-
Large Language Models for Multimodal Deformable Image Registration
Authors:
Mingrui Ma,
Weijie Wang,
Jie Ning,
Jianfeng He,
Nicu Sebe,
Bruno Lepri
Abstract:
The challenge of Multimodal Deformable Image Registration (MDIR) lies in the conversion and alignment of features between images of different modalities. Generative models (GMs) cannot retain the necessary information enough from the source modality to the target one, while non-GMs struggle to align features across these two modalities. In this paper, we propose a novel coarse-to-fine MDIR framewo…
▽ More
The challenge of Multimodal Deformable Image Registration (MDIR) lies in the conversion and alignment of features between images of different modalities. Generative models (GMs) cannot retain the necessary information enough from the source modality to the target one, while non-GMs struggle to align features across these two modalities. In this paper, we propose a novel coarse-to-fine MDIR framework,LLM-Morph, which is applicable to various pre-trained Large Language Models (LLMs) to solve these concerns by aligning the deep features from different modal medical images. Specifically, we first utilize a CNN encoder to extract deep visual features from cross-modal image pairs, then we use the first adapter to adjust these tokens, and use LoRA in pre-trained LLMs to fine-tune their weights, both aimed at eliminating the domain gap between the pre-trained LLMs and the MDIR task. Third, for the alignment of tokens, we utilize other four adapters to transform the LLM-encoded tokens into multi-scale visual features, generating multi-scale deformation fields and facilitating the coarse-to-fine MDIR task. Extensive experiments in MR-CT Abdomen and SR-Reg Brain datasets demonstrate the effectiveness of our framework and the potential of pre-trained LLMs for MDIR task. Our code is availabel at: https://github.com/ninjannn/LLM-Morph.
△ Less
Submitted 20 August, 2024;
originally announced August 2024.
-
Conformal predictive intervals in survival analysis: a re-sampling approach
Authors:
Jing Qin,
Jin Piao,
Jing Ning,
Yu Shen
Abstract:
The distribution-free method of conformal prediction (Vovk et al, 2005) has gained considerable attention in computer science, machine learning, and statistics. Candes et al. (2023) extended this method to right-censored survival data, addressing right-censoring complexity by creating a covariate shift setting, extracting a subcohort of subjects with censoring times exceeding a fixed threshold. Th…
▽ More
The distribution-free method of conformal prediction (Vovk et al, 2005) has gained considerable attention in computer science, machine learning, and statistics. Candes et al. (2023) extended this method to right-censored survival data, addressing right-censoring complexity by creating a covariate shift setting, extracting a subcohort of subjects with censoring times exceeding a fixed threshold. Their approach only estimates the lower prediction bound for type I censoring, where all subjects have available censoring times regardless of their failure status. In medical applications, we often encounter more general right-censored data, observing only the minimum of failure time and censoring time. Subjects with observed failure times have unavailable censoring times. To address this, we propose a bootstrap method to construct one -- as well as two-sided conformal predictive intervals for general right-censored survival data under different working regression models. Through simulations, our method demonstrates excellent average coverage for the lower bound and good coverage for the two-sided predictive interval, regardless of working model is correctly specified or not, particularly under moderate censoring. We further extend the proposed method to several directions in medical applications. We apply this method to predict breast cancer patients' future survival times based on tumour characteristics and treatment.
△ Less
Submitted 12 August, 2024;
originally announced August 2024.
-
FACOS: Enabling Privacy Protection Through Fine-Grained Access Control with On-chain and Off-chain System
Authors:
Chao Liu,
Cankun Hou,
Tianyu Jiang,
Jianting Ning,
Hui Qiao,
Yusen Wu
Abstract:
Data-driven landscape across finance, government, and healthcare, the continuous generation of information demands robust solutions for secure storage, efficient dissemination, and fine-grained access control. Blockchain technology emerges as a significant tool, offering decentralized storage while upholding the tenets of data security and accessibility. However, on-chain and off-chain strategies…
▽ More
Data-driven landscape across finance, government, and healthcare, the continuous generation of information demands robust solutions for secure storage, efficient dissemination, and fine-grained access control. Blockchain technology emerges as a significant tool, offering decentralized storage while upholding the tenets of data security and accessibility. However, on-chain and off-chain strategies are still confronted with issues such as untrusted off-chain data storage, absence of data ownership, limited access control policy for clients, and a deficiency in data privacy and auditability. To solve these challenges, we propose a permissioned blockchain-based privacy-preserving fine-grained access control on-chain and off-chain system, namely FACOS. We applied three fine-grained access control solutions and comprehensively analyzed them in different aspects, which provides an intuitive perspective for system designers and clients to choose the appropriate access control method for their systems. Compared to similar work that only stores encrypted data in centralized or non-fault-tolerant IPFS systems, we enhanced off-chain data storage security and robustness by utilizing a highly efficient and secure asynchronous Byzantine fault tolerance (BFT) protocol in the off-chain environment. As each of the clients needs to be verified and authorized before accessing the data, we involved the Trusted Execution Environment (TEE)-based solution to verify the credentials of clients. Additionally, our evaluation results demonstrated that our system offers better scalability and practicality than other state-of-the-art designs.
△ Less
Submitted 5 June, 2024;
originally announced June 2024.
-
A Converse to the Skoda $L^2$ Division Theorem
Authors:
Zhi Li,
Xiankui Meng,
Jiafu Ning,
Xiangyu Zhou
Abstract:
In this paper, we present a converse to a version of Skoda's $L^2$ division theorem by investigating the solvability of $\bar{\partial}$ equations of a specific type.
In this paper, we present a converse to a version of Skoda's $L^2$ division theorem by investigating the solvability of $\bar{\partial}$ equations of a specific type.
△ Less
Submitted 30 July, 2024; v1 submitted 28 May, 2024;
originally announced May 2024.
-
Neural Network Enhanced Single-Photon Fock State Tomography
Authors:
Hsien-Yi Hsieh,
Yi-Ru Chen,
Jingyu Ning,
Hsun-Chung Wu,
Hua Li Chen,
Zi-Hao Shi,
Po-Han Wang,
Ole Steuernagel,
Chien-Ming Wu,
Ray-Kuang Lee
Abstract:
Even though heralded single-photon sources have been generated routinely through the spontaneous parametric down conversion, vacuum and multiple photon states are unavoidably involved. With machine-learning, we report the experimental implementation of single-photon quantum state tomography by directly estimating target parameters. Compared to the Hanbury Brown and Twiss (HBT) measurements only wi…
▽ More
Even though heralded single-photon sources have been generated routinely through the spontaneous parametric down conversion, vacuum and multiple photon states are unavoidably involved. With machine-learning, we report the experimental implementation of single-photon quantum state tomography by directly estimating target parameters. Compared to the Hanbury Brown and Twiss (HBT) measurements only with clicked events recorded, our neural network enhanced quantum state tomography characterizes the photon number distribution for all possible photon number states from the balanced homodyne detectors. By using the histogram-based architecture, a direct parameter estimation on the negativity in Wigner's quasi-probability phase space is demonstrated. Such a fast, robust, and precise quantum state tomography provides us a crucial diagnostic toolbox for the applications with single-photon Fock states and other non-Gaussisan quantum states.
△ Less
Submitted 5 May, 2024;
originally announced May 2024.
-
Constraints on the Blazar-Boosted Dark Matter from the CDEX-10 Experiment
Authors:
R. Xu,
L. T. Yang,
Q. Yue,
K. J. Kang,
Y. J. Li,
H. P. An,
Greeshma C.,
J. P. Chang,
Y. H. Chen,
J. P. Cheng,
W. H. Dai,
Z. Deng,
C. H. Fang,
X. P. Geng,
H. Gong,
Q. J. Guo,
T. Guo,
X. Y. Guo,
L. He,
S. M. He,
J. W. Hu,
H. X. Huang,
T. C. Huang,
L. Jiang,
S. Karmakar
, et al. (59 additional authors not shown)
Abstract:
We report new constraints on light dark matter (DM) boosted by blazars using the 205.4 kg day data from the CDEX-10 experiment located at the China Jinping Underground Laboratory. Two representative blazars, TXS 0506+56 and BL Lacertae are studied. The results derived from TXS 0506+56 exclude DM-nucleon elastic scattering cross sections from $4.6\times 10^{-33}\ \rm cm^2$ to…
▽ More
We report new constraints on light dark matter (DM) boosted by blazars using the 205.4 kg day data from the CDEX-10 experiment located at the China Jinping Underground Laboratory. Two representative blazars, TXS 0506+56 and BL Lacertae are studied. The results derived from TXS 0506+56 exclude DM-nucleon elastic scattering cross sections from $4.6\times 10^{-33}\ \rm cm^2$ to $1\times10^{-26}\ \rm cm^2$ for DM masses between 10 keV and 1 GeV, and the results derived from BL Lacertae exclude DM-nucleon elastic scattering cross sections from $2.4\times 10^{-34}\ \rm cm^2$ to $1\times10^{-26}\ \rm cm^2$ for the same range of DM masses. The constraints correspond to the best sensitivities among solid-state detector experiments in the sub-MeV mass range.
△ Less
Submitted 29 March, 2024;
originally announced March 2024.
-
Probing Dark Matter Particles from Evaporating Primordial Black Holes via Electron Scattering in the CDEX-10 Experiment
Authors:
Z. H. Zhang,
L. T. Yang,
Q. Yue,
K. J. Kang,
Y. J. Li,
H. P. An,
Greeshma C.,
J. P. Chang,
Y. H. Chen,
J. P. Cheng,
W. H. Dai,
Z. Deng,
C. H. Fang,
X. P. Geng,
H. Gong,
Q. J. Guo,
T. Guo,
X. Y. Guo,
L. He,
S. M. He,
J. W. Hu,
H. X. Huang,
T. C. Huang,
L. Jiang,
S. Karmakar
, et al. (59 additional authors not shown)
Abstract:
Dark matter (DM) is a major constituent of the Universe. However, no definite evidence of DM particles (denoted as ``$χ$") has been found in DM direct detection (DD) experiments to date. There is a novel concept that detecting $χ$ from evaporating primordial black holes (PBHs). We search for $χ$ emitted from PBHs by investigating their interaction with target electrons. The examined PBH masses ran…
▽ More
Dark matter (DM) is a major constituent of the Universe. However, no definite evidence of DM particles (denoted as ``$χ$") has been found in DM direct detection (DD) experiments to date. There is a novel concept that detecting $χ$ from evaporating primordial black holes (PBHs). We search for $χ$ emitted from PBHs by investigating their interaction with target electrons. The examined PBH masses range from 1$\times$10$^{15}$ to 7$\times$10$^{16}$ g under the current limits of PBH abundance $f_{PBH}$. Using 205.4 kg$\cdot$day data obtained from the CDEX-10 experiment conducted in the China Jinping Underground Laboratory, we exclude the $χ$--electron ($χ$--$e$) elastic-scattering cross section $σ_{χe} \sim 5\times10^{-29}$ cm$^2$ for $χ$ with a mass $m_χ\lesssim$ 0.1 keV from our results. If ($m_χ$, $σ_{χe}$) can be determined in the future, DD experiments are expected to impose strong constraints on $f_{PBH}$ for large $M_{PBH}$s.
△ Less
Submitted 29 March, 2024;
originally announced March 2024.
-
Fluent: Round-efficient Secure Aggregation for Private Federated Learning
Authors:
Xincheng Li,
Jianting Ning,
Geong Sen Poh,
Leo Yu Zhang,
Xinchun Yin,
Tianwei Zhang
Abstract:
Federated learning (FL) facilitates collaborative training of machine learning models among a large number of clients while safeguarding the privacy of their local datasets. However, FL remains susceptible to vulnerabilities such as privacy inference and inversion attacks. Single-server secure aggregation schemes were proposed to address these threats. Nonetheless, they encounter practical constra…
▽ More
Federated learning (FL) facilitates collaborative training of machine learning models among a large number of clients while safeguarding the privacy of their local datasets. However, FL remains susceptible to vulnerabilities such as privacy inference and inversion attacks. Single-server secure aggregation schemes were proposed to address these threats. Nonetheless, they encounter practical constraints due to their round and communication complexities. This work introduces Fluent, a round and communication-efficient secure aggregation scheme for private FL. Fluent has several improvements compared to state-of-the-art solutions like Bell et al. (CCS 2020) and Ma et al. (SP 2023): (1) it eliminates frequent handshakes and secret sharing operations by efficiently reusing the shares across multiple training iterations without leaking any private information; (2) it accomplishes both the consistency check and gradient unmasking in one logical step, thereby reducing another round of communication. With these innovations, Fluent achieves the fewest communication rounds (i.e., two in the collection phase) in the malicious server setting, in contrast to at least three rounds in existing schemes. This significantly minimizes the latency for geographically distributed clients; (3) Fluent also introduces Fluent-Dynamic with a participant selection algorithm and an alternative secret sharing scheme. This can facilitate dynamic client joining and enhance the system flexibility and scalability. We implemented Fluent and compared it with existing solutions. Experimental results show that Fluent improves the computational cost by at least 75% and communication overhead by at least 25% for normal clients. Fluent also reduces the communication overhead for the server at the expense of a marginal increase in computational cost.
△ Less
Submitted 10 March, 2024;
originally announced March 2024.
-
A Direct Sampling Method and Its Integration with Deep Learning for Inverse Scattering Problems with Phaseless Data
Authors:
Jianfeng Ning,
Fuqun Han,
Jun Zou
Abstract:
We consider in this work an inverse acoustic scattering problem when only phaseless data is available. The inverse problem is highly nonlinear and ill-posed due to the lack of the phase information. Solving inverse scattering problems with phaseless data is important in applications as the collection of physically acceptable phased data is usually difficult and expensive. A novel direct sampling m…
▽ More
We consider in this work an inverse acoustic scattering problem when only phaseless data is available. The inverse problem is highly nonlinear and ill-posed due to the lack of the phase information. Solving inverse scattering problems with phaseless data is important in applications as the collection of physically acceptable phased data is usually difficult and expensive. A novel direct sampling method (DSM) will be developed to effectively estimate the locations and geometric shapes of the unknown scatterers from phaseless data generated by a very limited number of incident waves. With a careful theoretical analysis of the behavior of the index function and some representative numerical examples, the new DSM is shown to be computationally efficient, easy to implement, robust to large noise, and does not require any prior knowledge of the unknown scatterers. Furthermore, to fully exploit the index functions obtained from the DSM, we also propose to integrate the DSM with a deep learning technique (DSM-DL) to achieve high-quality reconstructions. Several challenging and representative numerical experiments are carried out to demonstrate the accuracy and robustness of reconstructions by DSM-DL. The DSM-DL networks trained by phased data are further theoretically and numerically shown to be able to solve problems with phaseless data. Additionally, our numerical experiments also show the DSM-DL can solve inverse scattering problems with mixed types of scatterers, which renders its applications in many important practical scenarios.
△ Less
Submitted 4 March, 2024;
originally announced March 2024.
-
Continual Learning with Pre-Trained Models: A Survey
Authors:
Da-Wei Zhou,
Hai-Long Sun,
Jingyi Ning,
Han-Jia Ye,
De-Chuan Zhan
Abstract:
Nowadays, real-world applications often face streaming data, which requires the learning system to absorb new knowledge as data evolves. Continual Learning (CL) aims to achieve this goal and meanwhile overcome the catastrophic forgetting of former knowledge when learning new ones. Typical CL methods build the model from scratch to grow with incoming data. However, the advent of the pre-trained mod…
▽ More
Nowadays, real-world applications often face streaming data, which requires the learning system to absorb new knowledge as data evolves. Continual Learning (CL) aims to achieve this goal and meanwhile overcome the catastrophic forgetting of former knowledge when learning new ones. Typical CL methods build the model from scratch to grow with incoming data. However, the advent of the pre-trained model (PTM) era has sparked immense research interest, particularly in leveraging PTMs' robust representational capabilities. This paper presents a comprehensive survey of the latest advancements in PTM-based CL. We categorize existing methodologies into three distinct groups, providing a comparative analysis of their similarities, differences, and respective advantages and disadvantages. Additionally, we offer an empirical study contrasting various state-of-the-art methods to highlight concerns regarding fairness in comparisons. The source code to reproduce these evaluations is available at: https://github.com/sun-hailong/LAMDA-PILOT
△ Less
Submitted 23 April, 2024; v1 submitted 29 January, 2024;
originally announced January 2024.
-
Deep Dynamics: Vehicle Dynamics Modeling with a Physics-Informed Neural Network for Autonomous Racing
Authors:
John Chrosniak,
Jingyun Ning,
Madhur Behl
Abstract:
Autonomous racing is a critical research area for autonomous driving, presenting significant challenges in vehicle dynamics modeling, such as balancing model precision and computational efficiency at high speeds (>280kmph), where minor errors in modeling have severe consequences. Existing physics-based models for vehicle dynamics require elaborate testing setups and tuning, which are hard to imple…
▽ More
Autonomous racing is a critical research area for autonomous driving, presenting significant challenges in vehicle dynamics modeling, such as balancing model precision and computational efficiency at high speeds (>280kmph), where minor errors in modeling have severe consequences. Existing physics-based models for vehicle dynamics require elaborate testing setups and tuning, which are hard to implement, time-intensive, and cost-prohibitive. Conversely, purely data-driven approaches do not generalize well and cannot adequately ensure physical constraints on predictions. This paper introduces Deep Dynamics, a physics-informed neural network (PINN) for vehicle dynamics modeling of an autonomous racecar. It combines physics coefficient estimation and dynamical equations to accurately predict vehicle states at high speeds and includes a unique Physics Guard layer to ensure internal coefficient estimates remain within their nominal physical ranges. Open-loop and closed-loop performance assessments, using a physics-based simulator and full-scale autonomous Indy racecar data, highlight Deep Dynamics as a promising approach for modeling racecar vehicle dynamics.
△ Less
Submitted 7 December, 2023;
originally announced December 2023.
-
BCN: Batch Channel Normalization for Image Classification
Authors:
Afifa Khaled,
Chao Li,
Jia Ning,
Kun He
Abstract:
Normalization techniques have been widely used in the field of deep learning due to their capability of enabling higher learning rates and are less careful in initialization. However, the effectiveness of popular normalization technologies is typically limited to specific areas. Unlike the standard Batch Normalization (BN) and Layer Normalization (LN), where BN computes the mean and variance along…
▽ More
Normalization techniques have been widely used in the field of deep learning due to their capability of enabling higher learning rates and are less careful in initialization. However, the effectiveness of popular normalization technologies is typically limited to specific areas. Unlike the standard Batch Normalization (BN) and Layer Normalization (LN), where BN computes the mean and variance along the (N,H,W) dimensions and LN computes the mean and variance along the (C,H,W) dimensions (N, C, H and W are the batch, channel, spatial height and width dimension, respectively), this paper presents a novel normalization technique called Batch Channel Normalization (BCN). To exploit both the channel and batch dependence and adaptively and combine the advantages of BN and LN based on specific datasets or tasks, BCN separately normalizes inputs along the (N, H, W) and (C, H, W) axes, then combines the normalized outputs based on adaptive parameters. As a basic block, BCN can be easily integrated into existing models for various applications in the field of computer vision. Empirical results show that the proposed technique can be seamlessly applied to various versions of CNN or Vision Transformer architecture. The code is publicly available at https://github.com/AfifaKhaled/BatchChannel-Normalization
△ Less
Submitted 1 December, 2023;
originally announced December 2023.
-
Taiyi: A Bilingual Fine-Tuned Large Language Model for Diverse Biomedical Tasks
Authors:
Ling Luo,
Jinzhong Ning,
Yingwen Zhao,
Zhijun Wang,
Zeyuan Ding,
Peng Chen,
Weiru Fu,
Qinyu Han,
Guangtao Xu,
Yunzhi Qiu,
Dinghao Pan,
Jiru Li,
Hao Li,
Wenduo Feng,
Senbo Tu,
Yuqi Liu,
Zhihao Yang,
Jian Wang,
Yuanyuan Sun,
Hongfei Lin
Abstract:
Objective: Most existing fine-tuned biomedical large language models (LLMs) focus on enhancing performance in monolingual biomedical question answering and conversation tasks. To investigate the effectiveness of the fine-tuned LLMs on diverse biomedical NLP tasks in different languages, We present Taiyi, a bilingual fine-tuned LLM for diverse biomedical tasks. Materials and Methods: We first curat…
▽ More
Objective: Most existing fine-tuned biomedical large language models (LLMs) focus on enhancing performance in monolingual biomedical question answering and conversation tasks. To investigate the effectiveness of the fine-tuned LLMs on diverse biomedical NLP tasks in different languages, We present Taiyi, a bilingual fine-tuned LLM for diverse biomedical tasks. Materials and Methods: We first curated a comprehensive collection of 140 existing biomedical text mining datasets (102 English and 38 Chinese datasets) across over 10 task types. Subsequently, a two-stage strategy is proposed for supervised fine-tuning to optimize the model performance across varied tasks. Results: Experimental results on 13 test sets covering named entity recognition, relation extraction, text classification, question answering tasks demonstrate that Taiyi achieves superior performance compared to general LLMs. The case study involving additional biomedical NLP tasks further shows Taiyi's considerable potential for bilingual biomedical multi-tasking. Conclusion: Leveraging rich high-quality biomedical corpora and developing effective fine-tuning strategies can significantly improve the performance of LLMs within the biomedical domain. Taiyi shows the bilingual multi-tasking capability through supervised fine-tuning. However, those tasks such as information extraction that are not generation tasks in nature remain challenging for LLM-based generative approaches, and they still underperform the conventional discriminative approaches of smaller language models.
△ Less
Submitted 19 December, 2023; v1 submitted 20 November, 2023;
originally announced November 2023.
-
Electrical Impedance Tomography: A Fair Comparative Study on Deep Learning and Analytic-based Approaches
Authors:
Derick Nganyu Tanyu,
Jianfeng Ning,
Andreas Hauptmann,
Bangti Jin,
Peter Maass
Abstract:
Electrical Impedance Tomography (EIT) is a powerful imaging technique with diverse applications, e.g., medical diagnosis, industrial monitoring, and environmental studies. The EIT inverse problem is about inferring the internal conductivity distribution of an object from measurements taken on its boundary. It is severely ill-posed, necessitating advanced computational methods for accurate image re…
▽ More
Electrical Impedance Tomography (EIT) is a powerful imaging technique with diverse applications, e.g., medical diagnosis, industrial monitoring, and environmental studies. The EIT inverse problem is about inferring the internal conductivity distribution of an object from measurements taken on its boundary. It is severely ill-posed, necessitating advanced computational methods for accurate image reconstructions. Recent years have witnessed significant progress, driven by innovations in analytic-based approaches and deep learning. This review explores techniques for solving the EIT inverse problem, focusing on the interplay between contemporary deep learning-based strategies and classical analytic-based methods. Four state-of-the-art deep learning algorithms are rigorously examined, harnessing the representational capabilities of deep neural networks to reconstruct intricate conductivity distributions. In parallel, two analytic-based methods, rooted in mathematical formulations and regularisation techniques, are dissected for their strengths and limitations. These methodologies are evaluated through various numerical experiments, encompassing diverse scenarios that reflect real-world complexities. A suite of performance metrics is employed to assess the efficacy of these methods. These metrics collectively provide a nuanced understanding of the methods' ability to capture essential features and delineate complex conductivity patterns. One novel feature of the study is the incorporation of variable conductivity scenarios, introducing a level of heterogeneity that mimics textured inclusions. This departure from uniform conductivity assumptions mimics realistic scenarios where tissues or materials exhibit spatially varying electrical properties. Exploring how each method responds to such variable conductivity scenarios opens avenues for understanding their robustness and adaptability.
△ Less
Submitted 28 October, 2023;
originally announced October 2023.
-
FP8-LM: Training FP8 Large Language Models
Authors:
Houwen Peng,
Kan Wu,
Yixuan Wei,
Guoshuai Zhao,
Yuxiang Yang,
Ze Liu,
Yifan Xiong,
Ziyue Yang,
Bolin Ni,
Jingcheng Hu,
Ruihang Li,
Miaosen Zhang,
Chen Li,
Jia Ning,
Ruizhe Wang,
Zheng Zhang,
Shuguang Liu,
Joe Chau,
Han Hu,
Peng Cheng
Abstract:
In this paper, we explore FP8 low-bit data formats for efficient training of large language models (LLMs). Our key insight is that most variables, such as gradients and optimizer states, in LLM training can employ low-precision data formats without compromising model accuracy and requiring no changes to hyper-parameters. Specifically, we propose a new FP8 automatic mixed-precision framework for tr…
▽ More
In this paper, we explore FP8 low-bit data formats for efficient training of large language models (LLMs). Our key insight is that most variables, such as gradients and optimizer states, in LLM training can employ low-precision data formats without compromising model accuracy and requiring no changes to hyper-parameters. Specifically, we propose a new FP8 automatic mixed-precision framework for training LLMs. This framework offers three levels of FP8 utilization to streamline mixed-precision and distributed parallel training for LLMs. It gradually incorporates 8-bit gradients, optimizer states, and distributed learning in an incremental manner. Experiment results show that, during the training of GPT-175B model on H100 GPU platform, our FP8 mixed-precision training framework not only achieved a remarkable 39% reduction in real memory usage but also ran 75% faster than the widely adopted BF16 framework (i.e., Megatron-LM), surpassing the speed of Nvidia Transformer Engine by 37%. This largely reduces the training costs for large foundation models. Furthermore, our FP8 mixed-precision training methodology is generic. It can be seamlessly applied to other tasks such as LLM instruction tuning and reinforcement learning with human feedback, offering savings in fine-tuning expenses. Our FP8 low-precision training framework is open-sourced at {https://github.com/Azure/MS-AMP}{aka.ms/MS.AMP}.
△ Less
Submitted 19 December, 2023; v1 submitted 27 October, 2023;
originally announced October 2023.
-
The Importance of Anti-Aliasing in Tiny Object Detection
Authors:
Jinlai Ning,
Michael Spratling
Abstract:
Tiny object detection has gained considerable attention in the research community owing to the frequent occurrence of tiny objects in numerous critical real-world scenarios. However, convolutional neural networks (CNNs) used as the backbone for object detection architectures typically neglect Nyquist's sampling theorem during down-sampling operations, resulting in aliasing and degraded performance…
▽ More
Tiny object detection has gained considerable attention in the research community owing to the frequent occurrence of tiny objects in numerous critical real-world scenarios. However, convolutional neural networks (CNNs) used as the backbone for object detection architectures typically neglect Nyquist's sampling theorem during down-sampling operations, resulting in aliasing and degraded performance. This is likely to be a particular issue for tiny objects that occupy very few pixels and therefore have high spatial frequency features. This paper applied an existing approach WaveCNet for anti-aliasing to tiny object detection. WaveCNet addresses aliasing by replacing standard down-sampling processes in CNNs with Wavelet Pooling (WaveletPool) layers, effectively suppressing aliasing. We modify the original WaveCNet to apply WaveletPool in a consistent way in both pathways of the residual blocks in ResNets. Additionally, we also propose a bottom-heavy version of the backbone, which further improves the performance of tiny object detection while also reducing the required number of parameters by almost half. Experimental results on the TinyPerson, WiderFace, and DOTA datasets demonstrate the importance of anti-aliasing in tiny object detection and the effectiveness of the proposed method which achieves new state-of-the-art results on all three datasets. Codes and experiment results are released at https://github.com/freshn/Anti-aliasing-Tiny-Object-Detection.git.
△ Less
Submitted 22 October, 2023;
originally announced October 2023.
-
Comparing first-principles density functionals plus corrections for the lattice dynamics of YBa$_2$Cu$_3$O$_6$
Authors:
Jinliang Ning,
Christopher Lane,
Bernardo Barbiellini,
Robert S. Markiewicz,
Arun Bansil,
Adrienn Ruzsinszky,
John P. Perdew,
Jianwei Sun
Abstract:
The enigmatic mechanism underlying unconventional high-temperature superconductivity, especially the role of lattice dynamics, has remained a subject of debate. Theoretical insights have long been hindered due to the lack of an accurate first-principles description of the lattice dynamics of cuprates. Recently, using the r2SCAN meta-GGA functional, we were able to achieve accurate phonon spectra o…
▽ More
The enigmatic mechanism underlying unconventional high-temperature superconductivity, especially the role of lattice dynamics, has remained a subject of debate. Theoretical insights have long been hindered due to the lack of an accurate first-principles description of the lattice dynamics of cuprates. Recently, using the r2SCAN meta-GGA functional, we were able to achieve accurate phonon spectra of an insulating cuprate YBa$_2$Cu$_3$O$_6$, and discover significant magnetoelastic coupling in experimentally interesting Cu-O bond stretching optical modes [Ning et al., Phys. Rev. B 107, 045126 (2023)]. We extend this work by comparing PBE and r2SCAN performances with corrections from the on-site Hubbard U and the D4 van der Waals (vdW) methods, aiming at further understanding on both the materials science side and the density functional side. We demonstrate the importance of vdW and self-interaction corrections for accurate first-principles YBa2 Cu3 O6 lattice dynamics. Since r2SCAN by itself partially accounts for these effects, the good performance of r2SCAN is now more fully explained. In addition, the performances of the Tao-Mo series of meta-GGAs, which are constructed in a different way from SCAN/r2SCAN, are also compared and discussed.
△ Less
Submitted 14 February, 2024; v1 submitted 18 October, 2023;
originally announced October 2023.
-
Experimental Limits on Solar Reflected Dark Matter with a New Approach on Accelerated-Dark-Matter-Electron Analysis in Semiconductors
Authors:
Z. Y. Zhang,
L. T. Yang,
Q. Yue,
K. J. Kang,
Y. J. Li,
H. P. An,
Greeshma C.,
J. P. Chang,
Y. H. Chen,
J. P. Cheng,
W. H. Dai,
Z. Deng,
C. H. Fang,
X. P. Geng,
H. Gong,
Q. J. Guo,
T. Guo,
X. Y. Guo,
L. He,
S. M. He,
J. W. Hu,
H. X. Huang,
T. C. Huang,
L. Jiang,
S. Karmakar
, et al. (59 additional authors not shown)
Abstract:
Recently a dark matter-electron (DM-electron) paradigm has drawn much attention. Models beyond the standard halo model describing DM accelerated by high energy celestial bodies are under intense examination as well. In this Letter, a velocity components analysis (VCA) method dedicated to swift analysis of accelerated DM-electron interactions via semiconductor detectors is proposed and the first HP…
▽ More
Recently a dark matter-electron (DM-electron) paradigm has drawn much attention. Models beyond the standard halo model describing DM accelerated by high energy celestial bodies are under intense examination as well. In this Letter, a velocity components analysis (VCA) method dedicated to swift analysis of accelerated DM-electron interactions via semiconductor detectors is proposed and the first HPGe detector-based accelerated DM-electron analysis is realized. Utilizing the method, the first germanium based constraint on sub-GeV solar reflected DM-electron interaction is presented with the 205.4 kg$\cdot$day dataset from the CDEX-10 experiment. In the heavy mediator scenario, our result excels in the mass range of 5$-$15 keV/$c^2$, achieving a 3 orders of magnitude improvement comparing with previous semiconductor experiments. In the light mediator scenario, the strongest laboratory constraint for DM lighter than 0.1 MeV/$c^2$ is presented. The result proves the feasibility and demonstrates the vast potential of the VCA technique in future accelerated DM-electron analyses with semiconductor detectors.
△ Less
Submitted 24 April, 2024; v1 submitted 26 September, 2023;
originally announced September 2023.
-
Assessing r2SCAN meta-GGA functional for structural parameters, cohesive energy, mechanical modulus and thermophysical properties of 3d, 4d and 5d transition metals
Authors:
Haoliang Liu,
Xue Bai,
Jingliang Ning,
Yuxuan Hou,
Zifeng Song,
Akilan Ramasamy,
Ruiqi Zhang,
Yefei Li,
Jianwei Sun,
Bing Xiao
Abstract:
The recent development of the accurate and efficient semilocal density functionals on the third rung of Jacob's ladder of density functional theory such as the revised regularized strongly constrained and appropriately normed (r2SCAN) density functional could enable the rapid and highly reliable prediction of the elasticity and temperature dependence of thermophysical parameters of refractory elem…
▽ More
The recent development of the accurate and efficient semilocal density functionals on the third rung of Jacob's ladder of density functional theory such as the revised regularized strongly constrained and appropriately normed (r2SCAN) density functional could enable the rapid and highly reliable prediction of the elasticity and temperature dependence of thermophysical parameters of refractory elements and their intermetallic compounds using quasi-harmonic approximation (QHA). Here, we present a comparative evaluation of the equilibrium cell volumes, cohesive energy, mechanical moduli, and thermophysical properties (Debye temperature and thermal expansion coefficient) for 22 transition metals using semilocal density functionals, including local density approximation (LDA), the Perdew-Burke-Ernzerhof (PBE) and PBEsol generalized gradient approximations (GGA), and the r2SCAN meta-GGA. PBEsol and r2SCAN deliver the same level of accuracies for structural, mechanical and thermophysical properties. Otherwise, PBE and r2SCAN perform better than LDA and PBEsol for calculating cohesive energies of transition metals. Among the tested density functionals, r2SCAN provides an overall well-balanced performance for reliably computing the cell volumes, cohesive energies, mechanical properties, and thermophysical properties of various 3d, 4d, and 5d transition metals using QHA. Therefore, we recommend that r2SCAN could be employed as a workhorse method to evaluate the thermophysical properties of transition metal compounds and alloys in the high throughput workflows.
△ Less
Submitted 21 September, 2023;
originally announced September 2023.
-
Approximation and extension of Hermitian metrics on holomorphic vector bundles over Stein manifolds
Authors:
Fusheng Deng,
Jiafu Ning,
Zhiwei Wang,
Xiangyu Zhou
Abstract:
We show that a singular Hermitian metric on a holomorphic vector bundle over a Stein manifold which is negative in the sense of Griffiths (resp. Nakano) can be approximated by a sequence of smooth Hermitian metrics with the same curvature negativity. We also show that a smooth Hermitian metric on a holomorphic vector bundle over a Stein manifold restricted to a submanifold which is negative in the…
▽ More
We show that a singular Hermitian metric on a holomorphic vector bundle over a Stein manifold which is negative in the sense of Griffiths (resp. Nakano) can be approximated by a sequence of smooth Hermitian metrics with the same curvature negativity. We also show that a smooth Hermitian metric on a holomorphic vector bundle over a Stein manifold restricted to a submanifold which is negative in the sense of Griffiths (resp. Nakano) can be extended to the whole bundle with the same curvature negativity.
△ Less
Submitted 10 September, 2023;
originally announced September 2023.
-
Projected WIMP sensitivity of the CDEX-50 dark matter experiment
Authors:
X. P. Geng,
L. T. Yang,
Q. Yue,
K. J. Kang,
Y. J. Li,
H. P. An,
Greeshma C.,
J. P. Chang,
Y. H. Chen,
J. P. Cheng,
W. H. Dai,
Z. Deng,
C. H. Fang,
H. Gong,
Q. J. Guo,
T. Guo,
X. Y. Guo,
L. He,
S. M. He,
J. W. Hu,
H. X. Huang,
T. C. Huang,
L. Jiang,
S. Karmakar,
H. B. Li
, et al. (59 additional authors not shown)
Abstract:
CDEX-50 is a next-generation project of the China Dark Matter Experiment (CDEX) that aims to search for dark matter using a 50-kg germanium detector array. This paper comprises a thorough summary of the CDEX-50 dark matter experiment, including an investigation of potential background sources and the development of a background model. Based on the baseline model, the projected sensitivity of weakl…
▽ More
CDEX-50 is a next-generation project of the China Dark Matter Experiment (CDEX) that aims to search for dark matter using a 50-kg germanium detector array. This paper comprises a thorough summary of the CDEX-50 dark matter experiment, including an investigation of potential background sources and the development of a background model. Based on the baseline model, the projected sensitivity of weakly interacting massive particle (WIMP) is also presented. The expected background level within the energy region of interest, set to 2--2.5 keVee, is $\sim$0.01 counts keVee$^{-1}$ kg$^{-1}$ day$^{-1}$. At 90\% confidence level, the expected sensitivity to spin-independent WIMP-nucleon couplings is estimated to reach a cross-section of 5.1 $\times$ 10$^{-45}$ cm$^{2}$ for a WIMP mass of 5 GeV/c$^{2}$ with an exposure objective of 150 kg$\cdot$year and an analysis threshold of 160 eVee. This science goal will correspond to the most sensitive results for WIMPs with a mass of 2.2--8 GeV/c$^{2}$.
△ Less
Submitted 4 July, 2024; v1 submitted 4 September, 2023;
originally announced September 2023.
-
Human-to-Human Interaction Detection
Authors:
Zhenhua Wang,
Kaining Ying,
Jiajun Meng,
Jifeng Ning
Abstract:
A comprehensive understanding of interested human-to-human interactions in video streams, such as queuing, handshaking, fighting and chasing, is of immense importance to the surveillance of public security in regions like campuses, squares and parks. Different from conventional human interaction recognition, which uses choreographed videos as inputs, neglects concurrent interactive groups, and per…
▽ More
A comprehensive understanding of interested human-to-human interactions in video streams, such as queuing, handshaking, fighting and chasing, is of immense importance to the surveillance of public security in regions like campuses, squares and parks. Different from conventional human interaction recognition, which uses choreographed videos as inputs, neglects concurrent interactive groups, and performs detection and recognition in separate stages, we introduce a new task named human-to-human interaction detection (HID). HID devotes to detecting subjects, recognizing person-wise actions, and grouping people according to their interactive relations, in one model. First, based on the popular AVA dataset created for action detection, we establish a new HID benchmark, termed AVA-Interaction (AVA-I), by adding annotations on interactive relations in a frame-by-frame manner. AVA-I consists of 85,254 frames and 86,338 interactive groups, and each image includes up to 4 concurrent interactive groups. Second, we present a novel baseline approach SaMFormer for HID, containing a visual feature extractor, a split stage which leverages a Transformer-based model to decode action instances and interactive groups, and a merging stage which reconstructs the relationship between instances and groups. All SaMFormer components are jointly trained in an end-to-end manner. Extensive experiments on AVA-I validate the superiority of SaMFormer over representative methods. The dataset and code will be made public to encourage more follow-up studies.
△ Less
Submitted 11 August, 2023; v1 submitted 1 July, 2023;
originally announced July 2023.
-
Evaluating Similitude and Robustness of Deep Image Denoising Models via Adversarial Attack
Authors:
Jie Ning,
Jiebao Sun,
Yao Li,
Zhichang Guo,
Wangmeng Zuo
Abstract:
Deep neural networks (DNNs) have shown superior performance comparing to traditional image denoising algorithms. However, DNNs are inevitably vulnerable while facing adversarial attacks. In this paper, we propose an adversarial attack method named denoising-PGD which can successfully attack all the current deep denoising models while keep the noise distribution almost unchanged. We surprisingly fi…
▽ More
Deep neural networks (DNNs) have shown superior performance comparing to traditional image denoising algorithms. However, DNNs are inevitably vulnerable while facing adversarial attacks. In this paper, we propose an adversarial attack method named denoising-PGD which can successfully attack all the current deep denoising models while keep the noise distribution almost unchanged. We surprisingly find that the current mainstream non-blind denoising models (DnCNN, FFDNet, ECNDNet, BRDNet), blind denoising models (DnCNN-B, Noise2Noise, RDDCNN-B, FAN), plug-and-play (DPIR, CurvPnP) and unfolding denoising models (DeamNet) almost share the same adversarial sample set on both grayscale and color images, respectively. Shared adversarial sample set indicates that all these models are similar in term of local behaviors at the neighborhood of all the test samples. Thus, we further propose an indicator to measure the local similarity of models, called robustness similitude. Non-blind denoising models are found to have high robustness similitude across each other, while hybrid-driven models are also found to have high robustness similitude with pure data-driven non-blind denoising models. According to our robustness assessment, data-driven non-blind denoising models are the most robust. We use adversarial training to complement the vulnerability to adversarial attacks. Moreover, the model-driven image denoising BM3D shows resistance on adversarial attacks.
△ Less
Submitted 6 July, 2023; v1 submitted 28 June, 2023;
originally announced June 2023.
-
Generation of heralded optical `Schroedinger cat' states by photon-addition
Authors:
Yi-Ru Chen,
Hsien-Yi Hsieh,
Jingyu Ning,
Hsun-Chung Wu,
Hua Li Chen,
Zi-Hao Shi,
Popo Yang,
Ole Steuernagel,
Chien-Ming Wu,
Ray-Kuang Lee
Abstract:
Optical "Schrödinger cat" states, the non-classical superposition of two quasi-classical coherent states, serve as a basis for gedanken experiments testing quantum physics on mesoscopic scales and are increasingly recognized as a resource for quantum information processing. Here, we report the first experimental realization of optical "Schrödinger cats" by adding a photon to a squeezed vacuum stat…
▽ More
Optical "Schrödinger cat" states, the non-classical superposition of two quasi-classical coherent states, serve as a basis for gedanken experiments testing quantum physics on mesoscopic scales and are increasingly recognized as a resource for quantum information processing. Here, we report the first experimental realization of optical "Schrödinger cats" by adding a photon to a squeezed vacuum state, so far only photon-subtraction protocols have been realized. Photon-addition gives us the advantage of using heralded signal photons as experimental triggers, and we can generate "Schrödinger cats" at rates exceeding $8.5 \times 10^4$ counts per second; at least one order of magnitude higher than all previously reported realizations. Wigner distributions with pronounced negative parts are demonstrated at down to -8.89 dB squeezing, even when the initial squeezed vacuum input state has low purity. Benchmarking against such a degraded squeezed input state we report a maximum fidelity of more than 80% with a maximum cat amplitude of $|α| \approx 1.66$. Our experiment uses photon-addition from pairs, one of those photons is used for monitoring, giving us enhanced control; moreover the pair production rates are high and should allow for repeated application of photon-addition via repeat-stages.
△ Less
Submitted 22 June, 2023;
originally announced June 2023.
-
Vehicle Dynamics Modeling for Autonomous Racing Using Gaussian Processes
Authors:
Jingyun Ning,
Madhur Behl
Abstract:
Autonomous racing is increasingly becoming a proving ground for autonomous vehicle technology at the limits of its current capabilities. The most prominent examples include the F1Tenth racing series, Formula Student Driverless (FSD), Roborace, and the Indy Autonomous Challenge (IAC). Especially necessary, in high speed autonomous racing, is the knowledge of accurate racecar vehicle dynamics. The c…
▽ More
Autonomous racing is increasingly becoming a proving ground for autonomous vehicle technology at the limits of its current capabilities. The most prominent examples include the F1Tenth racing series, Formula Student Driverless (FSD), Roborace, and the Indy Autonomous Challenge (IAC). Especially necessary, in high speed autonomous racing, is the knowledge of accurate racecar vehicle dynamics. The choice of the vehicle dynamics model has to be made by balancing the increasing computational demands in contrast to improved accuracy of more complex models. Recent studies have explored learning-based methods, such as Gaussian Process (GP) regression for approximating the vehicle dynamics model. However, these efforts focus on higher level constructs such as motion planning, or predictive control and lack both in realism and rigor of the GP modeling process, which is often over-simplified. This paper presents the most detailed analysis of the applicability of GP models for approximating vehicle dynamics for autonomous racing. In particular we construct dynamic, and extended kinematic models for the popular F1TENTH racing platform. We investigate the effect of kernel choices, sample sizes, racetrack layout, racing lines, and velocity profiles on the efficacy and generalizability of the learned dynamics. We conduct 400+ simulations on real F1 track layouts to provide comprehensive recommendations to the research community for training accurate GP regression for single-track vehicle dynamics of a racecar.
△ Less
Submitted 6 June, 2023;
originally announced June 2023.
-
Learning without Forgetting for Vision-Language Models
Authors:
Da-Wei Zhou,
Yuanhan Zhang,
Jingyi Ning,
Han-Jia Ye,
De-Chuan Zhan,
Ziwei Liu
Abstract:
Class-Incremental Learning (CIL) or continual learning is a desired capability in the real world, which requires a learning system to adapt to new tasks without forgetting former ones. While traditional CIL methods focus on visual information to grasp core features, recent advances in Vision-Language Models (VLM) have shown promising capabilities in learning generalizable representations with the…
▽ More
Class-Incremental Learning (CIL) or continual learning is a desired capability in the real world, which requires a learning system to adapt to new tasks without forgetting former ones. While traditional CIL methods focus on visual information to grasp core features, recent advances in Vision-Language Models (VLM) have shown promising capabilities in learning generalizable representations with the aid of textual information. However, when continually trained with new classes, VLMs often suffer from catastrophic forgetting of former knowledge. Applying VLMs to CIL poses two major challenges: 1) how to adapt the model without forgetting; and 2) how to make full use of the multi-modal information. To this end, we propose PROjectiOn Fusion (PROOF) that enables VLMs to learn without forgetting. To handle the first challenge, we propose training task-specific projections based on the frozen image/text encoders. When facing new tasks, new projections are expanded and former projections are fixed, alleviating the forgetting of old concepts. For the second challenge, we propose the fusion module to better utilize the cross-modality information. By jointly adjusting visual and textual features, the model can capture semantic information with stronger representation ability. Extensive experiments on nine benchmark datasets validate PROOF achieves state-of-the-art performance.
△ Less
Submitted 30 May, 2023;
originally announced May 2023.
-
Searching for $^{76}$Ge neutrinoless double beta decay with the CDEX-1B experiment
Authors:
B. T. Zhang,
L. T. Yang,
Q. Yue,
K. J. Kang,
Y. J. Li,
H. P. An,
Greeshma C.,
J. P. Chang,
Y. H. Chen,
J. P. Cheng,
W. H. Dai,
Z. Deng,
C. H. Fang,
X. P. Geng,
H. Gong,
Q. J. Guo,
X. Y. Guo,
L. He,
S. M. He,
J. W. Hu,
H. X. Huang,
T. C. Huang,
H. T. Jia,
X. Jiang,
S. Karmakar
, et al. (59 additional authors not shown)
Abstract:
We operated a p-type point contact high purity germanium (PPCGe) detector (CDEX-1B, 1.008 kg) in the China Jinping Underground Laboratory (CJPL) for 500.3 days to search for neutrinoless double beta ($0νββ$) decay of $^{76}$Ge. A total of 504.3 kg $\cdot$ day effective exposure data was accumulated. The anti-coincidence and the multi/single-site event (MSE/SSE) discrimination methods were used to…
▽ More
We operated a p-type point contact high purity germanium (PPCGe) detector (CDEX-1B, 1.008 kg) in the China Jinping Underground Laboratory (CJPL) for 500.3 days to search for neutrinoless double beta ($0νββ$) decay of $^{76}$Ge. A total of 504.3 kg $\cdot$ day effective exposure data was accumulated. The anti-coincidence and the multi/single-site event (MSE/SSE) discrimination methods were used to suppress the background in the energy region of interest (ROI, $1989-2089$ keV for this work) with a factor of 23. A background level of 0.33 counts/(keV $\cdot$ kg $\cdot$ yr) was achieved. The lower limit on the half life of $^{76}$Ge $0νββ$ decay was constrained as $T_{1/2}^{0ν}\ > \ {2.2}\times 10^{23}\ \rm yr\ (90\% \ C.L.)$, corresponding to the upper limits on the effective Majorana neutrino mass: $\langle m_{ββ}\rangle < 2.3-5.2\ \mathrm{eV}$.
△ Less
Submitted 8 May, 2023; v1 submitted 1 May, 2023;
originally announced May 2023.
-
A Direct Sampling-Based Deep Learning Approach for Inverse Medium Scattering Problems
Authors:
Jianfeng Ning,
Fuqun Han,
Jun Zou
Abstract:
In this work, we focus on the inverse medium scattering problem (IMSP), which aims to recover unknown scatterers based on measured scattered data. Motivated by the efficient direct sampling method (DSM) introduced in [23], we propose a novel direct sampling-based deep learning approach (DSM-DL)for reconstructing inhomogeneous scatterers. In particular, we use the U-Net neural network to learn the…
▽ More
In this work, we focus on the inverse medium scattering problem (IMSP), which aims to recover unknown scatterers based on measured scattered data. Motivated by the efficient direct sampling method (DSM) introduced in [23], we propose a novel direct sampling-based deep learning approach (DSM-DL)for reconstructing inhomogeneous scatterers. In particular, we use the U-Net neural network to learn the relation between the index functions and the true contrasts. Our proposed DSM-DL is computationally efficient, robust to noise, easy to implement, and able to naturally incorporate multiple measured data to achieve high-quality reconstructions. Some representative tests are carried out with varying numbers of incident waves and different noise levels to evaluate the performance of the proposed method. The results demonstrate the promising benefits of combining deep learning techniques with the DSM for IMSP.
△ Less
Submitted 29 April, 2023;
originally announced May 2023.
-
Evidence of Weyl Fermion Enhanced Thermal Conductivity Under Magnetic Fields in Antiferromagnetic Topological Insulator Mn(Bi(1-x)Sb(x))2Te4
Authors:
Robert A. Robinson,
Seng Huat Lee,
Lujin Min,
Jinliang Ning,
Jianwei Sun,
Zhiqiang Mao
Abstract:
We report thermal conductivity and Seebeck effect measurements on Mn(Bi1-xSbx)2Te4 (MBST) with x = 0.26 under applied magnetic fields below 50 K. Our data shows clear indications of the electronic structure transition induced by the antiferromagnetic (AFM) to ferromagnetic (FM) transition driven by applied magnetic field as well as significant positive magnetothermal conductivity in the Weyl semim…
▽ More
We report thermal conductivity and Seebeck effect measurements on Mn(Bi1-xSbx)2Te4 (MBST) with x = 0.26 under applied magnetic fields below 50 K. Our data shows clear indications of the electronic structure transition induced by the antiferromagnetic (AFM) to ferromagnetic (FM) transition driven by applied magnetic field as well as significant positive magnetothermal conductivity in the Weyl semimetal state of MBST. Further, by examining the dependence of magnetothermal conductivity on field orientation for MBST and comparison with the magnetothermal conductivity of MnBi2Te4 we see evidence of a contribution to thermal conductivity due to Weyl fermions in the FM phase of MBST. From the temperature dependence of Seebeck coefficient under magnetic fields for MBST, we also observed features consistent with the Fermi surface evolution from a hole pocket in the paramagnetic state to a Fermi surface with coexistence of electron and hole pockets in the FM state. These findings provide further evidence for the field-driven topological phase transition from an AFM topological insulator to a FM Weyl semimetal.
△ Less
Submitted 12 April, 2023;
originally announced April 2023.
-
BoPR: Body-aware Part Regressor for Human Shape and Pose Estimation
Authors:
Yongkang Cheng,
Shaoli Huang,
Jifeng Ning,
Ying Shan
Abstract:
This paper presents a novel approach for estimating human body shape and pose from monocular images that effectively addresses the challenges of occlusions and depth ambiguity. Our proposed method BoPR, the Body-aware Part Regressor, first extracts features of both the body and part regions using an attention-guided mechanism. We then utilize these features to encode extra part-body dependency for…
▽ More
This paper presents a novel approach for estimating human body shape and pose from monocular images that effectively addresses the challenges of occlusions and depth ambiguity. Our proposed method BoPR, the Body-aware Part Regressor, first extracts features of both the body and part regions using an attention-guided mechanism. We then utilize these features to encode extra part-body dependency for per-part regression, with part features as queries and body feature as a reference. This allows our network to infer the spatial relationship of occluded parts with the body by leveraging visible parts and body reference information. Our method outperforms existing state-of-the-art methods on two benchmark datasets, and our experiments show that it significantly surpasses existing methods in terms of depth ambiguity and occlusion handling. These results provide strong evidence of the effectiveness of our approach.The code and data are available for research purposes at https://github.com/cyk990422/BoPR.
△ Less
Submitted 24 March, 2023; v1 submitted 21 March, 2023;
originally announced March 2023.
-
Rethinking the backbone architecture for tiny object detection
Authors:
Jinlai Ning,
Haoyan Guan,
Michael Spratling
Abstract:
Tiny object detection has become an active area of research because images with tiny targets are common in several important real-world scenarios. However, existing tiny object detection methods use standard deep neural networks as their backbone architecture. We argue that such backbones are inappropriate for detecting tiny objects as they are designed for the classification of larger objects, an…
▽ More
Tiny object detection has become an active area of research because images with tiny targets are common in several important real-world scenarios. However, existing tiny object detection methods use standard deep neural networks as their backbone architecture. We argue that such backbones are inappropriate for detecting tiny objects as they are designed for the classification of larger objects, and do not have the spatial resolution to identify small targets. Specifically, such backbones use max-pooling or a large stride at early stages in the architecture. This produces lower resolution feature-maps that can be efficiently processed by subsequent layers. However, such low-resolution feature-maps do not contain information that can reliably discriminate tiny objects. To solve this problem we design 'bottom-heavy' versions of backbones that allocate more resources to processing higher-resolution features without introducing any additional computational burden overall. We also investigate if pre-training these backbones on images of appropriate size, using CIFAR100 and ImageNet32, can further improve performance on tiny object detection. Results on TinyPerson and WiderFace show that detectors with our proposed backbones achieve better results than the current state-of-the-art methods.
△ Less
Submitted 20 March, 2023;
originally announced March 2023.
-
GMConv: Modulating Effective Receptive Fields for Convolutional Kernels
Authors:
Qi Chen,
Chao Li,
Jia Ning,
Stephen Lin,
Kun He
Abstract:
In convolutional neural networks, the convolutions are conventionally performed using a square kernel with a fixed N $\times$ N receptive field (RF). However, what matters most to the network is the effective receptive field (ERF) that indicates the extent with which input pixels contribute to an output pixel. Inspired by the property that ERFs typically exhibit a Gaussian distribution, we propose…
▽ More
In convolutional neural networks, the convolutions are conventionally performed using a square kernel with a fixed N $\times$ N receptive field (RF). However, what matters most to the network is the effective receptive field (ERF) that indicates the extent with which input pixels contribute to an output pixel. Inspired by the property that ERFs typically exhibit a Gaussian distribution, we propose a Gaussian Mask convolutional kernel (GMConv) in this work. Specifically, GMConv utilizes the Gaussian function to generate a concentric symmetry mask that is placed over the kernel to refine the RF. Our GMConv can directly replace the standard convolutions in existing CNNs and can be easily trained end-to-end by standard back-propagation. We evaluate our approach through extensive experiments on image classification and object detection tasks. Over several tasks and standard base models, our approach compares favorably against the standard convolution. For instance, using GMConv for AlexNet and ResNet-50, the top-1 accuracy on ImageNet classification is boosted by 0.98% and 0.85%, respectively.
△ Less
Submitted 19 April, 2023; v1 submitted 9 February, 2023;
originally announced February 2023.
-
All in Tokens: Unifying Output Space of Visual Tasks via Soft Token
Authors:
Jia Ning,
Chen Li,
Zheng Zhang,
Zigang Geng,
Qi Dai,
Kun He,
Han Hu
Abstract:
Unlike language tasks, where the output space is usually limited to a set of tokens, the output space of visual tasks is more complicated, making it difficult to build a unified visual model for various visual tasks. In this paper, we seek to unify the output space of visual tasks, so that we can also build a unified model for visual tasks. To this end, we demonstrate a single unified model that s…
▽ More
Unlike language tasks, where the output space is usually limited to a set of tokens, the output space of visual tasks is more complicated, making it difficult to build a unified visual model for various visual tasks. In this paper, we seek to unify the output space of visual tasks, so that we can also build a unified model for visual tasks. To this end, we demonstrate a single unified model that simultaneously handles two typical visual tasks of instance segmentation and depth estimation, which have discrete/fixed-length and continuous/varied-length outputs, respectively. We propose several new techniques that take into account the particularity of visual tasks: 1) Soft token. We employ soft token to represent the task output. Unlike hard tokens in the common VQ-VAE which are assigned one-hot to discrete codebooks/vocabularies, the soft token is assigned softly to the codebook embeddings. Soft token can improve the accuracy of both the next token inference and decoding of the task output; 2) Mask augmentation. Many visual tasks have corruption, undefined or invalid values in label annotations, i.e., occluded area of depth maps. We show that a mask augmentation technique can greatly benefit these tasks. With these new techniques and other designs, we show that the proposed general-purpose task-solver can perform both instance segmentation and depth estimation well. Particularly, we achieve 0.279 RMSE on the specific task of NYUv2 depth estimation, setting a new record on this benchmark. The general-purpose task-solver, dubbed AiT, is available at \url{https://github.com/SwinTransformer/AiT}.
△ Less
Submitted 14 February, 2023; v1 submitted 5 January, 2023;
originally announced January 2023.
-
High-throughput screening assisted discovery of a stable layered anti-ferromagnetic semiconductor: CdFeP2Se6
Authors:
Manish Kothakonda,
Yanglin Zhu,
Yingdong Guan,
Jingyang He,
Jamin Kidd,
Ruiqi Zhang,
Jinliang Ning,
Venkatraman Gopalan,
Weiwei Xie,
Zhiqiang Mao,
Jianwei Sun
Abstract:
Recent advances in two-dimensional (2D) magnetism have heightened interest in layered magnetic materials due to their potential for spintronics. In particular, layered semiconducting antiferromagnets exhibit intriguing low-dimensional semiconducting behavior with both charge and spin as carrier controls. However, synthesis of these compounds is challenging and remains rare. Here, we conducted firs…
▽ More
Recent advances in two-dimensional (2D) magnetism have heightened interest in layered magnetic materials due to their potential for spintronics. In particular, layered semiconducting antiferromagnets exhibit intriguing low-dimensional semiconducting behavior with both charge and spin as carrier controls. However, synthesis of these compounds is challenging and remains rare. Here, we conducted firstprinciples based high-throughput search to screen potentially stable mixed metal phosphorous trichalcogenides (MM'P2X6, where M and M' are transition metals and X is a chalcogenide) that have a wide range of tunable bandgaps and interesting magnetic properties. Among the potential candidates, we successfully synthesized a stable semiconducting layered magnetic material, CdFeP2Se6, that exhibits a short-range antiferromagnetic order at TN = 21 K with an indirect band gap of 2.23 eV. Our work suggests that highthroughput screening assisted synthesis be an effective method for layered magnetic materials discovery.
△ Less
Submitted 18 December, 2022; v1 submitted 12 December, 2022;
originally announced December 2022.
-
Deep Learning Methods for Partial Differential Equations and Related Parameter Identification Problems
Authors:
Derick Nganyu Tanyu,
Jianfeng Ning,
Tom Freudenberg,
Nick Heilenkötter,
Andreas Rademacher,
Uwe Iben,
Peter Maass
Abstract:
Recent years have witnessed a growth in mathematics for deep learning--which seeks a deeper understanding of the concepts of deep learning with mathematics and explores how to make it more robust--and deep learning for mathematics, where deep learning algorithms are used to solve problems in mathematics. The latter has popularised the field of scientific machine learning where deep learning is app…
▽ More
Recent years have witnessed a growth in mathematics for deep learning--which seeks a deeper understanding of the concepts of deep learning with mathematics and explores how to make it more robust--and deep learning for mathematics, where deep learning algorithms are used to solve problems in mathematics. The latter has popularised the field of scientific machine learning where deep learning is applied to problems in scientific computing. Specifically, more and more neural network architectures have been developed to solve specific classes of partial differential equations (PDEs). Such methods exploit properties that are inherent to PDEs and thus solve the PDEs better than standard feed-forward neural networks, recurrent neural networks, or convolutional neural networks. This has had a great impact in the area of mathematical modeling where parametric PDEs are widely used to model most natural and physical processes arising in science and engineering. In this work, we review such methods as well as their extensions for parametric studies and for solving the related inverse problems. We equally proceed to show their relevance in some industrial applications.
△ Less
Submitted 16 May, 2023; v1 submitted 6 December, 2022;
originally announced December 2022.
-
Efficiency Boosting of Secure Cross-platform Recommender Systems over Sparse Data
Authors:
Hao Ren,
Guowen Xu,
Tianwei Zhang,
Jianting Ning,
Xinyi Huang,
Hongwei Li,
Rongxing Lu
Abstract:
Fueled by its successful commercialization, the recommender system (RS) has gained widespread attention. However, as the training data fed into the RS models are often highly sensitive, it ultimately leads to severe privacy concerns, especially when data are shared among different platforms. In this paper, we follow the tune of existing works to investigate the problem of secure sparse matrix mult…
▽ More
Fueled by its successful commercialization, the recommender system (RS) has gained widespread attention. However, as the training data fed into the RS models are often highly sensitive, it ultimately leads to severe privacy concerns, especially when data are shared among different platforms. In this paper, we follow the tune of existing works to investigate the problem of secure sparse matrix multiplication for cross-platform RSs. Two fundamental while critical issues are addressed: preserving the training data privacy and breaking the data silo problem. Specifically, we propose two concrete constructions with significantly boosted efficiency. They are designed for the sparse location insensitive case and location sensitive case, respectively. State-of-the-art cryptography building blocks including homomorphic encryption (HE) and private information retrieval (PIR) are fused into our protocols with non-trivial optimizations. As a result, our schemes can enjoy the HE acceleration technique without privacy trade-offs. We give formal security proofs for the proposed schemes and conduct extensive experiments on both real and large-scale simulated datasets. Compared with state-of-the-art works, our two schemes compress the running time roughly by 10* and 2.8*. They also attain up to 15* and 2.3* communication reduction without accuracy loss.
△ Less
Submitted 3 December, 2022;
originally announced December 2022.
-
Electric modulation of the Fermi arc spin transport via three-terminal configuration in the topological semimetal nanowires
Authors:
Guang-Yu Zhu,
Ji-Ai Ning,
Jian-Kun Wang,
Xin-Jie Liu,
Jing-Zhi Fang,
Ze-Nan Wu,
Jia-Jie Yang,
Ben-Chuan Lin,
Shuo Wang,
Dapeng Yu
Abstract:
Spin momentum locking is a key feature of the topological surface state, which plays an important role in spintronics. The electrical detection of current-induced spin polarization protected by the spin momentum locking in non-magnetic systems provides a new platform for developing spintronics while previous studies were mostly based on magnetic materials. In this study, the spin transport measure…
▽ More
Spin momentum locking is a key feature of the topological surface state, which plays an important role in spintronics. The electrical detection of current-induced spin polarization protected by the spin momentum locking in non-magnetic systems provides a new platform for developing spintronics while previous studies were mostly based on magnetic materials. In this study, the spin transport measurement of Dirac semimetal Cd3As2 was studied by the three-terminal geometry, and a hysteresis loop signal with high resistance and low resistance state was observed. The hysteresis was reversed by reversing the current direction, which illustrates the spin-momentum locking feature of Cd3As2. Furthermore, we realized the on-off states of the spin signals through electric modulation of the Fermi arc via the three-terminal configuration, which enables the great potential of Cd3As2 in spin field-effect transistors.
△ Less
Submitted 2 December, 2022;
originally announced December 2022.
-
Search for boosted keV-MeV light dark matter particles from evaporating primordial black holes at the CDEX-10 experiment
Authors:
Z. H. Zhang,
L. T. Yang,
Q. Yue,
K. J. Kang,
Y. J. Li,
H. P. An,
Greeshma C.,
J. P. Chang,
Y. H. Chen,
J. P. Cheng,
W. H. Dai,
Z. Deng,
C. H. Fang,
X. P. Geng,
H. Gong,
Q. J. Guo,
X. Y. Guo,
L. He,
S. M. He,
J. W. Hu,
H. X. Huang,
T. C. Huang,
H. T. Jia,
X. Jiang,
S. Karmakar
, et al. (59 additional authors not shown)
Abstract:
We present novel constraints on boosted light dark matter particles (denoted as ``$χ$'') from evaporating primordial black holes (PBHs) using 205.4 kg$\cdot$day data from the China Jinping Underground Laboratory's CDEX-10 p-type point contact germanium detector with a 160 eVee analysis threshold. $χ$ from PBHs with masses ranging from 1$\times$10$^{15}$ g to 7$\times$10$^{16}$ g are searched in th…
▽ More
We present novel constraints on boosted light dark matter particles (denoted as ``$χ$'') from evaporating primordial black holes (PBHs) using 205.4 kg$\cdot$day data from the China Jinping Underground Laboratory's CDEX-10 p-type point contact germanium detector with a 160 eVee analysis threshold. $χ$ from PBHs with masses ranging from 1$\times$10$^{15}$ g to 7$\times$10$^{16}$ g are searched in this work. In the presence of PBH abundance compatible with present bounds, our result excludes the $χ$-nucleon elastic-scattering cross section region from 3.4$\times$10$^{-32}$ cm$^{2}$ to 2.3$\times$10$^{-29}$ cm$^{2}$ for $χ$ of 1 keV to 24 MeV from PBHs with masses of 5$\times$10$^{15}$ g, as well as from 1.1$\times$10$^{-28}$ cm$^{2}$ to 7.6$\times$10$^{-28}$ cm$^{2}$ for $χ$ of 1 keV to 0.6 MeV from PBHs with masses of 7$\times$10$^{16}$ g. If the $χ$-nucleon elastic-scattering cross section can be determined in the future, the abundance of PBHs may be severely constrained by $χ$ evaporation. With the lower threshold (160 eVee) of the CDEX-10 experiment compared to the previously used experiments, this work allows for a better reach at soft spectra produced by heavier PBHs, which demonstrates the vast potential of such a technical route to pursue $χ$ from larger PBHs with a low threshold.
△ Less
Submitted 7 September, 2023; v1 submitted 14 November, 2022;
originally announced November 2022.
-
Unsupervised domain-adaptive person re-identification with multi-camera constraints
Authors:
S. Takeuchi,
F. Li,
S. Iwasaki,
J. Ning,
G. Suzuki
Abstract:
Person re-identification is a key technology for analyzing video-based human behavior; however, its application is still challenging in practical situations due to the performance degradation for domains different from those in the training data. Here, we propose an environment-constrained adaptive network for reducing the domain gap. This network refines pseudo-labels estimated via a self-trainin…
▽ More
Person re-identification is a key technology for analyzing video-based human behavior; however, its application is still challenging in practical situations due to the performance degradation for domains different from those in the training data. Here, we propose an environment-constrained adaptive network for reducing the domain gap. This network refines pseudo-labels estimated via a self-training scheme by imposing multi-camera constraints. The proposed method incorporates person-pair information without person identity labels obtained from the environment into the model training. In addition, we develop a method that appropriately selects a person from the pair that contributes to the performance improvement. We evaluate the performance of the network using public and private datasets and confirm the performance surpasses state-of-the-art methods in domains with overlapping camera views. To the best of our knowledge, this is the first study on domain-adaptive learning with multi-camera constraints that can be obtained in real environments.
△ Less
Submitted 25 October, 2022;
originally announced October 2022.
-
New Secure Sparse Inner Product with Applications to Machine Learning
Authors:
Guowen Xu,
Shengmin Xu,
Jianting Ning,
Tianwei Zhang,
Xinyi Huang,
Hongwei Li,
Rongxing Lu
Abstract:
Sparse inner product (SIP) has the attractive property of overhead being dominated by the intersection of inputs between parties, independent of the actual input size. It has intriguing prospects, especially for boosting machine learning on large-scale data, which is tangled with sparse data. In this paper, we investigate privacy-preserving SIP problems that have rarely been explored before. Speci…
▽ More
Sparse inner product (SIP) has the attractive property of overhead being dominated by the intersection of inputs between parties, independent of the actual input size. It has intriguing prospects, especially for boosting machine learning on large-scale data, which is tangled with sparse data. In this paper, we investigate privacy-preserving SIP problems that have rarely been explored before. Specifically, we propose two concrete constructs, one requiring offline linear communication which can be amortized across queries, while the other has sublinear overhead but relies on the more computationally expensive tool. Our approach exploits state-of-the-art cryptography tools including garbled Bloom filters (GBF) and Private Information Retrieval (PIR) as the cornerstone, but carefully fuses them to obtain non-trivial overhead reductions. We provide formal security analysis of the proposed constructs and implement them into representative machine learning algorithms including k-nearest neighbors, naive Bayes classification and logistic regression. Compared to the existing efforts, our method achieves $2$-$50\times$ speedup in runtime and up to $10\times$ reduction in communication.
△ Less
Submitted 15 October, 2022;
originally announced October 2022.
-
VerifyML: Obliviously Checking Model Fairness Resilient to Malicious Model Holder
Authors:
Guowen Xu,
Xingshuo Han,
Gelei Deng,
Tianwei Zhang,
Shengmin Xu,
Jianting Ning,
Anjia Yang,
Hongwei Li
Abstract:
In this paper, we present VerifyML, the first secure inference framework to check the fairness degree of a given Machine learning (ML) model. VerifyML is generic and is immune to any obstruction by the malicious model holder during the verification process. We rely on secure two-party computation (2PC) technology to implement VerifyML, and carefully customize a series of optimization methods to bo…
▽ More
In this paper, we present VerifyML, the first secure inference framework to check the fairness degree of a given Machine learning (ML) model. VerifyML is generic and is immune to any obstruction by the malicious model holder during the verification process. We rely on secure two-party computation (2PC) technology to implement VerifyML, and carefully customize a series of optimization methods to boost its performance for both linear and nonlinear layer execution. Specifically, (1) VerifyML allows the vast majority of the overhead to be performed offline, thus meeting the low latency requirements for online inference. (2) To speed up offline preparation, we first design novel homomorphic parallel computing techniques to accelerate the authenticated Beaver's triple (including matrix-vector and convolution triples) generation procedure. It achieves up to $1.7\times$ computation speedup and gains at least $10.7\times$ less communication overhead compared to state-of-the-art work. (3) We also present a new cryptographic protocol to evaluate the activation functions of non-linear layers, which is $4\times$--$42\times$ faster and has $>48\times$ lesser communication than existing 2PC protocol against malicious parties. In fact, VerifyML even beats the state-of-the-art semi-honest ML secure inference system! We provide formal theoretical analysis for VerifyML security and demonstrate its performance superiority on mainstream ML models including ResNet-18 and LeNet.
△ Less
Submitted 15 October, 2022;
originally announced October 2022.
-
Critical role of magnetic moments on lattice dynamics in YBa${}_{2}$Cu${}_{3}$O${}_{6}$
Authors:
Jinliang Ning,
Christopher Lane,
Yubo Zhang,
Matthew Matzelle,
Bahadur Singh,
Bernardo Barbiellini,
Robert S. Markiewicz,
Arun Bansil,
Jianwei Sun
Abstract:
The role of lattice dynamics in unconventional high-temperature superconductivity is still vigorously debated. Theoretical insights into this problem have long been prevented by the absence of an accurate first-principles description of the combined electronic, magnetic, and lattice degrees of freedom. Utilizing the recently constructed r$^2$SCAN density functional that stabilizes the antiferromag…
▽ More
The role of lattice dynamics in unconventional high-temperature superconductivity is still vigorously debated. Theoretical insights into this problem have long been prevented by the absence of an accurate first-principles description of the combined electronic, magnetic, and lattice degrees of freedom. Utilizing the recently constructed r$^2$SCAN density functional that stabilizes the antiferromagnetic (AFM) state of the pristine oxide YBa$_2$Cu$_3$O$_6$, we faithfully reproduce the experimental dispersion of key phonon modes. We further find significant magnetoelastic coupling in numerous high energy Cu-O bond stretching optical branches, where the AFM results improve over the soft non-magnetic phonon bands.
△ Less
Submitted 20 December, 2022; v1 submitted 12 October, 2022;
originally announced October 2022.
-
Search for exotic interactions of solar neutrinos in the CDEX-10 experiment
Authors:
X. P. Geng,
L. T. Yang,
Q. Yue,
K. J. Kang,
Y. J. Li,
H. P. An,
Greeshma C.,
J. P. Chang,
Y. H. Chen,
J. P. Cheng,
W. H. Dai,
Z. Deng,
C. H. Fang,
H. Gong,
Q. J. Guo,
X. Y. Guo,
L. He,
S. M. He,
J. W. Hu,
H. X. Huang,
T. C. Huang,
H. T. Jia,
X. Jiang,
S. Karmakar,
H. B. Li
, et al. (60 additional authors not shown)
Abstract:
We investigate exotic neutrino interactions using the 205.4 kg$\cdot$day dataset from the CDEX-10 experiment at the China Jinping Underground Laboratory. New constraints on the mass and couplings of new gauge bosons are presented. Two nonstandard neutrino interactions are considered: a $U(1)_{B-L}$ gauge-boson-induced interaction between an active neutrino and electron/nucleus, and a dark-photon-i…
▽ More
We investigate exotic neutrino interactions using the 205.4 kg$\cdot$day dataset from the CDEX-10 experiment at the China Jinping Underground Laboratory. New constraints on the mass and couplings of new gauge bosons are presented. Two nonstandard neutrino interactions are considered: a $U(1)_{B-L}$ gauge-boson-induced interaction between an active neutrino and electron/nucleus, and a dark-photon-induced interaction between a sterile neutrino and electron/nucleus via kinetic mixing with a photon. This work probes an unexplored parameter space involving sterile neutrino coupling with a dark photon. New laboratory limits are derived on dark photon masses below $1~{\rm eV}/c^{2}$ at some benchmark values of $Δm_{41}^{2}$ and $g^{\prime2}{\rm{sin}}^{2}2θ_{14}$.
△ Less
Submitted 2 June, 2023; v1 submitted 4 October, 2022;
originally announced October 2022.
-
Low Thermal Conductivity Phase Change Memory Superlattices
Authors:
Jing Ning,
Xilin Zhou,
Yunzheng Wang,
Takashi Yagi,
Janne Kalikka,
Siew Lang Teo,
Zhitang Song,
Michel Bosman,
Robert E. Simpson
Abstract:
Phase change memory devices are typically reset by melt-quenching a material to radically lower its electrical conductance. The high power and concomitantly high current density required to reset phase change materials is the major issue that limits the access times of 3D phase change memory architectures. Phase change superlattices were developed to lower the reset energy by confining the phase t…
▽ More
Phase change memory devices are typically reset by melt-quenching a material to radically lower its electrical conductance. The high power and concomitantly high current density required to reset phase change materials is the major issue that limits the access times of 3D phase change memory architectures. Phase change superlattices were developed to lower the reset energy by confining the phase transition to the interface between two different phase change materials. However, the high thermal conductivity of the superlattices means that heat is poorly confined within the phase change material, and most of the thermal energy is wasted to the surrounding materials. Here, we identified Ti as a useful dopant for substantially lowering the thermal conductivity of Sb2Te3-GeTe superlattices whilst also stabilising the layered structure from unwanted disordering. We demonstrate via laser heating that lowering the thermal conductivity by doping the Sb2Te3 layers with Ti halves the switching energy compared to superlattices that only use interfacial phase change transitions and strain engineering. The thermally optimized superlattice has (0 0 l) crystallographic orientation yet a thermal conductivity of just 0.25 W/m.K in the "on" (set) state. Prototype phase change memory devices that incorporate this Ti-doped superlattice switch faster and and at a substantially lower voltage than the undoped superlattice. During switching the Ti-doped Sb2Te3 layers remain stable within the superlattice and only the Ge atoms are active and undergo interfacial phase transitions. In conclusion, we show the potential of thermally optimised Sb2Te3-GeTe superlattices for a new generation of energy-efficient electrical and optical phase change memory.
△ Less
Submitted 30 September, 2022;
originally announced September 2022.
-
Linear isometric invariants of bounded domains
Authors:
Fusheng Deng,
Jiafu Ning,
Zhiwei Wang,
Xiangyu Zhou
Abstract:
We introduce two new conditions for bounded domains, namely $A^p$-completeness and boundary blow down type, and show that, for two bounded domains $D_1$ and $D_2$ that are $A^p$-complete and not of boundary blow down type, if there exists a linear isometry from $A^p(D_1)$ to $A^{p}(D_2)$ for some real number $p>0$ with $p\neq $ even integers, then $D_1$ and $D_2$ must be holomorphically equivalent…
▽ More
We introduce two new conditions for bounded domains, namely $A^p$-completeness and boundary blow down type, and show that, for two bounded domains $D_1$ and $D_2$ that are $A^p$-complete and not of boundary blow down type, if there exists a linear isometry from $A^p(D_1)$ to $A^{p}(D_2)$ for some real number $p>0$ with $p\neq $ even integers, then $D_1$ and $D_2$ must be holomorphically equivalent, where for a domain $D$, $A^p(D)$ denotes the space of $L^p$ holomorphic functions on $D$.
△ Less
Submitted 7 September, 2022;
originally announced September 2022.
-
Exotic Dark Matter Search with CDEX-10 Experiment at China's Jinping Underground Laboratory
Authors:
W. H. Dai,
L. P. Jia,
H. Ma,
Q. Yue,
K. J. Kang,
Y. J. Li,
H. P. An,
Greeshma C.,
J. P. Chang,
Y. H. Chen,
J. P. Cheng,
Z. Deng,
C. H. Fang,
X. P. Geng,
H. Gong,
Q. J. Guo,
X. Y. Guo,
L. He,
S. M. He,
J. W. Hu,
H. X. Huang,
T. C. Huang,
H. T. Jia,
X. Jiang,
S. Karmakar
, et al. (59 additional authors not shown)
Abstract:
A search for exotic dark matter (DM) in the sub-GeV mass range has been conducted using 205 kg$\cdot$day data taken from a p-type point contact germanium detector of CDEX-10 experiment at China Jinping underground laboratory. New low-mass dark matter searching channels, neutral current fermionic DM absorption ($χ+A\rightarrow ν+A$) and DM-nucleus 3$\rightarrow$2 scattering ($χ+χ+A\rightarrow φ+A$)…
▽ More
A search for exotic dark matter (DM) in the sub-GeV mass range has been conducted using 205 kg$\cdot$day data taken from a p-type point contact germanium detector of CDEX-10 experiment at China Jinping underground laboratory. New low-mass dark matter searching channels, neutral current fermionic DM absorption ($χ+A\rightarrow ν+A$) and DM-nucleus 3$\rightarrow$2 scattering ($χ+χ+A\rightarrow φ+A$), have been analyzed with an energy threshold of 160 eVee. No significant signal was found. Thus new limits on the DM-nucleon interaction cross section are set for both models at sub-GeV DM mass region. A cross section limit for the fermionic DM absorption is set to be $\rm 2.5\times 10^{-46} cm^2$(90\% C.L.) at DM mass of 10 MeV/c$^2$. For the DM-nucleus 3$\rightarrow$2 scattering scenario, limits are extended to DM mass of 5 MeV/c$^2$ and 14 MeV/c$^2$ for the massless dark photon and bound DM final state, respectively.
△ Less
Submitted 23 November, 2022; v1 submitted 2 September, 2022;
originally announced September 2022.
-
Testing the r$^2$SCAN density functional for the thermodynamic stability of solids with and without a van der Waals correction
Authors:
Manish Kothakonda,
Aaron D. Kaplan,
Eric B. Isaacs,
Christopher J. Bartel,
James W. Furness,
Jinliang Ning,
Chris Wolverton,
John P. Perdew,
Jianwei Sun
Abstract:
A central aim of materials discovery is an accurate and numerically reliable description of thermodynamic properties, such as the enthalpies of formation and decomposition. The r$^2$SCAN revision of the strongly constrained and appropriately normed (SCAN) meta-generalized gradient approximation (meta-GGA) balances numerical stability with high general accuracy. To assess the r$^2$SCAN description…
▽ More
A central aim of materials discovery is an accurate and numerically reliable description of thermodynamic properties, such as the enthalpies of formation and decomposition. The r$^2$SCAN revision of the strongly constrained and appropriately normed (SCAN) meta-generalized gradient approximation (meta-GGA) balances numerical stability with high general accuracy. To assess the r$^2$SCAN description of solid-state thermodynamics, we evaluate the formation and decomposition enthalpies, equilibrium volumes, and fundamental bandgaps of more than 1,000 solids using r$^2$SCAN, SCAN, and PBE, as well as two dispersion-corrected variants, SCAN+rVV10 and r$^2$SCAN+rVV10. We show that r$^2$SCAN achieves accuracy comparable to SCAN and often improves upon SCAN's already excellent accuracy. Whereas SCAN+rVV10 is often observed to worsen the formation enthalpies of SCAN, and makes no substantial correction to SCAN's cell volume predictions, r$^2$SCAN+rVV10 predicts marginally less-accurate formation enthalpies than r$^2$SCAN, and slightly more-accurate cell volumes than r$^2$SCAN. The average absolute errors in predicted formation enthalpies are found to decrease by a factor of 1.5 to 2.5 from the GGA level to the meta-GGA level. Smaller decreases in error are observed for decomposition enthalpies. For formation enthalpies r$^2$SCAN improves over SCAN for intermetallic systems. For a few classes of systems -- transition metals, intermetallics, weakly-bound solids, and enthalpies of decomposition into compounds -- GGAs are comparable to meta-GGAs. In total, r$^2$SCAN and r$^2$SCAN+rVV10 can be recommended as stable, general-purpose meta-GGAs for materials discovery.
△ Less
Submitted 4 August, 2022;
originally announced August 2022.
-
On a Bogomolov type vanishing theorem
Authors:
Zhi Li,
Xiangkui Meng,
Jiafu Ning,
Zhiwei Wang,
Xiangyu Zhou
Abstract:
Let $X$ be a compact Kähler manifold and $(L,h)\rightarrow X$ be a pseudoeffective line bundle, such that the curvature $iΘ_{L,h}\geq 0$ in the sense of currents. The main result of the present paper is that $H^n(X,\mathcal{O}(Ω^p_X\otimes L)\otimes \mathcal{I}(h))=0$ for $p\geq n-nd(L,h)+1$. This is a generalization of Bogomolov's vanishing theorem.
Let $X$ be a compact Kähler manifold and $(L,h)\rightarrow X$ be a pseudoeffective line bundle, such that the curvature $iΘ_{L,h}\geq 0$ in the sense of currents. The main result of the present paper is that $H^n(X,\mathcal{O}(Ω^p_X\otimes L)\otimes \mathcal{I}(h))=0$ for $p\geq n-nd(L,h)+1$. This is a generalization of Bogomolov's vanishing theorem.
△ Less
Submitted 17 March, 2023; v1 submitted 26 July, 2022;
originally announced July 2022.
-
E-Tenon: An Efficient Privacy-Preserving Secure Open Data Sharing Scheme for EHR System
Authors:
Zhihui Lin,
Prosanta Gope,
Jianting Ning,
Biplab Sikdar
Abstract:
The transition from paper-based information to Electronic-Health-Records (EHRs) has driven various advancements in the modern healthcare-industry. In many cases, patients need to share their EHR with healthcare professionals. Given the sensitive and security-critical nature of EHRs, it is essential to consider the security and privacy issues of storing and sharing EHR. However, existing security s…
▽ More
The transition from paper-based information to Electronic-Health-Records (EHRs) has driven various advancements in the modern healthcare-industry. In many cases, patients need to share their EHR with healthcare professionals. Given the sensitive and security-critical nature of EHRs, it is essential to consider the security and privacy issues of storing and sharing EHR. However, existing security solutions excessively encrypt the whole database, thus requiring the entire database to be decrypted for each access request, which is a time-consuming process. On the other hand, the use of EHR for medical research (e.g., development of precision-medicine, diagnostics-techniques), as well as optimisation of practices in healthcare organisations, requires the EHR to be analysed, and for that, they should be easily accessible without compromising the privacy of the patient. In this paper, we propose an efficient technique called E-Tenon that not only securely keeps all EHR publicly accessible but also provides the desirable security features. To the best of our knowledge, this is the first work in which an Open Database is used for protecting EHR. The proposed E-Tenon empowers patients to securely share their EHR under multi-level, fine-grained access policies defined by themselves. Analyses show that our system outperforms existing solutions in terms of computational-complexity.
△ Less
Submitted 12 July, 2022;
originally announced July 2022.
-
SIMC 2.0: Improved Secure ML Inference Against Malicious Clients
Authors:
Guowen Xu,
Xingshuo Han,
Tianwei Zhang,
Shengmin Xu,
Jianting Ning,
Xinyi Huang,
Hongwei Li,
Robert H. Deng
Abstract:
In this paper, we study the problem of secure ML inference against a malicious client and a semi-trusted server such that the client only learns the inference output while the server learns nothing. This problem is first formulated by Lehmkuhl \textit{et al.} with a solution (MUSE, Usenix Security'21), whose performance is then substantially improved by Chandran et al.'s work (SIMC, USENIX Securit…
▽ More
In this paper, we study the problem of secure ML inference against a malicious client and a semi-trusted server such that the client only learns the inference output while the server learns nothing. This problem is first formulated by Lehmkuhl \textit{et al.} with a solution (MUSE, Usenix Security'21), whose performance is then substantially improved by Chandran et al.'s work (SIMC, USENIX Security'22). However, there still exists a nontrivial gap in these efforts towards practicality, giving the challenges of overhead reduction and secure inference acceleration in an all-round way.
We propose SIMC 2.0, which complies with the underlying structure of SIMC, but significantly optimizes both the linear and non-linear layers of the model. Specifically, (1) we design a new coding method for homomorphic parallel computation between matrices and vectors. It is custom-built through the insight into the complementarity between cryptographic primitives in SIMC. As a result, it can minimize the number of rotation operations incurred in the calculation process, which is very computationally expensive compared to other homomorphic operations e.g., addition, multiplication). (2) We reduce the size of the garbled circuit (GC) (used to calculate nonlinear activation functions, e.g., ReLU) in SIMC by about two thirds. Then, we design an alternative lightweight protocol to perform tasks that are originally allocated to the expensive GCs. Compared with SIMC, our experiments show that SIMC 2.0 achieves a significant speedup by up to $17.4\times $ for linear layer computation, and at least $1.3\times$ reduction of both the computation and communication overheads in the implementation of non-linear layers under different data dimensions. Meanwhile, SIMC 2.0 demonstrates an encouraging runtime boost by $2.3\sim 4.3\times$ over SIMC on different state-of-the-art ML models.
△ Less
Submitted 27 October, 2022; v1 submitted 11 July, 2022;
originally announced July 2022.