-
A Theoretical Analysis of Efficiency Constrained Utility-Privacy Bi-Objective Optimization in Federated Learning
Authors:
Hanlin Gu,
Xinyuan Zhao,
Gongxi Zhu,
Yuxing Han,
Yan Kang,
Lixin Fan,
Qiang Yang
Abstract:
Federated learning (FL) enables multiple clients to collaboratively learn a shared model without sharing their individual data. Concerns about utility, privacy, and training efficiency in FL have garnered significant research attention. Differential privacy has emerged as a prevalent technique in FL, safeguarding the privacy of individual user data while impacting utility and training efficiency.…
▽ More
Federated learning (FL) enables multiple clients to collaboratively learn a shared model without sharing their individual data. Concerns about utility, privacy, and training efficiency in FL have garnered significant research attention. Differential privacy has emerged as a prevalent technique in FL, safeguarding the privacy of individual user data while impacting utility and training efficiency. Within Differential Privacy Federated Learning (DPFL), previous studies have primarily focused on the utility-privacy trade-off, neglecting training efficiency, which is crucial for timely completion. Moreover, differential privacy achieves privacy by introducing controlled randomness (noise) on selected clients in each communication round. Previous work has mainly examined the impact of noise level ($σ$) and communication rounds ($T$) on the privacy-utility dynamic, overlooking other influential factors like the sample ratio ($q$, the proportion of selected clients). This paper systematically formulates an efficiency-constrained utility-privacy bi-objective optimization problem in DPFL, focusing on $σ$, $T$, and $q$. We provide a comprehensive theoretical analysis, yielding analytical solutions for the Pareto front. Extensive empirical experiments verify the validity and efficacy of our analysis, offering valuable guidance for low-cost parameter design in DPFL.
△ Less
Submitted 29 January, 2024; v1 submitted 27 December, 2023;
originally announced December 2023.
-
The Security Analysis of Continuous-Variable Quantum Key Distribution under Limited Eavesdropping with Practical Fiber
Authors:
Sheng Liu,
Lu Fan,
Zhengyu Li,
Qiang Zhou,
Yunbo Li,
Dong Wang,
Dechao Zhang,
Yichen Zhang,
Han Li
Abstract:
Research on optimal eavesdropping models under practical conditions will help to evaluate realistic risk when employing quantum key distribution (QKD) system for secure information transmission. Intuitively, fiber loss will lead to the optical energy leaking to the environment, rather than harvested by the eavesdropper, which also limits the eavesdropping ability while improving the QKD system per…
▽ More
Research on optimal eavesdropping models under practical conditions will help to evaluate realistic risk when employing quantum key distribution (QKD) system for secure information transmission. Intuitively, fiber loss will lead to the optical energy leaking to the environment, rather than harvested by the eavesdropper, which also limits the eavesdropping ability while improving the QKD system performance in practical use. However, defining the optimal eavesdropping model in the presence of lossy fiber is difficult because the channel is beyond the control of legitimate partners and the leaked signal is undetectable. Here we investigate how the fiber loss influences the eavesdropping ability based on a teleportation-based collective attack model which requires two distant stations and a shared entanglement source. We find that if the distributed entanglement is limited due to the practical loss, the optimal attack occurs when the two teleportation stations are merged to one and placed close to the transmitter site, which performs similar to the entangling-cloning attack but with a reduced wiretapping ratio. Assuming Eve uses the best available hollow-core fiber, the secret key rate in the practical environment can be 20%~40% higher than that under ideal eavesdropping. While if the entanglement distillation technology is mature enough to provide high quality of distributed entanglement, the two teleportation stations should be distantly separated for better eavesdropping performance, where the eavesdropping can even approach the optimal collective attack. Under the current level of entanglement purification technology, the unavoidable fiber loss can still greatly limit the eavesdropping ability as well as enhance the secret key rate and transmission distance of the realistic system, which promotes the development of QKD systems in practical application scenarios.
△ Less
Submitted 29 December, 2023; v1 submitted 23 December, 2023;
originally announced December 2023.
-
Quantum-Assisted Online Task Offloading and Resource Allocation in MEC-Enabled Satellite-Aerial-Terrestrial Integrated Networks
Authors:
Yu Zhang,
Yanmin Gong,
Lei Fan,
Yu Wang,
Zhu Han,
Yuanxiong Guo
Abstract:
In the era of Internet of Things (IoT), multi-access edge computing (MEC)-enabled satellite-aerial-terrestrial integrated network (SATIN) has emerged as a promising technology to provide massive IoT devices with seamless and reliable communication and computation services. This paper investigates the cooperation of low Earth orbit (LEO) satellites, high altitude platforms (HAPs), and terrestrial b…
▽ More
In the era of Internet of Things (IoT), multi-access edge computing (MEC)-enabled satellite-aerial-terrestrial integrated network (SATIN) has emerged as a promising technology to provide massive IoT devices with seamless and reliable communication and computation services. This paper investigates the cooperation of low Earth orbit (LEO) satellites, high altitude platforms (HAPs), and terrestrial base stations (BSs) to provide relaying and computation services for vastly distributed IoT devices. Considering the uncertainty in dynamic SATIN systems, we formulate a stochastic optimization problem to minimize the time-average expected service delay by jointly optimizing resource allocation and task offloading while satisfying the energy constraints. To solve the formulated problem, we first develop a Lyapunov-based online control algorithm to decompose it into multiple one-slot problems. Since each one-slot problem is a large-scale mixed-integer nonlinear program (MINLP) that is intractable for classical computers, we further propose novel hybrid quantum-classical generalized Benders' decomposition (HQCGBD) algorithms to solve the problem efficiently by leveraging quantum advantages in parallel computing. Numerical results validate the effectiveness of the proposed MEC-enabled SATIN schemes.
△ Less
Submitted 25 December, 2023;
originally announced December 2023.
-
NPHardEval: Dynamic Benchmark on Reasoning Ability of Large Language Models via Complexity Classes
Authors:
Lizhou Fan,
Wenyue Hua,
Lingyao Li,
Haoyang Ling,
Yongfeng Zhang
Abstract:
Complex reasoning ability is one of the most important features of current LLMs, which has also been leveraged to play an integral role in complex decision-making tasks. Therefore, the investigation into the reasoning capabilities of Large Language Models (LLMs) is critical: numerous benchmarks have been established to assess the reasoning abilities of LLMs. However, current benchmarks are inadequ…
▽ More
Complex reasoning ability is one of the most important features of current LLMs, which has also been leveraged to play an integral role in complex decision-making tasks. Therefore, the investigation into the reasoning capabilities of Large Language Models (LLMs) is critical: numerous benchmarks have been established to assess the reasoning abilities of LLMs. However, current benchmarks are inadequate in offering a rigorous evaluation of the full extent of reasoning abilities that LLMs are capable of achieving. They are also prone to the risk of overfitting, as these benchmarks, being publicly accessible and static, allow models to potentially tailor their responses to specific benchmark metrics, thereby inflating their performance. Addressing these limitations, our research introduces a new benchmark, named NPHardEval. This benchmark is designed to evaluate the reasoning abilities of LLMs across a broad spectrum of 900 algorithmic questions, extending up to the NP-Hard complexity class. These questions are meticulously chosen to represent a wide range of complexity class below the NP-hard complexity class, offering a rigorous measure of the reasoning ability of LLMs. Through this study, we shed light on the current state of reasoning in LLMs, providing an objective and rigorous perspective through the comparison of LLMs' performance across complex classes. Moreover, this benchmark is designed with a dynamic update mechanism, where the datapoints are refreshed on a monthly basis. Such regular updates play a crucial role in mitigating the risk of LLMs overfitting to the benchmark, promoting a more accurate and reliable assessment of their reasoning capabilities. The benchmark dataset and code of NPHardEval are available at https://github.com/casmlab/NPHardEval.
△ Less
Submitted 12 February, 2024; v1 submitted 22 December, 2023;
originally announced December 2023.
-
Quantum-Assisted Joint Caching and Power Allocation for Integrated Satellite-Terrestrial Networks
Authors:
Yu Zhang,
Yanmin Gong,
Lei Fan,
Yu Wang,
Zhu Han,
Yuanxiong Guo
Abstract:
Low earth orbit (LEO) satellite network can complement terrestrial networks for achieving global wireless coverage and improving delay-sensitive Internet services. This paper proposes an integrated satellite-terrestrial network (ISTN) architecture to provide ground users with seamless and reliable content delivery services. For optimal service provisioning in this architecture, we formulate an opt…
▽ More
Low earth orbit (LEO) satellite network can complement terrestrial networks for achieving global wireless coverage and improving delay-sensitive Internet services. This paper proposes an integrated satellite-terrestrial network (ISTN) architecture to provide ground users with seamless and reliable content delivery services. For optimal service provisioning in this architecture, we formulate an optimization model to maximize the network throughput by jointly optimizing content delivery policy, cache placement, and transmission power allocation. The resulting optimization model is a large-scale mixed-integer nonlinear program (MINLP) that is intractable for classical computer solvers. Inspired by quantum computing techniques, we propose a hybrid quantum-classical generalized Benders' decomposition (HQCGBD) algorithm to address this challenge. Specifically, we first exploit the generalized Benders' decomposition (GBD) to decompose the problem into a master problem and a subproblem and then leverage the state-of-art quantum annealer to solve the challenging master problem.
△ Less
Submitted 22 December, 2023;
originally announced December 2023.
-
Search for 10--1000 GeV neutrinos from Gamma Ray Bursts with IceCube
Authors:
IceCube Collaboration,
R. Abbasi,
M. Ackermann,
J. Adams,
S. K. Agarwalla,
J. A. Aguilar,
M. Ahlers,
J. M. Alameddine,
N. M. Amin,
K. Andeen,
G. Anton,
C. Argüelles,
Y. Ashida,
S. Athanasiadou,
L. Ausborm,
S. N. Axani,
X. Bai,
A. Balagopal V.,
M. Baricevic,
S. W. Barwick,
V. Basu,
R. Bay,
J. J. Beatty,
J. Becker Tjus,
J. Beise
, et al. (384 additional authors not shown)
Abstract:
We present the results of a search for 10--1,000 GeV neutrinos from 2,268 gamma-ray bursts over 8 years of IceCube-DeepCore data. This work probes burst physics below the photosphere where electromagnetic radiation cannot escape. Neutrinos of tens of GeVs are predicted in sub-photospheric collision of free streaming neutrons with bulk-jet protons. In a first analysis, we searched for the most sign…
▽ More
We present the results of a search for 10--1,000 GeV neutrinos from 2,268 gamma-ray bursts over 8 years of IceCube-DeepCore data. This work probes burst physics below the photosphere where electromagnetic radiation cannot escape. Neutrinos of tens of GeVs are predicted in sub-photospheric collision of free streaming neutrons with bulk-jet protons. In a first analysis, we searched for the most significant neutrino-GRB coincidence using six overlapping time windows centered on the prompt phase of each GRB. In a second analysis, we conducted a search for a group of GRBs, each individually too weak to be detectable, but potentially significant when combined. No evidence of neutrino emission is found for either analysis. The most significant neutrino coincidence is for Fermi-GBM GRB bn 140807500, with a p-value of 0.097 corrected for all trials. The binomial test used to search for a group of GRBs had a p-value of 0.65 after all trial corrections. The binomial test found a group consisting only of GRB bn 140807500 and no additional GRBs. The neutrino limits of this work complement those obtained by IceCube at TeV to PeV energies. We compare our findings for the large set of GRBs as well as GRB 221009A to the sub-photospheric neutron-proton collision model and find that GRB 221009A provides the most constraining limit on baryon loading. For a jet Lorentz factor of 300 (800), the baryon loading on GRB 221009A is lower than 3.85 (2.13) at a 90% confidence level.
△ Less
Submitted 29 July, 2024; v1 submitted 12 December, 2023;
originally announced December 2023.
-
All-Sky Search for Transient Astrophysical Neutrino Emission with 10 Years of IceCube Cascade Events
Authors:
R. Abbasi,
M. Ackermann,
J. Adams,
S. K. Agarwalla,
J. A. Aguilar,
M. Ahlers,
J. M. Alameddine,
N. M. Amin,
K. Andeen,
G. Anton,
C. Argüelles,
Y. Ashida,
S. Athanasiadou,
L. Ausborm,
S. N. Axani,
X. Bai,
A. Balagopal V.,
M. Baricevic,
S. W. Barwick,
V. Basu,
R. Bay,
J. J. Beatty,
J. Becker Tjus,
J. Beise,
C. Bellenghi
, et al. (382 additional authors not shown)
Abstract:
We present the results of a time-dependent search for neutrino flares in data collected by IceCube between May 2011 and 2021. This data set contains cascade-like events originating from charged-current electron neutrino and tau neutrino interactions and all-flavor neutral-current interactions. IceCube's previous all-sky searches for neutrino flares used data sets consisting of track-like events or…
▽ More
We present the results of a time-dependent search for neutrino flares in data collected by IceCube between May 2011 and 2021. This data set contains cascade-like events originating from charged-current electron neutrino and tau neutrino interactions and all-flavor neutral-current interactions. IceCube's previous all-sky searches for neutrino flares used data sets consisting of track-like events originating from charged-current muon neutrino interactions. The cascade data sets are statistically independent of the track data sets and provide a new opportunity to observe the transient all-sky landscape. This search uses the spatial, temporal, and energy information of the cascade-like events to conduct searches for the most statistically significant neutrino flares in the northern and southern skies. No statistically significant time-dependent neutrino emission was observed. For the most statistically significant location in the northern sky, $p_\mathrm{global} =$ 0.71, and in the southern sky, $p_\mathrm{global} =$ 0.51. These results are compatible with the background hypothesis. Assuming an E$^{-2.53}$ spectrum from the diffuse astrophysical neutrino flux as measured with cascades, these results are used to calculate upper limits at the 90\% confidence level on neutrino flares of varying duration and constrain the contribution of these flares to the diffuse astrophysical neutrino flux. These constraints are independent of a specified class of astrophysical objects and show that multiple unresolved transient sources may contribute to the diffuse astrophysical neutrino flux.
△ Less
Submitted 11 March, 2024; v1 submitted 8 December, 2023;
originally announced December 2023.
-
Scaling Laws of Synthetic Images for Model Training ... for Now
Authors:
Lijie Fan,
Kaifeng Chen,
Dilip Krishnan,
Dina Katabi,
Phillip Isola,
Yonglong Tian
Abstract:
Recent significant advances in text-to-image models unlock the possibility of training vision systems using synthetic images, potentially overcoming the difficulty of collecting curated data at scale. It is unclear, however, how these models behave at scale, as more synthetic data is added to the training set. In this paper we study the scaling laws of synthetic images generated by state of the ar…
▽ More
Recent significant advances in text-to-image models unlock the possibility of training vision systems using synthetic images, potentially overcoming the difficulty of collecting curated data at scale. It is unclear, however, how these models behave at scale, as more synthetic data is added to the training set. In this paper we study the scaling laws of synthetic images generated by state of the art text-to-image models, for the training of supervised models: image classifiers with label supervision, and CLIP with language supervision. We identify several factors, including text prompts, classifier-free guidance scale, and types of text-to-image models, that significantly affect scaling behavior. After tuning these factors, we observe that synthetic images demonstrate a scaling trend similar to, but slightly less effective than, real images in CLIP training, while they significantly underperform in scaling when training supervised image classifiers. Our analysis indicates that the main reason for this underperformance is the inability of off-the-shelf text-to-image models to generate certain concepts, a limitation that significantly impairs the training of image classifiers. Our findings also suggest that scaling synthetic data can be particularly effective in scenarios such as: (1) when there is a limited supply of real images for a supervised problem (e.g., fewer than 0.5 million images in ImageNet), (2) when the evaluation dataset diverges significantly from the training data, indicating the out-of-distribution scenario, or (3) when synthetic data is used in conjunction with real images, as demonstrated in the training of CLIP models.
△ Less
Submitted 7 December, 2023;
originally announced December 2023.
-
Active Open-Vocabulary Recognition: Let Intelligent Moving Mitigate CLIP Limitations
Authors:
Lei Fan,
Jianxiong Zhou,
Xiaoying Xing,
Ying Wu
Abstract:
Active recognition, which allows intelligent agents to explore observations for better recognition performance, serves as a prerequisite for various embodied AI tasks, such as grasping, navigation and room arrangements. Given the evolving environment and the multitude of object classes, it is impractical to include all possible classes during the training stage. In this paper, we aim at advancing…
▽ More
Active recognition, which allows intelligent agents to explore observations for better recognition performance, serves as a prerequisite for various embodied AI tasks, such as grasping, navigation and room arrangements. Given the evolving environment and the multitude of object classes, it is impractical to include all possible classes during the training stage. In this paper, we aim at advancing active open-vocabulary recognition, empowering embodied agents to actively perceive and classify arbitrary objects. However, directly adopting recent open-vocabulary classification models, like Contrastive Language Image Pretraining (CLIP), poses its unique challenges. Specifically, we observe that CLIP's performance is heavily affected by the viewpoint and occlusions, compromising its reliability in unconstrained embodied perception scenarios. Further, the sequential nature of observations in agent-environment interactions necessitates an effective method for integrating features that maintains discriminative strength for open-vocabulary classification. To address these issues, we introduce a novel agent for active open-vocabulary recognition. The proposed method leverages inter-frame and inter-concept similarities to navigate agent movements and to fuse features, without relying on class-specific knowledge. Compared to baseline CLIP model with 29.6% accuracy on ShapeNet dataset, the proposed agent could achieve 53.3% accuracy for open-vocabulary recognition, without any fine-tuning to the equipped CLIP model. Additional experiments conducted with the Habitat simulator further affirm the efficacy of our method.
△ Less
Submitted 28 November, 2023;
originally announced November 2023.
-
Driving into the Future: Multiview Visual Forecasting and Planning with World Model for Autonomous Driving
Authors:
Yuqi Wang,
Jiawei He,
Lue Fan,
Hongxin Li,
Yuntao Chen,
Zhaoxiang Zhang
Abstract:
In autonomous driving, predicting future events in advance and evaluating the foreseeable risks empowers autonomous vehicles to better plan their actions, enhancing safety and efficiency on the road. To this end, we propose Drive-WM, the first driving world model compatible with existing end-to-end planning models. Through a joint spatial-temporal modeling facilitated by view factorization, our mo…
▽ More
In autonomous driving, predicting future events in advance and evaluating the foreseeable risks empowers autonomous vehicles to better plan their actions, enhancing safety and efficiency on the road. To this end, we propose Drive-WM, the first driving world model compatible with existing end-to-end planning models. Through a joint spatial-temporal modeling facilitated by view factorization, our model generates high-fidelity multiview videos in driving scenes. Building on its powerful generation ability, we showcase the potential of applying the world model for safe driving planning for the first time. Particularly, our Drive-WM enables driving into multiple futures based on distinct driving maneuvers, and determines the optimal trajectory according to the image-based rewards. Evaluation on real-world driving datasets verifies that our method could generate high-quality, consistent, and controllable multiview videos, opening up possibilities for real-world simulations and safe planning.
△ Less
Submitted 29 November, 2023;
originally announced November 2023.
-
Grounding Foundation Models through Federated Transfer Learning: A General Framework
Authors:
Yan Kang,
Tao Fan,
Hanlin Gu,
Xiaojin Zhang,
Lixin Fan,
Qiang Yang
Abstract:
Foundation Models (FMs) such as GPT-4 encoded with vast knowledge and powerful emergent abilities have achieved remarkable success in various natural language processing and computer vision tasks. Grounding FMs by adapting them to domain-specific tasks or augmenting them with domain-specific knowledge enables us to exploit the full potential of FMs. However, grounding FMs faces several challenges,…
▽ More
Foundation Models (FMs) such as GPT-4 encoded with vast knowledge and powerful emergent abilities have achieved remarkable success in various natural language processing and computer vision tasks. Grounding FMs by adapting them to domain-specific tasks or augmenting them with domain-specific knowledge enables us to exploit the full potential of FMs. However, grounding FMs faces several challenges, stemming primarily from constrained computing resources, data privacy, model heterogeneity, and model ownership. Federated Transfer Learning (FTL), the combination of federated learning and transfer learning, provides promising solutions to address these challenges. In recent years, the need for grounding FMs leveraging FTL, coined FTL-FM, has arisen strongly in both academia and industry. Motivated by the strong growth in FTL-FM research and the potential impact of FTL-FM on industrial applications, we propose an FTL-FM framework that formulates problems of grounding FMs in the federated learning setting, construct a detailed taxonomy based on the FTL-FM framework to categorize state-of-the-art FTL-FM works, and comprehensively overview FTL-FM works based on the proposed taxonomy. We also establish correspondences between FTL-FM and conventional phases of adapting FM so that FM practitioners can align their research works with FTL-FM. In addition, we overview advanced efficiency-improving and privacy-preserving techniques because efficiency and privacy are critical concerns in FTL-FM. Last, we discuss opportunities and future research directions of FTL-FM.
△ Less
Submitted 29 March, 2024; v1 submitted 29 November, 2023;
originally announced November 2023.
-
War and Peace (WarAgent): Large Language Model-based Multi-Agent Simulation of World Wars
Authors:
Wenyue Hua,
Lizhou Fan,
Lingyao Li,
Kai Mei,
Jianchao Ji,
Yingqiang Ge,
Libby Hemphill,
Yongfeng Zhang
Abstract:
Can we avoid wars at the crossroads of history? This question has been pursued by individuals, scholars, policymakers, and organizations throughout human history. In this research, we attempt to answer the question based on the recent advances of Artificial Intelligence (AI) and Large Language Models (LLMs). We propose \textbf{WarAgent}, an LLM-powered multi-agent AI system, to simulate the partic…
▽ More
Can we avoid wars at the crossroads of history? This question has been pursued by individuals, scholars, policymakers, and organizations throughout human history. In this research, we attempt to answer the question based on the recent advances of Artificial Intelligence (AI) and Large Language Models (LLMs). We propose \textbf{WarAgent}, an LLM-powered multi-agent AI system, to simulate the participating countries, their decisions, and the consequences, in historical international conflicts, including the World War I (WWI), the World War II (WWII), and the Warring States Period (WSP) in Ancient China. By evaluating the simulation effectiveness, we examine the advancements and limitations of cutting-edge AI systems' abilities in studying complex collective human behaviors such as international conflicts under diverse settings. In these simulations, the emergent interactions among agents also offer a novel perspective for examining the triggers and conditions that lead to war. Our findings offer data-driven and AI-augmented insights that can redefine how we approach conflict resolution and peacekeeping strategies. The implications stretch beyond historical analysis, offering a blueprint for using AI to understand human history and possibly prevent future international conflicts. Code and data are available at \url{https://github.com/agiresearch/WarAgent}.
△ Less
Submitted 30 January, 2024; v1 submitted 28 November, 2023;
originally announced November 2023.
-
Learning Multi-Pattern Normalities in the Frequency Domain for Efficient Time Series Anomaly Detection
Authors:
Feiyi Chen,
Yingying zhang,
Zhen Qin,
Lunting Fan,
Renhe Jiang,
Yuxuan Liang,
Qingsong Wen,
Shuiguang Deng
Abstract:
Anomaly detection significantly enhances the robustness of cloud systems. While neural network-based methods have recently demonstrated strong advantages, they encounter practical challenges in cloud environments: the contradiction between the impracticality of maintaining a unique model for each service and the limited ability to deal with diverse normal patterns by a unified model, as well as is…
▽ More
Anomaly detection significantly enhances the robustness of cloud systems. While neural network-based methods have recently demonstrated strong advantages, they encounter practical challenges in cloud environments: the contradiction between the impracticality of maintaining a unique model for each service and the limited ability to deal with diverse normal patterns by a unified model, as well as issues with handling heavy traffic in real time and short-term anomaly detection sensitivity.
Thus, we propose MACE, a multi-normal-pattern accommodated and efficient anomaly detection method in the frequency domain for time series anomaly detection. There are three novel characteristics of it: (i) a pattern extraction mechanism excelling at handling diverse normal patterns with a unified model, which enables the model to identify anomalies by examining the correlation between the data sample and its service normal pattern, instead of solely focusing on the data sample itself; (ii) a dualistic convolution mechanism that amplifies short-term anomalies in the time domain and hinders the reconstruction of anomalies in the frequency domain, which enlarges the reconstruction error disparity between anomaly and normality and facilitates anomaly detection; (iii) leveraging the sparsity and parallelism of frequency domain to enhance model efficiency. We theoretically and experimentally prove that using a strategically selected subset of Fourier bases can not only reduce computational overhead but is also profitable to distinguish anomalies, compared to using the complete spectrum. Moreover, extensive experiments demonstrate MACE's effectiveness in handling diverse normal patterns with a unified model and it achieves state-of-the-art performance with high efficiency.
△ Less
Submitted 18 March, 2024; v1 submitted 25 November, 2023;
originally announced November 2023.
-
Evidential Active Recognition: Intelligent and Prudent Open-World Embodied Perception
Authors:
Lei Fan,
Mingfu Liang,
Yunxuan Li,
Gang Hua,
Ying Wu
Abstract:
Active recognition enables robots to intelligently explore novel observations, thereby acquiring more information while circumventing undesired viewing conditions. Recent approaches favor learning policies from simulated or collected data, wherein appropriate actions are more frequently selected when the recognition is accurate. However, most recognition modules are developed under the closed-worl…
▽ More
Active recognition enables robots to intelligently explore novel observations, thereby acquiring more information while circumventing undesired viewing conditions. Recent approaches favor learning policies from simulated or collected data, wherein appropriate actions are more frequently selected when the recognition is accurate. However, most recognition modules are developed under the closed-world assumption, which makes them ill-equipped to handle unexpected inputs, such as the absence of the target object in the current observation. To address this issue, we propose treating active recognition as a sequential evidence-gathering process, providing by-step uncertainty quantification and reliable prediction under the evidence combination theory. Additionally, the reward function developed in this paper effectively characterizes the merit of actions when operating in open-world environments. To evaluate the performance, we collect a dataset from an indoor simulator, encompassing various recognition challenges such as distance, occlusion levels, and visibility. Through a series of experiments on recognition and robustness analysis, we demonstrate the necessity of introducing uncertainties to active recognition and the superior performance of the proposed method.
△ Less
Submitted 22 November, 2023;
originally announced November 2023.
-
Identifying the Defective: Detecting Damaged Grains for Cereal Appearance Inspection
Authors:
Lei Fan,
Yiwen Ding,
Dongdong Fan,
Yong Wu,
Maurice Pagnucco,
Yang Song
Abstract:
Cereal grain plays a crucial role in the human diet as a major source of essential nutrients. Grain Appearance Inspection (GAI) serves as an essential process to determine grain quality and facilitate grain circulation and processing. However, GAI is routinely performed manually by inspectors with cumbersome procedures, which poses a significant bottleneck in smart agriculture.
In this paper, we…
▽ More
Cereal grain plays a crucial role in the human diet as a major source of essential nutrients. Grain Appearance Inspection (GAI) serves as an essential process to determine grain quality and facilitate grain circulation and processing. However, GAI is routinely performed manually by inspectors with cumbersome procedures, which poses a significant bottleneck in smart agriculture.
In this paper, we endeavor to develop an automated GAI system:AI4GrainInsp. By analyzing the distinctive characteristics of grain kernels, we formulate GAI as a ubiquitous problem: Anomaly Detection (AD), in which healthy and edible kernels are considered normal samples while damaged grains or unknown objects are regarded as anomalies. We further propose an AD model, called AD-GAI, which is trained using only normal samples yet can identify anomalies during inference. Moreover, we customize a prototype device for data acquisition and create a large-scale dataset including 220K high-quality images of wheat and maize kernels. Through extensive experiments, AD-GAI achieves considerable performance in comparison with advanced AD methods, and AI4GrainInsp has highly consistent performance compared to human experts and excels at inspection efficiency over 20x speedup. The dataset, code and models will be released at https://github.com/hellodfan/AI4GrainInsp.
△ Less
Submitted 20 November, 2023;
originally announced November 2023.
-
Use of Equivalent Relative Utility (ERU) to Evaluate Artificial Intelligence-Enabled Rule-Out Devices
Authors:
Kwok Lung Fan,
Yee Lam Elim Thompson,
Weijie Chen,
Craig K. Abbey,
Frank W Samuelson
Abstract:
We investigated the use of equivalent relative utility (ERU) to evaluate the effectiveness of artificial intelligence (AI)-enabled rule-out devices that use AI to identify and autonomously remove non-cancer patient images from radiologist review in screening mammography.We reviewed two performance metrics that can be used to compare the diagnostic performance between the radiologist-with-rule-out-…
▽ More
We investigated the use of equivalent relative utility (ERU) to evaluate the effectiveness of artificial intelligence (AI)-enabled rule-out devices that use AI to identify and autonomously remove non-cancer patient images from radiologist review in screening mammography.We reviewed two performance metrics that can be used to compare the diagnostic performance between the radiologist-with-rule-out-device and radiologist-without-device workflows: positive/negative predictive values (PPV/NPV) and equivalent relative utility (ERU). To demonstrate the use of the two evaluation metrics, we applied both methods to a recent US-based study that reported an improved performance of the radiologist-with-device workflow compared to the one without the device by retrospectively applying their AI algorithm to a large mammography dataset. We further applied the ERU method to a European study utilizing their reported recall rates and cancer detection rates at different thresholds of their AI algorithm to compare the potential utility among different thresholds. For the study using US data, neither the PPV/NPV nor the ERU method can conclude a significant improvement in diagnostic performance for any of the algorithm thresholds reported. For the study using European data, ERU values at lower AI thresholds are found to be higher than that at a higher threshold because more false-negative cases would be ruled-out at higher threshold, reducing the overall diagnostic performance. Both PPV/NPV and ERU methods can be used to compare the diagnostic performance between the radiologist-with-device workflow and that without. One limitation of the ERU method is the need to measure the baseline, standard-of-care relative utility (RU) value for mammography screening in the US. Once the baseline value is known, the ERU method can be applied to large US datasets without knowing the true prevalence of the dataset.
△ Less
Submitted 13 November, 2023;
originally announced November 2023.
-
Evidence of the Singly Cabibbo Suppressed decay $Λ_c^+\to pπ^0$
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
X. C. Ai,
R. Aliberti,
A. Amoroso,
M. R. An,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere,
A. Brueggemann
, et al. (600 additional authors not shown)
Abstract:
Evidence for the singly Cabibbo suppressed decay $Λ_c^+\to pπ^0$ is reported for the first time with a statistical significance of $3.7σ$ based on 6.0 $\mathrm{fb}^{-1}$ of $e^+e^-$ collision data collected at center-of-mass energies between 4.600 and 4.843 GeV with the BESIII detector at the BEPCII collider. The absolute branching fraction of $Λ_c^+\to pπ^0$ is measured to be…
▽ More
Evidence for the singly Cabibbo suppressed decay $Λ_c^+\to pπ^0$ is reported for the first time with a statistical significance of $3.7σ$ based on 6.0 $\mathrm{fb}^{-1}$ of $e^+e^-$ collision data collected at center-of-mass energies between 4.600 and 4.843 GeV with the BESIII detector at the BEPCII collider. The absolute branching fraction of $Λ_c^+\to pπ^0$ is measured to be $(1.56^{+0.72}_{-0.58}\pm0.20)\times 10^{-4}$. Combining with the branching fraction of $Λ_c^+\to nπ^+$, $(6.6\pm1.3)\times10^{-4}$, the ratio of the branching fractions of $Λ_c^+\to nπ^+$ and $Λ_c^+\to pπ^0$ is calculated to be $3.2^{+2.2}_{-1.2}$. As an important input for the theoretical models describing the decay mechanisms of charmed baryons, our result indicates that the non-factorizable contributions play an essential role and their interference with the factorizable contributions should not be significant. In addition, the absolute branching fraction of $Λ_c^+\to pη$ is measured to be $(1.63\pm0.31_{\rm stat}\pm0.11_{\rm syst}) \times10^{-3}$.
△ Less
Submitted 3 June, 2024; v1 submitted 12 November, 2023;
originally announced November 2023.
-
Observation and branching fraction measurement of the decay $J\!/\!ψ\rightarrow \bar{p} Σ^{+} K_{S}^{0} + c.c.$
Authors:
M. Ablikim,
M. N. Achasov,
P. Adlarson,
X. C. Ai,
R. Aliberti,
A. Amoroso,
M. R. An,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
J. Bloms,
A. Bortone,
I. Boyko,
R. A. Briere,
A. Brueggemann
, et al. (602 additional authors not shown)
Abstract:
The first observation of the decays $J\!/\!ψ\rightarrow \bar{p} Σ^{+} K_{S}^{0}$ and $J\!/\!ψ\rightarrow p \barΣ^{-} K_{S}^{0}$ is reported using $(10087\pm44)\times10^{6}$ $J\!/\!ψ$ events recorded by the BESIII detector at the BEPCII storage ring. The branching fractions of each channel are determined to be…
▽ More
The first observation of the decays $J\!/\!ψ\rightarrow \bar{p} Σ^{+} K_{S}^{0}$ and $J\!/\!ψ\rightarrow p \barΣ^{-} K_{S}^{0}$ is reported using $(10087\pm44)\times10^{6}$ $J\!/\!ψ$ events recorded by the BESIII detector at the BEPCII storage ring. The branching fractions of each channel are determined to be $\mathcal{B}(J\!/\!ψ\rightarrow \bar{p} Σ^{+} K_{S}^{0})=(1.361 \pm 0.006 \pm 0.025) \times 10^{-4}$ and $\mathcal{B}(J\!/\!ψ\rightarrow p \barΣ^{-} K_{S}^{0})=(1.352 \pm 0.006 \pm 0.025) \times 10^{-4}$. The combined result is $\mathcal{B}(J\!/\!ψ\rightarrow \bar{p} Σ^{+} K_{S}^{0} +c.c.)=(2.725 \pm 0.009 \pm 0.050) \times 10^{-4}$, where the first uncertainty is statistical and the second systematic. The results presented are in good agreement with the branching fractions of the isospin partner decay $J\!/\!ψ\rightarrow p K^- \barΣ^0 + c.c.$.
△ Less
Submitted 14 November, 2023; v1 submitted 10 November, 2023;
originally announced November 2023.
-
Spatial Correlation at the Boson Peak Frequency in Amorphous Materials
Authors:
X. Y. Li,
H. P. Zhang,
S. Lan,
D. L. Abernathy,
C. H. Hu,
L. R. Fan,
M. Z. Li,
X. -L. Wang
Abstract:
The Boson peak (BP), an excess of vibrational density of states, is ubiquitous for amorphous materials and is believed to hold the key to understanding the dynamics of glass and glass transition. Previous studies have established an energy scale for the BP, which is ~1-10 meV or ~THz in frequency. However, so far, little is known about the momentum dependence or spatial correlation of the BP. Here…
▽ More
The Boson peak (BP), an excess of vibrational density of states, is ubiquitous for amorphous materials and is believed to hold the key to understanding the dynamics of glass and glass transition. Previous studies have established an energy scale for the BP, which is ~1-10 meV or ~THz in frequency. However, so far, little is known about the momentum dependence or spatial correlation of the BP. Here, we report the observation of the BP in model Zr-Cu-Al metallic glasses over a wide range of momentum transfer, using inelastic neutron scattering, heat capacity, Raman scattering measurements, and molecular dynamics (MD) simulations. The BP energy is largely dispersionless; however, the BP intensity was found to scale with the static structure factor. Additional MD simulations with a generic Lennard-Jones potential confirmed the same. Based on these results, an analytical expression for the dynamic structure factor was formulated for the BP excitation. Further analysis of the simulated disordered structures suggests that the BP is related to local structure fluctuations (e.g., in shear strain). Our results offered insights into the nature of the BP and provide guidance for the development of theories of amorphous materials.
△ Less
Submitted 6 November, 2023;
originally announced November 2023.
-
Measurement of the absolute branching fraction of the three-body decay $Λ_{c}^+ \to Ξ^{0}K^{+}π^{0}$ and search for $Λ_{c}^+ \to nK^+π^0$, $Σ^{0}K^{+}π^{0}$ and $ΛK^{+}π^{0}$
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
M. R. An,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (600 additional authors not shown)
Abstract:
The Cabbibo-favored decay $Λ_{c}^+ \to Ξ^{0}K^{+}π^{0}$ is studied for the first time using 6.1 fb$^{-1}$ of $e^+e^-$ collision data at center-of-mass energies between 4.600 and 4.840 GeV, collected with the BESIII detector at the BEPCII collider. With a double-tag method, the branching fraction of the three-body decay $Λ_{c}^+ \to Ξ^{0}K^{+}π^{0}$ is measured to be…
▽ More
The Cabbibo-favored decay $Λ_{c}^+ \to Ξ^{0}K^{+}π^{0}$ is studied for the first time using 6.1 fb$^{-1}$ of $e^+e^-$ collision data at center-of-mass energies between 4.600 and 4.840 GeV, collected with the BESIII detector at the BEPCII collider. With a double-tag method, the branching fraction of the three-body decay $Λ_{c}^+ \to Ξ^{0}K^{+}π^{0}$ is measured to be $(7.79 \pm 1.46 _{\rm} \pm0.71 _{\rm}) \times 10^{ - 3}$, where the first and second uncertainties are statistical and systematic, respectively. The branching fraction of the two-body decay $Λ_{c}^+ \to Ξ(1530)^{0}K^+$ is $(5.99\pm1.04\pm0.29)\times10^{-3}$, which is consistent with the previous result of $(5.02\pm0.99\pm0.31)\times 10^{-3}$. In addition, the upper limit on the branching fraction of the doubly Cabbibo-suppressed decay $Λ_{c}^+ \to nK^+π^0$ is $7.1 \times 10^{-4}$ at the 90$\%$ confidence level. The upper limits on the branching fractions of $Λ_{c}^+ \to Σ^{0}K^{+}π^{0}$ and $ΛK^{+}π^{0}$ are also determined to be $1.8\times 10^{-3}$ and $ 2.0 \times 10^{-3}$, respectively.
△ Less
Submitted 8 May, 2024; v1 submitted 4 November, 2023;
originally announced November 2023.
-
Federated Linear Bandits with Finite Adversarial Actions
Authors:
Li Fan,
Ruida Zhou,
Chao Tian,
Cong Shen
Abstract:
We study a federated linear bandits model, where $M$ clients communicate with a central server to solve a linear contextual bandits problem with finite adversarial action sets that may be different across clients. To address the unique challenges of adversarial finite action sets, we propose the FedSupLinUCB algorithm, which extends the principles of SupLinUCB and OFUL algorithms in linear context…
▽ More
We study a federated linear bandits model, where $M$ clients communicate with a central server to solve a linear contextual bandits problem with finite adversarial action sets that may be different across clients. To address the unique challenges of adversarial finite action sets, we propose the FedSupLinUCB algorithm, which extends the principles of SupLinUCB and OFUL algorithms in linear contextual bandits. We prove that FedSupLinUCB achieves a total regret of $\tilde{O}(\sqrt{d T})$, where $T$ is the total number of arm pulls from all clients, and $d$ is the ambient dimension of the linear model. This matches the minimax lower bound and thus is order-optimal (up to polylog terms). We study both asynchronous and synchronous cases and show that the communication cost can be controlled as $O(d M^2 \log(d)\log(T))$ and $O(\sqrt{d^3 M^3} \log(d))$, respectively. The FedSupLinUCB design is further extended to two scenarios: (1) variance-adaptive, where a total regret of $\tilde{O} (\sqrt{d \sum \nolimits_{t=1}^{T} σ_t^2})$ can be achieved with $σ_t^2$ being the noise variance of round $t$; and (2) adversarial corruption, where a total regret of $\tilde{O}(\sqrt{dT} + d C_p)$ can be achieved with $C_p$ being the total corruption budget. Experiment results corroborate the theoretical analysis and demonstrate the effectiveness of FedSupLinUCB on both synthetic and real-world datasets.
△ Less
Submitted 1 November, 2023;
originally announced November 2023.
-
A Communication Theory Perspective on Prompting Engineering Methods for Large Language Models
Authors:
Yuanfeng Song,
Yuanqin He,
Xuefang Zhao,
Hanlin Gu,
Di Jiang,
Haijun Yang,
Lixin Fan,
Qiang Yang
Abstract:
The springing up of Large Language Models (LLMs) has shifted the community from single-task-orientated natural language processing (NLP) research to a holistic end-to-end multi-task learning paradigm. Along this line of research endeavors in the area, LLM-based prompting methods have attracted much attention, partially due to the technological advantages brought by prompt engineering (PE) as well…
▽ More
The springing up of Large Language Models (LLMs) has shifted the community from single-task-orientated natural language processing (NLP) research to a holistic end-to-end multi-task learning paradigm. Along this line of research endeavors in the area, LLM-based prompting methods have attracted much attention, partially due to the technological advantages brought by prompt engineering (PE) as well as the underlying NLP principles disclosed by various prompting methods. Traditional supervised learning usually requires training a model based on labeled data and then making predictions. In contrast, PE methods directly use the powerful capabilities of existing LLMs (i.e., GPT-3 and GPT-4) via composing appropriate prompts, especially under few-shot or zero-shot scenarios. Facing the abundance of studies related to the prompting and the ever-evolving nature of this field, this article aims to (i) illustrate a novel perspective to review existing PE methods, within the well-established communication theory framework; (ii) facilitate a better/deeper understanding of developing trends of existing PE methods used in four typical tasks; (iii) shed light on promising research directions for future PE methods.
△ Less
Submitted 23 October, 2023;
originally announced October 2023.
-
Observation of the Anomalous Shape of $X(1840)$ in $J/ψ\rightarrow γ3(π^+ π^-)$ Indicating a Second Resonance Near $p\bar{p}$ Threshold
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
X. C. Ai,
R. Aliberti,
A. Amoroso,
M. R. An,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere,
A. Brueggemann
, et al. (604 additional authors not shown)
Abstract:
Using a sample of $(10087\pm44)\times 10^6$ $J/ψ$ events, which is about 45 times larger than that was previously analyzed, a further investigation on the $J/ψ\rightarrow γ3(π^+π^-)$ decay is performed. A significant distortion at 1.84 GeV/$c^2$ in the line-shape of the $3(π^+π^-)$ invariant mass spectrum is observed for the first time, which could be resolved by two overlapping resonant structure…
▽ More
Using a sample of $(10087\pm44)\times 10^6$ $J/ψ$ events, which is about 45 times larger than that was previously analyzed, a further investigation on the $J/ψ\rightarrow γ3(π^+π^-)$ decay is performed. A significant distortion at 1.84 GeV/$c^2$ in the line-shape of the $3(π^+π^-)$ invariant mass spectrum is observed for the first time, which could be resolved by two overlapping resonant structures, $X(1840)$ and $X(1880)$. The new state $X(1880)$ is observed with a statistical significance larger than $10σ$. The mass and width of $X(1880)$ are determined to be $1882.1\pm1.7\pm0.7$ MeV/$c^2$ and $30.7\pm5.5 \pm2.4$ MeV, respectively, which indicates the existence of a $p\bar{p}$ bound state.
△ Less
Submitted 15 April, 2024; v1 submitted 27 October, 2023;
originally announced October 2023.
-
MimicGen: A Data Generation System for Scalable Robot Learning using Human Demonstrations
Authors:
Ajay Mandlekar,
Soroush Nasiriany,
Bowen Wen,
Iretiayo Akinola,
Yashraj Narang,
Linxi Fan,
Yuke Zhu,
Dieter Fox
Abstract:
Imitation learning from a large set of human demonstrations has proved to be an effective paradigm for building capable robot agents. However, the demonstrations can be extremely costly and time-consuming to collect. We introduce MimicGen, a system for automatically synthesizing large-scale, rich datasets from only a small number of human demonstrations by adapting them to new contexts. We use Mim…
▽ More
Imitation learning from a large set of human demonstrations has proved to be an effective paradigm for building capable robot agents. However, the demonstrations can be extremely costly and time-consuming to collect. We introduce MimicGen, a system for automatically synthesizing large-scale, rich datasets from only a small number of human demonstrations by adapting them to new contexts. We use MimicGen to generate over 50K demonstrations across 18 tasks with diverse scene configurations, object instances, and robot arms from just ~200 human demonstrations. We show that robot agents can be effectively trained on this generated dataset by imitation learning to achieve strong performance in long-horizon and high-precision tasks, such as multi-part assembly and coffee preparation, across broad initial state distributions. We further demonstrate that the effectiveness and utility of MimicGen data compare favorably to collecting additional human demonstrations, making it a powerful and economical approach towards scaling up robot learning. Datasets, simulation environments, videos, and more at https://mimicgen.github.io .
△ Less
Submitted 26 October, 2023;
originally announced October 2023.
-
RCAgent: Cloud Root Cause Analysis by Autonomous Agents with Tool-Augmented Large Language Models
Authors:
Zefan Wang,
Zichuan Liu,
Yingying Zhang,
Aoxiao Zhong,
Jihong Wang,
Fengbin Yin,
Lunting Fan,
Lingfei Wu,
Qingsong Wen
Abstract:
Large language model (LLM) applications in cloud root cause analysis (RCA) have been actively explored recently. However, current methods are still reliant on manual workflow settings and do not unleash LLMs' decision-making and environment interaction capabilities. We present RCAgent, a tool-augmented LLM autonomous agent framework for practical and privacy-aware industrial RCA usage. Running on…
▽ More
Large language model (LLM) applications in cloud root cause analysis (RCA) have been actively explored recently. However, current methods are still reliant on manual workflow settings and do not unleash LLMs' decision-making and environment interaction capabilities. We present RCAgent, a tool-augmented LLM autonomous agent framework for practical and privacy-aware industrial RCA usage. Running on an internally deployed model rather than GPT families, RCAgent is capable of free-form data collection and comprehensive analysis with tools. Our framework combines a variety of enhancements, including a unique Self-Consistency for action trajectories, and a suite of methods for context management, stabilization, and importing domain knowledge. Our experiments show RCAgent's evident and consistent superiority over ReAct across all aspects of RCA -- predicting root causes, solutions, evidence, and responsibilities -- and tasks covered or uncovered by current rules, as validated by both automated metrics and human evaluations. Furthermore, RCAgent has already been integrated into the diagnosis and issue discovery workflow of the Real-time Compute Platform for Apache Flink of Alibaba Cloud.
△ Less
Submitted 1 August, 2024; v1 submitted 24 October, 2023;
originally announced October 2023.
-
Eureka: Human-Level Reward Design via Coding Large Language Models
Authors:
Yecheng Jason Ma,
William Liang,
Guanzhi Wang,
De-An Huang,
Osbert Bastani,
Dinesh Jayaraman,
Yuke Zhu,
Linxi Fan,
Anima Anandkumar
Abstract:
Large Language Models (LLMs) have excelled as high-level semantic planners for sequential decision-making tasks. However, harnessing them to learn complex low-level manipulation tasks, such as dexterous pen spinning, remains an open problem. We bridge this fundamental gap and present Eureka, a human-level reward design algorithm powered by LLMs. Eureka exploits the remarkable zero-shot generation,…
▽ More
Large Language Models (LLMs) have excelled as high-level semantic planners for sequential decision-making tasks. However, harnessing them to learn complex low-level manipulation tasks, such as dexterous pen spinning, remains an open problem. We bridge this fundamental gap and present Eureka, a human-level reward design algorithm powered by LLMs. Eureka exploits the remarkable zero-shot generation, code-writing, and in-context improvement capabilities of state-of-the-art LLMs, such as GPT-4, to perform evolutionary optimization over reward code. The resulting rewards can then be used to acquire complex skills via reinforcement learning. Without any task-specific prompting or pre-defined reward templates, Eureka generates reward functions that outperform expert human-engineered rewards. In a diverse suite of 29 open-source RL environments that include 10 distinct robot morphologies, Eureka outperforms human experts on 83% of the tasks, leading to an average normalized improvement of 52%. The generality of Eureka also enables a new gradient-free in-context learning approach to reinforcement learning from human feedback (RLHF), readily incorporating human inputs to improve the quality and the safety of the generated rewards without model updating. Finally, using Eureka rewards in a curriculum learning setting, we demonstrate for the first time, a simulated Shadow Hand capable of performing pen spinning tricks, adeptly manipulating a pen in circles at rapid speed.
△ Less
Submitted 30 April, 2024; v1 submitted 19 October, 2023;
originally announced October 2023.
-
Correlation of coalescence times in a diploid Wright-Fisher model with recombination and selfing
Authors:
David Kogan,
Dimitrios Diamantidis,
John Wakeley,
Wai-Tong Louis Fan
Abstract:
The correlation among the gene genealogies at different loci is crucial in biology, yet challenging to understand because such correlation depends on many factors including genetic linkage, recombination, natural selection and population structure. Based on a diploid Wright-Fisher model with a single mating type and partial selfing for a constant large population with size $N$, we quantify the com…
▽ More
The correlation among the gene genealogies at different loci is crucial in biology, yet challenging to understand because such correlation depends on many factors including genetic linkage, recombination, natural selection and population structure. Based on a diploid Wright-Fisher model with a single mating type and partial selfing for a constant large population with size $N$, we quantify the combined effect of genetic drift and two competing factors, recombination and selfing, on the correlation of coalescence times at two linked loci for samples of size two. Recombination decouples the genealogies at different loci and decreases the correlation while selfing increases the correlation. We obtain explicit asymptotic formulas for the correlation for four scaling scenarios that depend on whether the selfing probability and the recombination probability are of order $O(1/N)$ or $O(1)$ as $N$ tends to infinity. Our analytical results confirm that the asymptotic lower bound in [King, Wakeley, Carmi (Theor. Popul. Biol. 2018)] is sharp when the loci are unlinked and when there is no selfing, and provide a number of new formulas for other scaling scenarios that have not been considered before. We present asymptotic results for the variance of Tajima's estimator of the population mutation rate for infinitely many loci as $N$ tends to infinity. When the selfing probability is of order $O(1)$ and is equal to a positive constant $s$ for all $N$ and if the samples at both loci are in the same individual, then the variance of the Tajima's estimator tends to $s/2$ (hence remains positive) even when the recombination rate, the number of loci and the population size all tend to infinity.
△ Less
Submitted 18 October, 2023;
originally announced October 2023.
-
FATE-LLM: A Industrial Grade Federated Learning Framework for Large Language Models
Authors:
Tao Fan,
Yan Kang,
Guoqiang Ma,
Weijing Chen,
Wenbin Wei,
Lixin Fan,
Qiang Yang
Abstract:
Large Language Models (LLMs), such as ChatGPT, LLaMA, GLM, and PaLM, have exhibited remarkable performances across various tasks in recent years. However, LLMs face two main challenges in real-world applications. One challenge is that training LLMs consumes vast computing resources, preventing LLMs from being adopted by small and medium-sized enterprises with limited computing resources. Another i…
▽ More
Large Language Models (LLMs), such as ChatGPT, LLaMA, GLM, and PaLM, have exhibited remarkable performances across various tasks in recent years. However, LLMs face two main challenges in real-world applications. One challenge is that training LLMs consumes vast computing resources, preventing LLMs from being adopted by small and medium-sized enterprises with limited computing resources. Another is that training LLM requires a large amount of high-quality data, which are often scattered among enterprises. To address these challenges, we propose FATE-LLM, an industrial-grade federated learning framework for large language models. FATE-LLM (1) facilitates federated learning for large language models (coined FedLLM); (2) promotes efficient training of FedLLM using parameter-efficient fine-tuning methods; (3) protects the intellectual property of LLMs; (4) preserves data privacy during training and inference through privacy-preserving mechanisms. We release the code of FATE-LLM at https://github.com/FederatedAI/FATE-LLM to facilitate the research of FedLLM and enable a broad range of industrial applications.
△ Less
Submitted 16 October, 2023;
originally announced October 2023.
-
AMAGO: Scalable In-Context Reinforcement Learning for Adaptive Agents
Authors:
Jake Grigsby,
Linxi Fan,
Yuke Zhu
Abstract:
We introduce AMAGO, an in-context Reinforcement Learning (RL) agent that uses sequence models to tackle the challenges of generalization, long-term memory, and meta-learning. Recent works have shown that off-policy learning can make in-context RL with recurrent policies viable. Nonetheless, these approaches require extensive tuning and limit scalability by creating key bottlenecks in agents' memor…
▽ More
We introduce AMAGO, an in-context Reinforcement Learning (RL) agent that uses sequence models to tackle the challenges of generalization, long-term memory, and meta-learning. Recent works have shown that off-policy learning can make in-context RL with recurrent policies viable. Nonetheless, these approaches require extensive tuning and limit scalability by creating key bottlenecks in agents' memory capacity, planning horizon, and model size. AMAGO revisits and redesigns the off-policy in-context approach to successfully train long-sequence Transformers over entire rollouts in parallel with end-to-end RL. Our agent is scalable and applicable to a wide range of problems, and we demonstrate its strong performance empirically in meta-RL and long-term memory domains. AMAGO's focus on sparse rewards and off-policy data also allows in-context learning to extend to goal-conditioned problems with challenging exploration. When combined with a multi-goal hindsight relabeling scheme, AMAGO can solve a previously difficult category of open-world domains, where agents complete many possible instructions in procedurally generated environments.
△ Less
Submitted 31 January, 2024; v1 submitted 15 October, 2023;
originally announced October 2023.
-
Galactic Gamma-Ray Diffuse Emission at TeV energies with HAWC Data
Authors:
R. Alfaro,
C. Alvarez,
J. C. Arteaga-Velazquez,
K. P. Arunbabu,
D. Avila Rojas,
R. Babu,
V. Baghmanyan,
E. Belmont-Moreno,
C. Brisbois,
K. S. Caballero-Mora,
T. Capistran,
A. Carraminana,
S. Casanova,
O. Chaparro-Amaro,
U. Cotti,
J. Cotzomi,
S. Coutino de Leon,
E. De la Fuente,
R. Diaz Hernandez,
M. A. DuVernois,
M. Durocher,
J. C. Dıaz-Velez,
K. Engel,
C. Espinoza,
K. L. Fan
, et al. (55 additional authors not shown)
Abstract:
The Galactic gamma-ray diffuse emission (GDE) is emitted by cosmic rays (CRs), ultra-relativistic protons and electrons, interacting with gas and electromagnetic radiation fields in the interstellar medium. Here we present the analysis of TeV diffuse emission from a region of the Galactic Plane over the range in longitude of $l\in[43^\circ,73^\circ]$, using data collected with the High Altitude Wa…
▽ More
The Galactic gamma-ray diffuse emission (GDE) is emitted by cosmic rays (CRs), ultra-relativistic protons and electrons, interacting with gas and electromagnetic radiation fields in the interstellar medium. Here we present the analysis of TeV diffuse emission from a region of the Galactic Plane over the range in longitude of $l\in[43^\circ,73^\circ]$, using data collected with the High Altitude Water Cherenkov (HAWC) detector. Spectral, longitudinal and latitudinal distributions of the TeV diffuse emission are shown. The radiation spectrum is compatible with the spectrum of the emission arising from a CR population with an "index" similar to that of the observed CRs. When comparing with the \texttt{DRAGON} \textit{base model}, the HAWC GDE flux is higher by about a factor of two. Unresolved sources such as pulsar wind nebulae and TeV halos could explain the excess emission. Finally, deviations of the Galactic CR flux from the locally measured CR flux may additionally explain the difference between the predicted and measured diffuse fluxes.
△ Less
Submitted 13 October, 2023;
originally announced October 2023.
-
Open X-Embodiment: Robotic Learning Datasets and RT-X Models
Authors:
Open X-Embodiment Collaboration,
Abby O'Neill,
Abdul Rehman,
Abhinav Gupta,
Abhiram Maddukuri,
Abhishek Gupta,
Abhishek Padalkar,
Abraham Lee,
Acorn Pooley,
Agrim Gupta,
Ajay Mandlekar,
Ajinkya Jain,
Albert Tung,
Alex Bewley,
Alex Herzog,
Alex Irpan,
Alexander Khazatsky,
Anant Rai,
Anchit Gupta,
Andrew Wang,
Andrey Kolobov,
Anikait Singh,
Animesh Garg,
Aniruddha Kembhavi,
Annie Xie
, et al. (267 additional authors not shown)
Abstract:
Large, high-capacity models trained on diverse datasets have shown remarkable successes on efficiently tackling downstream applications. In domains from NLP to Computer Vision, this has led to a consolidation of pretrained models, with general pretrained backbones serving as a starting point for many applications. Can such a consolidation happen in robotics? Conventionally, robotic learning method…
▽ More
Large, high-capacity models trained on diverse datasets have shown remarkable successes on efficiently tackling downstream applications. In domains from NLP to Computer Vision, this has led to a consolidation of pretrained models, with general pretrained backbones serving as a starting point for many applications. Can such a consolidation happen in robotics? Conventionally, robotic learning methods train a separate model for every application, every robot, and even every environment. Can we instead train generalist X-robot policy that can be adapted efficiently to new robots, tasks, and environments? In this paper, we provide datasets in standardized data formats and models to make it possible to explore this possibility in the context of robotic manipulation, alongside experimental results that provide an example of effective X-robot policies. We assemble a dataset from 22 different robots collected through a collaboration between 21 institutions, demonstrating 527 skills (160266 tasks). We show that a high-capacity model trained on this data, which we call RT-X, exhibits positive transfer and improves the capabilities of multiple robots by leveraging experience from other platforms. More details can be found on the project website https://robotics-transformer-x.github.io.
△ Less
Submitted 1 June, 2024; v1 submitted 13 October, 2023;
originally announced October 2023.
-
Cross-Episodic Curriculum for Transformer Agents
Authors:
Lucy Xiaoyang Shi,
Yunfan Jiang,
Jake Grigsby,
Linxi "Jim" Fan,
Yuke Zhu
Abstract:
We present a new algorithm, Cross-Episodic Curriculum (CEC), to boost the learning efficiency and generalization of Transformer agents. Central to CEC is the placement of cross-episodic experiences into a Transformer's context, which forms the basis of a curriculum. By sequentially structuring online learning trials and mixed-quality demonstrations, CEC constructs curricula that encapsulate learni…
▽ More
We present a new algorithm, Cross-Episodic Curriculum (CEC), to boost the learning efficiency and generalization of Transformer agents. Central to CEC is the placement of cross-episodic experiences into a Transformer's context, which forms the basis of a curriculum. By sequentially structuring online learning trials and mixed-quality demonstrations, CEC constructs curricula that encapsulate learning progression and proficiency increase across episodes. Such synergy combined with the potent pattern recognition capabilities of Transformer models delivers a powerful cross-episodic attention mechanism. The effectiveness of CEC is demonstrated under two representative scenarios: one involving multi-task reinforcement learning with discrete control, such as in DeepMind Lab, where the curriculum captures the learning progression in both individual and progressively complex settings; and the other involving imitation learning with mixed-quality data for continuous control, as seen in RoboMimic, where the curriculum captures the improvement in demonstrators' expertise. In all instances, policies resulting from CEC exhibit superior performance and strong generalization. Code is open-sourced at https://cec-agent.github.io/ to facilitate research on Transformer agent learning.
△ Less
Submitted 12 October, 2023;
originally announced October 2023.
-
Search for $J/ψ$ weak decays containing $D$ meson
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
X. C. Ai,
R. Aliberti,
A. Amoroso,
M. R. An,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere,
A. Brueggemann
, et al. (600 additional authors not shown)
Abstract:
Using a sample of about 10 billion $J/ψ$ events with the BESIII detector, we search for the weak decays of $J/ψ\to \bar{D}^0π^0 + c.c.$, $J/ψ\to \bar{D}^0η+ c.c.$, $J/ψ\to \bar{D}^0ρ^0 + c.c.$, $J/ψ\to D^-π^+ + c.c.$, and $J/ψ\to D^-ρ^+ + c.c.$. Since no significant signal is observed, we set the upper limits of the branching fractions of these decays to be…
▽ More
Using a sample of about 10 billion $J/ψ$ events with the BESIII detector, we search for the weak decays of $J/ψ\to \bar{D}^0π^0 + c.c.$, $J/ψ\to \bar{D}^0η+ c.c.$, $J/ψ\to \bar{D}^0ρ^0 + c.c.$, $J/ψ\to D^-π^+ + c.c.$, and $J/ψ\to D^-ρ^+ + c.c.$. Since no significant signal is observed, we set the upper limits of the branching fractions of these decays to be $\mathcal{B}(J/ψ\to \bar{D}^0π^0 + c.c.) < 4.7 \times 10^{-7}$, $\mathcal{B}(J/ψ\to \bar{D}^0η+ c.c.) < 6.8 \times 10^{-7}$, $\mathcal{B}(J/ψ\to \bar{D}^0ρ^0 + c.c.) < 5.2 \times 10^{-7}$, $\mathcal{B}(J/ψ\to D^-π^+ + c.c.) < 7.0 \times 10^{-8}$, and $\mathcal{B}(J/ψ\to D^-ρ^+ + c.c.) < 6.0 \times 10^{-7}$ at the 90\% confidence level.
△ Less
Submitted 11 October, 2023;
originally announced October 2023.
-
Superadditive Communication with the Green Machine: A Practical Demonstration of Nonlocality without Entanglement
Authors:
Chaohan Cui,
Jack Postlewaite,
Babak N. Saif,
Linran Fan,
Saikat Guha
Abstract:
Achieving the ultimate Holevo limit of optical communication capacity requires a joint-detection receiver which makes a collective quantum measurement over multiple modulated symbols. Such superadditivity -- a higher communication rate than that achievable by symbol-by-symbol optical detection -- is a special case of the well-known nonlocality without entanglement and has yet to be demonstrated. I…
▽ More
Achieving the ultimate Holevo limit of optical communication capacity requires a joint-detection receiver which makes a collective quantum measurement over multiple modulated symbols. Such superadditivity -- a higher communication rate than that achievable by symbol-by-symbol optical detection -- is a special case of the well-known nonlocality without entanglement and has yet to be demonstrated. In this article, we propose and demonstrate a design of joint-detection receivers, the Green Machine, that can achieve superadditivity. We build this receiver and show that its capacity surpasses any symbol-by-symbol receivers in the photon-starved regime with binary-phase-shift-keying (BPSK). Our Green Machine receiver can also significantly reduce the transmitter peak power requirement compared with the pulse-position modulation (the conventional modulation format used for deep space laser communication). We further show that the self-referenced phase makes it immune to phase noise, e.g., atmospheric turbulence or platform vibrations.
△ Less
Submitted 2 August, 2024; v1 submitted 9 October, 2023;
originally announced October 2023.
-
Do self-supervised speech and language models extract similar representations as human brain?
Authors:
Peili Chen,
Linyang He,
Li Fu,
Lu Fan,
Edward F. Chang,
Yuanning Li
Abstract:
Speech and language models trained through self-supervised learning (SSL) demonstrate strong alignment with brain activity during speech and language perception. However, given their distinct training modalities, it remains unclear whether they correlate with the same neural aspects. We directly address this question by evaluating the brain prediction performance of two representative SSL models,…
▽ More
Speech and language models trained through self-supervised learning (SSL) demonstrate strong alignment with brain activity during speech and language perception. However, given their distinct training modalities, it remains unclear whether they correlate with the same neural aspects. We directly address this question by evaluating the brain prediction performance of two representative SSL models, Wav2Vec2.0 and GPT-2, designed for speech and language tasks. Our findings reveal that both models accurately predict speech responses in the auditory cortex, with a significant correlation between their brain predictions. Notably, shared speech contextual information between Wav2Vec2.0 and GPT-2 accounts for the majority of explained variance in brain activity, surpassing static semantic and lower-level acoustic-phonetic information. These results underscore the convergence of speech contextual representations in SSL models and their alignment with the neural network underlying speech perception, offering valuable insights into both SSL models and the neural basis of speech and language processing.
△ Less
Submitted 31 January, 2024; v1 submitted 6 October, 2023;
originally announced October 2023.
-
Neural2Speech: A Transfer Learning Framework for Neural-Driven Speech Reconstruction
Authors:
Jiawei Li,
Chunxu Guo,
Li Fu,
Lu Fan,
Edward F. Chang,
Yuanning Li
Abstract:
Reconstructing natural speech from neural activity is vital for enabling direct communication via brain-computer interfaces. Previous efforts have explored the conversion of neural recordings into speech using complex deep neural network (DNN) models trained on extensive neural recording data, which is resource-intensive under regular clinical constraints. However, achieving satisfactory performan…
▽ More
Reconstructing natural speech from neural activity is vital for enabling direct communication via brain-computer interfaces. Previous efforts have explored the conversion of neural recordings into speech using complex deep neural network (DNN) models trained on extensive neural recording data, which is resource-intensive under regular clinical constraints. However, achieving satisfactory performance in reconstructing speech from limited-scale neural recordings has been challenging, mainly due to the complexity of speech representations and the neural data constraints. To overcome these challenges, we propose a novel transfer learning framework for neural-driven speech reconstruction, called Neural2Speech, which consists of two distinct training phases. First, a speech autoencoder is pre-trained on readily available speech corpora to decode speech waveforms from the encoded speech representations. Second, a lightweight adaptor is trained on the small-scale neural recordings to align the neural activity and the speech representation for decoding. Remarkably, our proposed Neural2Speech demonstrates the feasibility of neural-driven speech reconstruction even with only 20 minutes of intracranial data, which significantly outperforms existing baseline methods in terms of speech fidelity and intelligibility.
△ Less
Submitted 31 January, 2024; v1 submitted 6 October, 2023;
originally announced October 2023.
-
Learning Concept-Based Causal Transition and Symbolic Reasoning for Visual Planning
Authors:
Yilue Qian,
Peiyu Yu,
Ying Nian Wu,
Yao Su,
Wei Wang,
Lifeng Fan
Abstract:
Visual planning simulates how humans make decisions to achieve desired goals in the form of searching for visual causal transitions between an initial visual state and a final visual goal state. It has become increasingly important in egocentric vision with its advantages in guiding agents to perform daily tasks in complex environments. In this paper, we propose an interpretable and generalizable…
▽ More
Visual planning simulates how humans make decisions to achieve desired goals in the form of searching for visual causal transitions between an initial visual state and a final visual goal state. It has become increasingly important in egocentric vision with its advantages in guiding agents to perform daily tasks in complex environments. In this paper, we propose an interpretable and generalizable visual planning framework consisting of i) a novel Substitution-based Concept Learner (SCL) that abstracts visual inputs into disentangled concept representations, ii) symbol abstraction and reasoning that performs task planning via the self-learned symbols, and iii) a Visual Causal Transition model (ViCT) that grounds visual causal transitions to semantically similar real-world actions. Given an initial state, we perform goal-conditioned visual planning with a symbolic reasoning method fueled by the learned representations and causal transitions to reach the goal state. To verify the effectiveness of the proposed model, we collect a large-scale visual planning dataset based on AI2-THOR, dubbed as CCTP. Extensive experiments on this challenging dataset demonstrate the superior performance of our method in visual task planning. Empirically, we show that our framework can generalize to unseen task trajectories, unseen object categories, and real-world data. Further details of this work are provided at https://fqyqc.github.io/ConTranPlan/.
△ Less
Submitted 27 March, 2024; v1 submitted 5 October, 2023;
originally announced October 2023.
-
Redistributing the Precision and Content in 3D-LUT-based Inverse Tone-mapping for HDR/WCG Display
Authors:
Cheng Guo,
Leidong Fan,
Qian Zhang,
Hanyuan Liu,
Kanglin Liu,
Xiuhua Jiang
Abstract:
ITM(inverse tone-mapping) converts SDR (standard dynamic range) footage to HDR/WCG (high dynamic range /wide color gamut) for media production. It happens not only when remastering legacy SDR footage in front-end content provider, but also adapting on-theair SDR service on user-end HDR display. The latter requires more efficiency, thus the pre-calculated LUT (look-up table) has become a popular so…
▽ More
ITM(inverse tone-mapping) converts SDR (standard dynamic range) footage to HDR/WCG (high dynamic range /wide color gamut) for media production. It happens not only when remastering legacy SDR footage in front-end content provider, but also adapting on-theair SDR service on user-end HDR display. The latter requires more efficiency, thus the pre-calculated LUT (look-up table) has become a popular solution. Yet, conventional fixed LUT lacks adaptability, so we learn from research community and combine it with AI. Meanwhile, higher-bit-depth HDR/WCG requires larger LUT than SDR, so we consult traditional ITM for an efficiency-performance trade-off: We use 3 smaller LUTs, each has a non-uniform packing (precision) respectively denser in dark, middle and bright luma range. In this case, their results will have less error only in their own range, so we use a contribution map to combine their best parts to final result. With the guidance of this map, the elements (content) of 3 LUTs will also be redistributed during training. We conduct ablation studies to verify method's effectiveness, and subjective and objective experiments to show its practicability. Code is available at: https://github.com/AndreGuo/ITMLUT.
△ Less
Submitted 15 October, 2023; v1 submitted 29 September, 2023;
originally announced September 2023.
-
BayeSED-GALAXIES I. Performance test for simultaneous photometric redshift and stellar population parameter estimation of galaxies in the CSST wide-field multiband imaging survey
Authors:
Yunkun Han,
Lulu Fan,
XianZhong Zheng,
Jin-Ming Bai,
Zhanwen Han
Abstract:
The forthcoming CSST wide-field multiband imaging survey will produce seven-band photometric spectral energy distributions (SEDs) for billions of galaxies. The effective extraction of astronomical information from these massive datasets of SEDs relies on the techniques of both SED synthesis (or modeling) and analysis (or fitting). We evaluate the performance of the latest version of BayeSED code c…
▽ More
The forthcoming CSST wide-field multiband imaging survey will produce seven-band photometric spectral energy distributions (SEDs) for billions of galaxies. The effective extraction of astronomical information from these massive datasets of SEDs relies on the techniques of both SED synthesis (or modeling) and analysis (or fitting). We evaluate the performance of the latest version of BayeSED code combined with SED models with increasing complexity for simultaneously determining the photometric redshifts and stellar population parameters of galaxies in this survey. By using an empirical statistics-based mock galaxy sample without SED modeling errors, we show finding that the random observational errors in photometries are more important sources of errors than the parameter degeneracies and Bayesian analysis method and tool. By using a Horizon-AGN hydrodynamical simulation-based mock galaxy sample with SED modeling errors about the star formation histories (SFHs) and dust attenuation laws (DALs), the simple typical assumptions lead to significantly worse parameter estimation with CSST photometries only. The SED models with more flexible (or complicated) forms of SFH/DAL do not necessarily lead to better estimation of redshift and stellar population parameters. We discuss the selection of the best SED model by means of Bayesian model comparison in different surveys. Our results reveal that the Bayesian model comparison with Bayesian evidence may favor SED models with different complexities when using photometries from different surveys. Meanwhile, the SED model with the largest Bayesian evidence tends to give the best performance of parameter estimation, which is more clear for photometries with larger discriminative power.
△ Less
Submitted 24 September, 2023;
originally announced September 2023.
-
Search for Continuous and Transient Neutrino Emission Associated with IceCube's Highest-Energy Tracks: An 11-Year Analysis
Authors:
R. Abbasi,
M. Ackermann,
J. Adams,
S. K. Agarwalla,
J. A. Aguilar,
M. Ahlers,
J. M. Alameddine,
N. M. Amin,
K. Andeen,
G. Anton,
C. Argüelles,
Y. Ashida,
S. Athanasiadou,
L. Ausborm,
S. N. Axani,
X. Bai,
A. Balagopal V.,
M. Baricevic,
S. W. Barwick,
V. Basu,
R. Bay,
J. J. Beatty,
J. Becker Tjus,
J. Beise,
C. Bellenghi
, et al. (385 additional authors not shown)
Abstract:
IceCube alert events are neutrinos with a moderate-to-high probability of having astrophysical origin. In this study, we analyze 11 years of IceCube data and investigate 122 alert events and a selection of high-energy tracks detected between 2009 and the end of 2021. This high-energy event selection (alert events + high-energy tracks) has an average probability of $\geq 0.5$ to be of astrophysical…
▽ More
IceCube alert events are neutrinos with a moderate-to-high probability of having astrophysical origin. In this study, we analyze 11 years of IceCube data and investigate 122 alert events and a selection of high-energy tracks detected between 2009 and the end of 2021. This high-energy event selection (alert events + high-energy tracks) has an average probability of $\geq 0.5$ to be of astrophysical origin. We search for additional continuous and transient neutrino emission within the high-energy events' error regions. We find no evidence for significant continuous neutrino emission from any of the alert event directions. The only locally significant neutrino emission is the transient emission associated with the blazar TXS~0506+056, with a local significance of $ 3 σ$, which confirms previous IceCube studies. When correcting for 122 test positions, the global p-value is $0.156$ and is compatible with the background hypothesis. We constrain the total continuous flux emitted from all 122 test positions at 100~TeV to be below $1.2 \times 10^{-15}$~(TeV cm$^2$ s)$^{-1}$ at 90% confidence assuming an $E^{-2}$ spectrum. This corresponds to 4.5% of IceCube's astrophysical diffuse flux. Overall, we find no indication that alert events, in general, are linked to lower-energetic continuous or transient neutrino emission.
△ Less
Submitted 5 February, 2024; v1 submitted 21 September, 2023;
originally announced September 2023.
-
Quasi-stationary behavior of the stochastic FKPP equation on the circle
Authors:
Wai-Tong Louis Fan,
Oliver Tough
Abstract:
We consider the stochastic Fisher-Kolmogorov-Petrovsky-Piscunov (FKPP) equation on the circle $\mathbb{S}$, \begin{equation*}
\partial_t u(t,x) \,= \fracα{2}Δu +β\,u(1-u) + \sqrt{γ\,u(1-u)}\,\dot{W}, \qquad (t,x)\in(0,\infty)\times \mathbb{S}, \end{equation*} where $\dot{W}$ is space-time white noise. While any solution will eventually be absorbed at one of two states, the constant 1 and the con…
▽ More
We consider the stochastic Fisher-Kolmogorov-Petrovsky-Piscunov (FKPP) equation on the circle $\mathbb{S}$, \begin{equation*}
\partial_t u(t,x) \,= \fracα{2}Δu +β\,u(1-u) + \sqrt{γ\,u(1-u)}\,\dot{W}, \qquad (t,x)\in(0,\infty)\times \mathbb{S}, \end{equation*} where $\dot{W}$ is space-time white noise. While any solution will eventually be absorbed at one of two states, the constant 1 and the constant 0 on the circle, essentially nothing had been established about the absorption time (also called the fixation time in population genetics), or about the long-time behavior prior to absorption. We establish the existence and uniqueness of the quasi-stationary distribution (QSD) for the solution of the stochastic FKPP. Moreover, we show that the solution conditioned on not being absorbed at time $t$ converges to this unique QSD as $t\to\infty$, for any initial distribution, and characterize the leading-order asymptotics for the tail distribution of the fixation time. We obtain explicit calculations in the neutral case ($β=0$), quantifying the effect of spatial diffusion on fixation time. We explicitly express the fixation rate in terms of the migration rate $α$ for all $α\in (0,\infty)$, finding in particular that the fixation rate is given by $γ[1-\fracγ{12α}+\mathcal{O}(\frac{γ^2}{α^2})]$ for fast migration and $π^2α[1-\frac{8α}γ+\mathcal{O}(\frac{α^2}{γ^2})]$ for slow migration. Our proof relies on the observation that the absorbed (or killed) stochastic FKPP is dual to a system of $2$-type branching-coalescing Brownian motions killed when one type dies off, and on leveraging the relationship between these two killed processes.
△ Less
Submitted 9 January, 2024; v1 submitted 19 September, 2023;
originally announced September 2023.
-
PolicyGPT: Automated Analysis of Privacy Policies with Large Language Models
Authors:
Chenhao Tang,
Zhengliang Liu,
Chong Ma,
Zihao Wu,
Yiwei Li,
Wei Liu,
Dajiang Zhu,
Quanzheng Li,
Xiang Li,
Tianming Liu,
Lei Fan
Abstract:
Privacy policies serve as the primary conduit through which online service providers inform users about their data collection and usage procedures. However, in a bid to be comprehensive and mitigate legal risks, these policy documents are often quite verbose. In practical use, users tend to click the Agree button directly rather than reading them carefully. This practice exposes users to risks of…
▽ More
Privacy policies serve as the primary conduit through which online service providers inform users about their data collection and usage procedures. However, in a bid to be comprehensive and mitigate legal risks, these policy documents are often quite verbose. In practical use, users tend to click the Agree button directly rather than reading them carefully. This practice exposes users to risks of privacy leakage and legal issues. Recently, the advent of Large Language Models (LLM) such as ChatGPT and GPT-4 has opened new possibilities for text analysis, especially for lengthy documents like privacy policies. In this study, we investigate a privacy policy text analysis framework PolicyGPT based on the LLM. This framework was tested using two datasets. The first dataset comprises of privacy policies from 115 websites, which were meticulously annotated by legal experts, categorizing each segment into one of 10 classes. The second dataset consists of privacy policies from 304 popular mobile applications, with each sentence manually annotated and classified into one of another 10 categories. Under zero-shot learning conditions, PolicyGPT demonstrated robust performance. For the first dataset, it achieved an accuracy rate of 97%, while for the second dataset, it attained an 87% accuracy rate, surpassing that of the baseline machine learning and neural network models.
△ Less
Submitted 18 September, 2023;
originally announced September 2023.
-
Flexible Visual Recognition by Evidential Modeling of Confusion and Ignorance
Authors:
Lei Fan,
Bo Liu,
Haoxiang Li,
Ying Wu,
Gang Hua
Abstract:
In real-world scenarios, typical visual recognition systems could fail under two major causes, i.e., the misclassification between known classes and the excusable misbehavior on unknown-class images. To tackle these deficiencies, flexible visual recognition should dynamically predict multiple classes when they are unconfident between choices and reject making predictions when the input is entirely…
▽ More
In real-world scenarios, typical visual recognition systems could fail under two major causes, i.e., the misclassification between known classes and the excusable misbehavior on unknown-class images. To tackle these deficiencies, flexible visual recognition should dynamically predict multiple classes when they are unconfident between choices and reject making predictions when the input is entirely out of the training distribution. Two challenges emerge along with this novel task. First, prediction uncertainty should be separately quantified as confusion depicting inter-class uncertainties and ignorance identifying out-of-distribution samples. Second, both confusion and ignorance should be comparable between samples to enable effective decision-making. In this paper, we propose to model these two sources of uncertainty explicitly with the theory of Subjective Logic. Regarding recognition as an evidence-collecting process, confusion is then defined as conflicting evidence, while ignorance is the absence of evidence. By predicting Dirichlet concentration parameters for singletons, comprehensive subjective opinions, including confusion and ignorance, could be achieved via further evidence combinations. Through a series of experiments on synthetic data analysis, visual recognition, and open-set detection, we demonstrate the effectiveness of our methods in quantifying two sources of uncertainties and dealing with flexible recognition.
△ Less
Submitted 13 September, 2023;
originally announced September 2023.
-
Real-time Monitoring for the Next Core-Collapse Supernova in JUNO
Authors:
Angel Abusleme,
Thomas Adam,
Shakeel Ahmad,
Rizwan Ahmed,
Sebastiano Aiello,
Muhammad Akram,
Abid Aleem,
Fengpeng An,
Qi An,
Giuseppe Andronico,
Nikolay Anfimov,
Vito Antonelli,
Tatiana Antoshkina,
Burin Asavapibhop,
João Pedro Athayde Marcondes de André,
Didier Auguste,
Weidong Bai,
Nikita Balashov,
Wander Baldini,
Andrea Barresi,
Davide Basilico,
Eric Baussan,
Marco Bellato,
Marco Beretta,
Antonio Bergnoli
, et al. (606 additional authors not shown)
Abstract:
The core-collapse supernova (CCSN) is considered one of the most energetic astrophysical events in the universe. The early and prompt detection of neutrinos before (pre-SN) and during the supernova (SN) burst presents a unique opportunity for multi-messenger observations of CCSN events. In this study, we describe the monitoring concept and present the sensitivity of the system to pre-SN and SN neu…
▽ More
The core-collapse supernova (CCSN) is considered one of the most energetic astrophysical events in the universe. The early and prompt detection of neutrinos before (pre-SN) and during the supernova (SN) burst presents a unique opportunity for multi-messenger observations of CCSN events. In this study, we describe the monitoring concept and present the sensitivity of the system to pre-SN and SN neutrinos at the Jiangmen Underground Neutrino Observatory (JUNO), a 20 kton liquid scintillator detector currently under construction in South China. The real-time monitoring system is designed to ensure both prompt alert speed and comprehensive coverage of progenitor stars. It incorporates prompt monitors on the electronic board as well as online monitors at the data acquisition stage. Assuming a false alert rate of 1 per year, this monitoring system exhibits sensitivity to pre-SN neutrinos up to a distance of approximately 1.6 (0.9) kiloparsecs and SN neutrinos up to about 370 (360) kiloparsecs for a progenitor mass of 30 solar masses, considering both normal and inverted mass ordering scenarios. The pointing ability of the CCSN is evaluated by analyzing the accumulated event anisotropy of inverse beta decay interactions from pre-SN or SN neutrinos. This, along with the early alert, can play a crucial role in facilitating follow-up multi-messenger observations of the next galactic or nearby extragalactic CCSN.
△ Less
Submitted 4 December, 2023; v1 submitted 13 September, 2023;
originally announced September 2023.
-
A new path method for exponential ergodicity of Markov processes on $\mathbb Z^d$, with applications to stochastic reaction networks
Authors:
David F. Anderson,
Daniele Cappelletti,
Wai-Tong Louis Fan,
Jinsu Kim
Abstract:
This paper provides a new path method that can be used to determine when an ergodic continuous-time Markov chain on $\mathbb Z^d$ converges exponentially fast to its stationary distribution in $L^2$. Specifically, we provide general conditions that guarantee the positivity of the spectral gap. Importantly, our results do not require the assumption of time-reversibility of the Markov model. We then…
▽ More
This paper provides a new path method that can be used to determine when an ergodic continuous-time Markov chain on $\mathbb Z^d$ converges exponentially fast to its stationary distribution in $L^2$. Specifically, we provide general conditions that guarantee the positivity of the spectral gap. Importantly, our results do not require the assumption of time-reversibility of the Markov model. We then apply our new method to the well-studied class of stochastically modeled reaction networks. Notably, we show that each complex-balanced model that is also ``open'' has a positive spectral gap, and is therefore exponentially ergodic. We further illustrate how our results can be applied for models that are not necessarily complex-balanced. Moreover, we provide an example of a detailed-balanced (in the sense of reaction network theory), and hence complex-balanced, stochastic reaction network that is not exponentially ergodic. We believe this to be the first such example in the literature.
△ Less
Submitted 29 September, 2023; v1 submitted 13 September, 2023;
originally announced September 2023.
-
Measurements of the absolute branching fractions of $Ω^-$ decays and test of the $ΔI = 1/2$ rule
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
X. C. Ai,
R. Aliberti,
A. Amoroso,
M. R. An,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere,
A. Brueggemann
, et al. (599 additional authors not shown)
Abstract:
Based on a data set of $(27.12\pm0.10)\times 10^8$ $ψ(3686)$ events collected at the BESIII experiment, the absolute branching fractions of the three dominant $Ω^-$ decays are measured to be $\mathcal{B}_{Ω^- \to Ξ^0 π^-} = (25.03\pm0.44\pm0.53)\%$, $\mathcal{B}_{Ω^- \to Ξ^- π^0} = (8.43\pm0.52\pm0.28)\%$, and $\mathcal{B}_{Ω^- \to ΛK^-} = (66.3\pm0.8\pm2.0)\%$, where the first and second uncertai…
▽ More
Based on a data set of $(27.12\pm0.10)\times 10^8$ $ψ(3686)$ events collected at the BESIII experiment, the absolute branching fractions of the three dominant $Ω^-$ decays are measured to be $\mathcal{B}_{Ω^- \to Ξ^0 π^-} = (25.03\pm0.44\pm0.53)\%$, $\mathcal{B}_{Ω^- \to Ξ^- π^0} = (8.43\pm0.52\pm0.28)\%$, and $\mathcal{B}_{Ω^- \to ΛK^-} = (66.3\pm0.8\pm2.0)\%$, where the first and second uncertainties are statistical and systematic, respectively. The ratio between $\mathcal{B}_{Ω^- \to Ξ^0 π^-}$ and $\mathcal{B}_{Ω^- \to Ξ^- π^0}$ is determined to be $2.97\pm0.19\pm0.11$, which is in good agreement with the PDG value of $2.74\pm0.15$, but greater by more than four standard deviations than the theoretical prediction of 2 obtained from the $ΔI = 1/2$ rule.
△ Less
Submitted 12 September, 2023;
originally announced September 2023.
-
Selection of contributing factors for predicting landslide susceptibility using machine learning and deep learning models
Authors:
Cheng Chen,
Lei Fan
Abstract:
Landslides are a common natural disaster that can cause casualties, property safety threats and economic losses. Therefore, it is important to understand or predict the probability of landslide occurrence at potentially risky sites. A commonly used means is to carry out a landslide susceptibility assessment based on a landslide inventory and a set of landslide contributing factors. This can be rea…
▽ More
Landslides are a common natural disaster that can cause casualties, property safety threats and economic losses. Therefore, it is important to understand or predict the probability of landslide occurrence at potentially risky sites. A commonly used means is to carry out a landslide susceptibility assessment based on a landslide inventory and a set of landslide contributing factors. This can be readily achieved using machine learning (ML) models such as logistic regression (LR), support vector machine (SVM), random forest (RF), extreme gradient boosting (Xgboost), or deep learning (DL) models such as convolutional neural network (CNN) and long short time memory (LSTM). As the input data for these models, landslide contributing factors have varying influences on landslide occurrence. Therefore, it is logically feasible to select more important contributing factors and eliminate less relevant ones, with the aim of increasing the prediction accuracy of these models. However, selecting more important factors is still a challenging task and there is no generally accepted method. Furthermore, the effects of factor selection using various methods on the prediction accuracy of ML and DL models are unclear. In this study, the impact of the selection of contributing factors on the accuracy of landslide susceptibility predictions using ML and DL models was investigated. Four methods for selecting contributing factors were considered for all the aforementioned ML and DL models, which included Information Gain Ratio (IGR), Recursive Feature Elimination (RFE), Particle Swarm Optimization (PSO), Least Absolute Shrinkage and Selection Operators (LASSO) and Harris Hawk Optimization (HHO). In addition, autoencoder-based factor selection methods for DL models were also investigated. To assess their performances, an exhaustive approach was adopted,...
△ Less
Submitted 12 September, 2023; v1 submitted 12 September, 2023;
originally announced September 2023.
-
Observation of $D^{+}\to K_{S}^{0}a_{0}(980)^{+}$ in the amplitude analysis of $D^{+} \to K_{S}^{0}π^+η$
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
M. R. An,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (604 additional authors not shown)
Abstract:
We perform for the first time an amplitude analysis of the decay $D^{+}\to K_{S}^{0}π^+η$ and report the observation of the decay $D^{+}\to K_{S}^{0}a_{0}(980)^{+}$ using 2.93 fb$^{-1}$ of $e^+e^-$ collision data taken at a center-of-mass energy of 3.773 GeV with the BESIII detector. As the only W-annihilation free decay among $D$ to $a_{0}(980)$-pseudoscalar, $D^{+}\to K_{S}^{0}a_{0}(980)^{+}$ is…
▽ More
We perform for the first time an amplitude analysis of the decay $D^{+}\to K_{S}^{0}π^+η$ and report the observation of the decay $D^{+}\to K_{S}^{0}a_{0}(980)^{+}$ using 2.93 fb$^{-1}$ of $e^+e^-$ collision data taken at a center-of-mass energy of 3.773 GeV with the BESIII detector. As the only W-annihilation free decay among $D$ to $a_{0}(980)$-pseudoscalar, $D^{+}\to K_{S}^{0}a_{0}(980)^{+}$ is the ideal decay to extract the contributions of the external and internal $W$-emission amplitudes involving $a_{0}(980)$ and study the final-state interactions. The absolute branching fraction of $D^{+}\to K_{S}^{0}π^+η$ is measured to be $(1.27\pm0.04_{\rm stat.}\pm0.03_{\rm syst.})\%$. The product branching fractions of $D^{+}\to K_{S}^{0}a_{0}(980)^{+}$ with $a_{0}(980)^{+}\to π^+η$ and $D^{+}\to π^+ K_0^*(1430)^0$ with $K_0^*(1430)^0\to K_{S}^{0}η$ are measured to be $(1.33\pm0.05_{\rm stat.}\pm0.04_{\rm syst.})\%$ and $(0.14\pm0.03_{\rm stat.}\pm0.01_{\rm syst.})\%$, respectively.
△ Less
Submitted 29 March, 2024; v1 submitted 11 September, 2023;
originally announced September 2023.
-
Observation of the Singly Cabibbo-Suppressed Decay $Λ_{c}^{+}\to Σ^{-}K^{+}π^{+}$
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
M. R. An,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (605 additional authors not shown)
Abstract:
The singly Cabibbo-suppressed decay $Λ_{c}^{+}\to Σ^{-}K^{+}π^{+}$ is observed for the first time with a statistical significance of $6.4σ$ by using 4.5 fb$^{-1}$ of $e^+e^-$ collision data collected at center-of-mass energies between 4.600 and 4.699 GeV with the BESIII detector at BEPCII. The absolute branching fraction of $Λ_{c}^{+}\to Σ^{-}K^{+}π^{+}$ is measured to be…
▽ More
The singly Cabibbo-suppressed decay $Λ_{c}^{+}\to Σ^{-}K^{+}π^{+}$ is observed for the first time with a statistical significance of $6.4σ$ by using 4.5 fb$^{-1}$ of $e^+e^-$ collision data collected at center-of-mass energies between 4.600 and 4.699 GeV with the BESIII detector at BEPCII. The absolute branching fraction of $Λ_{c}^{+}\to Σ^{-}K^{+}π^{+}$ is measured to be $(3.8\pm1.3_{\rm stat}\pm0.2_{\rm syst})\times 10^{-4}$ in a model-independent approach. This is the first observation of a Cabibbo-suppressed $Λ_{c}^{+}$ decay involving $Σ^-$ in the final state. The ratio of branching fractions between $Λ_{c}^{+}\to Σ^{-}K^{+}π^{+}$ and the Cabibbo-favored decay $Λ_{c}^{+}\to Σ^- π^+π^+$ is calculated to be $(0.4 \pm 0.1)s_{c}^{2}$, where $s_{c} \equiv \sinθ_c = 0.2248$ with $θ_c$ the Cabibbo mixing angle. This ratio significantly deviates from $1.0s_{c}^{2}$ and provides important information for the understanding of nonfactorization contributions in $Λ_{c}^{+}$ decays.
△ Less
Submitted 8 May, 2024; v1 submitted 11 September, 2023;
originally announced September 2023.
-
Measurement of the cross section of $e^+e^-\rightarrowΞ^{-}\barΞ^{+}$ at center-of-mass energies between 3.510 and 4.843 GeV
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
X. C. Ai,
R. Aliberti,
A. Amoroso,
M. R. An,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere,
A. Brueggemann
, et al. (599 additional authors not shown)
Abstract:
Using $e^+e^-$ collision data corresponding to a total integrated luminosity of 12.9 $fb^{-1}$ collected with the BESIII detector at the BEPCII collider, the exclusive Born cross sections and the effective form factors of the reaction $e^+e^-\rightarrowΞ^{-}\barΞ^{+}$ are measured via the single baryon-tag method at 23 center-of-mass energies between 3.510 and 4.843 GeV. Evidence for the decay…
▽ More
Using $e^+e^-$ collision data corresponding to a total integrated luminosity of 12.9 $fb^{-1}$ collected with the BESIII detector at the BEPCII collider, the exclusive Born cross sections and the effective form factors of the reaction $e^+e^-\rightarrowΞ^{-}\barΞ^{+}$ are measured via the single baryon-tag method at 23 center-of-mass energies between 3.510 and 4.843 GeV. Evidence for the decay $ψ(3770)\rightarrowΞ^{-}\barΞ^{+}$ is observed with a significance of 4.5$σ$ by analyzing the measured cross sections together with earlier BESIII results. For the other charmonium(-like) states $ψ(4040)$, $ψ(4160)$, $Y(4230)$, $Y(4360)$, $ψ(4415)$, and $Y(4660)$, no significant signal of their decay to $Ξ^-\bar Ξ^+$ is found. For these states, upper limits of the products of the branching fraction and the electronic partial width at the 90% confidence level are provided.
△ Less
Submitted 30 November, 2023; v1 submitted 8 September, 2023;
originally announced September 2023.