id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-04-25 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2504.13480 | Minsu Koh | Minsu Koh, Beom-Chul Park, Heejo Kong, Seong-Whan Lee | Integrating Locality-Aware Attention with Transformers for General
Geometry PDEs | Accepted by IJCNN 2025 | null | null | null | cs.LG cs.AI cs.CL | http://creativecommons.org/licenses/by/4.0/ | Neural operators have emerged as promising frameworks for learning mappings
governed by partial differential equations (PDEs), serving as data-driven
alternatives to traditional numerical methods. While methods such as the
Fourier neural operator (FNO) have demonstrated notable performance, their
reliance on uniform grids restricts their applicability to complex geometries
and irregular meshes. Recently, Transformer-based neural operators with linear
attention mechanisms have shown potential in overcoming these limitations for
large-scale PDE simulations. However, these approaches predominantly emphasize
global feature aggregation, often overlooking fine-scale dynamics and localized
PDE behaviors essential for accurate solutions. To address these challenges, we
propose the Locality-Aware Attention Transformer (LA2Former), which leverages
K-nearest neighbors for dynamic patchifying and integrates global-local
attention for enhanced PDE modeling. By combining linear attention for
efficient global context encoding with pairwise attention for capturing
intricate local interactions, LA2Former achieves an optimal balance between
computational efficiency and predictive accuracy. Extensive evaluations across
six benchmark datasets demonstrate that LA2Former improves predictive accuracy
by over 50% relative to existing linear attention methods, while also
outperforming full pairwise attention under optimal conditions. This work
underscores the critical importance of localized feature learning in advancing
Transformer-based neural operators for solving PDEs on complex and irregular
domains.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 05:43:49 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Koh",
"Minsu",
""
],
[
"Park",
"Beom-Chul",
""
],
[
"Kong",
"Heejo",
""
],
[
"Lee",
"Seong-Whan",
""
]
] |
2504.13481 | Nicolas Rougerie | Antoine Levitt (LMO), Douglas Lundholm, Nicolas Rougerie (UMPA-ENSL) | Magnetic Thomas-Fermi theory for 2D abelian anyons | null | null | null | null | math.AP cond-mat.mes-hall cond-mat.quant-gas cond-mat.str-el math-ph math.MP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Two-dimensional abelian anyons are, in the magnetic gauge picture,
represented as fermions coupled to magnetic flux tubes. For the ground state of
such a system in a trapping potential, we theoretically and numerically
investigate a Hartree approximate model, obtained by restricting trial states
to Slater determinants and introducing a self-consistent magnetic field,
locally proportional to matter density. This leads to a fermionic variant of
the Chern-Simons-Schr{\"o}dinger system. We find that for dense systems, a
semi-classical approximation yields qualitatively good results. Namely, we
derive a density functional theory of magnetic Thomas-Fermi type, which
correctly captures the trends of our numerical results. In particular, we
explore the subtle dependence of the ground state with respect to the fraction
of magnetic flux units attached to particles.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 05:46:23 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Levitt",
"Antoine",
"",
"LMO"
],
[
"Lundholm",
"Douglas",
"",
"UMPA-ENSL"
],
[
"Rougerie",
"Nicolas",
"",
"UMPA-ENSL"
]
] |
2504.13482 | Ziqi Zhao | Ziqi Zhao, Zhaochun Ren, Jiyuan Yang, Zuming Yan, Zihan Wang, Liu
Yang, Pengjie Ren, Zhumin Chen, Maarten de Rijke, Xin Xin | Improving Sequential Recommenders through Counterfactual Augmentation of
System Exposure | accepted at SIGIR 2025 (Proceedings of the 48th International ACM
SIGIR Conference on Research and Development in Information Retrieval) | null | null | null | cs.IR | http://creativecommons.org/licenses/by/4.0/ | In sequential recommendation (SR), system exposure refers to items that are
exposed to the user. Typically, only a few of the exposed items would be
interacted with by the user. Although SR has achieved great success in
predicting future user interests, existing SR methods still fail to fully
exploit system exposure data. Most methods only model items that have been
interacted with, while the large volume of exposed but non-interacted items is
overlooked. Even methods that consider the whole system exposure typically
train the recommender using only the logged historical system exposure, without
exploring unseen user interests.
In this paper, we propose counterfactual augmentation over system exposure
for sequential recommendation (CaseRec). To better model historical system
exposure, CaseRec introduces reinforcement learning to account for different
exposure rewards. CaseRec uses a decision transformer-based sequential model to
take an exposure sequence as input and assigns different rewards according to
the user feedback. To further explore unseen user interests, CaseRec proposes
to perform counterfactual augmentation, where exposed original items are
replaced with counterfactual items. Then, a transformer-based user simulator is
proposed to predict the user feedback reward for the augmented items.
Augmentation, together with the user simulator, constructs counterfactual
exposure sequences to uncover new user interests. Finally, CaseRec jointly uses
the logged exposure sequences with the counterfactual exposure sequences to
train a decision transformer-based sequential model for generating
recommendation. Experiments on three real-world benchmarks show the
effectiveness of CaseRec. Our code is available at
https://github.com/ZiqiZhao1/CaseRec.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 05:46:27 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Zhao",
"Ziqi",
""
],
[
"Ren",
"Zhaochun",
""
],
[
"Yang",
"Jiyuan",
""
],
[
"Yan",
"Zuming",
""
],
[
"Wang",
"Zihan",
""
],
[
"Yang",
"Liu",
""
],
[
"Ren",
"Pengjie",
""
],
[
"Chen",
"Zhumin",
""
],
[
"de Rijke",
"Maarten",
""
],
[
"Xin",
"Xin",
""
]
] |
2504.13483 | Yiran Wang | Yiran Wang, Tangtang Xie and Hao Wu | Latent Tensor Factorization with Nonlinear PID Control for Missing Data
Recovery in Non-Intrusive Load Monitoring | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Non-Intrusive Load Monitoring (NILM) has emerged as a key smart grid
technology, identifying electrical device and providing detailed energy
consumption data for precise demand response management. Nevertheless, NILM
data suffers from missing values due to inescapable factors like sensor
failure, leading to inaccuracies in non-intrusive load monitoring. A stochastic
gradient descent (SGD)-based latent factorization of tensors model has proven
to be effective in estimating missing data, however, it updates a latent factor
solely based on the current stochastic gradient, without considering past
information, which leads to slow convergence of anLFT model. To address this
issue, this paper proposes a Nonlinear Proportional-integral-derivative
(PID)-Incorporated Latent factorization of tensors (NPIL) model with two-fold
ideas: a) rebuilding the instant learning error according to the principle of a
nonlinear PID controller, thus, the past update information is efficiently
incorporated into the learning scheme, and b) implementing gain parameter
adaptation by utilizing particle swarm optimization (PSO) algorithm, hence, the
model computational efficiency is effectively improved. Experimental results on
real-world NILM datasets demonstrate that the proposed NPIL model surpasses
state-of-the-art models in convergence rate and accuracy when predicting the
missing NILM data.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 05:48:14 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Wang",
"Yiran",
""
],
[
"Xie",
"Tangtang",
""
],
[
"Wu",
"Hao",
""
]
] |
2504.13484 | Vivian Lin | Vivian Lin, Insup Lee | Monitor and Recover: A Paradigm for Future Research on Distribution
Shift in Learning-Enabled Cyber-Physical Systems | Accepted to ICCPS 2025 | null | null | null | cs.LG cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the known vulnerability of neural networks to distribution shift,
maintaining reliability in learning-enabled cyber-physical systems poses a
salient challenge. In response, many existing methods adopt a detect and
abstain methodology, aiming to detect distribution shift at inference time so
that the learning-enabled component can abstain from decision-making. This
approach, however, has limited use in real-world applications. We instead
propose a monitor and recover paradigm as a promising direction for future
research. This philosophy emphasizes 1) robust safety monitoring instead of
distribution shift detection and 2) distribution shift recovery instead of
abstention. We discuss two examples from our recent work.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 05:48:35 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Lin",
"Vivian",
""
],
[
"Lee",
"Insup",
""
]
] |
2504.13485 | San Vu Ngoc | Patrick Gioia, San Vu Ngoc (IUF, IRMAR) | Accurate semiclassical analysis of light propagation on tilted
hyperplanes | 43 pages, 10 figures | null | null | null | eess.SP math-ph math.AP math.MP math.SG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the scalar light model given by Helmholtz' equation in R^{1+d} , we
consider the transformation of an initial scene (a hologram) in {0}xR^d by an
arbitrary affine transformation (which can be viewed as a propagation into a
tilted hyperplane). In the high frequency regime, we use microlocal and
semiclassical analysis to describe the propagator as a semiclassical Fourier
integral operator, thus generalising the well-known Angular Spectrum formula
from optics. We then prove new precise Egorov theorems, including subprincipal
terms, which indicate how to take into account the propagation along rays of
geometric optics.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 05:50:02 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Gioia",
"Patrick",
"",
"IUF, IRMAR"
],
[
"Ngoc",
"San Vu",
"",
"IUF, IRMAR"
]
] |
2504.13486 | Lisa Egede | Lisa Egede, Ebtesam Al Haque, Gabriella Thompson, Alicia Boyd, Angela
D. R. Smith, Brittany Johnson | Exploring Culturally Informed AI Assistants: A Comparative Study of
ChatBlackGPT and ChatGPT | 9 pages, 3 figures, Camera-ready Extended Abstract paper accepted
into CHI 2025 | null | 10.1145/3706599.3720136 | null | cs.HC | http://creativecommons.org/licenses/by/4.0/ | In recent years, we have seen an influx in reliance on AI assistants for
information seeking. Given this widespread use and the known challenges AI
poses for Black users, recent efforts have emerged to identify key
considerations needed to provide meaningful support. One notable effort is the
development of ChatBlackGPT, a culturally informed AI assistant designed to
provide culturally relevant responses. Despite the existence of ChatBlackGPT,
there is no research on when and how Black communities might engage with
culturally informed AI assistants and the distinctions between engagement with
general purpose tools like ChatGPT. To fill this gap, we propose a research
agenda grounded in results from a preliminary comparative analysis of outputs
provided by ChatGPT and ChatBlackGPT for travel-related inquiries. Our efforts
thus far emphasize the need to consider Black communities' values, perceptions,
and experiences when designing AI assistants that acknowledge the Black lived
experience.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 05:50:28 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Egede",
"Lisa",
""
],
[
"Haque",
"Ebtesam Al",
""
],
[
"Thompson",
"Gabriella",
""
],
[
"Boyd",
"Alicia",
""
],
[
"Smith",
"Angela D. R.",
""
],
[
"Johnson",
"Brittany",
""
]
] |
2504.13487 | Romain Duboscq | Romain Duboscq (IMT), Olivier Pinaud (CSU) | An asymptotic preserving scheme for the quantum Liouville-BGK equation | null | null | null | null | math.AP cs.NA math.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We are interested in this work in the numerical resolution of the Quantum
Liouville-BGK equation, which arises in the derivation of quantum
hydrodynamical models from first principles. Such models are often obtained in
some asymptotic limits, for instance a diffusion or a fluid limit, and as a
consequence the original Liouville equation contains small parameters. A
standard method such as a split-step algorithm is then accurate provided the
time step is sufficiently small compared to the asymptotic parameter, which is
a severe limitation. In the case of the diffusion limit, we propose a numerical
method that is accurate for time steps independent of the small parameter, and
which captures well both the microscopic dynamics and the diffusion limit. Our
approach is substantiated by an informal theoretical error analysis.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 05:51:10 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Duboscq",
"Romain",
"",
"IMT"
],
[
"Pinaud",
"Olivier",
"",
"CSU"
]
] |
2504.13488 | Ulas Ozdem | U. \"Ozdem | Unveiling the electromagnetic structure and intrinsic dynamics of
spin-$\frac{3}{2}$ hidden-charm pentaquarks: A comprehensive QCD analysis | 22 pages, 8 tables, 2 figures | null | null | null | hep-ph hep-ex hep-lat | http://creativecommons.org/licenses/by/4.0/ | Understanding the internal structure of hadrons remains a fundamental
challenge in experimental and theoretical hadron physics. This pursuit is
crucial for advancing our comprehension of QCD and for refining the models that
describe the strong interaction. The discovery of exotic states, such as
hidden-charm pentaquarks, has further emphasized the complexity of hadronic
systems and the need to uncover the fundamental mechanisms governing their
formation and behavior. Addressing these challenges not only deepens our
understanding of QCD but also tests the limits of existing theoretical
frameworks, paving the way for new insights into the nature of matter.
Motivated by these challenges, the present study investigates the
electromagnetic properties$-$ specifically, the magnetic dipole, electric
quadrupole, and magnetic octupole moments$-$ of six hidden-charm pentaquark
states: $[u u][d c] \bar c$, $[dd][u c] \bar c$, $[u u][s c] \bar c$, $[dd] [s
c] \bar c$, $[s s][u c] \bar c$, and $[s s][d c] \bar c$. Employing the
framework of QCD light-cone sum rules and utilizing two distinct
diquark-diquark-antiquark interpolating currents, we focus on pentaquark
configurations with spin-parity quantum numbers $\mathrm{J^P =\frac{3}{2}^-}$.
From the numerical results, we observe significant deviations between the
magnetic dipole moment predictions obtained using different
diquark-diquark-antidiquark structures. These results suggest that multiple
pentaquark states with identical quantum numbers and quark constituents may
exhibit distinct magnetic dipole moments, depending on their internal quark
configurations. The obtained electromagnetic moments, particularly the
variations in magnetic dipole moments, may provide insights into the internal
structure of hidden-charm pentaquark states.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 05:51:12 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Özdem",
"U.",
""
]
] |
2504.13490 | Joowon Kim | Joowon Kim, Ziseok Lee, Donghyeon Cho, Sanghyun Jo, Yeonsung Jung,
Kyungsu Kim, Eunho Yang | Early Timestep Zero-Shot Candidate Selection for Instruction-Guided
Image Editing | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Despite recent advances in diffusion models, achieving reliable image
generation and editing remains challenging due to the inherent diversity
induced by stochastic noise in the sampling process. Instruction-guided image
editing with diffusion models offers user-friendly capabilities, yet editing
failures, such as background distortion, frequently occur. Users often resort
to trial and error, adjusting seeds or prompts to achieve satisfactory results,
which is inefficient. While seed selection methods exist for Text-to-Image
(T2I) generation, they depend on external verifiers, limiting applicability,
and evaluating multiple seeds increases computational complexity. To address
this, we first establish a multiple-seed-based image editing baseline using
background consistency scores, achieving Best-of-N performance without
supervision. Building on this, we introduce ELECT (Early-timestep Latent
Evaluation for Candidate Selection), a zero-shot framework that selects
reliable seeds by estimating background mismatches at early diffusion
timesteps, identifying the seed that retains the background while modifying
only the foreground. ELECT ranks seed candidates by a background inconsistency
score, filtering unsuitable samples early based on background consistency while
preserving editability. Beyond standalone seed selection, ELECT integrates into
instruction-guided editing pipelines and extends to Multimodal Large-Language
Models (MLLMs) for joint seed and prompt selection, further improving results
when seed selection alone is insufficient. Experiments show that ELECT reduces
computational costs (by 41 percent on average and up to 61 percent) while
improving background consistency and instruction adherence, achieving around 40
percent success rates in previously failed cases - without any external
supervision or training.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 05:59:01 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Kim",
"Joowon",
""
],
[
"Lee",
"Ziseok",
""
],
[
"Cho",
"Donghyeon",
""
],
[
"Jo",
"Sanghyun",
""
],
[
"Jung",
"Yeonsung",
""
],
[
"Kim",
"Kyungsu",
""
],
[
"Yang",
"Eunho",
""
]
] |
2504.13491 | Tetsuya Ito | Tetsuya Ito | A slice Cromwell inequality of homogeneous links | 7 pages, 2 figures | null | null | null | math.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Cromwell proved that the minimum $v$-degree of the HOMFLY polynomial of
homogeneous link $L$ is bounded above by $1-\chi(L)$, where $\chi(L)$ is the
maximum Euler characteristic of Seifert surfaces of $L$. We prove its slice
version, stating that the minimum $v$-degree of the HOMFLY polynomial of
homogeneous link $L$ is bounded above by $1-\chi_4(L)$, the maximum
4-dimensional Euler characteristic of $L$. As a byproduct, we prove a
conjecture of Stoimenow that for an alternating link, the minimum $v$-degree of
the HOMFLY polynomial is smaller than or equal to its signature.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 06:08:19 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Ito",
"Tetsuya",
""
]
] |
2504.13492 | Clement Cheneviere | Cl\'ement Chenevi\`ere (LISN), Wenjie Fang (LIGM), Corentin Henriet
(IRIF (UMR\_8243), DIMAI UniFI) | A new definition for m-Cambrian lattices | This work has been accepted as an extended abstract for the FPSAC
2025 conference. A long version of this work will be available later | 37th International Conference on Formal Power Series and Algebraic
Combinatorics (Sapporo 2025), Jul 2025, Sapporo, Hokkaido, Japan | null | null | math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Cambrian lattices, introduced in (Reading, 2006), generalize the Tamari
lattice to any choice of Coxeter element in any finite Coxeter group. They are
further generalized to the m-Cambrian lattices (Stump, Thomas, Williams, 2015).
However, their definitions do not provide a practical setup to work with
combinatorially. In this paper, we provide a new equivalent definition of the
m-Cambrian lattices on simple objects called m-noncrossing partitions, using a
simple and effective comparison criterion. It is obtained by showing that each
interval has a unique maximal chain that is c-increasing, which is computed by
a greedy algorithm. Our proof is uniform, involving all Coxeter groups and all
choices of Coxeter element at the same time. This work has been accepted as an
extended abstract for the FPSAC 2025 conference. A long version of this work
will be available later.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 06:09:26 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Chenevière",
"Clément",
"",
"LISN"
],
[
"Fang",
"Wenjie",
"",
"LIGM"
],
[
"Henriet",
"Corentin",
"",
"IRIF"
]
] |
2504.13493 | Satoshi Taguchi | Takuma Tomita, Satoshi Taguchi, Tetsuro Tsuji | Slow uniform flow of a rarefied gas past an infinitely thin circular
disk | null | null | null | null | physics.flu-dyn | http://creativecommons.org/licenses/by/4.0/ | The steady behavior of a rarefied gas flowing past an infinitely thin
circular disk is investigated based on kinetic theory, with the uniform flow
assumed to be perpendicular to the disk surface. Although this problem is
classical in fluid mechanics, it is revisited here due to the abrupt changes in
the fluid variables near the disk edge, where a kinetic description becomes
essential. This study focuses on elucidating the gas behavior near the sharp
edge by resolving the discontinuity in the velocity distribution function
originating from the edge. To this end, the linearized Bhatnagar--Gross--Krook
(BGK) model of the Boltzmann equation, subject to diffuse reflection boundary
conditions, is solved numerically using an integral equation approach. The
results clearly reveal the emergence of a kinetic boundary-layer structure near
the disk edge, which extends over a distance of several mean free paths, as the
Knudsen number $\mathrm{Kn}$ (defined with respect to the disk radius) becomes
small. The magnitude of this boundary layer is found to scale as
$\mathrm{Kn}^{1/2}$. In addition, the drag force acting on the disk is computed
over a wide range of Knudsen numbers.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 06:16:45 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Tomita",
"Takuma",
""
],
[
"Taguchi",
"Satoshi",
""
],
[
"Tsuji",
"Tetsuro",
""
]
] |
2504.13494 | Jinfei Wang | Jinfei Wang, Yi Ma, Fei Tong, Ziming He | Block-Weighted Lasso for Joint Optimization of Memory Depth and Kernels
in Wideband DPD | 4 pages, 1 figure | null | null | null | eess.SP | http://creativecommons.org/licenses/by-nc-nd/4.0/ | The optimizations of both memory depth and kernel functions are critical for
wideband digital pre-distortion (DPD). However, the memory depth is usually
determined via exhaustive search over a wide range for the sake of
linearization optimality, followed by the kernel selection of each memory
depth, yielding excessive computational cost. In this letter, we aim to provide
an efficient solution that jointly optimizes the memory depth and kernels while
preserving reasonable linearization performance. Specifically, we propose to
formulate this optimization as a blockweighted least absolute shrinkage and
selection operator (Lasso) problem, where kernels are assigned regularization
weights based on their polynomial orders. Then, a block coordinate descent
algorithm is introduced to solve the block-weighted Lasso problem. Measurement
results on a generalized memory polynomial (GMP) model demonstrates that our
proposed solution reduces memory depth by 31.6% and kernel count by 85%
compared to the full GMP, while achieving -46.4 dB error vector magnitude (EVM)
for signals of 80 MHz bandwidth. In addition, the proposed solution outperforms
both the full GMP and the GMP pruned by standard Lasso by at least 0.7 dB in
EVM.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 06:21:13 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Wang",
"Jinfei",
""
],
[
"Ma",
"Yi",
""
],
[
"Tong",
"Fei",
""
],
[
"He",
"Ziming",
""
]
] |
2504.13495 | Swarna Priya Ramu | Miit Daga, Priyasha Mohanty, Ram Krishna, Swarna Priya RM | Statistical Validation in Cultural Adaptations of Cognitive Tests: A
Multi- Regional Systematic Review | This paper is accepted and presented in the International Conference
Challenges & Opportunities in Artificial Intelligence: Engineering &
Management Applications (COAIEMA 2025) and to be published in Taylor &
Francis Proceedings | null | null | null | cs.CY cs.AI cs.LG cs.NE | http://creativecommons.org/licenses/by/4.0/ | This systematic review discusses the methodological approaches and
statistical confirmations of cross-cultural adaptations of cognitive evaluation
tools used with different populations. The review considers six seminal studies
on the methodology of cultural adaptation in Europe, Asia, Africa, and South
America. The results indicate that proper adaptations need holistic models with
demographic changes, and education explained as much as 26.76% of the variance
in MoCA-H scores. Cultural-linguistic factors explained 6.89% of the variance
in European adaptations of MoCA-H; however, another study on adapted MMSE and
BCSB among Brazilian Indigenous populations reported excellent diagnostic
performance, with a sensitivity of 94.4% and specificity of 99.2%. There was
78.5% inter-rater agreement on the evaluation of cultural adaptation using the
Manchester Translation Evaluation Checklist. A paramount message of the paper
is that community feedback is necessary for culturally appropriate preparation,
standardized translation protocols also must be included, along with robust
statistical validation methodologies for developing cognitive assessment
instruments. This review supplies evidence-based frameworks for the further
adaptation of cognitive assessments in increasingly diverse global health
settings.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 06:25:02 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Daga",
"Miit",
""
],
[
"Mohanty",
"Priyasha",
""
],
[
"Krishna",
"Ram",
""
],
[
"RM",
"Swarna Priya",
""
]
] |
2504.13496 | Bingchang Wang | Yong Liang, Bing-Chang Wang, and Huanshui Zhang | Open-Loop and Closed-Loop Strategies for Linear Quadratic Mean Field
Games: The Direct Approach | null | null | null | null | math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper delves into studying the differences and connections between
open-loop and closed-loop strategies for the linear quadratic (LQ) mean field
games (MFGs) by the direct approach. The investigation begins with the
finite-population system for solving the solvability of open-loop and
closed-loop systems within a unified framework under the global information
pattern. By a comprehensive analysis through variational methods, the necessary
and sufficient conditions are obtained for the existence of centralized
open-loop and closed-loop Nash equilibria, which are characterized by the
solvability of a system of forward-backward stochastic differential equations
and a system of Riccati equations, respectively. The connections and
disparities between centralized open-loop and closed-loop Nash equilibria are
analyzed. Then, the decentralized control is designed by studying the
asymptotic solvability for both open-loop and closed-loop systems.
Asymptotically decentralized Nash equilibria are obtained by considering the
centralized open-loop and closed-loop Nash equilibria in the
infinite-population system, which requires a standard and an asymmetric Riccati
equations. The results demonstrate that divergences between the centralized
open-loop and closed-loop Nash equilibria in the finite-population system, but
the corresponding asymptotically decentralized Nash equilibria in the
infinite-population system are consistent. Therefore, the choice of open-loop
and closed-loop strategies does not play an essential role in the design of
decentralized control for LQ MFGs.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 06:25:26 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Liang",
"Yong",
""
],
[
"Wang",
"Bing-Chang",
""
],
[
"Zhang",
"Huanshui",
""
]
] |
2504.13498 | Soumyadip Sahu | Soumyadip Sahu | Supersingular primes and Bogomolov property | null | null | null | null | math.NT | http://creativecommons.org/licenses/by/4.0/ | Let $E$ be an elliptic curve over a number field $K$ with at least one real
embedding and $L$ be a finite extension of $K$. We generalize a result of
Habegger to show that $L(E_{\text{tor}})$, the field generated by the torsion
points of $E$ over $L$, has the Bogomolov property. Moreover, the N\'eron-Tate
height on $E\big(L(E_{\text{tor}})\big)$ also satisfies a similar discreteness
property. Our main tool is a general criterion of Plessis that reduces the
problem to the existence of a supersingular prime for $E$ satisfying certain
conditions.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 06:25:45 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Sahu",
"Soumyadip",
""
]
] |
2504.13499 | Alex Ergasti | Alex Ergasti, Filippo Botti, Tomaso Fontanini, Claudio Ferrari,
Massimo Bertozzi, Andrea Prati | U-Shape Mamba: State Space Model for faster diffusion | Accepeted at CVPR 2025 eLVM workshop | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Diffusion models have become the most popular approach for high-quality image
generation, but their high computational cost still remains a significant
challenge. To address this problem, we propose U-Shape Mamba (USM), a novel
diffusion model that leverages Mamba-based layers within a U-Net-like
hierarchical structure. By progressively reducing sequence length in the
encoder and restoring it in the decoder through Mamba blocks, USM significantly
lowers computational overhead while maintaining strong generative capabilities.
Experimental results against Zigma, which is currently the most efficient
Mamba-based diffusion model, demonstrate that USM achieves one-third the
GFlops, requires less memory and is faster, while outperforming Zigma in image
quality. Frechet Inception Distance (FID) is improved by 15.3, 0.84 and 2.7
points on AFHQ, CelebAHQ and COCO datasets, respectively. These findings
highlight USM as a highly efficient and scalable solution for diffusion-based
generative models, making high-quality image synthesis more accessible to the
research community while reducing computational costs.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 06:38:12 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Ergasti",
"Alex",
""
],
[
"Botti",
"Filippo",
""
],
[
"Fontanini",
"Tomaso",
""
],
[
"Ferrari",
"Claudio",
""
],
[
"Bertozzi",
"Massimo",
""
],
[
"Prati",
"Andrea",
""
]
] |
2504.13500 | Jianing Wang | Jianing Wang, Jin Jiang, Yang Liu, Mengdi Zhang, Xunliang Cai | Prejudge-Before-Think: Enhancing Large Language Models at Test-Time by
Process Prejudge Reasoning | null | null | null | null | cs.CL | http://creativecommons.org/licenses/by-sa/4.0/ | In this paper, we introduce a new \emph{process prejudge} strategy in LLM
reasoning to demonstrate that bootstrapping with process prejudge allows the
LLM to adaptively anticipate the errors encountered when advancing the
subsequent reasoning steps, similar to people sometimes pausing to think about
what mistakes may occur and how to avoid them, rather than relying solely on
trial and error. Specifically, we define a prejudge node in the rationale,
which represents a reasoning step, with at least one step that follows the
prejudge node that has no paths toward the correct answer. To synthesize the
prejudge reasoning process, we present an automated reasoning framework with a
dynamic tree-searching strategy. This framework requires only one LLM to
perform answer judging, response critiquing, prejudge generation, and thought
completion. Furthermore, we develop a two-phase training mechanism with
supervised fine-tuning (SFT) and reinforcement learning (RL) to further enhance
the reasoning capabilities of LLMs. Experimental results from competition-level
complex reasoning demonstrate that our method can teach the model to prejudge
before thinking and significantly enhance the reasoning ability of LLMs. Code
and data is released at https://github.com/wjn1996/Prejudge-Before-Think.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 06:42:30 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Wang",
"Jianing",
""
],
[
"Jiang",
"Jin",
""
],
[
"Liu",
"Yang",
""
],
[
"Zhang",
"Mengdi",
""
],
[
"Cai",
"Xunliang",
""
]
] |
2504.13501 | Arnab Pal | Arup Biswas, Satya N Majumdar, Arnab Pal | Target search optimization by threshold resetting | null | null | null | null | cond-mat.stat-mech math.OC math.PR q-fin.ST | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a new class of first passage time optimization driven by
threshold resetting, inspired by many natural processes where crossing a
critical limit triggers failure, degradation or transition. In here, search
agents are collectively reset when a threshold is reached, creating
event-driven, system-coupled simultaneous resets that induce long-range
interactions. We develop a unified framework to compute search times for these
correlated stochastic processes, with ballistic searchers as a key example
uncovering diverse optimization behaviors. A cost function, akin to breakdown
penalties, reveals that optimal resetting can forestall larger losses. This
formalism generalizes to broader stochastic systems with multiple degrees of
freedom.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 06:42:41 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Biswas",
"Arup",
""
],
[
"Majumdar",
"Satya N",
""
],
[
"Pal",
"Arnab",
""
]
] |
2504.13502 | Magalie Benefice | Magalie B\'en\'efice (IECL, UL), Marc Arnaudon (IMB, UB), Audrey
Giremus (IMS, UB) | Continuous-time filtering in Lie groups: estimation via the Fr{\'e}chet
mean of solutions to stochastic differential equations | null | null | null | null | math.PR eess.SP math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We compute the Fr\'echet mean $\mathscr{E}_t$ of the solution $X_{t}$ to a
continuous-time stochastic differential equation in a Lie group. It provides an
estimator with minimal variance of $X_{t}$. We use it in the context of Kalman
filtering and more precisely to infer rotation matrices. In this paper, we
focus on the prediction step between two consecutive observations. Compared to
state-of-the-art approaches, our assumptions on the model are minimal.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 06:45:30 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Bénéfice",
"Magalie",
"",
"IECL, UL"
],
[
"Arnaudon",
"Marc",
"",
"IMB, UB"
],
[
"Giremus",
"Audrey",
"",
"IMS, UB"
]
] |
2504.13503 | Miryana Grigorova | Miryana Grigorova, Marie-Claire Quenez (UPCit\'e, LPSM), Peng Yuan | The non-linear multiple stopping problem: between the discrete and the
continuous time | null | null | null | null | math.OC math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the non-linear optimal multiple stopping problem under general
conditions on the non-linear evaluation operators, which might depend on two
time indices: the time of evaluation/assessment and the horizon (when the
reward or loss is incurred). We do not assume convexity/concavity or
cash-invariance. We focus on the case where the agent's stopping strategies are
what we call Bermudan stopping strategies, a framework which can be seen as
lying between the discrete and the continuous time. We first study the
non-linear double optimal stopping problem by using a reduction approach. We
provide a necessary and a sufficient condition for optimal pairs, and a result
on existence of optimal pairs. We then generalize the results to the non-linear
$d$-optimal stopping problem. We treat the symmetric case (of additive and
multiplicative reward families) as examples.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 06:47:29 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Grigorova",
"Miryana",
"",
"UPCité, LPSM"
],
[
"Quenez",
"Marie-Claire",
"",
"UPCité, LPSM"
],
[
"Yuan",
"Peng",
""
]
] |
2504.13505 | Daniele FAENZI | Gaia Comaschi (UPPA), Daniele Faenzi (UBE) | Higher rank instantons sheaves on Fano threefolds | null | null | null | null | math.AG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We define instanton sheaves of higher rank on smooth Fano threefolds X of
Picard rank one and show that their topological classification depends on two
integers, namely the rank n (or the half of it, if the Fano index of X is odd)
and the charge k. We elucidate the value of the minimal charge k0 of
slope-stable n-instanton bundles (except for Fano threefolds of index 1 and
genus 3 or 4), as an integer depending only on the genus of X and on n and we
prove the existence of slope-stable n-instanton bundles of charge k greater
than k0. Next, we study the acyclic extension of instantons on Fano threefolds
with curvilinear Kuznetsov component and give a monadic description when the
intermediate Jacobian is trivial. Finally, we provide several features of a
general element in the main component of the moduli space of intantons, such as
and generic splitting over rational curves contained in X and stable
restriction to a K3 section S of X, and give applications to Lagrangian
subvarieties of moduli spaces of sheaves on S.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 06:49:42 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Comaschi",
"Gaia",
"",
"UPPA"
],
[
"Faenzi",
"Daniele",
"",
"UBE"
]
] |
2504.13506 | Fabrice Etienne | Fabrice Etienne (UB, CANARI, IMB) | An algorithm to compute Selmer groups via resolutions by permutations
modules | null | null | null | null | cs.SC math.GR math.NT math.RT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given a number field with absolute Galois group $\mathcal{G}$, a finite
Galois module $M$, and a Selmer system $\mathcal{L}$, this article gives a
method to compute Sel$_\mathcal{L}$, the Selmer group of $M$ attached to
$\mathcal{L}$. First we describe an algorithm to obtain a resolution of $M$
where the morphisms are given by Hecke operators. Then we construct another
group $H^1_S(\mathcal{G}, M)$ and we prove, using the properties of Hecke
operators, that $H^1_S(\mathcal{G}, M)$ is a Selmer group containing
Sel$_\mathcal{L}$. Then, we discuss the time complexity of this method.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 06:57:38 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Etienne",
"Fabrice",
"",
"UB, CANARI, IMB"
]
] |
2504.13507 | D.S. Gireesh | B. Hemanthkumar and D. S. Gireesh | On $\ell-$regular and $2-$color partition triples modulo powers of $3$ | null | null | null | null | math.CO math.NT | http://creativecommons.org/licenses/by/4.0/ | Let $T_\ell(n)$ denote the number of $\ell-$regular partition triples of $n$
and let $p_{\ell, 3}(n)$ enumerates the number of 2--color partition triples of
$n$ where one of the colors appear only in parts that are multiples of $\ell$.
In this paper, we prove several infinite families of congruences modulo powers
of 3 for $T_\ell(n)$ and $p_{\ell, 3}(n)$, where $\ell \geq 1$ and $\equiv
0\pmod{3^k}$, and $\equiv \pm 3^k \pmod{3^{k+1}}$.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 06:58:15 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Hemanthkumar",
"B.",
""
],
[
"Gireesh",
"D. S.",
""
]
] |
2504.13508 | Claire Debord | Claire Debord (IMJ-PRG) | Hypoellipticit{\'e} de polyn{\^o}mes de champs de vecteurs et
conjectures de Helffer etNourrigat | in French language | S{\'e}minaire Bourbaki, Association des collaborateurs de Nicolas
Bourbaki, Mar 2025, Paris, France | null | null | math.AP math.DG math.OA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study here the sub-Riemannian geometry on a manifold $M$ induced by a
finite family $F$ of vector fields satisfying the H{\"o}rmander condition, as
well as the differential operators obtained as polynomials in the elements of
$F$. Such an operator $D$ is hypoelliptic if, for any smooth function $f$, the
solutions $u$ of the equation $Du=f$ are also smooth. A more refined notion,
that of maximal hypoelliptic operators, extends this property in terms of
Sobolev regularity, offering a parallel in sub-Riemannian geometry to elliptic
operators. In 1979, Helffer and Nourrigat proposed a conjecture characterizing
maximal hypoellipticity, generalizing the main regularity theorem for elliptic
operators. This conjecture has recently been confirmed using tools from
non-commutative geometry. A central element of this work is a natural
generalisation in sub-Riemannian geometry, introduced by Mohsen, of the Connes
tangent groupoid, in which appear all the tangent cones, key ingredients in the
work of Helffer and Nourrigat. In collaboration with Androulidakis and Yuncken,
Mohsen developed a pseudodifferential calculus in this context, introducing in
particular the notion of principal symbol. They obtained that the invertibility
of this symbol is equivalent to maximal hypoellipticity, thus validating the
conjecture. This talk will present the ingredients and broad outlines of these
innovative advances.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 06:59:11 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Debord",
"Claire",
"",
"IMJ-PRG"
]
] |
2504.13509 | Kai Murai | Masahiro Kawasaki, Kai Murai, Fuminobu Takahashi | Q-balls Under Spontaneously Broken U(1) Symmetry | 13 pages, 10 figures | null | null | TU-1262 | hep-ph astro-ph.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the evolution of Q-balls under a spontaneously broken global $U(1)$
symmetry. Q-balls are stabilized by the conservation of $U(1)$ charge, but when
the symmetry is spontaneously broken, the resulting Nambu-Goldstone (NG) boson
can carry charge away from the Q-ball, potentially leading to charge leakage.
To study this process in a controlled setting, we consider a scenario where
Q-balls first form under an unbroken $U(1)$ symmetry, which is then
spontaneously broken. We introduce two complex scalar fields: one responsible
for forming the Q-ball, and the other for spontaneously breaking the $U(1)$
symmetry, allowing us to clearly separate the formation and symmetry-breaking
phases. Using numerical simulations in a spherically symmetric system, we find
that the evolution of Q-balls depends sensitively on the structure of the
interaction between the two fields and the magnitude of symmetry breaking.
Depending on parameters, Q-balls can completely decay, evaporate into smaller,
stable Q-balls, or transition into oscillons/I-balls. In particular, we find
that stable, localized remnants often survive the evolution over long
timescales, especially when the symmetry-breaking scale is small. These results
demonstrate that, even though spontaneous $U(1)$ breaking can lead to
significant energy and charge loss from Q-balls, stable localized objects with
reduced or no charge can frequently survive and potentially contribute to
cosmological relics.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 06:59:59 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Kawasaki",
"Masahiro",
""
],
[
"Murai",
"Kai",
""
],
[
"Takahashi",
"Fuminobu",
""
]
] |
2504.13510 | Masaki Yamada | Jin Kobayashi, Kazunori Nakayama, Masaki Yamada | Decay rate of PQ-ball | 30 pages, 15 figures | null | null | TU-1257; KEK-QUP-2025-0006 | hep-ph astro-ph.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Q-balls are non-topological solitons that arise in theories with a complex
scalar field possessing a conserved global U(1) charge. Their stability is
ensured by this charge, making them potentially significant in cosmology. In
this paper, we investigate Q-ball-like objects in scenarios where the scalar
field acquires a finite vacuum expectation value, spontaneously breaking the
global U(1) symmetry. A well-motivated example is the Peccei-Quinn field, where
the U(1) symmetry is identified as the Peccei-Quinn symmetry, and hence we
refer to such objects as PQ-balls. We first discuss the existence of stable
PQ-ball solutions in a finite-density plasma and argue that they become
unstable in vacuum. Using detailed numerical simulations under spherical
symmetry, we confirm their formation, compute their decay rate, and derive an
analytical formula for it. Our results have important implications for axion
cosmology, particularly in the context of the kinetic misalignment mechanism.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 07:00:00 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Kobayashi",
"Jin",
""
],
[
"Nakayama",
"Kazunori",
""
],
[
"Yamada",
"Masaki",
""
]
] |
2504.13511 | Olivier Garet | Olivier Garet (IECL) | How often is $x\mapsto x^3$ one-to-one in $\mathbb{Z}/n\mathbb{Z}$? | null | null | null | null | math.NT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We characterize the integers n such that $x\mapsto x^3$ describes a bijection
from the set $\mathbb{Z}/n\mathbb{Z}$ to itself and we determine the frequency
of these integers. Precisely, denoting by $W$ the set of these integers, we
prove that an integer belongs to $W$ if and only if it is square-free with no
prime factor that is congruent to 1 modulo 3, and that there exists $C>0$ such
that $$|W\cap\{1,\dots,n\}|\sim C\frac{n}{\sqrt{\log n}}\ .$$ These facts (or
equivalent facts) are stated without proof on the OEIS website. We give the
explicit value of $C$, which did not seem to be known. Analogous results are
also proved for families of integers for which congruence classes for prime
factors are imposed. The proofs are based on a Tauberian Theorem by Delange.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 07:00:58 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Garet",
"Olivier",
"",
"IECL"
]
] |
2504.13512 | Sylvain Golenia | Nassim Athmouni, Marwa Ennaceur, Sylvain Golenia (IMB), Amel Jadlaoui | Limiting absorption principle for long-range perturbation in a graphene
setting | arXiv admin note: text overlap with arXiv:2403.06578 | null | null | null | math-ph math.MP math.SP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we examine the discrete Laplacian acting on a hexagonal
lattice by introducing long-range modifications in both the metric and the
potential. Our objective is to establish a Limiting Absorption Principle,
excluding possible embedded eigenvalues. To this end, we employ the positive
commutator technique as our method.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 07:02:53 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Athmouni",
"Nassim",
"",
"IMB"
],
[
"Ennaceur",
"Marwa",
"",
"IMB"
],
[
"Golenia",
"Sylvain",
"",
"IMB"
],
[
"Jadlaoui",
"Amel",
""
]
] |
2504.13513 | Anastasiia Hraivoronska | Anastasiia Hraivoronska (ICJ, MMCS), Filippo Santambrogio (ICJ, MMCS) | Convergence of the fully discrete JKO scheme | null | null | null | null | math.AP cs.NA math.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The JKO scheme provides the discrete-in-time approximation for the solutions
of evolutionary equations with Wasserstein gradient structure. We study a
natural space-discretization of this scheme by restricting the minimization to
the measures supported on the nodes of a regular grid. The study of the fully
discrete JKO scheme is motivated by the applications to developing numerical
schemes for the nonlinear diffusion equation with drift and the crowd motion
model. The main result of this paper is the convergence of the scheme as both
the time and space discretization parameters tend to zero in a suitable regime.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 07:04:08 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Hraivoronska",
"Anastasiia",
"",
"ICJ, MMCS"
],
[
"Santambrogio",
"Filippo",
"",
"ICJ, MMCS"
]
] |
2504.13514 | Muhittin Evren Aydin | Muhittin Evren Aydin, Adela Mihai, Cihan \"Ozg\"ur | Torqued and Anti-Torqued Vector Fields on Hyperbolic Spaces | 11 pages | null | null | null | math.DG | http://creativecommons.org/licenses/by/4.0/ | In this paper, we study the existence of torqued and anti-torqued vector
fields on the hyperbolic ambient space $\mathbb{H}^n$. Although there are
examples of proper torqued vector fields on open subsets on $\mathbb{H}^n$, we
prove that there is no a proper torqued vector field globally defined on
$\mathbb{H}^n$. Similarly, we have another non-existence result for
anti-torqued vector fields as long as their conformal scalar is a non-constant
function. When the conformal scalar is constant some examples of anti-torqued
vector fields are provided.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 07:04:43 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Aydin",
"Muhittin Evren",
""
],
[
"Mihai",
"Adela",
""
],
[
"Özgür",
"Cihan",
""
]
] |
2504.13515 | Mingwei Zheng | Mingwei Zheng and Danning Xie and Xiangyu Zhang | Large Language Models for Validating Network Protocol Parsers | null | null | null | null | cs.SE cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Network protocol parsers are essential for enabling correct and secure
communication between devices. Bugs in these parsers can introduce critical
vulnerabilities, including memory corruption, information leakage, and
denial-of-service attacks. An intuitive way to assess parser correctness is to
compare the implementation with its official protocol standard. However, this
comparison is challenging because protocol standards are typically written in
natural language, whereas implementations are in source code. Existing methods
like model checking, fuzzing, and differential testing have been used to find
parsing bugs, but they either require significant manual effort or ignore the
protocol standards, limiting their ability to detect semantic violations. To
enable more automated validation of parser implementations against protocol
standards, we propose PARVAL, a multi-agent framework built on large language
models (LLMs). PARVAL leverages the capabilities of LLMs to understand both
natural language and code. It transforms both protocol standards and their
implementations into a unified intermediate representation, referred to as
format specifications, and performs a differential comparison to uncover
inconsistencies. We evaluate PARVAL on the Bidirectional Forwarding Detection
(BFD) protocol. Our experiments demonstrate that PARVAL successfully identifies
inconsistencies between the implementation and its RFC standard, achieving a
low false positive rate of 5.6%. PARVAL uncovers seven unique bugs, including
five previously unknown issues.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 07:09:56 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Zheng",
"Mingwei",
""
],
[
"Xie",
"Danning",
""
],
[
"Zhang",
"Xiangyu",
""
]
] |
2504.13516 | Muhittin Evren Aydin | Muhittin Evren Aydin, Adela Mihai, Cihan \"Ozg\"ur | Anti-torqued slant helices and Torqued Curves in Riemannian manifolds | 18 pages, 2 figures | null | null | null | math.DG | http://creativecommons.org/licenses/by/4.0/ | In this paper, we introduce the notion of an anti-torqued slant helix in a
Riemannian manifold, defined as a curve whose principal vector field makes a
constant angle with an anti-torqued vector field globally defined on the
ambient manifold. We characterize and classify such curves through systems of
differential equations involving their invariants. Several illustrative
examples are also provided. Finally, we study torqued curves, defined as curves
for which the inner product function of the principal vector field and a
torqued vector field along the curve is a given constant.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 07:10:26 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Aydin",
"Muhittin Evren",
""
],
[
"Mihai",
"Adela",
""
],
[
"Özgür",
"Cihan",
""
]
] |
2504.13517 | Lihuan Li | Lihuan Li, Du Yin, Hao Xue, David Lillo-Trynes, Flora Salim | Optimizing Electric Vehicle Charging Station Locations: A Data-driven
System with Multi-source Fusion | 4-page short paper | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the growing electric vehicles (EVs) charging demand, urban planners face
the challenges of providing charging infrastructure at optimal locations. For
example, range anxiety during long-distance travel and the inadequate
distribution of residential charging stations are the major issues many cities
face. To achieve reasonable estimation and deployment of the charging demand,
we develop a data-driven system based on existing EV trips in New South Wales
(NSW) state, Australia, incorporating multiple factors that enhance the
geographical feasibility of recommended charging stations. Our system
integrates data sources including EV trip data, geographical data such as route
data and Local Government Area (LGA) boundaries, as well as features like fire
and flood risks, and Points of Interest (POIs). We visualize our results to
intuitively demonstrate the findings from our data-driven, multi-source fusion
system, and evaluate them through case studies. The outcome of this work can
provide a platform for discussion to develop new insights that could be used to
give guidance on where to position future EV charging stations.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 07:10:48 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Li",
"Lihuan",
""
],
[
"Yin",
"Du",
""
],
[
"Xue",
"Hao",
""
],
[
"Lillo-Trynes",
"David",
""
],
[
"Salim",
"Flora",
""
]
] |
2504.13518 | Yiying Dong | Yiying Dong, Bohan Zhang, Ruiqi Liang, Wenhe Jia, Kunpeng Chen, Junye
Zou, Futai Hu, Sheng Liu, Xiaokai Li, Yuanmu Yang | Scalable multilayer diffractive neural network with all-optical
nonlinear activation | null | null | null | null | physics.optics | http://creativecommons.org/licenses/by/4.0/ | All-optical diffractive neural networks (DNNs) offer a promising alternative
to electronics-based neural network processing due to their low latency, high
throughput, and inherent spatial parallelism. However, the lack of
reconfigurability and nonlinearity limits existing all-optical DNNs to handling
only simple tasks. In this study, we present a folded optical system that
enables a multilayer reconfigurable DNN using a single spatial light modulator.
This platform not only enables dynamic weight reconfiguration for diverse
classification challenges but crucially integrates a mirror-coated silicon
substrate exhibiting instantaneous \c{hi}(3) nonlinearity. The incorporation of
all-optical nonlinear activation yields substantial accuracy improvements
across benchmark tasks, with performance gains becoming increasingly
significant as both network depth and task complexity escalate. Our system
represents a critical advancement toward realizing scalable all-optical neural
networks with complex architectures, potentially achieving computational
capabilities that rival their electronic counterparts while maintaining
photonic advantages.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 07:14:18 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Dong",
"Yiying",
""
],
[
"Zhang",
"Bohan",
""
],
[
"Liang",
"Ruiqi",
""
],
[
"Jia",
"Wenhe",
""
],
[
"Chen",
"Kunpeng",
""
],
[
"Zou",
"Junye",
""
],
[
"Hu",
"Futai",
""
],
[
"Liu",
"Sheng",
""
],
[
"Li",
"Xiaokai",
""
],
[
"Yang",
"Yuanmu",
""
]
] |
2504.13519 | Yipeng Sun | Yipeng Sun, Linda-Sophie Schneider, Mingxuan Gu, Siyuan Mei, Chengze
Ye, Fabian Wagner, Siming Bayer and Andreas Maier | Filter2Noise: Interpretable Self-Supervised Single-Image Denoising for
Low-Dose CT with Attention-Guided Bilateral Filtering | preprint | null | null | null | eess.IV cs.CV cs.LG | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Effective denoising is crucial in low-dose CT to enhance subtle structures
and low-contrast lesions while preventing diagnostic errors. Supervised methods
struggle with limited paired datasets, and self-supervised approaches often
require multiple noisy images and rely on deep networks like U-Net, offering
little insight into the denoising mechanism. To address these challenges, we
propose an interpretable self-supervised single-image denoising framework --
Filter2Noise (F2N). Our approach introduces an Attention-Guided Bilateral
Filter that adapted to each noisy input through a lightweight module that
predicts spatially varying filter parameters, which can be visualized and
adjusted post-training for user-controlled denoising in specific regions of
interest. To enable single-image training, we introduce a novel downsampling
shuffle strategy with a new self-supervised loss function that extends the
concept of Noise2Noise to a single image and addresses spatially correlated
noise. On the Mayo Clinic 2016 low-dose CT dataset, F2N outperforms the leading
self-supervised single-image method (ZS-N2N) by 4.59 dB PSNR while improving
transparency, user control, and parametric efficiency. These features provide
key advantages for medical applications that require precise and interpretable
noise reduction. Our code is demonstrated at
https://github.com/sypsyp97/Filter2Noise.git .
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 07:15:27 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Sun",
"Yipeng",
""
],
[
"Schneider",
"Linda-Sophie",
""
],
[
"Gu",
"Mingxuan",
""
],
[
"Mei",
"Siyuan",
""
],
[
"Ye",
"Chengze",
""
],
[
"Wagner",
"Fabian",
""
],
[
"Bayer",
"Siming",
""
],
[
"Maier",
"Andreas",
""
]
] |
2504.13520 | Gregor Steiner | Gregor Steiner and Mark Steel | Bayesian Model Averaging in Causal Instrumental Variable Models | null | null | null | null | stat.ME econ.EM math.ST stat.TH | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Instrumental variables are a popular tool to infer causal effects under
unobserved confounding, but choosing suitable instruments is challenging in
practice. We propose gIVBMA, a Bayesian model averaging procedure that
addresses this challenge by averaging across different sets of instrumental
variables and covariates in a structural equation model. Our approach extends
previous work through a scale-invariant prior structure and accommodates
non-Gaussian outcomes and treatments, offering greater flexibility than
existing methods. The computational strategy uses conditional Bayes factors to
update models separately for the outcome and treatments. We prove that this
model selection procedure is consistent. By explicitly accounting for model
uncertainty, gIVBMA allows instruments and covariates to switch roles and
provides robustness against invalid instruments. In simulation experiments,
gIVBMA outperforms current state-of-the-art methods. We demonstrate its
usefulness in two empirical applications: the effects of malaria and
institutions on income per capita and the returns to schooling. A software
implementation of gIVBMA is available in Julia.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 07:18:51 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Steiner",
"Gregor",
""
],
[
"Steel",
"Mark",
""
]
] |
2504.13522 | John Cartlidge | Yunhua Pei and John Cartlidge and Anandadeep Mandal and Daniel Gold
and Enrique Marcilio and Riccardo Mazzon | Cross-Modal Temporal Fusion for Financial Market Forecasting | 10 pages, 2 figures | null | null | null | cs.LG cs.NE q-fin.CP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Accurate financial market forecasting requires diverse data sources,
including historical price trends, macroeconomic indicators, and financial
news, each contributing unique predictive signals. However, existing methods
often process these modalities independently or fail to effectively model their
interactions. In this paper, we introduce Cross-Modal Temporal Fusion (CMTF), a
novel transformer-based framework that integrates heterogeneous financial data
to improve predictive accuracy. Our approach employs attention mechanisms to
dynamically weight the contribution of different modalities, along with a
specialized tensor interpretation module for feature extraction. To facilitate
rapid model iteration in industry applications, we incorporate a mature
auto-training scheme that streamlines optimization. When applied to real-world
financial datasets, CMTF demonstrates improvements over baseline models in
forecasting stock price movements and provides a scalable and effective
solution for cross-modal integration in financial market prediction.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 07:20:18 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Pei",
"Yunhua",
""
],
[
"Cartlidge",
"John",
""
],
[
"Mandal",
"Anandadeep",
""
],
[
"Gold",
"Daniel",
""
],
[
"Marcilio",
"Enrique",
""
],
[
"Mazzon",
"Riccardo",
""
]
] |
2504.13523 | Philipp del Hougne | Hugo Prod'homme, Philipp del Hougne | Beyond-Diagonal Dynamic Metasurface Antenna | 5 pages, 2 figures, submitted to an IEEE Journal | null | null | null | physics.app-ph eess.SP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Dynamic metasurface antennas (DMAs) are an emerging technology for
next-generation wireless base stations, distinguished by hybrid analog/digital
beamforming capabilities with low hardware complexity. However, the coupling
between meta-atoms is fixed in existing DMAs, which fundamentally constrains
the achievable performance. Here, we introduce reconfigurable coupling
mechanisms between meta-atoms, yielding finer control over the DMA's analog
signal processing capabilities. This novel hardware is coined "beyond-diagonal
DMA" (BD-DMA), in line with established BD-RIS terminology. We derive a
physics-consistent system model revealing (correlated) "beyond-diagonal"
programmability in a reduced basis. We also present an equivalent formulation
in a non-reduced basis with (uncorrelated) "diagonal" programmability. Based on
the diagonal representation, we propose a general and efficient
mutual-coupling-aware optimization algorithm. Physics-consistent simulations
validate the performance enhancement enabled by reconfigurable coupling
mechanisms in BD-DMAs. The BD-DMA benefits grow with the mutual coupling
strength.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 07:23:13 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Prod'homme",
"Hugo",
""
],
[
"del Hougne",
"Philipp",
""
]
] |
2504.13524 | Jinhao Li | Jinhao Li, Zijian Chen, Tingzhu Chen, Zhiji Liu, Changbo Wang | OBIFormer: A Fast Attentive Denoising Framework for Oracle Bone
Inscriptions | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Oracle bone inscriptions (OBIs) are the earliest known form of Chinese
characters and serve as a valuable resource for research in anthropology and
archaeology. However, most excavated fragments are severely degraded due to
thousands of years of natural weathering, corrosion, and man-made destruction,
making automatic OBI recognition extremely challenging. Previous methods either
focus on pixel-level information or utilize vanilla transformers for
glyph-based OBI denoising, which leads to tremendous computational overhead.
Therefore, this paper proposes a fast attentive denoising framework for oracle
bone inscriptions, i.e., OBIFormer. It leverages channel-wise self-attention,
glyph extraction, and selective kernel feature fusion to reconstruct denoised
images precisely while being computationally efficient. Our OBIFormer achieves
state-of-the-art denoising performance for PSNR and SSIM metrics on synthetic
and original OBI datasets. Furthermore, comprehensive experiments on a real
oracle dataset demonstrate the great potential of our OBIFormer in assisting
automatic OBI recognition. The code will be made available at
https://github.com/LJHolyGround/OBIFormer.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 07:24:35 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Li",
"Jinhao",
""
],
[
"Chen",
"Zijian",
""
],
[
"Chen",
"Tingzhu",
""
],
[
"Liu",
"Zhiji",
""
],
[
"Wang",
"Changbo",
""
]
] |
2504.13525 | Florian Oschmann | Piotr Gwiazda, Florian Oschmann, Aneta Wr\'oblewska-Kami\'nska | Rigorous derivation of magneto-Oberbeck-Boussinesq approximation with
non-local temperature term | null | null | null | null | math.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a general compressible, viscous, heat and magnetically conducting
fluid described by the compressible Navier-Stokes-Fourier system coupled with
induction equation. In particular, we do not assume conservative boundary
conditions for the temperature and allow heating or cooling on the surface of
the domain. We are interested in the mathematical analysis when the Mach,
Froude, and Alfv\'en numbers are small, converging to zero at a specific rate.
We give a rigorous mathematical justification that in the limit, in case of low
stratification, one obtains a modified Oberbeck-Boussinesq-MHD system with a
non-local term or a non-local boundary condition for the temperature deviation.
Choosing a domain confined between parallel plates, one finds also that the
flow is horizontal, and the magnetic field is perpendicular to it. The proof is
based on the analysis of weak solutions to a primitive system and the relative
entropy method.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 07:28:23 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Gwiazda",
"Piotr",
""
],
[
"Oschmann",
"Florian",
""
],
[
"Wróblewska-Kamińska",
"Aneta",
""
]
] |
2504.13526 | Yulian Mao | Yulian Mao, Qingqing Ye, Rong Du, Qi Wang, Kai Huang, Haibo Hu | Multi-class Item Mining under Local Differential Privacy | null | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Item mining, a fundamental task for collecting statistical data from users,
has raised increasing privacy concerns. To address these concerns, local
differential privacy (LDP) was proposed as a privacy-preserving technique.
Existing LDP item mining mechanisms primarily concentrate on global statistics,
i.e., those from the entire dataset. Nevertheless, they fall short of
user-tailored tasks such as personalized recommendations, whereas classwise
statistics can improve task accuracy with fine-grained information. Meanwhile,
the introduction of class labels brings new challenges. Label perturbation may
result in invalid items for aggregation. To this end, we propose frameworks for
multi-class item mining, along with two mechanisms: validity perturbation to
reduce the impact of invalid data, and correlated perturbation to preserve the
relationship between labels and items. We also apply these optimized methods to
two multi-class item mining queries: frequency estimation and top-$k$ item
mining. Through theoretical analysis and extensive experiments, we verify the
effectiveness and superiority of these methods.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 07:37:06 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Mao",
"Yulian",
""
],
[
"Ye",
"Qingqing",
""
],
[
"Du",
"Rong",
""
],
[
"Wang",
"Qi",
""
],
[
"Huang",
"Kai",
""
],
[
"Hu",
"Haibo",
""
]
] |
2504.13527 | Corentin Larroche | Corentin Larroche | Designing a reliable lateral movement detector using a graph foundation
model | null | null | null | null | cs.CR cs.LG | http://creativecommons.org/licenses/by/4.0/ | Foundation models have recently emerged as a new paradigm in machine learning
(ML). These models are pre-trained on large and diverse datasets and can
subsequently be applied to various downstream tasks with little or no
retraining. This allows people without advanced ML expertise to build ML
applications, accelerating innovation across many fields. However, the adoption
of foundation models in cybersecurity is hindered by their inability to
efficiently process data such as network traffic captures or binary
executables. The recent introduction of graph foundation models (GFMs) could
make a significant difference, as graphs are well-suited to representing these
types of data. We study the usability of GFMs in cybersecurity through the lens
of one specific use case, namely lateral movement detection. Using a
pre-trained GFM, we build a detector that reaches state-of-the-art performance
without requiring any training on domain-specific data. This case study thus
provides compelling evidence of the potential of GFMs for cybersecurity.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 07:39:21 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Larroche",
"Corentin",
""
]
] |
2504.13528 | Shrabani Mondal | L. R. Rahul Biswas, Shrabani Mondal, and Bidhan Chandra Bag | Effect of an electromagnetic field on the barrier crossing rate | null | null | null | null | cond-mat.stat-mech | http://creativecommons.org/licenses/by/4.0/ | We investigate the spectrum for the rate constant of an electric field-driven
charged Brownian particle in the presence of a magnetic field (MF). For the
cross fields with low or high values of the cyclotron frequency, an asymmetric
splitting of the spectrum occurs with two peaks. Anharmonicity-induced
additional splitting may appear around the lower resonating frequency at the
intermediate strength of the applied MF. Another observation is that if the
magnetic field is tilted from the z-direction, an additional peak appears
between the two peaks. The position of the middle peak may be independent of
the strength of the applied MF. In some cases, only one peak appears even in
the presence of a magnetic field. We explain these observations considering the
dynamics around the stable fixed point and determine the position of the peak
in the spectrum for the rate constant as a function of the strength of the
applied magnetic field. Thus the present study may find applications for tuning
the conductivity of a solid electrolyte, which is very important in recent
technology. Other applications may be in areas such as electromagnetic
field-induced modulation of (a) thermally activated tunneling ionization, (b)
thermally stimulated ionization, etc.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 07:39:46 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Biswas",
"L. R. Rahul",
""
],
[
"Mondal",
"Shrabani",
""
],
[
"Bag",
"Bidhan Chandra",
""
]
] |
2504.13529 | John Cartlidge | Zinuo You and John Cartlidge and Karen Elliott and Menghan Ge and
Daniel Gold | Risk-aware black-box portfolio construction using Bayesian optimization
with adaptive weighted Lagrangian estimator | 10 pages, 2 figures | null | null | null | cs.LG cs.SY eess.SY q-fin.CP q-fin.PM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Existing portfolio management approaches are often black-box models due to
safety and commercial issues in the industry. However, their performance can
vary considerably whenever market conditions or internal trading strategies
change. Furthermore, evaluating these non-transparent systems is expensive,
where certain budgets limit observations of the systems. Therefore, optimizing
performance while controlling the potential risk of these financial systems has
become a critical challenge. This work presents a novel Bayesian optimization
framework to optimize black-box portfolio management models under limited
observations. In conventional Bayesian optimization settings, the objective
function is to maximize the expectation of performance metrics. However, simply
maximizing performance expectations leads to erratic optimization trajectories,
which exacerbate risk accumulation in portfolio management. Meanwhile, this can
lead to misalignment between the target distribution and the actual
distribution of the black-box model. To mitigate this problem, we propose an
adaptive weight Lagrangian estimator considering dual objective, which
incorporates maximizing model performance and minimizing variance of model
observations. Extensive experiments demonstrate the superiority of our approach
over five backtest settings with three black-box stock portfolio management
models. Ablation studies further verify the effectiveness of the proposed
estimator.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 07:40:24 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"You",
"Zinuo",
""
],
[
"Cartlidge",
"John",
""
],
[
"Elliott",
"Karen",
""
],
[
"Ge",
"Menghan",
""
],
[
"Gold",
"Daniel",
""
]
] |
2504.13530 | Soumalya Joardar | Arnab Chattopadhyay, Md Amir Hossain, and Soumalya Joardar | Metrics on $C^{\ast}$-algebras of \'Etale groupoids from length
functions | 14 pages | null | null | null | math.OA | http://creativecommons.org/licenses/by/4.0/ | We show that for an \'etale groupoid with compact unit space, the natural
Dirac type operator from a continuous length function produces a natural
pseudo-metric on the state space of the corresponding reduced
$C^{\ast}$-algebra. For a transformation groupoid with a continuous, proper
length function with rapid decay, the state space decomposes into genuine
metric spaces with a uniform finite diameter fibred over the state space of the
compact unit space. Moreover, when the unit space of the transformation
groupoid has finitely many points, the metric on each fibre metrizes the
weak*-topology.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 07:46:38 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Chattopadhyay",
"Arnab",
""
],
[
"Hossain",
"Md Amir",
""
],
[
"Joardar",
"Soumalya",
""
]
] |
2504.13531 | Nikolay Manchev | Nikolay Manchev and Luis C. Garcia-Peraza-Herrera | Can Local Representation Alignment RNNs Solve Temporal Tasks? | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recurrent Neural Networks (RNNs) are commonly used for real-time processing,
streaming data, and cases where the amount of training samples is limited.
Backpropagation Through Time (BPTT) is the predominant algorithm for training
RNNs; however, it is frequently criticized for being prone to exploding and
vanishing gradients and being biologically implausible. In this paper, we
present and evaluate a target propagation-based method for RNNs, which uses
local updates and seeks to reduce the said instabilities. Having stable RNN
models increases their practical use in a wide range of fields such as natural
language processing, time-series forecasting, anomaly detection, control
systems, and robotics.
The proposed solution uses local representation alignment (LRA). We
thoroughly analyze the performance of this method, experiment with
normalization and different local error functions, and invalidate certain
assumptions about the behavior of this type of learning. Namely, we demonstrate
that despite the decomposition of the network into sub-graphs, the model still
suffers from vanishing gradients. We also show that gradient clipping as
proposed in LRA has little to no effect on network performance. This results in
an LRA RNN model that is very difficult to train due to vanishing gradients. We
address this by introducing gradient regularization in the direction of the
update and demonstrate that this modification promotes gradient flow and
meaningfully impacts convergence. We compare and discuss the performance of the
algorithm, and we show that the regularized LRA RNN considerably outperforms
the unregularized version on three landmark tasks: temporal order, 3-bit
temporal order, and random permutation.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 07:48:48 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Manchev",
"Nikolay",
""
],
[
"Garcia-Peraza-Herrera",
"Luis C.",
""
]
] |
2504.13532 | Yen Jui Chang | Yen-Jui Chang, Wei-Ting Wang, Chen-Yu Liu, Yun-Yuan Wang, Ching-Ray
Chang | Quantum Walks-Based Adaptive Distribution Generation with Efficient
CUDA-Q Acceleration | 17 pages, 5 figures | null | null | null | quant-ph cs.CV q-fin.PR | http://creativecommons.org/licenses/by/4.0/ | We present a novel Adaptive Distribution Generator that leverages a quantum
walks-based approach to generate high precision and efficiency of target
probability distributions. Our method integrates variational quantum circuits
with discrete-time quantum walks, specifically, split-step quantum walks and
their entangled extensions, to dynamically tune coin parameters and drive the
evolution of quantum states towards desired distributions. This enables
accurate one-dimensional probability modeling for applications such as
financial simulation and structured two-dimensional pattern generation
exemplified by digit representations(0~9). Implemented within the CUDA-Q
framework, our approach exploits GPU acceleration to significantly reduce
computational overhead and improve scalability relative to conventional
methods. Extensive benchmarks demonstrate that our Quantum Walks-Based Adaptive
Distribution Generator achieves high simulation fidelity and bridges the gap
between theoretical quantum algorithms and practical high-performance
computation.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 07:53:03 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Chang",
"Yen-Jui",
""
],
[
"Wang",
"Wei-Ting",
""
],
[
"Liu",
"Chen-Yu",
""
],
[
"Wang",
"Yun-Yuan",
""
],
[
"Chang",
"Ching-Ray",
""
]
] |
2504.13533 | Eric Carlen | Eric A. Carlen, Gustavo Posta and Imre P\'eter T\'oth | Spectral Gap for the Stochastic Exchange Model | null | null | null | null | math.PR | http://creativecommons.org/licenses/by/4.0/ | We prove a spectral gap inequality for the stochastic exchange model studied
by Gaspard and Gilbert and by Grigo, Khanin and Sz\'asz in connection with
understanding heat conduction in a deterministic billiards model. The bound on
the spectral gap that we prove is uniform in the number of particles, as had
been conjectured. We adapt techniques that were originally developed to prove
spectral gap bounds for the Kac model with hard sphere collisions, which, like
the stochastic exchange model, has degenerate jump rates.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 07:54:27 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Carlen",
"Eric A.",
""
],
[
"Posta",
"Gustavo",
""
],
[
"Tóth",
"Imre Péter",
""
]
] |
2504.13534 | Feiyang Li | Feiyang Li, Peng Fang, Zhan Shi, Arijit Khan, Fang Wang, Dan Feng,
Weihao Wang, Xin Zhang, Yongjian Cui | CoT-RAG: Integrating Chain of Thought and Retrieval-Augmented Generation
to Enhance Reasoning in Large Language Models | null | null | null | null | cs.CL cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | While chain-of-thought (CoT) reasoning improves the performance of large
language models (LLMs) in complex tasks, it still has two main challenges: the
low reliability of relying solely on LLMs to generate reasoning chains and the
interference of natural language reasoning chains on the inference logic of
LLMs. To address these issues, we propose CoT-RAG, a novel reasoning framework
with three key designs: (i) Knowledge Graph-driven CoT Generation, featuring
knowledge graphs to modulate reasoning chain generation of LLMs, thereby
enhancing reasoning credibility; (ii) Learnable Knowledge Case-aware RAG, which
incorporates retrieval-augmented generation (RAG) into knowledge graphs to
retrieve relevant sub-cases and sub-descriptions, providing LLMs with learnable
information; (iii) Pseudo-Program Prompting Execution, which encourages LLMs to
execute reasoning tasks in pseudo-programs with greater logical rigor. We
conduct a comprehensive evaluation on nine public datasets, covering three
reasoning problems. Compared with the-state-of-the-art methods, CoT-RAG
exhibits a significant accuracy improvement, ranging from 4.0% to 23.0%.
Furthermore, testing on four domain-specific datasets, CoT-RAG shows remarkable
accuracy and efficient execution, highlighting its strong practical
applicability and scalability.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 07:55:09 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Li",
"Feiyang",
""
],
[
"Fang",
"Peng",
""
],
[
"Shi",
"Zhan",
""
],
[
"Khan",
"Arijit",
""
],
[
"Wang",
"Fang",
""
],
[
"Feng",
"Dan",
""
],
[
"Wang",
"Weihao",
""
],
[
"Zhang",
"Xin",
""
],
[
"Cui",
"Yongjian",
""
]
] |
2504.13535 | Jiahao Song | Jiahao Song, Yuzhao Wang | MusFlow: Multimodal Music Generation via Conditional Flow Matching | null | null | null | null | cs.SD cs.MM eess.AS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Music generation aims to create music segments that align with human
aesthetics based on diverse conditional information. Despite advancements in
generating music from specific textual descriptions (e.g., style, genre,
instruments), the practical application is still hindered by ordinary users'
limited expertise or time to write accurate prompts. To bridge this application
gap, this paper introduces MusFlow, a novel multimodal music generation model
using Conditional Flow Matching. We employ multiple Multi-Layer Perceptrons
(MLPs) to align multimodal conditional information into the audio's CLAP
embedding space. Conditional flow matching is trained to reconstruct the
compressed Mel-spectrogram in the pretrained VAE latent space guided by aligned
feature embedding. MusFlow can generate music from images, story texts, and
music captions. To collect data for model training, inspired by multi-agent
collaboration, we construct an intelligent data annotation workflow centered
around a fine-tuned Qwen2-VL model. Using this workflow, we build a new
multimodal music dataset, MMusSet, with each sample containing a quadruple of
image, story text, music caption, and music piece. We conduct four sets of
experiments: image-to-music, story-to-music, caption-to-music, and multimodal
music generation. Experimental results demonstrate that MusFlow can generate
high-quality music pieces whether the input conditions are unimodal or
multimodal. We hope this work can advance the application of music generation
in multimedia field, making music creation more accessible. Our generated
samples, code and dataset are available at musflow.github.io.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 07:59:35 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Song",
"Jiahao",
""
],
[
"Wang",
"Yuzhao",
""
]
] |
2504.13536 | Manuel Bodirsky | Arno Fehm and Manuel Bodirsky | Polynomial-time Tractable Problems over the $p$-adic Numbers | null | null | null | null | cs.CC math.LO | http://creativecommons.org/licenses/by-sa/4.0/ | We study the computational complexity of fundamental problems over the
$p$-adic numbers ${\mathbb Q}_p$ and the $p$-adic integers ${\mathbb Z}_p$.
Gu\'epin, Haase, and Worrell proved that checking satisfiability of systems of
linear equations combined with valuation constraints of the form $v_p(x) = c$
for $p \geq 5$ is NP-complete (both over ${\mathbb Z}_p$ and over ${\mathbb
Q}_p$), and left the cases $p=2$ and $p=3$ open. We solve their problem by
showing that the problem is NP-complete for ${\mathbb Z}_3$ and for ${\mathbb
Q}_3$, but that it is in P for ${\mathbb Z}_2$ and for ${\mathbb Q}_2$. We also
present different polynomial-time algorithms for solvability of systems of
linear equations in ${\mathbb Q}_p$ with either constraints of the form $v_p(x)
\leq c$ or of the form $v_p(x)\geq c$ for $c \in {\mathbb Z}$. Finally, we show
how our algorithms can be used to decide in polynomial time the satisfiability
of systems of (strict and non-strict) linear inequalities over ${\mathbb Q}$
together with valuation constraints $v_p(x) \geq c$ for several different prime
numbers $p$ simultaneously.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 07:59:52 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Fehm",
"Arno",
""
],
[
"Bodirsky",
"Manuel",
""
]
] |
2504.13537 | Omar Alnaseri | Omar Alnaseri, Yassine Himeur, Shadi Atalla and Wathiq Mansoor | Complexity of Post-Quantum Cryptography in Embedded Systems and Its
Optimization Strategies | null | null | null | null | cs.CR | http://creativecommons.org/licenses/by/4.0/ | With the rapid advancements in quantum computing, traditional cryptographic
schemes like Rivest-Shamir-Adleman (RSA) and elliptic curve cryptography (ECC)
are becoming vulnerable, necessitating the development of quantum-resistant
algorithms. The National Institute of Standards and Technology (NIST) has
initiated a standardization process for PQC algorithms, and several candidates,
including CRYSTALS-Kyber and McEliece, have reached the final stages. This
paper first provides a comprehensive analysis of the hardware complexity of
post-quantum cryptography (PQC) in embedded systems, categorizing PQC
algorithms into families based on their underlying mathematical problems:
lattice-based, code-based, hash-based and multivariate / isogeny-based schemes.
Each family presents distinct computational, memory, and energy profiles,
making them suitable for different use cases. To address these challenges, this
paper discusses optimization strategies such as pipelining, parallelization,
and high-level synthesis (HLS), which can improve the performance and energy
efficiency of PQC implementations. Finally, a detailed complexity analysis of
CRYSTALS-Kyber and McEliece, comparing their key generation, encryption, and
decryption processes in terms of computational complexity, has been conducted.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 08:02:13 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Alnaseri",
"Omar",
""
],
[
"Himeur",
"Yassine",
""
],
[
"Atalla",
"Shadi",
""
],
[
"Mansoor",
"Wathiq",
""
]
] |
2504.13538 | Junfan Yi | Yijun Ran, Junfan Yi, Wei Si, Michael Small and Ke-ke Shang | Machine Learning Informed by Micro and Mesoscopic Statistical Physics
Methods for Community Detection | 14 pages, 4 figures | null | null | null | cs.SI nlin.AO physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Community detection plays a crucial role in understanding the structural
organization of complex networks. Previous methods, particularly those from
statistical physics, primarily focus on the analysis of mesoscopic network
structures and often struggle to integrate fine-grained node similarities. To
address this limitation, we propose a low-complexity framework that integrates
machine learning to embed micro-level node-pair similarities into mesoscopic
community structures. By leveraging ensemble learning models, our approach
enhances both structural coherence and detection accuracy. Experimental
evaluations on artificial and real-world networks demonstrate that our
framework consistently outperforms conventional methods, achieving higher
modularity and improved accuracy in NMI and ARI. Notably, when ground-truth
labels are available, our approach yields the most accurate detection results,
effectively recovering real-world community structures while minimizing
misclassifications. To further explain our framework's performance, we analyze
the correlation between node-pair similarity and evaluation metrics. The
results reveal a strong and statistically significant correlation, underscoring
the critical role of node-pair similarity in enhancing detection accuracy.
Overall, our findings highlight the synergy between machine learning and
statistical physics, demonstrating how machine learning techniques can enhance
network analysis and uncover complex structural patterns.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 08:07:17 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Ran",
"Yijun",
""
],
[
"Yi",
"Junfan",
""
],
[
"Si",
"Wei",
""
],
[
"Small",
"Michael",
""
],
[
"Shang",
"Ke-ke",
""
]
] |
2504.13539 | Linjian Li | BESIII Collaboration: M. Ablikim, M. N. Achasov, P. Adlarson, X. C.
Ai, R. Aliberti, A. Amoroso, Q. An, Y. Bai, O. Bakina, Y. Ban, H.-R. Bao, V.
Batozskaya, K. Begzsuren, N. Berger, M. Berlowski, M. Bertani, D. Bettoni, F.
Bianchi, E. Bianco, A. Bortone, I. Boyko, R. A. Briere, A. Brueggemann, H.
Cai, M. H. Cai, X. Cai, A. Calcaterra, G. F. Cao, N. Cao, S. A. Cetin, X. Y.
Chai, J. F. Chang, G. R. Che, Y. Z. Che, C. H. Chen, Chao Chen, G. Chen, H.
S. Chen, H. Y. Chen, M. L. Chen, S. J. Chen, S. L. Chen, S. M. Chen, T. Chen,
X. R. Chen, X. T. Chen, X. Y. Chen, Y. B. Chen, Y. Q. Chen, Y. Q. Chen, Z. J.
Chen, Z. K. Chen, S. K. Choi, X. Chu, G. Cibinetto, F. Cossio, J.
Cottee-Meldrum, J. J. Cui, H. L. Dai, J. P. Dai, A. Dbeyssi, R. E. de Boer,
D. Dedovich, C. Q. Deng, Z. Y. Deng, A. Denig, I. Denysenko, M. Destefanis,
F. De Mori, B. Ding, X. X. Ding, Y. Ding, Y. Ding, Y. X. Ding, J. Dong, L. Y.
Dong, M. Y. Dong, X. Dong, M. C. Du, S. X. Du, S. X. Du, Y. Y. Duan, P.
Egorov, G. F. Fan, J. J. Fan, Y. H. Fan, J. Fang, J. Fang, S. S. Fang, W. X.
Fang, Y. Q. Fang, R. Farinelli, L. Fava, F. Feldbauer, G. Felici, C. Q. Feng,
J. H. Feng, L. Feng, Q. X. Feng, Y. T. Feng, M. Fritsch, C. D. Fu, J. L. Fu,
Y. W. Fu, H. Gao, X. B. Gao, Y. Gao, Y. N. Gao, Y. N. Gao, Y. Y. Gao, S.
Garbolino, I. Garzia, P. T. Ge, Z. W. Ge, C. Geng, E. M. Gersabeck, A.
Gilman, K. Goetzen, J. D. Gong, L. Gong, W. X. Gong, W. Gradl, S. Gramigna,
M. Greco, M. H. Gu, Y. T. Gu, C. Y. Guan, A. Q. Guo, L. B. Guo, M. J. Guo, R.
P. Guo, Y. P. Guo, A. Guskov, J. Gutierrez, K. L. Han, T. T. Han, F. Hanisch,
K. D. Hao, X. Q. Hao, F. A. Harris, K. K. He, K. L. He, F. H. Heinsius, C. H.
Heinz, Y. K. Heng, C. Herold, P. C. Hong, G. Y. Hou, X. T. Hou, Y. R. Hou, Z.
L. Hou, H. M. Hu, J. F. Hu, Q. P. Hu, S. L. Hu, T. Hu, Y. Hu, Z. M. Hu, G. S.
Huang, K. X. Huang, L. Q. Huang, P. Huang, X. T. Huang, Y. P. Huang, Y. S.
Huang, T. Hussain, N. H\"usken, N. in der Wiesche, J. Jackson, Q. Ji, Q. P.
Ji, W. Ji, X. B. Ji, X. L. Ji, Y. Y. Ji, Z. K. Jia, D. Jiang, H. B. Jiang, P.
C. Jiang, S. J. Jiang, T. J. Jiang, X. S. Jiang, Y. Jiang, J. B. Jiao, J. K.
Jiao, Z. Jiao, S. Jin, Y. Jin, M. Q. Jing, X. M. Jing, T. Johansson, S.
Kabana, N. Kalantar-Nayestanaki, X. L. Kang, X. S. Kang, M. Kavatsyuk, B. C.
Ke, V. Khachatryan, A. Khoukaz, R. Kiuchi, O. B. Kolcu, B. Kopf, M. Kuessner,
X. Kui, N. Kumar, A. Kupsc, W. K\"uhn, Q. Lan, W. N. Lan, T. T. Lei, M.
Lellmann, T. Lenz, C. Li, C. Li, C. Li, C. H. Li, C. K. Li, D. M. Li, F. Li,
G. Li, H. B. Li, H. J. Li, H. N. Li, Hui Li, J. R. Li, J. S. Li, K. Li, K. L.
Li, K. L. Li, L. J. Li, Lei Li, M. H. Li, M. R. Li, P. L. Li, P. R. Li, Q. M.
Li, Q. X. Li, R. Li, S. X. Li, T. Li, T. Y. Li, W. D. Li, W. G. Li, X. Li, X.
H. Li, X. L. Li, X. Y. Li, X. Z. Li, Y. Li, Y. G. Li, Y. P. Li, Z. J. Li, Z.
Y. Li, H. Liang, Y. F. Liang, Y. T. Liang, G. R. Liao, L. B. Liao, M. H.
Liao, Y. P. Liao, J. Libby, A. Limphirat, C. C. Lin, D. X. Lin, L. Q. Lin, T.
Lin, B. J. Liu, B. X. Liu, C. Liu, C. X. Liu, F. Liu, F. H. Liu, Feng Liu, G.
M. Liu, H. Liu, H. B. Liu, H. H. Liu, H. M. Liu, Huihui Liu, J. B. Liu, J. J.
Liu, K. Liu, K. Liu, K. Y. Liu, Ke Liu, L. C. Liu, Lu Liu, M. H. Liu, P. L.
Liu, Q. Liu, S. B. Liu, T. Liu, W. K. Liu, W. M. Liu, W. T. Liu, X. Liu, X.
Liu, X. K. Liu, X. Y. Liu, Y. Liu, Y. Liu, Y. Liu, Y. B. Liu, Z. A. Liu, Z.
D. Liu, Z. Q. Liu, X. C. Lou, F. X. Lu, H. J. Lu, J. G. Lu, X. L. Lu, Y. Lu,
Y. H. Lu, Y. P. Lu, Z. H. Lu, C. L. Luo, J. R. Luo, J. S. Luo, M. X. Luo, T.
Luo, X. L. Luo, Z. Y. Lv, X. R. Lyu, Y. F. Lyu, Y. H. Lyu, F. C. Ma, H. L.
Ma, J. L. Ma, L. L. Ma, L. R. Ma, Q. M. Ma, R. Q. Ma, R. Y. Ma, T. Ma, X. T.
Ma, X. Y. Ma, Y. M. Ma, F. E. Maas, I. MacKay, M. Maggiora, S. Malde, Q. A.
Malik, H. X. Mao, Y. J. Mao, Z. P. Mao, S. Marcello, A. Marshall, F. M.
Melendi, Y. H. Meng, Z. X. Meng, G. Mezzadri, H. Miao, T. J. Min, R. E.
Mitchell, X. H. Mo, B. Moses, N. Yu. Muchnoi, J. Muskalla, Y. Nefedov, F.
Nerling, L. S. Nie, I. B. Nikolaev, Z. Ning, S. Nisar, Q. L. Niu, W. D. Niu,
C. Normand, S. L. Olsen, Q. Ouyang, S. Pacetti, X. Pan, Y. Pan, A. Pathak, Y.
P. Pei, M. Pelizaeus, H. P. Peng, X. J. Peng, Y. Y. Peng, K. Peters, K.
Petridis, J. L. Ping, R. G. Ping, S. Plura, V. Prasad, F. Z. Qi, H. R. Qi, M.
Qi, S. Qian, W. B. Qian, C. F. Qiao, J. H. Qiao, J. J. Qin, J. L. Qin, L. Q.
Qin, L. Y. Qin, P. B. Qin, X. P. Qin, X. S. Qin, Z. H. Qin, J. F. Qiu, Z. H.
Qu, J. Rademacker, C. F. Redmer, A. Rivetti, M. Rolo, G. Rong, S. S. Rong, F.
Rosini, Ch. Rosner, M. Q. Ruan, N. Salone, A. Sarantsev, Y. Schelhaas, K.
Schoenning, M. Scodeggio, K. Y. Shan, W. Shan, X. Y. Shan, Z. J. Shang, J. F.
Shangguan, L. G. Shao, M. Shao, C. P. Shen, H. F. Shen, W. H. Shen, X. Y.
Shen, B. A. Shi, H. Shi, J. L. Shi, J. Y. Shi, S. Y. Shi, X. Shi, H. L. Song,
J. J. Song, T. Z. Song, W. M. Song, Y. J. Song, Y. X. Song, S. Sosio, S.
Spataro, F. Stieler, S. S Su, Y. J. Su, G. B. Sun, G. X. Sun, H. Sun, H. K.
Sun, J. F. Sun, K. Sun, L. Sun, S. S. Sun, T. Sun, Y. C. Sun, Y. H. Sun, Y.
J. Sun, Y. Z. Sun, Z. Q. Sun, Z. T. Sun, C. J. Tang, G. Y. Tang, J. Tang, J.
J. Tang, L. F. Tang, Y. A. Tang, L. Y. Tao, M. Tat, J. X. Teng, J. Y. Tian,
W. H. Tian, Y. Tian, Z. F. Tian, I. Uman, B. Wang, B. Wang, Bo Wang, C. Wang,
C. Wang, Cong Wang, D. Y. Wang, H. J. Wang, J. J. Wang, K. Wang, L. L. Wang,
L. W. Wang, M. Wang, M. Wang, N. Y. Wang, S. Wang, T. Wang, T. J. Wang, W.
Wang, W. Wang, W. P. Wang, X. Wang, X. F. Wang, X. J. Wang, X. L. Wang, X. N.
Wang, Y. Wang, Y. D. Wang, Y. F. Wang, Y. H. Wang, Y. J. Wang, Y. L. Wang, Y.
N. Wang, Y. Q. Wang, Yaqian Wang, Yi Wang, Yuan Wang, Z. Wang, Z. L. Wang, Z.
L. Wang, Z. Q. Wang, Z. Y. Wang, D. H. Wei, H. R. Wei, F. Weidner, S. P. Wen,
Y. R. Wen, U. Wiedner, G. Wilkinson, M. Wolke, C. Wu, J. F. Wu, L. H. Wu, L.
J. Wu, L. J. Wu, Lianjie Wu, S. G. Wu, S. M. Wu, X. Wu, X. H. Wu, Y. J. Wu,
Z. Wu, L. Xia, X. M. Xian, B. H. Xiang, D. Xiao, G. Y. Xiao, H. Xiao, Y. L.
Xiao, Z. J. Xiao, C. Xie, K. J. Xie, X. H. Xie, Y. Xie, Y. G. Xie, Y. H. Xie,
Z. P. Xie, T. Y. Xing, C. F. Xu, C. J. Xu, G. F. Xu, H. Y. Xu, H. Y. Xu, M.
Xu, Q. J. Xu, Q. N. Xu, T. D. Xu, W. Xu, W. L. Xu, X. P. Xu, Y. Xu, Y. Xu, Y.
C. Xu, Z. S. Xu, F. Yan, H. Y. Yan, L. Yan, W. B. Yan, W. C. Yan, W. H. Yan,
W. P. Yan, X. Q. Yan, H. J. Yang, H. L. Yang, H. X. Yang, J. H. Yang, R. J.
Yang, T. Yang, Y. Yang, Y. F. Yang, Y. H. Yang, Y. Q. Yang, Y. X. Yang, Y. Z.
Yang, M. Ye, M. H. Ye, Z. J. Ye, Junhao Yin, Z. Y. You, B. X. Yu, C. X. Yu,
G. Yu, J. S. Yu, L. Q. Yu, M. C. Yu, T. Yu, X. D. Yu, Y. C. Yu, C. Z. Yuan,
H. Yuan, J. Yuan, J. Yuan, L. Yuan, S. C. Yuan, X. Q. Yuan, Y. Yuan, Z. Y.
Yuan, C. X. Yue, Ying Yue, A. A. Zafar, S. H. Zeng, X. Zeng, Y. Zeng, Y. J.
Zeng, Y. J. Zeng, X. Y. Zhai, Y. H. Zhan, A. Q. Zhang, B. L. Zhang, B. X.
Zhang, D. H. Zhang, G. Y. Zhang, G. Y. Zhang, H. Zhang, H. Zhang, H. C.
Zhang, H. H. Zhang, H. Q. Zhang, H. R. Zhang, H. Y. Zhang, J. Zhang, J.
Zhang, J. J. Zhang, J. L. Zhang, J. Q. Zhang, J. S. Zhang, J. W. Zhang, J. X.
Zhang, J. Y. Zhang, J. Z. Zhang, Jianyu Zhang, L. M. Zhang, Lei Zhang, N.
Zhang, P. Zhang, Q. Zhang, Q. Y. Zhang, R. Y. Zhang, S. H. Zhang, Shulei
Zhang, X. M. Zhang, X. Y Zhang, X. Y. Zhang, Y. Zhang, Y. Zhang, Y. T. Zhang,
Y. H. Zhang, Y. M. Zhang, Y. P. Zhang, Z. D. Zhang, Z. H. Zhang, Z. L. Zhang,
Z. L. Zhang, Z. X. Zhang, Z. Y. Zhang, Z. Y. Zhang, Z. Z. Zhang, Zh. Zh.
Zhang, G. Zhao, J. Y. Zhao, J. Z. Zhao, L. Zhao, L. Zhao, M. G. Zhao, N.
Zhao, R. P. Zhao, S. J. Zhao, Y. B. Zhao, Y. L. Zhao, Y. X. Zhao, Z. G. Zhao,
A. Zhemchugov, B. Zheng, B. M. Zheng, J. P. Zheng, W. J. Zheng, X. R. Zheng,
Y. H. Zheng, B. Zhong, C. Zhong, H. Zhou, J. Q. Zhou, J. Y. Zhou, S. Zhou, X.
Zhou, X. K. Zhou, X. R. Zhou, X. Y. Zhou, Y. X. Zhou, Y. Z. Zhou, A. N. Zhu,
J. Zhu, K. Zhu, K. J. Zhu, K. S. Zhu, L. Zhu, L. X. Zhu, S. H. Zhu, T. J.
Zhu, W. D. Zhu, W. D. Zhu, W. J. Zhu, W. Z. Zhu, Y. C. Zhu, Z. A. Zhu, X. Y.
Zhuang, J. H. Zou, J. Zu | Search for $1^{-+}$ charmonium-like hybrid via $e^{+}e^{-}\rightarrow
\gamma \eta^{(\prime)} \eta_{c}$ at center-of-mass energies between 4.258 and
4.681 GeV | null | null | null | null | hep-ex | http://creativecommons.org/licenses/by/4.0/ | Using $e^{+}e^{-}$ collision data corresponding to an integrated luminosity
of 10.6 fb$^{-1}$ collected at center-of-mass energies between 4.258 and 4.681
GeV with the BESIII detector at the BEPCII collider, we search for the $1^{-
+}$ charmonium-like hybrid via $e^{+}e^{-}\rightarrow\gamma\eta\eta_{c}$ and
$e^{+}e^{-}\rightarrow\gamma\eta^{\prime}\eta_{c}$ decays for the first time.
No significant signal is observed and the upper limits on the Born cross
sections for both processes are set at the 90% confidence level.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 08:08:11 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"BESIII Collaboration",
"",
""
],
[
"Ablikim",
"M.",
""
],
[
"Achasov",
"M. N.",
""
],
[
"Adlarson",
"P.",
""
],
[
"Ai",
"X. C.",
""
],
[
"Aliberti",
"R.",
""
],
[
"Amoroso",
"A.",
""
],
[
"An",
"Q.",
""
],
[
"Bai",
"Y.",
""
],
[
"Bakina",
"O.",
""
],
[
"Ban",
"Y.",
""
],
[
"Bao",
"H. -R.",
""
],
[
"Batozskaya",
"V.",
""
],
[
"Begzsuren",
"K.",
""
],
[
"Berger",
"N.",
""
],
[
"Berlowski",
"M.",
""
],
[
"Bertani",
"M.",
""
],
[
"Bettoni",
"D.",
""
],
[
"Bianchi",
"F.",
""
],
[
"Bianco",
"E.",
""
],
[
"Bortone",
"A.",
""
],
[
"Boyko",
"I.",
""
],
[
"Briere",
"R. A.",
""
],
[
"Brueggemann",
"A.",
""
],
[
"Cai",
"H.",
""
],
[
"Cai",
"M. H.",
""
],
[
"Cai",
"X.",
""
],
[
"Calcaterra",
"A.",
""
],
[
"Cao",
"G. F.",
""
],
[
"Cao",
"N.",
""
],
[
"Cetin",
"S. A.",
""
],
[
"Chai",
"X. Y.",
""
],
[
"Chang",
"J. F.",
""
],
[
"Che",
"G. R.",
""
],
[
"Che",
"Y. Z.",
""
],
[
"Chen",
"C. H.",
""
],
[
"Chen",
"Chao",
""
],
[
"Chen",
"G.",
""
],
[
"Chen",
"H. S.",
""
],
[
"Chen",
"H. Y.",
""
],
[
"Chen",
"M. L.",
""
],
[
"Chen",
"S. J.",
""
],
[
"Chen",
"S. L.",
""
],
[
"Chen",
"S. M.",
""
],
[
"Chen",
"T.",
""
],
[
"Chen",
"X. R.",
""
],
[
"Chen",
"X. T.",
""
],
[
"Chen",
"X. Y.",
""
],
[
"Chen",
"Y. B.",
""
],
[
"Chen",
"Y. Q.",
""
],
[
"Chen",
"Y. Q.",
""
],
[
"Chen",
"Z. J.",
""
],
[
"Chen",
"Z. K.",
""
],
[
"Choi",
"S. K.",
""
],
[
"Chu",
"X.",
""
],
[
"Cibinetto",
"G.",
""
],
[
"Cossio",
"F.",
""
],
[
"Cottee-Meldrum",
"J.",
""
],
[
"Cui",
"J. J.",
""
],
[
"Dai",
"H. L.",
""
],
[
"Dai",
"J. P.",
""
],
[
"Dbeyssi",
"A.",
""
],
[
"de Boer",
"R. E.",
""
],
[
"Dedovich",
"D.",
""
],
[
"Deng",
"C. Q.",
""
],
[
"Deng",
"Z. Y.",
""
],
[
"Denig",
"A.",
""
],
[
"Denysenko",
"I.",
""
],
[
"Destefanis",
"M.",
""
],
[
"De Mori",
"F.",
""
],
[
"Ding",
"B.",
""
],
[
"Ding",
"X. X.",
""
],
[
"Ding",
"Y.",
""
],
[
"Ding",
"Y.",
""
],
[
"Ding",
"Y. X.",
""
],
[
"Dong",
"J.",
""
],
[
"Dong",
"L. Y.",
""
],
[
"Dong",
"M. Y.",
""
],
[
"Dong",
"X.",
""
],
[
"Du",
"M. C.",
""
],
[
"Du",
"S. X.",
""
],
[
"Du",
"S. X.",
""
],
[
"Duan",
"Y. Y.",
""
],
[
"Egorov",
"P.",
""
],
[
"Fan",
"G. F.",
""
],
[
"Fan",
"J. J.",
""
],
[
"Fan",
"Y. H.",
""
],
[
"Fang",
"J.",
""
],
[
"Fang",
"J.",
""
],
[
"Fang",
"S. S.",
""
],
[
"Fang",
"W. X.",
""
],
[
"Fang",
"Y. Q.",
""
],
[
"Farinelli",
"R.",
""
],
[
"Fava",
"L.",
""
],
[
"Feldbauer",
"F.",
""
],
[
"Felici",
"G.",
""
],
[
"Feng",
"C. Q.",
""
],
[
"Feng",
"J. H.",
""
],
[
"Feng",
"L.",
""
],
[
"Feng",
"Q. X.",
""
],
[
"Feng",
"Y. T.",
""
],
[
"Fritsch",
"M.",
""
],
[
"Fu",
"C. D.",
""
],
[
"Fu",
"J. L.",
""
],
[
"Fu",
"Y. W.",
""
],
[
"Gao",
"H.",
""
],
[
"Gao",
"X. B.",
""
],
[
"Gao",
"Y.",
""
],
[
"Gao",
"Y. N.",
""
],
[
"Gao",
"Y. N.",
""
],
[
"Gao",
"Y. Y.",
""
],
[
"Garbolino",
"S.",
""
],
[
"Garzia",
"I.",
""
],
[
"Ge",
"P. T.",
""
],
[
"Ge",
"Z. W.",
""
],
[
"Geng",
"C.",
""
],
[
"Gersabeck",
"E. M.",
""
],
[
"Gilman",
"A.",
""
],
[
"Goetzen",
"K.",
""
],
[
"Gong",
"J. D.",
""
],
[
"Gong",
"L.",
""
],
[
"Gong",
"W. X.",
""
],
[
"Gradl",
"W.",
""
],
[
"Gramigna",
"S.",
""
],
[
"Greco",
"M.",
""
],
[
"Gu",
"M. H.",
""
],
[
"Gu",
"Y. T.",
""
],
[
"Guan",
"C. Y.",
""
],
[
"Guo",
"A. Q.",
""
],
[
"Guo",
"L. B.",
""
],
[
"Guo",
"M. J.",
""
],
[
"Guo",
"R. P.",
""
],
[
"Guo",
"Y. P.",
""
],
[
"Guskov",
"A.",
""
],
[
"Gutierrez",
"J.",
""
],
[
"Han",
"K. L.",
""
],
[
"Han",
"T. T.",
""
],
[
"Hanisch",
"F.",
""
],
[
"Hao",
"K. D.",
""
],
[
"Hao",
"X. Q.",
""
],
[
"Harris",
"F. A.",
""
],
[
"He",
"K. K.",
""
],
[
"He",
"K. L.",
""
],
[
"Heinsius",
"F. H.",
""
],
[
"Heinz",
"C. H.",
""
],
[
"Heng",
"Y. K.",
""
],
[
"Herold",
"C.",
""
],
[
"Hong",
"P. C.",
""
],
[
"Hou",
"G. Y.",
""
],
[
"Hou",
"X. T.",
""
],
[
"Hou",
"Y. R.",
""
],
[
"Hou",
"Z. L.",
""
],
[
"Hu",
"H. M.",
""
],
[
"Hu",
"J. F.",
""
],
[
"Hu",
"Q. P.",
""
],
[
"Hu",
"S. L.",
""
],
[
"Hu",
"T.",
""
],
[
"Hu",
"Y.",
""
],
[
"Hu",
"Z. M.",
""
],
[
"Huang",
"G. S.",
""
],
[
"Huang",
"K. X.",
""
],
[
"Huang",
"L. Q.",
""
],
[
"Huang",
"P.",
""
],
[
"Huang",
"X. T.",
""
],
[
"Huang",
"Y. P.",
""
],
[
"Huang",
"Y. S.",
""
],
[
"Hussain",
"T.",
""
],
[
"Hüsken",
"N.",
""
],
[
"der Wiesche",
"N. in",
""
],
[
"Jackson",
"J.",
""
],
[
"Ji",
"Q.",
""
],
[
"Ji",
"Q. P.",
""
],
[
"Ji",
"W.",
""
],
[
"Ji",
"X. B.",
""
],
[
"Ji",
"X. L.",
""
],
[
"Ji",
"Y. Y.",
""
],
[
"Jia",
"Z. K.",
""
],
[
"Jiang",
"D.",
""
],
[
"Jiang",
"H. B.",
""
],
[
"Jiang",
"P. C.",
""
],
[
"Jiang",
"S. J.",
""
],
[
"Jiang",
"T. J.",
""
],
[
"Jiang",
"X. S.",
""
],
[
"Jiang",
"Y.",
""
],
[
"Jiao",
"J. B.",
""
],
[
"Jiao",
"J. K.",
""
],
[
"Jiao",
"Z.",
""
],
[
"Jin",
"S.",
""
],
[
"Jin",
"Y.",
""
],
[
"Jing",
"M. Q.",
""
],
[
"Jing",
"X. M.",
""
],
[
"Johansson",
"T.",
""
],
[
"Kabana",
"S.",
""
],
[
"Kalantar-Nayestanaki",
"N.",
""
],
[
"Kang",
"X. L.",
""
],
[
"Kang",
"X. S.",
""
],
[
"Kavatsyuk",
"M.",
""
],
[
"Ke",
"B. C.",
""
],
[
"Khachatryan",
"V.",
""
],
[
"Khoukaz",
"A.",
""
],
[
"Kiuchi",
"R.",
""
],
[
"Kolcu",
"O. B.",
""
],
[
"Kopf",
"B.",
""
],
[
"Kuessner",
"M.",
""
],
[
"Kui",
"X.",
""
],
[
"Kumar",
"N.",
""
],
[
"Kupsc",
"A.",
""
],
[
"Kühn",
"W.",
""
],
[
"Lan",
"Q.",
""
],
[
"Lan",
"W. N.",
""
],
[
"Lei",
"T. T.",
""
],
[
"Lellmann",
"M.",
""
],
[
"Lenz",
"T.",
""
],
[
"Li",
"C.",
""
],
[
"Li",
"C.",
""
],
[
"Li",
"C.",
""
],
[
"Li",
"C. H.",
""
],
[
"Li",
"C. K.",
""
],
[
"Li",
"D. M.",
""
],
[
"Li",
"F.",
""
],
[
"Li",
"G.",
""
],
[
"Li",
"H. B.",
""
],
[
"Li",
"H. J.",
""
],
[
"Li",
"H. N.",
""
],
[
"Li",
"Hui",
""
],
[
"Li",
"J. R.",
""
],
[
"Li",
"J. S.",
""
],
[
"Li",
"K.",
""
],
[
"Li",
"K. L.",
""
],
[
"Li",
"K. L.",
""
],
[
"Li",
"L. J.",
""
],
[
"Li",
"Lei",
""
],
[
"Li",
"M. H.",
""
],
[
"Li",
"M. R.",
""
],
[
"Li",
"P. L.",
""
],
[
"Li",
"P. R.",
""
],
[
"Li",
"Q. M.",
""
],
[
"Li",
"Q. X.",
""
],
[
"Li",
"R.",
""
],
[
"Li",
"S. X.",
""
],
[
"Li",
"T.",
""
],
[
"Li",
"T. Y.",
""
],
[
"Li",
"W. D.",
""
],
[
"Li",
"W. G.",
""
],
[
"Li",
"X.",
""
],
[
"Li",
"X. H.",
""
],
[
"Li",
"X. L.",
""
],
[
"Li",
"X. Y.",
""
],
[
"Li",
"X. Z.",
""
],
[
"Li",
"Y.",
""
],
[
"Li",
"Y. G.",
""
],
[
"Li",
"Y. P.",
""
],
[
"Li",
"Z. J.",
""
],
[
"Li",
"Z. Y.",
""
],
[
"Liang",
"H.",
""
],
[
"Liang",
"Y. F.",
""
],
[
"Liang",
"Y. T.",
""
],
[
"Liao",
"G. R.",
""
],
[
"Liao",
"L. B.",
""
],
[
"Liao",
"M. H.",
""
],
[
"Liao",
"Y. P.",
""
],
[
"Libby",
"J.",
""
],
[
"Limphirat",
"A.",
""
],
[
"Lin",
"C. C.",
""
],
[
"Lin",
"D. X.",
""
],
[
"Lin",
"L. Q.",
""
],
[
"Lin",
"T.",
""
],
[
"Liu",
"B. J.",
""
],
[
"Liu",
"B. X.",
""
],
[
"Liu",
"C.",
""
],
[
"Liu",
"C. X.",
""
],
[
"Liu",
"F.",
""
],
[
"Liu",
"F. H.",
""
],
[
"Liu",
"Feng",
""
],
[
"Liu",
"G. M.",
""
],
[
"Liu",
"H.",
""
],
[
"Liu",
"H. B.",
""
],
[
"Liu",
"H. H.",
""
],
[
"Liu",
"H. M.",
""
],
[
"Liu",
"Huihui",
""
],
[
"Liu",
"J. B.",
""
],
[
"Liu",
"J. J.",
""
],
[
"Liu",
"K.",
""
],
[
"Liu",
"K.",
""
],
[
"Liu",
"K. Y.",
""
],
[
"Liu",
"Ke",
""
],
[
"Liu",
"L. C.",
""
],
[
"Liu",
"Lu",
""
],
[
"Liu",
"M. H.",
""
],
[
"Liu",
"P. L.",
""
],
[
"Liu",
"Q.",
""
],
[
"Liu",
"S. B.",
""
],
[
"Liu",
"T.",
""
],
[
"Liu",
"W. K.",
""
],
[
"Liu",
"W. M.",
""
],
[
"Liu",
"W. T.",
""
],
[
"Liu",
"X.",
""
],
[
"Liu",
"X.",
""
],
[
"Liu",
"X. K.",
""
],
[
"Liu",
"X. Y.",
""
],
[
"Liu",
"Y.",
""
],
[
"Liu",
"Y.",
""
],
[
"Liu",
"Y.",
""
],
[
"Liu",
"Y. B.",
""
],
[
"Liu",
"Z. A.",
""
],
[
"Liu",
"Z. D.",
""
],
[
"Liu",
"Z. Q.",
""
],
[
"Lou",
"X. C.",
""
],
[
"Lu",
"F. X.",
""
],
[
"Lu",
"H. J.",
""
],
[
"Lu",
"J. G.",
""
],
[
"Lu",
"X. L.",
""
],
[
"Lu",
"Y.",
""
],
[
"Lu",
"Y. H.",
""
],
[
"Lu",
"Y. P.",
""
],
[
"Lu",
"Z. H.",
""
],
[
"Luo",
"C. L.",
""
],
[
"Luo",
"J. R.",
""
],
[
"Luo",
"J. S.",
""
],
[
"Luo",
"M. X.",
""
],
[
"Luo",
"T.",
""
],
[
"Luo",
"X. L.",
""
],
[
"Lv",
"Z. Y.",
""
],
[
"Lyu",
"X. R.",
""
],
[
"Lyu",
"Y. F.",
""
],
[
"Lyu",
"Y. H.",
""
],
[
"Ma",
"F. C.",
""
],
[
"Ma",
"H. L.",
""
],
[
"Ma",
"J. L.",
""
],
[
"Ma",
"L. L.",
""
],
[
"Ma",
"L. R.",
""
],
[
"Ma",
"Q. M.",
""
],
[
"Ma",
"R. Q.",
""
],
[
"Ma",
"R. Y.",
""
],
[
"Ma",
"T.",
""
],
[
"Ma",
"X. T.",
""
],
[
"Ma",
"X. Y.",
""
],
[
"Ma",
"Y. M.",
""
],
[
"Maas",
"F. E.",
""
],
[
"MacKay",
"I.",
""
],
[
"Maggiora",
"M.",
""
],
[
"Malde",
"S.",
""
],
[
"Malik",
"Q. A.",
""
],
[
"Mao",
"H. X.",
""
],
[
"Mao",
"Y. J.",
""
],
[
"Mao",
"Z. P.",
""
],
[
"Marcello",
"S.",
""
],
[
"Marshall",
"A.",
""
],
[
"Melendi",
"F. M.",
""
],
[
"Meng",
"Y. H.",
""
],
[
"Meng",
"Z. X.",
""
],
[
"Mezzadri",
"G.",
""
],
[
"Miao",
"H.",
""
],
[
"Min",
"T. J.",
""
],
[
"Mitchell",
"R. E.",
""
],
[
"Mo",
"X. H.",
""
],
[
"Moses",
"B.",
""
],
[
"Muchnoi",
"N. Yu.",
""
],
[
"Muskalla",
"J.",
""
],
[
"Nefedov",
"Y.",
""
],
[
"Nerling",
"F.",
""
],
[
"Nie",
"L. S.",
""
],
[
"Nikolaev",
"I. B.",
""
],
[
"Ning",
"Z.",
""
],
[
"Nisar",
"S.",
""
],
[
"Niu",
"Q. L.",
""
],
[
"Niu",
"W. D.",
""
],
[
"Normand",
"C.",
""
],
[
"Olsen",
"S. L.",
""
],
[
"Ouyang",
"Q.",
""
],
[
"Pacetti",
"S.",
""
],
[
"Pan",
"X.",
""
],
[
"Pan",
"Y.",
""
],
[
"Pathak",
"A.",
""
],
[
"Pei",
"Y. P.",
""
],
[
"Pelizaeus",
"M.",
""
],
[
"Peng",
"H. P.",
""
],
[
"Peng",
"X. J.",
""
],
[
"Peng",
"Y. Y.",
""
],
[
"Peters",
"K.",
""
],
[
"Petridis",
"K.",
""
],
[
"Ping",
"J. L.",
""
],
[
"Ping",
"R. G.",
""
],
[
"Plura",
"S.",
""
],
[
"Prasad",
"V.",
""
],
[
"Qi",
"F. Z.",
""
],
[
"Qi",
"H. R.",
""
],
[
"Qi",
"M.",
""
],
[
"Qian",
"S.",
""
],
[
"Qian",
"W. B.",
""
],
[
"Qiao",
"C. F.",
""
],
[
"Qiao",
"J. H.",
""
],
[
"Qin",
"J. J.",
""
],
[
"Qin",
"J. L.",
""
],
[
"Qin",
"L. Q.",
""
],
[
"Qin",
"L. Y.",
""
],
[
"Qin",
"P. B.",
""
],
[
"Qin",
"X. P.",
""
],
[
"Qin",
"X. S.",
""
],
[
"Qin",
"Z. H.",
""
],
[
"Qiu",
"J. F.",
""
],
[
"Qu",
"Z. H.",
""
],
[
"Rademacker",
"J.",
""
],
[
"Redmer",
"C. F.",
""
],
[
"Rivetti",
"A.",
""
],
[
"Rolo",
"M.",
""
],
[
"Rong",
"G.",
""
],
[
"Rong",
"S. S.",
""
],
[
"Rosini",
"F.",
""
],
[
"Rosner",
"Ch.",
""
],
[
"Ruan",
"M. Q.",
""
],
[
"Salone",
"N.",
""
],
[
"Sarantsev",
"A.",
""
],
[
"Schelhaas",
"Y.",
""
],
[
"Schoenning",
"K.",
""
],
[
"Scodeggio",
"M.",
""
],
[
"Shan",
"K. Y.",
""
],
[
"Shan",
"W.",
""
],
[
"Shan",
"X. Y.",
""
],
[
"Shang",
"Z. J.",
""
],
[
"Shangguan",
"J. F.",
""
],
[
"Shao",
"L. G.",
""
],
[
"Shao",
"M.",
""
],
[
"Shen",
"C. P.",
""
],
[
"Shen",
"H. F.",
""
],
[
"Shen",
"W. H.",
""
],
[
"Shen",
"X. Y.",
""
],
[
"Shi",
"B. A.",
""
],
[
"Shi",
"H.",
""
],
[
"Shi",
"J. L.",
""
],
[
"Shi",
"J. Y.",
""
],
[
"Shi",
"S. Y.",
""
],
[
"Shi",
"X.",
""
],
[
"Song",
"H. L.",
""
],
[
"Song",
"J. J.",
""
],
[
"Song",
"T. Z.",
""
],
[
"Song",
"W. M.",
""
],
[
"Song",
"Y. J.",
""
],
[
"Song",
"Y. X.",
""
],
[
"Sosio",
"S.",
""
],
[
"Spataro",
"S.",
""
],
[
"Stieler",
"F.",
""
],
[
"Su",
"S. S",
""
],
[
"Su",
"Y. J.",
""
],
[
"Sun",
"G. B.",
""
],
[
"Sun",
"G. X.",
""
],
[
"Sun",
"H.",
""
],
[
"Sun",
"H. K.",
""
],
[
"Sun",
"J. F.",
""
],
[
"Sun",
"K.",
""
],
[
"Sun",
"L.",
""
],
[
"Sun",
"S. S.",
""
],
[
"Sun",
"T.",
""
],
[
"Sun",
"Y. C.",
""
],
[
"Sun",
"Y. H.",
""
],
[
"Sun",
"Y. J.",
""
],
[
"Sun",
"Y. Z.",
""
],
[
"Sun",
"Z. Q.",
""
],
[
"Sun",
"Z. T.",
""
],
[
"Tang",
"C. J.",
""
],
[
"Tang",
"G. Y.",
""
],
[
"Tang",
"J.",
""
],
[
"Tang",
"J. J.",
""
],
[
"Tang",
"L. F.",
""
],
[
"Tang",
"Y. A.",
""
],
[
"Tao",
"L. Y.",
""
],
[
"Tat",
"M.",
""
],
[
"Teng",
"J. X.",
""
],
[
"Tian",
"J. Y.",
""
],
[
"Tian",
"W. H.",
""
],
[
"Tian",
"Y.",
""
],
[
"Tian",
"Z. F.",
""
],
[
"Uman",
"I.",
""
],
[
"Wang",
"B.",
""
],
[
"Wang",
"B.",
""
],
[
"Wang",
"Bo",
""
],
[
"Wang",
"C.",
""
],
[
"Wang",
"C.",
""
],
[
"Wang",
"Cong",
""
],
[
"Wang",
"D. Y.",
""
],
[
"Wang",
"H. J.",
""
],
[
"Wang",
"J. J.",
""
],
[
"Wang",
"K.",
""
],
[
"Wang",
"L. L.",
""
],
[
"Wang",
"L. W.",
""
],
[
"Wang",
"M.",
""
],
[
"Wang",
"M.",
""
],
[
"Wang",
"N. Y.",
""
],
[
"Wang",
"S.",
""
],
[
"Wang",
"T.",
""
],
[
"Wang",
"T. J.",
""
],
[
"Wang",
"W.",
""
],
[
"Wang",
"W.",
""
],
[
"Wang",
"W. P.",
""
],
[
"Wang",
"X.",
""
],
[
"Wang",
"X. F.",
""
],
[
"Wang",
"X. J.",
""
],
[
"Wang",
"X. L.",
""
],
[
"Wang",
"X. N.",
""
],
[
"Wang",
"Y.",
""
],
[
"Wang",
"Y. D.",
""
],
[
"Wang",
"Y. F.",
""
],
[
"Wang",
"Y. H.",
""
],
[
"Wang",
"Y. J.",
""
],
[
"Wang",
"Y. L.",
""
],
[
"Wang",
"Y. N.",
""
],
[
"Wang",
"Y. Q.",
""
],
[
"Wang",
"Yaqian",
""
],
[
"Wang",
"Yi",
""
],
[
"Wang",
"Yuan",
""
],
[
"Wang",
"Z.",
""
],
[
"Wang",
"Z. L.",
""
],
[
"Wang",
"Z. L.",
""
],
[
"Wang",
"Z. Q.",
""
],
[
"Wang",
"Z. Y.",
""
],
[
"Wei",
"D. H.",
""
],
[
"Wei",
"H. R.",
""
],
[
"Weidner",
"F.",
""
],
[
"Wen",
"S. P.",
""
],
[
"Wen",
"Y. R.",
""
],
[
"Wiedner",
"U.",
""
],
[
"Wilkinson",
"G.",
""
],
[
"Wolke",
"M.",
""
],
[
"Wu",
"C.",
""
],
[
"Wu",
"J. F.",
""
],
[
"Wu",
"L. H.",
""
],
[
"Wu",
"L. J.",
""
],
[
"Wu",
"L. J.",
""
],
[
"Wu",
"Lianjie",
""
],
[
"Wu",
"S. G.",
""
],
[
"Wu",
"S. M.",
""
],
[
"Wu",
"X.",
""
],
[
"Wu",
"X. H.",
""
],
[
"Wu",
"Y. J.",
""
],
[
"Wu",
"Z.",
""
],
[
"Xia",
"L.",
""
],
[
"Xian",
"X. M.",
""
],
[
"Xiang",
"B. H.",
""
],
[
"Xiao",
"D.",
""
],
[
"Xiao",
"G. Y.",
""
],
[
"Xiao",
"H.",
""
],
[
"Xiao",
"Y. L.",
""
],
[
"Xiao",
"Z. J.",
""
],
[
"Xie",
"C.",
""
],
[
"Xie",
"K. J.",
""
],
[
"Xie",
"X. H.",
""
],
[
"Xie",
"Y.",
""
],
[
"Xie",
"Y. G.",
""
],
[
"Xie",
"Y. H.",
""
],
[
"Xie",
"Z. P.",
""
],
[
"Xing",
"T. Y.",
""
],
[
"Xu",
"C. F.",
""
],
[
"Xu",
"C. J.",
""
],
[
"Xu",
"G. F.",
""
],
[
"Xu",
"H. Y.",
""
],
[
"Xu",
"H. Y.",
""
],
[
"Xu",
"M.",
""
],
[
"Xu",
"Q. J.",
""
],
[
"Xu",
"Q. N.",
""
],
[
"Xu",
"T. D.",
""
],
[
"Xu",
"W.",
""
],
[
"Xu",
"W. L.",
""
],
[
"Xu",
"X. P.",
""
],
[
"Xu",
"Y.",
""
],
[
"Xu",
"Y.",
""
],
[
"Xu",
"Y. C.",
""
],
[
"Xu",
"Z. S.",
""
],
[
"Yan",
"F.",
""
],
[
"Yan",
"H. Y.",
""
],
[
"Yan",
"L.",
""
],
[
"Yan",
"W. B.",
""
],
[
"Yan",
"W. C.",
""
],
[
"Yan",
"W. H.",
""
],
[
"Yan",
"W. P.",
""
],
[
"Yan",
"X. Q.",
""
],
[
"Yang",
"H. J.",
""
],
[
"Yang",
"H. L.",
""
],
[
"Yang",
"H. X.",
""
],
[
"Yang",
"J. H.",
""
],
[
"Yang",
"R. J.",
""
],
[
"Yang",
"T.",
""
],
[
"Yang",
"Y.",
""
],
[
"Yang",
"Y. F.",
""
],
[
"Yang",
"Y. H.",
""
],
[
"Yang",
"Y. Q.",
""
],
[
"Yang",
"Y. X.",
""
],
[
"Yang",
"Y. Z.",
""
],
[
"Ye",
"M.",
""
],
[
"Ye",
"M. H.",
""
],
[
"Ye",
"Z. J.",
""
],
[
"Yin",
"Junhao",
""
],
[
"You",
"Z. Y.",
""
],
[
"Yu",
"B. X.",
""
],
[
"Yu",
"C. X.",
""
],
[
"Yu",
"G.",
""
],
[
"Yu",
"J. S.",
""
],
[
"Yu",
"L. Q.",
""
],
[
"Yu",
"M. C.",
""
],
[
"Yu",
"T.",
""
],
[
"Yu",
"X. D.",
""
],
[
"Yu",
"Y. C.",
""
],
[
"Yuan",
"C. Z.",
""
],
[
"Yuan",
"H.",
""
],
[
"Yuan",
"J.",
""
],
[
"Yuan",
"J.",
""
],
[
"Yuan",
"L.",
""
],
[
"Yuan",
"S. C.",
""
],
[
"Yuan",
"X. Q.",
""
],
[
"Yuan",
"Y.",
""
],
[
"Yuan",
"Z. Y.",
""
],
[
"Yue",
"C. X.",
""
],
[
"Yue",
"Ying",
""
],
[
"Zafar",
"A. A.",
""
],
[
"Zeng",
"S. H.",
""
],
[
"Zeng",
"X.",
""
],
[
"Zeng",
"Y.",
""
],
[
"Zeng",
"Y. J.",
""
],
[
"Zeng",
"Y. J.",
""
],
[
"Zhai",
"X. Y.",
""
],
[
"Zhan",
"Y. H.",
""
],
[
"Zhang",
"A. Q.",
""
],
[
"Zhang",
"B. L.",
""
],
[
"Zhang",
"B. X.",
""
],
[
"Zhang",
"D. H.",
""
],
[
"Zhang",
"G. Y.",
""
],
[
"Zhang",
"G. Y.",
""
],
[
"Zhang",
"H.",
""
],
[
"Zhang",
"H.",
""
],
[
"Zhang",
"H. C.",
""
],
[
"Zhang",
"H. H.",
""
],
[
"Zhang",
"H. Q.",
""
],
[
"Zhang",
"H. R.",
""
],
[
"Zhang",
"H. Y.",
""
],
[
"Zhang",
"J.",
""
],
[
"Zhang",
"J.",
""
],
[
"Zhang",
"J. J.",
""
],
[
"Zhang",
"J. L.",
""
],
[
"Zhang",
"J. Q.",
""
],
[
"Zhang",
"J. S.",
""
],
[
"Zhang",
"J. W.",
""
],
[
"Zhang",
"J. X.",
""
],
[
"Zhang",
"J. Y.",
""
],
[
"Zhang",
"J. Z.",
""
],
[
"Zhang",
"Jianyu",
""
],
[
"Zhang",
"L. M.",
""
],
[
"Zhang",
"Lei",
""
],
[
"Zhang",
"N.",
""
],
[
"Zhang",
"P.",
""
],
[
"Zhang",
"Q.",
""
],
[
"Zhang",
"Q. Y.",
""
],
[
"Zhang",
"R. Y.",
""
],
[
"Zhang",
"S. H.",
""
],
[
"Zhang",
"Shulei",
""
],
[
"Zhang",
"X. M.",
""
],
[
"Zhang",
"X. Y",
""
],
[
"Zhang",
"X. Y.",
""
],
[
"Zhang",
"Y.",
""
],
[
"Zhang",
"Y.",
""
],
[
"Zhang",
"Y. T.",
""
],
[
"Zhang",
"Y. H.",
""
],
[
"Zhang",
"Y. M.",
""
],
[
"Zhang",
"Y. P.",
""
],
[
"Zhang",
"Z. D.",
""
],
[
"Zhang",
"Z. H.",
""
],
[
"Zhang",
"Z. L.",
""
],
[
"Zhang",
"Z. L.",
""
],
[
"Zhang",
"Z. X.",
""
],
[
"Zhang",
"Z. Y.",
""
],
[
"Zhang",
"Z. Y.",
""
],
[
"Zhang",
"Z. Z.",
""
],
[
"Zhang",
"Zh. Zh.",
""
],
[
"Zhao",
"G.",
""
],
[
"Zhao",
"J. Y.",
""
],
[
"Zhao",
"J. Z.",
""
],
[
"Zhao",
"L.",
""
],
[
"Zhao",
"L.",
""
],
[
"Zhao",
"M. G.",
""
],
[
"Zhao",
"N.",
""
],
[
"Zhao",
"R. P.",
""
],
[
"Zhao",
"S. J.",
""
],
[
"Zhao",
"Y. B.",
""
],
[
"Zhao",
"Y. L.",
""
],
[
"Zhao",
"Y. X.",
""
],
[
"Zhao",
"Z. G.",
""
],
[
"Zhemchugov",
"A.",
""
],
[
"Zheng",
"B.",
""
],
[
"Zheng",
"B. M.",
""
],
[
"Zheng",
"J. P.",
""
],
[
"Zheng",
"W. J.",
""
],
[
"Zheng",
"X. R.",
""
],
[
"Zheng",
"Y. H.",
""
],
[
"Zhong",
"B.",
""
],
[
"Zhong",
"C.",
""
],
[
"Zhou",
"H.",
""
],
[
"Zhou",
"J. Q.",
""
],
[
"Zhou",
"J. Y.",
""
],
[
"Zhou",
"S.",
""
],
[
"Zhou",
"X.",
""
],
[
"Zhou",
"X. K.",
""
],
[
"Zhou",
"X. R.",
""
],
[
"Zhou",
"X. Y.",
""
],
[
"Zhou",
"Y. X.",
""
],
[
"Zhou",
"Y. Z.",
""
],
[
"Zhu",
"A. N.",
""
],
[
"Zhu",
"J.",
""
],
[
"Zhu",
"K.",
""
],
[
"Zhu",
"K. J.",
""
],
[
"Zhu",
"K. S.",
""
],
[
"Zhu",
"L.",
""
],
[
"Zhu",
"L. X.",
""
],
[
"Zhu",
"S. H.",
""
],
[
"Zhu",
"T. J.",
""
],
[
"Zhu",
"W. D.",
""
],
[
"Zhu",
"W. D.",
""
],
[
"Zhu",
"W. J.",
""
],
[
"Zhu",
"W. Z.",
""
],
[
"Zhu",
"Y. C.",
""
],
[
"Zhu",
"Z. A.",
""
],
[
"Zhuang",
"X. Y.",
""
],
[
"Zou",
"J. H.",
""
],
[
"Zu",
"J.",
""
]
] |
2504.13540 | Beizhen Zhao | Beizhen Zhao, Yifan Zhou, Zijian Wang, Hao Wang | EG-Gaussian: Epipolar Geometry and Graph Network Enhanced 3D Gaussian
Splatting | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we explore an open research problem concerning the
reconstruction of 3D scenes from images. Recent methods have adopt 3D Gaussian
Splatting (3DGS) to produce 3D scenes due to its efficient training process.
However, these methodologies may generate incomplete 3D scenes or blurred
multiviews. This is because of (1) inaccurate 3DGS point initialization and (2)
the tendency of 3DGS to flatten 3D Gaussians with the sparse-view input. To
address these issues, we propose a novel framework EG-Gaussian, which utilizes
epipolar geometry and graph networks for 3D scene reconstruction. Initially, we
integrate epipolar geometry into the 3DGS initialization phase to enhance
initial 3DGS point construction. Then, we specifically design a graph learning
module to refine 3DGS spatial features, in which we incorporate both spatial
coordinates and angular relationships among neighboring points. Experiments on
indoor and outdoor benchmark datasets demonstrate that our approach
significantly improves reconstruction accuracy compared to 3DGS-based methods.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 08:10:39 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Zhao",
"Beizhen",
""
],
[
"Zhou",
"Yifan",
""
],
[
"Wang",
"Zijian",
""
],
[
"Wang",
"Hao",
""
]
] |
2504.13541 | Rachmad Vidya Wicaksana Putra | Avaneesh Devkota, Rachmad Vidya Wicaksana Putra, Muhammad Shafique | SwitchMT: An Adaptive Context Switching Methodology for Scalable
Multi-Task Learning in Intelligent Autonomous Agents | 7 pages, 7 figures, 3 tables | null | null | null | cs.NE cs.AI cs.LG cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The ability to train intelligent autonomous agents (such as mobile robots) on
multiple tasks is crucial for adapting to dynamic real-world environments.
However, state-of-the-art reinforcement learning (RL) methods only excel in
single-task settings, and still struggle to generalize across multiple tasks
due to task interference. Moreover, real-world environments also demand the
agents to have data stream processing capabilities. Toward this, a
state-of-the-art work employs Spiking Neural Networks (SNNs) to improve
multi-task learning by exploiting temporal information in data stream, while
enabling lowpower/energy event-based operations. However, it relies on fixed
context/task-switching intervals during its training, hence limiting the
scalability and effectiveness of multi-task learning. To address these
limitations, we propose SwitchMT, a novel adaptive task-switching methodology
for RL-based multi-task learning in autonomous agents. Specifically, SwitchMT
employs the following key ideas: (1) a Deep Spiking Q-Network with active
dendrites and dueling structure, that utilizes task-specific context signals to
create specialized sub-networks; and (2) an adaptive task-switching policy that
leverages both rewards and internal dynamics of the network parameters.
Experimental results demonstrate that SwitchMT achieves superior performance in
multi-task learning compared to state-of-the-art methods. It achieves
competitive scores in multiple Atari games (i.e., Pong: -8.8, Breakout: 5.6,
and Enduro: 355.2) compared to the state-of-the-art, showing its better
generalized learning capability. These results highlight the effectiveness of
our SwitchMT methodology in addressing task interference while enabling
multi-task learning automation through adaptive task switching, thereby paving
the way for more efficient generalist agents with scalable multi-task learning
capabilities.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 08:12:59 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Devkota",
"Avaneesh",
""
],
[
"Putra",
"Rachmad Vidya Wicaksana",
""
],
[
"Shafique",
"Muhammad",
""
]
] |
2504.13542 | Alin Bostan | Alin Bostan, Lucia Di Vizio and Kilian Raschel | Singular walks in the quarter plane and Bernoulli numbers | 31 pages, 4 figures | null | null | null | math.CO math.CA | http://creativecommons.org/licenses/by/4.0/ | We consider singular (aka genus $0$) walks in the quarter plane and their
associated generating functions $Q(x,y,t)$, which enumerate the walks starting
from the origin, of fixed endpoint (encoded by the spatial variables $x$ and
$y$) and of fixed length (encoded by the time variable $t$). We first prove
that the previous series can be extended up to a universal value of $t$ (in the
sense that this holds for all singular models), namely $t=\frac{1}{2}$, and we
provide a probabilistic interpretation of $Q(x,y,\frac{1}{2})$. As a second
step, we refine earlier results in the literature and show that $Q(x,y,t)$ is
indeed differentially transcendental for any $t\in(0,\frac{1}{2}]$. Moreover,
we prove that $Q(x,y,\frac{1}{2})$ is strongly differentially transcendental.
As a last step, we show that for certain models the series expansion of
$Q(x,y,\frac{1}{2})$ is directly related to Bernoulli numbers. This provides a
second proof of its strong differential transcendence.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 08:13:07 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Bostan",
"Alin",
""
],
[
"Di Vizio",
"Lucia",
""
],
[
"Raschel",
"Kilian",
""
]
] |
2504.13543 | Armin Iske | Armin Iske and Lennart Ohlsen | Irregular Sampling of High-Dimensional Functions in Reproducing Kernel
Hilbert Spaces | null | null | null | null | cs.LG cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We develop sampling formulas for high-dimensional functions in reproducing
kernel Hilbert spaces, where we rely on irregular samples that are taken at
determining sequences of data points. We place particular emphasis on sampling
formulas for tensor product kernels, where we show that determining irregular
samples in lower dimensions can be composed to obtain a tensor of determining
irregular samples in higher dimensions. This in turn reduces the computational
complexity of sampling formulas for high-dimensional functions quite
significantly.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 08:18:15 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Iske",
"Armin",
""
],
[
"Ohlsen",
"Lennart",
""
]
] |
2504.13544 | Paul Lafourcade Dr | Eliott T. Dubois and Paul Lafourcade and Jean-Bernard Maillet | Extracting flow stress surfaces of pristine materials using deformation
paths in MD simulations | null | null | null | null | cond-mat.mtrl-sci cond-mat.mes-hall | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Accurate simulation of deformation processes at the atomic scale is critical
for predicting the mechanical response of materials and particularly the
calculation of directional flow stresses. This work presents a method for
applying arbitrary deformation paths in LAMMPS while adhering to its convention
that supercell periodic vectors a, b are aligned such that a coincides with the
x-axis and b lies in the (x,y) plane. This method is particularly relevant for
materials with low crystal symmetry and also for exploring non uniaxial
deformations. The first step of the method consists in generating the
simulation frame tensor's time evolution upon any deformation, which may
initially violate LAMMPS alignment constraints. This constraint is then
overcome by the application of a rigid body rotation to realign the tensor with
LAMMPS's convention, ensuring valid periodic boundary conditions. The resulting
lengths and tilt factors from the rotated tensor are expressed analytically
using third-order polynomials and applied to the simulation cell using the fix
deform command. The present approach versatility is validated with the
calculation of directional flow stresses for various materials upon constant
volume shear, tension and compression, demonstrating its effectiveness in
simulations involving complex deformation scenarios and diverse crystal
structures. The flow stress surface extracted from these simulations are
finally analyzed as the fingerprint of all deformation mechanisms occurring in
the material.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 08:20:05 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Dubois",
"Eliott T.",
""
],
[
"Lafourcade",
"Paul",
""
],
[
"Maillet",
"Jean-Bernard",
""
]
] |
2504.13545 | Azmarah Rizvi | Azmarah Rizvi, Navojith Thamindu, A.M.N.H. Adhikari, W.P.U.
Senevirathna, Dharshana Kasthurirathna, Lakmini Abeywardhana | Enhancing Multilingual Sentiment Analysis with Explainability for
Sinhala, English, and Code-Mixed Content | 6 pages, 6 figures, 4 tables | null | null | null | cs.CL cs.AI cs.LG | http://creativecommons.org/licenses/by/4.0/ | Sentiment analysis is crucial for brand reputation management in the banking
sector, where customer feedback spans English, Sinhala, Singlish, and
code-mixed text. Existing models struggle with low-resource languages like
Sinhala and lack interpretability for practical use. This research develops a
hybrid aspect-based sentiment analysis framework that enhances multilingual
capabilities with explainable outputs. Using cleaned banking customer reviews,
we fine-tune XLM-RoBERTa for Sinhala and code-mixed text, integrate
domain-specific lexicon correction, and employ BERT-base-uncased for English.
The system classifies sentiment (positive, neutral, negative) with confidence
scores, while SHAP and LIME improve interpretability by providing real-time
sentiment explanations. Experimental results show that our approaches
outperform traditional transformer-based classifiers, achieving 92.3 percent
accuracy and an F1-score of 0.89 in English and 88.4 percent in Sinhala and
code-mixed content. An explainability analysis reveals key sentiment drivers,
improving trust and transparency. A user-friendly interface delivers
aspect-wise sentiment insights, ensuring accessibility for businesses. This
research contributes to robust, transparent sentiment analysis for financial
applications by bridging gaps in multilingual, low-resource NLP and
explainability.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 08:21:12 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Rizvi",
"Azmarah",
""
],
[
"Thamindu",
"Navojith",
""
],
[
"Adhikari",
"A. M. N. H.",
""
],
[
"Senevirathna",
"W. P. U.",
""
],
[
"Kasthurirathna",
"Dharshana",
""
],
[
"Abeywardhana",
"Lakmini",
""
]
] |
2504.13546 | Taha Sochi | Taha Sochi | Energy Minimization in Fluid Flow through Tubes and Networks of Various
Geometries | 21 pages. arXiv admin note: substantial text overlap with
arXiv:1412.8014 | null | null | null | physics.flu-dyn | http://creativecommons.org/licenses/by/4.0/ | In this paper we continue our previous investigation about energy
minimization in the flow of fluids through tubes and networks of interconnected
tubes of various geometries. We will show that the principle of energy
minimization holds independent of the geometry of the tubes and networks of
such interconnected tubes and independent of the type of fluid in such
geometries where in this regard we consider generalized Newtonian fluids. We
consider in this investigation the flow of Newtonian fluids through tubes and
networks of interconnected tubes of elliptical, rectangular, equilateral
triangular and concentric circular annular cross sectional geometries. We also
consider a combination of geometric factor with a fluid type factor by showing
that the principle of energy minimization holds in the flow of some
non-Newtonian fluids (namely power law, Ellis and Ree-Eyring fluids) through
tubes and networks of interconnected tubes of elliptical cross sections. The
relevance of this study extends beyond tubes and networks of fluid flow to
include for instance porous media and electrical networks.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 08:22:04 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Sochi",
"Taha",
""
]
] |
2504.13547 | Bolin Zhou | Bolin Zhou, Jingzheng Wu, Xiang Ling, Tianyue Luo, Jingkun Zhang | Version-level Third-Party Library Detection in Android Applications via
Class Structural Similarity | 12 pages | null | null | null | cs.CR cs.SE | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Android applications (apps) integrate reusable and well-tested third-party
libraries (TPLs) to enhance functionality and shorten development cycles.
However, recent research reveals that TPLs have become the largest attack
surface for Android apps, where the use of insecure TPLs can compromise both
developer and user interests. To mitigate such threats, researchers have
proposed various tools to detect TPLs used by apps, supporting further security
analyses such as vulnerable TPLs identification. Although existing tools
achieve notable library-level TPL detection performance in the presence of
obfuscation, they struggle with version-level TPL detection due to a lack of
sensitivity to differences between versions. This limitation results in a high
version-level false positive rate, significantly increasing the manual workload
for security analysts. To resolve this issue, we propose SAD, a TPL detection
tool with high version-level detection performance. SAD generates a candidate
app class list for each TPL class based on the feature of nodes in class
dependency graphs (CDGs). It then identifies the unique corresponding app class
for each TPL class by performing class matching based on the similarity of
their class summaries. Finally, SAD identifies TPL versions by evaluating the
structural similarity of the sub-graph formed by matched classes within the
CDGs of the TPL and the app. Extensive evaluation on three datasets
demonstrates the effectiveness of SAD and its components. SAD achieves F1
scores of 97.64% and 84.82% for library-level and version-level detection on
obfuscated apps, respectively, surpassing existing state-of-the-art tools. The
version-level false positives reported by the best tool is 1.61 times that of
SAD. We further evaluate the degree to which TPLs identified by detection tools
correspond to actual TPL classes.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 08:24:32 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Zhou",
"Bolin",
""
],
[
"Wu",
"Jingzheng",
""
],
[
"Ling",
"Xiang",
""
],
[
"Luo",
"Tianyue",
""
],
[
"Zhang",
"Jingkun",
""
]
] |
2504.13548 | Haoyang Luo | Haoyang Luo, Linwei Tao, Minjing Dong, Chang Xu | Beyond One-Hot Labels: Semantic Mixing for Model Calibration | null | null | null | null | cs.CV cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Model calibration seeks to ensure that models produce confidence scores that
accurately reflect the true likelihood of their predictions being correct.
However, existing calibration approaches are fundamentally tied to datasets of
one-hot labels implicitly assuming full certainty in all the annotations. Such
datasets are effective for classification but provides insufficient knowledge
of uncertainty for model calibration, necessitating the curation of datasets
with numerically rich ground-truth confidence values. However, due to the
scarcity of uncertain visual examples, such samples are not easily available as
real datasets. In this paper, we introduce calibration-aware data augmentation
to create synthetic datasets of diverse samples and their ground-truth
uncertainty. Specifically, we present Calibration-aware Semantic Mixing (CSM),
a novel framework that generates training samples with mixed class
characteristics and annotates them with distinct confidence scores via
diffusion models. Based on this framework, we propose calibrated reannotation
to tackle the misalignment between the annotated confidence score and the
mixing ratio during the diffusion reverse process. Besides, we explore the loss
functions that better fit the new data representation paradigm. Experimental
results demonstrate that CSM achieves superior calibration compared to the
state-of-the-art calibration approaches. Code is available at
github.com/E-Galois/CSM.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 08:26:18 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Luo",
"Haoyang",
""
],
[
"Tao",
"Linwei",
""
],
[
"Dong",
"Minjing",
""
],
[
"Xu",
"Chang",
""
]
] |
2504.13549 | Niccol\`o Fonio Mr | Niccol\`o Fonio, Ljubomir Budinski, Valtteri Lahtinen, Pierre Sagaut | Adaptive Lattice Gas Algorithm: Classical and Quantum implementations | null | null | null | null | quant-ph | http://creativecommons.org/licenses/by/4.0/ | Lattice gas algorithms (LGA) are a class of algorithms including, in
chronological order, binary lattice gas cellular automata (LGCA), integer
lattice gas algorithms (ILGA) and lattice Boltzmann method (LBM). They are
largely used for simulating non-linear systems. Starting from 1-dimensional
ILGA, we design an algorithm where we carry out a fraction of the possible
collisions. These fractions are then adapted to reproduce LBM equilibrium
distributions, resulting in an adaptive lattice gas algorithm (ALGA) that
achieves the same simulation results of LBM. Considering this, we develop a
quantum algorithm that involves a linear collision operator and capable of
simulating the same phenomena, while still using a measurement and
reinitialization procedure.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 08:29:47 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Fonio",
"Niccolò",
""
],
[
"Budinski",
"Ljubomir",
""
],
[
"Lahtinen",
"Valtteri",
""
],
[
"Sagaut",
"Pierre",
""
]
] |
2504.13550 | A V Anil Kumar | Radha Madhab Chandra, Alan Biju John and A. V. Anil Kumar | Emergence of rotating clusters in active Brownian particles with visual
perception | 9 pages, 9 figures | null | null | null | cond-mat.soft cond-mat.stat-mech | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We examine the group formation and subsequent dynamics of active particles
which are equipped with a visual perception using Langevin dynamics
simulations. These particles possess an orientational response to the position
of the nearest neighbours which are within a vision cone of these particles. We
observe the emergence of rotating clusters when the visual perception of the
particles are in the intermediate range. We have found that the persistent
motion of these active particles are intimately correlated with the emerging
structures by analysing the persistence probability as well as the
orientational correlation function. For rotating clusters, the persistent
probability is found to be very quickly decaying and orientational correlation
function shows oscillatory behaviour.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 08:35:17 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Chandra",
"Radha Madhab",
""
],
[
"John",
"Alan Biju",
""
],
[
"Kumar",
"A. V. Anil",
""
]
] |
2504.13551 | CheolWon Na | CheolWon Na, YunSeok Choi, Jee-Hyong Lee | Q-FAKER: Query-free Hard Black-box Attack via Controlled Generation | NAACL 2025 Findings | null | null | null | cs.CR cs.AI cs.CL | http://creativecommons.org/licenses/by-sa/4.0/ | Many adversarial attack approaches are proposed to verify the vulnerability
of language models. However, they require numerous queries and the information
on the target model. Even black-box attack methods also require the target
model's output information. They are not applicable in real-world scenarios, as
in hard black-box settings where the target model is closed and inaccessible.
Even the recently proposed hard black-box attacks still require many queries
and demand extremely high costs for training adversarial generators. To address
these challenges, we propose Q-faker (Query-free Hard Black-box Attacker), a
novel and efficient method that generates adversarial examples without
accessing the target model. To avoid accessing the target model, we use a
surrogate model instead. The surrogate model generates adversarial sentences
for a target-agnostic attack. During this process, we leverage controlled
generation techniques. We evaluate our proposed method on eight datasets.
Experimental results demonstrate our method's effectiveness including high
transferability and the high quality of the generated adversarial examples, and
prove its practical in hard black-box settings.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 08:36:38 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Na",
"CheolWon",
""
],
[
"Choi",
"YunSeok",
""
],
[
"Lee",
"Jee-Hyong",
""
]
] |
2504.13552 | Qianqian Liu | Qianqian Liu, Wenbin Chen, Jie Shen, Qing Cheng | Adaptive time-stepping and maximum-principle preserving Lagrangian
schemes for gradient flows | null | null | null | null | math.NA cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We develop in this paper an adaptive time-stepping approach for gradient
flows with distinct treatments for conservative and non-conservative dynamics.
For the non-conservative gradient flows in Lagrangian coordinates, we propose a
modified formulation augmented by auxiliary terms to guarantee positivity of
the determinant, and prove that the corresponding adaptive second-order
Backward Difference Formulas (BDF2) scheme preserves energy stability and the
maximum principle under the time-step ratio constraint $0<r_n\le
r_{\max}\le\frac{3}{2}$. On the other hand, for the conservative Wasserstein
gradient flows in Lagrangian coordinates, we propose an adaptive BDF2 scheme
which is shown to be energy dissipative, and positivity preserving under the
time-step ratio constraint $0<r_n\le r_{\max}\le\frac{3+\sqrt{17}}{2}$ in 1D
and $0<r_n\le r_{\max}\le \frac{5}{4}$ in 2D, respectively. We also present
ample numerical simulations in 1D and 2D to validate the efficiency and
accuracy of the proposed schemes.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 08:38:07 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Liu",
"Qianqian",
""
],
[
"Chen",
"Wenbin",
""
],
[
"Shen",
"Jie",
""
],
[
"Cheng",
"Qing",
""
]
] |
2504.13553 | Yihao Ouyang | Yihao Ouyang, Xunheng Kuang, Mengjia Xiong, Zhida Wang, Yuanquan Wang | A Novel Hybrid Approach for Retinal Vessel Segmentation with Dynamic
Long-Range Dependency and Multi-Scale Retinal Edge Fusion Enhancement | null | null | null | null | eess.IV cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Accurate retinal vessel segmentation provides essential structural
information for ophthalmic image analysis. However, existing methods struggle
with challenges such as multi-scale vessel variability, complex curvatures, and
ambiguous boundaries. While Convolutional Neural Networks (CNNs),
Transformer-based models and Mamba-based architectures have advanced the field,
they often suffer from vascular discontinuities or edge feature ambiguity. To
address these limitations, we propose a novel hybrid framework that
synergistically integrates CNNs and Mamba for high-precision retinal vessel
segmentation. Our approach introduces three key innovations: 1) The proposed
High-Resolution Edge Fuse Network is a high-resolution preserving hybrid
segmentation framework that combines a multi-scale backbone with the
Multi-scale Retina Edge Fusion (MREF) module to enhance edge features, ensuring
accurate and robust vessel segmentation. 2) The Dynamic Snake Visual State
Space block combines Dynamic Snake Convolution with Mamba to adaptively capture
vessel curvature details and long-range dependencies. An improved
eight-directional 2D Snake-Selective Scan mechanism and a dynamic weighting
strategy enhance the perception of complex vascular topologies. 3) The MREF
module enhances boundary precision through multi-scale edge feature
aggregation, suppressing noise while emphasizing critical vessel structures
across scales. Experiments on three public datasets demonstrate that our method
achieves state-of-the-art performance, particularly in maintaining vascular
continuity and effectively segmenting vessels in low-contrast regions. This
work provides a robust method for clinical applications requiring accurate
retinal vessel analysis. The code is available at
https://github.com/frank-oy/HREFNet.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 08:41:35 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Ouyang",
"Yihao",
""
],
[
"Kuang",
"Xunheng",
""
],
[
"Xiong",
"Mengjia",
""
],
[
"Wang",
"Zhida",
""
],
[
"Wang",
"Yuanquan",
""
]
] |
2504.13554 | Xin Tang | Xin Tang, Qian Chen, Wenjie Weng, Chao Jin, Zhang Liu, Jiacheng Wang,
Geng Sun, Xiaohuan Li, Dusit Niyato | Task Assignment and Exploration Optimization for Low Altitude UAV Rescue
via Generative AI Enhanced Multi-agent Reinforcement Learning | null | null | null | null | cs.AI cs.LG cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Artificial Intelligence (AI)-driven convolutional neural networks enhance
rescue, inspection, and surveillance tasks performed by low-altitude uncrewed
aerial vehicles (UAVs) and ground computing nodes (GCNs) in unknown
environments. However, their high computational demands often exceed a single
UAV's capacity, leading to system instability, further exacerbated by the
limited and dynamic resources of GCNs. To address these challenges, this paper
proposes a novel cooperation framework involving UAVs, ground-embedded robots
(GERs), and high-altitude platforms (HAPs), which enable resource pooling
through UAV-to-GER (U2G) and UAV-to-HAP (U2H) communications to provide
computing services for UAV offloaded tasks. Specifically, we formulate the
multi-objective optimization problem of task assignment and exploration
optimization in UAVs as a dynamic long-term optimization problem. Our objective
is to minimize task completion time and energy consumption while ensuring
system stability over time. To achieve this, we first employ the Lyapunov
optimization technique to transform the original problem, with stability
constraints, into a per-slot deterministic problem. We then propose an
algorithm named HG-MADDPG, which combines the Hungarian algorithm with a
generative diffusion model (GDM)-based multi-agent deep deterministic policy
gradient (MADDPG) approach. We first introduce the Hungarian algorithm as a
method for exploration area selection, enhancing UAV efficiency in interacting
with the environment. We then innovatively integrate the GDM and multi-agent
deep deterministic policy gradient (MADDPG) to optimize task assignment
decisions, such as task offloading and resource allocation. Simulation results
demonstrate the effectiveness of the proposed approach, with significant
improvements in task offloading efficiency, latency reduction, and system
stability compared to baseline methods.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 08:44:06 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Tang",
"Xin",
""
],
[
"Chen",
"Qian",
""
],
[
"Weng",
"Wenjie",
""
],
[
"Jin",
"Chao",
""
],
[
"Liu",
"Zhang",
""
],
[
"Wang",
"Jiacheng",
""
],
[
"Sun",
"Geng",
""
],
[
"Li",
"Xiaohuan",
""
],
[
"Niyato",
"Dusit",
""
]
] |
2504.13555 | Wenan Guo | Zehui Deng, Lu Liu, Wenan Guo, and Hai-Qing Lin | Coplanar order induced by emergent frustration | 7 pages, 3 figures | null | null | null | cond-mat.str-el cond-mat.stat-mech | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Traditional frustration arises from the conflict between the spin alignments
due to the geometry or the nature of the interactions. Here, we demonstrate a
novel form of frustration, dubbed ``emergent frustration'', which is induced by
the symmetry that emerges at the phase transition point of a quantum spin model
devoid of geometric frustration. We study the two-dimensional bipartite
chequerboard $J$-$Q$ model, which hosts the antiferromagnetic (AFM) state to
the plaquette-singlet solid state (PSS) phase transition detected in the
Shastry-Sutherland compound SrCu$_2({\rm BO}_3)_2$. By analyzing the scaling
behavior of the R\'enyi entanglement entropy with smooth boundaries at the
transition point, we observe an unexpected scaling behavior, which indicates
that the number of Goldstone modes is five. We explain this by proposing a
novel scenario in which the system is described by an effective quantum rotor
Hamiltonian with a three-sublattice geometry that frustrates collinear order
while supporting coplanar order. Such a three-sublattice geometry arises from
the emergent symmetry of coexisting orders, which may also occur at the AFM-PSS
transition point of SrCu$_2({\rm BO}_3)_2$. Therefore, experimental
investigations are warranted.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 08:48:49 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Deng",
"Zehui",
""
],
[
"Liu",
"Lu",
""
],
[
"Guo",
"Wenan",
""
],
[
"Lin",
"Hai-Qing",
""
]
] |
2504.13556 | Carles Rovira | Carles Rovira | On a stochastic epidemic SIR model with non homogenous population: a toy
model for HIV | null | null | null | null | q-bio.PE math.PR physics.soc-ph | http://creativecommons.org/licenses/by/4.0/ | In this paper we generalise a simple discrete time stochastic SIR type model
defined by Tuckwell and Williams. The SIR model by Tuckwell and Williams
assumes a homogeneous population, a fixed infectious period, and a strict
transition from susceptible to infected to recovered. In contrast, our model
introduces two groups, $A$ and $B$, where group $B$ has a higher risk of
infection due to increased contact rates. Additionally, the duration in the
infected class follows a probability distribution rather than being fixed.
Finally, individuals in group $B$ can transition directly to the recovered
class R, allowing us to analyze the impact of this preventive measure on
disease spread. Finally, we apply this model to the spread of HIV, analyzing
how risk behaviors, rapid testing, and PrEP-like therapies influence the
epidemic dynamics.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 08:49:41 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Rovira",
"Carles",
""
]
] |
2504.13557 | Ilhan Aytutuldu | I. Aytutuldu (1), O. Yol (2), Y. S. Akgul (1) ((1) Gebze Technical
University, (2) SSTTEK Academy) | Integrating LLMs for Grading and Appeal Resolution in Computer Science
Education | 13 pages, 5 figures | null | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This study explores the integration of Large Language Models (LLMs) into the
grading and appeal resolution process in computer science education. We
introduce AI-PAT, an AI-powered assessment tool that leverages LLMs to evaluate
computer science exams, generate feedback, and address student appeals. AI-PAT
was used to assess over 850 exam submissions and handle 185 appeal cases. Our
multi-model comparison (ChatGPT, Gemini) reveals strong correlations between
model outputs, though significant variability persists depending on
configuration and prompt design. Human graders, while internally consistent,
showed notable inter-rater disagreement, further highlighting subjectivity in
manual evaluation. The appeal process led to grade changes in 74% of cases,
indicating the need for continued refinement of AI evaluation strategies. While
students appreciated the speed and detail of AI feedback, survey responses
revealed trust and fairness concerns. We conclude that AI-PAT offers scalable
benefits for formative assessment and feedback, but must be accompanied by
transparent grading rubrics, human oversight, and appeal mechanisms to ensure
equitable outcomes.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 08:49:45 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Aytutuldu",
"I.",
""
],
[
"Yol",
"O.",
""
],
[
"Akgul",
"Y. S.",
""
]
] |
2504.13558 | Yanming Lai | Yuling Jiao, Yanming Lai, Yang Wang, Bokai Yan | Transformers Can Overcome the Curse of Dimensionality: A Theoretical
Study from an Approximation Perspective | null | null | null | null | cs.LG cs.AI | http://creativecommons.org/licenses/by-nc-nd/4.0/ | The Transformer model is widely used in various application areas of machine
learning, such as natural language processing. This paper investigates the
approximation of the H\"older continuous function class
$\mathcal{H}_{Q}^{\beta}\left([0,1]^{d\times n},\mathbb{R}^{d\times n}\right)$
by Transformers and constructs several Transformers that can overcome the curse
of dimensionality. These Transformers consist of one self-attention layer with
one head and the softmax function as the activation function, along with
several feedforward layers. For example, to achieve an approximation accuracy
of $\epsilon$, if the activation functions of the feedforward layers in the
Transformer are ReLU and floor, only
$\mathcal{O}\left(\log\frac{1}{\epsilon}\right)$ layers of feedforward layers
are needed, with widths of these layers not exceeding
$\mathcal{O}\left(\frac{1}{\epsilon^{2/\beta}}\log\frac{1}{\epsilon}\right)$.
If other activation functions are allowed in the feedforward layers, the width
of the feedforward layers can be further reduced to a constant. These results
demonstrate that Transformers have a strong expressive capability. The
construction in this paper is based on the Kolmogorov-Arnold Representation
Theorem and does not require the concept of contextual mapping, hence our proof
is more intuitively clear compared to previous Transformer approximation works.
Additionally, the translation technique proposed in this paper helps to apply
the previous approximation results of feedforward neural networks to
Transformer research.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 08:56:53 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Jiao",
"Yuling",
""
],
[
"Lai",
"Yanming",
""
],
[
"Wang",
"Yang",
""
],
[
"Yan",
"Bokai",
""
]
] |
2504.13559 | Alexandros Matsoukas | Wojciech G\'orny, Micha{\l} {\L}asica, Alexandros Matsoukas | Euler-Lagrange equations for variable-growth total variation | 23 pages | null | null | null | math.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a class of integral functionals with Musielak-Orlicz type
variable growth, possibly linear in some regions of the domain. This includes
$p(x)$ power-type integrands with $p(x)\ge 1$ as well as double-phase $p\!-\!q$
integrands with $p=1$. The main goal of this paper is to identify the
$L^2$-subdifferential of the functional, including a local characterisation in
terms of a variant of the Anzellotti product defined through the Young's
inequality. As an application, we obtain the Euler-Lagrange equation for the
variant of the Rudin-Osher-Fatemi image denoising problem with variable growth
regularising term.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 08:57:57 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Górny",
"Wojciech",
""
],
[
"Łasica",
"Michał",
""
],
[
"Matsoukas",
"Alexandros",
""
]
] |
2504.13560 | Hyewon Lee | SoYoung Park, Hyewon Lee, Mingyu Choi, Seunghoon Han, Jong-Ryul Lee,
Sungsu Lim, Tae-Ho Kim | Zero-Shot Industrial Anomaly Segmentation with Image-Aware Prompt
Generation | Accepted to PAKDD 2025, 12 pages | null | null | null | cs.CV cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Anomaly segmentation is essential for industrial quality, maintenance, and
stability. Existing text-guided zero-shot anomaly segmentation models are
effective but rely on fixed prompts, limiting adaptability in diverse
industrial scenarios. This highlights the need for flexible, context-aware
prompting strategies. We propose Image-Aware Prompt Anomaly Segmentation
(IAP-AS), which enhances anomaly segmentation by generating dynamic,
context-aware prompts using an image tagging model and a large language model
(LLM). IAP-AS extracts object attributes from images to generate context-aware
prompts, improving adaptability and generalization in dynamic and unstructured
industrial environments. In our experiments, IAP-AS improves the F1-max metric
by up to 10%, demonstrating superior adaptability and generalization. It
provides a scalable solution for anomaly segmentation across industries
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 08:58:40 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Park",
"SoYoung",
""
],
[
"Lee",
"Hyewon",
""
],
[
"Choi",
"Mingyu",
""
],
[
"Han",
"Seunghoon",
""
],
[
"Lee",
"Jong-Ryul",
""
],
[
"Lim",
"Sungsu",
""
],
[
"Kim",
"Tae-Ho",
""
]
] |
2504.13561 | Yang Wu | Yang Wu, Yun Zhu, Kaihua Zhang, Jianjun Qian, Jin Xie, Jian Yang | WeatherGen: A Unified Diverse Weather Generator for LiDAR Point Clouds
via Spider Mamba Diffusion | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | 3D scene perception demands a large amount of adverse-weather LiDAR data, yet
the cost of LiDAR data collection presents a significant scaling-up challenge.
To this end, a series of LiDAR simulators have been proposed. Yet, they can
only simulate a single adverse weather with a single physical model, and the
fidelity of the generated data is quite limited. This paper presents
WeatherGen, the first unified diverse-weather LiDAR data diffusion generation
framework, significantly improving fidelity. Specifically, we first design a
map-based data producer, which can provide a vast amount of high-quality
diverse-weather data for training purposes. Then, we utilize the
diffusion-denoising paradigm to construct a diffusion model. Among them, we
propose a spider mamba generator to restore the disturbed diverse weather data
gradually. The spider mamba models the feature interactions by scanning the
LiDAR beam circle or central ray, excellently maintaining the physical
structure of the LiDAR data. Subsequently, following the generator to transfer
real-world knowledge, we design a latent feature aligner. Afterward, we devise
a contrastive learning-based controller, which equips weather control signals
with compact semantic knowledge through language supervision, guiding the
diffusion model to generate more discriminative data. Extensive evaluations
demonstrate the high generation quality of WeatherGen. Through WeatherGen, we
construct the mini-weather dataset, promoting the performance of the downstream
task under adverse weather conditions. Code is available:
https://github.com/wuyang98/weathergen
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 09:01:07 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Wu",
"Yang",
""
],
[
"Zhu",
"Yun",
""
],
[
"Zhang",
"Kaihua",
""
],
[
"Qian",
"Jianjun",
""
],
[
"Xie",
"Jin",
""
],
[
"Yang",
"Jian",
""
]
] |
2504.13562 | Yu Li | Yu Li and Han Jiang and Zhihua Wei | DETAM: Defending LLMs Against Jailbreak Attacks via Targeted Attention
Modification | null | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the widespread adoption of Large Language Models (LLMs), jailbreak
attacks have become an increasingly pressing safety concern. While
safety-aligned LLMs can effectively defend against normal harmful queries, they
remain vulnerable to such attacks. Existing defense methods primarily rely on
fine-tuning or input modification, which often suffer from limited
generalization and reduced utility. To address this, we introduce DETAM, a
finetuning-free defense approach that improves the defensive capabilities
against jailbreak attacks of LLMs via targeted attention modification.
Specifically, we analyze the differences in attention scores between successful
and unsuccessful defenses to identify the attention heads sensitive to
jailbreak attacks. During inference, we reallocate attention to emphasize the
user's core intention, minimizing interference from attack tokens. Our
experimental results demonstrate that DETAM outperforms various baselines in
jailbreak defense and exhibits robust generalization across different attacks
and models, maintaining its effectiveness even on in-the-wild jailbreak data.
Furthermore, in evaluating the model's utility, we incorporated over-defense
datasets, which further validate the superior performance of our approach. The
code will be released immediately upon acceptance.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 09:02:12 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Li",
"Yu",
""
],
[
"Jiang",
"Han",
""
],
[
"Wei",
"Zhihua",
""
]
] |
2504.13563 | Cong Pan | C. Pan and J. Meng | Charge radii and their deformation correlation for even-$Z$ nuclei in
deformed relativistic Hartree-Bogoliubov theory in continuum | 18 pages, 5 figures | null | null | null | nucl-th | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The systematics are investigated for the charge radii of the even-$Z$ nuclei
with $8 \leqslant Z \leqslant 120$ calculated by the deformed relativistic
Hartree-Bogoliubov theory in continuum (DRHBc) with the functional PC-PK1, and
their deformation correlation is explored. The available data of the charge
radius are reproduced with a root-mean-square deviation $\sigma=0.033$ fm. In
particular, for the nuclei between the closed shells, the descriptions of the
charge radii are remarkably improved by including the deformation. Taking
molybdenum isotopes as examples, both the evolutions of the charge radius and
deformation are well reproduced. It is found that while the charge radius
typically increases with the deformation, there also exist different cases. For
example, in $^{346}$Sg, the charge radius of the deformed ground state is
smaller than the one of the spherical state, and the largest binding energy
does not necessarily correspond to the smallest charge radius.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 09:02:53 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Pan",
"C.",
""
],
[
"Meng",
"J.",
""
]
] |
2504.13564 | Chunyu Guo | Chunyu (Mark) Guo, Kaize Wang, Ling Zhang, Carsten Putzke, Dong Chen,
Maarten R. van Delft, Steffen Wiedmann, Fedor F. Balakirev, Ross D. McDonald,
Martin Gutierrez-Amigo, Manex Alkorta, Ion Errea, Maia G. Vergniory, Takashi
Oka, Roderich Moessner, Mark H. Fischer, Titus Neupert, Claudia Felser, and
Philip J.W. Moll | Long-range electron coherence in Kagome metals | null | null | null | null | cond-mat.str-el cond-mat.mtrl-sci cond-mat.supr-con | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The wave-like nature of electrons lies at the core of quantum mechanics,
distinguishing them from classical particles. Landmark experiments have
revealed phase coherence of mobile electrons within solids, such as
Aharonov-Bohm interference in mesoscopic rings. However, this coherence is
typically limited by numerous environmental interactions. Controlling and
ideally mitigating such decoherence remains a central challenge in condensed
matter physics. Here, we report magnetoresistance oscillations in mesoscopic
pillars of the Kagome metal CsV$_3$Sb$_5$ for fields applied parallel to the
Kagome planes. Their periodicity is independent of materials parameters, simply
given by the number of flux quanta $h/e$ threading between adjacent Kagome
layers akin to an atomic-scale Aharonov-Bohm interferometer. Intriguingly they
occur under conditions not favorable for typical interference in solids, at
temperatures above 20 K and in micrometer-scale devices well exceeding the
single-particle mean free path. Further, the oscillations exhibit non-analytic
field-angle dependence and scale consistently with a broad range of key
electronic responses in CsV$_3$Sb$_5$, pointing to a cooperative mechanism that
establishes intrinsic coherence. Our findings provide new insights into the
debated origin of correlated order in CsV$_3$Sb$_5$ and establish Kagome metals
as a promising platform for interaction-stabilized long-range electron
coherence - crucial for both fundamental studies and technological advancements
in quantum interference in metallic systems.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 09:03:45 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Chunyu",
"",
"",
"Mark"
],
[
"Guo",
"",
""
],
[
"Wang",
"Kaize",
""
],
[
"Zhang",
"Ling",
""
],
[
"Putzke",
"Carsten",
""
],
[
"Chen",
"Dong",
""
],
[
"van Delft",
"Maarten R.",
""
],
[
"Wiedmann",
"Steffen",
""
],
[
"Balakirev",
"Fedor F.",
""
],
[
"McDonald",
"Ross D.",
""
],
[
"Gutierrez-Amigo",
"Martin",
""
],
[
"Alkorta",
"Manex",
""
],
[
"Errea",
"Ion",
""
],
[
"Vergniory",
"Maia G.",
""
],
[
"Oka",
"Takashi",
""
],
[
"Moessner",
"Roderich",
""
],
[
"Fischer",
"Mark H.",
""
],
[
"Neupert",
"Titus",
""
],
[
"Felser",
"Claudia",
""
],
[
"Moll",
"Philip J. W.",
""
]
] |
2504.13565 | Zhang Di | Di Zhang, Minhao Yao, Zhonghua Liu, Baoluo Sun | MR-MAGIC: Robust Causal Inference Using Many Weak Genetic Interactions | 33 pages, 2 figures | null | null | null | stat.ME | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Mendelian randomization (MR) studies commonly use genetic variants as
instrumental variables to estimate causal effects of exposures on outcomes.
However, the presence of invalid instruments-even when numerous-can lead to
biased causal estimates. We propose a novel identification strategy that
remains valid even when all candidate instruments are invalid by leveraging
genetic interactions that collectively explain substantial exposure variation.
Recognizing that individual interaction effects may be weak, we develop
MR-MAGIC (Mendelian Randomization with MAny weak Genetic Interactions for
Causality), a robust method that simultaneously addresses instrument invalidity
and improves estimation efficiency. MR-MAGIC provides consistent and
asymptotically normal estimates under a many-weak-interactions asymptotic
framework. Comprehensive simulations and applications to UK Biobank data
demonstrate that MR-MAGIC outperforms conventional MR methods in practice,
offering reliable causal inference when standard approaches fail.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 09:06:26 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Zhang",
"Di",
""
],
[
"Yao",
"Minhao",
""
],
[
"Liu",
"Zhonghua",
""
],
[
"Sun",
"Baoluo",
""
]
] |
2504.13566 | Tony Puthenpurakal | Tony J. Puthenpurakal | Cohomology Vanishing theorems over some rings containing nilpotents | null | null | null | null | math.AC | http://creativecommons.org/licenses/by/4.0/ | (1) Let $(A,\mathfrak{m})$ be complete Noetherian local ring of dimension $d$
and let $P$ be a prime ideal with $G_P(A) = \bigoplus_{n \geq 0}P^n/P^{n+1}$ a
domain. Fix $r \geq 1$. If $J$ is a homogeneous ideal of $G_{P^r}(A)$ with
$\text{dim} \ G_{P^r}(A)/J > 0$ then the local cohomology module
$H^d_J(G_{P^r}(A)) = 0$.
(2) Let $A = K[[X_1, \ldots,X_d]]$ and let $\mathfrak{m} = (X_1, \ldots,
X_d)$. Assume $K$ is separably closed. Fix $r \geq 1$. Let $J$ be a homogeneous
ideal of $G_{\mathfrak{m}^r}(A)$. We show that local cohomology modules
$H^{j}_J(G_{\mathfrak{m}^r}(A)) = 0$ for $j \geq d -1$ if and only if
$\text{dim} \ G_{\mathfrak{m}^r}(A)/J \geq 2$ and $\text{Proj}\
G_{\mathfrak{m}^r}(A)/J $ is connected.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 09:08:45 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Puthenpurakal",
"Tony J.",
""
]
] |
2504.13567 | Tiancheng Liu | Tiancheng Liu, Anqi Wang, Xinda Chen, Jing Yan, Yin Li, Pan Hui, Kang
Zhang | PoEmotion: Can AI Utilize Chinese Calligraphy to Express Emotion from
Poems? | null | null | null | null | cs.HC cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents PoEmotion, an approach to visualizing emotions in poetry
with Chinese calligraphy strokes. Traditional textual emotion analysis often
lacks emotional resonance due to its mechanical nature. PoEmotion combines
natural language processing with deep learning generative algorithms to create
Chinese calligraphy that effectively conveys the emotions in poetry. The
created calligraphy represents four fundamental emotions: excitement, anger,
sadness, and relaxation, making the visual representation of emotions intuitive
and concise. Furthermore, the approach delves into the relationship be-tween
time, emotion, and cultural communication. Its goal is to provide a more
natural means of communicating emotions through non-verbal mediums to enhance
human emotional expression.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 09:10:40 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Liu",
"Tiancheng",
""
],
[
"Wang",
"Anqi",
""
],
[
"Chen",
"Xinda",
""
],
[
"Yan",
"Jing",
""
],
[
"Li",
"Yin",
""
],
[
"Hui",
"Pan",
""
],
[
"Zhang",
"Kang",
""
]
] |
2504.13568 | Runzhen Xue | Runzhen Xue, Hao Wu, Mingyu Yan, Ziheng Xiao, Xiaochun Ye and Dongrui
Fan | MetaDSE: A Few-shot Meta-learning Framework for Cross-workload CPU
Design Space Exploration | 7 pages, 6 figures. Accepted by DAC 2025 | null | null | null | cs.AR cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Cross-workload design space exploration (DSE) is crucial in CPU architecture
design. Existing DSE methods typically employ the transfer learning technique
to leverage knowledge from source workloads, aiming to minimize the requirement
of target workload simulation. However, these methods struggle with
overfitting, data ambiguity, and workload dissimilarity.
To address these challenges, we reframe the cross-workload CPU DSE task as a
few-shot meta-learning problem and further introduce MetaDSE. By leveraging
model agnostic meta-learning, MetaDSE swiftly adapts to new target workloads,
greatly enhancing the efficiency of cross-workload CPU DSE. Additionally,
MetaDSE introduces a novel knowledge transfer method called the
workload-adaptive architectural mask algorithm, which uncovers the inherent
properties of the architecture. Experiments on SPEC CPU 2017 demonstrate that
MetaDSE significantly reduces prediction error by 44.3\% compared to the
state-of-the-art. MetaDSE is open-sourced and available at this
\href{https://anonymous.4open.science/r/Meta_DSE-02F8}{anonymous GitHub.}
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 09:11:16 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Xue",
"Runzhen",
""
],
[
"Wu",
"Hao",
""
],
[
"Yan",
"Mingyu",
""
],
[
"Xiao",
"Ziheng",
""
],
[
"Ye",
"Xiaochun",
""
],
[
"Fan",
"Dongrui",
""
]
] |
2504.13569 | Damien Querlioz | Djohan Bonnet, Kellian Cottart, Tifenn Hirtzlin, Tarcisius Januel,
Thomas Dalgaty, Elisa Vianello, Damien Querlioz | Bayesian continual learning and forgetting in neural networks | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Biological synapses effortlessly balance memory retention and flexibility,
yet artificial neural networks still struggle with the extremes of catastrophic
forgetting and catastrophic remembering. Here, we introduce Metaplasticity from
Synaptic Uncertainty (MESU), a Bayesian framework that updates network
parameters according their uncertainty. This approach allows a principled
combination of learning and forgetting that ensures that critical knowledge is
preserved while unused or outdated information is gradually released. Unlike
standard Bayesian approaches -- which risk becoming overly constrained, and
popular continual-learning methods that rely on explicit task boundaries, MESU
seamlessly adapts to streaming data. It further provides reliable epistemic
uncertainty estimates, allowing out-of-distribution detection, the only
computational cost being to sample the weights multiple times to provide proper
output statistics. Experiments on image-classification benchmarks demonstrate
that MESU mitigates catastrophic forgetting, while maintaining plasticity for
new tasks. When training 200 sequential permuted MNIST tasks, MESU outperforms
established continual learning techniques in terms of accuracy, capability to
learn additional tasks, and out-of-distribution data detection. Additionally,
due to its non-reliance on task boundaries, MESU outperforms conventional
learning techniques on the incremental training of CIFAR-100 tasks consistently
in a wide range of scenarios. Our results unify ideas from metaplasticity,
Bayesian inference, and Hessian-based regularization, offering a
biologically-inspired pathway to robust, perpetual learning.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 09:11:34 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Bonnet",
"Djohan",
""
],
[
"Cottart",
"Kellian",
""
],
[
"Hirtzlin",
"Tifenn",
""
],
[
"Januel",
"Tarcisius",
""
],
[
"Dalgaty",
"Thomas",
""
],
[
"Vianello",
"Elisa",
""
],
[
"Querlioz",
"Damien",
""
]
] |
2504.13570 | Jingran Xu | Jingran Xu, Hongqi Min, Yong Zeng | Integrated Super-resolution Sensing and Symbiotic Communication with 3D
Sparse MIMO for Low-Altitude UAV Swarm | 13 pages, 15 figures | null | null | null | eess.SP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Low-altitude unmanned aerial vehicle (UAV) swarms are expected to play
important role for future intelligent aerial systems due to their great
potential to cooperatively accomplish complicated missions effectively.
However, there are important challenges to be addressed to enable their
efficient operation: the large-scale nature of swarms usually leads to
excessive spectrum consumption, and ultra-low cost requirements for individual
UAVs renders it necessary to develop more cost-effective communication modules.
In addition, the densely located swarm UAVs require high resolution for
localization and sensing. To address the above challenges and simultaneously
achieve spectrum and energy-efficient communication and accurate sensing, we
investigate low-altitude UAV swarm with integrated super-resolution sensing and
symbiotic communication technology. Specifically, one leading UAV may act as a
primary transmitter (PT) to transmit communication signals to the base station
(BS), and the remaining nearby UAVs in the swarm act as passive backscatter
devices (BDs), which can modulate their information by efficiently
backscattering the radio frequency (RF) signals from the PT without consuming
extra spectrum or power. In addition, to achieve efficient three-dimensional
(3D) super-resolution sensing for the densely located UAV swarm, 3D sparse
multiple-input multiple-output (MIMO) technology and super-resolution signal
processing algorithms are further exploited, where both L-shaped nested array
(LNA) and planar nested arrays (PNA) are considered at the BS. To evaluate the
communication and sensing performance for the UAV-symbiotic radio (SR) system,
the achievable rates of UAV swarm are derived and the beam patterns of sparse
LNA, PNA and the benchmarking compact uniform planar array (UPA) are compared.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 09:12:33 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Xu",
"Jingran",
""
],
[
"Min",
"Hongqi",
""
],
[
"Zeng",
"Yong",
""
]
] |
2504.13572 | Gustavo Penha | Gustavo Penha, Alice Wang, Martin Achenbach, Kristen Sheets, Sahitya
Mantravadi, Remi Galvez, Nico Guetta-Jeanrenaud, Divya Narayanan, Ofeliya
Kalaydzhyan, and Hugues Bouchard | Contextualizing Spotify's Audiobook List Recommendations with
Descriptive Shelves | Accepted for publication in the 47th European Conference on
Information Retrieval (ECIR'25) | null | null | null | cs.IR | http://creativecommons.org/licenses/by-nc-sa/4.0/ | In this paper, we propose a pipeline to generate contextualized list
recommendations with descriptive shelves in the domain of audiobooks. By
creating several shelves for topics the user has an affinity to, e.g. Uplifting
Women's Fiction, we can help them explore their recommendations according to
their interests and at the same time recommend a diverse set of items. To do
so, we use Large Language Models (LLMs) to enrich each item's metadata based on
a taxonomy created for this domain. Then we create diverse descriptive shelves
for each user. A/B tests show improvements in user engagement and audiobook
discovery metrics, demonstrating benefits for users and content creators.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 09:12:46 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Penha",
"Gustavo",
""
],
[
"Wang",
"Alice",
""
],
[
"Achenbach",
"Martin",
""
],
[
"Sheets",
"Kristen",
""
],
[
"Mantravadi",
"Sahitya",
""
],
[
"Galvez",
"Remi",
""
],
[
"Guetta-Jeanrenaud",
"Nico",
""
],
[
"Narayanan",
"Divya",
""
],
[
"Kalaydzhyan",
"Ofeliya",
""
],
[
"Bouchard",
"Hugues",
""
]
] |
2504.13573 | Kai Ma | Kai Ma and Ningyu He and Jintao Huang and Bosi Zhang and Ping Wu and
Haoyu Wang | Cybersquatting in Web3: The Case of NFT | null | null | null | null | cs.CR | http://creativecommons.org/licenses/by/4.0/ | Cybersquatting refers to the practice where attackers register a domain name
similar to a legitimate one to confuse users for illegal gains. With the growth
of the Non-Fungible Token (NFT) ecosystem, there are indications that
cybersquatting tactics have evolved from targeting domain names to NFTs. This
paper presents the first in-depth measurement study of NFT cybersquatting. By
analyzing over 220K NFT collections with over 150M NFT tokens, we have
identified 8,019 cybersquatting NFT collections targeting 654 popular NFT
projects. Through systematic analysis, we discover and characterize seven
distinct squatting tactics employed by scammers. We further conduct a
comprehensive measurement study of these cybersquatting NFT collections,
examining their metadata, associated digital asset content, and social media
status. Our analysis reveals that these NFT cybersquatting activities have
resulted in a significant financial impact, with over 670K victims affected by
these scams, leading to a total financial exploitation of $59.26 million. Our
findings demonstrate the urgency to identify and prevent NFT squatting abuses.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 09:14:59 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Ma",
"Kai",
""
],
[
"He",
"Ningyu",
""
],
[
"Huang",
"Jintao",
""
],
[
"Zhang",
"Bosi",
""
],
[
"Wu",
"Ping",
""
],
[
"Wang",
"Haoyu",
""
]
] |
2504.13574 | Zhenkai Qin | Zhenkai Qin, Feng Zhu, Huan Zeng, Xunyi Nong | MAAM: A Lightweight Multi-Agent Aggregation Module for Efficient Image
Classification Based on the MindSpore Framework | null | null | null | null | cs.LG cs.CV eess.IV | http://creativecommons.org/publicdomain/zero/1.0/ | The demand for lightweight models in image classification tasks under
resource-constrained environments necessitates a balance between computational
efficiency and robust feature representation. Traditional attention mechanisms,
despite their strong feature modeling capability, often struggle with high
computational complexity and structural rigidity, limiting their applicability
in scenarios with limited computational resources (e.g., edge devices or
real-time systems). To address this, we propose the Multi-Agent Aggregation
Module (MAAM), a lightweight attention architecture integrated with the
MindSpore framework. MAAM employs three parallel agent branches with
independently parameterized operations to extract heterogeneous features,
adaptively fused via learnable scalar weights, and refined through a
convolutional compression layer. Leveraging MindSpore's dynamic computational
graph and operator fusion, MAAM achieves 87.0% accuracy on the CIFAR-10
dataset, significantly outperforming conventional CNN (58.3%) and MLP (49.6%)
models, while improving training efficiency by 30%. Ablation studies confirm
the critical role of agent attention (accuracy drops to 32.0% if removed) and
compression modules (25.5% if omitted), validating their necessity for
maintaining discriminative feature learning. The framework's hardware
acceleration capabilities and minimal memory footprint further demonstrate its
practicality, offering a deployable solution for image classification in
resource-constrained scenarios without compromising accuracy.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 09:19:07 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Qin",
"Zhenkai",
""
],
[
"Zhu",
"Feng",
""
],
[
"Zeng",
"Huan",
""
],
[
"Nong",
"Xunyi",
""
]
] |
2504.13575 | Pablo Fernando Zubieta Rico | Gustavo R. P\'erez-Lemus, Cintia A. Menendez, Yinan Xu, Pablo F.
Zubieta Rico, Yezhi Jin and Juan J. de Pablo | Autodifferentiable Geometric Restraints for Enhanced Sampling
Simulations with Classical and Machine Learned Force Fields | null | null | null | null | physics.comp-ph | http://creativecommons.org/licenses/by/4.0/ | The use of external restraints is ubiquitous in advanced molecular simulation
techniques. In general, restraints serve to reduce the configurational space
that is available for sampling, thereby reducing the computational demands
associated with a given simulations. Examples include the use of positional
restraints in docking simulations or positional restraints in studies of
catalysis. Past work has sought to couple complex restraining potentials with
enhanced sampling methods, including Metadynamics or Extended Adaptive Biasing
Force approaches. Here, we introduce the use of more general geometric
potentials coupled with enhanced sampling methods that incorporate neural
networks or spectral decomposition to achieve more efficient sampling in the
context of advanced materials design.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 09:19:09 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Pérez-Lemus",
"Gustavo R.",
""
],
[
"Menendez",
"Cintia A.",
""
],
[
"Xu",
"Yinan",
""
],
[
"Rico",
"Pablo F. Zubieta",
""
],
[
"Jin",
"Yezhi",
""
],
[
"de Pablo",
"Juan J.",
""
]
] |
2504.13576 | Zhenkai Qin | Weiqi Qin, Yuxin Liu, Dongze Wu, Zhenkai Qin, Qining Luo | MSTIM: A MindSpore-Based Model for Traffic Flow Prediction | null | null | null | null | cs.LG | http://creativecommons.org/publicdomain/zero/1.0/ | Aiming at the problems of low accuracy and large error fluctuation of
traditional traffic flow predictionmodels when dealing with multi-scale
temporal features and dynamic change patterns. this paperproposes a multi-scale
time series information modelling model MSTIM based on the Mindspore framework,
which integrates long and short-term memory networks (LSTMs), convolutional
neural networks (CNN), and the attention mechanism to improve the modelling
accuracy and stability. The Metropolitan Interstate Traffic Volume (MITV)
dataset was used for the experiments and compared and analysed with typical
LSTM-attention models, CNN-attention models and LSTM-CNN models. The
experimental results show that the MSTIM model achieves better results in the
metrics of Mean Absolute Error (MAE), Mean Square Error (MSE), and Root Mean
Square Error (RMSE), which significantly improves the accuracy and stability of
the traffic volume prediction.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 09:19:51 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Qin",
"Weiqi",
""
],
[
"Liu",
"Yuxin",
""
],
[
"Wu",
"Dongze",
""
],
[
"Qin",
"Zhenkai",
""
],
[
"Luo",
"Qining",
""
]
] |
2504.13577 | Jonas Lang | Jonas Lang and Wojciech Kotlarski | Towards automatizing Higgs decays in BSM models at one-loop in the
decoupling renormalization scheme | 6 pages, 3 figures | null | null | null | hep-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose the use of a decoupling renormalization scheme in the calculation
of NLO corrections to SM-like Higgs boson decays in the Beyond the Standard
Model models. The advantage of this particular scheme is its decoupling
property in the presence of a heavy BSM physics and the possibility to directly
include known higher order Standard Model corrections. We illustrate the use of
this scheme by analysing the $h \to \mu^+ \mu^-$ decay in a simple Standard
Model extension by a $S_1$ leptoquark.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 09:20:26 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Lang",
"Jonas",
""
],
[
"Kotlarski",
"Wojciech",
""
]
] |
2504.13578 | Tao Yu | Xi-Han Zhou, Xiyin Ye, and Tao Yu | Chiral Locking of Magnon Flow and Electron Spin Accumulation in Their
Near-Field Radiative Spin Transfer | 6 pages, 4 figures | null | null | null | cond-mat.mes-hall | http://creativecommons.org/licenses/by/4.0/ | We report a non-contact mechanism for directional injection of magnons in
magnetic films when driven by a spin accumulation $\pmb{\mu}_s$ of electrons of
a nearby metallic layer, governed by the long-range dipolar coupling between
magnons and electron spins, which spontaneously generates a magnon current
${\bf J}_m$ flowing in the film plane. Crucially, in such near-field radiative
spin transfer, the magnon flow ${\bf J}_m$ is always perpendicular to the spin
accumulation $\pmb{\mu}_s$, showing a universal chiral locking relation. The
spin injection is efficient even when $\pmb{\mu}_s$ is parallel to the
magnetization, a feature breaking the limitation of the spin transfer by
contact exchange interaction. Our findings reveal the critical role of dipolar
chirality in driving the magnon thermal current and paving the way for the
functional design of magnonic devices based on near-field radiative spin
transfer.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 09:29:28 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Zhou",
"Xi-Han",
""
],
[
"Ye",
"Xiyin",
""
],
[
"Yu",
"Tao",
""
]
] |
2504.13579 | Shuobin Wei | Shuobin Wei, Zhuang Zhou, Zhengan Lu, Zizhao Yuan, and Binghua Su | HDBFormer: Efficient RGB-D Semantic Segmentation with A Heterogeneous
Dual-Branch Framework | 6 pages, 4 figures, published to IEEE Signal Processing Letter | IEEE Signal Processing Letters, vol. 32, pp. 91-95, 2025 | 10.1109/LSP.2024.3496588 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In RGB-D semantic segmentation for indoor scenes, a key challenge is
effectively integrating the rich color information from RGB images with the
spatial distance information from depth images. However, most existing methods
overlook the inherent differences in how RGB and depth images express
information. Properly distinguishing the processing of RGB and depth images is
essential to fully exploiting their unique and significant characteristics. To
address this, we propose a novel heterogeneous dual-branch framework called
HDBFormer, specifically designed to handle these modality differences. For RGB
images, which contain rich detail, we employ both a basic and detail encoder to
extract local and global features. For the simpler depth images, we propose
LDFormer, a lightweight hierarchical encoder that efficiently extracts depth
features with fewer parameters. Additionally, we introduce the Modality
Information Interaction Module (MIIM), which combines transformers with large
kernel convolutions to interact global and local information across modalities
efficiently. Extensive experiments show that HDBFormer achieves
state-of-the-art performance on the NYUDepthv2 and SUN-RGBD datasets. The code
is available at: https://github.com/Weishuobin/HDBFormer.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 09:29:46 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Wei",
"Shuobin",
""
],
[
"Zhou",
"Zhuang",
""
],
[
"Lu",
"Zhengan",
""
],
[
"Yuan",
"Zizhao",
""
],
[
"Su",
"Binghua",
""
]
] |
2504.13580 | Yuchen Rao | Yuchen Rao, Stefan Ainetter, Sinisa Stekovic, Vincent Lepetit,
Friedrich Fraundorfer | Leveraging Automatic CAD Annotations for Supervised Learning in 3D Scene
Understanding | Github Page: https://github.com/stefan-ainetter/SCANnotatepp | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | High-level 3D scene understanding is essential in many applications. However,
the challenges of generating accurate 3D annotations make development of deep
learning models difficult. We turn to recent advancements in automatic
retrieval of synthetic CAD models, and show that data generated by such methods
can be used as high-quality ground truth for training supervised deep learning
models. More exactly, we employ a pipeline akin to the one previously used to
automatically annotate objects in ScanNet scenes with their 9D poses and CAD
models. This time, we apply it to the recent ScanNet++ v1 dataset, which
previously lacked such annotations. Our findings demonstrate that it is not
only possible to train deep learning models on these automatically-obtained
annotations but that the resulting models outperform those trained on manually
annotated data. We validate this on two distinct tasks: point cloud completion
and single-view CAD model retrieval and alignment. Our results underscore the
potential of automatic 3D annotations to enhance model performance while
significantly reducing annotation costs. To support future research in 3D scene
understanding, we will release our annotations, which we call SCANnotate++,
along with our trained models.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 09:33:45 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Rao",
"Yuchen",
""
],
[
"Ainetter",
"Stefan",
""
],
[
"Stekovic",
"Sinisa",
""
],
[
"Lepetit",
"Vincent",
""
],
[
"Fraundorfer",
"Friedrich",
""
]
] |
2504.13581 | Manon Bailleul | M. C. Bailleul, N. Nardetto, V. Hocd\'e, P. Kervella, W. Gieren, J.
Storm, G. Pietrzy\'nski, A. Gallenne, A. M\'erand, G. Bras, A. Recio Blanco,
P. de Laverny, P. A. Palacio, A. Afanasiev, W. Kiviaho | Surface brightness-colour relations of Cepheids calibrated by optical
interferometry | Accepted for publication in A&A | null | null | null | astro-ph.SR astro-ph.GA | http://creativecommons.org/licenses/by/4.0/ | Surface brightness-colour relations (SBCRs) are widely used to determine the
angular diameters of stars. They are in particular used in the Baade-Wesselink
(BW) method of distance determination of Cepheids. However, the impact of the
SBCR on the BW distance of Cepheids is about 8%, depending on the choice of
SBCR considered in the literature. We aim to calibrate a precise SBCR dedicated
to Cepheids using the best quality interferometric measurements available as
well as different photometric bands, including the Gaia bands. We selected
interferometric and photometric data in the literature for seven Cepheids
covering different pulsation periods. From the phased photometry in the
different bands (VJHKG$\mathrm{G_{BP}G_{RP}}$) corrected from extinction and
the interferometric limb-darkened angular diameters, we calculated the SBCR
associated with each combination of colours. We first find that the seven
Cepheids have consistent SBCRs as long as the two magnitudes considered are not
too close in wavelengths. For the SBCR ($\mathrm{F_{V},V-K}$): $\mathrm{F_{V} =
-0.1336_{\pm 0.0009}(V-K)_{0}+3.9572_{\pm 0.0015}}$, we obtain a root mean
square (RMS) of 0.0040 mag, which is three times lower than the latest estimate
from 2004. Also, for the first time, we present an SBCR dedicated to Cepheids
based on Gaia bands only: $\mathrm{F_{G_{BP}} = -0.3001_{\pm
0.0030}(G_{BP}-G_{RP})_{0}+3.9977_{\pm 0.0029}}$, with an excellent RMS of
0.0061 mag. However, using theoretical models, we show that this SBCR is highly
sensitive to metallicity. From this empirical multi-wavelength approach, we
also show that the impact of the CircumStellar Environment (CSE) of Cepheids
emission is not negligible and should be taken into account in the future.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 09:34:29 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Bailleul",
"M. C.",
""
],
[
"Nardetto",
"N.",
""
],
[
"Hocdé",
"V.",
""
],
[
"Kervella",
"P.",
""
],
[
"Gieren",
"W.",
""
],
[
"Storm",
"J.",
""
],
[
"Pietrzyński",
"G.",
""
],
[
"Gallenne",
"A.",
""
],
[
"Mérand",
"A.",
""
],
[
"Bras",
"G.",
""
],
[
"Blanco",
"A. Recio",
""
],
[
"de Laverny",
"P.",
""
],
[
"Palacio",
"P. A.",
""
],
[
"Afanasiev",
"A.",
""
],
[
"Kiviaho",
"W.",
""
]
] |
2504.13582 | Zongyuan Chen | Zongyuan Chen, Yan Xia, Jiayuan Liu, Jijia Liu, Wenhao Tang, Jiayu
Chen, Feng Gao, Longfei Ma, Hongen Liao, Yu Wang, Chao Yu, Boyu Zhang, Fei
Xing | Hysteresis-Aware Neural Network Modeling and Whole-Body Reinforcement
Learning Control of Soft Robots | null | null | null | null | cs.RO cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Soft robots exhibit inherent compliance and safety, which makes them
particularly suitable for applications requiring direct physical interaction
with humans, such as surgical procedures. However, their nonlinear and
hysteretic behavior, resulting from the properties of soft materials, presents
substantial challenges for accurate modeling and control. In this study, we
present a soft robotic system designed for surgical applications and propose a
hysteresis-aware whole-body neural network model that accurately captures and
predicts the soft robot's whole-body motion, including its hysteretic behavior.
Building upon the high-precision dynamic model, we construct a highly parallel
simulation environment for soft robot control and apply an on-policy
reinforcement learning algorithm to efficiently train whole-body motion control
strategies. Based on the trained control policy, we developed a soft robotic
system for surgical applications and validated it through phantom-based laser
ablation experiments in a physical environment. The results demonstrate that
the hysteresis-aware modeling reduces the Mean Squared Error (MSE) by 84.95
percent compared to traditional modeling methods. The deployed control
algorithm achieved a trajectory tracking error ranging from 0.126 to 0.250 mm
on the real soft robot, highlighting its precision in real-world conditions.
The proposed method showed strong performance in phantom-based surgical
experiments and demonstrates its potential for complex scenarios, including
future real-world clinical applications.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 09:34:56 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Chen",
"Zongyuan",
""
],
[
"Xia",
"Yan",
""
],
[
"Liu",
"Jiayuan",
""
],
[
"Liu",
"Jijia",
""
],
[
"Tang",
"Wenhao",
""
],
[
"Chen",
"Jiayu",
""
],
[
"Gao",
"Feng",
""
],
[
"Ma",
"Longfei",
""
],
[
"Liao",
"Hongen",
""
],
[
"Wang",
"Yu",
""
],
[
"Yu",
"Chao",
""
],
[
"Zhang",
"Boyu",
""
],
[
"Xing",
"Fei",
""
]
] |
2504.13583 | Jiangang Kang | Jiangang Kang, Guangyuan Song, Tong Jie Zhang, Ming Zhu | Estimating constraints on cosmological parameters via the canonical and
the differential redshift drift with SKA HI 21-cm observations | 9 pages, 5 figures, 2 tables, accepted for publication by MNRAS | null | null | null | astro-ph.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Redshift drift effect, an observational probe that indenpendent of
cosmological models, presents unique applications in specific cosmological
epoch. By quantifying redshift drift signal , researchers can determine the
rate of the Universe's accelerated expansion and impose constraints on
cosmological models and parameters. This study evaluates the precision in
cosmological parameters estimation derived from this signal via HI 21cm signal,
that observed by the Square Kilometre Array (SKA) telescope, with spectral
resolutions of 0.001 Hz and 0.002 Hz over an observational period of $\Delta T
= 0.5$ year, utilizing two established techniques: the canonical redshift drift
and the differential redshift drift method. The primary objective of this
project is to ascertain the rate of cosmic acceleration and establish a solid
foundation for real-time cosmology. The results reveal that both the two
methods impose highly precise constraints on cosmological parameters, with
accuracy reaching the level of millimeter per second (mm/s) or better. However,
the canonical method provides relatively less stringent compared to the
differential approach. Furthermore, when solely constraining the matter density
parameter $\Omega_m$, the strategy can be adapted to the canonical method.
Nonetheless, the differential method exhibits clear advantages when
simultaneously constraining the matter density parameter $\Omega_m$ and the
equation of state of dark energy. These findings validate SKA's capability in
detecting redshift drift and refining observational cosmology and indicates the
effect can offer superior diagnostic capabilities compared to other techniques,
provided that appropriate observational equipment or sufficient observational
time is employed.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 09:36:32 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Kang",
"Jiangang",
""
],
[
"Song",
"Guangyuan",
""
],
[
"Zhang",
"Tong Jie",
""
],
[
"Zhu",
"Ming",
""
]
] |
2504.13585 | Michal Hapka | Dominik Cie\'sli\'nski, Micha{\l} Przybytek, Grzegorz
Cha{\l}asi\'nski, Micha{\l} Hapka | First-Order Symmetry-Adapted Perturbation Theory with Double Exchange
for Multireference Systems | null | null | null | null | physics.chem-ph | http://creativecommons.org/licenses/by/4.0/ | We extend first-order multiconfigurational symmetry-adapted perturbation
theory, SAPT(MC), [Hapka M. et al. JCTC, 2021, 17], to account for
double-exchange effects, where up to two electron pairs are exchanged between
interacting monomers. To achieve this, we derive density-matrix-based
expressions for the first-order exchange energy to arbitrary orders in the
overlap expansion. As a numerical demonstration, we apply the double-exchange
approximation to strongly orthogonal geminal wave functions. Additionally, we
propose an approximate method for evaluating double-exchange energy with
complete active space (CAS) wave functions of the valence type, i.e., with n
active electrons distributed over n orbitals. We analyze the performance of
these methods on model dimers in both ground and excited states.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 09:37:04 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Cieśliński",
"Dominik",
""
],
[
"Przybytek",
"Michał",
""
],
[
"Chałasiński",
"Grzegorz",
""
],
[
"Hapka",
"Michał",
""
]
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.