-
Tracking Reflected Objects: A Benchmark
Authors:
Xiaoyu Guo,
Pengzhi Zhong,
Lizhi Lin,
Hao Zhang,
Ling Huang,
Shuiwang Li
Abstract:
Visual tracking has advanced significantly in recent years, mainly due to the availability of large-scale training datasets. These datasets have enabled the development of numerous algorithms that can track objects with high accuracy and robustness.However, the majority of current research has been directed towards tracking generic objects, with less emphasis on more specialized and challenging sc…
▽ More
Visual tracking has advanced significantly in recent years, mainly due to the availability of large-scale training datasets. These datasets have enabled the development of numerous algorithms that can track objects with high accuracy and robustness.However, the majority of current research has been directed towards tracking generic objects, with less emphasis on more specialized and challenging scenarios. One such challenging scenario involves tracking reflected objects. Reflections can significantly distort the appearance of objects, creating ambiguous visual cues that complicate the tracking process. This issue is particularly pertinent in applications such as autonomous driving, security, smart homes, and industrial production, where accurately tracking objects reflected in surfaces like mirrors or glass is crucial. To address this gap, we introduce TRO, a benchmark specifically for Tracking Reflected Objects. TRO includes 200 sequences with around 70,000 frames, each carefully annotated with bounding boxes. This dataset aims to encourage the development of new, accurate methods for tracking reflected objects, which present unique challenges not sufficiently covered by existing benchmarks. We evaluated 20 state-of-the-art trackers and found that they struggle with the complexities of reflections. To provide a stronger baseline, we propose a new tracker, HiP-HaTrack, which uses hierarchical features to improve performance, significantly outperforming existing algorithms. We believe our benchmark, evaluation, and HiP-HaTrack will inspire further research and applications in tracking reflected objects. The TRO and code are available at https://github.com/OpenCodeGithub/HIP-HaTrack.
△ Less
Submitted 6 July, 2024;
originally announced July 2024.
-
A Calculus for Unreachable Code
Authors:
Peter Zhong,
Shu-Hung You,
Simone Campanoni,
Robert Bruce Findler,
Matthew Flatt,
Christos Dimoulas
Abstract:
In Racket, the LLVM IR, Rust, and other modern languages, programmers and static analyses can hint, with special annotations, that certain parts of a program are unreachable. Same as other assumptions about undefined behavior; the compiler assumes these hints are correct and transforms the program aggressively.
While compile-time transformations due to undefined behavior often perplex compiler w…
▽ More
In Racket, the LLVM IR, Rust, and other modern languages, programmers and static analyses can hint, with special annotations, that certain parts of a program are unreachable. Same as other assumptions about undefined behavior; the compiler assumes these hints are correct and transforms the program aggressively.
While compile-time transformations due to undefined behavior often perplex compiler writers and developers, we show that the essence of transformations due to unreachable code can be distilled in a surprisingly small set of simple formal rules. Specifically, following the well-established tradition of understanding linguistic phenomena through calculi, we introduce the first calculus for unreachable. Its term-rewriting rules that take advantage of unreachable fall into two groups. The first group allows the compiler to delete any code downstream of unreachable, and any effect-free code upstream of unreachable. The second group consists of rules that eliminate conditional expressions when one of their branches is unreachable. We show the correctness of the rules with a novel logical relation, and we examine how they correspond to transformations due to unreachable in Racket and LLVM.
△ Less
Submitted 5 July, 2024;
originally announced July 2024.
-
Retraining with Predicted Hard Labels Provably Increases Model Accuracy
Authors:
Rudrajit Das,
Inderjit S. Dhillon,
Alessandro Epasto,
Adel Javanmard,
Jieming Mao,
Vahab Mirrokni,
Sujay Sanghavi,
Peilin Zhong
Abstract:
The performance of a model trained with \textit{noisy labels} is often improved by simply \textit{retraining} the model with its own predicted \textit{hard} labels (i.e., $1$/$0$ labels). Yet, a detailed theoretical characterization of this phenomenon is lacking. In this paper, we theoretically analyze retraining in a linearly separable setting with randomly corrupted labels given to us and prove…
▽ More
The performance of a model trained with \textit{noisy labels} is often improved by simply \textit{retraining} the model with its own predicted \textit{hard} labels (i.e., $1$/$0$ labels). Yet, a detailed theoretical characterization of this phenomenon is lacking. In this paper, we theoretically analyze retraining in a linearly separable setting with randomly corrupted labels given to us and prove that retraining can improve the population accuracy obtained by initially training with the given (noisy) labels. To the best of our knowledge, this is the first such theoretical result. Retraining finds application in improving training with label differential privacy (DP) which involves training with noisy labels. We empirically show that retraining selectively on the samples for which the predicted label matches the given label significantly improves label DP training at \textit{no extra privacy cost}; we call this \textit{consensus-based retraining}. For e.g., when training ResNet-18 on CIFAR-100 with $ε=3$ label DP, we obtain $6.4\%$ improvement in accuracy with consensus-based retraining.
△ Less
Submitted 17 June, 2024;
originally announced June 2024.
-
Perturb-and-Project: Differentially Private Similarities and Marginals
Authors:
Vincent Cohen-Addad,
Tommaso d'Orsi,
Alessandro Epasto,
Vahab Mirrokni,
Peilin Zhong
Abstract:
We revisit the input perturbations framework for differential privacy where noise is added to the input $A\in \mathcal{S}$ and the result is then projected back to the space of admissible datasets $\mathcal{S}$. Through this framework, we first design novel efficient algorithms to privately release pair-wise cosine similarities. Second, we derive a novel algorithm to compute $k$-way marginal queri…
▽ More
We revisit the input perturbations framework for differential privacy where noise is added to the input $A\in \mathcal{S}$ and the result is then projected back to the space of admissible datasets $\mathcal{S}$. Through this framework, we first design novel efficient algorithms to privately release pair-wise cosine similarities. Second, we derive a novel algorithm to compute $k$-way marginal queries over $n$ features. Prior work could achieve comparable guarantees only for $k$ even. Furthermore, we extend our results to $t$-sparse datasets, where our efficient algorithms yields novel, stronger guarantees whenever $t\le n^{5/6}/\log n\,.$ Finally, we provide a theoretical perspective on why \textit{fast} input perturbation algorithms works well in practice. The key technical ingredients behind our results are tight sum-of-squares certificates upper bounding the Gaussian complexity of sets of solutions.
△ Less
Submitted 7 June, 2024;
originally announced June 2024.
-
High-Dimensional Geometric Streaming for Nearly Low Rank Data
Authors:
Hossein Esfandiari,
Vahab Mirrokni,
Praneeth Kacham,
David P. Woodruff,
Peilin Zhong
Abstract:
We study streaming algorithms for the $\ell_p$ subspace approximation problem. Given points $a_1, \ldots, a_n$ as an insertion-only stream and a rank parameter $k$, the $\ell_p$ subspace approximation problem is to find a $k$-dimensional subspace $V$ such that $(\sum_{i=1}^n d(a_i, V)^p)^{1/p}$ is minimized, where $d(a, V)$ denotes the Euclidean distance between $a$ and $V$ defined as…
▽ More
We study streaming algorithms for the $\ell_p$ subspace approximation problem. Given points $a_1, \ldots, a_n$ as an insertion-only stream and a rank parameter $k$, the $\ell_p$ subspace approximation problem is to find a $k$-dimensional subspace $V$ such that $(\sum_{i=1}^n d(a_i, V)^p)^{1/p}$ is minimized, where $d(a, V)$ denotes the Euclidean distance between $a$ and $V$ defined as $\min_{v \in V}\|{a - v}\|_{\infty}$. When $p = \infty$, we need to find a subspace $V$ that minimizes $\max_i d(a_i, V)$. For $\ell_{\infty}$ subspace approximation, we give a deterministic strong coreset construction algorithm and show that it can be used to compute a $\text{poly}(k, \log n)$ approximate solution. We show that the distortion obtained by our coreset is nearly tight for any sublinear space algorithm. For $\ell_p$ subspace approximation, we show that suitably scaling the points and then using our $\ell_{\infty}$ coreset construction, we can compute a $\text{poly}(k, \log n)$ approximation. Our algorithms are easy to implement and run very fast on large datasets. We also use our strong coreset construction to improve the results in a recent work of Woodruff and Yasuda (FOCS 2022) which gives streaming algorithms for high-dimensional geometric problems such as width estimation, convex hull estimation, and volume estimation.
△ Less
Submitted 5 June, 2024;
originally announced June 2024.
-
Overcoming systematic softening in universal machine learning interatomic potentials by fine-tuning
Authors:
Bowen Deng,
Yunyeong Choi,
Peichen Zhong,
Janosh Riebesell,
Shashwat Anand,
Zhuohan Li,
KyuJung Jun,
Kristin A. Persson,
Gerbrand Ceder
Abstract:
Machine learning interatomic potentials (MLIPs) have introduced a new paradigm for atomic simulations. Recent advancements have seen the emergence of universal MLIPs (uMLIPs) that are pre-trained on diverse materials datasets, providing opportunities for both ready-to-use universal force fields and robust foundations for downstream machine learning refinements. However, their performance in extrap…
▽ More
Machine learning interatomic potentials (MLIPs) have introduced a new paradigm for atomic simulations. Recent advancements have seen the emergence of universal MLIPs (uMLIPs) that are pre-trained on diverse materials datasets, providing opportunities for both ready-to-use universal force fields and robust foundations for downstream machine learning refinements. However, their performance in extrapolating to out-of-distribution complex atomic environments remains unclear. In this study, we highlight a consistent potential energy surface (PES) softening effect in three uMLIPs: M3GNet, CHGNet, and MACE-MP-0, which is characterized by energy and force under-prediction in a series of atomic-modeling benchmarks including surfaces, defects, solid-solution energetics, phonon vibration modes, ion migration barriers, and general high-energy states.
We find that the PES softening behavior originates from a systematic underprediction error of the PES curvature, which derives from the biased sampling of near-equilibrium atomic arrangements in uMLIP pre-training datasets. We demonstrate that the PES softening issue can be effectively rectified by fine-tuning with a single additional data point. Our findings suggest that a considerable fraction of uMLIP errors are highly systematic, and can therefore be efficiently corrected. This result rationalizes the data-efficient fine-tuning performance boost commonly observed with foundational MLIPs. We argue for the importance of a comprehensive materials dataset with improved PES sampling for next-generation foundational MLIPs.
△ Less
Submitted 11 May, 2024;
originally announced May 2024.
-
Optimal Communication for Classic Functions in the Coordinator Model and Beyond
Authors:
Hossein Esfandiari,
Praneeth Kacham,
Vahab Mirrokni,
David P. Woodruff,
Peilin Zhong
Abstract:
In the coordinator model of communication with $s$ servers, given an arbitrary non-negative function $f$, we study the problem of approximating the sum $\sum_{i \in [n]}f(x_i)$ up to a $1 \pm \varepsilon$ factor. Here the vector $x \in R^n$ is defined to be $x = x(1) + \cdots + x(s)$, where $x(j) \ge 0$ denotes the non-negative vector held by the $j$-th server. A special case of the problem is whe…
▽ More
In the coordinator model of communication with $s$ servers, given an arbitrary non-negative function $f$, we study the problem of approximating the sum $\sum_{i \in [n]}f(x_i)$ up to a $1 \pm \varepsilon$ factor. Here the vector $x \in R^n$ is defined to be $x = x(1) + \cdots + x(s)$, where $x(j) \ge 0$ denotes the non-negative vector held by the $j$-th server. A special case of the problem is when $f(x) = x^k$ which corresponds to the well-studied problem of $F_k$ moment estimation in the distributed communication model. We introduce a new parameter $c_f[s]$ which captures the communication complexity of approximating $\sum_{i\in [n]} f(x_i)$ and for a broad class of functions $f$ which includes $f(x) = x^k$ for $k \ge 2$ and other robust functions such as the Huber loss function, we give a two round protocol that uses total communication $c_f[s]/\varepsilon^2$ bits, up to polylogarithmic factors. For this broad class of functions, our result improves upon the communication bounds achieved by Kannan, Vempala, and Woodruff (COLT 2014) and Woodruff and Zhang (STOC 2012), obtaining the optimal communication up to polylogarithmic factors in the minimum number of rounds. We show that our protocol can also be used for approximating higher-order correlations.
Apart from the coordinator model, algorithms for other graph topologies in which each node is a server have been extensively studied. We argue that directly lifting protocols leads to inefficient algorithms. Hence, a natural question is the problems that can be efficiently solved in general graph topologies. We give communication efficient protocols in the so-called personalized CONGEST model for solving linear regression and low rank approximation by designing composable sketches. Our sketch construction may be of independent interest and can implement any importance sampling procedure that has a monotonicity property.
△ Less
Submitted 29 March, 2024;
originally announced March 2024.
-
Thermalization condition for non-Hermitian quantum systems
Authors:
Yiting Mao,
Peigeng Zhong,
Haiqing Lin,
Xiaoqun Wang,
Shijie Hu
Abstract:
The application of the eigenstate thermalization hypothesis to non-Hermitian quantum systems has become one of the most important topics in dissipative quantum chaos, recently giving rise to intense debates. The process of thermalization is intricate, involving many time-evolution trajectories in the reduced Hilbert space of the system. By considering two different expansion forms of the density m…
▽ More
The application of the eigenstate thermalization hypothesis to non-Hermitian quantum systems has become one of the most important topics in dissipative quantum chaos, recently giving rise to intense debates. The process of thermalization is intricate, involving many time-evolution trajectories in the reduced Hilbert space of the system. By considering two different expansion forms of the density matrices adopted in the biorthogonal and right-state time evolutions, we have derived two versions of the Gorini-Kossakowski-Sudarshan-Lindblad master equations describing the non-Hermitian systems coupled to a bosonic heat bath in thermal equilibrium. By solving the equations, we have identified a sufficient condition for thermalization under both time evolutions, resulting in Boltzmann biorthogonal and right-eigenstate statistics, respectively. This finding implies that the recently proposed biorthogonal random matrix theory needs an appropriate revision. Moreover, we have exemplified the precise dynamics of thermalization and thermodynamic properties with test models.
△ Less
Submitted 27 March, 2024;
originally announced March 2024.
-
The effect of cation-disorder on lithium transport in halide superionic conductors
Authors:
Peichen Zhong,
Sunny Gupta,
Bowen Deng,
KyuJung Jun,
Gerbrand Ceder
Abstract:
Among the chloride-based Li-ion solid electrolytes, Li$_2$ZrCl$_6$ (LZC) have emerged as potential candidates due to their affordability, moisture stability, and high ionic conductivity. LZC synthesized by solid-state heating exhibits limited Li-ion conductivity while the mechanochemical ball-milled material is more conductive. In this computational study, we integrate thermodynamic modeling, usin…
▽ More
Among the chloride-based Li-ion solid electrolytes, Li$_2$ZrCl$_6$ (LZC) have emerged as potential candidates due to their affordability, moisture stability, and high ionic conductivity. LZC synthesized by solid-state heating exhibits limited Li-ion conductivity while the mechanochemical ball-milled material is more conductive. In this computational study, we integrate thermodynamic modeling, using cluster-expansion Monte Carlo, and kinetic modeling, using molecular dynamics, to investigate whether cation disorder can be achieved in LZC, and how it affects Li-ion transport. Our results indicate that fast Li-ion conductivity is induced by the activation of Li/vacancy disorder, which itself depends on the degree of Zr disorder. We find that the very high-temperature scale at which equilibrium Zr-disorder can form precludes any equilibrium synthesis processes for achieving fast Li-ion conductivity, rationalizing why only non-equilibrium synthesis methods, such as ball milling leads to good conductivity. We identify as the critical mechanism the lack of Li/vacancy disorder near room temperature when Zr is well-ordered. Our simulations further show that the Li/vacancy order-disorder transition temperature is lowered by Zr disorder, which is necessary for creating high Li diffusivity at room temperature. The insights obtained from this study raise a challenge for the large-scale production of these materials and the potential for the long-term stability of their properties.
△ Less
Submitted 13 March, 2024;
originally announced March 2024.
-
Parallel Approximate Maximum Flows in Near-Linear Work and Polylogarithmic Depth
Authors:
Arpit Agarwal,
Sanjeev Khanna,
Huan Li,
Prathamesh Patil,
Chen Wang,
Nathan White,
Peilin Zhong
Abstract:
We present a parallel algorithm for the $(1-ε)$-approximate maximum flow problem in capacitated, undirected graphs with $n$ vertices and $m$ edges, achieving $O(ε^{-3}\text{polylog} n)$ depth and $O(m ε^{-3} \text{polylog} n)$ work in the PRAM model. Although near-linear time sequential algorithms for this problem have been known for almost a decade, no parallel algorithms that simultaneously achi…
▽ More
We present a parallel algorithm for the $(1-ε)$-approximate maximum flow problem in capacitated, undirected graphs with $n$ vertices and $m$ edges, achieving $O(ε^{-3}\text{polylog} n)$ depth and $O(m ε^{-3} \text{polylog} n)$ work in the PRAM model. Although near-linear time sequential algorithms for this problem have been known for almost a decade, no parallel algorithms that simultaneously achieved polylogarithmic depth and near-linear work were known.
At the heart of our result is a polylogarithmic depth, near-linear work recursive algorithm for computing congestion approximators. Our algorithm involves a recursive step to obtain a low-quality congestion approximator followed by a "boosting" step to improve its quality which prevents a multiplicative blow-up in error. Similar to Peng [SODA'16], our boosting step builds upon the hierarchical decomposition scheme of Räcke, Shah, and Täubig [SODA'14].
A direct implementation of this approach, however, leads only to an algorithm with $n^{o(1)}$ depth and $m^{1+o(1)}$ work. To get around this, we introduce a new hierarchical decomposition scheme, in which we only need to solve maximum flows on subgraphs obtained by contracting vertices, as opposed to vertex-induced subgraphs used in Räcke, Shah, and Täubig [SODA'14]. In particular, we are able to directly extract congestion approximators for the subgraphs from a congestion approximator for the entire graph, thereby avoiding additional recursion on those subgraphs. Along the way, we also develop a parallel flow-decomposition algorithm that is crucial to achieving polylogarithmic depth and may be of independent interest.
△ Less
Submitted 22 February, 2024;
originally announced February 2024.
-
Quadratic inference with dense functional responses
Authors:
Pratim Guha Niyogi,
Ping-Shou Zhong
Abstract:
We address the challenge of estimation in the context of constant linear effect models with dense functional responses. In this framework, the conditional expectation of the response curve is represented by a linear combination of functional covariates with constant regression parameters. In this paper, we present an alternative solution by employing the quadratic inference approach, a well-establ…
▽ More
We address the challenge of estimation in the context of constant linear effect models with dense functional responses. In this framework, the conditional expectation of the response curve is represented by a linear combination of functional covariates with constant regression parameters. In this paper, we present an alternative solution by employing the quadratic inference approach, a well-established method for analyzing correlated data, to estimate the regression coefficients. Our approach leverages non-parametrically estimated basis functions, eliminating the need for choosing working correlation structures. Furthermore, we demonstrate that our method achieves a parametric $\sqrt{n}$-convergence rate, contingent on an appropriate choice of bandwidth. This convergence is observed when the number of repeated measurements per trajectory exceeds a certain threshold, specifically, when it surpasses $n^{a_{0}}$, with $n$ representing the number of trajectories. Additionally, we establish the asymptotic normality of the resulting estimator. The performance of the proposed method is compared with that of existing methods through extensive simulation studies, where our proposed method outperforms. Real data analysis is also conducted to demonstrate the proposed method.
△ Less
Submitted 21 February, 2024;
originally announced February 2024.
-
Insights and caveats from mining local and global temporal motifs in cryptocurrency transaction networks
Authors:
Naomi A. Arnold,
Peijie Zhong,
Cheick Tidiane Ba,
Ben Steer,
Raul Mondragon,
Felix Cuadrado,
Renaud Lambiotte,
Richard G. Clegg
Abstract:
Distributed ledger technologies have opened up a wealth of fine-grained transaction data from cryptocurrencies like Bitcoin and Ethereum. This allows research into problems like anomaly detection, anti-money laundering, pattern mining and activity clustering (where data from traditional currencies is rarely available). The formalism of temporal networks offers a natural way of representing this da…
▽ More
Distributed ledger technologies have opened up a wealth of fine-grained transaction data from cryptocurrencies like Bitcoin and Ethereum. This allows research into problems like anomaly detection, anti-money laundering, pattern mining and activity clustering (where data from traditional currencies is rarely available). The formalism of temporal networks offers a natural way of representing this data and offers access to a wealth of metrics and models. However, the large scale of the data presents a challenge using standard graph analysis techniques. We use temporal motifs to analyse two Bitcoin datasets and one NFT dataset, using sequences of three transactions and up to three users. We show that the commonly used technique of simply counting temporal motifs over all users and all time can give misleading conclusions. Here we also study the motifs contributed by each user and discover that the motif distribution is heavy-tailed and that the key players have diverse motif signatures. We study the motifs that occur in different time periods and find events and anomalous activity that cannot be seen just by a count on the whole dataset. Studying motif completion time reveals dynamics driven by human behaviour as well as algorithmic behaviour.
△ Less
Submitted 14 February, 2024;
originally announced February 2024.
-
Density-matrix renormalization group algorithm for non-Hermitian systems
Authors:
Peigeng Zhong,
Wei Pan,
Haiqing Lin,
Xiaoqun Wang,
Shijie Hu
Abstract:
A biorthonormal-block density-matrix renormalization group algorithm is proposed to compute properties of non-Hermitian many-body systems, in which a structured low-rank approximation to a non-Hermitian reduced density matrix is implemented to fulfill the prerequisite for the biorthonormality of the renormalization transformation and to optimally construct a saved space as well. A redundancy assig…
▽ More
A biorthonormal-block density-matrix renormalization group algorithm is proposed to compute properties of non-Hermitian many-body systems, in which a structured low-rank approximation to a non-Hermitian reduced density matrix is implemented to fulfill the prerequisite for the biorthonormality of the renormalization transformation and to optimally construct a saved space as well. A redundancy assigned to the saved space of the reduced density matrix is exploited to reduce a condition number resulting from the left and right transformation matrices, thus ensuring the numerical stability of the renormalization procedure. The algorithm is successfully applied to an interacting fermionic Su-Schrieffer-Heeger model with both nonreciprocal hoppings and staggered complex chemical potential, exhibiting novel many-body phenomena in the ground-state phase diagram.
△ Less
Submitted 26 January, 2024;
originally announced January 2024.
-
HyperDID: Hyperspectral Intrinsic Image Decomposition with Deep Feature Embedding
Authors:
Zhiqiang Gong,
Xian Zhou,
Wen Yao,
Xiaohu Zheng,
Ping Zhong
Abstract:
The dissection of hyperspectral images into intrinsic components through hyperspectral intrinsic image decomposition (HIID) enhances the interpretability of hyperspectral data, providing a foundation for more accurate classification outcomes. However, the classification performance of HIID is constrained by the model's representational ability. To address this limitation, this study rethinks hyper…
▽ More
The dissection of hyperspectral images into intrinsic components through hyperspectral intrinsic image decomposition (HIID) enhances the interpretability of hyperspectral data, providing a foundation for more accurate classification outcomes. However, the classification performance of HIID is constrained by the model's representational ability. To address this limitation, this study rethinks hyperspectral intrinsic image decomposition for classification tasks by introducing deep feature embedding. The proposed framework, HyperDID, incorporates the Environmental Feature Module (EFM) and Categorical Feature Module (CFM) to extract intrinsic features. Additionally, a Feature Discrimination Module (FDM) is introduced to separate environment-related and category-related features. Experimental results across three commonly used datasets validate the effectiveness of HyperDID in improving hyperspectral image classification performance. This novel approach holds promise for advancing the capabilities of hyperspectral image analysis by leveraging deep feature embedding principles. The implementation of the proposed method could be accessed soon at https://github.com/shendu-sw/HyperDID for the sake of reproducibility.
△ Less
Submitted 24 November, 2023;
originally announced November 2023.
-
Near-Optimal $k$-Clustering in the Sliding Window Model
Authors:
David P. Woodruff,
Peilin Zhong,
Samson Zhou
Abstract:
Clustering is an important technique for identifying structural information in large-scale data analysis, where the underlying dataset may be too large to store. In many applications, recent data can provide more accurate information and thus older data past a certain time is expired. The sliding window model captures these desired properties and thus there has been substantial interest in cluster…
▽ More
Clustering is an important technique for identifying structural information in large-scale data analysis, where the underlying dataset may be too large to store. In many applications, recent data can provide more accurate information and thus older data past a certain time is expired. The sliding window model captures these desired properties and thus there has been substantial interest in clustering in the sliding window model.
In this paper, we give the first algorithm that achieves near-optimal $(1+\varepsilon)$-approximation to $(k,z)$-clustering in the sliding window model, where $z$ is the exponent of the distance function in the cost. Our algorithm uses $\frac{k}{\min(\varepsilon^4,\varepsilon^{2+z})}\,\text{polylog}\frac{nΔ}{\varepsilon}$ words of space when the points are from $[Δ]^d$, thus significantly improving on works by Braverman et. al. (SODA 2016), Borassi et. al. (NeurIPS 2021), and Epasto et. al. (SODA 2022).
Along the way, we develop a data structure for clustering called an online coreset, which outputs a coreset not only for the end of a stream, but also for all prefixes of the stream. Our online coreset samples $\frac{k}{\min(\varepsilon^4,\varepsilon^{2+z})}\,\text{polylog}\frac{nΔ}{\varepsilon}$ points from the stream. We then show that any online coreset requires $Ω\left(\frac{k}{\varepsilon^2}\log n\right)$ samples, which shows a separation from the problem of constructing an offline coreset, i.e., constructing online coresets is strictly harder. Our results also extend to general metrics on $[Δ]^d$ and are near-optimal in light of a $Ω\left(\frac{k}{\varepsilon^{2+z}}\right)$ lower bound for the size of an offline coreset.
△ Less
Submitted 1 November, 2023;
originally announced November 2023.
-
Existence and Asymptotic Behavior of Minimizers for Rotating Bose-Einstein Condensations in Bounded Domains
Authors:
Yongshuai Gao,
Shuai Li,
Peiye Zhong
Abstract:
This paper is concerned with the existence and mass concentration behavior of minimizers for rotating Bose-Einstein condensations (BECs) with attractive interactions in a bounded domain $\mathcal{D}\subset \mathbb{R}^2$. It is shown that, there exists a finite constant $a^*$, denoting mainly the critical number of bosons in the system, such that the least energy $e(a)$ admits minimizers if and onl…
▽ More
This paper is concerned with the existence and mass concentration behavior of minimizers for rotating Bose-Einstein condensations (BECs) with attractive interactions in a bounded domain $\mathcal{D}\subset \mathbb{R}^2$. It is shown that, there exists a finite constant $a^*$, denoting mainly the critical number of bosons in the system, such that the least energy $e(a)$ admits minimizers if and only if $0<a<a^*$, no matter the trapping potential $V(x)$ rotates at any velocity $Ω\geq0$. This is quite different from the rotating BECs in the whole plane case, where the existence conclusions depend on the value of $Ω$ (cf. \cite[Theorem 1.1]{GLY}). Moreover, by establishing the refined estimates of the rotation term and the least energy, we also analyze the mass concentration behavior of minimizers in a harmonic potential as $a\nearrow a^*$.
△ Less
Submitted 18 October, 2023;
originally announced October 2023.
-
Beyond Sharing Weights in Decoupling Feature Learning Network for UAV RGB-Infrared Vehicle Re-Identification
Authors:
Xingyue Liu,
Jiahao Qi,
Chen Chen,
Kangcheng Bin,
Ping Zhong
Abstract:
Owing to the capacity of performing full-time target search, cross-modality vehicle re-identification (Re-ID) based on unmanned aerial vehicle (UAV) is gaining more attention in both video surveillance and public security. However, this promising and innovative research has not been studied sufficiently due to the data inadequacy issue. Meanwhile, the cross-modality discrepancy and orientation dis…
▽ More
Owing to the capacity of performing full-time target search, cross-modality vehicle re-identification (Re-ID) based on unmanned aerial vehicle (UAV) is gaining more attention in both video surveillance and public security. However, this promising and innovative research has not been studied sufficiently due to the data inadequacy issue. Meanwhile, the cross-modality discrepancy and orientation discrepancy challenges further aggravate the difficulty of this task. To this end, we pioneer a cross-modality vehicle Re-ID benchmark named UAV Cross-Modality Vehicle Re-ID (UCM-VeID), containing 753 identities with 16015 RGB and 13913 infrared images. Moreover, to meet cross-modality discrepancy and orientation discrepancy challenges, we present a hybrid weights decoupling network (HWDNet) to learn the shared discriminative orientation-invariant features. For the first challenge, we proposed a hybrid weights siamese network with a well-designed weight restrainer and its corresponding objective function to learn both modality-specific and modality shared information. In terms of the second challenge, three effective decoupling structures with two pretext tasks are investigated to learn orientation-invariant feature. Comprehensive experiments are carried out to validate the effectiveness of the proposed method. The dataset and codes will be released at https://github.com/moonstarL/UAV-CM-VeID.
△ Less
Submitted 12 October, 2023;
originally announced October 2023.
-
PolySketchFormer: Fast Transformers via Sketching Polynomial Kernels
Authors:
Praneeth Kacham,
Vahab Mirrokni,
Peilin Zhong
Abstract:
The quadratic time and memory complexity inherent to self-attention mechanisms, with respect to sequence length, presents a critical computational bottleneck in the training and deployment of large-scale Transformer-based language models. Recent theoretical results indicate the intractability of sub-quadratic softmax attention approximation under reasonable complexity assumptions. This paper addre…
▽ More
The quadratic time and memory complexity inherent to self-attention mechanisms, with respect to sequence length, presents a critical computational bottleneck in the training and deployment of large-scale Transformer-based language models. Recent theoretical results indicate the intractability of sub-quadratic softmax attention approximation under reasonable complexity assumptions. This paper addresses this challenge by first demonstrating that polynomial attention with high degree can effectively replace softmax without sacrificing model quality. Next, we develop polynomial sketching techniques from numerical linear algebra to achieve linear-time polynomial attention with approximation guarantees. Crucially, our approach achieves this speedup without requiring the sparsification of attention matrices. We also present a block-based algorithm to apply causal masking efficiently. Combining these techniques, we provide \emph{PolySketchFormer}, a practical linear-time Transformer architecture for language modeling that offers provable guarantees.
We validate PolySketchFormer empirically by training language models capable of handling long contexts. These experiments utilize both synthetic and real-world datasets (PG19, Wikipedia and C4) on Google Cloud TPUs. For context lengths of 32k and GPT-2 style models, our model achieves a 2.5-4x speedup in training compared to FlashAttention, with no observed degradation in quality across our experiments.
△ Less
Submitted 17 March, 2024; v1 submitted 2 October, 2023;
originally announced October 2023.
-
Spectrum of Laplacian matrices associated with large random elliptic matrices
Authors:
Sean O'Rourke,
Zhi Yin,
Ping Zhong
Abstract:
A Laplacian matrix is a square matrix whose row sums are zero. We study the limiting eigenvalue distribution of a Laplacian matrix formed by taking a random elliptic matrix and subtracting the diagonal matrix containing its row sums. Under some mild assumptions, we show that the empirical spectral distribution of the Laplacian matrix converges to a deterministic probability distribution as the siz…
▽ More
A Laplacian matrix is a square matrix whose row sums are zero. We study the limiting eigenvalue distribution of a Laplacian matrix formed by taking a random elliptic matrix and subtracting the diagonal matrix containing its row sums. Under some mild assumptions, we show that the empirical spectral distribution of the Laplacian matrix converges to a deterministic probability distribution as the size of the matrix tends to infinity. The limiting measure can be interpreted as the Brown measure of the sum of an elliptic operator and a freely independent normal operator with a Gaussian distribution.
△ Less
Submitted 15 December, 2023; v1 submitted 30 August, 2023;
originally announced August 2023.
-
Long-Pulse Laser-Induced Cavitation: A Race Between Advection and Phase Transition
Authors:
Xuning Zhao,
Wentao Ma,
Junqin Chen,
Gaoming Xiang,
Pei Zhong,
Kevin Wang
Abstract:
Vapor bubbles generated by long-pulsed laser often have complex non-spherical shapes that reflect some characteristics (e.g., direction, width) of the laser beam. The transition between two commonly observed shapes - namely, a rounded pear-like shape and an elongated conical shape - is studied using a new computational model that combines compressible multiphase fluid dynamics with laser radiation…
▽ More
Vapor bubbles generated by long-pulsed laser often have complex non-spherical shapes that reflect some characteristics (e.g., direction, width) of the laser beam. The transition between two commonly observed shapes - namely, a rounded pear-like shape and an elongated conical shape - is studied using a new computational model that combines compressible multiphase fluid dynamics with laser radiation and phase transition. Two laboratory experiments are simulated, in which Holmium:YAG and Thulium fiber lasers are used separately to generate bubbles of different shapes. In both cases, the bubble morphology predicted by the simulation agrees reasonably well with the experimental measurement. The simulated laser radiance, temperature, velocity, and pressure fields are analyzed to explain bubble dynamics and energy transmission. It is found that due to the lasting energy input (i.e. long-pulsed laser), the vapor bubble's dynamics is driven not only by advection, but also by the continuation of vaporization. Notably, vaporization lasts less than 1 microsecond in the case of the pear-shaped bubble, versus more than 50 microseconds for the elongated bubble. It is hypothesized that the bubble's shape is the result of a competition. When the speed of advection is higher than that of vaporization, the bubble tends to grow spherically. Otherwise, it elongates along the laser beam direction. To clarify and test this hypothesis, the two speeds are defined analytically using a simplified model, then estimated for the experiments using simulation results. The results support the hypothesis. They also suggest that a higher laser absorption coefficient and a narrower beam facilitate bubble elongation.
△ Less
Submitted 22 August, 2023;
originally announced August 2023.
-
Massively Parallel Algorithms for High-Dimensional Euclidean Minimum Spanning Tree
Authors:
Rajesh Jayaram,
Vahab Mirrokni,
Shyam Narayanan,
Peilin Zhong
Abstract:
We study the classic Euclidean Minimum Spanning Tree (MST) problem in the Massively Parallel Computation (MPC) model. Given a set $X \subset \mathbb{R}^d$ of $n$ points, the goal is to produce a spanning tree for $X$ with weight within a small factor of optimal. Euclidean MST is one of the most fundamental hierarchical geometric clustering algorithms, and with the proliferation of enormous high-di…
▽ More
We study the classic Euclidean Minimum Spanning Tree (MST) problem in the Massively Parallel Computation (MPC) model. Given a set $X \subset \mathbb{R}^d$ of $n$ points, the goal is to produce a spanning tree for $X$ with weight within a small factor of optimal. Euclidean MST is one of the most fundamental hierarchical geometric clustering algorithms, and with the proliferation of enormous high-dimensional data sets, such as massive transformer-based embeddings, there is now a critical demand for efficient distributed algorithms to cluster such data sets.
In low-dimensional space, where $d = O(1)$, Andoni, Nikolov, Onak, and Yaroslavtsev [STOC '14] gave a constant round MPC algorithm that obtains a high accuracy $(1+ε)$-approximate solution. However, the situation is much more challenging for high-dimensional spaces: the best-known algorithm to obtain a constant approximation requires $O(\log n)$ rounds. Recently Chen, Jayaram, Levi, and Waingarten [STOC '22] gave a $\tilde{O}(\log n)$ approximation algorithm in a constant number of rounds based on embeddings into tree metrics. However, to date, no known algorithm achieves both a constant number of rounds and approximation.
In this paper, we make strong progress on this front by giving a constant factor approximation in $\tilde{O}(\log \log n)$ rounds of the MPC model. In contrast to tree-embedding-based approaches, which necessarily must pay $Ω(\log n)$-distortion, our algorithm is based on a new combination of graph-based distributed MST algorithms and geometric space partitions. Additionally, although the approximate MST we return can have a large depth, we show that it can be modified to obtain a $\tilde{O}(\log \log n)$-round constant factor approximation to the Euclidean Traveling Salesman Problem (TSP) in the MPC model. Previously, only a $O(\log n)$ round was known for the problem.
△ Less
Submitted 1 August, 2023;
originally announced August 2023.
-
Differentially Private Clustering in Data Streams
Authors:
Alessandro Epasto,
Tamalika Mukherjee,
Peilin Zhong
Abstract:
The streaming model is an abstraction of computing over massive data streams, which is a popular way of dealing with large-scale modern data analysis. In this model, there is a stream of data points, one after the other. A streaming algorithm is only allowed one pass over the data stream, and the goal is to perform some analysis during the stream while using as small space as possible. Clustering…
▽ More
The streaming model is an abstraction of computing over massive data streams, which is a popular way of dealing with large-scale modern data analysis. In this model, there is a stream of data points, one after the other. A streaming algorithm is only allowed one pass over the data stream, and the goal is to perform some analysis during the stream while using as small space as possible. Clustering problems (such as $k$-means and $k$-median) are fundamental unsupervised machine learning primitives, and streaming clustering algorithms have been extensively studied in the past. However, since data privacy becomes a central concern in many real-world applications, non-private clustering algorithms are not applicable in many scenarios.
In this work, we provide the first differentially private streaming algorithms for $k$-means and $k$-median clustering of $d$-dimensional Euclidean data points over a stream with length at most $T$ using $poly(k,d,\log(T))$ space to achieve a constant multiplicative error and a $poly(k,d,\log(T))$ additive error. In particular, we present a differentially private streaming clustering framework which only requires an offline DP coreset or clustering algorithm as a blackbox. By plugging in existing results from DP clustering Ghazi, Kumar, Manurangsi 2020 and Kaplan, Stemmer 2018, we achieve (1) a $(1+γ)$-multiplicative approximation with $\tilde{O}_γ(poly(k,d,\log(T)))$ space for any $γ>0$, and the additive error is $poly(k,d,\log(T))$ or (2) an $O(1)$-multiplicative approximation with $\tilde{O}(k^{1.5} \cdot poly(d,\log(T)))$ space and $poly(k,d,\log(T))$ additive error. In addition, our algorithmic framework is also differentially private under the continual release setting, i.e., the union of outputs of our algorithms at every timestamp is always differentially private.
△ Less
Submitted 7 January, 2024; v1 submitted 14 July, 2023;
originally announced July 2023.
-
Modeling intercalation chemistry with multi-redox reactions by sparse lattice models in disordered rocksalt cathodes
Authors:
Peichen Zhong,
Fengyu Xie,
Luis Barroso-Luque,
Liliang Huang,
Gerbrand Ceder
Abstract:
Modern battery materials can contain many elements with substantial site disorder, and their configurational state has been shown to be critical for their performance. The intercalation voltage profile is a critical parameter to evaluate the performance of energy storage. The application of commonly used cluster expansion techniques to model the intercalation thermodynamics of such systems from \t…
▽ More
Modern battery materials can contain many elements with substantial site disorder, and their configurational state has been shown to be critical for their performance. The intercalation voltage profile is a critical parameter to evaluate the performance of energy storage. The application of commonly used cluster expansion techniques to model the intercalation thermodynamics of such systems from \textit{ab-initio} is challenged by the combinatorial increase in configurational degrees of freedom as the number of species grows. Such challenges necessitate efficient generation of lattice models without over-fitting and proper sampling of the configurational space under charge balance in ionic systems. In this work, we introduce a combined approach that addresses these challenges by (1) constructing a robust cluster-expansion Hamiltonian using the sparse regression technique, including $\ell_0\ell_2$-norm regularization and structural hierarchy; and (2) implementing semigrand-canonical Monte Carlo to sample charge-balanced ionic configurations using the table-exchange method and an ensemble-average approach. These techniques are applied to a disordered rocksalt oxyfluoride Li$_{1.3-x}$Mn$_{0.4}$Nb$_{0.3}$O$_{1.6}$F$_{0.4}$ (LMNOF) which is part of a family of promising earth-abundant cathode materials. The simulated voltage profile is found to be in good agreement with experimental data and particularly provides a clear demonstration of the Mn and oxygen contribution to the redox potential as a function of Li content.
△ Less
Submitted 7 July, 2023;
originally announced July 2023.
-
Raphtory: The temporal graph engine for Rust and Python
Authors:
Ben Steer,
Naomi Arnold,
Cheick Tidiane Ba,
Renaud Lambiotte,
Haaroon Yousaf,
Lucas Jeub,
Fabian Murariu,
Shivam Kapoor,
Pedro Rico,
Rachel Chan,
Louis Chan,
James Alford,
Richard G. Clegg,
Felix Cuadrado,
Matthew Russell Barnes,
Peijie Zhong,
John N. Pougué Biyong,
Alhamza Alnaimi
Abstract:
Raphtory is a platform for building and analysing temporal networks. The library includes methods for creating networks from a variety of data sources; algorithms to explore their structure and evolution; and an extensible GraphQL server for deployment of applications built on top. Raphtory's core engine is built in Rust, for efficiency, with Python interfaces, for ease of use. Raphtory is develop…
▽ More
Raphtory is a platform for building and analysing temporal networks. The library includes methods for creating networks from a variety of data sources; algorithms to explore their structure and evolution; and an extensible GraphQL server for deployment of applications built on top. Raphtory's core engine is built in Rust, for efficiency, with Python interfaces, for ease of use. Raphtory is developed by network scientists, with a background in Physics, Applied Mathematics, Engineering and Computer Science, for use across academia and industry.
△ Less
Submitted 3 January, 2024; v1 submitted 28 June, 2023;
originally announced June 2023.
-
Optimizing pre-scheduled, intermittently-observed MDPs
Authors:
Patrick Zhong,
Federico Rossi,
Dylan A. Shell
Abstract:
A challenging category of robotics problems arises when sensing incurs substantial costs. This paper examines settings in which a robot wishes to limit its observations of state, for instance, motivated by specific considerations of energy management, stealth, or implicit coordination. We formulate the problem of planning under uncertainty when the robot's observations are intermittent but their t…
▽ More
A challenging category of robotics problems arises when sensing incurs substantial costs. This paper examines settings in which a robot wishes to limit its observations of state, for instance, motivated by specific considerations of energy management, stealth, or implicit coordination. We formulate the problem of planning under uncertainty when the robot's observations are intermittent but their timing is known via a pre-declared schedule. After having established the appropriate notion of an optimal policy for such settings, we tackle the problem of joint optimization of the cumulative execution cost and the number of state observations, both in expectation under discounts. To approach this multi-objective optimization problem, we introduce an algorithm that can identify the Pareto front for a class of schedules that are advantageous in the discounted setting. The algorithm proceeds in an accumulative fashion, prepending additions to a working set of schedules and then computing incremental changes to the value functions. Because full exhaustive construction becomes computationally prohibitive for moderate-sized problems, we propose a filtering approach to prune the working set. Empirical results demonstrate that this filtering is effective at reducing computation while incurring only negligible reduction in quality. In summarizing our findings, we provide a characterization of the run-time vs quality trade-off involved.
△ Less
Submitted 22 September, 2023; v1 submitted 15 May, 2023;
originally announced May 2023.
-
Charge Stripe Manipulation of Superconducting Pairing Symmetry Transition
Authors:
Chao Chen,
Peigeng Zhong,
Xuelei Sui,
Ying Liang,
Shijie Hu,
Tianxing Ma,
Hai-Qing Lin,
Bing Huang
Abstract:
While $d$-wave superconducting pairing symmetry dominates in cuprates, both $s$ and $d$ waves have been observed in infinite-layer nickelates. Understanding this novel difference is central to demystifying the similarities and distinctions between nickelates and cuprates. Here, by combining determinant quantum Monte Carlo with density-matrix renormalization group simulations in inhomogeneous Hubba…
▽ More
While $d$-wave superconducting pairing symmetry dominates in cuprates, both $s$ and $d$ waves have been observed in infinite-layer nickelates. Understanding this novel difference is central to demystifying the similarities and distinctions between nickelates and cuprates. Here, by combining determinant quantum Monte Carlo with density-matrix renormalization group simulations in inhomogeneous Hubbard models, we discover that the charge-stripe period $\mathcal{P}$, differing in cuprates and nickelates, plays an unexpected role in determining the emergence of distinct pairing symmetries. Interestingly, while the $d$ wave is dominant for $\mathcal{P} \ge 4$, both (extended) $s$ and $d$ waves can appear when $\mathcal{P} \le 3$. Taking $\mathcal{P}=3$ as the case for nickelates, we discover that the interplay between the hole-doping concentration $δ$ and charge-stripe amplitude $V_0$ can realize a novel $d$-$s$ wave transition. This interesting phenomenon originates from the charge-stripe-induced domain wall, which forms an unusual selection rule to generate $s$ and $d$ waves around the on-stripe region and inside the inter-stripe region, respectively, and gives rise to a critical point of $\mathcal{P}=3$ for the phase transition. Remarkably, during this transition, the $d$-wave state is transformed into a pairing-density wave state, competing with the $s$-wave state. Moreover, a novel magnetic-correlation transition accompanies the $d$-$s$ wave transition, indicating the inherent coupling between charge stripe, superconducting pairing, and magnetic correlation. In general, our unbiased simulations provide new insights into the difference in the superconducting pairing mechanism between nickelates and cuprates, highlighting the decisive role of charge stripe.
△ Less
Submitted 23 January, 2024; v1 submitted 27 April, 2023;
originally announced April 2023.
-
Measuring Re-identification Risk
Authors:
CJ Carey,
Travis Dick,
Alessandro Epasto,
Adel Javanmard,
Josh Karlin,
Shankar Kumar,
Andres Munoz Medina,
Vahab Mirrokni,
Gabriel Henrique Nunes,
Sergei Vassilvitskii,
Peilin Zhong
Abstract:
Compact user representations (such as embeddings) form the backbone of personalization services. In this work, we present a new theoretical framework to measure re-identification risk in such user representations. Our framework, based on hypothesis testing, formally bounds the probability that an attacker may be able to obtain the identity of a user from their representation. As an application, we…
▽ More
Compact user representations (such as embeddings) form the backbone of personalization services. In this work, we present a new theoretical framework to measure re-identification risk in such user representations. Our framework, based on hypothesis testing, formally bounds the probability that an attacker may be able to obtain the identity of a user from their representation. As an application, we show how our framework is general enough to model important real-world applications such as the Chrome's Topics API for interest-based advertising. We complement our theoretical bounds by showing provably good attack algorithms for re-identification that we use to estimate the re-identification risk in the Topics API. We believe this work provides a rigorous and interpretable notion of re-identification risk and a framework to measure it that can be used to inform real-world applications.
△ Less
Submitted 31 July, 2023; v1 submitted 12 April, 2023;
originally announced April 2023.
-
Deep learning of experimental electrochemistry for battery cathodes across diverse compositions
Authors:
Peichen Zhong,
Bowen Deng,
Tanjin He,
Zhengyan Lun,
Gerbrand Ceder
Abstract:
Artificial intelligence (AI) has emerged as a tool for discovering and optimizing novel battery materials. However, the adoption of AI in battery cathode representation and discovery is still limited due to the complexity of optimizing multiple performance properties and the scarcity of high-fidelity data. In this study, we present a machine-learning model (DRXNet) for battery informatics and demo…
▽ More
Artificial intelligence (AI) has emerged as a tool for discovering and optimizing novel battery materials. However, the adoption of AI in battery cathode representation and discovery is still limited due to the complexity of optimizing multiple performance properties and the scarcity of high-fidelity data. In this study, we present a machine-learning model (DRXNet) for battery informatics and demonstrate the application in the discovery and optimization of disordered rocksalt (DRX) cathode materials. We have compiled the electrochemistry data of DRX cathodes over the past five years, resulting in a dataset of more than 19,000 discharge voltage profiles on diverse chemistries spanning 14 different metal species. Learning from this extensive dataset, our DRXNet model can automatically capture critical features in the cycling curves of DRX cathodes under various conditions. Illustratively, the model gives rational predictions of the discharge capacity for diverse compositions in the Li--Mn--O--F chemical space as well as for high-entropy systems. As a universal model trained on diverse chemistries, our approach offers a data-driven solution to facilitate the rapid identification of novel cathode materials, accelerating the development of next-generation batteries for carbon neutralization.
△ Less
Submitted 2 April, 2024; v1 submitted 11 April, 2023;
originally announced April 2023.
-
Displacement field calculation of large-scale structures using computer vision with physical constraints
Authors:
Yapeng Guo,
Peng Zhong,
Yi Zhuo,
Fanzeng Meng,
Hao Di,
Shunlong Li
Abstract:
Because of the advantages of easy deployment, low cost and non-contact, computer vision-based structural displacement acquisition technique has received wide attention and research in recent years. However, the displacement field acquisition of large-scale structures is a challenging topic due to the contradiction of camera field of view and resolution. This paper presents a large-scale structural…
▽ More
Because of the advantages of easy deployment, low cost and non-contact, computer vision-based structural displacement acquisition technique has received wide attention and research in recent years. However, the displacement field acquisition of large-scale structures is a challenging topic due to the contradiction of camera field of view and resolution. This paper presents a large-scale structural displacement field calculation framework with integrated computer vision and physical constraints using only one camera. Firstly, the full-field image of the large-scale structure is obtained by processing the multi-view image using image stitching technique; secondly, the full-field image is meshed and the node displacements are calculated using an improved template matching method; and finally, the non-node displacements are described using shape functions considering physical constraints. The developed framework was validated using a scaled bridge model and evaluated by the proposed evaluation index for displacement field calculation accuracy. This paper can provide an effective way to obtain displacement fields of large-scale structures efficiently and cost-effectively.
△ Less
Submitted 31 March, 2023; v1 submitted 28 March, 2023;
originally announced March 2023.
-
Non-Markovian paths and cycles in NFT trades
Authors:
Haaroon Yousaf,
Naomi A. Arnold,
Renaud Lambiotte,
Timothy LaRock,
Richard G. Clegg,
Peijie Zhong,
Alhamza Alnaimi,
Ben Steer
Abstract:
Recent years have witnessed the availability of richer and richer datasets in a variety of domains, where signals often have a multi-modal nature, blending temporal, relational and semantic information. Within this context, several works have shown that standard network models are sometimes not sufficient to properly capture the complexity of real-world interacting systems. For this reason, differ…
▽ More
Recent years have witnessed the availability of richer and richer datasets in a variety of domains, where signals often have a multi-modal nature, blending temporal, relational and semantic information. Within this context, several works have shown that standard network models are sometimes not sufficient to properly capture the complexity of real-world interacting systems. For this reason, different attempts have been made to enrich the network language, leading to the emerging field of higher-order networks. In this work, we investigate the possibility of applying methods from higher-order networks to extract information from the online trade of Non-fungible tokens (NFTs), leveraging on their intrinsic temporal and non-Markovian nature. While NFTs as a technology open up the realms for many exciting applications, its future is marred by challenges of proof of ownership, scams, wash trading and possible money laundering. We demonstrate that by investigating time-respecting non-Markovian paths exhibited by NFT trades, we provide a practical path-based approach to fraud detection.
△ Less
Submitted 20 March, 2023;
originally announced March 2023.
-
CHGNet: Pretrained universal neural network potential for charge-informed atomistic modeling
Authors:
Bowen Deng,
Peichen Zhong,
KyuJung Jun,
Janosh Riebesell,
Kevin Han,
Christopher J. Bartel,
Gerbrand Ceder
Abstract:
The simulation of large-scale systems with complex electron interactions remains one of the greatest challenges for the atomistic modeling of materials. Although classical force fields often fail to describe the coupling between electronic states and ionic rearrangements, the more accurate \textit{ab-initio} molecular dynamics suffers from computational complexity that prevents long-time and large…
▽ More
The simulation of large-scale systems with complex electron interactions remains one of the greatest challenges for the atomistic modeling of materials. Although classical force fields often fail to describe the coupling between electronic states and ionic rearrangements, the more accurate \textit{ab-initio} molecular dynamics suffers from computational complexity that prevents long-time and large-scale simulations, which are essential to study many technologically relevant phenomena, such as reactions, ion migrations, phase transformations, and degradation.
In this work, we present the Crystal Hamiltonian Graph neural Network (CHGNet) as a novel machine-learning interatomic potential (MLIP), using a graph-neural-network-based force field to model a universal potential energy surface. CHGNet is pretrained on the energies, forces, stresses, and magnetic moments from the Materials Project Trajectory Dataset, which consists of over 10 years of density functional theory static and relaxation trajectories of $\sim 1.5$ million inorganic structures. The explicit inclusion of magnetic moments enables CHGNet to learn and accurately represent the orbital occupancy of electrons, enhancing its capability to describe both atomic and electronic degrees of freedom. We demonstrate several applications of CHGNet in solid-state materials, including charge-informed molecular dynamics in Li$_x$MnO$_2$, the finite temperature phase diagram for Li$_x$FePO$_4$ and Li diffusion in garnet conductors. We critically analyze the significance of including charge information for capturing appropriate chemistry, and we provide new insights into ionic systems with additional electronic degrees of freedom that can not be observed by previous MLIPs.
△ Less
Submitted 20 June, 2023; v1 submitted 27 February, 2023;
originally announced February 2023.
-
MP-Rec: Hardware-Software Co-Design to Enable Multi-Path Recommendation
Authors:
Samuel Hsia,
Udit Gupta,
Bilge Acun,
Newsha Ardalani,
Pan Zhong,
Gu-Yeon Wei,
David Brooks,
Carole-Jean Wu
Abstract:
Deep learning recommendation systems serve personalized content under diverse tail-latency targets and input-query loads. In order to do so, state-of-the-art recommendation models rely on terabyte-scale embedding tables to learn user preferences over large bodies of contents. The reliance on a fixed embedding representation of embedding tables not only imposes significant memory capacity and bandw…
▽ More
Deep learning recommendation systems serve personalized content under diverse tail-latency targets and input-query loads. In order to do so, state-of-the-art recommendation models rely on terabyte-scale embedding tables to learn user preferences over large bodies of contents. The reliance on a fixed embedding representation of embedding tables not only imposes significant memory capacity and bandwidth requirements but also limits the scope of compatible system solutions. This paper challenges the assumption of fixed embedding representations by showing how synergies between embedding representations and hardware platforms can lead to improvements in both algorithmic- and system performance. Based on our characterization of various embedding representations, we propose a hybrid embedding representation that achieves higher quality embeddings at the cost of increased memory and compute requirements. To address the system performance challenges of the hybrid representation, we propose MP-Rec -- a co-design technique that exploits heterogeneity and dynamic selection of embedding representations and underlying hardware platforms.
On real system hardware, we demonstrate how matching custom accelerators, i.e., GPUs, TPUs, and IPUs, with compatible embedding representations can lead to 16.65x performance speedup. Additionally, in query-serving scenarios, MP-Rec achieves 2.49x and 3.76x higher correct prediction throughput and 0.19% and 0.22% better model quality on a CPU-GPU system for the Kaggle and Terabyte datasets, respectively.
△ Less
Submitted 21 February, 2023;
originally announced February 2023.
-
Differentially Private Continual Releases of Streaming Frequency Moment Estimations
Authors:
Alessandro Epasto,
Jieming Mao,
Andres Munoz Medina,
Vahab Mirrokni,
Sergei Vassilvitskii,
Peilin Zhong
Abstract:
The streaming model of computation is a popular approach for working with large-scale data. In this setting, there is a stream of items and the goal is to compute the desired quantities (usually data statistics) while making a single pass through the stream and using as little space as possible.
Motivated by the importance of data privacy, we develop differentially private streaming algorithms u…
▽ More
The streaming model of computation is a popular approach for working with large-scale data. In this setting, there is a stream of items and the goal is to compute the desired quantities (usually data statistics) while making a single pass through the stream and using as little space as possible.
Motivated by the importance of data privacy, we develop differentially private streaming algorithms under the continual release setting, where the union of outputs of the algorithm at every timestamp must be differentially private. Specifically, we study the fundamental $\ell_p$ $(p\in [0,+\infty))$ frequency moment estimation problem under this setting, and give an $\varepsilon$-DP algorithm that achieves $(1+η)$-relative approximation $(\forall η\in(0,1))$ with $\mathrm{poly}\log(Tn)$ additive error and uses $\mathrm{poly}\log(Tn)\cdot \max(1, n^{1-2/p})$ space, where $T$ is the length of the stream and $n$ is the size of the universe of elements. Our space is near optimal up to poly-logarithmic factors even in the non-private setting.
To obtain our results, we first reduce several primitives under the differentially private continual release model, such as counting distinct elements, heavy hitters and counting low frequency elements, to the simpler, counting/summing problems in the same setting. Based on these primitives, we develop a differentially private continual release level set estimation approach to address the $\ell_p$ frequency moment estimation problem.
We also provide a simple extension of our results to the harder sliding window model, where the statistics must be maintained over the past $W$ data items.
△ Less
Submitted 13 January, 2023;
originally announced January 2023.
-
Testing the Graph of a Gaussian Graphical Model
Authors:
Thien-Minh Le,
Ping-Shou Zhong,
Chenlei Leng
Abstract:
The Gaussian graphical model is routinely employed to model the joint distribution of multiple random variables. The graph it induces is not only useful for describing the relationship between random variables but also critical for improving statistical estimation precision. In high-dimensional data analysis, despite an abundant literature on estimating this graph structure, tests for the adequacy…
▽ More
The Gaussian graphical model is routinely employed to model the joint distribution of multiple random variables. The graph it induces is not only useful for describing the relationship between random variables but also critical for improving statistical estimation precision. In high-dimensional data analysis, despite an abundant literature on estimating this graph structure, tests for the adequacy of its specification at a global level is severely underdeveloped. To make progress, this paper proposes a novel goodness-of-fit test that is computationally easy and theoretically tractable. Under the null hypothesis, it is shown that asymptotic distribution of the proposed test statistic follows a Gumbel distribution. Interestingly the location parameter of this limiting Gumbel distribution depends on the dependence structure under the null. We further develop a novel consistency-empowered test statistic when the true structure is nested in the postulated structure, by amplifying the noise incurred in estimation. Extensive simulation illustrates that the proposed test procedure has the right size under the null, and is powerful under the alternative. As an application, we apply the test to the analysis of a COVID-19 data set, demonstrating that our test can serve as a valuable tool in choosing a graph structure to improve estimation efficiency.
△ Less
Submitted 13 December, 2022;
originally announced December 2022.
-
Spatial modeling and future projection of extreme precipitation extents
Authors:
Peng Zhong,
Manuela Brunner,
Thomas Opitz,
Raphaël Huser
Abstract:
Extreme precipitation events with large spatial extents may have more severe impacts than localized events as they can lead to widespread flooding. It is debated how climate change may affect the spatial extent of precipitation extremes, whose investigation often directly relies on simulations from climate models. Here, we use a different strategy to investigate how future changes in spatial exten…
▽ More
Extreme precipitation events with large spatial extents may have more severe impacts than localized events as they can lead to widespread flooding. It is debated how climate change may affect the spatial extent of precipitation extremes, whose investigation often directly relies on simulations from climate models. Here, we use a different strategy to investigate how future changes in spatial extents of precipitation extremes differ across climate zones and seasons in two river basins (Danube and Mississippi). We rely on observed precipitation extremes while exploiting a physics-based mean temperature covariate, which enables us to project future precipitation extents. We include the covariate into newly developed time-varying $r$-Pareto processes using a suitably chosen spatial aggregation functional $r$. This model captures temporal non-stationarity in the spatial dependence structure of precipitation extremes by linking it to the temperature covariate, which we derive from observations for model calibration and from debiased climate simulations (CMIP6) for projections. For both river basins, our results show negative correlation between the spatial extent and the temperature covariate for most of the rain season and an increasing trend in the margins, indicating a decrease in spatial precipitation extent in a warming climate during rain seasons as precipitation intensity increases locally.
△ Less
Submitted 6 December, 2022;
originally announced December 2022.
-
Stars: Tera-Scale Graph Building for Clustering and Graph Learning
Authors:
CJ Carey,
Jonathan Halcrow,
Rajesh Jayaram,
Vahab Mirrokni,
Warren Schudy,
Peilin Zhong
Abstract:
A fundamental procedure in the analysis of massive datasets is the construction of similarity graphs. Such graphs play a key role for many downstream tasks, including clustering, classification, graph learning, and nearest neighbor search. For these tasks, it is critical to build graphs which are sparse yet still representative of the underlying data. The benefits of sparsity are twofold: firstly,…
▽ More
A fundamental procedure in the analysis of massive datasets is the construction of similarity graphs. Such graphs play a key role for many downstream tasks, including clustering, classification, graph learning, and nearest neighbor search. For these tasks, it is critical to build graphs which are sparse yet still representative of the underlying data. The benefits of sparsity are twofold: firstly, constructing dense graphs is infeasible in practice for large datasets, and secondly, the runtime of downstream tasks is directly influenced by the sparsity of the similarity graph. In this work, we present $\textit{Stars}$: a highly scalable method for building extremely sparse graphs via two-hop spanners, which are graphs where similar points are connected by a path of length at most two. Stars can construct two-hop spanners with significantly fewer similarity comparisons, which are a major bottleneck for learning based models where comparisons are expensive to evaluate. Theoretically, we demonstrate that Stars builds a graph in nearly-linear time, where approximate nearest neighbors are contained within two-hop neighborhoods. In practice, we have deployed Stars for multiple data sets allowing for graph building at the $\textit{Tera-Scale}$, i.e., for graphs with tens of trillions of edges. We evaluate the performance of Stars for clustering and graph learning, and demonstrate 10~1000-fold improvements in pairwise similarity comparisons compared to different baselines, and 2~10-fold improvement in running time without quality loss.
△ Less
Submitted 9 January, 2023; v1 submitted 5 December, 2022;
originally announced December 2022.
-
Deformed single ring theorems
Authors:
Ching-Wei Ho,
Ping Zhong
Abstract:
Given a sequence of deterministic matrices $A = A_N$ and a sequence of deterministic nonnegative matrices $Σ=Σ_N$ such that $A\to a$ and $Σ\to σ$ in $\ast$-distribution for some operators $a$ and $σ$ in a finite von Neumann algebra $\mathcal{A}$. Let $U =U_N$ and $V=V_N$ be independent Haar-distributed unitary matrices. We use free probability techniques to prove that, under mild assumptions, the…
▽ More
Given a sequence of deterministic matrices $A = A_N$ and a sequence of deterministic nonnegative matrices $Σ=Σ_N$ such that $A\to a$ and $Σ\to σ$ in $\ast$-distribution for some operators $a$ and $σ$ in a finite von Neumann algebra $\mathcal{A}$. Let $U =U_N$ and $V=V_N$ be independent Haar-distributed unitary matrices. We use free probability techniques to prove that, under mild assumptions, the empirical eigenvalue distribution of $UΣV^*+A$ converges to the Brown measure of $T+a$, where $T\in\mathcal{A}$ is an $R$-diagonal operator freely independent from $a$ and $\vert T\vert$ has the same distribution as $σ$. The assumptions can be removed if $A$ is Hermitian or unitary. By putting $A= 0$, our result removes a regularity assumption in the single ring theorem by Guionnet, Krishnapur and Zeitouni. We also prove a local convergence on optimal scale, extending the local single ring theorem of Bao, Erdős and Schnelli.
△ Less
Submitted 14 August, 2023; v1 submitted 20 October, 2022;
originally announced October 2022.
-
Partial Tail-Correlation Coefficient Applied to Extremal-Network Learning
Authors:
Yan Gong,
Peng Zhong,
Thomas Opitz,
Raphaël Huser
Abstract:
We propose a novel extremal dependence measure called the partial tail-correlation coefficient (PTCC), in analogy to the partial correlation coefficient in classical multivariate analysis. The construction of our new coefficient is based on the framework of multivariate regular variation and transformed-linear algebra operations. We show how this coefficient allows identifying pairs of variables t…
▽ More
We propose a novel extremal dependence measure called the partial tail-correlation coefficient (PTCC), in analogy to the partial correlation coefficient in classical multivariate analysis. The construction of our new coefficient is based on the framework of multivariate regular variation and transformed-linear algebra operations. We show how this coefficient allows identifying pairs of variables that have partially uncorrelated tails given the other variables in a random vector. Unlike other recently introduced conditional independence frameworks for extremes, our approach requires minimal modeling assumptions and can thus be used in exploratory analyses to learn the structure of extremal graphical models. Similarly to traditional Gaussian graphical models where edges correspond to the non-zero entries of the precision matrix, we can exploit classical inference methods for high-dimensional data, such as the graphical LASSO with Laplacian spectral constraints, to efficiently learn the extremal network structure via the PTCC. We apply our new method to study extreme risk networks in two different datasets (extreme river discharges and historical global currency exchange data) and show that we can extract meaningful extremal structures with meaningful domain-specific interpretations.
△ Less
Submitted 22 November, 2022; v1 submitted 13 October, 2022;
originally announced October 2022.
-
Grand-canonical Monte-Carlo simulation methods for charge-decorated cluster expansions
Authors:
Fengyu Xie,
Peichen Zhong,
Luis Barroso-Luque,
Bin Ouyang,
Gerbrand Ceder
Abstract:
Monte-Carlo sampling of lattice model Hamiltonians is a well-established technique in statistical mechanics for studying the configurational entropy of crystalline materials. When species to be distributed on the lattice model carry charge, the charge balance constraint on the overall system prohibits single-site Metropolis exchanges in MC. In this article, we propose two methods to perform MC sam…
▽ More
Monte-Carlo sampling of lattice model Hamiltonians is a well-established technique in statistical mechanics for studying the configurational entropy of crystalline materials. When species to be distributed on the lattice model carry charge, the charge balance constraint on the overall system prohibits single-site Metropolis exchanges in MC. In this article, we propose two methods to perform MC sampling in the grand-canonical ensemble in the presence of a charge-balance constraint. The table-exchange method (TE) constructs small charge-conserving excitations, and the square-charge bias method (SCB) allows the system to temporarily drift away from charge neutrality. We illustrate the effect of internal hyper-parameters on the efficiency of these algorithms and suggest practical strategies on how to apply these algorithms to real applications.
△ Less
Submitted 3 October, 2022;
originally announced October 2022.
-
The spectrum of local random Hamiltonians
Authors:
Benoit Collins,
Zhi Yin,
Liang Zhao,
Ping Zhong
Abstract:
The spectrum of a local random Hamiltonian can be represented generically by the so-called $ε$-free convolution of its local terms' probability distributions. We establish an isomorphism between the set of $ε$-noncrossing partitions and permutations to study its spectrum. Moreover, we derive some lower and upper bounds for the largest eigenvalue of the Hamiltonian.
The spectrum of a local random Hamiltonian can be represented generically by the so-called $ε$-free convolution of its local terms' probability distributions. We establish an isomorphism between the set of $ε$-noncrossing partitions and permutations to study its spectrum. Moreover, we derive some lower and upper bounds for the largest eigenvalue of the Hamiltonian.
△ Less
Submitted 30 September, 2022;
originally announced October 2022.
-
The Brown measure of a sum of two free random variables, one of which is R-diagonal
Authors:
Hari Bercovici,
Ping Zhong
Abstract:
We obtain a formula for the Brown measure of the sum of an $R$-diagonal operator and a free random variables using subordination functions. This allows us to provide a unified approach to the Brown measures of many known examples which include $R$-diagonal operators, the sum with a free circular operator and the sum with a free Cauchy operator. This answers a question of Biane and Lehner.
We obtain a formula for the Brown measure of the sum of an $R$-diagonal operator and a free random variables using subordination functions. This allows us to provide a unified approach to the Brown measures of many known examples which include $R$-diagonal operators, the sum with a free circular operator and the sum with a free Cauchy operator. This answers a question of Biane and Lehner.
△ Less
Submitted 25 September, 2022;
originally announced September 2022.
-
The Brown measure of a sum of two free random variables, one of which is triangular elliptic
Authors:
Serban Belinschi,
Zhi Yin,
Ping Zhong
Abstract:
The triangular elliptic operators are natural extensions of the elliptic deformation of circular operators. We obtain a Brown measure formula for the sum of a triangular elliptic operator $g_{_{α, β, γ}}$ with a random variable $x_0$, which is $*$-free from $g_{_{α, β, γ}}$ with amalgamation over certain unital subalgebra. Let $c_t$ be a circular operator. We prove that the Brown measure of…
▽ More
The triangular elliptic operators are natural extensions of the elliptic deformation of circular operators. We obtain a Brown measure formula for the sum of a triangular elliptic operator $g_{_{α, β, γ}}$ with a random variable $x_0$, which is $*$-free from $g_{_{α, β, γ}}$ with amalgamation over certain unital subalgebra. Let $c_t$ be a circular operator. We prove that the Brown measure of $x_0 + g_{_{α, β, γ}}$ is the push-forward measure of the Brown measure of $x_0 + c_t$ by an explicitly defined map on $\mathbb{C}$ for some suitable $t$. We show that the Brown measure of $x_0+c_t$ is absolutely continuous with respect to the Lebesgue measure on $\mathbb{C}$ and its density is bounded by $1/(π{t})$. This work generalizes earlier results on the addition with a circular operator, semicircular operator, or elliptic operator to a larger class of operators. We extend operator-valued subordination functions, due to Biane and Voiculescu, to certain unbounded operators. This allows us to extend our results to unbounded operators.
△ Less
Submitted 14 February, 2024; v1 submitted 23 September, 2022;
originally announced September 2022.
-
Functional varying-coefficient model under heteroskedasticity with application to DTI data
Authors:
Pratim Guha Niyogi,
Ping-Shou Zhong,
Xiaohong Joe Zhou
Abstract:
In this paper, we develop a multi-step estimation procedure to simultaneously estimate the varying-coefficient functions using a local-linear generalized method of moments (GMM) based on continuous moment conditions. To incorporate spatial dependence, the continuous moment conditions are first projected onto eigen-functions and then combined by weighted eigen-values, thereby, solving the challenge…
▽ More
In this paper, we develop a multi-step estimation procedure to simultaneously estimate the varying-coefficient functions using a local-linear generalized method of moments (GMM) based on continuous moment conditions. To incorporate spatial dependence, the continuous moment conditions are first projected onto eigen-functions and then combined by weighted eigen-values, thereby, solving the challenges of using an inverse covariance operator directly. We propose an optimal instrument variable that minimizes the asymptotic variance function among the class of all local-linear GMM estimators, and it outperforms the initial estimates which do not incorporate the spatial dependence. Our proposed method significantly improves the accuracy of the estimation under heteroskedasticity and its asymptotic properties have been investigated. Extensive simulation studies illustrate the finite sample performance, and the efficacy of the proposed method is confirmed by real data analysis.
△ Less
Submitted 18 July, 2022;
originally announced July 2022.
-
Masked Spatial-Spectral Autoencoders Are Excellent Hyperspectral Defenders
Authors:
Jiahao Qi,
Zhiqiang Gong,
Xingyue Liu,
Kangcheng Bin,
Chen Chen,
Yongqian Li,
Wei Xue,
Yu Zhang,
Ping Zhong
Abstract:
Deep learning methodology contributes a lot to the development of hyperspectral image (HSI) analysis community. However, it also makes HSI analysis systems vulnerable to adversarial attacks. To this end, we propose a masked spatial-spectral autoencoder (MSSA) in this paper under self-supervised learning theory, for enhancing the robustness of HSI analysis systems. First, a masked sequence attentio…
▽ More
Deep learning methodology contributes a lot to the development of hyperspectral image (HSI) analysis community. However, it also makes HSI analysis systems vulnerable to adversarial attacks. To this end, we propose a masked spatial-spectral autoencoder (MSSA) in this paper under self-supervised learning theory, for enhancing the robustness of HSI analysis systems. First, a masked sequence attention learning module is conducted to promote the inherent robustness of HSI analysis systems along spectral channel. Then, we develop a graph convolutional network with learnable graph structure to establish global pixel-wise combinations.In this way, the attack effect would be dispersed by all the related pixels among each combination, and a better defense performance is achievable in spatial aspect.Finally, to improve the defense transferability and address the problem of limited labelled samples, MSSA employs spectra reconstruction as a pretext task and fits the datasets in a self-supervised manner.Comprehensive experiments over three benchmarks verify the effectiveness of MSSA in comparison with the state-of-the-art hyperspectral classification methods and representative adversarial defense strategies.
△ Less
Submitted 15 July, 2022;
originally announced July 2022.
-
Differentially Private Graph Learning via Sensitivity-Bounded Personalized PageRank
Authors:
Alessandro Epasto,
Vahab Mirrokni,
Bryan Perozzi,
Anton Tsitsulin,
Peilin Zhong
Abstract:
Personalized PageRank (PPR) is a fundamental tool in unsupervised learning of graph representations such as node ranking, labeling, and graph embedding. However, while data privacy is one of the most important recent concerns, existing PPR algorithms are not designed to protect user privacy. PPR is highly sensitive to the input graph edges: the difference of only one edge may cause a big change in…
▽ More
Personalized PageRank (PPR) is a fundamental tool in unsupervised learning of graph representations such as node ranking, labeling, and graph embedding. However, while data privacy is one of the most important recent concerns, existing PPR algorithms are not designed to protect user privacy. PPR is highly sensitive to the input graph edges: the difference of only one edge may cause a big change in the PPR vector, potentially leaking private user data.
In this work, we propose an algorithm which outputs an approximate PPR and has provably bounded sensitivity to input edges. In addition, we prove that our algorithm achieves similar accuracy to non-private algorithms when the input graph has large degrees. Our sensitivity-bounded PPR directly implies private algorithms for several tools of graph learning, such as, differentially private (DP) PPR ranking, DP node classification, and DP node embedding. To complement our theoretical analysis, we also empirically verify the practical performances of our algorithms.
△ Less
Submitted 14 February, 2024; v1 submitted 14 July, 2022;
originally announced July 2022.
-
A CNN with Noise Inclined Module and Denoise Framework for Hyperspectral Image Classification
Authors:
Zhiqiang Gong,
Ping Zhong,
Jiahao Qi,
Panhe Hu
Abstract:
Deep Neural Networks have been successfully applied in hyperspectral image classification. However, most of prior works adopt general deep architectures while ignore the intrinsic structure of the hyperspectral image, such as the physical noise generation. This would make these deep models unable to generate discriminative features and provide impressive classification performance. To leverage suc…
▽ More
Deep Neural Networks have been successfully applied in hyperspectral image classification. However, most of prior works adopt general deep architectures while ignore the intrinsic structure of the hyperspectral image, such as the physical noise generation. This would make these deep models unable to generate discriminative features and provide impressive classification performance. To leverage such intrinsic information, this work develops a novel deep learning framework with the noise inclined module and denoise framework for hyperspectral image classification. First, we model the spectral signature of hyperspectral image with the physical noise model to describe the high intraclass variance of each class and great overlapping between different classes in the image. Then, a noise inclined module is developed to capture the physical noise within each object and a denoise framework is then followed to remove such noise from the object. Finally, the CNN with noise inclined module and the denoise framework is developed to obtain discriminative features and provides good classification performance of hyperspectral image. Experiments are conducted over two commonly used real-world datasets and the experimental results show the effectiveness of the proposed method. The implementation of the proposed method and other compared methods could be accessed at https://github.com/shendu-sw/noise-physical-framework.
△ Less
Submitted 24 May, 2022;
originally announced May 2022.
-
Transferable Physical Attack against Object Detection with Separable Attention
Authors:
Yu Zhang,
Zhiqiang Gong,
Yichuang Zhang,
YongQian Li,
Kangcheng Bin,
Jiahao Qi,
Wei Xue,
Ping Zhong
Abstract:
Transferable adversarial attack is always in the spotlight since deep learning models have been demonstrated to be vulnerable to adversarial samples. However, existing physical attack methods do not pay enough attention on transferability to unseen models, thus leading to the poor performance of black-box attack.In this paper, we put forward a novel method of generating physically realizable adver…
▽ More
Transferable adversarial attack is always in the spotlight since deep learning models have been demonstrated to be vulnerable to adversarial samples. However, existing physical attack methods do not pay enough attention on transferability to unseen models, thus leading to the poor performance of black-box attack.In this paper, we put forward a novel method of generating physically realizable adversarial camouflage to achieve transferable attack against detection models. More specifically, we first introduce multi-scale attention maps based on detection models to capture features of objects with various resolutions. Meanwhile, we adopt a sequence of composite transformations to obtain the averaged attention maps, which could curb model-specific noise in the attention and thus further boost transferability. Unlike the general visualization interpretation methods where model attention should be put on the foreground object as much as possible, we carry out attack on separable attention from the opposite perspective, i.e. suppressing attention of the foreground and enhancing that of the background. Consequently, transferable adversarial camouflage could be yielded efficiently with our novel attention-based loss function. Extensive comparison experiments verify the superiority of our method to state-of-the-art methods.
△ Less
Submitted 19 May, 2022;
originally announced May 2022.
-
An $\ell_0\ell_2$-norm regularized regression model for construction of robust cluster expansions in multicomponent systems
Authors:
Peichen Zhong,
Tina Chen,
Luis Barroso-Luque,
Fengyu Xie,
Gerbrand Ceder
Abstract:
We introduce the $\ell_0\ell_2$-norm regularization and hierarchy constraints into linear regression for the construction of cluster expansion to describe configurational disorder in materials. The approach is implemented through mixed integer quadratic programming (MIQP). The $\ell_2$-norm regularization is used to suppress intrinsic data noise, while $\ell_0$-norm is used to penalize the number…
▽ More
We introduce the $\ell_0\ell_2$-norm regularization and hierarchy constraints into linear regression for the construction of cluster expansion to describe configurational disorder in materials. The approach is implemented through mixed integer quadratic programming (MIQP). The $\ell_2$-norm regularization is used to suppress intrinsic data noise, while $\ell_0$-norm is used to penalize the number of non-zero elements in the solution. The hierarchy relation between clusters imposes relevant physics and is naturally included by the MIQP paradigm. As such, sparseness and cluster hierarchy can be well optimized to obtain a robust, converged, and effective cluster interactions with improved physical meaning. We demonstrate the effectiveness of $\ell_0\ell_2$-norm regularization in two high-component disordered rocksalt cathode material systems, where we compare the cross-validation and convergence speed, reproduction of phase diagrams, voltage profiles, and Li-occupancy energies with those of the conventional $\ell_1$-norm regularized cluster expansion model.
△ Less
Submitted 27 June, 2022; v1 submitted 28 April, 2022;
originally announced April 2022.
-
Quantum phase diagram for two species hardcore bosons in one-dimensional optical lattices with the resonantly driven Rabi frequency
Authors:
Peigeng Zhong,
Tao Wang,
Shijie Hu,
Haiqing Lin
Abstract:
We propose an experimental realization of the time-periodically modulated Rabi frequency and suggest density-dependent hoppings of two species hardcore bosons in a one-dimensional optical lattice. Distinct from the previous work [Phys. Rev. Research {\bf 2}, 013275 (2020)], we study effects in the first resonance region. In the effective Hamiltonian, the intra-species hopping occurs only if the de…
▽ More
We propose an experimental realization of the time-periodically modulated Rabi frequency and suggest density-dependent hoppings of two species hardcore bosons in a one-dimensional optical lattice. Distinct from the previous work [Phys. Rev. Research {\bf 2}, 013275 (2020)], we study effects in the first resonance region. In the effective Hamiltonian, the intra-species hopping occurs only if the density discrepancy of the other species on these sites is zero, while the inter-species one is allowed once the relevant density discrepancy becomes nonzero. At integer-$1$ filling, the quantum phase diagram of the effective Hamiltonian is determined by the perturbation analysis together with numerical calculations. We find that in the limit of dominant $J_{1}$, the system becomes a double-degenerate dimerized state, with spontaneously breaking the translation symmetry. The interplay of $J_{0}$, $J_{1}$ and the fixed ${\bar U}=1$ leads to three BKT transition lines and a tricritical BKT point. Exact transition lines are obtained by the level spectroscopic technique. Besides, general physical properties, including the charge gap, neutral gap, superfluid density and dimerization strength, are investigated as well.
△ Less
Submitted 7 June, 2022; v1 submitted 16 April, 2022;
originally announced April 2022.
-
Brown measure of $R$-diagonal operators, revisited
Authors:
Ping Zhong
Abstract:
We use subordination functions perspective to reformulate Haagerup--Schultz's approach for the Brown measure of $R$-diagonal operators. This allows us to simplify the original argument and find a connection with the other approach due to Belinschi-Śniady-Speicher. The Brown measure formula can be rewritten in terms of subordination functions.
We use subordination functions perspective to reformulate Haagerup--Schultz's approach for the Brown measure of $R$-diagonal operators. This allows us to simplify the original argument and find a connection with the other approach due to Belinschi-Śniady-Speicher. The Brown measure formula can be rewritten in terms of subordination functions.
△ Less
Submitted 28 October, 2022; v1 submitted 4 April, 2022;
originally announced April 2022.