id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-04-21 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2504.11695 | Huangyuan Su | Isabel Papadimitriou, Huangyuan Su, Thomas Fel, Naomi Saphra, Sham
Kakade, Stephanie Gil | Interpreting the Linear Structure of Vision-language Model Embedding
Spaces | null | null | null | null | cs.CV cs.MM | http://creativecommons.org/licenses/by/4.0/ | Vision-language models encode images and text in a joint space, minimizing
the distance between corresponding image and text pairs. How are language and
images organized in this joint space, and how do the models encode meaning and
modality? To investigate this, we train and release sparse autoencoders (SAEs)
on the embedding spaces of four vision-language models (CLIP, SigLIP, SigLIP2,
and AIMv2). SAEs approximate model embeddings as sparse linear combinations of
learned directions, or "concepts". We find that, compared to other methods of
linear feature learning, SAEs are better at reconstructing the real embeddings,
while also able to retain the most sparsity. Retraining SAEs with different
seeds or different data diet leads to two findings: the rare, specific concepts
captured by the SAEs are liable to change drastically, but we also show that
the key commonly-activating concepts extracted by SAEs are remarkably stable
across runs. Interestingly, while most concepts are strongly unimodal in
activation, we find they are not merely encoding modality per se. Many lie
close to - but not entirely within - the subspace defining modality, suggesting
that they encode cross-modal semantics despite their unimodal usage. To
quantify this bridging behavior, we introduce the Bridge Score, a metric that
identifies concept pairs which are both co-activated across aligned image-text
inputs and geometrically aligned in the shared space. This reveals that even
unimodal concepts can collaborate to support cross-modal integration. We
release interactive demos of the SAEs for all models, allowing researchers to
explore the organization of the concept spaces. Overall, our findings uncover a
sparse linear structure within VLM embedding spaces that is shaped by modality,
yet stitched together through latent bridges-offering new insight into how
multimodal meaning is constructed.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 01:40:06 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Papadimitriou",
"Isabel",
""
],
[
"Su",
"Huangyuan",
""
],
[
"Fel",
"Thomas",
""
],
[
"Saphra",
"Naomi",
""
],
[
"Kakade",
"Sham",
""
],
[
"Gil",
"Stephanie",
""
]
] |
2504.11696 | Kuiyuan Ding | Kuiyuan Ding, Caili Guo, Yang Yang, Wuxia Hu and Yonina C. Eldar | A New Paradigm of User-Centric Wireless Communication Driven by Large
Language Models | 8 pages, 5 figures | null | null | null | cs.NI cs.IR cs.SY eess.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The next generation of wireless communications seeks to deeply integrate
artificial intelligence (AI) with user-centric communication networks, with the
goal of developing AI-native networks that more accurately address user
requirements. The rapid development of large language models (LLMs) offers
significant potential in realizing these goals. However, existing efforts that
leverage LLMs for wireless communication often overlook the considerable gap
between human natural language and the intricacies of real-world communication
systems, thus failing to fully exploit the capabilities of LLMs. To address
this gap, we propose a novel LLM-driven paradigm for wireless communication
that innovatively incorporates the nature language to structured query language
(NL2SQL) tool. Specifically, in this paradigm, user personal requirements is
the primary focus. Upon receiving a user request, LLMs first analyze the user
intent in terms of relevant communication metrics and system parameters.
Subsequently, a structured query language (SQL) statement is generated to
retrieve the specific parameter values from a high-performance real-time
database. We further utilize LLMs to formulate and solve an optimization
problem based on the user request and the retrieved parameters. The solution to
this optimization problem then drives adjustments in the communication system
to fulfill the user's requirements. To validate the feasibility of the proposed
paradigm, we present a prototype system. In this prototype, we consider
user-request centric semantic communication (URC-SC) system in which a dynamic
semantic representation network at the physical layer adapts its encoding depth
to meet user requirements. Additionally, two LLMs are employed to analyze user
requests and generate SQL statements, respectively. Simulation results
demonstrate the effectiveness.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 01:43:36 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Ding",
"Kuiyuan",
""
],
[
"Guo",
"Caili",
""
],
[
"Yang",
"Yang",
""
],
[
"Hu",
"Wuxia",
""
],
[
"Eldar",
"Yonina C.",
""
]
] |
2504.11697 | Shunlin Huang | Shunlin Huang, Peng Wang, Yilin Xu, Jun Liu, and Ruxin Li | Fractional spatiotemporal optical vortices | null | null | null | null | physics.optics quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Spatiotemporal optical vortices (STOVs) with spiral phase in the space-time
domain, which carry intrinsic transverse orbital angular momentum (OAM),
introduce a new degree of freedom to light beams and exhibit unique properties.
While integer and fractional spatial vortices have been extensively studied and
widely applied, and research on integer STOVs have grown prosperously,
fractional STOVs (FSTOVs), classified as STOVs with fractional spiral phases
are rarely explored due to the challenges in characterizing rapidly varying
spatiotemporal phases. Furthermore, approaches for the rapid recognition of
FSTOVs are lacking. Herein, we experimentally and theoretically demonstrate the
generation of FSTOVs in the far field. The generation, evolution, and
diffraction rules of FSTOVs are revealed. Furthermore, a self-referential
method for the rapid recognition of FSTOVs based on the energy ratio between
the two end lobes of their diffraction patterns is proposed. This work will
promote the development of the theory of light with transverse OAM, and open
new opportunities for the applications of STOV, such as STOV-based optical
communication and quantum information.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 01:47:39 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Huang",
"Shunlin",
""
],
[
"Wang",
"Peng",
""
],
[
"Xu",
"Yilin",
""
],
[
"Liu",
"Jun",
""
],
[
"Li",
"Ruxin",
""
]
] |
2504.11698 | Xingwu Ji | Xingwu Ji, Haochen Niu, Dexin Duan, Rendong Ying, Fei Wen, Peilin Liu | An Online Adaptation Method for Robust Depth Estimation and Visual
Odometry in the Open World | 11 pages, 14 figures | null | null | null | cs.RO cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, learning-based robotic navigation systems have gained extensive
research attention and made significant progress. However, the diversity of
open-world scenarios poses a major challenge for the generalization of such
systems to practical scenarios. Specifically, learned systems for scene
measurement and state estimation tend to degrade when the application scenarios
deviate from the training data, resulting to unreliable depth and pose
estimation. Toward addressing this problem, this work aims to develop a visual
odometry system that can fast adapt to diverse novel environments in an online
manner. To this end, we construct a self-supervised online adaptation framework
for monocular visual odometry aided by an online-updated depth estimation
module. Firstly, we design a monocular depth estimation network with
lightweight refiner modules, which enables efficient online adaptation. Then,
we construct an objective for self-supervised learning of the depth estimation
module based on the output of the visual odometry system and the contextual
semantic information of the scene. Specifically, a sparse depth densification
module and a dynamic consistency enhancement module are proposed to leverage
camera poses and contextual semantics to generate pseudo-depths and valid masks
for the online adaptation. Finally, we demonstrate the robustness and
generalization capability of the proposed method in comparison with
state-of-the-art learning-based approaches on urban, in-house datasets and a
robot platform. Code is publicly available at:
https://github.com/jixingwu/SOL-SLAM.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 01:48:10 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Ji",
"Xingwu",
""
],
[
"Niu",
"Haochen",
""
],
[
"Duan",
"Dexin",
""
],
[
"Ying",
"Rendong",
""
],
[
"Wen",
"Fei",
""
],
[
"Liu",
"Peilin",
""
]
] |
2504.11699 | Rui Xue | Rui Xue, Tianfu Wu | H$^3$GNNs: Harmonizing Heterophily and Homophily in GNNs via Joint
Structural Node Encoding and Self-Supervised Learning | null | null | null | null | cs.LG cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Graph Neural Networks (GNNs) struggle to balance heterophily and homophily in
representation learning, a challenge further amplified in self-supervised
settings. We propose H$^3$GNNs, an end-to-end self-supervised learning
framework that harmonizes both structural properties through two key
innovations: (i) Joint Structural Node Encoding. We embed nodes into a unified
space combining linear and non-linear feature projections with K-hop structural
representations via a Weighted Graph Convolution Network(WGCN). A
cross-attention mechanism enhances awareness and adaptability to heterophily
and homophily. (ii) Self-Supervised Learning Using Teacher-Student Predictive
Architectures with Node-Difficulty Driven Dynamic Masking Strategies. We use a
teacher-student model, the student sees the masked input graph and predicts
node features inferred by the teacher that sees the full input graph in the
joint encoding space. To enhance learning difficulty, we introduce two novel
node-predictive-difficulty-based masking strategies. Experiments on seven
benchmarks (four heterophily datasets and three homophily datasets) confirm the
effectiveness and efficiency of H$^3$GNNs across diverse graph types. Our
H$^3$GNNs achieves overall state-of-the-art performance on the four heterophily
datasets, while retaining on-par performance to previous state-of-the-art
methods on the three homophily datasets.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 01:51:25 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Xue",
"Rui",
""
],
[
"Wu",
"Tianfu",
""
]
] |
2504.11700 | Xiao-Dong Cao | Xiao-Dong Cao and Chao-Jiang Xu and Yan Xu | The Gevrey Gelfand-Shilov regularizing effect of the Landau equation
with soft potential | 26 pages | null | null | null | math.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper studies the Cauchy problem for the spatially inhomogeneous Landau
equation with soft potential in the perturbative framework around the
Maxwellian distribution. Under a smallness assumption on the initial datum with
exponential decay in the velocity variable, we establish the optimal Gevrey
Gelfand-Shilov regularizing effect for the solution to the Cauchy problem.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 01:53:13 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Cao",
"Xiao-Dong",
""
],
[
"Xu",
"Chao-Jiang",
""
],
[
"Xu",
"Yan",
""
]
] |
2504.11701 | Yaohui Fang | Yaohui Fang and Xingce Wang | Non-uniform Point Cloud Upsampling via Local Manifold Distribution | null | null | null | null | cs.CV math.DG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Existing learning-based point cloud upsampling methods often overlook the
intrinsic data distribution charac?teristics of point clouds, leading to
suboptimal results when handling sparse and non-uniform point clouds. We
propose a novel approach to point cloud upsampling by imposing constraints from
the perspective of manifold distributions. Leveraging the strong fitting
capability of Gaussian functions, our method employs a network to iteratively
optimize Gaussian components and their weights, accurately representing local
manifolds. By utilizing the probabilistic distribution properties of Gaussian
functions, we construct a unified statistical manifold to impose distribution
constraints on the point cloud. Experimental results on multiple datasets
demonstrate that our method generates higher-quality and more uniformly
distributed dense point clouds when processing sparse and non-uniform inputs,
outperforming state-of-the-art point cloud upsampling techniques.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 01:54:33 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Fang",
"Yaohui",
""
],
[
"Wang",
"Xingce",
""
]
] |
2504.11702 | Dorottya Zelenyanszki | Dorottya Zelenyanszki, Zhe Hou, Kamanashis Biswas, Vallipuram
Muthukkumarasamy | Clustering and analysis of user behaviour in blockchain: A case study of
Planet IX | 15 pages, 8 figures, submitted to Blockchain: Research and
Applications | null | null | null | cs.LG cs.CR | http://creativecommons.org/licenses/by/4.0/ | Decentralised applications (dApps) that run on public blockchains have the
benefit of trustworthiness and transparency as every activity that happens on
the blockchain can be publicly traced through the transaction data. However,
this introduces a potential privacy problem as this data can be tracked and
analysed, which can reveal user-behaviour information. A user behaviour
analysis pipeline was proposed to present how this type of information can be
extracted and analysed to identify separate behavioural clusters that can
describe how users behave in the game. The pipeline starts with the collection
of transaction data, involving smart contracts, that is collected from a
blockchain-based game called Planet IX. Both the raw transaction information
and the transaction events are considered in the data collection. From this
data, separate game actions can be formed and those are leveraged to present
how and when the users conducted their in-game activities in the form of user
flows. An extended version of these user flows also presents how the
Non-Fungible Tokens (NFTs) are being leveraged in the user actions. The latter
is given as input for a Graph Neural Network (GNN) model to provide graph
embeddings for these flows which then can be leveraged by clustering algorithms
to cluster user behaviours into separate behavioural clusters. We benchmark and
compare well-known clustering algorithms as a part of the proposed method. The
user behaviour clusters were analysed and visualised in a graph format. It was
found that behavioural information can be extracted regarding the users that
belong to these clusters. Such information can be exploited by malicious users
to their advantage. To demonstrate this, a privacy threat model was also
presented based on the results that correspond to multiple potentially affected
areas.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 01:57:33 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Zelenyanszki",
"Dorottya",
""
],
[
"Hou",
"Zhe",
""
],
[
"Biswas",
"Kamanashis",
""
],
[
"Muthukkumarasamy",
"Vallipuram",
""
]
] |
2504.11703 | Tianneng Shi | Tianneng Shi, Jingxuan He, Zhun Wang, Linyu Wu, Hongwei Li, Wenbo Guo,
Dawn Song | Progent: Programmable Privilege Control for LLM Agents | null | null | null | null | cs.CR cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | LLM agents are an emerging form of AI systems where large language models
(LLMs) serve as the central component, utilizing a diverse set of tools to
complete user-assigned tasks. Despite their great potential, LLM agents pose
significant security risks. When interacting with the external world, they may
encounter malicious commands from attackers, leading to the execution of
dangerous actions. A promising way to address this is by enforcing the
principle of least privilege: allowing only essential actions for task
completion while blocking unnecessary ones. However, achieving this is
challenging, as it requires covering diverse agent scenarios while preserving
both security and utility.
We introduce Progent, the first privilege control mechanism for LLM agents.
At its core is a domain-specific language for flexibly expressing privilege
control policies applied during agent execution. These policies provide
fine-grained constraints over tool calls, deciding when tool calls are
permissible and specifying fallbacks if they are not. This enables agent
developers and users to craft suitable policies for their specific use cases
and enforce them deterministically to guarantee security. Thanks to its modular
design, integrating Progent does not alter agent internals and requires only
minimal changes to agent implementation, enhancing its practicality and
potential for widespread adoption. To automate policy writing, we leverage LLMs
to generate policies based on user queries, which are then updated dynamically
for improved security and utility. Our extensive evaluation shows that it
enables strong security while preserving high utility across three distinct
scenarios or benchmarks: AgentDojo, ASB, and AgentPoison. Furthermore, we
perform an in-depth analysis, showcasing the effectiveness of its core
components and the resilience of its automated policy generation against
adaptive attacks.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 01:58:40 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Shi",
"Tianneng",
""
],
[
"He",
"Jingxuan",
""
],
[
"Wang",
"Zhun",
""
],
[
"Wu",
"Linyu",
""
],
[
"Li",
"Hongwei",
""
],
[
"Guo",
"Wenbo",
""
],
[
"Song",
"Dawn",
""
]
] |
2504.11704 | Marina Danilevsky | Marina Danilevsky, Kristjan Greenewald, Chulaka Gunasekara, Maeda
Hanafi, Lihong He, Yannis Katsis, Krishnateja Killamsetty, Yatin Nandwani,
Lucian Popa, Dinesh Raghu, Frederick Reiss, Vraj Shah, Khoi-Nguyen Tran,
Huaiyu Zhu, Luis Lastras | A Library of LLM Intrinsics for Retrieval-Augmented Generation | null | null | null | null | cs.AI | http://creativecommons.org/licenses/by/4.0/ | In the developer community for large language models (LLMs), there is not yet
a clean pattern analogous to a software library, to support very large scale
collaboration. Even for the commonplace use case of Retrieval-Augmented
Generation (RAG), it is not currently possible to write a RAG application
against a well-defined set of APIs that are agreed upon by different LLM
providers. Inspired by the idea of compiler intrinsics, we propose some
elements of such a concept through introducing a library of LLM Intrinsics for
RAG. An LLM intrinsic is defined as a capability that can be invoked through a
well-defined API that is reasonably stable and independent of how the LLM
intrinsic itself is implemented. The intrinsics in our library are released as
LoRA adapters on HuggingFace, and through a software interface with clear
structured input/output characteristics on top of vLLM as an inference
platform, accompanied in both places with documentation and code. This article
describes the intended usage, training details, and evaluations for each
intrinsic, as well as compositions of multiple intrinsics.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 02:02:22 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Danilevsky",
"Marina",
""
],
[
"Greenewald",
"Kristjan",
""
],
[
"Gunasekara",
"Chulaka",
""
],
[
"Hanafi",
"Maeda",
""
],
[
"He",
"Lihong",
""
],
[
"Katsis",
"Yannis",
""
],
[
"Killamsetty",
"Krishnateja",
""
],
[
"Nandwani",
"Yatin",
""
],
[
"Popa",
"Lucian",
""
],
[
"Raghu",
"Dinesh",
""
],
[
"Reiss",
"Frederick",
""
],
[
"Shah",
"Vraj",
""
],
[
"Tran",
"Khoi-Nguyen",
""
],
[
"Zhu",
"Huaiyu",
""
],
[
"Lastras",
"Luis",
""
]
] |
2504.11705 | Adriano D'Alessandro | Adriano D'Alessandro, Ali Mahdavi-Amiri and Ghassan Hamarneh | Learning What NOT to Count | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Few/zero-shot object counting methods reduce the need for extensive
annotations but often struggle to distinguish between fine-grained categories,
especially when multiple similar objects appear in the same scene. To address
this limitation, we propose an annotation-free approach that enables the
seamless integration of new fine-grained categories into existing few/zero-shot
counting models. By leveraging latent generative models, we synthesize
high-quality, category-specific crowded scenes, providing a rich training
source for adapting to new categories without manual labeling. Our approach
introduces an attention prediction network that identifies fine-grained
category boundaries trained using only synthetic pseudo-annotated data. At
inference, these fine-grained attention estimates refine the output of existing
few/zero-shot counting networks. To benchmark our method, we further introduce
the FGTC dataset, a taxonomy-specific fine-grained object counting dataset for
natural images. Our method substantially enhances pre-trained state-of-the-art
models on fine-grained taxon counting tasks, while using only synthetic data.
Code and data to be released upon acceptance.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 02:05:47 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"D'Alessandro",
"Adriano",
""
],
[
"Mahdavi-Amiri",
"Ali",
""
],
[
"Hamarneh",
"Ghassan",
""
]
] |
2504.11706 | Ralihe R. Villagr\'an | Carlos A. Alfaro, Teresa I. Hoekstra-Mendoza, Juan Pablo Serrano and
Ralihe R. Villagr\'an | The characterization of graphs with two trivial distance ideals | null | null | null | null | math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The distance ideals of graphs are algebraic invariants that generalize the
Smith normal form (SNF) and the spectrum of several distance matrices
associated with a graph. In general, distance ideals are not monotone under
taking induced subgraphs. However, in [7] the characterizations of connected
graphs with one trivial distance ideal over $\mathbb{Z}[X]$ and over
$\mathbb{Q}[X]$ were obtained in terms of induced subgraphs, where $X$ is a set
of variables indexed by the vertices. Later, in [3], the first attempt was made
to characterize the family of connected graphs with at most two trivial
distance ideals over $\mathbb{Z}[X]$. There, it was proven that these graphs
are $\{ \mathcal {F},\textsf{odd-holes}_{7}\}$-free, where
$\textsf{odd-holes}_{7}$ consists of the odd cycles of length at least seven
and $\mathcal{F}$ is a set of sixteen graphs. Here, we give a characterization
of the $\{\mathcal{F},\textsf{odd-holes}_{7}\}$-free graphs and prove that the
$\{\mathcal{F},\textsf{odd-holes}_{7}\}$-free graphs are precisely the graphs
with at most two trivial distance ideals over $\mathbb{Z}[X]$. As byproduct, we
also find that the determinant of the distance matrix of a connected bipartite
graph is even, this suggests that it is possible to extend, to connected
bipartite graphs, the Graham-Pollak-Lov\'asz celebrated formula
$\det(D(T_{n+1}))=(-1)^nn2^{n-1}$, and the Hou-Woo result stating that
$\text{SNF}(D(T_{n+1}))=\textsf{I}_2\oplus 2\textsf{I}_{n-2}\oplus (2n)$, for
any tree $T_{n+1}$ with $n+1$ vertices. Finally, we also give the
characterizations of graphs with at most two trivial distance ideals over
$\mathbb{Q}[X]$, and the graphs with at most two trivial distance univariate
ideals.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 02:09:44 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Alfaro",
"Carlos A.",
""
],
[
"Hoekstra-Mendoza",
"Teresa I.",
""
],
[
"Serrano",
"Juan Pablo",
""
],
[
"Villagrán",
"Ralihe R.",
""
]
] |
2504.11707 | Muhammad Shahid Muneer | Muhammad Shahid Muneer, Simon S. Woo | Towards Safe Synthetic Image Generation On the Web: A Multimodal Robust
NSFW Defense and Million Scale Dataset | Short Paper The Web Conference | null | 10.1145/3701716.3715526 | null | cs.CV cs.AI | http://creativecommons.org/licenses/by/4.0/ | In the past years, we have witnessed the remarkable success of Text-to-Image
(T2I) models and their widespread use on the web. Extensive research in making
T2I models produce hyper-realistic images has led to new concerns, such as
generating Not-Safe-For-Work (NSFW) web content and polluting the web society.
To help prevent misuse of T2I models and create a safer web environment for
users features like NSFW filters and post-hoc security checks are used in these
models. However, recent work unveiled how these methods can easily fail to
prevent misuse. In particular, adversarial attacks on text and image modalities
can easily outplay defensive measures. %Exploiting such leads to the growing
concern of preventing adversarial attacks on text and image modalities.
Moreover, there is currently no robust multimodal NSFW dataset that includes
both prompt and image pairs and adversarial examples. This work proposes a
million-scale prompt and image dataset generated using open-source diffusion
models. Second, we develop a multimodal defense to distinguish safe and NSFW
text and images, which is robust against adversarial attacks and directly
alleviates current challenges. Our extensive experiments show that our model
performs well against existing SOTA NSFW detection methods in terms of accuracy
and recall, drastically reducing the Attack Success Rate (ASR) in multimodal
adversarial attack scenarios. Code:
https://github.com/shahidmuneer/multimodal-nsfw-defense.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 02:10:42 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Muneer",
"Muhammad Shahid",
""
],
[
"Woo",
"Simon S.",
""
]
] |
2504.11709 | Junyong Shin | Junyong Shin, Yongjeong Oh, Jinsung Park, Joohyuk Park, Yo-Seb Jeon | ESC-MVQ: End-to-End Semantic Communication With Multi-Codebook Vector
Quantization | null | null | null | null | eess.SP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes a novel end-to-end digital semantic communication
framework based on multi-codebook vector quantization (VQ), referred to as
ESC-MVQ. Unlike prior approaches that rely on end-to-end training with a
specific power or modulation scheme, often under a particular channel
condition, ESC-MVQ models a channel transfer function as parallel binary
symmetric channels (BSCs) with trainable bit-flip probabilities. Building on
this model, ESC-MVQ jointly trains multiple VQ codebooks and their associated
bit-flip probabilities with a single encoder-decoder pair. To maximize
inference performance when deploying ESC-MVQ in digital communication systems,
we devise an optimal communication strategy that jointly optimizes codebook
assignment, adaptive modulation, and power allocation. To this end, we develop
an iterative algorithm that selects the most suitable VQ codebook for semantic
features and flexibly allocates power and modulation schemes across the
transmitted symbols. Simulation results demonstrate that ESC-MVQ, using a
single encoder-decoder pair, outperforms existing digital semantic
communication methods in both performance and memory efficiency, offering a
scalable and adaptive solution for realizing digital semantic communication in
diverse channel conditions.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 02:12:57 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Shin",
"Junyong",
""
],
[
"Oh",
"Yongjeong",
""
],
[
"Park",
"Jinsung",
""
],
[
"Park",
"Joohyuk",
""
],
[
"Jeon",
"Yo-Seb",
""
]
] |
2504.11710 | Michael Barnsley | Michael F. Barnsley and Corey de Wit | Tilings from Tops of Overlapping Iterated Function Systems | null | null | null | null | math.DS | http://creativecommons.org/licenses/by/4.0/ | The top of the attractor $A$ of a hyperbolic iterated function system
$\left\{ f_{i}:\mathbb{R}^{n}\rightarrow\mathbb{R}^{n}|i=1,2,\dots,M\right\} $
is defined and used to extend self-similar tilings to overlapping systems. The
theory interprets expressions of the form
$\lim_{k\rightarrow\infty}f_{j_{1}}^{-1}f_{j_{2}}^{-1}\dots f_{j_{k}}
^{-1}(\left\{ top(f_{i_{1}}f_{i_{2}}\dots f_{i_{k+1}}(A))|i_{1}i_{2}\dots
i_{k+1}\in\{1,2,\dots,M\}^{k+1}\right\} )$ to yield tilings of
$\mathbb{R}^{n}$. Examples include systems of finite type, tilings related to
aperiodic monotiles, and ones where there are infinitely many distinct but
related prototiles.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 02:16:39 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Barnsley",
"Michael F.",
""
],
[
"de Wit",
"Corey",
""
]
] |
2504.11712 | Umananda Dev Goswami | Swaraj Pratim Sarmah and Umananda Dev Goswami | Ultra-high energy cosmic rays with UFA-15 source model in Bumblebee
gravity theory | 17 pages, 12 figures | null | null | null | astro-ph.HE | http://creativecommons.org/licenses/by/4.0/ | We explore the effects of Bumblebee gravity on the propagation of ultra-high
energy cosmic rays (UHECRs) using astrophysical sources modeled in the
Unger-Farrar-Anchordoqui (UFA) framework (2015), which includes star formation
rate (SFR), gamma-ray bursts (GRBs), and active galactic nuclei (AGN). We
compute the density enhancement factor for various source separation distances
($d_\text{s}$s) up to 100 Mpc within the Bumblebee gravity scenario.
Additionally, we calculate the CRs flux and their suppression, comparing the
results with observational data from the Pierre Auger Observatory (PAO) and the
Telescope Array through $\chi^2$ and $\chi_\text{red}^2$ analysis for the flux
and Levenberg-Marquardt algorithm for suppression. The anisotropy in CRs
arrival directions is examined, with corresponding $\chi^2$ and
$\chi_\text{red}^2$ values obtained from the PAO surface detector data (SD 750
and SD 1500). Finally, we present skymaps of flux and anisotropy under
different model assumptions, providing insights into the observational
signatures of UHECRs in Bumblebee gravity. Our results show that increasing the
Bumblebee gravity parameter $l$ enhances the density factor $\xi$, particularly
at low energies, highlighting Lorentz violation's impact on CRs' propagation.
Larger $d_\text{s}$ values amplify deviations from the $\Lambda$CDM model, with
AGN sources dominating at high energies and GRB/SFR sources at lower energies.
The skymaps indicate the structured flux patterns at large $d_\text{s}$ and
structured anisotropy at higher energies.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 02:17:30 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Sarmah",
"Swaraj Pratim",
""
],
[
"Goswami",
"Umananda Dev",
""
]
] |
2504.11714 | Karthik Shivashankar | Karthik Shivashankar, Antonio Martini | Unravelling Technical debt topics through Time, Programming Languages
and Repository | null | null | null | null | cs.SE cs.LG | http://creativecommons.org/licenses/by/4.0/ | This study explores the dynamic landscape of Technical Debt (TD) topics in
software engineering by examining its evolution across time, programming
languages, and repositories. Despite the extensive research on identifying and
quantifying TD, there remains a significant gap in understanding the diversity
of TD topics and their temporal development. To address this, we have conducted
an explorative analysis of TD data extracted from GitHub issues spanning from
2015 to September 2023. We employed BERTopic for sophisticated topic modelling.
This study categorises the TD topics and tracks their progression over time.
Furthermore, we have incorporated sentiment analysis for each identified topic,
providing a deeper insight into the perceptions and attitudes associated with
these topics. This offers a more nuanced understanding of the trends and shifts
in TD topics through time, programming language, and repository.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 02:20:56 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Shivashankar",
"Karthik",
""
],
[
"Martini",
"Antonio",
""
]
] |
2504.11715 | Frederic Latremoliere | Carla Farsi and Frederic Latremoliere | Continuity for the spectral propinquity of the Dirac operators
associated with an analytic path of Riemannian metrics | 15 pages | null | null | null | math.OA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We prove that a polynomial path of Riemannian metrics on a closed spin
manifold induces a continuous field in the spectral propinquity of metric
spectral triples.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 02:34:00 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Farsi",
"Carla",
""
],
[
"Latremoliere",
"Frederic",
""
]
] |
2504.11716 | Nityanand Rai | Nityanand Rai | A Technical Survey of Sparse Linear Solvers in Electronic Design
Automation | null | null | null | null | math.NA cs.NA cs.PF | http://creativecommons.org/licenses/by/4.0/ | Sparse linear system solvers ($Ax=b$) are critical computational kernels in
Electronic Design Automation (EDA), underpinning vital simulations for modern
IC and system design. Applications like power integrity verification and
electrothermal analysis fundamentally solve large-scale, sparse algebraic
systems from Modified Nodal Analysis (MNA) or Finite Element/Volume Method
(FEM/FVM) discretizations of PDEs. Problem dimensions routinely reach
$10^6-10^9$ unknowns, escalating towards $10^{10}$+ for full-chip power grids
\cite{Tsinghua21}, demanding stringent solver scalability, low memory
footprint, and efficiency. This paper surveys predominant sparse solver
paradigms in EDA: direct factorization methods (LU, Cholesky), iterative Krylov
subspace methods (CG, GMRES, BiCGSTAB), and multilevel multigrid techniques. We
examine their mathematical foundations, convergence, conditioning sensitivity,
implementation aspects (storage formats CSR/CSC, fill-in mitigation via
reordering), the critical role of preconditioning for ill-conditioned systems
\cite{SaadIterative, ComparisonSolversArxiv}, and multigrid's potential optimal
$O(N)$ complexity \cite{TrottenbergMG}. Solver choice critically depends on the
performance impact of frequent matrix updates (e.g., transient/non-linear),
where iterative/multigrid methods often amortize costs better than direct
methods needing repeated factorization \cite{SaadIterative}. We analyze
trade-offs in runtime complexity, memory needs, numerical robustness, parallel
scalability (MPI, OpenMP, GPU), and precision (FP32/FP64). Integration into EDA
tools for system-level multiphysics is discussed, with pseudocode
illustrations. The survey concludes by emphasizing the indispensable nature and
ongoing evolution of sparse solvers for designing and verifying complex
electronic systems.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 02:34:21 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Rai",
"Nityanand",
""
]
] |
2504.11718 | Selim Sukhtaiev | Fritz Gesztesy and Selim Sukhtaiev | Some Remarks On Krein--von Neumann Extensions | arXiv admin note: substantial text overlap with arXiv:1203.5713 | null | null | null | math.SP | http://creativecommons.org/licenses/by/4.0/ | We survey various properties of Krein--von Neumann extensions $S_K$ and the
reduced Krein--von Neumann operator $\hatt S_K$ in connection with a strictly
positive (symmetric) operator $S$ with nonzero deficiency indices. In
particular, we focus on the resolvents of $S_K$ and $\hatt S_K$ and of the
trace ideal properties of the resolvent of $\hatt S_K$, and make some
comparisons with the corresponding properties of the resolvent of the
Friedrichs extension $S_F$. We also recall a parametrization of all nonnegative
self-adjoint extensions of $S$ and various Krein-type resolvent formulas for
any two relatively prime self-adjoint extensions of $S$, utilizing a
Donoghue-type $M$-operator (i.e., an energy parameter dependent
Dirichlet-to-Neumann-type map).
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 02:42:58 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Gesztesy",
"Fritz",
""
],
[
"Sukhtaiev",
"Selim",
""
]
] |
2504.11719 | Chao Zhang | Ying Li and Chao Zhang | Equivalence between Superharmonic functions and renormalized solutions
for the equations with $(p, q)$-growth | null | null | null | null | math.AP | http://creativecommons.org/licenses/by/4.0/ | We establish the equivalence between superharmonic functions and locally
renormalized solutions for the elliptic measure data problems with $(p,
q)$-growth. By showing that locally renormalized solutions are essentially
bounded below and using Wolff potential estimates, we extend the results of [T.
Kilpel\"{a}inen, T. Kuusi, A. Tuhola-Kujanp\"{a}\"{a}, Superharmonic functions
are locally renormalized solutions, Ann. Inst. H. Poincar\'{e} C Anal. Non
Lin\'{e}aire, 2011] to a broader class of problems. Our work provides the first
equivalence result between locally renormalized solutions and superharmonic
functions for the nonstandard growth equations.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 02:44:48 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Li",
"Ying",
""
],
[
"Zhang",
"Chao",
""
]
] |
2504.11720 | Nicholas Pritchard | Nicholas J. Pritchard, Andreas Wicenec, Richard Dodson and Mohammed
Bennamoun | Polarisation-Inclusive Spiking Neural Networks for Real-Time RFI
Detection in Modern Radio Telescopes | 4 pages, 4 tables, accepted at URSI AP-RASC 2025 | null | null | null | cs.NE astro-ph.IM | http://creativecommons.org/licenses/by/4.0/ | Radio Frequency Interference (RFI) is a known growing challenge for radio
astronomy, intensified by increasing observatory sensitivity and prevalence of
orbital RFI sources. Spiking Neural Networks (SNNs) offer a promising solution
for real-time RFI detection by exploiting the time-varying nature of radio
observation and neuron dynamics together. This work explores the inclusion of
polarisation information in SNN-based RFI detection, using simulated data from
the Hydrogen Epoch of Reionisation Array (HERA) instrument and provides power
usage estimates for deploying SNN-based RFI detection on existing neuromorphic
hardware. Preliminary results demonstrate state-of-the-art detection accuracy
and highlight possible extensive energy-efficiency gains.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 02:45:00 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Pritchard",
"Nicholas J.",
""
],
[
"Wicenec",
"Andreas",
""
],
[
"Dodson",
"Richard",
""
],
[
"Bennamoun",
"Mohammed",
""
]
] |
2504.11721 | Pavel Shevchenko V | Daisuke Murakami, Pavel V. Shevchenko, Tomoko Matsui, Aleksandar
Arandjelovi\'c, Tor A. Myrvoll | Climate-economy projections under shared socioeconomic pathways and
net-zero scenarios | null | null | null | null | econ.GN q-fin.EC | http://creativecommons.org/licenses/by/4.0/ | We examine future trajectories of the social cost of carbon, global
temperatures, and carbon concentrations using the cost-benefit Dynamic
Integrated Climate-Economy (DICE) model calibrated to the five Shared
Socioeconomic Pathways (SSPs) under two mitigation scenarios: achieving
net-zero carbon emissions by 2050 and by 2100. The DICE model is calibrated to
align industrial and land-use carbon emissions with projections from six
leading process-based integrated assessment models (IAMs): IMAGE,
MESSAGE--GLOBIOM, AIM/CGE, GCAM, REMIND--MAgPIE and WITCH--GLOBIOM. We find
that even with aggressive mitigation (net-zero by 2050), global temperatures
are projected to exceed $2^\circ\text{C}$ above preindustrial levels by 2100,
with estimates ranging from $2.5^\circ\text{C}$ to $2.7^\circ\text{C}$ across
all SSPs and IAMs considered. Under the more lenient mitigation scenario
(net-zero by 2100), global temperatures are projected to rise to between
$3^\circ\text{C}$ and $3.7^\circ\text{C}$ by 2100. Additionally, the social
cost of carbon is estimated to increase from approximately USD 30--50 in 2025
to USD 250--400 in 2100.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 02:48:18 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Murakami",
"Daisuke",
""
],
[
"Shevchenko",
"Pavel V.",
""
],
[
"Matsui",
"Tomoko",
""
],
[
"Arandjelović",
"Aleksandar",
""
],
[
"Myrvoll",
"Tor A.",
""
]
] |
2504.11722 | He Xu | Siqing Chen, He Xua, Xueyu Zhang, Zhen Ma | Inversion of biological strategies in engineering technology: in case
underwater soft robot | 26 pages, 8 figures | null | null | null | cs.RO | http://creativecommons.org/licenses/by-nc-sa/4.0/ | This paper proposes a biomimetic design framework based on biological
strategy inversion, aiming to systematically map solutions evolved in nature to
the engineering field. By constructing a
"Function-Behavior-Feature-Environment" (F-B-Cs in E) knowledge model, combined
with natural language processing (NLP) and multi-criteria decision-making
methods, it achieves efficient conversion from biological strategies to
engineering solutions. Using underwater soft robot design as a case study, the
effectiveness of the framework in optimizing drive mechanisms, power
distribution, and motion pattern design is verified. This research provides
scalable methodological support for interdisciplinary biomimetic innovation.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 02:48:28 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Chen",
"Siqing",
""
],
[
"Xua",
"He",
""
],
[
"Zhang",
"Xueyu",
""
],
[
"Ma",
"Zhen",
""
]
] |
2504.11723 | Paul Denny | Paul Denny and Viraj Kumar and Stephen MacNeil and James Prather and
Juho Leinonen | Probing the Unknown: Exploring Student Interactions with Probeable
Problems at Scale in Introductory Programming | Accepted at ITiCSE 2025 | null | 10.1145/3724363.3729093 | null | cs.HC cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Introductory programming courses often rely on small code-writing exercises
that have clearly specified problem statements. This limits opportunities for
students to practice how to clarify ambiguous requirements -- a critical skill
in real-world programming. In addition, the emerging capabilities of large
language models (LLMs) to produce code from well-defined specifications may
harm student engagement with traditional programming exercises. This study
explores the use of ``Probeable Problems'', automatically gradable tasks that
have deliberately vague or incomplete specifications. Such problems require
students to submit test inputs, or `probes', to clarify requirements before
implementation. Through analysis of over 40,000 probes in an introductory
course, we identify patterns linking probing behaviors to task success.
Systematic strategies, such as thoroughly exploring expected behavior before
coding, resulted in fewer incorrect code submissions and correlated with course
success. Feedback from nearly 1,000 participants highlighted the challenges and
real-world relevance of these tasks, as well as benefits to critical thinking
and metacognitive skills. Probeable Problems are easy to set up and deploy at
scale, and help students recognize and resolve uncertainties in programming
problems.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 02:50:00 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Denny",
"Paul",
""
],
[
"Kumar",
"Viraj",
""
],
[
"MacNeil",
"Stephen",
""
],
[
"Prather",
"James",
""
],
[
"Leinonen",
"Juho",
""
]
] |
2504.11724 | Zuhuang Chen | Yangyang Si, Ningbo Fan, Yongqi Dong, Zhen Ye, Shiqing Deng, Yijie Li,
Chao Zhou, Qibin Zeng, Lu You, Yimei Zhu, Zhenlin Luo, Sujit Das, Laurent
Bellaiche, Bin Xu, Huajun Liu, Zuhuang Chen | Ideal antiferroelectricity with large digital electrostrain in PbZrO3
epitaxial thin films | 22pages, 5 figures | null | null | null | cond-mat.mtrl-sci physics.app-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Antiferroelectrics exhibit reversible antipolar-polar phase transitions under
electric fields, yielding large electrostrain suitable for electromechanical
devices. Nevertheless, in thin-film form, the antiferroelectric behavior is
often obscured by competing ferroic orders, resulting in slanted hysteresis
loops with undesired remnant polarization, subsequently posing challenges in
obtaining ideal antiferroelectricity and understanding their intrinsic
electrical behavior. Here, atomistic models for controllable
antiferroelectric-ferroelectric phase transition pathways are unveiled along
specific crystallographic directions. Guided by the anisotropic phase
transition and orientation design, we achieved ideal antiferroelectricity with
square double hysteresis loop, large saturated polarization (~60 {\mu}C/cm2),
near-zero remnant polarization, fast response time (~75 ns), and
near-fatigue-free performance (~10^10 cycles) in (111)P-oriented PbZrO3
epitaxial thin films. Moreover, a bipolar and frequency-independent digital
electrostrain (~0.83%) were demonstrated in this architype antiferroelectric
system. In-situ X-ray diffraction studies further reveal that the large digital
electrostrain results from intrinsic field-induced
antiferroelectric-ferroelectric structural transition. This work demonstrates
the anisotropic phase transition mechanism and ideal antiferroelectricity with
large digital electrostrain in antiferroelectric thin films, offering a new
avenue for applications of antiferroelectricity in nanoelectromechanical
systems.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 02:55:31 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Si",
"Yangyang",
""
],
[
"Fan",
"Ningbo",
""
],
[
"Dong",
"Yongqi",
""
],
[
"Ye",
"Zhen",
""
],
[
"Deng",
"Shiqing",
""
],
[
"Li",
"Yijie",
""
],
[
"Zhou",
"Chao",
""
],
[
"Zeng",
"Qibin",
""
],
[
"You",
"Lu",
""
],
[
"Zhu",
"Yimei",
""
],
[
"Luo",
"Zhenlin",
""
],
[
"Das",
"Sujit",
""
],
[
"Bellaiche",
"Laurent",
""
],
[
"Xu",
"Bin",
""
],
[
"Liu",
"Huajun",
""
],
[
"Chen",
"Zuhuang",
""
]
] |
2504.11725 | Scott Dawson | Scott T. M. Dawson, Jaime Prado Zayas, Barbara Lopez-Doriga | Sparsity-promoting methods for isolating dominant linear amplification
mechanisms in wall-bounded flows | 28 pages, 8 figures | null | null | null | physics.flu-dyn | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This work proposes a method to identify and isolate the physical mechanisms
that are responsible for linear energy amplification in fluid flows. This is
achieved by applying a sparsity-promoting methodology to the resolvent form of
the governing equations, solving an optimization problem that balances
retaining the amplification properties of the original operator with minimizing
the number of terms retained in the simplified sparse model. This results in
simplified operators that often have very similar pseudospectral properties as
the original equations. The method is demonstrated on both incompressible and
compressible wall-bounded parallel shear flows, where the results obtained from
the proposed method appear to be consistent with known mechanisms and
simplifying assumptions, such as the lift-up mechanism, and (for the
compressible case) Morkovin's hypothesis and the strong Reynolds analogy. This
provides a framework for the application of this method to problems for which
knowledge of pertinent amplification mechanisms is less established.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 02:59:01 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Dawson",
"Scott T. M.",
""
],
[
"Zayas",
"Jaime Prado",
""
],
[
"Lopez-Doriga",
"Barbara",
""
]
] |
2504.11726 | Yunzhe Li | Yunzhe Li, Facheng Hu, Hongzi Zhu, Shifan Zhang, Liang Zhang, Shan
Chang and Minyi Guo | Saga: Capturing Multi-granularity Semantics from Massive Unlabelled IMU
Data for User Perception | 2025 IEEE 45th International Conference on Distributed Computing
Systems (ICDCS) | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Inertial measurement units (IMUs), have been prevalently used in a wide range
of mobile perception applications such as activity recognition and user
authentication, where a large amount of labelled data are normally required to
train a satisfactory model. However, it is difficult to label micro-activities
in massive IMU data due to the hardness of understanding raw IMU data and the
lack of ground truth. In this paper, we propose a novel fine-grained user
perception approach, called Saga, which only needs a small amount of labelled
IMU data to achieve stunning user perception accuracy. The core idea of Saga is
to first pre-train a backbone feature extraction model, utilizing the rich
semantic information of different levels embedded in the massive unlabelled IMU
data. Meanwhile, for a specific downstream user perception application,
Bayesian Optimization is employed to determine the optimal weights for
pre-training tasks involving different semantic levels. We implement Saga on
five typical mobile phones and evaluate Saga on three typical tasks on three
IMU datasets. Results show that when only using about 100 training samples per
class, Saga can achieve over 90% accuracy of the full-fledged model trained on
over ten thousands training samples with no additional system overhead.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 03:03:42 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Li",
"Yunzhe",
""
],
[
"Hu",
"Facheng",
""
],
[
"Zhu",
"Hongzi",
""
],
[
"Zhang",
"Shifan",
""
],
[
"Zhang",
"Liang",
""
],
[
"Chang",
"Shan",
""
],
[
"Guo",
"Minyi",
""
]
] |
2504.11727 | Ronan Smith | Ronan Smith, Gregor Bortsnar, Vittorio Di Trapani, Ginevra Lautizi,
Ludovic Broche, Lukas Helfen, Daniel Bull, Richard Boardman, S. Mark
Spearing, Ian Sinclair, Mark Mavrogordato, and Pierre Thibault | Contrast Enhancement of Barely Visible Impact Damage using Speckle-Based
Dark-Field Radiography | null | null | null | null | physics.app-ph | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Barely visible impact damage (BVID) can cause serious issue for composite
structures, due to sub-surface damage seriously reducing the strength of the
material without showing easily detectable surface signs. Dark-field imaging
measures ultra-small angle scattering caused by microscopic features within
samples. It is sensitive to damage in composite materials which would otherwise
be invisible in conventional radiography. Here we demonstrate BVID detection
with speckle-based dark-field imaging, a technique requiring only sandpaper (to
create the speckle-pattern) in addition to a conventional X-ray imaging setup
to extract the dark-field imaging. We demonstrate that the technique is capable
of detecting both matrix cracking and delaminations by imaging materials
susceptible to these failure mechanisms.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 03:04:16 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Smith",
"Ronan",
""
],
[
"Bortsnar",
"Gregor",
""
],
[
"Di Trapani",
"Vittorio",
""
],
[
"Lautizi",
"Ginevra",
""
],
[
"Broche",
"Ludovic",
""
],
[
"Helfen",
"Lukas",
""
],
[
"Bull",
"Daniel",
""
],
[
"Boardman",
"Richard",
""
],
[
"Spearing",
"S. Mark",
""
],
[
"Sinclair",
"Ian",
""
],
[
"Mavrogordato",
"Mark",
""
],
[
"Thibault",
"Pierre",
""
]
] |
2504.11729 | Jason Ning | Jiahong Ning, Pengyan Zhu, Ce Zheng, Gary Lee, Sumei Sun, Tingting
Yang | EdgePrompt: A Distributed Key-Value Inference Framework for LLMs in 6G
Networks | null | null | null | null | eess.SP | http://creativecommons.org/publicdomain/zero/1.0/ | As sixth-generation (6G) networks advance, large language models (LLMs) are
increasingly integrated into 6G infrastructure to enhance network management
and intelligence. However, traditional LLMs architecture struggle to meet the
stringent latency and security requirements of 6G, especially as the increasing
in sequence length leads to greater task complexity. This paper proposes
Edge-Prompt, a cloud-edge collaborative framework based on a hierarchical
attention splicing mechanism. EdgePrompt employs distributed key-value (KV)
pair optimization techniques to accelerate inference and adapt to network
conditions. Additionally, to reduce the risk of data leakage, EdgePrompt
incorporates a privacy preserving strategy by isolating sensitive information
during processing. Experiments on public dataset show that EdgePrompt
effectively improves the inference throughput and reduces the latency, which
provides a reliable solution for LLMs deployment in 6G environments.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 03:07:07 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Ning",
"Jiahong",
""
],
[
"Zhu",
"Pengyan",
""
],
[
"Zheng",
"Ce",
""
],
[
"Lee",
"Gary",
""
],
[
"Sun",
"Sumei",
""
],
[
"Yang",
"Tingting",
""
]
] |
2504.11730 | Hailu Kuang | Bingquan Jin, Hailu Kuang, Xiaoqi Li | Blockchain Application in Metaverse: A Review | 19 pages, 9 figures | null | null | null | cs.CR | http://creativecommons.org/licenses/by/4.0/ | In recent years, the term Metaverse emerged as one of the most compelling
concepts, captivating the interest of international companies such as Tencent,
ByteDance, Microsoft, and Facebook. These company recognized the Metaverse as a
pivotal element for future success and have since made significant investments
in this area. The Metaverse is still in its developmental stages, requiring the
integration and advancement of various technologies to bring its vision to
life. One of the key technologies associated with the Metaverse is blockchain,
known for its decentralization, security, trustworthiness, and ability to
manage time-series data. These characteristics align perfectly with the
ecosystem of the Metaverse, making blockchain foundational for its security and
infrastructure. This paper introduces both blockchain and the Metaverse
ecosystem while exploring the application of the blockchain within the
Metaverse, including decentralization, consensus mechanisms, hash algorithms,
timestamping, smart contracts, distributed storage, distributed ledgers, and
non-fungible tokens (NFTs) to provide insights for researchers investigating
these topics.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 03:07:35 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Jin",
"Bingquan",
""
],
[
"Kuang",
"Hailu",
""
],
[
"Li",
"Xiaoqi",
""
]
] |
2504.11731 | Olivier Shelbaya Dr. | Emma Ghelfi, Alexander Katrusiak, Rick Baartman, Wojtek Fedorko,
Oliver Kester, Giordano Kogler Anele, Olivier Shelbaya, Defne Tanyer | Bayesian Optimization for Ion Beam Centroid Correction | 10 pages, 9 figures, 3 tables. Bayesian optimization applied to ion
beam centroid tuning | null | 10.1063/5.0233169 | null | physics.acc-ph physics.app-ph | http://creativecommons.org/licenses/by/4.0/ | An activity of the TRIUMF automatic beam tuning program, the Bayesian
optimization for Ion Steering, BOIS, method has been developed to perform
corrective centroid steering of beams at the TRIUMF ISAC facility. BOIS
exclusively controls the steerers for centroid correction after the transverse
optics have been set according to theory. The method is fully online, easy to
deploy, and has been tested in low energy and postaccelerated beams at ISAC,
achieving results comparable to human operators. scaleBOIS and boundBOIS are
naive proof of concept solutions to preferably select beam paths with minimal
steering. Repeatable and robust automated steering reduces reliance on operator
expertise and operational overhead, ensuring reliable beam delivery to the
experiments and thereby supporting TRIUMF's scientific mission.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 03:10:54 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Ghelfi",
"Emma",
""
],
[
"Katrusiak",
"Alexander",
""
],
[
"Baartman",
"Rick",
""
],
[
"Fedorko",
"Wojtek",
""
],
[
"Kester",
"Oliver",
""
],
[
"Anele",
"Giordano Kogler",
""
],
[
"Shelbaya",
"Olivier",
""
],
[
"Tanyer",
"Defne",
""
]
] |
2504.11732 | Jilan Xu | Jilan Xu, Yifei Huang, Baoqi Pei, Junlin Hou, Qingqiu Li, Guo Chen,
Yuejie Zhang, Rui Feng, Weidi Xie | EgoExo-Gen: Ego-centric Video Prediction by Watching Exo-centric Videos | ICLR 2025 | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Generating videos in the first-person perspective has broad application
prospects in the field of augmented reality and embodied intelligence. In this
work, we explore the cross-view video prediction task, where given an
exo-centric video, the first frame of the corresponding ego-centric video, and
textual instructions, the goal is to generate futur frames of the ego-centric
video. Inspired by the notion that hand-object interactions (HOI) in
ego-centric videos represent the primary intentions and actions of the current
actor, we present EgoExo-Gen that explicitly models the hand-object dynamics
for cross-view video prediction. EgoExo-Gen consists of two stages. First, we
design a cross-view HOI mask prediction model that anticipates the HOI masks in
future ego-frames by modeling the spatio-temporal ego-exo correspondence. Next,
we employ a video diffusion model to predict future ego-frames using the first
ego-frame and textual instructions, while incorporating the HOI masks as
structural guidance to enhance prediction quality. To facilitate training, we
develop an automated pipeline to generate pseudo HOI masks for both ego- and
exo-videos by exploiting vision foundation models. Extensive experiments
demonstrate that our proposed EgoExo-Gen achieves better prediction performance
compared to previous video prediction models on the Ego-Exo4D and H2O benchmark
datasets, with the HOI masks significantly improving the generation of hands
and interactive objects in the ego-centric videos.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 03:12:39 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Xu",
"Jilan",
""
],
[
"Huang",
"Yifei",
""
],
[
"Pei",
"Baoqi",
""
],
[
"Hou",
"Junlin",
""
],
[
"Li",
"Qingqiu",
""
],
[
"Chen",
"Guo",
""
],
[
"Zhang",
"Yuejie",
""
],
[
"Feng",
"Rui",
""
],
[
"Xie",
"Weidi",
""
]
] |
2504.11734 | Xiang Tang | Xiang Tang, Ruotong Li, Xiaopeng Fan | Recent Advance in 3D Object and Scene Generation: A Survey | 34 pages, 6 figures | null | null | null | cs.GR cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In recent years, the demand for 3D content has grown exponentially with
intelligent upgrading of interactive media, extended reality (XR), and
Metaverse industries. In order to overcome the limitation of traditional manual
modeling approaches, such as labor-intensive workflows and prolonged production
cycles, revolutionary advances have been achieved through the convergence of
novel 3D representation paradigms and artificial intelligence generative
technologies. In this survey, we conduct a systematically review of the
cutting-edge achievements in static 3D object and scene generation, as well as
establish a comprehensive technical framework through systematic
categorization. Specifically, we initiate our analysis with mainstream 3D
object representations, followed by in-depth exploration of two principal
technical pathways in object generation: data-driven supervised learning
methods and deep generative model-based approaches. Regarding scene generation,
we focus on three dominant paradigms: layout-guided compositional synthesis, 2D
prior-based scene generation, and rule-driven modeling. Finally, we critically
examine persistent challenges in 3D generation and propose potential research
directions for future investigation. This survey aims to provide readers with a
structured understanding of state-of-the-art 3D generation technologies while
inspiring researchers to undertake more exploration in this domain.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 03:22:06 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Tang",
"Xiang",
""
],
[
"Li",
"Ruotong",
""
],
[
"Fan",
"Xiaopeng",
""
]
] |
2504.11735 | Ningyu He | Xiaohui Hu, Ningyu He, Haoyu Wang | WalletProbe: A Testing Framework for Browser-based Cryptocurrency Wallet
Extensions | null | null | null | null | cs.CR | http://creativecommons.org/licenses/by/4.0/ | Serving as the first touch point for users to the cryptocurrency world,
cryptocurrency wallets allow users to manage, receive, and transmit digital
assets on blockchain networks and interact with emerging decentralized finance
(DeFi) applications. Unfortunately, cryptocurrency wallets have always been the
prime targets for attackers, and incidents of wallet breaches have been
reported from time to time. Although some recent studies have characterized the
vulnerabilities and scams related to wallets, they have generally been
characterized in coarse granularity, overlooking potential risks inherent in
detailed designs of cryptocurrency wallets, especially from perspectives
including user interaction and advanced features. To fill the void, in this
paper, we present a fine-grained security analysis on browser-based
cryptocurrency wallets. To pinpoint security issues of components in wallets,
we design WalletProbe, a mutation-based testing framework based on visual-level
oracles. We have identified 13 attack vectors that can be abused by attackers
to exploit cryptocurrency wallets and exposed 21 concrete attack strategies. By
applying WalletProbe on 39 widely-adopted browser-based wallet extensions, we
astonishingly figure out all of them can be abused to steal crypto assets from
innocent users. Identified potential attack vectors were reported to wallet
developers timely and 26 issues have been patched already. It is, hence, urgent
for our community to take action to mitigate threats related to cryptocurrency
wallets. We promise to release all code and data to promote the development of
the community.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 03:24:30 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Hu",
"Xiaohui",
""
],
[
"He",
"Ningyu",
""
],
[
"Wang",
"Haoyu",
""
]
] |
2504.11736 | Yoritaka Iwata | Yoritaka Iwata, Hiroyasu Ejiri, Shahariar Sarkar | Low-energy neutrino responses for 71Ga by electron capture rates, charge
exchange reactions and shell model calculations | submitted | null | null | null | nucl-th hep-ph nucl-ex | http://creativecommons.org/licenses/by/4.0/ | Weak Gamow-Teller (GT) responses for low-lying states in ${}^{71}\mathrm{Ga}$
are crucial for studying low-energy solar neutrinos and the Ga anomaly, i.e.,
the possible transition to the sterile state. The responses for the ground
state, the first excited state, and the second excited state are evaluated for
the first time using the experimental electron capture rates, the experimental
charge exchange reaction (CER) rates corrected for the tensor-interaction
effect and the theoretical interacting shell model (ISM) calculations. The
contributions from the two excited states to the solar and ${}^{51}\mathrm{Cr}$
neutrinos are found to be $4.2 \pm 1.2\%$ of that for the ground state. This is
slightly larger than the ISM values but little smaller than the CER values
without corrections for the tensor interaction effect. The Ga anomaly is far
beyond the uncertainty of the obtained nuclear responses.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 03:30:19 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Iwata",
"Yoritaka",
""
],
[
"Ejiri",
"Hiroyasu",
""
],
[
"Sarkar",
"Shahariar",
""
]
] |
2504.11737 | Qian Ding | Qian Ding and Dirk Englund | Hardware Co-Designed Optimal Control for Programmable Atomic Quantum
Processors via Reinforcement Learning | 14 pages, 4 figures | null | null | null | quant-ph | http://creativecommons.org/licenses/by/4.0/ | Developing scalable, fault-tolerant atomic quantum processors requires
precise control over large arrays of optical beams. This remains a major
challenge due to inherent imperfections in classical control hardware, such as
inter-channel crosstalk and beam leakage. In this work, we introduce a hardware
co-designed intelligent quantum control framework to address these limitations.
We construct a mathematical model of the photonic control hardware, integrate
it into the quantum optimal control (QOC) framework, and apply reinforcement
learning (RL) techniques to discover optimal control strategies. We demonstrate
that the proposed framework enables robust, high-fidelity parallel single-qubit
gate operations under realistic control conditions, where each atom is
individually addressed by an optical beam. Specifically, we implement and
benchmark three optimization strategies: a classical hybrid Self-Adaptive
Differential Evolution-Adam (SADE-Adam) optimizer, a conventional RL approach
based on Proximal Policy Optimization (PPO), and a novel end-to-end
differentiable RL method. Using SADE-Adam as a baseline, we find that while PPO
performance degrades as system complexity increases, the end-to-end
differentiable RL consistently achieves gate fidelities above 99.9$\%$,
exhibits faster convergence, and maintains robustness under varied channel
crosstalk strength and randomized dynamic control imperfections.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 03:30:40 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Ding",
"Qian",
""
],
[
"Englund",
"Dirk",
""
]
] |
2504.11738 | Xingyong Zhang | Lijuan Kang, Xingyong Zhang, Cuiling Liu | Infinitely many solutions for an instantaneous and non-instantaneous
fourth-order differential system with local assumptions | null | null | null | null | math.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We investigate a class of fourth-order differential systems with
instantaneous and non-instantaneous impulses. Our technical approach is mainly
based on a variant of Clark's theorem without the global assumptions. Under
locally subquadratic growth conditions imposed on the nonlinear terms
$f_i(t,u)$ and impulsive terms $I_i$, combined with perturbations governed by
arbitrary continuous functions of small coefficient $\varepsilon$, we establish
the existence of multiple small solutions. Specifically, the system exhibits
infinitely many solutions in the case where $\varepsilon=0$.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 03:32:13 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Kang",
"Lijuan",
""
],
[
"Zhang",
"Xingyong",
""
],
[
"Liu",
"Cuiling",
""
]
] |
2504.11739 | Bingjie Gao | Bingjie Gao, Xinyu Gao, Xiaoxue Wu, Yujie Zhou, Yu Qiao, Li Niu,
Xinyuan Chen, Yaohui Wang | The Devil is in the Prompts: Retrieval-Augmented Prompt Optimization for
Text-to-Video Generation | accepted by CVPR2025 | null | null | null | cs.CV cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The evolution of Text-to-video (T2V) generative models, trained on
large-scale datasets, has been marked by significant progress. However, the
sensitivity of T2V generative models to input prompts highlights the critical
role of prompt design in influencing generative outcomes. Prior research has
predominantly relied on Large Language Models (LLMs) to align user-provided
prompts with the distribution of training prompts, albeit without tailored
guidance encompassing prompt vocabulary and sentence structure nuances. To this
end, we introduce \textbf{RAPO}, a novel \textbf{R}etrieval-\textbf{A}ugmented
\textbf{P}rompt \textbf{O}ptimization framework. In order to address potential
inaccuracies and ambiguous details generated by LLM-generated prompts. RAPO
refines the naive prompts through dual optimization branches, selecting the
superior prompt for T2V generation. The first branch augments user prompts with
diverse modifiers extracted from a learned relational graph, refining them to
align with the format of training prompts via a fine-tuned LLM. Conversely, the
second branch rewrites the naive prompt using a pre-trained LLM following a
well-defined instruction set. Extensive experiments demonstrate that RAPO can
effectively enhance both the static and dynamic dimensions of generated videos,
demonstrating the significance of prompt optimization for user-provided
prompts. Project website:
\href{https://whynothaha.github.io/Prompt_optimizer/RAPO.html}{GitHub}.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 03:33:25 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Gao",
"Bingjie",
""
],
[
"Gao",
"Xinyu",
""
],
[
"Wu",
"Xiaoxue",
""
],
[
"Zhou",
"Yujie",
""
],
[
"Qiao",
"Yu",
""
],
[
"Niu",
"Li",
""
],
[
"Chen",
"Xinyuan",
""
],
[
"Wang",
"Yaohui",
""
]
] |
2504.11740 | Pamela Shaw | Pamela A Shaw, Susan Gruber, Brian D. Williamson, Rishi Desai, Susan
M. Shortreed, Chloe Krakauer, Jennifer C. Nelson, Mark J. van der Laan | A cautionary note for plasmode simulation studies in the setting of
causal inference | 55 pages, 6 tables, 2 figures, 8 supplemental tables, 4 supplemental
figures | null | null | null | stat.ME | http://creativecommons.org/licenses/by/4.0/ | Plasmode simulation has become an important tool for evaluating the operating
characteristics of different statistical methods in complex settings, such as
pharmacoepidemiological studies of treatment effectiveness using electronic
health records (EHR) data. These studies provide insight into how estimator
performance is impacted by challenges including rare events, small sample size,
etc., that can indicate which among a set of methods performs best in a
real-world dataset. Plasmode simulation combines data resampled from a
real-world dataset with synthetic data to generate a known truth for an
estimand in realistic data. There are different potential plasmode strategies
currently in use. We compare two popular plasmode simulation frameworks. We
provide numerical evidence and a theoretical result, which shows that one of
these frameworks can cause certain estimators to incorrectly appear overly
biased with lower than nominal confidence interval coverage. Detailed
simulation studies using both synthetic and real-world EHR data demonstrate
that these pitfalls remain at large sample sizes and when analyzing data from a
randomized controlled trial. We conclude with guidance for the choice of a
plasmode simulation approach that maintains good theoretical properties to
allow a fair evaluation of statistical methods while also maintaining the
desired similarity to real data.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 03:36:27 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Shaw",
"Pamela A",
""
],
[
"Gruber",
"Susan",
""
],
[
"Williamson",
"Brian D.",
""
],
[
"Desai",
"Rishi",
""
],
[
"Shortreed",
"Susan M.",
""
],
[
"Krakauer",
"Chloe",
""
],
[
"Nelson",
"Jennifer C.",
""
],
[
"van der Laan",
"Mark J.",
""
]
] |
2504.11741 | Yiyou Sun | Yiyou Sun and Georgia Zhou and Hao Wang and Dacheng Li and Nouha Dziri
and Dawn Song | Climbing the Ladder of Reasoning: What LLMs Can-and Still Can't-Solve
after SFT? | null | null | null | null | cs.AI cs.CL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent supervised fine-tuning (SFT) approaches have significantly improved
language models' performance on mathematical reasoning tasks, even when models
are trained at a small scale. However, the specific capabilities enhanced
through such fine-tuning remain poorly understood. In this paper, we conduct a
detailed analysis of model performance on the AIME24 dataset to understand how
reasoning capabilities evolve. We discover a ladder-like structure in problem
difficulty, categorize questions into four tiers (Easy, Medium, Hard, and
Extremely Hard (Exh)), and identify the specific requirements for advancing
between tiers. We find that progression from Easy to Medium tier requires
adopting an R1 reasoning style with minimal SFT (500-1K instances), while
Hard-level questions suffer from frequent model's errors at each step of the
reasoning chain, with accuracy plateauing at around 65% despite logarithmic
scaling. Exh-level questions present a fundamentally different challenge; they
require unconventional problem-solving skills that current models uniformly
struggle with. Additional findings reveal that carefully curated small-scale
datasets offer limited advantage-scaling dataset size proves far more
effective. Our analysis provides a clearer roadmap for advancing language model
capabilities in mathematical reasoning.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 03:39:38 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Sun",
"Yiyou",
""
],
[
"Zhou",
"Georgia",
""
],
[
"Wang",
"Hao",
""
],
[
"Li",
"Dacheng",
""
],
[
"Dziri",
"Nouha",
""
],
[
"Song",
"Dawn",
""
]
] |
2504.11743 | Shengjin Sun | Sheng-Jin Sun, Shuang-Xi Yi, Yuan-Chuan Zou, Yu-Peng Yang, Ying Qin,
Qing-Wen Tang, Fa-Yin Wang | Constraining the initial Lorentz factor of gamma-ray bursts under
different circumburst mediums | 9 pages, 3 figures, 2 tables; Accepted for publication in Journal of
High Energy Astrophysics | null | null | null | astro-ph.HE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The initial Lorentz factor ($\Gamma_{\text{0}}$) plays a crucial role in
uncovering the physical characteristics of gamma-ray bursts (GRBs). Previous
studies have indicated that the ambient medium density index $k$ for GRBs falls
in the range of 0 - 2, rather than exactly equal to 0 (homogeneous interstellar
ambient) or 2 (typical stellar wind). In this work, we aim to constrain the
$\Gamma_0$ of GRBs considering their distinct circumburst medium. We select a
total of 33 GRBs for our analysis, comprising 7 X-ray GRBs and 26 optical GRBs.
Subsequently, by utilizing the deceleration time of fireball $t_{\rm p}$, we
derive the $\Gamma_0$ for the 33 GRBs assuming the radiation efficiency of
$\eta =$ 0.2. The inferred initial Lorentz factor was found to be from 50 to
500, consistent with previous studies. We then investigate the correlation
between the $\Gamma_0$ and the isotropic energy $E_{\rm \gamma,iso}$ (as well
as the mean isotropic luminosity $L_{\rm \gamma,iso}$), finding very tight
correlations between them, i.e., $\Gamma_0$ $\propto$ $E^{0.24}_{\rm
\gamma,iso,52}$ ($\Gamma_0$ $\propto$ $L^{0.20}_{\rm \gamma,iso.49}$) with
$\eta$=0.2. Additionally, we verify the correlation among $\Gamma_0$, the
isotropic energy $E_{\rm \gamma,iso}$ (or $L_{\rm \gamma,iso}$) and the peak
energy $E_{\rm{p,z}}$, i.e., $E_{\rm \gamma,iso,52}$ $\propto$
$\Gamma^{1.36}_0$$E^{0.82}_{\rm{p,z}}$ ($L_{\rm \gamma,iso,49}$ $\propto$
$\Gamma^{1.05}_0$$E^{0.66}_{\rm{p,z}}$) under the same radiation efficiency
($\eta$=0.2).
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 03:46:39 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Sun",
"Sheng-Jin",
""
],
[
"Yi",
"Shuang-Xi",
""
],
[
"Zou",
"Yuan-Chuan",
""
],
[
"Yang",
"Yu-Peng",
""
],
[
"Qin",
"Ying",
""
],
[
"Tang",
"Qing-Wen",
""
],
[
"Wang",
"Fa-Yin",
""
]
] |
2504.11744 | Luning Zhang | Jiahui Shang, Luning Zhang and Zhongxiang Zheng | From Cyber Threat to Data Shield: Constructing Provably Secure File
Erasure with Repurposed Ransomware Cryptography | null | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Ransomware has emerged as a persistent cybersecurity threat,leveraging robust
encryption schemes that often remain unbroken even after public disclosure of
source code. Motivated by the technical resilience of such mechanisms, this
paper presents SEER (Secure and Efficient Encryption-based Erasure via
Ransomware), a provably secure file destruction system that repurposes
ransomware encryption for legitimate data erasure tasks. SEER integrates the
triple-encryption design of the Babuk ransomware family, including
Curve25519-based key exchange,SHA-256-based key derivation, and the Sosemanuk
stream cipher, to construct a layered key management architecture. It tightly
couples encryption and key destruction by securely erasing session keys
immediately after use. Experimental results on an ESXI platform demonstrate
that SEER achieves four orders of magnitude performance improvement over the
DoD 5220.22 standard. The proposed system further ensures provable security
through both theoretical foundations and practical validation, offering an
efficient and resilient solution for the secure destruction of sensitive data.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 03:47:17 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Shang",
"Jiahui",
""
],
[
"Zhang",
"Luning",
""
],
[
"Zheng",
"Zhongxiang",
""
]
] |
2504.11745 | Jinglong Zhu | Xiaotong Xie, Hiroyuki Umeeda, Jinglong Zhu | $D^0-\bar{D}^0$ mixing in the Dyson-Schwinger approach | 21 pages, 2 figures, 3 tables | null | null | null | hep-ph hep-ex | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In view of difficulty to reproduce observables in the $D^0-\bar{D}^0$ mixing
via the operator product expansion, we discuss the Dyson-Schwinger approach to
this process. Formulated by the parameterization of quark propagators, SU(3)
breaking relevant to charm mixing is evaluated in such a way that properly
takes account of dynamical chiral symmetry breaking. The $\bar{D}^0\to D^0$
transition is discussed in the vacuum-insertion approximation with locality of
the light valence-quark field, represented by the decay constant of $D^0$ meson
as well as relevant momentum integrals. It is found that dimensionless
mass-difference observable in this approach leads to $|x|=(1.3-2.9)\times
10^{-3}$, the order of magnitude comparable to the HFLAV data, and thereby
offering a certain improvement as a theoretical framework.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 03:49:44 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Xie",
"Xiaotong",
""
],
[
"Umeeda",
"Hiroyuki",
""
],
[
"Zhu",
"Jinglong",
""
]
] |
2504.11746 | Rami Z. E. Alsaberi Dr. | Rami Z. E. Alsaberi, Miroslav D. Filipovic, Hidetoshi Sano, Shi Dai,
Frank Haberl, Patrick J. Kavanagh, Denis Leahy, Pierre Maggi, Gavin Rowell,
Manami Sasaki, Ivo R. Seitenzahl, Dejan Urosevic, Jeffrey Payne, Zachary J.
Smeaton, and Sanja Lazarevic | A New Radio Continuum Study of the Large Magellanic Cloud Supernova
Remnant MC SNR J0519-6902 | 12 pages, 10 figures, The paper has been accepted for publication in
PASA. arXiv admin note: text overlap with arXiv:2310.16533 | null | null | null | astro-ph.HE | http://creativecommons.org/licenses/by/4.0/ | We present a new radio continuum study of the Large Magellanic Cloud
supernova remnant (SNR) MC SNR J0519-6902. With a diameter of ~8 pc, this SNR
shows a radio ring-like morphology with three bright regions toward the north,
east, and south. Its linear polarisation is prominent with average values of 5
+- 1% and 6 +- 1% at 5500 and 9000 MHz, and we find a spectral index of -0.62
+- 0.02 , typical of a young SNR. The average rotation measure is estimated at
-124 +- 83 rad m-2 and the magnetic field strength at ~11 muG. We also estimate
an equipartition magnetic field of 72 +- 5 muG and minimum explosion energy of
Emin = 2.6x1048 erg. Finally, we identified an H I cloud that may be associated
with MC SNR J0519-6902, located in the southeastern part of the remnant, along
with a potential wind-bubble cavity.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 03:51:27 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Alsaberi",
"Rami Z. E.",
""
],
[
"Filipovic",
"Miroslav D.",
""
],
[
"Sano",
"Hidetoshi",
""
],
[
"Dai",
"Shi",
""
],
[
"Haberl",
"Frank",
""
],
[
"Kavanagh",
"Patrick J.",
""
],
[
"Leahy",
"Denis",
""
],
[
"Maggi",
"Pierre",
""
],
[
"Rowell",
"Gavin",
""
],
[
"Sasaki",
"Manami",
""
],
[
"Seitenzahl",
"Ivo R.",
""
],
[
"Urosevic",
"Dejan",
""
],
[
"Payne",
"Jeffrey",
""
],
[
"Smeaton",
"Zachary J.",
""
],
[
"Lazarevic",
"Sanja",
""
]
] |
2504.11747 | Jiang-Tao Yuan | Cai-Hong Wang, Jiang-Tao Yuan, Ying-Hui Yang, Mao-Sheng Li, Shao-Ming
Fei and Zhi-Hao Ma | Detectors for local discrimination of sets of generalized Bell states | 10 pages, 2 figures,7 tables | Physical Review A 111, 042408 (2025) | 10.1103/PhysRevA.111.042408 | null | quant-ph math-ph math.MP | http://creativecommons.org/licenses/by/4.0/ | A fundamental problem in quantum information processing is the discrimination
among a set of orthogonal quantum states of a composite system under local
operations and classical communication (LOCC). Corresponding to the LOCC
indistinguishable sets of four ququad-ququad orthogonal maximally entangled
states (MESs) constructed by Yu et al. [Phys. Rev. Lett. 109, 020506 (2012)],
the maximum commutative sets (MCSs) were introduced as detectors for the local
distinguishability of the set of generalized Bell states (GBSs), for which the
detectors are sufficient to determine the LOCC distinguishability. In this
work, we show how to determine all the detectors for a given GBS set. We
construct also several 4-GBS sets without detectors, most of which are one-way
LOCC indistinguishable and only one is one-way LOCC distinguishable, indicating
that the detectors are not necessary for LOCC distinguishability. Furthermore,
we show that for 4-GBS sets in quantum system
$\mathbb{C}^{6}\otimes\mathbb{C}^{6}$, the detectors are almost necessary for
one-way LOCC distinguishability, except for one set in the sense of local
unitary equivalence. The problem of one-way LOCC discrimination of 4-GBS sets
in $\mathbb{C}^{6}\otimes\mathbb{C}^{6}$ is completely resolved.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 03:55:53 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Wang",
"Cai-Hong",
""
],
[
"Yuan",
"Jiang-Tao",
""
],
[
"Yang",
"Ying-Hui",
""
],
[
"Li",
"Mao-Sheng",
""
],
[
"Fei",
"Shao-Ming",
""
],
[
"Ma",
"Zhi-Hao",
""
]
] |
2504.11748 | Christopher Xu | Christopher Y. Xu, Jack Yan, Kathleen Lum, and Justin K. Yim | Steerable rolling of a 1-DoF robot using an internal pendulum | 2 pages, submitted to 2nd Unconventional Robots Workshop: Rethinking
Robotic Systems Beyond Convention at IEEE ICRA 2025 | null | null | null | cs.RO | http://creativecommons.org/licenses/by/4.0/ | We present ROCK (Rolling One-motor Controlled rocK), a 1 degree-of-freedom
robot consisting of a round shell and an internal pendulum. An uneven shell
surface enables steering by using only the movement of the pendulum, allowing
for mechanically simple designs that may be feasible to scale to large
quantities or small sizes. We train a control policy using reinforcement
learning in simulation and deploy it onto the robot to complete a rectangular
trajectory.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 03:59:30 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Xu",
"Christopher Y.",
""
],
[
"Yan",
"Jack",
""
],
[
"Lum",
"Kathleen",
""
],
[
"Yim",
"Justin K.",
""
]
] |
2504.11749 | Zongye Zhang | Zongye Zhang, Wenrui Cai, Qingjie Liu, Yunhong Wang | SkeletonX: Data-Efficient Skeleton-based Action Recognition via
Cross-sample Feature Aggregation | Accepted by IEEE Transactions on Multimedia (TMM). 13 pages, 7
figures, 11 tables | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | While current skeleton action recognition models demonstrate impressive
performance on large-scale datasets, their adaptation to new application
scenarios remains challenging. These challenges are particularly pronounced
when facing new action categories, diverse performers, and varied skeleton
layouts, leading to significant performance degeneration. Additionally, the
high cost and difficulty of collecting skeleton data make large-scale data
collection impractical. This paper studies one-shot and limited-scale learning
settings to enable efficient adaptation with minimal data. Existing approaches
often overlook the rich mutual information between labeled samples, resulting
in sub-optimal performance in low-data scenarios. To boost the utility of
labeled data, we identify the variability among performers and the commonality
within each action as two key attributes. We present SkeletonX, a lightweight
training pipeline that integrates seamlessly with existing GCN-based skeleton
action recognizers, promoting effective training under limited labeled data.
First, we propose a tailored sample pair construction strategy on two key
attributes to form and aggregate sample pairs. Next, we develop a concise and
effective feature aggregation module to process these pairs. Extensive
experiments are conducted on NTU RGB+D, NTU RGB+D 120, and PKU-MMD with various
GCN backbones, demonstrating that the pipeline effectively improves performance
when trained from scratch with limited data. Moreover, it surpasses previous
state-of-the-art methods in the one-shot setting, with only 1/10 of the
parameters and much fewer FLOPs. The code and data are available at:
https://github.com/zzysteve/SkeletonX
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 04:01:42 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Zhang",
"Zongye",
""
],
[
"Cai",
"Wenrui",
""
],
[
"Liu",
"Qingjie",
""
],
[
"Wang",
"Yunhong",
""
]
] |
2504.11750 | Prabhu Vellaisamy | Prabhu Vellaisamy, Thomas Labonte, Sourav Chakraborty, Matt Turner,
Samantika Sury, and John Paul Shen | Characterizing and Optimizing LLM Inference Workloads on CPU-GPU Coupled
Architectures | Accepted for ISPASS 2025 | null | null | null | cs.DC cs.AI cs.AR cs.PF | http://creativecommons.org/licenses/by/4.0/ | Large language model (LLM)-based inference workloads increasingly dominate
data center costs and resource utilization. Therefore, understanding the
inference workload characteristics on evolving CPU-GPU coupled architectures is
crucial for optimization. This paper presents an in-depth analysis of LLM
inference behavior on loosely-coupled (PCIe A100/H100) and closely-coupled
(GH200) systems. We analyze performance dynamics using fine-grained
operator-to-kernel trace analysis, facilitated by our novel profiler SKIP and
metrics like Total Kernel Launch and Queuing Time (TKLQT). Results show that
closely-coupled (CC) GH200 significantly outperforms loosely-coupled (LC)
systems at large batch sizes, achieving 1.9x-2.7x faster prefill latency for
Llama 3.2-1B. However, our analysis also reveals that GH200 remains CPU-bound
up to 4x larger batch sizes than LC systems. In this extended CPU-bound region,
we identify the performance characteristics of the Grace CPU as a key factor
contributing to higher inference latency at low batch sizes on GH200. We
demonstrate that TKLQT accurately identifies this CPU/GPU-bound transition
point. Based on this analysis, we further show that kernel fusion offers
significant potential to mitigate GH200's low-batch latency bottleneck by
reducing kernel launch overhead. This detailed kernel-level characterization
provides critical insights for optimizing diverse CPU-GPU coupling strategies.
This work is an initial effort, and we plan to explore other major AI/DL
workloads that demand different degrees of CPU-GPU heterogeneous architectures.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 04:02:39 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Vellaisamy",
"Prabhu",
""
],
[
"Labonte",
"Thomas",
""
],
[
"Chakraborty",
"Sourav",
""
],
[
"Turner",
"Matt",
""
],
[
"Sury",
"Samantika",
""
],
[
"Shen",
"John Paul",
""
]
] |
2504.11753 | Artbazar Galtbayar | Artbazar Galtbayar, Kenji Yajima | The $L^p$-boundedness of wave operators for 4-th order Schr\"odinger
operators on $\mathbb{R}^2$, I | null | null | null | null | math-ph math.MP | http://creativecommons.org/licenses/by-nc-nd/4.0/ | We prove that high energy parts of wave operators for fourth order
Schr\"odinger operators $H=\Delta^2 + V(x)$ in $\mathbb{R}^2$ are bounded in
$L^p(\mathbb{R}^2)$ for $p\in(1,\infty)$.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 04:10:47 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Galtbayar",
"Artbazar",
""
],
[
"Yajima",
"Kenji",
""
]
] |
2504.11754 | Bo Yang | Zihui Zhang, Yafei Yang, Hongtao Wen, Bo Yang | GrabS: Generative Embodied Agent for 3D Object Segmentation without
Scene Supervision | ICLR 2025 Spotlight. Code and data are available at:
https://github.com/vLAR-group/GrabS | null | null | null | cs.CV cs.AI cs.LG cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the hard problem of 3D object segmentation in complex point clouds
without requiring human labels of 3D scenes for supervision. By relying on the
similarity of pretrained 2D features or external signals such as motion to
group 3D points as objects, existing unsupervised methods are usually limited
to identifying simple objects like cars or their segmented objects are often
inferior due to the lack of objectness in pretrained features. In this paper,
we propose a new two-stage pipeline called GrabS. The core concept of our
method is to learn generative and discriminative object-centric priors as a
foundation from object datasets in the first stage, and then design an embodied
agent to learn to discover multiple objects by querying against the pretrained
generative priors in the second stage. We extensively evaluate our method on
two real-world datasets and a newly created synthetic dataset, demonstrating
remarkable segmentation performance, clearly surpassing all existing
unsupervised methods.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 04:13:53 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Zhang",
"Zihui",
""
],
[
"Yang",
"Yafei",
""
],
[
"Wen",
"Hongtao",
""
],
[
"Yang",
"Bo",
""
]
] |
2504.11755 | Kandulapati Sriram | SD Gouse, M. V. R. Abhishek, K. Sriram | Asymmetric Cross-Correlation functions with delays in Sco X-1: Evidence
of possible Jet triggering | Accepted in Astrophysics & Space Science (Ap&SS) Journal | null | null | null | astro-ph.HE | http://creativecommons.org/licenses/by/4.0/ | The formation and origin of Jets from Z sources are not well understood,
although an X-ray-radio correlation has been observed. We analyzed a few
observations of Sco X-1 using the Rossi X-ray Timing Experiment Satellite. Out
of the 17 observations, 5 showed lags of a few 10s of seconds with an asymmetry
in the CCF between the soft and hard bands in their cross-correlation function
(CCF) analysis. Interestingly, during these observations, a ballistic-type
radio jet of Ultra-relativistic(UR) nature was reported. The observed lags and
associated cross-correlation coefficients were validated using simulations. The
rest of the 12 observations' CCFs were symmetric, and their associated Power
Density Spectrum (PDS) displayed Normal Branch(NBO)/Normal + Horizontal Branch
Oscillations(NBO+HBO). The X-ray spectral study of 2 obs. where radio core
emission was seen with abrupt variation in both PDS and CCF showed a black-body
flux variation of 10-20%, but no spectral parameter varied. We suggest that the
ballistic jet caused a disturbance in the inner accretion region, viz., the
Boundary Layer plausibly along with the Corona, that caused the lags observed
in the CCFs along with the absence of any oscillatory features in the PDS
tracing only a flat-topped noise. Whereas the regions with no lags showed a
persistent NBO/NBO+HBO feature, suggesting a steady accretion flow. Although
the UR jet can't be related to NBO or HBO, we suggest it could be related to
the phenomena that cause NBO since the majority of PDSs displayed NBO. We also
constrain the inner accretion region size to 20-30 km, which is responsible for
the accretion ejecta in Sco X-1.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 04:18:21 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Gouse",
"SD",
""
],
[
"Abhishek",
"M. V. R.",
""
],
[
"Sriram",
"K.",
""
]
] |
2504.11756 | Lixiang Chen | Lixiang Chen, Yuxing Han, Yu Chen, Xing Chen, Chengcheng Yang, Weining
Qian | AQETuner: Reliable Query-level Configuration Tuning for Analytical Query
Engines | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Modern analytical query engines (AQEs) are essential for large-scale data
analysis and processing. These systems usually provide numerous query-level
tunable knobs that significantly affect individual query performance. While
several studies have explored automatic DBMS configuration tuning, they have
several limitations to handle query-level tuning. Firstly, they fail to capture
how knobs influence query plans, which directly affect query performance.
Secondly, they overlook query failures during the tuning processing, resulting
in low tuning efficiency. Thirdly, they struggle with cold-start problems for
new queries, leading to prolonged tuning time. To address these challenges, we
propose AQETuner, a novel Bayesian Optimization-based system tailored for
reliable query-level knob tuning in AQEs. AQETuner first applies the attention
mechanisms to jointly encode the knobs and plan query, effectively identifying
the impact of knobs on plan nodes. Then, AQETuner employs a dual-task Neural
Process to predict both query performance and failures, leveraging their
interactions to guide the tuning process. Furthermore, AQETuner utilizes
Particle Swarm Optimization to efficiently generate high-quality samples in
parallel during the initial tuning stage for the new queries. Experimental
results show that AQETuner significantly outperforms existing methods, reducing
query latency by up to 23.7% and query failures by up to 51.2%.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 04:18:25 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Chen",
"Lixiang",
""
],
[
"Han",
"Yuxing",
""
],
[
"Chen",
"Yu",
""
],
[
"Chen",
"Xing",
""
],
[
"Yang",
"Chengcheng",
""
],
[
"Qian",
"Weining",
""
]
] |
2504.11757 | Pradeep Singh Ph.D. | Pradeep Singh, Ashutosh Kumar, Sutirtha Ghosh, Hrishit B P,
Balasubramanian Raman | Dynamics and Computational Principles of Echo State Networks: A
Mathematical Perspective | 100 pages, 17 tables, 41 figures | null | null | null | cs.LG cs.NE | http://creativecommons.org/licenses/by/4.0/ | Reservoir computing (RC) represents a class of state-space models (SSMs)
characterized by a fixed state transition mechanism (the reservoir) and a
flexible readout layer that maps from the state space. It is a paradigm of
computational dynamical systems that harnesses the transient dynamics of
high-dimensional state spaces for efficient processing of temporal data. Rooted
in concepts from recurrent neural networks, RC achieves exceptional
computational power by decoupling the training of the dynamic reservoir from
the linear readout layer, thereby circumventing the complexities of
gradient-based optimization. This work presents a systematic exploration of RC,
addressing its foundational properties such as the echo state property, fading
memory, and reservoir capacity through the lens of dynamical systems theory. We
formalize the interplay between input signals and reservoir states,
demonstrating the conditions under which reservoirs exhibit stability and
expressive power. Further, we delve into the computational trade-offs and
robustness characteristics of RC architectures, extending the discussion to
their applications in signal processing, time-series prediction, and control
systems. The analysis is complemented by theoretical insights into
optimization, training methodologies, and scalability, highlighting open
challenges and potential directions for advancing the theoretical underpinnings
of RC.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 04:28:05 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Singh",
"Pradeep",
""
],
[
"Kumar",
"Ashutosh",
""
],
[
"Ghosh",
"Sutirtha",
""
],
[
"P",
"Hrishit B",
""
],
[
"Raman",
"Balasubramanian",
""
]
] |
2504.11758 | The Anh Bui | The Anh Bui | Hardy spaces, Campanato spaces and higher order Riesz transforms
associated with Bessel operators | 35 pages. arXiv admin note: text overlap with arXiv:2504.09867 | null | null | null | math.CA | http://creativecommons.org/licenses/by/4.0/ | Let $\nu = (\nu_1, \ldots, \nu_n) \in (-1/2, \infty)^n$, with $n \ge 1$, and
let $\Delta_\nu$ be the multivariate Bessel operator defined by
\[
\Delta_{\nu} = -\sum_{j=1}^n\left( \frac{\partial^2}{\partial x_j^2} -
\frac{\nu_j^2 - 1/4}{x_j^2} \right).
\]
In this paper, we develop the theory of Hardy spaces and BMO-type spaces
associated with the Bessel operator $\Delta_\nu$. We then study the
higher-order Riesz transforms associated with $\Delta_\nu$. First, we show that
these transforms are Calder\'on-Zygmund operators. We further prove that they
are bounded on the Hardy spaces and BMO-type spaces associated with
$\Delta_\nu$.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 04:34:41 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Bui",
"The Anh",
""
]
] |
2504.11759 | Ziyu Xu | Ziyu Xu and Aaditya Ramdas | Bringing closure to FDR control: beating the e-Benjamini-Hochberg
procedure | 11 pages, 1 figure | null | null | null | stat.ME math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | False discovery rate (FDR) has been a key metric for error control in
multiple hypothesis testing, and many methods have developed for FDR control
across a diverse cross-section of settings and applications. We develop a
closure principle for all FDR controlling procedures, i.e., we provide a
characterization based on e-values for all admissible FDR controlling
procedures. We leverage this idea to formulate the closed eBH procedure, a
(usually strict) improvement over the eBH procedure for FDR control when
provided with e-values. We demonstrate the practical performance of closed eBH
in simulations.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 04:36:12 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Xu",
"Ziyu",
""
],
[
"Ramdas",
"Aaditya",
""
]
] |
2504.11760 | Cliff Joslyn | Robert E. Green, Cliff A. Joslyn, Audun Myers, Michael G. Rawson,
Michael R. Robinson | The Topological Structures of the Orders of Hypergraphs | null | null | null | Information release PNNL-SA-210092 | math.CO math.AT math.CT | http://creativecommons.org/licenses/by/4.0/ | We provide first a categorical exploration of, and then completion of the
mapping of the relationships among, three fundamental perspectives on binary
relations: as the incidence matrices of hypergraphs, as the formal contexts of
concept lattices, and as specifying topological cosheaves of simplicial
(Dowker) complexes on simplicial (Dowker) complexes. We provide an integrative,
functorial framework combining previously known with three new results: 1)
given a binary relation, there are order isomorphisms among the bounded edge
order of the intersection complexes of its dual hypergraphs and its concept
lattice; 2) the concept lattice of a context is an isomorphism invariant of the
Dowker cosheaf (of abstract simplicial complexes) of that context; and 3) a
novel Dowker cosheaf (of chain complexes) of a relation is an isomorphism
invariant of the concept lattice of the context that generalizes Dowker's
original homological result. We illustrate these concepts throughout with a
running example, and demonstrate relationships to past results.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 04:40:12 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Green",
"Robert E.",
""
],
[
"Joslyn",
"Cliff A.",
""
],
[
"Myers",
"Audun",
""
],
[
"Rawson",
"Michael G.",
""
],
[
"Robinson",
"Michael R.",
""
]
] |
2504.11761 | Masahiro Tanaka | Masahiro Tanaka | Delayed Acceptance Markov Chain Monte Carlo for Robust Bayesian Analysis | null | null | null | null | stat.CO | http://creativecommons.org/licenses/by/4.0/ | This study introduces a computationally efficient algorithm, delayed
acceptance Markov chain Monte Carlo (DA-MCMC), designed to improve posterior
simulation in quasi-Bayesian inference. Quasi-Bayesian methods, which do not
require fully specifying a probabilistic model, are often computationally
expensive owing to the need to evaluate the inverse and determinant of large
covariance matrices. DA-MCMC addresses this challenge by employing a two-stage
process: In the first stage, proposals are screened using an approximate
posterior, whereas a final acceptance or rejection decision is made in the
second stage based on the exact target posterior. This reduces the need for
costly matrix computations, thereby improving efficiency without sacrificing
accuracy. We demonstrate the effectiveness of DA-MCMC through applications to
both synthetic and real data. The results demonstrate that, although DA-MCMC
slightly reduces the effective sample size per iteration compared with the
standard MCMC, it achieves substantial improvement in terms of effective sample
size per second, approximately doubling the efficiency. This makes DA-MCMC
particularly useful for cases where posterior simulation is computationally
intensive. Thus, the DA-MCMC algorithm offers a significant advancement in
computational efficiency for quasi-Bayesian inference, making it a valuable
tool for robust Bayesian analysis.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 04:40:17 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Tanaka",
"Masahiro",
""
]
] |
2504.11762 | Ruijuan Xiao | Zicun Li, Xinguo Ren, Jinbin Li, Ruijuan Xiao and Hong Li | Gas-solid Reaction Dynamics on Li$_6$PS$_5$Cl Surfaces: A Case Study of
the Influence of CO$_2$ and CO$_2$/O$_2$ Atmospheres Using AIMD and MLFF
Simulations | null | null | null | null | physics.chem-ph cond-mat.mtrl-sci | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In recent years, rapid progress has been made in solid-state lithium
batteries. Among various technologies, coating the surface of electrodes or
electrolytes has proven to be an effective method to enhance interfacial
stability and improve battery cycling performance. Recent experimental studies
showed that gas-solid reactions offer a convenient approach to form modified
coating layers on the solid electrolyte. Here, we performed computational
simulations to investigate this surface reaction process. Specifically, we
simulated the gas-solid reactions of Li$_6$PS$_5$Cl(LPSC) solid-state
electrolytes in pure CO$_2$ and in mixed CO$_2$/O$_2$ atmospheres using
ab-initio molecular dynamics (AIMD) and machine-learning force fields
(MLFF)-accelerated molecular dynamics (MD) approaches. In the former case, LPSC
surfaces primarily form Li$_2$CO$_2$S because it is difficult to dissociate
another oxygen atom from the second CO$_2$ molecule. While in CO$_2$/O$_2$
mixed atmosphere, O$_2$ molecules preferentially adsorb onto LPSC, which
supplies oxygen sites for subsequent CO$_2$ adsorption to form carbonate
-CO$_3$ units. This reaction pathway ultimately generates an interfacial
product dominated by Li$_2$CO$_3$. These coatings exhibit distinct electronic
and ionic conductivity characteristics, allowing the possibility to control
coating compositions and configurations by adjusting the gas-solid reactions.
Key criteria for applying this strategy are extracted from the current
research.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 04:45:40 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Li",
"Zicun",
""
],
[
"Ren",
"Xinguo",
""
],
[
"Li",
"Jinbin",
""
],
[
"Xiao",
"Ruijuan",
""
],
[
"Li",
"Hong",
""
]
] |
2504.11763 | Aoran Liu | Aoran Liu, Kun Hu, Clinton Mo, Changyang Li, Zhiyong Wang | Extended Short- and Long-Range Mesh Learning for Fast and Generalized
Garment Simulation | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | 3D garment simulation is a critical component for producing cloth-based
graphics. Recent advancements in graph neural networks (GNNs) offer a promising
approach for efficient garment simulation. However, GNNs require extensive
message-passing to propagate information such as physical forces and maintain
contact awareness across the entire garment mesh, which becomes computationally
inefficient at higher resolutions. To address this, we devise a novel GNN-based
mesh learning framework with two key components to extend the message-passing
range with minimal overhead, namely the Laplacian-Smoothed Dual Message-Passing
(LSDMP) and the Geodesic Self-Attention (GSA) modules. LSDMP enhances
message-passing with a Laplacian features smoothing process, which efficiently
propagates the impact of each vertex to nearby vertices. Concurrently, GSA
introduces geodesic distance embeddings to represent the spatial relationship
between vertices and utilises attention mechanisms to capture global mesh
information. The two modules operate in parallel to ensure both short- and
long-range mesh modelling. Extensive experiments demonstrate the
state-of-the-art performance of our method, requiring fewer layers and lower
inference latency.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 04:56:01 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Liu",
"Aoran",
""
],
[
"Hu",
"Kun",
""
],
[
"Mo",
"Clinton",
""
],
[
"Li",
"Changyang",
""
],
[
"Wang",
"Zhiyong",
""
]
] |
2504.11764 | SunHyun Youn | Sun-Hyun Youn | Probing the Abyss of the Quantum Vacuum: A Quest for Fluctuation-Free
Domains | 18pages, 6 figures | null | null | null | quant-ph | http://creativecommons.org/licenses/by-nc-nd/4.0/ | The modification of electromagnetic vacuum fluctuations by boundary
conditions is a fundamental prediction of quantum electrodynamics (QED).
However, direct experimental verification in the optical regime is hindered by
the need for sub-wavelength spatial resolution. Here, we present a novel
approach to indirectly probe the spatial distribution of vacuum fluctuations by
leveraging radio-frequency (RF) measurements of thermal noise. At RF
frequencies, thermal noise, which occupies the same electromagnetic modes as
vacuum fluctuations and is similarly shaped by boundary conditions, dominates
the single-photon energy. By precisely characterizing the spatial distribution
of thermal noise near a conducting boundary, we infer the corresponding
modification of vacuum modes and, consequently, the vacuum fluctuations
themselves. Our experimental setup, employing coaxial cables and RF splitters
to mimic optical mirrors and beam splitters, enables controlled manipulation of
boundary conditions and precise thermal noise measurements. We observe a
reduction in thermal noise near the conducting boundary, providing indirect
evidence for the theoretically predicted suppression of vacuum fluctuations.
This work establishes a new experimental framework for investigating QED
effects in constrained environments, with potential implications for
quantum-limited precision measurements, such as gravitational wave detection
and intensity-stabilized light sources. This RF approach circumvents the
limitations of optical techniques and opens new avenues for exploring
fundamental quantum phenomena.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 04:59:14 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Youn",
"Sun-Hyun",
""
]
] |
2504.11765 | Hyungwoo Lee | Hyungwoo Lee (1), Kihyun Kim (1), Jinwoo Kim (1), Jungmin So (1),
Myung-Hoon Cha (2), Hong-Yeon Kim (2), James J. Kim (3), Youngjae Kim (1)
((1) Dept. of Computer Science and Engineering, Sogang University, Seoul,
Republic of Korea, (2) ETRI, Daejeon, Republic of Korea, (3) Soteria Inc) | Shared Disk KV Cache Management for Efficient Multi-Instance Inference
in RAG-Powered LLMs | null | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent large language models (LLMs) face increasing inference latency as
input context length and model size continue to grow. In particular, the
retrieval-augmented generation (RAG) technique, which enhances LLM responses by
incorporating external knowledge, exacerbates this issue by significantly
increasing the number of input tokens. This expansion in token length leads to
a substantial rise in computational overhead, particularly during the prefill
stage, resulting in prolonged time-to-first-token (TTFT). To address this
issue, this paper proposes a method to reduce TTFT by leveraging a disk-based
key-value (KV) cache to lessen the computational burden during the prefill
stage. We also introduce a disk-based shared KV cache management system, called
Shared RAG-DCache, for multi-instance LLM RAG service environments. This
system, together with an optimal system configuration, improves both throughput
and latency under given resource constraints. Shared RAG-DCache exploits the
locality of documents related to user queries in RAG, as well as the queueing
delay in LLM inference services. It proactively generates and stores disk KV
caches for query-related documents and shares them across multiple LLM
instances to enhance inference performance. In experiments on a single host
equipped with 2 GPUs and 1 CPU, Shared RAG-DCache achieved a 15~71% increase in
throughput and up to a 12~65% reduction in latency, depending on the resource
configuration.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 04:59:18 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Lee",
"Hyungwoo",
""
],
[
"Kim",
"Kihyun",
""
],
[
"Kim",
"Jinwoo",
""
],
[
"So",
"Jungmin",
""
],
[
"Cha",
"Myung-Hoon",
""
],
[
"Kim",
"Hong-Yeon",
""
],
[
"Kim",
"James J.",
""
],
[
"Kim",
"Youngjae",
""
]
] |
2504.11766 | Shinji Ohno | Shinji Ohno and Yuuki Sasaki | On cohomogeneity one hyperpolar actions related to $G_{2}$ | null | null | null | null | math.DG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Cohomogeneity one actions on irreducible Riemannian symmetric spaces of
compact type are classified into three cases: Hermann actions, actions induced
by the linear isotropy representation of a Riemannian symmetric space of rank
2, and exceptional actions. In this paper, we consider exceptional actions
related to the exceptional compact Lie group $G_{2}$ and investigate some
properties of their orbits as Riemannian submanifolds. In particular, we
examine the principal curvatures of principal orbits and classify principal
orbits that are minimal, austere, weakly reflective, and proper biharmonic.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 05:03:19 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Ohno",
"Shinji",
""
],
[
"Sasaki",
"Yuuki",
""
]
] |
2504.11767 | Qinyan Shen | Qinyan Shen, Karl Gregory, Xianzheng Huang | Post-selection Inference in Regression Models for Group Testing Data | null | Biometrics. 2024 Jul 1;80(3):ujae101 | 10.1093/biomtc/ujae101 | null | stat.ME | http://creativecommons.org/licenses/by/4.0/ | We develop methodology for valid inference after variable selection in
logistic regression when the responses are partially observed, that is, when
one observes a set of error-prone testing outcomes instead of the true values
of the responses. Aiming at selecting important covariates while accounting for
missing information in the response data, we apply the expectation-maximization
algorithm to compute maximum likelihood estimators subject to LASSO
penalization. Subsequent to variable selection, we make inferences on the
selected covariate effects by extending post-selection inference methodology
based on the polyhedral lemma. Empirical evidence from our extensive simulation
study suggests that our post-selection inference results are more reliable than
those from naive inference methods that use the same data to perform variable
selection and inference without adjusting for variable selection.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 05:08:57 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Shen",
"Qinyan",
""
],
[
"Gregory",
"Karl",
""
],
[
"Huang",
"Xianzheng",
""
]
] |
2504.11768 | Kabeer Manali Rahul | Kabeer Manali Rahul | Representability theorems via metric techniques | null | null | null | null | math.AG math.CT | http://creativecommons.org/licenses/by/4.0/ | We prove new Brown representability theorems for triangulated categories
using metric techniques as introduced in the work of Neeman. In the setting of
algebraic geometry, this gives us new representability theorems for homological
and cohomological functors on the bounded derived category of coherent sheaves.
To prove this result, we introduce a generalisation of the notion of an
approximable triangulated category.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 05:11:38 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Rahul",
"Kabeer Manali",
""
]
] |
2504.11769 | Xuefen Chi | Yuchao Dang, Xuefen Chi | Sliding Block Martingale based Multi-hop Delay QoS Analysis | null | null | null | null | cs.IT math.IT | http://creativecommons.org/licenses/by-nc-nd/4.0/ | With the growing density of wireless networks and demand for multi-hop
transmissions, precise delay Quality of Service (QoS) analysis has become a
critical challenge. This paper introduces a multi-hop delay QoS analysis
framework based on the sliding block martingale, addressing the loose boundary
issue of prior methods that rely on service process martingales and min-plus
transformations. By constructing a sliding block martingale with a window, we
capture both long-term trends and short-term fluctuations in the backlog,
eliminating the reliance on the generalized incremental property. The framework
redefines delay unreliability events using cascading attributes, deriving a
more compact Delay Unreliability Probability Boundary (DUPB). To improve the
efficiency of solving the key parameter $\theta$, we propose a Micrometric
Intervals based Supermartingale Upcrossing Estimate Theorem, quantifying the
upper bound of event occurrence frequency to constrain the solution space of
$\theta$. Simulations based on the 3GPP UMa/UMi channel model validate the
framework's effectiveness. Results show that in 2-7 hop scenarios, the maximum
deviation between theoretical boundaries and Monte Carlo simulations is $4.116
\times 10^{-5}$, with a lower RMSE than existing methods. Iteration count and
CPU time for solving $\theta$ are reduced by $59\%-72\%$ and $60.6\%-70.5\%$,
respectively, improving analysis efficiency. Furthermore, the derived minimum
service rate for multi-hop queues offers a valuable reference for resource
allocation. The framework demonstrates high accuracy, scalability, and
practicality in complex multi-hop networks.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 05:13:53 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Dang",
"Yuchao",
""
],
[
"Chi",
"Xuefen",
""
]
] |
2504.11770 | Takashi Morita | Takashi Morita and Timothy J. O'Donnell | Unsupervised Classification of English Words Based on Phonological
Information: Discovery of Germanic and Latinate Clusters | null | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Cross-linguistically, native words and loanwords follow different
phonological rules. In English, for example, words of Germanic and Latinate
origin exhibit different stress patterns, and a certain syntactic structure is
exclusive to Germanic verbs. When seeing them as a cognitive model, however,
such etymology-based generalizations face challenges in terms of learnability,
since the historical origins of words are presumably inaccessible information
for general language learners. In this study, we present computational evidence
indicating that the Germanic-Latinate distinction in the English lexicon is
learnable from the phonotactic information of individual words. Specifically,
we performed an unsupervised clustering on corpus-extracted words, and the
resulting word clusters largely aligned with the etymological distinction. The
model-discovered clusters also recovered various linguistic generalizations
documented in the previous literature regarding the corresponding etymological
classes. Moreover, our findings also uncovered previously unrecognized features
of the quasi-etymological clusters, offering novel hypotheses for future
experimental studies.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 05:20:08 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Morita",
"Takashi",
""
],
[
"O'Donnell",
"Timothy J.",
""
]
] |
2504.11771 | Shuyue Fu | Shuyue Fu and Yihan Peng and Shengping Gong and Peng Shi | Design and Continuation of Nonlinear Teardrop Hovering Formation along
the Near Rectilinear Halo Orbit | null | null | null | null | math.OC | http://creativecommons.org/licenses/by-nc-nd/4.0/ | This short communication is devoted to the design and continuation of a
teardrop hovering formation along the Near Rectilinear Halo orbit and provides
further insights into future on-orbit services in the cislunar space. First, we
extend the concept of the teardrop hovering formation to scenarios along the
Near Rectilinear Halo orbit in the Earth-Moon circular restricted three-body
problem. Then, we develop two methods for designing these formations based on
the nonlinear model for relative motion. The first method addresses the design
of the teardrop hovering formations with relatively short revisit distances,
while the second method continues hovering trajectories from short to longer
revisit distances. In particular, new continuation method is developed to meet
the design requirements of this new scenario. Simulation results verify the
effectiveness of the proposed methods, and a near-natural teardrop hovering
formation is achieved by considering the dynamical properties near the NRHO.
Comparisons between design results obtained using linear and nonlinear models
further strengthen the necessity of using the nonlinear model.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 05:20:48 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Fu",
"Shuyue",
""
],
[
"Peng",
"Yihan",
""
],
[
"Gong",
"Shengping",
""
],
[
"Shi",
"Peng",
""
]
] |
2504.11772 | Kabeer Manali Rahul | Kabeer Manali Rahul | Admissible subcategories and metric techniques | null | null | null | null | math.AG math.CT | http://creativecommons.org/licenses/by/4.0/ | In this work, we provide a way of constructing new semiorthogonal
decompositions using metric techniques (\`a la Neeman). Given a semiorthogonal
decomposition on a category with a special kind of metric, which we call a
compressible metric, we can construct new semiorthogonal decomposition on a
category constructed from the given one using the aforementioned metric. In the
algebro-geometric setting, this gives us a way of producing new semiorthogonal
decompositions on various small triangulated categories associated to a scheme,
if we are given one. In the general setting, the work is related to that of
Sun-Zhang, while its applications to algebraic geometry are related to the work
of Bondarko and Kuznetsov-Shinder.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 05:24:55 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Rahul",
"Kabeer Manali",
""
]
] |
2504.11773 | Yiran Wang | Yiran Wang, Jiaqi Li, Chaoyi Hong, Ruibo Li, Liusheng Sun, Xiao Song,
Zhe Wang, Zhiguo Cao, Guosheng Lin | TacoDepth: Towards Efficient Radar-Camera Depth Estimation with
One-stage Fusion | Accepted by CVPR 2025 (Oral Presentation) | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Radar-Camera depth estimation aims to predict dense and accurate metric depth
by fusing input images and Radar data. Model efficiency is crucial for this
task in pursuit of real-time processing on autonomous vehicles and robotic
platforms. However, due to the sparsity of Radar returns, the prevailing
methods adopt multi-stage frameworks with intermediate quasi-dense depth, which
are time-consuming and not robust. To address these challenges, we propose
TacoDepth, an efficient and accurate Radar-Camera depth estimation model with
one-stage fusion. Specifically, the graph-based Radar structure extractor and
the pyramid-based Radar fusion module are designed to capture and integrate the
graph structures of Radar point clouds, delivering superior model efficiency
and robustness without relying on the intermediate depth results. Moreover,
TacoDepth can be flexible for different inference modes, providing a better
balance of speed and accuracy. Extensive experiments are conducted to
demonstrate the efficacy of our method. Compared with the previous
state-of-the-art approach, TacoDepth improves depth accuracy and processing
speed by 12.8% and 91.8%. Our work provides a new perspective on efficient
Radar-Camera depth estimation.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 05:25:04 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Wang",
"Yiran",
""
],
[
"Li",
"Jiaqi",
""
],
[
"Hong",
"Chaoyi",
""
],
[
"Li",
"Ruibo",
""
],
[
"Sun",
"Liusheng",
""
],
[
"Song",
"Xiao",
""
],
[
"Wang",
"Zhe",
""
],
[
"Cao",
"Zhiguo",
""
],
[
"Lin",
"Guosheng",
""
]
] |
2504.11774 | Ziyue Shen | Keke Gai, Ziyue Shen, Jing Yu, Liehuang Zhu, Qi Wu | PCDiff: Proactive Control for Ownership Protection in Diffusion Models
with Watermark Compatibility | null | null | null | null | cs.CR cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the growing demand for protecting the intellectual property (IP) of
text-to-image diffusion models, we propose PCDiff -- a proactive access control
framework that redefines model authorization by regulating generation quality.
At its core, PCDIFF integrates a trainable fuser module and hierarchical
authentication layers into the decoder architecture, ensuring that only users
with valid encrypted credentials can generate high-fidelity images. In the
absence of valid keys, the system deliberately degrades output quality,
effectively preventing unauthorized exploitation.Importantly, while the primary
mechanism enforces active access control through architectural intervention,
its decoupled design retains compatibility with existing watermarking
techniques. This satisfies the need of model owners to actively control model
ownership while preserving the traceability capabilities provided by
traditional watermarking approaches.Extensive experimental evaluations confirm
a strong dependency between credential verification and image quality across
various attack scenarios. Moreover, when combined with typical post-processing
operations, PCDIFF demonstrates powerful performance alongside conventional
watermarking methods. This work shifts the paradigm from passive detection to
proactive enforcement of authorization, laying the groundwork for IP management
of diffusion models.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 05:28:50 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Gai",
"Keke",
""
],
[
"Shen",
"Ziyue",
""
],
[
"Yu",
"Jing",
""
],
[
"Zhu",
"Liehuang",
""
],
[
"Wu",
"Qi",
""
]
] |
2504.11775 | Tianhe Zhang | Tianhe Zhang, Suhan Liu, Peng Shi | Discrimination-free Insurance Pricing with Privatized Sensitive
Attributes | null | null | null | null | stat.ML cs.CY cs.LG q-fin.RM | http://creativecommons.org/licenses/by/4.0/ | Fairness has emerged as a critical consideration in the landscape of machine
learning algorithms, particularly as AI continues to transform decision-making
across societal domains. To ensure that these algorithms are free from bias and
do not discriminate against individuals based on sensitive attributes such as
gender and race, the field of algorithmic bias has introduced various fairness
concepts, along with methodologies to achieve these notions in different
contexts. Despite the rapid advancement, not all sectors have embraced these
fairness principles to the same extent. One specific sector that merits
attention in this regard is insurance. Within the realm of insurance pricing,
fairness is defined through a distinct and specialized framework. Consequently,
achieving fairness according to established notions does not automatically
ensure fair pricing in insurance. In particular, regulators are increasingly
emphasizing transparency in pricing algorithms and imposing constraints on
insurance companies on the collection and utilization of sensitive consumer
attributes. These factors present additional challenges in the implementation
of fairness in pricing algorithms. To address these complexities and comply
with regulatory demands, we propose an efficient method for constructing fair
models that are tailored to the insurance domain, using only privatized
sensitive attributes. Notably, our approach ensures statistical guarantees,
does not require direct access to sensitive attributes, and adapts to varying
transparency requirements, addressing regulatory demands while ensuring
fairness in insurance pricing.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 05:29:11 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Zhang",
"Tianhe",
""
],
[
"Liu",
"Suhan",
""
],
[
"Shi",
"Peng",
""
]
] |
2504.11776 | Shih-Ying Hsu | Shih-Ying Hsu, Sheng-Yuan Liu, Xunchuan Liu, Pak Shing Li, Tie Liu,
Dipen Sahu, Kenichi Tatematsu, Shanghuo Li, Naomi Hirano, Chin-Fei Lee,
Sheng-Jun Lin | ALMASOP. Detection of Turbulence-induced Mass Assembly Shocks in
Starless Cores | 12 pages, 4+1 figures, accepted by ApJL | null | null | null | astro-ph.SR astro-ph.GA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Star formation is a series of mass assembly processes and starless cores,
those cold and dense condensations in molecular clouds, play a pivotal role as
initial seeds of stars. With only a limited sample of known starless cores,
however, the origin and growth of such stellar precursors had not been well
characterized previously. Meanwhile, the recent discovery of CH$_3$OH emission,
which is generally associated with desorbed icy mantle in warm regions,
particularly at the periphery of starless cores also remains puzzling. We
present sensitive ALMA (Band~3) observations (at 3~mm) toward a sample of newly
identified starless cores in the Orion Molecular Cloud. The spatially resolved
images distinctly indicate that the observed CH$_3$OH and N$_2$H$^+$ emission
associated with these cores are morphologically anti-correlated and
kinematically offset from each other. We postulate that the CH$_3$OH emission
highlights the desorption of icy mantle by shocks resulting from gas piling
onto dense cores in the filaments traced by N$_2$H$^+$. Our magnetohydrodynamic
(MHD) simulations of star formation in turbulent clouds combined with radiative
transfer calculations and imaging simulations successfully reproduced the
observed signatures and reaffirmed the above scenario at work. Our result
serves as an intriguing and exemplary illustration, a snapshot in time, of the
dynamic star-forming processes in turbulent clouds. The results offer
compelling insights into the mechanisms governing the growth of starless cores
and the presence of gas-phase complex organic molecules associated with these
cores.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 05:31:03 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Hsu",
"Shih-Ying",
""
],
[
"Liu",
"Sheng-Yuan",
""
],
[
"Liu",
"Xunchuan",
""
],
[
"Li",
"Pak Shing",
""
],
[
"Liu",
"Tie",
""
],
[
"Sahu",
"Dipen",
""
],
[
"Tatematsu",
"Kenichi",
""
],
[
"Li",
"Shanghuo",
""
],
[
"Hirano",
"Naomi",
""
],
[
"Lee",
"Chin-Fei",
""
],
[
"Lin",
"Sheng-Jun",
""
]
] |
2504.11777 | Yongpei Ma | Yongpei Ma, Pengyu Wang, Adam Dunn, Usman Naseem, Jinman Kim | Bridging the Semantic Gaps: Improving Medical VQA Consistency with
LLM-Augmented Question Sets | The first two listed authors contributed equally to this work | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Medical Visual Question Answering (MVQA) systems can interpret medical images
in response to natural language queries. However, linguistic variability in
question phrasing often undermines the consistency of these systems. To address
this challenge, we propose a Semantically Equivalent Question Augmentation
(SEQA) framework, which leverages large language models (LLMs) to generate
diverse yet semantically equivalent rephrasings of questions. Specifically,
this approach enriches linguistic diversity while preserving semantic meaning.
We further introduce an evaluation metric, Total Agreement Rate with
Semantically Equivalent Input and Correct Answer (TAR-SC), which assesses a
model's capability to generate consistent and correct responses to semantically
equivalent linguistic variations. In addition, we also propose three other
diversity metrics - average number of QA items per image (ANQI), average number
of questions per image with the same answer (ANQA), and average number of
open-ended questions per image with the same semantics (ANQS). Using the SEQA
framework, we augmented the benchmarked MVQA public datasets of SLAKE, VQA-RAD,
and PathVQA. As a result, all three datasets achieved significant improvements
by incorporating more semantically equivalent questions: ANQI increased by an
average of 86.1, ANQA by 85.1, and ANQS by 46. Subsequent experiments evaluate
three MVQA models (M2I2, MUMC, and BiomedGPT) under both zero-shot and
fine-tuning settings on the enhanced datasets. Experimental results in MVQA
datasets show that fine-tuned models achieve an average accuracy improvement of
19.35%, while our proposed TAR-SC metric shows an average improvement of 11.
61%, indicating a substantial enhancement in model consistency.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 05:31:18 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Ma",
"Yongpei",
""
],
[
"Wang",
"Pengyu",
""
],
[
"Dunn",
"Adam",
""
],
[
"Naseem",
"Usman",
""
],
[
"Kim",
"Jinman",
""
]
] |
2504.11778 | Haiyang Chen | Haiyang Chen, Fo-Hong Wang, Qiang Gao, Xue-Jian Gao, Zhenhua Chen,
Yaobo Huang, Kam Tuen Law, Xiao Yan Xu, Peng Chen | Spectroscopic evidence for possible quantum spin liquid behavior in a
two-dimensional Mott insulator | null | Phys. Rev. Lett. 134, 066402 (2025) | 10.1103/PhysRevLett.134.066402 | null | cond-mat.str-el | http://creativecommons.org/licenses/by/4.0/ | Mott insulators with localized magnetic moments will exhibit a quantum spin
liquid (QSL) state when the quantum fluctuations are strong enough to suppress
the ordering of the spins. Such an entangled state will give rise to collective
excitations, in which spin and charge information are carried separately. Our
angle-resolved photoemission spectroscopy (ARPES) measurements on single-layer
1T-TaS2 show a flat band around the zone center and a gap opening of about 200
meV in the low temperature, indicating 2D Mott insulating nature in the system.
This flat band is dispersionless in momentum space but shows anomalously broad
width around the zone center and the spectral weight decays rapidly as momentum
increases. The observation is described as a spectral continuum from electron
fractionalization, corroborated by a low energy effective model.The intensity
of the flat band is reduced by surface doping with magnetic adatoms and the gap
is closing, a result from the interaction between spin impurities coupled with
spinons and the chargons, which gives rise to a charge redistribution. Doping
with nonmagnetic impurities behaves differently as the chemical potential shift
dominates. These findings provide insight into the QSL states of strongly
correlated electrons on 2D triangular lattices.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 05:31:42 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Chen",
"Haiyang",
""
],
[
"Wang",
"Fo-Hong",
""
],
[
"Gao",
"Qiang",
""
],
[
"Gao",
"Xue-Jian",
""
],
[
"Chen",
"Zhenhua",
""
],
[
"Huang",
"Yaobo",
""
],
[
"Law",
"Kam Tuen",
""
],
[
"Xu",
"Xiao Yan",
""
],
[
"Chen",
"Peng",
""
]
] |
2504.11779 | Qishun Wang | Qishun Wang, Zhengzheng Tu, Chenglong Li, Bo Jiang | Multimodal Spatio-temporal Graph Learning for Alignment-free RGBT Video
Object Detection | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | RGB-Thermal Video Object Detection (RGBT VOD) can address the limitation of
traditional RGB-based VOD in challenging lighting conditions, making it more
practical and effective in many applications.
However, similar to most RGBT fusion tasks, it still mainly relies on
manually aligned multimodal image pairs.
In this paper, we propose a novel Multimodal Spatio-temporal Graph learning
Network (MSGNet) for alignment-free RGBT VOD problem by leveraging the robust
graph representation learning model.
Specifically, we first design an Adaptive Partitioning Layer (APL) to
estimate the corresponding regions of the Thermal image within the RGB image
(high-resolution), achieving a preliminary inexact alignment.
Then, we introduce the Spatial Sparse Graph Learning Module (S-SGLM) which
employs a sparse information passing mechanism on the estimated inexact
alignment to achieve reliable information interaction between different
modalities.
Moreover, to fully exploit the temporal cues for RGBT VOD problem, we
introduce Hybrid Structured Temporal Modeling (HSTM), which involves a Temporal
Sparse Graph Learning Module (T-SGLM) and Temporal Star Block (TSB). T-SGLM
aims to filter out some redundant information between adjacent frames by
employing the sparse aggregation mechanism on the temporal graph. Meanwhile,
TSB is dedicated to achieving the complementary learning of local spatial
relationships.
Extensive comparative experiments conducted on both the aligned dataset
VT-VOD50 and the unaligned dataset UVT-VOD2024 demonstrate the effectiveness
and superiority of our proposed method. Our project will be made available on
our website for free public access.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 05:32:59 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Wang",
"Qishun",
""
],
[
"Tu",
"Zhengzheng",
""
],
[
"Li",
"Chenglong",
""
],
[
"Jiang",
"Bo",
""
]
] |
2504.11780 | Maria Spichkova | Maria Spichkova, Hina Lee, Kevin Iwan, Madeleine Zwart, Yuwon Yoon,
Xiaohan Qin | Agile Retrospectives: What went well? What didn't go well? What should
we do? | Preprint. Accepted to the 20th International Conference on Evaluation
of Novel Approaches to Software Engineering (ENASE 2025). Final version to be
published by SCITEPRESS, http://www.scitepress.org | null | null | null | cs.SE cs.AI | http://creativecommons.org/licenses/by-nc-nd/4.0/ | In Agile/Scrum software development, the idea of retrospective meetings
(retros) is one of the core elements of the project process. In this paper, we
present our work in progress focusing on two aspects: analysis of potential
usage of generative AI for information interaction within retrospective
meetings, and visualisation of retros' information to software development
teams. We also present our prototype tool RetroAI++, focusing on retros-related
functionalities.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 05:33:35 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Spichkova",
"Maria",
""
],
[
"Lee",
"Hina",
""
],
[
"Iwan",
"Kevin",
""
],
[
"Zwart",
"Madeleine",
""
],
[
"Yoon",
"Yuwon",
""
],
[
"Qin",
"Xiaohan",
""
]
] |
2504.11781 | Guanchun Wang | Guanchun Wang, Xiangrong Zhang, Yifei Zhang, Zelin Peng, Tianyang
Zhang, Xu Tang, and Licheng Jiao | ACMamba: Fast Unsupervised Anomaly Detection via An Asymmetrical
Consensus State Space Model | 15 pages, 9 figures | null | null | null | cs.CV cs.AI cs.LG | http://creativecommons.org/licenses/by/4.0/ | Unsupervised anomaly detection in hyperspectral images (HSI), aiming to
detect unknown targets from backgrounds, is challenging for earth surface
monitoring. However, current studies are hindered by steep computational costs
due to the high-dimensional property of HSI and dense sampling-based training
paradigm, constraining their rapid deployment. Our key observation is that,
during training, not all samples within the same homogeneous area are
indispensable, whereas ingenious sampling can provide a powerful substitute for
reducing costs. Motivated by this, we propose an Asymmetrical Consensus State
Space Model (ACMamba) to significantly reduce computational costs without
compromising accuracy. Specifically, we design an asymmetrical anomaly
detection paradigm that utilizes region-level instances as an efficient
alternative to dense pixel-level samples. In this paradigm, a low-cost
Mamba-based module is introduced to discover global contextual attributes of
regions that are essential for HSI reconstruction. Additionally, we develop a
consensus learning strategy from the optimization perspective to simultaneously
facilitate background reconstruction and anomaly compression, further
alleviating the negative impact of anomaly reconstruction. Theoretical analysis
and extensive experiments across eight benchmarks verify the superiority of
ACMamba, demonstrating a faster speed and stronger performance over the
state-of-the-art.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 05:33:42 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Wang",
"Guanchun",
""
],
[
"Zhang",
"Xiangrong",
""
],
[
"Zhang",
"Yifei",
""
],
[
"Peng",
"Zelin",
""
],
[
"Zhang",
"Tianyang",
""
],
[
"Tang",
"Xu",
""
],
[
"Jiao",
"Licheng",
""
]
] |
2504.11782 | Si-Sheng Young | Chia-Hsiang Lin and Si-Sheng Young | HyperKING: Quantum-Classical Generative Adversarial Networks for
Hyperspectral Image Restoration | 19 pages, 15 figures, accepted by IEEE Transactions on Geoscience and
Remote Sensing | null | null | null | eess.IV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Quantum machine intelligence starts showing its impact on satellite remote
sensing (SRS). Also, recent literature exhibits that quantum generative
intelligences encompass superior potential than their classical counterpart,
motivating us to develop quantum generative adversarial networks (GANs) for
SRS. However, existing quantum GANs are restricted by the limited quantum bit
(qubit) resources of current quantum computers and process merely a small 2x2
grayscale image, far from being applicable to SRS. Recently, the novel concept
of hybrid quantum-classical GAN, a quantum generator with a classical
discriminator, has upgraded the order to 28x28 (still grayscale), whereas it is
still insufficient for SRS. This motivates us to design a radically new hybrid
framework, where both generator and discriminator are hybrid architectures. We
demonstrate this feasibility, leading to a breakthrough of processing 128x128
hyperspectral images for SRS. Specifically, we design the quantum part with
mathematically provable quantum full expressibility (FE) to address core signal
processing tasks, wherein the FE property allows the quantum network to realize
any valid quantum operator with appropriate training. The classical part,
composed of convolutional layers, treats the read-in (compressing the optical
information into limited qubits) and read-out (addressing the quantum collapse
effect) procedures. The proposed innovative hybrid quantum GAN, named
Hyperspectral Knot-like IntelligeNt dIscrimiNator and Generator (HyperKING),
where knot partly symbolizes the quantum entanglement and partly the compressed
quantum domain in the central part of the network architecture. HyperKING
significantly surpasses the classical approaches in hyperspectral tensor
completion, mixed noise removal (about 3dB improvement), and blind source
separation results.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 05:35:06 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Lin",
"Chia-Hsiang",
""
],
[
"Young",
"Si-Sheng",
""
]
] |
2504.11783 | Dawei Wang | Dawei Wang, Geng Zhou, Xianglong Li, Yu Bai, Li Chen, Ting Qin, Jian
Sun, Dan Li | The Digital Cybersecurity Expert: How Far Have We Come? | To appear in the IEEE Symposium on Security and Privacy (IEEE S&P)
2025, San Francisco, CA, USA | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The increasing deployment of large language models (LLMs) in the
cybersecurity domain underscores the need for effective model selection and
evaluation. However, traditional evaluation methods often overlook specific
cybersecurity knowledge gaps that contribute to performance limitations. To
address this, we develop CSEBenchmark, a fine-grained cybersecurity evaluation
framework based on 345 knowledge points expected of cybersecurity experts.
Drawing from cognitive science, these points are categorized into factual,
conceptual, and procedural types, enabling the design of 11,050 tailored
multiple-choice questions. We evaluate 12 popular LLMs on CSEBenchmark and find
that even the best-performing model achieves only 85.42% overall accuracy, with
particular knowledge gaps in the use of specialized tools and uncommon
commands. Different LLMs have unique knowledge gaps. Even large models from the
same family may perform poorly on knowledge points where smaller models excel.
By identifying and addressing specific knowledge gaps in each LLM, we achieve
up to an 84% improvement in correcting previously incorrect predictions across
three existing benchmarks for two cybersecurity tasks. Furthermore, our
assessment of each LLM's knowledge alignment with specific cybersecurity roles
reveals that different models align better with different roles, such as GPT-4o
for the Google Senior Intelligence Analyst and Deepseek-V3 for the Amazon
Privacy Engineer. These findings underscore the importance of aligning LLM
selection with the specific knowledge requirements of different cybersecurity
roles for optimal performance.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 05:36:28 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Wang",
"Dawei",
""
],
[
"Zhou",
"Geng",
""
],
[
"Li",
"Xianglong",
""
],
[
"Bai",
"Yu",
""
],
[
"Chen",
"Li",
""
],
[
"Qin",
"Ting",
""
],
[
"Sun",
"Jian",
""
],
[
"Li",
"Dan",
""
]
] |
2504.11784 | Xiao HaoYun | Junwei Zhou, HaoYun Xiao, Jianwen Xi and Qiuzhen Lin | DALC: Distributed Arithmetic Coding Aided by Linear Codes | 7 pages, 7 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Distributed Arithmetic Coding (DAC) has emerged as a feasible solution to the
Slepian-Wolf problem, particularly in scenarios with non-stationary sources and
for data sequences with lengths ranging from small to medium. Due to the
inherent decoding ambiguity in DAC, the number of candidate paths grows
exponentially with the increase in source length. To select the correct
decoding path from the set of candidates, DAC decoders utilize the Maximum A
Posteriori (MAP) metric to rank the decoding sequences, outputting the path
with the highest MAP metric as the decoding result of the decoder. However,
this method may still inadvertently output incorrect paths that have a MAP
metric higher than the correct decoding path, despite not being the correct
decoding path. To address the issue, we propose Distributed Arithmetic Coding
Aided by Linear Codes (DALC), which employs linear codes to constrain the
decoding process, thereby eliminating some incorrect paths and preserving the
correct one. During the encoding phase, DALC generates the parity bits of the
linear code for encoding the source data. In the decoding phase, each path in
the set of candidate paths is verified in descending order according to the MAP
metric until a path that meets the verification criteria is encountered, which
is then outputted as the decoding result. DALC enhances the decoding
performance of DAC by excluding candidate paths that do not meet the
constraints imposed by linear codes. Our experimental results demonstrate that
DALC reduces the Bit Error Rate(BER), with especially improvements in skewed
source data scenarios.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 05:36:52 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Zhou",
"Junwei",
""
],
[
"Xiao",
"HaoYun",
""
],
[
"Xi",
"Jianwen",
""
],
[
"Lin",
"Qiuzhen",
""
]
] |
2504.11785 | Qiang Gao | Qiang Gao, Xiaoyan Zhang | Ground state and multiple normalized solutions of quasilinear
Schr\"odinger equations in the $L^2$-supercritical case and the Sobolev
critical case | null | null | null | null | math.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper is devoted to studying the existence of normalized solutions for
the following quasilinear Schr\"odinger equation \begin{equation*}
\begin{aligned}
-\Delta u-u\Delta u^2 +\lambda u=|u|^{p-2}u \quad\mathrm{in}\ \mathbb{R}^{N},
\end{aligned} \end{equation*} where $N=3,4$, $\lambda$ appears as a Lagrange
multiplier and $p \in (4+\frac{4}{N},2\cdot2^*]$. The solutions correspond to
critical points of the energy functional subject to the $L^2$-norm constraint
$\int_{\mathbb{R}^N}|u|^2dx=a^2>0$. In the Sobolev critical case $p=2\cdot
2^*$, the energy functional has no critical point. As for $L^2$-supercritical
case $p \in (4+\frac{4}{N},2\cdot2^*)$: on the one hand, taking into account
Pohozaev manifold and perturbation method, we obtain the existence of ground
state normalized solutions for the non-radial case; on the other hand, we get
the existence of infinitely many normalized solutions in $H^1_r(\mathbb{R}^N)$.
Moreover, our results cover several relevant existing results. And in the end,
we get the asymptotic properties of energy as $a$ tends to $+\infty$ and $a$
tends to $0^+$.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 05:37:28 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Gao",
"Qiang",
""
],
[
"Zhang",
"Xiaoyan",
""
]
] |
2504.11786 | Keunsoo Heo | Sang-Jun Park, Keun-Soo Heo, Dong-Hee Shin, Young-Han Son, Ji-Hye Oh,
Tae-Eui Kam | DART: Disease-aware Image-Text Alignment and Self-correcting
Re-alignment for Trustworthy Radiology Report Generation | The IEEE/CVF Conference on Computer Vision and Pattern Recognition
(CVPR) 2025 | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/4.0/ | The automatic generation of radiology reports has emerged as a promising
solution to reduce a time-consuming task and accurately capture critical
disease-relevant findings in X-ray images. Previous approaches for radiology
report generation have shown impressive performance. However, there remains
significant potential to improve accuracy by ensuring that retrieved reports
contain disease-relevant findings similar to those in the X-ray images and by
refining generated reports. In this study, we propose a Disease-aware
image-text Alignment and self-correcting Re-alignment for Trustworthy radiology
report generation (DART) framework. In the first stage, we generate initial
reports based on image-to-text retrieval with disease-matching, embedding both
images and texts in a shared embedding space through contrastive learning. This
approach ensures the retrieval of reports with similar disease-relevant
findings that closely align with the input X-ray images. In the second stage,
we further enhance the initial reports by introducing a self-correction module
that re-aligns them with the X-ray images. Our proposed framework achieves
state-of-the-art results on two widely used benchmarks, surpassing previous
approaches in both report generation and clinical efficacy metrics, thereby
enhancing the trustworthiness of radiology reports.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 05:39:08 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Park",
"Sang-Jun",
""
],
[
"Heo",
"Keun-Soo",
""
],
[
"Shin",
"Dong-Hee",
""
],
[
"Son",
"Young-Han",
""
],
[
"Oh",
"Ji-Hye",
""
],
[
"Kam",
"Tae-Eui",
""
]
] |
2504.11787 | Souradeep Bhattacharya | Souradeep Bhattacharya and Kanak Saha | The AstroSat UV Deep Field South. III. Evolution of the UV Luminosity
Function and Luminosity Density from z~0.8-0.4 | 7 pages, 5 figures, 1 table, Accepted for publication in MNRAS
Letters. arXiv admin note: text overlap with arXiv:2310.01903 | null | null | null | astro-ph.GA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We characterise the rest-frame 1500 \r{A} UV luminosity Function (UVLF) from
deep AstroSat/UVIT F154W and N242W imaging in the Great Observatories Origins
Survey South (GOODS-S) deep field. The UVLFs are constructed and subsequently
characterised with fitted Schechter function parameters from FUV observations
at z$<0.13$ and NUV observations in seven redshift bins in z~0.8-0.4. The UVLF
slope ($\alpha$) and characteristic magnitude ($M^*$) are consistent with
previous determinations for this redshift range based on AstroSat/UVIT
GOODS-North observations, as well as with those from Galaxy evolution Explorer
and Hubble Space Telescope observations. However, differences in the
normalisation factor ($\phi_{*}$) are present for UVLFs for some redshift bins.
We compute the UV luminosity density, $\rho_{\rm UV}$, combining our determined
UVLF parameters with literature determinations out to z$\sim10$. The $\rho_{\rm
UV}$ trend with redshift implies the rapid increase in cosmic star formation
till its peak at z$\sim3$ (cosmic noon) followed by a slow decline till present
day. Both the initial increase in cosmic star formation and subsequent decline
are found to be more rapid than previous determinations.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 05:40:32 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Bhattacharya",
"Souradeep",
""
],
[
"Saha",
"Kanak",
""
]
] |
2504.11788 | Zhisong Zhang | Zhisong Zhang, Tianqing Fang, Kaixin Ma, Wenhao Yu, Hongming Zhang,
Haitao Mi, Dong Yu | Enhancing Web Agents with Explicit Rollback Mechanisms | null | null | null | null | cs.CL cs.AI | http://creativecommons.org/licenses/by/4.0/ | With recent advancements in large language models, web agents have been
greatly improved. However, dealing with complex and dynamic web environments
requires more advanced planning and search abilities. Previous studies usually
adopt a greedy one-way search strategy, which may struggle to recover from
erroneous states. In this work, we enhance web agents with an explicit rollback
mechanism, enabling the agent to revert back to a previous state in its
navigation trajectory. This mechanism gives the model the flexibility to
directly control the search process, leading to an effective and efficient web
navigation method. We conduct experiments on two live web navigation benchmarks
with zero-shot and fine-tuning settings. The results demonstrate the
effectiveness of our proposed approach.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 05:41:20 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Zhang",
"Zhisong",
""
],
[
"Fang",
"Tianqing",
""
],
[
"Ma",
"Kaixin",
""
],
[
"Yu",
"Wenhao",
""
],
[
"Zhang",
"Hongming",
""
],
[
"Mi",
"Haitao",
""
],
[
"Yu",
"Dong",
""
]
] |
2504.11789 | Andrea Davini Mr. | Andrea Davini and Hitoshi Ishii | The vanishing discount problem for nonlocal Hamilton-Jacobi equations | 45 pages | null | null | Roma01.Math | math.AP math.FA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We establish a convergence result for the vanishing discount problem in the
context of nonlocal HJ equations. We consider a fairly general class of
discounted first-order and convex HJ equations which incorporate an
integro-differential operator posed on the $d$-dimensional torus, and we show
that the solutions converge to a specific critical solution as the discount
factor tends to zero. Our approach relies on duality techniques for nonlocal
convex HJ equations, building upon Hahn-Banach separation theorems to develop a
generalized notion of Mather measure. The results are applied to a specific
class of convex and superlinear Hamiltonians.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 05:42:24 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Davini",
"Andrea",
""
],
[
"Ishii",
"Hitoshi",
""
]
] |
2504.11790 | Philipp del Hougne | Philipp del Hougne | Virtual VNA 3.1: Non-Coherent-Detection-Based Non-Reciprocal Scattering
Matrix Estimation Leveraging a Tunable Load Network | 9 pages including 6 figures | null | null | null | physics.app-ph eess.SP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We refine the recently introduced "Virtual VNA 3.0" technique to remove the
need for coherent detection. The resulting "Virtual VNA 3.1" technique can
unambiguously estimate the full scattering matrix of a non-reciprocal, linear,
passive, time-invariant device under test (DUT) with $N$ monomodal ports using
an $N_\mathrm{A}$-channel coherent wavefront generator and an
$N_\mathrm{A}$-channel non-coherent detector, where $N_\mathrm{A}<N$. Waves are
injected and received only via a fixed set of $N_\mathrm{A}$ "accessible" DUT
ports while the remaining $N_\mathrm{S}$ "not-directly-accessible" DUT ports
are terminated by a specific tunable load network. To resolve all ambiguities,
an additional modified setup is required in which waves are injected and
received via a known $2N_\mathrm{A}$-port system connected to the DUT's
accessible ports. We experimentally validate our method for
$N_\mathrm{A}=N_\mathrm{S}=4$ considering a non-reciprocal eight-port circuit
as DUT. By eliminating the need for coherent detection, our work reduces the
hardware complexity which may facilitate applications to large-scale or
higher-frequency systems. Additionally, our work provides fundamental insights
into the minimal requirements to fully and unambiguously characterize a
non-reciprocal DUT.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 05:42:51 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"del Hougne",
"Philipp",
""
]
] |
2504.11791 | Adil Jueid | A. Hammad, Adil Jueid | Progress in ${\cal CP}$ violating top-Higgs coupling at the LHC with
Machine Learning | 19 pages, 4 figures. Invited Review | null | null | CTPU-PTC-25-08 | hep-ph | http://creativecommons.org/licenses/by/4.0/ | A precise measurement of the top-Higgs coupling is essential in particle
physics, as it offers a powerful probe of potential new physics beyond the
Standard Model (BSM), particularly scenarios involving ${\cal CP}$ violation,
which is a key condition in addressing the problem of baryon asymmetry of the
universe. In this article, we review the recent progress in the studies of the
the top-Higgs coupling at the Large Hadron Collider (LHC). We briefly highlight
the recent Machine Learning (ML) algorithms being used and their role in
constraining the ${\cal CP}$ phase of the top-Higgs coupling with an emphasis
on the future potential of beyond-the-traditional methods such as transformers
and heterogeneous graphs in these studies.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 05:46:16 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Hammad",
"A.",
""
],
[
"Jueid",
"Adil",
""
]
] |
2504.11792 | Md Sultan Al Nahian | Md Sultan Al Nahian, Chris Delcher, Daniel Harris, Peter Akpunonu and
Ramakanth Kavuluru | Large Language Models for Drug Overdose Prediction from Longitudinal
Medical Records | null | null | null | null | cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The ability to predict drug overdose risk from a patient's medical records is
crucial for timely intervention and prevention. Traditional machine learning
models have shown promise in analyzing longitudinal medical records for this
task. However, recent advancements in large language models (LLMs) offer an
opportunity to enhance prediction performance by leveraging their ability to
process long textual data and their inherent prior knowledge across diverse
tasks. In this study, we assess the effectiveness of Open AI's GPT-4o LLM in
predicting drug overdose events using patients' longitudinal insurance claims
records. We evaluate its performance in both fine-tuned and zero-shot settings,
comparing them to strong traditional machine learning methods as baselines. Our
results show that LLMs not only outperform traditional models in certain
settings but can also predict overdose risk in a zero-shot setting without
task-specific training. These findings highlight the potential of LLMs in
clinical decision support, particularly for drug overdose risk prediction.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 05:52:22 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Nahian",
"Md Sultan Al",
""
],
[
"Delcher",
"Chris",
""
],
[
"Harris",
"Daniel",
""
],
[
"Akpunonu",
"Peter",
""
],
[
"Kavuluru",
"Ramakanth",
""
]
] |
2504.11794 | R. Henry Liu | R. Henry Liu, Boryana Hadzhiyska, Simone Ferraro, Sownak Bose, C\'esar
Hern\'andez-Aguayo | Fast Baryonic Field Painting for Sunyaev-Zel'dovich Analyses: Transfer
Function vs. Hybrid Effective Field Theory | 13 pages, 8 figures, comments welcome | null | null | null | astro-ph.CO | http://creativecommons.org/licenses/by/4.0/ | We present two approaches for "painting" baryonic properties relevant to the
Sunyaev-Zel'dovich (SZ) effect - optical depth and Compton-$y$ - onto
3-dimensional $N$-body simulations, using the MillenniumTNG suite as a
benchmark. The goal of these methods is to produce fast and accurate
reconstruction methods to aid future analyses of baryonic feedback using the SZ
effect. The first approach employs a Gaussian Process emulator to model the SZ
quantities via a transfer function, while the second utilizes Hybrid Effective
Field Theory (HEFT) to reproduce these quantities within the simulation. Our
analysis involves comparing both methods to the true MillenniumTNG optical
depth and Compton-$y$ fields using several metrics, including the
cross-correlation coefficient, power spectrum, and power spectrum error.
Additionally, we assess how well the reconstructed fields correlate with dark
matter haloes across various mass thresholds. The results indicate that the
transfer function method yields more accurate reconstructions for fields with
initially high correlations ($r \approx 1$), such as between the optical depth
and dark matter fields. Conversely, the HEFT-based approach proves more
effective in enhancing correlations for fields with weaker initial correlations
($r \sim 0.5$), such as between the Compton-$y$ and dark matter fields. Lastly,
we discuss extensions of our methods to improve the reconstruction performance
at the field level.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 06:00:21 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Liu",
"R. Henry",
""
],
[
"Hadzhiyska",
"Boryana",
""
],
[
"Ferraro",
"Simone",
""
],
[
"Bose",
"Sownak",
""
],
[
"Hernández-Aguayo",
"César",
""
]
] |
2504.11795 | Sitong Wang | Sitong Wang, Samia Menon, Dingzeyu Li, Xiaojuan Ma, Richard Zemel,
Lydia B. Chilton | Schemex: Interactive Structural Abstraction from Examples with
Contrastive Refinement | null | null | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Each type of creative or communicative work is underpinned by an implicit
structure. People learn these structures from examples - a process known in
cognitive science as schema induction. However, inducing schemas is
challenging, as structural patterns are often obscured by surface-level
variation. We present Schemex, an interactive visual workflow that scaffolds
schema induction through clustering, abstraction, and contrastive refinement.
Schemex supports users through visual representations and interactive
exploration that connect abstract structures to concrete examples, promoting
transparency, adaptability, and effective human-AI collaboration. In our user
study, participants reported significantly greater insight and confidence in
the schemas developed with Schemex compared to those created using a baseline
of an AI reasoning model. We conclude by discussing the broader implications of
structural abstraction and contrastive refinement across domains.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 06:02:31 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Wang",
"Sitong",
""
],
[
"Menon",
"Samia",
""
],
[
"Li",
"Dingzeyu",
""
],
[
"Ma",
"Xiaojuan",
""
],
[
"Zemel",
"Richard",
""
],
[
"Chilton",
"Lydia B.",
""
]
] |
2504.11796 | Yasuhiro Fukuma | Kazuki Shintaku, Arun Jacob Mathew, Akihisa Iwamoto, Mojtaba
Mohammadi, Hiroyuki Awano, Hironori Asada, Yasuhiro Fukuma | Efficient spin-orbit torque driven magnetization switching of GdFe using
phosphorus-implanted platinum layers | null | null | null | null | cond-mat.mtrl-sci | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The capability of the spin-orbit torque (SOT) generated via phenomena such as
the spin Hall effect in heavy metals, in switching the magnetization of an
adjacent magnetic material, has been studied extensively over the last decade.
The efficiency of SOT generation is commonly quantified in terms of the spin
Hall angle {\theta}_SH. In this work, we demonstrate experimentally that
implanting platinum (Pt) with phosphorus (P), resulting in Pt (P) d, where d
denotes the implantation dose, increases {\theta}_SH by a factor of 7, from
0.06 (d = 0) to 0.43 (d = 10*10^16 ions/cm^2). The enhanced {\theta}_SH, along
with factors such as perpendicular magnetic anisotropy and resistivity, lead to
reduction of the critical current density for switching the perpendicular
magnetization of ferrimagnetic rare earth-transition metal alloy Gd26Fe74, by a
factor of nearly 27, from 4.0*1011 A/m^2 (d = 0) to 1.5*10^10 A/m^2 (d =
10*10^16 ions/cm^2). Further, the switching current density at zero thermal
fluctuations and thermal stability factor were evaluated and found to be
2.0*10^10 A/m^2 and 61.4 (d = 10*10^16 ions/cm^2), with the latter being
sufficiently above the required threshold for commercial memory applications.
Our results suggest that Pt (P) could be a strong candidate in realizing
efficient SOT driven magnetization switching leading to the development of
improved memory and logic devices in the future.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 06:03:53 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Shintaku",
"Kazuki",
""
],
[
"Mathew",
"Arun Jacob",
""
],
[
"Iwamoto",
"Akihisa",
""
],
[
"Mohammadi",
"Mojtaba",
""
],
[
"Awano",
"Hiroyuki",
""
],
[
"Asada",
"Hironori",
""
],
[
"Fukuma",
"Yasuhiro",
""
]
] |
2504.11797 | Yongxin Xiong | Yongxin Xiong, Heng Wu, Yifei Li, Xiongfei Wang | Analysis of Power Swing Characteristics of Grid-Forming VSC System
Considering the Current Limitation Mode | null | null | null | null | eess.SY cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper investigates power swing characteristics of grid-forming voltage
source converter (GFM-VSC) systems considering the current limitation mode in
both non-inertial and inertial GFM-VSC systems. Following grid faults,
non-inertial GFM-VSC systems can re-synchronize with the grid but may
experience significant power swings driven by its control dynamics, while
inertial GFM-VSC systems may exhibit loss of synchronization (LOS),
characterized by the divergence of the output angle in the active power control
loop. These behaviours are different from conventional synchronous generator
(SG)-based systems, where power swings are typically characterized by physical
angle deviations among power sources. Based on these findings, this paper
explores the performance of traditional impedance-based swing detection schemes
in GFM-VSC systems. The theoretical analysis is validated through various
simulations using the PSCAD/EMTDC platform, covering both single and
multi-machine system scenarios.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 06:07:43 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Xiong",
"Yongxin",
""
],
[
"Wu",
"Heng",
""
],
[
"Li",
"Yifei",
""
],
[
"Wang",
"Xiongfei",
""
]
] |
2504.11798 | Tianyi Zhang | Chao Yuan, Tianyi Zhang, Guanglin Niu | Neighbor-Based Feature and Index Enhancement for Person
Re-Identification | Comment: This paper has been accepted for publication in the 2025
IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops
(CVPRW) | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Person re-identification (Re-ID) aims to match the same pedestrian in a large
gallery with different cameras and views. Enhancing the robustness of the
extracted feature representations is a main challenge in Re-ID. Existing
methods usually improve feature representation by improving model architecture,
but most methods ignore the potential contextual information, which limits the
effectiveness of feature representation and retrieval performance. Neighborhood
information, especially the potential information of multi-order neighborhoods,
can effectively enrich feature expression and improve retrieval accuracy, but
this has not been fully explored in existing research. Therefore, we propose a
novel model DMON-ARO that leverages latent neighborhood information to enhance
both feature representation and index performance. Our approach is built on two
complementary modules: Dynamic Multi-Order Neighbor Modeling (DMON) and
Asymmetric Relationship Optimization (ARO). The DMON module dynamically
aggregates multi-order neighbor relationships, allowing it to capture richer
contextual information and enhance feature representation through adaptive
neighborhood modeling. Meanwhile, ARO refines the distance matrix by optimizing
query-to-gallery relationships, improving the index accuracy. Extensive
experiments on three benchmark datasets demonstrate that our approach achieves
performance improvements against baseline models, which illustrate the
effectiveness of our model. Specifically, our model demonstrates improvements
in Rank-1 accuracy and mAP. Moreover, this method can also be directly extended
to other re-identification tasks.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 06:13:20 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Yuan",
"Chao",
""
],
[
"Zhang",
"Tianyi",
""
],
[
"Niu",
"Guanglin",
""
]
] |
2504.11799 | Nicholas Funai | Nicholas Funai | Gaussian states in quantum field theory: Exact representations of
relative phase in superpositions of Gaussian states | 14 pages (11 + 3 pages of Appendices). 2 figures. RevTeX 4.2 | null | null | null | quant-ph gr-qc hep-th | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Gaussian quantum mechanics is a powerful tool regularly used in quantum
optics to model linear and quadratic Hamiltonians efficiently. Recent interest
in qubit-CV hybrid models has revealed a simple, yet important gap in our
knowledge, namely, how to fully manipulate superpositions of Gaussian states.
In this paper, we show how to faithfully represent a quadratic Gaussian state
in the Fock basis. Specifically, we evaluate the phase necessary to equate the
unitary representation of a zero-mean Gaussian state with its Fock
representation. This allows for the coherent manipulation of superpositions of
Gaussian states, especially the evaluation of expectation values from these
superposed states. We then use this method to model a simple quantum field
theory communication protocol using quadratic detectors in a regime that has
previously been impossible to solve. The result presented in this paper is
expected to become increasingly relevant with hybrid-CV systems, especially in
the strong-coupling regime.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 06:13:36 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Funai",
"Nicholas",
""
]
] |
2504.11800 | Shubo Li | Shubo Li, Ran Li, Kaihao Wang, Zixiang Jia, Xiaoyue Cao, Carlos S.
Frenk, Fangzhou Jiang, Aristeidis Amvrosiadis, Shaun Cole, Qiuhan He, Samuel
C. Lange, Richard Massey, James W. Nightingale, Andrew Robertson, Maximilian
von Wietersheim-Kramsta, and Xianghao Ma | The "Little Dark Dot": Evidence for Self-Interacting Dark Matter in the
Strong Lens SDSSJ0946+1006? | 15 pages, 10 figures | null | null | null | astro-ph.GA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Previous studies, based on precise modeling of a gravitationally lensing
image, have identified what may be a extremely compact, dark perturber in the
well-known lensing system SDSSJ0946+1006 (the "Jackpot"). Its remarkable
compactness challenges the standard cold dark matter (CDM) paradigm. In this
paper, we explore whether such a compact perturber could be explained as a
core-collapsed halo described by the self-interacting dark matter (SIDM) model.
Using the isothermal Jeans method, we compute the density profiles of
core-collapsed halos across a range of masses. Our comparison with observations
indicates that only a core-collapsed halo with a total mass of approximately
$10^{11}~{\rm M_{\odot}}$ could produce an inner density profile and mass
enclosed within 1 kpc that is consistent with observational data. However, such
a massive dark matter halo should host a galaxy detectable by prior Hubble
imaging, which is not observed. Thus, the core-collapsed SIDM halo model
struggles to fully account for the exotic nature of the "little dark dot" in
the "Jackpot" lens.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 06:16:51 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Li",
"Shubo",
""
],
[
"Li",
"Ran",
""
],
[
"Wang",
"Kaihao",
""
],
[
"Jia",
"Zixiang",
""
],
[
"Cao",
"Xiaoyue",
""
],
[
"Frenk",
"Carlos S.",
""
],
[
"Jiang",
"Fangzhou",
""
],
[
"Amvrosiadis",
"Aristeidis",
""
],
[
"Cole",
"Shaun",
""
],
[
"He",
"Qiuhan",
""
],
[
"Lange",
"Samuel C.",
""
],
[
"Massey",
"Richard",
""
],
[
"Nightingale",
"James W.",
""
],
[
"Robertson",
"Andrew",
""
],
[
"von Wietersheim-Kramsta",
"Maximilian",
""
],
[
"Ma",
"Xianghao",
""
]
] |
2504.11801 | Jaesung Song | Jaesung Song, Young-Ik Sohn | Ultra-fast and accurate multimode waveguide design based on
dataset-based eigenmode expansion method | null | null | null | null | physics.optics | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a dataset-based photonic simulation framework for multimode
waveguide design, enabling ultra-fast simulations with high accuracy. Compared
to conventional approaches, our method offers two to three orders of magnitude
speed-up in complex multimode waveguide designs. Based on this approach, we
demonstrate a silicon multimode waveguide bend with an effective radius of
$30\,\mu\mathrm{m}$ under one second, with accuracy validated against
commercial 3D finite-difference time-domain method. We further explore its
utility for device optimization by designing a $20\,\mu \mathrm{m}$-radius,
arbitrary power splitting ratio bends through thousands of optimization
iterations, completed in just 68 minutes on a standard desktop CPU. This
framework enables the rapid design and engineering of large-scale multimode
photonic devices, making computationally intensive simulations more accessible
to many photonic circuit designers.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 06:17:19 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Song",
"Jaesung",
""
],
[
"Sohn",
"Young-Ik",
""
]
] |
2504.11802 | Pavel Chapovsky | Pavel L. Chapovsky | On the photon energy conservation in stimulated emission. Experiment | 8 pages, 3 figures | null | null | null | physics.atom-ph quant-ph | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Quantum electrodynamics predicts identity of incident and emitted photons in
stimulated emission. This fundamental law is important to test experimentally.
In this work stimulated emission in GaAs semiconductor amplifier was
investigated and positive frequency shift of the amplified beam was detected.
In relative units this frequency shift was found equal $\Delta\nu/\nu = (+1.7
\pm 0.2)\cdot10^{-18}$. This indicates violation of the photon energy
conservation in stimulated emission.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 06:17:28 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Chapovsky",
"Pavel L.",
""
]
] |
2504.11803 | Ilia Derkach | Ilia Derkach | R\'esum\'e abstractif \`a partir d'une transcription audio | 35 pages, in French language, 8 tables, 6 figures | null | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Currently, large language models are gaining popularity, their achievements
are used in many areas, ranging from text translation to generating answers to
queries. However, the main problem with these new machine learning algorithms
is that training such models requires large computing resources that only large
IT companies have. To avoid this problem, a number of methods (LoRA,
quantization) have been proposed so that existing models can be effectively
fine-tuned for specific tasks. In this paper, we propose an E2E (end to end)
audio summarization model using these techniques. In addition, this paper
examines the effectiveness of these approaches to the problem under
consideration and draws conclusions about the applicability of these methods.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 06:24:49 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Derkach",
"Ilia",
""
]
] |
2504.11804 | Yevgen Kotukh V | Gennady Khalimov, Yevgen Kotukh | Advanced MST3 Encryption scheme based on generalized Suzuki 2-groups | null | null | null | null | cs.CR math.GR | http://creativecommons.org/licenses/by/4.0/ | This article presents a method for enhancing the encryption algorithm in the
MST3 cryptosystem for generalized Suzuki 2-groups. The conventional MST
cryptosystem based on Suzuki groups utilizes logarithmic signatures (LS)
restricted to the center of the group, resulting in an expansive array of
logarithmic signatures. We propose an encryption scheme based on
multi-parameter non-commutative groups, specifically selecting multi-parameter
generalized Suzuki 2-groups as the group construction framework. In our
approach, the logarithmic signature extends across the entire group, with
cipher security dependent on the group order. This design enables the
development of encryption optimized for implementation efficiency determined by
logarithmic signature size while maintaining robust security through
appropriate key sizes and the finite field of group representation. The primary
innovation in our encryption implementation lies in the sequential
de-encapsulation of keys from ciphertext using logarithmic signatures and
associated keys. The security evaluation of the cipher relies on attack
complexity analysis, which is quantified through comprehensive key enumeration
methodologies.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 06:32:45 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Khalimov",
"Gennady",
""
],
[
"Kotukh",
"Yevgen",
""
]
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.