-
Singularities of minimal submanifolds
Authors:
Leon Simon
Abstract:
After quick survey of some key results and open questions about the structure of singularities of minimal surfaces, we discuss recent work~\cite{Sim23} on singularities of stable minimal hypersurfaces, including some simplifications of the main technical discussion in~\cite{Sim23}.
After quick survey of some key results and open questions about the structure of singularities of minimal surfaces, we discuss recent work~\cite{Sim23} on singularities of stable minimal hypersurfaces, including some simplifications of the main technical discussion in~\cite{Sim23}.
△ Less
Submitted 1 September, 2024;
originally announced September 2024.
-
Understanding and Modeling Job Marketplace with Pretrained Language Models
Authors:
Yaochen Zhu,
Liang Wu,
Binchi Zhang,
Song Wang,
Qi Guo,
Liangjie Hong,
Luke Simon,
Jundong Li
Abstract:
Job marketplace is a heterogeneous graph composed of interactions among members (job-seekers), companies, and jobs. Understanding and modeling job marketplace can benefit both job seekers and employers, ultimately contributing to the greater good of the society. However, existing graph neural network (GNN)-based methods have shallow understandings of the associated textual features and heterogeneo…
▽ More
Job marketplace is a heterogeneous graph composed of interactions among members (job-seekers), companies, and jobs. Understanding and modeling job marketplace can benefit both job seekers and employers, ultimately contributing to the greater good of the society. However, existing graph neural network (GNN)-based methods have shallow understandings of the associated textual features and heterogeneous relations. To address the above challenges, we propose PLM4Job, a job marketplace foundation model that tightly couples pretrained language models (PLM) with job market graph, aiming to fully utilize the pretrained knowledge and reasoning ability to model member/job textual features as well as various member-job relations simultaneously. In the pretraining phase, we propose a heterogeneous ego-graph-based prompting strategy to model and aggregate member/job textual features based on the topological structure around the target member/job node, where entity type embeddings and graph positional embeddings are introduced accordingly to model different entities and their heterogeneous relations. Meanwhile, a proximity-aware attention alignment strategy is designed to dynamically adjust the attention of the PLM on ego-graph node tokens in the prompt, such that the attention can be better aligned with job marketplace semantics. Extensive experiments at LinkedIn demonstrate the effectiveness of PLM4Job.
△ Less
Submitted 8 August, 2024;
originally announced August 2024.
-
Drift Detection: Introducing Gaussian Split Detector
Authors:
Maxime Fuccellaro,
Laurent Simon,
Akka Zemmari
Abstract:
Recent research yielded a wide array of drift detectors. However, in order to achieve remarkable performance, the true class labels must be available during the drift detection phase. This paper targets at detecting drift when the ground truth is unknown during the detection phase. To that end, we introduce Gaussian Split Detector (GSD) a novel drift detector that works in batch mode. GSD is desig…
▽ More
Recent research yielded a wide array of drift detectors. However, in order to achieve remarkable performance, the true class labels must be available during the drift detection phase. This paper targets at detecting drift when the ground truth is unknown during the detection phase. To that end, we introduce Gaussian Split Detector (GSD) a novel drift detector that works in batch mode. GSD is designed to work when the data follow a normal distribution and makes use of Gaussian mixture models to monitor changes in the decision boundary. The algorithm is designed to handle multi-dimension data streams and to work without the ground truth labels during the inference phase making it pertinent for real world use. In an extensive experimental study on real and synthetic datasets, we evaluate our detector against the state of the art. We show that our detector outperforms the state of the art in detecting real drift and in ignoring virtual drift which is key to avoid false alarms.
△ Less
Submitted 14 May, 2024;
originally announced May 2024.
-
Unifying and extending Precision Recall metrics for assessing generative models
Authors:
Benjamin Sykes,
Loic Simon,
Julien Rabin
Abstract:
With the recent success of generative models in image and text, the evaluation of generative models has gained a lot of attention. Whereas most generative models are compared in terms of scalar values such as Frechet Inception Distance (FID) or Inception Score (IS), in the last years (Sajjadi et al., 2018) proposed a definition of precision-recall curve to characterize the closeness of two distrib…
▽ More
With the recent success of generative models in image and text, the evaluation of generative models has gained a lot of attention. Whereas most generative models are compared in terms of scalar values such as Frechet Inception Distance (FID) or Inception Score (IS), in the last years (Sajjadi et al., 2018) proposed a definition of precision-recall curve to characterize the closeness of two distributions. Since then, various approaches to precision and recall have seen the light (Kynkaanniemi et al., 2019; Naeem et al., 2020; Park & Kim, 2023). They center their attention on the extreme values of precision and recall, but apart from this fact, their ties are elusive. In this paper, we unify most of these approaches under the same umbrella, relying on the work of (Simon et al., 2019). Doing so, we were able not only to recover entire curves, but also to expose the sources of the accounted pitfalls of the concerned metrics. We also provide consistency results that go well beyond the ones presented in the corresponding literature. Last, we study the different behaviors of the curves obtained experimentally.
△ Less
Submitted 2 May, 2024;
originally announced May 2024.
-
Denoising Gradient Descent in Variational Quantum Algorithms
Authors:
Lars Simon,
Holger Eble,
Hagen-Henrik Kowalski,
Manuel Radons
Abstract:
In this article we introduce an algorithm for mitigating the adverse effects of noise on gradient descent in variational quantum algorithms. This is accomplished by computing a {\emph{regularized}} local classical approximation to the objective function at every gradient descent step. The computational overhead of our algorithm is entirely classical, i.e., the number of circuit evaluations is exac…
▽ More
In this article we introduce an algorithm for mitigating the adverse effects of noise on gradient descent in variational quantum algorithms. This is accomplished by computing a {\emph{regularized}} local classical approximation to the objective function at every gradient descent step. The computational overhead of our algorithm is entirely classical, i.e., the number of circuit evaluations is exactly the same as when carrying out gradient descent using the parameter-shift rules. We empirically demonstrate the advantages offered by our algorithm on randomized parametrized quantum circuits.
△ Less
Submitted 6 March, 2024;
originally announced March 2024.
-
FKS subtraction for quarkonium production at NLO
Authors:
Ajjath A H,
Hua-Sheng Shao,
Lukas Simon
Abstract:
We extend the local infrared-divergence subtraction formalism, originally proposed by Frixione, Kunszt and Signer (FKS), to calculate short-distance (differential) cross section for any inclusive process involving a quarkonium particle in non-relativistic QCD (NRQCD) factorisation at next-to-leading order (NLO) accuracy in the strong coupling constant $α_s$. The new formulas are generally applicab…
▽ More
We extend the local infrared-divergence subtraction formalism, originally proposed by Frixione, Kunszt and Signer (FKS), to calculate short-distance (differential) cross section for any inclusive process involving a quarkonium particle in non-relativistic QCD (NRQCD) factorisation at next-to-leading order (NLO) accuracy in the strong coupling constant $α_s$. The new formulas are generally applicable to the production of an S- or P-wave quarkonium state in association with any number of elementary particles. The main new ingredients derived in this paper are the local and integrated soft counterterms for the colour-singlet and colour-octet P-wave bound states. It, therefore, paves the way to the automation of the NLO calculations for heavy quarkonium inclusive and associated production processes.
△ Less
Submitted 6 July, 2024; v1 submitted 29 February, 2024;
originally announced February 2024.
-
Learning to Retrieve for Job Matching
Authors:
Jianqiang Shen,
Yuchin Juan,
Shaobo Zhang,
Ping Liu,
Wen Pu,
Sriram Vasudevan,
Qingquan Song,
Fedor Borisyuk,
Kay Qianqi Shen,
Haichao Wei,
Yunxiang Ren,
Yeou S. Chiou,
Sicong Kuang,
Yuan Yin,
Ben Zheng,
Muchen Wu,
Shaghayegh Gharghabi,
Xiaoqing Wang,
Huichao Xue,
Qi Guo,
Daniel Hewlett,
Luke Simon,
Liangjie Hong,
Wenjing Zhang
Abstract:
Web-scale search systems typically tackle the scalability challenge with a two-step paradigm: retrieval and ranking. The retrieval step, also known as candidate selection, often involves extracting standardized entities, creating an inverted index, and performing term matching for retrieval. Such traditional methods require manual and time-consuming development of query models. In this paper, we d…
▽ More
Web-scale search systems typically tackle the scalability challenge with a two-step paradigm: retrieval and ranking. The retrieval step, also known as candidate selection, often involves extracting standardized entities, creating an inverted index, and performing term matching for retrieval. Such traditional methods require manual and time-consuming development of query models. In this paper, we discuss applying learning-to-retrieve technology to enhance LinkedIns job search and recommendation systems. In the realm of promoted jobs, the key objective is to improve the quality of applicants, thereby delivering value to recruiter customers. To achieve this, we leverage confirmed hire data to construct a graph that evaluates a seeker's qualification for a job, and utilize learned links for retrieval. Our learned model is easy to explain, debug, and adjust. On the other hand, the focus for organic jobs is to optimize seeker engagement. We accomplished this by training embeddings for personalized retrieval, fortified by a set of rules derived from the categorization of member feedback. In addition to a solution based on a conventional inverted index, we developed an on-GPU solution capable of supporting both KNN and term matching efficiently.
△ Less
Submitted 20 February, 2024;
originally announced February 2024.
-
DSeg: Direct Line Segments Detection
Authors:
Berger Cyrille,
Lacroix Simon
Abstract:
This paper presents a model-driven approach to detect image line segments. The approach incrementally detects segments on the gradient image using a linear Kalman filter that estimates the supporting line parameters and their associated variances. The algorithm is fast and robust with respect to image noise and illumination variations, it allows the detection of longer line segments than data-driv…
▽ More
This paper presents a model-driven approach to detect image line segments. The approach incrementally detects segments on the gradient image using a linear Kalman filter that estimates the supporting line parameters and their associated variances. The algorithm is fast and robust with respect to image noise and illumination variations, it allows the detection of longer line segments than data-driven approaches, and does not require any tedious parameters tuning. An extension of the algorithm that exploits a pyramidal approach to enhance the quality of results is proposed. Results with varying scene illumination and comparisons to classic existing approaches are presented.
△ Less
Submitted 30 November, 2023;
originally announced November 2023.
-
ZTD$_{JAVA}$: Mitigating Software Supply Chain Vulnerabilities via Zero-Trust Dependencies
Authors:
Paschal C. Amusuo,
Kyle A. Robinson,
Tanmay Singla,
Huiyun Peng,
Aravind Machiry,
Santiago Torres-Arias,
Laurent Simon,
James C. Davis
Abstract:
Third-party software components like Log4J accelerate software application development but introduce substantial risk. These components have led to many software supply chain attacks. These attacks succeed because third-party software components are implicitly trusted in an application. Although several security defenses exist to reduce the risks from third-party software components, none of them…
▽ More
Third-party software components like Log4J accelerate software application development but introduce substantial risk. These components have led to many software supply chain attacks. These attacks succeed because third-party software components are implicitly trusted in an application. Although several security defenses exist to reduce the risks from third-party software components, none of them fulfills the full set of requirements needed to defend against common attacks. No individual solution prevents malicious access to operating system resources, is dependency-aware, and enables the discovery of least privileges, all with low runtime costs. Consequently, they cannot prevent software supply chain attacks.
This paper proposes applying the NIST Zero Trust Architecture to software applications. Our Zero Trust Dependencies concept applies the NIST ZTA principles to an application's dependencies. First, we assess the expected effectiveness and feasibility of Zero Trust Dependencies using a study of third-party software components and their vulnerabilities. Then, we present a system design, ZTDSYS, that enables the application of Zero Trust Dependencies to software applications and a prototype, ZTDJAVA, for Java applications. Finally, with evaluations on recreated vulnerabilities and realistic applications, we show that ZTDJAVA can defend against prevalent vulnerability classes, introduces negligible cost, and is easy to configure and use.
△ Less
Submitted 25 April, 2024; v1 submitted 21 October, 2023;
originally announced October 2023.
-
Interpolating Parametrized Quantum Circuits using Blackbox Queries
Authors:
Lars Simon,
Holger Eble,
Hagen-Henrik Kowalski,
Manuel Radons
Abstract:
This article focuses on developing classical surrogates for parametrized quantum circuits using interpolation via (trigonometric) polynomials. We develop two algorithms for the construction of such surrogates and prove performance guarantees. The constructions are based on circuit evaluations which are blackbox in the sense that no structural specifics of the circuits are exploited. While acknowle…
▽ More
This article focuses on developing classical surrogates for parametrized quantum circuits using interpolation via (trigonometric) polynomials. We develop two algorithms for the construction of such surrogates and prove performance guarantees. The constructions are based on circuit evaluations which are blackbox in the sense that no structural specifics of the circuits are exploited. While acknowledging the limitations of the blackbox approach compared to whitebox evaluations, which exploit specific circuit properties, we demonstrate scenarios in which the blackbox approach might prove beneficial. Sample applications include but are not restricted to the approximation of VQEs and the alleviaton of the barren plateau problem.
△ Less
Submitted 11 July, 2024; v1 submitted 6 October, 2023;
originally announced October 2023.
-
SwimXYZ: A large-scale dataset of synthetic swimming motions and videos
Authors:
Fiche Guénolé,
Sevestre Vincent,
Gonzalez-Barral Camila,
Leglaive Simon,
Séguier Renaud
Abstract:
Technologies play an increasingly important role in sports and become a real competitive advantage for the athletes who benefit from it. Among them, the use of motion capture is developing in various sports to optimize sporting gestures. Unfortunately, traditional motion capture systems are expensive and constraining. Recently developed computer vision-based approaches also struggle in certain spo…
▽ More
Technologies play an increasingly important role in sports and become a real competitive advantage for the athletes who benefit from it. Among them, the use of motion capture is developing in various sports to optimize sporting gestures. Unfortunately, traditional motion capture systems are expensive and constraining. Recently developed computer vision-based approaches also struggle in certain sports, like swimming, due to the aquatic environment. One of the reasons for the gap in performance is the lack of labeled datasets with swimming videos. In an attempt to address this issue, we introduce SwimXYZ, a synthetic dataset of swimming motions and videos. SwimXYZ contains 3.4 million frames annotated with ground truth 2D and 3D joints, as well as 240 sequences of swimming motions in the SMPL parameters format. In addition to making this dataset publicly available, we present use cases for SwimXYZ in swimming stroke clustering and 2D pose estimation.
△ Less
Submitted 6 October, 2023;
originally announced October 2023.
-
Insights from exact social contagion dynamics on networks with higher-order structures
Authors:
István Z. Kiss,
Iacopo Iacopini,
Péter L. Simon,
Nicos Georgiou
Abstract:
Recently there has been an increasing interest in studying dynamical processes on networks exhibiting higher-order structures, such as simplicial complexes, where the dynamics acts above and beyond dyadic interactions. Using simulations or heuristically derived epidemic spreading models it was shown that new phenomena can emerge, such as bi-stability/multistability. Here, we show that such new eme…
▽ More
Recently there has been an increasing interest in studying dynamical processes on networks exhibiting higher-order structures, such as simplicial complexes, where the dynamics acts above and beyond dyadic interactions. Using simulations or heuristically derived epidemic spreading models it was shown that new phenomena can emerge, such as bi-stability/multistability. Here, we show that such new emerging phenomena do not require complex contact patterns, such as community structures, but naturally result from the higher-order contagion mechanisms. We show this by deriving an exact higher-order SIS model and its limiting mean-field equivalent for fully connected simplicial complexes. Going beyond previous results, we also give the global bifurcation picture for networks with 3- and 4-body interactions, with the latter allowing for two non-trivial stable endemic steady states. Differently from previous approaches, we are able to study systems featuring interactions of arbitrary order. In addition, we characterise the contributions from higher-order infections to the endemic equilibrium as perturbations of the pairwise baseline, finding that these diminish as the pairwise rate of infection increases. Our approach represents a first step towards a principled understanding of higher-order contagion processes beyond triads and opens up further directions for analytical investigations.
△ Less
Submitted 22 September, 2023;
originally announced September 2023.
-
Text-to-Image Models for Counterfactual Explanations: a Black-Box Approach
Authors:
Guillaume Jeanneret,
Loïc Simon,
Frédéric Jurie
Abstract:
This paper addresses the challenge of generating Counterfactual Explanations (CEs), involving the identification and modification of the fewest necessary features to alter a classifier's prediction for a given image. Our proposed method, Text-to-Image Models for Counterfactual Explanations (TIME), is a black-box counterfactual technique based on distillation. Unlike previous methods, this approach…
▽ More
This paper addresses the challenge of generating Counterfactual Explanations (CEs), involving the identification and modification of the fewest necessary features to alter a classifier's prediction for a given image. Our proposed method, Text-to-Image Models for Counterfactual Explanations (TIME), is a black-box counterfactual technique based on distillation. Unlike previous methods, this approach requires solely the image and its prediction, omitting the need for the classifier's structure, parameters, or gradients. Before generating the counterfactuals, TIME introduces two distinct biases into Stable Diffusion in the form of textual embeddings: the context bias, associated with the image's structure, and the class bias, linked to class-specific features learned by the target classifier. After learning these biases, we find the optimal latent code applying the classifier's predicted class token and regenerate the image using the target embedding as conditioning, producing the counterfactual explanation. Extensive empirical studies validate that TIME can generate explanations of comparable effectiveness even when operating within a black-box setting.
△ Less
Submitted 15 November, 2023; v1 submitted 14 September, 2023;
originally announced September 2023.
-
On Neural Quantum Support Vector Machines
Authors:
Lars Simon,
Manuel Radons
Abstract:
In \cite{simon2023algorithms} we introduced four algorithms for the training of neural support vector machines (NSVMs) and demonstrated their feasibility. In this note we introduce neural quantum support vector machines, that is, NSVMs with a quantum kernel, and extend our results to this setting.
In \cite{simon2023algorithms} we introduced four algorithms for the training of neural support vector machines (NSVMs) and demonstrated their feasibility. In this note we introduce neural quantum support vector machines, that is, NSVMs with a quantum kernel, and extend our results to this setting.
△ Less
Submitted 24 November, 2023; v1 submitted 16 August, 2023;
originally announced August 2023.
-
Algorithms for the Training of Neural Support Vector Machines
Authors:
Lars Simon,
Manuel Radons
Abstract:
Neural support vector machines (NSVMs) allow for the incorporation of domain knowledge in the design of the model architecture. In this article we introduce a set of training algorithms for NSVMs that leverage the Pegasos algorithm and provide a proof of concept by solving a set of standard machine learning tasks.
Neural support vector machines (NSVMs) allow for the incorporation of domain knowledge in the design of the model architecture. In this article we introduce a set of training algorithms for NSVMs that leverage the Pegasos algorithm and provide a proof of concept by solving a set of standard machine learning tasks.
△ Less
Submitted 14 August, 2023;
originally announced August 2023.
-
The Heterogeneous Earnings Impact of Job Loss Across Workers, Establishments, and Markets
Authors:
Susan Athey,
Lisa K. Simon,
Oskar N. Skans,
Johan Vikstrom,
Yaroslav Yakymovych
Abstract:
Using generalized random forests and rich Swedish administrative data, we show that the earnings effects of job displacement due to establishment closures are extremely heterogeneous across and within (observable) worker types, establishments, and markets. The decile with the largest predicted effects loses 50 percent of annual earnings the year after displacement and losses accumulate to 200 perc…
▽ More
Using generalized random forests and rich Swedish administrative data, we show that the earnings effects of job displacement due to establishment closures are extremely heterogeneous across and within (observable) worker types, establishments, and markets. The decile with the largest predicted effects loses 50 percent of annual earnings the year after displacement and losses accumulate to 200 percent over 7 years. The least affected decile experiences only marginal losses of 6 percent in the year after displacement. Prior to displacement workers in the most affected decile were lower paid and had negative earnings trajectories. Workers with large predicted effects are more sensitive to adverse market conditions than other workers. When restricting attention to simple targeting rules, the subgroup consisting of older workers in routine-task intensive jobs has the highest predictable effects of displacement.
△ Less
Submitted 23 February, 2024; v1 submitted 13 July, 2023;
originally announced July 2023.
-
On the De-duplication of LAION-2B
Authors:
Ryan Webster,
Julien Rabin,
Loic Simon,
Frederic Jurie
Abstract:
Generative models, such as DALL-E, Midjourney, and Stable Diffusion, have societal implications that extend beyond the field of computer science. These models require large image databases like LAION-2B, which contain two billion images. At this scale, manual inspection is difficult and automated analysis is challenging. In addition, recent studies show that duplicated images pose copyright proble…
▽ More
Generative models, such as DALL-E, Midjourney, and Stable Diffusion, have societal implications that extend beyond the field of computer science. These models require large image databases like LAION-2B, which contain two billion images. At this scale, manual inspection is difficult and automated analysis is challenging. In addition, recent studies show that duplicated images pose copyright problems for models trained on LAION2B, which hinders its usability. This paper proposes an algorithmic chain that runs with modest compute, that compresses CLIP features to enable efficient duplicate detection, even for vast image volumes. Our approach demonstrates that roughly 700 million images, or about 30\%, of LAION-2B's images are likely duplicated. Our method also provides the histograms of duplication on this dataset, which we use to reveal more examples of verbatim copies by Stable Diffusion and further justify the approach. The current version of the de-duplicated set will be distributed online.
△ Less
Submitted 17 March, 2023;
originally announced March 2023.
-
Adversarial Counterfactual Visual Explanations
Authors:
Guillaume Jeanneret,
Loïc Simon,
Frédéric Jurie
Abstract:
Counterfactual explanations and adversarial attacks have a related goal: flipping output labels with minimal perturbations regardless of their characteristics. Yet, adversarial attacks cannot be used directly in a counterfactual explanation perspective, as such perturbations are perceived as noise and not as actionable and understandable image modifications. Building on the robust learning literat…
▽ More
Counterfactual explanations and adversarial attacks have a related goal: flipping output labels with minimal perturbations regardless of their characteristics. Yet, adversarial attacks cannot be used directly in a counterfactual explanation perspective, as such perturbations are perceived as noise and not as actionable and understandable image modifications. Building on the robust learning literature, this paper proposes an elegant method to turn adversarial attacks into semantically meaningful perturbations, without modifying the classifiers to explain. The proposed approach hypothesizes that Denoising Diffusion Probabilistic Models are excellent regularizers for avoiding high-frequency and out-of-distribution perturbations when generating adversarial attacks. The paper's key idea is to build attacks through a diffusion model to polish them. This allows studying the target model regardless of its robustification level. Extensive experimentation shows the advantages of our counterfactual explanation approach over current State-of-the-Art in multiple testbeds.
△ Less
Submitted 17 March, 2023;
originally announced March 2023.
-
The Symmetric Minimal Surface Equation
Authors:
Kaveh Fouladgar,
Leon Simon
Abstract:
For positive functions $u\in C^{2}(Ω) $, where $Ω$ is an open subset of $\mathbb{R}^{n}$, the Symmetric Minimal Surface Equation (SME), is $\sum_{i=1}^{n}D_{i}\bigl(\frac{D_{i}u}{\sqrt{1+|Du|^{2}}}\bigr)=\frac{m-1}{u\sqrt{1+|Du|^{2}}}$. Geometrically, the SME expresses the fact that the ``symmetric graph'' $SG(u)$, defined by $SG(u)=\bigl\{(x,ξ)\in Ω\times\mathbb{R}^{m}:|ξ|=u(x)\bigr\}$, is a mini…
▽ More
For positive functions $u\in C^{2}(Ω) $, where $Ω$ is an open subset of $\mathbb{R}^{n}$, the Symmetric Minimal Surface Equation (SME), is $\sum_{i=1}^{n}D_{i}\bigl(\frac{D_{i}u}{\sqrt{1+|Du|^{2}}}\bigr)=\frac{m-1}{u\sqrt{1+|Du|^{2}}}$. Geometrically, the SME expresses the fact that the ``symmetric graph'' $SG(u)$, defined by $SG(u)=\bigl\{(x,ξ)\in Ω\times\mathbb{R}^{m}:|ξ|=u(x)\bigr\}$, is a minimal (i.e.\ zero mean curvature) hypersurface in $Ω\times\mathbb{R}^{m}$. A function $u\in C^{1}(Ω)$ is said to be a singular solution if $u^{-1}\{0\}\neq \emptyset$, and if $u=\lim_{j\to\infty}u_{j}$, uniformly on each compact subset of $Ω$, where each $u_{j}$ is a positive $C^{2}(Ω)$ solution of the SME. The present paper develops are theory of singular solutions of the SME, including existence, Hölder and Lipschitz estimates for bounded solutions, and a compactness and regularity theory. We also prove that the singular set $u^{-1}{\{0\}}$ is codimension at most 2.
△ Less
Submitted 22 January, 2023;
originally announced January 2023.
-
Self-Assembly of Soot Nanoparticles on the Surface of Resistively Heated Carbon Microtubes in Near-Hexagonal Arrays of Micropyramids
Authors:
Valeriy A Luchnikov,
Yukie Saito,
Luc Delmotte,
Joseph Dentzer,
Emmanuel Denys,
Vincent Malesys,
Ludovic Josien,
Laurent Simon,
Simon Gree
Abstract:
Almost regular hexagonal arrays of a few micrometers tall and wide micropyramids consisting of soot nano-particles are formed on the surface of graphitized hollow filaments, which are resistively heated to ~1800$^\circ$C-2400$^\circ$C in an Ar atmosphere containing trace amounts of oxygen (~300 p.p.m.). At the higher temperatures (T>2300$^\circ$C, approximately) the soot particles are represented…
▽ More
Almost regular hexagonal arrays of a few micrometers tall and wide micropyramids consisting of soot nano-particles are formed on the surface of graphitized hollow filaments, which are resistively heated to ~1800$^\circ$C-2400$^\circ$C in an Ar atmosphere containing trace amounts of oxygen (~300 p.p.m.). At the higher temperatures (T>2300$^\circ$C, approximately) the soot particles are represented mainly by multi-shell carbon nano-onions. The height and the width of the pyramids is strongly dependent on the temperature of the resistive heating, diminishing from 5-10mkm at T=1800$^\circ$C to 1mkm at 2300-2400$^\circ$C. Quasi-hexagonal arrays of the micropyramids are organized in the convex ``craters'' on the surface of the microtubes, which grow with the time of the thermal treatment. The pyramids are pointing always normally to the surface of the craters, except at the boundaries between the craters, where the normal direction is not well defined. The pyramids are soft and can be easy destroyed by touching them, but can be hardened by heating them in the oxygen-free atmosphere. The pyramids are observed only on the exterior surface of the microtubes, but not on their inner surface. This suggests that the thermophoretic force generated by a strong temperature gradient near the external surface of the tubes may be the cause of the micropyramids formation. Electrostatic charging of the soot nanoparticles due to thermionic emission may also be relevant to this phenomenon. The micropyramids can function as field emission point sources, as demonstrated with the use of a micro-nanoprobing station, mounted in a scanning electron microscope.
△ Less
Submitted 5 January, 2023;
originally announced January 2023.
-
On parameter identifiability in network-based epidemic models
Authors:
István Zoltán Kiss,
Péter L. Simon
Abstract:
Many models in mathematical epidemiology are developed with the aim to provide a framework for parameter estimation and then prediction. It is well-known that parameters are not always uniquely identifiable. In this paper we consider network-based mean-field models and explore the problem of parameter identifiability when observations about an epidemic are available. Making use of the analytical t…
▽ More
Many models in mathematical epidemiology are developed with the aim to provide a framework for parameter estimation and then prediction. It is well-known that parameters are not always uniquely identifiable. In this paper we consider network-based mean-field models and explore the problem of parameter identifiability when observations about an epidemic are available. Making use of the analytical tractability of most network-based mean-field models, e.g., explicit analytical expressions for leading eigenvalue and final epidemic size, we set up the parameter identifiability problem as finding the solution or solutions of a system of coupled equations. More precisely, subject to observing/measuring growth rate and final epidemic size, we seek to identify parameter values leading to these measurements. We are particularly concerned with disentangling transmission rate from the network density. To do this we define strong and weak identifiability and we find that except for the simplest model, parameters cannot be uniquely determined, that is they are weakly identifiable. This means that there exists multiple solutions (a manifold of infinite measure) which give rise to model output that is close to the data. Identifying, formalising and analytically describing this problem should lead to a better appreciation of the complexity involved in fitting models with many parameters to data.
△ Less
Submitted 16 August, 2022;
originally announced August 2022.
-
Flat band and Lifschitz transition in long-range ordered supergraphene obtained by Erbium intercalation
Authors:
A. Zaarour,
V. Malesys,
J. Teyssandier,
M. Cranney,
E. Denys,
J. L. Bubendorff,
A. Florentin,
L. Josien,
F. Vonau,
D. Aubel,
A. Ouerghi,
C. Bena,
L. Simon
Abstract:
Dispersionless energy bands are a peculiar property gathering increasing attention for the emergence of novel photonic, magnetic and electronic properties. Here we report the first observation of a graphene superstructure n-doped up to the Lifshitz transition and exhibiting a flat band, obtained by ordered Erbium intercalation between a single layer graphene and SiC(0001). STM experiments reveal l…
▽ More
Dispersionless energy bands are a peculiar property gathering increasing attention for the emergence of novel photonic, magnetic and electronic properties. Here we report the first observation of a graphene superstructure n-doped up to the Lifshitz transition and exhibiting a flat band, obtained by ordered Erbium intercalation between a single layer graphene and SiC(0001). STM experiments reveal large graphene areas characterized by a long-range ordered hexagonal superstructure with a lattice parameter of 1.40 nm, rotated by 19 degrees with respect to the original lattice. Angle Resolved Photoelectron Spectroscopy measurements show that this graphene structure exhibits Dirac cones with perfect linear dispersion, and a Dirac point at -1.72 eV +/- 0.02 under the Fermi level, which is one of the highest doping levels ever obtained solely by intercalation. Fermi surface measurements show that the Lifshitz transition has been reached, and that a wide flat band is generated around the M point. We propose that this modification of the band structure is the effect of an induced spin-orbit coupling. This system provides a playground to study the interaction between a novel magnetic order mediated by pi-band states, and a divergent density of states at the Fermi level.
△ Less
Submitted 24 August, 2022; v1 submitted 25 July, 2022;
originally announced July 2022.
-
Learning the parameters of a differential equation from its trajectory via the adjoint equation
Authors:
Imre Fekete,
András Molnár,
Péter L. Simon
Abstract:
The paper contributes to strengthening the relation between machine learning and the theory of differential equations. In this context, the inverse problem of fitting the parameters, and the initial condition of a differential equation to some measurements constitutes a key issue. The paper explores an abstraction that can be used to construct a family of loss functions with the aim of fitting the…
▽ More
The paper contributes to strengthening the relation between machine learning and the theory of differential equations. In this context, the inverse problem of fitting the parameters, and the initial condition of a differential equation to some measurements constitutes a key issue. The paper explores an abstraction that can be used to construct a family of loss functions with the aim of fitting the solution of an initial value problem to a set of discrete or continuous measurements. It is shown, that an extension of the adjoint equation can be used to derive the gradient of the loss function as a continuous analogue of backpropagation in machine learning. Numerical evidence is presented that under reasonably controlled circumstances the gradients obtained this way can be used in a gradient descent to fit the solution of an initial value problem to a set of continuous noisy measurements, and a set of discrete noisy measurements that are recorded at uncertain times.
△ Less
Submitted 17 June, 2022;
originally announced June 2022.
-
Diffusion Models for Counterfactual Explanations
Authors:
Guillaume Jeanneret,
Loïc Simon,
Frédéric Jurie
Abstract:
Counterfactual explanations have shown promising results as a post-hoc framework to make image classifiers more explainable. In this paper, we propose DiME, a method allowing the generation of counterfactual images using the recent diffusion models. By leveraging the guided generative diffusion process, our proposed methodology shows how to use the gradients of the target classifier to generate co…
▽ More
Counterfactual explanations have shown promising results as a post-hoc framework to make image classifiers more explainable. In this paper, we propose DiME, a method allowing the generation of counterfactual images using the recent diffusion models. By leveraging the guided generative diffusion process, our proposed methodology shows how to use the gradients of the target classifier to generate counterfactual explanations of input instances. Further, we analyze current approaches to evaluate spurious correlations and extend the evaluation measurements by proposing a new metric: Correlation Difference. Our experimental validations show that the proposed algorithm surpasses previous State-of-the-Art results on 5 out of 6 metrics on CelebA.
△ Less
Submitted 29 March, 2022;
originally announced March 2022.
-
European Aerosol Phenomenology -- 8: Harmonised Source Apportionment of Organic Aerosol using 22 Year-long ACSM/AMS Datasets
Authors:
Gang Chen,
Francesco Canonaco,
Anna Tobler,
Wenche Aas,
Andres Alastuey,
James Allan,
Samira Atabakhsh,
Minna Aurela,
Urs Baltensperger,
Aikaterini Bougiatioti,
Joel F. De Brito,
Darius Ceburnis,
Benjamin Chazeau,
Hasna Chebaicheb,
Kaspar R. Daellenbach,
Mikael Ehn,
Imad El Haddad,
Konstantinos Eleftheriadis,
Olivier Favez,
Harald Flentje,
Anna Font,
Kirsten Fossum,
Evelyn Freney,
Maria Gini,
David C Green
, et al. (45 additional authors not shown)
Abstract:
Organic aerosol (OA) is a key component to total submicron particulate matter (PM1), and comprehensive knowledge of OA sources across Europe is crucial to mitigate PM1 levels. Europe has a well-established air quality research infrastructure from which yearlong datasets using 21 aerosol chemical speciation monitors (ACSMs) and 1 aerosol mass spectrometer (AMS) were gathered during 2013-2019. It in…
▽ More
Organic aerosol (OA) is a key component to total submicron particulate matter (PM1), and comprehensive knowledge of OA sources across Europe is crucial to mitigate PM1 levels. Europe has a well-established air quality research infrastructure from which yearlong datasets using 21 aerosol chemical speciation monitors (ACSMs) and 1 aerosol mass spectrometer (AMS) were gathered during 2013-2019. It includes 9 non-urban and 13 urban sites. This study developed a state-of-the-art source apportionment protocol to analyse long-term OA mass spectrum data by applying the most advanced source apportionment strategies (i.e., rolling PMF, ME-2, and bootstrap). This harmonised protocol enables the quantifications of the most common OA components such as hydrocarbon-like OA (HOA), biomass burning OA (BBOA), cooking-like OA (COA), more oxidised-oxygenated OA (MO-OOA), and less oxidised-oxygenated OA (LO-OOA). Other components such as coal combustion OA (CCOA), solid fuel OA (SFOA: mainly mixture of coal and peat combustion), cigarette smoke OA (CSOA), sea salt (mostly inorganic but part of the OA mass spectrum), coffee OA, and ship industry OA could also be separated at a few specific sites. Oxygenated OA (OOA) components make up most of the submicron OA mass (average = 71.1%, a range of 43.7-100%). Solid fuel combustion-related OA components (i.e., BBOA, CCOA, and SFOA) are still considerable with in total 16.0% yearly contribution to the OA, yet mainly during winter months (21.4%). Overall, this comprehensive protocol works effectively across all sites governed by different sources and generates robust and consistent source apportionment results. Our work presents a comprehensive overview of OA sources in Europe with a unique combination of high time resolution and long-term data coverage (9-36 months), providing essential information to improve/validate air quality, health impact, and climate models.
△ Less
Submitted 4 January, 2022; v1 submitted 3 January, 2022;
originally announced January 2022.
-
On the inductive biases of deep domain adaptation
Authors:
Rodrigue Siry,
Louis Hémadou,
Loïc Simon,
Frédéric Jurie
Abstract:
Domain alignment is currently the most prevalent solution to unsupervised domain-adaptation tasks and are often being presented as minimizers of some theoretical upper-bounds on risk in the target domain. However, further works revealed severe inadequacies between theory and practice: we consolidate this analysis and confirm that imposing domain invariance on features is neither necessary nor suff…
▽ More
Domain alignment is currently the most prevalent solution to unsupervised domain-adaptation tasks and are often being presented as minimizers of some theoretical upper-bounds on risk in the target domain. However, further works revealed severe inadequacies between theory and practice: we consolidate this analysis and confirm that imposing domain invariance on features is neither necessary nor sufficient to obtain low target risk. We instead argue that successful deep domain adaptation rely largely on hidden inductive biases found in the common practice, such as model pre-training or design of encoder architecture. We perform various ablation experiments on popular benchmarks and our own synthetic transfers to illustrate their role in prototypical situations. To conclude our analysis, we propose to meta-learn parametric inductive biases to solve specific transfers and show their superior performance over handcrafted heuristics.
△ Less
Submitted 16 September, 2021;
originally announced September 2021.
-
Training face verification models from generated face identity data
Authors:
Dennis Conway,
Loic Simon,
Alexis Lechervy,
Frederic Jurie
Abstract:
Machine learning tools are becoming increasingly powerful and widely used. Unfortunately membership attacks, which seek to uncover information from data sets used in machine learning, have the potential to limit data sharing. In this paper we consider an approach to increase the privacy protection of data sets, as applied to face recognition. Using an auxiliary face recognition model, we build on…
▽ More
Machine learning tools are becoming increasingly powerful and widely used. Unfortunately membership attacks, which seek to uncover information from data sets used in machine learning, have the potential to limit data sharing. In this paper we consider an approach to increase the privacy protection of data sets, as applied to face recognition. Using an auxiliary face recognition model, we build on the StyleGAN generative adversarial network and feed it with latent codes combining two distinct sub-codes, one encoding visual identity factors, and, the other, non-identity factors. By independently varying these vectors during image generation, we create a synthetic data set of fictitious face identities. We use this data set to train a face recognition model. The model performance degrades in comparison to the state-of-the-art of face verification. When tested with a simple membership attack our model provides good privacy protection, however the model performance degrades in comparison to the state-of-the-art of face verification. We find that the addition of a small amount of private data greatly improves the performance of our model, which highlights the limitations of using synthetic data to train machine learning models.
△ Less
Submitted 2 August, 2021;
originally announced August 2021.
-
This Person (Probably) Exists. Identity Membership Attacks Against GAN Generated Faces
Authors:
Ryan Webster,
Julien Rabin,
Loic Simon,
Frederic Jurie
Abstract:
Recently, generative adversarial networks (GANs) have achieved stunning realism, fooling even human observers. Indeed, the popular tongue-in-cheek website {\small \url{ http://thispersondoesnotexist.com}}, taunts users with GAN generated images that seem too real to believe. On the other hand, GANs do leak information about their training data, as evidenced by membership attacks recently demonstra…
▽ More
Recently, generative adversarial networks (GANs) have achieved stunning realism, fooling even human observers. Indeed, the popular tongue-in-cheek website {\small \url{ http://thispersondoesnotexist.com}}, taunts users with GAN generated images that seem too real to believe. On the other hand, GANs do leak information about their training data, as evidenced by membership attacks recently demonstrated in the literature. In this work, we challenge the assumption that GAN faces really are novel creations, by constructing a successful membership attack of a new kind. Unlike previous works, our attack can accurately discern samples sharing the same identity as training samples without being the same samples. We demonstrate the interest of our attack across several popular face datasets and GAN training procedures. Notably, we show that even in the presence of significant dataset diversity, an over represented person can pose a privacy concern.
△ Less
Submitted 13 July, 2021;
originally announced July 2021.
-
Drop Interface and Airflow Unsteadiness in Wind-Forced Drop Depinning
Authors:
Roger L. Simon, Jr.,
Edward B. White
Abstract:
Liquid drops that are pinned to solid surfaces by contact-angle hysteresis can be dislodged by wind forcing. When this occurs at high Reynolds numbers, substantial drop-interface oscillations precede depinning. It has been hypothesized that coupling between drop interface oscillations and unsteady airflow vortices are important to the depinning process. This possibility is investigated using simul…
▽ More
Liquid drops that are pinned to solid surfaces by contact-angle hysteresis can be dislodged by wind forcing. When this occurs at high Reynolds numbers, substantial drop-interface oscillations precede depinning. It has been hypothesized that coupling between drop interface oscillations and unsteady airflow vortices are important to the depinning process. This possibility is investigated using simultaneous high-speed side-view drop images and airflow fluctuation measurements. The results show no evidence of coupling across a range of drop volumes and wind speeds for water drops in air. When properly scaled by drop volume, drop interface fluctuation frequencies are not affected by wind speed. Airflow vortex shedding occurs as if the drop were a solid surface protuberance. For the air/water system in these experiments, vortex shedding frequencies are substantially higher than drop interface frequencies and the disparate frequencies may make the hypothesized coupling impossible.
△ Less
Submitted 7 May, 2021;
originally announced May 2021.
-
Homogeneous Plurisubharmonic Polynomials in Higher Dimensions
Authors:
Lars Simon
Abstract:
We prove several results on homogeneous plurisubharmonic polynomials on $\mathbb{C}^n$, $n\in\mathbb{Z}_{\geq 2}$. Said results are relevant to the problem of constructing local bumpings at boundary points of pseudoconvex domains of finite D'Angelo $1$-type in $\mathbb{C}^{n+1}$.
We prove several results on homogeneous plurisubharmonic polynomials on $\mathbb{C}^n$, $n\in\mathbb{Z}_{\geq 2}$. Said results are relevant to the problem of constructing local bumpings at boundary points of pseudoconvex domains of finite D'Angelo $1$-type in $\mathbb{C}^{n+1}$.
△ Less
Submitted 11 March, 2021;
originally announced March 2021.
-
A Liouville-type theorem for stable minimal hypersurfaces
Authors:
Leon Simon
Abstract:
We prove that if $M$ is a strictly stable complete minimal hypersurface in Euclidean space with finite density at infinity and which lies on one side of a minimal cylinder with cross-section a strictly stable area minimizing hypercone, then $M$ must be cylindrical. Applications will be given in the references [Sim20a], [Sim20b].
We prove that if $M$ is a strictly stable complete minimal hypersurface in Euclidean space with finite density at infinity and which lies on one side of a minimal cylinder with cross-section a strictly stable area minimizing hypercone, then $M$ must be cylindrical. Applications will be given in the references [Sim20a], [Sim20b].
△ Less
Submitted 16 August, 2021; v1 submitted 16 January, 2021;
originally announced January 2021.
-
Stable minimal hypersurfaces in $\mathbb{R}^{N+1+\ell}$ with singular set an arbitrary closed $K$ in $\{0\}\times\mathbb{R}^{\ell}$
Authors:
Leon Simon
Abstract:
With respect to a $C^{\infty}$ metric which is close to the standard Euclidean metric on $\mathbb{R}^{N+1+\ell}$, where $N\ge 7$ and $\ell\ge 1$ are given, we construct a class of embedded $(N+\ell)$-dimensional hypersurfaces (without boundary) which are minimal and strictly stable, and which have singular set equal to an arbitrary preassigned closed subset $K\subset\{0\}\times\mathbb{R}^{\ell}$.
With respect to a $C^{\infty}$ metric which is close to the standard Euclidean metric on $\mathbb{R}^{N+1+\ell}$, where $N\ge 7$ and $\ell\ge 1$ are given, we construct a class of embedded $(N+\ell)$-dimensional hypersurfaces (without boundary) which are minimal and strictly stable, and which have singular set equal to an arbitrary preassigned closed subset $K\subset\{0\}\times\mathbb{R}^{\ell}$.
△ Less
Submitted 23 January, 2023; v1 submitted 16 January, 2021;
originally announced January 2021.
-
On the Theoretical Equivalence of Several Trade-Off Curves Assessing Statistical Proximity
Authors:
Rodrigue Siry,
Ryan Webster,
Loic Simon,
Julien Rabin
Abstract:
The recent advent of powerful generative models has triggered the renewed development of quantitative measures to assess the proximity of two probability distributions. As the scalar Frechet inception distance remains popular, several methods have explored computing entire curves, which reveal the trade-off between the fidelity and variability of the first distribution with respect to the second o…
▽ More
The recent advent of powerful generative models has triggered the renewed development of quantitative measures to assess the proximity of two probability distributions. As the scalar Frechet inception distance remains popular, several methods have explored computing entire curves, which reveal the trade-off between the fidelity and variability of the first distribution with respect to the second one. Several of such variants have been proposed independently and while intuitively similar, their relationship has not yet been made explicit. In an effort to make the emerging picture of generative evaluation more clear, we propose a unification of four curves known respectively as: the precision-recall (PR) curve, the Lorenz curve, the receiver operating characteristic (ROC) curve and a special case of Rényi divergence frontiers. In addition, we discuss possible links between PR / Lorenz curves with the derivation of domain adaptation bounds.
△ Less
Submitted 13 October, 2022; v1 submitted 21 June, 2020;
originally announced June 2020.
-
SAT Heritage: a community-driven effort for archiving, building and running more than thousand SAT solvers
Authors:
Gilles Audemard,
Loïc Paulevé,
Laurent Simon
Abstract:
SAT research has a long history of source code and binary releases, thanks to competitions organized every year. However, since every cycle of competitions has its own set of rules and an adhoc way of publishing source code and binaries, compiling or even running any solver may be harder than what it seems. Moreover, there has been more than a thousand solvers published so far, some of them releas…
▽ More
SAT research has a long history of source code and binary releases, thanks to competitions organized every year. However, since every cycle of competitions has its own set of rules and an adhoc way of publishing source code and binaries, compiling or even running any solver may be harder than what it seems. Moreover, there has been more than a thousand solvers published so far, some of them released in the early 90's. If the SAT community wants to archive and be able to keep track of all the solvers that made its history, it urgently needs to deploy an important effort. We propose to initiate a community-driven effort to archive and to allow easy compilation and running of all SAT solvers that have been released so far. We rely on the best tools for archiving and building binaries (thanks to Docker, GitHub and Zenodo) and provide a consistent and easy way for this. Thanks to our tool, building (or running) a solver from its source (or from its binary) can be done in one line.
△ Less
Submitted 2 June, 2020;
originally announced June 2020.
-
Nature and Origins of Rich Complexes of C IV Associated Absorption Lines
Authors:
Chen Chen,
Fred Hamann,
Leah Simon,
Bo Ma
Abstract:
Rich complexes of associated absorption lines (AALs) in quasar spectra provide unique information about gaseous infall, outflows, and feedback processes in quasar environments. We study five quasars at redshifts 3.1 to 4.4 with AAL complexes containing from 7 to 18 CIV 1548, 1551 systems in high-resolution spectra. These complexes span velocity ranges $\lesssim$3600 km/s within $\lesssim$8200 km/s…
▽ More
Rich complexes of associated absorption lines (AALs) in quasar spectra provide unique information about gaseous infall, outflows, and feedback processes in quasar environments. We study five quasars at redshifts 3.1 to 4.4 with AAL complexes containing from 7 to 18 CIV 1548, 1551 systems in high-resolution spectra. These complexes span velocity ranges $\lesssim$3600 km/s within $\lesssim$8200 km/s of the quasar redshifts. All are highly ionised with no measurable low-ionisation ions like SiII or CII, and all appear to form in the quasar/host galaxy environments based on evidence for line locking, partial covering of the background light source, strong NV absorption, and/or roughly solar metallicities, and on the implausibility of such complexes forming in unrelated intervening galaxies. Most of the lines in all five complexes identify high-speed quasar-driven outflows at velocity shifts $v\lesssim -1000$ km/s. Four of the complexes also have lines at smaller blueshifted velocities that might form in ambient interstellar clouds, low-speed outflows or at feedback interfaces in the host galaxies where high-speed winds impact and shred interstellar clouds. The partial covering we measure in some of the high-speed outflow lines require small absorbing clouds with characteristic sizes $\lesssim$1 pc or $\lesssim$0.01 pc. The short survival times of these clouds require locations very close to the quasars, or cloud creation in situ at larger distances perhaps via feedback/cloud-shredding processes. The AAL complex in one quasar, J1008+3623, includes unusually narrow CIV systems at redshifted velocities $350\lesssim v\lesssim640$ km/s that are excellent candidates for gaseous infall towards the quasar, e.g., ''cold-mode" accretion or a gravitationally-bound galactic fountain.
△ Less
Submitted 29 December, 2019; v1 submitted 17 December, 2019;
originally announced December 2019.
-
Sup-norm Estimates for $\overline{\partial}$ in $\mathbb{C}^3$
Authors:
Dusty Grundmeier,
Lars Simon,
Berit Stensønes
Abstract:
We develop a method for proving sup-norm and Hölder estimates for $\overline{\partial}$ on wide class of finite type pseudoconvex domains in $\mathbb{C}^n$. A fundamental obstruction to proving sup-norm estimates is the possibility of singular complex curves with exceptionally high order of contact with the boundary. Our method handles this problem, and in $\mathbb{C}^3$, we prove sup-norm and Höl…
▽ More
We develop a method for proving sup-norm and Hölder estimates for $\overline{\partial}$ on wide class of finite type pseudoconvex domains in $\mathbb{C}^n$. A fundamental obstruction to proving sup-norm estimates is the possibility of singular complex curves with exceptionally high order of contact with the boundary. Our method handles this problem, and in $\mathbb{C}^3$, we prove sup-norm and Hölder estimates for all bounded, pseudoconvex domains with real-analytic boundary.
△ Less
Submitted 9 December, 2020; v1 submitted 9 September, 2019;
originally announced September 2019.
-
n-MeRCI: A new Metric to Evaluate the Correlation Between Predictive Uncertainty and True Error
Authors:
Michel Moukari,
Loïc Simon,
Sylvaine Picard,
Frédéric Jurie
Abstract:
As deep learning applications are becoming more and more pervasive in robotics, the question of evaluating the reliability of inferences becomes a central question in the robotics community. This domain, known as predictive uncertainty, has come under the scrutiny of research groups developing Bayesian approaches adapted to deep learning such as Monte Carlo Dropout. Unfortunately, for the time bei…
▽ More
As deep learning applications are becoming more and more pervasive in robotics, the question of evaluating the reliability of inferences becomes a central question in the robotics community. This domain, known as predictive uncertainty, has come under the scrutiny of research groups developing Bayesian approaches adapted to deep learning such as Monte Carlo Dropout. Unfortunately, for the time being, the real goal of predictive uncertainty has been swept under the rug. Indeed, these approaches are solely evaluated in terms of raw performance of the network prediction, while the quality of their estimated uncertainty is not assessed. Evaluating such uncertainty prediction quality is especially important in robotics, as actions shall depend on the confidence in perceived information. In this context, the main contribution of this article is to propose a novel metric that is adapted to the evaluation of relative uncertainty assessment and directly applicable to regression with deep neural networks. To experimentally validate this metric, we evaluate it on a toy dataset and then apply it to the task of monocular depth estimation.
△ Less
Submitted 20 August, 2019;
originally announced August 2019.
-
Revisiting Precision and Recall Definition for Generative Model Evaluation
Authors:
Loïc Simon,
Ryan Webster,
Julien Rabin
Abstract:
In this article we revisit the definition of Precision-Recall (PR) curves for generative models proposed by Sajjadi et al. (arXiv:1806.00035). Rather than providing a scalar for generative quality, PR curves distinguish mode-collapse (poor recall) and bad quality (poor precision). We first generalize their formulation to arbitrary measures, hence removing any restriction to finite support. We also…
▽ More
In this article we revisit the definition of Precision-Recall (PR) curves for generative models proposed by Sajjadi et al. (arXiv:1806.00035). Rather than providing a scalar for generative quality, PR curves distinguish mode-collapse (poor recall) and bad quality (poor precision). We first generalize their formulation to arbitrary measures, hence removing any restriction to finite support. We also expose a bridge between PR curves and type I and type II error rates of likelihood ratio classifiers on the task of discriminating between samples of the two distributions. Building upon this new perspective, we propose a novel algorithm to approximate precision-recall curves, that shares some interesting methodological properties with the hypothesis testing technique from Lopez-Paz et al (arXiv:1610.06545). We demonstrate the interest of the proposed formulation over the original approach on controlled multi-modal datasets.
△ Less
Submitted 14 May, 2019;
originally announced May 2019.
-
Hearing your touch: A new acoustic side channel on smartphones
Authors:
Ilia Shumailov,
Laurent Simon,
Jeff Yan,
Ross Anderson
Abstract:
We present the first acoustic side-channel attack that recovers what users type on the virtual keyboard of their touch-screen smartphone or tablet. When a user taps the screen with a finger, the tap generates a sound wave that propagates on the screen surface and in the air. We found the device's microphone(s) can recover this wave and "hear" the finger's touch, and the wave's distortions are char…
▽ More
We present the first acoustic side-channel attack that recovers what users type on the virtual keyboard of their touch-screen smartphone or tablet. When a user taps the screen with a finger, the tap generates a sound wave that propagates on the screen surface and in the air. We found the device's microphone(s) can recover this wave and "hear" the finger's touch, and the wave's distortions are characteristic of the tap's location on the screen. Hence, by recording audio through the built-in microphone(s), a malicious app can infer text as the user enters it on their device. We evaluate the effectiveness of the attack with 45 participants in a real-world environment on an Android tablet and an Android smartphone. For the tablet, we recover 61% of 200 4-digit PIN-codes within 20 attempts, even if the model is not trained with the victim's data. For the smartphone, we recover 9 words of size 7--13 letters with 50 attempts in a common side-channel attack benchmark. Our results suggest that it not always sufficient to rely on isolation mechanisms such as TrustZone to protect user input. We propose and discuss hardware, operating-system and application-level mechanisms to block this attack more effectively. Mobile devices may need a richer capability model, a more user-friendly notification system for sensor usage and a more thorough evaluation of the information leaked by the underlying hardware.
△ Less
Submitted 26 March, 2019;
originally announced March 2019.
-
Higgs Physics at the HL-LHC and HE-LHC
Authors:
M. Cepeda,
S. Gori,
P. Ilten,
M. Kado,
F. Riva,
R. Abdul Khalek,
A. Aboubrahim,
J. Alimena,
S. Alioli,
A. Alves,
C. Asawatangtrakuldee,
A. Azatov,
P. Azzi,
S. Bailey,
S. Banerjee,
E. L. Barberio,
D. Barducci,
G. Barone,
M. Bauer,
C. Bautista,
P. Bechtle,
K. Becker,
A. Benaglia,
M. Bengala,
N. Berger
, et al. (352 additional authors not shown)
Abstract:
The discovery of the Higgs boson in 2012, by the ATLAS and CMS experiments, was a success achieved with only a percent of the entire dataset foreseen for the LHC. It opened a landscape of possibilities in the study of Higgs boson properties, Electroweak Symmetry breaking and the Standard Model in general, as well as new avenues in probing new physics beyond the Standard Model. Six years after the…
▽ More
The discovery of the Higgs boson in 2012, by the ATLAS and CMS experiments, was a success achieved with only a percent of the entire dataset foreseen for the LHC. It opened a landscape of possibilities in the study of Higgs boson properties, Electroweak Symmetry breaking and the Standard Model in general, as well as new avenues in probing new physics beyond the Standard Model. Six years after the discovery, with a conspicuously larger dataset collected during LHC Run 2 at a 13 TeV centre-of-mass energy, the theory and experimental particle physics communities have started a meticulous exploration of the potential for precision measurements of its properties. This includes studies of Higgs boson production and decays processes, the search for rare decays and production modes, high energy observables, and searches for an extended electroweak symmetry breaking sector. This report summarises the potential reach and opportunities in Higgs physics during the High Luminosity phase of the LHC, with an expected dataset of pp collisions at 14 TeV, corresponding to an integrated luminosity of 3 ab$^{-1}$. These studies are performed in light of the most recent analyses from LHC collaborations and the latest theoretical developments. The potential of an LHC upgrade, colliding protons at a centre-of-mass energy of 27 TeV and producing a dataset corresponding to an integrated luminosity of 15 ab$^{-1}$, is also discussed.
△ Less
Submitted 19 March, 2019; v1 submitted 31 January, 2019;
originally announced February 2019.
-
Detecting Overfitting of Deep Generative Networks via Latent Recovery
Authors:
Ryan Webster,
Julien Rabin,
Loic Simon,
Frederic Jurie
Abstract:
State of the art deep generative networks are capable of producing images with such incredible realism that they can be suspected of memorizing training images. It is why it is not uncommon to include visualizations of training set nearest neighbors, to suggest generated images are not simply memorized. We demonstrate this is not sufficient and motivates the need to study memorization/overfitting…
▽ More
State of the art deep generative networks are capable of producing images with such incredible realism that they can be suspected of memorizing training images. It is why it is not uncommon to include visualizations of training set nearest neighbors, to suggest generated images are not simply memorized. We demonstrate this is not sufficient and motivates the need to study memorization/overfitting of deep generators with more scrutiny. This paper addresses this question by i) showing how simple losses are highly effective at reconstructing images for deep generators ii) analyzing the statistics of reconstruction errors when reconstructing training and validation images, which is the standard way to analyze overfitting in machine learning. Using this methodology, this paper shows that overfitting is not detectable in the pure GAN models proposed in the literature, in contrast with those using hybrid adversarial losses, which are amongst the most widely applied generative methods. The paper also shows that standard GAN evaluation metrics fail to capture memorization for some deep generators. Finally, the paper also shows how off-the-shelf GAN generators can be successfully applied to face inpainting and face super-resolution using the proposed reconstruction method, without hybrid adversarial losses.
△ Less
Submitted 9 January, 2019;
originally announced January 2019.
-
The Gaseous Environments of Quasars: Associate Absorption Lines with Density and Distance Constraints
Authors:
Chen Chen,
Fred Hamann,
Leah Simon,
Thomas Barlow
Abstract:
Associated absorption lines (AALs) in quasar spectra are valuable probes of the gas kinematics and physical conditions in quasar environments. The host galaxies are by definition in an active evolution stage that might involve large-scale blowouts and/or cold-mode accretion (infall) from the intergalactic medium (IGM). We discuss rest-frame UV spectra of four redshift 2-3 quasars selected to have…
▽ More
Associated absorption lines (AALs) in quasar spectra are valuable probes of the gas kinematics and physical conditions in quasar environments. The host galaxies are by definition in an active evolution stage that might involve large-scale blowouts and/or cold-mode accretion (infall) from the intergalactic medium (IGM). We discuss rest-frame UV spectra of four redshift 2-3 quasars selected to have low-ionisation AALs of SiII or CII that place unique density and distance constraints on the absorbers. Our analysis of the AALs yields the following results. One of the quasars, Q0119$-$046, has a rich complex of 11 AAL systems that appear to be infalling at measured speeds from $\sim$0 to $\sim$1150 km s$^{-1}$ at distance $\sim$5.7 kpc from the quasar. The range of ions detected, up to NeVIII, indicates a wide range of densities from $\sim$4 to $\sim$2500 cm$^{-3}$. Partial covering the quasar emission source requires cloud sizes $<$1 pc and possibly $<$0.01 pc. The short dissipation times of these small clouds suggests that they are created in situ at their observed location, perhaps as dense condensations in cold-mode accreting gas from IGM. The AALs in the other three quasars have outflow speeds from $\sim$1900 to $\sim$3000 km s$^{-1}$. Some of them also appear to have a range of densities based on the range of ions detected, including MgI $λ$2853 in Q0105+061. However, the absence of excited-state AALs yields only upper limits on their gas densities ($\lesssim150$ cm$^{-3}$) and large minimum distances ($\gtrsim$40 kpc) from the quasars. These AALs might represent highly extended quasar-driven outflows, although their actual physical relationships to the quasars cannot be established.
△ Less
Submitted 14 September, 2018;
originally announced September 2018.
-
Fast variables determine the epidemic threshold in the pairwise model with an improved closure
Authors:
István Z. Kiss,
Joel C. Miller,
Péter L. Simon
Abstract:
Pairwise models are used widely to model epidemic spread on networks. These include the modelling of susceptible-infected-removed (SIR) epidemics on regular networks and extensions to SIS dynamics and contact tracing on more exotic networks exhibiting degree heterogeneity, directed and/or weighted links and clustering. However, extra features of the disease dynamics or of the network lead to an in…
▽ More
Pairwise models are used widely to model epidemic spread on networks. These include the modelling of susceptible-infected-removed (SIR) epidemics on regular networks and extensions to SIS dynamics and contact tracing on more exotic networks exhibiting degree heterogeneity, directed and/or weighted links and clustering. However, extra features of the disease dynamics or of the network lead to an increase in system size and analytical tractability becomes problematic. Various `closures' can be used to keep the system tractable. Focusing on SIR epidemics on regular but clustered networks, we show that even for the most complex closure we can determine the epidemic threshold as an asymptotic expansion in terms of the clustering coefficient.We do this by exploiting the presence of a system of fast variables, specified by the correlation structure of the epidemic, whose steady state determines the epidemic threshold. While we do not find the steady state analytically, we create an elegant asymptotic expansion of it. We validate this new threshold by comparing it to the numerical solution of the full system and find excellent agreement over a wide range of values of the clustering coefficient, transmission rate and average degree of the network. The technique carries over to pairwise models with other closures [1] and we note that the epidemic threshold will be model dependent. This emphasises the importance of model choice when dealing with realistic outbreaks.
△ Less
Submitted 11 September, 2018;
originally announced September 2018.
-
An Example on $s$-H-Convexity in $\mathbb{C}^2$
Authors:
Lars Simon,
Berit Stensønes
Abstract:
We construct a bounded domain $Ω$ in $\mathbb{C}^2$ with boundary of class $\mathcal{C}^{1,1}$, such that $\overlineΩ$ has a Stein neighborhood basis, but is not $s$-H-convex for any real number $s\geq{1}$.
We construct a bounded domain $Ω$ in $\mathbb{C}^2$ with boundary of class $\mathcal{C}^{1,1}$, such that $\overlineΩ$ has a Stein neighborhood basis, but is not $s$-H-convex for any real number $s\geq{1}$.
△ Less
Submitted 26 July, 2018;
originally announced July 2018.
-
Detailed analytic study of the compact pairwise model for SIS epidemic propagation on networks
Authors:
Noémi Nagy,
Péter L. Simon
Abstract:
The global behaviour of the compact pairwise approximation of SIS epidemic propagation on networks is studied. It is shown that the system can be reduced to two equations enabling us to carry out a detailed study of the dynamic properties of the solutions. It is proved that transcritical bifurcation occurs in the system at $τ= τ_c = \frac{γn}{\langle n^{2}\rangle-n}$, where $τ$ and $γ$ are infecti…
▽ More
The global behaviour of the compact pairwise approximation of SIS epidemic propagation on networks is studied. It is shown that the system can be reduced to two equations enabling us to carry out a detailed study of the dynamic properties of the solutions. It is proved that transcritical bifurcation occurs in the system at $τ= τ_c = \frac{γn}{\langle n^{2}\rangle-n}$, where $τ$ and $γ$ are infection and recovery rates, respectively, $n$ is the average degree of the network and $\langle n^{2}\rangle$ is the second moment of the degree distribution. For subcritical values of $τ$ the disease-free steady state is stable, while for supercritical values a unique stable endemic equilibrium appears. We also prove that for subcritical values of $τ$ the disease-free steady state is globally stable under certain assumptions on the graph that cover a wide class of networks.
△ Less
Submitted 9 July, 2018;
originally announced July 2018.
-
A Homogeneous Function Constant along the Leaves of a Foliation
Authors:
Lars Simon
Abstract:
Given a smooth foliation by complex curves (locally around a point $x\in\mathbb{C}^2\setminus\{0\}$) which is "compatible" with the foliation by spheres centered at the origin, we construct a smooth real-valued function $g$ in a neighborhood of said point, which is positive, homogeneous and constant along the leaves. A corollary we obtain from this is relevant to the problem of "bumping out" certa…
▽ More
Given a smooth foliation by complex curves (locally around a point $x\in\mathbb{C}^2\setminus\{0\}$) which is "compatible" with the foliation by spheres centered at the origin, we construct a smooth real-valued function $g$ in a neighborhood of said point, which is positive, homogeneous and constant along the leaves. A corollary we obtain from this is relevant to the problem of "bumping out" certain pseudoconvex domains in $\mathbb{C}^3$.
△ Less
Submitted 3 July, 2018;
originally announced July 2018.
-
Epidemic threshold in pairwise models for clustered networks: closures and fast correlations
Authors:
Rosanna C. Barnard,
Luc Berthouze,
Péter L. Simon,
István Z. Kiss
Abstract:
The epidemic threshold is probably the most studied quantity in the modelling of epidemics on networks. For a large class of networks and dynamics the epidemic threshold is well studied and understood. However, it is less so for clustered networks where theoretical results are mostly limited to idealised networks. In this paper we focus on a class of models known as pairwise models where, to our k…
▽ More
The epidemic threshold is probably the most studied quantity in the modelling of epidemics on networks. For a large class of networks and dynamics the epidemic threshold is well studied and understood. However, it is less so for clustered networks where theoretical results are mostly limited to idealised networks. In this paper we focus on a class of models known as pairwise models where, to our knowledge, no analytical result for the epidemic threshold exists. We show that by exploiting the presence of fast variables and using some standard techniques from perturbation theory we are able to obtain the epidemic threshold analytically. We validate this new threshold by comparing it to the numerical solution of the full system. The agreement is found to be excellent over a wide range of values of the clustering coefficient, transmission rate and average degree of the network. Interestingly, we find that the analytical form of $R_0$ depends on the choice of closure, highlighting the importance of model choice when dealing with real-world epidemics. Nevertheless, we ex- pect that our method will extend to other systems in which fast variables are present.
△ Less
Submitted 15 June, 2018;
originally announced June 2018.
-
Deep multi-scale architectures for monocular depth estimation
Authors:
Michel Moukari,
Sylvaine Picard,
Loic Simon,
Frédéric Jurie
Abstract:
This paper aims at understanding the role of multi-scale information in the estimation of depth from monocular images. More precisely, the paper investigates four different deep CNN architectures, designed to explicitly make use of multi-scale features along the network, and compare them to a state-of-the-art single-scale approach. The paper also shows that involving multi-scale features in depth…
▽ More
This paper aims at understanding the role of multi-scale information in the estimation of depth from monocular images. More precisely, the paper investigates four different deep CNN architectures, designed to explicitly make use of multi-scale features along the network, and compare them to a state-of-the-art single-scale approach. The paper also shows that involving multi-scale features in depth estimation not only improves the performance in terms of accuracy, but also gives qualitatively better depth maps. Experiments are done on the widely used NYU Depth dataset, on which the proposed method achieves state-of-the-art performance.
△ Less
Submitted 8 June, 2018;
originally announced June 2018.
-
vh@nnlo-v2: New physics in Higgs Strahlung
Authors:
Robert V. Harlander,
Jonas Klappert,
Stefan Liebler,
Lukas Simon
Abstract:
Introducing version 2 of the code vh@nnlo, we study the effects of a number of new-physics scenarios on the Higgs-Strahlung process. In particular, the cross section is evaluated within a general 2HDM and the MSSM. While the Drell-Yan-like contributions are consistently taken into account by a simple rescaling of the SM result, the gluon-initiated contribution is supplemented by squark-loop mediat…
▽ More
Introducing version 2 of the code vh@nnlo, we study the effects of a number of new-physics scenarios on the Higgs-Strahlung process. In particular, the cross section is evaluated within a general 2HDM and the MSSM. While the Drell-Yan-like contributions are consistently taken into account by a simple rescaling of the SM result, the gluon-initiated contribution is supplemented by squark-loop mediated amplitudes, and by the $s$-channel exchange of additional scalars which may lead to conspicuous interference effects. The latter holds as well for bottom-quark initiated Higgs Strahlung, which is also included in the new version of vh@nnlo. Using an orthogonal rotation of the three Higgs CP eigenstates in the 2HDM and the MSSM, vh@nnlo incorporates a simple means of CP mixing in these models. Moreover, the effect of vector-like quarks in the SM on the gluon-initiated contribution can be studied. Beyond concrete models, vh@nnlo allows to include the effect of higher-dimensional operators on the production of CP-even Higgs bosons. Transverse momentum distributions of the final state Higgs boson and invariant mass distributions of the $Vφ$ final state for the gluon- and bottom-quark initiated contributions can be studied. Distributions for the Drell-Yan-like component of Higgs-Strahlung can be included through a link to MCFM. vh@nnlo can also be linked to FeynHiggs and 2HDMC for the calculation of Higgs masses and mixing angles. It can also read these parameters from an SLHA-file as produced by standard spectrum generators. Throughout the manuscript, we highlight new-physics effects in various numerical examples, both at the inclusive level and for distributions.
△ Less
Submitted 14 February, 2020; v1 submitted 13 February, 2018;
originally announced February 2018.
-
A Parameter Version of Forstnerič's Splitting Lemma
Authors:
Lars Simon
Abstract:
We construct solution operators to the $\overline{\partial}$-equation that depend continuously on the domain. This is applied to derive a parameter version of Forstnerič's splitting lemma: If both the maps and the domains they are defined on vary continuously with a parameter, then the maps obtained from Forstnerič's splitting will depend continuously on the parameter as well.
We construct solution operators to the $\overline{\partial}$-equation that depend continuously on the domain. This is applied to derive a parameter version of Forstnerič's splitting lemma: If both the maps and the domains they are defined on vary continuously with a parameter, then the maps obtained from Forstnerič's splitting will depend continuously on the parameter as well.
△ Less
Submitted 5 February, 2018;
originally announced February 2018.