-
On Differentially Private U Statistics
Authors:
Kamalika Chaudhuri,
Po-Ling Loh,
Shourya Pandey,
Purnamrita Sarkar
Abstract:
We consider the problem of privately estimating a parameter $\mathbb{E}[h(X_1,\dots,X_k)]$, where $X_1$, $X_2$, $\dots$, $X_k$ are i.i.d. data from some distribution and $h$ is a permutation-invariant function. Without privacy constraints, standard estimators are U-statistics, which commonly arise in a wide range of problems, including nonparametric signed rank tests, symmetry testing, uniformity…
▽ More
We consider the problem of privately estimating a parameter $\mathbb{E}[h(X_1,\dots,X_k)]$, where $X_1$, $X_2$, $\dots$, $X_k$ are i.i.d. data from some distribution and $h$ is a permutation-invariant function. Without privacy constraints, standard estimators are U-statistics, which commonly arise in a wide range of problems, including nonparametric signed rank tests, symmetry testing, uniformity testing, and subgraph counts in random networks, and can be shown to be minimum variance unbiased estimators under mild conditions. Despite the recent outpouring of interest in private mean estimation, privatizing U-statistics has received little attention. While existing private mean estimation algorithms can be applied to obtain confidence intervals, we show that they can lead to suboptimal private error, e.g., constant-factor inflation in the leading term, or even $Θ(1/n)$ rather than $O(1/n^2)$ in degenerate settings. To remedy this, we propose a new thresholding-based approach using \emph{local Hájek projections} to reweight different subsets of the data. This leads to nearly optimal private error for non-degenerate U-statistics and a strong indication of near-optimality for degenerate U-statistics.
△ Less
Submitted 5 July, 2024;
originally announced July 2024.
-
Differentially Private Synthetic Data with Private Density Estimation
Authors:
Nikolija Bojkovic,
Po-Ling Loh
Abstract:
The need to analyze sensitive data, such as medical records or financial data, has created a critical research challenge in recent years. In this paper, we adopt the framework of differential privacy, and explore mechanisms for generating an entire dataset which accurately captures characteristics of the original data. We build upon the work of Boedihardjo et al, which laid the foundations for a n…
▽ More
The need to analyze sensitive data, such as medical records or financial data, has created a critical research challenge in recent years. In this paper, we adopt the framework of differential privacy, and explore mechanisms for generating an entire dataset which accurately captures characteristics of the original data. We build upon the work of Boedihardjo et al, which laid the foundations for a new optimization-based algorithm for generating private synthetic data. Importantly, we adapt their algorithm by replacing a uniform sampling step with a private distribution estimator; this allows us to obtain better computational guarantees for discrete distributions, and develop a novel algorithm suitable for continuous distributions. We also explore applications of our work to several statistical tasks.
△ Less
Submitted 6 May, 2024;
originally announced May 2024.
-
The Sample Complexity of Simple Binary Hypothesis Testing
Authors:
Ankit Pensia,
Varun Jog,
Po-Ling Loh
Abstract:
The sample complexity of simple binary hypothesis testing is the smallest number of i.i.d. samples required to distinguish between two distributions $p$ and $q$ in either: (i) the prior-free setting, with type-I error at most $α$ and type-II error at most $β$; or (ii) the Bayesian setting, with Bayes error at most $δ$ and prior distribution $(α, 1-α)$. This problem has only been studied when…
▽ More
The sample complexity of simple binary hypothesis testing is the smallest number of i.i.d. samples required to distinguish between two distributions $p$ and $q$ in either: (i) the prior-free setting, with type-I error at most $α$ and type-II error at most $β$; or (ii) the Bayesian setting, with Bayes error at most $δ$ and prior distribution $(α, 1-α)$. This problem has only been studied when $α= β$ (prior-free) or $α= 1/2$ (Bayesian), and the sample complexity is known to be characterized by the Hellinger divergence between $p$ and $q$, up to multiplicative constants. In this paper, we derive a formula that characterizes the sample complexity (up to multiplicative constants that are independent of $p$, $q$, and all error parameters) for: (i) all $0 \le α, β\le 1/8$ in the prior-free setting; and (ii) all $δ\le α/4$ in the Bayesian setting. In particular, the formula admits equivalent expressions in terms of certain divergences from the Jensen--Shannon and Hellinger families. The main technical result concerns an $f$-divergence inequality between members of the Jensen--Shannon and Hellinger families, which is proved by a combination of information-theoretic tools and case-by-case analyses. We explore applications of our results to robust and distributed (locally-private and communication-constrained) hypothesis testing.
△ Less
Submitted 25 March, 2024;
originally announced March 2024.
-
The Road to the Ideal Stent: A Review of Stent Design Optimisation Methods, Findings, and Opportunities
Authors:
Ankush Kapoor,
Nigel Jepson,
Neil W. Bressloff,
Poay Huan Loh,
Tapabrata Ray,
Susann Beier
Abstract:
Coronary stent designs have undergone significant transformations in geometry, materials, and drug elution coatings, contributing to the continuous improvement of stenting success over recent decades. However, the increasing use of percutaneous coronary intervention techniques on complex coronary artery disease anatomy continues to be a challenge and pushes the boundary to improve stent designs. D…
▽ More
Coronary stent designs have undergone significant transformations in geometry, materials, and drug elution coatings, contributing to the continuous improvement of stenting success over recent decades. However, the increasing use of percutaneous coronary intervention techniques on complex coronary artery disease anatomy continues to be a challenge and pushes the boundary to improve stent designs. Design optimisation techniques especially are a unique set of tools used to assess and balance competing design objectives, thus unlocking the capacity to maximise the performance of stents. This review provides a brief history of metallic and bioresorbable stent design evolution, before exploring the latest developments in performance metrics and design optimisation techniques in detail. This includes insights on different contemporary stent designs, structural and haemodynamic performance metrics, shape and topology representation, and optimisation along with the use of surrogates to deal with the underlying computationally expensive nature of the problem. Finally, an exploration of current key gaps and future possibilities is provided that includes hybrid optimisation of clinically relevant metrics, non-geometric variables such as material properties, and the possibility of personalised stenting devices.
△ Less
Submitted 3 December, 2023; v1 submitted 14 September, 2023;
originally announced September 2023.
-
Robust empirical risk minimization via Newton's method
Authors:
Eirini Ioannou,
Muni Sreenivas Pydi,
Po-Ling Loh
Abstract:
A new variant of Newton's method for empirical risk minimization is studied, where at each iteration of the optimization algorithm, the gradient and Hessian of the objective function are replaced by robust estimators taken from existing literature on robust mean estimation for multivariate data. After proving a general theorem about the convergence of successive iterates to a small ball around the…
▽ More
A new variant of Newton's method for empirical risk minimization is studied, where at each iteration of the optimization algorithm, the gradient and Hessian of the objective function are replaced by robust estimators taken from existing literature on robust mean estimation for multivariate data. After proving a general theorem about the convergence of successive iterates to a small ball around the population-level minimizer, consequences of the theory in generalized linear models are studied when data are generated from Huber's epsilon-contamination model and/or heavytailed distributions. An algorithm for obtaining robust Newton directions based on the conjugate gradient method is also proposed, which may be more appropriate for high-dimensional settings, and conjectures about the convergence of the resulting algorithm are offered. Compared to robust gradient descent, the proposed algorithm enjoys the faster rates of convergence for successive iterates often achieved by second-order algorithms for convex problems, i.e., quadratic convergence in a neighborhood of the optimum, with a stepsize that may be chosen adaptively via backtracking linesearch.
△ Less
Submitted 17 July, 2023; v1 submitted 30 January, 2023;
originally announced January 2023.
-
Simple Binary Hypothesis Testing under Local Differential Privacy and Communication Constraints
Authors:
Ankit Pensia,
Amir R. Asadi,
Varun Jog,
Po-Ling Loh
Abstract:
We study simple binary hypothesis testing under both local differential privacy (LDP) and communication constraints. We qualify our results as either minimax optimal or instance optimal: the former hold for the set of distribution pairs with prescribed Hellinger divergence and total variation distance, whereas the latter hold for specific distribution pairs. For the sample complexity of simple hyp…
▽ More
We study simple binary hypothesis testing under both local differential privacy (LDP) and communication constraints. We qualify our results as either minimax optimal or instance optimal: the former hold for the set of distribution pairs with prescribed Hellinger divergence and total variation distance, whereas the latter hold for specific distribution pairs. For the sample complexity of simple hypothesis testing under pure LDP constraints, we establish instance-optimal bounds for distributions with binary support; minimax-optimal bounds for general distributions; and (approximately) instance-optimal, computationally efficient algorithms for general distributions. When both privacy and communication constraints are present, we develop instance-optimal, computationally efficient algorithms that achieve the minimum possible sample complexity (up to universal constants). Our results on instance-optimal algorithms hinge on identifying the extreme points of the joint range set $\mathcal A$ of two distributions $p$ and $q$, defined as $\mathcal A := \{(\mathbf T p, \mathbf T q) | \mathbf T \in \mathcal C\}$, where $\mathcal C$ is the set of channels characterizing the constraints.
△ Less
Submitted 15 December, 2023; v1 submitted 9 January, 2023;
originally announced January 2023.
-
Emergent Topological Superconductor by Charge Density Wave Transition
Authors:
Zishen Wang,
Jingyang You,
Chuan Chen,
Jinchao Mo,
Jingyu He,
Lishu Zhang,
Jun Zhou,
Kian Ping Loh,
Yuan Ping Feng
Abstract:
Many-body instabilities and topological physics are two attractive topics in condensed matter physics. It is intriguing to explore the interplay between these phenomena in a single quantum material. Here, using the prototypical charge density wave (CDW) material monolayer 1H-NbSe$_2$ as an example, we show how momentum-dependent electron-phonon coupling drives the CDW transition from $3\times3$ to…
▽ More
Many-body instabilities and topological physics are two attractive topics in condensed matter physics. It is intriguing to explore the interplay between these phenomena in a single quantum material. Here, using the prototypical charge density wave (CDW) material monolayer 1H-NbSe$_2$ as an example, we show how momentum-dependent electron-phonon coupling drives the CDW transition from $3\times3$ to $2\times2$ phase under electron doping. More interestingly, we find the coexistence of superconductivity and nontrivial topology in one of the two $2\times2$ CDW phases, the latter of which is identified by the nonzero Z$_2$ invariant with ideal Dirac cone edge states near the Fermi level. A similar CDW transition-induced topological superconductor has also been confirmed in monolayer 1H-TaSe$_2$. Our findings not only reveal a unique and general method to introduce nontrivial topology by CDW transition, but also provide an ideal platform to modulate different quantum orders by electron doping, thus stimulating experimental interest.
△ Less
Submitted 16 October, 2022; v1 submitted 14 October, 2022;
originally announced October 2022.
-
Decisive role of electron-phonon coupling for phonon and electron instabilities in transition metal dichalcogenides
Authors:
Zishen Wang,
Chuan Chen,
Jinchao Mo,
Jun Zhou,
Kian Ping Loh,
Yuan Ping Feng
Abstract:
The origin of the charge density wave (CDW) in transition metal dichalcognides has been in hot debate and no conclusive agreement has been reached. Here, we propose an ab-initio framework for an accurate description of both Fermi surface nesting and electron-phonon coupling (EPC) and systematically investigate their roles in the formation of CDW. Using monolayer 1H-NbSe$_2$ and 1T-VTe$_2$ as repre…
▽ More
The origin of the charge density wave (CDW) in transition metal dichalcognides has been in hot debate and no conclusive agreement has been reached. Here, we propose an ab-initio framework for an accurate description of both Fermi surface nesting and electron-phonon coupling (EPC) and systematically investigate their roles in the formation of CDW. Using monolayer 1H-NbSe$_2$ and 1T-VTe$_2$ as representative examples, we show that it is the momentum-dependent EPC softens the phonon frequencies, which become imaginary (phonon instabilities) at CDW vectors (indicating CDW formation). Besides, the distribution of the CDW gap opening (electron instabilities) can be correctly predicted only if EPC is included in the mean-field model. These results emphasize the decisive role of EPC in the CDW formation. Our analytical process is general and can be applied to other CDW systems.
△ Less
Submitted 15 August, 2022;
originally announced August 2022.
-
Communication-constrained hypothesis testing: Optimality, robustness, and reverse data processing inequalities
Authors:
Ankit Pensia,
Varun Jog,
Po-Ling Loh
Abstract:
We study hypothesis testing under communication constraints, where each sample is quantized before being revealed to a statistician. Without communication constraints, it is well known that the sample complexity of simple binary hypothesis testing is characterized by the Hellinger distance between the distributions. We show that the sample complexity of simple binary hypothesis testing under commu…
▽ More
We study hypothesis testing under communication constraints, where each sample is quantized before being revealed to a statistician. Without communication constraints, it is well known that the sample complexity of simple binary hypothesis testing is characterized by the Hellinger distance between the distributions. We show that the sample complexity of simple binary hypothesis testing under communication constraints is at most a logarithmic factor larger than in the unconstrained setting and this bound is tight. We develop a polynomial-time algorithm that achieves the aforementioned sample complexity. Our framework extends to robust hypothesis testing, where the distributions are corrupted in the total variation distance. Our proofs rely on a new reverse data processing inequality and a reverse Markov inequality, which may be of independent interest. For simple $M$-ary hypothesis testing, the sample complexity in the absence of communication constraints has a logarithmic dependence on $M$. We show that communication constraints can cause an exponential blow-up leading to $Ω(M)$ sample complexity even for adaptive algorithms.
△ Less
Submitted 15 December, 2023; v1 submitted 6 June, 2022;
originally announced June 2022.
-
Data-driven discovery of high performance layered van der Waals piezoelectric NbOI2
Authors:
Yaze Wu,
Ibrahim Abdelwahab,
Ki Chang Kwon,
Ivan Verzhbitskiy,
Lin Wang,
Weng Heng Liew,
Kui Yao,
Goki Eda,
Kian Ping Loh,
Lei Shen,
Su Ying Quek
Abstract:
Using high-throughput first-principles calculations to search for layered van der Waals materials with the largest piezoelectric stress coefficients, we discover NbOI2 to be the one among 2940 monolayers screened. The piezoelectric performance of NbOI2 is independent of thickness, and its electromechanical coupling factor of near unity is a hallmark of optimal interconversion between electrical an…
▽ More
Using high-throughput first-principles calculations to search for layered van der Waals materials with the largest piezoelectric stress coefficients, we discover NbOI2 to be the one among 2940 monolayers screened. The piezoelectric performance of NbOI2 is independent of thickness, and its electromechanical coupling factor of near unity is a hallmark of optimal interconversion between electrical and mechanical energy. Laser scanning vibrometer studies on bulk and few-layer NbOI2 crystals verify their huge piezoelectric responses, which exceed internal references such as In2Se3 and CuInP2S6. Furthermore, we provide insights into the atomic origins of anti-correlated piezoelectric and ferroelectric responses in NbOX2 (X = Cl, Br, I), based on bond covalency and structural distortions in these materials. Our discovery that NbOI2 has the largest piezoelectric stress coefficients among 2D materials calls for the development of NbOI2-based flexible nanoscale piezoelectric devices.
△ Less
Submitted 2 February, 2022;
originally announced February 2022.
-
On the identifiability of mixtures of ranking models
Authors:
Xiaomin Zhang,
Xucheng Zhang,
Po-Ling Loh,
Yingyu Liang
Abstract:
Mixtures of ranking models are standard tools for ranking problems. However, even the fundamental question of parameter identifiability is not fully understood: the identifiability of a mixture model with two Bradley-Terry-Luce (BTL) components has remained open. In this work, we show that popular mixtures of ranking models with two components (BTL, multinomial logistic models with slates of size…
▽ More
Mixtures of ranking models are standard tools for ranking problems. However, even the fundamental question of parameter identifiability is not fully understood: the identifiability of a mixture model with two Bradley-Terry-Luce (BTL) components has remained open. In this work, we show that popular mixtures of ranking models with two components (BTL, multinomial logistic models with slates of size 3, or Plackett-Luce) are generically identifiable, i.e., the ground-truth parameters can be identified except when they are from a pathological subset of measure zero. We provide a framework for verifying the number of solutions in a general family of polynomial systems using algebraic geometry, and apply it to these mixtures of ranking models to establish generic identifiability. The framework can be applied more broadly to other learning models and may be of independent interest.
△ Less
Submitted 24 May, 2022; v1 submitted 31 January, 2022;
originally announced January 2022.
-
Sub-angstrom Non-invasive Imaging of Atomic Arrangement in 2D Hybrid Perovskites
Authors:
Mykola Telychko,
Shayan Edalatmanesh,
Kai Leng,
Ibrahim Abdelwahab,
Na Guo,
Chun Zhang,
Jesús I. Mendieta-Moreno,
Matyas Nachtigall,
Jing Li,
Kian Ping Loh,
Pavel Jelínek,
Jiong Lu
Abstract:
Non-invasive imaging of the atomic arrangement in two-dimensional (2D) Ruddlesden-Popper hybrid Perovskites (RPPs), as well as understanding the related effects is challenging, due to the insulating nature and softness of the organic layers which also obscure the underlying inorganic lattice. Here, we demonstrate a sub-angstrom resolution imaging of both soft organic layers and inorganic framework…
▽ More
Non-invasive imaging of the atomic arrangement in two-dimensional (2D) Ruddlesden-Popper hybrid Perovskites (RPPs), as well as understanding the related effects is challenging, due to the insulating nature and softness of the organic layers which also obscure the underlying inorganic lattice. Here, we demonstrate a sub-angstrom resolution imaging of both soft organic layers and inorganic framework in a prototypical 2D lead-halide RPP crystal via combined tip-functionalized Scanning Tunneling Microscopy (STM) and non-contact Atomic Force Microscope (ncAFM) corroborated by theoretical simulations. STM measurements unveil the atomic reconstruction of the inorganic lead-halide lattice and overall twin-domain composition of the RPP crystal, while ncAFM measurements with a CO-tip enable non-perturbative visualization of the cooperative reordering of surface organic cations driven by their hydrogen bonding interactions with the inorganic lattice. Moreover, such a joint technique also allows for the atomic-scale imaging of the electrostatic potential variation across the twin-domain walls, revealing alternating quasi-one-dimensional (1D) electron and hole-channels at neighboring twin-boundaries, which may influence in-plane exciton transport and dissociation.
△ Less
Submitted 14 September, 2021; v1 submitted 13 September, 2021;
originally announced September 2021.
-
Differentially private inference via noisy optimization
Authors:
Marco Avella-Medina,
Casey Bradshaw,
Po-Ling Loh
Abstract:
We propose a general optimization-based framework for computing differentially private M-estimators and a new method for constructing differentially private confidence regions. Firstly, we show that robust statistics can be used in conjunction with noisy gradient descent or noisy Newton methods in order to obtain optimal private estimators with global linear or quadratic convergence, respectively.…
▽ More
We propose a general optimization-based framework for computing differentially private M-estimators and a new method for constructing differentially private confidence regions. Firstly, we show that robust statistics can be used in conjunction with noisy gradient descent or noisy Newton methods in order to obtain optimal private estimators with global linear or quadratic convergence, respectively. We establish local and global convergence guarantees, under both local strong convexity and self-concordance, showing that our private estimators converge with high probability to a small neighborhood of the non-private M-estimators. Secondly, we tackle the problem of parametric inference by constructing differentially private estimators of the asymptotic variance of our private M-estimators. This naturally leads to approximate pivotal statistics for constructing confidence regions and conducting hypothesis testing. We demonstrate the effectiveness of a bias correction that leads to enhanced small-sample empirical performance in simulations. We illustrate the benefits of our methods in several numerical examples.
△ Less
Submitted 13 December, 2023; v1 submitted 19 March, 2021;
originally announced March 2021.
-
Room temperature ferromagnetism of monolayer chromium telluride with perpendicular magnetic anisotropy
Authors:
Rebekah Chua,
Jun Zhou,
Xiaojiang Yu,
Wei Yu,
Jian Gou,
Rui Zhu,
Lei Zhang,
Mark B. H. Breese,
Wei Chen,
Kian Ping Loh,
Yuan Ping Feng,
Ming Yang,
Yu Li Huang,
Andrew T. S. Wee
Abstract:
The realization of long-range magnetic ordering in two-dimensional (2D) systems can potentially revolutionize next-generation information technology. Here, we report the successful fabrication of crystalline Cr3Te4 monolayers with room temperature ferromagnetism. Using molecular beam epitaxy, the growth of 2D Cr3Te4 films with monolayer thickness is demonstrated at low substrate temperatures (~100…
▽ More
The realization of long-range magnetic ordering in two-dimensional (2D) systems can potentially revolutionize next-generation information technology. Here, we report the successful fabrication of crystalline Cr3Te4 monolayers with room temperature ferromagnetism. Using molecular beam epitaxy, the growth of 2D Cr3Te4 films with monolayer thickness is demonstrated at low substrate temperatures (~100C), compatible with Si CMOS technology. X-ray magnetic circular dichroism measurements reveal a Curie temperature (Tc) of ~344 K for the Cr3Te4 monolayer with an out-of-plane magnetic easy axis, which decreases to ~240 K for the thicker film (~ 7 nm) with an in-plane easy axis. The enhancement of ferromagnetic coupling and the magnetic anisotropy transition is ascribed to interfacial effects, in particular the orbital overlap at the monolayer Cr3Te4/graphite interface, supported by density-functional theory calculations. This work sheds light on the low-temperature scalable growth of 2D nonlayered materials with room temperature ferromagnetism for new magnetic and spintronic devices.
△ Less
Submitted 27 February, 2021;
originally announced March 2021.
-
Robust W-GAN-Based Estimation Under Wasserstein Contamination
Authors:
Zheng Liu,
Po-Ling Loh
Abstract:
Robust estimation is an important problem in statistics which aims at providing a reasonable estimator when the data-generating distribution lies within an appropriately defined ball around an uncontaminated distribution. Although minimax rates of estimation have been established in recent years, many existing robust estimators with provably optimal convergence rates are also computationally intra…
▽ More
Robust estimation is an important problem in statistics which aims at providing a reasonable estimator when the data-generating distribution lies within an appropriately defined ball around an uncontaminated distribution. Although minimax rates of estimation have been established in recent years, many existing robust estimators with provably optimal convergence rates are also computationally intractable. In this paper, we study several estimation problems under a Wasserstein contamination model and present computationally tractable estimators motivated by generative adversarial networks (GANs). Specifically, we analyze properties of Wasserstein GAN-based estimators for location estimation, covariance matrix estimation, and linear regression and show that our proposed estimators are minimax optimal in many scenarios. Finally, we present numerical results which demonstrate the effectiveness of our estimators.
△ Less
Submitted 20 January, 2021;
originally announced January 2021.
-
Large rainbow matchings in edge-colored graphs
Authors:
Debsoumya Chakraborti,
Po-Shen Loh
Abstract:
There has been much research on the topic of finding a large rainbow matching (with no two edges having the same color) in a properly edge-colored graph, where a proper edge coloring is a coloring of the edge set such that no same-colored edges are incident. Recently, Gao, Ramadurai, Wanless, and Wormald proved that in every proper edge coloring of a graph with $q$ colors where each color appears…
▽ More
There has been much research on the topic of finding a large rainbow matching (with no two edges having the same color) in a properly edge-colored graph, where a proper edge coloring is a coloring of the edge set such that no same-colored edges are incident. Recently, Gao, Ramadurai, Wanless, and Wormald proved that in every proper edge coloring of a graph with $q$ colors where each color appears at least $q+o(q)$ times, there is always a rainbow matching using every color. We strengthen this result by simultaneously relaxing two conditions: (i) we lift the condition on the number of colors and allow any finite number of colors and instead, put a weaker condition requiring the maximum degree of the graph to be at most $q$, and (ii) we also relax the proper coloring condition and require that the graph induced by each of the colors have bounded degree. This strengthening resolves a natural question inspired by the remarks made by Gao, Ramadurai, Wanless, and Wormald.
As an application of this result, we show that for every proper edge coloring of a graph with $2q+o(q)$ colors where each color appears at least $q$ times, there is always a rainbow matching of size $q$. This can be seen as an asymptotic version of a conjecture of Barát, Gyárfás, and Sárközy restricted on simple graphs. We also provide a construction showing that having $q+1$ colors is not enough, disproving a conjecture of Aharoni and Berger. As a by-product of our techniques, we obtain a new asymptotic version of the Brualdi--Ryser--Stein Conjecture, which is one of the central open questions in combinatorics.
△ Less
Submitted 10 October, 2022; v1 submitted 8 November, 2020;
originally announced November 2020.
-
Controllable phase transitions between multiple charge density waves in monolayer 1T-VSe$_2$ via doping and strain engineering
Authors:
Zishen Wang,
Jun Zhou,
Kian Ping Loh,
Yuan Ping Feng
Abstract:
Two-dimensional (2D) materials are known to possess emergent properties that are not found in their bulk counterparts. Recent experiments have shown a $\sqrt7 \times \sqrt3$ charge density wave (CDW) in monolayer 1T-VSe$_2$, in contrast to the $4\times 4\times 3$ phase in bulk. Here, via first-principles calculations, we show that multiple CDW phases compete in monolayer VSe$_2$, the ground state…
▽ More
Two-dimensional (2D) materials are known to possess emergent properties that are not found in their bulk counterparts. Recent experiments have shown a $\sqrt7 \times \sqrt3$ charge density wave (CDW) in monolayer 1T-VSe$_2$, in contrast to the $4\times 4\times 3$ phase in bulk. Here, via first-principles calculations, we show that multiple CDW phases compete in monolayer VSe$_2$, the ground state of which can be tuned by charge doping and in-plane biaxial strain. With doping, the $\sqrt7 \times \sqrt3$ CDW of the pristine VSe$_2$ transfers to a $3 \times \sqrt3$ and $4\times 4$ phase, the latter of which is a projection of the bulk counterpart, at critical doping concentrations of around 0.2 holes per formula unit and 0.25 electrons per formula unit, respectively. The $4\times 4$ CDW phase can also be stabilized under compressive strain. Although electron-phonon coupling is prevailing in the CDW formation, we show that Fermi surface nesting is a good starting point to explain most of these transitions in monolayer 1T-VSe$_2$. These results make VSe$_2$ an appealing material for electronic devices based on controllable CDW phase transitions.
△ Less
Submitted 11 March, 2021; v1 submitted 6 November, 2020;
originally announced November 2020.
-
Local energy landscape drives long exciton diffusion in 2D halide perovskite semiconductors
Authors:
Alan Baldwin,
Géraud Delport,
Kai Leng,
Rosemonde Chahbazian,
Krzysztof Galkowski,
Kian Ping Loh,
Samuel D. Stranks
Abstract:
Halide perovskites have emerged as disruptive semiconductors for applications including photovoltaics and light emitting devices, with modular optoelectronic properties realisable through composition and dimensionality tuning. Layered Ruddlesden-Popper perovskites of the form BA2MAn-1PbnI3n+1, where n is the number of lead-halide and methylammonium (MA) sheets spaced by longer butylammonium (BA) c…
▽ More
Halide perovskites have emerged as disruptive semiconductors for applications including photovoltaics and light emitting devices, with modular optoelectronic properties realisable through composition and dimensionality tuning. Layered Ruddlesden-Popper perovskites of the form BA2MAn-1PbnI3n+1, where n is the number of lead-halide and methylammonium (MA) sheets spaced by longer butylammonium (BA) cations, are particularly interesting due to their unique two-dimensional character and charge carrier dynamics dominated by strongly bound excitons. However, long-range energy transport through exciton diffusion in these materials is not understood or realised. Here, we employ local time-resolved luminescence mapping techniques to visualise exciton transport in high-quality exfoliated flakes of the BA2MAn-1PbnI3n+1 perovskite family. We uncover two distinct transport regimes, depending on the temperature range studied. At temperatures above 100 K, diffusion is mediated by thermally activated hopping processes between localised states. At lower temperatures, a non-uniform energetic landscape emerges in which exciton transport is dominated by energy funnelling processes to lower energy states, leading to long range transport over hundreds of nanometres even in the absence of exciton-phonon coupling and in the presence of local optoelectronic heterogeneity. Efficient, long-range and switchable excitonic funnelling offers exciting possibilities of controlled directional long-range transport in these 2D materials for new device applications.
△ Less
Submitted 29 October, 2020;
originally announced October 2020.
-
Flipping the Perspective in Contact Tracing
Authors:
Po-Shen Loh
Abstract:
We introduce a fundamentally different paradigm for contact tracing: for each positive case, do not only ask direct contacts to quarantine; instead, tell everyone how many relationships away the disease just struck (so, "2" is a close physical contact of a close physical contact). This new approach, which has already been deployed in a publicly downloadable app, brings a new tool to bear on pandem…
▽ More
We introduce a fundamentally different paradigm for contact tracing: for each positive case, do not only ask direct contacts to quarantine; instead, tell everyone how many relationships away the disease just struck (so, "2" is a close physical contact of a close physical contact). This new approach, which has already been deployed in a publicly downloadable app, brings a new tool to bear on pandemic control, powered by network theory. Like a weather satellite providing early warning of incoming hurricanes, it empowers individuals to see transmission approaching from far away, and incites behavior change to directly avoid exposure. This flipped perspective engages natural self-interested instincts of self-preservation, reducing reliance on altruism, and the resulting caution reduces pandemic spread in the social vicinity of each infection. Consequently, our new system solves the behavior coordination problem which has hampered many other app-based interventions to date. We also provide a heuristic mathematical analysis that shows how our system already achieves critical mass from the user perspective at very low adoption thresholds (likely below 10% in some common types of communities as indicated empirically in the first practical deployment); after that point, the design of our system naturally accelerates further adoption, while also alerting even non-users of the app. This article seeks to lay the theoretical foundation for our approach, and to open the area for further research along many dimensions.
△ Less
Submitted 12 November, 2020; v1 submitted 8 October, 2020;
originally announced October 2020.
-
Robust regression with covariate filtering: Heavy tails and adversarial contamination
Authors:
Ankit Pensia,
Varun Jog,
Po-Ling Loh
Abstract:
We study the problem of linear regression where both covariates and responses are potentially (i) heavy-tailed and (ii) adversarially contaminated. Several computationally efficient estimators have been proposed for the simpler setting where the covariates are sub-Gaussian and uncontaminated; however, these estimators may fail when the covariates are either heavy-tailed or contain outliers. In thi…
▽ More
We study the problem of linear regression where both covariates and responses are potentially (i) heavy-tailed and (ii) adversarially contaminated. Several computationally efficient estimators have been proposed for the simpler setting where the covariates are sub-Gaussian and uncontaminated; however, these estimators may fail when the covariates are either heavy-tailed or contain outliers. In this work, we show how to modify the Huber regression, least trimmed squares, and least absolute deviation estimators to obtain estimators which are simultaneously computationally and statistically efficient in the stronger contamination model. Our approach is quite simple, and consists of applying a filtering algorithm to the covariates, and then applying the classical robust regression estimators to the remaining data. We show that the Huber regression estimator achieves near-optimal error rates in this setting, whereas the least trimmed squares and least absolute deviation estimators can be made to achieve near-optimal error after applying a postprocessing step.
△ Less
Submitted 17 May, 2021; v1 submitted 27 September, 2020;
originally announced September 2020.
-
Provable Training Set Debugging for Linear Regression
Authors:
Xiaomin Zhang,
Xiaojin Zhu,
Po-Ling Loh
Abstract:
We investigate problems in penalized $M$-estimation, inspired by applications in machine learning debugging. Data are collected from two pools, one containing data with possibly contaminated labels, and the other which is known to contain only cleanly labeled points. We first formulate a general statistical algorithm for identifying buggy points and provide rigorous theoretical guarantees under th…
▽ More
We investigate problems in penalized $M$-estimation, inspired by applications in machine learning debugging. Data are collected from two pools, one containing data with possibly contaminated labels, and the other which is known to contain only cleanly labeled points. We first formulate a general statistical algorithm for identifying buggy points and provide rigorous theoretical guarantees under the assumption that the data follow a linear model. We then present two case studies to illustrate the results of our general theory and the dependence of our estimator on clean versus buggy points. We further propose an algorithm for tuning parameter selection of our Lasso-based algorithm and provide corresponding theoretical guarantees. Finally, we consider a two-person "game" played between a bug generator and a debugger, where the debugger can augment the contaminated data set with cleanly labeled versions of points in the original data pool. We establish a theoretical result showing a sufficient condition under which the bug generator can always fool the debugger. Nonetheless, we provide empirical results showing that such a situation may not occur in practice, making it possible for natural augmentation strategies combined with our Lasso debugging algorithm to succeed.
△ Less
Submitted 9 August, 2021; v1 submitted 16 June, 2020;
originally announced June 2020.
-
Learning Motifs and their Hierarchies in Atomic Resolution Microscopy
Authors:
Jiadong Dan,
Xiaoxu Zhao,
Shoucong Ning,
Jiong Lu,
Kian Ping Loh,
N. Duane Loh,
Stephen J. Pennycook
Abstract:
Progress in functional materials discovery has been accelerated by advances in high throughput materials synthesis and by the development of high-throughput computation. However, a complementary robust and high throughput structural characterization framework is still lacking. New methods and tools in the field of machine learning suggest that a highly automated high-throughput structural characte…
▽ More
Progress in functional materials discovery has been accelerated by advances in high throughput materials synthesis and by the development of high-throughput computation. However, a complementary robust and high throughput structural characterization framework is still lacking. New methods and tools in the field of machine learning suggest that a highly automated high-throughput structural characterization framework based on atomic-level imaging can establish the crucial statistical link between structure and macroscopic properties. Here we develop a machine learning framework towards this goal. Our framework captures local structural features in images with Zernike polynomials, which is demonstrably noise-robust, flexible, and accurate. These features are then classified into readily interpretable structural motifs with a hierarchical active learning scheme powered by a novel unsupervised two-stage relaxed clustering scheme. We have successfully demonstrated the accuracy and efficiency of the proposed methodology by mapping a full spectrum of structural defects, including point defects, line defects, and planar defects in scanning transmission electron microscopy (STEM) images of various 2D materials, with greatly improved separability over existing methods. Our techniques can be easily and flexibly applied to other types of microscopy data with complex features, providing a solid foundation for automatic, multiscale feature analysis with high veracity.
△ Less
Submitted 29 November, 2021; v1 submitted 23 May, 2020;
originally announced May 2020.
-
Spin-Valley Locking Effect in Defect States of Monolayer MoS$_2$
Authors:
Yaqian Wang,
Longjiang Deng,
Qilin Wei,
Yi Wan,
Zhen Liu,
Xiao Lu,
Yue Li,
Lei Bi,
Li Zhang,
Haipeng Lu,
Haiyan Chen,
Peiheng Zhou,
Linbo Zhang,
Yingchun Cheng,
Xiaoxu Zhao,
Yu Ye,
Wei Huang,
Stephen J. Pennycook,
Kian Ping Loh,
Bo Peng
Abstract:
Valley pseudospin in two-dimensional (2D) transition-metal dichalcogenides (TMDs) allows optical control of spin-valley polarization and intervalley quantum coherence. Defect states in TMDs give rise to new exciton features and theoretically exhibit spin-valley polarization; however, experimental achievement of this phenomenon remains challenges. Here, we report unambiguous valley pseudospin of de…
▽ More
Valley pseudospin in two-dimensional (2D) transition-metal dichalcogenides (TMDs) allows optical control of spin-valley polarization and intervalley quantum coherence. Defect states in TMDs give rise to new exciton features and theoretically exhibit spin-valley polarization; however, experimental achievement of this phenomenon remains challenges. Here, we report unambiguous valley pseudospin of defect-bound localized excitons in CVD-grown monolayer MoS2; enhanced valley Zeeman splitting with an effective g-factor of -6.2 is observed. Our results reveal that all five d-orbitals and the increased effective electron mass contribute to the band shift of defect states, demonstrating a new physics of the magnetic responses of defect-bound localized excitons, strikingly different from that of A excitons. Our work paves the way for the manipulation of the spin-valley degrees of freedom through defects toward valleytronic devices.
△ Less
Submitted 21 February, 2020;
originally announced February 2020.
-
Enhanced Valley Zeeman Splitting in Fe-Doped Monolayer MoS2
Authors:
Qi Li,
Xiaoxu Zhao,
Longjiang Deng,
Zhongtai Shi,
Sheng Liu,
Qilin Wei,
Linbo Zhang,
Yingchun Cheng,
Li Zhang,
Haipeng Lu,
Weibo Gao,
Wei Huang,
Cheng-Wei Qiu,
Gang Xiang,
Stephen John Pennycook,
Qihua Xiong,
Kian Ping Loh,
Bo Peng
Abstract:
The Zeeman effect offers unique opportunities for magnetic manipulation of the spin degree of freedom (DOF). Recently, valley Zeeman splitting, referring to the lifting of valley degeneracy, has been demonstrated in two-dimensional transition metal dichalcogenides (TMDs) at liquid helium temperature. However, to realize the practical applications of valley pseudospins, the valley DOF must be contr…
▽ More
The Zeeman effect offers unique opportunities for magnetic manipulation of the spin degree of freedom (DOF). Recently, valley Zeeman splitting, referring to the lifting of valley degeneracy, has been demonstrated in two-dimensional transition metal dichalcogenides (TMDs) at liquid helium temperature. However, to realize the practical applications of valley pseudospins, the valley DOF must be controllable by a magnetic field at room temperature, which remains a significant challenge. Magnetic doping in TMDs can enhance the Zeeman splitting, however, to achieve this experimentally is not easy. Here, we report unambiguous magnetic manipulation of valley Zeeman splitting at 300 K (g = -6.4) and 10 K (g = -11) in a CVD-grown Fe-doped MoS2 monolayer; the effective g factor can be tuned to -20.7 by increasing the Fe dopant concentration, which represents an approximately fivefold enhancement as compared to undoped MoS2. Our measurements and calculations reveal that the enhanced splitting and geff factors are due to the Heisenberg exchange interaction of the localized magnetic moments (Fe 3d electrons) with MoS2 through the d-orbital hybridization.
△ Less
Submitted 15 February, 2020;
originally announced February 2020.
-
Boosting Algorithms for Estimating Optimal Individualized Treatment Rules
Authors:
Duzhe Wang,
Haoda Fu,
Po-Ling Loh
Abstract:
We present nonparametric algorithms for estimating optimal individualized treatment rules. The proposed algorithms are based on the XGBoost algorithm, which is known as one of the most powerful algorithms in the machine learning literature. Our main idea is to model the conditional mean of clinical outcome or the decision rule via additive regression trees, and use the boosting technique to estima…
▽ More
We present nonparametric algorithms for estimating optimal individualized treatment rules. The proposed algorithms are based on the XGBoost algorithm, which is known as one of the most powerful algorithms in the machine learning literature. Our main idea is to model the conditional mean of clinical outcome or the decision rule via additive regression trees, and use the boosting technique to estimate each single tree iteratively. Our approaches overcome the challenge of correct model specification, which is required in current parametric methods. The major contribution of our proposed algorithms is providing efficient and accurate estimation of the highly nonlinear and complex optimal individualized treatment rules that often arise in practice. Finally, we illustrate the superior performance of our algorithms by extensive simulation studies and conclude with an application to the real data from a diabetes Phase III trial.
△ Less
Submitted 31 January, 2020;
originally announced February 2020.
-
Adaptive Estimation and Statistical Inference for High-Dimensional Graph-Based Linear Models
Authors:
Duzhe Wang,
Po-Ling Loh
Abstract:
We consider adaptive estimation and statistical inference for high-dimensional graph-based linear models. In our model, the coordinates of regression coefficients correspond to an underlying undirected graph. Furthermore, the given graph governs the piecewise polynomial structure of the regression vector. In the adaptive estimation part, we apply graph-based regularization techniques and propose a…
▽ More
We consider adaptive estimation and statistical inference for high-dimensional graph-based linear models. In our model, the coordinates of regression coefficients correspond to an underlying undirected graph. Furthermore, the given graph governs the piecewise polynomial structure of the regression vector. In the adaptive estimation part, we apply graph-based regularization techniques and propose a family of locally adaptive estimators called the Graph-Piecewise-Polynomial-Lasso. We further study a one-step update of the Graph-Piecewise-Polynomial-Lasso for the problem of statistical inference. We develop the corresponding theory, which includes the fixed design and the sub-Gaussian random design. Finally, we illustrate the superior performance of our approaches by extensive simulation studies and conclude with an application to an Arabidopsis thaliana microarray dataset.
△ Less
Submitted 28 January, 2020;
originally announced January 2020.
-
Extracting robust and accurate features via a robust information bottleneck
Authors:
Ankit Pensia,
Varun Jog,
Po-Ling Loh
Abstract:
We propose a novel strategy for extracting features in supervised learning that can be used to construct a classifier which is more robust to small perturbations in the input space. Our method builds upon the idea of the information bottleneck by introducing an additional penalty term that encourages the Fisher information of the extracted features to be small, when parametrized by the inputs. By…
▽ More
We propose a novel strategy for extracting features in supervised learning that can be used to construct a classifier which is more robust to small perturbations in the input space. Our method builds upon the idea of the information bottleneck by introducing an additional penalty term that encourages the Fisher information of the extracted features to be small, when parametrized by the inputs. By tuning the regularization parameter, we can explicitly trade off the opposing desiderata of robustness and accuracy when constructing a classifier. We derive the optimal solution to the robust information bottleneck when the inputs and outputs are jointly Gaussian, proving that the optimally robust features are also jointly Gaussian in that setting. Furthermore, we propose a method for optimizing a variational bound on the robust information bottleneck objective in general settings using stochastic gradient descent, which may be implemented efficiently in neural networks. Our experimental results for synthetic and real data sets show that the proposed feature extraction method indeed produces classifiers with increased robustness to perturbations.
△ Less
Submitted 15 October, 2019;
originally announced October 2019.
-
A Simple Proof of the Quadratic Formula
Authors:
Po-Shen Loh
Abstract:
This article provides a simple proof of the quadratic formula, which also produces an efficient and natural method for solving general quadratic equations. The derivation is computationally light and conceptually natural, and has the potential to demystify quadratic equations for students worldwide.
This article provides a simple proof of the quadratic formula, which also produces an efficient and natural method for solving general quadratic equations. The derivation is computationally light and conceptually natural, and has the potential to demystify quadratic equations for students worldwide.
△ Less
Submitted 16 December, 2019; v1 submitted 13 October, 2019;
originally announced October 2019.
-
Extremal graphs with local covering conditions
Authors:
Debsoumya Chakraborti,
Po-Shen Loh
Abstract:
We systematically study a natural problem in extremal graph theory, to minimize the number of edges in a graph with a fixed number of vertices, subject to a certain local condition: each vertex must be in a copy of a fixed graph $H$. We completely solve this problem when $H$ is a clique, as well as more generally when $H$ is any regular graph with degree at least about half its number of vertices.…
▽ More
We systematically study a natural problem in extremal graph theory, to minimize the number of edges in a graph with a fixed number of vertices, subject to a certain local condition: each vertex must be in a copy of a fixed graph $H$. We completely solve this problem when $H$ is a clique, as well as more generally when $H$ is any regular graph with degree at least about half its number of vertices. We also characterize the extremal graphs when $H$ is an Erdős-Rényi random graph. The extremal structures turn out to have the similar form as the conjectured extremal structures for a well-studied but elusive problem of similar flavor with local constraints: to maximize the number of copies of a fixed clique in graphs in which all degrees have a fixed upper bound.
△ Less
Submitted 6 March, 2020; v1 submitted 11 September, 2019;
originally announced September 2019.
-
Robustifying deep networks for image segmentation
Authors:
Zheng Liu,
Jinnian Zhang,
Varun Jog,
Po-Ling Loh,
Alan B McMillan
Abstract:
Purpose: The purpose of this study is to investigate the robustness of a commonly-used convolutional neural network for image segmentation with respect to visually-subtle adversarial perturbations, and suggest new methods to make these networks more robust to such perturbations. Materials and Methods: In this retrospective study, the accuracy of brain tumor segmentation was studied in subjects wit…
▽ More
Purpose: The purpose of this study is to investigate the robustness of a commonly-used convolutional neural network for image segmentation with respect to visually-subtle adversarial perturbations, and suggest new methods to make these networks more robust to such perturbations. Materials and Methods: In this retrospective study, the accuracy of brain tumor segmentation was studied in subjects with low- and high-grade gliomas. A three-dimensional UNet model was implemented to segment four different MR series (T1-weighted, post-contrast T1-weighted, T2- weighted, and T2-weighted FLAIR) into four pixelwise labels (Gd-enhancing tumor, peritumoral edema, necrotic and non-enhancing tumor, and background). We developed attack strategies based on the Fast Gradient Sign Method (FGSM), iterative FGSM (i-FGSM), and targeted iterative FGSM (ti-FGSM) to produce effective attacks. Additionally, we explored the effectiveness of distillation and adversarial training via data augmentation to counteract adversarial attacks. Robustness was measured by comparing the Dice coefficient for each attack method using Wilcoxon signed-rank tests. Results: Attacks based on FGSM, i-FGSM, and ti-FGSM were effective in significantly reducing the quality of image segmentation with reductions in Dice coefficient by up to 65%. For attack defenses, distillation performed significantly better than adversarial training approaches. However, all defense approaches performed worse compared to unperturbed test images. Conclusion: Segmentation networks can be adversely affected by targeted attacks that introduce visually minor (and potentially undetectable) modifications to existing images. With an increasing interest in applying deep learning techniques to medical imaging data, it is important to quantify the ramifications of adversarial inputs (either intentional or unintentional).
△ Less
Submitted 1 August, 2019;
originally announced August 2019.
-
Estimating location parameters in entangled single-sample distributions
Authors:
Ankit Pensia,
Varun Jog,
Po-Ling Loh
Abstract:
We consider the problem of estimating the common mean of independently sampled data, where samples are drawn in a possibly non-identical manner from symmetric, unimodal distributions with a common mean. This generalizes the setting of Gaussian mixture modeling, since the number of distinct mixture components may diverge with the number of observations. We propose an estimator that adapts to the le…
▽ More
We consider the problem of estimating the common mean of independently sampled data, where samples are drawn in a possibly non-identical manner from symmetric, unimodal distributions with a common mean. This generalizes the setting of Gaussian mixture modeling, since the number of distinct mixture components may diverge with the number of observations. We propose an estimator that adapts to the level of heterogeneity in the data, achieving near-optimality in both the i.i.d. setting and some heterogeneous settings, where the fraction of ``low-noise'' points is as small as $\frac{\log n}{n}$. Our estimator is a hybrid of the modal interval, shorth, and median estimators from classical statistics; however, the key technical contributions rely on novel empirical process theory results that we derive for independent but non-i.i.d. data. In the multivariate setting, we generalize our theory to mean estimation for mixtures of radially symmetric distributions, and derive minimax lower bounds on the expected error of any estimator that is agnostic to the scales of individual data points. Finally, we describe an extension of our estimators applicable to linear regression. In the multivariate mean estimation and regression settings, we present computationally feasible versions of our estimators that run in time polynomial in the number of data points.
△ Less
Submitted 6 July, 2019;
originally announced July 2019.
-
Minimizing the numbers of cliques and cycles of fixed size in an $F$-saturated graph
Authors:
Debsoumya Chakraborti,
Po-Shen Loh
Abstract:
This paper considers two important questions in the well-studied theory of graphs that are $F$-saturated. A graph $G$ is called $F$-saturated if $G$ does not contain a subgraph isomorphic to $F$, but the addition of any edge creates a copy of $F$. We first resolve a fundamental question of minimizing the number of cliques of size $r$ in a $K_s$-saturated graph for all sufficiently large numbers of…
▽ More
This paper considers two important questions in the well-studied theory of graphs that are $F$-saturated. A graph $G$ is called $F$-saturated if $G$ does not contain a subgraph isomorphic to $F$, but the addition of any edge creates a copy of $F$. We first resolve a fundamental question of minimizing the number of cliques of size $r$ in a $K_s$-saturated graph for all sufficiently large numbers of vertices, confirming a conjecture of Kritschgau, Methuku, Tait, and Timmons. We also go further and prove a corresponding stability result. Next we minimize the number of cycles of length $r$ in a $K_s$-saturated graph for all sufficiently large numbers of vertices, and classify the extremal graphs for most values of $r$, answering another question of Kritschgau, Methuku, Tait, and Timmons for most $r$. We then move on to a central and longstanding conjecture in graph saturation made by Tuza, which states that for every graph $F$, the limit $\lim_{n \rightarrow \infty} \frac{\sat(n, F)}{n}$ exists, where $\sat(n, F)$ denotes the minimum number of edges in an $n$-vertex $F$-saturated graph. Pikhurko made progress in the negative direction by considering families of graphs instead of a single graph, and proved that there exists a graph family $\mathcal{F}$ of size $4$ for which $\lim_{n \rightarrow \infty} \frac{\sat(n, \mathcal{F})}{n}$ does not exist (for a family of graphs $\mathcal{F}$, a graph $G$ is called $\mathcal{F}$-saturated if $G$ does not contain a copy of any graph in $\mathcal{F}$, but the addition of any edge creates a copy of a graph in $\mathcal{F}$, and $\sat(n, \mathcal{F})$ is defined similarly). We make the first improvement in 15 years by showing that there exist infinitely many graph families of size $3$ where this limit does not exist. Our construction also extends to the generalized saturation problem when we minimize the number of fixed-size cliques.
△ Less
Submitted 15 July, 2020; v1 submitted 2 July, 2019;
originally announced July 2019.
-
Does Data Augmentation Lead to Positive Margin?
Authors:
Shashank Rajput,
Zhili Feng,
Zachary Charles,
Po-Ling Loh,
Dimitris Papailiopoulos
Abstract:
Data augmentation (DA) is commonly used during model training, as it significantly improves test error and model robustness. DA artificially expands the training set by applying random noise, rotations, crops, or even adversarial perturbations to the input data. Although DA is widely used, its capacity to provably improve robustness is not fully understood. In this work, we analyze the robustness…
▽ More
Data augmentation (DA) is commonly used during model training, as it significantly improves test error and model robustness. DA artificially expands the training set by applying random noise, rotations, crops, or even adversarial perturbations to the input data. Although DA is widely used, its capacity to provably improve robustness is not fully understood. In this work, we analyze the robustness that DA begets by quantifying the margin that DA enforces on empirical risk minimizers. We first focus on linear separators, and then a class of nonlinear models whose labeling is constant within small convex hulls of data points. We present lower bounds on the number of augmented data points required for non-zero margin, and show that commonly used DA techniques may only introduce significant margin after adding exponentially many points to the data set.
△ Less
Submitted 8 May, 2019;
originally announced May 2019.
-
Teaching and learning in uncertainty
Authors:
Varun Jog,
Po-Ling Loh
Abstract:
We investigate a simple model for social learning with two agents: a teacher and a student. The teacher's goal is to teach the student the state of the world; however, the teacher himself is not certain about the state of the world and needs to simultaneously learn this parameter and teach it to the student. We model the teacher's and student's uncertainties via noisy transmission channels, and em…
▽ More
We investigate a simple model for social learning with two agents: a teacher and a student. The teacher's goal is to teach the student the state of the world; however, the teacher himself is not certain about the state of the world and needs to simultaneously learn this parameter and teach it to the student. We model the teacher's and student's uncertainties via noisy transmission channels, and employ two simple decoding strategies for the student. We focus on two teaching strategies: a "low-effort" strategy of simply forwarding information, and a "high-effort" strategy of communicating the teacher's current best estimate of the world at each time instant, based on his own cumulative learning. Using tools from large deviation theory, we calculate the exact learning rates for these strategies and demonstrate regimes where the low-effort strategy outperforms the high-effort strategy. Finally, we present a conjecture concerning the optimal learning rate for the student over all joint strategies between the student and the teacher.
△ Less
Submitted 6 October, 2020; v1 submitted 21 January, 2019;
originally announced January 2019.
-
Kondo Impurities in Two Dimensional MoS2 for Achieving Ultrahigh Thermoelectric Powerfactor
Authors:
Jing Wu,
Yanpeng Liu,
Yi Liu,
Yongqing Cai,
Yunshan Zhao,
Hong Kuan Ng,
Kenji Watanabe,
Takashi Taniguchi,
Gang Zhang,
Chengwei Qiu,
Dongzhi Chi,
AH Castro Neto,
John TL Thong,
Kian Ping Loh,
Kedar Hippalgaonkar
Abstract:
Local magnetic impurities arising from atomic vacancies in two-dimensional (2D) nanosheets are predicted to have a profound effect on charge transport due to resonant scattering, and provide a handle for enhancing thermoelectric properties through the Kondo effect. However, the effects of these impurities are often masked by external fluctuations and turbostratic interfaces, therefore, it is highl…
▽ More
Local magnetic impurities arising from atomic vacancies in two-dimensional (2D) nanosheets are predicted to have a profound effect on charge transport due to resonant scattering, and provide a handle for enhancing thermoelectric properties through the Kondo effect. However, the effects of these impurities are often masked by external fluctuations and turbostratic interfaces, therefore, it is highly challenging to probe the correlation between magnetic impurities and thermoelectric parameters experimentally. In this work, we demonstrate that by placing Molybdenum Disulfide on a hexagonal Boron Nitride substrate, a colossal spin splitting of the conduction sub-band up to ~50.0 meV is observed at the sulfur vacancies, suggesting that these are local magnetic states. Transport measurements reveal a large anomalous positive Seebeck coefficient in highly conducting n type MoS2, originating from quasiparticle resonance near the Fermi level described by the Kondo effect. Furthermore, by tuning the chemical potential, a record power factor of 50mW/mK2 in low-dimensional materials was achieved. Our work shows that defect engineering of 2D materials affords a strategy for controlling Kondo impurities and tuning thermoelectric transport.
△ Less
Submitted 14 January, 2019;
originally announced January 2019.
-
Scale calibration for high-dimensional robust regression
Authors:
Po-Ling Loh
Abstract:
We present a new method for high-dimensional linear regression when a scale parameter of the additive errors is unknown. The proposed estimator is based on a penalized Huber $M$-estimator, for which theoretical results on estimation error have recently been proposed in high-dimensional statistics literature. However, the variance of the error term in the linear model is intricately connected to th…
▽ More
We present a new method for high-dimensional linear regression when a scale parameter of the additive errors is unknown. The proposed estimator is based on a penalized Huber $M$-estimator, for which theoretical results on estimation error have recently been proposed in high-dimensional statistics literature. However, the variance of the error term in the linear model is intricately connected to the optimal parameter used to define the shape of the Huber loss. Our main idea is to use an adaptive technique, based on Lepski's method, to overcome the difficulties in solving a joint nonconvex optimization problem with respect to the location and scale parameters.
△ Less
Submitted 5 November, 2018;
originally announced November 2018.
-
Adversarial Risk Bounds via Function Transformation
Authors:
Justin Khim,
Po-Ling Loh
Abstract:
We derive bounds for a notion of adversarial risk, designed to characterize the robustness of linear and neural network classifiers to adversarial perturbations. Specifically, we introduce a new class of function transformations with the property that the risk of the transformed functions upper-bounds the adversarial risk of the original functions. This reduces the problem of deriving bounds on th…
▽ More
We derive bounds for a notion of adversarial risk, designed to characterize the robustness of linear and neural network classifiers to adversarial perturbations. Specifically, we introduce a new class of function transformations with the property that the risk of the transformed functions upper-bounds the adversarial risk of the original functions. This reduces the problem of deriving bounds on the adversarial risk to the problem of deriving risk bounds using standard learning-theoretic techniques. We then derive bounds on the Rademacher complexities of the transformed function classes, obtaining error rates on the same order as the generalization error of the original function classes. We also discuss extensions of our theory to multiclass classification and regression. Finally, we provide two algorithms for optimizing the adversarial risk bounds in the linear case, and discuss connections to regularization and distributional robustness.
△ Less
Submitted 1 January, 2019; v1 submitted 22 October, 2018;
originally announced October 2018.
-
A theory of maximum likelihood for weighted infection graphs
Authors:
Justin Khim,
Po-Ling Loh
Abstract:
We study the problem of parameter estimation based on infection data from an epidemic outbreak on a graph. We assume that successive infections occur via contagion; i.e., transmissions can only spread across existing directed edges in the graph. Our stochastic spreading model allows individual nodes to be infected more than once, and the probability of the transmission spreading across a particula…
▽ More
We study the problem of parameter estimation based on infection data from an epidemic outbreak on a graph. We assume that successive infections occur via contagion; i.e., transmissions can only spread across existing directed edges in the graph. Our stochastic spreading model allows individual nodes to be infected more than once, and the probability of the transmission spreading across a particular edge is proportional to both the cumulative number of times the source nodes has been infected in previous stages of the epidemic and the weight parameter of the edge. We propose a maximum likelihood estimator for inferring the unknown edge weights when full information is available concerning the order and identity of successive edge transmissions. When the weights take a particular form as exponential functions of a linear combination of known edge covariates, we show that maximum likelihood estimation amounts to optimizing a convex function, and produces a solution that is both consistent and asymptotically normal. Our proofs are based on martingale convergence theorems and the theory of weighted Pólya urns. We also show how our theory may be generalized to settings where the weights are not exponential. Finally, we analyze the case where the available infection data comes in the form of an unordered set of edge transmissions. We propose two algorithms for weight parameter estimation in this setting and derive corresponding theoretical guarantees. Our methods are validated using both synthetic data and real-world data from the Ebola spread in West Africa.
△ Less
Submitted 13 June, 2018;
originally announced June 2018.
-
Getting to Know Low-light Images with The Exclusively Dark Dataset
Authors:
Yuen Peng Loh,
Chee Seng Chan
Abstract:
Low-light is an inescapable element of our daily surroundings that greatly affects the efficiency of our vision. Research works on low-light has seen a steady growth, particularly in the field of image enhancement, but there is still a lack of a go-to database as benchmark. Besides, research fields that may assist us in low-light environments, such as object detection, has glossed over this aspect…
▽ More
Low-light is an inescapable element of our daily surroundings that greatly affects the efficiency of our vision. Research works on low-light has seen a steady growth, particularly in the field of image enhancement, but there is still a lack of a go-to database as benchmark. Besides, research fields that may assist us in low-light environments, such as object detection, has glossed over this aspect even though breakthroughs-after-breakthroughs had been achieved in recent years, most noticeably from the lack of low-light data (less than 2% of the total images) in successful public benchmark dataset such as PASCAL VOC, ImageNet, and Microsoft COCO. Thus, we propose the Exclusively Dark dataset to elevate this data drought, consisting exclusively of ten different types of low-light images (i.e. low, ambient, object, single, weak, strong, screen, window, shadow and twilight) captured in visible light only with image and object level annotations. Moreover, we share insightful findings in regards to the effects of low-light on the object detection task by analyzing visualizations of both hand-crafted and learned features. Most importantly, we found that the effects of low-light reaches far deeper into the features than can be solved by simple "illumination invariance'". It is our hope that this analysis and the Exclusively Dark dataset can encourage the growth in low-light domain researches on different fields. The Exclusively Dark dataset with its annotation is available at https://github.com/cs-chan/Exclusively-Dark-Image-Dataset
△ Less
Submitted 28 May, 2018;
originally announced May 2018.
-
Online learning with graph-structured feedback against adaptive adversaries
Authors:
Zhili Feng,
Po-Ling Loh
Abstract:
We derive upper and lower bounds for the policy regret of $T$-round online learning problems with graph-structured feedback, where the adversary is nonoblivious but assumed to have a bounded memory. We obtain upper bounds of $\widetilde O(T^{2/3})$ and $\widetilde O(T^{3/4})$ for strongly-observable and weakly-observable graphs, respectively, based on analyzing a variant of the Exp3 algorithm. Whe…
▽ More
We derive upper and lower bounds for the policy regret of $T$-round online learning problems with graph-structured feedback, where the adversary is nonoblivious but assumed to have a bounded memory. We obtain upper bounds of $\widetilde O(T^{2/3})$ and $\widetilde O(T^{3/4})$ for strongly-observable and weakly-observable graphs, respectively, based on analyzing a variant of the Exp3 algorithm. When the adversary is allowed a bounded memory of size 1, we show that a matching lower bound of $\widetildeΩ(T^{2/3})$ is achieved in the case of full-information feedback. We also study the particular loss structure of an oblivious adversary with switching costs, and show that in such a setting, non-revealing strongly-observable feedback graphs achieve a lower bound of $\widetildeΩ(T^{2/3})$, as well.
△ Less
Submitted 1 April, 2018;
originally announced April 2018.
-
Anomalous quantum metal in a 2D crystalline superconductor with intrinsic electronic non-uniformity
Authors:
Linjun Li,
Chuan Chen,
Kenji Watanabe,
Takashi Taniguchi,
Yi Zheng,
Zhuan Xu,
Vitor M. Pereira,
Kian Ping Loh,
Antonio H. Castro Neto
Abstract:
The details of the superconducting to quantum metal transition (SQMT) at T=0 are an open problem that invokes much interest in the nature of this exotic and unexpected ground state1-3. However, the SQMT was not yet investigated in a crystalline 2D superconductor with coexisting and fluctuating quantum orders. Here, we report the observation of a SQMT in 2D ion-gel gated 1T-TiSe24, driven by magnet…
▽ More
The details of the superconducting to quantum metal transition (SQMT) at T=0 are an open problem that invokes much interest in the nature of this exotic and unexpected ground state1-3. However, the SQMT was not yet investigated in a crystalline 2D superconductor with coexisting and fluctuating quantum orders. Here, we report the observation of a SQMT in 2D ion-gel gated 1T-TiSe24, driven by magnetic field. A field-induced crossover between Bose quantum metal and vortex quantum creeping with increasing field is observed. We discuss the interplay between superconducting and CDW fluctuations (discommensurations) and their relation to the anomalous quantum metal (AQM) phase. From our findings, gate-tunable 1T-TiSe2 emerges as a privileged platform to scrutinize, in a controlled way, the details of the SQMT, the role of coexisting fluctuating orders and, ultimately, obtain a deeper understanding of the fate of superconductivity in strictly two-dimensional crystals near zero temperature.
△ Less
Submitted 19 June, 2019; v1 submitted 29 March, 2018;
originally announced March 2018.
-
Graph-Based Ascent Algorithms for Function Maximization
Authors:
Muni Sreenivas Pydi,
Varun Jog,
Po-Ling Loh
Abstract:
We study the problem of finding the maximum of a function defined on the nodes of a connected graph. The goal is to identify a node where the function obtains its maximum. We focus on local iterative algorithms, which traverse the nodes of the graph along a path, and the next iterate is chosen from the neighbors of the current iterate with probability distribution determined by the function values…
▽ More
We study the problem of finding the maximum of a function defined on the nodes of a connected graph. The goal is to identify a node where the function obtains its maximum. We focus on local iterative algorithms, which traverse the nodes of the graph along a path, and the next iterate is chosen from the neighbors of the current iterate with probability distribution determined by the function values at the current iterate and its neighbors. We study two algorithms corresponding to a Metropolis-Hastings random walk with different transition kernels: (i) The first algorithm is an exponentially weighted random walk governed by a parameter $γ$. (ii) The second algorithm is defined with respect to the graph Laplacian and a smoothness parameter $k$. We derive convergence rates for the two algorithms in terms of total variation distance and hitting times. We also provide simulations showing the relative convergence rates of our algorithms in comparison to an unbiased random walk, as a function of the smoothness of the graph function. Our algorithms may be categorized as a new class of "descent-based" methods for function maximization on the nodes of a graph.
△ Less
Submitted 13 February, 2018;
originally announced February 2018.
-
Generalization Error Bounds for Noisy, Iterative Algorithms
Authors:
Ankit Pensia,
Varun Jog,
Po-Ling Loh
Abstract:
In statistical learning theory, generalization error is used to quantify the degree to which a supervised machine learning algorithm may overfit to training data. Recent work [Xu and Raginsky (2017)] has established a bound on the generalization error of empirical risk minimization based on the mutual information $I(S;W)$ between the algorithm input $S$ and the algorithm output $W$, when the loss…
▽ More
In statistical learning theory, generalization error is used to quantify the degree to which a supervised machine learning algorithm may overfit to training data. Recent work [Xu and Raginsky (2017)] has established a bound on the generalization error of empirical risk minimization based on the mutual information $I(S;W)$ between the algorithm input $S$ and the algorithm output $W$, when the loss function is sub-Gaussian. We leverage these results to derive generalization error bounds for a broad class of iterative algorithms that are characterized by bounded, noisy updates with Markovian structure. Our bounds are very general and are applicable to numerous settings of interest, including stochastic gradient Langevin dynamics (SGLD) and variants of the stochastic gradient Hamiltonian Monte Carlo (SGHMC) algorithm. Furthermore, our error bounds hold for any output function computed over the path of iterates, including the last iterate of the algorithm or the average of subsets of iterates, and also allow for non-uniform sampling of data in successive updates of the algorithm.
△ Less
Submitted 12 January, 2018;
originally announced January 2018.
-
Happy Travelers Take Big Pictures: A Psychological Study with Machine Learning and Big Data
Authors:
Xuefeng Liang,
Lixin Fan,
Yuen Peng Loh,
Yang Liu,
Song Tong
Abstract:
In psychology, theory-driven researches are usually conducted with extensive laboratory experiments, yet rarely tested or disproved with big data. In this paper, we make use of 418K travel photos with traveler ratings to test the influential "broaden-and-build" theory, that suggests positive emotions broaden one's visual attention. The core hypothesis examined in this study is that positive emotio…
▽ More
In psychology, theory-driven researches are usually conducted with extensive laboratory experiments, yet rarely tested or disproved with big data. In this paper, we make use of 418K travel photos with traveler ratings to test the influential "broaden-and-build" theory, that suggests positive emotions broaden one's visual attention. The core hypothesis examined in this study is that positive emotion is associated with a wider attention, hence highly-rated sites would trigger wide-angle photographs. By analyzing travel photos, we find a strong correlation between a preference for wide-angle photos and the high rating of tourist sites on TripAdvisor. We are able to carry out this analysis through the use of deep learning algorithms to classify the photos into wide and narrow angles, and present this study as an exemplar of how big data and deep learning can be used to test laboratory findings in the wild.
△ Less
Submitted 21 September, 2017;
originally announced September 2017.
-
The random k-matching-free process
Authors:
Michael Krivelevich,
Matthew Kwan,
Po-Shen Loh,
Benny Sudakov
Abstract:
Let $\mathcal{P}$ be a graph property which is preserved by removal of edges, and consider the random graph process that starts with the empty $n$-vertex graph and then adds edges one-by-one, each chosen uniformly at random subject to the constraint that $\mathcal{P}$ is not violated. These types of random processes have been the subject of extensive research over the last 20 years, having strikin…
▽ More
Let $\mathcal{P}$ be a graph property which is preserved by removal of edges, and consider the random graph process that starts with the empty $n$-vertex graph and then adds edges one-by-one, each chosen uniformly at random subject to the constraint that $\mathcal{P}$ is not violated. These types of random processes have been the subject of extensive research over the last 20 years, having striking applications in extremal combinatorics, and leading to the discovery of important probabilistic tools. In this paper we consider the $k$-matching-free process, where $\mathcal{P}$ is the property of not containing a matching of size $k$. We are able to analyse the behaviour of this process for a wide range of values of $k$; in particular we prove that if $k=o(n)$ or if $n-2k=o(\sqrt{n}/\log n)$ then this process is likely to terminate in a $k$-matching-free graph with the maximum possible number of edges, as characterised by Erdős and Gallai. We also show that these bounds on $k$ are essentially best possible, and we make a first step towards understanding the behaviour of the process in the intermediate regime.
△ Less
Submitted 27 May, 2018; v1 submitted 3 August, 2017;
originally announced August 2017.
-
Optimal Rates for Community Estimation in the Weighted Stochastic Block Model
Authors:
Min Xu,
Varun Jog,
Po-Ling Loh
Abstract:
Community identification in a network is an important problem in fields such as social science, neuroscience, and genetics. Over the past decade, stochastic block models (SBMs) have emerged as a popular statistical framework for this problem. However, SBMs have an important limitation in that they are suited only for networks with unweighted edges; in various scientific applications, disregarding…
▽ More
Community identification in a network is an important problem in fields such as social science, neuroscience, and genetics. Over the past decade, stochastic block models (SBMs) have emerged as a popular statistical framework for this problem. However, SBMs have an important limitation in that they are suited only for networks with unweighted edges; in various scientific applications, disregarding the edge weights may result in a loss of valuable information. We study a weighted generalization of the SBM, in which observations are collected in the form of a weighted adjacency matrix and the weight of each edge is generated independently from an unknown probability density determined by the community membership of its endpoints. We characterize the optimal rate of misclustering error of the weighted SBM in terms of the Renyi divergence of order 1/2 between the weight distributions of within-community and between-community edges, substantially generalizing existing results for unweighted SBMs. Furthermore, we present a computationally tractable algorithm based on discretization that achieves the optimal error rate. Our method is adaptive in the sense that the algorithm, without assuming knowledge of the weight densities, performs as well as the best algorithm that knows the weight densities.
△ Less
Submitted 29 September, 2018; v1 submitted 4 June, 2017;
originally announced June 2017.
-
Permutation Tests for Infection Graphs
Authors:
Justin Khim,
Po-Ling Loh
Abstract:
We formulate and analyze a novel hypothesis testing problem for inferring the edge structure of an infection graph. In our model, a disease spreads over a network via contagion or random infection, where the random variables governing the rates of contracting the disease from neighbors or random infection are independent exponential random variables with unknown rate parameters. A subset of nodes…
▽ More
We formulate and analyze a novel hypothesis testing problem for inferring the edge structure of an infection graph. In our model, a disease spreads over a network via contagion or random infection, where the random variables governing the rates of contracting the disease from neighbors or random infection are independent exponential random variables with unknown rate parameters. A subset of nodes is also censored uniformly at random. Given the statuses of nodes in the network, the goal is to determine the underlying graph. We present a procedure based on permutation testing, and we derive sufficient conditions for the validity of our test in terms of automorphism groups of the graphs corresponding to the null and alternative hypotheses. Further, the test is valid more generally for infection processes satisfying a basic symmetry condition. Our test is easy to compute and does not involve estimating unknown parameters governing the process. We also derive risk bounds for our permutation test in a variety of settings, and motivate our test statistic in terms of approximate equivalence to likelihood ratio testing and maximin tests. We conclude with an application to real data from an HIV infection network.
△ Less
Submitted 16 December, 2019; v1 submitted 22 May, 2017;
originally announced May 2017.
-
Distance-Uniform Graphs with Large Diameter
Authors:
Mikhail Lavrov,
Po-Shen Loh,
Arnau Messegué
Abstract:
An $ε$-distance-uniform graph is one in which from every vertex, all but an $ε$-fraction of the remaining vertices are at some fixed distance $d$, called the critical distance. We consider the maximum possible value of $d$ in an $ε$-distance-uniform graph with $n$ vertices. We show that for $\frac1n \le ε\le \frac1{\log n}$, there exist $ε$-distance-uniform graphs with critical distance…
▽ More
An $ε$-distance-uniform graph is one in which from every vertex, all but an $ε$-fraction of the remaining vertices are at some fixed distance $d$, called the critical distance. We consider the maximum possible value of $d$ in an $ε$-distance-uniform graph with $n$ vertices. We show that for $\frac1n \le ε\le \frac1{\log n}$, there exist $ε$-distance-uniform graphs with critical distance $2^{Ω(\frac{\log n}{\log ε^{-1}})}$, disproving a conjecture of Alon et al. that $d$ can be at most logarithmic in $n$. We also show that our construction is best possible, in the sense that an upper bound on $d$ of the form $2^{O(\frac{\log n}{\log ε^{-1}})}$ holds for all $ε$ and $n$.
△ Less
Submitted 16 August, 2017; v1 submitted 4 March, 2017;
originally announced March 2017.
-
Information and estimation in Fokker-Planck channels
Authors:
Andre Wibisono,
Varun Jog,
Po-Ling Loh
Abstract:
We study the relationship between information- and estimation-theoretic quantities in time-evolving systems. We focus on the Fokker-Planck channel defined by a general stochastic differential equation, and show that the time derivatives of entropy, KL divergence, and mutual information are characterized by estimation-theoretic quantities involving an appropriate generalization of the Fisher inform…
▽ More
We study the relationship between information- and estimation-theoretic quantities in time-evolving systems. We focus on the Fokker-Planck channel defined by a general stochastic differential equation, and show that the time derivatives of entropy, KL divergence, and mutual information are characterized by estimation-theoretic quantities involving an appropriate generalization of the Fisher information. Our results vastly extend De Bruijn's identity and the classical I-MMSE relation.
△ Less
Submitted 13 February, 2017;
originally announced February 2017.
-
Classifying unavoidable Tverberg partitions
Authors:
Boris Bukh,
Po-Shen Loh,
Gabriel Nivasch
Abstract:
Let $T(d,r) = (r-1)(d+1)+1$ be the parameter in Tverberg's theorem, and call a partition $\mathcal I$ of $\{1,2,\ldots,T(d,r)\}$ into $r$ parts a "Tverberg type". We say that $\mathcal I$ "occurs" in an ordered point sequence $P$ if $P$ contains a subsequence $P'$ of $T(d,r)$ points such that the partition of $P'$ that is order-isomorphic to $\mathcal I$ is a Tverberg partition. We say that…
▽ More
Let $T(d,r) = (r-1)(d+1)+1$ be the parameter in Tverberg's theorem, and call a partition $\mathcal I$ of $\{1,2,\ldots,T(d,r)\}$ into $r$ parts a "Tverberg type". We say that $\mathcal I$ "occurs" in an ordered point sequence $P$ if $P$ contains a subsequence $P'$ of $T(d,r)$ points such that the partition of $P'$ that is order-isomorphic to $\mathcal I$ is a Tverberg partition. We say that $\mathcal I$ is "unavoidable" if it occurs in every sufficiently long point sequence.
In this paper we study the problem of determining which Tverberg types are unavoidable. We conjecture a complete characterization of the unavoidable Tverberg types, and we prove some cases of our conjecture for $d\le 4$. Along the way, we study the avoidability of many other geometric predicates.
Our techniques also yield a large family of $T(d,r)$-point sets for which the number of Tverberg partitions is exactly $(r-1)!^d$. This lends further support for Sierksma's conjecture on the number of Tverberg partitions.
△ Less
Submitted 22 March, 2017; v1 submitted 3 November, 2016;
originally announced November 2016.