-
Curve Segment Neighborhood-based Vector Field Exploration
Authors:
Nguyen Phan,
Guoning Chen
Abstract:
Integral curves have been widely used to represent and analyze various vector fields. In this paper, we propose a Curve Segment Neighborhood Graph (CSNG) to capture the relationships between neighboring curve segments. This graph representation enables us to adapt the fast community detection algorithm, i.e., the Louvain algorithm, to identify individual graph communities from CSNG. Our results sh…
▽ More
Integral curves have been widely used to represent and analyze various vector fields. In this paper, we propose a Curve Segment Neighborhood Graph (CSNG) to capture the relationships between neighboring curve segments. This graph representation enables us to adapt the fast community detection algorithm, i.e., the Louvain algorithm, to identify individual graph communities from CSNG. Our results show that these communities often correspond to the features of the flow. To achieve a multi-level interactive exploration of the detected communities, we adapt a force-directed layout that allows users to refine and re-group communities based on their domain knowledge. We incorporate the proposed techniques into an interactive system to enable effective analysis and interpretation of complex patterns in large-scale integral curve datasets.
△ Less
Submitted 2 October, 2024;
originally announced October 2024.
-
HyperAgent: Generalist Software Engineering Agents to Solve Coding Tasks at Scale
Authors:
Huy Nhat Phan,
Phong X. Nguyen,
Nghi D. Q. Bui
Abstract:
Large Language Models (LLMs) have revolutionized software engineering (SE), demonstrating remarkable capabilities in various coding tasks. While recent efforts have produced autonomous software agents based on LLMs for end-to-end development tasks, these systems are typically designed for specific SE tasks. We introduce HyperAgent, a novel generalist multi-agent system designed to address a wide s…
▽ More
Large Language Models (LLMs) have revolutionized software engineering (SE), demonstrating remarkable capabilities in various coding tasks. While recent efforts have produced autonomous software agents based on LLMs for end-to-end development tasks, these systems are typically designed for specific SE tasks. We introduce HyperAgent, a novel generalist multi-agent system designed to address a wide spectrum of SE tasks across different programming languages by mimicking human developers' workflows. Comprising four specialized agents - Planner, Navigator, Code Editor, and Executor. HyperAgent manages the full lifecycle of SE tasks, from initial conception to final verification. Through extensive evaluations, HyperAgent achieves state-of-the-art performance across diverse SE tasks: it attains a 25.01% success rate on SWE-Bench-Lite and 31.40% on SWE-Bench-Verified for GitHub issue resolution, surpassing existing methods. Furthermore, HyperAgent demonstrates SOTA performance in repository-level code generation (RepoExec), and in fault localization and program repair (Defects4J), often outperforming specialized systems. This work represents a significant advancement towards versatile, autonomous agents capable of handling complex, multi-step SE tasks across various domains and languages, potentially transforming AI-assisted software development practices.
△ Less
Submitted 9 September, 2024;
originally announced September 2024.
-
PromSec: Prompt Optimization for Secure Generation of Functional Source Code with Large Language Models (LLMs)
Authors:
Mahmoud Nazzal,
Issa Khalil,
Abdallah Khreishah,
NhatHai Phan
Abstract:
The capability of generating high-quality source code using large language models (LLMs) reduces software development time and costs. However, they often introduce security vulnerabilities due to training on insecure open-source data. This highlights the need for ensuring secure and functional code generation. This paper introduces PromSec, an algorithm for prom optimization for secure and functio…
▽ More
The capability of generating high-quality source code using large language models (LLMs) reduces software development time and costs. However, they often introduce security vulnerabilities due to training on insecure open-source data. This highlights the need for ensuring secure and functional code generation. This paper introduces PromSec, an algorithm for prom optimization for secure and functioning code generation using LLMs. In PromSec, we combine 1) code vulnerability clearing using a generative adversarial graph neural network, dubbed as gGAN, to fix and reduce security vulnerabilities in generated codes and 2) code generation using an LLM into an interactive loop, such that the outcome of the gGAN drives the LLM with enhanced prompts to generate secure codes while preserving their functionality. Introducing a new contrastive learning approach in gGAN, we formulate code-clearing and generation as a dual-objective optimization problem, enabling PromSec to notably reduce the number of LLM inferences. PromSec offers a cost-effective and practical solution for generating secure, functional code. Extensive experiments conducted on Python and Java code datasets confirm that PromSec effectively enhances code security while upholding its intended functionality. Our experiments show that while a state-of-the-art approach fails to address all code vulnerabilities, PromSec effectively resolves them. Moreover, PromSec achieves more than an order-of-magnitude reduction in operation time, number of LLM queries, and security analysis costs. Furthermore, prompts optimized with PromSec for a certain LLM are transferable to other LLMs across programming languages and generalizable to unseen vulnerabilities in training. This study is a step in enhancing the trustworthiness of LLMs for secure and functional code generation, supporting their integration into real-world software development.
△ Less
Submitted 19 September, 2024;
originally announced September 2024.
-
Demo: SGCode: A Flexible Prompt-Optimizing System for Secure Generation of Code
Authors:
Khiem Ton,
Nhi Nguyen,
Mahmoud Nazzal,
Abdallah Khreishah,
Cristian Borcea,
NhatHai Phan,
Ruoming Jin,
Issa Khalil,
Yelong Shen
Abstract:
This paper introduces SGCode, a flexible prompt-optimizing system to generate secure code with large language models (LLMs). SGCode integrates recent prompt-optimization approaches with LLMs in a unified system accessible through front-end and back-end APIs, enabling users to 1) generate secure code, which is free of vulnerabilities, 2) review and share security analysis, and 3) easily switch from…
▽ More
This paper introduces SGCode, a flexible prompt-optimizing system to generate secure code with large language models (LLMs). SGCode integrates recent prompt-optimization approaches with LLMs in a unified system accessible through front-end and back-end APIs, enabling users to 1) generate secure code, which is free of vulnerabilities, 2) review and share security analysis, and 3) easily switch from one prompt optimization approach to another, while providing insights on model and system performance. We populated SGCode on an AWS server with PromSec, an approach that optimizes prompts by combining an LLM and security tools with a lightweight generative adversarial graph neural network to detect and fix security vulnerabilities in the generated code. Extensive experiments show that SGCode is practical as a public tool to gain insights into the trade-offs between model utility, secure code generation, and system cost. SGCode has only a marginal cost compared with prompting LLMs. SGCode is available at: https://sgcode.codes/.
△ Less
Submitted 25 September, 2024; v1 submitted 11 September, 2024;
originally announced September 2024.
-
Machine-Learning-Based Construction of Molecular Potential and Its Application in Exploring the Deep-Lying-Orbital Effect in High-Order Harmonic Generation
Authors:
Duong D. Hoang-Trong,
Khang Tran,
Doan-An Trieu,
Quan-Hao Truong,
Van-Hoang Le,
Ngoc-Loan Phan
Abstract:
Creating soft-Coulomb-type (SC) molecular potential within single-active-electron approximation (SAE) is essential since it allows solving time-dependent Schrödinger equations with fewer computational resources compared to other multielectron methods. The current available SC potentials can accurately reproduce the energy of the highest occupied molecular orbital (HOMO), which is sufficient for an…
▽ More
Creating soft-Coulomb-type (SC) molecular potential within single-active-electron approximation (SAE) is essential since it allows solving time-dependent Schrödinger equations with fewer computational resources compared to other multielectron methods. The current available SC potentials can accurately reproduce the energy of the highest occupied molecular orbital (HOMO), which is sufficient for analyzing nonlinear effects in laser-molecule interactions like high-order harmonic generation (HHG). However, recent discoveries of significant effects of deep-lying molecular orbitals call for more precise potentials to analyze them. In this study, we present a fast and accurate method based on machine learning to construct SC potentials that simultaneously reproduce various molecular features, including energies, symmetries, and dipole moments of HOMO, HOMO-1, and HOMO-2. We use this ML model to create SC SAE potentials of the HCN molecule and then comprehensively analyze the fingerprints of lower-lying orbitals in HHG spectra emitted during the H-CN stretching. Our findings reveal that HOMO-1 plays a role in forming the second HHG plateau. Additionally, as the H-C distance increases, the plateau structure and the smoothness of HHG spectra are altered due to the redistribution of orbital electron density. These results are in line with other experimental and theoretical studies. Lastly, the machine learning approach using deconvolution and convolution neural networks in the present study is so general that it can be applied to construct molecular potential for other molecules and molecular dynamic processes.
△ Less
Submitted 14 September, 2024; v1 submitted 20 August, 2024;
originally announced August 2024.
-
Learning to Predict Program Execution by Modeling Dynamic Dependency on Code Graphs
Authors:
Cuong Chi Le,
Hoang Nhat Phan,
Huy Nhat Phan,
Tien N. Nguyen,
Nghi D. Q. Bui
Abstract:
Predicting program behavior without execution is a crucial and challenging task in software engineering. Traditional models often struggle to capture the dynamic dependencies and interactions within code. This paper introduces a novel machine learning-based framework called CodeFlow, designed to predict code coverage and detect runtime errors through Dynamic Dependencies Learning. By utilizing con…
▽ More
Predicting program behavior without execution is a crucial and challenging task in software engineering. Traditional models often struggle to capture the dynamic dependencies and interactions within code. This paper introduces a novel machine learning-based framework called CodeFlow, designed to predict code coverage and detect runtime errors through Dynamic Dependencies Learning. By utilizing control flow graphs (CFGs), CodeFlow represents all possible execution paths and the relationships between different statements, providing a comprehensive understanding of program behavior. CodeFlow constructs CFGs to depict execution paths and learns vector representations for CFG nodes, capturing static control-flow dependencies. Additionally, it learns dynamic dependencies through execution traces, which reflect the impacts among statements during execution. This approach enables accurate prediction of code coverage and effective identification of runtime errors. Empirical evaluations demonstrate significant improvements in code coverage prediction accuracy and effective localization of runtime errors, outperforming existing models.
△ Less
Submitted 9 August, 2024; v1 submitted 5 August, 2024;
originally announced August 2024.
-
Operationalizing a Threat Model for Red-Teaming Large Language Models (LLMs)
Authors:
Apurv Verma,
Satyapriya Krishna,
Sebastian Gehrmann,
Madhavan Seshadri,
Anu Pradhan,
Tom Ault,
Leslie Barrett,
David Rabinowitz,
John Doucette,
NhatHai Phan
Abstract:
Creating secure and resilient applications with large language models (LLM) requires anticipating, adjusting to, and countering unforeseen threats. Red-teaming has emerged as a critical technique for identifying vulnerabilities in real-world LLM implementations. This paper presents a detailed threat model and provides a systematization of knowledge (SoK) of red-teaming attacks on LLMs. We develop…
▽ More
Creating secure and resilient applications with large language models (LLM) requires anticipating, adjusting to, and countering unforeseen threats. Red-teaming has emerged as a critical technique for identifying vulnerabilities in real-world LLM implementations. This paper presents a detailed threat model and provides a systematization of knowledge (SoK) of red-teaming attacks on LLMs. We develop a taxonomy of attacks based on the stages of the LLM development and deployment process and extract various insights from previous research. In addition, we compile methods for defense and practical red-teaming strategies for practitioners. By delineating prominent attack motifs and shedding light on various entry points, this paper provides a framework for improving the security and robustness of LLM-based systems.
△ Less
Submitted 20 July, 2024;
originally announced July 2024.
-
MEDFuse: Multimodal EHR Data Fusion with Masked Lab-Test Modeling and Large Language Models
Authors:
Thao Minh Nguyen Phan,
Cong-Tinh Dao,
Chenwei Wu,
Jian-Zhe Wang,
Shun Liu,
Jun-En Ding,
David Restrepo,
Feng Liu,
Fang-Ming Hung,
Wen-Chih Peng
Abstract:
Electronic health records (EHRs) are multimodal by nature, consisting of structured tabular features like lab tests and unstructured clinical notes. In real-life clinical practice, doctors use complementary multimodal EHR data sources to get a clearer picture of patients' health and support clinical decision-making. However, most EHR predictive models do not reflect these procedures, as they eithe…
▽ More
Electronic health records (EHRs) are multimodal by nature, consisting of structured tabular features like lab tests and unstructured clinical notes. In real-life clinical practice, doctors use complementary multimodal EHR data sources to get a clearer picture of patients' health and support clinical decision-making. However, most EHR predictive models do not reflect these procedures, as they either focus on a single modality or overlook the inter-modality interactions/redundancy. In this work, we propose MEDFuse, a Multimodal EHR Data Fusion framework that incorporates masked lab-test modeling and large language models (LLMs) to effectively integrate structured and unstructured medical data. MEDFuse leverages multimodal embeddings extracted from two sources: LLMs fine-tuned on free clinical text and masked tabular transformers trained on structured lab test results. We design a disentangled transformer module, optimized by a mutual information loss to 1) decouple modality-specific and modality-shared information and 2) extract useful joint representation from the noise and redundancy present in clinical notes. Through comprehensive validation on the public MIMIC-III dataset and the in-house FEMH dataset, MEDFuse demonstrates great potential in advancing clinical predictions, achieving over 90% F1 score in the 10-disease multi-label classification task.
△ Less
Submitted 17 July, 2024;
originally announced July 2024.
-
A practical approach to calculating magnetic Johnson noise for precision measurements
Authors:
N. S. Phan,
S. M. Clayton,
Y. J. Kim,
T. M. Ito
Abstract:
Magnetic Johnson noise is an important consideration for many applications involving precision magnetometry, and its significance will only increase in the future with improvements in measurement sensitivity. The fluctuation-dissipation theorem can be utilized to derive analytic expressions for magnetic Johnson noise in certain situations. But when used in conjunction with finite element analysis…
▽ More
Magnetic Johnson noise is an important consideration for many applications involving precision magnetometry, and its significance will only increase in the future with improvements in measurement sensitivity. The fluctuation-dissipation theorem can be utilized to derive analytic expressions for magnetic Johnson noise in certain situations. But when used in conjunction with finite element analysis tools, the combined approach is particularly powerful as it provides a practical means to calculate the magnetic Johnson noise arising from conductors of arbitrary geometry and permeability. In this paper, we demonstrate this method to be one of the most comprehensive approaches presently available to calculate thermal magnetic noise. In particular, its applicability is shown to not be limited to cases where the noise is evaluated at a point in space but also can be expanded to include cases where the magnetic field detector has a more general shape, such as a finite size loop, a gradiometer, or a detector that consists of a polarized atomic species trapped in a volume. Furthermore, some physics insights gained through studies made using this method are discussed
△ Less
Submitted 13 September, 2024; v1 submitted 15 July, 2024;
originally announced July 2024.
-
Analytical exciton energies in monolayer transition-metal dichalcogenides
Authors:
Hanh T. Dinh,
Ngoc-Hung Phan,
Duy-Nhat Ly,
Dai-Nam Le,
Ngoc-Tram D. Hoang,
Nhat-Quang Nguyen,
Phuoc-Thien Doan,
Van-Hoang Le
Abstract:
We derive an analytical expression for $s$-state exciton energies in monolayer transition-metal dichalcogenides (TMDCs): $E_{\text{ns}}=-{\text{Ry}}^*\times P_n/{(n-1/2+0.479\, r^*_0/κ)^2}$, $n=1,2,...$, where $r^*_0$ and $κ$ are the dimensionless screening length and dielectric constant of the surrounding medium; $\text{Ry}^*$ is an effective Rydberg energy scaled by the dielectric constant and e…
▽ More
We derive an analytical expression for $s$-state exciton energies in monolayer transition-metal dichalcogenides (TMDCs): $E_{\text{ns}}=-{\text{Ry}}^*\times P_n/{(n-1/2+0.479\, r^*_0/κ)^2}$, $n=1,2,...$, where $r^*_0$ and $κ$ are the dimensionless screening length and dielectric constant of the surrounding medium; $\text{Ry}^*$ is an effective Rydberg energy scaled by the dielectric constant and exciton reduced mass; $P_n(r^*_0/κ)$ is a function of variables $n$ and $r^*_0/κ$. Its values are around 1.0 so we consider it a term that corrects the Rydberg energy. Despite the simple form, the suggested formula gives exciton energies with high precision compared to the exact numerical solutions that accurately describe recent experimental data for a large class of TMDC materials, including WSe$_2$, WS$_2$, MoSe$_2$, MoS$_2$, and MoTe$_2$. To achieve these results, we have developed a so-called regulated perturbation theory by combining the conventional perturbation method with several elements of the Feranchuk-Komarov operator method, including the Levi-Civita transformation, the algebraic calculation technique via the annihilation and creation operators, and the introduction of a free parameter to optimize the convergence rate of the perturbation series. This universal form of exciton energies could be helpful in various physical analyses, including retrieval of the material parameters such as reduced exciton mass and screening length from the available measured exciton energies.
△ Less
Submitted 6 July, 2024; v1 submitted 1 July, 2024;
originally announced July 2024.
-
Laser-target symmetry-breaking in high harmonic generation: from frequency shift to odd-even intensity modulation
Authors:
Doan-An Trieu,
Van-Hoang Le,
Ngoc-Loan Phan
Abstract:
Although the frequency shift and odd-even intensity modulation in high-order harmonic generation (HHG) have both been observed for asymmetric laser-target systems, they are typically studied as two separate phenomena. In this Letter, we provide a comprehensive picture of these two nonlinear optical phenomena, unifying them through a common origin - asymmetry of the laser-target system. By tuning a…
▽ More
Although the frequency shift and odd-even intensity modulation in high-order harmonic generation (HHG) have both been observed for asymmetric laser-target systems, they are typically studied as two separate phenomena. In this Letter, we provide a comprehensive picture of these two nonlinear optical phenomena, unifying them through a common origin - asymmetry of the laser-target system. By tuning asymmetric laser-target systems, we discover a transition from the harmonic frequency shift to the odd-even intensity modulation upon increasing the duration of the driving laser pulse. Specifically, these phenomena are observed simultaneously for laser pulses with intermediate pulse duration. For numerical evidence, we solve the time-dependent Schrödinger equation, while insight into the underlying physics is obtained from a simplified analytically tractable model. Understanding the asymmetric characteristics reflected in the HHG as provided is crucial for retrieving laser-target information, sampling external fields, and probing molecular dynamics.
△ Less
Submitted 12 June, 2024;
originally announced June 2024.
-
Analytically controlling laser-induced electron phase in sub-cycle motion
Authors:
Doan-An Trieu,
Trong-Thanh D. Nguyen,
Thanh-Duy D. Nguyen,
Thanh Tran,
Van-Hoang Le,
Ngoc-Loan Phan
Abstract:
Precise control of the electron phase accumulated during its sub-cycle motion within intense laser fields is essential in strong-field physics, yet remains mostly indirect and complicated so far. In this Letter, we develop a novel approach to control this sub-cycle electron phase by tuning a low-frequency electric field applied on a centrosymmetric gaseous target during its interaction with a few-…
▽ More
Precise control of the electron phase accumulated during its sub-cycle motion within intense laser fields is essential in strong-field physics, yet remains mostly indirect and complicated so far. In this Letter, we develop a novel approach to control this sub-cycle electron phase by tuning a low-frequency electric field applied on a centrosymmetric gaseous target during its interaction with a few-cycle infrared laser pulse. Our method is based on a universal analytical relation between the low-frequency electric field and its induced harmonic frequency shift, derived by the strong-field approximation. This simple relation and its universality are confirmed numerically by directly solving the time-dependent Schrödinger equation. Moreover, we discuss the benefits of the discovered relation in \textit{in situ} applications, including continuously and precisely tuning XUV waves and developing a new method of comprehensively sampling THz pulse.
△ Less
Submitted 19 May, 2024;
originally announced May 2024.
-
Deep Neural Operator Enabled Digital Twin Modeling for Additive Manufacturing
Authors:
Ning Liu,
Xuxiao Li,
Manoj R. Rajanna,
Edward W. Reutzel,
Brady Sawyer,
Prahalada Rao,
Jim Lua,
Nam Phan,
Yue Yu
Abstract:
A digital twin (DT), with the components of a physics-based model, a data-driven model, and a machine learning (ML) enabled efficient surrogate, behaves as a virtual twin of the real-world physical process. In terms of Laser Powder Bed Fusion (L-PBF) based additive manufacturing (AM), a DT can predict the current and future states of the melt pool and the resulting defects corresponding to the inp…
▽ More
A digital twin (DT), with the components of a physics-based model, a data-driven model, and a machine learning (ML) enabled efficient surrogate, behaves as a virtual twin of the real-world physical process. In terms of Laser Powder Bed Fusion (L-PBF) based additive manufacturing (AM), a DT can predict the current and future states of the melt pool and the resulting defects corresponding to the input laser parameters, evolve itself by assimilating in-situ sensor data, and optimize the laser parameters to mitigate defect formation. In this paper, we present a deep neural operator enabled computational framework of the DT for closed-loop feedback control of the L-PBF process. This is accomplished by building a high-fidelity computational model to accurately represent the melt pool states, an efficient surrogate model to approximate the melt pool solution field, followed by an physics-based procedure to extract information from the computed melt pool simulation that can further be correlated to the defect quantities of interest (e.g., surface roughness). In particular, we leverage the data generated from the high-fidelity physics-based model and train a series of Fourier neural operator (FNO) based ML models to effectively learn the relation between the input laser parameters and the corresponding full temperature field of the melt pool. Subsequently, a set of physics-informed variables such as the melt pool dimensions and the peak temperature can be extracted to compute the resulting defects. An optimization algorithm is then exercised to control laser input and minimize defects. On the other hand, the constructed DT can also evolve with the physical twin via offline finetuning and online material calibration. Finally, a probabilistic framework is adopted for uncertainty quantification. The developed DT is envisioned to guide the AM process and facilitate high-quality manufacturing.
△ Less
Submitted 12 May, 2024;
originally announced May 2024.
-
RepoHyper: Search-Expand-Refine on Semantic Graphs for Repository-Level Code Completion
Authors:
Huy N. Phan,
Hoang N. Phan,
Tien N. Nguyen,
Nghi D. Q. Bui
Abstract:
Code Large Language Models (CodeLLMs) have demonstrated impressive proficiency in code completion tasks. However, they often fall short of fully understanding the extensive context of a project repository, such as the intricacies of relevant files and class hierarchies, which can result in less precise completions. To overcome these limitations, we present \tool, a multifaceted framework designed…
▽ More
Code Large Language Models (CodeLLMs) have demonstrated impressive proficiency in code completion tasks. However, they often fall short of fully understanding the extensive context of a project repository, such as the intricacies of relevant files and class hierarchies, which can result in less precise completions. To overcome these limitations, we present \tool, a multifaceted framework designed to address the complex challenges associated with repository-level code completion. Central to RepoHYPER is the {\em Repo-level Semantic Graph} (RSG), a novel semantic graph structure that encapsulates the vast context of code repositories. Furthermore, RepoHyper leverages Expand and Refine retrieval method, including a graph expansion and a link prediction algorithm applied to the RSG, enabling the effective retrieval and prioritization of relevant code snippets. Our evaluations show that \tool markedly outperforms existing techniques in repository-level code completion, showcasing enhanced accuracy across various datasets when compared to several strong baselines. Our implementation of RepoHYPER can be found at https://github.com/FSoft-AI4Code/RepoHyper.
△ Less
Submitted 14 August, 2024; v1 submitted 10 March, 2024;
originally announced March 2024.
-
Nanosecond stochastic operation in perpendicular superparamagnetic tunnel junctions
Authors:
Lucile Soumah,
Louise Desplat,
Nhat-Tan Phan,
Ahmed Sidi El Valli,
Advait Madhavan,
Florian Disdier,
Stéphane Auffret,
Ricardo Sousa,
Ursula Ebels,
Philippe Talatchian
Abstract:
We demonstrate the miniaturization of perpendicularly magnetized superparamagnetic tunnel junctions (SMTJs) down to 50 nm in diameter. We experimentally show stochastic reversals in those junctions, with tunable mean dwell times down to a few nanoseconds through applied magnetic field and voltage. The mean dwell times measured at negligible bias voltage agree with our simulations based on Langer's…
▽ More
We demonstrate the miniaturization of perpendicularly magnetized superparamagnetic tunnel junctions (SMTJs) down to 50 nm in diameter. We experimentally show stochastic reversals in those junctions, with tunable mean dwell times down to a few nanoseconds through applied magnetic field and voltage. The mean dwell times measured at negligible bias voltage agree with our simulations based on Langer's theory. We shed light on an Arrhenius prefactor $τ_0$ of a few femtoseconds, implying that the rates of thermally-activated magnetic transitions exceed the GHz-to-THz limitation of macrospin models, whereby $τ_0\sim1$ ns. We explain the small prefactor values by a Meyer-Neldel compensation phenomenon, where the prefactor exhibits a large entropic contribution with an exponential dependence on the activation energy. These findings pave the way towards the development of ultrafast, low-power unconventional computing schemes operating by leveraging thermal noise in perpendicular SMTJs, which are scalable below 20 nm.
△ Less
Submitted 5 February, 2024;
originally announced February 2024.
-
Solution uniqueness of convex optimization problems via the radial cone
Authors:
Jalal Fadili,
Tran T. A. Nghia,
Duy Nhat Phan
Abstract:
In this paper, we mainly study solution uniqueness of some convex optimization problems. Our characterizations of solution uniqueness are in terms of the radial cone. This approach allows us to know when a unique solution is a strong solution or even a tilt-stable one without checking second-order information. Consequently, we apply our theory to low-rank optimization problems. The radial cone is…
▽ More
In this paper, we mainly study solution uniqueness of some convex optimization problems. Our characterizations of solution uniqueness are in terms of the radial cone. This approach allows us to know when a unique solution is a strong solution or even a tilt-stable one without checking second-order information. Consequently, we apply our theory to low-rank optimization problems. The radial cone is fully calculated in this case and numerical experiments show that our characterizations are sharp.
△ Less
Submitted 18 January, 2024;
originally announced January 2024.
-
Unbiased Random Number Generation using Injection-Locked Spin-Torque Nano-Oscillators
Authors:
Nhat-Tan Phan,
Nitin Prasad,
Abderrazak Hakam,
Ahmed Sidi El Valli,
Lorena Anghel,
Luana Benetti,
Advait Madhavan,
Alex S. Jenkins,
Ricardo Ferreira,
Mark D. Stiles,
Ursula Ebels,
Philippe Talatchian
Abstract:
Unbiased sources of true randomness are critical for the successful deployment of stochastic unconventional computing schemes and encryption applications in hardware. Leveraging nanoscale thermal magnetization fluctuations provides an efficient and almost cost-free means of generating truly random bitstreams, distinguishing them from predictable pseudo-random sequences. However, existing approache…
▽ More
Unbiased sources of true randomness are critical for the successful deployment of stochastic unconventional computing schemes and encryption applications in hardware. Leveraging nanoscale thermal magnetization fluctuations provides an efficient and almost cost-free means of generating truly random bitstreams, distinguishing them from predictable pseudo-random sequences. However, existing approaches that aim to achieve randomness often suffer from bias, leading to significant deviations from equal fractions of 0 and 1 in the bitstreams and compromising their inherent unpredictability. This study presents a hardware approach that capitalizes on the intrinsic balance of phase noise in an oscillator injection locked at twice its natural frequency, leveraging the stability of this naturally balanced physical system. We demonstrate the successful generation of unbiased and truly random bitstreams through extensive experimentation. Our numerical simulations exhibit excellent agreement with the experimental results, confirming the robustness and viability of our approach.
△ Less
Submitted 20 November, 2023;
originally announced November 2023.
-
On the Out of Distribution Robustness of Foundation Models in Medical Image Segmentation
Authors:
Duy Minh Ho Nguyen,
Tan Ngoc Pham,
Nghiem Tuong Diep,
Nghi Quoc Phan,
Quang Pham,
Vinh Tong,
Binh T. Nguyen,
Ngan Hoang Le,
Nhat Ho,
Pengtao Xie,
Daniel Sonntag,
Mathias Niepert
Abstract:
Constructing a robust model that can effectively generalize to test samples under distribution shifts remains a significant challenge in the field of medical imaging. The foundational models for vision and language, pre-trained on extensive sets of natural image and text data, have emerged as a promising approach. It showcases impressive learning abilities across different tasks with the need for…
▽ More
Constructing a robust model that can effectively generalize to test samples under distribution shifts remains a significant challenge in the field of medical imaging. The foundational models for vision and language, pre-trained on extensive sets of natural image and text data, have emerged as a promising approach. It showcases impressive learning abilities across different tasks with the need for only a limited amount of annotated samples. While numerous techniques have focused on developing better fine-tuning strategies to adapt these models for specific domains, we instead examine their robustness to domain shifts in the medical image segmentation task. To this end, we compare the generalization performance to unseen domains of various pre-trained models after being fine-tuned on the same in-distribution dataset and show that foundation-based models enjoy better robustness than other architectures. From here, we further developed a new Bayesian uncertainty estimation for frozen models and used them as an indicator to characterize the model's performance on out-of-distribution (OOD) data, proving particularly beneficial for real-world applications. Our experiments not only reveal the limitations of current indicators like accuracy on the line or agreement on the line commonly used in natural image applications but also emphasize the promise of the introduced Bayesian uncertainty. Specifically, lower uncertainty predictions usually tend to higher out-of-distribution (OOD) performance.
△ Less
Submitted 18 November, 2023;
originally announced November 2023.
-
Mixed Mode Oscillations in a Three-Timescale Coupled Morris-Lecar System
Authors:
Ngoc Anh Phan,
Yangyang Wang
Abstract:
Mixed mode oscillations (MMOs) are complex oscillatory behaviors of multiple-timescale dynamical systems in which there is an alternation of large-amplitude and small-amplitude oscillations. It is well known that MMOs in two-timescale systems can arise either from a canard mechanism associated with folded node singularities or a delayed Andronov-Hopf bifurcation (DHB) of the fast subsystem. While…
▽ More
Mixed mode oscillations (MMOs) are complex oscillatory behaviors of multiple-timescale dynamical systems in which there is an alternation of large-amplitude and small-amplitude oscillations. It is well known that MMOs in two-timescale systems can arise either from a canard mechanism associated with folded node singularities or a delayed Andronov-Hopf bifurcation (DHB) of the fast subsystem. While MMOs in two-timescale systems have been extensively studied, less is known regarding MMOs emerging in three-timescale systems. In this work, we examine the mechanisms of MMOs in coupled Morris-Lecar neurons with three distinct timescales. We investigate two kinds of MMOs occurring in the presence of a singularity known as canard-delayed-Hopf (CDH) and in cases where CDH is absent. In both cases, we examine how features and mechanisms of MMOs vary with respect to variations in timescales. Our analysis reveals that MMOs supported by CDH demonstrate significantly stronger robustness than those in its absence. Moreover, we show that the mere presence of CDH does not guarantee the occurrence of MMOs. This work yields important insights into conditions under which the two separate mechanisms in two-timescale context, canard and DHB, can interact in a three-timescale setting and produce more robust MMOs, particularly against timescale variations.
△ Less
Submitted 28 February, 2024; v1 submitted 16 October, 2023;
originally announced October 2023.
-
Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection
Authors:
Mahmoud Nazzal,
Issa Khalil,
Abdallah Khreishah,
NhatHai Phan,
Yao Ma
Abstract:
Malicious domain detection (MDD) is an open security challenge that aims to detect if an Internet domain is associated with cyber-attacks. Among many approaches to this problem, graph neural networks (GNNs) are deemed highly effective. GNN-based MDD uses DNS logs to represent Internet domains as nodes in a maliciousness graph (DMG) and trains a GNN to infer their maliciousness by leveraging identi…
▽ More
Malicious domain detection (MDD) is an open security challenge that aims to detect if an Internet domain is associated with cyber-attacks. Among many approaches to this problem, graph neural networks (GNNs) are deemed highly effective. GNN-based MDD uses DNS logs to represent Internet domains as nodes in a maliciousness graph (DMG) and trains a GNN to infer their maliciousness by leveraging identified malicious domains. Since this method relies on accessible DNS logs to construct DMGs, it exposes a vulnerability for adversaries to manipulate their domain nodes' features and connections within DMGs. Existing research mainly concentrates on threat models that manipulate individual attacker nodes. However, adversaries commonly generate multiple domains to achieve their goals economically and avoid detection. Their objective is to evade discovery across as many domains as feasible. In this work, we call the attack that manipulates several nodes in the DMG concurrently a multi-instance evasion attack. We present theoretical and empirical evidence that the existing single-instance evasion techniques for are inadequate to launch multi-instance evasion attacks against GNN-based MDDs. Therefore, we introduce MintA, an inference-time multi-instance adversarial attack on GNN-based MDDs. MintA enhances node and neighborhood evasiveness through optimized perturbations and operates successfully with only black-box access to the target model, eliminating the need for knowledge about the model's specifics or non-adversary nodes. We formulate an optimization challenge for MintA, achieving an approximate solution. Evaluating MintA on a leading GNN-based MDD technique with real-world data showcases an attack success rate exceeding 80%. These findings act as a warning for security experts, underscoring GNN-based MDDs' susceptibility to practical attacks that can undermine their effectiveness and benefits.
△ Less
Submitted 22 August, 2023;
originally announced August 2023.
-
Geometric characterizations for strong minima with applications to nuclear norm minimization problems
Authors:
Jalal Fadili,
Tran T. A. Nghia,
Duy Nhat Phan
Abstract:
In this paper, we introduce several geometric characterizations for strong minima of optimization problems. Applying these results to nuclear norm minimization problems allows us to obtain new necessary and sufficient quantitative conditions for this important property. Our characterizations for strong minima are weaker than the Restricted Injectivity and Nondegenerate Source Condition, which are…
▽ More
In this paper, we introduce several geometric characterizations for strong minima of optimization problems. Applying these results to nuclear norm minimization problems allows us to obtain new necessary and sufficient quantitative conditions for this important property. Our characterizations for strong minima are weaker than the Restricted Injectivity and Nondegenerate Source Condition, which are usually used to identify solution uniqueness of nuclear norm minimization problems. Consequently, we obtain the minimum (tight) bound on the number of measurements for (strong) exact recovery of low-rank matrices.
△ Less
Submitted 17 August, 2023;
originally announced August 2023.
-
Learning in Cooperative Multiagent Systems Using Cognitive and Machine Models
Authors:
Thuy Ngoc Nguyen,
Duy Nhat Phan,
Cleotilde Gonzalez
Abstract:
Developing effective Multi-Agent Systems (MAS) is critical for many applications requiring collaboration and coordination with humans. Despite the rapid advance of Multi-Agent Deep Reinforcement Learning (MADRL) in cooperative MAS, one major challenge is the simultaneous learning and interaction of independent agents in dynamic environments in the presence of stochastic rewards. State-of-the-art M…
▽ More
Developing effective Multi-Agent Systems (MAS) is critical for many applications requiring collaboration and coordination with humans. Despite the rapid advance of Multi-Agent Deep Reinforcement Learning (MADRL) in cooperative MAS, one major challenge is the simultaneous learning and interaction of independent agents in dynamic environments in the presence of stochastic rewards. State-of-the-art MADRL models struggle to perform well in Coordinated Multi-agent Object Transportation Problems (CMOTPs), wherein agents must coordinate with each other and learn from stochastic rewards. In contrast, humans often learn rapidly to adapt to nonstationary environments that require coordination among people. In this paper, motivated by the demonstrated ability of cognitive models based on Instance-Based Learning Theory (IBLT) to capture human decisions in many dynamic decision making tasks, we propose three variants of Multi-Agent IBL models (MAIBL). The idea of these MAIBL algorithms is to combine the cognitive mechanisms of IBLT and the techniques of MADRL models to deal with coordination MAS in stochastic environments from the perspective of independent learners. We demonstrate that the MAIBL models exhibit faster learning and achieve better coordination in a dynamic CMOTP task with various settings of stochastic rewards compared to current MADRL models. We discuss the benefits of integrating cognitive insights into MADRL models.
△ Less
Submitted 17 August, 2023;
originally announced August 2023.
-
Fundamental Neutron Physics: a White Paper on Progress and Prospects in the US
Authors:
R. Alarcon,
A. Aleksandrova,
S. Baeßler,
D. H. Beck,
T. Bhattacharya,
M. Blatnik,
T. J. Bowles,
J. D. Bowman,
J. Brewington,
L. J. Broussard,
A. Bryant,
J. F. Burdine,
J. Caylor,
Y. Chen,
J. H. Choi,
L. Christie,
T. E. Chupp,
V. Cianciolo,
V. Cirigliano,
S. M. Clayton,
B. Collett,
C. Crawford,
W. Dekens,
M. Demarteau,
D. DeMille
, et al. (66 additional authors not shown)
Abstract:
Fundamental neutron physics, combining precision measurements and theory, probes particle physics at short range with reach well beyond the highest energies probed by the LHC. Significant US efforts are underway that will probe BSM CP violation with orders of magnitude more sensitivity, provide new data on the Cabibbo anomaly, more precisely measure the neutron lifetime and decay, and explore hadr…
▽ More
Fundamental neutron physics, combining precision measurements and theory, probes particle physics at short range with reach well beyond the highest energies probed by the LHC. Significant US efforts are underway that will probe BSM CP violation with orders of magnitude more sensitivity, provide new data on the Cabibbo anomaly, more precisely measure the neutron lifetime and decay, and explore hadronic parity violation. World-leading results from the US Fundamental Neutron Physics community since the last Long Range Plan, include the world's most precise measurement of the neutron lifetime from UCN$τ$, the final results on the beta-asymmetry from UCNA and new results on hadronic parity violation from the NPDGamma and n-${^3}$He runs at the FNPB (Fundamental Neutron Physics Beamline), precision measurement of the radiative neutron decay mode and n-${}^4$He at NIST. US leadership and discovery potential are ensured by the development of new high-impact experiments including BL3, Nab, LANL nEDM and nEDM@SNS. On the theory side, the last few years have seen results for the neutron EDM from the QCD $θ$ term, a factor of two reduction in the uncertainty for inner radiative corrections in beta-decay which impacts CKM unitarity, and progress on {\it ab initio} calculations of nuclear structure for medium-mass and heavy nuclei which can eventually improve the connection between nuclear and nucleon EDMs. In order to maintain this exciting program and capitalize on past investments while also pursuing new ideas and building US leadership in new areas, the Fundamental Neutron Physics community has identified a number of priorities and opportunities for our sub-field covering the time-frame of the last Long Range Plan (LRP) under development. This white paper elaborates on these priorities.
△ Less
Submitted 17 August, 2023;
originally announced August 2023.
-
FairDP: Certified Fairness with Differential Privacy
Authors:
Khang Tran,
Ferdinando Fioretto,
Issa Khalil,
My T. Thai,
NhatHai Phan
Abstract:
This paper introduces FairDP, a novel mechanism designed to achieve certified fairness with differential privacy (DP). FairDP independently trains models for distinct individual groups, using group-specific clipping terms to assess and bound the disparate impacts of DP. Throughout the training process, the mechanism progressively integrates knowledge from group models to formulate a comprehensive…
▽ More
This paper introduces FairDP, a novel mechanism designed to achieve certified fairness with differential privacy (DP). FairDP independently trains models for distinct individual groups, using group-specific clipping terms to assess and bound the disparate impacts of DP. Throughout the training process, the mechanism progressively integrates knowledge from group models to formulate a comprehensive model that balances privacy, utility, and fairness in downstream tasks. Extensive theoretical and empirical analyses validate the efficacy of FairDP and improved trade-offs between model utility, privacy, and fairness compared with existing methods.
△ Less
Submitted 21 August, 2023; v1 submitted 25 May, 2023;
originally announced May 2023.
-
ViMQ: A Vietnamese Medical Question Dataset for Healthcare Dialogue System Development
Authors:
Ta Duc Huy,
Nguyen Anh Tu,
Tran Hoang Vu,
Nguyen Phuc Minh,
Nguyen Phan,
Trung H. Bui,
Steven Q. H. Truong
Abstract:
Existing medical text datasets usually take the form of question and answer pairs that support the task of natural language generation, but lacking the composite annotations of the medical terms. In this study, we publish a Vietnamese dataset of medical questions from patients with sentence-level and entity-level annotations for the Intent Classification and Named Entity Recognition tasks. The tag…
▽ More
Existing medical text datasets usually take the form of question and answer pairs that support the task of natural language generation, but lacking the composite annotations of the medical terms. In this study, we publish a Vietnamese dataset of medical questions from patients with sentence-level and entity-level annotations for the Intent Classification and Named Entity Recognition tasks. The tag sets for two tasks are in medical domain and can facilitate the development of task-oriented healthcare chatbots with better comprehension of queries from patients. We train baseline models for the two tasks and propose a simple self-supervised training strategy with span-noise modelling that substantially improves the performance. Dataset and code will be published at https://github.com/tadeephuy/ViMQ
△ Less
Submitted 27 April, 2023;
originally announced April 2023.
-
Retrieval of material properties of monolayer transition-metal dichalcogenides from magnetoexciton energy spectra
Authors:
Duy-Nhat Ly,
Dai-Nam Le,
Duy-Anh P. Nguyen,
Ngoc-Tram D. Hoang,
Ngoc-Hung Phan,
Hoang-Minh L. Nguyen,
Van-Hoang Le
Abstract:
Reduced exciton mass, polarizability, and dielectric constant of the surrounding medium are essential properties for semiconducting materials, and they have been extracted recently from the magnetoexciton energies. However, the acceptable accuracy of the suggested method requires very high magnetic intensity. Therefore, in the present paper, we propose an alternative method of extracting these mat…
▽ More
Reduced exciton mass, polarizability, and dielectric constant of the surrounding medium are essential properties for semiconducting materials, and they have been extracted recently from the magnetoexciton energies. However, the acceptable accuracy of the suggested method requires very high magnetic intensity. Therefore, in the present paper, we propose an alternative method of extracting these material properties from recently available experimental magnetoexciton s-state energies in monolayer transition-metal dichalcogenides (TMDCs). The method is based on the high sensitivity of exciton energies to the material parameters in the Rytova-Keldysh model. It allows us to vary the considered material parameters to get the best fit of the theoretical calculation to the experimental exciton energies for the $1s$, $2s$, and $3s$ states. This procedure gives values of the exciton reduced mass and $2D$ polarizability. Then, the experimental magnetoexciton spectra compared to the theoretical calculation also determine the average dielectric constant. Concrete applications are presented only for monolayers WSe$_2$ and WS$_2$ from the recently available experimental data; however, the presented approach is universal and can be applied to other monolayer TMDCs. The mentioned fitting procedure requires a fast and effective method of solving the Schrödinger equation of an exciton in monolayer TMDCs with a magnetic field. Therefore, we also develop such a method in this paper for highly accurate magnetoexciton energies.
△ Less
Submitted 24 April, 2023; v1 submitted 14 March, 2023;
originally announced March 2023.
-
Zone-based Federated Learning for Mobile Sensing Data
Authors:
Xiaopeng Jiang,
Thinh On,
NhatHai Phan,
Hessamaldin Mohammadi,
Vijaya Datta Mayyuri,
An Chen,
Ruoming Jin,
Cristian Borcea
Abstract:
Mobile apps, such as mHealth and wellness applications, can benefit from deep learning (DL) models trained with mobile sensing data collected by smart phones or wearable devices. However, currently there is no mobile sensing DL system that simultaneously achieves good model accuracy while adapting to user mobility behavior, scales well as the number of users increases, and protects user data priva…
▽ More
Mobile apps, such as mHealth and wellness applications, can benefit from deep learning (DL) models trained with mobile sensing data collected by smart phones or wearable devices. However, currently there is no mobile sensing DL system that simultaneously achieves good model accuracy while adapting to user mobility behavior, scales well as the number of users increases, and protects user data privacy. We propose Zone-based Federated Learning (ZoneFL) to address these requirements. ZoneFL divides the physical space into geographical zones mapped to a mobile-edge-cloud system architecture for good model accuracy and scalability. Each zone has a federated training model, called a zone model, which adapts well to data and behaviors of users in that zone. Benefiting from the FL design, the user data privacy is protected during the ZoneFL training. We propose two novel zone-based federated training algorithms to optimize zone models to user mobility behavior: Zone Merge and Split (ZMS) and Zone Gradient Diffusion (ZGD). ZMS optimizes zone models by adapting the zone geographical partitions through merging of neighboring zones or splitting of large zones into smaller ones. Different from ZMS, ZGD maintains fixed zones and optimizes a zone model by incorporating the gradients derived from neighboring zones' data. ZGD uses a self-attention mechanism to dynamically control the impact of one zone on its neighbors. Extensive analysis and experimental results demonstrate that ZoneFL significantly outperforms traditional FL in two models for heart rate prediction and human activity recognition. In addition, we developed a ZoneFL system using Android phones and AWS cloud. The system was used in a heart rate prediction field study with 63 users for 4 months, and we demonstrated the feasibility of ZoneFL in real-life.
△ Less
Submitted 10 March, 2023;
originally announced March 2023.
-
Active Membership Inference Attack under Local Differential Privacy in Federated Learning
Authors:
Truc Nguyen,
Phung Lai,
Khang Tran,
NhatHai Phan,
My T. Thai
Abstract:
Federated learning (FL) was originally regarded as a framework for collaborative learning among clients with data privacy protection through a coordinating server. In this paper, we propose a new active membership inference (AMI) attack carried out by a dishonest server in FL. In AMI attacks, the server crafts and embeds malicious parameters into global models to effectively infer whether a target…
▽ More
Federated learning (FL) was originally regarded as a framework for collaborative learning among clients with data privacy protection through a coordinating server. In this paper, we propose a new active membership inference (AMI) attack carried out by a dishonest server in FL. In AMI attacks, the server crafts and embeds malicious parameters into global models to effectively infer whether a target data sample is included in a client's private training data or not. By exploiting the correlation among data features through a non-linear decision boundary, AMI attacks with a certified guarantee of success can achieve severely high success rates under rigorous local differential privacy (LDP) protection; thereby exposing clients' training data to significant privacy risk. Theoretical and experimental results on several benchmark datasets show that adding sufficient privacy-preserving noise to prevent our attack would significantly damage FL's model utility.
△ Less
Submitted 24 July, 2023; v1 submitted 24 February, 2023;
originally announced February 2023.
-
Fe$_{1+y}$Te$_{x}$Se$_{1-x}$: a delicate and tunable Majorana material
Authors:
Fazhi Yang,
Giao Ngoc Phan,
Renjie Zhang,
Jin Zhao,
Jiajun Li,
Zouyouwei Lu,
John Schneeloch,
Ruidan Zhong,
Mingwei Ma,
Genda Gu,
Xiaoli Dong,
Tian Qian,
Hong Ding
Abstract:
We report the observation for the p$_{z}$ electron band and the band inversion in Fe$_{1+y}$Te$_{x}$Se$_{1-x}$ with angle-resolved photoemission spectroscopy. Furthermore, we found that excess Fe (y>0) inhibits the topological band inversion in Fe$_{1+y}$Te$_{x}$Se$_{1-x}$, which explains the absence of Majorana zero modes in previous reports for Fe$_{1+y}$Te$_{x}$Se$_{1-x}$ with excess Fe. Based…
▽ More
We report the observation for the p$_{z}$ electron band and the band inversion in Fe$_{1+y}$Te$_{x}$Se$_{1-x}$ with angle-resolved photoemission spectroscopy. Furthermore, we found that excess Fe (y>0) inhibits the topological band inversion in Fe$_{1+y}$Te$_{x}$Se$_{1-x}$, which explains the absence of Majorana zero modes in previous reports for Fe$_{1+y}$Te$_{x}$Se$_{1-x}$ with excess Fe. Based on our analysis of different amounts of Te doping and excess Fe, we propose a delicate topological phase in this material. Thanks to this delicate phase, one may be able to tune the topological transition via applying lattice strain or carrier doping.
△ Less
Submitted 20 February, 2023;
originally announced February 2023.
-
Conditional expectation with regularization for missing data imputation
Authors:
Mai Anh Vu,
Thu Nguyen,
Tu T. Do,
Nhan Phan,
Nitesh V. Chawla,
Pål Halvorsen,
Michael A. Riegler,
Binh T. Nguyen
Abstract:
Missing data frequently occurs in datasets across various domains, such as medicine, sports, and finance. In many cases, to enable proper and reliable analyses of such data, the missing values are often imputed, and it is necessary that the method used has a low root mean square error (RMSE) between the imputed and the true values. In addition, for some critical applications, it is also often a re…
▽ More
Missing data frequently occurs in datasets across various domains, such as medicine, sports, and finance. In many cases, to enable proper and reliable analyses of such data, the missing values are often imputed, and it is necessary that the method used has a low root mean square error (RMSE) between the imputed and the true values. In addition, for some critical applications, it is also often a requirement that the imputation method is scalable and the logic behind the imputation is explainable, which is especially difficult for complex methods that are, for example, based on deep learning. Based on these considerations, we propose a new algorithm named "conditional Distribution-based Imputation of Missing Values with Regularization" (DIMV). DIMV operates by determining the conditional distribution of a feature that has missing entries, using the information from the fully observed features as a basis. As will be illustrated via experiments in the paper, DIMV (i) gives a low RMSE for the imputed values compared to state-of-the-art methods; (ii) fast and scalable; (iii) is explainable as coefficients in a regression model, allowing reliable and trustable analysis, makes it a suitable choice for critical domains where understanding is important such as in medical fields, finance, etc; (iv) can provide an approximated confidence region for the missing values in a given sample; (v) suitable for both small and large scale data; (vi) in many scenarios, does not require a huge number of parameters as deep learning approaches; (vii) handle multicollinearity in imputation effectively; and (viii) is robust to the normally distributed assumption that its theoretical grounds rely on.
△ Less
Submitted 11 September, 2023; v1 submitted 2 February, 2023;
originally announced February 2023.
-
Rig Inversion by Training a Differentiable Rig Function
Authors:
Mathieu Marquis Bolduc,
Hau Nghiep Phan
Abstract:
Rig inversion is the problem of creating a method that can find the rig parameter vector that best approximates a given input mesh. In this paper we propose to solve this problem by first obtaining a differentiable rig function by training a multi layer perceptron to approximate the rig function. This differentiable rig function can then be used to train a deep learning model of rig inversion.
Rig inversion is the problem of creating a method that can find the rig parameter vector that best approximates a given input mesh. In this paper we propose to solve this problem by first obtaining a differentiable rig function by training a multi layer perceptron to approximate the rig function. This differentiable rig function can then be used to train a deep learning model of rig inversion.
△ Less
Submitted 11 January, 2023;
originally announced January 2023.
-
Universality in odd-even harmonic generation and application in terahertz waveform sampling
Authors:
Doan-An Trieu,
Ngoc-Loan Phan,
Quan-Hao Truong,
Hien T. Nguyen,
Cam-Tu Le,
DinhDuy Vu,
Van-Hoang Le
Abstract:
Odd-even harmonics emitted from a laser-target system imprint rich, subtle information characterizing the system's dynamical asymmetry, which is desirable to decipher. In this Letter, we discover a simple universal relation between the odd-even harmonics and the asymmetry of the THz-assisted laser-atomic system -- atoms in a fundamental mid-IR laser pulse combined with a THz laser. First, we demon…
▽ More
Odd-even harmonics emitted from a laser-target system imprint rich, subtle information characterizing the system's dynamical asymmetry, which is desirable to decipher. In this Letter, we discover a simple universal relation between the odd-even harmonics and the asymmetry of the THz-assisted laser-atomic system -- atoms in a fundamental mid-IR laser pulse combined with a THz laser. First, we demonstrate numerically and then analytically formulize the harmonic even-to-odd ratio as a function of the THz electric field, the source of the system's asymmetry. Notably, we suggest a scaling that makes the obtained rule universal, independent of the parameters of both the fundamental pulse and atomic target. This universality facilitates us to propose a general pump-probe scheme for THz waveform sampling from the even-to-odd ratio, measurable within a conventional compact setup.
△ Less
Submitted 16 January, 2023; v1 submitted 7 January, 2023;
originally announced January 2023.
-
XRand: Differentially Private Defense against Explanation-Guided Attacks
Authors:
Truc Nguyen,
Phung Lai,
NhatHai Phan,
My T. Thai
Abstract:
Recent development in the field of explainable artificial intelligence (XAI) has helped improve trust in Machine-Learning-as-a-Service (MLaaS) systems, in which an explanation is provided together with the model prediction in response to each query. However, XAI also opens a door for adversaries to gain insights into the black-box models in MLaaS, thereby making the models more vulnerable to sever…
▽ More
Recent development in the field of explainable artificial intelligence (XAI) has helped improve trust in Machine-Learning-as-a-Service (MLaaS) systems, in which an explanation is provided together with the model prediction in response to each query. However, XAI also opens a door for adversaries to gain insights into the black-box models in MLaaS, thereby making the models more vulnerable to several attacks. For example, feature-based explanations (e.g., SHAP) could expose the top important features that a black-box model focuses on. Such disclosure has been exploited to craft effective backdoor triggers against malware classifiers. To address this trade-off, we introduce a new concept of achieving local differential privacy (LDP) in the explanations, and from that we establish a defense, called XRand, against such attacks. We show that our mechanism restricts the information that the adversary can learn about the top important features, while maintaining the faithfulness of the explanations.
△ Less
Submitted 14 December, 2022; v1 submitted 8 December, 2022;
originally announced December 2022.
-
Heterogeneous Randomized Response for Differential Privacy in Graph Neural Networks
Authors:
Khang Tran,
Phung Lai,
NhatHai Phan,
Issa Khalil,
Yao Ma,
Abdallah Khreishah,
My Thai,
Xintao Wu
Abstract:
Graph neural networks (GNNs) are susceptible to privacy inference attacks (PIAs), given their ability to learn joint representation from features and edges among nodes in graph data. To prevent privacy leakages in GNNs, we propose a novel heterogeneous randomized response (HeteroRR) mechanism to protect nodes' features and edges against PIAs under differential privacy (DP) guarantees without an un…
▽ More
Graph neural networks (GNNs) are susceptible to privacy inference attacks (PIAs), given their ability to learn joint representation from features and edges among nodes in graph data. To prevent privacy leakages in GNNs, we propose a novel heterogeneous randomized response (HeteroRR) mechanism to protect nodes' features and edges against PIAs under differential privacy (DP) guarantees without an undue cost of data and model utility in training GNNs. Our idea is to balance the importance and sensitivity of nodes' features and edges in redistributing the privacy budgets since some features and edges are more sensitive or important to the model utility than others. As a result, we derive significantly better randomization probabilities and tighter error bounds at both levels of nodes' features and edges departing from existing approaches, thus enabling us to maintain high data utility for training GNNs. An extensive theoretical and empirical analysis using benchmark datasets shows that HeteroRR significantly outperforms various baselines in terms of model utility under rigorous privacy protection for both nodes' features and edges. That enables us to defend PIAs in DP-preserving GNNs effectively.
△ Less
Submitted 10 November, 2022;
originally announced November 2022.
-
User-Entity Differential Privacy in Learning Natural Language Models
Authors:
Phung Lai,
NhatHai Phan,
Tong Sun,
Rajiv Jain,
Franck Dernoncourt,
Jiuxiang Gu,
Nikolaos Barmpalios
Abstract:
In this paper, we introduce a novel concept of user-entity differential privacy (UeDP) to provide formal privacy protection simultaneously to both sensitive entities in textual data and data owners in learning natural language models (NLMs). To preserve UeDP, we developed a novel algorithm, called UeDP-Alg, optimizing the trade-off between privacy loss and model utility with a tight sensitivity bo…
▽ More
In this paper, we introduce a novel concept of user-entity differential privacy (UeDP) to provide formal privacy protection simultaneously to both sensitive entities in textual data and data owners in learning natural language models (NLMs). To preserve UeDP, we developed a novel algorithm, called UeDP-Alg, optimizing the trade-off between privacy loss and model utility with a tight sensitivity bound derived from seamlessly combining user and sensitive entity sampling processes. An extensive theoretical analysis and evaluation show that our UeDP-Alg outperforms baseline approaches in model utility under the same privacy budget consumption on several NLM tasks, using benchmark datasets.
△ Less
Submitted 8 November, 2022; v1 submitted 1 November, 2022;
originally announced November 2022.
-
Combining datasets to increase the number of samples and improve model fitting
Authors:
Thu Nguyen,
Rabindra Khadka,
Nhan Phan,
Anis Yazidi,
Pål Halvorsen,
Michael A. Riegler
Abstract:
For many use cases, combining information from different datasets can be of interest to improve a machine learning model's performance, especially when the number of samples from at least one of the datasets is small. However, a potential challenge in such cases is that the features from these datasets are not identical, even though there are some commonly shared features among the datasets. To ta…
▽ More
For many use cases, combining information from different datasets can be of interest to improve a machine learning model's performance, especially when the number of samples from at least one of the datasets is small. However, a potential challenge in such cases is that the features from these datasets are not identical, even though there are some commonly shared features among the datasets. To tackle this challenge, we propose a novel framework called Combine datasets based on Imputation (ComImp). In addition, we propose a variant of ComImp that uses Principle Component Analysis (PCA), PCA-ComImp in order to reduce dimension before combining datasets. This is useful when the datasets have a large number of features that are not shared between them. Furthermore, our framework can also be utilized for data preprocessing by imputing missing data, i.e., filling in the missing entries while combining different datasets. To illustrate the power of the proposed methods and their potential usages, we conduct experiments for various tasks: regression, classification, and for different data types: tabular data, time series data, when the datasets to be combined have missing data. We also investigate how the devised methods can be used with transfer learning to provide even further model training improvement. Our results indicate that the proposed methods are somewhat similar to transfer learning in that the merge can significantly improve the accuracy of a prediction model on smaller datasets. In addition, the methods can boost performance by a significant margin when combining small datasets together and can provide extra improvement when being used with transfer learning.
△ Less
Submitted 16 May, 2023; v1 submitted 11 October, 2022;
originally announced October 2022.
-
Thermal effect on magnetoexciton energy spectra in monolayer transition metal dichalcogenides
Authors:
Duy-Nhat Ly,
Dai-Nam Le,
Ngoc-Hung Phan,
Van-Hoang Le
Abstract:
It is widely comprehended that temperature may cause phonon-exciton scattering, enhancing the energy level's linewidth and leading to some spectrum shifts. However, in the present paper, we suggest a different mechanism that allows the thermal motion of the exciton's center of mass (c.m.) to affect the magnetoexciton energies in monolayer dichalcogenides (TMDCs). By the nontrivial but precise sepa…
▽ More
It is widely comprehended that temperature may cause phonon-exciton scattering, enhancing the energy level's linewidth and leading to some spectrum shifts. However, in the present paper, we suggest a different mechanism that allows the thermal motion of the exciton's center of mass (c.m.) to affect the magnetoexciton energies in monolayer dichalcogenides (TMDCs). By the nontrivial but precise separation of the c.m. motion from an exciton in a monolayer TMDC with a magnetic field, we obtain an equation for the relative motion containing a motional Stark term proportional to the c.m. pseudomomentum, related to the temperature of the exciton gas but neglected in the previous studies. Solving the Schrödinger equation without omitting the motional Stark potential at room temperature shows approximately a few meV thermal-magnetic shifts in the exciton energies, significant enough for experimental detection. Moreover, this thermal effect causes a change in exciton radius and diamagnetic coefficient and enhances the exciton lifetime as a consequence. Surprisingly, the thermoinduced motional Stark potential breaks the system's SO(2) symmetry, conducting new peaks in the exciton absorption spectra at room temperature besides those of the $s$ states. This mechanism could be extended for other magnetoquasiparticles such as trions and biexcitons.
△ Less
Submitted 8 April, 2023; v1 submitted 27 September, 2022;
originally announced September 2022.
-
Design of experiments for the calibration of history-dependent models via deep reinforcement learning and an enhanced Kalman filter
Authors:
Ruben Villarreal,
Nikolaos N. Vlassis,
Nhon N. Phan,
Tommie A. Catanach,
Reese E. Jones,
Nathaniel A. Trask,
Sharlotte L. B. Kramer,
WaiChing Sun
Abstract:
Experimental data is costly to obtain, which makes it difficult to calibrate complex models. For many models an experimental design that produces the best calibration given a limited experimental budget is not obvious. This paper introduces a deep reinforcement learning (RL) algorithm for design of experiments that maximizes the information gain measured by Kullback-Leibler (KL) divergence obtaine…
▽ More
Experimental data is costly to obtain, which makes it difficult to calibrate complex models. For many models an experimental design that produces the best calibration given a limited experimental budget is not obvious. This paper introduces a deep reinforcement learning (RL) algorithm for design of experiments that maximizes the information gain measured by Kullback-Leibler (KL) divergence obtained via the Kalman filter (KF). This combination enables experimental design for rapid online experiments where traditional methods are too costly. We formulate possible configurations of experiments as a decision tree and a Markov decision process (MDP), where a finite choice of actions is available at each incremental step. Once an action is taken, a variety of measurements are used to update the state of the experiment. This new data leads to a Bayesian update of the parameters by the KF, which is used to enhance the state representation. In contrast to the Nash-Sutcliffe efficiency (NSE) index, which requires additional sampling to test hypotheses for forward predictions, the KF can lower the cost of experiments by directly estimating the values of new data acquired through additional actions. In this work our applications focus on mechanical testing of materials. Numerical experiments with complex, history-dependent models are used to verify the implementation and benchmark the performance of the RL-designed experiments.
△ Less
Submitted 26 September, 2022;
originally announced September 2022.
-
Lifelong DP: Consistently Bounded Differential Privacy in Lifelong Machine Learning
Authors:
Phung Lai,
Han Hu,
NhatHai Phan,
Ruoming Jin,
My T. Thai,
An M. Chen
Abstract:
In this paper, we show that the process of continually learning new tasks and memorizing previous tasks introduces unknown privacy risks and challenges to bound the privacy loss. Based upon this, we introduce a formal definition of Lifelong DP, in which the participation of any data tuples in the training set of any tasks is protected, under a consistently bounded DP protection, given a growing st…
▽ More
In this paper, we show that the process of continually learning new tasks and memorizing previous tasks introduces unknown privacy risks and challenges to bound the privacy loss. Based upon this, we introduce a formal definition of Lifelong DP, in which the participation of any data tuples in the training set of any tasks is protected, under a consistently bounded DP protection, given a growing stream of tasks. A consistently bounded DP means having only one fixed value of the DP privacy budget, regardless of the number of tasks. To preserve Lifelong DP, we propose a scalable and heterogeneous algorithm, called L2DP-ML with a streaming batch training, to efficiently train and continue releasing new versions of an L2M model, given the heterogeneity in terms of data sizes and the training order of tasks, without affecting DP protection of the private training set. An end-to-end theoretical analysis and thorough evaluations show that our mechanism is significantly better than baseline approaches in preserving Lifelong DP. The implementation of L2DP-ML is available at: https://github.com/haiphanNJIT/PrivateDeepLearning.
△ Less
Submitted 26 July, 2022;
originally announced July 2022.
-
Improving Domain Generalization by Learning without Forgetting: Application in Retail Checkout
Authors:
Thuy C. Nguyen,
Nam LH. Phan,
Son T. Nguyen
Abstract:
Designing an automatic checkout system for retail stores at the human level accuracy is challenging due to similar appearance products and their various poses. This paper addresses the problem by proposing a method with a two-stage pipeline. The first stage detects class-agnostic items, and the second one is dedicated to classify product categories. We also track the objects across video frames to…
▽ More
Designing an automatic checkout system for retail stores at the human level accuracy is challenging due to similar appearance products and their various poses. This paper addresses the problem by proposing a method with a two-stage pipeline. The first stage detects class-agnostic items, and the second one is dedicated to classify product categories. We also track the objects across video frames to avoid duplicated counting. One major challenge is the domain gap because the models are trained on synthetic data but tested on the real images. To reduce the error gap, we adopt domain generalization methods for the first-stage detector. In addition, model ensemble is used to enhance the robustness of the 2nd-stage classifier. The method is evaluated on the AI City challenge 2022 -- Track 4 and gets the F1 score $40\%$ on the test A set. Code is released at the link https://github.com/cybercore-co-ltd/aicity22-track4.
△ Less
Submitted 12 July, 2022;
originally announced July 2022.
-
Eine Bemerkung zu einigen $2$-dimensionalen Komplexen, die im $\mathbb{R}^4$ fast-eingebettet werden können
Authors:
T. Tam Nguyen Phan
Abstract:
We observe that many of the 2-complexes constructed by Freedman-Krushkal-Teichner in their paper on the incompleteness of the van Kampen embedding obstruction can actually be PL immersed in $\mathbb{R}^4$ in such a way that the images of the interiors of distinct cells are disjoint. In other words, they PL almost-embed in $\mathbb{R}^4$ with singularities occurring only as self intersections of so…
▽ More
We observe that many of the 2-complexes constructed by Freedman-Krushkal-Teichner in their paper on the incompleteness of the van Kampen embedding obstruction can actually be PL immersed in $\mathbb{R}^4$ in such a way that the images of the interiors of distinct cells are disjoint. In other words, they PL almost-embed in $\mathbb{R}^4$ with singularities occurring only as self intersections of some 2-cells. This note is written in (not necessarily modern) German.
△ Less
Submitted 26 June, 2022;
originally announced June 2022.
-
Continuously Doping Bi 2 Sr 2 CaCu 2 O 8+δ into Electron-Doped Superconductor by CaH 2 Annealing Method
Authors:
Jin Zhao,
Yu-Lin Gan,
Guang Yang,
Yi-Gui Zhong,
Cen-Yao Tang,
Fa-Zhi Yang,
Giao Ngoc Phan,
Qiang-Tao Sui,
Zhong Liu,
Gang Li,
Xiang-Gang Qiu,
Qing-Hua Zhang,
Jie Shen,
Tian Qian,
Li Lu,
Lei Yan,
Gen-Da Gu,
Hong Ding
Abstract:
As a typical hole-doped cuprate superconductor, Bi 2 Sr 2 CaCu 2 O 8+δ (Bi2212) carrier doping is mostly determined by its oxygen content. Traditional doping methods can regulate its doping level within the range of hole doping. Here we report the first application of CaH 2 annealing method in regulating the doping level of Bi2212. By continuously controlling the anneal time, a series of different…
▽ More
As a typical hole-doped cuprate superconductor, Bi 2 Sr 2 CaCu 2 O 8+δ (Bi2212) carrier doping is mostly determined by its oxygen content. Traditional doping methods can regulate its doping level within the range of hole doping. Here we report the first application of CaH 2 annealing method in regulating the doping level of Bi2212. By continuously controlling the anneal time, a series of differently doped samples can be obtained. The combined experimental results of x-ray diffraction, scanning transmission electron microscopy, resistance and Hall measurements demonstrate that the CaH 2 induced topochemical reaction can effectively change the oxygen content of Bi2212 within a very wide range, even switching from hole doping to electron doping. We also found evidence of a low-T c superconducting phase in the electron doping side.
△ Less
Submitted 23 June, 2022;
originally announced June 2022.
-
DPER: Dynamic Programming for Exist-Random Stochastic SAT
Authors:
Vu H. N. Phan,
Moshe Y. Vardi
Abstract:
In Bayesian inference, the maximum a posteriori (MAP) problem combines the most probable explanation (MPE) and marginalization (MAR) problems. The counterpart in propositional logic is the exist-random stochastic satisfiability (ER-SSAT) problem, which combines the satisfiability (SAT) and weighted model counting (WMC) problems. Both MAP and ER-SSAT have the form…
▽ More
In Bayesian inference, the maximum a posteriori (MAP) problem combines the most probable explanation (MPE) and marginalization (MAR) problems. The counterpart in propositional logic is the exist-random stochastic satisfiability (ER-SSAT) problem, which combines the satisfiability (SAT) and weighted model counting (WMC) problems. Both MAP and ER-SSAT have the form $\operatorname{argmax}_X \sum_Y f(X, Y)$, where $f$ is a real-valued function over disjoint sets $X$ and $Y$ of variables. These two optimization problems request a value assignment for the $X$ variables that maximizes the weighted sum of $f(X, Y)$ over all value assignments for the $Y$ variables. ER-SSAT has been shown to be a promising approach to formally verify fairness in supervised learning. Recently, dynamic programming on graded project-join trees has been proposed to solve weighted projected model counting (WPMC), a related problem that has the form $\sum_X \max_Y f(X, Y)$. We extend this WPMC framework to exactly solve ER-SSAT and implement a dynamic-programming solver named DPER. Our empirical evaluation indicates that DPER contributes to the portfolio of state-of-the-art ER-SSAT solvers (DC-SSAT and erSSAT) through competitive performance on low-width problem instances.
△ Less
Submitted 19 May, 2022;
originally announced May 2022.
-
DPO: Dynamic-Programming Optimization on Hybrid Constraints
Authors:
Vu H. N. Phan,
Moshe Y. Vardi
Abstract:
In Bayesian inference, the most probable explanation (MPE) problem requests a variable instantiation with the highest probability given some evidence. Since a Bayesian network can be encoded as a literal-weighted CNF formula $\varphi$, we study Boolean MPE, a more general problem that requests a model $τ$ of $\varphi$ with the highest weight, where the weight of $τ$ is the product of weights of li…
▽ More
In Bayesian inference, the most probable explanation (MPE) problem requests a variable instantiation with the highest probability given some evidence. Since a Bayesian network can be encoded as a literal-weighted CNF formula $\varphi$, we study Boolean MPE, a more general problem that requests a model $τ$ of $\varphi$ with the highest weight, where the weight of $τ$ is the product of weights of literals satisfied by $τ$. It is known that Boolean MPE can be solved via reduction to (weighted partial) MaxSAT. Recent work proposed DPMC, a dynamic-programming model counter that leverages graph-decomposition techniques to construct project-join trees. A project-join tree is an execution plan that specifies how to conjoin clauses and project out variables. We build on DPMC and introduce DPO, a dynamic-programming optimizer that exactly solves Boolean MPE. By using algebraic decision diagrams (ADDs) to represent pseudo-Boolean (PB) functions, DPO is able to handle disjunctive clauses as well as XOR clauses. (Cardinality constraints and PB constraints may also be compactly represented by ADDs, so one can further extend DPO's support for hybrid inputs.) To test the competitiveness of DPO, we generate random XOR-CNF formulas. On these hybrid benchmarks, DPO significantly outperforms MaxHS, UWrMaxSat, and GaussMaxHS, which are state-of-the-art exact solvers for MaxSAT.
△ Less
Submitted 17 May, 2022;
originally announced May 2022.
-
Finnish Parliament ASR corpus - Analysis, benchmarks and statistics
Authors:
Anja Virkkunen,
Aku Rouhe,
Nhan Phan,
Mikko Kurimo
Abstract:
Public sources like parliament meeting recordings and transcripts provide ever-growing material for the training and evaluation of automatic speech recognition (ASR) systems. In this paper, we publish and analyse the Finnish parliament ASR corpus, the largest publicly available collection of manually transcribed speech data for Finnish with over 3000 hours of speech and 449 speakers for which it p…
▽ More
Public sources like parliament meeting recordings and transcripts provide ever-growing material for the training and evaluation of automatic speech recognition (ASR) systems. In this paper, we publish and analyse the Finnish parliament ASR corpus, the largest publicly available collection of manually transcribed speech data for Finnish with over 3000 hours of speech and 449 speakers for which it provides rich demographic metadata. This corpus builds on earlier initial work, and as a result the corpus has a natural split into two training subsets from two periods of time. Similarly, there are two official, corrected test sets covering different times, setting an ASR task with longitudinal distribution-shift characteristics. An official development set is also provided. We develop a complete Kaldi-based data preparation pipeline, and hidden Markov model (HMM), hybrid deep neural network (HMM-DNN) and attention-based encoder-decoder (AED) ASR recipes. We set benchmarks on the official test sets, as well as multiple other recently used test sets. Both temporal corpus subsets are already large, and we observe that beyond their scale, ASR performance on the official test sets plateaus, whereas other domains benefit from added data. The HMM-DNN and AED approaches are compared in a carefully matched equal data setting, with the HMM-DNN system consistently performing better. Finally, the variation of the ASR accuracy is compared between the speaker categories available in the parliament metadata to detect potential biases based on factors such as gender, age, and education.
△ Less
Submitted 28 March, 2022;
originally announced March 2022.
-
Facial Expression Classification using Fusion of Deep Neural Network in Video for the 3rd ABAW3 Competition
Authors:
Kim Ngan Phan,
Hong-Hai Nguyen,
Van-Thong Huynh,
Soo-Hyung Kim
Abstract:
For computers to recognize human emotions, expression classification is an equally important problem in the human-computer interaction area. In the 3rd Affective Behavior Analysis In-The-Wild competition, the task of expression classification includes eight classes with six basic expressions of human faces from videos. In this paper, we employ a transformer mechanism to encode the robust represent…
▽ More
For computers to recognize human emotions, expression classification is an equally important problem in the human-computer interaction area. In the 3rd Affective Behavior Analysis In-The-Wild competition, the task of expression classification includes eight classes with six basic expressions of human faces from videos. In this paper, we employ a transformer mechanism to encode the robust representation from the backbone. Fusion of the robust representations plays an important role in the expression classification task. Our approach achieves 30.35\% and 28.60\% for the $F_1$ score on the validation set and the test set, respectively. This result shows the effectiveness of the proposed architecture based on the Aff-Wild2 dataset.
△ Less
Submitted 8 April, 2022; v1 submitted 24 March, 2022;
originally announced March 2022.
-
Recoil imaging for directional detection of dark matter, neutrinos, and physics beyond the Standard Model
Authors:
C. A. J. O'Hare,
D. Loomba,
K. Altenmüller,
H. Álvarez-Pol,
F. D. Amaro,
H. M. Araújo,
D. Aristizabal Sierra,
J. Asaadi,
D. Attié,
S. Aune,
C. Awe,
Y. Ayyad,
E. Baracchini,
P. Barbeau,
J. B. R. Battat,
N. F. Bell,
B. Biasuzzi,
L. J. Bignell,
C. Boehm,
I. Bolognino,
F. M. Brunbauer,
M. Caamaño,
C. Cabo,
D. Caratelli,
J. M. Carmona
, et al. (142 additional authors not shown)
Abstract:
Recoil imaging entails the detection of spatially resolved ionization tracks generated by particle interactions. This is a highly sought-after capability in many classes of detector, with broad applications across particle and astroparticle physics. However, at low energies, where ionization signatures are small in size, recoil imaging only seems to be a practical goal for micro-pattern gas detect…
▽ More
Recoil imaging entails the detection of spatially resolved ionization tracks generated by particle interactions. This is a highly sought-after capability in many classes of detector, with broad applications across particle and astroparticle physics. However, at low energies, where ionization signatures are small in size, recoil imaging only seems to be a practical goal for micro-pattern gas detectors. This white paper outlines the physics case for recoil imaging, and puts forward a decadal plan to advance towards the directional detection of low-energy recoils with sensitivity and resolution close to fundamental performance limits. The science case covered includes: the discovery of dark matter into the neutrino fog, directional detection of sub-MeV solar neutrinos, the precision study of coherent-elastic neutrino-nucleus scattering, the detection of solar axions, the measurement of the Migdal effect, X-ray polarimetry, and several other applied physics goals. We also outline the R&D programs necessary to test concepts that are crucial to advance detector performance towards their fundamental limit: single primary electron sensitivity with full 3D spatial resolution at the $\sim$100 micron-scale. These advancements include: the use of negative ion drift, electron counting with high-definition electronic readout, time projection chambers with optical readout, and the possibility for nuclear recoil tracking in high-density gases such as argon. We also discuss the readout and electronics systems needed to scale-up such detectors to the ton-scale and beyond.
△ Less
Submitted 17 July, 2022; v1 submitted 11 March, 2022;
originally announced March 2022.
-
Parallel feature selection based on the trace ratio criterion
Authors:
Thu Nguyen,
Thanh Nhan Phan,
Van Nhuong Nguyen,
Thanh Binh Nguyen,
Pål Halvorsen,
Michael Riegler
Abstract:
The growth of data today poses a challenge in management and inference. While feature extraction methods are capable of reducing the size of the data for inference, they do not help in minimizing the cost of data storage. On the other hand, feature selection helps to remove the redundant features and therefore is helpful not only in inference but also in reducing management costs. This work presen…
▽ More
The growth of data today poses a challenge in management and inference. While feature extraction methods are capable of reducing the size of the data for inference, they do not help in minimizing the cost of data storage. On the other hand, feature selection helps to remove the redundant features and therefore is helpful not only in inference but also in reducing management costs. This work presents a novel parallel feature selection approach for classification, namely Parallel Feature Selection using Trace criterion (PFST), which scales up to very large datasets. Our method uses trace criterion, a measure of class separability used in Fisher's Discriminant Analysis, to evaluate feature usefulness. We analyzed the criterion's desirable properties theoretically. Based on the criterion, PFST rapidly finds important features out of a set of features for big datasets by first making a forward selection with early removal of seemingly redundant features parallelly. After the most important features are included in the model, we check back their contribution for possible interaction that may improve the fit. Lastly, we make a backward selection to check back possible redundant added by the forward steps. We evaluate our methods via various experiments using Linear Discriminant Analysis as the classifier on selected features. The experiments show that our method can produce a small set of features in a fraction of the amount of time by the other methods under comparison. In addition, the classifier trained on the features selected by PFST not only achieves better accuracy than the ones chosen by other approaches but can also achieve better accuracy than the classification on all available features.
△ Less
Submitted 3 March, 2022;
originally announced March 2022.
-
How to Backdoor HyperNetwork in Personalized Federated Learning?
Authors:
Phung Lai,
NhatHai Phan,
Issa Khalil,
Abdallah Khreishah,
Xintao Wu
Abstract:
This paper explores previously unknown backdoor risks in HyperNet-based personalized federated learning (HyperNetFL) through poisoning attacks. Based upon that, we propose a novel model transferring attack (called HNTroj), i.e., the first of its kind, to transfer a local backdoor infected model to all legitimate and personalized local models, which are generated by the HyperNetFL model, through co…
▽ More
This paper explores previously unknown backdoor risks in HyperNet-based personalized federated learning (HyperNetFL) through poisoning attacks. Based upon that, we propose a novel model transferring attack (called HNTroj), i.e., the first of its kind, to transfer a local backdoor infected model to all legitimate and personalized local models, which are generated by the HyperNetFL model, through consistent and effective malicious local gradients computed across all compromised clients in the whole training process. As a result, HNTroj reduces the number of compromised clients needed to successfully launch the attack without any observable signs of sudden shifts or degradation regarding model utility on legitimate data samples making our attack stealthy. To defend against HNTroj, we adapted several backdoor-resistant FL training algorithms into HyperNetFL. An extensive experiment that is carried out using several benchmark datasets shows that HNTroj significantly outperforms data poisoning and model replacement attacks and bypasses robust training algorithms even with modest numbers of compromised clients.
△ Less
Submitted 11 December, 2023; v1 submitted 18 January, 2022;
originally announced January 2022.
-
Quasi-Einstein metrics on sphere bundles
Authors:
Solomon Huang,
Tommy Murphy,
Thanh Nhan Phan
Abstract:
In this note we adapt the work of Hall to find quasi-Einstein metrics on sphere bundles over products of Fano Kaehler-Einstein manifolds, as well as bundles where only one end is blown down.
In this note we adapt the work of Hall to find quasi-Einstein metrics on sphere bundles over products of Fano Kaehler-Einstein manifolds, as well as bundles where only one end is blown down.
△ Less
Submitted 12 January, 2022;
originally announced January 2022.