id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
3
62.8k
title
stringlengths
1
382
comments
stringlengths
1
1.15k
journal-ref
stringlengths
1
557
doi
stringlengths
7
153
report-no
stringlengths
1
509
categories
stringlengths
5
125
license
stringclasses
9 values
abstract
stringlengths
6
6.09k
versions
listlengths
1
187
update_date
timestamp[s]date
2007-05-23 00:00:00
2025-04-25 00:00:00
authors_parsed
sequencelengths
1
2.83k
2504.13692
Qianghua Chen
Qianghua Chen, Huiyu Wang, Li Ming and Ying Zhao
Zebrafish Counting Using Event Stream Data
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Zebrafish share a high degree of homology with human genes and are commonly used as model organism in biomedical research. For medical laboratories, counting zebrafish is a daily task. Due to the tiny size of zebrafish, manual visual counting is challenging. Existing counting methods are either not applicable to small fishes or have too many limitations. The paper proposed a zebrafish counting algorithm based on the event stream data. Firstly, an event camera is applied for data acquisition. Secondly, camera calibration and image fusion were preformed successively. Then, the trajectory information was used to improve the counting accuracy. Finally, the counting results were averaged over an empirical of period and rounded up to get the final results. To evaluate the accuracy of the algorithm, 20 zebrafish were put in a four-liter breeding tank. Among 100 counting trials, the average accuracy reached 97.95%. As compared with traditional algorithms, the proposed one offers a simpler implementation and achieves higher accuracy.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 13:51:29 GMT" } ]
2025-04-21T00:00:00
[ [ "Chen", "Qianghua", "" ], [ "Wang", "Huiyu", "" ], [ "Ming", "Li", "" ], [ "Zhao", "Ying", "" ] ]
2504.13693
Vincent Louatron
Kenta Higuchi and Vincent Louatron and Kouichi Taira
A microlocal Cauchy problem through a crossing point of Hamiltonian flows
43 pages, 5 figures
null
null
null
math.AP math-ph math.MP math.SP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider $2\times 2$ matrix-valued pseudodifferential equations in which the two characteristic sets intersect with finite contact order. We show that the asymptotic behavior of its solution changes dramatically before and after the crossing point, and provide a precise asymptotic formula. This is a generalization of the previous results for matrix-valued Schr\"odinger operators and Landau-Zener models. The proof relies on a normal form reduction and a detailed analysis of a simple first-order system.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 13:53:52 GMT" } ]
2025-04-21T00:00:00
[ [ "Higuchi", "Kenta", "" ], [ "Louatron", "Vincent", "" ], [ "Taira", "Kouichi", "" ] ]
2504.13694
Yilin Xie
Yilin Xie
Fixers and stabilizers for Ree groups
null
null
null
null
math.GR math.CO
http://creativecommons.org/licenses/by/4.0/
Let $G$ be a finite permutation group on $\Omega,$ a subgroup $K\leqslant G$ is called a fixer if each element in $K$ fixes some element in $\Omega.$ In this paper, we characterize fixers $K$ with $|K|\geqslant |G_\omega|$ for each primitive action of almost simple group $G$ with socle ${}^2G_2(q).$
[ { "version": "v1", "created": "Fri, 18 Apr 2025 13:53:58 GMT" } ]
2025-04-21T00:00:00
[ [ "Xie", "Yilin", "" ] ]
2504.13695
Miaoxia Zhuang
Qiming Hu, Baogang Xu and Miaoxia Zhuang
Perfect weighted divisibility is equivalent to perfect divisibility
null
null
null
null
math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A graph is perfectly divisible if for each of its induced subgraph $H$, $V(H)$ can be partitioned into $A$ and $B$ such that $H[A]$ is perfect and $\omega(H[B]) < \omega(H)$. A graph $G$ is perfectly weight divisible if for every positive integral weight function on $V(G)$ and each of its induced subgraph $H$, $V(H)$ can be partitioned into $A$ and $B$ such that $H[A]$ is perfect and the maximum weight of a clique in $H[B]$ is smaller than the maximum weight of a clique in $H$. In this paper, we prove that the perfect divisibility of a graph is equivalent to its perfect weighted divisibility.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 13:56:09 GMT" } ]
2025-04-21T00:00:00
[ [ "Hu", "Qiming", "" ], [ "Xu", "Baogang", "" ], [ "Zhuang", "Miaoxia", "" ] ]
2504.13696
Mariia Selina
Mariia Selina, R. Barthel, S. Bugiel, L. Cecconi, J. De Melo, M. Fransen, A. Grelli, I. Hobus, A. Isakov, A. Junique, P. Leitao, M. Mager, Y. Otarid, F. Piro, M.J. Rossewij, S. Solokhin, J. Sonneveld, W. Snoeys, N. Tiltmann, A. Vitkovskiy, H. Wennloef (on behalf of the ALICE collaboration)
Exploring unique design features of the Monolithic Stitched Sensor with Timing (MOST): yield, powering, timing, and sensor reverse bias
7 pages proceeding for PIXEL24 workshop
null
null
null
physics.ins-det hep-ex
http://creativecommons.org/licenses/by/4.0/
Monolithic stitched CMOS sensors are explored for the upgrade of Inner Tracking System of the ALICE experiment (ITS3) and the R&D of the CERN Experimental Physics Department. To learn about stitching, two 26 cm long stitched sensors, the Monolithic Stitched Sensor (MOSS), and the Monolithic Stitched Sensor with Timing (MOST), were implemented in the Engineering Round 1 (ER1) in the TPSCo 65nm ISC technology. Contrary to the MOSS, powered by 20 distinct power domains accessible from separate pads, the MOST has one global analog and digital power domain to or from which small fractions of the matrix can be connected or disconnected by conservatively designed power switches to prevent shorts or defects from affecting the full chip. Instead of the synchronous readout in the MOSS, the MOST immediately transfers hit information upon a hit, preserving timing information. The sensor reverse bias is also applied through the bias of the front-end rather than by a reverse substrate bias. This paper presents the first characterization results of the MOST, with the focus on its specific characteristics, including yield analysis, precise timing measurements, and the potential of its alternative biasing approach for improved sensor performance.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 13:56:45 GMT" } ]
2025-04-21T00:00:00
[ [ "Selina", "Mariia", "", "on behalf of the ALICE collaboration" ], [ "Barthel", "R.", "", "on behalf of the ALICE collaboration" ], [ "Bugiel", "S.", "", "on behalf of the ALICE collaboration" ], [ "Cecconi", "L.", "", "on behalf of the ALICE collaboration" ], [ "De Melo", "J.", "", "on behalf of the ALICE collaboration" ], [ "Fransen", "M.", "", "on behalf of the ALICE collaboration" ], [ "Grelli", "A.", "", "on behalf of the ALICE collaboration" ], [ "Hobus", "I.", "", "on behalf of the ALICE collaboration" ], [ "Isakov", "A.", "", "on behalf of the ALICE collaboration" ], [ "Junique", "A.", "", "on behalf of the ALICE collaboration" ], [ "Leitao", "P.", "", "on behalf of the ALICE collaboration" ], [ "Mager", "M.", "", "on behalf of the ALICE collaboration" ], [ "Otarid", "Y.", "", "on behalf of the ALICE collaboration" ], [ "Piro", "F.", "", "on behalf of the ALICE collaboration" ], [ "Rossewij", "M. J.", "", "on behalf of the ALICE collaboration" ], [ "Solokhin", "S.", "", "on behalf of the ALICE collaboration" ], [ "Sonneveld", "J.", "", "on behalf of the ALICE collaboration" ], [ "Snoeys", "W.", "", "on behalf of the ALICE collaboration" ], [ "Tiltmann", "N.", "", "on behalf of the ALICE collaboration" ], [ "Vitkovskiy", "A.", "", "on behalf of the ALICE collaboration" ], [ "Wennloef", "H.", "", "on behalf of the ALICE collaboration" ] ]
2504.13697
Shuai Wang
Chenxuan Liu, He Li, Zongze Li, Shuai Wang, Wei Xu, Kejiang Ye, Derrick Wing Kwan Ng, Chengzhong Xu
Green Robotic Mixed Reality with Gaussian Splatting
6 pages, 5 figures, accepted by IEEE INFOCOM 2025 Workshop on Networked Robotics and Communication Systems
null
null
null
cs.RO cs.CV eess.SP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Realizing green communication in robotic mixed reality (RoboMR) systems presents a challenge, due to the necessity of uploading high-resolution images at high frequencies through wireless channels. This paper proposes Gaussian splatting (GS) RoboMR (GSRMR), which achieves a lower energy consumption and makes a concrete step towards green RoboMR. The crux to GSRMR is to build a GS model which enables the simulator to opportunistically render a photo-realistic view from the robot's pose, thereby reducing the need for excessive image uploads. Since the GS model may involve discrepancies compared to the actual environments, a GS cross-layer optimization (GSCLO) framework is further proposed, which jointly optimizes content switching (i.e., deciding whether to upload image or not) and power allocation across different frames. The GSCLO problem is solved by an accelerated penalty optimization (APO) algorithm. Experiments demonstrate that the proposed GSRMR reduces the communication energy by over 10x compared with RoboMR. Furthermore, the proposed GSRMR with APO outperforms extensive baseline schemes, in terms of peak signal-to-noise ratio (PSNR) and structural similarity index measure (SSIM).
[ { "version": "v1", "created": "Fri, 18 Apr 2025 13:57:28 GMT" } ]
2025-04-21T00:00:00
[ [ "Liu", "Chenxuan", "" ], [ "Li", "He", "" ], [ "Li", "Zongze", "" ], [ "Wang", "Shuai", "" ], [ "Xu", "Wei", "" ], [ "Ye", "Kejiang", "" ], [ "Ng", "Derrick Wing Kwan", "" ], [ "Xu", "Chengzhong", "" ] ]
2504.13698
Sergey Afonin
S. S. Afonin
The experimental observation of $a_0(1710)$: Long awaited from Regge approach
6 pages, contribution to the session-conference Rubakov70
null
null
null
hep-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, the BABAR (in 2021), BESIII (in 2022), and LHCb (in 2023) Collaborations reported the observation of the $a_0(1710)$ resonance. This has sparked a lively debate in the literature about the nature of this possible isospin partner of $f_0(1710)$, since the latter has long been regarded as the main candidate for the lightest glueball. We highlight the clear prediction of $a_0(1710)$ in 2007 within the Regge approach using the observed hydrogen-like degeneracy in the spectrum of light mesons. Our reanalysis of the data used shows that the prediction was reliable and thus indicates that $a_0(1710)$ and $f_0(1710)$ are conventional quark-antiquark states.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 13:58:06 GMT" } ]
2025-04-21T00:00:00
[ [ "Afonin", "S. S.", "" ] ]
2504.13699
Taehyun Kim
Daun Chung, Yonghwan Cha, Hosung Shon, Jeonghyun Park, Woojun Lee, Kyungmin Lee, Beomgeun Cho, Kwangyeul Choi, Chiyoon Kim, Seungwoo Yoo, Suhan Kim, Uihwan Jeong, Jiyong Kang, Jaehun You, Taehyun Kim
Radio-Frequency Pseudo-Null Induced by Light in an Ion Trap
null
null
null
null
physics.atom-ph quant-ph
http://creativecommons.org/licenses/by/4.0/
In a linear radio-frequency (rf) ion trap, the rf null is the point of zero electric field in the dynamic trapping potential where the ion motion is approximately harmonic. When displaced from the rf null, the ion is superimposed by fast oscillations known as micromotion, which can be probed through motion-sensitive light-atom interactions. In this work, we report on the emergence of the rf pseudo-null, a locus of points where the ion responds to light as if it were at the true rf null, despite being displaced from it. The phenomenon is fully explained by accounting for the general two-dimensional structure of micromotion and is experimentally verified under various potential configurations, with observations in great agreement with numerical simulations. The rf pseudo-null manifests as a line in a two-dimensional parameter space, determined by the geometry of the incident light and its overlap with the motional structure of the ion. The true rf null occurs uniquely at the concurrent point of the pseudo-null lines induced by different light sources.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 13:58:16 GMT" } ]
2025-04-21T00:00:00
[ [ "Chung", "Daun", "" ], [ "Cha", "Yonghwan", "" ], [ "Shon", "Hosung", "" ], [ "Park", "Jeonghyun", "" ], [ "Lee", "Woojun", "" ], [ "Lee", "Kyungmin", "" ], [ "Cho", "Beomgeun", "" ], [ "Choi", "Kwangyeul", "" ], [ "Kim", "Chiyoon", "" ], [ "Yoo", "Seungwoo", "" ], [ "Kim", "Suhan", "" ], [ "Jeong", "Uihwan", "" ], [ "Kang", "Jiyong", "" ], [ "You", "Jaehun", "" ], [ "Kim", "Taehyun", "" ] ]
2504.13700
Zhen Wen
Zhen Wen, Luoxuan Weng, Yinghao Tang, Runjin Zhang, Yuxin Liu, Bo Pan, Minfeng Zhu, Wei Chen
Exploring Multimodal Prompt for Visualization Authoring with Large Language Models
11 pages, 8 figures
null
null
null
cs.HC cs.AI
http://creativecommons.org/licenses/by-nc-nd/4.0/
Recent advances in large language models (LLMs) have shown great potential in automating the process of visualization authoring through simple natural language utterances. However, instructing LLMs using natural language is limited in precision and expressiveness for conveying visualization intent, leading to misinterpretation and time-consuming iterations. To address these limitations, we conduct an empirical study to understand how LLMs interpret ambiguous or incomplete text prompts in the context of visualization authoring, and the conditions making LLMs misinterpret user intent. Informed by the findings, we introduce visual prompts as a complementary input modality to text prompts, which help clarify user intent and improve LLMs' interpretation abilities. To explore the potential of multimodal prompting in visualization authoring, we design VisPilot, which enables users to easily create visualizations using multimodal prompts, including text, sketches, and direct manipulations on existing visualizations. Through two case studies and a controlled user study, we demonstrate that VisPilot provides a more intuitive way to create visualizations without affecting the overall task efficiency compared to text-only prompting approaches. Furthermore, we analyze the impact of text and visual prompts in different visualization tasks. Our findings highlight the importance of multimodal prompting in improving the usability of LLMs for visualization authoring. We discuss design implications for future visualization systems and provide insights into how multimodal prompts can enhance human-AI collaboration in creative visualization tasks. All materials are available at https://OSF.IO/2QRAK.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 14:00:55 GMT" } ]
2025-04-21T00:00:00
[ [ "Wen", "Zhen", "" ], [ "Weng", "Luoxuan", "" ], [ "Tang", "Yinghao", "" ], [ "Zhang", "Runjin", "" ], [ "Liu", "Yuxin", "" ], [ "Pan", "Bo", "" ], [ "Zhu", "Minfeng", "" ], [ "Chen", "Wei", "" ] ]
2504.13701
Yushan Li
Yushan Li, Jianping He, and Dimos V. Dimarogonas
Inverse Inference on Cooperative Control of Networked Dynamical Systems
14 pages
null
null
null
eess.SY cs.MA cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent years have witnessed the rapid advancement of understanding the control mechanism of networked dynamical systems (NDSs), which are governed by components such as nodal dynamics and topology. This paper reveals that the critical components in continuous-time state feedback cooperative control of NDSs can be inferred merely from discrete observations. In particular, we advocate a bi-level inference framework to estimate the global closed-loop system and extract the components, respectively. The novelty lies in bridging the gap from discrete observations to the continuous-time model and effectively decoupling the concerned components. Specifically, in the first level, we design a causality-based estimator for the discrete-time closed-loop system matrix, which can achieve asymptotically unbiased performance when the NDS is stable. In the second level, we introduce a matrix logarithm based method to recover the continuous-time counterpart matrix, providing new sampling period guarantees and establishing the recovery error bound. By utilizing graph properties of the NDS, we develop least square based procedures to decouple the concerned components with up to a scalar ambiguity. Furthermore, we employ inverse optimal control techniques to reconstruct the objective function driving the control process, deriving necessary conditions for the solutions. Numerical simulations demonstrate the effectiveness of the proposed method.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 14:02:29 GMT" } ]
2025-04-21T00:00:00
[ [ "Li", "Yushan", "" ], [ "He", "Jianping", "" ], [ "Dimarogonas", "Dimos V.", "" ] ]
2504.13702
Alberto Bordin
Alberto Bordin, Florian J. Bennebroek Evertsz', Bart Roovers, Juan D. Torres Luna, Wietze D. Huisman, Francesco Zatelli, Grzegorz P. Mazur, Sebastiaan L. D. ten Haaf, Ghada Badawy, Erik P. A. M. Bakkers, Chun-Xiao Liu, Ruben Seoane Souto, Nick van Loo, Leo P. Kouwenhoven
Probing Majorana localization of a phase-controlled three-site Kitaev chain with an additional quantum dot
null
null
null
null
cond-mat.mes-hall
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Few-site implementations of the Kitaev chain offer a minimal platform to study the emergence and stability of Majorana bound states. Here, we realize two- and three-site chains in semiconducting quantum dots coupled via superconductors, and tune them to the sweet spot where zero-energy Majorana modes appear at the chain ends. We demonstrate control of the superconducting phase through both magnetic field and sweet-spot selection, and fully characterize the excitation spectrum under local and global perturbations. All spectral features are identified using the ideal Kitaev chain model. To assess Majorana localization, we couple the system to an additional quantum dot. The absence of energy splitting at the sweet spot confirms the high quality of the Majorana modes, despite the minimal size of the chains.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 14:03:10 GMT" } ]
2025-04-21T00:00:00
[ [ "Bordin", "Alberto", "" ], [ "Evertsz'", "Florian J. Bennebroek", "" ], [ "Roovers", "Bart", "" ], [ "Luna", "Juan D. Torres", "" ], [ "Huisman", "Wietze D.", "" ], [ "Zatelli", "Francesco", "" ], [ "Mazur", "Grzegorz P.", "" ], [ "Haaf", "Sebastiaan L. D. ten", "" ], [ "Badawy", "Ghada", "" ], [ "Bakkers", "Erik P. A. M.", "" ], [ "Liu", "Chun-Xiao", "" ], [ "Souto", "Ruben Seoane", "" ], [ "van Loo", "Nick", "" ], [ "Kouwenhoven", "Leo P.", "" ] ]
2504.13703
Soyoung Kim
Soyoung Kim, Dongjun Lee, Jaekwang Kim
Consensus-aware Contrastive Learning for Group Recommendation
10 pages, 5 figures
null
null
null
cs.IR
http://creativecommons.org/licenses/by/4.0/
Group recommendation aims to provide personalized item suggestions to a group of users by reflecting their collective preferences. A fundamental challenge in this task is deriving a consensus that adequately represents the diverse interests of individual group members. Despite advancements made by deep learning-based models, existing approaches still struggle in two main areas: (1) Capturing consensus in small-group settings, which are more prevalent in real-world applications, and (2) Balancing individual preferences with overall group performance, particularly in hypergraph-based methods that tend to emphasize group accuracy at the expense of personalization. To address these challenges, we introduce a Consensus-aware Contrastive Learning for Group Recommendation (CoCoRec) that models group consensus through contrastive learning. CoCoRec utilizes a transformer encoder to jointly learn user and group representations, enabling richer modeling of intra-group dynamics. Additionally, the contrastive objective helps reduce overfitting from high-frequency user interactions, leading to more robust and representative group embeddings. Experiments conducted on four benchmark datasets show that CoCoRec consistently outperforms state-of-the-art baselines in both individual and group recommendation scenarios, highlighting the effectiveness of consensus-aware contrastive learning in group recommendation tasks.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 14:03:40 GMT" } ]
2025-04-21T00:00:00
[ [ "Kim", "Soyoung", "" ], [ "Lee", "Dongjun", "" ], [ "Kim", "Jaekwang", "" ] ]
2504.13704
Thijs Van Der Horst
Thijs van der Horst, Marc van Kreveld, Tim Ophelders, and Bettina Speckmann
A near-linear time exact algorithm for the $L_1$-geodesic Fr\'echet distance between two curves on the boundary of a simple polygon
19 pages, 5 figures
null
null
null
cs.CG
http://creativecommons.org/licenses/by/4.0/
Let $P$ be a polygon with $k$ vertices. Let $R$ and $B$ be two simple, interior disjoint curves on the boundary of $P$, with $n$ and $m$ vertices. We show how to compute the Fr\'echet distance between $R$ and $B$ using the geodesic $L_1$-distance in $P$ in $\mathcal{O}(k \log nm + (n+m) (\log^2 nm \log k + \log^4 nm))$ time.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 14:06:44 GMT" } ]
2025-04-21T00:00:00
[ [ "van der Horst", "Thijs", "" ], [ "van Kreveld", "Marc", "" ], [ "Ophelders", "Tim", "" ], [ "Speckmann", "Bettina", "" ] ]
2504.13705
Wenqi Ma
Wenqi Ma, Zhifu Gao, Biaopeng Li, Jumei Yao, Fayin Wang
Deriving the Energy Function of Non-repeaters from CHIME/FRB Baseband Data
11 pages,5 figures,1 table.Submitted to ApJ
null
null
null
astro-ph.HE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Fast radio bursts (FRBs) are radio pulses that originate from cosmological distance. Over 800 FRB sources with thousands of bursts have been detected, yet their origins remain unknown. Analyse of the energy function and the redshift evolution of volumetric rate could provide crucial insights into FRB progenitors. In this paper, we present the energy functions of non-repeaters selected from the CHIME/FRB baseband data using the $V_\mathrm{max}$ method. The $V_\mathrm{max}$ method allows us to measure redshift evolution without prior assumptions. We observed Schechter-like shapes in the energy function at low redshift region, while high redshift regions show a relatively small slope ($\gamma\approx -2$). The redshift evolution of volumetric rates shows an ambiguous trend, indicating that the population of non-repeaters is still not well understood. In the future, more samples and accurate measurements are needed to clarify these trends.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 14:08:49 GMT" } ]
2025-04-21T00:00:00
[ [ "Ma", "Wenqi", "" ], [ "Gao", "Zhifu", "" ], [ "Li", "Biaopeng", "" ], [ "Yao", "Jumei", "" ], [ "Wang", "Fayin", "" ] ]
2504.13706
Gray Manicom
Gray Manicom, Emily Harvey, Joshua Looker, David Wu, Oliver Maclaren, Dion O' Neale
Modelling Immunity in Agent-based Models
29 pages, 5 figures
null
null
null
q-bio.PE physics.soc-ph
http://creativecommons.org/licenses/by/4.0/
Vaccination policies play a central role in public health interventions and models are often used to assess the effectiveness of these policies. Many vaccines are leaky, in which case the observed vaccine effectiveness depends on the force of infection. Within models, the immunity parameters required for agent-based models to achieve observed vaccine effectiveness values are further influenced by model features such as its transmission algorithm, contact network structure, and approach to simulating vaccination. We present a method for determining parameters in agent-based models such that a set of target immunity values is achieved. We construct a dataset of desired population-level immunity values against various disease outcomes considering both vaccination and prior infection from COVID-19. This dataset incorporates immunological data, data collection methodologies, immunity models, and biological insights. We then describe how we choose minimal parameters for continuous waning immunity curves that result in those target values being realized in simulations. We use simulations of the household secondary attack rates to establish a relationship between the protection per infection attempt and overall immunity, thus accounting for the dependence of protection from acquisition on model features and the force of infection.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 14:09:39 GMT" } ]
2025-04-21T00:00:00
[ [ "Manicom", "Gray", "" ], [ "Harvey", "Emily", "" ], [ "Looker", "Joshua", "" ], [ "Wu", "David", "" ], [ "Maclaren", "Oliver", "" ], [ "Neale", "Dion O'", "" ] ]
2504.13707
Yichen Wu
Yichen Wu, Xudong Pan, Geng Hong and Min Yang
OpenDeception: Benchmarking and Investigating AI Deceptive Behaviors via Open-ended Interaction Simulation
null
null
null
null
cs.AI cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As the general capabilities of large language models (LLMs) improve and agent applications become more widespread, the underlying deception risks urgently require systematic evaluation and effective oversight. Unlike existing evaluation which uses simulated games or presents limited choices, we introduce OpenDeception, a novel deception evaluation framework with an open-ended scenario dataset. OpenDeception jointly evaluates both the deception intention and capabilities of LLM-based agents by inspecting their internal reasoning process. Specifically, we construct five types of common use cases where LLMs intensively interact with the user, each consisting of ten diverse, concrete scenarios from the real world. To avoid ethical concerns and costs of high-risk deceptive interactions with human testers, we propose to simulate the multi-turn dialogue via agent simulation. Extensive evaluation of eleven mainstream LLMs on OpenDeception highlights the urgent need to address deception risks and security concerns in LLM-based agents: the deception intention ratio across the models exceeds 80%, while the deception success rate surpasses 50%. Furthermore, we observe that LLMs with stronger capabilities do exhibit a higher risk of deception, which calls for more alignment efforts on inhibiting deceptive behaviors.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 14:11:27 GMT" } ]
2025-04-21T00:00:00
[ [ "Wu", "Yichen", "" ], [ "Pan", "Xudong", "" ], [ "Hong", "Geng", "" ], [ "Yang", "Min", "" ] ]
2504.13708
Antonio Lorenzin
Tobias Fritz, Antonio Lorenzin
Categories of abstract and noncommutative measurable spaces
61 pages
null
null
null
math.OA math.CT math.PR quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Gelfand duality is a fundamental result that justifies thinking of general unital $C^*$-algebras as noncommutative versions of compact Hausdorff spaces. Inspired by this perspective, we investigate what noncommutative measurable spaces should be. This leads us to consider categories of monotone $\sigma$-complete $C^*$-algebras as well as categories of Boolean $\sigma$-algebras, which can be thought of as abstract measurable spaces. Motivated by the search for a good notion of noncommutative measurable space, we provide a unified overview of these categories, alongside those of measurable spaces, and formalize their relationships through functors, adjunctions and equivalences. This includes an equivalence between Boolean $\sigma$-algebras and commutative monotone $\sigma$-complete $C^*$-algebras, as well as a Gelfand-type duality adjunction between the latter category and the category of measurable spaces. This duality restricts to two equivalences: one involving standard Borel spaces, which are widely used in probability theory, and another involving the more general Baire measurable spaces. Moreover, this result admits a probabilistic version, where the morphisms are $\sigma$-normal cpu maps and Markov kernels, respectively. We hope that these developments can also contribute to the ongoing search for a well-behaved Markov category for measure-theoretic probability beyond the standard Borel setting - an open problem in the current state of the art.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 14:12:40 GMT" } ]
2025-04-21T00:00:00
[ [ "Fritz", "Tobias", "" ], [ "Lorenzin", "Antonio", "" ] ]
2504.13709
Swarnajit Chatterjee
Aditya Kumar Dutta, Matthieu Mangeat, Heiko Rieger, Raja Paul, Swarnajit Chatterjee
Stability of flocking in the reciprocal two-species Vicsek model: Effects of relative population, motility, and noise
16 pages, 18 figures
null
null
null
cond-mat.stat-mech
http://creativecommons.org/licenses/by-nc-nd/4.0/
Natural flocks need to cope with various forms of heterogeneities, for instance, their composition, motility, interaction, or environmental factors. Here, we study the effects of such heterogeneities on the flocking dynamics of the reciprocal two-species Vicsek model [Phys. Rev. E 107, 024607 (2023)], which comprises two groups of self-propelled agents with anti-aligning inter-species interactions and exhibits either parallel or anti-parallel flocking states. The parallel and anti-parallel flocking states vanish upon reducing the size of one group, and the system transitions to a single-species flock of the majority species. At sufficiently low noise (or high density), the minority species can exhibit collective behavior, anti-aligning with the liquid state of the majority species. Unequal self-propulsion speeds of the two species strongly encourage anti-parallel flocking over parallel flocking. However, when activity landscapes with region-dependent motilities are introduced, parallel flocking is retained if the faster region is given more space, highlighting the role of environmental constraints. Under noise heterogeneity, the colder species (subjected to lower noise) attain higher band velocity compared to the hotter one, temporarily disrupting any parallel flocking, which is subsequently restored. These findings collectively reveal how different forms of heterogeneity, both intrinsic and environmental, can qualitatively reshape flocking behavior in this class of reciprocal two-species models.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 14:13:26 GMT" } ]
2025-04-21T00:00:00
[ [ "Dutta", "Aditya Kumar", "" ], [ "Mangeat", "Matthieu", "" ], [ "Rieger", "Heiko", "" ], [ "Paul", "Raja", "" ], [ "Chatterjee", "Swarnajit", "" ] ]
2504.13710
Heng Liu
Heng Liu, Guanghui Li, Mingqi Gao, Xiantong Zhen, Feng Zheng, Yang Wang
Few-Shot Referring Video Single- and Multi-Object Segmentation via Cross-Modal Affinity with Instance Sequence Matching
23 pages, 10 figures
null
null
null
cs.CV
http://creativecommons.org/licenses/by-nc-sa/4.0/
Referring video object segmentation (RVOS) aims to segment objects in videos guided by natural language descriptions. We propose FS-RVOS, a Transformer-based model with two key components: a cross-modal affinity module and an instance sequence matching strategy, which extends FS-RVOS to multi-object segmentation (FS-RVMOS). Experiments show FS-RVOS and FS-RVMOS outperform state-of-the-art methods across diverse benchmarks, demonstrating superior robustness and accuracy.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 14:19:07 GMT" } ]
2025-04-21T00:00:00
[ [ "Liu", "Heng", "" ], [ "Li", "Guanghui", "" ], [ "Gao", "Mingqi", "" ], [ "Zhen", "Xiantong", "" ], [ "Zheng", "Feng", "" ], [ "Wang", "Yang", "" ] ]
2504.13711
Remko Proesmans
Remko Proesmans, Thomas Lips and Francis wyffels
Self-Mixing Laser Interferometry: In Search of an Ambient Noise-Resilient Alternative to Acoustic Sensing
Submitted to the RoboAcoustics workshop at ICRA2025. arXiv admin note: text overlap with arXiv:2502.15390
null
null
null
cs.RO
http://creativecommons.org/licenses/by-nc-sa/4.0/
Self-mixing interferometry (SMI) has been lauded for its sensitivity in detecting microvibrations, while requiring no physical contact with its target. Microvibrations, i.e., sounds, have recently been used as a salient indicator of extrinsic contact in robotic manipulation. In previous work, we presented a robotic fingertip using SMI for extrinsic contact sensing as an ambient-noise-resilient alternative to acoustic sensing. Here, we extend the validation experiments to the frequency domain. We find that for broadband ambient noise, SMI still outperforms acoustic sensing, but the difference is less pronounced than in time-domain analyses. For targeted noise disturbances, analogous to multiple robots simultaneously collecting data for the same task, SMI is still the clear winner. Lastly, we show how motor noise affects SMI sensing more so than acoustic sensing, and that a higher SMI readout frequency is important for future work. Design and data files are available at https://github.com/RemkoPr/icra2025-SMI-tactile-sensing.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 14:20:14 GMT" } ]
2025-04-21T00:00:00
[ [ "Proesmans", "Remko", "" ], [ "Lips", "Thomas", "" ], [ "wyffels", "Francis", "" ] ]
2504.13712
Hidekazu Yoshioka
Hidekazu Yoshioka
Theoretical and computational investigations of superposed interacting affine and more complex processes
null
null
null
null
math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Non-Markovian long memory processes arise from numerous science and engineering problems. The Markovian lift is an effective mathematical technique that transforms a non-Markov process into an infinite-dimensional Markov process to which a broad range of theoretical and computational results can be potentially applied. One challenge in Markovian lifts is that the resulting Markovian system has multiple time scales ranging from infinitely small to infinitely large; therefore, a numerical method that consistently deals with them is required. However, such an approach has not been well studied for the superposition of affine or more complex jump-diffusion processes driven by L\'evy bases. We address this issue based on recently developed exact discretization methods for affine diffusion and jump processes. A nominal superposition process consisting of an infinite number of interacting affine processes was considered, along with its finite-dimensional version and associated generalized Riccati equations. We examine the computational performance of the proposed numerical scheme based on exact discretization methods through comparisons with the analytical results. We also numerically investigate a more complex model arising in the environmental sciences and some extended cases in which superposed processes belong to a class of nonlinear processes that generalize affine processes.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 14:21:01 GMT" } ]
2025-04-21T00:00:00
[ [ "Yoshioka", "Hidekazu", "" ] ]
2504.13714
Oguz Umut Salman
Jalal Smiri and Oguz Umut Salman and Ioan R. Ionescu
Orientation attractors in velocity gradient driven processes for large plastic deformations of crystals
arXiv admin note: text overlap with arXiv:2504.03565
null
null
null
cond-mat.mtrl-sci
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study lattice orientation attractors, also referred to as preferred or ideal orientations, in crystalline materials, and how they can be used to predict the final texture of polycrystals after manufacturing processes. By treating Crystal Plasticity (CP) in an Eulerian framework, rather than traditional Lagrangian approaches, we overcome the significant challenges associated with lattice distortion, enabling accurate simulations of material behavior under large deformations. This Eulerian perspective allows us to track the evolution of crystallographic orientations directly in the spatial domain, providing crucial insights into texture development. The CP models employed here capture the microstructural evolution in both mono- and polycrystalline materials, with particular emphasis on velocity gradient driven processes. Our linear stability analysis strategy, while applicable to general CP formulations, is demonstrated using a simplified rigid-(visco)-plastic 2-D model with three slip systems. This approach successfully predicts the lattice orientation attractors for very large strains (exceeding 50$\%$) by analyzing how different slip systems interact under applied loads. Three numerical simulations illustrate the theory's effectiveness: polycrystal deformation under homogeneous velocity gradient loading, void evolution in a monocrystal under non-homogeneous loading, and slip band formation during uni-axial traction. High-resolution CP simulations, enhanced through re-meshing techniques, further validate our findings on how initial crystallographic orientations, deformation mechanisms, and loading conditions affect the evolution of orientation attractors and ultimate crystal texture.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 14:32:33 GMT" } ]
2025-04-21T00:00:00
[ [ "Smiri", "Jalal", "" ], [ "Salman", "Oguz Umut", "" ], [ "Ionescu", "Ioan R.", "" ] ]
2504.13715
Giovanni Caldarelli
Alberto Guandalini, Giovanni Caldarelli, Francesco Macheda and Francesco Mauri
Excitonic effects in phonons: reshaping the graphene Kohn anomalies and lifetimes
null
null
null
null
cond-mat.mtrl-sci cond-mat.mes-hall
http://creativecommons.org/licenses/by/4.0/
We develop an ab initio framework that captures the impact of electron-electron and electron-hole interactions on phonon properties. This enables the inclusion of excitonic effects in the optical phonon dispersions and lifetimes of graphene, both near the center ($\Gamma$) and at the border (K) of the Brillouin zone, at phonon momenta relevant for Raman scattering and for the onset of the intrinsic electrical resistivity. Near K, we find a phonon red-shift of ~150 $cm^{-1}$ and a 10x enhancement of the group velocity, together with a 5x increase in linewidths due to a 26x increase of the electron-phonon matrix elements. These effects persist for doping $2E_{F} < {\hbar}{\omega}_{ph}$ and are quenched at higher dopings. Near $\Gamma$, the excitonic effects are minor because of the gauge field nature of the electron-phonon coupling at small phonon momentum.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 14:32:36 GMT" } ]
2025-04-21T00:00:00
[ [ "Guandalini", "Alberto", "" ], [ "Caldarelli", "Giovanni", "" ], [ "Macheda", "Francesco", "" ], [ "Mauri", "Francesco", "" ] ]
2504.13716
Shalom Eliahou
Shalom Eliahou and Jean-Louis Verger-Gaugry
The number system in rational base $3/2$ and the $3x+1$ problem
9 pages. To appear in Comptes Rendus. Math\'ematique. Acad\'emie des Sciences, Paris
null
null
null
math.NT
http://creativecommons.org/licenses/by/4.0/
The representation of numbers in rational base $p/q$ was introduced in 2008 by Akiyama, Frougny & Sakarovitch, with a special focus on the case $p/q=3/2$. Unnoticed since then, natural questions related to representations in that specific base turn out to intimately involve the Collatz $3x+1$ function. Our purpose in this note is to expose these links and motivate further research into them.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 14:35:35 GMT" } ]
2025-04-21T00:00:00
[ [ "Eliahou", "Shalom", "" ], [ "Verger-Gaugry", "Jean-Louis", "" ] ]
2504.13717
Gianluca Carloni
Gianluca Carloni
Human-aligned Deep Learning: Explainability, Causality, and Biological Inspiration
Personal adaptation and expansion of doctoral thesis (originally submitted in Oct 2024, revisioned in Jan 2025)
null
null
null
cs.CV cs.AI cs.LG eess.IV q-bio.NC
http://creativecommons.org/licenses/by/4.0/
This work aligns deep learning (DL) with human reasoning capabilities and needs to enable more efficient, interpretable, and robust image classification. We approach this from three perspectives: explainability, causality, and biological vision. Introduction and background open this work before diving into operative chapters. First, we assess neural networks' visualization techniques for medical images and validate an explainable-by-design method for breast mass classification. A comprehensive review at the intersection of XAI and causality follows, where we introduce a general scaffold to organize past and future research, laying the groundwork for our second perspective. In the causality direction, we propose novel modules that exploit feature co-occurrence in medical images, leading to more effective and explainable predictions. We further introduce CROCODILE, a general framework that integrates causal concepts, contrastive learning, feature disentanglement, and prior knowledge to enhance generalization. Lastly, we explore biological vision, examining how humans recognize objects, and propose CoCoReco, a connectivity-inspired network with context-aware attention mechanisms. Overall, our key findings include: (i) simple activation maximization lacks insight for medical imaging DL models; (ii) prototypical-part learning is effective and radiologically aligned; (iii) XAI and causal ML are deeply connected; (iv) weak causal signals can be leveraged without a priori information to improve performance and interpretability; (v) our framework generalizes across medical domains and out-of-distribution data; (vi) incorporating biological circuit motifs improves human-aligned recognition. This work contributes toward human-aligned DL and highlights pathways to bridge the gap between research and clinical adoption, with implications for improved trust, diagnostic accuracy, and safe deployment.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 14:40:58 GMT" } ]
2025-04-21T00:00:00
[ [ "Carloni", "Gianluca", "" ] ]
2504.13719
Andi Pina
A.R. Pi\~na, Shams El-Adawy, Mike Verostek, Brett T. Boyle, Mateo Cacheiro, Matt Lawler, Namitha Pradeep, Ella Watts, Colin G. West, H.J. Lewandowski, Benjamin M. Zwickl
Landscape of Quantum Information Science and Engineering Education: From Physics Foundations to Interdisciplinary Frontiers
23 pages, 7 figures, 5 appendices
null
null
null
physics.ed-ph quant-ph
http://creativecommons.org/licenses/by/4.0/
Quantum Information Science and Engineering (QISE) is rapidly gaining interest from those within many disciplines and higher education needs to adapt to the changing landscape. Although QISE education still has a strong presence and roots in physics, the field is becoming increasingly interdisciplinary. There is a need to understand the presence of QISE instruction and quantum-related instruction across all disciplines in order to figure out where QISE education is already happening and where it could be expanded. Although there is recent work that characterizes introductory QISE courses, there is no holistic picture of the landscape of QISE and quantum-related education in the United States. We analyzed course catalogs from 1,456 U.S. institutions. We found 61 institutions offering QISE degree programs, mostly at PhD-granting schools, with physics, electrical and computer engineering (ECE), and computer science(CS) as their primary contributors . Across all institutions, we identified over 8,000 courses mentioning 'quantum,' but about one-third of institutions in our study had none. We also found over 500 dedicated QISE courses, concentrated in PhD-granting institutions, primarily in physics, ECE, and CS. Physics leads in offering both general quantum-related ($\sim$4,700) and QISE-specific ($\sim$200) courses. Across multiple disciplines, we see that QISE topics are being introduced in courses not fully dedicated to QISE, which may be a productive strategy for increasing access to QISE education. Our dataset and analysis provide the most comprehensive overview to date of quantum education across US higher education. To ensure broad access, all data are publicly available and downloadable at quantumlandscape.streamlit.app. We hope these findings will support and guide future efforts in curriculum design, workforce development, and education policy across the quantum ecosystem.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 14:41:58 GMT" } ]
2025-04-21T00:00:00
[ [ "Piña", "A. R.", "" ], [ "El-Adawy", "Shams", "" ], [ "Verostek", "Mike", "" ], [ "Boyle", "Brett T.", "" ], [ "Cacheiro", "Mateo", "" ], [ "Lawler", "Matt", "" ], [ "Pradeep", "Namitha", "" ], [ "Watts", "Ella", "" ], [ "West", "Colin G.", "" ], [ "Lewandowski", "H. J.", "" ], [ "Zwickl", "Benjamin M.", "" ] ]
2504.13720
Edoardo Provenzi
Michel Berthier, Valerie Garcin, Nicoletta Prencipe and Edoardo Provenzi
The relativity of color perception
null
Journal of Mathematical Psychology, 103, 102562, 2021
null
null
q-bio.NC eess.IV quant-ph
http://creativecommons.org/licenses/by/4.0/
Physical colors, i.e. reflected or emitted lights entering the eyes from a visual environment, are converted into perceived colors sensed by humans by neurophysiological mechanisms. These processes involve both three types of photoreceptors, the LMS cones, and spectrally opponent and non-opponent interactions resulting from the activity rates of ganglion and lateral geniculate nucleus cells. Thus, color perception is a phenomenon inherently linked to an experimental environment (the visual scene) and an observing apparatus (the human visual system). This is clearly reminiscent of the conceptual foundation of both relativity and quantum mechanics, where the link is between a physical system and the measuring instruments. The relationship between color perception and relativity was explicitly examined for the first time by the physicist H. Yilmaz in 1962 from an experimental point of view. The main purpose of this contribution is to present a rigorous mathematical model that, by taking into account both trichromacy and color opponency, permits to explain on a purely theoretical basis the relativistic color perception phenomena argued by Yilmaz. Instead of relying directly on relativistic considerations, we base our theory on a quantum interpretation of color perception together with just one assumption, called trichromacy axiom, that summarizes well-established properties of trichromatic color vision within the framework of Jordan algebras. We show how this approach allows us to reconcile trichromacy with Hering's opponency and also to derive the relativistic properties of perceived colors without any additional mathematical or experimental assumption.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 14:46:29 GMT" } ]
2025-04-21T00:00:00
[ [ "Berthier", "Michel", "" ], [ "Garcin", "Valerie", "" ], [ "Prencipe", "Nicoletta", "" ], [ "Provenzi", "Edoardo", "" ] ]
2504.13721
Nozomi Soya
Nozomi Soya, Michihiro Yamada, Kohei Hamaya, Kazuya Ando
Isotropic and anisotropic spin-dependent transport in epitaxial Fe$_3$Si
null
null
null
null
cond-mat.mes-hall cond-mat.mtrl-sci
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate spin-dependent transport phenomena in epitaxially grown Fe$_3$Si films, focusing on the anisotropic magnetoresistance (AMR), planar Hall effect (PHE), anomalous Hall effect (AHE), and spin Hall effect (SHE). While the sign and magnitude of the AMR and PHE depend on the current orientation relative to the crystallographic axes, the AHE and SHE remain nearly independent of the current orientation. The anisotropic AMR and PHE are attributed to current and magnetization dependent local band properties, including band crossing/anticrossing at specific $k$ points. In contrast, the isotropic AHE and SHE arise from the Berry curvature integrated over the entire Brillouin zone, which cancels local variations. These findings highlight the interplay between symmetry, band structure, and magnetization in the spin-dependent transport phenomena.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 14:46:52 GMT" } ]
2025-04-21T00:00:00
[ [ "Soya", "Nozomi", "" ], [ "Yamada", "Michihiro", "" ], [ "Hamaya", "Kohei", "" ], [ "Ando", "Kazuya", "" ] ]
2504.13722
H. Van Dyke Parunak
H. Van Dyke Parunak
$O(p \log d)$ Subgraph Isomorphism using Stigmergic Swarming Agents
null
null
null
null
cs.MA cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Subgraph isomorphism compares two graphs (sets of nodes joined by edges) to determine whether they contain a common subgraph. Many applications require identifying the subgraph, not just deciding its existence. A particularly common use case, using graphs with labeled nodes, seeks to find instances of a smaller pattern graph with $p$ nodes in the larger data graph with $d$ nodes. The problem is NP-complete, so that na\"ive solutions are exponential in $p + d$. A wide range of heuristics have been proposed, with the best complexity $O(p^2d^2)$. This paper outlines ASSIST (Approximate Swarming Subgraph Isomorphism through Stigmergy), inspired by the ant colony optimization approach to the traveling salesperson problem. ASSIST is linearithmic, $O(p \log d)$, and also supports matching problems (such as temporally ordered edges, inexact matches, and missing nodes or edges in the data graph) that frustrate other heuristics.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 14:47:49 GMT" } ]
2025-04-21T00:00:00
[ [ "Parunak", "H. Van Dyke", "" ] ]
2504.13723
Yanqing Xu
Yanqing Xu, Zhiguo Ding, Donghong Cai, and Vincent W.S. Wong
QoS-Aware NOMA Design for Downlink Pinching-Antenna Systems
This paper has been submitted for possible publication
null
null
null
eess.SP
http://creativecommons.org/licenses/by-nc-nd/4.0/
Pinching antennas, implemented by applying small dielectric particles on a waveguide, have emerged as a promising flexible-antenna technology ideal for next-generation wireless communications systems. Unlike conventional flexible-antenna systems, pinching antennas offer the advantage of creating line-of-sight links by enabling antennas to be activated on the waveguide at a location close to the user. This paper investigates a typical two-user non-orthogonal multiple access (NOMA) downlink scenario, where multiple pinching antennas are activated on a single dielectric waveguide to assist NOMA transmission. We formulate the problem of maximizing the data rate of one user subject to the quality-of-service requirement of the other user by jointly optimizing the antenna locations and power allocation coefficients. The formulated problem is nonconvex and difficult to solve due to the impact of antenna locations on large-scale path loss and two types of phase shifts, namely in-waveguide phase shifts and free space propagation phase shifts. To this end, we propose an iterative algorithm based on block coordinate descent and successive convex approximation techniques. Moreover, we consider the special case with a single pinching antenna, which is a simplified version of the multi-antenna case. Although the formulated problem is still nonconvex, by using the inherent features of the formulated problem, we derive the global optimal solution in closed-form, which offers important insights on the performance of pinching-antenna systems. Simulation results demonstrate that the pinching-antenna system significantly outperforms conventional fixed-position antenna systems, and the proposed algorithm achieves performance comparable to the computationally intensive exhaustive search based approach.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 14:49:08 GMT" } ]
2025-04-21T00:00:00
[ [ "Xu", "Yanqing", "" ], [ "Ding", "Zhiguo", "" ], [ "Cai", "Donghong", "" ], [ "Wong", "Vincent W. S.", "" ] ]
2504.13724
Jiang Zhu
Michael J. Ramsey-Musolf, Jiang Zhu
Bubble wall velocity from Kadanoff-Baym equations: fluid dynamics and microscopic interactions
39 pages, 6 figures
null
null
null
hep-ph hep-th
http://creativecommons.org/licenses/by/4.0/
We establish a first principles, systematic framework for determining the bubble wall velocity during a first order cosmological phase transition. This framework, based on non-local Kadanoff-Baym equations, incorporates both macroscopic fluid dynamics and microscopic interactions between the bubble wall and particles in the plasma. Previous studies have generally focused on one of these two sources of friction pressure that govern the wall velocity. As a precursor, we utilize background field quantum field theory to obtain the relevant local Boltzmann equations, from which we derive the forces associated with variation of particle masses across the bubble wall and the microscopic wall-particle interactions. We subsequently show how these equations emerge from the Kadanoff-Baym framework under various approximations. We apply this framework in the ballistic regime to compute the new friction force arising from the $2\rightarrow 2$ scattering processes in scalar field theory. We obtain a linear relationship between this force and the Lorentz factor $\gamma_w$ that would preclude runaway bubbles with such effects.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 14:50:01 GMT" } ]
2025-04-21T00:00:00
[ [ "Ramsey-Musolf", "Michael J.", "" ], [ "Zhu", "Jiang", "" ] ]
2504.13725
Wen-Yuan Ai
Wen-Yuan Ai, Matthias Carosi, Bjorn Garbrecht, Carlos Tamarit and Miguel Vanvlasselaer
Bubble wall dynamics from nonequilibrium quantum field theory
63 pages, 6 figures
null
null
MITP-25-029
hep-ph astro-ph.CO hep-th
http://creativecommons.org/licenses/by/4.0/
We derive the coupled dynamics between the bubble wall and the plasma from first principles using nonequilibrium quantum field theory. The commonly used equation of motion of the bubble wall in the kinetic approach is shown to be incomplete. In the language of the two-particle-irreducible effective action, the conventional equation misses higher-loop terms generated by the condensate-particle type vertices (e.g.,~$\varphi\phi\chi^2$, where $\varphi$ is the background field describing the bubble wall, $\phi$ the corresponding particle excitation and $\chi$ another particle species in the plasma). From the missing terms, we identify an additional dissipative friction which is contributed by particle production processes from the condensate-particle type vertices. We also show how other transmission processes beyond the 1-to-1 elementary transmission studied in the literature for ultrarelativistic bubble walls, e.g., 1-to-1 mixing and 1-to-2 transition radiation, can be understood from the kinetic approach.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 14:50:03 GMT" } ]
2025-04-21T00:00:00
[ [ "Ai", "Wen-Yuan", "" ], [ "Carosi", "Matthias", "" ], [ "Garbrecht", "Bjorn", "" ], [ "Tamarit", "Carlos", "" ], [ "Vanvlasselaer", "Miguel", "" ] ]
2504.13726
Xiaowan Li
Lin Yuan, Xiaowan Li, Yan Zhang, Jiawei Zhang, Hongbo Li, Xinbo Gao
MLEP: Multi-granularity Local Entropy Patterns for Universal AI-generated Image Detection
9 pages, 6 figures
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Advancements in image generation technologies have raised significant concerns about their potential misuse, such as producing misinformation and deepfakes. Therefore, there is an urgent need for effective methods to detect AI-generated images (AIGI). Despite progress in AIGI detection, achieving reliable performance across diverse generation models and scenes remains challenging due to the lack of source-invariant features and limited generalization capabilities in existing methods. In this work, we explore the potential of using image entropy as a cue for AIGI detection and propose Multi-granularity Local Entropy Patterns (MLEP), a set of entropy feature maps computed across shuffled small patches over multiple image scaled. MLEP comprehensively captures pixel relationships across dimensions and scales while significantly disrupting image semantics, reducing potential content bias. Leveraging MLEP, a robust CNN-based classifier for AIGI detection can be trained. Extensive experiments conducted in an open-world scenario, evaluating images synthesized by 32 distinct generative models, demonstrate significant improvements over state-of-the-art methods in both accuracy and generalization.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 14:50:23 GMT" } ]
2025-04-21T00:00:00
[ [ "Yuan", "Lin", "" ], [ "Li", "Xiaowan", "" ], [ "Zhang", "Yan", "" ], [ "Zhang", "Jiawei", "" ], [ "Li", "Hongbo", "" ], [ "Gao", "Xinbo", "" ] ]
2504.13727
Robert Rosenbaum
Yue Wan and Robert Rosenbaum
High-dimensional dynamics in low-dimensional networks
null
null
null
null
math.DS math-ph math.MP q-bio.NC
http://creativecommons.org/licenses/by/4.0/
Many networks that arise in nature and applications are effectively low-dimensional in the sense that their connectivity structure is dominated by a few dimensions. It is natural to expect that dynamics on such networks might also be low-dimensional. Indeed, recent results show that low-rank networks produce low-dimensional dynamics whenever the network is isolated from external perturbations or noise. However, networks in nature are rarely isolated. We show that recurrent networks with low-rank structure often produce high-dimensional dynamics in the presence of high-dimensional perturbations. Counter to intuition, dynamics in these networks are \textit{suppressed} in directions that are aligned with the network's low-rank structure, a phenomenon we term "low-rank suppression." Our results clarify important, but counterintuitive relationships between a network's connectivity structure and the structure of the dynamics it generates.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 14:54:45 GMT" } ]
2025-04-21T00:00:00
[ [ "Wan", "Yue", "" ], [ "Rosenbaum", "Robert", "" ] ]
2504.13728
Ana\"is Vallet
Ana\"is Vallet and St\'ephane Blanco and Coline Chevallier and Francis Eustache and Jacques Gautrais and Jean-Yves Grandpeix and Jean-Louis Joly and Shailendra Segobin and Pierre Gagnepain
Sensitivity analysis enlightens effects of connectivity in a Neural Mass Model under Control-Target mode
null
null
null
null
q-bio.NC
http://creativecommons.org/licenses/by-nc-nd/4.0/
Biophysical models of human brain represent the latter as a graph of inter-connected neural regions. Building from the model by Naskar et al. (Network Neuroscience 2021), our motivation was to understand how these brain regions can be connected at neural level to implement some inhibitory control, which calls for inhibitory connectivity rarely considered in such models. In this model, regions are made of inter-connected excitatory and inhibitory pools of neurons, but are long-range connected only via excitatory pools (mutual excitation). We thus extend this model by generalizing connectivity, and we analyse how connectivity affects the behaviour of this model. Focusing on the simplest paradigm made of a Control area and a Target area, we explore four typical kinds of connectivity: mutual excitation, Target inhibition by Control, Control inhibition by Target, and mutual inhibition. For this, we build an analytical sensitivity framework, nesting up sensitivities of isolated pools, of isolated regions, and of the full system. We show that inhibitory control can emerge only in Target inhibition by Control and mutual inhibition connectivities. We next offer an analysis of how the model sensitivities depends on connectivity structure, depending on a parameter controling the strength of the self-inhibition within Target region. Finally, we illustrate the effect of connectivity structure upon control effectivity in response to an external forcing in the Control area. Beyond the case explored here, our methodology to build analytical sensitivities by nesting up levels (pool, region, system) lays the groundwork for expressing nested sensitivities for more complex network configurations, either for this model or any other one.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 14:54:57 GMT" } ]
2025-04-21T00:00:00
[ [ "Vallet", "Anaïs", "" ], [ "Blanco", "Stéphane", "" ], [ "Chevallier", "Coline", "" ], [ "Eustache", "Francis", "" ], [ "Gautrais", "Jacques", "" ], [ "Grandpeix", "Jean-Yves", "" ], [ "Joly", "Jean-Louis", "" ], [ "Segobin", "Shailendra", "" ], [ "Gagnepain", "Pierre", "" ] ]
2504.13729
Anjala Mullaparambil Babu
Zain H. Saleem, Anil Shaji, Anjala M Babu, Da-Wei Luo, Quinn Langfitt, Ting Yu and Stephen K. Gray
Quantum Fisher Information and the Curvature of Entanglement
7 pages, 7 figures
null
null
null
quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We explore the relationship between quantum Fisher information (QFI) and the second derivative of concurrence with respect to the coupling between two qubits, referred to as the curvature of entanglement (CoE). For a two-qubit quantum probe used to estimate the coupling constant appearing in a simple interaction Hamiltonian, we show that at certain times CoE = -QFI; these times can be associated with the concurrence, viewed as a function of the coupling parameter, being a maximum. We examine the time evolution of the concurrence of the eigenstates of the symmetric logarithmic derivative and show that, for both initially separable and initially entangled states, simple product measurements suffice to saturate the quantum Cram\'er-Rao bound when CoE = -QFI, while otherwise, in general, entangled measurements are required giving an operational significance to the points in time when CoE = -QFI.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 14:55:42 GMT" } ]
2025-04-21T00:00:00
[ [ "Saleem", "Zain H.", "" ], [ "Shaji", "Anil", "" ], [ "Babu", "Anjala M", "" ], [ "Luo", "Da-Wei", "" ], [ "Langfitt", "Quinn", "" ], [ "Yu", "Ting", "" ], [ "Gray", "Stephen K.", "" ] ]
2504.13730
Paul K. Mandal
Paul K. Mandal, Cole Leo, Connor Hurley
Controlled Territory and Conflict Tracking (CONTACT): (Geo-)Mapping Occupied Territory from Open Source Intelligence
7 pages, 1 figure, 1 table
null
null
null
cs.CL cs.AI cs.LG
http://creativecommons.org/licenses/by-nc-nd/4.0/
Open-source intelligence provides a stream of unstructured textual data that can inform assessments of territorial control. We present CONTACT, a framework for territorial control prediction using large language models (LLMs) and minimal supervision. We evaluate two approaches: SetFit, an embedding-based few-shot classifier, and a prompt tuning method applied to BLOOMZ-560m, a multilingual generative LLM. Our model is trained on a small hand-labeled dataset of news articles covering ISIS activity in Syria and Iraq, using prompt-conditioned extraction of control-relevant signals such as military operations, casualties, and location references. We show that the BLOOMZ-based model outperforms the SetFit baseline, and that prompt-based supervision improves generalization in low-resource settings. CONTACT demonstrates that LLMs fine-tuned using few-shot methods can reduce annotation burdens and support structured inference from open-ended OSINT streams. Our code is available at https://github.com/PaulKMandal/CONTACT/.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 14:57:07 GMT" } ]
2025-04-21T00:00:00
[ [ "Mandal", "Paul K.", "" ], [ "Leo", "Cole", "" ], [ "Hurley", "Connor", "" ] ]
2504.13731
Yixin Wang
Yixin Wang, Fanhui Meng and Xiao Ma
Systematic Bernoulli Generator Matrix Codes
null
null
null
null
cs.IT math.IT
http://creativecommons.org/licenses/by/4.0/
This paper is concerned with the systematic Bernoulli generator matrix~(BGM) codes, which have been proved to be capacity-achieving over binary-input output-symmetric~(BIOS) channels in terms of bit-error rate~(BER). We prove that the systematic BGM codes are also capacity-achieving over BIOS channels in terms of frame-error rate (FER). To this end, we present a new framework to prove the coding theorems for binary linear codes. Different from the widely-accepted approach via ensemble enlargement, the proof directly applies to the systematic binary linear codes. The new proof indicates that the pair-wise independence condition is not necessary for proving the binary linear code ensemble to achieve the capacity of the BIOS channel. The Bernoulli parity-check~(BPC) codes, which fall within the framework of the systematic BGM codes with parity-check bits known at the decoder can also be proved to achieve the capacity. The presented framework also reveals a new mechanism pertained to the systematic linear codes that the systematic bits and the corresponding parity-check bits play different roles. Precisely, the noisy systematic bits are used to limit the list size of candidate codewords, while the noisy parity-check bits are used to select from the list the maximum likelihood codeword. For systematic BGM codes with finite length, we derive the lower bounds on the BER and FER, which can be used to predict the error floors. Numerical results show that the systematic BGM codes match well with the derived error floors. The performance in water-fall region can be improved with approaches in statistical physics and the error floors can be significantly improved by implementing the concatenated codes with the systematic BGM codes as the inner codes.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 14:58:50 GMT" } ]
2025-04-21T00:00:00
[ [ "Wang", "Yixin", "" ], [ "Meng", "Fanhui", "" ], [ "Ma", "Xiao", "" ] ]
2504.13732
Chunsheng Luo
C.S.Luo, X.D.Tang, C.Henkel, K.M.Menten, Y.Sun, Y.Gong, X.W.Zheng, D.L.Li, Y.X.He, X.Lu, Y.P.Ao, X.P.Chen, T.Liu, K.Wang, J.W.Wu, J. Esimbek, J.J.Zhou, J.J.Qiu, X.Zhao, J.S.Li, Q.Zhao, and L.D.Liu
Molecular Clouds at the Edge of the Galaxy I. Variation of CO J=2-1/1-0 Line Ratio
null
null
null
null
astro-ph.GA
http://creativecommons.org/licenses/by/4.0/
The Galactic edge at Galactocentric distances of 14\,--\,22\,kpc provides an ideal laboratory to study molecular clouds in an environment that is different from the solar neighborhood, due to its lower gas density, lower metallicity, and little or no perturbation from the spiral arms. Observations of CO\,($J$\,=\,2--1) spectral lines were carried out towards 72 molecular clouds located at the Galactic edge using the IRAM\,30\,m telescope. Combined with CO\,($J$\,=\,1--0) data from the MWISP project, we investigate the variations of $R_{21}$ across these Galactic edge clouds, with $R_{21}$ representing CO(2-1)/CO(1-0) integrated intensity ratios. These are found to range from 0.3 to 3.0 with a mean of 1.0\,$\pm$\,0.1 in the Galactic edge clouds. The proportions of very low ratio gas (VLRG; $R_{21}$\,<\,0.4), low ratio gas (LRG; 0.4\,$\le$\,$R_{21}$\,<\,0.7), high ratio gas (HRG; 0.7\,$\le$\,$R_{21}$\,<\,1.0), and very high ratio gas (VHRG; $R_{21}$\,$\ge$\,1.0) are 6.9\%, 29.2\%, 26.4\%, and 37.5\%, respectively, indicating a significant presence of high $R_{21}$ ratio molecular gas within these regions. In our Galaxy, the $R_{21}$ ratio exhibits a gradient of initial radial decline followed by a high dispersion with increasing Galacticentric distance and a prevalence for high ratio gas. There is no apparent systematic variation within the Galactocentric distance range of 14 to 22\,kpc. A substantial proportion of HRG and VHRG is found to be associated with compact clouds and regions displaying star-forming activity, suggesting that the high $R_{21}$ ratios may stem from dense gas concentrations and recent episodes of star formation.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 15:00:34 GMT" } ]
2025-04-21T00:00:00
[ [ "Luo", "C. S.", "" ], [ "Tang", "X. D.", "" ], [ "Henkel", "C.", "" ], [ "Menten", "K. M.", "" ], [ "Sun", "Y.", "" ], [ "Gong", "Y.", "" ], [ "Zheng", "X. W.", "" ], [ "Li", "D. L.", "" ], [ "He", "Y. X.", "" ], [ "Lu", "X.", "" ], [ "Ao", "Y. P.", "" ], [ "Chen", "X. P.", "" ], [ "Liu", "T.", "" ], [ "Wang", "K.", "" ], [ "Wu", "J. W.", "" ], [ "Esimbek", "J.", "" ], [ "Zhou", "J. J.", "" ], [ "Qiu", "J. J.", "" ], [ "Zhao", "X.", "" ], [ "Li", "J. S.", "" ], [ "Zhao", "Q.", "" ], [ "Liu", "L. D.", "" ] ]
2504.13733
Yichen Liu
Yichen Liu
Dynamic Regularized CBDT: Variance-Calibrated Causal Boosting for Interpretable Heterogeneous Treatment Effects
Preprint version. 13 pages, 4 figures, 3 tables
null
null
null
cs.LG stat.ML
http://creativecommons.org/licenses/by/4.0/
Heterogeneous treatment effect estimation in high-stakes applications demands models that simultaneously optimize precision, interpretability, and calibration. Many existing tree-based causal inference techniques, however, exhibit high estimation errors when applied to observational data because they struggle to capture complex interactions among factors and rely on static regularization schemes. In this work, we propose Dynamic Regularized Causal Boosted Decision Trees (CBDT), a novel framework that integrates variance regularization and average treatment effect calibration into the loss function of gradient boosted decision trees. Our approach dynamically updates the regularization parameters using gradient statistics to better balance the bias-variance tradeoff. Extensive experiments on standard benchmark datasets and real-world clinical data demonstrate that the proposed method significantly improves estimation accuracy while maintaining reliable coverage of true treatment effects. In an intensive care unit patient triage study, the method successfully identified clinically actionable rules and achieved high accuracy in treatment effect estimation. The results validate that dynamic regularization can effectively tighten error bounds and enhance both predictive performance and model interpretability.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 15:02:06 GMT" } ]
2025-04-21T00:00:00
[ [ "Liu", "Yichen", "" ] ]
2504.13734
Hieu Minh Tran
Hieu Minh Tran, Sang Quang Dinh, and Trang Quynh Trieu
Expected statistical uncertainties at future $e^+e^-$ colliders
6 pages, 2 figures
null
null
null
hep-ph hep-ex nucl-ex
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In future colliders, the frontiers of luminosity and energy are extended to explore the physics of elementary particles at extremely high precision, and to discover new phenomena suggested from current experimental anomalies. In this letter, we present a simple method to estimate the expected statistical uncertainties of scattering cross sections at future colliders using their conceptual design reports. In particular, the expected statistical uncertainties of muon pair production cross section at the Future Circular Collider (FCC-ee) and the Circular Electron-Positron Collider (CEPC) are calculated. The results can be used to set a goal for systematic uncertainty improvement, to determine the standard model parameters accurately, and to identify the viable parameter space of new physics models.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 15:02:55 GMT" } ]
2025-04-21T00:00:00
[ [ "Tran", "Hieu Minh", "" ], [ "Dinh", "Sang Quang", "" ], [ "Trieu", "Trang Quynh", "" ] ]
2504.13735
Yujie Huang
Yujie Huang, Audrey Crozet, Toinon Vigier, Alexandre Bruckert, Patrick Le Callet, Pierre Lebranchu
Orientation and mobility test in virtual reality, a tool for quantitative assessment of functional vision: dataset and evaluation in healthy subjects
null
null
null
null
cs.HC
http://creativecommons.org/licenses/by/4.0/
The purpose of this study was to develop and evaluate a novel virtual reality seated orientation and mobility (VR-S-O&M) test protocol designed to assess functional vision. This study aims to provide a dataset of healthy subjects using this protocol and preliminary analyses. We introduced a VR-based O&M test protocol featuring a novel seated displacement method, diverse lighting conditions, and varying course configurations within a virtual environment. Normally sighted participants (N=42) completed the test, which required them to navigate a path and destroy identified obstacles. We assessed basic performance metrics, including time duration, number of missed objects, and time before the first step, under different environmental conditions to verify ecological validity. Additionally, we analyzed participants' behaviors regarding missed objects, demonstrating the potential of integrating behavioral and interactive data for a more precise functional vision assessment. Our VR-S-O&M test protocol, along with the first O&M behavior dataset, presents significant opportunities for developing more refined performance metrics for assessing functional vision and enhancing the quality of life.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 15:04:25 GMT" } ]
2025-04-21T00:00:00
[ [ "Huang", "Yujie", "" ], [ "Crozet", "Audrey", "" ], [ "Vigier", "Toinon", "" ], [ "Bruckert", "Alexandre", "" ], [ "Callet", "Patrick Le", "" ], [ "Lebranchu", "Pierre", "" ] ]
2504.13736
Ali Hojjat
Ali Hojjat, Janek Haberer, Tayyaba Zainab, Olaf Landsiedel
LimitNet: Progressive, Content-Aware Image Offloading for Extremely Weak Devices & Networks
This is the author's accepted manuscript. The Version of Record is available at: https://doi.org/10.1145/3643832.3661856
In Proceedings of the 22nd ACM International Conference on Mobile Systems, Applications, and Services (MobiSys '24), June 3-7, 2024, Minato-ku, Tokyo, Japan. ACM, New York, NY, USA
10.1145/3643832.3661856
null
cs.CV eess.IV
http://creativecommons.org/licenses/by-nc-nd/4.0/
IoT devices have limited hardware capabilities and are often deployed in remote areas. Consequently, advanced vision models surpass such devices' processing and storage capabilities, requiring offloading of such tasks to the cloud. However, remote areas often rely on LPWANs technology with limited bandwidth, high packet loss rates, and extremely low duty cycles, which makes fast offloading for time-sensitive inference challenging. Today's approaches, which are deployable on weak devices, generate a non-progressive bit stream, and therefore, their decoding quality suffers strongly when data is only partially available on the cloud at a deadline due to limited bandwidth or packet losses. In this paper, we introduce LimitNet, a progressive, content-aware image compression model designed for extremely weak devices and networks. LimitNet's lightweight progressive encoder prioritizes critical data during transmission based on the content of the image, which gives the cloud the opportunity to run inference even with partial data availability. Experimental results demonstrate that LimitNet, on average, compared to SOTA, achieves 14.01 p.p. (percentage point) higher accuracy on ImageNet1000, 18.01 pp on CIFAR100, and 0.1 higher [email protected] on COCO. Also, on average, LimitNet saves 61.24% bandwidth on ImageNet1000, 83.68% on CIFAR100, and 42.25% on the COCO dataset compared to SOTA, while it only has 4% more encoding time compared to JPEG (with a fixed quality) on STM32F7 (Cortex-M7).
[ { "version": "v1", "created": "Fri, 18 Apr 2025 15:04:53 GMT" } ]
2025-04-21T00:00:00
[ [ "Hojjat", "Ali", "" ], [ "Haberer", "Janek", "" ], [ "Zainab", "Tayyaba", "" ], [ "Landsiedel", "Olaf", "" ] ]
2504.13737
William Buchanan Prof
Jamie Gilchrist, William J. Buchanan and Keir Finlow-Bates
Breaking ECDSA with Two Affinely Related Nonces
null
null
null
null
cs.CR
http://creativecommons.org/licenses/by/4.0/
The security of the Elliptic Curve Digital Signature Algorithm (ECDSA) depends on the uniqueness and secrecy of the nonce, which is used in each signature. While it is well understood that nonce $k$ reuse across two distinct messages can leak the private key, we show that even if a distinct value is used for $k_2$, where an affine relationship exists in the form of: \(k_m = a \cdot k_n + b\), we can also recover the private key. Our method requires only two signatures (even over the same message) and relies purely on algebra, with no need for lattice reduction or brute-force search(if the relationship, or offset, is known). To our knowledge, this is the first closed-form derivation of the ECDSA private key from only two signatures over the same message, under a known affine relationship between nonces.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 15:05:22 GMT" } ]
2025-04-21T00:00:00
[ [ "Gilchrist", "Jamie", "" ], [ "Buchanan", "William J.", "" ], [ "Finlow-Bates", "Keir", "" ] ]
2504.13738
Stephan Stieberger
Xavier Kervyn and Stephan Stieberger
High Energy String Theory and the Celestial Sphere
28 pages, LaTeX, 2 figs
null
null
null
hep-th gr-qc
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We elaborate on a string world-sheet connection to flat space-time holography. More specifically, in the high energy (zero tension) limit of tree-level string scattering in flat backgrounds the underlying string world-sheets can be related to the celestial sphere, with the saddle points of the high energy string description representing points on the celestial sphere. We show that this picture continues to hold at all subleading orders in the quantum fluctuations around this classical configuration. As a consequence there is a dual description of the high energy limit of string theory as the large energy expansion on the celestial sphere organized by (light) higher spin modes. This approach points to an intrinsic construction of celestial conformal field theory (CFT) by relating it to a (free) world-sheet CFT of string theory. We also elaborate on the high energy representations of tree-level open and closed string amplitudes and work out their subleading corrections. Their number theoretic properties and relevance as amplitudes of tensionless strings are discussed.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 15:08:17 GMT" } ]
2025-04-21T00:00:00
[ [ "Kervyn", "Xavier", "" ], [ "Stieberger", "Stephan", "" ] ]
2504.13739
Xin-Xiang Ju
Xin-Xiang Ju, Bo-Hao Liu, Ya-Wen Sun, and Yang Zhao
Modular Hamiltonian of holographic time band states
22 pages, 6 figures
null
null
null
hep-th
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A holographic time band is a causal incomplete boundary spacetime subregion whose causal wedge is a causal complete bulk spacetime subregion. In an AdS$_3$ spacetime with a specifically modified IR geometry, its causal wedge coincides with its entanglement wedge, which suggests the existence of a local modular Hamiltonian for the holographic time band state. In this work, we construct the local modular Hamiltonian for holographic time bands using two independent methods: from the quantum information properties of the time band state and from the construction of consistent geometric modular flows. Both methods lead to the same unique result of the local modular Hamiltonian, reflecting the intrinsic property of the time band state. The entanglement first law has also been checked to hold for the simplest time band state. This is a substantial addition to the known holographic subsystems with a local modular Hamiltonian, beyond the few cases previously identified.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 15:08:45 GMT" } ]
2025-04-21T00:00:00
[ [ "Ju", "Xin-Xiang", "" ], [ "Liu", "Bo-Hao", "" ], [ "Sun", "Ya-Wen", "" ], [ "Zhao", "Yang", "" ] ]
2504.13740
Andrea Di Giusto
Andrea Di Giusto, Wim van Houtum, Alberto Ravagnani, Yan Wu
Equivalence of Serial and Parallel A-Posteriori Probabilities in the Decoding of DAB Systems
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivated by applications to digital audio broadcasting (DAB) systems, we study the a-posteriori probabilities (APPs) of the coded and information bits of the serial concatenation of multiple convolutional codewords. The main result of this correspondence is a proof that the APPs of the input bits do not change when considering the concatenation of multiple codewords as a received sequence. This is a purely theoretical result, which remains valid for every convolutional code, as long as the encoder goes back to the zero state at the end of each codeword. An equivalent heuristic for serial concatenation in Viterbi decoding is described. The applicability of our result to DAB systems, where interleaving and modulation are accounted for, is investigated through Matlab simulations. We show that the Bit Error Rate (BER) of the simulated DAB system does not change when decoding multiple transmitted codewords as one serially concatenated sequence, even when considering all the features of a DAB system.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 15:08:50 GMT" } ]
2025-04-21T00:00:00
[ [ "Di Giusto", "Andrea", "" ], [ "van Houtum", "Wim", "" ], [ "Ravagnani", "Alberto", "" ], [ "Wu", "Yan", "" ] ]
2504.13741
Min Li
Xingyu Zhao, Min Li, Ming-Min Zhao, Shihao Yan and Min-Jian Zhao
Sensing-Then-Beamforming: Robust Transmission Design for RIS-Empowered Integrated Sensing and Covert Communication
13 pages; submitted for possible publication
null
null
null
cs.IT eess.SP math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Traditional covert communication often relies on the knowledge of the warden's channel state information, which is inherently challenging to obtain due to the non-cooperative nature and potential mobility of the warden. The integration of sensing and communication technology provides a promising solution by enabling the legitimate transmitter to sense and track the warden, thereby enhancing transmission covertness. In this paper, we develop a framework for sensing-then-beamforming in reconfigurable intelligent surface (RIS)-empowered integrated sensing and covert communication (ISCC) systems, where the transmitter (Alice) estimates and tracks the mobile aerial warden's channel using sensing echo signals while simultaneously sending covert information to multiple legitimate users (Bobs) with the assistance of RIS, under the surveillance of the warden (Willie). Considering channel estimation errors, we formulate a robust non-convex optimization problem that jointly designs the communication beamformers, the sensing signal covariance matrix at Alice, and the phase shifts at the RIS to maximize the covert sum rate of Bobs while satisfying the constraints related to covert communication, sensing, transmitter power, and the unit modulus of the RIS elements. To solve this complex problem, we develop an efficient algorithm using alternating optimization, successive convex approximation, S-procedure, sequential rank-one constraint relaxation, and semidefinite relaxation techniques. Numerical results confirm the convergence of the proposed algorithm and demonstrate its effectiveness in tracking the warden's channel while ensuring robust covert transmission. Furthermore, the results highlight the advantages of using RIS to enhance the covert transmission rate compared to baseline schemes, and also illustrate the intricate trade-off between communication and sensing in ISCC systems.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 15:13:15 GMT" } ]
2025-04-21T00:00:00
[ [ "Zhao", "Xingyu", "" ], [ "Li", "Min", "" ], [ "Zhao", "Ming-Min", "" ], [ "Yan", "Shihao", "" ], [ "Zhao", "Min-Jian", "" ] ]
2504.13742
Vadim Dudnikov
Vadim Dudnikov
Explanation for the development of surface -plasma method of negative ion production in BINP and around the World
null
null
null
null
physics.plasm-ph
http://creativecommons.org/publicdomain/zero/1.0/
Development of charge-exchange ions injection into circular accelerators and storage rings and development of surface-plasma method of negative ion production in Budker Institute of Nuclear Physics (Novosibirsk) and around the World are described.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 15:17:15 GMT" } ]
2025-04-21T00:00:00
[ [ "Dudnikov", "Vadim", "" ] ]
2504.13743
Runsheng Liu
Yifan Gao, Xinyi Li, Runsheng Liu, Xiangyi Liu, Daisuke Shiraishi
Convergence in natural parametrization of random walk frontier
33 pages, 4 figures
null
null
null
math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we show that the frontier of planar random walk converges weakly under natural parametrization to that of planar Brownian motion. As an intermediate result, we also show the convergence of the renormalized occupation measure.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 15:17:30 GMT" } ]
2025-04-21T00:00:00
[ [ "Gao", "Yifan", "" ], [ "Li", "Xinyi", "" ], [ "Liu", "Runsheng", "" ], [ "Liu", "Xiangyi", "" ], [ "Shiraishi", "Daisuke", "" ] ]
2504.13744
Andrea Vinante
F. Ahrens and A. Vinante
Observation of gyroscopic coupling in a non-spinning levitated ferromagnet
5 pages, 2 figures
null
null
null
quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A non-spinning permanent ferromagnet is predicted to behave as a gyroscope at sufficiently low frequencies, which can be seen as a manifestation of the Einstein-de Haas effect. This yet unexplored regime has been recently proposed for ultrasensitive precession-based magnetometry and for atomic-like quantum stabilization of a levitated nanomagnet in a static field. Here, we observe signatures of gyroscopic effects in the rotational dynamics of a non-spinning permanent ferromagnet levitated in a superconducting trap. Specifically, we detect spin-rotation coupling between different librational modes, in good agreement with theoretical predictions. From our measurements, we can infer both the intrinsic angular momentum of the levitated magnet and its gyromagnetic $g$-factor.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 15:18:08 GMT" } ]
2025-04-21T00:00:00
[ [ "Ahrens", "F.", "" ], [ "Vinante", "A.", "" ] ]
2504.13745
Andrea Rigo
Andrea Rigo, Luca Stornaiuolo, Mauro Martino, Bruno Lepri, Nicu Sebe
ESPLoRA: Enhanced Spatial Precision with Low-Rank Adaption in Text-to-Image Diffusion Models for High-Definition Synthesis
null
null
null
null
cs.CV cs.AI
http://creativecommons.org/licenses/by/4.0/
Diffusion models have revolutionized text-to-image (T2I) synthesis, producing high-quality, photorealistic images. However, they still struggle to properly render the spatial relationships described in text prompts. To address the lack of spatial information in T2I generations, existing methods typically use external network conditioning and predefined layouts, resulting in higher computational costs and reduced flexibility. Our approach builds upon a curated dataset of spatially explicit prompts, meticulously extracted and synthesized from LAION-400M to ensure precise alignment between textual descriptions and spatial layouts. Alongside this dataset, we present ESPLoRA, a flexible fine-tuning framework based on Low-Rank Adaptation, specifically designed to enhance spatial consistency in generative models without increasing generation time or compromising the quality of the outputs. In addition to ESPLoRA, we propose refined evaluation metrics grounded in geometric constraints, capturing 3D spatial relations such as \textit{in front of} or \textit{behind}. These metrics also expose spatial biases in T2I models which, even when not fully mitigated, can be strategically exploited by our TORE algorithm to further improve the spatial consistency of generated images. Our method outperforms the current state-of-the-art framework, CoMPaSS, by 13.33% on established spatial consistency benchmarks.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 15:21:37 GMT" } ]
2025-04-21T00:00:00
[ [ "Rigo", "Andrea", "" ], [ "Stornaiuolo", "Luca", "" ], [ "Martino", "Mauro", "" ], [ "Lepri", "Bruno", "" ], [ "Sebe", "Nicu", "" ] ]
2504.13746
Piero D'Ancona
Piero D'Ancona, Diego Fiorletta
A dynamical Amrein-Berthier uncertainty principle
null
null
null
null
math.AP math-ph math.MP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a selfadjoint magnetic Schr\"odinger operator \begin{equation*} H = ( i \partial + A(x) )^2 + V(x) \end{equation*} on $L^{2}(\mathbb{R}^n)$, with $V(x)$ strictly subquadratic and $A(x)$ strictly sublinear, we prove that the flow $u(t)=e^{-itH}u(0)$ satisfies an Amrein--Berthier type inequality \begin{equation*} \|u(t)\|_{L^{2}}\lesssim_{E,F,T,A,V} \|u(0)\|_{L^{2}(E^{c})} + \|u(T)\|_{L^{2}(F^{c})}, \qquad 0\le t\le T \end{equation*} for all compact sets $E,F \subset \mathbb{R}^{n}$. In particular, if both $u(0)$ and $u(T)$ are compactly supported, then $u$ vanishes identically. Under different assumptions on the operator, which allow for time--dependent coefficients, the result extends to sets $E,F$ of finite measure. We also consider a few variants for Schr\"{o}dinger operators with singular coefficients, metaplectic operators, and we include applications to control theory.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 15:27:23 GMT" } ]
2025-04-21T00:00:00
[ [ "D'Ancona", "Piero", "" ], [ "Fiorletta", "Diego", "" ] ]
2504.13747
Christophe Parisel
Christophe Parisel
Scoring Azure permissions with metric spaces
null
null
null
null
cs.CR
http://creativecommons.org/licenses/by/4.0/
In this work, we introduce two complementary metrics for quantifying and scoring privilege risk in Microsoft Azure. In the Control Plane, we define the WAR distance, a superincreasing distance over Write, Action, and Read control permissions, which yields a total ordering of principals by their configuration power. In the Data Plane, we present a blast radius distance for measuring the maximum breadth of data exfiltration and forgery, leveraging the natural ultrametry of Azure Tenants clustering hierarchy Together, these metrics offer a unified framework for proactive IAM analysis, ranking, lifecycle monitoring, and least privilege enforcement.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 15:29:51 GMT" } ]
2025-04-21T00:00:00
[ [ "Parisel", "Christophe", "" ] ]
2504.13748
Hongjia Chen
Hongjia Chen, Xin Xu, Fangling Pu
DAM-Net: Domain Adaptation Network with Micro-Labeled Fine-Tuning for Change Detection
13 pages, 6 figures
null
null
null
cs.CV
http://creativecommons.org/licenses/by-nc-nd/4.0/
Change detection (CD) in remote sensing imagery plays a crucial role in various applications such as urban planning, damage assessment, and resource management. While deep learning approaches have significantly advanced CD performance, current methods suffer from poor domain adaptability, requiring extensive labeled data for retraining when applied to new scenarios. This limitation severely restricts their practical applications across different datasets. In this work, we propose DAM-Net: a Domain Adaptation Network with Micro-Labeled Fine-Tuning for CD. Our network introduces adversarial domain adaptation to CD for, utilizing a specially designed segmentation-discriminator and alternating training strategy to enable effective transfer between domains. Additionally, we propose a novel Micro-Labeled Fine-Tuning approach that strategically selects and labels a minimal amount of samples (less than 1%) to enhance domain adaptation. The network incorporates a Multi-Temporal Transformer for feature fusion and optimized backbone structure based on previous research. Experiments conducted on the LEVIR-CD and WHU-CD datasets demonstrate that DAM-Net significantly outperforms existing domain adaptation methods, achieving comparable performance to semi-supervised approaches that require 10% labeled data while using only 0.3% labeled samples. Our approach significantly advances cross-dataset CD applications and provides a new paradigm for efficient domain adaptation in remote sensing. The source code of DAM-Net will be made publicly available upon publication.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 15:29:57 GMT" } ]
2025-04-21T00:00:00
[ [ "Chen", "Hongjia", "" ], [ "Xu", "Xin", "" ], [ "Pu", "Fangling", "" ] ]
2504.13749
Alessandro Lunghi
Lion Frangoulis, Zahra Khatibi, Lorenzo A. Mariano and Alessandro Lunghi
Generating new coordination compounds via multireference simulations, genetic algorithms and machine learning: the case of Co(II) molecular magnets
null
null
null
null
cond-mat.mtrl-sci cs.NE physics.chem-ph physics.comp-ph
http://creativecommons.org/licenses/by/4.0/
The design of coordination compounds with target properties often requires years of continuous feedback loop between theory, simulations and experiments. In the case of magnetic molecules, this conventional strategy has indeed led to the breakthrough of single-molecule magnets with working temperatures above nitrogen's boiling point, but at significant costs in terms of resources and time. Here, we propose a computational strategy able to accelerate the discovery of new coordination compounds with desired electronic and magnetic properties. Our approach is based on a combination of high-throughput multireference ab initio methods, genetic algorithms and machine learning. While genetic algorithms allow for an intelligent sampling of the vast chemical space available, machine learning reduces the computational cost by pre-screening molecular properties in advance of their accurate and automated multireference ab initio characterization. Importantly, the presented framework is able to generate novel organic ligands and explore chemical motifs beyond those available in pre-existing structural databases. We showcase the power of this approach by automatically generating new Co(II) mononuclear coordination compounds with record magnetic properties in a fraction of the time required by either experiments or brute-force ab initio approaches
[ { "version": "v1", "created": "Fri, 18 Apr 2025 15:33:48 GMT" } ]
2025-04-21T00:00:00
[ [ "Frangoulis", "Lion", "" ], [ "Khatibi", "Zahra", "" ], [ "Mariano", "Lorenzo A.", "" ], [ "Lunghi", "Alessandro", "" ] ]
2504.13750
Haocheng Wen
Haocheng Wen, Faxuan Luo, Sheng Xu, Bing Wang
JANC: A cost-effective, differentiable compressible reacting flow solver featured with JAX-based adaptive mesh refinement
null
null
null
null
physics.flu-dyn
http://creativecommons.org/licenses/by/4.0/
The compressible reacting flow numerical solver is an essential tool in the study of combustion, energy disciplines, as well as in the design of industrial power and propulsion devices. We have established the first JAX-based block-structured adaptive mesh refinement (AMR) framework, called JAX-AMR, and then developed a fully-differentiable solver for compressible reacting flows, named JANC. JANC is implemented in Python and features automatic differentiation capabilities, enabling an efficient integration of the solver with machine learning. Furthermore, benefited by multiple acceleration features such as XLA-powered JIT compilation, GPU/TPU computing, parallel computing, and AMR, the computational efficiency of JANC has been significantly improved. In a comparative test of a two-dimensional detonation tube case, the computational cost of the JANC core solver, running on a single A100 GPU, was reduced to 1% of that of OpenFOAM, which was parallelized across 384 CPU cores. When the AMR method is enabled for both solvers, JANC's computational cost can be reduced to 1-2% of that of OpenFOAM. The core solver of JANC has also been tested for parallel computation on a 4-card A100 setup, demonstrating its convenient and efficient parallel computing capability. JANC also shows strong compatibility with machine learning by combining adjoint optimization to make the whole dynamic trajectory efficiently differentiable. JANC provides a new generation of high-performance, cost-effective, and high-precision solver framework for large-scale numerical simulations of compressible reacting flows and related machine learning research. Now, the source codes have been available under the MIT license at https://github.com/JA4S/JAX-AMR and https://github.com/JA4S/JANC.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 15:34:42 GMT" } ]
2025-04-21T00:00:00
[ [ "Wen", "Haocheng", "" ], [ "Luo", "Faxuan", "" ], [ "Xu", "Sheng", "" ], [ "Wang", "Bing", "" ] ]
2504.13751
Mahdi Jaberzadeh Ansari
Mahdi Jaberzadeh Ansari, Ann Barcomb
A Survey for What Developers Require in AI-powered Tools that Aid in Component Selection in CBSD
10 pages, 4 figures, The 29th International Conference on Evaluation and Assessment in Software Engineering, 17 to 20 June, 2025, Istanbul, Turkey
The 29th International Conference on Evaluation and Assessment in Software Engineering 17 to 20 June 2025 Istanbul Turkey
null
null
cs.SE cs.AI cs.CY
http://creativecommons.org/licenses/by/4.0/
Although it has been more than four decades that the first components-based software development (CBSD) studies were conducted, there is still no standard method or tool for component selection which is widely accepted by the industry. The gulf between industry and academia contributes to the lack of an accepted tool. We conducted a mixed methods survey of nearly 100 people engaged in component-based software engineering practice or research to better understand the problems facing industry, how these needs could be addressed, and current best practices employed in component selection. We also sought to identify and prioritize quality criteria for component selection from an industry perspective. In response to the call for CBSD component selection tools to incorporate recent technical advances, we also explored the perceptions of professionals about AI-driven tools, present and envisioned.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 15:35:31 GMT" } ]
2025-04-21T00:00:00
[ [ "Ansari", "Mahdi Jaberzadeh", "" ], [ "Barcomb", "Ann", "" ] ]
2504.13752
Benjamin Cohen-Wang
Benjamin Cohen-Wang, Yung-Sung Chuang, Aleksander Madry
Learning to Attribute with Attention
null
null
null
null
cs.LG cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a sequence of tokens generated by a language model, we may want to identify the preceding tokens that influence the model to generate this sequence. Performing such token attribution is expensive; a common approach is to ablate preceding tokens and directly measure their effects. To reduce the cost of token attribution, we revisit attention weights as a heuristic for how a language model uses previous tokens. Naive approaches to attribute model behavior with attention (e.g., averaging attention weights across attention heads to estimate a token's influence) have been found to be unreliable. To attain faithful attributions, we propose treating the attention weights of different attention heads as features. This way, we can learn how to effectively leverage attention weights for attribution (using signal from ablations). Our resulting method, Attribution with Attention (AT2), reliably performs on par with approaches that involve many ablations, while being significantly more efficient. To showcase the utility of AT2, we use it to prune less important parts of a provided context in a question answering setting, improving answer quality. We provide code for AT2 at https://github.com/MadryLab/AT2 .
[ { "version": "v1", "created": "Fri, 18 Apr 2025 15:36:28 GMT" } ]
2025-04-21T00:00:00
[ [ "Cohen-Wang", "Benjamin", "" ], [ "Chuang", "Yung-Sung", "" ], [ "Madry", "Aleksander", "" ] ]
2504.13753
Tung Le
Alexey Chernov, Tung Le
Gevrey class regularity for steady-state incompressible Navier-Stokes equations in parametric domains and related models
43 pages, 4 figues
null
null
null
math.NA cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate parameteric Navier-Stokes equations for a viscous, incompressible flow in bounded domains. The coefficients of the equations are perturbed by high-dimensional random parameters, this fits in particular for modelling flows in domains with uncertain perturbations. Our focus is on deriving bounds for arbitrary high-order derivatives of the pressure and the velocity fields with respect to the random parameters in the context of incompressible Navier-Stokes equation under a small-data assumption. To achieve this, we analyze mixed and saddle-point problems and employ the alternative-to-factorial technique to establish generalized Gevrey-class regularity for the solution pair. Thereby the analytic regularity follows as a special case. In the numerical experiments, we validate and illustrate our theoretical findings using Gauss-Legendre quadrature and Quasi-Monte Carlo methods.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 15:36:34 GMT" } ]
2025-04-21T00:00:00
[ [ "Chernov", "Alexey", "" ], [ "Le", "Tung", "" ] ]
2504.13754
Yifei Chen
Zhu Zhu, Shuo Jiang, Jingyuan Zheng, Yawen Li, Yifei Chen, Manli Zhao, Weizhong Gu, Feiwei Qin, Jinhu Wang, Gang Yu
Towards Accurate and Interpretable Neuroblastoma Diagnosis via Contrastive Multi-scale Pathological Image Analysis
14pages, 8 figures
null
null
null
cs.CV cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Neuroblastoma, adrenal-derived, is among the most common pediatric solid malignancies, characterized by significant clinical heterogeneity. Timely and accurate pathological diagnosis from hematoxylin and eosin-stained whole slide images is critical for patient prognosis. However, current diagnostic practices primarily rely on subjective manual examination by pathologists, leading to inconsistent accuracy. Existing automated whole slide image classification methods encounter challenges such as poor interpretability, limited feature extraction capabilities, and high computational costs, restricting their practical clinical deployment. To overcome these limitations, we propose CMSwinKAN, a contrastive-learning-based multi-scale feature fusion model tailored for pathological image classification, which enhances the Swin Transformer architecture by integrating a Kernel Activation Network within its multilayer perceptron and classification head modules, significantly improving both interpretability and accuracy. By fusing multi-scale features and leveraging contrastive learning strategies, CMSwinKAN mimics clinicians' comprehensive approach, effectively capturing global and local tissue characteristics. Additionally, we introduce a heuristic soft voting mechanism guided by clinical insights to seamlessly bridge patch-level predictions to whole slide image-level classifications. We validate CMSwinKAN on the PpNTs dataset, which was collaboratively established with our partner hospital and the publicly accessible BreakHis dataset. Results demonstrate that CMSwinKAN performs better than existing state-of-the-art pathology-specific models pre-trained on large datasets. Our source code is available at https://github.com/JSLiam94/CMSwinKAN.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 15:39:46 GMT" } ]
2025-04-21T00:00:00
[ [ "Zhu", "Zhu", "" ], [ "Jiang", "Shuo", "" ], [ "Zheng", "Jingyuan", "" ], [ "Li", "Yawen", "" ], [ "Chen", "Yifei", "" ], [ "Zhao", "Manli", "" ], [ "Gu", "Weizhong", "" ], [ "Qin", "Feiwei", "" ], [ "Wang", "Jinhu", "" ], [ "Yu", "Gang", "" ] ]
2504.13755
Amin Noroozi
Amin Noroozi, Sidratul Muntaha Esha, Mansoureh Ghari
Predictors of Childhood Vaccination Uptake in England: An Explainable Machine Learning Analysis of Longitudinal Regional Data (2021-2024)
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Childhood vaccination is a cornerstone of public health, yet disparities in vaccination coverage persist across England. These disparities are shaped by complex interactions among various factors, including geographic, demographic, socioeconomic, and cultural (GDSC) factors. Previous studies mostly rely on cross-sectional data and traditional statistical approaches that assess individual or limited sets of variables in isolation. Such methods may fall short in capturing the dynamic and multivariate nature of vaccine uptake. In this paper, we conducted a longitudinal machine learning analysis of childhood vaccination coverage across 150 districts in England from 2021 to 2024. Using vaccination data from NHS records, we applied hierarchical clustering to group districts by vaccination coverage into low- and high-coverage clusters. A CatBoost classifier was then trained to predict districts' vaccination clusters using their GDSC data. Finally, the SHapley Additive exPlanations (SHAP) method was used to interpret the predictors' importance. The classifier achieved high accuracies of 92.1, 90.6, and 86.3 in predicting districts' vaccination clusters for the years 2021-2022, 2022-2023, and 2023-2024, respectively. SHAP revealed that geographic, cultural, and demographic variables, particularly rurality, English language proficiency, the percentage of foreign-born residents, and ethnic composition, were the most influential predictors of vaccination coverage, whereas socioeconomic variables, such as deprivation and employment, consistently showed lower importance, especially in 2023-2024. Surprisingly, rural districts were significantly more likely to have higher vaccination rates. Additionally, districts with lower vaccination coverage had higher populations whose first language was not English, who were born outside the UK, or who were from ethnic minority groups.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 15:41:26 GMT" } ]
2025-04-21T00:00:00
[ [ "Noroozi", "Amin", "" ], [ "Esha", "Sidratul Muntaha", "" ], [ "Ghari", "Mansoureh", "" ] ]
2504.13756
Dmitrii Kharlapenko
Dmitrii Kharlapenko, Stepan Shabalin, Fazl Barez, Arthur Conmy, Neel Nanda
Scaling sparse feature circuit finding for in-context learning
null
null
null
null
cs.LG cs.AI cs.CL
http://creativecommons.org/licenses/by/4.0/
Sparse autoencoders (SAEs) are a popular tool for interpreting large language model activations, but their utility in addressing open questions in interpretability remains unclear. In this work, we demonstrate their effectiveness by using SAEs to deepen our understanding of the mechanism behind in-context learning (ICL). We identify abstract SAE features that (i) encode the model's knowledge of which task to execute and (ii) whose latent vectors causally induce the task zero-shot. This aligns with prior work showing that ICL is mediated by task vectors. We further demonstrate that these task vectors are well approximated by a sparse sum of SAE latents, including these task-execution features. To explore the ICL mechanism, we adapt the sparse feature circuits methodology of Marks et al. (2024) to work for the much larger Gemma-1 2B model, with 30 times as many parameters, and to the more complex task of ICL. Through circuit finding, we discover task-detecting features with corresponding SAE latents that activate earlier in the prompt, that detect when tasks have been performed. They are causally linked with task-execution features through the attention and MLP sublayers.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 15:45:30 GMT" } ]
2025-04-21T00:00:00
[ [ "Kharlapenko", "Dmitrii", "" ], [ "Shabalin", "Stepan", "" ], [ "Barez", "Fazl", "" ], [ "Conmy", "Arthur", "" ], [ "Nanda", "Neel", "" ] ]
2504.13758
Tsung-Sheng Huang
Tsung-Sheng Huang, Andrey Grankin, Yu-Xin Wang, Mohammad Hafezi
Optical engineering and detection of magnetism in moir\'e semiconductors
null
null
null
null
cond-mat.str-el cond-mat.mes-hall cond-mat.mtrl-sci quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a general framework for optically inducing, controlling, and probing spin states in moir\'e systems. In particular, we demonstrate that applying Raman optical drives to moir\'e transition metal dichalcogenide bilayers can realize a class of spin models, with magnetic interactions tunable via the optical parameters. The resulting interaction anisotropy, controlled by the polarizations of the drives, enables access to magnetic states that are inaccessible in undriven moir\'e bilayers. Furthermore, we establish direct connections between the resulting spin correlations and experimentally observable optical signals. Our work paves the way for future studies on the optical control and detection on strongly correlated quantum systems.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 15:49:06 GMT" } ]
2025-04-21T00:00:00
[ [ "Huang", "Tsung-Sheng", "" ], [ "Grankin", "Andrey", "" ], [ "Wang", "Yu-Xin", "" ], [ "Hafezi", "Mohammad", "" ] ]
2504.13759
Marco Micheletto
Davide Ghiani, Jefferson David Rodriguez Chivata, Stefano Lilliu, Simone Maurizio La Cava, Marco Micheletto, Giulia Orr\`u, Federico Lama, Gian Luca Marcialis
Fragile Watermarking for Image Certification Using Deep Steganographic Embedding
null
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Modern identity verification systems increasingly rely on facial images embedded in biometric documents such as electronic passports. To ensure global interoperability and security, these images must comply with strict standards defined by the International Civil Aviation Organization (ICAO), which specify acquisition, quality, and format requirements. However, once issued, these images may undergo unintentional degradations (e.g., compression, resizing) or malicious manipulations (e.g., morphing) and deceive facial recognition systems. In this study, we explore fragile watermarking, based on deep steganographic embedding as a proactive mechanism to certify the authenticity of ICAO-compliant facial images. By embedding a hidden image within the official photo at the time of issuance, we establish an integrity marker that becomes sensitive to any post-issuance modification. We assess how a range of image manipulations affects the recovered hidden image and show that degradation artifacts can serve as robust forensic cues. Furthermore, we propose a classification framework that analyzes the revealed content to detect and categorize the type of manipulation applied. Our experiments demonstrate high detection accuracy, including cross-method scenarios with multiple deep steganography-based models. These findings support the viability of fragile watermarking via steganographic embedding as a valuable tool for biometric document integrity verification.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 15:51:56 GMT" } ]
2025-04-21T00:00:00
[ [ "Ghiani", "Davide", "" ], [ "Chivata", "Jefferson David Rodriguez", "" ], [ "Lilliu", "Stefano", "" ], [ "La Cava", "Simone Maurizio", "" ], [ "Micheletto", "Marco", "" ], [ "Orrù", "Giulia", "" ], [ "Lama", "Federico", "" ], [ "Marcialis", "Gian Luca", "" ] ]
2504.13760
Georgios Polykratis
Constantia Alexandrou, Andreas Athenodorou, Kostas Blekos, Georgios Polykratis, Stefan K\"uhn
Realizing string breaking dynamics in a $Z_2$ lattice gauge theory on quantum hardware
17 pages, 19 figures
null
null
null
hep-lat quant-ph
http://creativecommons.org/licenses/by/4.0/
We investigate static and dynamical aspects of string breaking in a $Z_2$ lattice gauge theory coupled to Kogut-Susskind staggered fermions. Using Tensor Network simulations, we demonstrate that the static potential as well as the site-resolved configuration of the matter sites and gauge links allows us to identify the regimes in which string breaking occurs. Furthermore, we develop a variational quantum eigensolver that allows for reliably preparing the ground state of the theory in both the absence and presence of static charges and to capture the static aspects of the phenomenon. Carrying out state preparation on real quantum hardware for up to 19 qubits, we demonstrate its suitability for current quantum devices. In addition, we study the real-time dynamics of a flux tube between two static charges using both Tensor Networks and quantum hardware. Using a trotterization for the time-evolution operator, we are able to show that the breaking process starts with the creation of charges inside the string. These eventually redistribute towards the static charges and screen them, which leads to the breaking of the flux tube.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 15:52:31 GMT" } ]
2025-04-21T00:00:00
[ [ "Alexandrou", "Constantia", "" ], [ "Athenodorou", "Andreas", "" ], [ "Blekos", "Kostas", "" ], [ "Polykratis", "Georgios", "" ], [ "Kühn", "Stefan", "" ] ]
2504.13761
Taras Radul
Taras Radul
On monotonicity of comonotonically maxitive functional
null
null
null
null
math.GN math.FA
http://creativecommons.org/licenses/by-nc-nd/4.0/
The comonotonic maxitivity property of functionals frequently appears in the characterization of fuzzy integrals based on the maximum operation. In some special cases, comonotonic maxitivity implies monotonicity of functionals. The question of whether this implication holds in general was posed by T. Radul (2023). It was shown in that paper that the implication is valid for finite compacta. In this article, we provide a negative answer to the general problem and discuss additional properties that need to be imposed to ensure the implication holds.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 15:59:25 GMT" } ]
2025-04-21T00:00:00
[ [ "Radul", "Taras", "" ] ]
2504.13762
Wissal Benzine
Wissal Benzine, Ali Bemani, Nassar Ksairi and Dirk Slock
Models, Methods and Waveforms for Estimation and Prediction of Doubly Sparse Time-Varying Channels
submitted to IEEE Transactions on Wireless Communications
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper investigates channel estimation for linear time-varying (LTV) wireless channels under double sparsity, i.e., sparsity in both the delay and Doppler domains. An on-grid approximation is first considered, enabling rigorous hierarchical-sparsity modeling and compressed sensing-based channel estimation. Guaranteed recovery conditions are provided for affine frequency division multiplexing (AFDM), orthogonal frequency division multiplexing (OFDM) and single-carrier modulation (SCM), highlighting the superiority of AFDM in terms of doubly sparse channel estimation. To address arbitrary Doppler shifts, a relaxed version of the on-grid model is introduced by making use of multiple elementary Expansion Models (BEM) each based on Discrete Prolate Spheroidal Sequences (DPSS). Next, theoretical guarantees are provided for the precision of this off-grid model before further extending it to tackle channel prediction by exploiting the inherent DPSS extrapolation capability. Finally, numerical results are provided to both validate the proposed off-grid model for channel estimation and prediction purposes under the double sparsity assumption and to compare the corresponding mean squared error (MSE) and the overhead performance when the different wireless waveforms are used.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 15:59:58 GMT" } ]
2025-04-21T00:00:00
[ [ "Benzine", "Wissal", "" ], [ "Bemani", "Ali", "" ], [ "Ksairi", "Nassar", "" ], [ "Slock", "Dirk", "" ] ]
2504.13764
Rana Parshad
Ranjit Kumar Upadhyay, Rana D. Parshad, Namrata Mani Tripathi, Nishith Mohan
An eco-epidemiological model with prey-taxis and slow diffusion: Global existence, boundedness and novel dynamics
null
null
null
null
math.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this manuscript, an attempt has been made to understand the effects of prey-taxis on the existence of global-in-time solutions and dynamics in an eco-epidemiological model, particularly under the influence of slow dispersal characterized by the $p$-Laplacian operator and enhanced mortality of the infected prey, subject to specific assumptions on the taxis sensitivity functions. We prove the global existence of classical solutions when the infected prey undergoes random motion and exhibits standard mortality. Under the assumption that the infected prey disperses slowly and exhibits enhanced mortality, we prove the global existence of weak solutions. Following a detailed mathematical investigation of the proposed model, we shift our focus to analyse the stability of the positive equilibrium point under the scenario where all species exhibit linear diffusion, the infected prey experiences standard mortality, and the predator exhibits taxis exclusively toward the infected prey. Within this framework, we establish the occurrence of a steady-state bifurcation. Numerical simulations are then carried out to observe this dynamical behavior. Our results have large scale applications to biological invasions and biological control of pests, under the prevalence of disease in the pest population.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 16:01:07 GMT" } ]
2025-04-21T00:00:00
[ [ "Upadhyay", "Ranjit Kumar", "" ], [ "Parshad", "Rana D.", "" ], [ "Tripathi", "Namrata Mani", "" ], [ "Mohan", "Nishith", "" ] ]
2504.13765
Peyman Jahanbin
Peyman Jahanbin
Modeling L1 Influence on L2 Pronunciation: An MFCC-Based Framework for Explainable Machine Learning and Pedagogical Feedback
27 pages (including references), 4 figures, 1 table. Combines statistical inference and explainable machine learning to model L1 influence in L2 pronunciation using MFCC features. Methodology and code are openly available via Zenodo and OSF: Zenodo: https://doi.org/10.5281/zenodo.15186197 OSF: https://doi.org/10.17605/OSF.IO/4UXGM
null
null
null
eess.AS cs.SD
http://creativecommons.org/licenses/by/4.0/
This study investigates the extent to which Mel-Frequency Cepstral Coefficients (MFCCs) capture first language (L1) transfer in extended second language (L2) English speech. Speech samples from Mandarin and American English L1 speakers were extracted from the GMU Speech Accent Archive, converted to WAV format, and processed to obtain thirteen MFCCs per speaker. A multi-method analytic framework combining inferential statistics (t-tests, MANOVA, Canonical Discriminant Analysis) and machine learning (Random Forest classification) identified MFCC-1 (broadband energy), MFCC-2 (first formant region), and MFCC-5 (voicing and fricative energy) as the most discriminative features for distinguishing L1 backgrounds. A reduced-feature model using these MFCCs significantly outperformed the full-feature model, as confirmed by McNemar's test and non-overlapping confidence intervals. The findings empirically support the Perceptual Assimilation Model for L2 (PAM-L2) and the Speech Learning Model (SLM), demonstrating that L1-conditioned variation in L2 speech is both perceptually grounded and acoustically quantifiable. Methodologically, the study contributes to applied linguistics and explainable AI by proposing a transparent, data-efficient pipeline for L2 pronunciation modeling. The results also offer pedagogical implications for ESL/EFL instruction by highlighting L1-specific features that can inform intelligibility-oriented instruction, curriculum design, and speech assessment tools.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 16:04:22 GMT" } ]
2025-04-21T00:00:00
[ [ "Jahanbin", "Peyman", "" ] ]
2504.13766
Wenyu Xin
Wenyu Xin, Chun-Ming Yip, Ken'ichi Nomoto, Xianfei Zhang and Shaolan Bi
The impact of new ($\alpha$, n) reaction rates on the weak s-process in metal-poor massive stars
16 pages, 15 figures
null
null
null
astro-ph.SR nucl-ex nucl-th
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Massive stars are significant sites for the weak s-process (ws-process). $^{22}$Ne and $^{16}$O are, respectively, the main neutron source and poison for the ws-process. In the metal-poor stars, the abundance of $^{22}$Ne is limited by the metallicity, so that the contribution of $^{22}$Ne($\alpha$, n)$^{25}$Mg reaction on the s-process is small. Conversely, the $^{17}$O($\alpha$, n)$^{20}$Ne reaction is more evident in more metal-poor stars due to the most abundant $^{16}$O in all metallicities. In this work, we calculate the evolution of four metal-poor models ($Z=10^{-3}$) for the Zero-Age Main-Sequence (ZAMS) masses of $M ({\rm ZAMS})=$ 15, 20, 25, and 30 M$_{\odot}$ to investigate the effect of reaction rates on the ws-process. We adopt the new $^{17}$O($\alpha$, n)$^{20}$Ne and $^{17}$O($\alpha, \gamma$)$^{21}$Ne reaction rates suggested by Wiescher et al. (2023) and $^{22}$Ne($\alpha$, n)$^{25}$Mg and $^{22}$Ne($\alpha, \gamma$)$^{26}$Mg from Best et al. (2013). The yields of the s-process isotope with updated reaction rates are compared with the results using default reaction rates from JINA REACLIB. We find that the effects of new $^{17}$O+$\alpha$ are much more significant than those of new $^{22}$Ne+$\alpha$ reaction rates in the non-rotation stars.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 16:04:50 GMT" } ]
2025-04-21T00:00:00
[ [ "Xin", "Wenyu", "" ], [ "Yip", "Chun-Ming", "" ], [ "Nomoto", "Ken'ichi", "" ], [ "Zhang", "Xianfei", "" ], [ "Bi", "Shaolan", "" ] ]
2504.13767
Nikos Fotiou
Nikos Fotiou, Vasilios A. Siris, George C. Polyzos
Access control for Data Spaces
in Proc. of 28th Conference on Innovation in Clouds, Internet and Networks (ICIN 2025), Paris, France, 2025
null
10.1109/ICIN64016.2025.10943024
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Data spaces represent an emerging paradigm that facilitates secure and trusted data exchange through foundational elements of data interoperability, sovereignty, and trust. Within a data space, data items, potentially owned by different entities, can be interconnected. Concurrently, data consumers can execute advanced data lookup operations and subscribe to data-driven events. Achieving fine-grained access control without compromising functionality presents a significant challenge. In this paper, we design and implement an access control mechanism that ensures continuous evaluation of access control policies, is data semantics aware, and supports subscriptions to data events. We present a construction where access control policies are stored in a centralized location, which we extend to allow data owners to maintain their own Policy Administration Points. This extension builds upon W3C Verifiable Credentials.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 16:09:53 GMT" } ]
2025-04-21T00:00:00
[ [ "Fotiou", "Nikos", "" ], [ "Siris", "Vasilios A.", "" ], [ "Polyzos", "George C.", "" ] ]
2504.13769
Phuong Nguyen
Motunrayo Ibiyo and Thinakone Louangdy and Phuong T. Nguyen and Claudio Di Sipio and Davide Di Ruscio
Detecting Malicious Source Code in PyPI Packages with LLMs: Does RAG Come in Handy?
The paper has been peer-reviewed and accepted for publication to the 29th International Conference on Evaluation and Assessment in Software Engineering (EASE 2025)
null
null
null
cs.SE
http://creativecommons.org/licenses/by-nc-sa/4.0/
Malicious software packages in open-source ecosystems, such as PyPI, pose growing security risks. Unlike traditional vulnerabilities, these packages are intentionally designed to deceive users, making detection challenging due to evolving attack methods and the lack of structured datasets. In this work, we empirically evaluate the effectiveness of Large Language Models (LLMs), Retrieval-Augmented Generation (RAG), and few-shot learning for detecting malicious source code. We fine-tune LLMs on curated datasets and integrate YARA rules, GitHub Security Advisories, and malicious code snippets with the aim of enhancing classification accuracy. We came across a counterintuitive outcome: While RAG is expected to boost up the prediction performance, it fails in the performed evaluation, obtaining a mediocre accuracy. In contrast, few-shot learning is more effective as it significantly improves the detection of malicious code, achieving 97% accuracy and 95% balanced accuracy, outperforming traditional RAG approaches. Thus, future work should expand structured knowledge bases, refine retrieval models, and explore hybrid AI-driven cybersecurity solutions.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 16:11:59 GMT" } ]
2025-04-21T00:00:00
[ [ "Ibiyo", "Motunrayo", "" ], [ "Louangdy", "Thinakone", "" ], [ "Nguyen", "Phuong T.", "" ], [ "Di Sipio", "Claudio", "" ], [ "Di Ruscio", "Davide", "" ] ]
2504.13770
Zhibin Liang
Zhi-Bin Liang, Shan-Zhong Li, Runze Li, and Zhi Li
Emergent chiral toplogical point gaps in a non-Hermitian quasiperiodic Su-Schrieffer-Heeger model
null
null
null
null
cond-mat.dis-nn
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study a quasiperiodic Su-Schrieffer-Heeger lattice with staggered on-site gain-loss. The results reveal that on-site staggered gain-loss can effectively induce non-Hermitian topological gap without introducing imaginary phase. Further analysis exhibits that five different processes of topological phase transitions, including topological re-entrant phenomena, with the gain-loss intensity increasing. In addition, through the analysis of inverse participation ratios, normalized participation ratios, winding number and other indicators, we find that topological phase transitions occur synchronically with localized phase transitions. Finally, by investigating the properties of dual space eigenfunction, we reveal that the non-Hermitian topological point gaps predicted in this paper are chiral point gaps, which have a pair of skin modes along opposite directions simultaneously.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 16:13:02 GMT" } ]
2025-04-21T00:00:00
[ [ "Liang", "Zhi-Bin", "" ], [ "Li", "Shan-Zhong", "" ], [ "Li", "Runze", "" ], [ "Li", "Zhi", "" ] ]
2504.13771
Xuan Wang
BESIII Collaboration: M. Ablikim, M. N. Achasov, P. Adlarson, X. C. Ai, R. Aliberti, A. Amoroso, Q. An, Y. Bai, O. Bakina, Y. Ban, H.-R. Bao, V. Batozskaya, K. Begzsuren, N. Berger, M. Berlowski, M. Bertani, D. Bettoni, F. Bianchi, E. Bianco, A. Bortone, I. Boyko, R. A. Briere, A. Brueggemann, H. Cai, M. H. Cai, X. Cai, A. Calcaterra, G. F. Cao, N. Cao, S. A. Cetin, X. Y. Chai, J. F. Chang, G. R. Che, Y. Z. Che, G. Chelkov, C. Chen, C. H. Chen, Chao Chen, G. Chen, H. S. Chen, H. Y. Chen, M. L. Chen, S. J. Chen, S. L. Chen, S. M. Chen, T. Chen, X. R. Chen, X. T. Chen, Y. B. Chen, Y. Q. Chen, Z. J. Chen, Z. K. Chen, S. K. Choi, X. Chu, G. Cibinetto, F. Cossio, J. J. Cui, H. L. Dai, J. P. Dai, A. Dbeyssi, R. E. de Boer, D. Dedovich, C. Q. Deng, Z. Y. Deng, A. Denig, I. Denysenko, M. Destefanis, F. De Mori, B. Ding, X. X. Ding, Y. Ding, Y. Ding, Y. X. Ding, J. Dong, L. Y. Dong, M. Y. Dong, X. Dong, M. C. Du, S. X. Du, Y. Y. Duan, Z. H. Duan, P. Egorov, G. F. Fan, J. J. Fan, Y. H. Fan, J. Fang, J. Fang, S. S. Fang, W. X. Fang, Y. Q. Fang, R. Farinelli, L. Fava, F. Feldbauer, G. Felici, C. Q. Feng, J. H. Feng, Y. T. Feng, M. Fritsch, C. D. Fu, J. L. Fu, Y. W. Fu, H. Gao, X. B. Gao, Y. N. Gao, Y. N. Gao, Y. Y. Gao, Yang Gao, S. Garbolino, I. Garzia, P. T. Ge, Z. W. Ge, C. Geng, E. M. Gersabeck, A. Gilman, K. Goetzen, J. D. Gong, L. Gong, W. X. Gong, W. Gradl, S. Gramigna, M. Greco, M. H. Gu, Y. T. Gu, C. Y. Guan, A. Q. Guo, L. B. Guo, M. J. Guo, R. P. Guo, Y. P. Guo, A. Guskov, J. Gutierrez, K. L. Han, T. T. Han, F. Hanisch, K. D. Hao, X. Q. Hao, F. A. Harris, K. K. He, K. L. He, F. H. Heinsius, C. H. Heinz, Y. K. Heng, C. Herold, T. Holtmann, P. C. Hong, G. Y. Hou, X. T. Hou, Y. R. Hou, Z. L. Hou, B. Y. Hu, H. M. Hu, J. F. Hu, Q. P. Hu, S. L. Hu, T. Hu, Y. Hu, Z. M. Hu, G. S. Huang, K. X. Huang, L. Q. Huang, P. Huang, X. T. Huang, Y. P. Huang, Y. S. Huang, T. Hussain, N. H\"usken, N. in der Wiesche, J. Jackson, S. Janchiv, Q. Ji, Q. P. Ji, W. Ji, X. B. Ji, X. L. Ji, Y. Y. Ji, Z. K. Jia, D. Jiang, H. B. Jiang, P. C. Jiang, S. J. Jiang, T. J. Jiang, X. S. Jiang, Y. Jiang, J. B. Jiao, J. K. Jiao, Z. Jiao, S. Jin, Y. Jin, M. Q. Jing, X. M. Jing, T. Johansson, S. Kabana, N. Kalantar-Nayestanaki, X. L. Kang, X. S. Kang, M. Kavatsyuk, B. C. Ke, V. Khachatryan, A. Khoukaz, R. Kiuchi, O. B. Kolcu, B. Kopf, M. Kuessner, X. Kui, N. Kumar, A. Kupsc, W. K\"uhn, Q. Lan, W. N. Lan, T. T. Lei, M. Lellmann, T. Lenz, C. Li, C. Li, C. H. Li, C. K. Li, Cheng Li, D. M. Li, F. Li, G. Li, H. B. Li, H. J. Li, H. N. Li, Hui Li, J. R. Li, J. S. Li, K. Li, K. L. Li, K. L. Li, L. J. Li, Lei Li, M. H. Li, M. R. Li, P. L. Li, P. R. Li, Q. M. Li, Q. X. Li, R. Li, T. Li, T. Y. Li, W. D. Li, W. G. Li, X. Li, X. H. Li, X. L. Li, X. Y. Li, X. Z. Li, Y. Li, Y. G. Li, Y. P. Li, Z. J. Li, Z. Y. Li, C. Liang, H. Liang, Y. F. Liang, Y. T. Liang, G. R. Liao, L. B. Liao, M. H. Liao, Y. P. Liao, J. Libby, A. Limphirat, C. C. Lin, C. X. Lin, D. X. Lin, L. Q. Lin, T. Lin, B. J. Liu, B. X. Liu, C. Liu, C. X. Liu, F. Liu, F. H. Liu, Feng Liu, G. M. Liu, H. Liu, H. B. Liu, H. H. Liu, H. M. Liu, Huihui Liu, J. B. Liu, J. J. Liu, K. Liu, K. Liu, K. Y. Liu, Ke Liu, L. Liu, L. C. Liu, Lu Liu, P. L. Liu, Q. Liu, S. B. Liu, T. Liu, W. K. Liu, W. M. Liu, W. T. Liu, X. Liu, X. Liu, X. Y. Liu, Y. Liu, Y. Liu, Y. Liu, Y. B. Liu, Z. A. Liu, Z. D. Liu, Z. Q. Liu, X. C. Lou, F. X. Lu, H. J. Lu, J. G. Lu, Y. Lu, Y. H. Lu, Y. P. Lu, Z. H. Lu, C. L. Luo, J. R. Luo, J. S. Luo, M. X. Luo, T. Luo, X. L. Luo, Z. Y. Lv, X. R. Lyu, Y. F. Lyu, Y. H. Lyu, F. C. Ma, H. Ma, H. L. Ma, J. L. Ma, L. L. Ma, L. R. Ma, Q. M. Ma, R. Q. Ma, R. Y. Ma, T. Ma, X. T. Ma, X. Y. Ma, Y. M. Ma, F. E. Maas, I. MacKay, M. Maggiora, S. Malde, Y. J. Mao, Z. P. Mao, S. Marcello, F. M. Melendi, Y. H. Meng, Z. X. Meng, J. G. Messchendorp, G. Mezzadri, H. Miao, T. J. Min, R. E. Mitchell, X. H. Mo, B. Moses, N. Yu. Muchnoi, J. Muskalla, Y. Nefedov, F. Nerling, L. S. Nie, I. B. Nikolaev, Z. Ning, S. Nisar, Q. L. Niu, W. D. Niu, S. L. Olsen, Q. Ouyang, S. Pacetti, X. Pan, Y. Pan, A. Pathak, Y. P. Pei, M. Pelizaeus, H. P. Peng, Y. Y. Peng, K. Peters, J. L. Ping, R. G. Ping, S. Plura, V. Prasad, F. Z. Qi, H. R. Qi, M. Qi, S. Qian, W. B. Qian, C. F. Qiao, J. H. Qiao, J. J. Qin, J. L. Qin, L. Q. Qin, L. Y. Qin, P. B. Qin, X. P. Qin, X. S. Qin, Z. H. Qin, J. F. Qiu, Z. H. Qu, C. F. Redmer, A. Rivetti, M. Rolo, G. Rong, S. S. Rong, F. Rosini, Ch. Rosner, M. Q. Ruan, S. N. Ruan, N. Salone, A. Sarantsev, Y. Schelhaas, K. Schoenning, M. Scodeggio, K. Y. Shan, W. Shan, X. Y. Shan, Z. J. Shang, J. F. Shangguan, L. G. Shao, M. Shao, C. P. Shen, H. F. Shen, W. H. Shen, X. Y. Shen, B. A. Shi, H. Shi, J. L. Shi, J. Y. Shi, S. Y. Shi, X. Shi, H. L. Song, J. J. Song, T. Z. Song, W. M. Song, Y. X. Song, S. Sosio, S. Spataro, F. Stieler, S. S Su, Y. J. Su, G. B. Sun, G. X. Sun, H. Sun, H. K. Sun, J. F. Sun, K. Sun, L. Sun, S. S. Sun, T. Sun, Y. C. Sun, Y. H. Sun, Y. J. Sun, Y. Z. Sun, Z. Q. Sun, Z. T. Sun, C. J. Tang, G. Y. Tang, J. Tang, L. F. Tang, M. Tang, Y. A. Tang, L. Y. Tao, M. Tat, J. X. Teng, J. Y. Tian, W. H. Tian, Y. Tian, Z. F. Tian, I. Uman, B. Wang, B. Wang, Bo Wang, C. Wang, Cong Wang, D. Y. Wang, H. J. Wang, J. J. Wang, K. Wang, L. L. Wang, L. W. Wang, M. Wang, M. Wang, N. Y. Wang, S. Wang, T. Wang, T. J. Wang, W. Wang, W. Wang, W. P. Wang, X. Wang, X. F. Wang, X. J. Wang, X. L. Wang, X. N. Wang, Y. Wang, Y. D. Wang, Y. F. Wang, Y. H. Wang, Y. L. Wang, Y. N. Wang, Y. Q. Wang, Yaqian Wang, Yi Wang, Yuan Wang, Z. Wang, Z. L. Wang, Z. L. Wang, Z. Q. Wang, Z. Y. Wang, D. H. Wei, H. R. Wei, F. Weidner, S. P. Wen, Y. R. Wen, U. Wiedner, G. Wilkinson, M. Wolke, C. Wu, J. F. Wu, L. H. Wu, L. J. Wu, Lianjie Wu, S. G. Wu, S. M. Wu, X. Wu, X. H. Wu, Y. J. Wu, Z. Wu, L. Xia, X. M. Xian, B. H. Xiang, T. Xiang, D. Xiao, G. Y. Xiao, H. Xiao, Y. L. Xiao, Z. J. Xiao, C. Xie, K. J. Xie, X. H. Xie, Y. Xie, Y. G. Xie, Y. H. Xie, Z. P. Xie, T. Y. Xing, C. F. Xu, C. J. Xu, G. F. Xu, H. Y. Xu, H. Y. Xu, M. Xu, Q. J. Xu, Q. N. Xu, W. L. Xu, X. P. Xu, Y. Xu, Y. Xu, Y. C. Xu, Z. S. Xu, H. Y. Yan, L. Yan, W. B. Yan, W. C. Yan, W. P. Yan, X. Q. Yan, H. J. Yang, H. L. Yang, H. X. Yang, J. H. Yang, R. J. Yang, T. Yang, Y. Yang, Y. F. Yang, Y. H. Yang, Y. Q. Yang, Y. X. Yang, Y. Z. Yang, M. Ye, M. H. Ye, Junhao Yin, Z. Y. You, B. X. Yu, C. X. Yu, G. Yu, J. S. Yu, M. C. Yu, T. Yu, X. D. Yu, Y. C. Yu, C. Z. Yuan, H. Yuan, J. Yuan, J. Yuan, L. Yuan, S. C. Yuan, Y. Yuan, Z. Y. Yuan, C. X. Yue, Ying Yue, A. A. Zafar, S. H. Zeng, X. Zeng, Y. Zeng, Y. J. Zeng, Y. J. Zeng, X. Y. Zhai, Y. H. Zhan, A. Q. Zhang, B. L. Zhang, B. X. Zhang, D. H. Zhang, G. Y. Zhang, G. Y. Zhang, H. Zhang, H. Zhang, H. C. Zhang, H. H. Zhang, H. Q. Zhang, H. R. Zhang, H. Y. Zhang, J. Zhang, J. Zhang, J. J. Zhang, J. L. Zhang, J. Q. Zhang, J. S. Zhang, J. W. Zhang, J. X. Zhang, J. Y. Zhang, J. Z. Zhang, Jianyu Zhang, L. M. Zhang, Lei Zhang, N. Zhang, P. Zhang, Q. Zhang, Q. Y. Zhang, R. Y. Zhang, S. H. Zhang, Shulei Zhang, X. M. Zhang, X. Y Zhang, X. Y. Zhang, Y. Zhang, Y. Zhang, Y. T. Zhang, Y. H. Zhang, Y. M. Zhang, Z. D. Zhang, Z. H. Zhang, Z. L. Zhang, Z. L. Zhang, Z. X. Zhang, Z. Y. Zhang, Z. Y. Zhang, Z. Z. Zhang, Zh. Zh. Zhang, G. Zhao, J. Y. Zhao, J. Z. Zhao, L. Zhao, Lei Zhao, M. G. Zhao, N. Zhao, R. P. Zhao, S. J. Zhao, Y. B. Zhao, Y. L. Zhao, Y. X. Zhao, Z. G. Zhao, A. Zhemchugov, B. Zheng, B. M. Zheng, J. P. Zheng, W. J. Zheng, X. R. Zheng, Y. H. Zheng, B. Zhong, X. Zhong, H. Zhou, J. Q. Zhou, J. Y. Zhou, S. Zhou, X. Zhou, X. K. Zhou, X. R. Zhou, X. Y. Zhou, Y. Z. Zhou, Z. C. Zhou, A. N. Zhu, J. Zhu, K. Zhu, K. J. Zhu, K. S. Zhu, L. Zhu, L. X. Zhu, S. H. Zhu, T. J. Zhu, W. D. Zhu, W. D. Zhu, W. J. Zhu, W. Z. Zhu, Y. C. Zhu, Z. A. Zhu, X. Y. Zhuang, J. H. Zou, J. Zu
Search for $J/\psi\rightarrow K^{0}_{S}K^{0}_{S}$ and $\psi(3686)\rightarrow K^{0}_{S}K^{0}_{S}$
null
null
null
null
hep-ex
http://creativecommons.org/licenses/by/4.0/
Using data samples of $(10087\pm 44)\times10^{6}$ $J/\psi$ events and $(2712.4\pm 14.3)\times10^{6}$ $\psi(3686)$ events collected with the BESIII detector at the BEPCII collider, we search for the CP violating decays $J/\psi\rightarrow K^{0}_{S}K^{0}_{S}$ and $\psi(3686)\rightarrow K^{0}_{S}K^{0}_{S}$. No significant signals are observed over the expected background yields. The upper limits on their branching fractions are set as $\mathcal{B}(J/\psi\rightarrow K^{0}_{S}K^{0}_{S}) <4.7\times 10^{-9}$ and $\mathcal{B}(\psi(3686)\rightarrow K^{0}_{S}K^{0}_{S}) <1.1\times 10^{-8}$ at the 90% confidence level. These results improve the previous limits by a factor of three for $J/\psi\rightarrow K^{0}_{S} K^{0}_{S}$ and two orders of magnitude for $\psi(3686)\rightarrow K^{0}_{S} K^{0}_{S}$.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 16:14:05 GMT" } ]
2025-04-21T00:00:00
[ [ "BESIII Collaboration", "", "" ], [ "Ablikim", "M.", "" ], [ "Achasov", "M. N.", "" ], [ "Adlarson", "P.", "" ], [ "Ai", "X. C.", "" ], [ "Aliberti", "R.", "" ], [ "Amoroso", "A.", "" ], [ "An", "Q.", "" ], [ "Bai", "Y.", "" ], [ "Bakina", "O.", "" ], [ "Ban", "Y.", "" ], [ "Bao", "H. -R.", "" ], [ "Batozskaya", "V.", "" ], [ "Begzsuren", "K.", "" ], [ "Berger", "N.", "" ], [ "Berlowski", "M.", "" ], [ "Bertani", "M.", "" ], [ "Bettoni", "D.", "" ], [ "Bianchi", "F.", "" ], [ "Bianco", "E.", "" ], [ "Bortone", "A.", "" ], [ "Boyko", "I.", "" ], [ "Briere", "R. A.", "" ], [ "Brueggemann", "A.", "" ], [ "Cai", "H.", "" ], [ "Cai", "M. H.", "" ], [ "Cai", "X.", "" ], [ "Calcaterra", "A.", "" ], [ "Cao", "G. F.", "" ], [ "Cao", "N.", "" ], [ "Cetin", "S. A.", "" ], [ "Chai", "X. Y.", "" ], [ "Chang", "J. F.", "" ], [ "Che", "G. R.", "" ], [ "Che", "Y. Z.", "" ], [ "Chelkov", "G.", "" ], [ "Chen", "C.", "" ], [ "Chen", "C. H.", "" ], [ "Chen", "Chao", "" ], [ "Chen", "G.", "" ], [ "Chen", "H. S.", "" ], [ "Chen", "H. Y.", "" ], [ "Chen", "M. L.", "" ], [ "Chen", "S. J.", "" ], [ "Chen", "S. L.", "" ], [ "Chen", "S. M.", "" ], [ "Chen", "T.", "" ], [ "Chen", "X. R.", "" ], [ "Chen", "X. T.", "" ], [ "Chen", "Y. B.", "" ], [ "Chen", "Y. Q.", "" ], [ "Chen", "Z. J.", "" ], [ "Chen", "Z. K.", "" ], [ "Choi", "S. K.", "" ], [ "Chu", "X.", "" ], [ "Cibinetto", "G.", "" ], [ "Cossio", "F.", "" ], [ "Cui", "J. J.", "" ], [ "Dai", "H. L.", "" ], [ "Dai", "J. P.", "" ], [ "Dbeyssi", "A.", "" ], [ "de Boer", "R. E.", "" ], [ "Dedovich", "D.", "" ], [ "Deng", "C. Q.", "" ], [ "Deng", "Z. Y.", "" ], [ "Denig", "A.", "" ], [ "Denysenko", "I.", "" ], [ "Destefanis", "M.", "" ], [ "De Mori", "F.", "" ], [ "Ding", "B.", "" ], [ "Ding", "X. X.", "" ], [ "Ding", "Y.", "" ], [ "Ding", "Y.", "" ], [ "Ding", "Y. X.", "" ], [ "Dong", "J.", "" ], [ "Dong", "L. Y.", "" ], [ "Dong", "M. Y.", "" ], [ "Dong", "X.", "" ], [ "Du", "M. C.", "" ], [ "Du", "S. X.", "" ], [ "Duan", "Y. Y.", "" ], [ "Duan", "Z. H.", "" ], [ "Egorov", "P.", "" ], [ "Fan", "G. F.", "" ], [ "Fan", "J. J.", "" ], [ "Fan", "Y. H.", "" ], [ "Fang", "J.", "" ], [ "Fang", "J.", "" ], [ "Fang", "S. S.", "" ], [ "Fang", "W. X.", "" ], [ "Fang", "Y. Q.", "" ], [ "Farinelli", "R.", "" ], [ "Fava", "L.", "" ], [ "Feldbauer", "F.", "" ], [ "Felici", "G.", "" ], [ "Feng", "C. Q.", "" ], [ "Feng", "J. H.", "" ], [ "Feng", "Y. T.", "" ], [ "Fritsch", "M.", "" ], [ "Fu", "C. D.", "" ], [ "Fu", "J. L.", "" ], [ "Fu", "Y. W.", "" ], [ "Gao", "H.", "" ], [ "Gao", "X. B.", "" ], [ "Gao", "Y. N.", "" ], [ "Gao", "Y. N.", "" ], [ "Gao", "Y. Y.", "" ], [ "Gao", "Yang", "" ], [ "Garbolino", "S.", "" ], [ "Garzia", "I.", "" ], [ "Ge", "P. T.", "" ], [ "Ge", "Z. W.", "" ], [ "Geng", "C.", "" ], [ "Gersabeck", "E. M.", "" ], [ "Gilman", "A.", "" ], [ "Goetzen", "K.", "" ], [ "Gong", "J. D.", "" ], [ "Gong", "L.", "" ], [ "Gong", "W. X.", "" ], [ "Gradl", "W.", "" ], [ "Gramigna", "S.", "" ], [ "Greco", "M.", "" ], [ "Gu", "M. H.", "" ], [ "Gu", "Y. T.", "" ], [ "Guan", "C. Y.", "" ], [ "Guo", "A. Q.", "" ], [ "Guo", "L. B.", "" ], [ "Guo", "M. J.", "" ], [ "Guo", "R. P.", "" ], [ "Guo", "Y. P.", "" ], [ "Guskov", "A.", "" ], [ "Gutierrez", "J.", "" ], [ "Han", "K. L.", "" ], [ "Han", "T. T.", "" ], [ "Hanisch", "F.", "" ], [ "Hao", "K. D.", "" ], [ "Hao", "X. Q.", "" ], [ "Harris", "F. A.", "" ], [ "He", "K. K.", "" ], [ "He", "K. L.", "" ], [ "Heinsius", "F. H.", "" ], [ "Heinz", "C. H.", "" ], [ "Heng", "Y. K.", "" ], [ "Herold", "C.", "" ], [ "Holtmann", "T.", "" ], [ "Hong", "P. C.", "" ], [ "Hou", "G. Y.", "" ], [ "Hou", "X. T.", "" ], [ "Hou", "Y. R.", "" ], [ "Hou", "Z. L.", "" ], [ "Hu", "B. Y.", "" ], [ "Hu", "H. M.", "" ], [ "Hu", "J. F.", "" ], [ "Hu", "Q. P.", "" ], [ "Hu", "S. L.", "" ], [ "Hu", "T.", "" ], [ "Hu", "Y.", "" ], [ "Hu", "Z. M.", "" ], [ "Huang", "G. S.", "" ], [ "Huang", "K. X.", "" ], [ "Huang", "L. Q.", "" ], [ "Huang", "P.", "" ], [ "Huang", "X. T.", "" ], [ "Huang", "Y. P.", "" ], [ "Huang", "Y. S.", "" ], [ "Hussain", "T.", "" ], [ "Hüsken", "N.", "" ], [ "der Wiesche", "N. in", "" ], [ "Jackson", "J.", "" ], [ "Janchiv", "S.", "" ], [ "Ji", "Q.", "" ], [ "Ji", "Q. P.", "" ], [ "Ji", "W.", "" ], [ "Ji", "X. B.", "" ], [ "Ji", "X. L.", "" ], [ "Ji", "Y. Y.", "" ], [ "Jia", "Z. K.", "" ], [ "Jiang", "D.", "" ], [ "Jiang", "H. B.", "" ], [ "Jiang", "P. C.", "" ], [ "Jiang", "S. J.", "" ], [ "Jiang", "T. J.", "" ], [ "Jiang", "X. S.", "" ], [ "Jiang", "Y.", "" ], [ "Jiao", "J. B.", "" ], [ "Jiao", "J. K.", "" ], [ "Jiao", "Z.", "" ], [ "Jin", "S.", "" ], [ "Jin", "Y.", "" ], [ "Jing", "M. Q.", "" ], [ "Jing", "X. M.", "" ], [ "Johansson", "T.", "" ], [ "Kabana", "S.", "" ], [ "Kalantar-Nayestanaki", "N.", "" ], [ "Kang", "X. L.", "" ], [ "Kang", "X. S.", "" ], [ "Kavatsyuk", "M.", "" ], [ "Ke", "B. C.", "" ], [ "Khachatryan", "V.", "" ], [ "Khoukaz", "A.", "" ], [ "Kiuchi", "R.", "" ], [ "Kolcu", "O. B.", "" ], [ "Kopf", "B.", "" ], [ "Kuessner", "M.", "" ], [ "Kui", "X.", "" ], [ "Kumar", "N.", "" ], [ "Kupsc", "A.", "" ], [ "Kühn", "W.", "" ], [ "Lan", "Q.", "" ], [ "Lan", "W. N.", "" ], [ "Lei", "T. T.", "" ], [ "Lellmann", "M.", "" ], [ "Lenz", "T.", "" ], [ "Li", "C.", "" ], [ "Li", "C.", "" ], [ "Li", "C. H.", "" ], [ "Li", "C. K.", "" ], [ "Li", "Cheng", "" ], [ "Li", "D. M.", "" ], [ "Li", "F.", "" ], [ "Li", "G.", "" ], [ "Li", "H. B.", "" ], [ "Li", "H. J.", "" ], [ "Li", "H. N.", "" ], [ "Li", "Hui", "" ], [ "Li", "J. R.", "" ], [ "Li", "J. S.", "" ], [ "Li", "K.", "" ], [ "Li", "K. L.", "" ], [ "Li", "K. L.", "" ], [ "Li", "L. J.", "" ], [ "Li", "Lei", "" ], [ "Li", "M. H.", "" ], [ "Li", "M. R.", "" ], [ "Li", "P. L.", "" ], [ "Li", "P. R.", "" ], [ "Li", "Q. M.", "" ], [ "Li", "Q. X.", "" ], [ "Li", "R.", "" ], [ "Li", "T.", "" ], [ "Li", "T. Y.", "" ], [ "Li", "W. D.", "" ], [ "Li", "W. G.", "" ], [ "Li", "X.", "" ], [ "Li", "X. H.", "" ], [ "Li", "X. L.", "" ], [ "Li", "X. Y.", "" ], [ "Li", "X. Z.", "" ], [ "Li", "Y.", "" ], [ "Li", "Y. G.", "" ], [ "Li", "Y. P.", "" ], [ "Li", "Z. J.", "" ], [ "Li", "Z. Y.", "" ], [ "Liang", "C.", "" ], [ "Liang", "H.", "" ], [ "Liang", "Y. F.", "" ], [ "Liang", "Y. T.", "" ], [ "Liao", "G. R.", "" ], [ "Liao", "L. B.", "" ], [ "Liao", "M. H.", "" ], [ "Liao", "Y. P.", "" ], [ "Libby", "J.", "" ], [ "Limphirat", "A.", "" ], [ "Lin", "C. C.", "" ], [ "Lin", "C. X.", "" ], [ "Lin", "D. X.", "" ], [ "Lin", "L. Q.", "" ], [ "Lin", "T.", "" ], [ "Liu", "B. J.", "" ], [ "Liu", "B. X.", "" ], [ "Liu", "C.", "" ], [ "Liu", "C. X.", "" ], [ "Liu", "F.", "" ], [ "Liu", "F. H.", "" ], [ "Liu", "Feng", "" ], [ "Liu", "G. M.", "" ], [ "Liu", "H.", "" ], [ "Liu", "H. B.", "" ], [ "Liu", "H. H.", "" ], [ "Liu", "H. M.", "" ], [ "Liu", "Huihui", "" ], [ "Liu", "J. B.", "" ], [ "Liu", "J. J.", "" ], [ "Liu", "K.", "" ], [ "Liu", "K.", "" ], [ "Liu", "K. Y.", "" ], [ "Liu", "Ke", "" ], [ "Liu", "L.", "" ], [ "Liu", "L. C.", "" ], [ "Liu", "Lu", "" ], [ "Liu", "P. L.", "" ], [ "Liu", "Q.", "" ], [ "Liu", "S. B.", "" ], [ "Liu", "T.", "" ], [ "Liu", "W. K.", "" ], [ "Liu", "W. M.", "" ], [ "Liu", "W. T.", "" ], [ "Liu", "X.", "" ], [ "Liu", "X.", "" ], [ "Liu", "X. Y.", "" ], [ "Liu", "Y.", "" ], [ "Liu", "Y.", "" ], [ "Liu", "Y.", "" ], [ "Liu", "Y. B.", "" ], [ "Liu", "Z. A.", "" ], [ "Liu", "Z. D.", "" ], [ "Liu", "Z. Q.", "" ], [ "Lou", "X. C.", "" ], [ "Lu", "F. X.", "" ], [ "Lu", "H. J.", "" ], [ "Lu", "J. G.", "" ], [ "Lu", "Y.", "" ], [ "Lu", "Y. H.", "" ], [ "Lu", "Y. P.", "" ], [ "Lu", "Z. H.", "" ], [ "Luo", "C. L.", "" ], [ "Luo", "J. R.", "" ], [ "Luo", "J. S.", "" ], [ "Luo", "M. X.", "" ], [ "Luo", "T.", "" ], [ "Luo", "X. L.", "" ], [ "Lv", "Z. Y.", "" ], [ "Lyu", "X. R.", "" ], [ "Lyu", "Y. F.", "" ], [ "Lyu", "Y. H.", "" ], [ "Ma", "F. C.", "" ], [ "Ma", "H.", "" ], [ "Ma", "H. L.", "" ], [ "Ma", "J. L.", "" ], [ "Ma", "L. L.", "" ], [ "Ma", "L. R.", "" ], [ "Ma", "Q. M.", "" ], [ "Ma", "R. Q.", "" ], [ "Ma", "R. Y.", "" ], [ "Ma", "T.", "" ], [ "Ma", "X. T.", "" ], [ "Ma", "X. Y.", "" ], [ "Ma", "Y. M.", "" ], [ "Maas", "F. E.", "" ], [ "MacKay", "I.", "" ], [ "Maggiora", "M.", "" ], [ "Malde", "S.", "" ], [ "Mao", "Y. J.", "" ], [ "Mao", "Z. P.", "" ], [ "Marcello", "S.", "" ], [ "Melendi", "F. M.", "" ], [ "Meng", "Y. H.", "" ], [ "Meng", "Z. X.", "" ], [ "Messchendorp", "J. G.", "" ], [ "Mezzadri", "G.", "" ], [ "Miao", "H.", "" ], [ "Min", "T. J.", "" ], [ "Mitchell", "R. E.", "" ], [ "Mo", "X. H.", "" ], [ "Moses", "B.", "" ], [ "Muchnoi", "N. Yu.", "" ], [ "Muskalla", "J.", "" ], [ "Nefedov", "Y.", "" ], [ "Nerling", "F.", "" ], [ "Nie", "L. S.", "" ], [ "Nikolaev", "I. B.", "" ], [ "Ning", "Z.", "" ], [ "Nisar", "S.", "" ], [ "Niu", "Q. L.", "" ], [ "Niu", "W. D.", "" ], [ "Olsen", "S. L.", "" ], [ "Ouyang", "Q.", "" ], [ "Pacetti", "S.", "" ], [ "Pan", "X.", "" ], [ "Pan", "Y.", "" ], [ "Pathak", "A.", "" ], [ "Pei", "Y. P.", "" ], [ "Pelizaeus", "M.", "" ], [ "Peng", "H. P.", "" ], [ "Peng", "Y. Y.", "" ], [ "Peters", "K.", "" ], [ "Ping", "J. L.", "" ], [ "Ping", "R. G.", "" ], [ "Plura", "S.", "" ], [ "Prasad", "V.", "" ], [ "Qi", "F. Z.", "" ], [ "Qi", "H. R.", "" ], [ "Qi", "M.", "" ], [ "Qian", "S.", "" ], [ "Qian", "W. B.", "" ], [ "Qiao", "C. F.", "" ], [ "Qiao", "J. H.", "" ], [ "Qin", "J. J.", "" ], [ "Qin", "J. L.", "" ], [ "Qin", "L. Q.", "" ], [ "Qin", "L. Y.", "" ], [ "Qin", "P. B.", "" ], [ "Qin", "X. P.", "" ], [ "Qin", "X. S.", "" ], [ "Qin", "Z. H.", "" ], [ "Qiu", "J. F.", "" ], [ "Qu", "Z. H.", "" ], [ "Redmer", "C. F.", "" ], [ "Rivetti", "A.", "" ], [ "Rolo", "M.", "" ], [ "Rong", "G.", "" ], [ "Rong", "S. S.", "" ], [ "Rosini", "F.", "" ], [ "Rosner", "Ch.", "" ], [ "Ruan", "M. Q.", "" ], [ "Ruan", "S. N.", "" ], [ "Salone", "N.", "" ], [ "Sarantsev", "A.", "" ], [ "Schelhaas", "Y.", "" ], [ "Schoenning", "K.", "" ], [ "Scodeggio", "M.", "" ], [ "Shan", "K. Y.", "" ], [ "Shan", "W.", "" ], [ "Shan", "X. Y.", "" ], [ "Shang", "Z. J.", "" ], [ "Shangguan", "J. F.", "" ], [ "Shao", "L. G.", "" ], [ "Shao", "M.", "" ], [ "Shen", "C. P.", "" ], [ "Shen", "H. F.", "" ], [ "Shen", "W. H.", "" ], [ "Shen", "X. Y.", "" ], [ "Shi", "B. A.", "" ], [ "Shi", "H.", "" ], [ "Shi", "J. L.", "" ], [ "Shi", "J. Y.", "" ], [ "Shi", "S. Y.", "" ], [ "Shi", "X.", "" ], [ "Song", "H. L.", "" ], [ "Song", "J. J.", "" ], [ "Song", "T. Z.", "" ], [ "Song", "W. M.", "" ], [ "Song", "Y. X.", "" ], [ "Sosio", "S.", "" ], [ "Spataro", "S.", "" ], [ "Stieler", "F.", "" ], [ "Su", "S. S", "" ], [ "Su", "Y. J.", "" ], [ "Sun", "G. B.", "" ], [ "Sun", "G. X.", "" ], [ "Sun", "H.", "" ], [ "Sun", "H. K.", "" ], [ "Sun", "J. F.", "" ], [ "Sun", "K.", "" ], [ "Sun", "L.", "" ], [ "Sun", "S. S.", "" ], [ "Sun", "T.", "" ], [ "Sun", "Y. C.", "" ], [ "Sun", "Y. H.", "" ], [ "Sun", "Y. J.", "" ], [ "Sun", "Y. Z.", "" ], [ "Sun", "Z. Q.", "" ], [ "Sun", "Z. T.", "" ], [ "Tang", "C. J.", "" ], [ "Tang", "G. Y.", "" ], [ "Tang", "J.", "" ], [ "Tang", "L. F.", "" ], [ "Tang", "M.", "" ], [ "Tang", "Y. A.", "" ], [ "Tao", "L. Y.", "" ], [ "Tat", "M.", "" ], [ "Teng", "J. X.", "" ], [ "Tian", "J. Y.", "" ], [ "Tian", "W. H.", "" ], [ "Tian", "Y.", "" ], [ "Tian", "Z. F.", "" ], [ "Uman", "I.", "" ], [ "Wang", "B.", "" ], [ "Wang", "B.", "" ], [ "Wang", "Bo", "" ], [ "Wang", "C.", "" ], [ "Wang", "Cong", "" ], [ "Wang", "D. Y.", "" ], [ "Wang", "H. J.", "" ], [ "Wang", "J. J.", "" ], [ "Wang", "K.", "" ], [ "Wang", "L. L.", "" ], [ "Wang", "L. W.", "" ], [ "Wang", "M.", "" ], [ "Wang", "M.", "" ], [ "Wang", "N. Y.", "" ], [ "Wang", "S.", "" ], [ "Wang", "T.", "" ], [ "Wang", "T. J.", "" ], [ "Wang", "W.", "" ], [ "Wang", "W.", "" ], [ "Wang", "W. P.", "" ], [ "Wang", "X.", "" ], [ "Wang", "X. F.", "" ], [ "Wang", "X. J.", "" ], [ "Wang", "X. L.", "" ], [ "Wang", "X. N.", "" ], [ "Wang", "Y.", "" ], [ "Wang", "Y. D.", "" ], [ "Wang", "Y. F.", "" ], [ "Wang", "Y. H.", "" ], [ "Wang", "Y. L.", "" ], [ "Wang", "Y. N.", "" ], [ "Wang", "Y. Q.", "" ], [ "Wang", "Yaqian", "" ], [ "Wang", "Yi", "" ], [ "Wang", "Yuan", "" ], [ "Wang", "Z.", "" ], [ "Wang", "Z. L.", "" ], [ "Wang", "Z. L.", "" ], [ "Wang", "Z. Q.", "" ], [ "Wang", "Z. Y.", "" ], [ "Wei", "D. H.", "" ], [ "Wei", "H. R.", "" ], [ "Weidner", "F.", "" ], [ "Wen", "S. P.", "" ], [ "Wen", "Y. R.", "" ], [ "Wiedner", "U.", "" ], [ "Wilkinson", "G.", "" ], [ "Wolke", "M.", "" ], [ "Wu", "C.", "" ], [ "Wu", "J. F.", "" ], [ "Wu", "L. H.", "" ], [ "Wu", "L. J.", "" ], [ "Wu", "Lianjie", "" ], [ "Wu", "S. G.", "" ], [ "Wu", "S. M.", "" ], [ "Wu", "X.", "" ], [ "Wu", "X. H.", "" ], [ "Wu", "Y. J.", "" ], [ "Wu", "Z.", "" ], [ "Xia", "L.", "" ], [ "Xian", "X. M.", "" ], [ "Xiang", "B. H.", "" ], [ "Xiang", "T.", "" ], [ "Xiao", "D.", "" ], [ "Xiao", "G. Y.", "" ], [ "Xiao", "H.", "" ], [ "Xiao", "Y. L.", "" ], [ "Xiao", "Z. J.", "" ], [ "Xie", "C.", "" ], [ "Xie", "K. J.", "" ], [ "Xie", "X. H.", "" ], [ "Xie", "Y.", "" ], [ "Xie", "Y. G.", "" ], [ "Xie", "Y. H.", "" ], [ "Xie", "Z. P.", "" ], [ "Xing", "T. Y.", "" ], [ "Xu", "C. F.", "" ], [ "Xu", "C. J.", "" ], [ "Xu", "G. F.", "" ], [ "Xu", "H. Y.", "" ], [ "Xu", "H. Y.", "" ], [ "Xu", "M.", "" ], [ "Xu", "Q. J.", "" ], [ "Xu", "Q. N.", "" ], [ "Xu", "W. L.", "" ], [ "Xu", "X. P.", "" ], [ "Xu", "Y.", "" ], [ "Xu", "Y.", "" ], [ "Xu", "Y. C.", "" ], [ "Xu", "Z. S.", "" ], [ "Yan", "H. Y.", "" ], [ "Yan", "L.", "" ], [ "Yan", "W. B.", "" ], [ "Yan", "W. C.", "" ], [ "Yan", "W. P.", "" ], [ "Yan", "X. Q.", "" ], [ "Yang", "H. J.", "" ], [ "Yang", "H. L.", "" ], [ "Yang", "H. X.", "" ], [ "Yang", "J. H.", "" ], [ "Yang", "R. J.", "" ], [ "Yang", "T.", "" ], [ "Yang", "Y.", "" ], [ "Yang", "Y. F.", "" ], [ "Yang", "Y. H.", "" ], [ "Yang", "Y. Q.", "" ], [ "Yang", "Y. X.", "" ], [ "Yang", "Y. Z.", "" ], [ "Ye", "M.", "" ], [ "Ye", "M. H.", "" ], [ "Yin", "Junhao", "" ], [ "You", "Z. Y.", "" ], [ "Yu", "B. X.", "" ], [ "Yu", "C. X.", "" ], [ "Yu", "G.", "" ], [ "Yu", "J. S.", "" ], [ "Yu", "M. C.", "" ], [ "Yu", "T.", "" ], [ "Yu", "X. D.", "" ], [ "Yu", "Y. C.", "" ], [ "Yuan", "C. Z.", "" ], [ "Yuan", "H.", "" ], [ "Yuan", "J.", "" ], [ "Yuan", "J.", "" ], [ "Yuan", "L.", "" ], [ "Yuan", "S. C.", "" ], [ "Yuan", "Y.", "" ], [ "Yuan", "Z. Y.", "" ], [ "Yue", "C. X.", "" ], [ "Yue", "Ying", "" ], [ "Zafar", "A. A.", "" ], [ "Zeng", "S. H.", "" ], [ "Zeng", "X.", "" ], [ "Zeng", "Y.", "" ], [ "Zeng", "Y. J.", "" ], [ "Zeng", "Y. J.", "" ], [ "Zhai", "X. Y.", "" ], [ "Zhan", "Y. H.", "" ], [ "Zhang", "A. Q.", "" ], [ "Zhang", "B. L.", "" ], [ "Zhang", "B. X.", "" ], [ "Zhang", "D. H.", "" ], [ "Zhang", "G. Y.", "" ], [ "Zhang", "G. Y.", "" ], [ "Zhang", "H.", "" ], [ "Zhang", "H.", "" ], [ "Zhang", "H. C.", "" ], [ "Zhang", "H. H.", "" ], [ "Zhang", "H. Q.", "" ], [ "Zhang", "H. R.", "" ], [ "Zhang", "H. Y.", "" ], [ "Zhang", "J.", "" ], [ "Zhang", "J.", "" ], [ "Zhang", "J. J.", "" ], [ "Zhang", "J. L.", "" ], [ "Zhang", "J. Q.", "" ], [ "Zhang", "J. S.", "" ], [ "Zhang", "J. W.", "" ], [ "Zhang", "J. X.", "" ], [ "Zhang", "J. Y.", "" ], [ "Zhang", "J. Z.", "" ], [ "Zhang", "Jianyu", "" ], [ "Zhang", "L. M.", "" ], [ "Zhang", "Lei", "" ], [ "Zhang", "N.", "" ], [ "Zhang", "P.", "" ], [ "Zhang", "Q.", "" ], [ "Zhang", "Q. Y.", "" ], [ "Zhang", "R. Y.", "" ], [ "Zhang", "S. H.", "" ], [ "Zhang", "Shulei", "" ], [ "Zhang", "X. M.", "" ], [ "Zhang", "X. Y", "" ], [ "Zhang", "X. Y.", "" ], [ "Zhang", "Y.", "" ], [ "Zhang", "Y.", "" ], [ "Zhang", "Y. T.", "" ], [ "Zhang", "Y. H.", "" ], [ "Zhang", "Y. M.", "" ], [ "Zhang", "Z. D.", "" ], [ "Zhang", "Z. H.", "" ], [ "Zhang", "Z. L.", "" ], [ "Zhang", "Z. L.", "" ], [ "Zhang", "Z. X.", "" ], [ "Zhang", "Z. Y.", "" ], [ "Zhang", "Z. Y.", "" ], [ "Zhang", "Z. Z.", "" ], [ "Zhang", "Zh. Zh.", "" ], [ "Zhao", "G.", "" ], [ "Zhao", "J. Y.", "" ], [ "Zhao", "J. Z.", "" ], [ "Zhao", "L.", "" ], [ "Zhao", "Lei", "" ], [ "Zhao", "M. G.", "" ], [ "Zhao", "N.", "" ], [ "Zhao", "R. P.", "" ], [ "Zhao", "S. J.", "" ], [ "Zhao", "Y. B.", "" ], [ "Zhao", "Y. L.", "" ], [ "Zhao", "Y. X.", "" ], [ "Zhao", "Z. G.", "" ], [ "Zhemchugov", "A.", "" ], [ "Zheng", "B.", "" ], [ "Zheng", "B. M.", "" ], [ "Zheng", "J. P.", "" ], [ "Zheng", "W. J.", "" ], [ "Zheng", "X. R.", "" ], [ "Zheng", "Y. H.", "" ], [ "Zhong", "B.", "" ], [ "Zhong", "X.", "" ], [ "Zhou", "H.", "" ], [ "Zhou", "J. Q.", "" ], [ "Zhou", "J. Y.", "" ], [ "Zhou", "S.", "" ], [ "Zhou", "X.", "" ], [ "Zhou", "X. K.", "" ], [ "Zhou", "X. R.", "" ], [ "Zhou", "X. Y.", "" ], [ "Zhou", "Y. Z.", "" ], [ "Zhou", "Z. C.", "" ], [ "Zhu", "A. N.", "" ], [ "Zhu", "J.", "" ], [ "Zhu", "K.", "" ], [ "Zhu", "K. J.", "" ], [ "Zhu", "K. S.", "" ], [ "Zhu", "L.", "" ], [ "Zhu", "L. X.", "" ], [ "Zhu", "S. H.", "" ], [ "Zhu", "T. J.", "" ], [ "Zhu", "W. D.", "" ], [ "Zhu", "W. D.", "" ], [ "Zhu", "W. J.", "" ], [ "Zhu", "W. Z.", "" ], [ "Zhu", "Y. C.", "" ], [ "Zhu", "Z. A.", "" ], [ "Zhuang", "X. Y.", "" ], [ "Zou", "J. H.", "" ], [ "Zu", "J.", "" ] ]
2504.13772
Phuong Nguyen
Minh Hoang Vuong and Anh M. T. Bui and Phuong T. Nguyen and Davide Di Ruscio
Bake Two Cakes with One Oven: RL for Defusing Popularity Bias and Cold-start in Third-Party Library Recommendations
The paper has been peer-reviewed and accepted for publication in the proceedings of the 29th International Conference on Evaluation and Assessment in Software Engineering (EASE 2025)
null
null
null
cs.SE
http://creativecommons.org/licenses/by-nc-sa/4.0/
Third-party libraries (TPLs) have become an integral part of modern software development, enhancing developer productivity and accelerating time-to-market. However, identifying suitable candidates from a rapidly growing and continuously evolving collection of TPLs remains a challenging task. TPL recommender systems have been studied, offering a promising solution to address this issue. They typically rely on collaborative filtering (CF) that exploits a two-dimensional project-library matrix (user-item in general context of recommendation) when making recommendations. We have noticed that CF-based approaches often encounter two challenges: (i) a tendency to recommend popular items more frequently, making them even more dominant, a phenomenon known as popularity bias, and (ii) difficulty in generating recommendations for new users or items due to limited user-item interactions, commonly referred to as the cold-start problem. In this paper, we propose a reinforcement learning (RL)-based approach to address popularity bias and the cold-start problem in TPL recommendation. Our method comprises three key components. First, we utilize a graph convolution network (GCN)-based embedding model to learn user preferences and user-item interactions, allowing us to capture complex relationships within interaction subgraphs and effectively represent new user/item embeddings. Second, we introduce an aggregation operator to generate a representative embedding from user and item embeddings, which is then used to model cold-start users. Finally, we adopt a model-based RL framework for TPL recommendation, where popularity bias is mitigated through a carefully designed reward function and a rarity-based replay buffer partitioning strategy. The results demonstrated that our proposed approach outperforms state-of-the-art models in cold-start scenarios while effectively mitigating the impact of popularity bias.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 16:17:20 GMT" } ]
2025-04-21T00:00:00
[ [ "Vuong", "Minh Hoang", "" ], [ "Bui", "Anh M. T.", "" ], [ "Nguyen", "Phuong T.", "" ], [ "Di Ruscio", "Davide", "" ] ]
2504.13773
Cory Nunn
Cory Nunn, Nijil Lal, Ivan Burenkov, Ya-Shian Li-Baboud, Paulina S. Kuo, Thomas Gerrits, Sergey V. Polyakov
Picosecond synchronization of mode-locked lasers for metropolitan-scale quantum networks
10 pages, 4 figures
null
null
null
quant-ph
http://creativecommons.org/licenses/by/4.0/
We demonstrate picosecond-level synchronization of two actively mode-locked Ti:Sapphire lasers via the White Rabbit Precision Time Protocol (WR-PTP), tested over 120 km of deployed optical fiber. This synchronization capability, in combination with the highly single-mode, transform-limited pulses produced by each laser, enables their use as pump lasers for indistinguishable photon sources at remote locations in a quantum network. Here, the WR-PTP serves as a scalable network synchronization protocol, and its performance is compared to traditional methods of local synchronization. We demonstrate pulse-to-pulse synchronization better than 3 ps and time deviation (TDEV) values below 4 ps for all averaging times up to 10 s. With a designed coherence time of 35 ps for single photon sources utilizing these lasers, the achievable temporal overlap corresponds to 98 % Hong-Ou-Mandel (HOM) interference visibility between independent sources.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 16:19:47 GMT" } ]
2025-04-21T00:00:00
[ [ "Nunn", "Cory", "" ], [ "Lal", "Nijil", "" ], [ "Burenkov", "Ivan", "" ], [ "Li-Baboud", "Ya-Shian", "" ], [ "Kuo", "Paulina S.", "" ], [ "Gerrits", "Thomas", "" ], [ "Polyakov", "Sergey V.", "" ] ]
2504.13774
Tamim Al Mahmud
Tamim Al Mahmud, Najeeb Jebreel, Josep Domingo-Ferrer and David Sanchez
DP2Unlearning: An Efficient and Guaranteed Unlearning Framework for LLMs
49 pages
null
10.2139/ssrn.5217160
null
cs.LG cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Large language models (LLMs) have recently revolutionized language processing tasks but have also brought ethical and legal issues. LLMs have a tendency to memorize potentially private or copyrighted information present in the training data, which might then be delivered to end users at inference time. When this happens, a naive solution is to retrain the model from scratch after excluding the undesired data. Although this guarantees that the target data have been forgotten, it is also prohibitively expensive for LLMs. Approximate unlearning offers a more efficient alternative, as it consists of ex post modifications of the trained model itself to prevent undesirable results, but it lacks forgetting guarantees because it relies solely on empirical evidence. In this work, we present DP2Unlearning, a novel LLM unlearning framework that offers formal forgetting guarantees at a significantly lower cost than retraining from scratch on the data to be retained. DP2Unlearning involves training LLMs on textual data protected using {\epsilon}-differential privacy (DP), which later enables efficient unlearning with the guarantees against disclosure associated with the chosen {\epsilon}. Our experiments demonstrate that DP2Unlearning achieves similar model performance post-unlearning, compared to an LLM retraining from scratch on retained data -- the gold standard exact unlearning -- but at approximately half the unlearning cost. In addition, with a reasonable computational cost, it outperforms approximate unlearning methods at both preserving the utility of the model post-unlearning and effectively forgetting the targeted information.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 16:22:20 GMT" } ]
2025-04-21T00:00:00
[ [ "Mahmud", "Tamim Al", "" ], [ "Jebreel", "Najeeb", "" ], [ "Domingo-Ferrer", "Josep", "" ], [ "Sanchez", "David", "" ] ]
2504.13776
Aman Agarwal
Aman Agarwal, James Gearon, Raksha Rank, Etienne Chenevert
Fighting Fires from Space: Leveraging Vision Transformers for Enhanced Wildfire Detection and Characterization
null
null
null
null
cs.CV eess.IV
http://creativecommons.org/licenses/by/4.0/
Wildfires are increasing in intensity, frequency, and duration across large parts of the world as a result of anthropogenic climate change. Modern hazard detection and response systems that deal with wildfires are under-equipped for sustained wildfire seasons. Recent work has proved automated wildfire detection using Convolutional Neural Networks (CNNs) trained on satellite imagery are capable of high-accuracy results. However, CNNs are computationally expensive to train and only incorporate local image context. Recently, Vision Transformers (ViTs) have gained popularity for their efficient training and their ability to include both local and global contextual information. In this work, we show that ViT can outperform well-trained and specialized CNNs to detect wildfires on a previously published dataset of LandSat-8 imagery. One of our ViTs outperforms the baseline CNN comparison by 0.92%. However, we find our own implementation of CNN-based UNet to perform best in every category, showing their sustained utility in image tasks. Overall, ViTs are comparably capable in detecting wildfires as CNNs, though well-tuned CNNs are still the best technique for detecting wildfire with our UNet providing an IoU of 93.58%, better than the baseline UNet by some 4.58%.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 16:25:54 GMT" } ]
2025-04-21T00:00:00
[ [ "Agarwal", "Aman", "" ], [ "Gearon", "James", "" ], [ "Rank", "Raksha", "" ], [ "Chenevert", "Etienne", "" ] ]
2504.13777
Anqi Shao
Anqi Shao
Beyond Misinformation: A Conceptual Framework for Studying AI Hallucinations in (Science) Communication
null
null
null
null
cs.HC
http://creativecommons.org/licenses/by-nc-sa/4.0/
This paper proposes a conceptual framework for understanding AI hallucinations as a distinct form of misinformation. While misinformation scholarship has traditionally focused on human intent, generative AI systems now produce false yet plausible outputs absent of such intent. I argue that these AI hallucinations should not be treated merely as technical failures but as communication phenomena with social consequences. Drawing on a supply-and-demand model and the concept of distributed agency, the framework outlines how hallucinations differ from human-generated misinformation in production, perception, and institutional response. I conclude by outlining a research agenda for communication scholars to investigate the emergence, dissemination, and audience reception of hallucinated content, with attention to macro (institutional), meso (group), and micro (individual) levels. This work urges communication researchers to rethink the boundaries of misinformation theory in light of probabilistic, non-human actors increasingly embedded in knowledge production.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 16:26:02 GMT" } ]
2025-04-21T00:00:00
[ [ "Shao", "Anqi", "" ] ]
2504.13778
Nadezhda Semenova Dr.
Ivan Kolesnikov and Nadezhda Semenova
Internal noise in hardware deep and recurrent neural networks helps with learning
8 pages 5 figures
null
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, the field of hardware neural networks has been actively developing, where neurons and their connections are not simulated on a computer but are implemented at the physical level, transforming the neural network into a tangible device. In this paper, we investigate how internal noise during the training of neural networks affects the final performance of recurrent and deep neural networks. We consider feedforward networks (FNN) and echo state networks (ESN) as examples. The types of noise examined originated from a real optical implementation of a neural network. However, these types were subsequently generalized to enhance the applicability of our findings on a broader scale. The noise types considered include additive and multiplicative noise, which depend on how noise influences each individual neuron, and correlated and uncorrelated noise, which pertains to the impact of noise on groups of neurons (such as the hidden layer of FNNs or the reservoir of ESNs). In this paper, we demonstrate that, in most cases, both deep and echo state networks benefit from internal noise during training, as it enhances their resilience to noise. Consequently, the testing performance at the same noise intensities is significantly higher for networks trained with noise than for those trained without it. Notably, only multiplicative correlated noise during training has minimal has almost no impact on both deep and recurrent networks.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 16:26:46 GMT" } ]
2025-04-21T00:00:00
[ [ "Kolesnikov", "Ivan", "" ], [ "Semenova", "Nadezhda", "" ] ]
2504.13779
Thomas J. Maldonado
Thomas J. Maldonado, Alejandro W. Rodriguez, Hakan E. T\"ureci
Quantum theory of the Josephson junction between finite islands
5 pages, 3 figures
null
null
null
quant-ph cond-mat.supr-con
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Superconducting circuits comprising Josephson junctions have spurred significant research activity due to their promise to realize scalable quantum computers. Effective Hamiltonians for these systems have traditionally been derived assuming the junction connects superconducting islands of infinite size. We derive a quantized Hamiltonian for a Josephson junction between finite-sized islands and predict measurable corrections to the qubit frequency and charge susceptibility to test the theory.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 16:27:10 GMT" } ]
2025-04-21T00:00:00
[ [ "Maldonado", "Thomas J.", "" ], [ "Rodriguez", "Alejandro W.", "" ], [ "Türeci", "Hakan E.", "" ] ]
2504.13780
Madhu Dhiman
Madhu Dhiman, Atul Maurya, Veeraruna Kavitha and Priyank Sinha
Punitive policies to combat misreporting in dynamic supply chains
null
null
null
null
math.OC
http://creativecommons.org/licenses/by-nc-nd/4.0/
Wholesale price contracts are known to be associated with double marginalization effects, which prevents supply chains from achieving their true market share. In a dynamic setting under information asymmetry, these inefficiencies manifest in the form of misreporting of the market potential by the manufacturer to the supplier, again leading to the loss of market share. We pose the dynamics of interaction between the supplier and manufacturer as the Stackelberg game and develop theoretical results for optimal punitive strategies that the supplier can implement to ensure that the manufacturer truthfully reveals the market potential in the single-stage setting. Later, we validate these results through the randomly generated, Monte-Carlo simulation based numerical examples.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 16:29:38 GMT" } ]
2025-04-21T00:00:00
[ [ "Dhiman", "Madhu", "" ], [ "Maurya", "Atul", "" ], [ "Kavitha", "Veeraruna", "" ], [ "Sinha", "Priyank", "" ] ]
2504.13781
Divan Aristo Burger Dr
Divan A. Burger, Sean van der Merwe, Emmanuel Lesaffre
Addressing outliers in mixed-effects logistic regression: a more robust modeling approach
null
null
null
null
stat.ME
http://creativecommons.org/licenses/by/4.0/
This study introduces an outlier-robust model for analyzing hierarchically structured bounded count data within a Bayesian framework, utilizing a logistic regression approach implemented in JAGS. Our model incorporates a t-distributed latent variable to address overdispersion and outliers, improving robustness compared to conventional models such as the beta-binomial, binomial-logit-normal, and standard binomial models. Notably, our approach models the median of the response variable, presenting a more convenient and interpretable measure of central tendency, which is available in closed form. For comparability between all models, we also make predictions based on the mean proportion; however, this involves an integration step for the t-distributed nuisance parameter. While limited literature specifically addresses outliers in mixed models for bounded count data, this research fills that gap. The practical utility of the model is demonstrated using a longitudinal medication adherence dataset, where patient behavior often results in abrupt changes and outliers within individual trajectories. A simulation study demonstrates the binomial-logit-t model's strong performance, with comparison statistics favoring it among the four evaluated models. An additional data contamination simulation confirms its robustness against outliers. Our robust approach maintains the integrity of the dataset, effectively handling outliers to provide more accurate and reliable parameter estimates.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 16:33:03 GMT" } ]
2025-04-21T00:00:00
[ [ "Burger", "Divan A.", "" ], [ "van der Merwe", "Sean", "" ], [ "Lesaffre", "Emmanuel", "" ] ]
2504.13782
Kuan-Cheng Chen
Wenxuan Ma, Kuan-Cheng Chen, Shang Yu, Mengxiang Liu, Ruilong Deng
Robust Decentralized Quantum Kernel Learning for Noisy and Adversarial Environment
null
null
null
null
quant-ph cs.DC
http://creativecommons.org/licenses/by/4.0/
This paper proposes a general decentralized framework for quantum kernel learning (QKL). It has robustness against quantum noise and can also be designed to defend adversarial information attacks forming a robust approach named RDQKL. We analyze the impact of noise on QKL and study the robustness of decentralized QKL to the noise. By integrating robust decentralized optimization techniques, our method is able to mitigate the impact of malicious data injections across multiple nodes. Experimental results demonstrate that our approach maintains high accuracy under noisy quantum operations and effectively counter adversarial modifications, offering a promising pathway towards the future practical, scalable and secure quantum machine learning (QML).
[ { "version": "v1", "created": "Fri, 18 Apr 2025 16:33:07 GMT" } ]
2025-04-21T00:00:00
[ [ "Ma", "Wenxuan", "" ], [ "Chen", "Kuan-Cheng", "" ], [ "Yu", "Shang", "" ], [ "Liu", "Mengxiang", "" ], [ "Deng", "Ruilong", "" ] ]
2504.13783
Ivana Vukorepa
Dra\v{z}en Adamovi\'c, Ivana Vukorepa
A new quasi-lisse affine vertex algebra of type $D_4$
13 pages
null
null
null
math.QA math-ph math.MP math.RT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a family of potential quasi-lisse affine vertex algebras $L_{k_m}(D_4)$ at levels $k_m =-6 + \frac{4}{2m+1}$. In the case $m=0$, the irreducible $L_{k_0}(D_4)$--modules were classified in arXiv:1205.3003, and it was proved in arXiv:1610.05865 that $L_{k_0}(D_4)$ is a quasi-lisse vertex algebra. We conjecture that $L_{k_m}(D_4)$ is quasi-lisse for every $m \in {\mathbb{Z}}_{>0}$, and that it contains a unique irreducible ordinary module. In this article we prove this conjecture for $m=1$, by using mostly computational methods. We show that the maximal ideal in the universal affine vertex algebra $V^{k_1}(D_4)$ is generated by three singular vectors of conformal weight six. The explicit formulas were obtained using software. Then we apply Zhu's theory and classify all irreducible $L_{k_1}(D_4)$--modules. It turns out that $L_{k_1}(D_4)$ has $405$ irreducible modules in the category $\mathcal O$, but a unique irreducible ordinary module. Finally, we prove that $L_{k_1}(D_4)$ is quasi-lisse by showing that its associated variety is contained in the nilpotent cone of $D_4$.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 16:34:34 GMT" } ]
2025-04-21T00:00:00
[ [ "Adamović", "Dražen", "" ], [ "Vukorepa", "Ivana", "" ] ]
2504.13784
Andrew Ryzhikov
Stefan Kiefer, Andrew Ryzhikov
The complexity of reachability problems in strongly connected finite automata
null
null
null
null
cs.FL
http://creativecommons.org/licenses/by/4.0/
Several reachability problems in finite automata, such as completeness of NFAs and synchronisation of total DFAs, correspond to fundamental properties of sets of nonnegative matrices. In particular, the two mentioned properties correspond to matrix mortality and ergodicity, which ask whether there exists a product of the input matrices that is equal to, respectively, the zero matrix and a matrix with a column of strictly positive entries only. The case where the input automaton is strongly connected (that is, the corresponding set of nonnegative matrices is irreducible) frequently appears in applications and often admits better properties than the general case. In this paper, we address the existence of such properties from the computational complexity point of view, and develop a versatile technique to show that several NL-complete problems remain NL-complete in the strongly connected case. Namely, we show that deciding if a binary total DFA is synchronising is NL-complete even if it is promised to be strongly connected, and that deciding completeness of a binary unambiguous NFA with very limited nondeterminism is NL-complete under the same promise.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 16:34:41 GMT" } ]
2025-04-21T00:00:00
[ [ "Kiefer", "Stefan", "" ], [ "Ryzhikov", "Andrew", "" ] ]
2504.13785
Steffen Hagedorn
Steffen Hagedorn, Aron Distelzweig, Marcel Hallgarten, Alexandru P. Condurache
Learning Through Retrospection: Improving Trajectory Prediction for Automated Driving with Error Feedback
null
null
null
null
cs.RO cs.AI cs.CV
http://creativecommons.org/licenses/by-nc-sa/4.0/
In automated driving, predicting trajectories of surrounding vehicles supports reasoning about scene dynamics and enables safe planning for the ego vehicle. However, existing models handle predictions as an instantaneous task of forecasting future trajectories based on observed information. As time proceeds, the next prediction is made independently of the previous one, which means that the model cannot correct its errors during inference and will repeat them. To alleviate this problem and better leverage temporal data, we propose a novel retrospection technique. Through training on closed-loop rollouts the model learns to use aggregated feedback. Given new observations it reflects on previous predictions and analyzes its errors to improve the quality of subsequent predictions. Thus, the model can learn to correct systematic errors during inference. Comprehensive experiments on nuScenes and Argoverse demonstrate a considerable decrease in minimum Average Displacement Error of up to 31.9% compared to the state-of-the-art baseline without retrospection. We further showcase the robustness of our technique by demonstrating a better handling of out-of-distribution scenarios with undetected road-users.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 16:35:12 GMT" } ]
2025-04-21T00:00:00
[ [ "Hagedorn", "Steffen", "" ], [ "Distelzweig", "Aron", "" ], [ "Hallgarten", "Marcel", "" ], [ "Condurache", "Alexandru P.", "" ] ]
2504.13786
Lorenz Kummer BSc MSc
Lorenz Kummer, Wilfried N. Gansterer, Nils M. Kriege
On the Relationship Between Robustness and Expressivity of Graph Neural Networks
Accepted at AISTAST 2025, will add DOI when available
null
null
null
cs.LG
http://creativecommons.org/licenses/by/4.0/
We investigate the vulnerability of Graph Neural Networks (GNNs) to bit-flip attacks (BFAs) by introducing an analytical framework to study the influence of architectural features, graph properties, and their interaction. The expressivity of GNNs refers to their ability to distinguish non-isomorphic graphs and depends on the encoding of node neighborhoods. We examine the vulnerability of neural multiset functions commonly used for this purpose and establish formal criteria to characterize a GNN's susceptibility to losing expressivity due to BFAs. This enables an analysis of the impact of homophily, graph structural variety, feature encoding, and activation functions on GNN robustness. We derive theoretical bounds for the number of bit flips required to degrade GNN expressivity on a dataset, identifying ReLU-activated GNNs operating on highly homophilous graphs with low-dimensional or one-hot encoded features as particularly susceptible. Empirical results using ten real-world datasets confirm the statistical significance of our key theoretical insights and offer actionable results to mitigate BFA risks in expressivity-critical applications.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 16:38:33 GMT" } ]
2025-04-21T00:00:00
[ [ "Kummer", "Lorenz", "" ], [ "Gansterer", "Wilfried N.", "" ], [ "Kriege", "Nils M.", "" ] ]
2504.13787
Anton Xue
Helen Jin, Anton Xue, Weiqiu You, Surbhi Goel, Eric Wong
Probabilistic Stability Guarantees for Feature Attributions
null
null
null
null
cs.LG cs.AI
http://creativecommons.org/licenses/by/4.0/
Stability guarantees are an emerging tool for evaluating feature attributions, but existing certification methods rely on smoothed classifiers and often yield conservative guarantees. To address these limitations, we introduce soft stability and propose a simple, model-agnostic, and sample-efficient stability certification algorithm (SCA) that provides non-trivial and interpretable guarantees for any attribution. Moreover, we show that mild smoothing enables a graceful tradeoff between accuracy and stability, in contrast to prior certification methods that require a more aggressive compromise. Using Boolean function analysis, we give a novel characterization of stability under smoothing. We evaluate SCA on vision and language tasks, and demonstrate the effectiveness of soft stability in measuring the robustness of explanation methods.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 16:39:08 GMT" } ]
2025-04-21T00:00:00
[ [ "Jin", "Helen", "" ], [ "Xue", "Anton", "" ], [ "You", "Weiqiu", "" ], [ "Goel", "Surbhi", "" ], [ "Wong", "Eric", "" ] ]
2504.13788
Yixuan Yang
Yixuan Yang, Jinyu Yang, Zixiang Zhao, Victor Sanchez, Feng Zheng
RefComp: A Reference-guided Unified Framework for Unpaired Point Cloud Completion
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The unpaired point cloud completion task aims to complete a partial point cloud by using models trained with no ground truth. Existing unpaired point cloud completion methods are class-aware, i.e., a separate model is needed for each object class. Since they have limited generalization capabilities, these methods perform poorly in real-world scenarios when confronted with a wide range of point clouds of generic 3D objects. In this paper, we propose a novel unpaired point cloud completion framework, namely the Reference-guided Completion (RefComp) framework, which attains strong performance in both the class-aware and class-agnostic training settings. The RefComp framework transforms the unpaired completion problem into a shape translation problem, which is solved in the latent feature space of the partial point clouds. To this end, we introduce the use of partial-complete point cloud pairs, which are retrieved by using the partial point cloud to be completed as a template. These point cloud pairs are used as reference data to guide the completion process. Our RefComp framework uses a reference branch and a target branch with shared parameters for shape fusion and shape translation via a Latent Shape Fusion Module (LSFM) to enhance the structural features along the completion pipeline. Extensive experiments demonstrate that the RefComp framework achieves not only state-of-the-art performance in the class-aware training setting but also competitive results in the class-agnostic training setting on both virtual scans and real-world datasets.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 16:40:16 GMT" } ]
2025-04-21T00:00:00
[ [ "Yang", "Yixuan", "" ], [ "Yang", "Jinyu", "" ], [ "Zhao", "Zixiang", "" ], [ "Sanchez", "Victor", "" ], [ "Zheng", "Feng", "" ] ]
2504.13789
Zhiqing Zhang
Michel Davier, Bogdan Malaescu, Zhiqing Zhang
Data-based form factor corrections between the two-pion $\tau$ and $e^+e^-$ spectral functions
17 pages, 9 figures, 3 tables
null
null
null
hep-ph hep-ex
http://creativecommons.org/licenses/by/4.0/
The $\tau$ spectral functions are an alternative to $e^+e^-$ cross-sections, where different measurements are not consistent, for computing the hadronic vacuum contribution to the muon magnetic anomaly $a_\mu$. This requires a control of isospin-breaking effects which have to be corrected for. So far these corrections have been evaluated using theoretical models. In this letter, a new approach based only on data is presented for the determination of the most critical correction relating the $e^+e^-$ and $\tau$ pion form factors. An updated evaluation of the total isospin-breaking correction is given and its impact is discussed in the context of $e^+e^-$-based $a_\mu$ predictions and of the direct measurement.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 16:42:16 GMT" } ]
2025-04-21T00:00:00
[ [ "Davier", "Michel", "" ], [ "Malaescu", "Bogdan", "" ], [ "Zhang", "Zhiqing", "" ] ]
2504.13790
James Brusseau
James Brusseau (Philosophy and Computer Science, Pace University, New York City, USA and Department of Information Engineering and Computer Science. University of Trento, Italy)
Four Bottomless Errors and the Collapse of Statistical Fairness
null
null
10.13140/RG.2.2.36548.95367
null
cs.CY
http://creativecommons.org/licenses/by-nc-sa/4.0/
The AI ethics of statistical fairness is an error, the approach should be abandoned, and the accumulated academic work deleted. The argument proceeds by identifying four recurring mistakes within statistical fairness. One conflates fairness with equality, which confines thinking to similars being treated similarly. The second and third errors derive from a perspectival ethical view which functions by negating others and their viewpoints. The final mistake constrains fairness to work within predefined social groups instead of allowing unconstrained fairness to subsequently define group composition. From the nature of these misconceptions, the larger argument follows. Because the errors are integral to how statistical fairness works, attempting to resolve the difficulties only deepens them. Consequently, the errors cannot be corrected without undermining the larger project, and statistical fairness collapses from within. While the collapse ends a failure in ethics, it also provokes distinct possibilities for fairness, data, and algorithms. Quickly indicating some of these directions is a secondary aim of the paper, and one that aligns with what fairness has consistently meant and done since Aristotle.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 16:42:49 GMT" } ]
2025-04-21T00:00:00
[ [ "Brusseau", "James", "", "Philosophy and Computer Science, Pace University, New\n York City, USA and Department of Information Engineering and Computer\n Science. University of Trento, Italy" ] ]
2504.13791
Sandipan Dhar
Sandipan Dhar and Md. Tousin Akhter and Nanda Dulal Jana and Swagatam Das
Collective Learning Mechanism based Optimal Transport Generative Adversarial Network for Non-parallel Voice Conversion
7 pages, 2 figures, 3 tables
null
null
null
cs.SD cs.AI eess.AS
http://creativecommons.org/licenses/by/4.0/
After demonstrating significant success in image synthesis, Generative Adversarial Network (GAN) models have likewise made significant progress in the field of speech synthesis, leveraging their capacity to adapt the precise distribution of target data through adversarial learning processes. Notably, in the realm of State-Of-The-Art (SOTA) GAN-based Voice Conversion (VC) models, there exists a substantial disparity in naturalness between real and GAN-generated speech samples. Furthermore, while many GAN models currently operate on a single generator discriminator learning approach, optimizing target data distribution is more effectively achievable through a single generator multi-discriminator learning scheme. Hence, this study introduces a novel GAN model named Collective Learning Mechanism-based Optimal Transport GAN (CLOT-GAN) model, incorporating multiple discriminators, including the Deep Convolutional Neural Network (DCNN) model, Vision Transformer (ViT), and conformer. The objective of integrating various discriminators lies in their ability to comprehend the formant distribution of mel-spectrograms, facilitated by a collective learning mechanism. Simultaneously, the inclusion of Optimal Transport (OT) loss aims to precisely bridge the gap between the source and target data distribution, employing the principles of OT theory. The experimental validation on VCC 2018, VCTK, and CMU-Arctic datasets confirms that the CLOT-GAN-VC model outperforms existing VC models in objective and subjective assessments.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 16:44:01 GMT" } ]
2025-04-21T00:00:00
[ [ "Dhar", "Sandipan", "" ], [ "Akhter", "Md. Tousin", "" ], [ "Jana", "Nanda Dulal", "" ], [ "Das", "Swagatam", "" ] ]
2504.13792
Weizhi Lu
Weizhi Lu, Mingrui Chen, Weiyu Li
The Binary and Ternary Quantization Can Improve Feature Discrimination
null
null
null
null
cs.LG
http://creativecommons.org/licenses/by/4.0/
In machine learning, quantization is widely used to simplify data representation and facilitate algorithm deployment on hardware. Given the fundamental role of classification in machine learning, it is crucial to investigate the impact of quantization on classification. Current research primarily focuses on quantization errors, operating under the premise that higher quantization errors generally result in lower classification performance. However, this premise lacks a solid theoretical foundation and often contradicts empirical findings. For instance, certain extremely low bit-width quantization methods, such as $\{0,1\}$-binary quantization and $\{0, \pm1\}$-ternary quantization, can achieve comparable or even superior classification accuracy compared to the original non-quantized data, despite exhibiting high quantization errors. To more accurately evaluate classification performance, we propose to directly investigate the feature discrimination of quantized data, instead of analyzing its quantization error. Interestingly, it is found that both binary and ternary quantization methods can improve, rather than degrade, the feature discrimination of the original data. This remarkable performance is validated through classification experiments across various data types, including images, speech, and texts.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 16:44:12 GMT" } ]
2025-04-21T00:00:00
[ [ "Lu", "Weizhi", "" ], [ "Chen", "Mingrui", "" ], [ "Li", "Weiyu", "" ] ]
2504.13793
Takuya Sera
Takuya Sera, Yusuke Hamano
ChatNekoHacker: Real-Time Fan Engagement with Conversational Agents
Accepted to GenAICHI 2025: Generative AI and HCI at CHI 2025
null
null
null
cs.HC
http://creativecommons.org/licenses/by/4.0/
ChatNekoHacker is a real-time conversational agent system that strengthens fan engagement for musicians. It integrates Amazon Bedrock Agents for autonomous dialogue, Unity for immersive 3D livestream sets, and VOICEVOX for high quality Japanese text-to-speech, enabling two virtual personas to represent the music duo Neko Hacker. In a one-hour YouTube Live with 30 participants, we evaluated the impact of the system. Regression analysis showed that agent interaction significantly elevated fan interest, with perceived fun as the dominant predictor. The participants also expressed a stronger intention to listen to the duo's music and attend future concerts. These findings highlight entertaining, interactive broadcasts as pivotal to cultivating fandom. Our work offers actionable insights for the deployment of conversational agents in entertainment while pointing to next steps: broader response diversity, lower latency, and tighter fact-checking to curb potential misinformation.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 16:48:30 GMT" } ]
2025-04-21T00:00:00
[ [ "Sera", "Takuya", "" ], [ "Hamano", "Yusuke", "" ] ]
2504.13794
Mark Moeller
Mark Moeller, Tiago Ferreira, Thomas Lu, Nate Foster, Alexandra Silva
Active Learning of Symbolic NetKAT Automata
Appearing in PLDI 2025
null
10.1145/3729295
null
cs.PL
http://creativecommons.org/licenses/by/4.0/
NetKAT is a domain-specific programming language and logic that has been successfully used to specify and verify the behavior of packet-switched networks. This paper develops techniques for automatically learning NetKAT models of unknown networks using active learning. Prior work has explored active learning for a wide range of automata (e.g., deterministic, register, B\"uchi, timed etc.) and also developed applications, such as validating implementations of network protocols. We present algorithms for learning different types of NetKAT automata, including symbolic automata proposed in recent work. We prove the soundness of these algorithms, build a prototype implementation, and evaluate it on a standard benchmark. Our results highlight the applicability of symbolic NetKAT learning for realistic network configurations and topologies.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 16:55:29 GMT" } ]
2025-04-21T00:00:00
[ [ "Moeller", "Mark", "" ], [ "Ferreira", "Tiago", "" ], [ "Lu", "Thomas", "" ], [ "Foster", "Nate", "" ], [ "Silva", "Alexandra", "" ] ]
2504.13795
Jason Murphy
Gong Chen, Jason Murphy
Stability of nonlinear recovery from scattering and modified scattering maps
10 pages
null
null
null
math.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove stability estimates for the recovery of the nonlinearity from the scattering or modified scattering map for one-dimensional nonlinear Schr\"odinger equations. We consider nonlinearities of the form $a(x) |u|^p u$ for $p\in [2,4]$ and $[1+a(x)]|u|^2 u$, where $a$ is a localized function. In the first case, we show that for $p\in(2,4]$ we may obtain a H\"older-type stability estimate for recovery via the scattering map, while for $p=2$ we obtain a logarithmic stability estimate. In the second case, we show a logarithmic stability estimate for recovery via the modified scattering map.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 16:56:18 GMT" } ]
2025-04-21T00:00:00
[ [ "Chen", "Gong", "" ], [ "Murphy", "Jason", "" ] ]
2504.13796
Antonio Bianconi Prof.
Gaetano Campi, Massimiliano Catricala, Giuseppe Chita, Luisa Barba, Luchuan Shi, Jianfa Zhao, Changing Jin, Antonio Bianconi
Lattice Quantum Geometry Controlling 118 K Multigap Superconductivity in Heavily Overdoped CuBa2Ca3Cu4O10+d
16 pages, 4 figures
null
null
null
cond-mat.supr-con quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Synchrotron X-ray diffraction has been used to study the thermal structure evolution in CuBa2Ca3Cu4O10+d (Cu1234), a superconductor which exhibits a high critical temperature (Tc 118 K), high critical current density and large upper critical magnetic field. The lattice geometry at nanoscale of this cuprate belongs to the class of natural heterostructures at atomic limit like the artificial high Tc superlattices made of interface space charge in Mott insulator units intercalated by metal units. Temperature-dependent lattice parameters reveal a distinct structural transition at TC characterized by a drop of the c-axis and in plane Cu-O negative thermal expansion below TC. These results provide clear evidence of lattice reorganization associated with the chemical potential changes due to the opening of multiple superconducting gaps. Additionally, evidence for oxygen defects rearrangement is observed at temperatures above 200 K. We construct a phase diagram correlating temperature, the c/a axis ratio, and in plane Cu-O strain, identifying regions associated with gaps opening and oxygen rearrangement. These findings provide new insights into how lattice geometry control superconductivity to inform the material design of advanced nanoscale superconducting artificial quantum heterostructures.
[ { "version": "v1", "created": "Fri, 18 Apr 2025 16:57:03 GMT" } ]
2025-04-21T00:00:00
[ [ "Campi", "Gaetano", "" ], [ "Catricala", "Massimiliano", "" ], [ "Chita", "Giuseppe", "" ], [ "Barba", "Luisa", "" ], [ "Shi", "Luchuan", "" ], [ "Zhao", "Jianfa", "" ], [ "Jin", "Changing", "" ], [ "Bianconi", "Antonio", "" ] ]
2504.13797
Yu Wang
Yu Wang, Shujie Liu, Shuai Lv, Gengshuo Liu
Meta-Learning and Knowledge Discovery based Physics-Informed Neural Network for Remaining Useful Life Prediction
34 pages,20 figs
null
null
null
cs.LG cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Predicting the remaining useful life (RUL) of rotating machinery is critical for industrial safety and maintenance, but existing methods struggle with scarce target-domain data and unclear degradation dynamics. We propose a Meta-Learning and Knowledge Discovery-based Physics-Informed Neural Network (MKDPINN) to address these challenges. The method first maps noisy sensor data to a low-dimensional hidden state space via a Hidden State Mapper (HSM). A Physics-Guided Regulator (PGR) then learns unknown nonlinear PDEs governing degradation evolution, embedding these physical constraints into the PINN framework. This integrates data-driven and physics-based approaches. The framework uses meta-learning, optimizing across source-domain meta-tasks to enable few-shot adaptation to new target tasks. Experiments on industrial data and the C-MAPSS benchmark show MKDPINN outperforms baselines in generalization and accuracy, proving its effectiveness for RUL prediction under data scarcity
[ { "version": "v1", "created": "Fri, 18 Apr 2025 16:58:38 GMT" } ]
2025-04-21T00:00:00
[ [ "Wang", "Yu", "" ], [ "Liu", "Shujie", "" ], [ "Lv", "Shuai", "" ], [ "Liu", "Gengshuo", "" ] ]