-
TreeBoN: Enhancing Inference-Time Alignment with Speculative Tree-Search and Best-of-N Sampling
Authors:
Jiahao Qiu,
Yifu Lu,
Yifan Zeng,
Jiacheng Guo,
Jiayi Geng,
Huazheng Wang,
Kaixuan Huang,
Yue Wu,
Mengdi Wang
Abstract:
Inference-time alignment enhances the performance of large language models without requiring additional training or fine-tuning but presents challenges due to balancing computational efficiency with high-quality output. Best-of-N (BoN) sampling, as a simple yet powerful approach, generates multiple responses and selects the best one, achieving improved performance but with a high computational cos…
▽ More
Inference-time alignment enhances the performance of large language models without requiring additional training or fine-tuning but presents challenges due to balancing computational efficiency with high-quality output. Best-of-N (BoN) sampling, as a simple yet powerful approach, generates multiple responses and selects the best one, achieving improved performance but with a high computational cost. We propose TreeBoN, a novel framework that integrates a speculative tree-search strategy into Best-of-N (BoN) Sampling. TreeBoN maintains a set of parent nodes, iteratively branching and pruning low-quality responses, thereby reducing computational overhead while maintaining high output quality. Our approach also leverages token-level rewards from Direct Preference Optimization (DPO) to guide tree expansion and prune low-quality paths. We evaluate TreeBoN using AlpacaFarm, UltraFeedback, GSM8K, HH-RLHF, and TutorEval datasets, demonstrating consistent improvements. Specifically, TreeBoN achieves a 65% win rate at maximum lengths of 192 and 384 tokens, outperforming standard BoN with the same computational cost. Furthermore, TreeBoN achieves around a 60% win rate across longer responses, showcasing its scalability and alignment efficacy.
△ Less
Submitted 18 October, 2024;
originally announced October 2024.
-
START: A Generalized State Space Model with Saliency-Driven Token-Aware Transformation
Authors:
Jintao Guo,
Lei Qi,
Yinghuan Shi,
Yang Gao
Abstract:
Domain Generalization (DG) aims to enable models to generalize to unseen target domains by learning from multiple source domains. Existing DG methods primarily rely on convolutional neural networks (CNNs), which inherently learn texture biases due to their limited receptive fields, making them prone to overfitting source domains. While some works have introduced transformer-based methods (ViTs) fo…
▽ More
Domain Generalization (DG) aims to enable models to generalize to unseen target domains by learning from multiple source domains. Existing DG methods primarily rely on convolutional neural networks (CNNs), which inherently learn texture biases due to their limited receptive fields, making them prone to overfitting source domains. While some works have introduced transformer-based methods (ViTs) for DG to leverage the global receptive field, these methods incur high computational costs due to the quadratic complexity of self-attention. Recently, advanced state space models (SSMs), represented by Mamba, have shown promising results in supervised learning tasks by achieving linear complexity in sequence length during training and fast RNN-like computation during inference. Inspired by this, we investigate the generalization ability of the Mamba model under domain shifts and find that input-dependent matrices within SSMs could accumulate and amplify domain-specific features, thus hindering model generalization. To address this issue, we propose a novel SSM-based architecture with saliency-based token-aware transformation (namely START), which achieves state-of-the-art (SOTA) performances and offers a competitive alternative to CNNs and ViTs. Our START can selectively perturb and suppress domain-specific features in salient tokens within the input-dependent matrices of SSMs, thus effectively reducing the discrepancy between different domains. Extensive experiments on five benchmarks demonstrate that START outperforms existing SOTA DG methods with efficient linear complexity. Our code is available at https://github.com/lingeringlight/START.
△ Less
Submitted 21 October, 2024;
originally announced October 2024.
-
Random Token Fusion for Multi-View Medical Diagnosis
Authors:
Jingyu Guo,
Christos Matsoukas,
Fredrik Strand,
Kevin Smith
Abstract:
In multi-view medical diagnosis, deep learning-based models often fuse information from different imaging perspectives to improve diagnostic performance. However, existing approaches are prone to overfitting and rely heavily on view-specific features, which can lead to trivial solutions. In this work, we introduce Random Token Fusion (RTF), a novel technique designed to enhance multi-view medical…
▽ More
In multi-view medical diagnosis, deep learning-based models often fuse information from different imaging perspectives to improve diagnostic performance. However, existing approaches are prone to overfitting and rely heavily on view-specific features, which can lead to trivial solutions. In this work, we introduce Random Token Fusion (RTF), a novel technique designed to enhance multi-view medical image analysis using vision transformers. By integrating randomness into the feature fusion process during training, RTF addresses the issue of overfitting and enhances the robustness and accuracy of diagnostic models without incurring any additional cost at inference. We validate our approach on standard mammography and chest X-ray benchmark datasets. Through extensive experiments, we demonstrate that RTF consistently improves the performance of existing fusion methods, paving the way for a new generation of multi-view medical foundation models.
△ Less
Submitted 21 October, 2024;
originally announced October 2024.
-
Quantum-Confined Tunable Ferromagnetism on the Surface of a van der Waals Antiferromagnet NaCrTe2
Authors:
Yidian Li,
Xian Du,
Junjie Wang,
Runzhe Xu,
Wenxuan Zhao,
Kaiyi Zhai,
Jieyi Liu,
Houke Chen,
Yiheng Yang,
Nicolas C. Plumb,
Sailong Ju,
Ming Shi,
Zhongkai Liu,
Jiangang Guo,
Xiaolong Chen,
Yulin Chen,
Lexian Yang
Abstract:
The surface of three-dimensional materials provides an ideal and versatile platform to explore quantum-confined physics. Here, we systematically investigate the electronic structure of Na-intercalated CrTe2, a van der Waals antiferromagnet, using angle-resolved photoemission spectroscopy and ab-initio calculations. The measured band structure deviates from the calculation of bulk NaCrTe2 but agree…
▽ More
The surface of three-dimensional materials provides an ideal and versatile platform to explore quantum-confined physics. Here, we systematically investigate the electronic structure of Na-intercalated CrTe2, a van der Waals antiferromagnet, using angle-resolved photoemission spectroscopy and ab-initio calculations. The measured band structure deviates from the calculation of bulk NaCrTe2 but agrees with that of ferromagnetic monolayer CrTe2. Consistently, we observe an unexpected exchange splitting of the band dispersions, persisting well above the Néel temperature of bulk NaCrTe2. We argue that NaCrTe2 features a quantum-confined 2D ferromagnetic state in the topmost surface layer due to strong ferromagnetic correlation in the CrTe2 layer. Moreover, the exchange splitting and the critical temperature can be controlled by surface doping of alkali-metal atoms, suggesting a feasible tunability of the surface ferromagnetism. Our work not only presents a simple platform to explore tunable 2D ferromagnetism but also provides important insights into the quantum-confined low-dimensional magnetic states.
△ Less
Submitted 18 October, 2024;
originally announced October 2024.
-
De-mark: Watermark Removal in Large Language Models
Authors:
Ruibo Chen,
Yihan Wu,
Junfeng Guo,
Heng Huang
Abstract:
Watermarking techniques offer a promising way to identify machine-generated content via embedding covert information into the contents generated from language models (LMs). However, the robustness of the watermarking schemes has not been well explored. In this paper, we present De-mark, an advanced framework designed to remove n-gram-based watermarks effectively. Our method utilizes a novel queryi…
▽ More
Watermarking techniques offer a promising way to identify machine-generated content via embedding covert information into the contents generated from language models (LMs). However, the robustness of the watermarking schemes has not been well explored. In this paper, we present De-mark, an advanced framework designed to remove n-gram-based watermarks effectively. Our method utilizes a novel querying strategy, termed random selection probing, which aids in assessing the strength of the watermark and identifying the red-green list within the n-gram watermark. Experiments on popular LMs, such as Llama3 and ChatGPT, demonstrate the efficiency and effectiveness of De-mark in watermark removal and exploitation tasks.
△ Less
Submitted 17 October, 2024;
originally announced October 2024.
-
A Watermark for Order-Agnostic Language Models
Authors:
Ruibo Chen,
Yihan Wu,
Yanshuo Chen,
Chenxi Liu,
Junfeng Guo,
Heng Huang
Abstract:
Statistical watermarking techniques are well-established for sequentially decoded language models (LMs). However, these techniques cannot be directly applied to order-agnostic LMs, as the tokens in order-agnostic LMs are not generated sequentially. In this work, we introduce Pattern-mark, a pattern-based watermarking framework specifically designed for order-agnostic LMs. We develop a Markov-chain…
▽ More
Statistical watermarking techniques are well-established for sequentially decoded language models (LMs). However, these techniques cannot be directly applied to order-agnostic LMs, as the tokens in order-agnostic LMs are not generated sequentially. In this work, we introduce Pattern-mark, a pattern-based watermarking framework specifically designed for order-agnostic LMs. We develop a Markov-chain-based watermark generator that produces watermark key sequences with high-frequency key patterns. Correspondingly, we propose a statistical pattern-based detection algorithm that recovers the key sequence during detection and conducts statistical tests based on the count of high-frequency patterns. Our extensive evaluations on order-agnostic LMs, such as ProteinMPNN and CMLM, demonstrate Pattern-mark's enhanced detection efficiency, generation quality, and robustness, positioning it as a superior watermarking technique for order-agnostic LMs.
△ Less
Submitted 17 October, 2024;
originally announced October 2024.
-
Observation of a rare beta decay of the charmed baryon with a Graph Neural Network
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (637 additional authors not shown)
Abstract:
The study of beta decay of the charmed baryon provides unique insights into the fundamental mechanism of the strong and electro-weak interactions. The $Λ_c^+$, being the lightest charmed baryon, undergoes disintegration solely through the charm quark weak decay. Its beta decay provides an ideal laboratory for investigating non-perturbative effects in quantum chromodynamics and for constraining the…
▽ More
The study of beta decay of the charmed baryon provides unique insights into the fundamental mechanism of the strong and electro-weak interactions. The $Λ_c^+$, being the lightest charmed baryon, undergoes disintegration solely through the charm quark weak decay. Its beta decay provides an ideal laboratory for investigating non-perturbative effects in quantum chromodynamics and for constraining the fundamental parameters of the Cabibbo-Kobayashi-Maskawa matrix in weak interaction theory. This article presents the first observation of the Cabibbo-suppressed $Λ_c^+$ beta decay into a neutron $Λ_c^+ \rightarrow n e^+ ν_{e}$, based on $4.5~\mathrm{fb}^{-1}$ of electron-positron annihilation data collected with the BESIII detector in the energy region above the $Λ^+_c\barΛ^-_c$ threshold. A novel machine learning technique, leveraging Graph Neural Networks, has been utilized to effectively separate signals from dominant backgrounds, particularly $Λ_c^+ \rightarrow Λe^+ ν_{e}$. This approach has yielded a statistical significance of more than $10σ$. The absolute branching fraction of $Λ_c^+ \rightarrow n e^+ ν_{e}$ is measured to be $(3.57\pm0.34_{\mathrm{stat}}\pm0.14_{\mathrm{syst}})\times 10^{-3}$. For the first time, the CKM matrix element $\left|V_{cd}\right|$ is extracted via a charmed baryon decay to be $0.208\pm0.011_{\rm exp.}\pm0.007_{\rm LQCD}\pm0.001_{τ_{Λ_c^+}}$. This study provides a new probe to further understand fundamental interactions in the charmed baryon sector, and demonstrates the power of modern machine learning techniques in enhancing experimental capability in high energy physics research.
△ Less
Submitted 17 October, 2024;
originally announced October 2024.
-
Observation of $χ_{c0}\toΣ^{+}\barΣ^{-}η$ and evidence for $χ_{c1,2}\toΣ^{+}\barΣ^{-}η$
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (634 additional authors not shown)
Abstract:
Using $(27.12\pm 0.14)\times10^{8}$ $ψ(3686)$ events collected with the BESIII detector, the decay $χ_{c0}\toΣ^{+}\barΣ^{-}η$ is observed for the first time with a statistical significance of $7.0σ$, and evidence for $χ_{c1}\toΣ^{+}\barΣ^{-}η$ and $χ_{c2}\toΣ^{+}\barΣ^{-}η$ is found with statistical significances of $4.3σ$ and $4.6σ$, respectively. The branching fractions are determined to be…
▽ More
Using $(27.12\pm 0.14)\times10^{8}$ $ψ(3686)$ events collected with the BESIII detector, the decay $χ_{c0}\toΣ^{+}\barΣ^{-}η$ is observed for the first time with a statistical significance of $7.0σ$, and evidence for $χ_{c1}\toΣ^{+}\barΣ^{-}η$ and $χ_{c2}\toΣ^{+}\barΣ^{-}η$ is found with statistical significances of $4.3σ$ and $4.6σ$, respectively. The branching fractions are determined to be $\mathcal{B}(χ_{c0}\toΣ^{+}\barΣ^{-}η)=({1.26 \pm 0.20 \pm 0.13}) \times 10^{-4}, ~\mathcal{B}(χ_{c1}\toΣ^{+}\barΣ^{-}η)=({5.10 \pm 1.21 \pm 0.67}) \times 10^{-5}$, and $\mathcal{B}(χ_{c2}\toΣ^{+}\barΣ^{-}η)=({5.46 \pm 1.18 \pm 0.50}) \times 10^{-5}$, where the first uncertainties are statistical, and the second ones are systematic.
△ Less
Submitted 17 October, 2024;
originally announced October 2024.
-
Observation of the Singly Cabibbo-Suppressed Decay $Λ_c^{+}\to pπ^0$
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (638 additional authors not shown)
Abstract:
Utilizing 4.5${~\rm{fb}}^{-1}$ of $e^+e^-$ annihilation data collected with the BESIII detector at the BEPCII collider at center-of-mass energies between 4.600 and 4.699 GeV, the first observation of the singly Cabibbo-suppressed decay $Λ_c^{+}\to pπ^0$ is presented, with a statistical significance of $5.4σ$. The ratio of the branching fractions of $Λ_c^{+}\to pπ^0$ and $Λ_c^{+}\to pη$ is measured…
▽ More
Utilizing 4.5${~\rm{fb}}^{-1}$ of $e^+e^-$ annihilation data collected with the BESIII detector at the BEPCII collider at center-of-mass energies between 4.600 and 4.699 GeV, the first observation of the singly Cabibbo-suppressed decay $Λ_c^{+}\to pπ^0$ is presented, with a statistical significance of $5.4σ$. The ratio of the branching fractions of $Λ_c^{+}\to pπ^0$ and $Λ_c^{+}\to pη$ is measured as $\mathcal{B}(Λ_c^{+}\to pπ^0)/\mathcal{B}(Λ_c^{+}\to pη)=(0.120\pm0.026_{\rm stat.}\pm0.007_{\rm syst.})$. This result resolves the longstanding discrepancy between earlier experimental searches, providing both a decisive conclusion and valuable input for QCD-inspired theoretical models. A sophisticated deep learning approach using a Transformer-based architecture is employed to distinguish the signal from the prevalent hadronic backgrounds, complemented by thorough validation and systematic uncertainty quantification.
△ Less
Submitted 17 October, 2024;
originally announced October 2024.
-
GlossyGS: Inverse Rendering of Glossy Objects with 3D Gaussian Splatting
Authors:
Shuichang Lai,
Letian Huang,
Jie Guo,
Kai Cheng,
Bowen Pan,
Xiaoxiao Long,
Jiangjing Lyu,
Chengfei Lv,
Yanwen Guo
Abstract:
Reconstructing objects from posed images is a crucial and complex task in computer graphics and computer vision. While NeRF-based neural reconstruction methods have exhibited impressive reconstruction ability, they tend to be time-comsuming. Recent strategies have adopted 3D Gaussian Splatting (3D-GS) for inverse rendering, which have led to quick and effective outcomes. However, these techniques…
▽ More
Reconstructing objects from posed images is a crucial and complex task in computer graphics and computer vision. While NeRF-based neural reconstruction methods have exhibited impressive reconstruction ability, they tend to be time-comsuming. Recent strategies have adopted 3D Gaussian Splatting (3D-GS) for inverse rendering, which have led to quick and effective outcomes. However, these techniques generally have difficulty in producing believable geometries and materials for glossy objects, a challenge that stems from the inherent ambiguities of inverse rendering. To address this, we introduce GlossyGS, an innovative 3D-GS-based inverse rendering framework that aims to precisely reconstruct the geometry and materials of glossy objects by integrating material priors. The key idea is the use of micro-facet geometry segmentation prior, which helps to reduce the intrinsic ambiguities and improve the decomposition of geometries and materials. Additionally, we introduce a normal map prefiltering strategy to more accurately simulate the normal distribution of reflective surfaces. These strategies are integrated into a hybrid geometry and material representation that employs both explicit and implicit methods to depict glossy objects. We demonstrate through quantitative analysis and qualitative visualization that the proposed method is effective to reconstruct high-fidelity geometries and materials of glossy objects, and performs favorably against state-of-the-arts.
△ Less
Submitted 17 October, 2024;
originally announced October 2024.
-
A statistical study on the peak and fluence spectra of Solar Energetic Particles observed over 4 solar cycles
Authors:
Yubao Wang,
Jingnan Guo
Abstract:
Solar energetic particles (SEPs) are an important space radiation source, especially for the space weather environment in the inner heliosphere. The energy spectrum of SEP events is crucial both for evaluating their radiation effects and for understanding their acceleration process at the source region and their propagation mechanism. In this work, we investigate the properties of the SEP peak flu…
▽ More
Solar energetic particles (SEPs) are an important space radiation source, especially for the space weather environment in the inner heliosphere. The energy spectrum of SEP events is crucial both for evaluating their radiation effects and for understanding their acceleration process at the source region and their propagation mechanism. In this work, we investigate the properties of the SEP peak flux spectra and the fluence spectra and their potential formation mechanisms using statistical methods. We aim to advance our understanding of both SEPs' acceleration and propagation mechanisms. Employing the dataset of European Space Agency's Solar Energetic Particle Environment Modelling (SEPEM) program, we have obtained and fitted the peak-flux and fluence proton spectra of more than a hundred SEP events from 1974 to 2018. We analyzed the relationship among the solar activity, X-ray peak intensity of solar flares and the SEP spectral parameters. Based on the assumption that the initial spectrum of accelerated SEPs generally has a power-law distribution and also the diffusion coefficient has a power-law dependence on particle energy, we can assess both the source and propagation properties using the observed SEP event peak flux and fluence energy spectra. We confirm that SEPs' spectral properties are influenced by the solar source and the interplanetary conditions and their transportation process can be influenced by different phases of solar cycle. This study provides an observational perspective on the double power-law spectral characteristics of the SEP energy spectra, showing their correlation with the adiabatic cooling and diffusion processes during the particle propagation from the Sun to the observer. This contributes to a deeper understanding of the acceleration and propagation of SEP events, in particular the possible origins of the double-power law.
△ Less
Submitted 16 October, 2024;
originally announced October 2024.
-
Chain of Ideas: Revolutionizing Research in Novel Idea Development with LLM Agents
Authors:
Long Li,
Weiwen Xu,
Jiayan Guo,
Ruochen Zhao,
Xinxuan Li,
Yuqian Yuan,
Boqiang Zhang,
Yuming Jiang,
Yifei Xin,
Ronghao Dang,
Deli Zhao,
Yu Rong,
Tian Feng,
Lidong Bing
Abstract:
Effective research ideation is a critical step for scientific research. However, the exponential increase in scientific literature makes it challenging for researchers to stay current with recent advances and identify meaningful research directions. Recent developments in large language models~(LLMs) suggest a promising avenue for automating the generation of novel research ideas. However, existin…
▽ More
Effective research ideation is a critical step for scientific research. However, the exponential increase in scientific literature makes it challenging for researchers to stay current with recent advances and identify meaningful research directions. Recent developments in large language models~(LLMs) suggest a promising avenue for automating the generation of novel research ideas. However, existing methods for idea generation either trivially prompt LLMs or directly expose LLMs to extensive literature without indicating useful information. Inspired by the research process of human researchers, we propose a Chain-of-Ideas~(CoI) agent, an LLM-based agent that organizes relevant literature in a chain structure to effectively mirror the progressive development in a research domain. This organization facilitates LLMs to capture the current advancements in research, thereby enhancing their ideation capabilities. Furthermore, we propose Idea Arena, an evaluation protocol that can comprehensively evaluate idea generation methods from different perspectives, aligning closely with the preferences of human researchers. Experimental results indicate that the CoI agent consistently outperforms other methods and shows comparable quality as humans in research idea generation. Moreover, our CoI agent is budget-friendly, with a minimum cost of \$0.50 to generate a candidate idea and its corresponding experimental design.
△ Less
Submitted 20 October, 2024; v1 submitted 16 October, 2024;
originally announced October 2024.
-
UniAutoML: A Human-Centered Framework for Unified Discriminative and Generative AutoML with Large Language Models
Authors:
Jiayi Guo,
Zan Chen,
Yingrui Ji,
Liyun Zhang,
Daqin Luo,
Zhigang Li,
Yiqin Shen
Abstract:
Automated Machine Learning (AutoML) has simplified complex ML processes such as data pre-processing, model selection, and hyper-parameter searching. However, traditional AutoML frameworks focus solely on discriminative tasks, often falling short in tackling AutoML for generative models. Additionally, these frameworks lack interpretability and user engagement during the training process, primarily…
▽ More
Automated Machine Learning (AutoML) has simplified complex ML processes such as data pre-processing, model selection, and hyper-parameter searching. However, traditional AutoML frameworks focus solely on discriminative tasks, often falling short in tackling AutoML for generative models. Additionally, these frameworks lack interpretability and user engagement during the training process, primarily due to the absence of human-centered design. It leads to a lack of transparency in final decision-making and limited user control, potentially reducing trust and adoption of AutoML methods. To address these limitations, we introduce UniAutoML, a human-centered AutoML framework that leverages Large Language Models (LLMs) to unify AutoML for both discriminative (e.g., Transformers and CNNs for classification or regression tasks) and generative tasks (e.g., fine-tuning diffusion models or LLMs). The human-centered design of UniAutoML innovatively features a conversational user interface (CUI) that facilitates natural language interactions, providing users with real-time guidance, feedback, and progress updates for better interpretability. This design enhances transparency and user control throughout the AutoML training process, allowing users to seamlessly break down or modify the model being trained. To mitigate potential risks associated with LLM generated content, UniAutoML incorporates a safety guardline that filters inputs and censors outputs. We evaluated UniAutoML's performance and usability through experiments on eight diverse datasets and user studies involving 25 participants, demonstrating that UniAutoML not only enhances performance but also improves user control and trust. Our human-centered design bridges the gap between AutoML capabilities and user understanding, making ML more accessible to a broader audience.
△ Less
Submitted 17 October, 2024; v1 submitted 9 October, 2024;
originally announced October 2024.
-
Search for $e^{+}e^{-} \to φχ_{c0}$ and $φη_{c2}(1D)$ at center-of-mass energies from 4.47 to 4.95 GeV
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (644 additional authors not shown)
Abstract:
Utilizing a data set of $6.7$ fb$^{-1}$ from electron-positron collisions recorded by the BESIII detector at the BEPCII storage ring, a search is conducted for the processes $e^{+}e^{-} \to φχ_{c0}$ and $φη_{c2}(1D)$ across center-of-mass energies from 4.47 to 4.95 GeV. In the absence of any significant signals, upper limits are set. These include limits on the Born cross sections for…
▽ More
Utilizing a data set of $6.7$ fb$^{-1}$ from electron-positron collisions recorded by the BESIII detector at the BEPCII storage ring, a search is conducted for the processes $e^{+}e^{-} \to φχ_{c0}$ and $φη_{c2}(1D)$ across center-of-mass energies from 4.47 to 4.95 GeV. In the absence of any significant signals, upper limits are set. These include limits on the Born cross sections for $e^{+}e^{-} \to φχ_{c0}$, as well as the product of the Born cross section for $e^{+}e^{-} \to φη_{c2}(1D)$ and a sum of five branching fractions. Furthermore, the product of the electronic width of $Y(4660)$ and the branching fraction of the $Y(4660) \to φχ_{c0}$, denoted as $Γ^{Y(4660)}_{e^{+}e^{-}} \mathcal{B}_{Y(4660) \to φχ_{c0}}$, is determined to be $< 0.40$ eV at the 90\% confidence level.
△ Less
Submitted 16 October, 2024;
originally announced October 2024.
-
A Claim Decomposition Benchmark for Long-form Answer Verification
Authors:
Zhihao Zhang,
Yixing Fan,
Ruqing Zhang,
Jiafeng Guo
Abstract:
The advancement of LLMs has significantly boosted the performance of complex long-form question answering tasks. However, one prominent issue of LLMs is the generated "hallucination" responses that are not factual. Consequently, attribution for each claim in responses becomes a common solution to improve the factuality and verifiability. Existing researches mainly focus on how to provide accurate…
▽ More
The advancement of LLMs has significantly boosted the performance of complex long-form question answering tasks. However, one prominent issue of LLMs is the generated "hallucination" responses that are not factual. Consequently, attribution for each claim in responses becomes a common solution to improve the factuality and verifiability. Existing researches mainly focus on how to provide accurate citations for the response, which largely overlook the importance of identifying the claims or statements for each response. To bridge this gap, we introduce a new claim decomposition benchmark, which requires building system that can identify atomic and checkworthy claims for LLM responses. Specifically, we present the Chinese Atomic Claim Decomposition Dataset (CACDD), which builds on the WebCPM dataset with additional expert annotations to ensure high data quality. The CACDD encompasses a collection of 500 human-annotated question-answer pairs, including a total of 4956 atomic claims. We further propose a new pipeline for human annotation and describe the challenges of this task. In addition, we provide experiment results on zero-shot, few-shot and fine-tuned LLMs as baselines. The results show that the claim decomposition is highly challenging and requires further explorations. All code and data are publicly available at \url{https://github.com/FBzzh/CACDD}.
△ Less
Submitted 16 October, 2024;
originally announced October 2024.
-
Observation of $χ_{cJ}\to p \bar p K^0_S K^- π^+ + c.c.$
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere,
A. Brueggemann
, et al. (648 additional authors not shown)
Abstract:
By analyzing $(27.12\pm0.14)\times10^8$ $ψ(3686)$ events collected with the BESIII detector operating at the BEPCII collider, the decays of $χ_{cJ} \to p \bar{p} K^0_S K^- π^+ +c.c.(J=0, 1, 2)$ are observed for the first time with statistical significances greater than $10σ$. The branching fractions of these decays are determined to be…
▽ More
By analyzing $(27.12\pm0.14)\times10^8$ $ψ(3686)$ events collected with the BESIII detector operating at the BEPCII collider, the decays of $χ_{cJ} \to p \bar{p} K^0_S K^- π^+ +c.c.(J=0, 1, 2)$ are observed for the first time with statistical significances greater than $10σ$. The branching fractions of these decays are determined to be $\mathcal{B}(χ_{c0}\to p \bar p K^{0}_{S} K^- π^+ + c.c.)=(2.61\pm0.27\pm0.32)\times10^{-5},$ $\mathcal{B}(χ_{c1}\to p \bar p K^{0}_{S} K^- π^+ + c.c.)=(4.16\pm0.24\pm0.46)\times10^{-5},$ and $\mathcal{B}(χ_{c2}\to p \bar p K^{0}_{S} K^- π^+ + c.c.)=(5.63\pm0.28\pm0.46)\times10^{-5}$, respectively. The processes $χ_{c1,2} \to \bar{p} Λ(1520) K^0_S π^{+} + c.c.$ are also observed, with statistical significances of 5.7$σ$ and 7.0$σ$, respectively. Evidence for $χ_{c0} \to\bar{p} Λ(1520) K^0_S π^{+} + c.c.$ is found with statistical significances of 3.3$σ$ each. The corresponding branching fractions are determined to be $\mathcal{B}(χ_{c0}\to \bar{p} Λ(1520) K^0_S π^{+} + c.c.) =(1.61^{+0.68}_{-0.64}\pm0.23)\times10^{-5}$, $\mathcal{B}(χ_{c1}\to \bar{p} Λ(1520) K^0_S π^{+} + c.c.)=(4.06^{+0.80}_{-0.76}\pm0.52)\times10^{-5}$, and $\mathcal{B}(χ_{c2}\to \bar{p} Λ(1520) K^0_S π^{+} + c.c.)=(4.09^{+0.87}_{-0.84}\pm0.42)\times10^{-5}$. Here, the first uncertainties are statistical and the second ones are systematic.
△ Less
Submitted 15 October, 2024;
originally announced October 2024.
-
It Takes Two to Tango: Directly Optimizing for Constrained Synthesizability in Generative Molecular Design
Authors:
Jeff Guo,
Philippe Schwaller
Abstract:
Constrained synthesizability is an unaddressed challenge in generative molecular design. In particular, designing molecules satisfying multi-parameter optimization objectives, while simultaneously being synthesizable and enforcing the presence of specific commercial building blocks in the synthesis. This is practically important for molecule re-purposing, sustainability, and efficiency. In this wo…
▽ More
Constrained synthesizability is an unaddressed challenge in generative molecular design. In particular, designing molecules satisfying multi-parameter optimization objectives, while simultaneously being synthesizable and enforcing the presence of specific commercial building blocks in the synthesis. This is practically important for molecule re-purposing, sustainability, and efficiency. In this work, we propose a novel reward function called TANimoto Group Overlap (TANGO), which uses chemistry principles to transform a sparse reward function into a dense and learnable reward function -- crucial for reinforcement learning. TANGO can augment general-purpose molecular generative models to directly optimize for constrained synthesizability while simultaneously optimizing for other properties relevant to drug discovery using reinforcement learning. Our framework is general and addresses starting-material, intermediate, and divergent synthesis constraints. Contrary to most existing works in the field, we show that incentivizing a general-purpose (without any inductive biases) model is a productive approach to navigating challenging optimization scenarios. We demonstrate this by showing that the trained models explicitly learn a desirable distribution. Our framework is the first generative approach to tackle constrained synthesizability.
△ Less
Submitted 15 October, 2024;
originally announced October 2024.
-
RSSI-Assisted CSI-Based Passenger Counting with Multiple Wi-Fi Receivers
Authors:
Jingtao Guo,
Wenhao Zhuang,
Yuyi Mao,
Ivan Wang-Hei Ho
Abstract:
Passenger counting is crucial for public transport vehicle scheduling and traffic capacity evaluation. However, most existing methods are either costly or with low counting accuracy, leading to the recent use of Wi-Fi signals for this purpose. In this paper, we develop an efficient edge computing-based passenger counting system consists of multiple Wi-Fi receivers and an edge server. It leverages…
▽ More
Passenger counting is crucial for public transport vehicle scheduling and traffic capacity evaluation. However, most existing methods are either costly or with low counting accuracy, leading to the recent use of Wi-Fi signals for this purpose. In this paper, we develop an efficient edge computing-based passenger counting system consists of multiple Wi-Fi receivers and an edge server. It leverages channel state information (CSI) and received signal strength indicator (RSSI) to facilitate the collaboration among multiple receivers. Specifically, we design a novel CSI feature fusion module called Adaptive RSSI-weighted CSI Feature Concatenation, which integrates locally extracted CSI and RSSI features from multiple receivers for information fusion at the edge server. Performance of our proposed system is evaluated using a real-world dataset collected from a double-decker bus in Hong Kong, with up to 20 passengers. The experimental results reveal that our system achieves an average accuracy and F1-score of over 94%, surpassing other cooperative sensing baselines by at least 2.27% in accuracy and 2.34% in F1-score.
△ Less
Submitted 15 October, 2024;
originally announced October 2024.
-
On the Capacity of Citation Generation by Large Language Models
Authors:
Haosheng Qian,
Yixing Fan,
Ruqing Zhang,
Jiafeng Guo
Abstract:
Retrieval-augmented generation (RAG) appears as a promising method to alleviate the "hallucination" problem in large language models (LLMs), since it can incorporate external traceable resources for response generation. The essence of RAG in combating the hallucination issue lies in accurately attributing claims in responses to the corresponding retrieved documents. However, most of existing works…
▽ More
Retrieval-augmented generation (RAG) appears as a promising method to alleviate the "hallucination" problem in large language models (LLMs), since it can incorporate external traceable resources for response generation. The essence of RAG in combating the hallucination issue lies in accurately attributing claims in responses to the corresponding retrieved documents. However, most of existing works focus on improving the quality of generated responses from the LLM, while largely overlooked its ability to attribute sources accurately. In this study, we conduct a systematic analysis about the capabilities of LLMs in generating citations within response generation, and further introduce a novel method to enhance their citation generation abilities. Specifically, we evaluate both the correctness and citation quality for seven widely-used LLMs on two benchmark datasets. Meanwhile, we introduce new citation evaluation metrics to eliminate the over-penalization of unnecessary and excessive citations in existing metrics. Furthermore, we propose a Generate-then-Refine method that completes relevant citations and removes irrelevant ones without altering the response text. The results on WebGLM-QA, ASQA and ELI5 datasets show that our method substantially improves the quality of citations in responses generated by LLMs.
△ Less
Submitted 14 October, 2024;
originally announced October 2024.
-
DuoAttention: Efficient Long-Context LLM Inference with Retrieval and Streaming Heads
Authors:
Guangxuan Xiao,
Jiaming Tang,
Jingwei Zuo,
Junxian Guo,
Shang Yang,
Haotian Tang,
Yao Fu,
Song Han
Abstract:
Deploying long-context large language models (LLMs) is essential but poses significant computational and memory challenges. Caching all Key and Value (KV) states across all attention heads consumes substantial memory. Existing KV cache pruning methods either damage the long-context capabilities of LLMs or offer only limited efficiency improvements. In this paper, we identify that only a fraction o…
▽ More
Deploying long-context large language models (LLMs) is essential but poses significant computational and memory challenges. Caching all Key and Value (KV) states across all attention heads consumes substantial memory. Existing KV cache pruning methods either damage the long-context capabilities of LLMs or offer only limited efficiency improvements. In this paper, we identify that only a fraction of attention heads, a.k.a, Retrieval Heads, are critical for processing long contexts and require full attention across all tokens. In contrast, all other heads, which primarily focus on recent tokens and attention sinks--referred to as Streaming Heads--do not require full attention. Based on this insight, we introduce DuoAttention, a framework that only applies a full KV cache to retrieval heads while using a light-weight, constant-length KV cache for streaming heads, which reduces both LLM's decoding and pre-filling memory and latency without compromising its long-context abilities. DuoAttention uses a lightweight, optimization-based algorithm with synthetic data to identify retrieval heads accurately. Our method significantly reduces long-context inference memory by up to 2.55x for MHA and 1.67x for GQA models while speeding up decoding by up to 2.18x and 1.50x and accelerating pre-filling by up to 1.73x and 1.63x for MHA and GQA models, respectively, with minimal accuracy loss compared to full attention. Notably, combined with quantization, DuoAttention enables Llama-3-8B decoding with 3.3 million context length on a single A100 GPU. Code is provided in https://github.com/mit-han-lab/duo-attention.
△ Less
Submitted 14 October, 2024;
originally announced October 2024.
-
Model-Based Differentially Private Knowledge Transfer for Large Language Models
Authors:
Zhaomin Wu,
Jizhou Guo,
Junyi Hou,
Bingsheng He,
Lixin Fan,
Qiang Yang
Abstract:
As large language models (LLMs) become increasingly prevalent in web services, effectively leveraging domain-specific knowledge while ensuring privacy has become critical. Existing methods, such as retrieval-augmented generation (RAG) and differentially private data synthesis, often compromise either the utility of domain knowledge or the privacy of sensitive data, limiting their applicability in…
▽ More
As large language models (LLMs) become increasingly prevalent in web services, effectively leveraging domain-specific knowledge while ensuring privacy has become critical. Existing methods, such as retrieval-augmented generation (RAG) and differentially private data synthesis, often compromise either the utility of domain knowledge or the privacy of sensitive data, limiting their applicability in specialized domains. To address these challenges, we propose \textit{Llamdex}, a novel framework that integrates privacy-preserving, domain-specific models into LLMs. Our approach significantly enhances the accuracy of domain-specific tasks, achieving up to a 26\% improvement compared to existing methods under the same differential privacy constraints. Experimental results show that Llamdex not only improves the accuracy of LLM responses but also maintains comparable inference efficiency to the original LLM, highlighting its potential for real-world applications.
△ Less
Submitted 14 October, 2024;
originally announced October 2024.
-
Free Video-LLM: Prompt-guided Visual Perception for Efficient Training-free Video LLMs
Authors:
Kai Han,
Jianyuan Guo,
Yehui Tang,
Wei He,
Enhua Wu,
Yunhe Wang
Abstract:
Vision-language large models have achieved remarkable success in various multi-modal tasks, yet applying them to video understanding remains challenging due to the inherent complexity and computational demands of video data. While training-based video-LLMs deliver high performance, they often require substantial resources for training and inference. Conversely, training-free approaches offer a mor…
▽ More
Vision-language large models have achieved remarkable success in various multi-modal tasks, yet applying them to video understanding remains challenging due to the inherent complexity and computational demands of video data. While training-based video-LLMs deliver high performance, they often require substantial resources for training and inference. Conversely, training-free approaches offer a more efficient alternative by adapting pre-trained image-LLMs models for video tasks without additional training, but they face inference efficiency bottlenecks due to the large number of visual tokens generated from video frames. In this work, we present a novel prompt-guided visual perception framework (abbreviated as Free Video-LLM) for efficient inference of training-free video LLMs. The proposed framework decouples spatial-temporal dimension and performs temporal frame sampling and spatial RoI cropping respectively based on task-specific prompts. Our method effectively reduces the number of visual tokens while maintaining high performance across multiple video question-answering benchmarks. Extensive experiments demonstrate that our approach achieves competitive results with significantly fewer tokens, offering an optimal trade-off between accuracy and computational efficiency compared to state-of-the-art video LLMs. The code will be available at https://github.com/contrastive/FreeVideoLLM.
△ Less
Submitted 16 October, 2024; v1 submitted 14 October, 2024;
originally announced October 2024.
-
Parameterize Structure with Differentiable Template for 3D Shape Generation
Authors:
Changfeng Ma,
Pengxiao Guo,
Shuangyu Yang,
Yinuo Chen,
Jie Guo,
Chongjun Wang,
Yanwen Guo,
Wenping Wang
Abstract:
Structural representation is crucial for reconstructing and generating editable 3D shapes with part semantics. Recent 3D shape generation works employ complicated networks and structure definitions relying on hierarchical annotations and pay less attention to the details inside parts. In this paper, we propose the method that parameterizes the shared structure in the same category using a differen…
▽ More
Structural representation is crucial for reconstructing and generating editable 3D shapes with part semantics. Recent 3D shape generation works employ complicated networks and structure definitions relying on hierarchical annotations and pay less attention to the details inside parts. In this paper, we propose the method that parameterizes the shared structure in the same category using a differentiable template and corresponding fixed-length parameters. Specific parameters are fed into the template to calculate cuboids that indicate a concrete shape. We utilize the boundaries of three-view drawings of each cuboid to further describe the inside details. Shapes are represented with the parameters and three-view details inside cuboids, from which the SDF can be calculated to recover the object. Benefiting from our fixed-length parameters and three-view details, our networks for reconstruction and generation are simple and effective to learn the latent space. Our method can reconstruct or generate diverse shapes with complicated details, and interpolate them smoothly. Extensive evaluations demonstrate the superiority of our method on reconstruction from point cloud, generation, and interpolation.
△ Less
Submitted 15 October, 2024; v1 submitted 14 October, 2024;
originally announced October 2024.
-
Caching Content Placement and Beamforming Co-design for IRS-Aided MIMO Systems with Imperfect CSI
Authors:
Meng Gao,
Yang Wang,
Huafu Li,
Junqi Guo
Abstract:
When offloading links encounter deep fading and obstruction, edge caching cannot fully enhance wireless network performance and improve the QoS of edge nodes, as it fails to effectively reduce backhaul burden. The emerging technology of intelligent reflecting surfaces (IRS) compensates for this disadvantage by creating a smart and reconfigurable wireless environment. Subsequently, we jointly desig…
▽ More
When offloading links encounter deep fading and obstruction, edge caching cannot fully enhance wireless network performance and improve the QoS of edge nodes, as it fails to effectively reduce backhaul burden. The emerging technology of intelligent reflecting surfaces (IRS) compensates for this disadvantage by creating a smart and reconfigurable wireless environment. Subsequently, we jointly design content placement and active/passive beamforming to minimize network costs under imperfect channel state information (CSI) in the IRS-oriented edge caching system. This minimization problem is decomposed into two subproblems. The content placement subproblem is addressed by applying KKT optimality conditions. We then develop the alternating optimization method to resolve precoder and reflection beamforming. Specifically, we reduce transmission power by first fixing the phase shift, reducing the problem to a convex one relative to the precoder, which is solved through convex optimization. Next, we fix the precoder and resolve the resulting reflection beamforming problem using the penalty convex-concave procedure (CCP) method. Results demonstrate that our proposed method outperforms uniform caching and random phase approaches in reducing transmission power and saving network costs. Eventually, the proposed approach offers potential improvements in the caching optimization and transmission robustness of wireless communication with imperfect CSI.
△ Less
Submitted 14 October, 2024;
originally announced October 2024.
-
Observation of $D^+\toη^\primeμ^+ν_μ$ and First Study of $D^+\to η^\prime \ell^+ν_\ell$ Decay Dynamics
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (643 additional authors not shown)
Abstract:
Using $20.3\,\rm fb^{-1}$ of $e^+e^-$ collision data collected at the center-of-mass energy 3.773\,GeV with the BESIII detector, we report the first observation of the semileptonic decay $D^+\to η^\prime μ^+ν_μ$ with significance of $8.6σ$ including systematic uncertainties, and an improved measurement of $D^+\to η^\prime e^+ν_e$. The branching fractions of $D^+\to η^\prime μ^+ν_μ$ and…
▽ More
Using $20.3\,\rm fb^{-1}$ of $e^+e^-$ collision data collected at the center-of-mass energy 3.773\,GeV with the BESIII detector, we report the first observation of the semileptonic decay $D^+\to η^\prime μ^+ν_μ$ with significance of $8.6σ$ including systematic uncertainties, and an improved measurement of $D^+\to η^\prime e^+ν_e$. The branching fractions of $D^+\to η^\prime μ^+ν_μ$ and $D^+\to η^\prime e^+ν_e$ are determined to be $(1.92\pm0.28_{\rm stat}\pm 0.08_{\rm syst})\times 10^{-4}$ and $(1.79\pm0.19_{\rm stat}\pm 0.07_{\rm syst})\times 10^{-4}$, respectively. From an analysis of the $D^+\to η^\prime \ell^+ν_\ell$ decay dynamics, the product of the hadronic form factor $f_+^{η^{\prime}}(0)$ and the CKM matrix element $|V_{cd}|$ is measured for the first time, giving $f^{η^\prime}_+(0)|V_{cd}| = (5.92\pm0.56_{\rm stat}\pm0.13_{\rm syst})\times 10^{-2}$. No evidence for violation of $μ-e$ lepton-flavor universality is found in both the full range and several bins of $\ell^+ν_\ell$ four-momentum transfer. The $η-η^\prime$ mixing angle in the quark flavor basis is determined to be $φ_{\rm P} =(39.8\pm0.8_{\rm stat}\pm0.3_{\rm syst})^\circ$.
△ Less
Submitted 11 October, 2024;
originally announced October 2024.
-
Precision Measurement of the Branching Fraction of $D^{+}\to μ^{+}ν_μ$
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (643 additional authors not shown)
Abstract:
Using $20.3~\mathrm{fb}^{-1}$ of $e^+e^-$ collision data collected at a center-of-mass energy of $E_{\rm cm}=3.773$ GeV with the BESIII detector operating at the BEPCII collider, we determine the branching fraction of the leptonic decay $D^+\toμ^+ν_μ$ to be $(3.981\pm0.079_{\rm stat}\pm0.040_{\rm syst})\times10^{-4}$. Interpreting our measurement with knowledge of the Fermi coupling constant…
▽ More
Using $20.3~\mathrm{fb}^{-1}$ of $e^+e^-$ collision data collected at a center-of-mass energy of $E_{\rm cm}=3.773$ GeV with the BESIII detector operating at the BEPCII collider, we determine the branching fraction of the leptonic decay $D^+\toμ^+ν_μ$ to be $(3.981\pm0.079_{\rm stat}\pm0.040_{\rm syst})\times10^{-4}$. Interpreting our measurement with knowledge of the Fermi coupling constant $G_F$, the masses of the $D^+$ and $μ^+$ as well as the lifetime of the $D^+$, we determine $f_{D^+}|V_{cd}|=(47.53\pm0.48_{\rm stat}\pm0.24_{\rm syst}\pm0.12_{\rm input})~\mathrm{MeV}$. This result is a factor of 2.3 more precise than the previous best measurement. Using the value of the magnitude of the Cabibbo-Kobayashi-Maskawa matrix element $|V_{cd}|$ given by the global standard model fit, we obtain the $D^+$ decay constant $f_{D^+}=(211.5\pm2.3_{\rm stat}\pm1.1_{\rm syst}\pm0.8_{\rm input})$ MeV. Alternatively, using the value of $f_{D^+}$ from a precise lattice quantum chromodynamics calculation, we extract $|V_{cd}|=0.2242\pm0.0023_{\rm stat}\pm0.0011_{\rm syst}\pm0.0009_{\rm input}$.
△ Less
Submitted 10 October, 2024;
originally announced October 2024.
-
Search for the radiative decays $D^+\toγρ^+$ and $D^+\toγK^{*+}$
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (648 additional authors not shown)
Abstract:
We search for the radiative decays $D^{+} \to γρ^+$ and $D^{+} \to γK^{*+}$ using 20.3~fb$^{-1}$ of $e^+e^-$ annihilation data collected at the center-of-mass energy $\sqrt{s}=3.773$ GeV by the BESIII detector operating at the BEPCII collider. No significant signals are observed, and the upper limits on the branching fractions of $D^{+} \to γρ^+$ and $D^{+} \to γK^{*+}$ at 90\% confidence level ar…
▽ More
We search for the radiative decays $D^{+} \to γρ^+$ and $D^{+} \to γK^{*+}$ using 20.3~fb$^{-1}$ of $e^+e^-$ annihilation data collected at the center-of-mass energy $\sqrt{s}=3.773$ GeV by the BESIII detector operating at the BEPCII collider. No significant signals are observed, and the upper limits on the branching fractions of $D^{+} \to γρ^+$ and $D^{+} \to γK^{*+}$ at 90\% confidence level are set to be $1.3\times10^{-5}$ and $1.8\times10^{-5}$, respectively.
△ Less
Submitted 8 October, 2024;
originally announced October 2024.
-
ERCache: An Efficient and Reliable Caching Framework for Large-Scale User Representations in Meta's Ads System
Authors:
Fang Zhou,
Yaning Huang,
Dong Liang,
Dai Li,
Zhongke Zhang,
Kai Wang,
Xiao Xin,
Abdallah Aboelela,
Zheliang Jiang,
Yang Wang,
Jeff Song,
Wei Zhang,
Chen Liang,
Huayu Li,
ChongLin Sun,
Hang Yang,
Lei Qu,
Zhan Shu,
Mindi Yuan,
Emanuele Maccherani,
Taha Hayat,
John Guo,
Varna Puvvada,
Uladzimir Pashkevich
Abstract:
The increasing complexity of deep learning models used for calculating user representations presents significant challenges, particularly with limited computational resources and strict service-level agreements (SLAs). Previous research efforts have focused on optimizing model inference but have overlooked a critical question: is it necessary to perform user model inference for every ad request in…
▽ More
The increasing complexity of deep learning models used for calculating user representations presents significant challenges, particularly with limited computational resources and strict service-level agreements (SLAs). Previous research efforts have focused on optimizing model inference but have overlooked a critical question: is it necessary to perform user model inference for every ad request in large-scale social networks? To address this question and these challenges, we first analyze user access patterns at Meta and find that most user model inferences occur within a short timeframe. T his observation reveals a triangular relationship among model complexity, embedding freshness, and service SLAs. Building on this insight, we designed, implemented, and evaluated ERCache, an efficient and robust caching framework for large-scale user representations in ads recommendation systems on social networks. ERCache categorizes cache into direct and failover types and applies customized settings and eviction policies for each model, effectively balancing model complexity, embedding freshness, and service SLAs, even considering the staleness introduced by caching. ERCache has been deployed at Meta for over six months, supporting more than 30 ranking models while efficiently conserving computational resources and complying with service SLA requirements.
△ Less
Submitted 8 October, 2024;
originally announced October 2024.
-
Detecting Android Malware by Visualizing App Behaviors from Multiple Complementary Views
Authors:
Zhaoyi Meng,
Jiale Zhang,
Jiaqi Guo,
Wansen Wang,
Wenchao Huang,
Jie Cui,
Hong Zhong,
Yan Xiong
Abstract:
Deep learning has emerged as a promising technology for achieving Android malware detection. To further unleash its detection potentials, software visualization can be integrated for analyzing the details of app behaviors clearly. However, facing increasingly sophisticated malware, existing visualization-based methods, analyzing from one or randomly-selected few views, can only detect limited atta…
▽ More
Deep learning has emerged as a promising technology for achieving Android malware detection. To further unleash its detection potentials, software visualization can be integrated for analyzing the details of app behaviors clearly. However, facing increasingly sophisticated malware, existing visualization-based methods, analyzing from one or randomly-selected few views, can only detect limited attack types. We propose and implement LensDroid, a novel technique that detects Android malware by visualizing app behaviors from multiple complementary views. Our goal is to harness the power of combining deep learning and software visualization to automatically capture and aggregate high-level features that are not inherently linked, thereby revealing hidden maliciousness of Android app behaviors. To thoroughly comprehend the details of apps, we visualize app behaviors from three related but distinct views of behavioral sensitivities, operational contexts and supported environments. We then extract high-order semantics based on the views accordingly. To exploit semantic complementarity of the views, we design a deep neural network based model for fusing the visualized features from local to global based on their contributions to downstream tasks. A comprehensive comparison with five baseline techniques is performed on datasets of more than 51K apps in three real-world typical scenarios, including overall threats, app evolution and zero-day malware. The experimental results show that the overall performance of LensDroid is better than the baseline techniques. We also validate the complementarity of the views and demonstrate that the multi-view fusion in LensDroid enhances Android malware detection.
△ Less
Submitted 8 October, 2024;
originally announced October 2024.
-
Observation of an axial-vector state in the study of $ψ(3686) \to φηη'$ decay
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (625 additional authors not shown)
Abstract:
Using (2712.4 $\pm$ 14.3)$\times 10^{6}$ $ψ(3686)$ events collected with the BESIII detector at BEPCII, a partial wave analysis of the decay $ψ(3686) \to φηη' $ is performed with the covariant tensor approach. An axial-vector state with a mass near 2.3 $\rm GeV/c^2$ is observed for the first time. Its mass and width are measured to be 2316…
▽ More
Using (2712.4 $\pm$ 14.3)$\times 10^{6}$ $ψ(3686)$ events collected with the BESIII detector at BEPCII, a partial wave analysis of the decay $ψ(3686) \to φηη' $ is performed with the covariant tensor approach. An axial-vector state with a mass near 2.3 $\rm GeV/c^2$ is observed for the first time. Its mass and width are measured to be 2316 $\pm 9_{\mathrm{stat}} \pm 30_{\mathrm{syst}}\,\rm MeV/c^2$ and 89 $\pm 15_{\mathrm{stat}} \pm 26_{\mathrm{syst}}\,\rm MeV$, respectively. The product branching fractions of $\mathcal{B}(ψ(3686) \to X(2300) η') \mathcal{B}(X(2300)\to φη)$ and $\mathcal{B}(ψ(3686) \to X(2300) η)\mathcal{B}(X(2300)\to φη')$ are determined to be (4.8 $\pm 1.3_{\mathrm{stat}} \pm 0.7_{\mathrm{syst}})\times 10^{-6}$ and (2.2 $\pm 0.7_{\mathrm{stat}} \pm 0.7_{\mathrm{syst}})\times 10^{-6}$, respectively. The branching fraction $\mathcal{B}(ψ(3686) \to φηη')$ is measured for the first time to be (3.14$\pm0.17_{\mathrm{stat}}\pm0.24_{\mathrm{syst}})\times10^{-5}$.
The first uncertainties are statistical and the second are systematic.
△ Less
Submitted 8 October, 2024;
originally announced October 2024.
-
Tracing the bottom electroweak dipole operators at future lepton colliders
Authors:
Jiayin Gu,
Jiayu Guo,
Xiao-Ze Tan
Abstract:
While often omitted in the SMEFT analyses of electroweak measurements, the electroweak dipole operators of the bottom quark have been found to be important in some cases, and are also related to processes involving the top quark. In this paper, we further investigate their effects, focusing on the measurements of the $e^+e^-\to b\bar{b}$ process at a future lepton collider. Their linear contributi…
▽ More
While often omitted in the SMEFT analyses of electroweak measurements, the electroweak dipole operators of the bottom quark have been found to be important in some cases, and are also related to processes involving the top quark. In this paper, we further investigate their effects, focusing on the measurements of the $e^+e^-\to b\bar{b}$ process at a future lepton collider. Their linear contributions are suppressed by the bottom mass due to the helicity flip in the interference term with the SM amplitude, leading to a nontrivial interplay between the linear and the quadratic contributions. With two runs at the Z-pole and 240 GeV, the effects of CP-even dipole coefficients can be well separated from the modifications of the SM $Zb\bar{b}$ couplings, while an additional run (e.g. at 360 GeV) is useful for lifting a nontrivial second best-fit point due to the quadratic contributions. The dipole operators also offer an alternative explanation to the long-standing $A^{0,b}_{\rm FB}$ discrepancy at LEP, which can be tested at a future lepton collider.
△ Less
Submitted 7 October, 2024;
originally announced October 2024.
-
Lens: Rethinking Multilingual Enhancement for Large Language Models
Authors:
Weixiang Zhao,
Yulin Hu,
Jiahe Guo,
Xingyu Sui,
Tongtong Wu,
Yang Deng,
Yanyan Zhao,
Bing Qin,
Wanxiang Che,
Ting Liu
Abstract:
Despite the growing global demand for large language models (LLMs) that serve users from diverse linguistic backgrounds, most cutting-edge LLMs remain predominantly English-centric. This creates a performance gap across languages, restricting access to advanced AI services for non-English speakers. Current methods to enhance multilingual capabilities largely rely on data-driven post-training techn…
▽ More
Despite the growing global demand for large language models (LLMs) that serve users from diverse linguistic backgrounds, most cutting-edge LLMs remain predominantly English-centric. This creates a performance gap across languages, restricting access to advanced AI services for non-English speakers. Current methods to enhance multilingual capabilities largely rely on data-driven post-training techniques, such as multilingual instruction tuning or continual pre-training. However, these approaches encounter significant challenges, including the scarcity of high-quality multilingual datasets and the limited enhancement of multilingual capabilities. They often suffer from off-target issues and catastrophic forgetting of central language abilities. To this end, we propose Lens, a novel approach to enhance multilingual capabilities of LLMs by leveraging their internal language representation spaces. Specially, Lens operates by manipulating the hidden representations within the language-agnostic and language-specific subspaces from top layers of LLMs. Using the central language as a pivot, the target language is drawn closer to it within the language-agnostic subspace, allowing it to inherit well-established semantic representations. Meanwhile, in the language-specific subspace, the representations of the target and central languages are pushed apart, enabling the target language to express itself distinctly. Extensive experiments on one English-centric and two multilingual LLMs demonstrate that Lens effectively improves multilingual performance without sacrificing the original central language capabilities of the backbone model, achieving superior results with much fewer computational resources compared to existing post-training approaches.
△ Less
Submitted 6 October, 2024;
originally announced October 2024.
-
On multivalued groups of order 3
Authors:
Jin Guo,
Ilia Ponomarenko,
Andrey V. Vasil'ev
Abstract:
A complete classification of the multivalued coset groups of order $3$ is given. The proof is based on the classification of rank $3$ groups having regular normal subgroups.
A complete classification of the multivalued coset groups of order $3$ is given. The proof is based on the classification of rank $3$ groups having regular normal subgroups.
△ Less
Submitted 5 October, 2024;
originally announced October 2024.
-
Charge Density Fluctuations with Enhanced Superconductivity at the Proposed Nematic Quantum Critical Point
Authors:
Youzhe Chen,
Nathan Giles-Donovan,
Jiayu Guo,
Ruihan Chen,
Hiroshi Fukui,
Taishun Manjo,
Daisuke Ishikawa,
Alfred Q. R. Baron,
Yu Song,
Robert J Birgeneau
Abstract:
A quantum critical point (QCP) represents a continuous phase transition at absolute zero. At the QCP of an unconventional superconductor, enhanced superconducting transition temperature and magnetic fluctuations strength are often observed together, indicating magnetism-mediated superconductivity. This raises the question of whether quantum fluctuations in other degrees of freedom, such as charge,…
▽ More
A quantum critical point (QCP) represents a continuous phase transition at absolute zero. At the QCP of an unconventional superconductor, enhanced superconducting transition temperature and magnetic fluctuations strength are often observed together, indicating magnetism-mediated superconductivity. This raises the question of whether quantum fluctuations in other degrees of freedom, such as charge, could similarly boost superconductivity. However, because charge is frequently intertwined with magnetism, isolating and understanding its specific role in Cooper pair formation poses a significant challenge. Here, we report persistent charge density fluctuations (CDF) down to 15 K in the non-magnetic superconductor Sr$_{0.77}$Ba$_{0.23}$Ni$_{2}$As$_{2}$, which lies near a proposed nematic QCP associated with a six-fold enhancement of superconductivity. Our results show that the quasi-elastic CDF does not condense into resolution-limited Bragg peaks and displays non-saturated strength. The CDF completely softens at 25 K, with its critical behavior described by the same mathematical framework as the antiferromagnetic Fermi liquid model, yielding a fitted Curie-Weiss temperature of $θ\approx 0$ K. Additionally, we find that the nematic fluctuations are not lattice-driven, as evidenced by the absence of softening in nematic-coupled in-plane transverse acoustic phonons. Our discovery positions Sr$_{x}$Ba$_{1-x}$Ni$_{2}$As$_{2}$ as a promising candidate for charge-fluctuation-driven nematicity and superconductivity.
△ Less
Submitted 4 October, 2024;
originally announced October 2024.
-
Search for lepton number violating decays of $D_s^+\to h^-h^0e^+e^+$
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (650 additional authors not shown)
Abstract:
Based on 7.33 fb$^{-1}$ of $e^+e^-$ collision data collected by the BESIII detector operating at the BEPCII collider at center-of-mass energies from 4.128 to 4.226 GeV, a search for the Majorana neutrino $ν_m$ is conducted in the lepton-number-violating decays of $D_s^+\to h^-h^0e^+e^+$. Here, $h^-$ represents a $K^-$ or $π^-$, and $h^0$ represents a $π^0$, $K_S^0$ or $φ$. No significant signal is…
▽ More
Based on 7.33 fb$^{-1}$ of $e^+e^-$ collision data collected by the BESIII detector operating at the BEPCII collider at center-of-mass energies from 4.128 to 4.226 GeV, a search for the Majorana neutrino $ν_m$ is conducted in the lepton-number-violating decays of $D_s^+\to h^-h^0e^+e^+$. Here, $h^-$ represents a $K^-$ or $π^-$, and $h^0$ represents a $π^0$, $K_S^0$ or $φ$. No significant signal is observed, and the upper limits of their branching fractions at the 90\% confidence level are determined to be $\mathcal{B}(D_s^+\to φπ^-e^+e^+) < 6.9 \times 10^{-5}$, $\mathcal{B}(D_s^+\to φK^-e^+e^+) < 9.9 \times 10^{-5}$, $\mathcal{B}(D_s^+\to K_S^0π^-e^+e^+) < 1.3 \times 10^{-5}$, $\mathcal{B}(D_s^+\to K_S^0K^-e^+e^+) < 2.9 \times 10^{-5}$, $\mathcal{B}(D_s^+\to π^-π^0e^+e^+) < 2.9 \times 10^{-5}$ and $\mathcal{B}(D_s^+\to K^-π^0e^+e^+) < 3.4 \times 10^{-5}$. The Majorana neutrino is searched for with different mass assumptions within the range [0.20, 0.80] GeV$/c^2$ in the decay of $D_s^+\toφe^+ν_m$ with $ν_m\toπ^-e^+$, and the upper limits of the branching fractions at the 90\% confidence level are at the level of $10^{-5}-10^{-2}$, depending on the mass of the Majorana neutrino.
△ Less
Submitted 3 October, 2024;
originally announced October 2024.
-
D(R, O) Grasp: A Unified Representation of Robot and Object Interaction for Cross-Embodiment Dexterous Grasping
Authors:
Zhenyu Wei,
Zhixuan Xu,
Jingxiang Guo,
Yiwen Hou,
Chongkai Gao,
Zhehao Cai,
Jiayu Luo,
Lin Shao
Abstract:
Dexterous grasping is a fundamental yet challenging skill in robotic manipulation, requiring precise interaction between robotic hands and objects. In this paper, we present D(R,O) Grasp, a novel framework that models the interaction between the robotic hand in its grasping pose and the object, enabling broad generalization across various robot hands and object geometries. Our model takes the robo…
▽ More
Dexterous grasping is a fundamental yet challenging skill in robotic manipulation, requiring precise interaction between robotic hands and objects. In this paper, we present D(R,O) Grasp, a novel framework that models the interaction between the robotic hand in its grasping pose and the object, enabling broad generalization across various robot hands and object geometries. Our model takes the robot hand's description and object point cloud as inputs and efficiently predicts kinematically valid and stable grasps, demonstrating strong adaptability to diverse robot embodiments and object geometries. Extensive experiments conducted in both simulated and real-world environments validate the effectiveness of our approach, with significant improvements in success rate, grasp diversity, and inference speed across multiple robotic hands. Our method achieves an average success rate of 87.53% in simulation in less than one second, tested across three different dexterous robotic hands. In real-world experiments using the LeapHand, the method also demonstrates an average success rate of 89%. D(R,O) Grasp provides a robust solution for dexterous grasping in complex and varied environments. The code, appendix, and videos are available on our project website at https://nus-lins-lab.github.io/drograspweb/.
△ Less
Submitted 8 October, 2024; v1 submitted 2 October, 2024;
originally announced October 2024.
-
Harnessing micro-Fabry-Perot reference cavities in photonic integrated circuits
Authors:
Haotian Cheng,
Chao Xiang,
Naijun Jin,
Igor Kudelin,
Joel Guo,
Matthew Heyrich,
Yifan Liu,
Jonathan Peters,
Qing-Xin Ji,
Yishu Zhou,
Kerry J. Vahala,
Franklyn Quinlan,
Scott A. Diddams,
John E. Bowers,
Peter T. Rakich
Abstract:
Compact photonic systems that offer high frequency stability and low noise are of increasing importance to applications in precision metrology, quantum computing, communication, and advanced sensing technologies. However, on-chip resonators comprised of dielectrics cannot match the frequency stability and noise characteristics of Fabry-Perot cavities, whose electromagnetic modes live almost entire…
▽ More
Compact photonic systems that offer high frequency stability and low noise are of increasing importance to applications in precision metrology, quantum computing, communication, and advanced sensing technologies. However, on-chip resonators comprised of dielectrics cannot match the frequency stability and noise characteristics of Fabry-Perot cavities, whose electromagnetic modes live almost entirely in vacuum. In this study, we present a novel strategy to interface micro-fabricated Fabry-Perot cavities with photonic integrated circuits to realize compact, high-performance integrated systems. Using this new integration approach, we demonstrate self-injection locking of an on-chip laser to a milimeter-scale vacuum-gap Fabry-Perot using a circuit interface that transforms the reflected cavity response to enable efficient feedback to the laser. This system achieves a phase noise of -97 dBc/Hz at 10 kHz offset frequency, a fractional frequency stability of 5*10-13 at 10 ms, a 150 Hz 1/pi integral linewidth, and a 35 mHz fundamental linewidth. We also present a complementary integration strategy that utilizes a vertical emission grating coupler and a back-reflection cancellation circuit to realize a fully co-integrated module that effectively redirects the reflected signals and isolates back-reflections with a 10 dB suppression ratio, readily adaptable for on-chip PDH locking. Together, these demonstrations significantly enhance the precision and functionality of RF photonic systems, paving the way for continued advancements in photonic applications.
△ Less
Submitted 1 October, 2024;
originally announced October 2024.
-
FlipGuard: Defending Preference Alignment against Update Regression with Constrained Optimization
Authors:
Mingye Zhu,
Yi Liu,
Quan Wang,
Junbo Guo,
Zhendong Mao
Abstract:
Recent breakthroughs in preference alignment have significantly improved Large Language Models' ability to generate texts that align with human preferences and values. However, current alignment metrics typically emphasize the post-hoc overall improvement, while overlooking a critical aspect: regression, which refers to the backsliding on previously correctly-handled data after updates. This poten…
▽ More
Recent breakthroughs in preference alignment have significantly improved Large Language Models' ability to generate texts that align with human preferences and values. However, current alignment metrics typically emphasize the post-hoc overall improvement, while overlooking a critical aspect: regression, which refers to the backsliding on previously correctly-handled data after updates. This potential pitfall may arise from excessive fine-tuning on already well-aligned data, which subsequently leads to over-alignment and degeneration. To address this challenge, we propose FlipGuard, a constrained optimization approach to detect and mitigate update regression with focal attention. Specifically, FlipGuard identifies performance degradation using a customized reward characterization and strategically enforces a constraint to encourage conditional congruence with the pre-aligned model during training. Comprehensive experiments demonstrate that FlipGuard effectively alleviates update regression while demonstrating excellent overall performance, with the added benefit of knowledge preservation while aligning preferences.
△ Less
Submitted 14 October, 2024; v1 submitted 1 October, 2024;
originally announced October 2024.
-
Offline Signature Verification Based on Feature Disentangling Aided Variational Autoencoder
Authors:
Hansong Zhang,
Jiangjian Guo,
Kun Li,
Yang Zhang,
Yimei Zhao
Abstract:
Offline handwritten signature verification systems are used to verify the identity of individuals, through recognizing their handwritten signature image as genuine signatures or forgeries. The main tasks of signature verification systems include extracting features from signature images and training a classifier for classification. The challenges of these tasks are twofold. First, genuine signatur…
▽ More
Offline handwritten signature verification systems are used to verify the identity of individuals, through recognizing their handwritten signature image as genuine signatures or forgeries. The main tasks of signature verification systems include extracting features from signature images and training a classifier for classification. The challenges of these tasks are twofold. First, genuine signatures and skilled forgeries are highly similar in their appearances, resulting in a small inter-class distance. Second, the instances of skilled forgeries are often unavailable, when signature verification models are being trained. To tackle these problems, this paper proposes a new signature verification method. It is the first model that employs a variational autoencoder (VAE) to extract features directly from signature images. To make the features more discriminative, it improves the traditional VAEs by introducing a new loss function for feature disentangling. In addition, it relies on SVM (Support Vector Machine) for classification according to the extracted features. Extensive experiments are conducted on two public datasets: MCYT-75 and GPDS-synthetic where the proposed method significantly outperformed $13$ representative offline signature verification methods. The achieved improvement in distinctive datasets indicates the robustness and great potential of the developed system in real application.
△ Less
Submitted 29 September, 2024;
originally announced September 2024.
-
A Search for $z=5$ H$α$ and H$β+$[O III] Dual-Line Emitting Galaxies in the JWST CEERS Field: Implications for the AGN Abundance
Authors:
Jingsong Guo,
Masafusa Onoue,
Kohei Inayoshi,
Dale D. Kocevski,
Steven L. Finkelstein,
Micaela B. Bagley,
Elizabeth J. McGrath
Abstract:
The James Webb Space Telescope (JWST) has enabled us to uncover faint galaxies and active galactic nuclei (AGNs) in the early universe. Taking advantage of the unique filter combination used in the Cosmic Evolution Early Release Science Survey (CEERS) program, we perform an extensive photometric search of galaxies emitting strong H$β+$[O III] and H$α$ lines. The redshift range of the galaxies is l…
▽ More
The James Webb Space Telescope (JWST) has enabled us to uncover faint galaxies and active galactic nuclei (AGNs) in the early universe. Taking advantage of the unique filter combination used in the Cosmic Evolution Early Release Science Survey (CEERS) program, we perform an extensive photometric search of galaxies emitting strong H$β+$[O III] and H$α$ lines. The redshift range of the galaxies is limited to $5.03\leq z\leq 5.26$ by requiring photometric excesses in NIRCam's F277W and F410M images. A total of 261 H$β+$[O III] and H$α$ dual-line emitters are found over the absolute UV magnitude $-22\lesssim M_{\mathrm{UV}}\lesssim -17$, with a mean rest-frame equivalent width of 1010 A for H$β+$[O III] and 1040 A for H$α$. This population accounts for $\sim 40\%$ of the Lyman break galaxies at this redshift range. Intriguingly, there are 58 objects (22% of the whole sample) that exhibit compact morphology at the rest-UV or optical wavelength. With an assumption that these compact dual-line emitters are dominated by AGN, their AGN bolometric luminosities are in the range of $2\times 10^{43} \lesssim L_{\rm bol}/({\rm erg~s}^{-1})\lesssim 3\times 10^{44}$. Their number density is two orders of magnitude higher than the extrapolation from the UV-selected luminous quasars, which is in good agreement with previous JWST studies of broad-line AGNs, requiring a $\sim 10\%$ of the AGN duty cycle. Moreover, our dual-line emitter sample reaches the faint end of the H$α$ and [O III] luminosity functions down to $\lesssim 10^{42}~{\rm erg~s}^{-1}$. Spectroscopic follow-up observations are planned in an approved JWST Cycle 3 program, in which we aim to confirm their nature, characterize their black hole activity, and construct their mass distribution at $10^6\lesssim M_{\rm BH}/M_\odot \lesssim 10^8$.
△ Less
Submitted 27 September, 2024;
originally announced September 2024.
-
First Measurement of Near- and Sub-Threshold $J/ψ$ Photoproduction off Nuclei
Authors:
J. R. Pybus,
L. Ehinger,
T. Kolar,
B. Devkota,
P. Sharp,
B. Yu,
M. M. Dalton,
D. Dutta,
H. Gao,
O. Hen,
E. Piasetzky,
S. N. Santiesteban,
A. Schmidt,
A. Somov,
H. Szumila-Vance,
S. Adhikari,
A. Asaturyan,
A. Austregesilo,
C. Ayerbe Gayoso,
J. Barlow,
V. V. Berdnikov,
H. D. Bhatt,
Deepak Bhetuwal,
T. Black,
W. J. Briscoe
, et al. (42 additional authors not shown)
Abstract:
We report on the first measurement of $J/ψ$ photoproduction from nuclei in the photon energy range of $7$ to $10.8$ GeV, extending above and below the photoproduction threshold in the free proton of $\sim8.2$ GeV. The experiment used a tagged photon beam incident on deuterium, helium, and carbon, and the GlueX detector at Jefferson Lab to measure the semi-inclusive $A(γ,e^+e^-p)$ reaction with a d…
▽ More
We report on the first measurement of $J/ψ$ photoproduction from nuclei in the photon energy range of $7$ to $10.8$ GeV, extending above and below the photoproduction threshold in the free proton of $\sim8.2$ GeV. The experiment used a tagged photon beam incident on deuterium, helium, and carbon, and the GlueX detector at Jefferson Lab to measure the semi-inclusive $A(γ,e^+e^-p)$ reaction with a dilepton invariant mass $M(e^+e^-)\sim m_{J/ψ}=3.1$ GeV. The incoherent $J/ψ$ photoproduction cross sections in the measured nuclei are extracted as a function of the incident photon energy, momentum transfer, and proton reconstructed missing light-cone momentum fraction. Comparisons with theoretical predictions suggest an excess of the measured cross section for sub-threshold production and for interactions with high missing light-cone momentum fraction protons. The measured enhancement can be explained by modified gluon structure for high-virtuality bound-protons.
△ Less
Submitted 27 September, 2024;
originally announced September 2024.
-
Generative Retrieval Meets Multi-Graded Relevance
Authors:
Yubao Tang,
Ruqing Zhang,
Jiafeng Guo,
Maarten de Rijke,
Wei Chen,
Xueqi Cheng
Abstract:
Generative retrieval represents a novel approach to information retrieval. It uses an encoder-decoder architecture to directly produce relevant document identifiers (docids) for queries. While this method offers benefits, current approaches are limited to scenarios with binary relevance data, overlooking the potential for documents to have multi-graded relevance. Extending generative retrieval to…
▽ More
Generative retrieval represents a novel approach to information retrieval. It uses an encoder-decoder architecture to directly produce relevant document identifiers (docids) for queries. While this method offers benefits, current approaches are limited to scenarios with binary relevance data, overlooking the potential for documents to have multi-graded relevance. Extending generative retrieval to accommodate multi-graded relevance poses challenges, including the need to reconcile likelihood probabilities for docid pairs and the possibility of multiple relevant documents sharing the same identifier. To address these challenges, we introduce a framework called GRaded Generative Retrieval (GR$^2$). GR$^2$ focuses on two key components: ensuring relevant and distinct identifiers, and implementing multi-graded constrained contrastive training. First, we create identifiers that are both semantically relevant and sufficiently distinct to represent individual documents effectively. This is achieved by jointly optimizing the relevance and distinctness of docids through a combination of docid generation and autoencoder models. Second, we incorporate information about the relationship between relevance grades to guide the training process. We use a constrained contrastive training strategy to bring the representations of queries and the identifiers of their relevant documents closer together, based on their respective relevance grades. Extensive experiments on datasets with both multi-graded and binary relevance demonstrate the effectiveness of GR$^2$.
△ Less
Submitted 26 September, 2024;
originally announced September 2024.
-
Quantum entanglement in phase space
Authors:
Shuheng Liu,
Jiajie Guo,
Qiongyi He,
Matteo Fadel
Abstract:
While commonly used entanglement criteria for continuous variable systems are based on quadrature measurements, here we study entanglement detection from measurements of the Wigner function. These are routinely performed in platforms such as trapped ions and circuit QED, where homodyne measurements are difficult to be implemented. We provide complementary criteria which we show to be tight for a v…
▽ More
While commonly used entanglement criteria for continuous variable systems are based on quadrature measurements, here we study entanglement detection from measurements of the Wigner function. These are routinely performed in platforms such as trapped ions and circuit QED, where homodyne measurements are difficult to be implemented. We provide complementary criteria which we show to be tight for a variety of experimentally relevant Gaussian and non-Gaussian states. Our results show novel approaches to detect entanglement in continuous variable systems and shed light on interesting connections between known criteria and the Wigner function.
△ Less
Submitted 26 September, 2024;
originally announced September 2024.
-
Long-lived Sterile Neutrino Searches at Future Muon Colliders
Authors:
Qi Bi,
Jinhui Guo,
Jia Liu,
Yan Luo,
Xiao-Ping Wang
Abstract:
We explore the potential of studying sterile neutrinos at a future high-energy muon collider, where these particles can generate small active neutrino masses via the seesaw mechanism and exhibit long-lived particle signatures. A Dirac sterile neutrino model with ${\rm U(1)}_{L_μ-L_τ}$ symmetry is introduced, where the heavy right-handed neutrino ($N_R$) produces tiny active neutrino masses, and th…
▽ More
We explore the potential of studying sterile neutrinos at a future high-energy muon collider, where these particles can generate small active neutrino masses via the seesaw mechanism and exhibit long-lived particle signatures. A Dirac sterile neutrino model with ${\rm U(1)}_{L_μ-L_τ}$ symmetry is introduced, where the heavy right-handed neutrino ($N_R$) produces tiny active neutrino masses, and the light left-handed neutrino ($N_L$) naturally behaves as a long-lived particle. The ${\rm U(1)}_{L_μ-L_τ}$ gauge symmetry also enhances sterile neutrino pair production at a future high-energy muon collider. Using the displaced vertex method, the muon collider can search for heavy sterile neutrino, especially for $m_L> m_W$. We find that a muon collider with $\sqrt{s} = 3~ (10)$ TeV and luminosity $L=1~(10)$ ab$^{-1}$ can probe $N_L$ masses of $m_L \in [100,~1500~(5000)]$ GeV and mixing angles $θ_{νL} \in [10^{-13}~(10^{-14}),~10^{-6}]$.
△ Less
Submitted 25 September, 2024;
originally announced September 2024.
-
Optical Multilayer Thin Film Structure Inverse Design: From Optimization to Deep Learning
Authors:
Taigao Ma,
Mingqian Ma,
L. Jay Guo
Abstract:
Optical multilayer thin film structures have been widely used in numerous photonic domains and applications. The key component to enable these applications is the inverse design. Different from other photonic structures such as metasurface or waveguide, multilayer thin film is a one-dimensional structure, which deserves its own treatment for the design process. Optimization has always been the sta…
▽ More
Optical multilayer thin film structures have been widely used in numerous photonic domains and applications. The key component to enable these applications is the inverse design. Different from other photonic structures such as metasurface or waveguide, multilayer thin film is a one-dimensional structure, which deserves its own treatment for the design process. Optimization has always been the standard design algorithm for decades. Recent years have witnessed a rapid development of integrating different deep learning algorithms to tackle the inverse design problems. A natural question to ask is: how do these algorithms differ from each other? Why do we need to develop so many algorithms and what type of challenges do they solve? What is the state-of-the-art algorithm in this domain? Here, we review recent progress and provide a guide-tour through this research area, starting from traditional optimization to recent deep learning approaches. Challenges and future perspectives are also discussed.
△ Less
Submitted 25 September, 2024;
originally announced September 2024.
-
Multi-functional reservoir computing
Authors:
Yao Du,
Haibo Luo,
Jianmin Guo,
Jinghua Xiao,
Yizhen Yu,
Xingang Wang
Abstract:
Whereas the power of reservoir computing (RC) in inferring chaotic systems has been well established in the literature, the studies are mostly restricted to mono-functional machines where the training and testing data are acquired from the same attractor. Here, using the strategies of attractor labeling and trajectory separation, we propose a new scheme of RC capable of learning multiple attractor…
▽ More
Whereas the power of reservoir computing (RC) in inferring chaotic systems has been well established in the literature, the studies are mostly restricted to mono-functional machines where the training and testing data are acquired from the same attractor. Here, using the strategies of attractor labeling and trajectory separation, we propose a new scheme of RC capable of learning multiple attractors generated by entirely different dynamics, namely multi-functional RC. Specifically, we demonstrate that by incorporating a label channel into the standard RC, a single machine is able to learn from data the dynamics of multiple chaotic attractors, while each attractor can be accurately retrieved by inputting just a scalar in the prediction phase. The dependence of the machine performance on the labeling and separation parameters is investigated, and it is found that the machine performance is optimized when the parameters take intermediate values. The working mechanism of multi-functional RC is analyzed by the method of functional networks in neuroscience, and it is revealed that each attractor is represented by a stable, unique functional network in the reservoir, and the optimal performance arises as a balance between the stability, complexity, and distinguishability of the functional networks.
△ Less
Submitted 25 September, 2024;
originally announced September 2024.
-
A Survey of Low-bit Large Language Models: Basics, Systems, and Algorithms
Authors:
Ruihao Gong,
Yifu Ding,
Zining Wang,
Chengtao Lv,
Xingyu Zheng,
Jinyang Du,
Haotong Qin,
Jinyang Guo,
Michele Magno,
Xianglong Liu
Abstract:
Large language models (LLMs) have achieved remarkable advancements in natural language processing, showcasing exceptional performance across various tasks. However, the expensive memory and computational requirements present significant challenges for their practical deployment. Low-bit quantization has emerged as a critical approach to mitigate these challenges by reducing the bit-width of model…
▽ More
Large language models (LLMs) have achieved remarkable advancements in natural language processing, showcasing exceptional performance across various tasks. However, the expensive memory and computational requirements present significant challenges for their practical deployment. Low-bit quantization has emerged as a critical approach to mitigate these challenges by reducing the bit-width of model parameters, activations, and gradients, thus decreasing memory usage and computational demands. This paper presents a comprehensive survey of low-bit quantization methods tailored for LLMs, covering the fundamental principles, system implementations, and algorithmic strategies. An overview of basic concepts and new data formats specific to low-bit LLMs is first introduced, followed by a review of frameworks and systems that facilitate low-bit LLMs across various hardware platforms. Then, we categorize and analyze techniques and toolkits for efficient low-bit training and inference of LLMs. Finally, we conclude with a discussion of future trends and potential advancements of low-bit LLMs. Our systematic overview from basic, system, and algorithm perspectives can offer valuable insights and guidelines for future works to enhance the efficiency and applicability of LLMs through low-bit quantization.
△ Less
Submitted 30 September, 2024; v1 submitted 25 September, 2024;
originally announced September 2024.
-
Context-aware and Style-related Incremental Decoding framework for Discourse-Level Literary Translation
Authors:
Yuanchang Luo,
Jiaxin Guo,
Daimeng Wei,
Hengchao Shang,
Zongyao Li,
Zhanglin Wu,
Zhiqiang Rao,
Shaojun Li,
Jinlong Yang,
Hao Yang
Abstract:
This report outlines our approach for the WMT24 Discourse-Level Literary Translation Task, focusing on the Chinese-English language pair in the Constrained Track. Translating literary texts poses significant challenges due to the nuanced meanings, idiomatic expressions, and intricate narrative structures inherent in such works. To address these challenges, we leveraged the Chinese-Llama2 model, sp…
▽ More
This report outlines our approach for the WMT24 Discourse-Level Literary Translation Task, focusing on the Chinese-English language pair in the Constrained Track. Translating literary texts poses significant challenges due to the nuanced meanings, idiomatic expressions, and intricate narrative structures inherent in such works. To address these challenges, we leveraged the Chinese-Llama2 model, specifically enhanced for this task through a combination of Continual Pre-training (CPT) and Supervised Fine-Tuning (SFT). Our methodology includes a novel Incremental Decoding framework, which ensures that each sentence is translated with consideration of its broader context, maintaining coherence and consistency throughout the text. This approach allows the model to capture long-range dependencies and stylistic elements, producing translations that faithfully preserve the original literary quality. Our experiments demonstrate significant improvements in both sentence-level and document-level BLEU scores, underscoring the effectiveness of our proposed framework in addressing the complexities of document-level literary translation.
△ Less
Submitted 29 September, 2024; v1 submitted 24 September, 2024;
originally announced September 2024.
-
Exploring the traditional NMT model and Large Language Model for chat translation
Authors:
Jinlong Yang,
Hengchao Shang,
Daimeng Wei,
Jiaxin Guo,
Zongyao Li,
Zhanglin Wu,
Zhiqiang Rao,
Shaojun Li,
Yuhao Xie,
Yuanchang Luo,
Jiawei Zheng,
Bin Wei,
Hao Yang
Abstract:
This paper describes the submissions of Huawei Translation Services Center(HW-TSC) to WMT24 chat translation shared task on English$\leftrightarrow$Germany (en-de) bidirection. The experiments involved fine-tuning models using chat data and exploring various strategies, including Minimum Bayesian Risk (MBR) decoding and self-training. The results show significant performance improvements in certai…
▽ More
This paper describes the submissions of Huawei Translation Services Center(HW-TSC) to WMT24 chat translation shared task on English$\leftrightarrow$Germany (en-de) bidirection. The experiments involved fine-tuning models using chat data and exploring various strategies, including Minimum Bayesian Risk (MBR) decoding and self-training. The results show significant performance improvements in certain directions, with the MBR self-training method achieving the best results. The Large Language Model also discusses the challenges and potential avenues for further research in the field of chat translation.
△ Less
Submitted 24 September, 2024;
originally announced September 2024.
-
Controlling Risk of Retrieval-augmented Generation: A Counterfactual Prompting Framework
Authors:
Lu Chen,
Ruqing Zhang,
Jiafeng Guo,
Yixing Fan,
Xueqi Cheng
Abstract:
Retrieval-augmented generation (RAG) has emerged as a popular solution to mitigate the hallucination issues of large language models. However, existing studies on RAG seldom address the issue of predictive uncertainty, i.e., how likely it is that a RAG model's prediction is incorrect, resulting in uncontrollable risks in real-world applications. In this work, we emphasize the importance of risk co…
▽ More
Retrieval-augmented generation (RAG) has emerged as a popular solution to mitigate the hallucination issues of large language models. However, existing studies on RAG seldom address the issue of predictive uncertainty, i.e., how likely it is that a RAG model's prediction is incorrect, resulting in uncontrollable risks in real-world applications. In this work, we emphasize the importance of risk control, ensuring that RAG models proactively refuse to answer questions with low confidence. Our research identifies two critical latent factors affecting RAG's confidence in its predictions: the quality of the retrieved results and the manner in which these results are utilized. To guide RAG models in assessing their own confidence based on these two latent factors, we develop a counterfactual prompting framework that induces the models to alter these factors and analyzes the effect on their answers. We also introduce a benchmarking procedure to collect answers with the option to abstain, facilitating a series of experiments. For evaluation, we introduce several risk-related metrics and the experimental results demonstrate the effectiveness of our approach.
△ Less
Submitted 24 September, 2024;
originally announced September 2024.