-
End-to-End Learning for Task-Oriented Semantic Communications Over MIMO Channels: An Information-Theoretic Framework
Authors:
Chang Cai,
Xiaojun Yuan,
Ying-Jun Angela Zhang
Abstract:
This paper addresses the problem of end-to-end (E2E) design of learning and communication in a task-oriented semantic communication system. In particular, we consider a multi-device cooperative edge inference system over a wireless multiple-input multiple-output (MIMO) multiple access channel, where multiple devices transmit extracted features to a server to perform a classification task. We formu…
▽ More
This paper addresses the problem of end-to-end (E2E) design of learning and communication in a task-oriented semantic communication system. In particular, we consider a multi-device cooperative edge inference system over a wireless multiple-input multiple-output (MIMO) multiple access channel, where multiple devices transmit extracted features to a server to perform a classification task. We formulate the E2E design of feature encoding, MIMO precoding, and classification as a conditional mutual information maximization problem. However, it is notoriously difficult to design and train an E2E network that can be adaptive to both the task dataset and different channel realizations. Regarding network training, we propose a decoupled pretraining framework that separately trains the feature encoder and the MIMO precoder, with a maximum a posteriori (MAP) classifier employed at the server to generate the inference result. The feature encoder is pretrained exclusively using the task dataset, while the MIMO precoder is pretrained solely based on the channel and noise distributions. Nevertheless, we manage to align the pretraining objectives of each individual component with the E2E learning objective, so as to approach the performance bound of E2E learning. By leveraging the decoupled pretraining results for initialization, the E2E learning can be conducted with minimal training overhead. Regarding network architecture design, we develop two deep unfolded precoding networks that effectively incorporate the domain knowledge of the solution to the decoupled precoding problem. Simulation results on both the CIFAR-10 and ModelNet10 datasets verify that the proposed method achieves significantly higher classification accuracy compared to various baselines.
△ Less
Submitted 30 August, 2024;
originally announced August 2024.
-
Search for $h_c \to π^+π^-J/ψ$ via $ψ(3686)\to π^0h_c$
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere,
A. Brueggemann
, et al. (653 additional authors not shown)
Abstract:
Using $(2712.4 \pm 14.3) \times 10^6~ψ$(3686) events collected with the BESIII detector operating at the BEPCII collider, we search for the hadronic transition $h_c \to π^+π^-J/ψ$ via $ψ(3686)\to π^0 h_c$. No significant signal is observed. We set the most stringent upper limits to date on the branching fractions $\mathcal{B}(ψ(3686)\to π^0 h_c)\times\mathcal{B}(h_c\toπ^+π^-J/ψ)$ and…
▽ More
Using $(2712.4 \pm 14.3) \times 10^6~ψ$(3686) events collected with the BESIII detector operating at the BEPCII collider, we search for the hadronic transition $h_c \to π^+π^-J/ψ$ via $ψ(3686)\to π^0 h_c$. No significant signal is observed. We set the most stringent upper limits to date on the branching fractions $\mathcal{B}(ψ(3686)\to π^0 h_c)\times\mathcal{B}(h_c\toπ^+π^-J/ψ)$ and $\mathcal{B}(h_c \to π^+π^-J/ψ)$ at the 90$\%$ confidence level, which are determined to be $6.7\times 10^{-7}$ and $9.4 \times10^{-4}$, respectively.
△ Less
Submitted 30 August, 2024;
originally announced August 2024.
-
Measurement of the Decay $Ξ^{0}\toΛγ$ with Entangled $Ξ^{0}\barΞ^{0}$ Pairs
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (638 additional authors not shown)
Abstract:
In this Letter, a systematic study of the weak radiative hyperon decay $Ξ^{0}\toΛγ$ at an electron-positron collider using entangled $Ξ^{0}\barΞ^{0}$ pair events is presented. The absolute branching fraction for this decay has been measured for the first time, and is $\left(1.347 \pm 0.066_{\mathrm stat.}\pm0.054_{\mathrm syst.}\right)\times 10^{-3}$. The decay asymmetry parameter, which character…
▽ More
In this Letter, a systematic study of the weak radiative hyperon decay $Ξ^{0}\toΛγ$ at an electron-positron collider using entangled $Ξ^{0}\barΞ^{0}$ pair events is presented. The absolute branching fraction for this decay has been measured for the first time, and is $\left(1.347 \pm 0.066_{\mathrm stat.}\pm0.054_{\mathrm syst.}\right)\times 10^{-3}$. The decay asymmetry parameter, which characterizes the effect of parity violation in the decay, is determined to be $-0.741 \pm 0.062_{\mathrm stat.}\pm 0.019_{\mathrm syst.}$. The obtained results are consistent with the world average values within the uncertainties, offering valuable insights into the underlying mechanism governing the weak radiative hyperon decays. The charge conjugation parity ($CP$) symmetries of branching fraction and decay asymmetry parameter in the decay are also studied. No statistically significant violation of charge conjugation parity symmetry is observed.
△ Less
Submitted 29 August, 2024; v1 submitted 29 August, 2024;
originally announced August 2024.
-
Model-independent determination of the strong-phase difference between $D^0$ and $\bar{D}^0 \to π^+π^-π^+π^-$ decays
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (647 additional authors not shown)
Abstract:
Measurements of the strong-phase difference between $D^0$ and $\bar{D}^0\toπ^+π^-π^+π^-$ are performed in bins of phase space. The study exploits a sample of quantum-correlated $D\bar{D}$ mesons collected by the BESIII experiment in $e^+e^-$ collisions at a center-of-mass energy of 3.773~GeV, corresponding to an integrated luminosity of 2.93~fb$^{-1}$. Here, $D$ denotes a neutral charm meson in a…
▽ More
Measurements of the strong-phase difference between $D^0$ and $\bar{D}^0\toπ^+π^-π^+π^-$ are performed in bins of phase space. The study exploits a sample of quantum-correlated $D\bar{D}$ mesons collected by the BESIII experiment in $e^+e^-$ collisions at a center-of-mass energy of 3.773~GeV, corresponding to an integrated luminosity of 2.93~fb$^{-1}$. Here, $D$ denotes a neutral charm meson in a superposition of flavor eigenstates. The reported results are valuable for measurements of the $C\!P$-violating phase $γ$ (also denoted $φ_3$) in $B^\pm \to DK^\pm$, $D \to π^+π^-π^+π^-$ decays, and the binning schemes are designed to provide good statistical sensitivity to this parameter. The expected uncertainty on $γ$ arising from the precision of the strong-phase measurements, when applied to very large samples of $B$-meson decays, is around $1.5^\circ$ or $2^\circ$, depending on the binning scheme. The binned strong-phase parameters are combined to give a value of $F_+^{4π} = 0.746 \pm 0.010 \pm 0.004$ for the $C\!P$-even fraction of $D^0 \to π^+π^-π^+π^-$ decays, which is around 30\% more precise than the previous best measurement of this quantity.
△ Less
Submitted 29 August, 2024;
originally announced August 2024.
-
Joint Offloading and Beamforming Design in Integrating Sensing, Communication, and Computing Systems: A Distributed Approach
Authors:
Peng Liu,
Zesong Fei,
Xinyi Wang,
Jingxuan Huang,
Jie Hu,
J. Andrew Zhang
Abstract:
When applying integrated sensing and communications (ISAC) in future mobile networks, many sensing tasks have low latency requirements, preferably being implemented at terminals. However, terminals often have limited computing capabilities and energy supply. In this paper, we investigate the effectiveness of leveraging the advanced computing capabilities of mobile edge computing (MEC) servers and…
▽ More
When applying integrated sensing and communications (ISAC) in future mobile networks, many sensing tasks have low latency requirements, preferably being implemented at terminals. However, terminals often have limited computing capabilities and energy supply. In this paper, we investigate the effectiveness of leveraging the advanced computing capabilities of mobile edge computing (MEC) servers and the cloud server to address the sensing tasks of ISAC terminals. Specifically, we propose a novel three-tier integrated sensing, communication, and computing (ISCC) framework composed of one cloud server, multiple MEC servers, and multiple terminals, where the terminals can optionally offload sensing data to the MEC server or the cloud server. The offload message is sent via the ISAC waveform, whose echo is used for sensing. We jointly optimize the computation offloading and beamforming strategies to minimize the average execution latency while satisfying sensing requirements. In particular, we propose a low-complexity distributed algorithm to solve the problem. Firstly, we use the alternating direction method of multipliers (ADMM) and derive the closed-form solution for offloading decision variables. Subsequently, we convert the beamforming optimization sub-problem into a weighted minimum mean-square error (WMMSE) problem and propose a fractional programming based algorithm. Numerical results demonstrate that the proposed ISCC framework and distributed algorithm significantly reduce the execution latency and the energy consumption of sensing tasks at a lower computational complexity compared to existing schemes.
△ Less
Submitted 27 August, 2024;
originally announced August 2024.
-
Integrated Brain Connectivity Analysis with fMRI, DTI, and sMRI Powered by Interpretable Graph Neural Networks
Authors:
Gang Qu,
Ziyu Zhou,
Vince D. Calhoun,
Aiying Zhang,
Yu-Ping Wang
Abstract:
Multimodal neuroimaging modeling has becomes a widely used approach but confronts considerable challenges due to heterogeneity, which encompasses variability in data types, scales, and formats across modalities. This variability necessitates the deployment of advanced computational methods to integrate and interpret these diverse datasets within a cohesive analytical framework. In our research, we…
▽ More
Multimodal neuroimaging modeling has becomes a widely used approach but confronts considerable challenges due to heterogeneity, which encompasses variability in data types, scales, and formats across modalities. This variability necessitates the deployment of advanced computational methods to integrate and interpret these diverse datasets within a cohesive analytical framework. In our research, we amalgamate functional magnetic resonance imaging, diffusion tensor imaging, and structural MRI into a cohesive framework. This integration capitalizes on the unique strengths of each modality and their inherent interconnections, aiming for a comprehensive understanding of the brain's connectivity and anatomical characteristics. Utilizing the Glasser atlas for parcellation, we integrate imaging derived features from various modalities: functional connectivity from fMRI, structural connectivity from DTI, and anatomical features from sMRI within consistent regions. Our approach incorporates a masking strategy to differentially weight neural connections, thereby facilitating a holistic amalgamation of multimodal imaging data. This technique enhances interpretability at connectivity level, transcending traditional analyses centered on singular regional attributes. The model is applied to the Human Connectome Project's Development study to elucidate the associations between multimodal imaging and cognitive functions throughout youth. The analysis demonstrates improved predictive accuracy and uncovers crucial anatomical features and essential neural connections, deepening our understanding of brain structure and function.
△ Less
Submitted 26 August, 2024;
originally announced August 2024.
-
Visuo-Tactile Exploration of Unknown Rigid 3D Curvatures by Vision-Augmented Unified Force-Impedance Control
Authors:
Kübra Karacan,
Anran Zhang,
Hamid Sadeghian,
Fan Wu,
Sami Haddadin
Abstract:
Despite recent advancements in torque-controlled tactile robots, integrating them into manufacturing settings remains challenging, particularly in complex environments. Simplifying robotic skill programming for non-experts is crucial for increasing robot deployment in manufacturing. This work proposes an innovative approach, Vision-Augmented Unified Force-Impedance Control (VA-UFIC), aimed at intu…
▽ More
Despite recent advancements in torque-controlled tactile robots, integrating them into manufacturing settings remains challenging, particularly in complex environments. Simplifying robotic skill programming for non-experts is crucial for increasing robot deployment in manufacturing. This work proposes an innovative approach, Vision-Augmented Unified Force-Impedance Control (VA-UFIC), aimed at intuitive visuo-tactile exploration of unknown 3D curvatures. VA-UFIC stands out by seamlessly integrating vision and tactile data, enabling the exploration of diverse contact shapes in three dimensions, including point contacts, flat contacts with concave and convex curvatures, and scenarios involving contact loss. A pivotal component of our method is a robust online contact alignment monitoring system that considers tactile error, local surface curvature, and orientation, facilitating adaptive adjustments of robot stiffness and force regulation during exploration. We introduce virtual energy tanks within the control framework to ensure safety and stability, effectively addressing inherent safety concerns in visuo-tactile exploration. Evaluation using a Franka Emika research robot demonstrates the efficacy of VA-UFIC in exploring unknown 3D curvatures while adhering to arbitrarily defined force-motion policies. By seamlessly integrating vision and tactile sensing, VA-UFIC offers a promising avenue for intuitive exploration of complex environments, with potential applications spanning manufacturing, inspection, and beyond.
△ Less
Submitted 26 August, 2024;
originally announced August 2024.
-
Learning Multi-Rate Task-Oriented Communications Over Symmetric Discrete Memoryless Channels
Authors:
Anbang Zhang,
Shuaishuai Guo
Abstract:
This letter introduces a multi-rate task-oriented communication (MR-ToC) framework. This framework dynamically adapts to variations in affordable data rate within the communication pipeline. It conceptualizes communication pipelines as symmetric, discrete, memoryless channels. We employ a progressive learning strategy to train the system, comprising a nested codebook for encoding and task inferenc…
▽ More
This letter introduces a multi-rate task-oriented communication (MR-ToC) framework. This framework dynamically adapts to variations in affordable data rate within the communication pipeline. It conceptualizes communication pipelines as symmetric, discrete, memoryless channels. We employ a progressive learning strategy to train the system, comprising a nested codebook for encoding and task inference. This configuration allows for the adjustment of multiple rate levels in response to evolving channel conditions. The results from our experiments show that this system not only supports edge inference across various coding levels but also excels in adapting to variable communication environments.
△ Less
Submitted 24 August, 2024;
originally announced August 2024.
-
Tactile-Morph Skills: Energy-Based Control Meets Data-Driven Learning
Authors:
Anran Zhang,
Kübra Karacan,
Hamid Sadeghian,
Yansong Wu,
Fan Wu,
Sami Haddadin
Abstract:
Robotic manipulation is essential for modernizing factories and automating industrial tasks like polishing, which require advanced tactile abilities. These robots must be easily set up, safely work with humans, learn tasks autonomously, and transfer skills to similar tasks. Addressing these needs, we introduce the tactile-morph skill framework, which integrates unified force-impedance control with…
▽ More
Robotic manipulation is essential for modernizing factories and automating industrial tasks like polishing, which require advanced tactile abilities. These robots must be easily set up, safely work with humans, learn tasks autonomously, and transfer skills to similar tasks. Addressing these needs, we introduce the tactile-morph skill framework, which integrates unified force-impedance control with data-driven learning. Our system adjusts robot movements and force application based on estimated energy levels for the desired trajectory and force profile, ensuring safety by stopping if energy allocated for the control runs out. Using a Temporal Convolutional Network, we estimate the energy distribution for a given motion and force profile, enabling skill transfer across different tasks and surfaces. Our approach maintains stability and performance even on unfamiliar geometries with similar friction characteristics, demonstrating improved accuracy, zero-shot transferable performance, and enhanced safety in real-world scenarios. This framework promises to enhance robotic capabilities in industrial settings, making intelligent robots more accessible and valuable.
△ Less
Submitted 23 August, 2024; v1 submitted 22 August, 2024;
originally announced August 2024.
-
Synthesis of Group-IV ternary and binary semiconductors using epitaxy of $\rm GeH_3Cl$ and $\rm SnH_4$
Authors:
Aixin Zhang,
Dhruve A. Ringuala,
Matthew A. Mircovich,
Manuel A. Roldan,
John Kouvetakis,
José Menéndez
Abstract:
$\rm{Ge}_{1-x-y}Si_{x}Sn_{y}$ alloys were grown on Ge buffer layers at ultra-low temperature using reactions of $\rm SnH_{4}$ and $\rm GeH_{3}Cl$ for the first time. The latter is a newly introduced CVD source designed for epitaxial development of group IV semiconductors under low thermal budgets and CMOS compatible conditions. The $\rm{Ge}_{1-x-y}Si_{x}Sn_{y}…
▽ More
$\rm{Ge}_{1-x-y}Si_{x}Sn_{y}$ alloys were grown on Ge buffer layers at ultra-low temperature using reactions of $\rm SnH_{4}$ and $\rm GeH_{3}Cl$ for the first time. The latter is a newly introduced CVD source designed for epitaxial development of group IV semiconductors under low thermal budgets and CMOS compatible conditions. The $\rm{Ge}_{1-x-y}Si_{x}Sn_{y}$ films were produced between 160-200oC with 3-5% Si and ~ 5-11 % Sn, which traverses the indirect to direct gap transition in Ge-Sn materials. The films were fully strained to Ge and exhibited defect-free microstructures, flat surfaces, homogeneous compositions, uniform thicknesses and sharp interfaces as required for device manufacturing. A comparative study was then conducted to investigate the applicability of $\rm GeH_{3}Cl$ for the synthesis of $\rm Ge_{1-y}Sn_{y}$ binaries under similar experimental conditions. The$\rm Ge_{1-y}Sn_{y}$ films were grown fully strained to Ge, but with reduced Sn compositions ranging from ~ 2 - 7 % and lower thicknesses relative to $\rm{Ge}_{1-x-y}Si_{x}Sn_{y}$. This prompted efforts to further investigate the growth behavior of $\rm Ge_{1-y}Sn_{y}$ using the $\rm GeH_{3}Cl$ method, bypassing the Ge buffer to produce samples directly on Si, with the aim of exploring how to manage interface strain. In this case the $\rm Ge_{1-y}Sn_{y}$ on Si films exhibited compositions and thicknesses comparable to $\rm Ge_{1-y}Sn_{y}$-on-Ge films; however, their strain states were mostly relaxed, presumably due to the large misfit between $\rm Ge_{1-y}Sn_{y}$ and Si. Efforts to increase the concentration and thickness of these samples resulted in non-homogeneous multi-phase materials containing large amounts of interstitial Sn impurities.
△ Less
Submitted 28 August, 2024; v1 submitted 21 August, 2024;
originally announced August 2024.
-
AIM 2024 Challenge on Compressed Video Quality Assessment: Methods and Results
Authors:
Maksim Smirnov,
Aleksandr Gushchin,
Anastasia Antsiferova,
Dmitry Vatolin,
Radu Timofte,
Ziheng Jia,
Zicheng Zhang,
Wei Sun,
Jiaying Qian,
Yuqin Cao,
Yinan Sun,
Yuxin Zhu,
Xiongkuo Min,
Guangtao Zhai,
Kanjar De,
Qing Luo,
Ao-Xiang Zhang,
Peng Zhang,
Haibo Lei,
Linyan Jiang,
Yaqing Li,
Wenhui Meng,
Xiaoheng Tan,
Haiqiang Wang,
Xiaozhong Xu
, et al. (11 additional authors not shown)
Abstract:
Video quality assessment (VQA) is a crucial task in the development of video compression standards, as it directly impacts the viewer experience. This paper presents the results of the Compressed Video Quality Assessment challenge, held in conjunction with the Advances in Image Manipulation (AIM) workshop at ECCV 2024. The challenge aimed to evaluate the performance of VQA methods on a diverse dat…
▽ More
Video quality assessment (VQA) is a crucial task in the development of video compression standards, as it directly impacts the viewer experience. This paper presents the results of the Compressed Video Quality Assessment challenge, held in conjunction with the Advances in Image Manipulation (AIM) workshop at ECCV 2024. The challenge aimed to evaluate the performance of VQA methods on a diverse dataset of 459 videos, encoded with 14 codecs of various compression standards (AVC/H.264, HEVC/H.265, AV1, and VVC/H.266) and containing a comprehensive collection of compression artifacts. To measure the methods performance, we employed traditional correlation coefficients between their predictions and subjective scores, which were collected via large-scale crowdsourced pairwise human comparisons. For training purposes, participants were provided with the Compressed Video Quality Assessment Dataset (CVQAD), a previously developed dataset of 1022 videos. Up to 30 participating teams registered for the challenge, while we report the results of 6 teams, which submitted valid final solutions and code for reproducing the results. Moreover, we calculated and present the performance of state-of-the-art VQA methods on the developed dataset, providing a comprehensive benchmark for future research. The dataset, results, and online leaderboard are publicly available at https://challenges.videoprocessing.ai/challenges/compressedvideo-quality-assessment.html.
△ Less
Submitted 28 August, 2024; v1 submitted 21 August, 2024;
originally announced August 2024.
-
Quantum highway: Observation of minimal and maximal speed limits for few and many-body states
Authors:
Zitian Zhu,
Lei Gao,
Zehang Bao,
Liang Xiang,
Zixuan Song,
Shibo Xu,
Ke Wang,
Jiachen Chen,
Feitong Jin,
Xuhao Zhu,
Yu Gao,
Yaozu Wu,
Chuanyu Zhang,
Ning Wang,
Yiren Zou,
Ziqi Tan,
Aosai Zhang,
Zhengyi Cui,
Fanhao Shen,
Jiarun Zhong,
Tingting Li,
Jinfeng Deng,
Xu Zhang,
Hang Dong,
Pengfei Zhang
, et al. (8 additional authors not shown)
Abstract:
Tracking the time evolution of a quantum state allows one to verify the thermalization rate or the propagation speed of correlations in generic quantum systems. Inspired by the energy-time uncertainty principle, bounds have been demonstrated on the maximal speed at which a quantum state can change, resulting in immediate and practical tasks. Based on a programmable superconducting quantum processo…
▽ More
Tracking the time evolution of a quantum state allows one to verify the thermalization rate or the propagation speed of correlations in generic quantum systems. Inspired by the energy-time uncertainty principle, bounds have been demonstrated on the maximal speed at which a quantum state can change, resulting in immediate and practical tasks. Based on a programmable superconducting quantum processor, we test the dynamics of various emulated quantum mechanical systems encompassing single- and many-body states. We show that one can test the known quantum speed limits and that modifying a single Hamiltonian parameter allows the observation of the crossover of the different bounds on the dynamics. We also unveil the observation of minimal quantum speed limits in addition to more common maximal ones, i.e., the lowest rate of change of a unitarily evolved quantum state. Our results establish a comprehensive experimental characterization of quantum speed limits and pave the way for their subsequent study in engineered non-unitary conditions.
△ Less
Submitted 21 August, 2024;
originally announced August 2024.
-
Ground State Magnetic Structure and Magnetic Field Effects in the Layered Honeycomb Antiferromagnet YbOCl
Authors:
Zheng Zhang,
Yanzhen Cai,
Jinlong Jiao,
Jing Kang,
Dehong Yu,
Bertrand Roessli,
Anmin Zhang,
Jianting Ji,
Feng Jin,
Jie Ma,
Qingming Zhang
Abstract:
YbOCl is a representative member of the van der Waals layered honeycomb rare-earth chalcohalide REChX (RE = rare earth, Ch = O, S, Se, and Te, and X = F, Cl, Br, and I) family reported recently. Its spin ground state remains to be explored experimentally. In this paper, we have grown high-quality single crystals of YbOCl and conducted comprehensive thermodynamic, elastic, and inelastic neutron sca…
▽ More
YbOCl is a representative member of the van der Waals layered honeycomb rare-earth chalcohalide REChX (RE = rare earth, Ch = O, S, Se, and Te, and X = F, Cl, Br, and I) family reported recently. Its spin ground state remains to be explored experimentally. In this paper, we have grown high-quality single crystals of YbOCl and conducted comprehensive thermodynamic, elastic, and inelastic neutron scattering experiments down to 50 mK. The experiments reveal an antiferromagnetic phase below 1.3 K, which is identified as a spin ground state with an intralayer ferromagnetic and interlayer antiferromagnetic ordering. By applying sophisticated numerical techniques to a honeycomb (nearest-neighbor)-triangle (next-nearest-neighbor) model Hamiltonian which accurately describes the highly anisotropic spin system, we are able to well simulate the experiments and determine the diagonal and off-diagonal spin-exchange interactions. The simulations give an antiferromagnetic Kitaev term comparable to the Heisenberg one. The experiments under magnetic fields allow us to establish a magnetic field-temperature phase diagram around the spin ground state. Most interestingly, a relatively small magnetic field (~ 0.3 to 3 T) can significantly suppress the antiferromagnetic order, suggesting an intriguing interplay of the Kitaev interaction and magnetic fields in the spin system. The present study provides fundamental insights into the highly anisotropic spin systems and opens a new window to look into Kitaev spin physics in a rare-earth-based system.
△ Less
Submitted 19 August, 2024;
originally announced August 2024.
-
Customizing Language Models with Instance-wise LoRA for Sequential Recommendation
Authors:
Xiaoyu Kong,
Jiancan Wu,
An Zhang,
Leheng Sheng,
Hui Lin,
Xiang Wang,
Xiangnan He
Abstract:
Sequential recommendation systems predict a user's next item of interest by analyzing past interactions, aligning recommendations with individual preferences. Leveraging the strengths of Large Language Models (LLMs) in knowledge comprehension and reasoning, recent approaches have applied LLMs to sequential recommendation through language generation paradigms. These methods convert user behavior se…
▽ More
Sequential recommendation systems predict a user's next item of interest by analyzing past interactions, aligning recommendations with individual preferences. Leveraging the strengths of Large Language Models (LLMs) in knowledge comprehension and reasoning, recent approaches have applied LLMs to sequential recommendation through language generation paradigms. These methods convert user behavior sequences into prompts for LLM fine-tuning, utilizing Low-Rank Adaptation (LoRA) modules to refine recommendations. However, the uniform application of LoRA across diverse user behaviors sometimes fails to capture individual variability, leading to suboptimal performance and negative transfer between disparate sequences. To address these challenges, we propose Instance-wise LoRA (iLoRA), integrating LoRA with the Mixture of Experts (MoE) framework. iLoRA creates a diverse array of experts, each capturing specific aspects of user preferences, and introduces a sequence representation guided gate function. This gate function processes historical interaction sequences to generate enriched representations, guiding the gating network to output customized expert participation weights. This tailored approach mitigates negative transfer and dynamically adjusts to diverse behavior patterns. Extensive experiments on three benchmark datasets demonstrate the effectiveness of iLoRA, highlighting its superior performance compared to existing methods in capturing user-specific preferences and improving recommendation accuracy.
△ Less
Submitted 19 August, 2024;
originally announced August 2024.
-
Structure-enhanced Contrastive Learning for Graph Clustering
Authors:
Xunlian Wu,
Jingqi Hu,
Anqi Zhang,
Yining Quan,
Qiguang Miao,
Peng Gang Sun
Abstract:
Graph clustering is a crucial task in network analysis with widespread applications, focusing on partitioning nodes into distinct groups with stronger intra-group connections than inter-group ones. Recently, contrastive learning has achieved significant progress in graph clustering. However, most methods suffer from the following issues: 1) an over-reliance on meticulously designed data augmentati…
▽ More
Graph clustering is a crucial task in network analysis with widespread applications, focusing on partitioning nodes into distinct groups with stronger intra-group connections than inter-group ones. Recently, contrastive learning has achieved significant progress in graph clustering. However, most methods suffer from the following issues: 1) an over-reliance on meticulously designed data augmentation strategies, which can undermine the potential of contrastive learning. 2) overlooking cluster-oriented structural information, particularly the higher-order cluster(community) structure information, which could unveil the mesoscopic cluster structure information of the network. In this study, Structure-enhanced Contrastive Learning (SECL) is introduced to addresses these issues by leveraging inherent network structures. SECL utilizes a cross-view contrastive learning mechanism to enhance node embeddings without elaborate data augmentations, a structural contrastive learning module for ensuring structural consistency, and a modularity maximization strategy for harnessing clustering-oriented information. This comprehensive approach results in robust node representations that greatly enhance clustering performance. Extensive experiments on six datasets confirm SECL's superiority over current state-of-the-art methods, indicating a substantial improvement in the domain of graph clustering.
△ Less
Submitted 19 August, 2024;
originally announced August 2024.
-
Cybench: A Framework for Evaluating Cybersecurity Capabilities and Risk of Language Models
Authors:
Andy K. Zhang,
Neil Perry,
Riya Dulepet,
Eliot Jones,
Justin W. Lin,
Joey Ji,
Celeste Menders,
Gashon Hussein,
Samantha Liu,
Donovan Jasper,
Pura Peetathawatchai,
Ari Glenn,
Vikram Sivashankar,
Daniel Zamoshchin,
Leo Glikbarg,
Derek Askaryar,
Mike Yang,
Teddy Zhang,
Rishi Alluri,
Nathan Tran,
Rinnara Sangpisit,
Polycarpos Yiorkadjis,
Kenny Osele,
Gautham Raghupathi,
Dan Boneh
, et al. (2 additional authors not shown)
Abstract:
Language Model (LM) agents for cybersecurity that are capable of autonomously identifying vulnerabilities and executing exploits have the potential to cause real-world impact. Policymakers, model providers, and other researchers in the AI and cybersecurity communities are interested in quantifying the capabilities of such agents to help mitigate cyberrisk and investigate opportunities for penetrat…
▽ More
Language Model (LM) agents for cybersecurity that are capable of autonomously identifying vulnerabilities and executing exploits have the potential to cause real-world impact. Policymakers, model providers, and other researchers in the AI and cybersecurity communities are interested in quantifying the capabilities of such agents to help mitigate cyberrisk and investigate opportunities for penetration testing. Toward that end, we introduce Cybench, a framework for specifying cybersecurity tasks and evaluating agents on those tasks. We include 40 professional-level Capture the Flag (CTF) tasks from 4 distinct CTF competitions, chosen to be recent, meaningful, and spanning a wide range of difficulties. Each task includes its own description, starter files, and is initialized in an environment where an agent can execute bash commands and observe outputs. Since many tasks are beyond the capabilities of existing LM agents, we introduce subtasks, which break down a task into intermediary steps for more gradated evaluation; we add subtasks for 17 of the 40 tasks. To evaluate agent capabilities, we construct a cybersecurity agent and evaluate 7 models: GPT-4o, Claude 3 Opus, Claude 3.5 Sonnet, Mixtral 8x22b Instruct, Gemini 1.5 Pro, Llama 3 70B Chat, and Llama 3.1 405B Instruct. Without guidance, we find that agents are able to solve only the easiest complete tasks that took human teams up to 11 minutes to solve, with Claude 3.5 Sonnet and GPT-4o having the highest success rates. Finally, subtasks provide more signal for measuring performance compared to unguided runs, with models achieving a 3.2\% higher success rate on complete tasks with subtask-guidance than without subtask-guidance. All code and data are publicly available at https://cybench.github.io
△ Less
Submitted 15 August, 2024;
originally announced August 2024.
-
Search for the rare decay $J/ψ\to γD^0+c.c.$ at BESIII
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (642 additional authors not shown)
Abstract:
Using $(10087\pm44)\times10^6J/ψ$ events collected with the BESIII detector, we search for the rare decay $J/ψ\to γD^0+c.c.$ for the first time. No obvious signal is observed and the upper limit on the branching fraction is determined to be ${\cal B}(J/ψ\to γD^{0}+c.c.)< 9.1 \times 10^{-8}$ at 90\% confidence level.
Using $(10087\pm44)\times10^6J/ψ$ events collected with the BESIII detector, we search for the rare decay $J/ψ\to γD^0+c.c.$ for the first time. No obvious signal is observed and the upper limit on the branching fraction is determined to be ${\cal B}(J/ψ\to γD^{0}+c.c.)< 9.1 \times 10^{-8}$ at 90\% confidence level.
△ Less
Submitted 16 August, 2024;
originally announced August 2024.
-
CAT: Caution Aware Transfer in Reinforcement Learning via Distributional Risk
Authors:
Mohamad Fares El Hajj Chehade,
Amrit Singh Bedi,
Amy Zhang,
Hao Zhu
Abstract:
Transfer learning in reinforcement learning (RL) has become a pivotal strategy for improving data efficiency in new, unseen tasks by utilizing knowledge from previously learned tasks. This approach is especially beneficial in real-world deployment scenarios where computational resources are constrained and agents must adapt rapidly to novel environments. However, current state-of-the-art methods o…
▽ More
Transfer learning in reinforcement learning (RL) has become a pivotal strategy for improving data efficiency in new, unseen tasks by utilizing knowledge from previously learned tasks. This approach is especially beneficial in real-world deployment scenarios where computational resources are constrained and agents must adapt rapidly to novel environments. However, current state-of-the-art methods often fall short in ensuring safety during the transfer process, particularly when unforeseen risks emerge in the deployment phase. In this work, we address these limitations by introducing a novel Caution-Aware Transfer Learning (CAT) framework. Unlike traditional approaches that limit risk considerations to mean-variance, we define "caution" as a more generalized and comprehensive notion of risk. Our core innovation lies in optimizing a weighted sum of reward return and caution-based on state-action occupancy measures-during the transfer process, allowing for a rich representation of diverse risk factors. To the best of our knowledge, this is the first work to explore the optimization of such a generalized risk notion within the context of transfer RL. Our contributions are threefold: (1) We propose a Caution-Aware Transfer (CAT) framework that evaluates source policies within the test environment and constructs a new policy that balances reward maximization and caution. (2) We derive theoretical sub-optimality bounds for our method, providing rigorous guarantees of its efficacy. (3) We empirically validate CAT, demonstrating that it consistently outperforms existing methods by delivering safer policies under varying risk conditions in the test tasks.
△ Less
Submitted 16 August, 2024;
originally announced August 2024.
-
Representation Learning of Geometric Trees
Authors:
Zheng Zhang,
Allen Zhang,
Ruth Nelson,
Giorgio Ascoli,
Liang Zhao
Abstract:
Geometric trees are characterized by their tree-structured layout and spatially constrained nodes and edges, which significantly impacts their topological attributes. This inherent hierarchical structure plays a crucial role in domains such as neuron morphology and river geomorphology, but traditional graph representation methods often overlook these specific characteristics of tree structures. To…
▽ More
Geometric trees are characterized by their tree-structured layout and spatially constrained nodes and edges, which significantly impacts their topological attributes. This inherent hierarchical structure plays a crucial role in domains such as neuron morphology and river geomorphology, but traditional graph representation methods often overlook these specific characteristics of tree structures. To address this, we introduce a new representation learning framework tailored for geometric trees. It first features a unique message passing neural network, which is both provably geometrical structure-recoverable and rotation-translation invariant. To address the data label scarcity issue, our approach also includes two innovative training targets that reflect the hierarchical ordering and geometric structure of these geometric trees. This enables fully self-supervised learning without explicit labels. We validate our method's effectiveness on eight real-world datasets, demonstrating its capability to represent geometric trees.
△ Less
Submitted 16 August, 2024;
originally announced August 2024.
-
Task-Aware Dynamic Transformer for Efficient Arbitrary-Scale Image Super-Resolution
Authors:
Tianyi Xu,
Yiji Zhou,
Xiaotao Hu,
Kai Zhang,
Anran Zhang,
Xingye Qiu,
Jun Xu
Abstract:
Arbitrary-scale super-resolution (ASSR) aims to learn a single model for image super-resolution at arbitrary magnifying scales. Existing ASSR networks typically comprise an off-the-shelf scale-agnostic feature extractor and an arbitrary scale upsampler. These feature extractors often use fixed network architectures to address different ASSR inference tasks, each of which is characterized by an inp…
▽ More
Arbitrary-scale super-resolution (ASSR) aims to learn a single model for image super-resolution at arbitrary magnifying scales. Existing ASSR networks typically comprise an off-the-shelf scale-agnostic feature extractor and an arbitrary scale upsampler. These feature extractors often use fixed network architectures to address different ASSR inference tasks, each of which is characterized by an input image and an upsampling scale. However, this overlooks the difficulty variance of super-resolution on different inference scenarios, where simple images or small SR scales could be resolved with less computational effort than difficult images or large SR scales. To tackle this difficulty variability, in this paper, we propose a Task-Aware Dynamic Transformer (TADT) as an input-adaptive feature extractor for efficient image ASSR. Our TADT consists of a multi-scale feature extraction backbone built upon groups of Multi-Scale Transformer Blocks (MSTBs) and a Task-Aware Routing Controller (TARC). The TARC predicts the inference paths within feature extraction backbone, specifically selecting MSTBs based on the input images and SR scales. The prediction of inference path is guided by a new loss function to trade-off the SR accuracy and efficiency. Experiments demonstrate that, when working with three popular arbitrary-scale upsamplers, our TADT achieves state-of-the-art ASSR performance when compared with mainstream feature extractors, but with relatively fewer computational costs. The code will be publicly released.
△ Less
Submitted 25 August, 2024; v1 submitted 16 August, 2024;
originally announced August 2024.
-
Topological Charge Quadrupole Protected by Spin-Orbit U(1) Quasi-Symmetry in Antiferromagnet NdBiPt
Authors:
Ao Zhang,
Xiaobing Chen,
Jiayu Li,
Pengfei Liu,
Yuntian Liu,
Qihang Liu
Abstract:
The interplay of symmetry and topology in crystal solids has given rise to various elementary excitations as quasiparticles. Among these, those with significant Berry-phase-related transport responses are of particular interest. Here, we predict a new type of quasiparticle called topological charge quadruple (TCQ), which is analogous to a charge quadrupole but consists of two closely-packed pairs…
▽ More
The interplay of symmetry and topology in crystal solids has given rise to various elementary excitations as quasiparticles. Among these, those with significant Berry-phase-related transport responses are of particular interest. Here, we predict a new type of quasiparticle called topological charge quadruple (TCQ), which is analogous to a charge quadrupole but consists of two closely-packed pairs of Weyl points in momentum space, specifically in a half-Heusler antiferromagnet NdBiPt. Interestingly, the TCQ is protected by the spin-orbit $U(1)$ quasi-symmetry, rather than any exact crystallographic symmetries. This quasi-symmetry restricts the energy splitting induced by symmetry-lowering perturbations to a second-order effect. Furthermore, the closely located Berry curvature sources and sinks in the TCQ lead to a large Berry curvature dipole, resulting in a significant nonlinear Hall effect. Our work opens an avenue for designing novel quasiparticles using quasi-symmetries and developing materials with enhanced nonlinear responses.
△ Less
Submitted 14 August, 2024;
originally announced August 2024.
-
Search for $η_c(2S)\toωω$ and $ωφ$ decays and measurements of $χ_{cJ}\toωω$ and $ωφ$ in $ψ(2S)$ radiative processes
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (643 additional authors not shown)
Abstract:
Using $(2712\pm 14)$ $\times$ 10$^{6}$ $ψ(2S)$ events collected with the BESIII detector at the BEPCII collider, we search for the decays $η_{c}(2S)\toωω$ and $η_{c}(2S)\toωφ$ via the process $ψ(2S)\toγη_{c}(2S)$. Evidence of $η_{c}(2S)\toωω$ is found with a statistical significance of $3.2σ$. The branching fraction is measured to be…
▽ More
Using $(2712\pm 14)$ $\times$ 10$^{6}$ $ψ(2S)$ events collected with the BESIII detector at the BEPCII collider, we search for the decays $η_{c}(2S)\toωω$ and $η_{c}(2S)\toωφ$ via the process $ψ(2S)\toγη_{c}(2S)$. Evidence of $η_{c}(2S)\toωω$ is found with a statistical significance of $3.2σ$. The branching fraction is measured to be $\mathcal{B}(η_{c}(2S)\toωω)=(5.65\pm3.77(\rm stat.)\pm5.32(\rm syst.))\times10^{-4}$. No statistically significant signal is observed for the decay $η_{c}(2S)\toωφ$. The upper limit of the branching fraction at the 90\% confidence level is determined to be $\mathcal{B}(ψ(2S)\toγη_{c}(2S),η_{c}(2S)\toωφ)<2.24\times 10^{-7}$. We also update the branching fractions of $χ_{cJ}\to ωω$ and $χ_{cJ}\toωφ$ decays via the $ψ(2S)\toγχ_{cJ}$ transition. The branching fractions are determined to be $\mathcal{B}(χ_{c0}\toωω)=(10.63\pm0.11\pm0.46)\times 10^{-4}$, $\mathcal{B}(χ_{c1}\toωω)=(6.39\pm0.07\pm0.29)\times 10^{-4}$, $\mathcal{B}(χ_{c2}\toωω)=(8.50\pm0.08\pm0.38)\times 10^{-4}$, $\mathcal{B}(χ_{c0}\toωφ)=(1.18\pm0.03\pm0.05)\times 10^{-4}$, $\mathcal{B}(χ_{c1}\toωφ)=(2.03\pm0.15\pm0.12)\times 10^{-5}$, and $\mathcal{B}(χ_{c2}\toωφ)=(9.37\pm1.07\pm0.59)\times 10^{-6}$, where the first uncertainties are statistical and the second are systematic.
△ Less
Submitted 13 August, 2024;
originally announced August 2024.
-
Tensor Decomposition Meets RKHS: Efficient Algorithms for Smooth and Misaligned Data
Authors:
Brett W. Larsen,
Tamara G. Kolda,
Anru R. Zhang,
Alex H. Williams
Abstract:
The canonical polyadic (CP) tensor decomposition decomposes a multidimensional data array into a sum of outer products of finite-dimensional vectors. Instead, we can replace some or all of the vectors with continuous functions (infinite-dimensional vectors) from a reproducing kernel Hilbert space (RKHS). We refer to tensors with some infinite-dimensional modes as quasitensors, and the approach of…
▽ More
The canonical polyadic (CP) tensor decomposition decomposes a multidimensional data array into a sum of outer products of finite-dimensional vectors. Instead, we can replace some or all of the vectors with continuous functions (infinite-dimensional vectors) from a reproducing kernel Hilbert space (RKHS). We refer to tensors with some infinite-dimensional modes as quasitensors, and the approach of decomposing a tensor with some continuous RKHS modes is referred to as CP-HiFi (hybrid infinite and finite dimensional) tensor decomposition. An advantage of CP-HiFi is that it can enforce smoothness in the infinite dimensional modes. Further, CP-HiFi does not require the observed data to lie on a regular and finite rectangular grid and naturally incorporates misaligned data. We detail the methodology and illustrate it on a synthetic example.
△ Less
Submitted 10 August, 2024;
originally announced August 2024.
-
Analysis of the dynamics of the decay $D^{+}\to K_{S}^{0} π^{0} e^{+}ν_{e}$
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (644 additional authors not shown)
Abstract:
The branching fraction of $D^+\to K_{S}^{0} π^{0}e^+ν_e$ is measured for the first time using $7.93~\mathrm{fb}^{-1}$ of $e^+e^-$ annihilation data collected at the center-of-mass energy $\sqrt{s}=3.773$~GeV with the BESIII detector operating at the BEPCII collider, and is determined to be ${\mathcal B}$($D^+\to K_S^0π^0e^+ν_e$) = $(0.881~\pm~0.017_{\rm stat.}~\pm~0.016_{\rm syst.})$\%. Based on a…
▽ More
The branching fraction of $D^+\to K_{S}^{0} π^{0}e^+ν_e$ is measured for the first time using $7.93~\mathrm{fb}^{-1}$ of $e^+e^-$ annihilation data collected at the center-of-mass energy $\sqrt{s}=3.773$~GeV with the BESIII detector operating at the BEPCII collider, and is determined to be ${\mathcal B}$($D^+\to K_S^0π^0e^+ν_e$) = $(0.881~\pm~0.017_{\rm stat.}~\pm~0.016_{\rm syst.})$\%. Based on an analysis of the $D^+\to K_S^0π^0e^+ν_e$ decay dynamics, we observe the $S\text{-}{\rm wave}$ and $P$-wave components with fractions of $f_{S\text{-}{\rm wave}}$ = $(6.13~\pm~0.27_{\rm stat.}~\pm ~0.30_{\rm syst.})\%$ and $f_{\bar K^{*}(892)^0}$ = $(93.88~\pm~0.27_{\rm stat.}~\pm~0.29_{\rm syst.})$\%, respectively. From these results, we obtain the branching fractions ${\mathcal B}$($D^+\to (K_S^0π^0)_{S\text{-}{\rm wave}}~e^+ν_e$) = $(5.41~\pm~0.35_{\rm stat.}~\pm~0.37_{\rm syst.})\times10^{-4}$ and ${\mathcal B}$($D^+\to \bar K^{*}(892)^0e^+ν_e$) = $(4.97~\pm~0.11_{\rm stat.}~\pm~0.12_{\rm syst.})$\%. In addition, the hadronic form-factor ratios of $D^{+} \to \bar {K}^{*}(892)^0e^+ν_e$ at $q^2=0$, assuming a single-pole dominance parameterization, are determined to be $r_V=\frac{V(0)}{A_1(0)}= 1.43~\pm~0.07_{\rm stat.}~\pm~0.03_{\rm syst.}$ and $r_2=\frac{A_2(0)}{A_1(0)}=0.72~\pm~0.06_{\rm stat.}~\pm~0.02_{\rm syst.}$.
△ Less
Submitted 8 August, 2024;
originally announced August 2024.
-
Trustworthy Semantic-Enabled 6G Communication: A Task-oriented and Privacy-preserving Perspective
Authors:
Shuaishuai Guo,
Anbang Zhang,
Yanhu Wang,
Chenyuan Feng,
Tony Q. S. Quek
Abstract:
Trustworthy task-oriented semantic communication (ToSC) emerges as an innovative approach in the 6G landscape, characterized by the transmission of only vital information that is directly pertinent to a specific task. While ToSC offers an efficient mode of communication, it concurrently raises concerns regarding privacy, as sophisticated adversaries might possess the capability to reconstruct the…
▽ More
Trustworthy task-oriented semantic communication (ToSC) emerges as an innovative approach in the 6G landscape, characterized by the transmission of only vital information that is directly pertinent to a specific task. While ToSC offers an efficient mode of communication, it concurrently raises concerns regarding privacy, as sophisticated adversaries might possess the capability to reconstruct the original data from the transmitted features. This article provides an in-depth analysis of privacy-preserving strategies specifically designed for ToSC relying on deep neural network-based joint source and channel coding (DeepJSCC). The study encompasses a detailed comparative assessment of trustworthy feature perturbation methods such as differential privacy and encryption, alongside intrinsic security incorporation approaches like adversarial learning to train the JSCC and learning-based vector quantization (LBVQ). This comparative analysis underscores the integration of advanced explainable learning algorithms into communication systems, positing a new benchmark for privacy standards in the forthcoming 6G era.
△ Less
Submitted 7 August, 2024;
originally announced August 2024.
-
Measurement of the Branching Fraction of \boldmath{$ψ(2S) \to γπ^0$}
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (644 additional authors not shown)
Abstract:
Based on $(2712.4\pm14.1)\times10^{6}~ψ(2S)$ events, 7.9 fb$^{-1}$ $ψ(3773)$ data, and 0.8 fb$^{-1}$ off-resonance data samples collected with the BESIII detector, we measure the branching fraction of $ψ(2S)\rightarrowγπ^{0}$ and $e^{+}e^{-}\rightarrowγπ^{0}$ form factor at momentum transfers $Q^{2}\sim13$ GeV$^{2}$. The $e^{+}e^{-}\rightarrowγπ^{0}$ cross section is fitted with considering the in…
▽ More
Based on $(2712.4\pm14.1)\times10^{6}~ψ(2S)$ events, 7.9 fb$^{-1}$ $ψ(3773)$ data, and 0.8 fb$^{-1}$ off-resonance data samples collected with the BESIII detector, we measure the branching fraction of $ψ(2S)\rightarrowγπ^{0}$ and $e^{+}e^{-}\rightarrowγπ^{0}$ form factor at momentum transfers $Q^{2}\sim13$ GeV$^{2}$. The $e^{+}e^{-}\rightarrowγπ^{0}$ cross section is fitted with considering the interference between the $ψ(2S)$ and continuum amplitudes and two solutions are found, ${\cal B}=3.74\times10^{-7}$ with $φ=3.93$ rad and ${\cal B}=7.87\times10^{-7}$ with $φ=2.08$ rad. Here, ${\cal B}$ is the branching fraction of $ψ(2S)\rightarrowγπ^{0}$ and $φ$ is the relative phase angle between the $ψ(2S)$ and continuum amplitudes. Due to insufficient off-resonance data, the branching fraction ${\cal B}(ψ(2S)\rightarrowγπ^{0})$ is determined to be in the range $[2.7, 9.7]\times10^{-7}$ within one standard deviation of the contour region.
△ Less
Submitted 7 August, 2024; v1 submitted 7 August, 2024;
originally announced August 2024.
-
Measurement of $Σ^+$ transverse polarization in $e^+e^-$ collisions at $\sqrt{s} = 3.68-3.71$ GeV
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (639 additional authors not shown)
Abstract:
Using $e^+e^-$ collision data collected with the BESIII detector at seven energy points ranging from 3.68 to 3.71 GeV and corresponding to an integrated luminosity of $652.1~{\rm pb^{-1}}$, we present an energy-dependent measurement of the transverse polarization, relative phase and modulus ratio of the electromagnetic form factors of the $Σ^+$ hyperon in the $e^+e^- \to Σ^+ \barΣ^-$ reaction. The…
▽ More
Using $e^+e^-$ collision data collected with the BESIII detector at seven energy points ranging from 3.68 to 3.71 GeV and corresponding to an integrated luminosity of $652.1~{\rm pb^{-1}}$, we present an energy-dependent measurement of the transverse polarization, relative phase and modulus ratio of the electromagnetic form factors of the $Σ^+$ hyperon in the $e^+e^- \to Σ^+ \barΣ^-$ reaction. These results are helpful to understand the production mechanism of the $Σ^+$-$\barΣ^-$ pairs.
△ Less
Submitted 7 August, 2024; v1 submitted 6 August, 2024;
originally announced August 2024.
-
Observation of $η_{c}(2S) \to K^{+}K^{-}η$
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (639 additional authors not shown)
Abstract:
By analyzing $(27.12 \pm 0.14)\times10^{8}$ $ψ(3686)$ events accumulated with the BESIII detector, the decay $η_{c}(2S) \to K^{+} K^{-} η$ is observed for the first time with a significance of $6.2σ$ after considering systematic uncertainties. The product of the branching fractions of $ψ(3686) \to γη_{c}(2S)$ and $η_{c}(2S) \to K^{+} K^{-} η$ is measured to be…
▽ More
By analyzing $(27.12 \pm 0.14)\times10^{8}$ $ψ(3686)$ events accumulated with the BESIII detector, the decay $η_{c}(2S) \to K^{+} K^{-} η$ is observed for the first time with a significance of $6.2σ$ after considering systematic uncertainties. The product of the branching fractions of $ψ(3686) \to γη_{c}(2S)$ and $η_{c}(2S) \to K^{+} K^{-} η$ is measured to be $\mathcal{B}(ψ(3686) \toγη_{c}(2S))\times \mathcal{B}(η_{c}(2S)\to K^{+} K^{-}η)=(2.39 \pm 0.32 \pm 0.34) \times 10^{-6}$, where the first uncertainty is statistical, and the second one is systematic. The branching fraction of $η_{c}(2S)\to K^{+} K^{-}η$ is determined to be $\mathcal{B}(η_{c}(2S)\to K^{+} K^{-}η) = (3.42 \pm 0.46 \pm 0.48 \pm 2.44) \times 10^{-3}$, where the third uncertainty is due to the branching fraction of $ψ(3686) \to γη_{c}(2S)$. Using a recent BESIII measurement of $\mathcal{B} (η_{c}(2S) \to K^{+} K^{-}π^{0})$, we also determine the ratio between the branching fractions of $η_{c}(2S) \to K^{+} K^{-}η$ and $η_{c}(2S) \to K^{+} K^{-}π^{0}$ to be $1.49 \pm 0.22 \pm 0.25$, which is consistent with the previous result of BaBar at a comparable precision level.
△ Less
Submitted 5 August, 2024;
originally announced August 2024.
-
Multistain Pretraining for Slide Representation Learning in Pathology
Authors:
Guillaume Jaume,
Anurag Vaidya,
Andrew Zhang,
Andrew H. Song,
Richard J. Chen,
Sharifa Sahai,
Dandan Mo,
Emilio Madrigal,
Long Phi Le,
Faisal Mahmood
Abstract:
Developing self-supervised learning (SSL) models that can learn universal and transferable representations of H&E gigapixel whole-slide images (WSIs) is becoming increasingly valuable in computational pathology. These models hold the potential to advance critical tasks such as few-shot classification, slide retrieval, and patient stratification. Existing approaches for slide representation learnin…
▽ More
Developing self-supervised learning (SSL) models that can learn universal and transferable representations of H&E gigapixel whole-slide images (WSIs) is becoming increasingly valuable in computational pathology. These models hold the potential to advance critical tasks such as few-shot classification, slide retrieval, and patient stratification. Existing approaches for slide representation learning extend the principles of SSL from small images (e.g., 224 x 224 patches) to entire slides, usually by aligning two different augmentations (or views) of the slide. Yet the resulting representation remains constrained by the limited clinical and biological diversity of the views. Instead, we postulate that slides stained with multiple markers, such as immunohistochemistry, can be used as different views to form a rich task-agnostic training signal. To this end, we introduce Madeleine, a multimodal pretraining strategy for slide representation learning. Madeleine is trained with a dual global-local cross-stain alignment objective on large cohorts of breast cancer samples (N=4,211 WSIs across five stains) and kidney transplant samples (N=12,070 WSIs across four stains). We demonstrate the quality of slide representations learned by Madeleine on various downstream evaluations, ranging from morphological and molecular classification to prognostic prediction, comprising 21 tasks using 7,299 WSIs from multiple medical centers. Code is available at https://github.com/mahmoodlab/MADELEINE.
△ Less
Submitted 5 August, 2024;
originally announced August 2024.
-
Caution for the Environment: Multimodal Agents are Susceptible to Environmental Distractions
Authors:
Xinbei Ma,
Yiting Wang,
Yao Yao,
Tongxin Yuan,
Aston Zhang,
Zhuosheng Zhang,
Hai Zhao
Abstract:
This paper investigates the faithfulness of multimodal large language model (MLLM) agents in the graphical user interface (GUI) environment, aiming to address the research question of whether multimodal GUI agents can be distracted by environmental context. A general setting is proposed where both the user and the agent are benign, and the environment, while not malicious, contains unrelated conte…
▽ More
This paper investigates the faithfulness of multimodal large language model (MLLM) agents in the graphical user interface (GUI) environment, aiming to address the research question of whether multimodal GUI agents can be distracted by environmental context. A general setting is proposed where both the user and the agent are benign, and the environment, while not malicious, contains unrelated content. A wide range of MLLMs are evaluated as GUI agents using our simulated dataset, following three working patterns with different levels of perception. Experimental results reveal that even the most powerful models, whether generalist agents or specialist GUI agents, are susceptible to distractions. While recent studies predominantly focus on the helpfulness (i.e., action accuracy) of multimodal agents, our findings indicate that these agents are prone to environmental distractions, resulting in unfaithful behaviors. Furthermore, we switch to the adversarial perspective and implement environment injection, demonstrating that such unfaithfulness can be exploited, leading to unexpected risks.
△ Less
Submitted 5 August, 2024;
originally announced August 2024.
-
MiniCPM-V: A GPT-4V Level MLLM on Your Phone
Authors:
Yuan Yao,
Tianyu Yu,
Ao Zhang,
Chongyi Wang,
Junbo Cui,
Hongji Zhu,
Tianchi Cai,
Haoyu Li,
Weilin Zhao,
Zhihui He,
Qianyu Chen,
Huarong Zhou,
Zhensheng Zou,
Haoye Zhang,
Shengding Hu,
Zhi Zheng,
Jie Zhou,
Jie Cai,
Xu Han,
Guoyang Zeng,
Dahai Li,
Zhiyuan Liu,
Maosong Sun
Abstract:
The recent surge of Multimodal Large Language Models (MLLMs) has fundamentally reshaped the landscape of AI research and industry, shedding light on a promising path toward the next AI milestone. However, significant challenges remain preventing MLLMs from being practical in real-world applications. The most notable challenge comes from the huge cost of running an MLLM with a massive number of par…
▽ More
The recent surge of Multimodal Large Language Models (MLLMs) has fundamentally reshaped the landscape of AI research and industry, shedding light on a promising path toward the next AI milestone. However, significant challenges remain preventing MLLMs from being practical in real-world applications. The most notable challenge comes from the huge cost of running an MLLM with a massive number of parameters and extensive computation. As a result, most MLLMs need to be deployed on high-performing cloud servers, which greatly limits their application scopes such as mobile, offline, energy-sensitive, and privacy-protective scenarios. In this work, we present MiniCPM-V, a series of efficient MLLMs deployable on end-side devices. By integrating the latest MLLM techniques in architecture, pretraining and alignment, the latest MiniCPM-Llama3-V 2.5 has several notable features: (1) Strong performance, outperforming GPT-4V-1106, Gemini Pro and Claude 3 on OpenCompass, a comprehensive evaluation over 11 popular benchmarks, (2) strong OCR capability and 1.8M pixel high-resolution image perception at any aspect ratio, (3) trustworthy behavior with low hallucination rates, (4) multilingual support for 30+ languages, and (5) efficient deployment on mobile phones. More importantly, MiniCPM-V can be viewed as a representative example of a promising trend: The model sizes for achieving usable (e.g., GPT-4V) level performance are rapidly decreasing, along with the fast growth of end-side computation capacity. This jointly shows that GPT-4V level MLLMs deployed on end devices are becoming increasingly possible, unlocking a wider spectrum of real-world AI applications in the near future.
△ Less
Submitted 3 August, 2024;
originally announced August 2024.
-
Search for $X(3872)\toπ^0π^0χ_{c1,2}$
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (638 additional authors not shown)
Abstract:
Using 10.1 fb$^{-1}$ of $e^+e^-$ collision data collected by the BESIII detector with center-of-mass energies between 4.15 GeV and 4.30 GeV, we search for the decays $X(3872)\toπ^0π^0χ_{c1,2}$, where the $X(3872)$ is produced in $e^+e^-\toγX(3872)$. No evidence above $3σ$ is found for either decay. Upper limits at the $90\%$ C.L. on the branching fractions of $X(3872)\toπ^0π^0χ_{c1,2}$ normalized…
▽ More
Using 10.1 fb$^{-1}$ of $e^+e^-$ collision data collected by the BESIII detector with center-of-mass energies between 4.15 GeV and 4.30 GeV, we search for the decays $X(3872)\toπ^0π^0χ_{c1,2}$, where the $X(3872)$ is produced in $e^+e^-\toγX(3872)$. No evidence above $3σ$ is found for either decay. Upper limits at the $90\%$ C.L. on the branching fractions of $X(3872)\toπ^0π^0χ_{c1,2}$ normalized to the branching fraction of $X(3872)\toπ^+π^-J/ψ$ are set to be $\mathcal{B}(X(3872)\toπ^0π^0χ_{c1})/\mathcal{B}(X(3872)\toπ^+π^-J/ψ) < 1.1$ and $\mathcal{B}(X(3872)\toπ^0π^0χ_{c2})/\mathcal{B}(X(3872)\toπ^+π^-J/ψ) < 0.5$, taking into account both statistical and systematic uncertainties.
△ Less
Submitted 2 August, 2024;
originally announced August 2024.
-
Improving Retrieval-Augmented Generation in Medicine with Iterative Follow-up Questions
Authors:
Guangzhi Xiong,
Qiao Jin,
Xiao Wang,
Minjia Zhang,
Zhiyong Lu,
Aidong Zhang
Abstract:
The emergent abilities of large language models (LLMs) have demonstrated great potential in solving medical questions. They can possess considerable medical knowledge, but may still hallucinate and are inflexible in the knowledge updates. While Retrieval-Augmented Generation (RAG) has been proposed to enhance the medical question-answering capabilities of LLMs with external knowledge bases, it may…
▽ More
The emergent abilities of large language models (LLMs) have demonstrated great potential in solving medical questions. They can possess considerable medical knowledge, but may still hallucinate and are inflexible in the knowledge updates. While Retrieval-Augmented Generation (RAG) has been proposed to enhance the medical question-answering capabilities of LLMs with external knowledge bases, it may still fail in complex cases where multiple rounds of information-seeking are required. To address such an issue, we propose iterative RAG for medicine (i-MedRAG), where LLMs can iteratively ask follow-up queries based on previous information-seeking attempts. In each iteration of i-MedRAG, the follow-up queries will be answered by a vanilla RAG system and they will be further used to guide the query generation in the next iteration. Our experiments show the improved performance of various LLMs brought by i-MedRAG compared with vanilla RAG on complex questions from clinical vignettes in the United States Medical Licensing Examination (USMLE), as well as various knowledge tests in the Massive Multitask Language Understanding (MMLU) dataset. Notably, our zero-shot i-MedRAG outperforms all existing prompt engineering and fine-tuning methods on GPT-3.5, achieving an accuracy of 69.68\% on the MedQA dataset. In addition, we characterize the scaling properties of i-MedRAG with different iterations of follow-up queries and different numbers of queries per iteration. Our case studies show that i-MedRAG can flexibly ask follow-up queries to form reasoning chains, providing an in-depth analysis of medical questions. To the best of our knowledge, this is the first-of-its-kind study on incorporating follow-up queries into medical RAG.
△ Less
Submitted 1 August, 2024;
originally announced August 2024.
-
Partial wave analysis of $ψ(3686)\toΛ\barΣ^0π^0+c.c.$
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (644 additional authors not shown)
Abstract:
Based on a sample of $(2712.4\pm14.3)\times10^6\;ψ(3686)$ events collected with the BESIII detector, a partial wave analysis of the decay $ψ(3686)\toΛ\barΣ^0π^0+c.c.$ is performed to investigate $Λ^*$ and $Σ^*$ resonances in the $π^0\barΣ^0$ and $π^0Λ$ invariant mass distributions. Significant contributions are found from the $Λ(1405)$, $Λ(1520)$, $Λ(1600)$, $Λ(1670)$, $Λ(1690)$, $Λ(1800)$,…
▽ More
Based on a sample of $(2712.4\pm14.3)\times10^6\;ψ(3686)$ events collected with the BESIII detector, a partial wave analysis of the decay $ψ(3686)\toΛ\barΣ^0π^0+c.c.$ is performed to investigate $Λ^*$ and $Σ^*$ resonances in the $π^0\barΣ^0$ and $π^0Λ$ invariant mass distributions. Significant contributions are found from the $Λ(1405)$, $Λ(1520)$, $Λ(1600)$, $Λ(1670)$, $Λ(1690)$, $Λ(1800)$, $Λ(1890)$, $Λ(2325)$, $Σ(1385)$, $Σ(1660)$, $Σ(1670)$, $Σ(1750)$, and $Σ(1910)$. The masses, widths, and production branching fractions for each component are determined. In addition, the branching fraction of $ψ(3686)\toΛ\barΣ^0π^0+c.c.$ is measured to be $(1.544\pm0.013\pm0.069)\times10^{-4}$ for the first time, where the first uncertainty is statistical and the second systematic.
△ Less
Submitted 1 August, 2024;
originally announced August 2024.
-
The Llama 3 Herd of Models
Authors:
Abhimanyu Dubey,
Abhinav Jauhri,
Abhinav Pandey,
Abhishek Kadian,
Ahmad Al-Dahle,
Aiesha Letman,
Akhil Mathur,
Alan Schelten,
Amy Yang,
Angela Fan,
Anirudh Goyal,
Anthony Hartshorn,
Aobo Yang,
Archi Mitra,
Archie Sravankumar,
Artem Korenev,
Arthur Hinsvark,
Arun Rao,
Aston Zhang,
Aurelien Rodriguez,
Austen Gregerson,
Ava Spataru,
Baptiste Roziere,
Bethany Biron,
Binh Tang
, et al. (510 additional authors not shown)
Abstract:
Modern artificial intelligence (AI) systems are powered by foundation models. This paper presents a new set of foundation models, called Llama 3. It is a herd of language models that natively support multilinguality, coding, reasoning, and tool usage. Our largest model is a dense Transformer with 405B parameters and a context window of up to 128K tokens. This paper presents an extensive empirical…
▽ More
Modern artificial intelligence (AI) systems are powered by foundation models. This paper presents a new set of foundation models, called Llama 3. It is a herd of language models that natively support multilinguality, coding, reasoning, and tool usage. Our largest model is a dense Transformer with 405B parameters and a context window of up to 128K tokens. This paper presents an extensive empirical evaluation of Llama 3. We find that Llama 3 delivers comparable quality to leading language models such as GPT-4 on a plethora of tasks. We publicly release Llama 3, including pre-trained and post-trained versions of the 405B parameter language model and our Llama Guard 3 model for input and output safety. The paper also presents the results of experiments in which we integrate image, video, and speech capabilities into Llama 3 via a compositional approach. We observe this approach performs competitively with the state-of-the-art on image, video, and speech recognition tasks. The resulting models are not yet being broadly released as they are still under development.
△ Less
Submitted 15 August, 2024; v1 submitted 31 July, 2024;
originally announced July 2024.
-
Wireless Communications in Doubly Selective Channels with Domain Adaptivity
Authors:
J. Andrew Zhang,
Hongyang Zhang,
Kai Wu,
Xiaojing Huang,
Jinhong Yuan,
Y. Jay Guo
Abstract:
Wireless communications are significantly impacted by the propagation environment, particularly in doubly selective channels with variations in both time and frequency domains. Orthogonal Time Frequency Space (OTFS) modulation has emerged as a promising solution; however, its high equalization complexity, if performed in the delay-Doppler domain, limits its universal application. This article expl…
▽ More
Wireless communications are significantly impacted by the propagation environment, particularly in doubly selective channels with variations in both time and frequency domains. Orthogonal Time Frequency Space (OTFS) modulation has emerged as a promising solution; however, its high equalization complexity, if performed in the delay-Doppler domain, limits its universal application. This article explores domain-adaptive system design, dynamically selecting best-fit domains for modulation, pilot placement, and equalization based on channel conditions, to enhance performance across diverse environments. We examine domain classifications and connections, signal designs, and equalization techniques with domain adaptivity, and finally highlight future research opportunities.
△ Less
Submitted 31 July, 2024; v1 submitted 31 July, 2024;
originally announced July 2024.
-
Adaptive Pre-training Data Detection for Large Language Models via Surprising Tokens
Authors:
Anqi Zhang,
Chaofeng Wu
Abstract:
While large language models (LLMs) are extensively used, there are raising concerns regarding privacy, security, and copyright due to their opaque training data, which brings the problem of detecting pre-training data on the table. Current solutions to this problem leverage techniques explored in machine learning privacy such as Membership Inference Attacks (MIAs), which heavily depend on LLMs' ca…
▽ More
While large language models (LLMs) are extensively used, there are raising concerns regarding privacy, security, and copyright due to their opaque training data, which brings the problem of detecting pre-training data on the table. Current solutions to this problem leverage techniques explored in machine learning privacy such as Membership Inference Attacks (MIAs), which heavily depend on LLMs' capability of verbatim memorization. However, this reliance presents challenges, especially given the vast amount of training data and the restricted number of effective training epochs. In this paper, we propose an adaptive pre-training data detection method which alleviates this reliance and effectively amplify the identification. Our method adaptively locates \textit{surprising tokens} of the input. A token is surprising to a LLM if the prediction on the token is "certain but wrong", which refers to low Shannon entropy of the probability distribution and low probability of the ground truth token at the same time. By using the prediction probability of surprising tokens to measure \textit{surprising}, the detection method is achieved based on the simple hypothesis that seeing seen data is less surprising for the model compared with seeing unseen data. The method can be applied without any access to the the pre-training data corpus or additional training like reference models. Our approach exhibits a consistent enhancement compared to existing methods in diverse experiments conducted on various benchmarks and models, achieving a maximum improvement of 29.5\%. We also introduce a new benchmark Dolma-Book developed upon a novel framework, which employs book data collected both before and after model training to provide further evaluation.
△ Less
Submitted 30 July, 2024;
originally announced July 2024.
-
Apple Intelligence Foundation Language Models
Authors:
Tom Gunter,
Zirui Wang,
Chong Wang,
Ruoming Pang,
Andy Narayanan,
Aonan Zhang,
Bowen Zhang,
Chen Chen,
Chung-Cheng Chiu,
David Qiu,
Deepak Gopinath,
Dian Ang Yap,
Dong Yin,
Feng Nan,
Floris Weers,
Guoli Yin,
Haoshuo Huang,
Jianyu Wang,
Jiarui Lu,
John Peebles,
Ke Ye,
Mark Lee,
Nan Du,
Qibin Chen,
Quentin Keunebroek
, et al. (130 additional authors not shown)
Abstract:
We present foundation language models developed to power Apple Intelligence features, including a ~3 billion parameter model designed to run efficiently on devices and a large server-based language model designed for Private Cloud Compute. These models are designed to perform a wide range of tasks efficiently, accurately, and responsibly. This report describes the model architecture, the data used…
▽ More
We present foundation language models developed to power Apple Intelligence features, including a ~3 billion parameter model designed to run efficiently on devices and a large server-based language model designed for Private Cloud Compute. These models are designed to perform a wide range of tasks efficiently, accurately, and responsibly. This report describes the model architecture, the data used to train the model, the training process, how the models are optimized for inference, and the evaluation results. We highlight our focus on Responsible AI and how the principles are applied throughout the model development.
△ Less
Submitted 29 July, 2024;
originally announced July 2024.
-
Observation of $D^0\to b_1(1235)^- e^+ν_e$ and evidence for $D^+\to b_1(1235)^0 e^+ν_e$
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (647 additional authors not shown)
Abstract:
By analyzing a data sample of $e^+e^-$ collisions with center-of-mass energy $\sqrt{s}=3.773$ GeV, corresponding to an integrated luminosity of $7.9~\rm {fb}^{-1}$ collected with the BESIII detector operating at the BEPCII collider, we study semileptonic decays of the $D^{0(+)}$ mesons into the axial-vector meson $b_1(1235)$ via the decay $b_1(1235)\to ωπ$. The decay…
▽ More
By analyzing a data sample of $e^+e^-$ collisions with center-of-mass energy $\sqrt{s}=3.773$ GeV, corresponding to an integrated luminosity of $7.9~\rm {fb}^{-1}$ collected with the BESIII detector operating at the BEPCII collider, we study semileptonic decays of the $D^{0(+)}$ mesons into the axial-vector meson $b_1(1235)$ via the decay $b_1(1235)\to ωπ$. The decay $D^0\to b_1(1235)^-e^{+}ν_{e}$ is observed with a significance of 5.2$σ$ after considering systematic uncertainty, while evidence for the decay $D^+\to b_1(1235)^0 e^+ν_e$ is obtained with a 3.1$σ$ significance. The product branching fractions are determined to be ${\mathcal B}(D^0\to b_{1}(1235)^-e^{+}ν_{e})\times {\mathcal B} (b_1(1235)^-\to ωπ^-) = (0.72\pm0.18^{+0.06}_{-0.08})\times10^{-4}$ and ${\mathcal B}(D^+\to b_{1}(1235)^0e^{+}ν_{e})\times {\mathcal B} (b_1(1235)^0~\to ωπ^0) = (1.16\pm0.44\pm0.16)\times10^{-4}$, where the first uncertainties are statistical and the second systematic. The ratio of their partial decay widths is determined to be $\frac{Γ(D^0\to b_{1}(1235)^-e^{+}ν_{e})}{2Γ(D^+\to b_{1}(1235)^0e^{+}ν_{e})}=0.78\pm0.19^{+0.04}_{-0.05}$, which is consistent with unity, predicted by isospin invariance, within uncertainties.
△ Less
Submitted 30 July, 2024;
originally announced July 2024.
-
Diffusion-DICE: In-Sample Diffusion Guidance for Offline Reinforcement Learning
Authors:
Liyuan Mao,
Haoran Xu,
Weinan Zhang,
Xianyuan Zhan,
Amy Zhang
Abstract:
One important property of DIstribution Correction Estimation (DICE) methods is that the solution is the optimal stationary distribution ratio between the optimized and data collection policy. In this work, we show that DICE-based methods can be viewed as a transformation from the behavior distribution to the optimal policy distribution. Based on this, we propose a novel approach, Diffusion-DICE, t…
▽ More
One important property of DIstribution Correction Estimation (DICE) methods is that the solution is the optimal stationary distribution ratio between the optimized and data collection policy. In this work, we show that DICE-based methods can be viewed as a transformation from the behavior distribution to the optimal policy distribution. Based on this, we propose a novel approach, Diffusion-DICE, that directly performs this transformation using diffusion models. We find that the optimal policy's score function can be decomposed into two terms: the behavior policy's score function and the gradient of a guidance term which depends on the optimal distribution ratio. The first term can be obtained from a diffusion model trained on the dataset and we propose an in-sample learning objective to learn the second term. Due to the multi-modality contained in the optimal policy distribution, the transformation in Diffusion-DICE may guide towards those local-optimal modes. We thus generate a few candidate actions and carefully select from them to approach global-optimum. Different from all other diffusion-based offline RL methods, the guide-then-select paradigm in Diffusion-DICE only uses in-sample actions for training and brings minimal error exploitation in the value function. We use a didatic toycase example to show how previous diffusion-based methods fail to generate optimal actions due to leveraging these errors and how Diffusion-DICE successfully avoids that. We then conduct extensive experiments on benchmark datasets to show the strong performance of Diffusion-DICE.
△ Less
Submitted 29 July, 2024;
originally announced July 2024.
-
Measurement of the $\boldsymbol{e^{+}e^{-}\to K^+K^-ψ(2S)}$ Cross Section at Center-of-Mass Energies from 4.699 to 4.951 GeV and Search for $\boldsymbol{Z_{cs}^{\pm}}$ in the $\boldsymbol{Z_{cs}^\pm\to K^\pmψ(2S)}$ Decay
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (646 additional authors not shown)
Abstract:
We perform the first investigation of the process $e^{+}e^{-}\to K^+K^-ψ(2S)$ and report its Born cross sections over a range of center-of-mass energies from 4.699 to 4.951~GeV. The measurements are carried out using several partial reconstruction techniques using data samples collected by the BESIII detector with a total integrated luminosity of 2.5~fb$^{-1}$. We search for new tetraquark candida…
▽ More
We perform the first investigation of the process $e^{+}e^{-}\to K^+K^-ψ(2S)$ and report its Born cross sections over a range of center-of-mass energies from 4.699 to 4.951~GeV. The measurements are carried out using several partial reconstruction techniques using data samples collected by the BESIII detector with a total integrated luminosity of 2.5~fb$^{-1}$. We search for new tetraquark candidates $Z_{cs}^\pm$ in the decays $Z_{cs}^\pm\to K^\pmψ(2S)$. No significant $Z_{cs}^\pm$ signals are observed.
△ Less
Submitted 29 July, 2024;
originally announced July 2024.
-
Scaling limits for supercritical nearly unstable Hawkes processes
Authors:
Chenguang Liu,
Liping Xu,
An Zhang
Abstract:
In this paper, we investigate the asymptotic behavior of nearly unstable Hawkes processes whose regression kernel has $L^1$ norm strictly greater than one and close to one as time goes to infinity. We find that,the scaling size determines the scaling behavior of the processes like in \cite{MR3313750}. Specifically,after suitable rescaling, the limit of the sequence of Hawkes processes is determini…
▽ More
In this paper, we investigate the asymptotic behavior of nearly unstable Hawkes processes whose regression kernel has $L^1$ norm strictly greater than one and close to one as time goes to infinity. We find that,the scaling size determines the scaling behavior of the processes like in \cite{MR3313750}. Specifically,after suitable rescaling, the limit of the sequence of Hawkes processes is deterministic.And also with another appropriate rescaling, the sequence converges in law to an integrated Cox Ingersoll Ross like process. This theoretical result may apply to model the recent COVID19 in epidemiology and in social network.
△ Less
Submitted 2 August, 2024; v1 submitted 29 July, 2024;
originally announced July 2024.
-
CoLiDR: Concept Learning using Aggregated Disentangled Representations
Authors:
Sanchit Sinha,
Guangzhi Xiong,
Aidong Zhang
Abstract:
Interpretability of Deep Neural Networks using concept-based models offers a promising way to explain model behavior through human-understandable concepts. A parallel line of research focuses on disentangling the data distribution into its underlying generative factors, in turn explaining the data generation process. While both directions have received extensive attention, little work has been don…
▽ More
Interpretability of Deep Neural Networks using concept-based models offers a promising way to explain model behavior through human-understandable concepts. A parallel line of research focuses on disentangling the data distribution into its underlying generative factors, in turn explaining the data generation process. While both directions have received extensive attention, little work has been done on explaining concepts in terms of generative factors to unify mathematically disentangled representations and human-understandable concepts as an explanation for downstream tasks. In this paper, we propose a novel method CoLiDR - which utilizes a disentangled representation learning setup for learning mutually independent generative factors and subsequently learns to aggregate the said representations into human-understandable concepts using a novel aggregation/decomposition module. Experiments are conducted on datasets with both known and unknown latent generative factors. Our method successfully aggregates disentangled generative factors into concepts while maintaining parity with state-of-the-art concept-based approaches. Quantitative and visual analysis of the learned aggregation procedure demonstrates the advantages of our work compared to commonly used concept-based models over four challenging datasets. Lastly, our work is generalizable to an arbitrary number of concepts and generative factors - making it flexible enough to be suitable for various types of data.
△ Less
Submitted 27 July, 2024;
originally announced July 2024.
-
Practical Marketplace Optimization at Uber Using Causally-Informed Machine Learning
Authors:
Bobby Chen,
Siyu Chen,
Jason Dowlatabadi,
Yu Xuan Hong,
Vinayak Iyer,
Uday Mantripragada,
Rishabh Narang,
Apoorv Pandey,
Zijun Qin,
Abrar Sheikh,
Hongtao Sun,
Jiaqi Sun,
Matthew Walker,
Kaichen Wei,
Chen Xu,
Jingnan Yang,
Allen T. Zhang,
Guoqing Zhang
Abstract:
Budget allocation of marketplace levers, such as incentives for drivers and promotions for riders, has long been a technical and business challenge at Uber; understanding lever budget changes' impact and estimating cost efficiency to achieve predefined budgets is crucial, with the goal of optimal allocations that maximize business value; we introduce an end-to-end machine learning and optimization…
▽ More
Budget allocation of marketplace levers, such as incentives for drivers and promotions for riders, has long been a technical and business challenge at Uber; understanding lever budget changes' impact and estimating cost efficiency to achieve predefined budgets is crucial, with the goal of optimal allocations that maximize business value; we introduce an end-to-end machine learning and optimization procedure to automate budget decision-making for cities, relying on feature store, model training and serving, optimizers, and backtesting; proposing state-of-the-art deep learning (DL) estimator based on S-Learner and a novel tensor B-Spline regression model, we solve high-dimensional optimization with ADMM and primal-dual interior point convex optimization, substantially improving Uber's resource allocation efficiency.
△ Less
Submitted 26 July, 2024;
originally announced July 2024.
-
MMAU: A Holistic Benchmark of Agent Capabilities Across Diverse Domains
Authors:
Guoli Yin,
Haoping Bai,
Shuang Ma,
Feng Nan,
Yanchao Sun,
Zhaoyang Xu,
Shen Ma,
Jiarui Lu,
Xiang Kong,
Aonan Zhang,
Dian Ang Yap,
Yizhe zhang,
Karsten Ahnert,
Vik Kamath,
Mathias Berglund,
Dominic Walsh,
Tobias Gindele,
Juergen Wiest,
Zhengfeng Lai,
Xiaoming Wang,
Jiulong Shan,
Meng Cao,
Ruoming Pang,
Zirui Wang
Abstract:
Recent advances in large language models (LLMs) have increased the demand for comprehensive benchmarks to evaluate their capabilities as human-like agents. Existing benchmarks, while useful, often focus on specific application scenarios, emphasizing task completion but failing to dissect the underlying skills that drive these outcomes. This lack of granularity makes it difficult to deeply discern…
▽ More
Recent advances in large language models (LLMs) have increased the demand for comprehensive benchmarks to evaluate their capabilities as human-like agents. Existing benchmarks, while useful, often focus on specific application scenarios, emphasizing task completion but failing to dissect the underlying skills that drive these outcomes. This lack of granularity makes it difficult to deeply discern where failures stem from. Additionally, setting up these environments requires considerable effort, and issues of unreliability and reproducibility sometimes arise, especially in interactive tasks. To address these limitations, we introduce the Massive Multitask Agent Understanding (MMAU) benchmark, featuring comprehensive offline tasks that eliminate the need for complex environment setups. It evaluates models across five domains, including Tool-use, Directed Acyclic Graph (DAG) QA, Data Science and Machine Learning coding, Contest-level programming and Mathematics, and covers five essential capabilities: Understanding, Reasoning, Planning, Problem-solving, and Self-correction. With a total of 20 meticulously designed tasks encompassing over 3K distinct prompts, MMAU provides a comprehensive framework for evaluating the strengths and limitations of LLM agents. By testing 18 representative models on MMAU, we provide deep and insightful analyses. Ultimately, MMAU not only sheds light on the capabilities and limitations of LLM agents but also enhances the interpretability of their performance. Datasets and evaluation scripts of MMAU are released at https://github.com/apple/axlearn/tree/main/docs/research/mmau.
△ Less
Submitted 15 August, 2024; v1 submitted 17 July, 2024;
originally announced July 2024.
-
Peak-Controlled Logits Poisoning Attack in Federated Distillation
Authors:
Yuhan Tang,
Aoxu Zhang,
Zhiyuan Wu,
Bo Gao,
Tian Wen,
Yuwei Wang,
Sheng Sun
Abstract:
Federated Distillation (FD) offers an innovative approach to distributed machine learning, leveraging knowledge distillation for efficient and flexible cross-device knowledge transfer without necessitating the upload of extensive model parameters to a central server. While FD has gained popularity, its vulnerability to poisoning attacks remains underexplored. To address this gap, we previously int…
▽ More
Federated Distillation (FD) offers an innovative approach to distributed machine learning, leveraging knowledge distillation for efficient and flexible cross-device knowledge transfer without necessitating the upload of extensive model parameters to a central server. While FD has gained popularity, its vulnerability to poisoning attacks remains underexplored. To address this gap, we previously introduced FDLA (Federated Distillation Logits Attack), a method that manipulates logits communication to mislead and degrade the performance of client models. However, the impact of FDLA on participants with different identities and the effects of malicious modifications at various stages of knowledge transfer remain unexplored. To this end, we present PCFDLA (Peak-Controlled Federated Distillation Logits Attack), an advanced and more stealthy logits poisoning attack method for FD. PCFDLA enhances the effectiveness of FDLA by carefully controlling the peak values of logits to create highly misleading yet inconspicuous modifications. Furthermore, we introduce a novel metric for better evaluating attack efficacy, demonstrating that PCFDLA maintains stealth while being significantly more disruptive to victim models compared to its predecessors. Experimental results across various datasets confirm the superior impact of PCFDLA on model accuracy, solidifying its potential threat in federated distillation systems.
△ Less
Submitted 25 July, 2024;
originally announced July 2024.
-
Envisioning New Futures of Positive Social Technology: Beyond Paradigms of Fixing, Protecting, and Preventing
Authors:
JaeWon Kim,
Lindsay Popowski,
Anna Fang,
Cassidy Pyle,
Guo Freeman,
Ryan M. Kelly,
Angela Y. Lee,
Fannie Liu,
Angela D. R. Smith,
Alexandra To,
Amy X. Zhang
Abstract:
Social technology research today largely focuses on mitigating the negative impacts of technology and, therefore, often misses the potential of technology to enhance human connections and well-being. However, we see a potential to shift towards a holistic view of social technology's impact on human flourishing. We introduce Positive Social Technology (Positech), a framework that shifts emphasis to…
▽ More
Social technology research today largely focuses on mitigating the negative impacts of technology and, therefore, often misses the potential of technology to enhance human connections and well-being. However, we see a potential to shift towards a holistic view of social technology's impact on human flourishing. We introduce Positive Social Technology (Positech), a framework that shifts emphasis toward leveraging social technologies to support and augment human flourishing. This workshop is organized around three themes relevant to Positech: 1) "Exploring Relevant and Adjacent Research" to define and widen the Positech scope with insights from related fields, 2) "Projecting the Landscape of Positech" for participants to outline the domain's key aspects and 3) "Envisioning the Future of Positech," anchored around strategic planning towards a sustainable research community. Ultimately, this workshop will serve as a platform to shift the narrative of social technology research towards a more positive, human-centric approach. It will foster research that goes beyond fixing technologies to protect humans from harm, to also pursue enriching human experiences and connections through technology.
△ Less
Submitted 27 August, 2024; v1 submitted 24 July, 2024;
originally announced July 2024.
-
Search for $η_{c}(2S)\to K^+ K^- η^{\prime}$ decay
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (639 additional authors not shown)
Abstract:
Using $(2.712\pm0.014)\times10^{9}$ $ψ(3686)$ events collected with the BESIII detector operating at the BEPCII, we find an evidence of the $η_{c}(2S)\to K^+ K^- η^{\prime}$ decay with a statistical significance of 3.1$σ$. Its decay branching fraction is measured to be $(12.24\pm4.60(\mathrm{stat.})\pm2.37(\mathrm{syst.})\pm4.68(\mathrm{extr.}))\times 10^{-4}$, where the first uncertainty is stati…
▽ More
Using $(2.712\pm0.014)\times10^{9}$ $ψ(3686)$ events collected with the BESIII detector operating at the BEPCII, we find an evidence of the $η_{c}(2S)\to K^+ K^- η^{\prime}$ decay with a statistical significance of 3.1$σ$. Its decay branching fraction is measured to be $(12.24\pm4.60(\mathrm{stat.})\pm2.37(\mathrm{syst.})\pm4.68(\mathrm{extr.}))\times 10^{-4}$, where the first uncertainty is statistical, the second is systematic, and the third uncertainty is from the branching fraction of the $ψ(3686)\toγη_{c}(2S)$ decay. The upper limit on the product branching fraction $B[ψ(3686)\toγη_{c}(2S)] \times$ $B[η_{c}(2S)\to K^+ K^- η^{\prime}]$ is set to be $1.14 \times 10^{-6}$ at $90\%$ confidence level. In addition, the branching fractions of $χ_{c1}\to K^+ K^- η^{\prime}$ and $χ_{c2}\to K^+ K^- η^{\prime}$ are updated to be $(8.47\pm0.09(\mathrm{stat.})\pm0.47(\mathrm{syst.}))\times 10^{-4}$ and $(1.53\pm0.04(\mathrm{stat.})\pm0.08(\mathrm{syst.}))\times 10^{-4}$, respectively. The precision is improved by twofold.
△ Less
Submitted 24 July, 2024;
originally announced July 2024.
-
Efffcient Sensing Parameter Estimation with Direct Clutter Mitigation in Perceptive Mobile Networks
Authors:
Hang Li,
Hongming Yang,
Qinghua Guo,
J. Andrew Zhang,
Yang Xiang,
Yashan Pang
Abstract:
In this work, we investigate sensing parameter estimation in the presence of clutter in perceptive mobile networks (PMNs) that integrate radar sensing into mobile communications. Performing clutter suppression before sensing parameter estimation is generally desirable as the number of sensing parameters can be signiffcantly reduced. However, existing methods require high-complexity clutter mitigat…
▽ More
In this work, we investigate sensing parameter estimation in the presence of clutter in perceptive mobile networks (PMNs) that integrate radar sensing into mobile communications. Performing clutter suppression before sensing parameter estimation is generally desirable as the number of sensing parameters can be signiffcantly reduced. However, existing methods require high-complexity clutter mitigation and sensing parameter estimation, where clutter is ffrstly identiffed and then removed. In this correspondence, we propose a much simpler but more effective method by incorporating a clutter cancellation mechanism in formulating a sparse signal model for sensing parameter estimation.
In particular, clutter mitigation is performed directly on the received signals and the unitary approximate message passing (UAMP) is leveraged to exploit the common support for sensing parameter estimation in the formulated sparse signal recovery problem. Simulation results show that, compared to state-of-theart methods, the proposed method delivers signiffcantly better performance while with substantially reduced complexity.
△ Less
Submitted 24 July, 2024;
originally announced July 2024.
-
Performance Analysis and Low-Complexity Beamforming Design for Near-Field Physical Layer Security
Authors:
Yunpu Zhang,
Yuan Fang,
Xianghao Yu,
Changsheng You,
Ying-Jun Angela Zhang
Abstract:
Extremely large-scale arrays (XL-arrays) have emerged as a key enabler in achieving the unprecedented performance requirements of future wireless networks, leading to a significant increase in the range of the near-field region. This transition necessitates the spherical wavefront model for characterizing the wireless propagation rather than the far-field planar counterpart, thereby introducing ex…
▽ More
Extremely large-scale arrays (XL-arrays) have emerged as a key enabler in achieving the unprecedented performance requirements of future wireless networks, leading to a significant increase in the range of the near-field region. This transition necessitates the spherical wavefront model for characterizing the wireless propagation rather than the far-field planar counterpart, thereby introducing extra degrees of freedom (DoFs) to wireless system design. In this paper, we explore the beam focusing-based physical layer security (PLS) in the near field, where multiple legitimate users and one eavesdropper are situated in the near-field region of the XL-array base station (BS). First, we consider a special case with one legitimate user and one eavesdropper to shed useful insights into near-field PLS. In particular, it is shown that 1) Artificial noise (AN) is crucial to near-field security provisioning, transforming an insecure system to a secure one; 2) AN can yield numerous security gains, which considerably enhances PLS in the near field as compared to the case without AN taken into account. Next, for the general case with multiple legitimate users, we propose an efficient low-complexity approach to design the beamforming with AN to guarantee near-field secure transmission. Specifically, the low-complexity approach is conceived starting by introducing the concept of interference domain to capture the inter-user interference level, followed by a three-step identification framework for designing the beamforming. Finally, numerical results reveal that 1) the PLS enhancement in the near field is pronounced thanks to the additional spatial DoFs; 2) the proposed approach can achieve close performance to that of the computationally-extensive conventional approach yet with a significantly lower computational complexity.
△ Less
Submitted 18 July, 2024;
originally announced July 2024.