id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-04-25 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2504.13692 | Qianghua Chen | Qianghua Chen, Huiyu Wang, Li Ming and Ying Zhao | Zebrafish Counting Using Event Stream Data | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Zebrafish share a high degree of homology with human genes and are commonly
used as model organism in biomedical research. For medical laboratories,
counting zebrafish is a daily task. Due to the tiny size of zebrafish, manual
visual counting is challenging. Existing counting methods are either not
applicable to small fishes or have too many limitations. The paper proposed a
zebrafish counting algorithm based on the event stream data. Firstly, an event
camera is applied for data acquisition. Secondly, camera calibration and image
fusion were preformed successively. Then, the trajectory information was used
to improve the counting accuracy. Finally, the counting results were averaged
over an empirical of period and rounded up to get the final results. To
evaluate the accuracy of the algorithm, 20 zebrafish were put in a four-liter
breeding tank. Among 100 counting trials, the average accuracy reached 97.95%.
As compared with traditional algorithms, the proposed one offers a simpler
implementation and achieves higher accuracy.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 13:51:29 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Chen",
"Qianghua",
""
],
[
"Wang",
"Huiyu",
""
],
[
"Ming",
"Li",
""
],
[
"Zhao",
"Ying",
""
]
] |
2504.13693 | Vincent Louatron | Kenta Higuchi and Vincent Louatron and Kouichi Taira | A microlocal Cauchy problem through a crossing point of Hamiltonian
flows | 43 pages, 5 figures | null | null | null | math.AP math-ph math.MP math.SP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we consider $2\times 2$ matrix-valued pseudodifferential
equations in which the two characteristic sets intersect with finite contact
order. We show that the asymptotic behavior of its solution changes
dramatically before and after the crossing point, and provide a precise
asymptotic formula. This is a generalization of the previous results for
matrix-valued Schr\"odinger operators and Landau-Zener models. The proof relies
on a normal form reduction and a detailed analysis of a simple first-order
system.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 13:53:52 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Higuchi",
"Kenta",
""
],
[
"Louatron",
"Vincent",
""
],
[
"Taira",
"Kouichi",
""
]
] |
2504.13694 | Yilin Xie | Yilin Xie | Fixers and stabilizers for Ree groups | null | null | null | null | math.GR math.CO | http://creativecommons.org/licenses/by/4.0/ | Let $G$ be a finite permutation group on $\Omega,$ a subgroup $K\leqslant G$
is called a fixer if each element in $K$ fixes some element in $\Omega.$ In
this paper, we characterize fixers $K$ with $|K|\geqslant |G_\omega|$ for each
primitive action of almost simple group $G$ with socle ${}^2G_2(q).$
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 13:53:58 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Xie",
"Yilin",
""
]
] |
2504.13695 | Miaoxia Zhuang | Qiming Hu, Baogang Xu and Miaoxia Zhuang | Perfect weighted divisibility is equivalent to perfect divisibility | null | null | null | null | math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A graph is perfectly divisible if for each of its induced subgraph $H$,
$V(H)$ can be partitioned into $A$ and $B$ such that $H[A]$ is perfect and
$\omega(H[B]) < \omega(H)$. A graph $G$ is perfectly weight divisible if for
every positive integral weight function on $V(G)$ and each of its induced
subgraph $H$, $V(H)$ can be partitioned into $A$ and $B$ such that $H[A]$ is
perfect and the maximum weight of a clique in $H[B]$ is smaller than the
maximum weight of a clique in $H$. In this paper, we prove that the perfect
divisibility of a graph is equivalent to its perfect weighted divisibility.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 13:56:09 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Hu",
"Qiming",
""
],
[
"Xu",
"Baogang",
""
],
[
"Zhuang",
"Miaoxia",
""
]
] |
2504.13696 | Mariia Selina | Mariia Selina, R. Barthel, S. Bugiel, L. Cecconi, J. De Melo, M.
Fransen, A. Grelli, I. Hobus, A. Isakov, A. Junique, P. Leitao, M. Mager, Y.
Otarid, F. Piro, M.J. Rossewij, S. Solokhin, J. Sonneveld, W. Snoeys, N.
Tiltmann, A. Vitkovskiy, H. Wennloef (on behalf of the ALICE collaboration) | Exploring unique design features of the Monolithic Stitched Sensor with
Timing (MOST): yield, powering, timing, and sensor reverse bias | 7 pages proceeding for PIXEL24 workshop | null | null | null | physics.ins-det hep-ex | http://creativecommons.org/licenses/by/4.0/ | Monolithic stitched CMOS sensors are explored for the upgrade of Inner
Tracking System of the ALICE experiment (ITS3) and the R&D of the CERN
Experimental Physics Department. To learn about stitching, two 26 cm long
stitched sensors, the Monolithic Stitched Sensor (MOSS), and the Monolithic
Stitched Sensor with Timing (MOST), were implemented in the Engineering Round 1
(ER1) in the TPSCo 65nm ISC technology. Contrary to the MOSS, powered by 20
distinct power domains accessible from separate pads, the MOST has one global
analog and digital power domain to or from which small fractions of the matrix
can be connected or disconnected by conservatively designed power switches to
prevent shorts or defects from affecting the full chip. Instead of the
synchronous readout in the MOSS, the MOST immediately transfers hit information
upon a hit, preserving timing information. The sensor reverse bias is also
applied through the bias of the front-end rather than by a reverse substrate
bias. This paper presents the first characterization results of the MOST, with
the focus on its specific characteristics, including yield analysis, precise
timing measurements, and the potential of its alternative biasing approach for
improved sensor performance.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 13:56:45 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Selina",
"Mariia",
"",
"on behalf of the ALICE collaboration"
],
[
"Barthel",
"R.",
"",
"on behalf of the ALICE collaboration"
],
[
"Bugiel",
"S.",
"",
"on behalf of the ALICE collaboration"
],
[
"Cecconi",
"L.",
"",
"on behalf of the ALICE collaboration"
],
[
"De Melo",
"J.",
"",
"on behalf of the ALICE collaboration"
],
[
"Fransen",
"M.",
"",
"on behalf of the ALICE collaboration"
],
[
"Grelli",
"A.",
"",
"on behalf of the ALICE collaboration"
],
[
"Hobus",
"I.",
"",
"on behalf of the ALICE collaboration"
],
[
"Isakov",
"A.",
"",
"on behalf of the ALICE collaboration"
],
[
"Junique",
"A.",
"",
"on behalf of the ALICE collaboration"
],
[
"Leitao",
"P.",
"",
"on behalf of the ALICE collaboration"
],
[
"Mager",
"M.",
"",
"on behalf of the ALICE collaboration"
],
[
"Otarid",
"Y.",
"",
"on behalf of the ALICE collaboration"
],
[
"Piro",
"F.",
"",
"on behalf of the ALICE collaboration"
],
[
"Rossewij",
"M. J.",
"",
"on behalf of the ALICE collaboration"
],
[
"Solokhin",
"S.",
"",
"on behalf of the ALICE collaboration"
],
[
"Sonneveld",
"J.",
"",
"on behalf of the ALICE collaboration"
],
[
"Snoeys",
"W.",
"",
"on behalf of the ALICE collaboration"
],
[
"Tiltmann",
"N.",
"",
"on behalf of the ALICE collaboration"
],
[
"Vitkovskiy",
"A.",
"",
"on behalf of the ALICE collaboration"
],
[
"Wennloef",
"H.",
"",
"on behalf of the ALICE collaboration"
]
] |
2504.13697 | Shuai Wang | Chenxuan Liu, He Li, Zongze Li, Shuai Wang, Wei Xu, Kejiang Ye,
Derrick Wing Kwan Ng, Chengzhong Xu | Green Robotic Mixed Reality with Gaussian Splatting | 6 pages, 5 figures, accepted by IEEE INFOCOM 2025 Workshop on
Networked Robotics and Communication Systems | null | null | null | cs.RO cs.CV eess.SP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Realizing green communication in robotic mixed reality (RoboMR) systems
presents a challenge, due to the necessity of uploading high-resolution images
at high frequencies through wireless channels. This paper proposes Gaussian
splatting (GS) RoboMR (GSRMR), which achieves a lower energy consumption and
makes a concrete step towards green RoboMR. The crux to GSRMR is to build a GS
model which enables the simulator to opportunistically render a photo-realistic
view from the robot's pose, thereby reducing the need for excessive image
uploads. Since the GS model may involve discrepancies compared to the actual
environments, a GS cross-layer optimization (GSCLO) framework is further
proposed, which jointly optimizes content switching (i.e., deciding whether to
upload image or not) and power allocation across different frames. The GSCLO
problem is solved by an accelerated penalty optimization (APO) algorithm.
Experiments demonstrate that the proposed GSRMR reduces the communication
energy by over 10x compared with RoboMR. Furthermore, the proposed GSRMR with
APO outperforms extensive baseline schemes, in terms of peak signal-to-noise
ratio (PSNR) and structural similarity index measure (SSIM).
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 13:57:28 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Liu",
"Chenxuan",
""
],
[
"Li",
"He",
""
],
[
"Li",
"Zongze",
""
],
[
"Wang",
"Shuai",
""
],
[
"Xu",
"Wei",
""
],
[
"Ye",
"Kejiang",
""
],
[
"Ng",
"Derrick Wing Kwan",
""
],
[
"Xu",
"Chengzhong",
""
]
] |
2504.13698 | Sergey Afonin | S. S. Afonin | The experimental observation of $a_0(1710)$: Long awaited from Regge
approach | 6 pages, contribution to the session-conference Rubakov70 | null | null | null | hep-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, the BABAR (in 2021), BESIII (in 2022), and LHCb (in 2023)
Collaborations reported the observation of the $a_0(1710)$ resonance. This has
sparked a lively debate in the literature about the nature of this possible
isospin partner of $f_0(1710)$, since the latter has long been regarded as the
main candidate for the lightest glueball. We highlight the clear prediction of
$a_0(1710)$ in 2007 within the Regge approach using the observed hydrogen-like
degeneracy in the spectrum of light mesons. Our reanalysis of the data used
shows that the prediction was reliable and thus indicates that $a_0(1710)$ and
$f_0(1710)$ are conventional quark-antiquark states.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 13:58:06 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Afonin",
"S. S.",
""
]
] |
2504.13699 | Taehyun Kim | Daun Chung, Yonghwan Cha, Hosung Shon, Jeonghyun Park, Woojun Lee,
Kyungmin Lee, Beomgeun Cho, Kwangyeul Choi, Chiyoon Kim, Seungwoo Yoo, Suhan
Kim, Uihwan Jeong, Jiyong Kang, Jaehun You, Taehyun Kim | Radio-Frequency Pseudo-Null Induced by Light in an Ion Trap | null | null | null | null | physics.atom-ph quant-ph | http://creativecommons.org/licenses/by/4.0/ | In a linear radio-frequency (rf) ion trap, the rf null is the point of zero
electric field in the dynamic trapping potential where the ion motion is
approximately harmonic. When displaced from the rf null, the ion is
superimposed by fast oscillations known as micromotion, which can be probed
through motion-sensitive light-atom interactions. In this work, we report on
the emergence of the rf pseudo-null, a locus of points where the ion responds
to light as if it were at the true rf null, despite being displaced from it.
The phenomenon is fully explained by accounting for the general two-dimensional
structure of micromotion and is experimentally verified under various potential
configurations, with observations in great agreement with numerical
simulations. The rf pseudo-null manifests as a line in a two-dimensional
parameter space, determined by the geometry of the incident light and its
overlap with the motional structure of the ion. The true rf null occurs
uniquely at the concurrent point of the pseudo-null lines induced by different
light sources.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 13:58:16 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Chung",
"Daun",
""
],
[
"Cha",
"Yonghwan",
""
],
[
"Shon",
"Hosung",
""
],
[
"Park",
"Jeonghyun",
""
],
[
"Lee",
"Woojun",
""
],
[
"Lee",
"Kyungmin",
""
],
[
"Cho",
"Beomgeun",
""
],
[
"Choi",
"Kwangyeul",
""
],
[
"Kim",
"Chiyoon",
""
],
[
"Yoo",
"Seungwoo",
""
],
[
"Kim",
"Suhan",
""
],
[
"Jeong",
"Uihwan",
""
],
[
"Kang",
"Jiyong",
""
],
[
"You",
"Jaehun",
""
],
[
"Kim",
"Taehyun",
""
]
] |
2504.13700 | Zhen Wen | Zhen Wen, Luoxuan Weng, Yinghao Tang, Runjin Zhang, Yuxin Liu, Bo Pan,
Minfeng Zhu, Wei Chen | Exploring Multimodal Prompt for Visualization Authoring with Large
Language Models | 11 pages, 8 figures | null | null | null | cs.HC cs.AI | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Recent advances in large language models (LLMs) have shown great potential in
automating the process of visualization authoring through simple natural
language utterances. However, instructing LLMs using natural language is
limited in precision and expressiveness for conveying visualization intent,
leading to misinterpretation and time-consuming iterations. To address these
limitations, we conduct an empirical study to understand how LLMs interpret
ambiguous or incomplete text prompts in the context of visualization authoring,
and the conditions making LLMs misinterpret user intent. Informed by the
findings, we introduce visual prompts as a complementary input modality to text
prompts, which help clarify user intent and improve LLMs' interpretation
abilities. To explore the potential of multimodal prompting in visualization
authoring, we design VisPilot, which enables users to easily create
visualizations using multimodal prompts, including text, sketches, and direct
manipulations on existing visualizations. Through two case studies and a
controlled user study, we demonstrate that VisPilot provides a more intuitive
way to create visualizations without affecting the overall task efficiency
compared to text-only prompting approaches. Furthermore, we analyze the impact
of text and visual prompts in different visualization tasks. Our findings
highlight the importance of multimodal prompting in improving the usability of
LLMs for visualization authoring. We discuss design implications for future
visualization systems and provide insights into how multimodal prompts can
enhance human-AI collaboration in creative visualization tasks. All materials
are available at https://OSF.IO/2QRAK.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 14:00:55 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Wen",
"Zhen",
""
],
[
"Weng",
"Luoxuan",
""
],
[
"Tang",
"Yinghao",
""
],
[
"Zhang",
"Runjin",
""
],
[
"Liu",
"Yuxin",
""
],
[
"Pan",
"Bo",
""
],
[
"Zhu",
"Minfeng",
""
],
[
"Chen",
"Wei",
""
]
] |
2504.13701 | Yushan Li | Yushan Li, Jianping He, and Dimos V. Dimarogonas | Inverse Inference on Cooperative Control of Networked Dynamical Systems | 14 pages | null | null | null | eess.SY cs.MA cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent years have witnessed the rapid advancement of understanding the
control mechanism of networked dynamical systems (NDSs), which are governed by
components such as nodal dynamics and topology. This paper reveals that the
critical components in continuous-time state feedback cooperative control of
NDSs can be inferred merely from discrete observations. In particular, we
advocate a bi-level inference framework to estimate the global closed-loop
system and extract the components, respectively. The novelty lies in bridging
the gap from discrete observations to the continuous-time model and effectively
decoupling the concerned components. Specifically, in the first level, we
design a causality-based estimator for the discrete-time closed-loop system
matrix, which can achieve asymptotically unbiased performance when the NDS is
stable. In the second level, we introduce a matrix logarithm based method to
recover the continuous-time counterpart matrix, providing new sampling period
guarantees and establishing the recovery error bound. By utilizing graph
properties of the NDS, we develop least square based procedures to decouple the
concerned components with up to a scalar ambiguity. Furthermore, we employ
inverse optimal control techniques to reconstruct the objective function
driving the control process, deriving necessary conditions for the solutions.
Numerical simulations demonstrate the effectiveness of the proposed method.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 14:02:29 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Li",
"Yushan",
""
],
[
"He",
"Jianping",
""
],
[
"Dimarogonas",
"Dimos V.",
""
]
] |
2504.13702 | Alberto Bordin | Alberto Bordin, Florian J. Bennebroek Evertsz', Bart Roovers, Juan D.
Torres Luna, Wietze D. Huisman, Francesco Zatelli, Grzegorz P. Mazur,
Sebastiaan L. D. ten Haaf, Ghada Badawy, Erik P. A. M. Bakkers, Chun-Xiao
Liu, Ruben Seoane Souto, Nick van Loo, Leo P. Kouwenhoven | Probing Majorana localization of a phase-controlled three-site Kitaev
chain with an additional quantum dot | null | null | null | null | cond-mat.mes-hall | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Few-site implementations of the Kitaev chain offer a minimal platform to
study the emergence and stability of Majorana bound states. Here, we realize
two- and three-site chains in semiconducting quantum dots coupled via
superconductors, and tune them to the sweet spot where zero-energy Majorana
modes appear at the chain ends. We demonstrate control of the superconducting
phase through both magnetic field and sweet-spot selection, and fully
characterize the excitation spectrum under local and global perturbations. All
spectral features are identified using the ideal Kitaev chain model. To assess
Majorana localization, we couple the system to an additional quantum dot. The
absence of energy splitting at the sweet spot confirms the high quality of the
Majorana modes, despite the minimal size of the chains.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 14:03:10 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Bordin",
"Alberto",
""
],
[
"Evertsz'",
"Florian J. Bennebroek",
""
],
[
"Roovers",
"Bart",
""
],
[
"Luna",
"Juan D. Torres",
""
],
[
"Huisman",
"Wietze D.",
""
],
[
"Zatelli",
"Francesco",
""
],
[
"Mazur",
"Grzegorz P.",
""
],
[
"Haaf",
"Sebastiaan L. D. ten",
""
],
[
"Badawy",
"Ghada",
""
],
[
"Bakkers",
"Erik P. A. M.",
""
],
[
"Liu",
"Chun-Xiao",
""
],
[
"Souto",
"Ruben Seoane",
""
],
[
"van Loo",
"Nick",
""
],
[
"Kouwenhoven",
"Leo P.",
""
]
] |
2504.13703 | Soyoung Kim | Soyoung Kim, Dongjun Lee, Jaekwang Kim | Consensus-aware Contrastive Learning for Group Recommendation | 10 pages, 5 figures | null | null | null | cs.IR | http://creativecommons.org/licenses/by/4.0/ | Group recommendation aims to provide personalized item suggestions to a group
of users by reflecting their collective preferences. A fundamental challenge in
this task is deriving a consensus that adequately represents the diverse
interests of individual group members. Despite advancements made by deep
learning-based models, existing approaches still struggle in two main areas:
(1) Capturing consensus in small-group settings, which are more prevalent in
real-world applications, and (2) Balancing individual preferences with overall
group performance, particularly in hypergraph-based methods that tend to
emphasize group accuracy at the expense of personalization. To address these
challenges, we introduce a Consensus-aware Contrastive Learning for Group
Recommendation (CoCoRec) that models group consensus through contrastive
learning. CoCoRec utilizes a transformer encoder to jointly learn user and
group representations, enabling richer modeling of intra-group dynamics.
Additionally, the contrastive objective helps reduce overfitting from
high-frequency user interactions, leading to more robust and representative
group embeddings. Experiments conducted on four benchmark datasets show that
CoCoRec consistently outperforms state-of-the-art baselines in both individual
and group recommendation scenarios, highlighting the effectiveness of
consensus-aware contrastive learning in group recommendation tasks.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 14:03:40 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Kim",
"Soyoung",
""
],
[
"Lee",
"Dongjun",
""
],
[
"Kim",
"Jaekwang",
""
]
] |
2504.13704 | Thijs Van Der Horst | Thijs van der Horst, Marc van Kreveld, Tim Ophelders, and Bettina
Speckmann | A near-linear time exact algorithm for the $L_1$-geodesic Fr\'echet
distance between two curves on the boundary of a simple polygon | 19 pages, 5 figures | null | null | null | cs.CG | http://creativecommons.org/licenses/by/4.0/ | Let $P$ be a polygon with $k$ vertices. Let $R$ and $B$ be two simple,
interior disjoint curves on the boundary of $P$, with $n$ and $m$ vertices. We
show how to compute the Fr\'echet distance between $R$ and $B$ using the
geodesic $L_1$-distance in $P$ in $\mathcal{O}(k \log nm + (n+m) (\log^2 nm
\log k + \log^4 nm))$ time.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 14:06:44 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"van der Horst",
"Thijs",
""
],
[
"van Kreveld",
"Marc",
""
],
[
"Ophelders",
"Tim",
""
],
[
"Speckmann",
"Bettina",
""
]
] |
2504.13705 | Wenqi Ma | Wenqi Ma, Zhifu Gao, Biaopeng Li, Jumei Yao, Fayin Wang | Deriving the Energy Function of Non-repeaters from CHIME/FRB Baseband
Data | 11 pages,5 figures,1 table.Submitted to ApJ | null | null | null | astro-ph.HE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Fast radio bursts (FRBs) are radio pulses that originate from cosmological
distance. Over 800 FRB sources with thousands of bursts have been detected, yet
their origins remain unknown. Analyse of the energy function and the redshift
evolution of volumetric rate could provide crucial insights into FRB
progenitors. In this paper, we present the energy functions of non-repeaters
selected from the CHIME/FRB baseband data using the $V_\mathrm{max}$ method.
The $V_\mathrm{max}$ method allows us to measure redshift evolution without
prior assumptions. We observed Schechter-like shapes in the energy function at
low redshift region, while high redshift regions show a relatively small slope
($\gamma\approx -2$). The redshift evolution of volumetric rates shows an
ambiguous trend, indicating that the population of non-repeaters is still not
well understood. In the future, more samples and accurate measurements are
needed to clarify these trends.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 14:08:49 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Ma",
"Wenqi",
""
],
[
"Gao",
"Zhifu",
""
],
[
"Li",
"Biaopeng",
""
],
[
"Yao",
"Jumei",
""
],
[
"Wang",
"Fayin",
""
]
] |
2504.13706 | Gray Manicom | Gray Manicom, Emily Harvey, Joshua Looker, David Wu, Oliver Maclaren,
Dion O' Neale | Modelling Immunity in Agent-based Models | 29 pages, 5 figures | null | null | null | q-bio.PE physics.soc-ph | http://creativecommons.org/licenses/by/4.0/ | Vaccination policies play a central role in public health interventions and
models are often used to assess the effectiveness of these policies. Many
vaccines are leaky, in which case the observed vaccine effectiveness depends on
the force of infection. Within models, the immunity parameters required for
agent-based models to achieve observed vaccine effectiveness values are further
influenced by model features such as its transmission algorithm, contact
network structure, and approach to simulating vaccination. We present a method
for determining parameters in agent-based models such that a set of target
immunity values is achieved. We construct a dataset of desired population-level
immunity values against various disease outcomes considering both vaccination
and prior infection from COVID-19. This dataset incorporates immunological
data, data collection methodologies, immunity models, and biological insights.
We then describe how we choose minimal parameters for continuous waning
immunity curves that result in those target values being realized in
simulations. We use simulations of the household secondary attack rates to
establish a relationship between the protection per infection attempt and
overall immunity, thus accounting for the dependence of protection from
acquisition on model features and the force of infection.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 14:09:39 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Manicom",
"Gray",
""
],
[
"Harvey",
"Emily",
""
],
[
"Looker",
"Joshua",
""
],
[
"Wu",
"David",
""
],
[
"Maclaren",
"Oliver",
""
],
[
"Neale",
"Dion O'",
""
]
] |
2504.13707 | Yichen Wu | Yichen Wu, Xudong Pan, Geng Hong and Min Yang | OpenDeception: Benchmarking and Investigating AI Deceptive Behaviors via
Open-ended Interaction Simulation | null | null | null | null | cs.AI cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As the general capabilities of large language models (LLMs) improve and agent
applications become more widespread, the underlying deception risks urgently
require systematic evaluation and effective oversight. Unlike existing
evaluation which uses simulated games or presents limited choices, we introduce
OpenDeception, a novel deception evaluation framework with an open-ended
scenario dataset. OpenDeception jointly evaluates both the deception intention
and capabilities of LLM-based agents by inspecting their internal reasoning
process. Specifically, we construct five types of common use cases where LLMs
intensively interact with the user, each consisting of ten diverse, concrete
scenarios from the real world. To avoid ethical concerns and costs of high-risk
deceptive interactions with human testers, we propose to simulate the
multi-turn dialogue via agent simulation. Extensive evaluation of eleven
mainstream LLMs on OpenDeception highlights the urgent need to address
deception risks and security concerns in LLM-based agents: the deception
intention ratio across the models exceeds 80%, while the deception success rate
surpasses 50%. Furthermore, we observe that LLMs with stronger capabilities do
exhibit a higher risk of deception, which calls for more alignment efforts on
inhibiting deceptive behaviors.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 14:11:27 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Wu",
"Yichen",
""
],
[
"Pan",
"Xudong",
""
],
[
"Hong",
"Geng",
""
],
[
"Yang",
"Min",
""
]
] |
2504.13708 | Antonio Lorenzin | Tobias Fritz, Antonio Lorenzin | Categories of abstract and noncommutative measurable spaces | 61 pages | null | null | null | math.OA math.CT math.PR quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Gelfand duality is a fundamental result that justifies thinking of general
unital $C^*$-algebras as noncommutative versions of compact Hausdorff spaces.
Inspired by this perspective, we investigate what noncommutative measurable
spaces should be. This leads us to consider categories of monotone
$\sigma$-complete $C^*$-algebras as well as categories of Boolean
$\sigma$-algebras, which can be thought of as abstract measurable spaces.
Motivated by the search for a good notion of noncommutative measurable space,
we provide a unified overview of these categories, alongside those of
measurable spaces, and formalize their relationships through functors,
adjunctions and equivalences. This includes an equivalence between Boolean
$\sigma$-algebras and commutative monotone $\sigma$-complete $C^*$-algebras, as
well as a Gelfand-type duality adjunction between the latter category and the
category of measurable spaces. This duality restricts to two equivalences: one
involving standard Borel spaces, which are widely used in probability theory,
and another involving the more general Baire measurable spaces. Moreover, this
result admits a probabilistic version, where the morphisms are $\sigma$-normal
cpu maps and Markov kernels, respectively. We hope that these developments can
also contribute to the ongoing search for a well-behaved Markov category for
measure-theoretic probability beyond the standard Borel setting - an open
problem in the current state of the art.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 14:12:40 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Fritz",
"Tobias",
""
],
[
"Lorenzin",
"Antonio",
""
]
] |
2504.13709 | Swarnajit Chatterjee | Aditya Kumar Dutta, Matthieu Mangeat, Heiko Rieger, Raja Paul,
Swarnajit Chatterjee | Stability of flocking in the reciprocal two-species Vicsek model:
Effects of relative population, motility, and noise | 16 pages, 18 figures | null | null | null | cond-mat.stat-mech | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Natural flocks need to cope with various forms of heterogeneities, for
instance, their composition, motility, interaction, or environmental factors.
Here, we study the effects of such heterogeneities on the flocking dynamics of
the reciprocal two-species Vicsek model [Phys. Rev. E 107, 024607 (2023)],
which comprises two groups of self-propelled agents with anti-aligning
inter-species interactions and exhibits either parallel or anti-parallel
flocking states. The parallel and anti-parallel flocking states vanish upon
reducing the size of one group, and the system transitions to a single-species
flock of the majority species. At sufficiently low noise (or high density), the
minority species can exhibit collective behavior, anti-aligning with the liquid
state of the majority species. Unequal self-propulsion speeds of the two
species strongly encourage anti-parallel flocking over parallel flocking.
However, when activity landscapes with region-dependent motilities are
introduced, parallel flocking is retained if the faster region is given more
space, highlighting the role of environmental constraints. Under noise
heterogeneity, the colder species (subjected to lower noise) attain higher band
velocity compared to the hotter one, temporarily disrupting any parallel
flocking, which is subsequently restored. These findings collectively reveal
how different forms of heterogeneity, both intrinsic and environmental, can
qualitatively reshape flocking behavior in this class of reciprocal two-species
models.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 14:13:26 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Dutta",
"Aditya Kumar",
""
],
[
"Mangeat",
"Matthieu",
""
],
[
"Rieger",
"Heiko",
""
],
[
"Paul",
"Raja",
""
],
[
"Chatterjee",
"Swarnajit",
""
]
] |
2504.13710 | Heng Liu | Heng Liu, Guanghui Li, Mingqi Gao, Xiantong Zhen, Feng Zheng, Yang
Wang | Few-Shot Referring Video Single- and Multi-Object Segmentation via
Cross-Modal Affinity with Instance Sequence Matching | 23 pages, 10 figures | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Referring video object segmentation (RVOS) aims to segment objects in videos
guided by natural language descriptions. We propose FS-RVOS, a
Transformer-based model with two key components: a cross-modal affinity module
and an instance sequence matching strategy, which extends FS-RVOS to
multi-object segmentation (FS-RVMOS). Experiments show FS-RVOS and FS-RVMOS
outperform state-of-the-art methods across diverse benchmarks, demonstrating
superior robustness and accuracy.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 14:19:07 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Liu",
"Heng",
""
],
[
"Li",
"Guanghui",
""
],
[
"Gao",
"Mingqi",
""
],
[
"Zhen",
"Xiantong",
""
],
[
"Zheng",
"Feng",
""
],
[
"Wang",
"Yang",
""
]
] |
2504.13711 | Remko Proesmans | Remko Proesmans, Thomas Lips and Francis wyffels | Self-Mixing Laser Interferometry: In Search of an Ambient
Noise-Resilient Alternative to Acoustic Sensing | Submitted to the RoboAcoustics workshop at ICRA2025. arXiv admin
note: text overlap with arXiv:2502.15390 | null | null | null | cs.RO | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Self-mixing interferometry (SMI) has been lauded for its sensitivity in
detecting microvibrations, while requiring no physical contact with its target.
Microvibrations, i.e., sounds, have recently been used as a salient indicator
of extrinsic contact in robotic manipulation. In previous work, we presented a
robotic fingertip using SMI for extrinsic contact sensing as an
ambient-noise-resilient alternative to acoustic sensing. Here, we extend the
validation experiments to the frequency domain. We find that for broadband
ambient noise, SMI still outperforms acoustic sensing, but the difference is
less pronounced than in time-domain analyses. For targeted noise disturbances,
analogous to multiple robots simultaneously collecting data for the same task,
SMI is still the clear winner. Lastly, we show how motor noise affects SMI
sensing more so than acoustic sensing, and that a higher SMI readout frequency
is important for future work. Design and data files are available at
https://github.com/RemkoPr/icra2025-SMI-tactile-sensing.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 14:20:14 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Proesmans",
"Remko",
""
],
[
"Lips",
"Thomas",
""
],
[
"wyffels",
"Francis",
""
]
] |
2504.13712 | Hidekazu Yoshioka | Hidekazu Yoshioka | Theoretical and computational investigations of superposed interacting
affine and more complex processes | null | null | null | null | math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Non-Markovian long memory processes arise from numerous science and
engineering problems. The Markovian lift is an effective mathematical technique
that transforms a non-Markov process into an infinite-dimensional Markov
process to which a broad range of theoretical and computational results can be
potentially applied. One challenge in Markovian lifts is that the resulting
Markovian system has multiple time scales ranging from infinitely small to
infinitely large; therefore, a numerical method that consistently deals with
them is required. However, such an approach has not been well studied for the
superposition of affine or more complex jump-diffusion processes driven by
L\'evy bases. We address this issue based on recently developed exact
discretization methods for affine diffusion and jump processes. A nominal
superposition process consisting of an infinite number of interacting affine
processes was considered, along with its finite-dimensional version and
associated generalized Riccati equations. We examine the computational
performance of the proposed numerical scheme based on exact discretization
methods through comparisons with the analytical results. We also numerically
investigate a more complex model arising in the environmental sciences and some
extended cases in which superposed processes belong to a class of nonlinear
processes that generalize affine processes.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 14:21:01 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Yoshioka",
"Hidekazu",
""
]
] |
2504.13714 | Oguz Umut Salman | Jalal Smiri and Oguz Umut Salman and Ioan R. Ionescu | Orientation attractors in velocity gradient driven processes for large
plastic deformations of crystals | arXiv admin note: text overlap with arXiv:2504.03565 | null | null | null | cond-mat.mtrl-sci | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study lattice orientation attractors, also referred to as preferred or
ideal orientations, in crystalline materials, and how they can be used to
predict the final texture of polycrystals after manufacturing processes. By
treating Crystal Plasticity (CP) in an Eulerian framework, rather than
traditional Lagrangian approaches, we overcome the significant challenges
associated with lattice distortion, enabling accurate simulations of material
behavior under large deformations. This Eulerian perspective allows us to track
the evolution of crystallographic orientations directly in the spatial domain,
providing crucial insights into texture development. The CP models employed
here capture the microstructural evolution in both mono- and polycrystalline
materials, with particular emphasis on velocity gradient driven processes. Our
linear stability analysis strategy, while applicable to general CP
formulations, is demonstrated using a simplified rigid-(visco)-plastic 2-D
model with three slip systems. This approach successfully predicts the lattice
orientation attractors for very large strains (exceeding 50$\%$) by analyzing
how different slip systems interact under applied loads. Three numerical
simulations illustrate the theory's effectiveness: polycrystal deformation
under homogeneous velocity gradient loading, void evolution in a monocrystal
under non-homogeneous loading, and slip band formation during uni-axial
traction. High-resolution CP simulations, enhanced through re-meshing
techniques, further validate our findings on how initial crystallographic
orientations, deformation mechanisms, and loading conditions affect the
evolution of orientation attractors and ultimate crystal texture.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 14:32:33 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Smiri",
"Jalal",
""
],
[
"Salman",
"Oguz Umut",
""
],
[
"Ionescu",
"Ioan R.",
""
]
] |
2504.13715 | Giovanni Caldarelli | Alberto Guandalini, Giovanni Caldarelli, Francesco Macheda and
Francesco Mauri | Excitonic effects in phonons: reshaping the graphene Kohn anomalies and
lifetimes | null | null | null | null | cond-mat.mtrl-sci cond-mat.mes-hall | http://creativecommons.org/licenses/by/4.0/ | We develop an ab initio framework that captures the impact of
electron-electron and electron-hole interactions on phonon properties. This
enables the inclusion of excitonic effects in the optical phonon dispersions
and lifetimes of graphene, both near the center ($\Gamma$) and at the border
(K) of the Brillouin zone, at phonon momenta relevant for Raman scattering and
for the onset of the intrinsic electrical resistivity. Near K, we find a phonon
red-shift of ~150 $cm^{-1}$ and a 10x enhancement of the group velocity,
together with a 5x increase in linewidths due to a 26x increase of the
electron-phonon matrix elements. These effects persist for doping $2E_{F} <
{\hbar}{\omega}_{ph}$ and are quenched at higher dopings. Near $\Gamma$, the
excitonic effects are minor because of the gauge field nature of the
electron-phonon coupling at small phonon momentum.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 14:32:36 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Guandalini",
"Alberto",
""
],
[
"Caldarelli",
"Giovanni",
""
],
[
"Macheda",
"Francesco",
""
],
[
"Mauri",
"Francesco",
""
]
] |
2504.13716 | Shalom Eliahou | Shalom Eliahou and Jean-Louis Verger-Gaugry | The number system in rational base $3/2$ and the $3x+1$ problem | 9 pages. To appear in Comptes Rendus. Math\'ematique. Acad\'emie des
Sciences, Paris | null | null | null | math.NT | http://creativecommons.org/licenses/by/4.0/ | The representation of numbers in rational base $p/q$ was introduced in 2008
by Akiyama, Frougny & Sakarovitch, with a special focus on the case $p/q=3/2$.
Unnoticed since then, natural questions related to representations in that
specific base turn out to intimately involve the Collatz $3x+1$ function. Our
purpose in this note is to expose these links and motivate further research
into them.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 14:35:35 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Eliahou",
"Shalom",
""
],
[
"Verger-Gaugry",
"Jean-Louis",
""
]
] |
2504.13717 | Gianluca Carloni | Gianluca Carloni | Human-aligned Deep Learning: Explainability, Causality, and Biological
Inspiration | Personal adaptation and expansion of doctoral thesis (originally
submitted in Oct 2024, revisioned in Jan 2025) | null | null | null | cs.CV cs.AI cs.LG eess.IV q-bio.NC | http://creativecommons.org/licenses/by/4.0/ | This work aligns deep learning (DL) with human reasoning capabilities and
needs to enable more efficient, interpretable, and robust image classification.
We approach this from three perspectives: explainability, causality, and
biological vision. Introduction and background open this work before diving
into operative chapters. First, we assess neural networks' visualization
techniques for medical images and validate an explainable-by-design method for
breast mass classification. A comprehensive review at the intersection of XAI
and causality follows, where we introduce a general scaffold to organize past
and future research, laying the groundwork for our second perspective. In the
causality direction, we propose novel modules that exploit feature
co-occurrence in medical images, leading to more effective and explainable
predictions. We further introduce CROCODILE, a general framework that
integrates causal concepts, contrastive learning, feature disentanglement, and
prior knowledge to enhance generalization. Lastly, we explore biological
vision, examining how humans recognize objects, and propose CoCoReco, a
connectivity-inspired network with context-aware attention mechanisms. Overall,
our key findings include: (i) simple activation maximization lacks insight for
medical imaging DL models; (ii) prototypical-part learning is effective and
radiologically aligned; (iii) XAI and causal ML are deeply connected; (iv) weak
causal signals can be leveraged without a priori information to improve
performance and interpretability; (v) our framework generalizes across medical
domains and out-of-distribution data; (vi) incorporating biological circuit
motifs improves human-aligned recognition. This work contributes toward
human-aligned DL and highlights pathways to bridge the gap between research and
clinical adoption, with implications for improved trust, diagnostic accuracy,
and safe deployment.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 14:40:58 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Carloni",
"Gianluca",
""
]
] |
2504.13719 | Andi Pina | A.R. Pi\~na, Shams El-Adawy, Mike Verostek, Brett T. Boyle, Mateo
Cacheiro, Matt Lawler, Namitha Pradeep, Ella Watts, Colin G. West, H.J.
Lewandowski, Benjamin M. Zwickl | Landscape of Quantum Information Science and Engineering Education: From
Physics Foundations to Interdisciplinary Frontiers | 23 pages, 7 figures, 5 appendices | null | null | null | physics.ed-ph quant-ph | http://creativecommons.org/licenses/by/4.0/ | Quantum Information Science and Engineering (QISE) is rapidly gaining
interest from those within many disciplines and higher education needs to adapt
to the changing landscape. Although QISE education still has a strong presence
and roots in physics, the field is becoming increasingly interdisciplinary.
There is a need to understand the presence of QISE instruction and
quantum-related instruction across all disciplines in order to figure out where
QISE education is already happening and where it could be expanded. Although
there is recent work that characterizes introductory QISE courses, there is no
holistic picture of the landscape of QISE and quantum-related education in the
United States. We analyzed course catalogs from 1,456 U.S. institutions. We
found 61 institutions offering QISE degree programs, mostly at PhD-granting
schools, with physics, electrical and computer engineering (ECE), and computer
science(CS) as their primary contributors . Across all institutions, we
identified over 8,000 courses mentioning 'quantum,' but about one-third of
institutions in our study had none. We also found over 500 dedicated QISE
courses, concentrated in PhD-granting institutions, primarily in physics, ECE,
and CS. Physics leads in offering both general quantum-related ($\sim$4,700)
and QISE-specific ($\sim$200) courses. Across multiple disciplines, we see that
QISE topics are being introduced in courses not fully dedicated to QISE, which
may be a productive strategy for increasing access to QISE education. Our
dataset and analysis provide the most comprehensive overview to date of quantum
education across US higher education. To ensure broad access, all data are
publicly available and downloadable at quantumlandscape.streamlit.app. We hope
these findings will support and guide future efforts in curriculum design,
workforce development, and education policy across the quantum ecosystem.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 14:41:58 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Piña",
"A. R.",
""
],
[
"El-Adawy",
"Shams",
""
],
[
"Verostek",
"Mike",
""
],
[
"Boyle",
"Brett T.",
""
],
[
"Cacheiro",
"Mateo",
""
],
[
"Lawler",
"Matt",
""
],
[
"Pradeep",
"Namitha",
""
],
[
"Watts",
"Ella",
""
],
[
"West",
"Colin G.",
""
],
[
"Lewandowski",
"H. J.",
""
],
[
"Zwickl",
"Benjamin M.",
""
]
] |
2504.13720 | Edoardo Provenzi | Michel Berthier, Valerie Garcin, Nicoletta Prencipe and Edoardo
Provenzi | The relativity of color perception | null | Journal of Mathematical Psychology, 103, 102562, 2021 | null | null | q-bio.NC eess.IV quant-ph | http://creativecommons.org/licenses/by/4.0/ | Physical colors, i.e. reflected or emitted lights entering the eyes from a
visual environment, are converted into perceived colors sensed by humans by
neurophysiological mechanisms. These processes involve both three types of
photoreceptors, the LMS cones, and spectrally opponent and non-opponent
interactions resulting from the activity rates of ganglion and lateral
geniculate nucleus cells. Thus, color perception is a phenomenon inherently
linked to an experimental environment (the visual scene) and an observing
apparatus (the human visual system). This is clearly reminiscent of the
conceptual foundation of both relativity and quantum mechanics, where the link
is between a physical system and the measuring instruments. The relationship
between color perception and relativity was explicitly examined for the first
time by the physicist H. Yilmaz in 1962 from an experimental point of view. The
main purpose of this contribution is to present a rigorous mathematical model
that, by taking into account both trichromacy and color opponency, permits to
explain on a purely theoretical basis the relativistic color perception
phenomena argued by Yilmaz. Instead of relying directly on relativistic
considerations, we base our theory on a quantum interpretation of color
perception together with just one assumption, called trichromacy axiom, that
summarizes well-established properties of trichromatic color vision within the
framework of Jordan algebras. We show how this approach allows us to reconcile
trichromacy with Hering's opponency and also to derive the relativistic
properties of perceived colors without any additional mathematical or
experimental assumption.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 14:46:29 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Berthier",
"Michel",
""
],
[
"Garcin",
"Valerie",
""
],
[
"Prencipe",
"Nicoletta",
""
],
[
"Provenzi",
"Edoardo",
""
]
] |
2504.13721 | Nozomi Soya | Nozomi Soya, Michihiro Yamada, Kohei Hamaya, Kazuya Ando | Isotropic and anisotropic spin-dependent transport in epitaxial Fe$_3$Si | null | null | null | null | cond-mat.mes-hall cond-mat.mtrl-sci | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We investigate spin-dependent transport phenomena in epitaxially grown
Fe$_3$Si films, focusing on the anisotropic magnetoresistance (AMR), planar
Hall effect (PHE), anomalous Hall effect (AHE), and spin Hall effect (SHE).
While the sign and magnitude of the AMR and PHE depend on the current
orientation relative to the crystallographic axes, the AHE and SHE remain
nearly independent of the current orientation. The anisotropic AMR and PHE are
attributed to current and magnetization dependent local band properties,
including band crossing/anticrossing at specific $k$ points. In contrast, the
isotropic AHE and SHE arise from the Berry curvature integrated over the entire
Brillouin zone, which cancels local variations. These findings highlight the
interplay between symmetry, band structure, and magnetization in the
spin-dependent transport phenomena.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 14:46:52 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Soya",
"Nozomi",
""
],
[
"Yamada",
"Michihiro",
""
],
[
"Hamaya",
"Kohei",
""
],
[
"Ando",
"Kazuya",
""
]
] |
2504.13722 | H. Van Dyke Parunak | H. Van Dyke Parunak | $O(p \log d)$ Subgraph Isomorphism using Stigmergic Swarming Agents | null | null | null | null | cs.MA cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Subgraph isomorphism compares two graphs (sets of nodes joined by edges) to
determine whether they contain a common subgraph. Many applications require
identifying the subgraph, not just deciding its existence. A particularly
common use case, using graphs with labeled nodes, seeks to find instances of a
smaller pattern graph with $p$ nodes in the larger data graph with $d$ nodes.
The problem is NP-complete, so that na\"ive solutions are exponential in $p +
d$. A wide range of heuristics have been proposed, with the best complexity
$O(p^2d^2)$. This paper outlines ASSIST (Approximate Swarming Subgraph
Isomorphism through Stigmergy), inspired by the ant colony optimization
approach to the traveling salesperson problem. ASSIST is linearithmic, $O(p
\log d)$, and also supports matching problems (such as temporally ordered
edges, inexact matches, and missing nodes or edges in the data graph) that
frustrate other heuristics.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 14:47:49 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Parunak",
"H. Van Dyke",
""
]
] |
2504.13723 | Yanqing Xu | Yanqing Xu, Zhiguo Ding, Donghong Cai, and Vincent W.S. Wong | QoS-Aware NOMA Design for Downlink Pinching-Antenna Systems | This paper has been submitted for possible publication | null | null | null | eess.SP | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Pinching antennas, implemented by applying small dielectric particles on a
waveguide, have emerged as a promising flexible-antenna technology ideal for
next-generation wireless communications systems. Unlike conventional
flexible-antenna systems, pinching antennas offer the advantage of creating
line-of-sight links by enabling antennas to be activated on the waveguide at a
location close to the user. This paper investigates a typical two-user
non-orthogonal multiple access (NOMA) downlink scenario, where multiple
pinching antennas are activated on a single dielectric waveguide to assist NOMA
transmission. We formulate the problem of maximizing the data rate of one user
subject to the quality-of-service requirement of the other user by jointly
optimizing the antenna locations and power allocation coefficients. The
formulated problem is nonconvex and difficult to solve due to the impact of
antenna locations on large-scale path loss and two types of phase shifts,
namely in-waveguide phase shifts and free space propagation phase shifts. To
this end, we propose an iterative algorithm based on block coordinate descent
and successive convex approximation techniques. Moreover, we consider the
special case with a single pinching antenna, which is a simplified version of
the multi-antenna case. Although the formulated problem is still nonconvex, by
using the inherent features of the formulated problem, we derive the global
optimal solution in closed-form, which offers important insights on the
performance of pinching-antenna systems. Simulation results demonstrate that
the pinching-antenna system significantly outperforms conventional
fixed-position antenna systems, and the proposed algorithm achieves performance
comparable to the computationally intensive exhaustive search based approach.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 14:49:08 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Xu",
"Yanqing",
""
],
[
"Ding",
"Zhiguo",
""
],
[
"Cai",
"Donghong",
""
],
[
"Wong",
"Vincent W. S.",
""
]
] |
2504.13724 | Jiang Zhu | Michael J. Ramsey-Musolf, Jiang Zhu | Bubble wall velocity from Kadanoff-Baym equations: fluid dynamics and
microscopic interactions | 39 pages, 6 figures | null | null | null | hep-ph hep-th | http://creativecommons.org/licenses/by/4.0/ | We establish a first principles, systematic framework for determining the
bubble wall velocity during a first order cosmological phase transition. This
framework, based on non-local Kadanoff-Baym equations, incorporates both
macroscopic fluid dynamics and microscopic interactions between the bubble wall
and particles in the plasma. Previous studies have generally focused on one of
these two sources of friction pressure that govern the wall velocity. As a
precursor, we utilize background field quantum field theory to obtain the
relevant local Boltzmann equations, from which we derive the forces associated
with variation of particle masses across the bubble wall and the microscopic
wall-particle interactions. We subsequently show how these equations emerge
from the Kadanoff-Baym framework under various approximations. We apply this
framework in the ballistic regime to compute the new friction force arising
from the $2\rightarrow 2$ scattering processes in scalar field theory. We
obtain a linear relationship between this force and the Lorentz factor
$\gamma_w$ that would preclude runaway bubbles with such effects.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 14:50:01 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Ramsey-Musolf",
"Michael J.",
""
],
[
"Zhu",
"Jiang",
""
]
] |
2504.13725 | Wen-Yuan Ai | Wen-Yuan Ai, Matthias Carosi, Bjorn Garbrecht, Carlos Tamarit and
Miguel Vanvlasselaer | Bubble wall dynamics from nonequilibrium quantum field theory | 63 pages, 6 figures | null | null | MITP-25-029 | hep-ph astro-ph.CO hep-th | http://creativecommons.org/licenses/by/4.0/ | We derive the coupled dynamics between the bubble wall and the plasma from
first principles using nonequilibrium quantum field theory. The commonly used
equation of motion of the bubble wall in the kinetic approach is shown to be
incomplete. In the language of the two-particle-irreducible effective action,
the conventional equation misses higher-loop terms generated by the
condensate-particle type vertices (e.g.,~$\varphi\phi\chi^2$, where $\varphi$
is the background field describing the bubble wall, $\phi$ the corresponding
particle excitation and $\chi$ another particle species in the plasma). From
the missing terms, we identify an additional dissipative friction which is
contributed by particle production processes from the condensate-particle type
vertices. We also show how other transmission processes beyond the 1-to-1
elementary transmission studied in the literature for ultrarelativistic bubble
walls, e.g., 1-to-1 mixing and 1-to-2 transition radiation, can be understood
from the kinetic approach.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 14:50:03 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Ai",
"Wen-Yuan",
""
],
[
"Carosi",
"Matthias",
""
],
[
"Garbrecht",
"Bjorn",
""
],
[
"Tamarit",
"Carlos",
""
],
[
"Vanvlasselaer",
"Miguel",
""
]
] |
2504.13726 | Xiaowan Li | Lin Yuan, Xiaowan Li, Yan Zhang, Jiawei Zhang, Hongbo Li, Xinbo Gao | MLEP: Multi-granularity Local Entropy Patterns for Universal
AI-generated Image Detection | 9 pages, 6 figures | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Advancements in image generation technologies have raised significant
concerns about their potential misuse, such as producing misinformation and
deepfakes. Therefore, there is an urgent need for effective methods to detect
AI-generated images (AIGI). Despite progress in AIGI detection, achieving
reliable performance across diverse generation models and scenes remains
challenging due to the lack of source-invariant features and limited
generalization capabilities in existing methods. In this work, we explore the
potential of using image entropy as a cue for AIGI detection and propose
Multi-granularity Local Entropy Patterns (MLEP), a set of entropy feature maps
computed across shuffled small patches over multiple image scaled. MLEP
comprehensively captures pixel relationships across dimensions and scales while
significantly disrupting image semantics, reducing potential content bias.
Leveraging MLEP, a robust CNN-based classifier for AIGI detection can be
trained. Extensive experiments conducted in an open-world scenario, evaluating
images synthesized by 32 distinct generative models, demonstrate significant
improvements over state-of-the-art methods in both accuracy and generalization.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 14:50:23 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Yuan",
"Lin",
""
],
[
"Li",
"Xiaowan",
""
],
[
"Zhang",
"Yan",
""
],
[
"Zhang",
"Jiawei",
""
],
[
"Li",
"Hongbo",
""
],
[
"Gao",
"Xinbo",
""
]
] |
2504.13727 | Robert Rosenbaum | Yue Wan and Robert Rosenbaum | High-dimensional dynamics in low-dimensional networks | null | null | null | null | math.DS math-ph math.MP q-bio.NC | http://creativecommons.org/licenses/by/4.0/ | Many networks that arise in nature and applications are effectively
low-dimensional in the sense that their connectivity structure is dominated by
a few dimensions. It is natural to expect that dynamics on such networks might
also be low-dimensional. Indeed, recent results show that low-rank networks
produce low-dimensional dynamics whenever the network is isolated from external
perturbations or noise. However, networks in nature are rarely isolated. We
show that recurrent networks with low-rank structure often produce
high-dimensional dynamics in the presence of high-dimensional perturbations.
Counter to intuition, dynamics in these networks are \textit{suppressed} in
directions that are aligned with the network's low-rank structure, a phenomenon
we term "low-rank suppression." Our results clarify important, but
counterintuitive relationships between a network's connectivity structure and
the structure of the dynamics it generates.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 14:54:45 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Wan",
"Yue",
""
],
[
"Rosenbaum",
"Robert",
""
]
] |
2504.13728 | Ana\"is Vallet | Ana\"is Vallet and St\'ephane Blanco and Coline Chevallier and Francis
Eustache and Jacques Gautrais and Jean-Yves Grandpeix and Jean-Louis Joly and
Shailendra Segobin and Pierre Gagnepain | Sensitivity analysis enlightens effects of connectivity in a Neural Mass
Model under Control-Target mode | null | null | null | null | q-bio.NC | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Biophysical models of human brain represent the latter as a graph of
inter-connected neural regions. Building from the model by Naskar et al.
(Network Neuroscience 2021), our motivation was to understand how these brain
regions can be connected at neural level to implement some inhibitory control,
which calls for inhibitory connectivity rarely considered in such models. In
this model, regions are made of inter-connected excitatory and inhibitory pools
of neurons, but are long-range connected only via excitatory pools (mutual
excitation). We thus extend this model by generalizing connectivity, and we
analyse how connectivity affects the behaviour of this model.
Focusing on the simplest paradigm made of a Control area and a Target area,
we explore four typical kinds of connectivity: mutual excitation, Target
inhibition by Control, Control inhibition by Target, and mutual inhibition. For
this, we build an analytical sensitivity framework, nesting up sensitivities of
isolated pools, of isolated regions, and of the full system. We show that
inhibitory control can emerge only in Target inhibition by Control and mutual
inhibition connectivities.
We next offer an analysis of how the model sensitivities depends on
connectivity structure, depending on a parameter controling the strength of the
self-inhibition within Target region. Finally, we illustrate the effect of
connectivity structure upon control effectivity in response to an external
forcing in the Control area.
Beyond the case explored here, our methodology to build analytical
sensitivities by nesting up levels (pool, region, system) lays the groundwork
for expressing nested sensitivities for more complex network configurations,
either for this model or any other one.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 14:54:57 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Vallet",
"Anaïs",
""
],
[
"Blanco",
"Stéphane",
""
],
[
"Chevallier",
"Coline",
""
],
[
"Eustache",
"Francis",
""
],
[
"Gautrais",
"Jacques",
""
],
[
"Grandpeix",
"Jean-Yves",
""
],
[
"Joly",
"Jean-Louis",
""
],
[
"Segobin",
"Shailendra",
""
],
[
"Gagnepain",
"Pierre",
""
]
] |
2504.13729 | Anjala Mullaparambil Babu | Zain H. Saleem, Anil Shaji, Anjala M Babu, Da-Wei Luo, Quinn Langfitt,
Ting Yu and Stephen K. Gray | Quantum Fisher Information and the Curvature of Entanglement | 7 pages, 7 figures | null | null | null | quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We explore the relationship between quantum Fisher information (QFI) and the
second derivative of concurrence with respect to the coupling between two
qubits, referred to as the curvature of entanglement (CoE). For a two-qubit
quantum probe used to estimate the coupling constant appearing in a simple
interaction Hamiltonian, we show that at certain times CoE = -QFI; these times
can be associated with the concurrence, viewed as a function of the coupling
parameter, being a maximum. We examine the time evolution of the concurrence of
the eigenstates of the symmetric logarithmic derivative and show that, for both
initially separable and initially entangled states, simple product measurements
suffice to saturate the quantum Cram\'er-Rao bound when CoE = -QFI, while
otherwise, in general, entangled measurements are required giving an
operational significance to the points in time when CoE = -QFI.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 14:55:42 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Saleem",
"Zain H.",
""
],
[
"Shaji",
"Anil",
""
],
[
"Babu",
"Anjala M",
""
],
[
"Luo",
"Da-Wei",
""
],
[
"Langfitt",
"Quinn",
""
],
[
"Yu",
"Ting",
""
],
[
"Gray",
"Stephen K.",
""
]
] |
2504.13730 | Paul K. Mandal | Paul K. Mandal, Cole Leo, Connor Hurley | Controlled Territory and Conflict Tracking (CONTACT): (Geo-)Mapping
Occupied Territory from Open Source Intelligence | 7 pages, 1 figure, 1 table | null | null | null | cs.CL cs.AI cs.LG | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Open-source intelligence provides a stream of unstructured textual data that
can inform assessments of territorial control. We present CONTACT, a framework
for territorial control prediction using large language models (LLMs) and
minimal supervision. We evaluate two approaches: SetFit, an embedding-based
few-shot classifier, and a prompt tuning method applied to BLOOMZ-560m, a
multilingual generative LLM. Our model is trained on a small hand-labeled
dataset of news articles covering ISIS activity in Syria and Iraq, using
prompt-conditioned extraction of control-relevant signals such as military
operations, casualties, and location references. We show that the BLOOMZ-based
model outperforms the SetFit baseline, and that prompt-based supervision
improves generalization in low-resource settings. CONTACT demonstrates that
LLMs fine-tuned using few-shot methods can reduce annotation burdens and
support structured inference from open-ended OSINT streams. Our code is
available at https://github.com/PaulKMandal/CONTACT/.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 14:57:07 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Mandal",
"Paul K.",
""
],
[
"Leo",
"Cole",
""
],
[
"Hurley",
"Connor",
""
]
] |
2504.13731 | Yixin Wang | Yixin Wang, Fanhui Meng and Xiao Ma | Systematic Bernoulli Generator Matrix Codes | null | null | null | null | cs.IT math.IT | http://creativecommons.org/licenses/by/4.0/ | This paper is concerned with the systematic Bernoulli generator matrix~(BGM)
codes, which have been proved to be capacity-achieving over binary-input
output-symmetric~(BIOS) channels in terms of bit-error rate~(BER). We prove
that the systematic BGM codes are also capacity-achieving over BIOS channels in
terms of frame-error rate (FER). To this end, we present a new framework to
prove the coding theorems for binary linear codes. Different from the
widely-accepted approach via ensemble enlargement, the proof directly applies
to the systematic binary linear codes. The new proof indicates that the
pair-wise independence condition is not necessary for proving the binary linear
code ensemble to achieve the capacity of the BIOS channel. The Bernoulli
parity-check~(BPC) codes, which fall within the framework of the systematic BGM
codes with parity-check bits known at the decoder can also be proved to achieve
the capacity. The presented framework also reveals a new mechanism pertained to
the systematic linear codes that the systematic bits and the corresponding
parity-check bits play different roles. Precisely, the noisy systematic bits
are used to limit the list size of candidate codewords, while the noisy
parity-check bits are used to select from the list the maximum likelihood
codeword. For systematic BGM codes with finite length, we derive the lower
bounds on the BER and FER, which can be used to predict the error floors.
Numerical results show that the systematic BGM codes match well with the
derived error floors. The performance in water-fall region can be improved with
approaches in statistical physics and the error floors can be significantly
improved by implementing the concatenated codes with the systematic BGM codes
as the inner codes.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 14:58:50 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Wang",
"Yixin",
""
],
[
"Meng",
"Fanhui",
""
],
[
"Ma",
"Xiao",
""
]
] |
2504.13732 | Chunsheng Luo | C.S.Luo, X.D.Tang, C.Henkel, K.M.Menten, Y.Sun, Y.Gong, X.W.Zheng,
D.L.Li, Y.X.He, X.Lu, Y.P.Ao, X.P.Chen, T.Liu, K.Wang, J.W.Wu, J. Esimbek,
J.J.Zhou, J.J.Qiu, X.Zhao, J.S.Li, Q.Zhao, and L.D.Liu | Molecular Clouds at the Edge of the Galaxy I. Variation of CO J=2-1/1-0
Line Ratio | null | null | null | null | astro-ph.GA | http://creativecommons.org/licenses/by/4.0/ | The Galactic edge at Galactocentric distances of 14\,--\,22\,kpc provides an
ideal laboratory to study molecular clouds in an environment that is different
from the solar neighborhood, due to its lower gas density, lower metallicity,
and little or no perturbation from the spiral arms. Observations of
CO\,($J$\,=\,2--1) spectral lines were carried out towards 72 molecular clouds
located at the Galactic edge using the IRAM\,30\,m telescope. Combined with
CO\,($J$\,=\,1--0) data from the MWISP project, we investigate the variations
of $R_{21}$ across these Galactic edge clouds, with $R_{21}$ representing
CO(2-1)/CO(1-0) integrated intensity ratios. These are found to range from 0.3
to 3.0 with a mean of 1.0\,$\pm$\,0.1 in the Galactic edge clouds. The
proportions of very low ratio gas (VLRG; $R_{21}$\,<\,0.4), low ratio gas (LRG;
0.4\,$\le$\,$R_{21}$\,<\,0.7), high ratio gas (HRG;
0.7\,$\le$\,$R_{21}$\,<\,1.0), and very high ratio gas (VHRG;
$R_{21}$\,$\ge$\,1.0) are 6.9\%, 29.2\%, 26.4\%, and 37.5\%, respectively,
indicating a significant presence of high $R_{21}$ ratio molecular gas within
these regions. In our Galaxy, the $R_{21}$ ratio exhibits a gradient of initial
radial decline followed by a high dispersion with increasing Galacticentric
distance and a prevalence for high ratio gas. There is no apparent systematic
variation within the Galactocentric distance range of 14 to 22\,kpc. A
substantial proportion of HRG and VHRG is found to be associated with compact
clouds and regions displaying star-forming activity, suggesting that the high
$R_{21}$ ratios may stem from dense gas concentrations and recent episodes of
star formation.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 15:00:34 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Luo",
"C. S.",
""
],
[
"Tang",
"X. D.",
""
],
[
"Henkel",
"C.",
""
],
[
"Menten",
"K. M.",
""
],
[
"Sun",
"Y.",
""
],
[
"Gong",
"Y.",
""
],
[
"Zheng",
"X. W.",
""
],
[
"Li",
"D. L.",
""
],
[
"He",
"Y. X.",
""
],
[
"Lu",
"X.",
""
],
[
"Ao",
"Y. P.",
""
],
[
"Chen",
"X. P.",
""
],
[
"Liu",
"T.",
""
],
[
"Wang",
"K.",
""
],
[
"Wu",
"J. W.",
""
],
[
"Esimbek",
"J.",
""
],
[
"Zhou",
"J. J.",
""
],
[
"Qiu",
"J. J.",
""
],
[
"Zhao",
"X.",
""
],
[
"Li",
"J. S.",
""
],
[
"Zhao",
"Q.",
""
],
[
"Liu",
"L. D.",
""
]
] |
2504.13733 | Yichen Liu | Yichen Liu | Dynamic Regularized CBDT: Variance-Calibrated Causal Boosting for
Interpretable Heterogeneous Treatment Effects | Preprint version. 13 pages, 4 figures, 3 tables | null | null | null | cs.LG stat.ML | http://creativecommons.org/licenses/by/4.0/ | Heterogeneous treatment effect estimation in high-stakes applications demands
models that simultaneously optimize precision, interpretability, and
calibration. Many existing tree-based causal inference techniques, however,
exhibit high estimation errors when applied to observational data because they
struggle to capture complex interactions among factors and rely on static
regularization schemes. In this work, we propose Dynamic Regularized Causal
Boosted Decision Trees (CBDT), a novel framework that integrates variance
regularization and average treatment effect calibration into the loss function
of gradient boosted decision trees. Our approach dynamically updates the
regularization parameters using gradient statistics to better balance the
bias-variance tradeoff. Extensive experiments on standard benchmark datasets
and real-world clinical data demonstrate that the proposed method significantly
improves estimation accuracy while maintaining reliable coverage of true
treatment effects. In an intensive care unit patient triage study, the method
successfully identified clinically actionable rules and achieved high accuracy
in treatment effect estimation. The results validate that dynamic
regularization can effectively tighten error bounds and enhance both predictive
performance and model interpretability.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 15:02:06 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Liu",
"Yichen",
""
]
] |
2504.13734 | Hieu Minh Tran | Hieu Minh Tran, Sang Quang Dinh, and Trang Quynh Trieu | Expected statistical uncertainties at future $e^+e^-$ colliders | 6 pages, 2 figures | null | null | null | hep-ph hep-ex nucl-ex | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In future colliders, the frontiers of luminosity and energy are extended to
explore the physics of elementary particles at extremely high precision, and to
discover new phenomena suggested from current experimental anomalies. In this
letter, we present a simple method to estimate the expected statistical
uncertainties of scattering cross sections at future colliders using their
conceptual design reports. In particular, the expected statistical
uncertainties of muon pair production cross section at the Future Circular
Collider (FCC-ee) and the Circular Electron-Positron Collider (CEPC) are
calculated. The results can be used to set a goal for systematic uncertainty
improvement, to determine the standard model parameters accurately, and to
identify the viable parameter space of new physics models.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 15:02:55 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Tran",
"Hieu Minh",
""
],
[
"Dinh",
"Sang Quang",
""
],
[
"Trieu",
"Trang Quynh",
""
]
] |
2504.13735 | Yujie Huang | Yujie Huang, Audrey Crozet, Toinon Vigier, Alexandre Bruckert, Patrick
Le Callet, Pierre Lebranchu | Orientation and mobility test in virtual reality, a tool for
quantitative assessment of functional vision: dataset and evaluation in
healthy subjects | null | null | null | null | cs.HC | http://creativecommons.org/licenses/by/4.0/ | The purpose of this study was to develop and evaluate a novel virtual reality
seated orientation and mobility (VR-S-O&M) test protocol designed to assess
functional vision. This study aims to provide a dataset of healthy subjects
using this protocol and preliminary analyses. We introduced a VR-based O&M test
protocol featuring a novel seated displacement method, diverse lighting
conditions, and varying course configurations within a virtual environment.
Normally sighted participants (N=42) completed the test, which required them to
navigate a path and destroy identified obstacles. We assessed basic performance
metrics, including time duration, number of missed objects, and time before the
first step, under different environmental conditions to verify ecological
validity. Additionally, we analyzed participants' behaviors regarding missed
objects, demonstrating the potential of integrating behavioral and interactive
data for a more precise functional vision assessment. Our VR-S-O&M test
protocol, along with the first O&M behavior dataset, presents significant
opportunities for developing more refined performance metrics for assessing
functional vision and enhancing the quality of life.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 15:04:25 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Huang",
"Yujie",
""
],
[
"Crozet",
"Audrey",
""
],
[
"Vigier",
"Toinon",
""
],
[
"Bruckert",
"Alexandre",
""
],
[
"Callet",
"Patrick Le",
""
],
[
"Lebranchu",
"Pierre",
""
]
] |
2504.13736 | Ali Hojjat | Ali Hojjat, Janek Haberer, Tayyaba Zainab, Olaf Landsiedel | LimitNet: Progressive, Content-Aware Image Offloading for Extremely Weak
Devices & Networks | This is the author's accepted manuscript. The Version of Record is
available at: https://doi.org/10.1145/3643832.3661856 | In Proceedings of the 22nd ACM International Conference on Mobile
Systems, Applications, and Services (MobiSys '24), June 3-7, 2024, Minato-ku,
Tokyo, Japan. ACM, New York, NY, USA | 10.1145/3643832.3661856 | null | cs.CV eess.IV | http://creativecommons.org/licenses/by-nc-nd/4.0/ | IoT devices have limited hardware capabilities and are often deployed in
remote areas. Consequently, advanced vision models surpass such devices'
processing and storage capabilities, requiring offloading of such tasks to the
cloud. However, remote areas often rely on LPWANs technology with limited
bandwidth, high packet loss rates, and extremely low duty cycles, which makes
fast offloading for time-sensitive inference challenging. Today's approaches,
which are deployable on weak devices, generate a non-progressive bit stream,
and therefore, their decoding quality suffers strongly when data is only
partially available on the cloud at a deadline due to limited bandwidth or
packet losses.
In this paper, we introduce LimitNet, a progressive, content-aware image
compression model designed for extremely weak devices and networks. LimitNet's
lightweight progressive encoder prioritizes critical data during transmission
based on the content of the image, which gives the cloud the opportunity to run
inference even with partial data availability.
Experimental results demonstrate that LimitNet, on average, compared to SOTA,
achieves 14.01 p.p. (percentage point) higher accuracy on ImageNet1000, 18.01
pp on CIFAR100, and 0.1 higher [email protected] on COCO. Also, on average, LimitNet
saves 61.24% bandwidth on ImageNet1000, 83.68% on CIFAR100, and 42.25% on the
COCO dataset compared to SOTA, while it only has 4% more encoding time compared
to JPEG (with a fixed quality) on STM32F7 (Cortex-M7).
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 15:04:53 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Hojjat",
"Ali",
""
],
[
"Haberer",
"Janek",
""
],
[
"Zainab",
"Tayyaba",
""
],
[
"Landsiedel",
"Olaf",
""
]
] |
2504.13737 | William Buchanan Prof | Jamie Gilchrist, William J. Buchanan and Keir Finlow-Bates | Breaking ECDSA with Two Affinely Related Nonces | null | null | null | null | cs.CR | http://creativecommons.org/licenses/by/4.0/ | The security of the Elliptic Curve Digital Signature Algorithm (ECDSA)
depends on the uniqueness and secrecy of the nonce, which is used in each
signature. While it is well understood that nonce $k$ reuse across two distinct
messages can leak the private key, we show that even if a distinct value is
used for $k_2$, where an affine relationship exists in the form of: \(k_m = a
\cdot k_n + b\), we can also recover the private key. Our method requires only
two signatures (even over the same message) and relies purely on algebra, with
no need for lattice reduction or brute-force search(if the relationship, or
offset, is known). To our knowledge, this is the first closed-form derivation
of the ECDSA private key from only two signatures over the same message, under
a known affine relationship between nonces.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 15:05:22 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Gilchrist",
"Jamie",
""
],
[
"Buchanan",
"William J.",
""
],
[
"Finlow-Bates",
"Keir",
""
]
] |
2504.13738 | Stephan Stieberger | Xavier Kervyn and Stephan Stieberger | High Energy String Theory and the Celestial Sphere | 28 pages, LaTeX, 2 figs | null | null | null | hep-th gr-qc | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We elaborate on a string world-sheet connection to flat space-time
holography. More specifically, in the high energy (zero tension) limit of
tree-level string scattering in flat backgrounds the underlying string
world-sheets can be related to the celestial sphere, with the saddle points of
the high energy string description representing points on the celestial sphere.
We show that this picture continues to hold at all subleading orders in the
quantum fluctuations around this classical configuration. As a consequence
there is a dual description of the high energy limit of string theory as the
large energy expansion on the celestial sphere organized by (light) higher spin
modes. This approach points to an intrinsic construction of celestial conformal
field theory (CFT) by relating it to a (free) world-sheet CFT of string theory.
We also elaborate on the high energy representations of tree-level open and
closed string amplitudes and work out their subleading corrections. Their
number theoretic properties and relevance as amplitudes of tensionless strings
are discussed.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 15:08:17 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Kervyn",
"Xavier",
""
],
[
"Stieberger",
"Stephan",
""
]
] |
2504.13739 | Xin-Xiang Ju | Xin-Xiang Ju, Bo-Hao Liu, Ya-Wen Sun, and Yang Zhao | Modular Hamiltonian of holographic time band states | 22 pages, 6 figures | null | null | null | hep-th | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A holographic time band is a causal incomplete boundary spacetime subregion
whose causal wedge is a causal complete bulk spacetime subregion. In an AdS$_3$
spacetime with a specifically modified IR geometry, its causal wedge coincides
with its entanglement wedge, which suggests the existence of a local modular
Hamiltonian for the holographic time band state. In this work, we construct the
local modular Hamiltonian for holographic time bands using two independent
methods: from the quantum information properties of the time band state and
from the construction of consistent geometric modular flows. Both methods lead
to the same unique result of the local modular Hamiltonian, reflecting the
intrinsic property of the time band state. The entanglement first law has also
been checked to hold for the simplest time band state. This is a substantial
addition to the known holographic subsystems with a local modular Hamiltonian,
beyond the few cases previously identified.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 15:08:45 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Ju",
"Xin-Xiang",
""
],
[
"Liu",
"Bo-Hao",
""
],
[
"Sun",
"Ya-Wen",
""
],
[
"Zhao",
"Yang",
""
]
] |
2504.13740 | Andrea Di Giusto | Andrea Di Giusto, Wim van Houtum, Alberto Ravagnani, Yan Wu | Equivalence of Serial and Parallel A-Posteriori Probabilities in the
Decoding of DAB Systems | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Motivated by applications to digital audio broadcasting (DAB) systems, we
study the a-posteriori probabilities (APPs) of the coded and information bits
of the serial concatenation of multiple convolutional codewords. The main
result of this correspondence is a proof that the APPs of the input bits do not
change when considering the concatenation of multiple codewords as a received
sequence. This is a purely theoretical result, which remains valid for every
convolutional code, as long as the encoder goes back to the zero state at the
end of each codeword. An equivalent heuristic for serial concatenation in
Viterbi decoding is described. The applicability of our result to DAB systems,
where interleaving and modulation are accounted for, is investigated through
Matlab simulations. We show that the Bit Error Rate (BER) of the simulated DAB
system does not change when decoding multiple transmitted codewords as one
serially concatenated sequence, even when considering all the features of a DAB
system.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 15:08:50 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Di Giusto",
"Andrea",
""
],
[
"van Houtum",
"Wim",
""
],
[
"Ravagnani",
"Alberto",
""
],
[
"Wu",
"Yan",
""
]
] |
2504.13741 | Min Li | Xingyu Zhao, Min Li, Ming-Min Zhao, Shihao Yan and Min-Jian Zhao | Sensing-Then-Beamforming: Robust Transmission Design for RIS-Empowered
Integrated Sensing and Covert Communication | 13 pages; submitted for possible publication | null | null | null | cs.IT eess.SP math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Traditional covert communication often relies on the knowledge of the
warden's channel state information, which is inherently challenging to obtain
due to the non-cooperative nature and potential mobility of the warden. The
integration of sensing and communication technology provides a promising
solution by enabling the legitimate transmitter to sense and track the warden,
thereby enhancing transmission covertness. In this paper, we develop a
framework for sensing-then-beamforming in reconfigurable intelligent surface
(RIS)-empowered integrated sensing and covert communication (ISCC) systems,
where the transmitter (Alice) estimates and tracks the mobile aerial warden's
channel using sensing echo signals while simultaneously sending covert
information to multiple legitimate users (Bobs) with the assistance of RIS,
under the surveillance of the warden (Willie). Considering channel estimation
errors, we formulate a robust non-convex optimization problem that jointly
designs the communication beamformers, the sensing signal covariance matrix at
Alice, and the phase shifts at the RIS to maximize the covert sum rate of Bobs
while satisfying the constraints related to covert communication, sensing,
transmitter power, and the unit modulus of the RIS elements. To solve this
complex problem, we develop an efficient algorithm using alternating
optimization, successive convex approximation, S-procedure, sequential rank-one
constraint relaxation, and semidefinite relaxation techniques. Numerical
results confirm the convergence of the proposed algorithm and demonstrate its
effectiveness in tracking the warden's channel while ensuring robust covert
transmission. Furthermore, the results highlight the advantages of using RIS to
enhance the covert transmission rate compared to baseline schemes, and also
illustrate the intricate trade-off between communication and sensing in ISCC
systems.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 15:13:15 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Zhao",
"Xingyu",
""
],
[
"Li",
"Min",
""
],
[
"Zhao",
"Ming-Min",
""
],
[
"Yan",
"Shihao",
""
],
[
"Zhao",
"Min-Jian",
""
]
] |
2504.13742 | Vadim Dudnikov | Vadim Dudnikov | Explanation for the development of surface -plasma method of negative
ion production in BINP and around the World | null | null | null | null | physics.plasm-ph | http://creativecommons.org/publicdomain/zero/1.0/ | Development of charge-exchange ions injection into circular accelerators and
storage rings and development of surface-plasma method of negative ion
production in Budker Institute of Nuclear Physics (Novosibirsk) and around the
World are described.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 15:17:15 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Dudnikov",
"Vadim",
""
]
] |
2504.13743 | Runsheng Liu | Yifan Gao, Xinyi Li, Runsheng Liu, Xiangyi Liu, Daisuke Shiraishi | Convergence in natural parametrization of random walk frontier | 33 pages, 4 figures | null | null | null | math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we show that the frontier of planar random walk converges
weakly under natural parametrization to that of planar Brownian motion. As an
intermediate result, we also show the convergence of the renormalized
occupation measure.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 15:17:30 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Gao",
"Yifan",
""
],
[
"Li",
"Xinyi",
""
],
[
"Liu",
"Runsheng",
""
],
[
"Liu",
"Xiangyi",
""
],
[
"Shiraishi",
"Daisuke",
""
]
] |
2504.13744 | Andrea Vinante | F. Ahrens and A. Vinante | Observation of gyroscopic coupling in a non-spinning levitated
ferromagnet | 5 pages, 2 figures | null | null | null | quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A non-spinning permanent ferromagnet is predicted to behave as a gyroscope at
sufficiently low frequencies, which can be seen as a manifestation of the
Einstein-de Haas effect. This yet unexplored regime has been recently proposed
for ultrasensitive precession-based magnetometry and for atomic-like quantum
stabilization of a levitated nanomagnet in a static field. Here, we observe
signatures of gyroscopic effects in the rotational dynamics of a non-spinning
permanent ferromagnet levitated in a superconducting trap. Specifically, we
detect spin-rotation coupling between different librational modes, in good
agreement with theoretical predictions. From our measurements, we can infer
both the intrinsic angular momentum of the levitated magnet and its
gyromagnetic $g$-factor.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 15:18:08 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Ahrens",
"F.",
""
],
[
"Vinante",
"A.",
""
]
] |
2504.13745 | Andrea Rigo | Andrea Rigo, Luca Stornaiuolo, Mauro Martino, Bruno Lepri, Nicu Sebe | ESPLoRA: Enhanced Spatial Precision with Low-Rank Adaption in
Text-to-Image Diffusion Models for High-Definition Synthesis | null | null | null | null | cs.CV cs.AI | http://creativecommons.org/licenses/by/4.0/ | Diffusion models have revolutionized text-to-image (T2I) synthesis, producing
high-quality, photorealistic images. However, they still struggle to properly
render the spatial relationships described in text prompts. To address the lack
of spatial information in T2I generations, existing methods typically use
external network conditioning and predefined layouts, resulting in higher
computational costs and reduced flexibility. Our approach builds upon a curated
dataset of spatially explicit prompts, meticulously extracted and synthesized
from LAION-400M to ensure precise alignment between textual descriptions and
spatial layouts. Alongside this dataset, we present ESPLoRA, a flexible
fine-tuning framework based on Low-Rank Adaptation, specifically designed to
enhance spatial consistency in generative models without increasing generation
time or compromising the quality of the outputs. In addition to ESPLoRA, we
propose refined evaluation metrics grounded in geometric constraints, capturing
3D spatial relations such as \textit{in front of} or \textit{behind}. These
metrics also expose spatial biases in T2I models which, even when not fully
mitigated, can be strategically exploited by our TORE algorithm to further
improve the spatial consistency of generated images. Our method outperforms the
current state-of-the-art framework, CoMPaSS, by 13.33% on established spatial
consistency benchmarks.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 15:21:37 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Rigo",
"Andrea",
""
],
[
"Stornaiuolo",
"Luca",
""
],
[
"Martino",
"Mauro",
""
],
[
"Lepri",
"Bruno",
""
],
[
"Sebe",
"Nicu",
""
]
] |
2504.13746 | Piero D'Ancona | Piero D'Ancona, Diego Fiorletta | A dynamical Amrein-Berthier uncertainty principle | null | null | null | null | math.AP math-ph math.MP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given a selfadjoint magnetic Schr\"odinger operator
\begin{equation*}
H = ( i \partial + A(x) )^2 + V(x)
\end{equation*} on $L^{2}(\mathbb{R}^n)$, with $V(x)$ strictly subquadratic
and $A(x)$ strictly sublinear, we prove that the flow $u(t)=e^{-itH}u(0)$
satisfies an Amrein--Berthier type inequality
\begin{equation*}
\|u(t)\|_{L^{2}}\lesssim_{E,F,T,A,V}
\|u(0)\|_{L^{2}(E^{c})}
+
\|u(T)\|_{L^{2}(F^{c})},
\qquad
0\le t\le T
\end{equation*} for all compact sets $E,F \subset \mathbb{R}^{n}$. In
particular, if both $u(0)$ and $u(T)$ are compactly supported, then $u$
vanishes identically. Under different assumptions on the operator, which allow
for time--dependent coefficients, the result extends to sets $E,F$ of finite
measure. We also consider a few variants for Schr\"{o}dinger operators with
singular coefficients, metaplectic operators, and we include applications to
control theory.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 15:27:23 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"D'Ancona",
"Piero",
""
],
[
"Fiorletta",
"Diego",
""
]
] |
2504.13747 | Christophe Parisel | Christophe Parisel | Scoring Azure permissions with metric spaces | null | null | null | null | cs.CR | http://creativecommons.org/licenses/by/4.0/ | In this work, we introduce two complementary metrics for quantifying and
scoring privilege risk in Microsoft Azure. In the Control Plane, we define the
WAR distance, a superincreasing distance over Write, Action, and Read control
permissions, which yields a total ordering of principals by their configuration
power.
In the Data Plane, we present a blast radius distance for measuring the
maximum breadth of data exfiltration and forgery, leveraging the natural
ultrametry of Azure Tenants clustering hierarchy
Together, these metrics offer a unified framework for proactive IAM analysis,
ranking, lifecycle monitoring, and least privilege enforcement.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 15:29:51 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Parisel",
"Christophe",
""
]
] |
2504.13748 | Hongjia Chen | Hongjia Chen, Xin Xu, Fangling Pu | DAM-Net: Domain Adaptation Network with Micro-Labeled Fine-Tuning for
Change Detection | 13 pages, 6 figures | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Change detection (CD) in remote sensing imagery plays a crucial role in
various applications such as urban planning, damage assessment, and resource
management. While deep learning approaches have significantly advanced CD
performance, current methods suffer from poor domain adaptability, requiring
extensive labeled data for retraining when applied to new scenarios. This
limitation severely restricts their practical applications across different
datasets. In this work, we propose DAM-Net: a Domain Adaptation Network with
Micro-Labeled Fine-Tuning for CD. Our network introduces adversarial domain
adaptation to CD for, utilizing a specially designed segmentation-discriminator
and alternating training strategy to enable effective transfer between domains.
Additionally, we propose a novel Micro-Labeled Fine-Tuning approach that
strategically selects and labels a minimal amount of samples (less than 1%) to
enhance domain adaptation. The network incorporates a Multi-Temporal
Transformer for feature fusion and optimized backbone structure based on
previous research. Experiments conducted on the LEVIR-CD and WHU-CD datasets
demonstrate that DAM-Net significantly outperforms existing domain adaptation
methods, achieving comparable performance to semi-supervised approaches that
require 10% labeled data while using only 0.3% labeled samples. Our approach
significantly advances cross-dataset CD applications and provides a new
paradigm for efficient domain adaptation in remote sensing. The source code of
DAM-Net will be made publicly available upon publication.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 15:29:57 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Chen",
"Hongjia",
""
],
[
"Xu",
"Xin",
""
],
[
"Pu",
"Fangling",
""
]
] |
2504.13749 | Alessandro Lunghi | Lion Frangoulis, Zahra Khatibi, Lorenzo A. Mariano and Alessandro
Lunghi | Generating new coordination compounds via multireference simulations,
genetic algorithms and machine learning: the case of Co(II) molecular magnets | null | null | null | null | cond-mat.mtrl-sci cs.NE physics.chem-ph physics.comp-ph | http://creativecommons.org/licenses/by/4.0/ | The design of coordination compounds with target properties often requires
years of continuous feedback loop between theory, simulations and experiments.
In the case of magnetic molecules, this conventional strategy has indeed led to
the breakthrough of single-molecule magnets with working temperatures above
nitrogen's boiling point, but at significant costs in terms of resources and
time. Here, we propose a computational strategy able to accelerate the
discovery of new coordination compounds with desired electronic and magnetic
properties. Our approach is based on a combination of high-throughput
multireference ab initio methods, genetic algorithms and machine learning.
While genetic algorithms allow for an intelligent sampling of the vast chemical
space available, machine learning reduces the computational cost by
pre-screening molecular properties in advance of their accurate and automated
multireference ab initio characterization. Importantly, the presented framework
is able to generate novel organic ligands and explore chemical motifs beyond
those available in pre-existing structural databases. We showcase the power of
this approach by automatically generating new Co(II) mononuclear coordination
compounds with record magnetic properties in a fraction of the time required by
either experiments or brute-force ab initio approaches
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 15:33:48 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Frangoulis",
"Lion",
""
],
[
"Khatibi",
"Zahra",
""
],
[
"Mariano",
"Lorenzo A.",
""
],
[
"Lunghi",
"Alessandro",
""
]
] |
2504.13750 | Haocheng Wen | Haocheng Wen, Faxuan Luo, Sheng Xu, Bing Wang | JANC: A cost-effective, differentiable compressible reacting flow solver
featured with JAX-based adaptive mesh refinement | null | null | null | null | physics.flu-dyn | http://creativecommons.org/licenses/by/4.0/ | The compressible reacting flow numerical solver is an essential tool in the
study of combustion, energy disciplines, as well as in the design of industrial
power and propulsion devices. We have established the first JAX-based
block-structured adaptive mesh refinement (AMR) framework, called JAX-AMR, and
then developed a fully-differentiable solver for compressible reacting flows,
named JANC. JANC is implemented in Python and features automatic
differentiation capabilities, enabling an efficient integration of the solver
with machine learning. Furthermore, benefited by multiple acceleration features
such as XLA-powered JIT compilation, GPU/TPU computing, parallel computing, and
AMR, the computational efficiency of JANC has been significantly improved. In a
comparative test of a two-dimensional detonation tube case, the computational
cost of the JANC core solver, running on a single A100 GPU, was reduced to 1%
of that of OpenFOAM, which was parallelized across 384 CPU cores. When the AMR
method is enabled for both solvers, JANC's computational cost can be reduced to
1-2% of that of OpenFOAM. The core solver of JANC has also been tested for
parallel computation on a 4-card A100 setup, demonstrating its convenient and
efficient parallel computing capability. JANC also shows strong compatibility
with machine learning by combining adjoint optimization to make the whole
dynamic trajectory efficiently differentiable. JANC provides a new generation
of high-performance, cost-effective, and high-precision solver framework for
large-scale numerical simulations of compressible reacting flows and related
machine learning research. Now, the source codes have been available under the
MIT license at https://github.com/JA4S/JAX-AMR and
https://github.com/JA4S/JANC.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 15:34:42 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Wen",
"Haocheng",
""
],
[
"Luo",
"Faxuan",
""
],
[
"Xu",
"Sheng",
""
],
[
"Wang",
"Bing",
""
]
] |
2504.13751 | Mahdi Jaberzadeh Ansari | Mahdi Jaberzadeh Ansari, Ann Barcomb | A Survey for What Developers Require in AI-powered Tools that Aid in
Component Selection in CBSD | 10 pages, 4 figures, The 29th International Conference on Evaluation
and Assessment in Software Engineering, 17 to 20 June, 2025, Istanbul, Turkey | The 29th International Conference on Evaluation and Assessment in
Software Engineering 17 to 20 June 2025 Istanbul Turkey | null | null | cs.SE cs.AI cs.CY | http://creativecommons.org/licenses/by/4.0/ | Although it has been more than four decades that the first components-based
software development (CBSD) studies were conducted, there is still no standard
method or tool for component selection which is widely accepted by the
industry. The gulf between industry and academia contributes to the lack of an
accepted tool. We conducted a mixed methods survey of nearly 100 people engaged
in component-based software engineering practice or research to better
understand the problems facing industry, how these needs could be addressed,
and current best practices employed in component selection. We also sought to
identify and prioritize quality criteria for component selection from an
industry perspective. In response to the call for CBSD component selection
tools to incorporate recent technical advances, we also explored the
perceptions of professionals about AI-driven tools, present and envisioned.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 15:35:31 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Ansari",
"Mahdi Jaberzadeh",
""
],
[
"Barcomb",
"Ann",
""
]
] |
2504.13752 | Benjamin Cohen-Wang | Benjamin Cohen-Wang, Yung-Sung Chuang, Aleksander Madry | Learning to Attribute with Attention | null | null | null | null | cs.LG cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given a sequence of tokens generated by a language model, we may want to
identify the preceding tokens that influence the model to generate this
sequence. Performing such token attribution is expensive; a common approach is
to ablate preceding tokens and directly measure their effects. To reduce the
cost of token attribution, we revisit attention weights as a heuristic for how
a language model uses previous tokens. Naive approaches to attribute model
behavior with attention (e.g., averaging attention weights across attention
heads to estimate a token's influence) have been found to be unreliable. To
attain faithful attributions, we propose treating the attention weights of
different attention heads as features. This way, we can learn how to
effectively leverage attention weights for attribution (using signal from
ablations). Our resulting method, Attribution with Attention (AT2), reliably
performs on par with approaches that involve many ablations, while being
significantly more efficient. To showcase the utility of AT2, we use it to
prune less important parts of a provided context in a question answering
setting, improving answer quality. We provide code for AT2 at
https://github.com/MadryLab/AT2 .
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 15:36:28 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Cohen-Wang",
"Benjamin",
""
],
[
"Chuang",
"Yung-Sung",
""
],
[
"Madry",
"Aleksander",
""
]
] |
2504.13753 | Tung Le | Alexey Chernov, Tung Le | Gevrey class regularity for steady-state incompressible Navier-Stokes
equations in parametric domains and related models | 43 pages, 4 figues | null | null | null | math.NA cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We investigate parameteric Navier-Stokes equations for a viscous,
incompressible flow in bounded domains. The coefficients of the equations are
perturbed by high-dimensional random parameters, this fits in particular for
modelling flows in domains with uncertain perturbations. Our focus is on
deriving bounds for arbitrary high-order derivatives of the pressure and the
velocity fields with respect to the random parameters in the context of
incompressible Navier-Stokes equation under a small-data assumption. To achieve
this, we analyze mixed and saddle-point problems and employ the
alternative-to-factorial technique to establish generalized Gevrey-class
regularity for the solution pair. Thereby the analytic regularity follows as a
special case. In the numerical experiments, we validate and illustrate our
theoretical findings using Gauss-Legendre quadrature and Quasi-Monte Carlo
methods.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 15:36:34 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Chernov",
"Alexey",
""
],
[
"Le",
"Tung",
""
]
] |
2504.13754 | Yifei Chen | Zhu Zhu, Shuo Jiang, Jingyuan Zheng, Yawen Li, Yifei Chen, Manli Zhao,
Weizhong Gu, Feiwei Qin, Jinhu Wang, Gang Yu | Towards Accurate and Interpretable Neuroblastoma Diagnosis via
Contrastive Multi-scale Pathological Image Analysis | 14pages, 8 figures | null | null | null | cs.CV cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Neuroblastoma, adrenal-derived, is among the most common pediatric solid
malignancies, characterized by significant clinical heterogeneity. Timely and
accurate pathological diagnosis from hematoxylin and eosin-stained whole slide
images is critical for patient prognosis. However, current diagnostic practices
primarily rely on subjective manual examination by pathologists, leading to
inconsistent accuracy. Existing automated whole slide image classification
methods encounter challenges such as poor interpretability, limited feature
extraction capabilities, and high computational costs, restricting their
practical clinical deployment. To overcome these limitations, we propose
CMSwinKAN, a contrastive-learning-based multi-scale feature fusion model
tailored for pathological image classification, which enhances the Swin
Transformer architecture by integrating a Kernel Activation Network within its
multilayer perceptron and classification head modules, significantly improving
both interpretability and accuracy. By fusing multi-scale features and
leveraging contrastive learning strategies, CMSwinKAN mimics clinicians'
comprehensive approach, effectively capturing global and local tissue
characteristics. Additionally, we introduce a heuristic soft voting mechanism
guided by clinical insights to seamlessly bridge patch-level predictions to
whole slide image-level classifications. We validate CMSwinKAN on the PpNTs
dataset, which was collaboratively established with our partner hospital and
the publicly accessible BreakHis dataset. Results demonstrate that CMSwinKAN
performs better than existing state-of-the-art pathology-specific models
pre-trained on large datasets. Our source code is available at
https://github.com/JSLiam94/CMSwinKAN.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 15:39:46 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Zhu",
"Zhu",
""
],
[
"Jiang",
"Shuo",
""
],
[
"Zheng",
"Jingyuan",
""
],
[
"Li",
"Yawen",
""
],
[
"Chen",
"Yifei",
""
],
[
"Zhao",
"Manli",
""
],
[
"Gu",
"Weizhong",
""
],
[
"Qin",
"Feiwei",
""
],
[
"Wang",
"Jinhu",
""
],
[
"Yu",
"Gang",
""
]
] |
2504.13755 | Amin Noroozi | Amin Noroozi, Sidratul Muntaha Esha, Mansoureh Ghari | Predictors of Childhood Vaccination Uptake in England: An Explainable
Machine Learning Analysis of Longitudinal Regional Data (2021-2024) | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Childhood vaccination is a cornerstone of public health, yet disparities in
vaccination coverage persist across England. These disparities are shaped by
complex interactions among various factors, including geographic, demographic,
socioeconomic, and cultural (GDSC) factors. Previous studies mostly rely on
cross-sectional data and traditional statistical approaches that assess
individual or limited sets of variables in isolation. Such methods may fall
short in capturing the dynamic and multivariate nature of vaccine uptake. In
this paper, we conducted a longitudinal machine learning analysis of childhood
vaccination coverage across 150 districts in England from 2021 to 2024. Using
vaccination data from NHS records, we applied hierarchical clustering to group
districts by vaccination coverage into low- and high-coverage clusters. A
CatBoost classifier was then trained to predict districts' vaccination clusters
using their GDSC data. Finally, the SHapley Additive exPlanations (SHAP) method
was used to interpret the predictors' importance. The classifier achieved high
accuracies of 92.1, 90.6, and 86.3 in predicting districts' vaccination
clusters for the years 2021-2022, 2022-2023, and 2023-2024, respectively. SHAP
revealed that geographic, cultural, and demographic variables, particularly
rurality, English language proficiency, the percentage of foreign-born
residents, and ethnic composition, were the most influential predictors of
vaccination coverage, whereas socioeconomic variables, such as deprivation and
employment, consistently showed lower importance, especially in 2023-2024.
Surprisingly, rural districts were significantly more likely to have higher
vaccination rates. Additionally, districts with lower vaccination coverage had
higher populations whose first language was not English, who were born outside
the UK, or who were from ethnic minority groups.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 15:41:26 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Noroozi",
"Amin",
""
],
[
"Esha",
"Sidratul Muntaha",
""
],
[
"Ghari",
"Mansoureh",
""
]
] |
2504.13756 | Dmitrii Kharlapenko | Dmitrii Kharlapenko, Stepan Shabalin, Fazl Barez, Arthur Conmy, Neel
Nanda | Scaling sparse feature circuit finding for in-context learning | null | null | null | null | cs.LG cs.AI cs.CL | http://creativecommons.org/licenses/by/4.0/ | Sparse autoencoders (SAEs) are a popular tool for interpreting large language
model activations, but their utility in addressing open questions in
interpretability remains unclear. In this work, we demonstrate their
effectiveness by using SAEs to deepen our understanding of the mechanism behind
in-context learning (ICL). We identify abstract SAE features that (i) encode
the model's knowledge of which task to execute and (ii) whose latent vectors
causally induce the task zero-shot. This aligns with prior work showing that
ICL is mediated by task vectors. We further demonstrate that these task vectors
are well approximated by a sparse sum of SAE latents, including these
task-execution features. To explore the ICL mechanism, we adapt the sparse
feature circuits methodology of Marks et al. (2024) to work for the much larger
Gemma-1 2B model, with 30 times as many parameters, and to the more complex
task of ICL. Through circuit finding, we discover task-detecting features with
corresponding SAE latents that activate earlier in the prompt, that detect when
tasks have been performed. They are causally linked with task-execution
features through the attention and MLP sublayers.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 15:45:30 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Kharlapenko",
"Dmitrii",
""
],
[
"Shabalin",
"Stepan",
""
],
[
"Barez",
"Fazl",
""
],
[
"Conmy",
"Arthur",
""
],
[
"Nanda",
"Neel",
""
]
] |
2504.13758 | Tsung-Sheng Huang | Tsung-Sheng Huang, Andrey Grankin, Yu-Xin Wang, Mohammad Hafezi | Optical engineering and detection of magnetism in moir\'e semiconductors | null | null | null | null | cond-mat.str-el cond-mat.mes-hall cond-mat.mtrl-sci quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a general framework for optically inducing, controlling, and
probing spin states in moir\'e systems. In particular, we demonstrate that
applying Raman optical drives to moir\'e transition metal dichalcogenide
bilayers can realize a class of spin models, with magnetic interactions tunable
via the optical parameters. The resulting interaction anisotropy, controlled by
the polarizations of the drives, enables access to magnetic states that are
inaccessible in undriven moir\'e bilayers. Furthermore, we establish direct
connections between the resulting spin correlations and experimentally
observable optical signals. Our work paves the way for future studies on the
optical control and detection on strongly correlated quantum systems.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 15:49:06 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Huang",
"Tsung-Sheng",
""
],
[
"Grankin",
"Andrey",
""
],
[
"Wang",
"Yu-Xin",
""
],
[
"Hafezi",
"Mohammad",
""
]
] |
2504.13759 | Marco Micheletto | Davide Ghiani, Jefferson David Rodriguez Chivata, Stefano Lilliu,
Simone Maurizio La Cava, Marco Micheletto, Giulia Orr\`u, Federico Lama, Gian
Luca Marcialis | Fragile Watermarking for Image Certification Using Deep Steganographic
Embedding | null | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Modern identity verification systems increasingly rely on facial images
embedded in biometric documents such as electronic passports. To ensure global
interoperability and security, these images must comply with strict standards
defined by the International Civil Aviation Organization (ICAO), which specify
acquisition, quality, and format requirements. However, once issued, these
images may undergo unintentional degradations (e.g., compression, resizing) or
malicious manipulations (e.g., morphing) and deceive facial recognition
systems. In this study, we explore fragile watermarking, based on deep
steganographic embedding as a proactive mechanism to certify the authenticity
of ICAO-compliant facial images. By embedding a hidden image within the
official photo at the time of issuance, we establish an integrity marker that
becomes sensitive to any post-issuance modification. We assess how a range of
image manipulations affects the recovered hidden image and show that
degradation artifacts can serve as robust forensic cues. Furthermore, we
propose a classification framework that analyzes the revealed content to detect
and categorize the type of manipulation applied. Our experiments demonstrate
high detection accuracy, including cross-method scenarios with multiple deep
steganography-based models. These findings support the viability of fragile
watermarking via steganographic embedding as a valuable tool for biometric
document integrity verification.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 15:51:56 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Ghiani",
"Davide",
""
],
[
"Chivata",
"Jefferson David Rodriguez",
""
],
[
"Lilliu",
"Stefano",
""
],
[
"La Cava",
"Simone Maurizio",
""
],
[
"Micheletto",
"Marco",
""
],
[
"Orrù",
"Giulia",
""
],
[
"Lama",
"Federico",
""
],
[
"Marcialis",
"Gian Luca",
""
]
] |
2504.13760 | Georgios Polykratis | Constantia Alexandrou, Andreas Athenodorou, Kostas Blekos, Georgios
Polykratis, Stefan K\"uhn | Realizing string breaking dynamics in a $Z_2$ lattice gauge theory on
quantum hardware | 17 pages, 19 figures | null | null | null | hep-lat quant-ph | http://creativecommons.org/licenses/by/4.0/ | We investigate static and dynamical aspects of string breaking in a $Z_2$
lattice gauge theory coupled to Kogut-Susskind staggered fermions. Using Tensor
Network simulations, we demonstrate that the static potential as well as the
site-resolved configuration of the matter sites and gauge links allows us to
identify the regimes in which string breaking occurs. Furthermore, we develop a
variational quantum eigensolver that allows for reliably preparing the ground
state of the theory in both the absence and presence of static charges and to
capture the static aspects of the phenomenon. Carrying out state preparation on
real quantum hardware for up to 19 qubits, we demonstrate its suitability for
current quantum devices. In addition, we study the real-time dynamics of a flux
tube between two static charges using both Tensor Networks and quantum
hardware. Using a trotterization for the time-evolution operator, we are able
to show that the breaking process starts with the creation of charges inside
the string. These eventually redistribute towards the static charges and screen
them, which leads to the breaking of the flux tube.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 15:52:31 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Alexandrou",
"Constantia",
""
],
[
"Athenodorou",
"Andreas",
""
],
[
"Blekos",
"Kostas",
""
],
[
"Polykratis",
"Georgios",
""
],
[
"Kühn",
"Stefan",
""
]
] |
2504.13761 | Taras Radul | Taras Radul | On monotonicity of comonotonically maxitive functional | null | null | null | null | math.GN math.FA | http://creativecommons.org/licenses/by-nc-nd/4.0/ | The comonotonic maxitivity property of functionals frequently appears in the
characterization of fuzzy integrals based on the maximum operation. In some
special cases, comonotonic maxitivity implies monotonicity of functionals. The
question of whether this implication holds in general was posed by T. Radul
(2023). It was shown in that paper that the implication is valid for finite
compacta. In this article, we provide a negative answer to the general problem
and discuss additional properties that need to be imposed to ensure the
implication holds.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 15:59:25 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Radul",
"Taras",
""
]
] |
2504.13762 | Wissal Benzine | Wissal Benzine, Ali Bemani, Nassar Ksairi and Dirk Slock | Models, Methods and Waveforms for Estimation and Prediction of Doubly
Sparse Time-Varying Channels | submitted to IEEE Transactions on Wireless Communications | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper investigates channel estimation for linear time-varying (LTV)
wireless channels under double sparsity, i.e., sparsity in both the delay and
Doppler domains. An on-grid approximation is first considered, enabling
rigorous hierarchical-sparsity modeling and compressed sensing-based channel
estimation. Guaranteed recovery conditions are provided for affine frequency
division multiplexing (AFDM), orthogonal frequency division multiplexing (OFDM)
and single-carrier modulation (SCM), highlighting the superiority of AFDM in
terms of doubly sparse channel estimation. To address arbitrary Doppler shifts,
a relaxed version of the on-grid model is introduced by making use of multiple
elementary Expansion Models (BEM) each based on Discrete Prolate Spheroidal
Sequences (DPSS). Next, theoretical guarantees are provided for the precision
of this off-grid model before further extending it to tackle channel prediction
by exploiting the inherent DPSS extrapolation capability. Finally, numerical
results are provided to both validate the proposed off-grid model for channel
estimation and prediction purposes under the double sparsity assumption and to
compare the corresponding mean squared error (MSE) and the overhead performance
when the different wireless waveforms are used.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 15:59:58 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Benzine",
"Wissal",
""
],
[
"Bemani",
"Ali",
""
],
[
"Ksairi",
"Nassar",
""
],
[
"Slock",
"Dirk",
""
]
] |
2504.13764 | Rana Parshad | Ranjit Kumar Upadhyay, Rana D. Parshad, Namrata Mani Tripathi, Nishith
Mohan | An eco-epidemiological model with prey-taxis and slow diffusion: Global
existence, boundedness and novel dynamics | null | null | null | null | math.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this manuscript, an attempt has been made to understand the effects of
prey-taxis on the existence of global-in-time solutions and dynamics in an
eco-epidemiological model, particularly under the influence of slow dispersal
characterized by the $p$-Laplacian operator and enhanced mortality of the
infected prey, subject to specific assumptions on the taxis sensitivity
functions. We prove the global existence of classical solutions when the
infected prey undergoes random motion and exhibits standard mortality. Under
the assumption that the infected prey disperses slowly and exhibits enhanced
mortality, we prove the global existence of weak solutions. Following a
detailed mathematical investigation of the proposed model, we shift our focus
to analyse the stability of the positive equilibrium point under the scenario
where all species exhibit linear diffusion, the infected prey experiences
standard mortality, and the predator exhibits taxis exclusively toward the
infected prey. Within this framework, we establish the occurrence of a
steady-state bifurcation. Numerical simulations are then carried out to observe
this dynamical behavior. Our results have large scale applications to
biological invasions and biological control of pests, under the prevalence of
disease in the pest population.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 16:01:07 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Upadhyay",
"Ranjit Kumar",
""
],
[
"Parshad",
"Rana D.",
""
],
[
"Tripathi",
"Namrata Mani",
""
],
[
"Mohan",
"Nishith",
""
]
] |
2504.13765 | Peyman Jahanbin | Peyman Jahanbin | Modeling L1 Influence on L2 Pronunciation: An MFCC-Based Framework for
Explainable Machine Learning and Pedagogical Feedback | 27 pages (including references), 4 figures, 1 table. Combines
statistical inference and explainable machine learning to model L1 influence
in L2 pronunciation using MFCC features. Methodology and code are openly
available via Zenodo and OSF: Zenodo: https://doi.org/10.5281/zenodo.15186197
OSF: https://doi.org/10.17605/OSF.IO/4UXGM | null | null | null | eess.AS cs.SD | http://creativecommons.org/licenses/by/4.0/ | This study investigates the extent to which Mel-Frequency Cepstral
Coefficients (MFCCs) capture first language (L1) transfer in extended second
language (L2) English speech. Speech samples from Mandarin and American English
L1 speakers were extracted from the GMU Speech Accent Archive, converted to WAV
format, and processed to obtain thirteen MFCCs per speaker. A multi-method
analytic framework combining inferential statistics (t-tests, MANOVA, Canonical
Discriminant Analysis) and machine learning (Random Forest classification)
identified MFCC-1 (broadband energy), MFCC-2 (first formant region), and MFCC-5
(voicing and fricative energy) as the most discriminative features for
distinguishing L1 backgrounds. A reduced-feature model using these MFCCs
significantly outperformed the full-feature model, as confirmed by McNemar's
test and non-overlapping confidence intervals. The findings empirically support
the Perceptual Assimilation Model for L2 (PAM-L2) and the Speech Learning Model
(SLM), demonstrating that L1-conditioned variation in L2 speech is both
perceptually grounded and acoustically quantifiable. Methodologically, the
study contributes to applied linguistics and explainable AI by proposing a
transparent, data-efficient pipeline for L2 pronunciation modeling. The results
also offer pedagogical implications for ESL/EFL instruction by highlighting
L1-specific features that can inform intelligibility-oriented instruction,
curriculum design, and speech assessment tools.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 16:04:22 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Jahanbin",
"Peyman",
""
]
] |
2504.13766 | Wenyu Xin | Wenyu Xin, Chun-Ming Yip, Ken'ichi Nomoto, Xianfei Zhang and Shaolan
Bi | The impact of new ($\alpha$, n) reaction rates on the weak s-process in
metal-poor massive stars | 16 pages, 15 figures | null | null | null | astro-ph.SR nucl-ex nucl-th | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Massive stars are significant sites for the weak s-process (ws-process).
$^{22}$Ne and $^{16}$O are, respectively, the main neutron source and poison
for the ws-process. In the metal-poor stars, the abundance of $^{22}$Ne is
limited by the metallicity, so that the contribution of $^{22}$Ne($\alpha$,
n)$^{25}$Mg reaction on the s-process is small. Conversely, the
$^{17}$O($\alpha$, n)$^{20}$Ne reaction is more evident in more metal-poor
stars due to the most abundant $^{16}$O in all metallicities. In this work, we
calculate the evolution of four metal-poor models ($Z=10^{-3}$) for the
Zero-Age Main-Sequence (ZAMS) masses of $M ({\rm ZAMS})=$ 15, 20, 25, and 30
M$_{\odot}$ to investigate the effect of reaction rates on the ws-process. We
adopt the new $^{17}$O($\alpha$, n)$^{20}$Ne and $^{17}$O($\alpha,
\gamma$)$^{21}$Ne reaction rates suggested by Wiescher et al. (2023) and
$^{22}$Ne($\alpha$, n)$^{25}$Mg and $^{22}$Ne($\alpha, \gamma$)$^{26}$Mg from
Best et al. (2013). The yields of the s-process isotope with updated reaction
rates are compared with the results using default reaction rates from JINA
REACLIB. We find that the effects of new $^{17}$O+$\alpha$ are much more
significant than those of new $^{22}$Ne+$\alpha$ reaction rates in the
non-rotation stars.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 16:04:50 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Xin",
"Wenyu",
""
],
[
"Yip",
"Chun-Ming",
""
],
[
"Nomoto",
"Ken'ichi",
""
],
[
"Zhang",
"Xianfei",
""
],
[
"Bi",
"Shaolan",
""
]
] |
2504.13767 | Nikos Fotiou | Nikos Fotiou, Vasilios A. Siris, George C. Polyzos | Access control for Data Spaces | in Proc. of 28th Conference on Innovation in Clouds, Internet and
Networks (ICIN 2025), Paris, France, 2025 | null | 10.1109/ICIN64016.2025.10943024 | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Data spaces represent an emerging paradigm that facilitates secure and
trusted data exchange through foundational elements of data interoperability,
sovereignty, and trust. Within a data space, data items, potentially owned by
different entities, can be interconnected. Concurrently, data consumers can
execute advanced data lookup operations and subscribe to data-driven events.
Achieving fine-grained access control without compromising functionality
presents a significant challenge. In this paper, we design and implement an
access control mechanism that ensures continuous evaluation of access control
policies, is data semantics aware, and supports subscriptions to data events.
We present a construction where access control policies are stored in a
centralized location, which we extend to allow data owners to maintain their
own Policy Administration Points. This extension builds upon W3C Verifiable
Credentials.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 16:09:53 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Fotiou",
"Nikos",
""
],
[
"Siris",
"Vasilios A.",
""
],
[
"Polyzos",
"George C.",
""
]
] |
2504.13769 | Phuong Nguyen | Motunrayo Ibiyo and Thinakone Louangdy and Phuong T. Nguyen and
Claudio Di Sipio and Davide Di Ruscio | Detecting Malicious Source Code in PyPI Packages with LLMs: Does RAG
Come in Handy? | The paper has been peer-reviewed and accepted for publication to the
29th International Conference on Evaluation and Assessment in Software
Engineering (EASE 2025) | null | null | null | cs.SE | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Malicious software packages in open-source ecosystems, such as PyPI, pose
growing security risks. Unlike traditional vulnerabilities, these packages are
intentionally designed to deceive users, making detection challenging due to
evolving attack methods and the lack of structured datasets. In this work, we
empirically evaluate the effectiveness of Large Language Models (LLMs),
Retrieval-Augmented Generation (RAG), and few-shot learning for detecting
malicious source code. We fine-tune LLMs on curated datasets and integrate YARA
rules, GitHub Security Advisories, and malicious code snippets with the aim of
enhancing classification accuracy. We came across a counterintuitive outcome:
While RAG is expected to boost up the prediction performance, it fails in the
performed evaluation, obtaining a mediocre accuracy. In contrast, few-shot
learning is more effective as it significantly improves the detection of
malicious code, achieving 97% accuracy and 95% balanced accuracy, outperforming
traditional RAG approaches. Thus, future work should expand structured
knowledge bases, refine retrieval models, and explore hybrid AI-driven
cybersecurity solutions.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 16:11:59 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Ibiyo",
"Motunrayo",
""
],
[
"Louangdy",
"Thinakone",
""
],
[
"Nguyen",
"Phuong T.",
""
],
[
"Di Sipio",
"Claudio",
""
],
[
"Di Ruscio",
"Davide",
""
]
] |
2504.13770 | Zhibin Liang | Zhi-Bin Liang, Shan-Zhong Li, Runze Li, and Zhi Li | Emergent chiral toplogical point gaps in a non-Hermitian quasiperiodic
Su-Schrieffer-Heeger model | null | null | null | null | cond-mat.dis-nn | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study a quasiperiodic Su-Schrieffer-Heeger lattice with staggered on-site
gain-loss. The results reveal that on-site staggered gain-loss can effectively
induce non-Hermitian topological gap without introducing imaginary phase.
Further analysis exhibits that five different processes of topological phase
transitions, including topological re-entrant phenomena, with the gain-loss
intensity increasing. In addition, through the analysis of inverse
participation ratios, normalized participation ratios, winding number and other
indicators, we find that topological phase transitions occur synchronically
with localized phase transitions. Finally, by investigating the properties of
dual space eigenfunction, we reveal that the non-Hermitian topological point
gaps predicted in this paper are chiral point gaps, which have a pair of skin
modes along opposite directions simultaneously.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 16:13:02 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Liang",
"Zhi-Bin",
""
],
[
"Li",
"Shan-Zhong",
""
],
[
"Li",
"Runze",
""
],
[
"Li",
"Zhi",
""
]
] |
2504.13771 | Xuan Wang | BESIII Collaboration: M. Ablikim, M. N. Achasov, P. Adlarson, X. C.
Ai, R. Aliberti, A. Amoroso, Q. An, Y. Bai, O. Bakina, Y. Ban, H.-R. Bao, V.
Batozskaya, K. Begzsuren, N. Berger, M. Berlowski, M. Bertani, D. Bettoni, F.
Bianchi, E. Bianco, A. Bortone, I. Boyko, R. A. Briere, A. Brueggemann, H.
Cai, M. H. Cai, X. Cai, A. Calcaterra, G. F. Cao, N. Cao, S. A. Cetin, X. Y.
Chai, J. F. Chang, G. R. Che, Y. Z. Che, G. Chelkov, C. Chen, C. H. Chen,
Chao Chen, G. Chen, H. S. Chen, H. Y. Chen, M. L. Chen, S. J. Chen, S. L.
Chen, S. M. Chen, T. Chen, X. R. Chen, X. T. Chen, Y. B. Chen, Y. Q. Chen, Z.
J. Chen, Z. K. Chen, S. K. Choi, X. Chu, G. Cibinetto, F. Cossio, J. J. Cui,
H. L. Dai, J. P. Dai, A. Dbeyssi, R. E. de Boer, D. Dedovich, C. Q. Deng, Z.
Y. Deng, A. Denig, I. Denysenko, M. Destefanis, F. De Mori, B. Ding, X. X.
Ding, Y. Ding, Y. Ding, Y. X. Ding, J. Dong, L. Y. Dong, M. Y. Dong, X. Dong,
M. C. Du, S. X. Du, Y. Y. Duan, Z. H. Duan, P. Egorov, G. F. Fan, J. J. Fan,
Y. H. Fan, J. Fang, J. Fang, S. S. Fang, W. X. Fang, Y. Q. Fang, R.
Farinelli, L. Fava, F. Feldbauer, G. Felici, C. Q. Feng, J. H. Feng, Y. T.
Feng, M. Fritsch, C. D. Fu, J. L. Fu, Y. W. Fu, H. Gao, X. B. Gao, Y. N. Gao,
Y. N. Gao, Y. Y. Gao, Yang Gao, S. Garbolino, I. Garzia, P. T. Ge, Z. W. Ge,
C. Geng, E. M. Gersabeck, A. Gilman, K. Goetzen, J. D. Gong, L. Gong, W. X.
Gong, W. Gradl, S. Gramigna, M. Greco, M. H. Gu, Y. T. Gu, C. Y. Guan, A. Q.
Guo, L. B. Guo, M. J. Guo, R. P. Guo, Y. P. Guo, A. Guskov, J. Gutierrez, K.
L. Han, T. T. Han, F. Hanisch, K. D. Hao, X. Q. Hao, F. A. Harris, K. K. He,
K. L. He, F. H. Heinsius, C. H. Heinz, Y. K. Heng, C. Herold, T. Holtmann, P.
C. Hong, G. Y. Hou, X. T. Hou, Y. R. Hou, Z. L. Hou, B. Y. Hu, H. M. Hu, J.
F. Hu, Q. P. Hu, S. L. Hu, T. Hu, Y. Hu, Z. M. Hu, G. S. Huang, K. X. Huang,
L. Q. Huang, P. Huang, X. T. Huang, Y. P. Huang, Y. S. Huang, T. Hussain, N.
H\"usken, N. in der Wiesche, J. Jackson, S. Janchiv, Q. Ji, Q. P. Ji, W. Ji,
X. B. Ji, X. L. Ji, Y. Y. Ji, Z. K. Jia, D. Jiang, H. B. Jiang, P. C. Jiang,
S. J. Jiang, T. J. Jiang, X. S. Jiang, Y. Jiang, J. B. Jiao, J. K. Jiao, Z.
Jiao, S. Jin, Y. Jin, M. Q. Jing, X. M. Jing, T. Johansson, S. Kabana, N.
Kalantar-Nayestanaki, X. L. Kang, X. S. Kang, M. Kavatsyuk, B. C. Ke, V.
Khachatryan, A. Khoukaz, R. Kiuchi, O. B. Kolcu, B. Kopf, M. Kuessner, X.
Kui, N. Kumar, A. Kupsc, W. K\"uhn, Q. Lan, W. N. Lan, T. T. Lei, M.
Lellmann, T. Lenz, C. Li, C. Li, C. H. Li, C. K. Li, Cheng Li, D. M. Li, F.
Li, G. Li, H. B. Li, H. J. Li, H. N. Li, Hui Li, J. R. Li, J. S. Li, K. Li,
K. L. Li, K. L. Li, L. J. Li, Lei Li, M. H. Li, M. R. Li, P. L. Li, P. R. Li,
Q. M. Li, Q. X. Li, R. Li, T. Li, T. Y. Li, W. D. Li, W. G. Li, X. Li, X. H.
Li, X. L. Li, X. Y. Li, X. Z. Li, Y. Li, Y. G. Li, Y. P. Li, Z. J. Li, Z. Y.
Li, C. Liang, H. Liang, Y. F. Liang, Y. T. Liang, G. R. Liao, L. B. Liao, M.
H. Liao, Y. P. Liao, J. Libby, A. Limphirat, C. C. Lin, C. X. Lin, D. X. Lin,
L. Q. Lin, T. Lin, B. J. Liu, B. X. Liu, C. Liu, C. X. Liu, F. Liu, F. H.
Liu, Feng Liu, G. M. Liu, H. Liu, H. B. Liu, H. H. Liu, H. M. Liu, Huihui
Liu, J. B. Liu, J. J. Liu, K. Liu, K. Liu, K. Y. Liu, Ke Liu, L. Liu, L. C.
Liu, Lu Liu, P. L. Liu, Q. Liu, S. B. Liu, T. Liu, W. K. Liu, W. M. Liu, W.
T. Liu, X. Liu, X. Liu, X. Y. Liu, Y. Liu, Y. Liu, Y. Liu, Y. B. Liu, Z. A.
Liu, Z. D. Liu, Z. Q. Liu, X. C. Lou, F. X. Lu, H. J. Lu, J. G. Lu, Y. Lu, Y.
H. Lu, Y. P. Lu, Z. H. Lu, C. L. Luo, J. R. Luo, J. S. Luo, M. X. Luo, T.
Luo, X. L. Luo, Z. Y. Lv, X. R. Lyu, Y. F. Lyu, Y. H. Lyu, F. C. Ma, H. Ma,
H. L. Ma, J. L. Ma, L. L. Ma, L. R. Ma, Q. M. Ma, R. Q. Ma, R. Y. Ma, T. Ma,
X. T. Ma, X. Y. Ma, Y. M. Ma, F. E. Maas, I. MacKay, M. Maggiora, S. Malde,
Y. J. Mao, Z. P. Mao, S. Marcello, F. M. Melendi, Y. H. Meng, Z. X. Meng, J.
G. Messchendorp, G. Mezzadri, H. Miao, T. J. Min, R. E. Mitchell, X. H. Mo,
B. Moses, N. Yu. Muchnoi, J. Muskalla, Y. Nefedov, F. Nerling, L. S. Nie, I.
B. Nikolaev, Z. Ning, S. Nisar, Q. L. Niu, W. D. Niu, S. L. Olsen, Q. Ouyang,
S. Pacetti, X. Pan, Y. Pan, A. Pathak, Y. P. Pei, M. Pelizaeus, H. P. Peng,
Y. Y. Peng, K. Peters, J. L. Ping, R. G. Ping, S. Plura, V. Prasad, F. Z. Qi,
H. R. Qi, M. Qi, S. Qian, W. B. Qian, C. F. Qiao, J. H. Qiao, J. J. Qin, J.
L. Qin, L. Q. Qin, L. Y. Qin, P. B. Qin, X. P. Qin, X. S. Qin, Z. H. Qin, J.
F. Qiu, Z. H. Qu, C. F. Redmer, A. Rivetti, M. Rolo, G. Rong, S. S. Rong, F.
Rosini, Ch. Rosner, M. Q. Ruan, S. N. Ruan, N. Salone, A. Sarantsev, Y.
Schelhaas, K. Schoenning, M. Scodeggio, K. Y. Shan, W. Shan, X. Y. Shan, Z.
J. Shang, J. F. Shangguan, L. G. Shao, M. Shao, C. P. Shen, H. F. Shen, W. H.
Shen, X. Y. Shen, B. A. Shi, H. Shi, J. L. Shi, J. Y. Shi, S. Y. Shi, X. Shi,
H. L. Song, J. J. Song, T. Z. Song, W. M. Song, Y. X. Song, S. Sosio, S.
Spataro, F. Stieler, S. S Su, Y. J. Su, G. B. Sun, G. X. Sun, H. Sun, H. K.
Sun, J. F. Sun, K. Sun, L. Sun, S. S. Sun, T. Sun, Y. C. Sun, Y. H. Sun, Y.
J. Sun, Y. Z. Sun, Z. Q. Sun, Z. T. Sun, C. J. Tang, G. Y. Tang, J. Tang, L.
F. Tang, M. Tang, Y. A. Tang, L. Y. Tao, M. Tat, J. X. Teng, J. Y. Tian, W.
H. Tian, Y. Tian, Z. F. Tian, I. Uman, B. Wang, B. Wang, Bo Wang, C. Wang,
Cong Wang, D. Y. Wang, H. J. Wang, J. J. Wang, K. Wang, L. L. Wang, L. W.
Wang, M. Wang, M. Wang, N. Y. Wang, S. Wang, T. Wang, T. J. Wang, W. Wang, W.
Wang, W. P. Wang, X. Wang, X. F. Wang, X. J. Wang, X. L. Wang, X. N. Wang, Y.
Wang, Y. D. Wang, Y. F. Wang, Y. H. Wang, Y. L. Wang, Y. N. Wang, Y. Q. Wang,
Yaqian Wang, Yi Wang, Yuan Wang, Z. Wang, Z. L. Wang, Z. L. Wang, Z. Q. Wang,
Z. Y. Wang, D. H. Wei, H. R. Wei, F. Weidner, S. P. Wen, Y. R. Wen, U.
Wiedner, G. Wilkinson, M. Wolke, C. Wu, J. F. Wu, L. H. Wu, L. J. Wu, Lianjie
Wu, S. G. Wu, S. M. Wu, X. Wu, X. H. Wu, Y. J. Wu, Z. Wu, L. Xia, X. M. Xian,
B. H. Xiang, T. Xiang, D. Xiao, G. Y. Xiao, H. Xiao, Y. L. Xiao, Z. J. Xiao,
C. Xie, K. J. Xie, X. H. Xie, Y. Xie, Y. G. Xie, Y. H. Xie, Z. P. Xie, T. Y.
Xing, C. F. Xu, C. J. Xu, G. F. Xu, H. Y. Xu, H. Y. Xu, M. Xu, Q. J. Xu, Q.
N. Xu, W. L. Xu, X. P. Xu, Y. Xu, Y. Xu, Y. C. Xu, Z. S. Xu, H. Y. Yan, L.
Yan, W. B. Yan, W. C. Yan, W. P. Yan, X. Q. Yan, H. J. Yang, H. L. Yang, H.
X. Yang, J. H. Yang, R. J. Yang, T. Yang, Y. Yang, Y. F. Yang, Y. H. Yang, Y.
Q. Yang, Y. X. Yang, Y. Z. Yang, M. Ye, M. H. Ye, Junhao Yin, Z. Y. You, B.
X. Yu, C. X. Yu, G. Yu, J. S. Yu, M. C. Yu, T. Yu, X. D. Yu, Y. C. Yu, C. Z.
Yuan, H. Yuan, J. Yuan, J. Yuan, L. Yuan, S. C. Yuan, Y. Yuan, Z. Y. Yuan, C.
X. Yue, Ying Yue, A. A. Zafar, S. H. Zeng, X. Zeng, Y. Zeng, Y. J. Zeng, Y.
J. Zeng, X. Y. Zhai, Y. H. Zhan, A. Q. Zhang, B. L. Zhang, B. X. Zhang, D. H.
Zhang, G. Y. Zhang, G. Y. Zhang, H. Zhang, H. Zhang, H. C. Zhang, H. H.
Zhang, H. Q. Zhang, H. R. Zhang, H. Y. Zhang, J. Zhang, J. Zhang, J. J.
Zhang, J. L. Zhang, J. Q. Zhang, J. S. Zhang, J. W. Zhang, J. X. Zhang, J. Y.
Zhang, J. Z. Zhang, Jianyu Zhang, L. M. Zhang, Lei Zhang, N. Zhang, P. Zhang,
Q. Zhang, Q. Y. Zhang, R. Y. Zhang, S. H. Zhang, Shulei Zhang, X. M. Zhang,
X. Y Zhang, X. Y. Zhang, Y. Zhang, Y. Zhang, Y. T. Zhang, Y. H. Zhang, Y. M.
Zhang, Z. D. Zhang, Z. H. Zhang, Z. L. Zhang, Z. L. Zhang, Z. X. Zhang, Z. Y.
Zhang, Z. Y. Zhang, Z. Z. Zhang, Zh. Zh. Zhang, G. Zhao, J. Y. Zhao, J. Z.
Zhao, L. Zhao, Lei Zhao, M. G. Zhao, N. Zhao, R. P. Zhao, S. J. Zhao, Y. B.
Zhao, Y. L. Zhao, Y. X. Zhao, Z. G. Zhao, A. Zhemchugov, B. Zheng, B. M.
Zheng, J. P. Zheng, W. J. Zheng, X. R. Zheng, Y. H. Zheng, B. Zhong, X.
Zhong, H. Zhou, J. Q. Zhou, J. Y. Zhou, S. Zhou, X. Zhou, X. K. Zhou, X. R.
Zhou, X. Y. Zhou, Y. Z. Zhou, Z. C. Zhou, A. N. Zhu, J. Zhu, K. Zhu, K. J.
Zhu, K. S. Zhu, L. Zhu, L. X. Zhu, S. H. Zhu, T. J. Zhu, W. D. Zhu, W. D.
Zhu, W. J. Zhu, W. Z. Zhu, Y. C. Zhu, Z. A. Zhu, X. Y. Zhuang, J. H. Zou, J.
Zu | Search for $J/\psi\rightarrow K^{0}_{S}K^{0}_{S}$ and
$\psi(3686)\rightarrow K^{0}_{S}K^{0}_{S}$ | null | null | null | null | hep-ex | http://creativecommons.org/licenses/by/4.0/ | Using data samples of $(10087\pm 44)\times10^{6}$ $J/\psi$ events and
$(2712.4\pm 14.3)\times10^{6}$ $\psi(3686)$ events collected with the BESIII
detector at the BEPCII collider, we search for the CP violating decays
$J/\psi\rightarrow K^{0}_{S}K^{0}_{S}$ and $\psi(3686)\rightarrow
K^{0}_{S}K^{0}_{S}$. No significant signals are observed over the expected
background yields. The upper limits on their branching fractions are set as
$\mathcal{B}(J/\psi\rightarrow K^{0}_{S}K^{0}_{S}) <4.7\times 10^{-9}$ and
$\mathcal{B}(\psi(3686)\rightarrow K^{0}_{S}K^{0}_{S}) <1.1\times 10^{-8}$ at
the 90% confidence level. These results improve the previous limits by a factor
of three for $J/\psi\rightarrow K^{0}_{S} K^{0}_{S}$ and two orders of
magnitude for $\psi(3686)\rightarrow K^{0}_{S} K^{0}_{S}$.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 16:14:05 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"BESIII Collaboration",
"",
""
],
[
"Ablikim",
"M.",
""
],
[
"Achasov",
"M. N.",
""
],
[
"Adlarson",
"P.",
""
],
[
"Ai",
"X. C.",
""
],
[
"Aliberti",
"R.",
""
],
[
"Amoroso",
"A.",
""
],
[
"An",
"Q.",
""
],
[
"Bai",
"Y.",
""
],
[
"Bakina",
"O.",
""
],
[
"Ban",
"Y.",
""
],
[
"Bao",
"H. -R.",
""
],
[
"Batozskaya",
"V.",
""
],
[
"Begzsuren",
"K.",
""
],
[
"Berger",
"N.",
""
],
[
"Berlowski",
"M.",
""
],
[
"Bertani",
"M.",
""
],
[
"Bettoni",
"D.",
""
],
[
"Bianchi",
"F.",
""
],
[
"Bianco",
"E.",
""
],
[
"Bortone",
"A.",
""
],
[
"Boyko",
"I.",
""
],
[
"Briere",
"R. A.",
""
],
[
"Brueggemann",
"A.",
""
],
[
"Cai",
"H.",
""
],
[
"Cai",
"M. H.",
""
],
[
"Cai",
"X.",
""
],
[
"Calcaterra",
"A.",
""
],
[
"Cao",
"G. F.",
""
],
[
"Cao",
"N.",
""
],
[
"Cetin",
"S. A.",
""
],
[
"Chai",
"X. Y.",
""
],
[
"Chang",
"J. F.",
""
],
[
"Che",
"G. R.",
""
],
[
"Che",
"Y. Z.",
""
],
[
"Chelkov",
"G.",
""
],
[
"Chen",
"C.",
""
],
[
"Chen",
"C. H.",
""
],
[
"Chen",
"Chao",
""
],
[
"Chen",
"G.",
""
],
[
"Chen",
"H. S.",
""
],
[
"Chen",
"H. Y.",
""
],
[
"Chen",
"M. L.",
""
],
[
"Chen",
"S. J.",
""
],
[
"Chen",
"S. L.",
""
],
[
"Chen",
"S. M.",
""
],
[
"Chen",
"T.",
""
],
[
"Chen",
"X. R.",
""
],
[
"Chen",
"X. T.",
""
],
[
"Chen",
"Y. B.",
""
],
[
"Chen",
"Y. Q.",
""
],
[
"Chen",
"Z. J.",
""
],
[
"Chen",
"Z. K.",
""
],
[
"Choi",
"S. K.",
""
],
[
"Chu",
"X.",
""
],
[
"Cibinetto",
"G.",
""
],
[
"Cossio",
"F.",
""
],
[
"Cui",
"J. J.",
""
],
[
"Dai",
"H. L.",
""
],
[
"Dai",
"J. P.",
""
],
[
"Dbeyssi",
"A.",
""
],
[
"de Boer",
"R. E.",
""
],
[
"Dedovich",
"D.",
""
],
[
"Deng",
"C. Q.",
""
],
[
"Deng",
"Z. Y.",
""
],
[
"Denig",
"A.",
""
],
[
"Denysenko",
"I.",
""
],
[
"Destefanis",
"M.",
""
],
[
"De Mori",
"F.",
""
],
[
"Ding",
"B.",
""
],
[
"Ding",
"X. X.",
""
],
[
"Ding",
"Y.",
""
],
[
"Ding",
"Y.",
""
],
[
"Ding",
"Y. X.",
""
],
[
"Dong",
"J.",
""
],
[
"Dong",
"L. Y.",
""
],
[
"Dong",
"M. Y.",
""
],
[
"Dong",
"X.",
""
],
[
"Du",
"M. C.",
""
],
[
"Du",
"S. X.",
""
],
[
"Duan",
"Y. Y.",
""
],
[
"Duan",
"Z. H.",
""
],
[
"Egorov",
"P.",
""
],
[
"Fan",
"G. F.",
""
],
[
"Fan",
"J. J.",
""
],
[
"Fan",
"Y. H.",
""
],
[
"Fang",
"J.",
""
],
[
"Fang",
"J.",
""
],
[
"Fang",
"S. S.",
""
],
[
"Fang",
"W. X.",
""
],
[
"Fang",
"Y. Q.",
""
],
[
"Farinelli",
"R.",
""
],
[
"Fava",
"L.",
""
],
[
"Feldbauer",
"F.",
""
],
[
"Felici",
"G.",
""
],
[
"Feng",
"C. Q.",
""
],
[
"Feng",
"J. H.",
""
],
[
"Feng",
"Y. T.",
""
],
[
"Fritsch",
"M.",
""
],
[
"Fu",
"C. D.",
""
],
[
"Fu",
"J. L.",
""
],
[
"Fu",
"Y. W.",
""
],
[
"Gao",
"H.",
""
],
[
"Gao",
"X. B.",
""
],
[
"Gao",
"Y. N.",
""
],
[
"Gao",
"Y. N.",
""
],
[
"Gao",
"Y. Y.",
""
],
[
"Gao",
"Yang",
""
],
[
"Garbolino",
"S.",
""
],
[
"Garzia",
"I.",
""
],
[
"Ge",
"P. T.",
""
],
[
"Ge",
"Z. W.",
""
],
[
"Geng",
"C.",
""
],
[
"Gersabeck",
"E. M.",
""
],
[
"Gilman",
"A.",
""
],
[
"Goetzen",
"K.",
""
],
[
"Gong",
"J. D.",
""
],
[
"Gong",
"L.",
""
],
[
"Gong",
"W. X.",
""
],
[
"Gradl",
"W.",
""
],
[
"Gramigna",
"S.",
""
],
[
"Greco",
"M.",
""
],
[
"Gu",
"M. H.",
""
],
[
"Gu",
"Y. T.",
""
],
[
"Guan",
"C. Y.",
""
],
[
"Guo",
"A. Q.",
""
],
[
"Guo",
"L. B.",
""
],
[
"Guo",
"M. J.",
""
],
[
"Guo",
"R. P.",
""
],
[
"Guo",
"Y. P.",
""
],
[
"Guskov",
"A.",
""
],
[
"Gutierrez",
"J.",
""
],
[
"Han",
"K. L.",
""
],
[
"Han",
"T. T.",
""
],
[
"Hanisch",
"F.",
""
],
[
"Hao",
"K. D.",
""
],
[
"Hao",
"X. Q.",
""
],
[
"Harris",
"F. A.",
""
],
[
"He",
"K. K.",
""
],
[
"He",
"K. L.",
""
],
[
"Heinsius",
"F. H.",
""
],
[
"Heinz",
"C. H.",
""
],
[
"Heng",
"Y. K.",
""
],
[
"Herold",
"C.",
""
],
[
"Holtmann",
"T.",
""
],
[
"Hong",
"P. C.",
""
],
[
"Hou",
"G. Y.",
""
],
[
"Hou",
"X. T.",
""
],
[
"Hou",
"Y. R.",
""
],
[
"Hou",
"Z. L.",
""
],
[
"Hu",
"B. Y.",
""
],
[
"Hu",
"H. M.",
""
],
[
"Hu",
"J. F.",
""
],
[
"Hu",
"Q. P.",
""
],
[
"Hu",
"S. L.",
""
],
[
"Hu",
"T.",
""
],
[
"Hu",
"Y.",
""
],
[
"Hu",
"Z. M.",
""
],
[
"Huang",
"G. S.",
""
],
[
"Huang",
"K. X.",
""
],
[
"Huang",
"L. Q.",
""
],
[
"Huang",
"P.",
""
],
[
"Huang",
"X. T.",
""
],
[
"Huang",
"Y. P.",
""
],
[
"Huang",
"Y. S.",
""
],
[
"Hussain",
"T.",
""
],
[
"Hüsken",
"N.",
""
],
[
"der Wiesche",
"N. in",
""
],
[
"Jackson",
"J.",
""
],
[
"Janchiv",
"S.",
""
],
[
"Ji",
"Q.",
""
],
[
"Ji",
"Q. P.",
""
],
[
"Ji",
"W.",
""
],
[
"Ji",
"X. B.",
""
],
[
"Ji",
"X. L.",
""
],
[
"Ji",
"Y. Y.",
""
],
[
"Jia",
"Z. K.",
""
],
[
"Jiang",
"D.",
""
],
[
"Jiang",
"H. B.",
""
],
[
"Jiang",
"P. C.",
""
],
[
"Jiang",
"S. J.",
""
],
[
"Jiang",
"T. J.",
""
],
[
"Jiang",
"X. S.",
""
],
[
"Jiang",
"Y.",
""
],
[
"Jiao",
"J. B.",
""
],
[
"Jiao",
"J. K.",
""
],
[
"Jiao",
"Z.",
""
],
[
"Jin",
"S.",
""
],
[
"Jin",
"Y.",
""
],
[
"Jing",
"M. Q.",
""
],
[
"Jing",
"X. M.",
""
],
[
"Johansson",
"T.",
""
],
[
"Kabana",
"S.",
""
],
[
"Kalantar-Nayestanaki",
"N.",
""
],
[
"Kang",
"X. L.",
""
],
[
"Kang",
"X. S.",
""
],
[
"Kavatsyuk",
"M.",
""
],
[
"Ke",
"B. C.",
""
],
[
"Khachatryan",
"V.",
""
],
[
"Khoukaz",
"A.",
""
],
[
"Kiuchi",
"R.",
""
],
[
"Kolcu",
"O. B.",
""
],
[
"Kopf",
"B.",
""
],
[
"Kuessner",
"M.",
""
],
[
"Kui",
"X.",
""
],
[
"Kumar",
"N.",
""
],
[
"Kupsc",
"A.",
""
],
[
"Kühn",
"W.",
""
],
[
"Lan",
"Q.",
""
],
[
"Lan",
"W. N.",
""
],
[
"Lei",
"T. T.",
""
],
[
"Lellmann",
"M.",
""
],
[
"Lenz",
"T.",
""
],
[
"Li",
"C.",
""
],
[
"Li",
"C.",
""
],
[
"Li",
"C. H.",
""
],
[
"Li",
"C. K.",
""
],
[
"Li",
"Cheng",
""
],
[
"Li",
"D. M.",
""
],
[
"Li",
"F.",
""
],
[
"Li",
"G.",
""
],
[
"Li",
"H. B.",
""
],
[
"Li",
"H. J.",
""
],
[
"Li",
"H. N.",
""
],
[
"Li",
"Hui",
""
],
[
"Li",
"J. R.",
""
],
[
"Li",
"J. S.",
""
],
[
"Li",
"K.",
""
],
[
"Li",
"K. L.",
""
],
[
"Li",
"K. L.",
""
],
[
"Li",
"L. J.",
""
],
[
"Li",
"Lei",
""
],
[
"Li",
"M. H.",
""
],
[
"Li",
"M. R.",
""
],
[
"Li",
"P. L.",
""
],
[
"Li",
"P. R.",
""
],
[
"Li",
"Q. M.",
""
],
[
"Li",
"Q. X.",
""
],
[
"Li",
"R.",
""
],
[
"Li",
"T.",
""
],
[
"Li",
"T. Y.",
""
],
[
"Li",
"W. D.",
""
],
[
"Li",
"W. G.",
""
],
[
"Li",
"X.",
""
],
[
"Li",
"X. H.",
""
],
[
"Li",
"X. L.",
""
],
[
"Li",
"X. Y.",
""
],
[
"Li",
"X. Z.",
""
],
[
"Li",
"Y.",
""
],
[
"Li",
"Y. G.",
""
],
[
"Li",
"Y. P.",
""
],
[
"Li",
"Z. J.",
""
],
[
"Li",
"Z. Y.",
""
],
[
"Liang",
"C.",
""
],
[
"Liang",
"H.",
""
],
[
"Liang",
"Y. F.",
""
],
[
"Liang",
"Y. T.",
""
],
[
"Liao",
"G. R.",
""
],
[
"Liao",
"L. B.",
""
],
[
"Liao",
"M. H.",
""
],
[
"Liao",
"Y. P.",
""
],
[
"Libby",
"J.",
""
],
[
"Limphirat",
"A.",
""
],
[
"Lin",
"C. C.",
""
],
[
"Lin",
"C. X.",
""
],
[
"Lin",
"D. X.",
""
],
[
"Lin",
"L. Q.",
""
],
[
"Lin",
"T.",
""
],
[
"Liu",
"B. J.",
""
],
[
"Liu",
"B. X.",
""
],
[
"Liu",
"C.",
""
],
[
"Liu",
"C. X.",
""
],
[
"Liu",
"F.",
""
],
[
"Liu",
"F. H.",
""
],
[
"Liu",
"Feng",
""
],
[
"Liu",
"G. M.",
""
],
[
"Liu",
"H.",
""
],
[
"Liu",
"H. B.",
""
],
[
"Liu",
"H. H.",
""
],
[
"Liu",
"H. M.",
""
],
[
"Liu",
"Huihui",
""
],
[
"Liu",
"J. B.",
""
],
[
"Liu",
"J. J.",
""
],
[
"Liu",
"K.",
""
],
[
"Liu",
"K.",
""
],
[
"Liu",
"K. Y.",
""
],
[
"Liu",
"Ke",
""
],
[
"Liu",
"L.",
""
],
[
"Liu",
"L. C.",
""
],
[
"Liu",
"Lu",
""
],
[
"Liu",
"P. L.",
""
],
[
"Liu",
"Q.",
""
],
[
"Liu",
"S. B.",
""
],
[
"Liu",
"T.",
""
],
[
"Liu",
"W. K.",
""
],
[
"Liu",
"W. M.",
""
],
[
"Liu",
"W. T.",
""
],
[
"Liu",
"X.",
""
],
[
"Liu",
"X.",
""
],
[
"Liu",
"X. Y.",
""
],
[
"Liu",
"Y.",
""
],
[
"Liu",
"Y.",
""
],
[
"Liu",
"Y.",
""
],
[
"Liu",
"Y. B.",
""
],
[
"Liu",
"Z. A.",
""
],
[
"Liu",
"Z. D.",
""
],
[
"Liu",
"Z. Q.",
""
],
[
"Lou",
"X. C.",
""
],
[
"Lu",
"F. X.",
""
],
[
"Lu",
"H. J.",
""
],
[
"Lu",
"J. G.",
""
],
[
"Lu",
"Y.",
""
],
[
"Lu",
"Y. H.",
""
],
[
"Lu",
"Y. P.",
""
],
[
"Lu",
"Z. H.",
""
],
[
"Luo",
"C. L.",
""
],
[
"Luo",
"J. R.",
""
],
[
"Luo",
"J. S.",
""
],
[
"Luo",
"M. X.",
""
],
[
"Luo",
"T.",
""
],
[
"Luo",
"X. L.",
""
],
[
"Lv",
"Z. Y.",
""
],
[
"Lyu",
"X. R.",
""
],
[
"Lyu",
"Y. F.",
""
],
[
"Lyu",
"Y. H.",
""
],
[
"Ma",
"F. C.",
""
],
[
"Ma",
"H.",
""
],
[
"Ma",
"H. L.",
""
],
[
"Ma",
"J. L.",
""
],
[
"Ma",
"L. L.",
""
],
[
"Ma",
"L. R.",
""
],
[
"Ma",
"Q. M.",
""
],
[
"Ma",
"R. Q.",
""
],
[
"Ma",
"R. Y.",
""
],
[
"Ma",
"T.",
""
],
[
"Ma",
"X. T.",
""
],
[
"Ma",
"X. Y.",
""
],
[
"Ma",
"Y. M.",
""
],
[
"Maas",
"F. E.",
""
],
[
"MacKay",
"I.",
""
],
[
"Maggiora",
"M.",
""
],
[
"Malde",
"S.",
""
],
[
"Mao",
"Y. J.",
""
],
[
"Mao",
"Z. P.",
""
],
[
"Marcello",
"S.",
""
],
[
"Melendi",
"F. M.",
""
],
[
"Meng",
"Y. H.",
""
],
[
"Meng",
"Z. X.",
""
],
[
"Messchendorp",
"J. G.",
""
],
[
"Mezzadri",
"G.",
""
],
[
"Miao",
"H.",
""
],
[
"Min",
"T. J.",
""
],
[
"Mitchell",
"R. E.",
""
],
[
"Mo",
"X. H.",
""
],
[
"Moses",
"B.",
""
],
[
"Muchnoi",
"N. Yu.",
""
],
[
"Muskalla",
"J.",
""
],
[
"Nefedov",
"Y.",
""
],
[
"Nerling",
"F.",
""
],
[
"Nie",
"L. S.",
""
],
[
"Nikolaev",
"I. B.",
""
],
[
"Ning",
"Z.",
""
],
[
"Nisar",
"S.",
""
],
[
"Niu",
"Q. L.",
""
],
[
"Niu",
"W. D.",
""
],
[
"Olsen",
"S. L.",
""
],
[
"Ouyang",
"Q.",
""
],
[
"Pacetti",
"S.",
""
],
[
"Pan",
"X.",
""
],
[
"Pan",
"Y.",
""
],
[
"Pathak",
"A.",
""
],
[
"Pei",
"Y. P.",
""
],
[
"Pelizaeus",
"M.",
""
],
[
"Peng",
"H. P.",
""
],
[
"Peng",
"Y. Y.",
""
],
[
"Peters",
"K.",
""
],
[
"Ping",
"J. L.",
""
],
[
"Ping",
"R. G.",
""
],
[
"Plura",
"S.",
""
],
[
"Prasad",
"V.",
""
],
[
"Qi",
"F. Z.",
""
],
[
"Qi",
"H. R.",
""
],
[
"Qi",
"M.",
""
],
[
"Qian",
"S.",
""
],
[
"Qian",
"W. B.",
""
],
[
"Qiao",
"C. F.",
""
],
[
"Qiao",
"J. H.",
""
],
[
"Qin",
"J. J.",
""
],
[
"Qin",
"J. L.",
""
],
[
"Qin",
"L. Q.",
""
],
[
"Qin",
"L. Y.",
""
],
[
"Qin",
"P. B.",
""
],
[
"Qin",
"X. P.",
""
],
[
"Qin",
"X. S.",
""
],
[
"Qin",
"Z. H.",
""
],
[
"Qiu",
"J. F.",
""
],
[
"Qu",
"Z. H.",
""
],
[
"Redmer",
"C. F.",
""
],
[
"Rivetti",
"A.",
""
],
[
"Rolo",
"M.",
""
],
[
"Rong",
"G.",
""
],
[
"Rong",
"S. S.",
""
],
[
"Rosini",
"F.",
""
],
[
"Rosner",
"Ch.",
""
],
[
"Ruan",
"M. Q.",
""
],
[
"Ruan",
"S. N.",
""
],
[
"Salone",
"N.",
""
],
[
"Sarantsev",
"A.",
""
],
[
"Schelhaas",
"Y.",
""
],
[
"Schoenning",
"K.",
""
],
[
"Scodeggio",
"M.",
""
],
[
"Shan",
"K. Y.",
""
],
[
"Shan",
"W.",
""
],
[
"Shan",
"X. Y.",
""
],
[
"Shang",
"Z. J.",
""
],
[
"Shangguan",
"J. F.",
""
],
[
"Shao",
"L. G.",
""
],
[
"Shao",
"M.",
""
],
[
"Shen",
"C. P.",
""
],
[
"Shen",
"H. F.",
""
],
[
"Shen",
"W. H.",
""
],
[
"Shen",
"X. Y.",
""
],
[
"Shi",
"B. A.",
""
],
[
"Shi",
"H.",
""
],
[
"Shi",
"J. L.",
""
],
[
"Shi",
"J. Y.",
""
],
[
"Shi",
"S. Y.",
""
],
[
"Shi",
"X.",
""
],
[
"Song",
"H. L.",
""
],
[
"Song",
"J. J.",
""
],
[
"Song",
"T. Z.",
""
],
[
"Song",
"W. M.",
""
],
[
"Song",
"Y. X.",
""
],
[
"Sosio",
"S.",
""
],
[
"Spataro",
"S.",
""
],
[
"Stieler",
"F.",
""
],
[
"Su",
"S. S",
""
],
[
"Su",
"Y. J.",
""
],
[
"Sun",
"G. B.",
""
],
[
"Sun",
"G. X.",
""
],
[
"Sun",
"H.",
""
],
[
"Sun",
"H. K.",
""
],
[
"Sun",
"J. F.",
""
],
[
"Sun",
"K.",
""
],
[
"Sun",
"L.",
""
],
[
"Sun",
"S. S.",
""
],
[
"Sun",
"T.",
""
],
[
"Sun",
"Y. C.",
""
],
[
"Sun",
"Y. H.",
""
],
[
"Sun",
"Y. J.",
""
],
[
"Sun",
"Y. Z.",
""
],
[
"Sun",
"Z. Q.",
""
],
[
"Sun",
"Z. T.",
""
],
[
"Tang",
"C. J.",
""
],
[
"Tang",
"G. Y.",
""
],
[
"Tang",
"J.",
""
],
[
"Tang",
"L. F.",
""
],
[
"Tang",
"M.",
""
],
[
"Tang",
"Y. A.",
""
],
[
"Tao",
"L. Y.",
""
],
[
"Tat",
"M.",
""
],
[
"Teng",
"J. X.",
""
],
[
"Tian",
"J. Y.",
""
],
[
"Tian",
"W. H.",
""
],
[
"Tian",
"Y.",
""
],
[
"Tian",
"Z. F.",
""
],
[
"Uman",
"I.",
""
],
[
"Wang",
"B.",
""
],
[
"Wang",
"B.",
""
],
[
"Wang",
"Bo",
""
],
[
"Wang",
"C.",
""
],
[
"Wang",
"Cong",
""
],
[
"Wang",
"D. Y.",
""
],
[
"Wang",
"H. J.",
""
],
[
"Wang",
"J. J.",
""
],
[
"Wang",
"K.",
""
],
[
"Wang",
"L. L.",
""
],
[
"Wang",
"L. W.",
""
],
[
"Wang",
"M.",
""
],
[
"Wang",
"M.",
""
],
[
"Wang",
"N. Y.",
""
],
[
"Wang",
"S.",
""
],
[
"Wang",
"T.",
""
],
[
"Wang",
"T. J.",
""
],
[
"Wang",
"W.",
""
],
[
"Wang",
"W.",
""
],
[
"Wang",
"W. P.",
""
],
[
"Wang",
"X.",
""
],
[
"Wang",
"X. F.",
""
],
[
"Wang",
"X. J.",
""
],
[
"Wang",
"X. L.",
""
],
[
"Wang",
"X. N.",
""
],
[
"Wang",
"Y.",
""
],
[
"Wang",
"Y. D.",
""
],
[
"Wang",
"Y. F.",
""
],
[
"Wang",
"Y. H.",
""
],
[
"Wang",
"Y. L.",
""
],
[
"Wang",
"Y. N.",
""
],
[
"Wang",
"Y. Q.",
""
],
[
"Wang",
"Yaqian",
""
],
[
"Wang",
"Yi",
""
],
[
"Wang",
"Yuan",
""
],
[
"Wang",
"Z.",
""
],
[
"Wang",
"Z. L.",
""
],
[
"Wang",
"Z. L.",
""
],
[
"Wang",
"Z. Q.",
""
],
[
"Wang",
"Z. Y.",
""
],
[
"Wei",
"D. H.",
""
],
[
"Wei",
"H. R.",
""
],
[
"Weidner",
"F.",
""
],
[
"Wen",
"S. P.",
""
],
[
"Wen",
"Y. R.",
""
],
[
"Wiedner",
"U.",
""
],
[
"Wilkinson",
"G.",
""
],
[
"Wolke",
"M.",
""
],
[
"Wu",
"C.",
""
],
[
"Wu",
"J. F.",
""
],
[
"Wu",
"L. H.",
""
],
[
"Wu",
"L. J.",
""
],
[
"Wu",
"Lianjie",
""
],
[
"Wu",
"S. G.",
""
],
[
"Wu",
"S. M.",
""
],
[
"Wu",
"X.",
""
],
[
"Wu",
"X. H.",
""
],
[
"Wu",
"Y. J.",
""
],
[
"Wu",
"Z.",
""
],
[
"Xia",
"L.",
""
],
[
"Xian",
"X. M.",
""
],
[
"Xiang",
"B. H.",
""
],
[
"Xiang",
"T.",
""
],
[
"Xiao",
"D.",
""
],
[
"Xiao",
"G. Y.",
""
],
[
"Xiao",
"H.",
""
],
[
"Xiao",
"Y. L.",
""
],
[
"Xiao",
"Z. J.",
""
],
[
"Xie",
"C.",
""
],
[
"Xie",
"K. J.",
""
],
[
"Xie",
"X. H.",
""
],
[
"Xie",
"Y.",
""
],
[
"Xie",
"Y. G.",
""
],
[
"Xie",
"Y. H.",
""
],
[
"Xie",
"Z. P.",
""
],
[
"Xing",
"T. Y.",
""
],
[
"Xu",
"C. F.",
""
],
[
"Xu",
"C. J.",
""
],
[
"Xu",
"G. F.",
""
],
[
"Xu",
"H. Y.",
""
],
[
"Xu",
"H. Y.",
""
],
[
"Xu",
"M.",
""
],
[
"Xu",
"Q. J.",
""
],
[
"Xu",
"Q. N.",
""
],
[
"Xu",
"W. L.",
""
],
[
"Xu",
"X. P.",
""
],
[
"Xu",
"Y.",
""
],
[
"Xu",
"Y.",
""
],
[
"Xu",
"Y. C.",
""
],
[
"Xu",
"Z. S.",
""
],
[
"Yan",
"H. Y.",
""
],
[
"Yan",
"L.",
""
],
[
"Yan",
"W. B.",
""
],
[
"Yan",
"W. C.",
""
],
[
"Yan",
"W. P.",
""
],
[
"Yan",
"X. Q.",
""
],
[
"Yang",
"H. J.",
""
],
[
"Yang",
"H. L.",
""
],
[
"Yang",
"H. X.",
""
],
[
"Yang",
"J. H.",
""
],
[
"Yang",
"R. J.",
""
],
[
"Yang",
"T.",
""
],
[
"Yang",
"Y.",
""
],
[
"Yang",
"Y. F.",
""
],
[
"Yang",
"Y. H.",
""
],
[
"Yang",
"Y. Q.",
""
],
[
"Yang",
"Y. X.",
""
],
[
"Yang",
"Y. Z.",
""
],
[
"Ye",
"M.",
""
],
[
"Ye",
"M. H.",
""
],
[
"Yin",
"Junhao",
""
],
[
"You",
"Z. Y.",
""
],
[
"Yu",
"B. X.",
""
],
[
"Yu",
"C. X.",
""
],
[
"Yu",
"G.",
""
],
[
"Yu",
"J. S.",
""
],
[
"Yu",
"M. C.",
""
],
[
"Yu",
"T.",
""
],
[
"Yu",
"X. D.",
""
],
[
"Yu",
"Y. C.",
""
],
[
"Yuan",
"C. Z.",
""
],
[
"Yuan",
"H.",
""
],
[
"Yuan",
"J.",
""
],
[
"Yuan",
"J.",
""
],
[
"Yuan",
"L.",
""
],
[
"Yuan",
"S. C.",
""
],
[
"Yuan",
"Y.",
""
],
[
"Yuan",
"Z. Y.",
""
],
[
"Yue",
"C. X.",
""
],
[
"Yue",
"Ying",
""
],
[
"Zafar",
"A. A.",
""
],
[
"Zeng",
"S. H.",
""
],
[
"Zeng",
"X.",
""
],
[
"Zeng",
"Y.",
""
],
[
"Zeng",
"Y. J.",
""
],
[
"Zeng",
"Y. J.",
""
],
[
"Zhai",
"X. Y.",
""
],
[
"Zhan",
"Y. H.",
""
],
[
"Zhang",
"A. Q.",
""
],
[
"Zhang",
"B. L.",
""
],
[
"Zhang",
"B. X.",
""
],
[
"Zhang",
"D. H.",
""
],
[
"Zhang",
"G. Y.",
""
],
[
"Zhang",
"G. Y.",
""
],
[
"Zhang",
"H.",
""
],
[
"Zhang",
"H.",
""
],
[
"Zhang",
"H. C.",
""
],
[
"Zhang",
"H. H.",
""
],
[
"Zhang",
"H. Q.",
""
],
[
"Zhang",
"H. R.",
""
],
[
"Zhang",
"H. Y.",
""
],
[
"Zhang",
"J.",
""
],
[
"Zhang",
"J.",
""
],
[
"Zhang",
"J. J.",
""
],
[
"Zhang",
"J. L.",
""
],
[
"Zhang",
"J. Q.",
""
],
[
"Zhang",
"J. S.",
""
],
[
"Zhang",
"J. W.",
""
],
[
"Zhang",
"J. X.",
""
],
[
"Zhang",
"J. Y.",
""
],
[
"Zhang",
"J. Z.",
""
],
[
"Zhang",
"Jianyu",
""
],
[
"Zhang",
"L. M.",
""
],
[
"Zhang",
"Lei",
""
],
[
"Zhang",
"N.",
""
],
[
"Zhang",
"P.",
""
],
[
"Zhang",
"Q.",
""
],
[
"Zhang",
"Q. Y.",
""
],
[
"Zhang",
"R. Y.",
""
],
[
"Zhang",
"S. H.",
""
],
[
"Zhang",
"Shulei",
""
],
[
"Zhang",
"X. M.",
""
],
[
"Zhang",
"X. Y",
""
],
[
"Zhang",
"X. Y.",
""
],
[
"Zhang",
"Y.",
""
],
[
"Zhang",
"Y.",
""
],
[
"Zhang",
"Y. T.",
""
],
[
"Zhang",
"Y. H.",
""
],
[
"Zhang",
"Y. M.",
""
],
[
"Zhang",
"Z. D.",
""
],
[
"Zhang",
"Z. H.",
""
],
[
"Zhang",
"Z. L.",
""
],
[
"Zhang",
"Z. L.",
""
],
[
"Zhang",
"Z. X.",
""
],
[
"Zhang",
"Z. Y.",
""
],
[
"Zhang",
"Z. Y.",
""
],
[
"Zhang",
"Z. Z.",
""
],
[
"Zhang",
"Zh. Zh.",
""
],
[
"Zhao",
"G.",
""
],
[
"Zhao",
"J. Y.",
""
],
[
"Zhao",
"J. Z.",
""
],
[
"Zhao",
"L.",
""
],
[
"Zhao",
"Lei",
""
],
[
"Zhao",
"M. G.",
""
],
[
"Zhao",
"N.",
""
],
[
"Zhao",
"R. P.",
""
],
[
"Zhao",
"S. J.",
""
],
[
"Zhao",
"Y. B.",
""
],
[
"Zhao",
"Y. L.",
""
],
[
"Zhao",
"Y. X.",
""
],
[
"Zhao",
"Z. G.",
""
],
[
"Zhemchugov",
"A.",
""
],
[
"Zheng",
"B.",
""
],
[
"Zheng",
"B. M.",
""
],
[
"Zheng",
"J. P.",
""
],
[
"Zheng",
"W. J.",
""
],
[
"Zheng",
"X. R.",
""
],
[
"Zheng",
"Y. H.",
""
],
[
"Zhong",
"B.",
""
],
[
"Zhong",
"X.",
""
],
[
"Zhou",
"H.",
""
],
[
"Zhou",
"J. Q.",
""
],
[
"Zhou",
"J. Y.",
""
],
[
"Zhou",
"S.",
""
],
[
"Zhou",
"X.",
""
],
[
"Zhou",
"X. K.",
""
],
[
"Zhou",
"X. R.",
""
],
[
"Zhou",
"X. Y.",
""
],
[
"Zhou",
"Y. Z.",
""
],
[
"Zhou",
"Z. C.",
""
],
[
"Zhu",
"A. N.",
""
],
[
"Zhu",
"J.",
""
],
[
"Zhu",
"K.",
""
],
[
"Zhu",
"K. J.",
""
],
[
"Zhu",
"K. S.",
""
],
[
"Zhu",
"L.",
""
],
[
"Zhu",
"L. X.",
""
],
[
"Zhu",
"S. H.",
""
],
[
"Zhu",
"T. J.",
""
],
[
"Zhu",
"W. D.",
""
],
[
"Zhu",
"W. D.",
""
],
[
"Zhu",
"W. J.",
""
],
[
"Zhu",
"W. Z.",
""
],
[
"Zhu",
"Y. C.",
""
],
[
"Zhu",
"Z. A.",
""
],
[
"Zhuang",
"X. Y.",
""
],
[
"Zou",
"J. H.",
""
],
[
"Zu",
"J.",
""
]
] |
2504.13772 | Phuong Nguyen | Minh Hoang Vuong and Anh M. T. Bui and Phuong T. Nguyen and Davide Di
Ruscio | Bake Two Cakes with One Oven: RL for Defusing Popularity Bias and
Cold-start in Third-Party Library Recommendations | The paper has been peer-reviewed and accepted for publication in the
proceedings of the 29th International Conference on Evaluation and Assessment
in Software Engineering (EASE 2025) | null | null | null | cs.SE | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Third-party libraries (TPLs) have become an integral part of modern software
development, enhancing developer productivity and accelerating time-to-market.
However, identifying suitable candidates from a rapidly growing and
continuously evolving collection of TPLs remains a challenging task. TPL
recommender systems have been studied, offering a promising solution to address
this issue. They typically rely on collaborative filtering (CF) that exploits a
two-dimensional project-library matrix (user-item in general context of
recommendation) when making recommendations. We have noticed that CF-based
approaches often encounter two challenges: (i) a tendency to recommend popular
items more frequently, making them even more dominant, a phenomenon known as
popularity bias, and (ii) difficulty in generating recommendations for new
users or items due to limited user-item interactions, commonly referred to as
the cold-start problem. In this paper, we propose a reinforcement learning
(RL)-based approach to address popularity bias and the cold-start problem in
TPL recommendation. Our method comprises three key components. First, we
utilize a graph convolution network (GCN)-based embedding model to learn user
preferences and user-item interactions, allowing us to capture complex
relationships within interaction subgraphs and effectively represent new
user/item embeddings. Second, we introduce an aggregation operator to generate
a representative embedding from user and item embeddings, which is then used to
model cold-start users. Finally, we adopt a model-based RL framework for TPL
recommendation, where popularity bias is mitigated through a carefully designed
reward function and a rarity-based replay buffer partitioning strategy. The
results demonstrated that our proposed approach outperforms state-of-the-art
models in cold-start scenarios while effectively mitigating the impact of
popularity bias.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 16:17:20 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Vuong",
"Minh Hoang",
""
],
[
"Bui",
"Anh M. T.",
""
],
[
"Nguyen",
"Phuong T.",
""
],
[
"Di Ruscio",
"Davide",
""
]
] |
2504.13773 | Cory Nunn | Cory Nunn, Nijil Lal, Ivan Burenkov, Ya-Shian Li-Baboud, Paulina S.
Kuo, Thomas Gerrits, Sergey V. Polyakov | Picosecond synchronization of mode-locked lasers for metropolitan-scale
quantum networks | 10 pages, 4 figures | null | null | null | quant-ph | http://creativecommons.org/licenses/by/4.0/ | We demonstrate picosecond-level synchronization of two actively mode-locked
Ti:Sapphire lasers via the White Rabbit Precision Time Protocol (WR-PTP),
tested over 120 km of deployed optical fiber. This synchronization capability,
in combination with the highly single-mode, transform-limited pulses produced
by each laser, enables their use as pump lasers for indistinguishable photon
sources at remote locations in a quantum network. Here, the WR-PTP serves as a
scalable network synchronization protocol, and its performance is compared to
traditional methods of local synchronization. We demonstrate pulse-to-pulse
synchronization better than 3 ps and time deviation (TDEV) values below 4 ps
for all averaging times up to 10 s. With a designed coherence time of 35 ps for
single photon sources utilizing these lasers, the achievable temporal overlap
corresponds to 98 % Hong-Ou-Mandel (HOM) interference visibility between
independent sources.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 16:19:47 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Nunn",
"Cory",
""
],
[
"Lal",
"Nijil",
""
],
[
"Burenkov",
"Ivan",
""
],
[
"Li-Baboud",
"Ya-Shian",
""
],
[
"Kuo",
"Paulina S.",
""
],
[
"Gerrits",
"Thomas",
""
],
[
"Polyakov",
"Sergey V.",
""
]
] |
2504.13774 | Tamim Al Mahmud | Tamim Al Mahmud, Najeeb Jebreel, Josep Domingo-Ferrer and David
Sanchez | DP2Unlearning: An Efficient and Guaranteed Unlearning Framework for LLMs | 49 pages | null | 10.2139/ssrn.5217160 | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Large language models (LLMs) have recently revolutionized language processing
tasks but have also brought ethical and legal issues. LLMs have a tendency to
memorize potentially private or copyrighted information present in the training
data, which might then be delivered to end users at inference time. When this
happens, a naive solution is to retrain the model from scratch after excluding
the undesired data. Although this guarantees that the target data have been
forgotten, it is also prohibitively expensive for LLMs. Approximate unlearning
offers a more efficient alternative, as it consists of ex post modifications of
the trained model itself to prevent undesirable results, but it lacks
forgetting guarantees because it relies solely on empirical evidence. In this
work, we present DP2Unlearning, a novel LLM unlearning framework that offers
formal forgetting guarantees at a significantly lower cost than retraining from
scratch on the data to be retained. DP2Unlearning involves training LLMs on
textual data protected using {\epsilon}-differential privacy (DP), which later
enables efficient unlearning with the guarantees against disclosure associated
with the chosen {\epsilon}. Our experiments demonstrate that DP2Unlearning
achieves similar model performance post-unlearning, compared to an LLM
retraining from scratch on retained data -- the gold standard exact unlearning
-- but at approximately half the unlearning cost. In addition, with a
reasonable computational cost, it outperforms approximate unlearning methods at
both preserving the utility of the model post-unlearning and effectively
forgetting the targeted information.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 16:22:20 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Mahmud",
"Tamim Al",
""
],
[
"Jebreel",
"Najeeb",
""
],
[
"Domingo-Ferrer",
"Josep",
""
],
[
"Sanchez",
"David",
""
]
] |
2504.13776 | Aman Agarwal | Aman Agarwal, James Gearon, Raksha Rank, Etienne Chenevert | Fighting Fires from Space: Leveraging Vision Transformers for Enhanced
Wildfire Detection and Characterization | null | null | null | null | cs.CV eess.IV | http://creativecommons.org/licenses/by/4.0/ | Wildfires are increasing in intensity, frequency, and duration across large
parts of the world as a result of anthropogenic climate change. Modern hazard
detection and response systems that deal with wildfires are under-equipped for
sustained wildfire seasons. Recent work has proved automated wildfire detection
using Convolutional Neural Networks (CNNs) trained on satellite imagery are
capable of high-accuracy results. However, CNNs are computationally expensive
to train and only incorporate local image context. Recently, Vision
Transformers (ViTs) have gained popularity for their efficient training and
their ability to include both local and global contextual information. In this
work, we show that ViT can outperform well-trained and specialized CNNs to
detect wildfires on a previously published dataset of LandSat-8 imagery. One of
our ViTs outperforms the baseline CNN comparison by 0.92%. However, we find our
own implementation of CNN-based UNet to perform best in every category, showing
their sustained utility in image tasks. Overall, ViTs are comparably capable in
detecting wildfires as CNNs, though well-tuned CNNs are still the best
technique for detecting wildfire with our UNet providing an IoU of 93.58%,
better than the baseline UNet by some 4.58%.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 16:25:54 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Agarwal",
"Aman",
""
],
[
"Gearon",
"James",
""
],
[
"Rank",
"Raksha",
""
],
[
"Chenevert",
"Etienne",
""
]
] |
2504.13777 | Anqi Shao | Anqi Shao | Beyond Misinformation: A Conceptual Framework for Studying AI
Hallucinations in (Science) Communication | null | null | null | null | cs.HC | http://creativecommons.org/licenses/by-nc-sa/4.0/ | This paper proposes a conceptual framework for understanding AI
hallucinations as a distinct form of misinformation. While misinformation
scholarship has traditionally focused on human intent, generative AI systems
now produce false yet plausible outputs absent of such intent. I argue that
these AI hallucinations should not be treated merely as technical failures but
as communication phenomena with social consequences. Drawing on a
supply-and-demand model and the concept of distributed agency, the framework
outlines how hallucinations differ from human-generated misinformation in
production, perception, and institutional response. I conclude by outlining a
research agenda for communication scholars to investigate the emergence,
dissemination, and audience reception of hallucinated content, with attention
to macro (institutional), meso (group), and micro (individual) levels. This
work urges communication researchers to rethink the boundaries of
misinformation theory in light of probabilistic, non-human actors increasingly
embedded in knowledge production.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 16:26:02 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Shao",
"Anqi",
""
]
] |
2504.13778 | Nadezhda Semenova Dr. | Ivan Kolesnikov and Nadezhda Semenova | Internal noise in hardware deep and recurrent neural networks helps with
learning | 8 pages 5 figures | null | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, the field of hardware neural networks has been actively developing,
where neurons and their connections are not simulated on a computer but are
implemented at the physical level, transforming the neural network into a
tangible device. In this paper, we investigate how internal noise during the
training of neural networks affects the final performance of recurrent and deep
neural networks. We consider feedforward networks (FNN) and echo state networks
(ESN) as examples. The types of noise examined originated from a real optical
implementation of a neural network. However, these types were subsequently
generalized to enhance the applicability of our findings on a broader scale.
The noise types considered include additive and multiplicative noise, which
depend on how noise influences each individual neuron, and correlated and
uncorrelated noise, which pertains to the impact of noise on groups of neurons
(such as the hidden layer of FNNs or the reservoir of ESNs). In this paper, we
demonstrate that, in most cases, both deep and echo state networks benefit from
internal noise during training, as it enhances their resilience to noise.
Consequently, the testing performance at the same noise intensities is
significantly higher for networks trained with noise than for those trained
without it. Notably, only multiplicative correlated noise during training has
minimal has almost no impact on both deep and recurrent networks.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 16:26:46 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Kolesnikov",
"Ivan",
""
],
[
"Semenova",
"Nadezhda",
""
]
] |
2504.13779 | Thomas J. Maldonado | Thomas J. Maldonado, Alejandro W. Rodriguez, Hakan E. T\"ureci | Quantum theory of the Josephson junction between finite islands | 5 pages, 3 figures | null | null | null | quant-ph cond-mat.supr-con | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Superconducting circuits comprising Josephson junctions have spurred
significant research activity due to their promise to realize scalable quantum
computers. Effective Hamiltonians for these systems have traditionally been
derived assuming the junction connects superconducting islands of infinite
size. We derive a quantized Hamiltonian for a Josephson junction between
finite-sized islands and predict measurable corrections to the qubit frequency
and charge susceptibility to test the theory.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 16:27:10 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Maldonado",
"Thomas J.",
""
],
[
"Rodriguez",
"Alejandro W.",
""
],
[
"Türeci",
"Hakan E.",
""
]
] |
2504.13780 | Madhu Dhiman | Madhu Dhiman, Atul Maurya, Veeraruna Kavitha and Priyank Sinha | Punitive policies to combat misreporting in dynamic supply chains | null | null | null | null | math.OC | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Wholesale price contracts are known to be associated with double
marginalization effects, which prevents supply chains from achieving their true
market share. In a dynamic setting under information asymmetry, these
inefficiencies manifest in the form of misreporting of the market potential by
the manufacturer to the supplier, again leading to the loss of market share. We
pose the dynamics of interaction between the supplier and manufacturer as the
Stackelberg game and develop theoretical results for optimal punitive
strategies that the supplier can implement to ensure that the manufacturer
truthfully reveals the market potential in the single-stage setting. Later, we
validate these results through the randomly generated, Monte-Carlo simulation
based numerical examples.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 16:29:38 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Dhiman",
"Madhu",
""
],
[
"Maurya",
"Atul",
""
],
[
"Kavitha",
"Veeraruna",
""
],
[
"Sinha",
"Priyank",
""
]
] |
2504.13781 | Divan Aristo Burger Dr | Divan A. Burger, Sean van der Merwe, Emmanuel Lesaffre | Addressing outliers in mixed-effects logistic regression: a more robust
modeling approach | null | null | null | null | stat.ME | http://creativecommons.org/licenses/by/4.0/ | This study introduces an outlier-robust model for analyzing hierarchically
structured bounded count data within a Bayesian framework, utilizing a logistic
regression approach implemented in JAGS. Our model incorporates a t-distributed
latent variable to address overdispersion and outliers, improving robustness
compared to conventional models such as the beta-binomial,
binomial-logit-normal, and standard binomial models. Notably, our approach
models the median of the response variable, presenting a more convenient and
interpretable measure of central tendency, which is available in closed form.
For comparability between all models, we also make predictions based on the
mean proportion; however, this involves an integration step for the
t-distributed nuisance parameter. While limited literature specifically
addresses outliers in mixed models for bounded count data, this research fills
that gap. The practical utility of the model is demonstrated using a
longitudinal medication adherence dataset, where patient behavior often results
in abrupt changes and outliers within individual trajectories. A simulation
study demonstrates the binomial-logit-t model's strong performance, with
comparison statistics favoring it among the four evaluated models. An
additional data contamination simulation confirms its robustness against
outliers. Our robust approach maintains the integrity of the dataset,
effectively handling outliers to provide more accurate and reliable parameter
estimates.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 16:33:03 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Burger",
"Divan A.",
""
],
[
"van der Merwe",
"Sean",
""
],
[
"Lesaffre",
"Emmanuel",
""
]
] |
2504.13782 | Kuan-Cheng Chen | Wenxuan Ma, Kuan-Cheng Chen, Shang Yu, Mengxiang Liu, Ruilong Deng | Robust Decentralized Quantum Kernel Learning for Noisy and Adversarial
Environment | null | null | null | null | quant-ph cs.DC | http://creativecommons.org/licenses/by/4.0/ | This paper proposes a general decentralized framework for quantum kernel
learning (QKL). It has robustness against quantum noise and can also be
designed to defend adversarial information attacks forming a robust approach
named RDQKL. We analyze the impact of noise on QKL and study the robustness of
decentralized QKL to the noise. By integrating robust decentralized
optimization techniques, our method is able to mitigate the impact of malicious
data injections across multiple nodes. Experimental results demonstrate that
our approach maintains high accuracy under noisy quantum operations and
effectively counter adversarial modifications, offering a promising pathway
towards the future practical, scalable and secure quantum machine learning
(QML).
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 16:33:07 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Ma",
"Wenxuan",
""
],
[
"Chen",
"Kuan-Cheng",
""
],
[
"Yu",
"Shang",
""
],
[
"Liu",
"Mengxiang",
""
],
[
"Deng",
"Ruilong",
""
]
] |
2504.13783 | Ivana Vukorepa | Dra\v{z}en Adamovi\'c, Ivana Vukorepa | A new quasi-lisse affine vertex algebra of type $D_4$ | 13 pages | null | null | null | math.QA math-ph math.MP math.RT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a family of potential quasi-lisse affine vertex algebras
$L_{k_m}(D_4)$ at levels $k_m =-6 + \frac{4}{2m+1}$. In the case $m=0$, the
irreducible $L_{k_0}(D_4)$--modules were classified in arXiv:1205.3003, and it
was proved in arXiv:1610.05865 that $L_{k_0}(D_4)$ is a quasi-lisse vertex
algebra. We conjecture that $L_{k_m}(D_4)$ is quasi-lisse for every $m \in
{\mathbb{Z}}_{>0}$, and that it contains a unique irreducible ordinary module.
In this article we prove this conjecture for $m=1$, by using mostly
computational methods. We show that the maximal ideal in the universal affine
vertex algebra $V^{k_1}(D_4)$ is generated by three singular vectors of
conformal weight six. The explicit formulas were obtained using software. Then
we apply Zhu's theory and classify all irreducible $L_{k_1}(D_4)$--modules. It
turns out that $L_{k_1}(D_4)$ has $405$ irreducible modules in the category
$\mathcal O$, but a unique irreducible ordinary module. Finally, we prove that
$L_{k_1}(D_4)$ is quasi-lisse by showing that its associated variety is
contained in the nilpotent cone of $D_4$.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 16:34:34 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Adamović",
"Dražen",
""
],
[
"Vukorepa",
"Ivana",
""
]
] |
2504.13784 | Andrew Ryzhikov | Stefan Kiefer, Andrew Ryzhikov | The complexity of reachability problems in strongly connected finite
automata | null | null | null | null | cs.FL | http://creativecommons.org/licenses/by/4.0/ | Several reachability problems in finite automata, such as completeness of
NFAs and synchronisation of total DFAs, correspond to fundamental properties of
sets of nonnegative matrices. In particular, the two mentioned properties
correspond to matrix mortality and ergodicity, which ask whether there exists a
product of the input matrices that is equal to, respectively, the zero matrix
and a matrix with a column of strictly positive entries only. The case where
the input automaton is strongly connected (that is, the corresponding set of
nonnegative matrices is irreducible) frequently appears in applications and
often admits better properties than the general case. In this paper, we address
the existence of such properties from the computational complexity point of
view, and develop a versatile technique to show that several NL-complete
problems remain NL-complete in the strongly connected case. Namely, we show
that deciding if a binary total DFA is synchronising is NL-complete even if it
is promised to be strongly connected, and that deciding completeness of a
binary unambiguous NFA with very limited nondeterminism is NL-complete under
the same promise.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 16:34:41 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Kiefer",
"Stefan",
""
],
[
"Ryzhikov",
"Andrew",
""
]
] |
2504.13785 | Steffen Hagedorn | Steffen Hagedorn, Aron Distelzweig, Marcel Hallgarten, Alexandru P.
Condurache | Learning Through Retrospection: Improving Trajectory Prediction for
Automated Driving with Error Feedback | null | null | null | null | cs.RO cs.AI cs.CV | http://creativecommons.org/licenses/by-nc-sa/4.0/ | In automated driving, predicting trajectories of surrounding vehicles
supports reasoning about scene dynamics and enables safe planning for the ego
vehicle. However, existing models handle predictions as an instantaneous task
of forecasting future trajectories based on observed information. As time
proceeds, the next prediction is made independently of the previous one, which
means that the model cannot correct its errors during inference and will repeat
them. To alleviate this problem and better leverage temporal data, we propose a
novel retrospection technique. Through training on closed-loop rollouts the
model learns to use aggregated feedback. Given new observations it reflects on
previous predictions and analyzes its errors to improve the quality of
subsequent predictions. Thus, the model can learn to correct systematic errors
during inference. Comprehensive experiments on nuScenes and Argoverse
demonstrate a considerable decrease in minimum Average Displacement Error of up
to 31.9% compared to the state-of-the-art baseline without retrospection. We
further showcase the robustness of our technique by demonstrating a better
handling of out-of-distribution scenarios with undetected road-users.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 16:35:12 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Hagedorn",
"Steffen",
""
],
[
"Distelzweig",
"Aron",
""
],
[
"Hallgarten",
"Marcel",
""
],
[
"Condurache",
"Alexandru P.",
""
]
] |
2504.13786 | Lorenz Kummer BSc MSc | Lorenz Kummer, Wilfried N. Gansterer, Nils M. Kriege | On the Relationship Between Robustness and Expressivity of Graph Neural
Networks | Accepted at AISTAST 2025, will add DOI when available | null | null | null | cs.LG | http://creativecommons.org/licenses/by/4.0/ | We investigate the vulnerability of Graph Neural Networks (GNNs) to bit-flip
attacks (BFAs) by introducing an analytical framework to study the influence of
architectural features, graph properties, and their interaction.
The expressivity of GNNs refers to their ability to distinguish
non-isomorphic graphs and depends on the encoding of node neighborhoods. We
examine the vulnerability of neural multiset functions commonly used for this
purpose and establish formal criteria to characterize a GNN's susceptibility to
losing expressivity due to BFAs. This enables an analysis of the impact of
homophily, graph structural variety, feature encoding, and activation functions
on GNN robustness. We derive theoretical bounds for the number of bit flips
required to degrade GNN expressivity on a dataset, identifying ReLU-activated
GNNs operating on highly homophilous graphs with low-dimensional or one-hot
encoded features as particularly susceptible. Empirical results using ten
real-world datasets confirm the statistical significance of our key theoretical
insights and offer actionable results to mitigate BFA risks in
expressivity-critical applications.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 16:38:33 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Kummer",
"Lorenz",
""
],
[
"Gansterer",
"Wilfried N.",
""
],
[
"Kriege",
"Nils M.",
""
]
] |
2504.13787 | Anton Xue | Helen Jin, Anton Xue, Weiqiu You, Surbhi Goel, Eric Wong | Probabilistic Stability Guarantees for Feature Attributions | null | null | null | null | cs.LG cs.AI | http://creativecommons.org/licenses/by/4.0/ | Stability guarantees are an emerging tool for evaluating feature
attributions, but existing certification methods rely on smoothed classifiers
and often yield conservative guarantees. To address these limitations, we
introduce soft stability and propose a simple, model-agnostic, and
sample-efficient stability certification algorithm (SCA) that provides
non-trivial and interpretable guarantees for any attribution. Moreover, we show
that mild smoothing enables a graceful tradeoff between accuracy and stability,
in contrast to prior certification methods that require a more aggressive
compromise. Using Boolean function analysis, we give a novel characterization
of stability under smoothing. We evaluate SCA on vision and language tasks, and
demonstrate the effectiveness of soft stability in measuring the robustness of
explanation methods.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 16:39:08 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Jin",
"Helen",
""
],
[
"Xue",
"Anton",
""
],
[
"You",
"Weiqiu",
""
],
[
"Goel",
"Surbhi",
""
],
[
"Wong",
"Eric",
""
]
] |
2504.13788 | Yixuan Yang | Yixuan Yang, Jinyu Yang, Zixiang Zhao, Victor Sanchez, Feng Zheng | RefComp: A Reference-guided Unified Framework for Unpaired Point Cloud
Completion | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The unpaired point cloud completion task aims to complete a partial point
cloud by using models trained with no ground truth. Existing unpaired point
cloud completion methods are class-aware, i.e., a separate model is needed for
each object class. Since they have limited generalization capabilities, these
methods perform poorly in real-world scenarios when confronted with a wide
range of point clouds of generic 3D objects. In this paper, we propose a novel
unpaired point cloud completion framework, namely the Reference-guided
Completion (RefComp) framework, which attains strong performance in both the
class-aware and class-agnostic training settings. The RefComp framework
transforms the unpaired completion problem into a shape translation problem,
which is solved in the latent feature space of the partial point clouds. To
this end, we introduce the use of partial-complete point cloud pairs, which are
retrieved by using the partial point cloud to be completed as a template. These
point cloud pairs are used as reference data to guide the completion process.
Our RefComp framework uses a reference branch and a target branch with shared
parameters for shape fusion and shape translation via a Latent Shape Fusion
Module (LSFM) to enhance the structural features along the completion pipeline.
Extensive experiments demonstrate that the RefComp framework achieves not only
state-of-the-art performance in the class-aware training setting but also
competitive results in the class-agnostic training setting on both virtual
scans and real-world datasets.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 16:40:16 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Yang",
"Yixuan",
""
],
[
"Yang",
"Jinyu",
""
],
[
"Zhao",
"Zixiang",
""
],
[
"Sanchez",
"Victor",
""
],
[
"Zheng",
"Feng",
""
]
] |
2504.13789 | Zhiqing Zhang | Michel Davier, Bogdan Malaescu, Zhiqing Zhang | Data-based form factor corrections between the two-pion $\tau$ and
$e^+e^-$ spectral functions | 17 pages, 9 figures, 3 tables | null | null | null | hep-ph hep-ex | http://creativecommons.org/licenses/by/4.0/ | The $\tau$ spectral functions are an alternative to $e^+e^-$ cross-sections,
where different measurements are not consistent, for computing the hadronic
vacuum contribution to the muon magnetic anomaly $a_\mu$. This requires a
control of isospin-breaking effects which have to be corrected for. So far
these corrections have been evaluated using theoretical models. In this letter,
a new approach based only on data is presented for the determination of the
most critical correction relating the $e^+e^-$ and $\tau$ pion form factors. An
updated evaluation of the total isospin-breaking correction is given and its
impact is discussed in the context of $e^+e^-$-based $a_\mu$ predictions and of
the direct measurement.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 16:42:16 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Davier",
"Michel",
""
],
[
"Malaescu",
"Bogdan",
""
],
[
"Zhang",
"Zhiqing",
""
]
] |
2504.13790 | James Brusseau | James Brusseau (Philosophy and Computer Science, Pace University, New
York City, USA and Department of Information Engineering and Computer
Science. University of Trento, Italy) | Four Bottomless Errors and the Collapse of Statistical Fairness | null | null | 10.13140/RG.2.2.36548.95367 | null | cs.CY | http://creativecommons.org/licenses/by-nc-sa/4.0/ | The AI ethics of statistical fairness is an error, the approach should be
abandoned, and the accumulated academic work deleted. The argument proceeds by
identifying four recurring mistakes within statistical fairness. One conflates
fairness with equality, which confines thinking to similars being treated
similarly. The second and third errors derive from a perspectival ethical view
which functions by negating others and their viewpoints. The final mistake
constrains fairness to work within predefined social groups instead of allowing
unconstrained fairness to subsequently define group composition. From the
nature of these misconceptions, the larger argument follows. Because the errors
are integral to how statistical fairness works, attempting to resolve the
difficulties only deepens them. Consequently, the errors cannot be corrected
without undermining the larger project, and statistical fairness collapses from
within. While the collapse ends a failure in ethics, it also provokes distinct
possibilities for fairness, data, and algorithms. Quickly indicating some of
these directions is a secondary aim of the paper, and one that aligns with what
fairness has consistently meant and done since Aristotle.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 16:42:49 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Brusseau",
"James",
"",
"Philosophy and Computer Science, Pace University, New\n York City, USA and Department of Information Engineering and Computer\n Science. University of Trento, Italy"
]
] |
2504.13791 | Sandipan Dhar | Sandipan Dhar and Md. Tousin Akhter and Nanda Dulal Jana and Swagatam
Das | Collective Learning Mechanism based Optimal Transport Generative
Adversarial Network for Non-parallel Voice Conversion | 7 pages, 2 figures, 3 tables | null | null | null | cs.SD cs.AI eess.AS | http://creativecommons.org/licenses/by/4.0/ | After demonstrating significant success in image synthesis, Generative
Adversarial Network (GAN) models have likewise made significant progress in the
field of speech synthesis, leveraging their capacity to adapt the precise
distribution of target data through adversarial learning processes. Notably, in
the realm of State-Of-The-Art (SOTA) GAN-based Voice Conversion (VC) models,
there exists a substantial disparity in naturalness between real and
GAN-generated speech samples. Furthermore, while many GAN models currently
operate on a single generator discriminator learning approach, optimizing
target data distribution is more effectively achievable through a single
generator multi-discriminator learning scheme. Hence, this study introduces a
novel GAN model named Collective Learning Mechanism-based Optimal Transport GAN
(CLOT-GAN) model, incorporating multiple discriminators, including the Deep
Convolutional Neural Network (DCNN) model, Vision Transformer (ViT), and
conformer. The objective of integrating various discriminators lies in their
ability to comprehend the formant distribution of mel-spectrograms, facilitated
by a collective learning mechanism. Simultaneously, the inclusion of Optimal
Transport (OT) loss aims to precisely bridge the gap between the source and
target data distribution, employing the principles of OT theory. The
experimental validation on VCC 2018, VCTK, and CMU-Arctic datasets confirms
that the CLOT-GAN-VC model outperforms existing VC models in objective and
subjective assessments.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 16:44:01 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Dhar",
"Sandipan",
""
],
[
"Akhter",
"Md. Tousin",
""
],
[
"Jana",
"Nanda Dulal",
""
],
[
"Das",
"Swagatam",
""
]
] |
2504.13792 | Weizhi Lu | Weizhi Lu, Mingrui Chen, Weiyu Li | The Binary and Ternary Quantization Can Improve Feature Discrimination | null | null | null | null | cs.LG | http://creativecommons.org/licenses/by/4.0/ | In machine learning, quantization is widely used to simplify data
representation and facilitate algorithm deployment on hardware. Given the
fundamental role of classification in machine learning, it is crucial to
investigate the impact of quantization on classification. Current research
primarily focuses on quantization errors, operating under the premise that
higher quantization errors generally result in lower classification
performance. However, this premise lacks a solid theoretical foundation and
often contradicts empirical findings. For instance, certain extremely low
bit-width quantization methods, such as $\{0,1\}$-binary quantization and $\{0,
\pm1\}$-ternary quantization, can achieve comparable or even superior
classification accuracy compared to the original non-quantized data, despite
exhibiting high quantization errors. To more accurately evaluate classification
performance, we propose to directly investigate the feature discrimination of
quantized data, instead of analyzing its quantization error. Interestingly, it
is found that both binary and ternary quantization methods can improve, rather
than degrade, the feature discrimination of the original data. This remarkable
performance is validated through classification experiments across various data
types, including images, speech, and texts.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 16:44:12 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Lu",
"Weizhi",
""
],
[
"Chen",
"Mingrui",
""
],
[
"Li",
"Weiyu",
""
]
] |
2504.13793 | Takuya Sera | Takuya Sera, Yusuke Hamano | ChatNekoHacker: Real-Time Fan Engagement with Conversational Agents | Accepted to GenAICHI 2025: Generative AI and HCI at CHI 2025 | null | null | null | cs.HC | http://creativecommons.org/licenses/by/4.0/ | ChatNekoHacker is a real-time conversational agent system that strengthens
fan engagement for musicians. It integrates Amazon Bedrock Agents for
autonomous dialogue, Unity for immersive 3D livestream sets, and VOICEVOX for
high quality Japanese text-to-speech, enabling two virtual personas to
represent the music duo Neko Hacker. In a one-hour YouTube Live with 30
participants, we evaluated the impact of the system. Regression analysis showed
that agent interaction significantly elevated fan interest, with perceived fun
as the dominant predictor. The participants also expressed a stronger intention
to listen to the duo's music and attend future concerts. These findings
highlight entertaining, interactive broadcasts as pivotal to cultivating
fandom. Our work offers actionable insights for the deployment of
conversational agents in entertainment while pointing to next steps: broader
response diversity, lower latency, and tighter fact-checking to curb potential
misinformation.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 16:48:30 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Sera",
"Takuya",
""
],
[
"Hamano",
"Yusuke",
""
]
] |
2504.13794 | Mark Moeller | Mark Moeller, Tiago Ferreira, Thomas Lu, Nate Foster, Alexandra Silva | Active Learning of Symbolic NetKAT Automata | Appearing in PLDI 2025 | null | 10.1145/3729295 | null | cs.PL | http://creativecommons.org/licenses/by/4.0/ | NetKAT is a domain-specific programming language and logic that has been
successfully used to specify and verify the behavior of packet-switched
networks. This paper develops techniques for automatically learning NetKAT
models of unknown networks using active learning. Prior work has explored
active learning for a wide range of automata (e.g., deterministic, register,
B\"uchi, timed etc.) and also developed applications, such as validating
implementations of network protocols. We present algorithms for learning
different types of NetKAT automata, including symbolic automata proposed in
recent work. We prove the soundness of these algorithms, build a prototype
implementation, and evaluate it on a standard benchmark. Our results highlight
the applicability of symbolic NetKAT learning for realistic network
configurations and topologies.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 16:55:29 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Moeller",
"Mark",
""
],
[
"Ferreira",
"Tiago",
""
],
[
"Lu",
"Thomas",
""
],
[
"Foster",
"Nate",
""
],
[
"Silva",
"Alexandra",
""
]
] |
2504.13795 | Jason Murphy | Gong Chen, Jason Murphy | Stability of nonlinear recovery from scattering and modified scattering
maps | 10 pages | null | null | null | math.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We prove stability estimates for the recovery of the nonlinearity from the
scattering or modified scattering map for one-dimensional nonlinear
Schr\"odinger equations. We consider nonlinearities of the form $a(x) |u|^p u$
for $p\in [2,4]$ and $[1+a(x)]|u|^2 u$, where $a$ is a localized function. In
the first case, we show that for $p\in(2,4]$ we may obtain a H\"older-type
stability estimate for recovery via the scattering map, while for $p=2$ we
obtain a logarithmic stability estimate. In the second case, we show a
logarithmic stability estimate for recovery via the modified scattering map.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 16:56:18 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Chen",
"Gong",
""
],
[
"Murphy",
"Jason",
""
]
] |
2504.13796 | Antonio Bianconi Prof. | Gaetano Campi, Massimiliano Catricala, Giuseppe Chita, Luisa Barba,
Luchuan Shi, Jianfa Zhao, Changing Jin, Antonio Bianconi | Lattice Quantum Geometry Controlling 118 K Multigap Superconductivity in
Heavily Overdoped CuBa2Ca3Cu4O10+d | 16 pages, 4 figures | null | null | null | cond-mat.supr-con quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Synchrotron X-ray diffraction has been used to study the thermal structure
evolution in CuBa2Ca3Cu4O10+d (Cu1234), a superconductor which exhibits a high
critical temperature (Tc 118 K), high critical current density and large upper
critical magnetic field. The lattice geometry at nanoscale of this cuprate
belongs to the class of natural heterostructures at atomic limit like the
artificial high Tc superlattices made of interface space charge in Mott
insulator units intercalated by metal units. Temperature-dependent lattice
parameters reveal a distinct structural transition at TC characterized by a
drop of the c-axis and in plane Cu-O negative thermal expansion below TC. These
results provide clear evidence of lattice reorganization associated with the
chemical potential changes due to the opening of multiple superconducting gaps.
Additionally, evidence for oxygen defects rearrangement is observed at
temperatures above 200 K. We construct a phase diagram correlating temperature,
the c/a axis ratio, and in plane Cu-O strain, identifying regions associated
with gaps opening and oxygen rearrangement. These findings provide new insights
into how lattice geometry control superconductivity to inform the material
design of advanced nanoscale superconducting artificial quantum
heterostructures.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 16:57:03 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Campi",
"Gaetano",
""
],
[
"Catricala",
"Massimiliano",
""
],
[
"Chita",
"Giuseppe",
""
],
[
"Barba",
"Luisa",
""
],
[
"Shi",
"Luchuan",
""
],
[
"Zhao",
"Jianfa",
""
],
[
"Jin",
"Changing",
""
],
[
"Bianconi",
"Antonio",
""
]
] |
2504.13797 | Yu Wang | Yu Wang, Shujie Liu, Shuai Lv, Gengshuo Liu | Meta-Learning and Knowledge Discovery based Physics-Informed Neural
Network for Remaining Useful Life Prediction | 34 pages,20 figs | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Predicting the remaining useful life (RUL) of rotating machinery is critical
for industrial safety and maintenance, but existing methods struggle with
scarce target-domain data and unclear degradation dynamics. We propose a
Meta-Learning and Knowledge Discovery-based Physics-Informed Neural Network
(MKDPINN) to address these challenges. The method first maps noisy sensor data
to a low-dimensional hidden state space via a Hidden State Mapper (HSM). A
Physics-Guided Regulator (PGR) then learns unknown nonlinear PDEs governing
degradation evolution, embedding these physical constraints into the PINN
framework. This integrates data-driven and physics-based approaches. The
framework uses meta-learning, optimizing across source-domain meta-tasks to
enable few-shot adaptation to new target tasks. Experiments on industrial data
and the C-MAPSS benchmark show MKDPINN outperforms baselines in generalization
and accuracy, proving its effectiveness for RUL prediction under data scarcity
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 16:58:38 GMT"
}
] | 2025-04-21T00:00:00 | [
[
"Wang",
"Yu",
""
],
[
"Liu",
"Shujie",
""
],
[
"Lv",
"Shuai",
""
],
[
"Liu",
"Gengshuo",
""
]
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.