process. Focusing on visual
creativity, POET offers a first glimpse of how interaction techniques of future
text-to-image generation tools may support and align with more pluralistic
values and the needs of end users during the ideation stages of their work.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 00:54:36 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Han",
"Evans Xu",
""
],
[
"Zhang",
"Alice Qian",
""
],
[
"Shen",
"Hong",
""
],
[
"Zhu",
"Haiyi",
""
],
[
"Liang",
"Paul Pu",
""
],
[
"Hsieh",
"Jane",
""
]
] |
2504.13393 | S M Rayeed | S M Rayeed, Alyson East, Samuel Stevens, Sydne Record, Charles V
Stewart | BeetleVerse: A study on taxonomic classification of ground beetles | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Ground beetles are a highly sensitive and speciose biological indicator,
making them vital for monitoring biodiversity. However, they are currently an
underutilized resource due to the manual effort required by taxonomic experts
to perform challenging species differentiations based on subtle morphological
differences, precluding widespread applications. In this paper, we evaluate 12
vision models on taxonomic classification across four diverse, long-tailed
datasets spanning over 230 genera and 1769 species, with images ranging from
controlled laboratory settings to challenging field-collected (in-situ)
photographs. We further explore taxonomic classification in two important
real-world contexts: sample efficiency and domain adaptation. Our results show
that the Vision and Language Transformer combined with an MLP head is the best
performing model, with 97\% accuracy at genus and 94\% at species level. Sample
efficiency analysis shows that we can reduce train data requirements by up to
50\% with minimal compromise in performance. The domain adaptation experiments
reveal significant challenges when transferring models from lab to in-situ
images, highlighting a critical domain gap. Overall, our study lays a
foundation for large-scale automated taxonomic classification of beetles, and
beyond that, advances sample-efficient learning and cross-domain adaptation for
diverse long-tailed ecological datasets.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 01:06:37 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Rayeed",
"S M",
""
],
[
"East",
"Alyson",
""
],
[
"Stevens",
"Samuel",
""
],
[
"Record",
"Sydne",
""
],
[
"Stewart",
"Charles V",
""
]
] |
2504.13394 | Bo Zhou | Bo Zhou, Kaijie Xu, Yinghui Quan and Mengdao Xing | A Deep Learning-Based Supervised Transfer Learning Framework for DOA
Estimation with Array Imperfections | null | null | null | null | eess.SP | http://creativecommons.org/licenses/by/4.0/ | In practical scenarios, processes such as sensor design, manufacturing, and
installation will introduce certain errors. Furthermore, mutual interference
occurs when the sensors receive signals. These defects in array systems are
referred to as array imperfections, which can significantly degrade the
performance of Direction of Arrival (DOA) estimation. In this study, we propose
a deep-learning based transfer learning approach, which effectively mitigates
the degradation of deep-learning based DOA estimation performance caused by
array imperfections.
In the proposed approach, we highlight three major contributions. First, we
propose a Vision Transformer (ViT) based method for DOA estimation, which
achieves excellent performance in scenarios with low signal-to-noise ratios
(SNR) and limited snapshots. Second, we introduce a transfer learning framework
that extends deep learning models from ideal simulation scenarios to complex
real-world scenarios with array imperfections. By leveraging prior knowledge
from ideal simulation data, the proposed transfer learning framework
significantly improves deep learning-based DOA estimation performance in the
presence of array imperfections, without the need for extensive real-world
data. Finally, we incorporate visualization and evaluation metrics to assess
the performance of DOA estimation algorithms, which allow for a more thorough
evaluation of algorithms and further validate the proposed method. Our code can
be accessed at https://github.com/zzb-nice/DOA_est_Master.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 01:09:38 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Zhou",
"Bo",
""
],
[
"Xu",
"Kaijie",
""
],
[
"Quan",
"Yinghui",
""
],
[
"Xing",
"Mengdao",
""
]
] |
2504.13395 | Doris Stoppacher | D. Stoppacher, P. Tissera, Y. Rosas-Guevara, G. Galaz, and J. O\~norbe | Hidden Figures in the Sky: Evolution of low-surface brightness galaxies
from a hydro-dynamical perspective | 18 pages, submitted to A&A | null | null | null | astro-ph.GA | http://creativecommons.org/licenses/by/4.0/ | Low-surface brightness galaxies (LSBGs) are defined as galaxies with central
surface brightness levels fainter than the night sky, making them challenging
to observe. A key open question is whether their faint appearance arises from
intrinsic properties or stochastic events in their formation histories. We aim
to trace the formation histories of LSBGs to assess whether their evolutionary
paths differ from those of high-surface brightness galaxies (HSBGs), and to
identify the key physical drivers behind these differences. We present a fast
and efficient method to estimate stellar surface brightness densities in
hydro-dynamical simulations and a statistically robust exploration of over 150
properties in the reference run \textsc{Ref-L0100N1504} of the \texttt{EAGLE}
simulation. To minimise biases, we carefully match the stellar and halo mass
distributions of the selected LSB and HSB samples. At $z=0$, LSBGs are
typically extended, rotation-supported systems with lower stellar densities,
older stellar populations, reduced star formation activity, and higher specific
stellar angular momenta $j_*$ than their HSBG counterparts. They also exhibit
larger radii of maximum circular velocity ($R_{\mathrm{Vmax}}$). We identify
key transition redshifts that mark the divergence of LSBG and HSBG properties:
$j_*$ diverges at $z\sim5-7$ and $R_{\mathrm{Vmax}}$ at $z\sim2-3$. Star
formation activity and large-scale environment seem to play only a minimal role
in the development of LSB features. LSBGs follow mass-dependent evolutionary
pathways, where early rapid formation and later slowdowns, combined with their
distinct structural properties, influence their response to external factors
like mergers and gas accretion. Their LSB nature emerges from intrinsic
dynamical and structural factors rather than environmental influences, with
angular momentum as a key driver of divergence at high redshifts.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 01:11:14 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Stoppacher",
"D.",
""
],
[
"Tissera",
"P.",
""
],
[
"Rosas-Guevara",
"Y.",
""
],
[
"Galaz",
"G.",
""
],
[
"Oñorbe",
"J.",
""
]
] |
2504.13396 | Jianyu Hu | Jianyu Hu, Juan-Pablo Ortega, and Daiying Yin | A global structure-preserving kernel method for the learning of Poisson
systems | null | null | null | null | math.NA cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A structure-preserving kernel ridge regression method is presented that
allows the recovery of globally defined, potentially high-dimensional, and
nonlinear Hamiltonian functions on Poisson manifolds out of datasets made of
noisy observations of Hamiltonian vector fields. The proposed method is based
on finding the solution of a non-standard kernel ridge regression where the
observed data is generated as the noisy image by a vector bundle map of the
differential of the function that one is trying to estimate. Additionally, it
is shown how a suitable regularization solves the intrinsic non-identifiability
of the learning problem due to the degeneracy of the Poisson tensor and the
presence of Casimir functions. A full error analysis is conducted that provides
convergence rates using fixed and adaptive regularization parameters. The good
performance of the proposed estimator is illustrated with several numerical
experiments.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 01:12:08 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Hu",
"Jianyu",
""
],
[
"Ortega",
"Juan-Pablo",
""
],
[
"Yin",
"Daiying",
""
]
] |
2504.13397 | Junyu Liu | Yu Gan, Mohadeseh Azar, Nitish Kumar Chandra, Xin Jin, Jinglei Cheng,
Kaushik P. Seshadreesan, Junyu Liu | Quantum repeaters enhanced by vacuum beam guides | 10 pages | null | null | null | quant-ph cs.DC cs.LG cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The development of large-scale quantum communication networks faces critical
challenges due to photon loss and decoherence in optical fiber channels. These
fundamentally limit transmission distances and demand dense networks of
repeater stations. This work investigates using vacuum beam guides (VBGs)-a
promising ultra-low-loss transmission platform-as an alternative to traditional
fiber links. By incorporating VBGs into repeater-based architectures, we
demonstrate that the inter-repeater spacing can be substantially extended,
resulting in fewer required nodes and significantly reducing hardware and
operational complexity. We perform a cost-function analysis to quantify
performance trade-offs across first, second, and third-generation repeaters.
Our results show that first-generation repeaters reduce costs dramatically by
eliminating entanglement purification. Third-generation repeaters benefit from
improved link transmission success, which is crucial for quantum error
correction. In contrast, second-generation repeaters exhibit a more nuanced
response; although transmission loss is reduced, their performance remains
primarily limited by logical gate errors rather than channel loss. These
findings highlight that while all repeater generations benefit from reduced
photon loss, the magnitude of improvement depends critically on the underlying
error mechanisms. Vacuum beam guides thus emerge as a powerful enabler for
scalable, high-performance quantum networks, particularly in conjunction with
near-term quantum hardware capabilities.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 01:19:12 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Gan",
"Yu",
""
],
[
"Azar",
"Mohadeseh",
""
],
[
"Chandra",
"Nitish Kumar",
""
],
[
"Jin",
"Xin",
""
],
[
"Cheng",
"Jinglei",
""
],
[
"Seshadreesan",
"Kaushik P.",
""
],
[
"Liu",
"Junyu",
""
]
] |
2504.13398 | Sen Yang | Sen Yang, Kaihua Qin, Aviv Yaish, Fan Zhang | Insecurity Through Obscurity: Veiled Vulnerabilities in Closed-Source
Contracts | null | null | null | null | cs.CR | http://creativecommons.org/licenses/by/4.0/ | Most blockchains cannot hide the binary code of programs (i.e., smart
contracts) running on them. To conceal proprietary business logic and to
potentially deter attacks, many smart contracts are closed-source and employ
layers of obfuscation. However, we demonstrate that such obfuscation can
obscure critical vulnerabilities rather than enhance security, a phenomenon we
term insecurity through obscurity. To systematically analyze these risks on a
large scale, we present SKANF, a novel EVM bytecode analysis tool tailored for
closed-source and obfuscated contracts. SKANF combines control-flow
deobfuscation, symbolic execution, and concolic execution based on historical
transactions to identify and exploit asset management vulnerabilities. Our
evaluation on real-world Maximal Extractable Value (MEV) bots reveals that
SKANF detects vulnerabilities in 1,028 contracts and successfully generates
exploits for 373 of them, with potential losses exceeding \$9.0M. Additionally,
we uncover 40 real-world MEV bot attacks that collectively resulted in \$900K
in losses.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 01:22:58 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Yang",
"Sen",
""
],
[
"Qin",
"Kaihua",
""
],
[
"Yaish",
"Aviv",
""
],
[
"Zhang",
"Fan",
""
]
] |
2504.13399 | Shashank Shriram | Shashank Shriram, Srinivasa Perisetla, Aryan Keskar, Harsha
Krishnaswamy, Tonko Emil Westerhof Bossen, Andreas M{\o}gelmose, Ross Greer | Towards a Multi-Agent Vision-Language System for Zero-Shot Novel
Hazardous Object Detection for Autonomous Driving Safety | null | null | null | null | cs.CV cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Detecting anomalous hazards in visual data, particularly in video streams, is
a critical challenge in autonomous driving. Existing models often struggle with
unpredictable, out-of-label hazards due to their reliance on predefined object
categories. In this paper, we propose a multimodal approach that integrates
vision-language reasoning with zero-shot object detection to improve hazard
identification and explanation. Our pipeline consists of a Vision-Language
Model (VLM), a Large Language Model (LLM), in order to detect hazardous objects
within a traffic scene. We refine object detection by incorporating OpenAI's
CLIP model to match predicted hazards with bounding box annotations, improving
localization accuracy. To assess model performance, we create a ground truth
dataset by denoising and extending the foundational COOOL
(Challenge-of-Out-of-Label) anomaly detection benchmark dataset with complete
natural language descriptions for hazard annotations. We define a means of
hazard detection and labeling evaluation on the extended dataset using cosine
similarity. This evaluation considers the semantic similarity between the
predicted hazard description and the annotated ground truth for each video.
Additionally, we release a set of tools for structuring and managing
large-scale hazard detection datasets. Our findings highlight the strengths and
limitations of current vision-language-based approaches, offering insights into
future improvements in autonomous hazard detection systems. Our models,
scripts, and data can be found at https://github.com/mi3labucm/COOOLER.git
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 01:25:02 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Shriram",
"Shashank",
""
],
[
"Perisetla",
"Srinivasa",
""
],
[
"Keskar",
"Aryan",
""
],
[
"Krishnaswamy",
"Harsha",
""
],
[
"Bossen",
"Tonko Emil Westerhof",
""
],
[
"Møgelmose",
"Andreas",
""
],
[
"Greer",
"Ross",
""
]
] |
2504.13400 | Tabish Qureshi | Suvrajyoti Chatterjee, Saba Firoze, Tabish Qureshi | Diffusion Limited Aggregation in Ants Biting off Wall Paint | 4 pages | null | null | null | nlin.PS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Diffusion limited aggregation (DLA) is a well studied phenomenon in which
diffusing particles cumulatively aggregate on a starting fixed seed point,
forming a pattern which is fractal in structure. Here we report an interesting
DLA process arising from ants biting off wall paint. The structures arising
from this long process are analyzed and found to have a fractional dimension
between 1 and 2. The DLA formations observed in nature are mostly a result of
various kinds of inanimate particles diffusing and aggregating. What makes the
present observation interesting is that it involves live beings which may be
guided by sight, smell etc. A simple theoretical model of the process is
simulated, and the results agree well with the experimental observations.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 01:32:45 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Chatterjee",
"Suvrajyoti",
""
],
[
"Firoze",
"Saba",
""
],
[
"Qureshi",
"Tabish",
""
]
] |
2504.13401 | Er-Jia Guo | Ting Cui, Ying Zhou, Qianying Wang, Dongke Rong, Haitao Hong, Axin
Xie, Jun-Jie Zhang, Qinghua Zhang, Can Wang, Chen Ge, Lin Gu, Shanmin Wang,
Kuijuan Jin, Shuai Dong, and Er-Jia Guo | Charge transfer induced insulating state at antiperovskite/perovskite
heterointerfaces | 15 pages; 4 figures | null | null | null | cond-mat.mtrl-sci | http://creativecommons.org/licenses/by/4.0/ | Heterointerfaces have been pivotal in unveiling extraordinary interfacial
properties and enabling multifunctional material platforms. Despite extensive
research on all-oxide interfaces, heterointerfaces between different material
classes, such as oxides and nitrides, remain underexplored. Here we present the
fabrication of a high-quality Dirac metal antiperovskite Ni3InN, characterized
by an extremely low temperature coefficient of resistivity, approximately
1.8*10^-8 {\Omega}*cm/K, over a broad temperature range. Atomically sharp
heterointerfaces between Ni3InN and SrVO3 were constructed, revealing
intriguing interfacial phenomena. Leveraging layer-resolved scanning
transmission electron microscopy and electron energy loss spectroscopy, we
identified pronounced charge transfer across the well-ordered interface.
Remarkably, this interfacial electron transfer from Ni3InN to SrVO3 induces an
insulating interfacial layer and an emergent magnetic moment within the Ni3InN
layer, consistent with first-principles calculations. These findings pave the
way for novel electronic and spintronic applications by enabling tunable
interfacial properties in nitride/oxide systems.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 01:36:35 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Cui",
"Ting",
""
],
[
"Zhou",
"Ying",
""
],
[
"Wang",
"Qianying",
""
],
[
"Rong",
"Dongke",
""
],
[
"Hong",
"Haitao",
""
],
[
"Xie",
"Axin",
""
],
[
"Zhang",
"Jun-Jie",
""
],
[
"Zhang",
"Qinghua",
""
],
[
"Wang",
"Can",
""
],
[
"Ge",
"Chen",
""
],
[
"Gu",
"Lin",
""
],
[
"Wang",
"Shanmin",
""
],
[
"Jin",
"Kuijuan",
""
],
[
"Dong",
"Shuai",
""
],
[
"Guo",
"Er-Jia",
""
]
] |
2504.13402 | Vedrana Ivezic | Vedrana Ivezi\'c, Ashwath Radhachandran, Ekaterina Redekop, Shreeram
Athreya, Dongwoo Lee, Vivek Sant, Corey Arnold, William Speier | CytoFM: The first cytology foundation model | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Cytology is essential for cancer diagnostics and screening due to its
minimally invasive nature. However, the development of robust deep learning
models for digital cytology is challenging due to the heterogeneity in staining
and preparation methods of samples, differences across organs, and the limited
availability of large, diverse, annotated datasets. Developing a task-specific
model for every cytology application is impractical and non-cytology-specific
foundation models struggle to generalize to tasks in this domain where the
emphasis is on cell morphology. To address these challenges, we introduce
CytoFM, the first cytology self-supervised foundation model. Using iBOT, a
self-supervised Vision Transformer (ViT) training framework incorporating
masked image modeling and self-distillation, we pretrain CytoFM on a diverse
collection of cytology datasets to learn robust, transferable representations.
We evaluate CytoFM on multiple downstream cytology tasks, including breast
cancer classification and cell type identification, using an attention-based
multiple instance learning framework. Our results demonstrate that CytoFM
performs better on two out of three downstream tasks than existing foundation
models pretrained on histopathology (UNI) or natural images (iBOT-Imagenet).
Visualizations of learned representations demonstrate our model is able to
attend to cytologically relevant features. Despite a small pre-training
dataset, CytoFM's promising results highlight the ability of task-agnostic
pre-training approaches to learn robust and generalizable features from
cytology data.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 01:37:50 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Ivezić",
"Vedrana",
""
],
[
"Radhachandran",
"Ashwath",
""
],
[
"Redekop",
"Ekaterina",
""
],
[
"Athreya",
"Shreeram",
""
],
[
"Lee",
"Dongwoo",
""
],
[
"Sant",
"Vivek",
""
],
[
"Arnold",
"Corey",
""
],
[
"Speier",
"William",
""
]
] |
2504.13403 | Yeongjun Jang | Yeongjun Jang, Joowon Lee, and Junsoo Kim | Documentation on Encrypted Dynamic Control Simulation Code using
Ring-LWE based Cryptosystems | 6 pages | Journal of The Society of Instrument and Control Engineers, vol.
64, no. 4, pp. 248-254, 2025 | 10.11499/sicejl.64.248 | null | eess.SY cs.SY | http://creativecommons.org/licenses/by/4.0/ | Encrypted controllers offer secure computation by employing modern
cryptosystems to execute control operations directly over encrypted data
without decryption. However, incorporating cryptosystems into dynamic
controllers significantly increases the computational load. This paper aims to
provide an accessible guideline for running encrypted controllers using an
open-source library Lattigo, which supports an efficient implementation of
Ring-Learing With Errors (LWE) based encrypted controllers, and our
explanations are assisted with example codes that are fully available at
https://github.com/CDSL-EncryptedControl/CDSL.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 01:47:48 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Jang",
"Yeongjun",
""
],
[
"Lee",
"Joowon",
""
],
[
"Kim",
"Junsoo",
""
]
] |
2504.13404 | Rui Shang | Rui Shang, Bingjie Huang | Design Priorities in Digital Gateways: A Comparative Study of
Authentication and Usability in Academic Library Alliances | null | null | null | null | cs.HC cs.DL | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Purpose: This study examines the design and functionality of university
library login pages across academic alliances (IVY Plus, BTAA, JULAC, JVU) to
identify how these interfaces align with institutional priorities and user
needs. It explores consensus features, design variations, and emerging trends
in authentication, usability, and security.
Methodology: A multi-method approach was employed: screenshots and HTML files
from 46 institutions were analyzed through categorization, statistical
analysis, and comparative evaluation. Features were grouped into authentication
mechanisms, usability, security/compliance, and library-specific elements.
Findings: Core functionalities (e.g., ID/password, privacy policies) were
consistent across alliances. Divergences emerged in feature emphasis: mature
alliances (e.g., BTAA) prioritized resource accessibility with streamlined
interfaces, while emerging consortia (e.g., JVU) emphasized cybersecurity (IP
restrictions, third-party integrations). Usability features, particularly
multilingual support, drove cross-alliance differences. The results highlighted
regional and institutional influences, with older alliances favoring simplicity
and newer ones adopting security-centric designs.
Originality/Value: This is the first systematic comparison of login page
designs across academic alliances, offering insights into how regional,
technological, and institutional factors shape digital resource access.
Findings inform best practices for balancing security, usability, and
accessibility in library interfaces. **Keywords**: Academic library consortia,
Login page design, User authentication, User experience, Security compliance.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 01:52:52 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Shang",
"Rui",
""
],
[
"Huang",
"Bingjie",
""
]
] |
2504.13405 | Shengqin Jiang | Shengqin Jiang, Linfei Li, Haokui Zhang, Qingshan Liu, Amin Beheshti,
Jian Yang, Anton van den Hengel, Quan Z. Sheng, Yuankai Qi | ProgRoCC: A Progressive Approach to Rough Crowd Counting | Under review | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As the number of individuals in a crowd grows, enumeration-based techniques
become increasingly infeasible and their estimates increasingly unreliable. We
propose instead an estimation-based version of the problem: we label Rough
Crowd Counting that delivers better accuracy on the basis of training data that
is easier to acquire. Rough crowd counting requires only rough annotations of
the number of targets in an image, instead of the more traditional, and far
more expensive, per-target annotations. We propose an approach to the rough
crowd counting problem based on CLIP, termed ProgRoCC. Specifically, we
introduce a progressive estimation learning strategy that determines the object
count through a coarse-to-fine approach. This approach delivers answers
quickly, outperforms the state-of-the-art in semi- and weakly-supervised crowd
counting. In addition, we design a vision-language matching adapter that
optimizes key-value pairs by mining effective matches of two modalities to
refine the visual features, thereby improving the final performance. Extensive
experimental results on three widely adopted crowd counting datasets
demonstrate the effectiveness of our method.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 01:57:42 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Jiang",
"Shengqin",
""
],
[
"Li",
"Linfei",
""
],
[
"Zhang",
"Haokui",
""
],
[
"Liu",
"Qingshan",
""
],
[
"Beheshti",
"Amin",
""
],
[
"Yang",
"Jian",
""
],
[
"Hengel",
"Anton van den",
""
],
[
"Sheng",
"Quan Z.",
""
],
[
"Qi",
"Yuankai",
""
]
] |
2504.13406 | Xiangbo Gao | Xiangbo Gao, Yuheng Wu, Rujia Wang, Chenxi Liu, Yang Zhou, and
Zhengzhong Tu | LangCoop: Collaborative Driving with Language | null | CVPRW 2025 | null | null | cs.RO cs.AI cs.CL cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Multi-agent collaboration holds great promise for enhancing the safety,
reliability, and mobility of autonomous driving systems by enabling information
sharing among multiple connected agents. However, existing multi-agent
communication approaches are hindered by limitations of existing communication
media, including high bandwidth demands, agent heterogeneity, and information
loss. To address these challenges, we introduce LangCoop, a new paradigm for
collaborative autonomous driving that leverages natural language as a compact
yet expressive medium for inter-agent communication. LangCoop features two key
innovations: Mixture Model Modular Chain-of-thought (M$^3$CoT) for structured
zero-shot vision-language reasoning and Natural Language Information Packaging
(LangPack) for efficiently packaging information into concise, language-based
messages. Through extensive experiments conducted in the CARLA simulations, we
demonstrate that LangCoop achieves a remarkable 96\% reduction in communication
bandwidth (< 2KB per message) compared to image-based communication, while
maintaining competitive driving performance in the closed-loop evaluation.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 02:03:14 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Gao",
"Xiangbo",
""
],
[
"Wu",
"Yuheng",
""
],
[
"Wang",
"Rujia",
""
],
[
"Liu",
"Chenxi",
""
],
[
"Zhou",
"Yang",
""
],
[
"Tu",
"Zhengzhong",
""
]
] |
2504.13407 | Shimou Ling | Shimou Ling, Liang Zhang, Jiangwei Zhao, Lili Pan, Hongliang Li | LoRA-Based Continual Learning with Constraints on Critical Parameter
Changes | null | null | null | null | cs.CV cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | LoRA-based continual learning represents a promising avenue for leveraging
pre-trained models in downstream continual learning tasks. Recent studies have
shown that orthogonal LoRA tuning effectively mitigates forgetting. However,
this work unveils that under orthogonal LoRA tuning, the critical parameters
for pre-tasks still change notably after learning post-tasks. To address this
problem, we directly propose freezing the most critical parameter matrices in
the Vision Transformer (ViT) for pre-tasks before learning post-tasks. In
addition, building on orthogonal LoRA tuning, we propose orthogonal LoRA
composition (LoRAC) based on QR decomposition, which may further enhance the
plasticity of our method. Elaborate ablation studies and extensive comparisons
demonstrate the effectiveness of our proposed method. Our results indicate that
our method achieves state-of-the-art (SOTA) performance on several well-known
continual learning benchmarks. For instance, on the Split CIFAR-100 dataset,
our method shows a 6.35\% improvement in accuracy and a 3.24\% reduction in
forgetting compared to previous methods. Our code is available at
https://github.com/learninginvision/LoRAC-IPC.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 02:08:19 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Ling",
"Shimou",
""
],
[
"Zhang",
"Liang",
""
],
[
"Zhao",
"Jiangwei",
""
],
[
"Pan",
"Lili",
""
],
[
"Li",
"Hongliang",
""
]
] |
2504.13408 | Rudraksh Gupta | Varij Saini, Rudraksh Gupta, Neel Soni | OpCode-Based Malware Classification Using Machine Learning and Deep
Learning Techniques | 11 pages | null | null | null | cs.CR cs.LG | http://creativecommons.org/licenses/by/4.0/ | This technical report presents a comprehensive analysis of malware
classification using OpCode sequences. Two distinct approaches are evaluated:
traditional machine learning using n-gram analysis with Support Vector Machine
(SVM), K-Nearest Neighbors (KNN), and Decision Tree classifiers; and a deep
learning approach employing a Convolutional Neural Network (CNN). The
traditional machine learning approach establishes a baseline using handcrafted
1-gram and 2-gram features from disassembled malware samples. The deep learning
methodology builds upon the work proposed in "Deep Android Malware Detection"
by McLaughlin et al. and evaluates the performance of a CNN model trained to
automatically extract features from raw OpCode data. Empirical results are
compared using standard performance metrics (accuracy, precision, recall, and
F1-score). While the SVM classifier outperforms other traditional techniques,
the CNN model demonstrates competitive performance with the added benefit of
automated feature extraction.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 02:09:57 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Saini",
"Varij",
""
],
[
"Gupta",
"Rudraksh",
""
],
[
"Soni",
"Neel",
""
]
] |
2504.13409 | Mai Liao | Mai Liao, Roberto J. Assef, Chao-Wei Tsai, Manuel Aravena, Rom\'an
Fern\'andez Aranda, Andrew W. Blain, Tanio D\'iaz-Santos, Peter Eisenhardt,
Jorge Gonz\'alez-L\'opez, Hyunsung D. Jun, Xiaofeng Li, Guodong Li, Lee R.
Martin, Ana Posses, Devika Shobhana, Manuel Solimano, Daniel Stern, Andrey
Vayner, Jingwen Wu, Dejene Zewdie | Resolving the black hole sphere of influence in a hyper-luminous
obscured quasar at redshift 4.6 | 36 pages, 13 figures, submitted, comments welcome | null | null | null | astro-ph.GA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Supermassive black holes (SMBHs) imprint gravitational signatures on the
matter within their sphere of influence (SoI). Nuclear gas dynamics can hence
be used to accurately measure the mass of an SMBH, yet such measurements remain
elusive in the early Universe. We report the first dynamical measurement of an
SMBH mass at $z >$ 2, based on high spatial resolution observations of the [C
II] emission line that resolve the SoI in an obscured quasar at $z$ = 4.6. The
velocity dispersion rises radially toward the center, requiring the presence of
a 6.3$~\pm~0.14$ $\times$ 10$^9~\rm M_{\odot}$ SMBH. We propose that obscured
quasars allow [C II] survivability in the inner regions, and may be ideal
targets for increasing dynamical SMBH mass estimates in the early Universe.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 02:12:09 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Liao",
"Mai",
""
],
[
"Assef",
"Roberto J.",
""
],
[
"Tsai",
"Chao-Wei",
""
],
[
"Aravena",
"Manuel",
""
],
[
"Aranda",
"Román Fernández",
""
],
[
"Blain",
"Andrew W.",
""
],
[
"Díaz-Santos",
"Tanio",
""
],
[
"Eisenhardt",
"Peter",
""
],
[
"González-López",
"Jorge",
""
],
[
"Jun",
"Hyunsung D.",
""
],
[
"Li",
"Xiaofeng",
""
],
[
"Li",
"Guodong",
""
],
[
"Martin",
"Lee R.",
""
],
[
"Posses",
"Ana",
""
],
[
"Shobhana",
"Devika",
""
],
[
"Solimano",
"Manuel",
""
],
[
"Stern",
"Daniel",
""
],
[
"Vayner",
"Andrey",
""
],
[
"Wu",
"Jingwen",
""
],
[
"Zewdie",
"Dejene",
""
]
] |
2504.13410 | Ning Wang | Ning Wang | Refinement of an analytical capture cross section formula | 4 figures, 1 table | null | null | null | nucl-th nucl-ex | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An analytical formula with high accuracy is proposed for a systematic
description of the capture cross sections from light to superheavy reaction
systems. Based on the empirical barrier distribution (EBD) method, three key
input quantities are refined by introducing the Coulomb exchange term to the
Coulomb parameter $z$ for calculating the barrier height, incorporating the
$Q$-value into the barrier distribution width calculations, and considering the
surface effects of light nuclei and the deep inelastic scattering effects of
superheavy systems on the barrier radius. These refinements substantially
improve the model accuracy, not only the accuracy of the barrier height but
also the accruacy of the capture cross sections at energies around the Coulomb
barrier. The mean value of the deviations (in logarithmic scale) between the
predicted cross sections and the data for a total of 426 reaction systems with
$ 35 < Z_1 Z_2 < 2600$ is sharply reduced from 3.485 to 0.166.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 02:12:39 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Wang",
"Ning",
""
]
] |
2504.13411 | Shin Nishihara | Shin Nishihara and Toru Ohira | Local Ridge Formation and Domain Delimitation in Aggregation-Diffusion
Equations | null | null | null | null | physics.bio-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | On the carapace of turtles such as Mauremys japonica, raised linear
structures called keels form along the midline during embryonic development.
This study investigates the underlying mechanisms of keel formation and domain
delimitation on the carapace using a theoretical framework based on
aggregation-diffusion equations. In this model, outward tissue growth is
represented by density-dependent diffusion, while local ridge formation is
modeled as distance-dependent aggregation potentially driven by haptotaxis.
Analytical and numerical investigations reveal that distance sensitivity in
aggregation plays a critical role in shaping ridge patterns and domain
boundaries: low sensitivity promotes uniform density, whereas high sensitivity
leads to localized high-density regions. The model may reproduce
species-specific variations in keel formation, including the emergence of
single or multiple keels, and accounts for the consistent appearance of the
midline keel across diverse turtle species. Furthermore, the emergence of
multiple high-density regions is shown to occur at points where the aggregation
flux changes sign. These findings imply that cellular responses to structural
gradients may underlie both ridge formation and boundary determination. This
study helps possibly providing new insight into morphogenetic patterning on the
turtle carapace and highlighting the role of distance-dependent cell
aggregation in shaping complex biological structures.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 02:13:14 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Nishihara",
"Shin",
""
],
[
"Ohira",
"Toru",
""
]
] |
2504.13412 | Samuel Audia | Samuel Audia, Soheil Feizi, Matthias Zwicker, Dinesh Manocha | How Learnable Grids Recover Fine Detail in Low Dimensions: A Neural
Tangent Kernel Analysis of Multigrid Parametric Encodings | null | null | null | null | cs.CV cs.LG | http://creativecommons.org/licenses/by/4.0/ | Neural networks that map between low dimensional spaces are ubiquitous in
computer graphics and scientific computing; however, in their naive
implementation, they are unable to learn high frequency information. We present
a comprehensive analysis comparing the two most common techniques for
mitigating this spectral bias: Fourier feature encodings (FFE) and multigrid
parametric encodings (MPE). FFEs are seen as the standard for low dimensional
mappings, but MPEs often outperform them and learn representations with higher
resolution and finer detail. FFE's roots in the Fourier transform, make it
susceptible to aliasing if pushed too far, while MPEs, which use a learned grid
structure, have no such limitation. To understand the difference in
performance, we use the neural tangent kernel (NTK) to evaluate these encodings
through the lens of an analogous kernel regression. By finding a lower bound on
the smallest eigenvalue of the NTK, we prove that MPEs improve a network's
performance through the structure of their grid and not their learnable
embedding. This mechanism is fundamentally different from FFEs, which rely
solely on their embedding space to improve performance. Results are empirically
validated on a 2D image regression task using images taken from 100 synonym
sets of ImageNet and 3D implicit surface regression on objects from the
Stanford graphics dataset. Using peak signal-to-noise ratio (PSNR) and
multiscale structural similarity (MS-SSIM) to evaluate how well fine details
are learned, we show that the MPE increases the minimum eigenvalue by 8 orders
of magnitude over the baseline and 2 orders of magnitude over the FFE. The
increase in spectrum corresponds to a 15 dB (PSNR) / 0.65 (MS-SSIM) increase
over baseline and a 12 dB (PSNR) / 0.33 (MS-SSIM) increase over the FFE.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 02:18:08 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Audia",
"Samuel",
""
],
[
"Feizi",
"Soheil",
""
],
[
"Zwicker",
"Matthias",
""
],
[
"Manocha",
"Dinesh",
""
]
] |
2504.13413 | Haldun Balim | Haldun Balim, Yang Hu, Yuyang Zhang, Na Li | A Model-Based Approach to Imitation Learning through Multi-Step
Predictions | null | null | null | null | cs.LG cs.RO cs.SY eess.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Imitation learning is a widely used approach for training agents to replicate
expert behavior in complex decision-making tasks. However, existing methods
often struggle with compounding errors and limited generalization, due to the
inherent challenge of error correction and the distribution shift between
training and deployment. In this paper, we present a novel model-based
imitation learning framework inspired by model predictive control, which
addresses these limitations by integrating predictive modeling through
multi-step state predictions. Our method outperforms traditional behavior
cloning numerical benchmarks, demonstrating superior robustness to distribution
shift and measurement noise both in available data and during execution.
Furthermore, we provide theoretical guarantees on the sample complexity and
error bounds of our method, offering insights into its convergence properties.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 02:19:30 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Balim",
"Haldun",
""
],
[
"Hu",
"Yang",
""
],
[
"Zhang",
"Yuyang",
""
],
[
"Li",
"Na",
""
]
] |
2504.13414 | Hsin-Yi Lin | Hsin-Yi Lin, Huan-Hsin Tseng, Samuel Yen-Chi Chen, Shinjae Yoo | Adaptive Non-local Observable on Quantum Neural Networks | null | null | null | null | quant-ph cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Conventional Variational Quantum Circuits (VQCs) for Quantum Machine Learning
typically rely on a fixed Hermitian observable, often built from Pauli
operators. Inspired by the Heisenberg picture, we propose an adaptive non-local
measurement framework that substantially increases the model complexity of the
quantum circuits. Our introduction of dynamical Hermitian observables with
evolving parameters shows that optimizing VQC rotations corresponds to tracing
a trajectory in the observable space. This viewpoint reveals that standard VQCs
are merely a special case of the Heisenberg representation.
Furthermore, we show that properly incorporating variational rotations with
non-local observables enhances qubit interaction and information mixture,
admitting flexible circuit designs. Two non-local measurement schemes are
introduced, and numerical simulations on classification tasks confirm that our
approach outperforms conventional VQCs, yielding a more powerful and
resource-efficient approach as a Quantum Neural Network.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 02:20:12 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Lin",
"Hsin-Yi",
""
],
[
"Tseng",
"Huan-Hsin",
""
],
[
"Chen",
"Samuel Yen-Chi",
""
],
[
"Yoo",
"Shinjae",
""
]
] |
2504.13415 | Racheal Mukisa | Racheal Mukisa and Arvind K. Bansal | DADU: Dual Attention-based Deep Supervised UNet for Automated Semantic
Segmentation of Cardiac Images | 20 pages, 8 figures | null | null | null | eess.IV cs.AI cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose an enhanced deep learning-based model for image segmentation of
the left and right ventricles and myocardium scar tissue from cardiac magnetic
resonance (CMR) images. The proposed technique integrates UNet, channel and
spatial attention, edge-detection based skip-connection and deep supervised
learning to improve the accuracy of the CMR image-segmentation. Images are
processed using multiple channels to generate multiple feature-maps. We built a
dual attention-based model to integrate channel and spatial attention. The use
of extracted edges in skip connection improves the reconstructed images from
feature-maps. The use of deep supervision reduces vanishing gradient problems
inherent in classification based on deep neural networks. The algorithms for
dual attention-based model, corresponding implementation and performance
results are described. The performance results show that this approach has
attained high accuracy: 98% Dice Similarity Score (DSC) and significantly lower
Hausdorff Distance (HD). The performance results outperform other leading
techniques both in DSC and HD.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 02:22:45 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Mukisa",
"Racheal",
""
],
[
"Bansal",
"Arvind K.",
""
]
] |
2504.13416 | Saksham Rastogi | Saksham Rastogi, Pratyush Maini, Danish Pruthi | STAMP Your Content: Proving Dataset Membership via Watermarked
Rephrasings | Accepted at DATA-FM, WMark @ ICLR 2025. Project page at see
https://codeboy5.github.io/stamp | null | null | null | cs.LG cs.CL cs.CR | http://creativecommons.org/licenses/by/4.0/ | Given how large parts of publicly available text are crawled to pretrain
large language models (LLMs), data creators increasingly worry about the
inclusion of their proprietary data for model training without attribution or
licensing. Their concerns are also shared by benchmark curators whose test-sets
might be compromised. In this paper, we present STAMP, a framework for
detecting dataset membership-i.e., determining the inclusion of a dataset in
the pretraining corpora of LLMs. Given an original piece of content, our
proposal involves first generating multiple rephrases, each embedding a
watermark with a unique secret key. One version is to be released publicly,
while others are to be kept private. Subsequently, creators can compare model
likelihoods between public and private versions using paired statistical tests
to prove membership. We show that our framework can successfully detect
contamination across four benchmarks which appear only once in the training
data and constitute less than 0.001% of the total tokens, outperforming several
contamination detection and dataset inference baselines. We verify that STAMP
preserves both the semantic meaning and the utility of the original data in
comparing different models. We apply STAMP to two real-world scenarios to
confirm the inclusion of paper abstracts and blog articles in the pretraining
corpora.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 02:25:08 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Rastogi",
"Saksham",
""
],
[
"Maini",
"Pratyush",
""
],
[
"Pruthi",
"Danish",
""
]
] |
2504.13417 | Tamitake Itoh Dr. | Tamitake Itoh and Yuko S. Yamamoto | Ultrabroad resonance of localized plasmon on a nanoparticle coupled with
surface plasmon on a nanowire enabling two-photon excited emission via
continuous-wave laser | 54 pages, 18 figures | null | null | null | physics.optics quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This study found that plasmonic hotspots (HSs) between silver nanoparticles
(NPs) and silver nanowires (NWs) generated two-photon excited emissions,
including hyper-Rayleigh, hyper-Raman, and two-photon fluorescence of dye
molecules with continuous-wave (CW) near-infrared (NIR) laser excitation. A
comparison between experimental results and electromagnetic (EM) calculations
revealed that a large EM enhancement factor (FR) at the HS appears in the
visible to NIR regions owing to EM coupling between localized plasmons of the
NP and surface plasmons of the NW. This ultrabroad resonance of the coupled
plasmons enables the observation of two-photon-excited emissions with CW laser
excitation. A comparison of the dependence of the NP diameter, NW diameter, and
gap distance on two-photon-excited emissions further demonstrated that the
large HS-by-HS variations in the emission intensities were mainly induced by
the sensitivity of FR to the gap distance at the HSs. We also experimentally
and theoretically investigated the propagation of two-photon-excited emission
light to a neighboring NP on the NW via surface plasmons.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 02:26:29 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Itoh",
"Tamitake",
""
],
[
"Yamamoto",
"Yuko S.",
""
]
] |
2504.13418 | Pedro Rosario | Pedro Rosario, Luiz O.R. Solak, A. Cidrim, R. Bachelard, Johannes
Schachenmayer | Unraveling Dicke Superradiant Decay with Separable Coherent Spin States | null | null | null | null | quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show that Dicke superradiant decay from a fully inverted state can at all
times be described by a positive statistical mixture of coherent spin states
(CSS). Since CSS are separable, this implies that no entanglement is involved
in Dicke decay. Based on this result, we introduce a new numerical quantum
trajectory approach leading to low-entanglement unravelings. This opens up
possibilities for large-scale numerical simulations of collective decay
processes.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 02:32:09 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Rosario",
"Pedro",
""
],
[
"Solak",
"Luiz O. R.",
""
],
[
"Cidrim",
"A.",
""
],
[
"Bachelard",
"R.",
""
],
[
"Schachenmayer",
"Johannes",
""
]
] |
2504.13419 | Wenyu Li | Wenyu Li, Sidun Liu, Peng Qiao, Yong Dou | Mono3R: Exploiting Monocular Cues for Geometric 3D Reconstruction | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Recent advances in data-driven geometric multi-view 3D reconstruction
foundation models (e.g., DUSt3R) have shown remarkable performance across
various 3D vision tasks, facilitated by the release of large-scale,
high-quality 3D datasets. However, as we observed, constrained by their
matching-based principles, the reconstruction quality of existing models
suffers significant degradation in challenging regions with limited matching
cues, particularly in weakly textured areas and low-light conditions. To
mitigate these limitations, we propose to harness the inherent robustness of
monocular geometry estimation to compensate for the inherent shortcomings of
matching-based methods. Specifically, we introduce a monocular-guided
refinement module that integrates monocular geometric priors into multi-view
reconstruction frameworks. This integration substantially enhances the
robustness of multi-view reconstruction systems, leading to high-quality
feed-forward reconstructions. Comprehensive experiments across multiple
benchmarks demonstrate that our method achieves substantial improvements in
both mutli-view camera pose estimation and point cloud accuracy.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 02:33:12 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Li",
"Wenyu",
""
],
[
"Liu",
"Sidun",
""
],
[
"Qiao",
"Peng",
""
],
[
"Dou",
"Yong",
""
]
] |
2504.13420 | Haoxiang Tian | Haoxiang Tian, Wenqiang Ding, Xingshuo Han, Guoquan Wu, An Guo, Junqi
Zhang. Wei Chen, Jun Wei, Tianwei Zhang | Testing the Fault-Tolerance of Multi-Sensor Fusion Perception in
Autonomous Driving Systems | null | null | null | null | cs.RO cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | High-level Autonomous Driving Systems (ADSs), such as Google Waymo and Baidu
Apollo, typically rely on multi-sensor fusion (MSF) based approaches to
perceive their surroundings. This strategy increases perception robustness by
combining the respective strengths of the camera and LiDAR and directly affects
the safety-critical driving decisions of autonomous vehicles (AVs). However, in
real-world autonomous driving scenarios, cameras and LiDAR are subject to
various faults, which can probably significantly impact the decision-making and
behaviors of ADSs. Existing MSF testing approaches only discovered corner cases
that the MSF-based perception cannot accurately detected by MSF-based
perception, while lacking research on how sensor faults affect the system-level
behaviors of ADSs.
To address this gap, we conduct the first exploration of the fault tolerance
of MSF perception-based ADS for sensor faults. In this paper, we systematically
and comprehensively build fault models for cameras and LiDAR in AVs and inject
them into the MSF perception-based ADS to test its behaviors in test scenarios.
To effectively and efficiently explore the parameter spaces of sensor fault
models, we design a feedback-guided differential fuzzer to discover the safety
violations of MSF perception-based ADS caused by the injected sensor faults. We
evaluate FADE on the representative and practical industrial ADS, Baidu Apollo.
Our evaluation results demonstrate the effectiveness and efficiency of FADE,
and we conclude some useful findings from the experimental results. To validate
the findings in the physical world, we use a real Baidu Apollo 6.0 EDU
autonomous vehicle to conduct the physical experiments, and the results show
the practical significance of our findings.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 02:37:55 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Tian",
"Haoxiang",
""
],
[
"Ding",
"Wenqiang",
""
],
[
"Han",
"Xingshuo",
""
],
[
"Wu",
"Guoquan",
""
],
[
"Guo",
"An",
""
],
[
"Chen",
"Junqi Zhang. Wei",
""
],
[
"Wei",
"Jun",
""
],
[
"Zhang",
"Tianwei",
""
]
] |
2504.13421 | Ken Jen Lee | Ken Jen Lee, PiaoHong Wang and Zhicong Lu | "Can't believe I'm crying over an anime girl": Public Parasocial
Grieving and Coping Towards VTuber Graduation and Termination | 23 pages, 3 figures, Proceedings of CHI Conference on Human Factors
in Computing Systems (CHI '25) | Proceedings of CHI Conference on Human Factors in Computing
Systems (CHI 2025), 23 pages | null | null | cs.HC cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Despite the significant increase in popularity of Virtual YouTubers
(VTubers), research on the unique dynamics of viewer-VTuber parasocial
relationships is nascent. This work investigates how English-speaking viewers
grieved VTubers whose identities are no longer used, an interesting context as
the nakanohito (i.e., the person behind the VTuber identity) is usually alive
post-retirement and might "reincarnate" as another VTuber. We propose a
typology for VTuber retirements and analyzed 13,655 Reddit posts and comments
spanning nearly three years using mixed-methods. Findings include how viewers
coped using methods similar to when losing loved ones, alongside novel coping
methods reflecting different attachment styles. Although emotions like sadness,
shock, concern, disapproval, confusion, and love decreased with time, regret
and loyalty showed opposite trends. Furthermore, viewers' reactions situated a
VTuber identity within a community of content creators and viewers. We also
discuss design implications alongside implications on the VTuber ecosystem and
future research directions.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 02:40:42 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Lee",
"Ken Jen",
""
],
[
"Wang",
"PiaoHong",
""
],
[
"Lu",
"Zhicong",
""
]
] |
2504.13422 | Vivek Oommen | Vivek Oommen, Andreas E. Robertson, Daniel Diaz, Coleman Alleman, Zhen
Zhang, Anthony D. Rollett, George E. Karniadakis, R\'emi Dingreville | Equilibrium Conserving Neural Operators for Super-Resolution Learning | null | null | null | null | cs.LG physics.comp-ph | http://creativecommons.org/licenses/by/4.0/ | Neural surrogate solvers can estimate solutions to partial differential
equations in physical problems more efficiently than standard numerical
methods, but require extensive high-resolution training data. In this paper, we
break this limitation; we introduce a framework for super-resolution learning
in solid mechanics problems. Our approach allows one to train a high-resolution
neural network using only low-resolution data. Our Equilibrium Conserving
Operator (ECO) architecture embeds known physics directly into the network to
make up for missing high-resolution information during training. We evaluate
this ECO-based super-resolution framework that strongly enforces
conservation-laws in the predicted solutions on two working examples: embedded
pores in a homogenized matrix and randomly textured polycrystalline materials.
ECO eliminates the reliance on high-fidelity data and reduces the upfront cost
of data collection by two orders of magnitude, offering a robust pathway for
resource-efficient surrogate modeling in materials modeling. ECO is readily
generalizable to other physics-based problems.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 02:47:53 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Oommen",
"Vivek",
""
],
[
"Robertson",
"Andreas E.",
""
],
[
"Diaz",
"Daniel",
""
],
[
"Alleman",
"Coleman",
""
],
[
"Zhang",
"Zhen",
""
],
[
"Rollett",
"Anthony D.",
""
],
[
"Karniadakis",
"George E.",
""
],
[
"Dingreville",
"Rémi",
""
]
] |
2504.13423 | William Cook | William Cook | Mixed Fractional Information: Consistency of Dissipation Measures for
Stable Laws | 20 pages, 1 figure | null | null | null | cs.IT math.FA math.IT math.PR math.ST stat.TH | http://creativecommons.org/licenses/by/4.0/ | Symmetric alpha-stable (S alpha S) distributions with alpha<2 lack finite
classical Fisher information. Building on Johnson's framework, we define Mixed
Fractional Information (MFI) via the initial rate of relative entropy
dissipation during interpolation between S alpha S laws with differing scales,
v and s. We demonstrate two equivalent formulations for MFI in this specific S
alpha S-to-S alpha S setting. The first involves the derivative D'(v) of the
relative entropy between the two S alpha S densities. The second uses an
integral expectation E_gv[u(x,0) (pF_v(x) - pF_s(x))] involving the difference
between Fisher scores (pF_v, pF_s) and a specific MMSE-related score function
u(x,0) derived from the interpolation dynamics. Our central contribution is a
rigorous proof of the consistency identity: D'(v) = (1/(alpha v)) E_gv[X
(pF_v(X) - pF_s(X))]. This identity mathematically validates the equivalence of
the two MFI formulations for S alpha S inputs, establishing MFI's internal
coherence and directly linking entropy dissipation rates to score function
differences. We further establish MFI's non-negativity (zero if and only if
v=s), derive its closed-form expression for the Cauchy case (alpha=1), and
numerically validate the consistency identity. MFI provides a finite, coherent,
and computable information-theoretic measure for comparing S alpha S
distributions where classical Fisher information fails, connecting entropy
dynamics to score functions and estimation concepts. This work lays a
foundation for exploring potential fractional I-MMSE relations and new
functional inequalities tailored to heavy-tailed systems.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 02:49:24 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Cook",
"William",
""
]
] |
2504.13424 | Yang Shen | Yang Shen, Shuqi Chai, Bing Li, Xiaodong Luo, Qingjiang Shi, and
Rongqing Zhang | Decentralized Handover Parameter Optimization with MARL for Load
Balancing in 5G Networks | 12 pages, 11 figures | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In cellular networks, cell handover refers to the process where a device
switches from one base station to another, and this mechanism is crucial for
balancing the load among different cells. Traditionally, engineers would
manually adjust parameters based on experience. However, the explosive growth
in the number of cells has rendered manual tuning impractical. Existing
research tends to overlook critical engineering details in order to simplify
handover problems. In this paper, we classify cell handover into three types,
and jointly model their mutual influence. To achieve load balancing, we propose
a multi-agent-reinforcement-learning (MARL)-based scheme to automatically
optimize the parameters. To reduce the agent interaction costs, a distributed
training is implemented based on consensus approximation of global average
load, and it is shown that the approximation error is bounded. Experimental
results show that our proposed scheme outperforms existing benchmarks in
balancing load and improving network performance.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 02:49:45 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Shen",
"Yang",
""
],
[
"Chai",
"Shuqi",
""
],
[
"Li",
"Bing",
""
],
[
"Luo",
"Xiaodong",
""
],
[
"Shi",
"Qingjiang",
""
],
[
"Zhang",
"Rongqing",
""
]
] |
2504.13425 | Grace Byun | Grace Byun, Shinsun Lee, Nayoung Choi, Jinho Choi | Secure Multifaceted-RAG for Enterprise: Hybrid Knowledge Retrieval with
Security Filtering | null | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | Existing Retrieval-Augmented Generation (RAG) systems face challenges in
enterprise settings due to limited retrieval scope and data security risks.
When relevant internal documents are unavailable, the system struggles to
generate accurate and complete responses. Additionally, using closed-source
Large Language Models (LLMs) raises concerns about exposing proprietary
information. To address these issues, we propose the Secure Multifaceted-RAG
(SecMulti-RAG) framework, which retrieves not only from internal documents but
also from two supplementary sources: pre-generated expert knowledge for
anticipated queries and on-demand external LLM-generated knowledge. To mitigate
security risks, we adopt a local open-source generator and selectively utilize
external LLMs only when prompts are deemed safe by a filtering mechanism. This
approach enhances completeness, prevents data leakage, and reduces costs. In
our evaluation on a report generation task in the automotive industry,
SecMulti-RAG significantly outperforms traditional RAG - achieving 79.3 to 91.9
percent win rates across correctness, richness, and helpfulness in LLM-based
evaluation, and 56.3 to 70.4 percent in human evaluation. This highlights
SecMulti-RAG as a practical and secure solution for enterprise RAG.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 02:51:29 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Byun",
"Grace",
""
],
[
"Lee",
"Shinsun",
""
],
[
"Choi",
"Nayoung",
""
],
[
"Choi",
"Jinho",
""
]
] |
2504.13426 | Jielong Lu | Jielong LuZhihao Wu, Zhiling Cai, Yueyang Pi, Shiping Wang | Simplifying Graph Convolutional Networks with Redundancy-Free Neighbors | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In recent years, Graph Convolutional Networks (GCNs) have gained popularity
for their exceptional ability to process graph-structured data. Existing
GCN-based approaches typically employ a shallow model architecture due to the
over-smoothing phenomenon. Current approaches to mitigating over-smoothing
primarily involve adding supplementary components to GCN architectures, such as
residual connections and random edge-dropping strategies. However, these
improvements toward deep GCNs have achieved only limited success. In this work,
we analyze the intrinsic message passing mechanism of GCNs and identify a
critical issue: messages originating from high-order neighbors must traverse
through low-order neighbors to reach the target node. This repeated reliance on
low-order neighbors leads to redundant information aggregation, a phenomenon we
term over-aggregation. Our analysis demonstrates that over-aggregation not only
introduces significant redundancy but also serves as the fundamental cause of
over-smoothing in GCNs.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 02:56:21 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Wu",
"Jielong LuZhihao",
""
],
[
"Cai",
"Zhiling",
""
],
[
"Pi",
"Yueyang",
""
],
[
"Wang",
"Shiping",
""
]
] |
2504.13427 | Ming Li | Guannan Zhang, Jiamin Xu, Ming Li, Shuqian Shen, Lei Li, and Shao-ming
Fei | Tight upper bound and monogamy relation for the maximum quantum value of
the parity-CHSH inequality and applied to device-independent randomness | 7 pages, 1 figure | Laser Phys. Lett. 22, 055201(2025) | null | null | quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Based on the violation of Bell inequalities, we can verify quantum random
numbers by examining the correlation between device inputs and outputs. In this
paper, we derive the maximum quantum value of the parity-CHSH inequality for a
three-qubit system, establishing a tight upper bound applicable to any quantum
state. Simultaneously, the necessary constraints for achieving saturation are
analyzed. Utilizing this method, we present necessary and sufficient conditions
for certain states to violate the parity-CHSH inequality. Building upon our
proposal, the relationship between the noise parameter and the certifiable
randomness in a bipartite entangled state is probed. Furthermore, we derive a
monogamy relationship between the average values of the parity-CHSH inequality
associated with the reduced three-qubit density matrices of GHZ-class states
comprising four qubits.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 02:58:59 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Zhang",
"Guannan",
""
],
[
"Xu",
"Jiamin",
""
],
[
"Li",
"Ming",
""
],
[
"Shen",
"Shuqian",
""
],
[
"Li",
"Lei",
""
],
[
"Fei",
"Shao-ming",
""
]
] |
2504.13428 | Qi'ao Xu | Qi'ao Xu, Pengfei Wang, Yanjun Li, Tianwen Qian, Xiaoling Wang | HSACNet: Hierarchical Scale-Aware Consistency Regularized
Semi-Supervised Change Detection | 7 pages, 8 figures, accepted by ICME 2025 | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Semi-supervised change detection (SSCD) aims to detect changes between
bi-temporal remote sensing images by utilizing limited labeled data and
abundant unlabeled data. Existing methods struggle in complex scenarios,
exhibiting poor performance when confronted with noisy data. They typically
neglect intra-layer multi-scale features while emphasizing inter-layer fusion,
harming the integrity of change objects with different scales. In this paper,
we propose HSACNet, a Hierarchical Scale-Aware Consistency regularized Network
for SSCD. Specifically, we integrate Segment Anything Model 2 (SAM2), using its
Hiera backbone as the encoder to extract inter-layer multi-scale features and
applying adapters for parameter-efficient fine-tuning. Moreover, we design a
Scale-Aware Differential Attention Module (SADAM) that can precisely capture
intra-layer multi-scale change features and suppress noise. Additionally, a
dual-augmentation consistency regularization strategy is adopted to effectively
utilize the unlabeled data. Extensive experiments across four CD benchmarks
demonstrate that our HSACNet achieves state-of-the-art performance, with
reduced parameters and computational cost.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 03:00:52 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Xu",
"Qi'ao",
""
],
[
"Wang",
"Pengfei",
""
],
[
"Li",
"Yanjun",
""
],
[
"Qian",
"Tianwen",
""
],
[
"Wang",
"Xiaoling",
""
]
] |
2504.13429 | Shenzhi Yang | Shenzhi Yang, Bin Liang, An Liu, Lin Gui, Xingkai Yao, Xiaofang Zhang | Bounded and Uniform Energy-based Out-of-distribution Detection for
Graphs | arXiv admin note: text overlap with arXiv:2302.02914 by other authors | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given the critical role of graphs in real-world applications and their
high-security requirements, improving the ability of graph neural networks
(GNNs) to detect out-of-distribution (OOD) data is an urgent research problem.
The recent work GNNSAFE proposes a framework based on the aggregation of
negative energy scores that significantly improves the performance of GNNs to
detect node-level OOD data. However, our study finds that score aggregation
among nodes is susceptible to extreme values due to the unboundedness of the
negative energy scores and logit shifts, which severely limits the accuracy of
GNNs in detecting node-level OOD data. In this paper, we propose NODESAFE:
reducing the generation of extreme scores of nodes by adding two optimization
terms that make the negative energy scores bounded and mitigate the logit
shift. Experimental results show that our approach dramatically improves the
ability of GNNs to detect OOD data at the node level, e.g., in detecting OOD
data induced by Structure Manipulation, the metric of FPR95 (lower is better)
in scenarios without (with) OOD data exposure are reduced from the current SOTA
by 28.4% (22.7%).
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 03:01:00 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Yang",
"Shenzhi",
""
],
[
"Liang",
"Bin",
""
],
[
"Liu",
"An",
""
],
[
"Gui",
"Lin",
""
],
[
"Yao",
"Xingkai",
""
],
[
"Zhang",
"Xiaofang",
""
]
] |
2504.13430 | Chui Shan Lee | Zhiyi Huang, Chui Shan Lee, Xinkai Shu, Zhaozi Wang | The Long Arm of Nashian Allocation in Online $p$-Mean Welfare
Maximization | null | null | null | null | cs.GT cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the online allocation of divisible items to $n$ agents with additive
valuations for $p$-mean welfare maximization, a problem introduced by Barman,
Khan, and Maiti~(2022). Our algorithmic and hardness results characterize the
optimal competitive ratios for the entire spectrum of $-\infty \le p \le 1$.
Surprisingly, our improved algorithms for all $p \le \frac{1}{\log n}$ are
simply the greedy algorithm for the Nash welfare, supplemented with two
auxiliary components to ensure all agents have non-zero utilities and to help a
small number of agents with low utilities. In this sense, the long arm of
Nashian allocation achieves near-optimal competitive ratios not only for Nash
welfare but also all the way to egalitarian welfare.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 03:01:18 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Huang",
"Zhiyi",
""
],
[
"Lee",
"Chui Shan",
""
],
[
"Shu",
"Xinkai",
""
],
[
"Wang",
"Zhaozi",
""
]
] |
2504.13431 | Jun-Chao Su | Jun-Chao Su, Qing-Fu Song, Qi-Fang L\"u and Jingya Zhu | An analysis on doubly bottom molecular tetraquarks composed of $H_{(s)}$
and $T_{(s)}$ doublets | null | null | null | null | hep-ph | http://creativecommons.org/licenses/by/4.0/ | In this work, we investigate the doubly bottom $H_{(s)}\bar{T}_{(s)}$ and
$H_{(s)}T_{(s)}$ systems by adopting the one-boson-exchange model, where
$H_{(s)}$ and $T_{(s)}$ represent $S$-wave $B^{(*)}_{(s)}$ and $P$-wave
$B^{(*)}_{(s)1,2}$ doublets, respectively. For the $H\bar{T}$ systems, we
predict some loosely bound states in the $I(J^{PC})=0(1^{-\pm})$
$B\bar{B}_{1}$, $I(J^{PC})=0(2^{--})$ $B\bar{B}_{2}^{*}$, and
$I(J^{PC})=0(1^{-\pm})$ $B^*\bar{B}_{1}$ channels, which are the most promising
hidden bottom molecular tetraquarks. For the $HT$ systems, the
$I(J^{PC})=0(1^{-\pm})$ $B^*B_1$ and $I(J^{PC})=0(2^{-+})$ $B^{*}B^{*}_2$
channels are also likely to form molecular tetraquarks. In contrast, no
molecular candidates have been identified in the bottom-strange sectors. One
can hope that our predictions will provide valuable insights to the LHCb and
Belle II Collaborations as they continue to explore this fascinating field
through experimental research.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 03:06:05 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Su",
"Jun-Chao",
""
],
[
"Song",
"Qing-Fu",
""
],
[
"Lü",
"Qi-Fang",
""
],
[
"Zhu",
"Jingya",
""
]
] |
2504.13432 | Chu Chen | Chu Chen, Han Zhang, Lok Ming Lui | Circular Image Deturbulence using Quasi-conformal Geometry | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | The presence of inhomogeneous media between optical sensors and objects leads
to distorted imaging outputs, significantly complicating downstream
image-processing tasks. A key challenge in image restoration is the lack of
high-quality, paired-label images required for training supervised models. In
this paper, we introduce the Circular Quasi-Conformal Deturbulence (CQCD)
framework, an unsupervised approach for removing image distortions through a
circular architecture. This design ensures that the restored image remains both
geometrically accurate and visually faithful while preventing the accumulation
of incorrect estimations.The circular restoration process involves both forward
and inverse mapping. To ensure the bijectivity of the estimated non-rigid
deformations, computational quasi-conformal geometry theories are leveraged to
regularize the mapping, enforcing its homeomorphic properties. This guarantees
a well-defined transformation that preserves structural integrity and prevents
unwanted artifacts. Furthermore, tight-frame blocks are integrated to encode
distortion-sensitive features for precise recovery. To validate the performance
of our approach, we conduct evaluations on various synthetic and real-world
captured images. Experimental results demonstrate that CQCD not only
outperforms existing state-of-the-art deturbulence methods in terms of image
restoration quality but also provides highly accurate deformation field
estimations.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 03:07:25 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Chen",
"Chu",
""
],
[
"Zhang",
"Han",
""
],
[
"Lui",
"Lok Ming",
""
]
] |
2504.13433 | William Cook | William Cook | A Recursive Block Pillar Structure in the Kolakoski Sequence K(1,3) | 8 pages, no figures. Undergraduate research. Includes full proofs and
references | null | null | null | math.CO cs.FL math.DS | http://creativecommons.org/licenses/by/4.0/ | The Kolakoski sequence K(a,b) over {a, b} is the unique sequence starting
with a that equals its own run-length encoding. While the classical case K(1,2)
remains deeply enigmatic, generalizations exhibit markedly different behaviors
depending on the parity of a and b. The sequence K(1,3), a same-parity case
over the alphabet {1,3}, is known to possess regular structure and a calculable
symbol frequency. This paper reveals a complementary structural property: a
nested block-pillar recursion of the form B_{n+1} = B_n + P_n + B_n, and
P_{n+1} = G(P_n, 3), where each B_n is a prefix of K(1,3), and G is a
generation operator based on run-length encoding. We show that B_{n+1} = G(B_n,
1), leading to a self-replicating description of K(1,3). This structure allows
derivation of exact recurrences for length, symbol counts, and density, proving
exponential growth and convergence to the known limit d = (5 - sqrt(5)) / 10.
Our analysis highlights the structured nature of same-parity Kolakoski
sequences and offers a constructive alternative to morphic generation.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 03:08:46 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Cook",
"William",
""
]
] |
2504.13434 | Ky Ho | Hoang Hai Ha, Ky Ho, Bui The Quan, Inbo Sim | Global boundedness for Generalized Schr\"odinger-Type Double Phase
Problems in $\mathbb{R}^N$ and Applications to Supercritical Double Phase
Problems | null | null | null | null | math.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We establish two global boundedness results for weak solutions to generalized
Schr\"{o}dinger-type double phase problems with variable exponents in
$\mathbb{R}^N$ under new critical growth conditions optimally introduced in
[26, 32]. More precisely, for the case of subcritical growth, we employ the De
Giorgi iteration with a suitable localization method in $\mathbb{R}^N$ to
obtain a-priori bounds. As a byproduct, we derive the decay property of weak
solutions. For the case of critical growth, using the De Giorgi iteration with
a localization adapted to the critical growth, we prove the global boundedness.
As an interesting application of these results, the existence of weak solutions
for supercritical double phase problems is shown. These results are new even
for problems with constant exponents in $\mathbb{R}^N$.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 03:17:38 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Ha",
"Hoang Hai",
""
],
[
"Ho",
"Ky",
""
],
[
"Quan",
"Bui The",
""
],
[
"Sim",
"Inbo",
""
]
] |
2504.13435 | N. R. Sree Harsha | Jack K. Wright, N. R. Sree Harsha, and Allen L. Garner | A generalized equation for the critical current for a one-dimensional
crossed-field gap in an orthogonal coordinate system | 36 pages, 10 figures | null | null | null | physics.plasm-ph physics.app-ph | http://creativecommons.org/licenses/by/4.0/ | Recent studies have applied variational calculus, conformal mapping, and
point transformations to extend the one-dimensional SCLC from planar gaps to
more complicated geometries. However, introducing a magnetic field orthogonal
to the diode's electric field complicates these calculations due to changes in
the electron trajectory. This paper extends a recent study that applied
variational calculus to determine the SCLC for a cylindrical crossed-field
diode to derive an equation that is valid for any orthogonal coordinate system.
We then derive equations for the SCLC for crossed-field gaps in spherical,
tip-to-tip, and tip-to-plane geometries that can be solved numerically. These
calculations exhibit a discontinuity at the Hull cutoff magnetic field $B_H$
corresponding to the transition to magnetic insulation as observed analytically
for a planar geometry. The ratio of the crossed-field SCLC to the nonmagnetic
SCLC becomes essentially independent of geometry when we fix $\delta = D/D_M >
0.6$, where $D$ is the canonical gap distance accounting for geometric effects
on electric potential and $D_M$ is the effective gap distance that accounts for
magnetic field and geometry. The solutions for these geometries overlap as
$\delta \to 1$ since the geometric corrections for electric potential and
magnetic field match. This indicates the possibility of more generally
accounting for the combination of geometric and magnetic effects when
calculating $B_H$ and SCLC.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 03:20:46 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Wright",
"Jack K.",
""
],
[
"Harsha",
"N. R. Sree",
""
],
[
"Garner",
"Allen L.",
""
]
] |
2504.13436 | Duksu Kim | YoungWoo Kim, Jaehong Lee, Duksu Kim | RT-HDIST: Ray-Tracing Core-based Hausdorff Distance Computation | 8 pages, 7 figures | null | null | null | cs.GR cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Hausdorff distance is a fundamental metric with widespread applications
across various fields. However, its computation remains computationally
expensive, especially for large-scale datasets. In this work, we present
RT-HDIST, the first Hausdorff distance algorithm accelerated by ray-tracing
cores (RT-cores). By reformulating the Hausdorff distance problem as a series
of nearest-neighbor searches and introducing a novel quantized index space,
RT-HDIST achieves significant reductions in computational overhead while
maintaining exact results. Extensive benchmarks demonstrate up to a
two-order-of-magnitude speedup over prior state-of-the-art methods,
underscoring RT-HDIST's potential for real-time and large-scale applications.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 03:21:34 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Kim",
"YoungWoo",
""
],
[
"Lee",
"Jaehong",
""
],
[
"Kim",
"Duksu",
""
]
] |
2504.13437 | Zimo Zhang | Zimo Zhang, Zhongxiao Xu, Ran Huang, Xingda Lu, Fengbo Zhang, Donghao
Li, \c{S}ahin K. \"Ozdemir, Franco Nori, Han Bao, Yanhong Xiao, Bing Chen,
Hui Jing, and Heng Shen | Chirality-induced quantum nonreciprocity | Accepted by Nature Photonic | null | null | null | quant-ph physics.atom-ph physics.optics | http://creativecommons.org/licenses/by/4.0/ | Chirality, nonreciprocity, and quantum correlations are at the center of a
wide range of intriguing effects and applications across natural sciences and
emerging quantum technologies. However, the direct link combining these three
essential concepts has remained unknown till now. Here, we establish a chiral
non-Hermitian platform with flying atoms and demonstrate chirality-induced
nonreciprocal bipartite quantum correlations between two channels: Quantum
correlation emerges when two spatially separated light beams of the same
polarization propagate in opposite directions in the atomic cloud, and it
becomes zero when they travel in the same direction. Thus, just by flipping the
propagation direction of one of the beams while keeping its polarization the
same as the other beam, we can create or annihilate quantum correlations
between two channels. We also show that this nonreciprocal quantum correlation
can be extended to multi-color sidebands with Floquet engineering. Our findings
may pave the road for realizing one-way quantum effects, such as nonreciprocal
squeezing or entanglement, with a variety of chiral devices, for the emerging
applications of e.g., directional quantum network or nonreciprocal quantum
metrology.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 03:34:16 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Zhang",
"Zimo",
""
],
[
"Xu",
"Zhongxiao",
""
],
[
"Huang",
"Ran",
""
],
[
"Lu",
"Xingda",
""
],
[
"Zhang",
"Fengbo",
""
],
[
"Li",
"Donghao",
""
],
[
"Özdemir",
"Şahin K.",
""
],
[
"Nori",
"Franco",
""
],
[
"Bao",
"Han",
""
],
[
"Xiao",
"Yanhong",
""
],
[
"Chen",
"Bing",
""
],
[
"Jing",
"Hui",
""
],
[
"Shen",
"Heng",
""
]
] |
2504.13438 | Swadesh Pal | Swadesh Pal and Roderick Melnik | Adaptive modelling of anti-tau treatments for neurodegenerative
disorders based on the Bayesian approach with physics-informed neural
networks | 22 pages, 8 figures | null | null | null | q-bio.NC q-bio.QM | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Alzheimer's disease (AD) is a complex neurodegenerative disorder
characterized by the accumulation of amyloid-beta (A$\beta$) and phosphorylated
tau (p-tau) proteins, leading to cognitive decline measured by the Alzheimer's
Disease Assessment Scale (ADAS) score. In this study, we develop and analyze a
system of ordinary differential equation models to describe the interactions
between A$\beta$, p-tau, and ADAS score, providing a mechanistic understanding
of disease progression. To ensure accurate model calibration, we employ
Bayesian inference and Physics-Informed Neural Networks (PINNs) for parameter
estimation based on Alzheimer's Disease Neuroimaging Initiative data. The
data-driven Bayesian approach enables uncertainty quantification, improving
confidence in model predictions, while the PINN framework leverages neural
networks to capture complex dynamics directly from data. Furthermore, we
implement an optimal control strategy to assess the efficacy of an anti-tau
therapeutic intervention aimed at reducing p-tau levels and mitigating
cognitive decline. Our data-driven solutions indicate that while optimal drug
administration effectively decreases p-tau concentration, its impact on
cognitive decline, as reflected in the ADAS score, remains limited. These
findings suggest that targeting p-tau alone may not be sufficient for
significant cognitive improvement, highlighting the need for multi-target
therapeutic strategies. The integration of mechanistic modelling, advanced
parameter estimation, and control-based therapeutic optimization provides a
comprehensive framework for improving treatment strategies for AD.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 03:35:11 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Pal",
"Swadesh",
""
],
[
"Melnik",
"Roderick",
""
]
] |
2504.13439 | Grace Byun | Grace Byun, Jinho Choi | D-GEN: Automatic Distractor Generation and Evaluation for Reliable
Assessment of Generative Model | null | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | Evaluating generative models with open-ended generation is challenging due to
inconsistencies in response formats. Multiple-choice (MC) evaluation mitigates
this issue, but generating high-quality distractors is time-consuming and
labor-intensive. We introduce D-GEN, the first open-source distractor generator
model that transforms open-ended data into an MC format. To evaluate distractor
quality, we propose two novel methods: (1) ranking alignment, ensuring
generated distractors retain the discriminatory power of ground-truth
distractors, and (2) entropy analysis, comparing model confidence
distributions. Our results show that D-GEN preserves ranking consistency
(Spearman's rho 0.99, Kendall's tau 0.94) and closely matches the entropy
distribution of ground-truth distractors. Human evaluation further confirms the
fluency, coherence, distractiveness, and incorrectness. Our work advances
robust and efficient distractor generation with automated evaluation, setting a
new standard for MC evaluation.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 03:40:11 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Byun",
"Grace",
""
],
[
"Choi",
"Jinho",
""
]
] |
2504.13440 | Cheng Yuan | Cheng Yuan, Yutong Ban | Temporal Propagation of Asymmetric Feature Pyramid for Surgical Scene
Segmentation | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Surgical scene segmentation is crucial for robot-assisted laparoscopic
surgery understanding. Current approaches face two challenges: (i) static image
limitations including ambiguous local feature similarities and fine-grained
structural details, and (ii) dynamic video complexities arising from rapid
instrument motion and persistent visual occlusions. While existing methods
mainly focus on spatial feature extraction, they fundamentally overlook
temporal dependencies in surgical video streams. To address this, we present
temporal asymmetric feature propagation network, a bidirectional attention
architecture enabling cross-frame feature propagation. The proposed method
contains a temporal query propagator that integrates multi-directional
consistency constraints to enhance frame-specific feature representation, and
an aggregated asymmetric feature pyramid module that preserves discriminative
features for anatomical structures and surgical instruments. Our framework
uniquely enables both temporal guidance and contextual reasoning for surgical
scene understanding. Comprehensive evaluations on two public benchmarks show
the proposed method outperforms the current SOTA methods by a large margin,
with +16.4\% mIoU on EndoVis2018 and +3.3\% mAP on Endoscapes2023. The code
will be publicly available after paper acceptance.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 03:41:23 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Yuan",
"Cheng",
""
],
[
"Ban",
"Yutong",
""
]
] |
2504.13441 | Devon Lin Professor | Anita Shahrokhian, Xinwei Deng and C. Devon Lin | Active Learning of Computer Experiment with both Quantitative and
Qualitative Inputs | arXiv admin note: text overlap with arXiv:2504.05498 | null | null | null | stat.ME | http://creativecommons.org/licenses/by/4.0/ | Computer experiments refer to the study of real systems using complex
simulation models. They have been widely used as alternatives to physical
experiments. Design and analysis of computer experiments have attracted great
attention in past three decades. The bulk of the work, however, often focus on
experiments with only quantitative inputs. In recent years, research on design
and analysis for computer experiments have gain momentum. Statistical
methodology for design, modeling and inference of such experiments have been
developed. In this chapter, we review some of those key developments, and
propose active learning approaches for modeling, optimization, contour
estimation of computer experiments with both types of inputs. Numerical studies
are conducted to evaluate the performance of the proposed methods in comparison
with other existing methods.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 03:46:50 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Shahrokhian",
"Anita",
""
],
[
"Deng",
"Xinwei",
""
],
[
"Lin",
"C. Devon",
""
]
] |
2504.13442 | Zhenyu Yu | Zhenyu Yu, Mohd. Yamani Idna Idris, Pei Wang | SatelliteCalculator: A Multi-Task Vision Foundation Model for
Quantitative Remote Sensing Inversion | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Quantitative remote sensing inversion plays a critical role in environmental
monitoring, enabling the estimation of key ecological variables such as
vegetation indices, canopy structure, and carbon stock. Although vision
foundation models have achieved remarkable progress in classification and
segmentation tasks, their application to physically interpretable regression
remains largely unexplored. Furthermore, the multi-spectral nature and
geospatial heterogeneity of remote sensing data pose significant challenges for
generalization and transferability. To address these issues, we introduce
SatelliteCalculator, the first vision foundation model tailored for
quantitative remote sensing inversion. By leveraging physically defined index
formulas, we automatically construct a large-scale dataset of over one million
paired samples across eight core ecological indicators. The model integrates a
frozen Swin Transformer backbone with a prompt-guided architecture, featuring
cross-attentive adapters and lightweight task-specific MLP decoders.
Experiments on the Open-Canopy benchmark demonstrate that SatelliteCalculator
achieves competitive accuracy across all tasks while significantly reducing
inference cost. Our results validate the feasibility of applying foundation
models to quantitative inversion, and provide a scalable framework for
task-adaptive remote sensing estimation.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 03:48:04 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Yu",
"Zhenyu",
""
],
[
"Idris",
"Mohd. Yamani Idna",
""
],
[
"Wang",
"Pei",
""
]
] |
2504.13443 | Michael Juntao Yuan | Michael J. Yuan, Carlos Campoy, Sydney Lai, James Snewin, Ju Long | Trust, but verify | null | null | null | null | cs.AI cs.DC cs.MA econ.GN q-fin.EC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Decentralized AI agent networks, such as Gaia, allows individuals to run
customized LLMs on their own computers and then provide services to the public.
However, in order to maintain service quality, the network must verify that
individual nodes are running their designated LLMs. In this paper, we
demonstrate that in a cluster of mostly honest nodes, we can detect nodes that
run unauthorized or incorrect LLM through social consensus of its peers. We
will discuss the algorithm and experimental data from the Gaia network. We will
also discuss the intersubjective validation system, implemented as an
EigenLayer AVS to introduce financial incentives and penalties to encourage
honest behavior from LLM nodes.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 03:49:53 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Yuan",
"Michael J.",
""
],
[
"Campoy",
"Carlos",
""
],
[
"Lai",
"Sydney",
""
],
[
"Snewin",
"James",
""
],
[
"Long",
"Ju",
""
]
] |
2504.13444 | Mengjie (Magie) Cheng | Mengjie (Magie) Cheng, Elie Ofek, Hema Yoganarasimhan | Balancing Engagement and Polarization: Multi-Objective Alignment of News
Content Using LLMs | 73 pages | null | null | null | econ.GN q-fin.EC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study how media firms can use LLMs to generate news content that aligns
with multiple objectives -- making content more engaging while maintaining a
preferred level of polarization/slant consistent with the firm's editorial
policy. Using news articles from The New York Times, we first show that more
engaging human-written content tends to be more polarizing. Further, naively
employing LLMs (with prompts or standard Direct Preference Optimization
approaches) to generate more engaging content can also increase polarization.
This has an important managerial and policy implication: using LLMs without
building in controls for limiting slant can exacerbate news media polarization.
We present a constructive solution to this problem based on the Multi-Objective
Direct Preference Optimization (MODPO) algorithm, a novel approach that
integrates Direct Preference Optimization with multi-objective optimization
techniques. We build on open-source LLMs and develop a new language model that
simultaneously makes content more engaging while maintaining a preferred
editorial stance. Our model achieves this by modifying content characteristics
strongly associated with polarization but that have a relatively smaller impact
on engagement. Our approach and findings apply to other settings where firms
seek to use LLMs for content creation to achieve multiple objectives, e.g.,
advertising and social media.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 03:50:56 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Mengjie",
"",
"",
"Magie"
],
[
"Cheng",
"",
""
],
[
"Ofek",
"Elie",
""
],
[
"Yoganarasimhan",
"Hema",
""
]
] |
2504.13445 | Daichi Amagata | Daichi Amagata, Kazuyoshi Aoayama, Keito Kido, Sumio Fujita | How to Mine Potentially Popular Items? A Reverse MIPS-based Approach | Accepted to SSDBM2025 | null | null | null | cs.DB | http://creativecommons.org/licenses/by-nc-nd/4.0/ | The $k$-MIPS ($k$ Maximum Inner Product Search) problem has been employed in
many fields. Recently, its reverse version, the reverse $k$-MIPS problem, has
been proposed. Given an item vector (i.e., query), it retrieves all user
vectors such that their $k$-MIPS results contain the item vector. Consider the
cardinality of a reverse $k$-MIPS result. A large cardinality means that the
item is potentially popular, because it is included in the $k$-MIPS results of
many users. This mining is important in recommender systems, market analysis,
and new item development. Motivated by this, we formulate a new problem. In
this problem, the score of each item is defined as the cardinality of its
reverse $k$-MIPS result, and the $N$ items with the highest score are
retrieved. A straightforward approach is to compute the scores of all items,
but this is clearly prohibitive for large numbers of users and items. We remove
this inefficiency issue and propose a fast algorithm for this problem. Because
the main bottleneck of the problem is to compute the score of each item, we
devise a new upper-bounding technique that is specific to our problem and
filters unnecessary score computations. We conduct extensive experiments on
real datasets and show the superiority of our algorithm over competitors.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 03:56:00 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Amagata",
"Daichi",
""
],
[
"Aoayama",
"Kazuyoshi",
""
],
[
"Kido",
"Keito",
""
],
[
"Fujita",
"Sumio",
""
]
] |
2504.13446 | Daichi Amagata | Daichi Amagata, Kazuyoshi Aoyama, Keito Kido, Sumio Fujita | Approximate Reverse $k$-Ranks Queries in High Dimensions | Accepted to SSDBM2025 | null | null | null | cs.DB | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Many objects are represented as high-dimensional vectors nowadays. In this
setting, the relevance between two objects (vectors) is usually evaluated by
their inner product. Recently, item-centric searches, which search for users
relevant to query items, have received attention and find important
applications, such as product promotion and market analysis. To support these
applications, this paper considers reverse $k$-ranks queries. Given a query
vector $\mathbf{q}$, $k$, a set $\mathbf{U}$ of user vectors, and a set
$\mathbf{P}$ of item vectors, this query retrieves the $k$ user vectors
$\mathbf{u} \in \mathbf{U}$ with the highest
$r(\mathbf{q},\mathbf{u},\mathbf{P})$, where
$r(\mathbf{q},\mathbf{u},\mathbf{P})$ shows the rank of $\mathbf{q}$ for
$\mathbf{u}$ among $\mathbf{P}$. Because efficiently computing the exact answer
for this query is difficult in high dimensions, we address the problem of
approximate reverse $k$-ranks queries. Informally, given an approximation
factor $c$, this problem allows, as an output, a user $\mathbf{u}'$ such that
$r(\mathbf{q},\mathbf{u}',\mathbf{P}) > \tau$ but
$r(\mathbf{q},\mathbf{u}',\mathbf{P}) \leq c \times \tau$, where $\tau$ is the
rank threshold for the exact answer. We propose a new algorithm for solving
this problem efficiently. Through theoretical and empirical analyses, we
confirm the efficiency and effectiveness of our algorithm.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 03:56:07 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Amagata",
"Daichi",
""
],
[
"Aoyama",
"Kazuyoshi",
""
],
[
"Kido",
"Keito",
""
],
[
"Fujita",
"Sumio",
""
]
] |
2504.13447 | Guobin Liu Dr | Erwei Li, Qianjin Ma, Weiyu Wang, Bobo Du and Guobin Liu | Laser power stabilization using conservation law in acoustic optical
modulator | 6 pages, 7 figures | null | null | null | physics.optics physics.atom-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An active method of laser power stabilization is realized utilizing an
acoustic optical modulator (AOM). Under Bragg diffraction conditions, the total
output power of AOM equals the combined power of the 0th and 1st order beams,
which are expressed as the sum of the sampling beam power and a
temperature-sensitive term. Based on this conservation law, we designed a
digital PID control system that dynamically adjusts the 1st order beam power to
maintain a stable output of the 0th order application beam. The method allows
high availability and deep engagement of the application beam. Experimental
result demonstrates that the relative power noise of controlled application
beam is reduced by a factor of 200, reaching $4 \times 10^{-6} $ Hz$^{-1/2}$ at
0.0001 Hz compared with the uncontrolled total power. Allan deviation shows
that the application beam reaches a relative power instability of 3.28$\times
10^{-6}$ at 500 s averaging time. This active digital control method of laser
power in long term can be used for applications requiring ultra-stable laser
sources, such as the atomic clocks, interferometers and gyroscopes.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 03:56:44 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Li",
"Erwei",
""
],
[
"Ma",
"Qianjin",
""
],
[
"Wang",
"Weiyu",
""
],
[
"Du",
"Bobo",
""
],
[
"Liu",
"Guobin",
""
]
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.