-
A single-phase epitaxially grown ferroelectric perovskite nitride
Authors:
Songhee Choi,
Qiao Jin,
Xian Zi,
Dongke Rong,
Jie Fang,
Jinfeng Zhang,
Qinghua Zhang,
Wei Li,
Shuai Xu,
Shengru Chen,
Haitao Hong,
Cui Ting,
Qianying Wang,
Gang Tang,
Chen Ge,
Can Wang,
Zhiguo Chen,
Lin Gu,
Qian Li,
Lingfei Wang,
Shanmin Wang,
Jiawang Hong,
Kuijuan Jin,
Er-Jia Guo
Abstract:
The integration of ferroelectrics with semiconductors is crucial for developing functional devices, such as field-effect transistors, tunnel junctions, and nonvolatile memories. However, the synthesis of high-quality single-crystalline ferroelectric nitride perovskites has been limited, hindering a comprehensive understanding of their switching dynamics and potential applications. Here we report t…
▽ More
The integration of ferroelectrics with semiconductors is crucial for developing functional devices, such as field-effect transistors, tunnel junctions, and nonvolatile memories. However, the synthesis of high-quality single-crystalline ferroelectric nitride perovskites has been limited, hindering a comprehensive understanding of their switching dynamics and potential applications. Here we report the synthesis and characterizations of epitaxial single-phase ferroelectric cerium tantalum nitride (CeTaN3) on both oxides and semiconductors. The polar symmetry of CeTaN3 was confirmed by observing the atomic displacement of central ions relative to the center of the TaN6 octahedra, as well as through optical second harmonic generation. We observed switchable ferroelectric domains in CeTaN3 films using piezo-response force microscopy, complemented by the characterization of square-like polarization-electric field hysteresis loops. The remanent polarization of CeTaN3 reaches approximately 20 uC/cm2 at room temperature, consistent with theoretical calculations. This work establishes a vital link between ferroelectric nitride perovskites and their practical applications, paving the way for next-generation information and energy-storage devices with enhanced performance, scalability, and manufacturability.
△ Less
Submitted 22 October, 2024;
originally announced October 2024.
-
LLM-Driven Learning Analytics Dashboard for Teachers in EFL Writing Education
Authors:
Minsun Kim,
SeonGyeom Kim,
Suyoun Lee,
Yoosang Yoon,
Junho Myung,
Haneul Yoo,
Hyunseung Lim,
Jieun Han,
Yoonsu Kim,
So-Yeon Ahn,
Juho Kim,
Alice Oh,
Hwajung Hong,
Tak Yeon Lee
Abstract:
This paper presents the development of a dashboard designed specifically for teachers in English as a Foreign Language (EFL) writing education. Leveraging LLMs, the dashboard facilitates the analysis of student interactions with an essay writing system, which integrates ChatGPT for real-time feedback. The dashboard aids teachers in monitoring student behavior, identifying noneducational interactio…
▽ More
This paper presents the development of a dashboard designed specifically for teachers in English as a Foreign Language (EFL) writing education. Leveraging LLMs, the dashboard facilitates the analysis of student interactions with an essay writing system, which integrates ChatGPT for real-time feedback. The dashboard aids teachers in monitoring student behavior, identifying noneducational interaction with ChatGPT, and aligning instructional strategies with learning objectives. By combining insights from NLP and Human-Computer Interaction (HCI), this study demonstrates how a human-centered approach can enhance the effectiveness of teacher dashboards, particularly in ChatGPT-integrated learning.
△ Less
Submitted 19 October, 2024;
originally announced October 2024.
-
Leveraging Estimated Transferability Over Human Intuition for Model Selection in Text Ranking
Authors:
Jun Bai,
Zhuofan Chen,
Zhenzi Li,
Hanhua Hong,
Jianfei Zhang,
Chen Li,
Chenghua Lin,
Wenge Rong
Abstract:
Text ranking has witnessed significant advancements, attributed to the utilization of dual-encoder enhanced by Pre-trained Language Models (PLMs). Given the proliferation of available PLMs, selecting the most effective one for a given dataset has become a non-trivial challenge. As a promising alternative to human intuition and brute-force fine-tuning, Transferability Estimation (TE) has emerged as…
▽ More
Text ranking has witnessed significant advancements, attributed to the utilization of dual-encoder enhanced by Pre-trained Language Models (PLMs). Given the proliferation of available PLMs, selecting the most effective one for a given dataset has become a non-trivial challenge. As a promising alternative to human intuition and brute-force fine-tuning, Transferability Estimation (TE) has emerged as an effective approach to model selection. However, current TE methods are primarily designed for classification tasks, and their estimated transferability may not align well with the objectives of text ranking. To address this challenge, we propose to compute the expected rank as transferability, explicitly reflecting the model's ranking capability. Furthermore, to mitigate anisotropy and incorporate training dynamics, we adaptively scale isotropic sentence embeddings to yield an accurate expected rank score. Our resulting method, Adaptive Ranking Transferability (AiRTran), can effectively capture subtle differences between models. On challenging model selection scenarios across various text ranking datasets, it demonstrates significant improvements over previous classification-oriented TE methods, human intuition, and ChatGPT with minor time consumption.
△ Less
Submitted 24 September, 2024;
originally announced September 2024.
-
A Generalization of Habicht's Theorem for Subresultants of Several Univariate Polynomials
Authors:
Hoon Hong,
Jiaqi Meng,
Jing Yang
Abstract:
Subresultants of two univariate polynomials are one of the most classic and ubiquitous objects in computational algebra and algebraic geometry. In 1948, Habicht discovered and proved interesting relationships among subresultants. Those relationships were found to be useful for both structural understanding and efficient computation. Often one needs to consider several (possibly more than two) poly…
▽ More
Subresultants of two univariate polynomials are one of the most classic and ubiquitous objects in computational algebra and algebraic geometry. In 1948, Habicht discovered and proved interesting relationships among subresultants. Those relationships were found to be useful for both structural understanding and efficient computation. Often one needs to consider several (possibly more than two) polynomials. It is rather straightforward to generalize the notion of subresultants to several polynomials. However, it is not obvious (in fact, quite challenging) to generalize the Habicht's result to several polynomials. The main contribution of this paper is to provide such a generalization.
△ Less
Submitted 19 September, 2024;
originally announced September 2024.
-
AACessTalk: Fostering Communication between Minimally Verbal Autistic Children and Parents with Contextual Guidance and Card Recommendation
Authors:
Dasom Choi,
SoHyun Park,
Kyungah Lee,
Hwajung Hong,
Young-Ho Kim
Abstract:
As minimally verbal autistic (MVA) children communicate with parents through few words and nonverbal cues, parents often struggle to encourage their children to express subtle emotions and needs and to grasp their nuanced signals. We present AACessTalk, a tablet-based, AI-mediated communication system that facilitates meaningful exchanges between an MVA child and a parent. AACessTalk provides real…
▽ More
As minimally verbal autistic (MVA) children communicate with parents through few words and nonverbal cues, parents often struggle to encourage their children to express subtle emotions and needs and to grasp their nuanced signals. We present AACessTalk, a tablet-based, AI-mediated communication system that facilitates meaningful exchanges between an MVA child and a parent. AACessTalk provides real-time guides to the parent to engage the child in conversation and, in turn, recommends contextual vocabulary cards to the child. Through a two-week deployment study with 11 MVA child-parent dyads, we examine how AACessTalk fosters everyday conversation practice and mutual engagement. Our findings show high engagement from all dyads, leading to increased frequency of conversation and turn-taking. AACessTalk also encouraged parents to explore their own interaction strategies and empowered the children to have more agency in communication. We discuss the implications of designing technologies for balanced communication dynamics in parent-MVA child interaction.
△ Less
Submitted 17 September, 2024; v1 submitted 15 September, 2024;
originally announced September 2024.
-
Identify Design Problems Through Questioning: Exploring Role-playing Interactions with Large Language Models to Foster Design Questioning Skills
Authors:
Hyunseung Lim,
Dasom Choi,
Hwajung Hong
Abstract:
Identifying design problems is a crucial step for creating plausible solutions, but it is challenging for design novices due to their limited knowledge and experience. Questioning is a promising skill that enables students to independently identify design problems without being passive or relying on instructors. This study explores role-playing interactions with Large Language Model (LLM)-powered…
▽ More
Identifying design problems is a crucial step for creating plausible solutions, but it is challenging for design novices due to their limited knowledge and experience. Questioning is a promising skill that enables students to independently identify design problems without being passive or relying on instructors. This study explores role-playing interactions with Large Language Model (LLM)-powered Conversational Agents (CAs) to foster the questioning skills of novice design students. We proposed an LLM-powered CA prototype and conducted a preliminary study with 16 novice design students engaged in a real-world design class to observe the interactions between students and the LLM-powered CAs. Our findings indicate that while the CAs stimulated questioning and reduced pressure to ask questions, it also inadvertently led to over-reliance on LLM responses. We proposed design considerations and future works for LLM-powered CA to foster questioning skills.
△ Less
Submitted 11 September, 2024;
originally announced September 2024.
-
MetaBGM: Dynamic Soundtrack Transformation For Continuous Multi-Scene Experiences With Ambient Awareness And Personalization
Authors:
Haoxuan Liu,
Zihao Wang,
Haorong Hong,
Youwei Feng,
Jiaxin Yu,
Han Diao,
Yunfei Xu,
Kejun Zhang
Abstract:
This paper introduces MetaBGM, a groundbreaking framework for generating background music that adapts to dynamic scenes and real-time user interactions. We define multi-scene as variations in environmental contexts, such as transitions in game settings or movie scenes. To tackle the challenge of converting backend data into music description texts for audio generation models, MetaBGM employs a nov…
▽ More
This paper introduces MetaBGM, a groundbreaking framework for generating background music that adapts to dynamic scenes and real-time user interactions. We define multi-scene as variations in environmental contexts, such as transitions in game settings or movie scenes. To tackle the challenge of converting backend data into music description texts for audio generation models, MetaBGM employs a novel two-stage generation approach that transforms continuous scene and user state data into these texts, which are then fed into an audio generation model for real-time soundtrack creation. Experimental results demonstrate that MetaBGM effectively generates contextually relevant and dynamic background music for interactive applications.
△ Less
Submitted 5 September, 2024;
originally announced September 2024.
-
Curvature estimates for semi-convex solutions of asymptotic Plateau problem in $\mathbb{H}^{n+1}$
Authors:
Han Hong,
Ruijia Zhang
Abstract:
In this paper, we consider the asymptotic $σ_k$ Plateau problem in hyperbolic space. We establish $C^2$ estimates for semi-convex complete hypersurfaces satisfying constant $σ_k$ curvature with a prescribed asymptotic boundary at the infinity for $2\leq k\leq n-2$ . The result is based on a new crucial concavity inequality derived for hessian equations.
In this paper, we consider the asymptotic $σ_k$ Plateau problem in hyperbolic space. We establish $C^2$ estimates for semi-convex complete hypersurfaces satisfying constant $σ_k$ curvature with a prescribed asymptotic boundary at the infinity for $2\leq k\leq n-2$ . The result is based on a new crucial concavity inequality derived for hessian equations.
△ Less
Submitted 18 August, 2024;
originally announced August 2024.
-
Navigating Beyond Instructions: Vision-and-Language Navigation in Obstructed Environments
Authors:
Haodong Hong,
Sen Wang,
Zi Huang,
Qi Wu,
Jiajun Liu
Abstract:
Real-world navigation often involves dealing with unexpected obstructions such as closed doors, moved objects, and unpredictable entities. However, mainstream Vision-and-Language Navigation (VLN) tasks typically assume instructions perfectly align with the fixed and predefined navigation graphs without any obstructions. This assumption overlooks potential discrepancies in actual navigation graphs…
▽ More
Real-world navigation often involves dealing with unexpected obstructions such as closed doors, moved objects, and unpredictable entities. However, mainstream Vision-and-Language Navigation (VLN) tasks typically assume instructions perfectly align with the fixed and predefined navigation graphs without any obstructions. This assumption overlooks potential discrepancies in actual navigation graphs and given instructions, which can cause major failures for both indoor and outdoor agents. To address this issue, we integrate diverse obstructions into the R2R dataset by modifying both the navigation graphs and visual observations, introducing an innovative dataset and task, R2R with UNexpected Obstructions (R2R-UNO). R2R-UNO contains various types and numbers of path obstructions to generate instruction-reality mismatches for VLN research. Experiments on R2R-UNO reveal that state-of-the-art VLN methods inevitably encounter significant challenges when facing such mismatches, indicating that they rigidly follow instructions rather than navigate adaptively. Therefore, we propose a novel method called ObVLN (Obstructed VLN), which includes a curriculum training strategy and virtual graph construction to help agents effectively adapt to obstructed environments. Empirical results show that ObVLN not only maintains robust performance in unobstructed scenarios but also achieves a substantial performance advantage with unexpected obstructions.
△ Less
Submitted 31 July, 2024;
originally announced July 2024.
-
Efficient and generalizable prediction of molecular alterations in multiple cancer cohorts using H&E whole slide images
Authors:
Kshitij Ingale,
Sun Hae Hong,
Qiyuan Hu,
Renyu Zhang,
Bo Osinski,
Mina Khoshdeli,
Josh Och,
Kunal Nagpal,
Martin C. Stumpe,
Rohan P. Joshi
Abstract:
Molecular testing of tumor samples for targetable biomarkers is restricted by a lack of standardization, turnaround-time, cost, and tissue availability across cancer types. Additionally, targetable alterations of low prevalence may not be tested in routine workflows. Algorithms that predict DNA alterations from routinely generated hematoxylin and eosin (H&E)-stained images could prioritize samples…
▽ More
Molecular testing of tumor samples for targetable biomarkers is restricted by a lack of standardization, turnaround-time, cost, and tissue availability across cancer types. Additionally, targetable alterations of low prevalence may not be tested in routine workflows. Algorithms that predict DNA alterations from routinely generated hematoxylin and eosin (H&E)-stained images could prioritize samples for confirmatory molecular testing. Costs and the necessity of a large number of samples containing mutations limit approaches that train individual algorithms for each alteration. In this work, models were trained for simultaneous prediction of multiple DNA alterations from H&E images using a multi-task approach. Compared to biomarker-specific models, this approach performed better on average, with pronounced gains for rare mutations. The models reasonably generalized to independent temporal-holdout, externally-stained, and multi-site TCGA test sets. Additionally, whole slide image embeddings derived using multi-task models demonstrated strong performance in downstream tasks that were not a part of training. Overall, this is a promising approach to develop clinically useful algorithms that provide multiple actionable predictions from a single slide.
△ Less
Submitted 22 July, 2024;
originally announced July 2024.
-
Universally Harmonizing Differential Privacy Mechanisms for Federated Learning: Boosting Accuracy and Convergence
Authors:
Shuya Feng,
Meisam Mohammady,
Hanbin Hong,
Shenao Yan,
Ashish Kundu,
Binghui Wang,
Yuan Hong
Abstract:
Differentially private federated learning (DP-FL) is a promising technique for collaborative model training while ensuring provable privacy for clients. However, optimizing the tradeoff between privacy and accuracy remains a critical challenge. To our best knowledge, we propose the first DP-FL framework (namely UDP-FL), which universally harmonizes any randomization mechanism (e.g., an optimal one…
▽ More
Differentially private federated learning (DP-FL) is a promising technique for collaborative model training while ensuring provable privacy for clients. However, optimizing the tradeoff between privacy and accuracy remains a critical challenge. To our best knowledge, we propose the first DP-FL framework (namely UDP-FL), which universally harmonizes any randomization mechanism (e.g., an optimal one) with the Gaussian Moments Accountant (viz. DP-SGD) to significantly boost accuracy and convergence. Specifically, UDP-FL demonstrates enhanced model performance by mitigating the reliance on Gaussian noise. The key mediator variable in this transformation is the Rényi Differential Privacy notion, which is carefully used to harmonize privacy budgets. We also propose an innovative method to theoretically analyze the convergence for DP-FL (including our UDP-FL ) based on mode connectivity analysis. Moreover, we evaluate our UDP-FL through extensive experiments benchmarked against state-of-the-art (SOTA) methods, demonstrating superior performance on both privacy guarantees and model performance. Notably, UDP-FL exhibits substantial resilience against different inference attacks, indicating a significant advance in safeguarding sensitive data in federated learning environments.
△ Less
Submitted 23 July, 2024; v1 submitted 19 July, 2024;
originally announced July 2024.
-
Dark matter limits from the tip of the red giant branch of globular clusters
Authors:
Haozhi Hong,
Aaron C. Vincent
Abstract:
Capture and annihilation of WIMP-like dark matter in red giant stars can lead to faster-than-expected ignition of the helium core, and thus a lower tip of the red giant branch (TRGB) luminosity. We use Gaia data to place constraints on the dark matter-nucleon cross section using 22 globular clusters with measured TRGB luminosities, and place projections on the sensitivity resulting from 161 cluste…
▽ More
Capture and annihilation of WIMP-like dark matter in red giant stars can lead to faster-than-expected ignition of the helium core, and thus a lower tip of the red giant branch (TRGB) luminosity. We use Gaia data to place constraints on the dark matter-nucleon cross section using 22 globular clusters with measured TRGB luminosities, and place projections on the sensitivity resulting from 161 clusters with full phase space distributions observed by Gaia. Although limits remain weaker than those from Earth-based direct detection experiments, they represent a constraint that is fully independent of dark matter properties in the Solar neighbourhood, probing its properties across the entire Milky Way galaxy. Based on our findings, it is likely that the use of the TRGB as a standard candle in $H_0$ measurements is very robust against the effects of dark matter.
△ Less
Submitted 11 July, 2024;
originally announced July 2024.
-
On $δ$-Stable Minimal Hypersurfaces in $\mathbb{R}^{n+1}$
Authors:
Han Hong,
Haizhong Li,
Gaoming Wang
Abstract:
In this paper, we extend several results established for stable minimal hypersurfaces to $δ$-stable minimal hypersurfaces. These include the regularity and compactness theorems for immersed $δ$-stable minimal hypersurfaces in $\mathbb{R}^{n+1}$ when $n \geq 3$ and $δ> \frac{n-2}{n}$, as well as the $δ$-stable Bernstein theorem for $n=3$ and $n=4$ for properly immersion. The range of $δ$ is optimal…
▽ More
In this paper, we extend several results established for stable minimal hypersurfaces to $δ$-stable minimal hypersurfaces. These include the regularity and compactness theorems for immersed $δ$-stable minimal hypersurfaces in $\mathbb{R}^{n+1}$ when $n \geq 3$ and $δ> \frac{n-2}{n}$, as well as the $δ$-stable Bernstein theorem for $n=3$ and $n=4$ for properly immersion. The range of $δ$ is optimal, as the $n$-dimensional catenoid in $\mathbb{R}^{n+1}$ is $\frac{n-2}{n}$-stable.
△ Less
Submitted 3 July, 2024;
originally announced July 2024.
-
CBPF: Filtering Poisoned Data Based on Composite Backdoor Attack
Authors:
Hanfeng Xia,
Haibo Hong,
Ruili Wang
Abstract:
Backdoor attacks involve the injection of a limited quantity of poisoned examples containing triggers into the training dataset. During the inference stage, backdoor attacks can uphold a high level of accuracy for normal examples, yet when presented with trigger-containing instances, the model may erroneously predict them as the targeted class designated by the attacker. This paper explores strate…
▽ More
Backdoor attacks involve the injection of a limited quantity of poisoned examples containing triggers into the training dataset. During the inference stage, backdoor attacks can uphold a high level of accuracy for normal examples, yet when presented with trigger-containing instances, the model may erroneously predict them as the targeted class designated by the attacker. This paper explores strategies for mitigating the risks associated with backdoor attacks by examining the filtration of poisoned samples.We primarily leverage two key characteristics of backdoor attacks: the ability for multiple backdoors to exist simultaneously within a single model, and the discovery through Composite Backdoor Attack (CBA) that altering two triggers in a sample to new target labels does not compromise the original functionality of the triggers, yet enables the prediction of the data as a new target class when both triggers are present simultaneously.Therefore, a novel three-stage poisoning data filtering approach, known as Composite Backdoor Poison Filtering (CBPF), is proposed as an effective solution. Firstly, utilizing the identified distinctions in output between poisoned and clean samples, a subset of data is partitioned to include both poisoned and clean instances. Subsequently, benign triggers are incorporated and labels are adjusted to create new target and benign target classes, thereby prompting the poisoned and clean data to be classified as distinct entities during the inference stage. The experimental results indicate that CBPF is successful in filtering out malicious data produced by six advanced attacks on CIFAR10 and ImageNet-12. On average, CBPF attains a notable filtering success rate of 99.91% for the six attacks on CIFAR10. Additionally, the model trained on the uncontaminated samples exhibits sustained high accuracy levels.
△ Less
Submitted 23 June, 2024;
originally announced June 2024.
-
Full reference point cloud quality assessment using support vector regression
Authors:
Ryosuke Watanabe,
Shashank N. Sridhara,
Haoran Hong,
Eduardo Pavez,
Keisuke Nonaka,
Tatsuya Kobayashi,
Antonio Ortega
Abstract:
Point clouds are a general format for representing realistic 3D objects in diverse 3D applications. Since point clouds have large data sizes, developing efficient point cloud compression methods is crucial. However, excessive compression leads to various distortions, which deteriorates the point cloud quality perceived by end users. Thus, establishing reliable point cloud quality assessment (PCQA)…
▽ More
Point clouds are a general format for representing realistic 3D objects in diverse 3D applications. Since point clouds have large data sizes, developing efficient point cloud compression methods is crucial. However, excessive compression leads to various distortions, which deteriorates the point cloud quality perceived by end users. Thus, establishing reliable point cloud quality assessment (PCQA) methods is essential as a benchmark to develop efficient compression methods. This paper presents an accurate full-reference point cloud quality assessment (FR-PCQA) method called full-reference quality assessment using support vector regression (FRSVR) for various types of degradations such as compression distortion, Gaussian noise, and down-sampling. The proposed method demonstrates accurate PCQA by integrating five FR-based metrics covering various types of errors (e.g., considering geometric distortion, color distortion, and point count) using support vector regression (SVR). Moreover, the proposed method achieves a superior trade-off between accuracy and calculation speed because it includes only the calculation of these five simple metrics and SVR, which can perform fast prediction. Experimental results with three types of open datasets show that the proposed method is more accurate than conventional FR-PCQA methods. In addition, the proposed method is faster than state-of-the-art methods that utilize complicated features such as curvature and multi-scale features. Thus, the proposed method provides excellent performance in terms of the accuracy of PCQA and processing speed. Our method is available from https://github.com/STAC-USC/FRSVR-PCQA.
△ Less
Submitted 15 June, 2024;
originally announced June 2024.
-
An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection
Authors:
Shenao Yan,
Shen Wang,
Yue Duan,
Hanbin Hong,
Kiho Lee,
Doowon Kim,
Yuan Hong
Abstract:
Large Language Models (LLMs) have transformed code completion tasks, providing context-based suggestions to boost developer productivity in software engineering. As users often fine-tune these models for specific applications, poisoning and backdoor attacks can covertly alter the model outputs. To address this critical security challenge, we introduce CodeBreaker, a pioneering LLM-assisted backdoo…
▽ More
Large Language Models (LLMs) have transformed code completion tasks, providing context-based suggestions to boost developer productivity in software engineering. As users often fine-tune these models for specific applications, poisoning and backdoor attacks can covertly alter the model outputs. To address this critical security challenge, we introduce CodeBreaker, a pioneering LLM-assisted backdoor attack framework on code completion models. Unlike recent attacks that embed malicious payloads in detectable or irrelevant sections of the code (e.g., comments), CodeBreaker leverages LLMs (e.g., GPT-4) for sophisticated payload transformation (without affecting functionalities), ensuring that both the poisoned data for fine-tuning and generated code can evade strong vulnerability detection. CodeBreaker stands out with its comprehensive coverage of vulnerabilities, making it the first to provide such an extensive set for evaluation. Our extensive experimental evaluations and user studies underline the strong attack performance of CodeBreaker across various settings, validating its superiority over existing approaches. By integrating malicious payloads directly into the source code with minimal transformation, CodeBreaker challenges current security measures, underscoring the critical need for more robust defenses for code completion.
△ Less
Submitted 10 June, 2024;
originally announced June 2024.
-
Biomarker-Guided Adaptive Enrichment Design with Threshold Detection for Clinical Trials with Time-to-Event Outcome
Authors:
Kaiyuan Hua,
Hwanhee Hong,
Xiaofei Wang
Abstract:
Biomarker-guided designs are increasingly used to evaluate personalized treatments based on patients' biomarker status in Phase II and III clinical trials. With adaptive enrichment, these designs can improve the efficiency of evaluating the treatment effect in biomarker-positive patients by increasing their proportion in the randomized trial. While time-to-event outcomes are often used as the prim…
▽ More
Biomarker-guided designs are increasingly used to evaluate personalized treatments based on patients' biomarker status in Phase II and III clinical trials. With adaptive enrichment, these designs can improve the efficiency of evaluating the treatment effect in biomarker-positive patients by increasing their proportion in the randomized trial. While time-to-event outcomes are often used as the primary endpoint to measure treatment effects for a new therapy in severe diseases like cancer and cardiovascular diseases, there is limited research on biomarker-guided adaptive enrichment trials in this context. Such trials almost always adopt hazard ratio methods for statistical measurement of treatment effects. In contrast, restricted mean survival time (RMST) has gained popularity for analyzing time-to-event outcomes because it offers more straightforward interpretations of treatment effects and does not require the proportional hazard assumption. This paper proposes a two-stage biomarker-guided adaptive RMST design with threshold detection and patient enrichment. We develop sophisticated methods for identifying the optimal biomarker threshold, treatment effect estimators in the biomarker-positive subgroup, and approaches for type I error rate, power analysis, and sample size calculation. We present a numerical example of re-designing an oncology trial. An extensive simulation study is conducted to evaluate the performance of the proposed design.
△ Less
Submitted 10 June, 2024;
originally announced June 2024.
-
Why Only Text: Empowering Vision-and-Language Navigation with Multi-modal Prompts
Authors:
Haodong Hong,
Sen Wang,
Zi Huang,
Qi Wu,
Jiajun Liu
Abstract:
Current Vision-and-Language Navigation (VLN) tasks mainly employ textual instructions to guide agents. However, being inherently abstract, the same textual instruction can be associated with different visual signals, causing severe ambiguity and limiting the transfer of prior knowledge in the vision domain from the user to the agent. To fill this gap, we propose Vision-and-Language Navigation with…
▽ More
Current Vision-and-Language Navigation (VLN) tasks mainly employ textual instructions to guide agents. However, being inherently abstract, the same textual instruction can be associated with different visual signals, causing severe ambiguity and limiting the transfer of prior knowledge in the vision domain from the user to the agent. To fill this gap, we propose Vision-and-Language Navigation with Multi-modal Prompts (VLN-MP), a novel task augmenting traditional VLN by integrating both natural language and images in instructions. VLN-MP not only maintains backward compatibility by effectively handling text-only prompts but also consistently shows advantages with different quantities and relevance of visual prompts. Possible forms of visual prompts include both exact and similar object images, providing adaptability and versatility in diverse navigation scenarios. To evaluate VLN-MP under a unified framework, we implement a new benchmark that offers: (1) a training-free pipeline to transform textual instructions into multi-modal forms with landmark images; (2) diverse datasets with multi-modal instructions for different downstream tasks; (3) a novel module designed to process various image prompts for seamless integration with state-of-the-art VLN models. Extensive experiments on four VLN benchmarks (R2R, RxR, REVERIE, CVDN) show that incorporating visual prompts significantly boosts navigation performance. While maintaining efficiency with text-only prompts, VLN-MP enables agents to navigate in the pre-explore setting and outperform text-based models, showing its broader applicability.
△ Less
Submitted 4 June, 2024;
originally announced June 2024.
-
GenMix: Combining Generative and Mixture Data Augmentation for Medical Image Classification
Authors:
Hansang Lee,
Haeil Lee,
Helen Hong
Abstract:
In this paper, we propose a novel data augmentation technique called GenMix, which combines generative and mixture approaches to leverage the strengths of both methods. While generative models excel at creating new data patterns, they face challenges such as mode collapse in GANs and difficulties in training diffusion models, especially with limited medical imaging data. On the other hand, mixture…
▽ More
In this paper, we propose a novel data augmentation technique called GenMix, which combines generative and mixture approaches to leverage the strengths of both methods. While generative models excel at creating new data patterns, they face challenges such as mode collapse in GANs and difficulties in training diffusion models, especially with limited medical imaging data. On the other hand, mixture models enhance class boundary regions but tend to favor the major class in scenarios with class imbalance. To address these limitations, GenMix integrates both approaches to complement each other. GenMix operates in two stages: (1) training a generative model to produce synthetic images, and (2) performing mixup between synthetic and real data. This process improves the quality and diversity of synthetic data while simultaneously benefiting from the new pattern learning of generative models and the boundary enhancement of mixture models. We validate the effectiveness of our method on the task of classifying focal liver lesions (FLLs) in CT images. Our results demonstrate that GenMix enhances the performance of various generative models, including DCGAN, StyleGAN, Textual Inversion, and Diffusion Models. Notably, the proposed method with Textual Inversion outperforms other methods without fine-tuning diffusion model on the FLL dataset.
△ Less
Submitted 16 July, 2024; v1 submitted 31 May, 2024;
originally announced May 2024.
-
Designing Prompt Analytics Dashboards to Analyze Student-ChatGPT Interactions in EFL Writing
Authors:
Minsun Kim,
SeonGyeom Kim,
Suyoun Lee,
Yoosang Yoon,
Junho Myung,
Haneul Yoo,
Hyunseung Lim,
Jieun Han,
Yoonsu Kim,
So-Yeon Ahn,
Juho Kim,
Alice Oh,
Hwajung Hong,
Tak Yeon Lee
Abstract:
While ChatGPT has significantly impacted education by offering personalized resources for students, its integration into educational settings poses unprecedented risks, such as inaccuracies and biases in AI-generated content, plagiarism and over-reliance on AI, and privacy and security issues. To help teachers address such risks, we conducted a two-phase iterative design process that comprises sur…
▽ More
While ChatGPT has significantly impacted education by offering personalized resources for students, its integration into educational settings poses unprecedented risks, such as inaccuracies and biases in AI-generated content, plagiarism and over-reliance on AI, and privacy and security issues. To help teachers address such risks, we conducted a two-phase iterative design process that comprises surveys, interviews, and prototype demonstration involving six EFL (English as a Foreign Language) teachers, who integrated ChatGPT into semester-long English essay writing classes. Based on the needs identified during the initial survey and interviews, we developed a prototype of Prompt Analytics Dashboard (PAD) that integrates the essay editing history and chat logs between students and ChatGPT. Teacher's feedback on the prototype informs additional features and unmet needs for designing future PAD, which helps them (1) analyze contextual analysis of student behaviors, (2) design an overall learning loop, and (3) develop their teaching skills.
△ Less
Submitted 18 October, 2024; v1 submitted 30 May, 2024;
originally announced May 2024.
-
Smooth connectivity in real algebraic varieties
Authors:
Joseph Cummings,
Jonathan D. Hauenstein,
Hoon Hong,
Clifford D. Smyth
Abstract:
A standard question in real algebraic geometry is to compute the number of connected components of a real algebraic variety in affine space. By adapting an approach for determining connectivity in complements of real hypersurfaces by Hong, Rohal, Safey El Din, and Schost, algorithms are presented for computing the number of connected components, the Euler characteristic, and deciding the connectiv…
▽ More
A standard question in real algebraic geometry is to compute the number of connected components of a real algebraic variety in affine space. By adapting an approach for determining connectivity in complements of real hypersurfaces by Hong, Rohal, Safey El Din, and Schost, algorithms are presented for computing the number of connected components, the Euler characteristic, and deciding the connectivity between two points for a smooth manifold arising as the complement of a real hypersurface of a real algebraic variety. When taking such real hypersurface to be the set of singular points, this yields an approach for determining smooth connectivity in a real algebraic variety. The method is based upon gradient ascent/descent paths on the real algebraic variety and several examples are included to demonstrate the approach.
△ Less
Submitted 28 May, 2024;
originally announced May 2024.
-
Extraction of In-Phase and Quadrature Components by Time-Encoding Sampling
Authors:
Y. H. Shao,
S. Y. Chen,
H. Z. Yang,
F. Xi,
H. Hong,
Z. Liu
Abstract:
Time encoding machine (TEM) is a biologically-inspired scheme to perform signal sampling using timing. In this paper, we study its application to the sampling of bandpass signals. We propose an integrate-and-fire TEM scheme by which the in-phase (I) and quadrature (Q) components are extracted through reconstruction. We design the TEM according to the signal bandwidth and amplitude instead of upper…
▽ More
Time encoding machine (TEM) is a biologically-inspired scheme to perform signal sampling using timing. In this paper, we study its application to the sampling of bandpass signals. We propose an integrate-and-fire TEM scheme by which the in-phase (I) and quadrature (Q) components are extracted through reconstruction. We design the TEM according to the signal bandwidth and amplitude instead of upper-edge frequency and amplitude as in the case of bandlimited/lowpass signals. We show that the I and Q components can be perfectly reconstructed from the TEM measurements if the minimum firing rate is equal to the Landau's rate of the signal. For the reconstruction of I and Q components, we develop an alternating projection onto convex sets (POCS) algorithm in which two POCS algorithms are alternately iterated. For the algorithm analysis, we define a solution space of vector-valued signals and prove that the proposed reconstruction algorithm converges to the correct unique solution in the noiseless case. The proposed TEM can operate regardless of the center frequencies of the bandpass signals. This is quite different from traditional bandpass sampling, where the center frequency should be carefully allocated for Landau's rate and its variations have the negative effect on the sampling performance. In addition, the proposed TEM achieves certain reconstructed signal-to-noise-plus-distortion ratios for small firing rates in thermal noise, which is unavoidably present and will be aliased to the Nyquist band in the traditional sampling such that high sampling rates are required. We demonstrate the reconstruction performance and substantiate our claims via simulation experiments.
△ Less
Submitted 27 May, 2024;
originally announced May 2024.
-
Certifying Adapters: Enabling and Enhancing the Certification of Classifier Adversarial Robustness
Authors:
Jieren Deng,
Hanbin Hong,
Aaron Palmer,
Xin Zhou,
Jinbo Bi,
Kaleel Mahmood,
Yuan Hong,
Derek Aguiar
Abstract:
Randomized smoothing has become a leading method for achieving certified robustness in deep classifiers against l_{p}-norm adversarial perturbations. Current approaches for achieving certified robustness, such as data augmentation with Gaussian noise and adversarial training, require expensive training procedures that tune large models for different Gaussian noise levels and thus cannot leverage h…
▽ More
Randomized smoothing has become a leading method for achieving certified robustness in deep classifiers against l_{p}-norm adversarial perturbations. Current approaches for achieving certified robustness, such as data augmentation with Gaussian noise and adversarial training, require expensive training procedures that tune large models for different Gaussian noise levels and thus cannot leverage high-performance pre-trained neural networks. In this work, we introduce a novel certifying adapters framework (CAF) that enables and enhances the certification of classifier adversarial robustness. Our approach makes few assumptions about the underlying training algorithm or feature extractor and is thus broadly applicable to different feature extractor architectures (e.g., convolutional neural networks or vision transformers) and smoothing algorithms. We show that CAF (a) enables certification in uncertified models pre-trained on clean datasets and (b) substantially improves the performance of certified classifiers via randomized smoothing and SmoothAdv at multiple radii in CIFAR-10 and ImageNet. We demonstrate that CAF achieves improved certified accuracies when compared to methods based on random or denoised smoothing, and that CAF is insensitive to certifying adapter hyperparameters. Finally, we show that an ensemble of adapters enables a single pre-trained feature extractor to defend against a range of noise perturbation scales.
△ Less
Submitted 24 May, 2024;
originally announced May 2024.
-
Fast 3D Molecule Generation via Unified Geometric Optimal Transport
Authors:
Haokai Hong,
Wanyu Lin,
Kay Chen Tan
Abstract:
This paper proposes a new 3D molecule generation framework, called GOAT, for fast and effective 3D molecule generation based on the flow-matching optimal transport objective. Specifically, we formulate a geometric transport formula for measuring the cost of mapping multi-modal features (e.g., continuous atom coordinates and categorical atom types) between a base distribution and a target data dist…
▽ More
This paper proposes a new 3D molecule generation framework, called GOAT, for fast and effective 3D molecule generation based on the flow-matching optimal transport objective. Specifically, we formulate a geometric transport formula for measuring the cost of mapping multi-modal features (e.g., continuous atom coordinates and categorical atom types) between a base distribution and a target data distribution. Our formula is solved within a unified, equivalent, and smooth representation space. This is achieved by transforming the multi-modal features into a continuous latent space with equivalent networks. In addition, we find that identifying optimal distributional coupling is necessary for fast and effective transport between any two distributions. We further propose a flow refinement and purification mechanism for optimal coupling identification. By doing so, GOAT can turn arbitrary distribution couplings into new deterministic couplings, leading to a unified optimal transport path for fast 3D molecule generation. The purification filters the subpar molecules to ensure the ultimate generation performance. We theoretically prove the proposed method indeed reduced the transport cost. Finally, extensive experiments show that GOAT enjoys the efficiency of solving geometric optimal transport, leading to a double speedup compared to the sub-optimal method while achieving the best generation quality regarding validity, uniqueness, and novelty.
△ Less
Submitted 24 May, 2024;
originally announced May 2024.
-
Rigidity and nonexistence of CMC hypersurfaces in 5-manifolds
Authors:
Han Hong,
Zetian Yan
Abstract:
We prove that the nonnegative $3$-intermediate Ricci curvature and uniformly positive $k$-triRic curvature implies rigidity of complete noncompact two-sided stable minimal hypersurfaces in a Riemannian manifold $(X^5,g)$ with bounded geometry. The nonnegativity of $3$-intermediate Ricci curvature can be replaced by nonnegative Ricci and biRic curvature. In particular, there is no complete noncompa…
▽ More
We prove that the nonnegative $3$-intermediate Ricci curvature and uniformly positive $k$-triRic curvature implies rigidity of complete noncompact two-sided stable minimal hypersurfaces in a Riemannian manifold $(X^5,g)$ with bounded geometry. The nonnegativity of $3$-intermediate Ricci curvature can be replaced by nonnegative Ricci and biRic curvature. In particular, there is no complete noncompact finite index CMC hypersurface in a closed $5$-dimensional manifold with positive sectional curvature. It extends result of Chodosh-Li-Stryker [to appear in J. Eur. Math. Soc (2024)] to $5$-dimensions. We also prove that complete constant mean curvature hypersurfaces in hyperbolic space $\mathbb{H}^5$ with finite index and the mean curvature greater than $\frac{\sqrt{65}}{8}$ must be compact. This improves the previous larger bound $\frac{\sqrt{175}}{\sqrt{148}}$ on the mean curvature.
△ Less
Submitted 23 May, 2024; v1 submitted 10 May, 2024;
originally announced May 2024.
-
Power Variable Projection for Initialization-Free Large-Scale Bundle Adjustment
Authors:
Simon Weber,
Je Hyeong Hong,
Daniel Cremers
Abstract:
Most Bundle Adjustment (BA) solvers like the Levenberg-Marquardt algorithm require a good initialization. Instead, initialization-free BA remains a largely uncharted territory. The under-explored Variable Projection algorithm (VarPro) exhibits a wide convergence basin even without initialization. Coupled with object space error formulation, recent works have shown its ability to solve small-scale…
▽ More
Most Bundle Adjustment (BA) solvers like the Levenberg-Marquardt algorithm require a good initialization. Instead, initialization-free BA remains a largely uncharted territory. The under-explored Variable Projection algorithm (VarPro) exhibits a wide convergence basin even without initialization. Coupled with object space error formulation, recent works have shown its ability to solve small-scale initialization-free bundle adjustment problem. To make such initialization-free BA approaches scalable, we introduce Power Variable Projection (PoVar), extending a recent inverse expansion method based on power series. Importantly, we link the power series expansion to Riemannian manifold optimization. This projective framework is crucial to solve large-scale bundle adjustment problems without initialization. Using the real-world BAL dataset, we experimentally demonstrate that our solver achieves state-of-the-art results in terms of speed and accuracy. To our knowledge, this work is the first to address the scalability of BA without initialization opening new venues for initialization-free structure-from-motion.
△ Less
Submitted 13 August, 2024; v1 submitted 8 May, 2024;
originally announced May 2024.
-
Dynamic temperature compensation for wavelength-stable entangled biphoton generation
Authors:
Yuting Liu,
Huibo Hong,
Xiao Xiang,
Runai Quan,
Tao Liu,
Mingtao Cao,
Shougang Zhang,
Ruifang Dong
Abstract:
A dynamic temperature compensation method is presented to stabilize the wavelength of the entangled biphoton source, which is generated via the spontaneous parametric down-conversion based on a MgO: PPLN waveguide. Utilizing the dispersive Fourier transformation technique combined with a digital proportional-integral-differential algorithm, the small amount of wavelength variation can be instantly…
▽ More
A dynamic temperature compensation method is presented to stabilize the wavelength of the entangled biphoton source, which is generated via the spontaneous parametric down-conversion based on a MgO: PPLN waveguide. Utilizing the dispersive Fourier transformation technique combined with a digital proportional-integral-differential algorithm, the small amount of wavelength variation can be instantly identified and then compensated with active temperature correction. The long-term wavelength stability, assessed though Allan deviation, shows nearly a hundredfold enhancement, reaching 2.00*10^(-7) at the averaging time of 10000 s. It offers a simple, ready-to-use solution for precise wavelength control in quantum information processing.
△ Less
Submitted 29 April, 2024;
originally announced April 2024.
-
Decomposition of Longitudinal Disparities: an Application to the Fetal Growth-Singletons Study
Authors:
Sang Kyu Lee,
Seonjin Kim,
Mi-Ok Kim,
Katherine L. Grantz,
Hyokyoung G. Hong
Abstract:
Addressing health disparities among different demographic groups is a key challenge in public health. Despite many efforts, there is still a gap in understanding how these disparities unfold over time. Our paper focuses on this overlooked longitudinal aspect, which is crucial in both clinical and public health settings. In this paper, we introduce a longitudinal disparity decomposition method that…
▽ More
Addressing health disparities among different demographic groups is a key challenge in public health. Despite many efforts, there is still a gap in understanding how these disparities unfold over time. Our paper focuses on this overlooked longitudinal aspect, which is crucial in both clinical and public health settings. In this paper, we introduce a longitudinal disparity decomposition method that decomposes disparities into three components: the explained disparity linked to differences in the exploratory variables' conditional distribution when the modifier distribution is identical between majority and minority groups, the explained disparity that emerges specifically from the unequal distribution of the modifier and its interaction with covariates, and the unexplained disparity. The proposed method offers a dynamic alternative to the traditional Peters-Belson decomposition approach, tackling both the potential reduction in disparity if the covariate distributions of minority groups matched those of the majority group and the evolving nature of disparity over time. We apply the proposed approach to a fetal growth study to gain insights into disparities between different race/ethnicity groups in fetal developmental progress throughout the course of pregnancy.
△ Less
Submitted 17 April, 2024;
originally announced April 2024.
-
CMC hypersurface with finite index in hyperbolic space $\mathbb{H}^4$
Authors:
Han Hong
Abstract:
In this paper, we prove that there are no complete noncompact constant mean curvature hypersurfaces with the mean curvature $H>1$ and finite index satisfying universal subexponential end growth in hyperbolic space $\mathbb{H}^4$. A more general nonexistence result can be proved in a $4$-dimensional Riemannian manifold with certain curvature conditions. We also show that $4$-manifold with…
▽ More
In this paper, we prove that there are no complete noncompact constant mean curvature hypersurfaces with the mean curvature $H>1$ and finite index satisfying universal subexponential end growth in hyperbolic space $\mathbb{H}^4$. A more general nonexistence result can be proved in a $4$-dimensional Riemannian manifold with certain curvature conditions. We also show that $4$-manifold with $\operatorname{Ric}>1$ does not contain any complete noncompact stable minimal hypersurface with universal subexponential end growth. The proof relies on the harmonic function theory developed by Li-Tam-Wang and the $μ$-bubble initially introduced by Gromov and further developed by Chodosh-Li-Stryker in the context of stable minimal hypersurfaces.
△ Less
Submitted 23 May, 2024; v1 submitted 16 April, 2024;
originally announced April 2024.
-
Inference of treatment effect and its regional modifiers using restricted mean survival time in multi-regional clinical trials
Authors:
Kaiyuan Hua,
Hwanhee Hong,
Xiaofei Wang
Abstract:
Multi-regional clinical trials (MRCTs) play an increasingly crucial role in global pharmaceutical development by expediting data gathering and regulatory approval across diverse patient populations. However, differences in recruitment practices and regional demographics often lead to variations in study participant characteristics, potentially biasing treatment effect estimates and undermining tre…
▽ More
Multi-regional clinical trials (MRCTs) play an increasingly crucial role in global pharmaceutical development by expediting data gathering and regulatory approval across diverse patient populations. However, differences in recruitment practices and regional demographics often lead to variations in study participant characteristics, potentially biasing treatment effect estimates and undermining treatment effect consistency assessment across regions. To address this challenge, we propose novel estimators and inference methods utilizing inverse probability of sampling and calibration weighting. Our approaches aim to eliminate exogenous regional imbalance while preserving intrinsic differences across regions, such as race and genetic variants. Moreover, time-to-event outcomes in MRCT studies receive limited attention, with existing methodologies primarily focusing on hazard ratios. In this paper, we adopt restricted mean survival time to characterize the treatment effect, offering more straightforward interpretations of treatment effects with fewer assumptions than hazard ratios. Theoretical results are established for the proposed estimators, supported by extensive simulation studies. We illustrate the effectiveness of our methods through a real MRCT case study on acute coronary syndromes.
△ Less
Submitted 11 April, 2024;
originally announced April 2024.
-
Effectiveness of Self-Assessment Software to Evaluate Preclinical Operative Procedures
Authors:
Qi Dai,
Ryan Davis,
Houlin Hong,
Ying Gu
Abstract:
Objectives: To assess the effectiveness of digital scanning techniques for self-assessment and of preparations and restorations in preclinical dental education when compared to traditional faculty grading. Methods: Forty-four separate Class I (#30-O), Class II (#30-MO) preparations, and class II amalgam restorations (#31-MO) were generated respectively under preclinical assessment setting. Calibra…
▽ More
Objectives: To assess the effectiveness of digital scanning techniques for self-assessment and of preparations and restorations in preclinical dental education when compared to traditional faculty grading. Methods: Forty-four separate Class I (#30-O), Class II (#30-MO) preparations, and class II amalgam restorations (#31-MO) were generated respectively under preclinical assessment setting. Calibrated faculty evaluated the preparations and restorations using a standard rubric from preclinical operative class. The same teeth were scanned using Planmeca PlanScan intraoral scanner and graded using the Romexis E4D Compare Software. Each tooth was compared against a corresponding gold standard tooth with tolerance intervals ranging from 100μm to 500μm. These scores were compared to traditional faculty grades using a linear mixed model to estimate the mean differences at 95% confidence interval for each tolerance level. Results: The average Compare Software grade of Class I preparation at 300μm tolerance had the smallest mean difference of 1.64 points on a 100 points scale compared to the average faculty grade. Class II preparation at 400μm tolerance had the smallest mean difference of 0.41 points. Finally, Class II Restoration at 300μm tolerance had the smallest mean difference at 0.20 points. Conclusion: In this study, tolerance levels that best correlated the Compare Software grades with the faculty grades were determined for three operative procedures: class I preparation, class II preparation and class II restoration. This Compare Software can be used as a useful adjunct method for more objective grading. It also can be used by students as a great self-assessment tool.
△ Less
Submitted 8 April, 2024;
originally announced April 2024.
-
Laser mode-hopping assisted all-optical single beam pulsed atomic magnetometer
Authors:
Ji Hoon Yoon,
Sang Hyuk Hong,
Taek Jeong,
Sin Hyuk Yim,
Kyu Min Shim,
Sangkyung Lee
Abstract:
We demonstrate an all-optical single beam pulsed atomic magnetometer assisted by laser mode-hopping in a distributed Bragg reflector (DBR) laser. We implement a temporal sequence of the laser current; sinusoidal current modulation including the laser mode-hop current for synchronous optical pumping and the following constant current for paramagnetic Faraday rotation measurements to probe the free…
▽ More
We demonstrate an all-optical single beam pulsed atomic magnetometer assisted by laser mode-hopping in a distributed Bragg reflector (DBR) laser. We implement a temporal sequence of the laser current; sinusoidal current modulation including the laser mode-hop current for synchronous optical pumping and the following constant current for paramagnetic Faraday rotation measurements to probe the free induction decay (FID) of transverse $^{87}$Rb spin polarization. Repetitive sudden frequency shifts of 20 GHz around the pressure-broadened $^{87}$Rb spectra originating from laser mode-hopping enables discontinuous optical pumping modulation with a large depth which enhances transverse spin polarization. We achieve a sensitivity of 3.77 pT/Hz$^{1/2}$ in a magnetic field of 14 $μ$T, limited by the performance of the frequency counter. The Cramer-Rao lower bound (CRLB) of the sensitivity due to the non-magnetic noise such as photon shot-noise is 191 fT/Hz$^{1/2}$. Our approach based on laser mode-hopping can be applied to miniaturization of all-optical atomic magnetometers with sub-pT/Hz$^{1/2}$ sensitivities.
△ Less
Submitted 2 April, 2024;
originally announced April 2024.
-
Diffusion-Driven Domain Adaptation for Generating 3D Molecules
Authors:
Haokai Hong,
Wanyu Lin,
Kay Chen Tan
Abstract:
Can we train a molecule generator that can generate 3D molecules from a new domain, circumventing the need to collect data? This problem can be cast as the problem of domain adaptive molecule generation. This work presents a novel and principled diffusion-based approach, called GADM, that allows shifting a generative model to desired new domains without the need to collect even a single molecule.…
▽ More
Can we train a molecule generator that can generate 3D molecules from a new domain, circumventing the need to collect data? This problem can be cast as the problem of domain adaptive molecule generation. This work presents a novel and principled diffusion-based approach, called GADM, that allows shifting a generative model to desired new domains without the need to collect even a single molecule. As the domain shift is typically caused by the structure variations of molecules, e.g., scaffold variations, we leverage a designated equivariant masked autoencoder (MAE) along with various masking strategies to capture the structural-grained representations of the in-domain varieties. In particular, with an asymmetric encoder-decoder module, the MAE can generalize to unseen structure variations from the target domains. These structure variations are encoded with an equivariant encoder and treated as domain supervisors to control denoising. We show that, with these encoded structural-grained domain supervisors, GADM can generate effective molecules within the desired new domains. We conduct extensive experiments across various domain adaptation tasks over benchmarking datasets. We show that our approach can improve up to 65.6% in terms of success rate defined based on molecular validity, uniqueness, and novelty compared to alternative baselines.
△ Less
Submitted 1 April, 2024;
originally announced April 2024.
-
Statistical Inference of Optimal Allocations I: Regularities and their Implications
Authors:
Kai Feng,
Han Hong
Abstract:
In this paper, we develop a functional differentiability approach for solving statistical optimal allocation problems. We first derive Hadamard differentiability of the value function through a detailed analysis of the general properties of the sorting operator. Central to our framework are the concept of Hausdorff measure and the area and coarea integration formulas from geometric measure theory.…
▽ More
In this paper, we develop a functional differentiability approach for solving statistical optimal allocation problems. We first derive Hadamard differentiability of the value function through a detailed analysis of the general properties of the sorting operator. Central to our framework are the concept of Hausdorff measure and the area and coarea integration formulas from geometric measure theory. Building on our Hadamard differentiability results, we demonstrate how the functional delta method can be used to directly derive the asymptotic properties of the value function process for binary constrained optimal allocation problems, as well as the two-step ROC curve estimator. Moreover, leveraging profound insights from geometric functional analysis on convex and local Lipschitz functionals, we obtain additional generic Fréchet differentiability results for the value functions of optimal allocation problems. These compelling findings motivate us to study carefully the first order approximation of the optimal social welfare. In this paper, we then present a double / debiased estimator for the value functions. Importantly, the conditions outlined in the Hadamard differentiability section validate the margin assumption from the statistical classification literature employing plug-in methods that justifies a faster convergence rate.
△ Less
Submitted 7 April, 2024; v1 submitted 27 March, 2024;
originally announced March 2024.
-
Validity of annealed approximation in a high-dimensional system
Authors:
Jaegon Um,
Hyunsuk Hong,
Hyunggyu Park
Abstract:
This study investigates the suitability of the annealed approximation in high-dimensional systems characterized by dense networks with quenched link disorder, employing models of coupled oscillators. We demonstrate that dynamic equations governing dense-network systems converge to those of the complete-graph version in the thermodynamic limit, where link disorder fluctuations vanish entirely. Cons…
▽ More
This study investigates the suitability of the annealed approximation in high-dimensional systems characterized by dense networks with quenched link disorder, employing models of coupled oscillators. We demonstrate that dynamic equations governing dense-network systems converge to those of the complete-graph version in the thermodynamic limit, where link disorder fluctuations vanish entirely. Consequently, the annealed-network systems, where fluctuations are attenuated, also exhibit the same dynamic behavior in the thermodynamic limit. However, a significant discrepancy arises in the incoherent (disordered) phase wherein the finite-size behavior becomes critical in determining the steady-state pattern. To explicitly elucidate this discrepancy, we focus on identical oscillators subject to competitive attractive and repulsive couplings. In the incoherent phase of dense networks, we observe the manifestation of random irregular states. In contrast, the annealed approximation yields a symmetric (regular) incoherent state where two oppositely coherent clusters of oscillators coexist, accompanied by the vanishing order parameter. Our findings imply that the annealed approximation should be employed with caution even in dense-network systems, particularly in the disordered phase.
△ Less
Submitted 22 March, 2024;
originally announced March 2024.
-
Intelligent Traffic Monitoring with Distributed Acoustic Sensing
Authors:
Dongzi Xie,
Xinming Wu,
Zhixiang Guo,
Heting Hong,
Baoshan Wang,
Yingjiao Rong
Abstract:
Distributed Acoustic Sensing (DAS) is promising for traffic monitoring, but its extensive data and sensitivity to vibrations, causing noise, pose computational challenges. To address this, we propose a two-step deep-learning workflow with high efficiency and noise immunity for DAS-based traffic monitoring, focusing on instance vehicle trajectory segmentation and velocity estimation. Our approach b…
▽ More
Distributed Acoustic Sensing (DAS) is promising for traffic monitoring, but its extensive data and sensitivity to vibrations, causing noise, pose computational challenges. To address this, we propose a two-step deep-learning workflow with high efficiency and noise immunity for DAS-based traffic monitoring, focusing on instance vehicle trajectory segmentation and velocity estimation. Our approach begins by generating a diverse synthetic DAS dataset with labeled vehicle signals, tackling the issue of missing training labels in this field. This dataset is used to train a Convolutional Neural Network (CNN) to detect linear vehicle trajectories from the noisy DAS data in the time-space domain. However, due to significant noise, these trajectories are often fragmented and incomplete. To enhance accuracy, we introduce a second step involving the Hough transform. This converts detected linear features into point-like energy clusters in the Hough domain. Another CNN is then employed to focus on these energies, identifying the most significant points. The inverse Hough transform is applied to these points to reconstruct complete, distinct, and noise-free linear vehicle trajectories in the time-space domain. The Hough transform plays a crucial role by enforcing a local linearity constraint on the trajectories, enhancing continuity and noise immunity, and facilitating the separation of individual trajectories and estimation of vehicle velocities (indicated by trajectory slopes in the Hough domain). Our method has shown effectiveness in real-world datasets, proving its value in real-time processing of DAS data and applicability in similar traffic monitoring scenarios. All related codes and data are available at https://github.com/TTMuTian/itm/.
△ Less
Submitted 5 March, 2024;
originally announced March 2024.
-
Fine-tuning Large Language Models for Domain-specific Machine Translation
Authors:
Jiawei Zheng,
Hanghai Hong,
Xiaoli Wang,
Jingsong Su,
Yonggui Liang,
Shikai Wu
Abstract:
Large language models (LLMs) have made significant progress in machine translation (MT). However, their potential in domain-specific MT remains under-explored. Current LLM-based MT systems still face several challenges. First, for LLMs with in-context learning, their effectiveness is highly sensitive to input translation examples, and processing them can increase inference costs. They often requir…
▽ More
Large language models (LLMs) have made significant progress in machine translation (MT). However, their potential in domain-specific MT remains under-explored. Current LLM-based MT systems still face several challenges. First, for LLMs with in-context learning, their effectiveness is highly sensitive to input translation examples, and processing them can increase inference costs. They often require extra post-processing due to over-generation. Second, LLMs with fine-tuning on domain-specific data often require high training costs for domain adaptation, and may weaken the zero-shot MT capabilities of LLMs due to over-specialization. The aforementioned methods can struggle to translate rare words in domain transfer scenarios. To address these challenges, this paper proposes a prompt-oriented fine-tuning method, denoted as LlamaIT, to effectively and efficiently fine-tune a general-purpose LLM for domain-specific MT tasks. First, we construct a task-specific mix-domain dataset, which is then used to fine-tune the LLM with LoRA. This can eliminate the need for input translation examples, post-processing, or over-specialization. By zero-shot prompting with instructions, we adapt the MT tasks to the target domain at inference time. To further elicit the MT capability for rare words, we construct new prompts by incorporating domain-specific bilingual vocabulary. We also conduct extensive experiments on both publicly available and self-constructed datasets. The results show that our LlamaIT can significantly enhance the domain-specific MT capabilities of the LLM, meanwhile preserving its zero-shot MT capabilities.
△ Less
Submitted 22 February, 2024;
originally announced February 2024.
-
Orbifold Kodaira-Spencer maps and closed-string mirror symmetry for punctured Riemann surfaces
Authors:
Hansol Hong,
Hyeongjun Jin,
Sangwook Lee
Abstract:
When a Weinstein manifold admits an action of a finite abelian group, we propose its mirror construction following the equivariant TQFT-type construction, and obtain as a mirror the orbifolding of the mirror of the quotient with respect to the induced dual group action. As an application, we construct an orbifold Landau-Ginzburg mirror of a punctured Riemann surface given as an abelian cover of th…
▽ More
When a Weinstein manifold admits an action of a finite abelian group, we propose its mirror construction following the equivariant TQFT-type construction, and obtain as a mirror the orbifolding of the mirror of the quotient with respect to the induced dual group action. As an application, we construct an orbifold Landau-Ginzburg mirror of a punctured Riemann surface given as an abelian cover of the pair-of-pants, and prove its closed-string mirror symmetry using the (part of) closed-open map twisted by the dual group action.
△ Less
Submitted 22 February, 2024;
originally announced February 2024.
-
Equi-affine minimal-degree moving frames for polynomial curves
Authors:
Hoon Hong,
Irina A. Kogan
Abstract:
We develop a theory and an algorithm for constructing minimal-degree polynomial moving frames for polynomial curves in an affine space. The algorithm is equivariant under volume-preserving affine transformations of the ambient space and the parameter shifts. We show that any matrix-completion algorithm can be turned into an equivariant moving frame algorithm via an equivariantization procedure tha…
▽ More
We develop a theory and an algorithm for constructing minimal-degree polynomial moving frames for polynomial curves in an affine space. The algorithm is equivariant under volume-preserving affine transformations of the ambient space and the parameter shifts. We show that any matrix-completion algorithm can be turned into an equivariant moving frame algorithm via an equivariantization procedure that we develop. We prove that if a matrix-completion algorithm is of minimal degree then so is the resulting equivariant moving frame algorithm. We propose a novel minimal-degree matrix-completion algorithm, complementing the existing body of literature on this topic.
△ Less
Submitted 11 July, 2024; v1 submitted 9 February, 2024;
originally announced February 2024.
-
Leveraging Human-Machine Interactions for Computer Vision Dataset Quality Enhancement
Authors:
Esla Timothy Anzaku,
Hyesoo Hong,
Jin-Woo Park,
Wonjun Yang,
Kangmin Kim,
JongBum Won,
Deshika Vinoshani Kumari Herath,
Arnout Van Messem,
Wesley De Neve
Abstract:
Large-scale datasets for single-label multi-class classification, such as \emph{ImageNet-1k}, have been instrumental in advancing deep learning and computer vision. However, a critical and often understudied aspect is the comprehensive quality assessment of these datasets, especially regarding potential multi-label annotation errors. In this paper, we introduce a lightweight, user-friendly, and sc…
▽ More
Large-scale datasets for single-label multi-class classification, such as \emph{ImageNet-1k}, have been instrumental in advancing deep learning and computer vision. However, a critical and often understudied aspect is the comprehensive quality assessment of these datasets, especially regarding potential multi-label annotation errors. In this paper, we introduce a lightweight, user-friendly, and scalable framework that synergizes human and machine intelligence for efficient dataset validation and quality enhancement. We term this novel framework \emph{Multilabelfy}. Central to Multilabelfy is an adaptable web-based platform that systematically guides annotators through the re-evaluation process, effectively leveraging human-machine interactions to enhance dataset quality. By using Multilabelfy on the ImageNetV2 dataset, we found that approximately $47.88\%$ of the images contained at least two labels, underscoring the need for more rigorous assessments of such influential datasets. Furthermore, our analysis showed a negative correlation between the number of potential labels per image and model top-1 accuracy, illuminating a crucial factor in model evaluation and selection. Our open-source framework, Multilabelfy, offers a convenient, lightweight solution for dataset enhancement, emphasizing multi-label proportions. This study tackles major challenges in dataset integrity and provides key insights into model performance evaluation. Moreover, it underscores the advantages of integrating human expertise with machine capabilities to produce more robust models and trustworthy data development. The source code for Multilabelfy will be available at https://github.com/esla/Multilabelfy.
\keywords{Computer Vision \and Dataset Quality Enhancement \and Dataset Validation \and Human-Computer Interaction \and Multi-label Annotation.}
△ Less
Submitted 31 January, 2024;
originally announced January 2024.
-
Improving Angular Speed Uniformity by Piecewise Radical Reparameterization
Authors:
Hoon Hong,
Dongming Wang,
Jing Yang
Abstract:
For a rational parameterization of a curve, it is desirable that its angular speed is as uniform as possible. Hence, given a rational parameterization, one wants to find re-parameterization with better uniformity. One natural way is to use piecewise rational reparameterization. However, it turns out that the piecewise rational reparameterization does not help when the angular speed of the given ra…
▽ More
For a rational parameterization of a curve, it is desirable that its angular speed is as uniform as possible. Hence, given a rational parameterization, one wants to find re-parameterization with better uniformity. One natural way is to use piecewise rational reparameterization. However, it turns out that the piecewise rational reparameterization does not help when the angular speed of the given rational parameterization is zero at some points on the curve. In this paper, we show how to overcome the challenge by using piecewise radical reparameterization.
△ Less
Submitted 22 January, 2024;
originally announced January 2024.
-
Almost Bijective Parametrization of Copositive Univariate Polynomials
Authors:
Hoon Hong,
Ezra Nance
Abstract:
In this work we develop a novel recursive method for parametrizing the cone of copositive univariate polynomials of any arbitrary degree $d$. This parametrization is surjective, almost injective, and has the easily described domain of $(\mathbb{R}_{\geq 0})^d$.
In this work we develop a novel recursive method for parametrizing the cone of copositive univariate polynomials of any arbitrary degree $d$. This parametrization is surjective, almost injective, and has the easily described domain of $(\mathbb{R}_{\geq 0})^d$.
△ Less
Submitted 9 May, 2024; v1 submitted 19 January, 2024;
originally announced January 2024.
-
Almost Bijective Parametrization of $3 \times 3$ Copositive Matrices
Authors:
Hoon Hong,
Ezra Nance
Abstract:
In this work we take a deep dive into the cone of copositive $3 \times 3$ matrices. In doing so we visualize the cone, make geometric observations about it, and prove them. We then use these observations to parametrize the set. In the process we run into issues with surjectivity, and overcome them by resolving singularities and slightly shifting our original approach. We do all of this to ultimate…
▽ More
In this work we take a deep dive into the cone of copositive $3 \times 3$ matrices. In doing so we visualize the cone, make geometric observations about it, and prove them. We then use these observations to parametrize the set. In the process we run into issues with surjectivity, and overcome them by resolving singularities and slightly shifting our original approach. We do all of this to ultimately arrive at a novel parametrization of the $3 \times 3$ copositive matrix cone which is surjective and almost injective, which we call almost bijective.
△ Less
Submitted 9 May, 2024; v1 submitted 11 January, 2024;
originally announced January 2024.
-
Conditions for eigenvalue configurations of two real symmetric matrices: a signature approach
Authors:
Hoon Hong,
Daniel Profili,
J. Rafael Sendra
Abstract:
For two real symmetric matrices, their eigenvalue configuration is the arrangement of their eigenvalues on the real line. In this paper, we provide quantifier-free necessary and sufficient conditions for two symmetric matrices to realize a given eigenvalue configuration. The basic idea is to generate a set of polynomials in the entries of the two matrices whose roots can be counted to uniquely det…
▽ More
For two real symmetric matrices, their eigenvalue configuration is the arrangement of their eigenvalues on the real line. In this paper, we provide quantifier-free necessary and sufficient conditions for two symmetric matrices to realize a given eigenvalue configuration. The basic idea is to generate a set of polynomials in the entries of the two matrices whose roots can be counted to uniquely determine the eigenvalue configuration. This result can be seen as ageneralization of Descartes' rule of signs to the case of two real univariate polynomials.
△ Less
Submitted 10 May, 2024; v1 submitted 29 December, 2023;
originally announced January 2024.
-
Computing greatest common divisor of several parametric univariate polynomials via generalized subresultant polynomials
Authors:
Hoon Hong,
Jing Yang
Abstract:
In this paper, we tackle the following problem: compute the gcd for several univariate polynomials with parametric coefficients. It amounts to partitioning the parameter space into ``cells'' so that the gcd has a uniform expression over each cell and constructing a uniform expression of gcd in each cell. We tackle the problem as follows. We begin by making a natural and obvious extension of subres…
▽ More
In this paper, we tackle the following problem: compute the gcd for several univariate polynomials with parametric coefficients. It amounts to partitioning the parameter space into ``cells'' so that the gcd has a uniform expression over each cell and constructing a uniform expression of gcd in each cell. We tackle the problem as follows. We begin by making a natural and obvious extension of subresultant polynomials of two polynomials to several polynomials. Then we develop the following structural theories about them.
1. We generalize Sylvester's theory to several polynomials, in order to obtain an elegant relationship between generalized subresultant polynomials and the gcd of several polynomials, yielding an elegant algorithm.
2. We generalize Habicht's theory to several polynomials, in order to obtain a systematic relationship between generalized subresultant polynomials and pseudo-remainders, yielding an efficient algorithm.
Using the generalized theories, we present a simple (structurally elegant) algorithm which is significantly more efficient (both in the output size and computing time) than algorithms based on previous approaches.
△ Less
Submitted 6 September, 2024; v1 submitted 31 December, 2023;
originally announced January 2024.
-
Conditions for eigenvalue configurations of two real symmetric matrices: a symmetric function approach
Authors:
Hoon Hong,
Daniel Profili,
J. Rafael Sendra
Abstract:
For two real symmetric matrices, their eigenvalue configuration is the arrangement of their eigenvalues on the real line. We study the problem of determining a quantifier-free necessary and sufficient condition for two real symmetric matrices to realize a given eigenvalue configuration as a generalization of Descartes' rule of signs. We exploit the combinatorial properties of our definition for ei…
▽ More
For two real symmetric matrices, their eigenvalue configuration is the arrangement of their eigenvalues on the real line. We study the problem of determining a quantifier-free necessary and sufficient condition for two real symmetric matrices to realize a given eigenvalue configuration as a generalization of Descartes' rule of signs. We exploit the combinatorial properties of our definition for eigenvalue configuration to reduce a two-polynomial root counting problem into several single-polynomial root counting problems of symmetric polynomials. We then leverage the fundamental theorem of symmetric polynomials to derive a final quantifier-free necessary and sufficient condition for two real symmetric matrices to realize a given eigenvalue configuration.
△ Less
Submitted 10 May, 2024; v1 submitted 29 December, 2023;
originally announced January 2024.
-
One-Dimensional Adapter to Rule Them All: Concepts, Diffusion Models and Erasing Applications
Authors:
Mengyao Lyu,
Yuhong Yang,
Haiwen Hong,
Hui Chen,
Xuan Jin,
Yuan He,
Hui Xue,
Jungong Han,
Guiguang Ding
Abstract:
The prevalent use of commercial and open-source diffusion models (DMs) for text-to-image generation prompts risk mitigation to prevent undesired behaviors. Existing concept erasing methods in academia are all based on full parameter or specification-based fine-tuning, from which we observe the following issues: 1) Generation alternation towards erosion: Parameter drift during target elimination ca…
▽ More
The prevalent use of commercial and open-source diffusion models (DMs) for text-to-image generation prompts risk mitigation to prevent undesired behaviors. Existing concept erasing methods in academia are all based on full parameter or specification-based fine-tuning, from which we observe the following issues: 1) Generation alternation towards erosion: Parameter drift during target elimination causes alternations and potential deformations across all generations, even eroding other concepts at varying degrees, which is more evident with multi-concept erased; 2) Transfer inability & deployment inefficiency: Previous model-specific erasure impedes the flexible combination of concepts and the training-free transfer towards other models, resulting in linear cost growth as the deployment scenarios increase. To achieve non-invasive, precise, customizable, and transferable elimination, we ground our erasing framework on one-dimensional adapters to erase multiple concepts from most DMs at once across versatile erasing applications. The concept-SemiPermeable structure is injected as a Membrane (SPM) into any DM to learn targeted erasing, and meantime the alteration and erosion phenomenon is effectively mitigated via a novel Latent Anchoring fine-tuning strategy. Once obtained, SPMs can be flexibly combined and plug-and-play for other DMs without specific re-tuning, enabling timely and efficient adaptation to diverse scenarios. During generation, our Facilitated Transport mechanism dynamically regulates the permeability of each SPM to respond to different input prompts, further minimizing the impact on other concepts. Quantitative and qualitative results across ~40 concepts, 7 DMs and 4 erasing applications have demonstrated the superior erasing of SPM. Our code and pre-tuned SPMs are available on the project page https://lyumengyao.github.io/projects/spm.
△ Less
Submitted 11 March, 2024; v1 submitted 26 December, 2023;
originally announced December 2023.
-
A Summarized History-based Dialogue System for Amnesia-Free Prompt Updates
Authors:
Hyejin Hong,
Hibiki Kawano,
Takuto Maekawa,
Naoki Yoshimaru,
Takamasa Iio,
Kenji Hatano
Abstract:
In today's society, information overload presents challenges in providing optimal recommendations. Consequently, the importance of dialogue systems that can discern and provide the necessary information through dialogue is increasingly recognized. However, some concerns existing dialogue systems rely on pre-trained models and need help to cope with real-time or insufficient information. To address…
▽ More
In today's society, information overload presents challenges in providing optimal recommendations. Consequently, the importance of dialogue systems that can discern and provide the necessary information through dialogue is increasingly recognized. However, some concerns existing dialogue systems rely on pre-trained models and need help to cope with real-time or insufficient information. To address these concerns, models that allow the addition of missing information to dialogue robots are being proposed. Yet, maintaining the integrity of previous conversation history while integrating new data remains a formidable challenge. This paper presents a novel system for dialogue robots designed to remember user-specific characteristics by retaining past conversation history even as new information is added.
△ Less
Submitted 21 December, 2023;
originally announced December 2023.
-
Foreseeing Reconstruction Quality of Gradient Inversion: An Optimization Perspective
Authors:
HyeongGwon Hong,
Yooshin Cho,
Hanbyel Cho,
Jaesung Ahn,
Junmo Kim
Abstract:
Gradient inversion attacks can leak data privacy when clients share weight updates with the server in federated learning (FL). Existing studies mainly use L2 or cosine distance as the loss function for gradient matching in the attack. Our empirical investigation shows that the vulnerability ranking varies with the loss function used. Gradient norm, which is commonly used as a vulnerability proxy f…
▽ More
Gradient inversion attacks can leak data privacy when clients share weight updates with the server in federated learning (FL). Existing studies mainly use L2 or cosine distance as the loss function for gradient matching in the attack. Our empirical investigation shows that the vulnerability ranking varies with the loss function used. Gradient norm, which is commonly used as a vulnerability proxy for gradient inversion attack, cannot explain this as it remains constant regardless of the loss function for gradient matching. In this paper, we propose a loss-aware vulnerability proxy (LAVP) for the first time. LAVP refers to either the maximum or minimum eigenvalue of the Hessian with respect to gradient matching loss at ground truth. This suggestion is based on our theoretical findings regarding the local optimization of the gradient inversion in proximity to the ground truth, which corresponds to the worst case attack scenario. We demonstrate the effectiveness of LAVP on various architectures and datasets, showing its consistent superiority over the gradient norm in capturing sample vulnerabilities. The performance of each proxy is measured in terms of Spearman's rank correlation with respect to several similarity scores. This work will contribute to enhancing FL security against any potential loss functions beyond L2 or cosine distance in the future.
△ Less
Submitted 19 December, 2023;
originally announced December 2023.
-
Pre-Evolved Model for Complex Multi-objective Optimization Problems
Authors:
Haokai Hong,
Min Jiang
Abstract:
Multi-objective optimization problems (MOPs) necessitate the simultaneous optimization of multiple objectives. Numerous studies have demonstrated that evolutionary computation is a promising paradigm for solving complex MOPs, which involve optimization problems with large-scale decision variables, many objectives, and expensive evaluation functions. However, existing multi-objective evolutionary a…
▽ More
Multi-objective optimization problems (MOPs) necessitate the simultaneous optimization of multiple objectives. Numerous studies have demonstrated that evolutionary computation is a promising paradigm for solving complex MOPs, which involve optimization problems with large-scale decision variables, many objectives, and expensive evaluation functions. However, existing multi-objective evolutionary algorithms (MOEAs) encounter significant challenges in generating high-quality populations when solving diverse complex MOPs. Specifically, the distinct requirements and constraints of the population result in the inefficiency or even incompetence of MOEAs in addressing various complex MOPs. Therefore, this paper proposes the concept of pre-evolving for MOEAs to generate high-quality populations for diverse complex MOPs. Drawing inspiration from the classical transformer architecture, we devise dimension embedding and objective encoding techniques to configure the pre-evolved model (PEM). The PEM is pre-evolved on a substantial number of existing MOPs. Subsequently, when fine-evolving on new complex MOPs, the PEM transforms the population into the next generation to approximate the Pareto-optimal front. Furthermore, it utilizes evaluations on new solutions to iteratively update the PEM for subsequent generations, thereby efficiently solving various complex MOPs. Experimental results demonstrate that the PEM outperforms state-of-the-art MOEAs on a range of complex MOPs.
△ Less
Submitted 20 February, 2024; v1 submitted 11 December, 2023;
originally announced December 2023.