id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
3
62.8k
title
stringlengths
1
382
comments
stringlengths
1
1.15k
journal-ref
stringlengths
1
557
doi
stringlengths
7
153
report-no
stringlengths
1
509
categories
stringlengths
5
125
license
stringclasses
9 values
abstract
stringlengths
6
6.09k
versions
listlengths
1
187
update_date
timestamp[s]date
2007-05-23 00:00:00
2025-05-16 00:00:00
authors_parsed
sequencelengths
1
2.83k
2505.05178
Grigory Volovik
G.E. Volovik
Extended Tsallis-Cirto entropy for black and white holes
5 pages, no figures
null
null
null
gr-qc cond-mat.other
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In reference [1] we considered the black hole thermodynamics with the non-extensive entropy. This entropy obeys the composition rule which coincides with the composition rule in the non-extensive Tsallis-Cirto $\delta=2$ statistics. Here we extend this approach to the thermodynamics of white holes. The entropy of the white hole is negative as follows from the rate of macroscopic quantum tunneling from black hole to white hole. The white hole entropy is with the minus sign the entropy of the black hole with the same mass, $S_{\rm WH}(M)=-S_{\rm BH}(M)$. This reflects the anti-symmetry with respect to time reversal, at which the shift vector in the Arnowitt-Deser-Misner formalism changes sign. This symmetry allows one to extend the Tsallis-Chirto entropy by adding a minus sign to the Tsallis-Chirto formula applied to white hole. As a result, the composition rule remains the same, with the only difference being that instead of entropy it contains the entropy modulus. The same non-extensive composition rule is obtained for the entropy of the Reissner-Nordstr\"om black hole. This entropy is formed by the positive entropy of the outer horizon and the negative entropy of the inner horizon. The model of the black hole formed by "black hole atoms" with Planck-scale mass is also extended to include the negative entropy of white holes.
[ { "version": "v1", "created": "Thu, 8 May 2025 12:28:21 GMT" }, { "version": "v2", "created": "Mon, 12 May 2025 13:22:11 GMT" }, { "version": "v3", "created": "Wed, 14 May 2025 16:34:14 GMT" } ]
2025-05-15T00:00:00
[ [ "Volovik", "G. E.", "" ] ]
2505.05272
Andr\'e Milagre
Andr\'e Milagre, Darius Jur\v{c}iukonis, Lu\'is Lavoura
Vacuum stability conditions for new $SU(2)$ multiplets
33 pages, 2 figures; v2: added references and footnotes, corrected the Acknowledgments
null
null
null
hep-ph hep-th
http://creativecommons.org/licenses/by/4.0/
We consider the addition to the Standard Model of a scalar $SU(2)$ multiplet $\Delta_n$ with dimension $n$ going from $1$ to $6$. The multiplet $\Delta_n$ is assumed to have null vacuum expectation value and an arbitrary (free) hypercharge. We determine the shape of the phase space for the new terms that appear in the scalar potential (SP); we observe in particular that, in the case of a 6-plet, the phase space is slightly concave along one of its boundaries. We determine the bounded-from-below and vacuum stability conditions on the SP for each value of $n$.
[ { "version": "v1", "created": "Thu, 8 May 2025 14:18:09 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 14:09:47 GMT" } ]
2025-05-15T00:00:00
[ [ "Milagre", "André", "" ], [ "Jurčiukonis", "Darius", "" ], [ "Lavoura", "Luís", "" ] ]
2505.05364
Hao Liu
Yanbin Zhao, Hao Liu, Zhihua Deng, Tong Li, Haoyi Jiang, Zhenfei Ling, Xingkai Wang, Lei Zhang, Xiaoping Ouyang
Machine learning bridging battery field data and laboratory data
73 pages, 21 figures
null
null
null
stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Aiming at the dilemma that most laboratory data-driven diagnostic and prognostic methods cannot be applied to field batteries in passenger cars and energy storage systems, this paper proposes a method to bridge field data and laboratory data using machine learning. Only two field real impedances corresponding to a medium frequency and a high frequency are needed to predict laboratory real impedance curve, laboratory charge/discharge curve, and laboratory relaxation curve. Based on the predicted laboratory data, laboratory data-driven methods can be used for field battery diagnosis and prognosis. Compared with the field data-driven methods based on massive historical field data, the proposed method has the advantages of higher accuracy, lower cost, faster speed, readily available, and no use of private data. The proposed method is tested using two open-source datasets containing 249 NMC cells. For a test set containing 76 cells, the mean absolute percentage errors of laboratory real impedance curve, charge curve, and discharge curve prediction results are 0.85%, 4.72%, and 2.69%, respectively. This work fills the gap between laboratory data-driven diagnostic and prognostic methods and field battery applications, making all laboratory data-driven methods applicable to field battery diagnosis and prognosis. Furthermore, this work overturns the fixed path of developing field battery diagnostic and prognostic methods based on massive field historical data, opening up new research and breakthrough directions for field battery diagnosis and prognosis.
[ { "version": "v1", "created": "Thu, 8 May 2025 15:58:57 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 01:51:09 GMT" } ]
2025-05-15T00:00:00
[ [ "Zhao", "Yanbin", "" ], [ "Liu", "Hao", "" ], [ "Deng", "Zhihua", "" ], [ "Li", "Tong", "" ], [ "Jiang", "Haoyi", "" ], [ "Ling", "Zhenfei", "" ], [ "Wang", "Xingkai", "" ], [ "Zhang", "Lei", "" ], [ "Ouyang", "Xiaoping", "" ] ]
2505.05507
Igor Alentev
Igor Alentev, Lev Kozlov, Ivan Domrachev, Simeon Nedelchev, Jee-Hwan Ryu
VIMPPI: Enhancing Model Predictive Path Integral Control with Variational Integration for Underactuated Systems
null
null
null
null
eess.SY cs.RO cs.SY
http://creativecommons.org/licenses/by/4.0/
This paper presents VIMPPI, a novel control approach for underactuated double pendulum systems developed for the AI Olympics competition. We enhance the Model Predictive Path Integral framework by incorporating variational integration techniques, enabling longer planning horizons without additional computational cost. Operating at 500-700 Hz with control interpolation and disturbance detection mechanisms, VIMPPI substantially outperforms both baseline methods and alternative MPPI implementations
[ { "version": "v1", "created": "Wed, 7 May 2025 08:18:54 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 12:13:27 GMT" } ]
2025-05-15T00:00:00
[ [ "Alentev", "Igor", "" ], [ "Kozlov", "Lev", "" ], [ "Domrachev", "Ivan", "" ], [ "Nedelchev", "Simeon", "" ], [ "Ryu", "Jee-Hwan", "" ] ]
2505.05776
Zachary Lipel
Zachary G. Lipel, Yannick A. D. Omar, Dimitrios Fraggedakis
Finite Membrane Thickness Influences Hydrodynamics on the Nanoscale
7 pages, 2 figures
null
null
null
cond-mat.soft physics.bio-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many lipid membrane-mediated transport processes--such as mechanically-gated channel activation and solute transport--involve structural and dynamical features on membrane thickness length scales. Most existing membrane models, however, tend to adopt (quasi-)two-dimensional descriptions that neglect thickness-dependent phenomena relevant to internal membrane mechanics, and thus do not fully account for the complex coupling of lipid membranes with their surrounding fluid media. Therefore, explicitly incorporating membrane thickness effects in lipid membrane models will enable a more accurate description of the influence of membrane/fluid coupling on transport phenomena in the vicinity of the bilayer surfaces. Here, we present a continuum model for membrane fluctuations that accounts for finite membrane thickness and resolves hydrodynamic interactions between the bilayer and its surrounding fluid. By applying linear response analysis, we observe that membrane thickness-mediated effects, such as bending-induced lipid reorientations, can generate shear flows close to the membrane surface that slow down the relaxation of nanometer scale shape fluctuations. Additionally, we reveal the emergence of pressure inversion and flow reversal near the membrane interfaces, accompanied by localized stagnation points. Among these, extensional stagnation points give rise to a novel mode of bulk dissipation, originating from bending-induced compression and expansion of the membrane surfaces and their coupling to shear stresses in the fluid. Our findings identify membrane thickness as a key factor in nanoscale hydrodynamics and suggest that its effects may be detectable in fluctuation spectra and can be relevant to interfacial processes such as solute permeability and contact with solid boundaries or other membranes.
[ { "version": "v1", "created": "Fri, 9 May 2025 04:37:55 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 15:33:35 GMT" } ]
2025-05-15T00:00:00
[ [ "Lipel", "Zachary G.", "" ], [ "Omar", "Yannick A. D.", "" ], [ "Fraggedakis", "Dimitrios", "" ] ]
2505.05871
Joan Bachs-Esteban
Joan Bachs-Esteban, Il\'idio Lopes, Javier Rubio
Screening Mechanisms on White Dwarfs: Symmetron & Dilaton
Corrected references. Matches published version
Universe 2025, 11(5), 158
10.3390/universe11050158
null
gr-qc astro-ph.HE astro-ph.SR
http://creativecommons.org/licenses/by/4.0/
This work provides the first comparison of the symmetron and dilaton fields in white dwarfs. We show how these screening mechanisms behave inside {such stars} and their impact on stellar properties. Employing a custom-developed shooting method, we solve the scalar-tensor equilibrium equations in the Newtonian approximation. We consider a Chandrasekhar equation of state and examine a range of potential mass scales and coupling strengths for both fields. Both fields enhance the pressure drop in low-density white dwarfs, leading to smaller stellar masses, radii, and luminosities. Unlike chameleon models, their effects are suppressed in more massive stars, with symmetron fields fully decoupling and dilaton fields weakening but not vanishing. Consequently, no mass-radius curve for screened white dwarfs exceeds the Newtonian prediction in any of these three mechanisms. The mass-radius deviations are generally more pronounced at lower densities, depending on model parameters. Due to their common runaway potential, we confirm that dilaton and chameleon fields display similar field and gradient profiles. In contrast, due to their environment-dependent coupling, the dilaton and symmetron mechanisms exhibit stronger density-dependent screening effects. These findings highlight both phenomenological differences and theoretical similarities among these mechanisms, motivating asteroseismology studies to constrain the symmetron and dilaton parameter spaces.
[ { "version": "v1", "created": "Fri, 9 May 2025 08:15:59 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 14:32:40 GMT" } ]
2025-05-15T00:00:00
[ [ "Bachs-Esteban", "Joan", "" ], [ "Lopes", "Ilídio", "" ], [ "Rubio", "Javier", "" ] ]
2505.05925
Yu Hao
Chang Li, Yangxiang Lu, Hao Yu
Infinite combinatorial Ricci flow in spherical background geometry
null
null
null
null
math.GT math.DG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Since the fundamental work of Chow-Luo \cite{CL03}, Ge \cite{Ge12,Ge17} et al., the combinatorial curvature flow methods became a basic technique in the study of circle pattern theory. In this paper, we investigate the combinatorial Ricci flow with prescribed total geodesic curvatures in spherical background geometry. For infinite cellular decompositions, we establish the existence of a solution to the flow equation for all time. Furthermore, under an additional condition, we prove that the solution converges as time tends to infinity. To the best of our knowledge, this is the first study of an infinite combinatorial curvature flow in spherical background geometry.
[ { "version": "v1", "created": "Fri, 9 May 2025 09:57:58 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 00:11:26 GMT" } ]
2025-05-15T00:00:00
[ [ "Li", "Chang", "" ], [ "Lu", "Yangxiang", "" ], [ "Yu", "Hao", "" ] ]
2505.06006
Heng Xu
Jiangwei Xu, Heng Xu, Yanjun Guo, Jinchen Jiang, Bojun Wang, Zihan Xue, Yunpeng Men, Kejia Lee, Bing Zhang, Weiwei Zhu, Jinlin Han
Periodic variation of magnetoionic environment of a fast radio burst source
Submitted, comments are welcome
null
null
null
astro-ph.HE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Fast radio bursts (FRBs) are luminous, dispersed millisecond-duration radio bursts whose origin is poorly known. Recent observations suggest that some FRBs may reside in binary systems, even though conclusive evidence remains elusive. Here we report the detection of a 26.24$\pm$0.02 day periodicity in Faraday rotation measure (RM) of an actively repeating source named FRB 20201124A. The detection was made from 3,106 bursts collected with the Five-hundred-meter Aperture Spherical radio Telescope (FAST) over ~365 days. The RM periodicity is coherently phase-connected across ~14 cycles over a 1-year duration. Our detection of RM periodicity corresponds to a natural logarithmic Bayesian factor of 1,168. The detection significances vary between 5.9-34 {\sigma} under different assumptions. Such a periodicity provides evidence for the binary nature of FRB 20201124A, where the periodic RM variations arise from the orbital motion of the FRB source within the magnetoionic environment of the system. Together with previous observations, our result suggests that being in binary systems may be a common feature for actively repeating FRB sources.
[ { "version": "v1", "created": "Fri, 9 May 2025 12:35:51 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 03:22:34 GMT" } ]
2025-05-15T00:00:00
[ [ "Xu", "Jiangwei", "" ], [ "Xu", "Heng", "" ], [ "Guo", "Yanjun", "" ], [ "Jiang", "Jinchen", "" ], [ "Wang", "Bojun", "" ], [ "Xue", "Zihan", "" ], [ "Men", "Yunpeng", "" ], [ "Lee", "Kejia", "" ], [ "Zhang", "Bing", "" ], [ "Zhu", "Weiwei", "" ], [ "Han", "Jinlin", "" ] ]
2505.06058
Anna Fino
Beatrice Brienza, Anna Fino, Gueo Grantcharov and Misha Verbitsky
On the structure of compact strong HKT manifolds
33 pages
null
null
null
math.DG hep-th
http://creativecommons.org/licenses/by/4.0/
We study the geometry of compact strong HKT and, more generally, compact BHE manifolds. We prove that any compact BHE manifold with full holonomy must be K\"ahler and we establish a similar result for strong HKT manifolds. Additionally, we demonstrate a rigidity theorem for strong HKT structures on solvmanifolds and we completely classify those with parallel Bismut torsion. Finally, we introduce the Ricci foliation for hypercomplex manifolds and analyze its properties for compact, simply connected, 8-dimensional strong HKT manifolds, proving that they are always Hopf fibrations over a compact $4$-dimensional orbifold.
[ { "version": "v1", "created": "Fri, 9 May 2025 13:53:03 GMT" } ]
2025-05-15T00:00:00
[ [ "Brienza", "Beatrice", "" ], [ "Fino", "Anna", "" ], [ "Grantcharov", "Gueo", "" ], [ "Verbitsky", "Misha", "" ] ]
2505.06137
Xianguo Lu
L. Alvarez Ruso, W. Chang, J. Franklin, P.R. Hobson, P.B. Jurj, R. Kamath, P. Kyberd, X. Lu, K. Long, D. Pasari, S. Ricciardi, J. Turner, A. Vogiatzi (on behalf of the nuSTORM collaboration)
Neutrinos from Stored Muons (nuSTORM)
Submitted to the 2026 Update of the European Strategy for Particle Physics (https://indico.cern.ch/event/1439855/contributions/6461582/). Contact: K. Long. 17 pages, 7 figures. v2: fixed top matter
null
null
null
hep-ex nucl-ex physics.acc-ph
http://creativecommons.org/licenses/by-nc-nd/4.0/
The Neutrinos from Stored Muons, nuSTORM, facility has been designed to deliver a definitive neutrino-nucleus scattering programme using beams of ,{\nu}e- and ,{\nu}{\mu}- from the decay of muons confined within a storage ring. The facility is unique, it will be capable of storing {\mu} beams with a central momentum of between 1 GeV/c and 6 GeV/c and a momentum spread of 16%. This specification will allow neutrino-scattering measurements to be made over the kinematic range of interest to the DUNE and Hyper-K collaborations. At nuSTORM, the flavour composition of the beam and the neutrino-energy spectrum are both precisely known. The storage-ring instrumentation will allow the neutrino flux to be determined to a precision of 1% or better. With its existing proton-beam infrastructure, CERN is uniquely well-placed to implement nuSTORM. A summary of the proposed implementation of nuSTORM at CERN is presented below.
[ { "version": "v1", "created": "Fri, 9 May 2025 15:43:42 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 14:59:25 GMT" } ]
2025-05-15T00:00:00
[ [ "Ruso", "L. Alvarez", "", "on behalf of the nuSTORM collaboration" ], [ "Chang", "W.", "", "on behalf of the nuSTORM collaboration" ], [ "Franklin", "J.", "", "on behalf of the nuSTORM collaboration" ], [ "Hobson", "P. R.", "", "on behalf of the nuSTORM collaboration" ], [ "Jurj", "P. B.", "", "on behalf of the nuSTORM collaboration" ], [ "Kamath", "R.", "", "on behalf of the nuSTORM collaboration" ], [ "Kyberd", "P.", "", "on behalf of the nuSTORM collaboration" ], [ "Lu", "X.", "", "on behalf of the nuSTORM collaboration" ], [ "Long", "K.", "", "on behalf of the nuSTORM collaboration" ], [ "Pasari", "D.", "", "on behalf of the nuSTORM collaboration" ], [ "Ricciardi", "S.", "", "on behalf of the nuSTORM collaboration" ], [ "Turner", "J.", "", "on behalf of the nuSTORM collaboration" ], [ "Vogiatzi", "A.", "", "on behalf of the nuSTORM collaboration" ] ]
2505.06140
Ramesh Sharma
Ramesh Sharma
A Conformal Quasi Einstein Characterization Of The Round Sphere
None
null
null
null
math.DG
http://creativecommons.org/licenses/by/4.0/
We extend the following result of Cochran ``A closed $m$-quasi Einstein manifold ($M,g,X$) with $m \ne -2$ has constant scalar curvature if and only if $X$ is Killing" covering the missing accidental case $m=-2$ and generalize it showing that $X$ is Killing if the integral of the Lie derivative of the scalar curvature along $X$ is non-positive. For a closed $m$-quasi Einstein manifold of dimension $n \ge 2$, if $X$ is conformal, then it is Killing; and in addition, if $M$ admits a non-Killing conformal vector field $V$, then it is globally isometric to a sphere and $V$ is gradient for $n > 2$. Finally, we derive an integral identity for a vector field on a closed Riemannian manifold, which provides a direct proof of the Bourguignon-Ezin conservation identity.
[ { "version": "v1", "created": "Fri, 9 May 2025 15:49:16 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 17:47:31 GMT" } ]
2025-05-15T00:00:00
[ [ "Sharma", "Ramesh", "" ] ]
2505.06372
Przemyslaw Ignaciuk
Naohisa Otsuka, Daiki Kakehi, Przemys{\l}aw Ignaciuk
Interval reduced-order switched positive observers for uncertain switched positive linear systems
11 pages, 4 figures
Int. J. Control Autom. Syst. 22, 1105-1115, 2024
10.1007/s12555-023-0103-6
null
eess.SY cs.SY
http://creativecommons.org/licenses/by-nc-nd/4.0/
In this paper, existence conditions and a design procedure of reduced-order switched positive observers for continuous- and discrete-time switched positive linear systems with uncertainty are established. In the analyzed class, arbitrary switching is permitted, whereas the uncertainty expressed via matrix inequalities concerns both the initial state and system parameters. Positive lower and positive upper interval switched observers are obtained. The proposed observers are of (n - p) order, where n is the dimension of the state vector and p is the rank of the output matrix, i.e., p-dimensional measurement information. Moreover, as a special case, existence conditions and a design procedure of reduced-order positive observers for uncertain positive linear systems without switching are provided. The theoretical findings are illustrated by two numerical examples for continuous- and discrete-time systems.
[ { "version": "v1", "created": "Fri, 9 May 2025 18:27:43 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 07:08:35 GMT" } ]
2025-05-15T00:00:00
[ [ "Otsuka", "Naohisa", "" ], [ "Kakehi", "Daiki", "" ], [ "Ignaciuk", "Przemysław", "" ] ]
2505.06625
Tianhao Cai
Tianhao Cai, Liang Wang, Limin Xiao, Meng Han, Zeyu Wang, Lin Sun and Xiaojian Liao
CaMDN: Enhancing Cache Efficiency for Multi-tenant DNNs on Integrated NPUs
7 pages, 9 figures. This paper has been accepted to the 2025 Design Automation Conference (DAC)
null
null
null
cs.AR cs.AI cs.OS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the rapid development of DNN applications, multi-tenant execution, where multiple DNNs are co-located on a single SoC, is becoming a prevailing trend. Although many methods are proposed in prior works to improve multi-tenant performance, the impact of shared cache is not well studied. This paper proposes CaMDN, an architecture-scheduling co-design to enhance cache efficiency for multi-tenant DNNs on integrated NPUs. Specifically, a lightweight architecture is proposed to support model-exclusive, NPU-controlled regions inside shared cache to eliminate unexpected cache contention. Moreover, a cache scheduling method is proposed to improve shared cache utilization. In particular, it includes a cache-aware mapping method for adaptability to the varying available cache capacity and a dynamic allocation algorithm to adjust the usage among co-located DNNs at runtime. Compared to prior works, CaMDN reduces the memory access by 33.4% on average and achieves a model speedup of up to 2.56$\times$ (1.88$\times$ on average).
[ { "version": "v1", "created": "Sat, 10 May 2025 12:16:50 GMT" } ]
2025-05-15T00:00:00
[ [ "Cai", "Tianhao", "" ], [ "Wang", "Liang", "" ], [ "Xiao", "Limin", "" ], [ "Han", "Meng", "" ], [ "Wang", "Zeyu", "" ], [ "Sun", "Lin", "" ], [ "Liao", "Xiaojian", "" ] ]
2505.06738
Zibo Gao
Zibo Gao, Junjie Hu, Feng Guo, Yixin Zhang, Yinglong Han, Siyuan Liu, Haiyang Li and Zhiqiang Lv
I Know What You Said: Unveiling Hardware Cache Side-Channels in Local Large Language Model Inference
Submitted for review in January 22, 2025
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Large Language Models (LLMs) that can be deployed locally have recently gained popularity for privacy-sensitive tasks, with companies such as Meta, Google, and Intel playing significant roles in their development. However, the security of local LLMs through the lens of hardware cache side-channels remains unexplored. In this paper, we unveil novel side-channel vulnerabilities in local LLM inference: token value and token position leakage, which can expose both the victim's input and output text, thereby compromising user privacy. Specifically, we found that adversaries can infer the token values from the cache access patterns of the token embedding operation, and deduce the token positions from the timing of autoregressive decoding phases. To demonstrate the potential of these leaks, we design a novel eavesdropping attack framework targeting both open-source and proprietary LLM inference systems. The attack framework does not directly interact with the victim's LLM and can be executed without privilege. We evaluate the attack on a range of practical local LLM deployments (e.g., Llama, Falcon, and Gemma), and the results show that our attack achieves promising accuracy. The restored output and input text have an average edit distance of 5.2% and 17.3% to the ground truth, respectively. Furthermore, the reconstructed texts achieve average cosine similarity scores of 98.7% (input) and 98.0% (output).
[ { "version": "v1", "created": "Sat, 10 May 2025 19:06:37 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 16:04:57 GMT" } ]
2025-05-15T00:00:00
[ [ "Gao", "Zibo", "" ], [ "Hu", "Junjie", "" ], [ "Guo", "Feng", "" ], [ "Zhang", "Yixin", "" ], [ "Han", "Yinglong", "" ], [ "Liu", "Siyuan", "" ], [ "Li", "Haiyang", "" ], [ "Lv", "Zhiqiang", "" ] ]
2505.06795
Abhijit Gupta PhD
Abhijit Gupta
Decoding Futures Price Dynamics: A Regularized Sparse Autoencoder for Interpretable Multi-Horizon Forecasting and Factor Discovery
null
null
null
null
cs.LG cs.AI cs.CE
http://creativecommons.org/licenses/by-nc-nd/4.0/
Commodity price volatility creates economic challenges, necessitating accurate multi-horizon forecasting. Predicting prices for commodities like copper and crude oil is complicated by diverse interacting factors (macroeconomic, supply/demand, geopolitical, etc.). Current models often lack transparency, limiting strategic use. This paper presents a Regularized Sparse Autoencoder (RSAE), a deep learning framework for simultaneous multi-horizon commodity price prediction and discovery of interpretable latent market drivers. The RSAE forecasts prices at multiple horizons (e.g., 1-day, 1-week, 1-month) using multivariate time series. Crucially, L1 regularization ($\|\mathbf{z}\|_1$) on its latent vector $\mathbf{z}$ enforces sparsity, promoting parsimonious explanations of market dynamics through learned factors representing underlying drivers (e.g., demand, supply shocks). Drawing from energy-based models and sparse coding, the RSAE optimizes predictive accuracy while learning sparse representations. Evaluated on historical Copper and Crude Oil data with numerous indicators, our findings indicate the RSAE offers competitive multi-horizon forecasting accuracy and data-driven insights into price dynamics via its interpretable latent space, a key advantage over traditional black-box approaches.
[ { "version": "v1", "created": "Sun, 11 May 2025 00:21:53 GMT" }, { "version": "v2", "created": "Tue, 13 May 2025 06:44:43 GMT" }, { "version": "v3", "created": "Wed, 14 May 2025 17:49:51 GMT" } ]
2025-05-15T00:00:00
[ [ "Gupta", "Abhijit", "" ] ]
2505.06977
WenJu Sun
Wenju Sun and Qingyong Li and Yangli-ao Geng and Boyang Li
CAT Merging: A Training-Free Approach for Resolving Conflicts in Model Merging
null
null
null
null
cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multi-task model merging offers a promising paradigm for integrating multiple expert models into a unified model without additional training. Existing state-of-the-art techniques, such as Task Arithmetic and its variants, merge models by accumulating task vectors -- the parameter differences between pretrained and finetuned models. However, task vector accumulation is often hindered by knowledge conflicts, leading to performance degradation. To address this challenge, we propose Conflict-Aware Task Merging (CAT Merging), a novel training-free framework that selectively trims conflict-prone components from the task vectors. CAT Merging introduces several parameter-specific strategies, including projection for linear weights and masking for scaling and shifting parameters in normalization layers. Extensive experiments on vision, language, and vision-language tasks demonstrate that CAT Merging effectively suppresses knowledge conflicts, achieving average accuracy improvements of up to 2.5% (ViT-B/32) and 2.0% (ViT-L/14) over state-of-the-art methods.
[ { "version": "v1", "created": "Sun, 11 May 2025 13:24:09 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 14:11:52 GMT" } ]
2025-05-15T00:00:00
[ [ "Sun", "Wenju", "" ], [ "Li", "Qingyong", "" ], [ "Geng", "Yangli-ao", "" ], [ "Li", "Boyang", "" ] ]
2505.07051
Shannon Starr
Shannon Starr
Some Observations about the "Generalized Abundancy Index"
added 1 reference
null
null
null
math.CO math.NT math.PR
http://creativecommons.org/licenses/by/4.0/
Let $\mathcal{A}(\ell,n) \subset S_n^{\ell}$ denote the set of all $\ell$-tuples $(\pi_1,\dots,\pi_{\ell})$, for $\pi_1,\dots,\pi_{\ell} \in S_n$ satisfying: $\forall i<j$ we have $\pi_i\pi_j=\pi_j\pi_i$. Considering the action of $S_n$ on $[n]=\{1,\dots,n\}$, let $\kappa(\pi_1,\dots,\pi_{\ell})$ be equal to the number of orbits of the action of the subgroup $\langle \pi_1,\dots,\pi_{\ell} \rangle \subset S_n$. There has been interest in the study of the combinatorial numbers $A(\ell,n,k)$ equal to the cardinalities $|\{(\pi_1,\dots,\pi_{\ell}) \in \mathcal{A}(\ell,n)\, :\, \kappa(\pi_1,\dots\pi_{\ell})=k\}|$. If one defines $B(\ell,n)=A(\ell,n,1)/(n-1)!$, then it is known that $B(\ell,n) = \sum_{(f_1,\dots,f_{\ell}) \in \mathbb{N}^{\ell}} \mathbf{1}_{\{n\}}(f_1\cdots f_{\ell}) \prod_{r=1}^{\ell-1} f_r^{\ell-r}$. A special case, $\ell=2$, is $B(2,n) = \sum_{d|n} d = \sigma_1(n)$ the sum-of-divisors function. Then $A(2,n,1)/n!=B(2,n)/n$ is called the abundancy index: $\sigma_1(n)/n$. We call $B(\ell,n) n^{-\ell+1}$ the ``generalized abundancy index.'' Building on work of Abdesselam, using the probability model, we prove that $\lim_{N \to \infty} N^{-1} \sum_{n=1}^{N} B(\ell,n) n^{-\ell+1}$ equals $\zeta(2)\cdots \zeta(\ell)$. Motivated by this we state a more precise conjecture for the asymptotics of $-\zeta(2) + N^{-1}\sum_{n=1}^{N} (B(2,n)/n)$.
[ { "version": "v1", "created": "Sun, 11 May 2025 16:49:28 GMT" }, { "version": "v2", "created": "Tue, 13 May 2025 22:23:07 GMT" } ]
2025-05-15T00:00:00
[ [ "Starr", "Shannon", "" ] ]
2505.07086
Pranam Chatterjee
Tong Chen, Yinuo Zhang, Sophia Tang, Pranam Chatterjee
Multi-Objective-Guided Discrete Flow Matching for Controllable Biological Sequence Design
null
null
null
null
cs.LG q-bio.BM
http://creativecommons.org/licenses/by-nc-nd/4.0/
Designing biological sequences that satisfy multiple, often conflicting, functional and biophysical criteria remains a central challenge in biomolecule engineering. While discrete flow matching models have recently shown promise for efficient sampling in high-dimensional sequence spaces, existing approaches address only single objectives or require continuous embeddings that can distort discrete distributions. We present Multi-Objective-Guided Discrete Flow Matching (MOG-DFM), a general framework to steer any pretrained discrete flow matching generator toward Pareto-efficient trade-offs across multiple scalar objectives. At each sampling step, MOG-DFM computes a hybrid rank-directional score for candidate transitions and applies an adaptive hypercone filter to enforce consistent multi-objective progression. We also trained two unconditional discrete flow matching models, PepDFM for diverse peptide generation and EnhancerDFM for functional enhancer DNA generation, as base generation models for MOG-DFM. We demonstrate MOG-DFM's effectiveness in generating peptide binders optimized across five properties (hemolysis, non-fouling, solubility, half-life, and binding affinity), and in designing DNA sequences with specific enhancer classes and DNA shapes. In total, MOG-DFM proves to be a powerful tool for multi-property-guided biomolecule sequence design.
[ { "version": "v1", "created": "Sun, 11 May 2025 18:17:44 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 16:19:40 GMT" } ]
2025-05-15T00:00:00
[ [ "Chen", "Tong", "" ], [ "Zhang", "Yinuo", "" ], [ "Tang", "Sophia", "" ], [ "Chatterjee", "Pranam", "" ] ]
2505.07089
Yuanliang Li
Hanzheng Dai and Yuanliang Li and Zhibo Zhang and Jun Yan
RefPentester: A Knowledge-Informed Self-Reflective Penetration Testing Framework Based on Large Language Models
null
null
null
null
cs.AI
http://creativecommons.org/licenses/by/4.0/
Automated penetration testing (AutoPT) powered by large language models (LLMs) has gained attention for its ability to automate ethical hacking processes and identify vulnerabilities in target systems by leveraging the intrinsic knowledge of LLMs. However, existing LLM-based AutoPT frameworks often underperform compared to human experts in challenging tasks for several reasons: the imbalanced knowledge used in LLM training, short-sighted planning in the planning process, and hallucinations during command generation. In addition, the penetration testing (PT) process, with its trial-and-error nature, is limited by existing frameworks that lack mechanisms to learn from previous failed operations, restricting adaptive improvement of PT strategies. To address these limitations, we propose a knowledge-informed self-reflective PT framework powered by LLMs, called RefPentester, which is an AutoPT framework designed to assist human operators in identifying the current stage of the PT process, selecting appropriate tactic and technique for the stage, choosing suggested action, providing step-by-step operational guidance, and learning from previous failed operations. We also modeled the PT process as a seven-state Stage Machine to integrate the proposed framework effectively. The evaluation shows that RefPentester can successfully reveal credentials on Hack The Box's Sau machine, outperforming the baseline GPT-4o model by 16.7%. Across PT stages, RefPentester also demonstrates superior success rates on PT stage transitions.
[ { "version": "v1", "created": "Sun, 11 May 2025 18:38:00 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 00:44:05 GMT" } ]
2025-05-15T00:00:00
[ [ "Dai", "Hanzheng", "" ], [ "Li", "Yuanliang", "" ], [ "Zhang", "Zhibo", "" ], [ "Yan", "Jun", "" ] ]
2505.07356
Smarajit Karmakar Dr.
Rashmi Priya and Smarajit Karmakar
Inverse Bauschinger Effect in Active Ultrastable Glasses
null
null
null
null
cond-mat.soft cond-mat.stat-mech physics.bio-ph
http://creativecommons.org/licenses/by/4.0/
Memory effects in amorphous materials have been widely studied because of their possible widespread future applications. We show here that ultrastable glasses can exhibit a transient reversible memory effect when subjected to both a local driving force via Run-and-tumble active particles and global shear. We investigate the system's response across different yielding regimes by selectively switching the shear direction at different strains. We analyze how changes in shear direction influence yielding, post-yield behavior, and structural evolution in active amorphous solids. Our model active system exhibits an enhanced anisotropic response, displaying both conventional and inverse Bauschinger effects, depending on the deformation history. The results indicate that activity-induced shear band networks create structural memory, enabling the system to heal upon shear reversal due to the transient nature of this phenomenon. Additionally, we observe that shear softening under cyclic loading produces an irreversible, stable, and less branched network structure with increasing cycles. These findings provide novel insights into how activity and shear collectively contribute to mechanical response, including memory formation in ultrastable disordered systems.
[ { "version": "v1", "created": "Mon, 12 May 2025 08:48:14 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 04:07:35 GMT" } ]
2025-05-15T00:00:00
[ [ "Priya", "Rashmi", "" ], [ "Karmakar", "Smarajit", "" ] ]
2505.07363
Serge Massar
Serge Massar
Equilibrium Propagation for Learning in Lagrangian Dynamical Systems
8 pages, 1 figure
null
null
null
nlin.CD cs.LG physics.data-an
http://creativecommons.org/licenses/by/4.0/
We propose a method for training dynamical systems governed by Lagrangian mechanics using Equilibrium Propagation. Our approach extends Equilibrium Propagation -- initially developed for energy-based models -- to dynamical trajectories by leveraging the principle of action extremization. Training is achieved by gently nudging trajectories toward desired targets and measuring how the variables conjugate to the parameters to be trained respond. This method is particularly suited to systems with periodic boundary conditions or fixed initial and final states, enabling efficient parameter updates without requiring explicit backpropagation through time. In the case of periodic boundary conditions, this approach yields the semiclassical limit of Quantum Equilibrium Propagation. Applications to systems with dissipation are also discussed.
[ { "version": "v1", "created": "Mon, 12 May 2025 08:59:17 GMT" }, { "version": "v2", "created": "Tue, 13 May 2025 07:06:52 GMT" } ]
2025-05-15T00:00:00
[ [ "Massar", "Serge", "" ] ]
2505.07392
Spencer Bryngelson
Benjamin Wilfong and Anand Radhakrishnan and Henry Le Berre and Nikolaos Tselepidis and Benedikt Dorschner and Reuben Budiardja and Brian Cornille and Stephen Abbott and Florian Sch\"afer and Spencer H. Bryngelson
Simulating many-engine spacecraft: Exceeding 100 trillion grid points via information geometric regularization and the MFC flow solver
10 pages, 7 figures
null
null
null
physics.comp-ph cs.CE physics.flu-dyn
http://creativecommons.org/licenses/by/4.0/
This work proposes a method and optimized implementation for exascale simulations of high-speed compressible fluid flows, enabling the simulation of multi-engine rocket craft at an unprecedented scale. We significantly improve upon the state-of-the-art in terms of computational cost and memory footprint through a carefully crafted implementation of the recently proposed information geometric regularization, which eliminates the need for numerical shock capturing. Unified addressing on tightly coupled CPU--GPU platforms increases the total problem size with negligible performance hit. Despite linear stencil algorithms being memory-bound, we achieve wall clock times that are four times faster than optimized baseline numerics. This enables the execution of CFD simulations at more than 100 trillion grid points, surpassing the largest state-of-the-art publicly available simulations by an order of magnitude. Ideal weak scaling is demonstrated on OLCF Frontier and CSCS Alps using the full system, entailing 37.8K AMD MI250X GPUs (Frontier) or 9.2K NVIDIA GH200 superchips (Alps).
[ { "version": "v1", "created": "Mon, 12 May 2025 09:35:38 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 08:58:41 GMT" } ]
2025-05-15T00:00:00
[ [ "Wilfong", "Benjamin", "" ], [ "Radhakrishnan", "Anand", "" ], [ "Berre", "Henry Le", "" ], [ "Tselepidis", "Nikolaos", "" ], [ "Dorschner", "Benedikt", "" ], [ "Budiardja", "Reuben", "" ], [ "Cornille", "Brian", "" ], [ "Abbott", "Stephen", "" ], [ "Schäfer", "Florian", "" ], [ "Bryngelson", "Spencer H.", "" ] ]
2505.07407
Asif Manzoor Hasan
Asif Manzoor Hasan, Pedro Costa, Johan Larsson and Rene Pecnik
Scaling of wall pressure and the peak of streamwise turbulence intensity in compressible wall flows
10 pages, 2 figures
null
null
null
physics.flu-dyn
http://creativecommons.org/licenses/by/4.0/
This paper develops scaling laws for wall-pressure root-mean-square (r.m.s.) and the peak of streamwise turbulence intensity, accounting for both variable-property and intrinsic compressibility effects -- those associated with changes in fluid volume due to pressure variations. To develop such scaling laws, we express the target quantities as an expansion series in powers of an appropriately defined Mach number. The leading-order term is represented using the scaling relations developed for incompressible flows, but with an effective Reynolds number. Higher-order terms capture intrinsic compressibility effects and are modeled as constant coefficients, calibrated using flow cases specifically designed to isolate these effects. The resulting scaling relations are shown to be accurate for a wide range of turbulent channel flows and boundary layers.
[ { "version": "v1", "created": "Mon, 12 May 2025 09:59:43 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 00:17:32 GMT" } ]
2025-05-15T00:00:00
[ [ "Hasan", "Asif Manzoor", "" ], [ "Costa", "Pedro", "" ], [ "Larsson", "Johan", "" ], [ "Pecnik", "Rene", "" ] ]
2505.07412
Tabish Qureshi
Rashi Adhikari, Tabish Qureshi
Characterizing the Generalized Einstein-Podolsky-Rosen State
5 pages. A new section added on experimental measurement of entanglement
null
null
null
quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In their seminal paper, Einstein Podolsky and Rosen (EPR) had introduced a momentum entangled state for two particles. That state, referred to as the EPR state, has been widely used in studies on entangled particles with continuous degrees of freedom. Later that state was generalized to a form that allows varying degree of entanglement, known as the generalized EPR state. In a suitable limit it reduces to the EPR state. The generalized EPR state is theoretically analyzed here and its entanglement quantified in terms of a recently introduced generalized entanglement measure. This state can also be applied to entangled photons produced from spontaneous parametric down conversion (SPDC). The present analysis is then used in quantifying the entanglement of photons produced from the SPDC process, in terms of certain experimental parameters. A comparison is also made with the Schmidt number, which is normally used as an entanglement measure in such situations. A procedure for experimentally determining the entanglement of SPDC photons has also been described.
[ { "version": "v1", "created": "Mon, 12 May 2025 10:07:36 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 17:22:02 GMT" } ]
2025-05-15T00:00:00
[ [ "Adhikari", "Rashi", "" ], [ "Qureshi", "Tabish", "" ] ]
2505.07434
Giovanni Viglietta
Giovanni Viglietta and Yasuyuki Kachi
Efficient Lifting of Discrete Logarithms Modulo Prime Powers
15 pages
null
null
null
math.NT cs.DM
http://creativecommons.org/licenses/by/4.0/
We present a deterministic algorithm that, given a prime $p$ and a solution $x \in \mathbb Z$ to the discrete logarithm problem $a^x \equiv b \pmod p$ with $p\nmid a$, efficiently lifts it to a solution modulo $p^k$, i.e., $a^x \equiv b \pmod {p^k}$, for any fixed $k \geq 1$. The algorithm performs $k(\lceil \log_2 p\rceil +2)+O(\log p)$ multiplications modulo $p^k$ in the worst case, improving upon prior lifting methods by at least a factor of 8.
[ { "version": "v1", "created": "Mon, 12 May 2025 10:52:19 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 15:55:10 GMT" } ]
2025-05-15T00:00:00
[ [ "Viglietta", "Giovanni", "" ], [ "Kachi", "Yasuyuki", "" ] ]
2505.07574
Vinod P
Matteo Brosolo, Asmitha K. A., Rafidha Rehiman K. A., Muhammed Shafi K. P., Serena Nicolazzo, Antonino Nocera, Vinod P
Security through the Eyes of AI: How Visualization is Shaping Malware Detection
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Malware, a persistent cybersecurity threat, increasingly targets interconnected digital systems such as desktop, mobile, and IoT platforms through sophisticated attack vectors. By exploiting these vulnerabilities, attackers compromise the integrity and resilience of modern digital ecosystems. To address this risk, security experts actively employ Machine Learning or Deep Learning-based strategies, integrating static, dynamic, or hybrid approaches to categorize malware instances. Despite their advantages, these methods have inherent drawbacks and malware variants persistently evolve with increased sophistication, necessitating advancements in detection strategies. Visualization-based techniques are emerging as scalable and interpretable solutions for detecting and understanding malicious behaviors across diverse platforms including desktop, mobile, IoT, and distributed systems as well as through analysis of network packet capture files. In this comprehensive survey of more than 100 high-quality research articles, we evaluate existing visualization-based approaches applied to malware detection and classification. As a first contribution, we propose a new all-encompassing framework to study the landscape of visualization-based malware detection techniques. Within this framework, we systematically analyze state-of-the-art approaches across the critical stages of the malware detection pipeline. By analyzing not only the single techniques but also how they are combined to produce the final solution, we shed light on the main challenges in visualization-based approaches and provide insights into the advancements and potential future directions in this critical field.
[ { "version": "v1", "created": "Mon, 12 May 2025 13:53:56 GMT" }, { "version": "v2", "created": "Tue, 13 May 2025 23:35:12 GMT" } ]
2025-05-15T00:00:00
[ [ "Brosolo", "Matteo", "" ], [ "A.", "Asmitha K.", "" ], [ "A.", "Rafidha Rehiman K.", "" ], [ "P.", "Muhammed Shafi K.", "" ], [ "Nicolazzo", "Serena", "" ], [ "Nocera", "Antonino", "" ], [ "P", "Vinod", "" ] ]
2505.07634
Jian Liu
Jian Liu, Xiongtao Shi, Thai Duy Nguyen, Haitian Zhang, Tianxiang Zhang, Wei Sun, Yanjie Li, Athanasios V. Vasilakos, Giovanni Iacca, Arshad Ali Khan, Arvind Kumar, Jae Won Cho, Ajmal Mian, Lihua Xie, Erik Cambria, Lin Wang
Neural Brain: A Neuroscience-inspired Framework for Embodied Agents
51 pages, 17 figures, 9 tables
null
null
null
cs.RO cs.AI cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The rapid evolution of artificial intelligence (AI) has shifted from static, data-driven models to dynamic systems capable of perceiving and interacting with real-world environments. Despite advancements in pattern recognition and symbolic reasoning, current AI systems, such as large language models, remain disembodied, unable to physically engage with the world. This limitation has driven the rise of embodied AI, where autonomous agents, such as humanoid robots, must navigate and manipulate unstructured environments with human-like adaptability. At the core of this challenge lies the concept of Neural Brain, a central intelligence system designed to drive embodied agents with human-like adaptability. A Neural Brain must seamlessly integrate multimodal sensing and perception with cognitive capabilities. Achieving this also requires an adaptive memory system and energy-efficient hardware-software co-design, enabling real-time action in dynamic environments. This paper introduces a unified framework for the Neural Brain of embodied agents, addressing two fundamental challenges: (1) defining the core components of Neural Brain and (2) bridging the gap between static AI models and the dynamic adaptability required for real-world deployment. To this end, we propose a biologically inspired architecture that integrates multimodal active sensing, perception-cognition-action function, neuroplasticity-based memory storage and updating, and neuromorphic hardware/software optimization. Furthermore, we also review the latest research on embodied agents across these four aspects and analyze the gap between current AI systems and human intelligence. By synthesizing insights from neuroscience, we outline a roadmap towards the development of generalizable, autonomous agents capable of human-level intelligence in real-world scenarios.
[ { "version": "v1", "created": "Mon, 12 May 2025 15:05:34 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 12:56:45 GMT" } ]
2025-05-15T00:00:00
[ [ "Liu", "Jian", "" ], [ "Shi", "Xiongtao", "" ], [ "Nguyen", "Thai Duy", "" ], [ "Zhang", "Haitian", "" ], [ "Zhang", "Tianxiang", "" ], [ "Sun", "Wei", "" ], [ "Li", "Yanjie", "" ], [ "Vasilakos", "Athanasios V.", "" ], [ "Iacca", "Giovanni", "" ], [ "Khan", "Arshad Ali", "" ], [ "Kumar", "Arvind", "" ], [ "Cho", "Jae Won", "" ], [ "Mian", "Ajmal", "" ], [ "Xie", "Lihua", "" ], [ "Cambria", "Erik", "" ], [ "Wang", "Lin", "" ] ]
2505.07773
Xinji Mai
Xinji Mai, Haotian Xu, Xing W, Weinong Wang, Yingying Zhang, Wenqiang Zhang
Agent RL Scaling Law: Agent RL with Spontaneous Code Execution for Mathematical Problem Solving
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Large Language Models (LLMs) often struggle with mathematical reasoning tasks requiring precise, verifiable computation. While Reinforcement Learning (RL) from outcome-based rewards enhances text-based reasoning, understanding how agents autonomously learn to leverage external tools like code execution remains crucial. We investigate RL from outcome-based rewards for Tool-Integrated Reasoning, ZeroTIR, training base LLMs to spontaneously generate and execute Python code for mathematical problems without supervised tool-use examples. Our central contribution is we demonstrate that as RL training progresses, key metrics scale predictably. Specifically, we observe strong positive correlations where increased training steps lead to increases in the spontaneous code execution frequency, the average response length, and, critically, the final task accuracy. This suggests a quantifiable relationship between computational effort invested in training and the emergence of effective, tool-augmented reasoning strategies. We implement a robust framework featuring a decoupled code execution environment and validate our findings across standard RL algorithms and frameworks. Experiments show ZeroTIR significantly surpasses non-tool ZeroRL baselines on challenging math benchmarks. Our findings provide a foundational understanding of how autonomous tool use is acquired and scales within Agent RL, offering a reproducible benchmark for future studies. Code is released at \href{https://github.com/yyht/openrlhf_async_pipline}{https://github.com/yyht/openrlhf\_async\_pipline}.
[ { "version": "v1", "created": "Mon, 12 May 2025 17:23:34 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 04:15:06 GMT" } ]
2025-05-15T00:00:00
[ [ "Mai", "Xinji", "" ], [ "Xu", "Haotian", "" ], [ "W", "Xing", "" ], [ "Wang", "Weinong", "" ], [ "Zhang", "Yingying", "" ], [ "Zhang", "Wenqiang", "" ] ]
2505.07835
Alex C. Y. Wong
Alex C. Y. Wong, Duncan McFarlane, C. Ellarby, M. Lee, and M. Kuok
Intelligent Product 3.0: Decentralised AI Agents and Web3 Intelligence Standards
18 pages, 1 Figure, 3 Tables; Corrected typo in Section 3.4 heading
null
null
null
cs.NI cs.AI cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Twenty-five years ago, the specification of the Intelligent Product was established, envisaging real-time connectivity that not only enables products to gather accurate data about themselves but also allows them to assess and influence their own destiny. Early work by the Auto-ID project focused on creating a single, open-standard repository for storing and retrieving product information, laying a foundation for scalable connectivity. A decade later, the approach was revisited in light of low-cost RFID systems that promised a low-cost link between physical goods and networked information environments. Since then, advances in blockchain, Web3, and artificial intelligence have introduced unprecedented levels of resilience, consensus, and autonomy. By leveraging decentralised identity, blockchain-based product information and history, and intelligent AI-to-AI collaboration, this paper examines these developments and outlines a new specification for the Intelligent Product 3.0, illustrating how decentralised and AI-driven capabilities facilitate seamless interaction between physical AI and everyday products.
[ { "version": "v1", "created": "Fri, 2 May 2025 22:01:17 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 11:10:49 GMT" } ]
2025-05-15T00:00:00
[ [ "Wong", "Alex C. Y.", "" ], [ "McFarlane", "Duncan", "" ], [ "Ellarby", "C.", "" ], [ "Lee", "M.", "" ], [ "Kuok", "M.", "" ] ]
2505.07887
Songyin Wu
Songyin Wu, Zhaoyang Lv, Yufeng Zhu, Duncan Frost, Zhengqin Li, Ling-Qi Yan, Carl Ren, Richard Newcombe, Zhao Dong
Monocular Online Reconstruction with Enhanced Detail Preservation
Accepted to SIGGRAPH 2025 (Conference Track). Project page: https://poiw.github.io/MODP
null
null
null
cs.GR cs.CV
http://creativecommons.org/licenses/by-nc-sa/4.0/
We propose an online 3D Gaussian-based dense mapping framework for photorealistic details reconstruction from a monocular image stream. Our approach addresses two key challenges in monocular online reconstruction: distributing Gaussians without relying on depth maps and ensuring both local and global consistency in the reconstructed maps. To achieve this, we introduce two key modules: the Hierarchical Gaussian Management Module for effective Gaussian distribution and the Global Consistency Optimization Module for maintaining alignment and coherence at all scales. In addition, we present the Multi-level Occupancy Hash Voxels (MOHV), a structure that regularizes Gaussians for capturing details across multiple levels of granularity. MOHV ensures accurate reconstruction of both fine and coarse geometries and textures, preserving intricate details while maintaining overall structural integrity. Compared to state-of-the-art RGB-only and even RGB-D methods, our framework achieves superior reconstruction quality with high computational efficiency. Moreover, it integrates seamlessly with various tracking systems, ensuring generality and scalability.
[ { "version": "v1", "created": "Sun, 11 May 2025 01:49:09 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 03:15:06 GMT" } ]
2025-05-15T00:00:00
[ [ "Wu", "Songyin", "" ], [ "Lv", "Zhaoyang", "" ], [ "Zhu", "Yufeng", "" ], [ "Frost", "Duncan", "" ], [ "Li", "Zhengqin", "" ], [ "Yan", "Ling-Qi", "" ], [ "Ren", "Carl", "" ], [ "Newcombe", "Richard", "" ], [ "Dong", "Zhao", "" ] ]
2505.07890
Kutay Ert\"urk
Kutay Ert\"urk, Furkan Alt{\i}n{\i}\c{s}{\i}k, \.Irem Sar{\i}alt{\i}n, \"Omer Nezih Gerek
TSLFormer: A Lightweight Transformer Model for Turkish Sign Language Recognition Using Skeletal Landmarks
null
null
null
null
cs.CL eess.IV
http://creativecommons.org/licenses/by-nc-sa/4.0/
This study presents TSLFormer, a light and robust word-level Turkish Sign Language (TSL) recognition model that treats sign gestures as ordered, string-like language. Instead of using raw RGB or depth videos, our method only works with 3D joint positions - articulation points - extracted using Google's Mediapipe library, which focuses on the hand and torso skeletal locations. This creates efficient input dimensionality reduction while preserving important semantic gesture information. Our approach revisits sign language recognition as sequence-to-sequence translation, inspired by the linguistic nature of sign languages and the success of transformers in natural language processing. Since TSLFormer uses the self-attention mechanism, it effectively captures temporal co-occurrence within gesture sequences and highlights meaningful motion patterns as words unfold. Evaluated on the AUTSL dataset with over 36,000 samples and 227 different words, TSLFormer achieves competitive performance with minimal computational cost. These results show that joint-based input is sufficient for enabling real-time, mobile, and assistive communication systems for hearing-impaired individuals.
[ { "version": "v1", "created": "Sun, 11 May 2025 14:30:56 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 16:43:25 GMT" } ]
2025-05-15T00:00:00
[ [ "Ertürk", "Kutay", "" ], [ "Altınışık", "Furkan", "" ], [ "Sarıaltın", "İrem", "" ], [ "Gerek", "Ömer Nezih", "" ] ]
2505.07961
Xuechen Zhang
Xuechen Zhang, Zijian Huang, Chenshun Ni, Ziyang Xiong, Jiasi Chen, Samet Oymak
Making Small Language Models Efficient Reasoners: Intervention, Supervision, Reinforcement
null
null
null
null
cs.LG
http://creativecommons.org/licenses/by/4.0/
Recent research enhances language model reasoning by scaling test-time compute via longer chain-of-thought traces. This often improves accuracy but also introduces redundancy and high computational cost, especially for small language models distilled with supervised fine-tuning (SFT). In this work, we propose new algorithms to improve token-efficient reasoning with small-scale models by effectively trading off accuracy and computation. We first show that the post-SFT model fails to determine the optimal stopping point of the reasoning process, resulting in verbose and repetitive outputs. Verbosity also significantly varies across wrong vs correct responses. To address these issues, we propose two solutions: (1) Temperature scaling (TS) to control the stopping point for the thinking phase and thereby trace length, and (2) TLDR: a length-regularized reinforcement learning method based on GRPO that facilitates multi-level trace length control (e.g. short, medium, long reasoning). Experiments on four reasoning benchmarks, MATH500, AMC, AIME24 and OlympiadBench, demonstrate that TS is highly effective compared to s1's budget forcing approach and TLDR significantly improves token efficiency by about 50% with minimal to no accuracy loss over the SFT baseline. Moreover, TLDR also facilitates flexible control over the response length, offering a practical and effective solution for token-efficient reasoning in small models. Ultimately, our work reveals the importance of stopping time control, highlights shortcomings of pure SFT, and provides effective algorithmic recipes.
[ { "version": "v1", "created": "Mon, 12 May 2025 18:04:39 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 01:42:08 GMT" } ]
2025-05-15T00:00:00
[ [ "Zhang", "Xuechen", "" ], [ "Huang", "Zijian", "" ], [ "Ni", "Chenshun", "" ], [ "Xiong", "Ziyang", "" ], [ "Chen", "Jiasi", "" ], [ "Oymak", "Samet", "" ] ]
2505.08020
Daniel Cranston
Stijn Cambie, Wouter Cames van Batenburg, Daniel W. Cranston, Jan van den Heuvel, Ross J. Kang
Reconfiguration of List Colourings
27 pages, 4 figures
null
null
null
math.CO cs.DM cs.DS
http://creativecommons.org/licenses/by/4.0/
Given a proper (list) colouring of a graph $G$, a recolouring step changes the colour at a single vertex to another colour (in its list) that is currently unused on its neighbours, hence maintaining a proper colouring. Suppose that each vertex $v$ has its own private list $L(v)$ of allowed colours such that $|L(v)|\ge \mbox{deg}(v)+1$. We prove that if $G$ is connected and its maximum degree $\Delta$ is at least $3$, then for any two proper $L$-colourings in which at least one vertex can be recoloured, one can be transformed to the other by a sequence of $O(|V(G)|^2)$ recolouring steps. We also show that reducing the list-size of a single vertex $w$ to $\mbox{deg}(w)$ can lead to situations where the space of proper $L$-colourings is `shattered'. Our results can be interpreted as showing a sharp phase transition in the Glauber dynamics of proper $L$-colourings of graphs. This constitutes a `local' strengthening and generalisation of a result of Feghali, Johnson, and Paulusma, which considered the situation where the lists are all identical to $\{1,\ldots,\Delta+1\}$.
[ { "version": "v1", "created": "Mon, 12 May 2025 19:41:48 GMT" } ]
2025-05-15T00:00:00
[ [ "Cambie", "Stijn", "" ], [ "van Batenburg", "Wouter Cames", "" ], [ "Cranston", "Daniel W.", "" ], [ "Heuvel", "Jan van den", "" ], [ "Kang", "Ross J.", "" ] ]
2505.08037
Yutong Liu
Yutong Liu, Feng Xiao, Ziyue Zhang, Yongbin Yu, Cheng Huang, Fan Gao, Xiangxiang Wang, Ma-bao Ban, Manping Fan, Thupten Tsering, Cheng Huang, Gadeng Luosang, Renzeng Duojie, Nyima Tashi
TiSpell: A Semi-Masked Methodology for Tibetan Spelling Correction covering Multi-Level Error with Data Augmentation
14 pages, 7 figures
null
null
null
cs.CL cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multi-level Tibetan spelling correction addresses errors at both the character and syllable levels within a unified model. Existing methods focus mainly on single-level correction and lack effective integration of both levels. Moreover, there are no open-source datasets or augmentation methods tailored for this task in Tibetan. To tackle this, we propose a data augmentation approach using unlabeled text to generate multi-level corruptions, and introduce TiSpell, a semi-masked model capable of correcting both character- and syllable-level errors. Although syllable-level correction is more challenging due to its reliance on global context, our semi-masked strategy simplifies this process. We synthesize nine types of corruptions on clean sentences to create a robust training set. Experiments on both simulated and real-world data demonstrate that TiSpell, trained on our dataset, outperforms baseline models and matches the performance of state-of-the-art approaches, confirming its effectiveness.
[ { "version": "v1", "created": "Mon, 12 May 2025 20:08:05 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 04:04:08 GMT" } ]
2025-05-15T00:00:00
[ [ "Liu", "Yutong", "" ], [ "Xiao", "Feng", "" ], [ "Zhang", "Ziyue", "" ], [ "Yu", "Yongbin", "" ], [ "Huang", "Cheng", "" ], [ "Gao", "Fan", "" ], [ "Wang", "Xiangxiang", "" ], [ "Ban", "Ma-bao", "" ], [ "Fan", "Manping", "" ], [ "Tsering", "Thupten", "" ], [ "Huang", "Cheng", "" ], [ "Luosang", "Gadeng", "" ], [ "Duojie", "Renzeng", "" ], [ "Tashi", "Nyima", "" ] ]
2505.08048
Sian Lee
Sian Lee, Haeseung Seo, Aiping Xiong, Dongwon Lee
Partisan Fact-Checkers' Warnings Can Effectively Correct Individuals' Misbeliefs About Political Misinformation
To appear in International AAAI Conference on Web and Social Media (ICWSM) 2025
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Political misinformation, particularly harmful when it aligns with individuals' preexisting beliefs and political ideologies, has become widespread on social media platforms. In response, platforms like Facebook and X introduced warning messages leveraging fact-checking results from third-party fact-checkers to alert users against false content. However, concerns persist about the effectiveness of these fact-checks, especially when fact-checkers are perceived as politically biased. To address these concerns, this study presents findings from an online human-subject experiment (N=216) investigating how the political stances of fact-checkers influence their effectiveness in correcting misbeliefs about political misinformation. Our findings demonstrate that partisan fact-checkers can decrease the perceived accuracy of political misinformation and correct misbeliefs without triggering backfire effects. This correction is even more pronounced when the misinformation aligns with individuals' political ideologies. Notably, while previous research suggests that fact-checking warnings are less effective for conservatives than liberals, our results suggest that explicitly labeled partisan fact-checkers, positioned as political counterparts to conservatives, are particularly effective in reducing conservatives' misbeliefs toward pro-liberal misinformation.
[ { "version": "v1", "created": "Mon, 12 May 2025 20:34:50 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 15:19:43 GMT" } ]
2025-05-15T00:00:00
[ [ "Lee", "Sian", "" ], [ "Seo", "Haeseung", "" ], [ "Xiong", "Aiping", "" ], [ "Lee", "Dongwon", "" ] ]
2505.08090
Luc Ta
Luc Ta
Equivalences of racks, Legendrian racks, and symmetric racks
13 pages, 1 figure, 1 table; comments welcome. Simplified the notation in Ex. 2.16, fixed a typo in Prop. 5.9, and added clarification to the proofs of Prop. 4.2 and Thm. 1.2
null
null
null
math.GT math.GR math.QA
http://creativecommons.org/licenses/by/4.0/
Racks and Legendrian racks are nonassociative algebraic structures based on the framed and Legendrian Reidemeister moves, respectively. Motivated by the classification problem for Legendrian knots, we construct an equivalence of categories between racks and Legendrian racks (and, hence, GL-quandles). We deduce equivalences between kink-involutory racks and Legendrian quandles, involutory racks and Legendrian kei, and the respective pairs of full subcategories whose objects are medial. As applications, we classify objects in these categories up to order 8 and classify several families of symmetric racks; these results are likely to be of independent interest. In particular, the categories of kei with good involutions, Legendrian kei, and involutory racks are all equivalent.
[ { "version": "v1", "created": "Mon, 12 May 2025 21:52:32 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 14:41:15 GMT" } ]
2025-05-15T00:00:00
[ [ "Ta", "Luc", "" ] ]
2505.08167
Ruilin Liu
Ruilin Liu, Zhixiao Zhao, Jieqiong Li, Chang Liu, Dongbo Wang
Fusing Bidirectional Chains of Thought and Reward Mechanisms A Method for Enhancing Question-Answering Capabilities of Large Language Models for Chinese Intangible Cultural Heritage
22 pages, 5 figures
null
null
null
cs.CL cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The rapid development of large language models (LLMs) has provided significant support and opportunities for the advancement of domain-specific LLMs. However, fine-tuning these large models using Intangible Cultural Heritage (ICH) data inevitably faces challenges such as bias, incorrect knowledge inheritance, and catastrophic forgetting. To address these issues, we propose a novel training method that integrates a bidirectional chains of thought and a reward mechanism. This method is built upon ICH-Qwen, a large language model specifically designed for the field of intangible cultural heritage. The proposed method enables the model to not only perform forward reasoning but also enhances the accuracy of the generated answers by utilizing reverse questioning and reverse reasoning to activate the model's latent knowledge. Additionally, a reward mechanism is introduced during training to optimize the decision-making process. This mechanism improves the quality of the model's outputs through structural and content evaluations with different weighting schemes. We conduct comparative experiments on ICH-Qwen, with results demonstrating that our method outperforms 0-shot, step-by-step reasoning, knowledge distillation, and question augmentation methods in terms of accuracy, Bleu-4, and Rouge-L scores on the question-answering task. Furthermore, the paper highlights the effectiveness of combining the bidirectional chains of thought and reward mechanism through ablation experiments. In addition, a series of generalizability experiments are conducted, with results showing that the proposed method yields improvements on various domain-specific datasets and advanced models in areas such as Finance, Wikidata, and StrategyQA. This demonstrates that the method is adaptable to multiple domains and provides a valuable approach for model training in future applications across diverse fields.
[ { "version": "v1", "created": "Tue, 13 May 2025 02:05:25 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 01:35:33 GMT" } ]
2025-05-15T00:00:00
[ [ "Liu", "Ruilin", "" ], [ "Zhao", "Zhixiao", "" ], [ "Li", "Jieqiong", "" ], [ "Liu", "Chang", "" ], [ "Wang", "Dongbo", "" ] ]
2505.08175
Zachary Novack
Zachary Novack, Zach Evans, Zack Zukowski, Josiah Taylor, CJ Carr, Julian Parker, Adnan Al-Sinan, Gian Marco Iodice, Julian McAuley, Taylor Berg-Kirkpatrick, Jordi Pons
Fast Text-to-Audio Generation with Adversarial Post-Training
null
null
null
null
cs.SD cs.AI cs.LG cs.MM eess.AS
http://creativecommons.org/licenses/by/4.0/
Text-to-audio systems, while increasingly performant, are slow at inference time, thus making their latency unpractical for many creative applications. We present Adversarial Relativistic-Contrastive (ARC) post-training, the first adversarial acceleration algorithm for diffusion/flow models not based on distillation. While past adversarial post-training methods have struggled to compare against their expensive distillation counterparts, ARC post-training is a simple procedure that (1) extends a recent relativistic adversarial formulation to diffusion/flow post-training and (2) combines it with a novel contrastive discriminator objective to encourage better prompt adherence. We pair ARC post-training with a number optimizations to Stable Audio Open and build a model capable of generating $\approx$12s of 44.1kHz stereo audio in $\approx$75ms on an H100, and $\approx$7s on a mobile edge-device, the fastest text-to-audio model to our knowledge.
[ { "version": "v1", "created": "Tue, 13 May 2025 02:25:47 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 06:07:26 GMT" } ]
2025-05-15T00:00:00
[ [ "Novack", "Zachary", "" ], [ "Evans", "Zach", "" ], [ "Zukowski", "Zack", "" ], [ "Taylor", "Josiah", "" ], [ "Carr", "CJ", "" ], [ "Parker", "Julian", "" ], [ "Al-Sinan", "Adnan", "" ], [ "Iodice", "Gian Marco", "" ], [ "McAuley", "Julian", "" ], [ "Berg-Kirkpatrick", "Taylor", "" ], [ "Pons", "Jordi", "" ] ]
2505.08221
Dongsheng Sui
Dongsheng Sui, Cunhua Pan, Hong Ren, Jiahua Wan, Liuchang Zhuo, Jing Jin, Qixing Wang and Jiangzhou Wang
Performance Analysis of Cooperative Integrated Sensing and Communications for 6G Networks
null
null
null
null
eess.SP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we aim to effectively characterize the performance of cooperative integrated sensing and communication (ISAC) networks and to reveal how performance metrics relate to network parameters. To this end, we introduce a generalized stochastic geometry framework to model the cooperative ISAC networks, which approximates the spatial randomness of the network deployment. Based on this framework, we derive analytical expressions for key performance metrics in both communication and sensing domains, with a particular focus on communication coverage probability and radar information rate. The analytical expressions derived explicitly highlight how performance metrics depend on network parameters, thereby offering valuable insights into the deployment and design of cooperative ISAC networks. In the end, we validate the theoretical performance analysis through Monte Carlo simulation results. Our results demonstrate that increasing the number of cooperative base stations (BSs) significantly improves both metrics, while increasing the BS deployment density has a limited impact on communication coverage probability but substantially enhances the radar information rate. Additionally, increasing the number of transmit antennas is effective when the total number of transmit antennas is relatively small. The incremental performance gain reduces with the increase of the number of transmit antennas, suggesting that indiscriminately increasing antennas is not an efficient strategy to improve the performance of the system in cooperative ISAC networks.
[ { "version": "v1", "created": "Tue, 13 May 2025 04:37:56 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 01:44:34 GMT" } ]
2025-05-15T00:00:00
[ [ "Sui", "Dongsheng", "" ], [ "Pan", "Cunhua", "" ], [ "Ren", "Hong", "" ], [ "Wan", "Jiahua", "" ], [ "Zhuo", "Liuchang", "" ], [ "Jin", "Jing", "" ], [ "Wang", "Qixing", "" ], [ "Wang", "Jiangzhou", "" ] ]
2505.08233
Santhoshkumar Peddi
Santhoshkumar Peddi and Soham Bandyopadhyay and Debasis Samanta
G-MSGINet: A Grouped Multi-Scale Graph-Involution Network for Contactless Fingerprint Recognition
null
null
null
null
cs.CV
http://creativecommons.org/licenses/by-nc-nd/4.0/
This paper presents G-MSGINet, a unified and efficient framework for robust contactless fingerprint recognition that jointly performs minutiae localization and identity embedding directly from raw input images. Existing approaches rely on multi-branch architectures, orientation labels, or complex preprocessing steps, which limit scalability and generalization across real-world acquisition scenarios. In contrast, the proposed architecture introduces the GMSGI layer, a novel computational module that integrates grouped pixel-level involution, dynamic multi-scale kernel generation, and graph-based relational modelling into a single processing unit. Stacked GMSGI layers progressively refine both local minutiae-sensitive features and global topological representations through end-to-end optimization. The architecture eliminates explicit orientation supervision and adapts graph connectivity directly from learned kernel descriptors, thereby capturing meaningful structural relationships among fingerprint regions without fixed heuristics. Extensive experiments on three benchmark datasets, namely PolyU, CFPose, and Benchmark 2D/3D, demonstrate that G-MSGINet consistently achieves minutiae F1-scores in the range of $0.83\pm0.02$ and Rank-1 identification accuracies between 97.0% and 99.1%, while maintaining an Equal Error Rate (EER) as low as 0.5%. These results correspond to improvements of up to 4.8% in F1-score and 1.4% in Rank-1 accuracy when compared to prior methods, using only 0.38 million parameters and 6.63 giga floating-point operations, which represents up to ten times fewer parameters than competitive baselines. This highlights the scalability and effectiveness of G-MSGINet in real-world contactless biometric recognition scenarios.
[ { "version": "v1", "created": "Tue, 13 May 2025 05:24:24 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 06:16:41 GMT" } ]
2025-05-15T00:00:00
[ [ "Peddi", "Santhoshkumar", "" ], [ "Bandyopadhyay", "Soham", "" ], [ "Samanta", "Debasis", "" ] ]
2505.08254
Zhuo-Cheng Xiao
Zhongyi Wang, Louis Tao, Zhuo-Cheng Xiao
Efficient, simulation-free estimators of firing rates with Markovian surrogates
9 pages, 5 figures
null
null
null
q-bio.NC math.PR
http://creativecommons.org/licenses/by/4.0/
Spiking neural networks (SNNs) are powerful mathematical models that integrate the biological details of neural systems, but their complexity often makes them computationally expensive and analytically untractable. The firing rate of an SNN is a crucial first-order statistic to characterize network activity. However, estimating firing rates analytically from even simplified SNN models is challenging due to 1) the intricate dependence between the nonlinear network dynamics and parameters, and 2) the singularity and irreversibility of spikes. In this Letter, we propose a class of computationally efficient, simulation-free estimators of firing rates. This is based on a hierarchy of Markovian approximations that reduces the complexity of SNN dynamics. We show that while considering firing rates alone is insufficient for accurate estimations of themselves, the information of spiking synchrony dramatically improves the estimator's accuracy. This approach provides a practical tool for brain modelers, directly mapping biological parameters to firing rate.
[ { "version": "v1", "created": "Tue, 13 May 2025 06:04:02 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 15:52:14 GMT" } ]
2025-05-15T00:00:00
[ [ "Wang", "Zhongyi", "" ], [ "Tao", "Louis", "" ], [ "Xiao", "Zhuo-Cheng", "" ] ]
2505.08301
Sanghun Lee
Jihyeon Lee and Sanghun Lee
Modified Hawking mass and rigidity of three-manifolds with boundary
null
null
null
null
math.DG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we prove a rigidity result for three-dimensional Riemannian manifolds with boundary, under the assumption that a free boundary minimal two-disk, which locally maximizes a modified Hawking mass, is embedded in a $3$-dimensional Riemannian manifold with negative scalar curvature and mean convex boundary. First, we establish area estimates for free boundary strictly stable two-disks. Finally, we show that the $3$-dimensional Riemannian manifold with boundary is locally isometric to the half anti-de Sitter-Schwarzschild manifold.
[ { "version": "v1", "created": "Tue, 13 May 2025 07:25:27 GMT" } ]
2025-05-15T00:00:00
[ [ "Lee", "Jihyeon", "" ], [ "Lee", "Sanghun", "" ] ]
2505.08320
YoonHyuk Choi
Yoonhyuk Choi, Chong-Kwon Kim
SpecSphere: Dual-Pass Spectral-Spatial Graph Neural Networks with Certified Robustness
null
null
null
null
cs.LG
http://creativecommons.org/licenses/by/4.0/
We introduce SpecSphere, the first dual-pass spectral-spatial GNN that certifies every prediction against both $\ell\_{0}$ edge flips and $\ell\_{\infty}$ feature perturbations, adapts to the full homophily-heterophily spectrum, and surpasses the expressive power of 1-Weisfeiler-Lehman while retaining linear-time complexity. Our model couples a Chebyshev-polynomial spectral branch with an attention-gated spatial branch and fuses their representations through a lightweight MLP trained in a cooperative-adversarial min-max game. We further establish (i) a uniform Chebyshev approximation theorem, (ii) minimax-optimal risk across the homophily-heterophily spectrum, (iii) closed-form robustness certificates, and (iv) universal approximation strictly beyond 1-WL. SpecSphere achieves state-of-the-art node-classification accuracy and delivers tighter certified robustness guarantees on real-world benchmarks. These results demonstrate that high expressivity, heterophily adaptation, and provable robustness can coexist within a single, scalable architecture.
[ { "version": "v1", "created": "Tue, 13 May 2025 08:00:16 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 17:07:37 GMT" } ]
2025-05-15T00:00:00
[ [ "Choi", "Yoonhyuk", "" ], [ "Kim", "Chong-Kwon", "" ] ]
2505.08401
Tarun Dalal
Francesc Bars, Tarun Dalal
The modular automorphisms of quotient modular curves
null
null
null
null
math.NT math.AG math.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We obtain the modular automorphism group of any quotient modular curve of level $N$, with $4,9\nmid N$. In particular, we obtain some non-expected automorphisms of order 3 that appear for the quotient modular curves when the Atkin-Lehner involution $w_{25}$ belongs to the quotient modular group, such automorphisms are not necessarily defined over $\mathbb{Q}$. As a consequence of the results, we obtain the full automorphism group of the quotient modular curve $X_0^*(N^2)$, for sufficiently large $N$.
[ { "version": "v1", "created": "Tue, 13 May 2025 09:56:14 GMT" } ]
2025-05-15T00:00:00
[ [ "Bars", "Francesc", "" ], [ "Dalal", "Tarun", "" ] ]
2505.08435
Mehran Sarmadi
Mehran Sarmadi, Morteza Alikhani, Erfan Zinvandi, Zahra Pourbahman
Hakim: Farsi Text Embedding Model
null
null
null
null
cs.CL cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent advancements in text embedding have significantly improved natural language understanding across many languages, yet Persian remains notably underrepresented in large-scale embedding research. In this paper, we present Hakim, a novel state-of-the-art Persian text embedding model that achieves a 8.5% performance improvement over existing approaches on the FaMTEB benchmark, outperforming all previously developed Persian language models. As part of this work, we introduce three new datasets - Corpesia, Pairsia-sup, and Pairsia-unsup - to support supervised and unsupervised training scenarios. Additionally, Hakim is designed for applications in chatbots and retrieval-augmented generation (RAG) systems, particularly addressing retrieval tasks that require incorporating message history within these systems. We also propose a new baseline model built on the BERT architecture. Our language model consistently achieves higher accuracy across various Persian NLP tasks, while the RetroMAE-based model proves particularly effective for textual information retrieval applications. Together, these contributions establish a new foundation for advancing Persian language understanding.
[ { "version": "v1", "created": "Tue, 13 May 2025 10:57:32 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 13:47:12 GMT" } ]
2025-05-15T00:00:00
[ [ "Sarmadi", "Mehran", "" ], [ "Alikhani", "Morteza", "" ], [ "Zinvandi", "Erfan", "" ], [ "Pourbahman", "Zahra", "" ] ]
2505.08477
Chenhui Xie
Runyu Lei, Chen-Hui Xie, Jiayi Liu, Zhong Liu, Xin Liu, Yu Gao, Sichun Sun, Jinxing Zhang
Emerging axion detection in artificial magnetoelectric materials
17 pages, 5 figures
null
null
null
hep-ph cond-mat.mes-hall cond-mat.mtrl-sci cond-mat.str-el hep-ex
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The origin of dark matter is a fundamental problem in physics. Axions are considered a key component of dark matter, characterized by very weak Chern-Simons couplings to electromagnetism, gravity, and fermions. We propose a novel symmetry-breaking detection mechanism in magnetoelectric materials, allowing for a linear axionic coupling between magnetism and ferroelectric polarization. We focus on strain gradient Sr2IrO4, where the breaking of space-inversion symmetry results in an emergent polar phase and out-of-plane magnetic moment, exhibiting a flexomagnetoelectric effect. In this material, the linear P||M enables direct coupling between the external axion field and the intrinsic axion-like field within the material. This mechanism amplifies the weak electromagnetic signals induced by axions, paving the way for pioneering axion detection. These signals can be detected by monitoring changes in macroscopic physical quantities, such as the magnetoelectric and magnetic responses. In contrast to conventional detection techniques, this mechanism significantly enhances the sensitivity of the axion-electron and axion-photon coupling, providing a novel platform for axion detection and advancing the study of dark matter through the magnetoelectric effect.
[ { "version": "v1", "created": "Tue, 13 May 2025 12:04:30 GMT" } ]
2025-05-15T00:00:00
[ [ "Lei", "Runyu", "" ], [ "Xie", "Chen-Hui", "" ], [ "Liu", "Jiayi", "" ], [ "Liu", "Zhong", "" ], [ "Liu", "Xin", "" ], [ "Gao", "Yu", "" ], [ "Sun", "Sichun", "" ], [ "Zhang", "Jinxing", "" ] ]
2505.08526
Wuzhe Xu
Wuzhe Xu, Yulong Lu, Sifan Wang and Tong-Rui Liu
Improving Data Fidelity via Diffusion Model-based Correction and Super-Resolution
null
null
null
null
math.NA cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a unified diffusion model-based correction and super-resolution method to enhance the fidelity and resolution of diverse low-quality data through a two-step pipeline. First, the correction step employs a novel enhanced stochastic differential editing technique based on an imbalanced perturbation and denoising process, ensuring robust and effective bias correction at the low-resolution level. The robustness and effectiveness of this approach are validated theoretically and experimentally. Next, the super-resolution step leverages cascaded conditional diffusion models to iteratively refine the corrected data to high-resolution. Numerical experiments on three PDE problems and a climate dataset demonstrate that the proposed method effectively enhances low-fidelity, low-resolution data by correcting numerical errors and noise while simultaneously improving resolution to recover fine-scale structures.
[ { "version": "v1", "created": "Tue, 13 May 2025 12:59:07 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 13:32:25 GMT" } ]
2025-05-15T00:00:00
[ [ "Xu", "Wuzhe", "" ], [ "Lu", "Yulong", "" ], [ "Wang", "Sifan", "" ], [ "Liu", "Tong-Rui", "" ] ]
2505.08527
Zheang Huai
Zheang Huai, Hui Tang, Yi Li, Zhuangzhuang Chen, Xiaomeng Li
Leveraging Segment Anything Model for Source-Free Domain Adaptation via Dual Feature Guided Auto-Prompting
null
null
null
null
cs.CV
http://creativecommons.org/licenses/by-nc-nd/4.0/
Source-free domain adaptation (SFDA) for segmentation aims at adapting a model trained in the source domain to perform well in the target domain with only the source model and unlabeled target data.Inspired by the recent success of Segment Anything Model (SAM) which exhibits the generality of segmenting images of various modalities and in different domains given human-annotated prompts like bounding boxes or points, we for the first time explore the potentials of Segment Anything Model for SFDA via automatedly finding an accurate bounding box prompt. We find that the bounding boxes directly generated with existing SFDA approaches are defective due to the domain gap.To tackle this issue, we propose a novel Dual Feature Guided (DFG) auto-prompting approach to search for the box prompt. Specifically, the source model is first trained in a feature aggregation phase, which not only preliminarily adapts the source model to the target domain but also builds a feature distribution well-prepared for box prompt search. In the second phase, based on two feature distribution observations, we gradually expand the box prompt with the guidance of the target model feature and the SAM feature to handle the class-wise clustered target features and the class-wise dispersed target features, respectively. To remove the potentially enlarged false positive regions caused by the over-confident prediction of the target model, the refined pseudo-labels produced by SAM are further postprocessed based on connectivity analysis. Experiments on 3D and 2D datasets indicate that our approach yields superior performance compared to conventional methods. Code is available at https://github.com/xmed-lab/DFG.
[ { "version": "v1", "created": "Tue, 13 May 2025 13:00:48 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 02:43:13 GMT" } ]
2025-05-15T00:00:00
[ [ "Huai", "Zheang", "" ], [ "Tang", "Hui", "" ], [ "Li", "Yi", "" ], [ "Chen", "Zhuangzhuang", "" ], [ "Li", "Xiaomeng", "" ] ]
2505.08536
Jiafu Hao
Jiafu Hao, Chentao Yue, Hao Chang, Branka Vucetic, and Yonghui Li
Short Wins Long: Short Codes with Language Model Semantic Correction Outperform Long Codes
6 pages, 3 figures
null
null
null
eess.SP cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a novel semantic-enhanced decoding scheme for transmitting natural language sentences with multiple short block codes over noisy wireless channels. After ASCII source coding, the natural language sentence message is divided into segments, where each is encoded with short block channel codes independently before transmission. At the receiver, each short block of codewords is decoded in parallel, followed by a semantic error correction (SEC) model to reconstruct corrupted segments semantically. We design and train the SEC model based on Bidirectional and Auto-Regressive Transformers (BART). Simulations demonstrate that the proposed scheme can significantly outperform encoding the sentence with one conventional long LDPC code, in terms of block error rate (BLER), semantic metrics, and decoding latency. Finally, we proposed a semantic hybrid automatic repeat request (HARQ) scheme to further enhance the error performance, which selectively requests retransmission depends on semantic uncertainty.
[ { "version": "v1", "created": "Tue, 13 May 2025 13:07:01 GMT" } ]
2025-05-15T00:00:00
[ [ "Hao", "Jiafu", "" ], [ "Yue", "Chentao", "" ], [ "Chang", "Hao", "" ], [ "Vucetic", "Branka", "" ], [ "Li", "Yonghui", "" ] ]
2505.08537
Mohamed Lamine Mekhalfi
Mohamed Lamine Mekhalfi, Paul Chippendale, Fabio Poiesi, Samuele Bonecher, Gilberto Osler, Nicola Zancanella
The RaspGrade Dataset: Towards Automatic Raspberry Ripeness Grading with Deep Learning
null
null
null
null
cs.CV
http://creativecommons.org/licenses/by-nc-sa/4.0/
This research investigates the application of computer vision for rapid, accurate, and non-invasive food quality assessment, focusing on the novel challenge of real-time raspberry grading into five distinct classes within an industrial environment as the fruits move along a conveyor belt. To address this, a dedicated dataset of raspberries, namely RaspGrade, was acquired and meticulously annotated. Instance segmentation experiments revealed that accurate fruit-level masks can be obtained; however, the classification of certain raspberry grades presents challenges due to color similarities and occlusion, while others are more readily distinguishable based on color. The acquired and annotated RaspGrade dataset is accessible on Hugging Face at: https://huggingface.co/datasets/FBK-TeV/RaspGrade.
[ { "version": "v1", "created": "Tue, 13 May 2025 13:07:29 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 10:39:44 GMT" } ]
2025-05-15T00:00:00
[ [ "Mekhalfi", "Mohamed Lamine", "" ], [ "Chippendale", "Paul", "" ], [ "Poiesi", "Fabio", "" ], [ "Bonecher", "Samuele", "" ], [ "Osler", "Gilberto", "" ], [ "Zancanella", "Nicola", "" ] ]
2505.08550
Wenzhen Yue
Wenzhen Yue, Yong Liu, Haoxuan Li, Hao Wang, Xianghua Ying, Ruohao Guo, Bowei Xing, Ji Shi
OLinear: A Linear Model for Time Series Forecasting in Orthogonally Transformed Domain
null
null
null
null
cs.LG stat.ML
http://creativecommons.org/licenses/by/4.0/
This paper presents $\mathbf{OLinear}$, a $\mathbf{linear}$-based multivariate time series forecasting model that operates in an $\mathbf{o}$rthogonally transformed domain. Recent forecasting models typically adopt the temporal forecast (TF) paradigm, which directly encode and decode time series in the time domain. However, the entangled step-wise dependencies in series data can hinder the performance of TF. To address this, some forecasters conduct encoding and decoding in the transformed domain using fixed, dataset-independent bases (e.g., sine and cosine signals in the Fourier transform). In contrast, we utilize $\mathbf{OrthoTrans}$, a data-adaptive transformation based on an orthogonal matrix that diagonalizes the series' temporal Pearson correlation matrix. This approach enables more effective encoding and decoding in the decorrelated feature domain and can serve as a plug-in module to enhance existing forecasters. To enhance the representation learning for multivariate time series, we introduce a customized linear layer, $\mathbf{NormLin}$, which employs a normalized weight matrix to capture multivariate dependencies. Empirically, the NormLin module shows a surprising performance advantage over multi-head self-attention, while requiring nearly half the FLOPs. Extensive experiments on 24 benchmarks and 140 forecasting tasks demonstrate that OLinear consistently achieves state-of-the-art performance with high efficiency. Notably, as a plug-in replacement for self-attention, the NormLin module consistently enhances Transformer-based forecasters. The code and datasets are available at https://anonymous.4open.science/r/OLinear
[ { "version": "v1", "created": "Mon, 12 May 2025 10:39:37 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 11:00:57 GMT" } ]
2025-05-15T00:00:00
[ [ "Yue", "Wenzhen", "" ], [ "Liu", "Yong", "" ], [ "Li", "Haoxuan", "" ], [ "Wang", "Hao", "" ], [ "Ying", "Xianghua", "" ], [ "Guo", "Ruohao", "" ], [ "Xing", "Bowei", "" ], [ "Shi", "Ji", "" ] ]
2505.08568
Xiao Ni
Xiao Ni, Carsten Kuehnel, and Xiaoyi Jiang
Thermal Detection of People with Mobility Restrictions for Barrier Reduction at Traffic Lights Controlled Intersections
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Rapid advances in deep learning for computer vision have driven the adoption of RGB camera-based adaptive traffic light systems to improve traffic safety and pedestrian comfort. However, these systems often overlook the needs of people with mobility restrictions. Moreover, the use of RGB cameras presents significant challenges, including limited detection performance under adverse weather or low-visibility conditions, as well as heightened privacy concerns. To address these issues, we propose a fully automated, thermal detector-based traffic light system that dynamically adjusts signal durations for individuals with walking impairments or mobility burden and triggers the auditory signal for visually impaired individuals, thereby advancing towards barrier-free intersection for all users. To this end, we build the thermal dataset for people with mobility restrictions (TD4PWMR), designed to capture diverse pedestrian scenarios, particularly focusing on individuals with mobility aids or mobility burden under varying environmental conditions, such as different lighting, weather, and crowded urban settings. While thermal imaging offers advantages in terms of privacy and robustness to adverse conditions, it also introduces inherent hurdles for object detection due to its lack of color and fine texture details and generally lower resolution of thermal images. To overcome these limitations, we develop YOLO-Thermal, a novel variant of the YOLO architecture that integrates advanced feature extraction and attention mechanisms for enhanced detection accuracy and robustness in thermal imaging. Experiments demonstrate that the proposed thermal detector outperforms existing detectors, while the proposed traffic light system effectively enhances barrier-free intersection. The source codes and dataset are available at https://github.com/leon2014dresden/YOLO-THERMAL.
[ { "version": "v1", "created": "Tue, 13 May 2025 13:44:21 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 13:01:48 GMT" } ]
2025-05-15T00:00:00
[ [ "Ni", "Xiao", "" ], [ "Kuehnel", "Carsten", "" ], [ "Jiang", "Xiaoyi", "" ] ]
2505.08592
Kunpeng Zhang
Kunpeng Zhang, Lei Xu, Xinlei Yi, Guanghui Wen, Ming Cao, Karl H. Johansson, Tianyou Chai, and Tao Yang
Communication-Efficient Distributed Online Nonconvex Optimization with Time-Varying Constraints
56 pages, 3 figures. arXiv admin note: substantial text overlap with arXiv:2503.22410
null
null
null
math.OC cs.SY eess.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers distributed online nonconvex optimization with time-varying inequality constraints over a network of agents, where the nonconvex local loss and convex local constraint functions can vary arbitrarily across iterations, and the information of them is privately revealed to each agent at each iteration. For a uniformly jointly strongly connected time-varying directed graph, we propose two distributed bandit online primal--dual algorithm with compressed communication to efficiently utilize communication resources in the one-point and two-point bandit feedback settings, respectively. In nonconvex optimization, finding a globally optimal decision is often NP-hard. As a result, the standard regret metric used in online convex optimization becomes inapplicable. To measure the performance of the proposed algorithms, we use a network regret metric grounded in the first-order optimality condition associated with the variational inequality. We show that the compressed algorithms establish sublinear network regret and cumulative constraint violation bounds. Finally, a simulation example is presented to validate the theoretical results.
[ { "version": "v1", "created": "Tue, 13 May 2025 14:04:12 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 09:43:09 GMT" } ]
2025-05-15T00:00:00
[ [ "Zhang", "Kunpeng", "" ], [ "Xu", "Lei", "" ], [ "Yi", "Xinlei", "" ], [ "Wen", "Guanghui", "" ], [ "Cao", "Ming", "" ], [ "Johansson", "Karl H.", "" ], [ "Chai", "Tianyou", "" ], [ "Yang", "Tao", "" ] ]
2505.08614
Ziyuan He
Ziyuan He, Zhiqing Guo, Liejun Wang, Gaobo Yang, Yunfeng Diao, Dan Ma
WaveGuard: Robust Deepfake Detection and Source Tracing via Dual-Tree Complex Wavelet and Graph Neural Networks
11 pages, 5 figures, 4 tables
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Deepfake technology poses increasing risks such as privacy invasion and identity theft. To address these threats, we propose WaveGuard, a proactive watermarking framework that enhances robustness and imperceptibility via frequency-domain embedding and graph-based structural consistency. Specifically, we embed watermarks into high-frequency sub-bands using Dual-Tree Complex Wavelet Transform (DT-CWT) and employ a Structural Consistency Graph Neural Network (SC-GNN) to preserve visual quality. We also design an attention module to refine embedding precision. Experimental results on face swap and reenactment tasks demonstrate that WaveGuard outperforms state-of-the-art methods in both robustness and visual quality. Code is available at https://github.com/vpsg-research/WaveGuard.
[ { "version": "v1", "created": "Tue, 13 May 2025 14:31:42 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 03:27:59 GMT" } ]
2025-05-15T00:00:00
[ [ "He", "Ziyuan", "" ], [ "Guo", "Zhiqing", "" ], [ "Wang", "Liejun", "" ], [ "Yang", "Gaobo", "" ], [ "Diao", "Yunfeng", "" ], [ "Ma", "Dan", "" ] ]
2505.08660
Pramath Anamby
Pramath Anamby and Soumya Das
Pullbacks of Saito-Kurokawa lifts of square-free levels, their non-vanishing and the $L^2$-mass
46 pages; Comments are most welcome
null
null
null
math.NT
http://creativecommons.org/licenses/by/4.0/
We obtain the full spectral decomposition of the pullback of a Saito-Kurokawa (SK) newform $F$ of odd, square-free level; and show that the projections onto the elements $\mathbf g \otimes \mathbf g$ of an arithmetically orthogonalized old-basis are either zero or whose squares are given by the certain $\mathrm{GL}(3)\times \mathrm{GL}(2)$ central $L$-values $L(f\otimes \mathrm{sym}^2 g, \frac{1}{2})$, where $F$ is the lift of the $\mathrm{GL}(2)$ newform $f$ and $g$ is the newform underlying $\mathbf g$. Based on this, we work out a conjectural formula for the $L^2$-mass of the pullback of $F$ via the CFKRS heuristics, which becomes a weighted average (over $g$) of the central $L$-values. We show that on average over $f$, the main term predicted by the above heuristics matches with the actual main term. We also provide several results and sufficient conditions that ensure the non-vanishing of the pullbacks.
[ { "version": "v1", "created": "Tue, 13 May 2025 15:22:37 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 05:46:14 GMT" } ]
2025-05-15T00:00:00
[ [ "Anamby", "Pramath", "" ], [ "Das", "Soumya", "" ] ]
2505.08699
George Saon
George Saon, Avihu Dekel, Alexander Brooks, Tohru Nagano, Abraham Daniels, Aharon Satt, Ashish Mittal, Brian Kingsbury, David Haws, Edmilson Morais, Gakuto Kurata, Hagai Aronowitz, Ibrahim Ibrahim, Jeff Kuo, Kate Soule, Luis Lastras, Masayuki Suzuki, Ron Hoory, Samuel Thomas, Sashi Novitasari, Takashi Fukuda, Vishal Sunder, Xiaodong Cui, Zvi Kons
Granite-speech: open-source speech-aware LLMs with strong English ASR capabilities
7 pages, 9 figures
null
null
null
eess.AS
http://creativecommons.org/licenses/by/4.0/
Granite-speech LLMs are compact and efficient speech language models specifically designed for English ASR and automatic speech translation (AST). The models were trained by modality aligning the 2B and 8B parameter variants of granite-3.3-instruct to speech on publicly available open-source corpora containing audio inputs and text targets consisting of either human transcripts for ASR or automatically generated translations for AST. Comprehensive benchmarking shows that on English ASR, which was our primary focus, they outperform several competitors' models that were trained on orders of magnitude more proprietary data, and they keep pace on English-to-X AST for major European languages, Japanese, and Chinese. The speech-specific components are: a conformer acoustic encoder using block attention and self-conditioning trained with connectionist temporal classification, a windowed query-transformer speech modality adapter used to do temporal downsampling of the acoustic embeddings and map them to the LLM text embedding space, and LoRA adapters to further fine-tune the text LLM. Granite-speech-3.3 operates in two modes: in speech mode, it performs ASR and AST by activating the encoder, projector, and LoRA adapters; in text mode, it calls the underlying granite-3.3-instruct model directly (without LoRA), essentially preserving all the text LLM capabilities and safety. Both models are freely available on HuggingFace (https://huggingface.co/ibm-granite/granite-speech-3.3-2b and https://huggingface.co/ibm-granite/granite-speech-3.3-8b) and can be used for both research and commercial purposes under a permissive Apache 2.0 license.
[ { "version": "v1", "created": "Tue, 13 May 2025 15:58:57 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 02:10:29 GMT" } ]
2025-05-15T00:00:00
[ [ "Saon", "George", "" ], [ "Dekel", "Avihu", "" ], [ "Brooks", "Alexander", "" ], [ "Nagano", "Tohru", "" ], [ "Daniels", "Abraham", "" ], [ "Satt", "Aharon", "" ], [ "Mittal", "Ashish", "" ], [ "Kingsbury", "Brian", "" ], [ "Haws", "David", "" ], [ "Morais", "Edmilson", "" ], [ "Kurata", "Gakuto", "" ], [ "Aronowitz", "Hagai", "" ], [ "Ibrahim", "Ibrahim", "" ], [ "Kuo", "Jeff", "" ], [ "Soule", "Kate", "" ], [ "Lastras", "Luis", "" ], [ "Suzuki", "Masayuki", "" ], [ "Hoory", "Ron", "" ], [ "Thomas", "Samuel", "" ], [ "Novitasari", "Sashi", "" ], [ "Fukuda", "Takashi", "" ], [ "Sunder", "Vishal", "" ], [ "Cui", "Xiaodong", "" ], [ "Kons", "Zvi", "" ] ]
2505.08740
Abdolmehdi Behroozi
Abdolmehdi Behroozi, Chaopeng Shen and, Daniel Kifer
Sensitivity-Constrained Fourier Neural Operators for Forward and Inverse Problems in Parametric Differential Equations
null
null
null
null
cs.LG cs.CE
http://creativecommons.org/licenses/by/4.0/
Parametric differential equations of the form du/dt = f(u, x, t, p) are fundamental in science and engineering. While deep learning frameworks such as the Fourier Neural Operator (FNO) can efficiently approximate solutions, they struggle with inverse problems, sensitivity estimation (du/dp), and concept drift. We address these limitations by introducing a sensitivity-based regularization strategy, called Sensitivity-Constrained Fourier Neural Operators (SC-FNO). SC-FNO achieves high accuracy in predicting solution paths and consistently outperforms standard FNO and FNO with physics-informed regularization. It improves performance in parameter inversion tasks, scales to high-dimensional parameter spaces (tested with up to 82 parameters), and reduces both data and training requirements. These gains are achieved with a modest increase in training time (30% to 130% per epoch) and generalize across various types of differential equations and neural operators. Code and selected experiments are available at: https://github.com/AMBehroozi/SC_Neural_Operators
[ { "version": "v1", "created": "Tue, 13 May 2025 16:54:10 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 15:24:15 GMT" } ]
2025-05-15T00:00:00
[ [ "Behroozi", "Abdolmehdi", "" ], [ "and", "Chaopeng Shen", "" ], [ "Kifer", "Daniel", "" ] ]
2505.08765
Zhengqiu Zhu
Yatai Ji, Zhengqiu Zhu, Yong Zhao, Beidan Liu, Chen Gao, Yihao Zhao, Sihang Qiu, Yue Hu, Quanjun Yin and Yong Li
Towards Autonomous UAV Visual Object Search in City Space: Benchmark and Agentic Methodology
null
null
null
null
cs.CV cs.AI
http://creativecommons.org/licenses/by-nc-nd/4.0/
Aerial Visual Object Search (AVOS) tasks in urban environments require Unmanned Aerial Vehicles (UAVs) to autonomously search for and identify target objects using visual and textual cues without external guidance. Existing approaches struggle in complex urban environments due to redundant semantic processing, similar object distinction, and the exploration-exploitation dilemma. To bridge this gap and support the AVOS task, we introduce CityAVOS, the first benchmark dataset for autonomous search of common urban objects. This dataset comprises 2,420 tasks across six object categories with varying difficulty levels, enabling comprehensive evaluation of UAV agents' search capabilities. To solve the AVOS tasks, we also propose PRPSearcher (Perception-Reasoning-Planning Searcher), a novel agentic method powered by multi-modal large language models (MLLMs) that mimics human three-tier cognition. Specifically, PRPSearcher constructs three specialized maps: an object-centric dynamic semantic map enhancing spatial perception, a 3D cognitive map based on semantic attraction values for target reasoning, and a 3D uncertainty map for balanced exploration-exploitation search. Also, our approach incorporates a denoising mechanism to mitigate interference from similar objects and utilizes an Inspiration Promote Thought (IPT) prompting mechanism for adaptive action planning. Experimental results on CityAVOS demonstrate that PRPSearcher surpasses existing baselines in both success rate and search efficiency (on average: +37.69% SR, +28.96% SPL, -30.69% MSS, and -46.40% NE). While promising, the performance gap compared to humans highlights the need for better semantic reasoning and spatial exploration capabilities in AVOS tasks. This work establishes a foundation for future advances in embodied target search. Dataset and source code are available at https://anonymous.4open.science/r/CityAVOS-3DF8.
[ { "version": "v1", "created": "Tue, 13 May 2025 17:34:54 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 01:30:03 GMT" } ]
2025-05-15T00:00:00
[ [ "Ji", "Yatai", "" ], [ "Zhu", "Zhengqiu", "" ], [ "Zhao", "Yong", "" ], [ "Liu", "Beidan", "" ], [ "Gao", "Chen", "" ], [ "Zhao", "Yihao", "" ], [ "Qiu", "Sihang", "" ], [ "Hu", "Yue", "" ], [ "Yin", "Quanjun", "" ], [ "Li", "Yong", "" ] ]
2505.08790
Octavio Miramontes
Leticia R. Paiva, Sidiney G. Alves, Og DeSouza and Octavio Miramontes
Emergent dynamical phases and collective motion in termites
10 figures
null
null
null
q-bio.PE nlin.AO
http://creativecommons.org/licenses/by/4.0/
Termites which are able to forage in the open can be often seen, in the field or in the lab: (i) wandering around, forming no observable pattern, or (ii) clustering themselves in a dense and almost immobile pack, or (iii) milling about in a circular movement. Despite been well reported patterns, they are normally regarded as independent phenomena whose specific traits have never been properly quantified. Evidence, however, favours the hypothesis that these are interdependent patterns, arisen from self-organised interactions and movement among workers. After all, termites are a form of active matter where blind cooperative individuals are self-propelled and lack the possibility of visual cues to spatially orientate and align. It follows that their non-trivial close-contact patterns could generate motion-collision induced phase separations. This would then trigger the emergence of these three patterns (disorder, clustering, milling) as parts of the same continuum. By inspecting termite groups confined in arenas, we could quantitatively describe each one of these patterns in detail. We identified disorder, clustering and milling spatial patterns. These phases and their transitions are characterised aiming to offer refinements in the understanding of these aspects of self-propelled particles in active matter where close-range contacts and collisions are important.
[ { "version": "v1", "created": "Mon, 28 Apr 2025 21:36:30 GMT" } ]
2025-05-15T00:00:00
[ [ "Paiva", "Leticia R.", "" ], [ "Alves", "Sidiney G.", "" ], [ "DeSouza", "Og", "" ], [ "Miramontes", "Octavio", "" ] ]
2505.08791
Alexander Meyer
Alexander Meyer
Post-Quantum Cryptography: An Analysis of Code-Based and Lattice-Based Cryptosystems
null
null
null
null
cs.CR cs.IT math.IT
http://creativecommons.org/licenses/by/4.0/
Most modern cryptographic systems, such as RSA and the Diffie-Hellman Key Exchange, rely on "trapdoor" mathematical functions that are presumed to be computationally difficult with existing tools. However, quantum computers will be able to break these systems using Shor's Algorithm, necessitating the development of quantum-resistant alternatives. We first examine the McEliece cryptosystem, a code-based scheme believed to be secure against quantum attacks due to the hardness of decoding arbitrary linear codes. We then explore NTRU, a lattice-based system grounded in the difficulty of solving the Shortest Vector Problem. Finally, we establish connections between the structural foundations and security of the two systems.
[ { "version": "v1", "created": "Tue, 6 May 2025 03:42:38 GMT" } ]
2025-05-15T00:00:00
[ [ "Meyer", "Alexander", "" ] ]
2505.08792
Brittany Johnson-Matthews
Michelle Nashla Turcios, Alicia E. Boyd, Angela D.R. Smith, Brittany Johnson
A Preliminary Framework for Intersectionality in ML Pipelines
Accepted for the 1st International Intersectionality and Software Engineering Workshop, colocated with FSE 2025
null
10.1145/3696630.3728692
null
cs.LG cs.CY
http://creativecommons.org/licenses/by/4.0/
Machine learning (ML) has become a go-to solution for improving how we use, experience, and interact with technology (and the world around us). Unfortunately, studies have repeatedly shown that machine learning technologies may not provide adequate support for societal identities and experiences. Intersectionality is a sociological framework that provides a mechanism for explicitly considering complex social identities, focusing on social justice and power. While the framework of intersectionality can support the development of technologies that acknowledge and support all members of society, it has been adopted and adapted in ways that are not always true to its foundations, thereby weakening its potential for impact. To support the appropriate adoption and use of intersectionality for more equitable technological outcomes, we amplify the foundational intersectionality scholarship--Crenshaw, Combahee, and Collins (three C's), to create a socially relevant preliminary framework in developing machine-learning solutions. We use this framework to evaluate and report on the (mis)alignments of intersectionality application in machine learning literature.
[ { "version": "v1", "created": "Tue, 6 May 2025 16:57:56 GMT" } ]
2025-05-15T00:00:00
[ [ "Turcios", "Michelle Nashla", "" ], [ "Boyd", "Alicia E.", "" ], [ "Smith", "Angela D. R.", "" ], [ "Johnson", "Brittany", "" ] ]
2505.08793
Monirul Islam Pavel
Monirul Islam Pavel, Siyi Hu, Mahardhika Pratama and Ryszard Kowalczyk
Onboard Optimization and Learning: A Survey
36 pages, 5 figures, 3 tables
null
null
null
cs.LG cs.AR
http://creativecommons.org/licenses/by/4.0/
Onboard learning is a transformative approach in edge AI, enabling real-time data processing, decision-making, and adaptive model training directly on resource-constrained devices without relying on centralized servers. This paradigm is crucial for applications demanding low latency, enhanced privacy, and energy efficiency. However, onboard learning faces challenges such as limited computational resources, high inference costs, and security vulnerabilities. This survey explores a comprehensive range of methodologies that address these challenges, focusing on techniques that optimize model efficiency, accelerate inference, and support collaborative learning across distributed devices. Approaches for reducing model complexity, improving inference speed, and ensuring privacy-preserving computation are examined alongside emerging strategies that enhance scalability and adaptability in dynamic environments. By bridging advancements in hardware-software co-design, model compression, and decentralized learning, this survey provides insights into the current state of onboard learning to enable robust, efficient, and secure AI deployment at the edge.
[ { "version": "v1", "created": "Wed, 7 May 2025 07:47:14 GMT" } ]
2025-05-15T00:00:00
[ [ "Pavel", "Monirul Islam", "" ], [ "Hu", "Siyi", "" ], [ "Pratama", "Mahardhika", "" ], [ "Kowalczyk", "Ryszard", "" ] ]
2505.08794
Martin Rivas
Juan Barandiaran and Martin Rivas
Classical Dirac particle I
32 pages, 13 figures, 2 Mathematica Notebooks with 16 bookmarks
null
null
null
physics.class-ph math-ph math.MP
http://creativecommons.org/licenses/by/4.0/
In this work we produce a classical Lagrangian description of an elementary spinning particle which satisfies Dirac equation when quantized. We call this particle a classical Dirac particle. We analyze in detail the way we arrive to this model and how the different observables and constants of the motion can be expressed in terms of the degrees of freedom and their derivatives, by making use of Noether's theorem. The main feature is that the particle has a center of charge r, moving at the speed of light, that satisfies fourth-order diferential equations and all observables can be expressed only in terms of this point and their time derivatives. The particle has also a center of mass q, that is a different point than the center of charge. This implies that two different spin observables can be defined, one S with respect to the point r and another SCM with respect to the point q, that satisfy different dynamical equations. The spin S satisfies the same dynamical equation than Dirac's spin operator. The fourth-order differential equations for the point r can be transformed into a system of second-order ordinary differential equations for the center of charge and center of mass. The dynamics can be described in terms of dimensionless variables. The possible interaction Lagrangians are described and we devote the main part of the work to the electromagnetic interaction of the Dirac particle with uniform and oscillating electric and magnetic fields. The numerical integrations of the dynamical equations are performed with different Mathematica notebooks that are available for the interested reader.
[ { "version": "v1", "created": "Wed, 7 May 2025 10:58:09 GMT" } ]
2025-05-15T00:00:00
[ [ "Barandiaran", "Juan", "" ], [ "Rivas", "Martin", "" ] ]
2505.08795
Andres Anabalon
Andres Anabalon, Hugo Garces, Julio Oliva and Jose Cifuentes
The Geometry of Meaning: Perfect Spacetime Representations of Hierarchical Structures
7 pages, 3 figures
null
null
null
cs.LG cs.AI cs.CL
http://creativecommons.org/licenses/by/4.0/
We show that there is a fast algorithm that embeds hierarchical structures in three-dimensional Minkowski spacetime. The correlation of data ends up purely encoded in the causal structure. Our model relies solely on oriented token pairs -- local hierarchical signals -- with no access to global symbolic structure. We apply our method to the corpus of \textit{WordNet}. We provide a perfect embedding of the mammal sub-tree including ambiguities (more than one hierarchy per node) in such a way that the hierarchical structures get completely codified in the geometry and exactly reproduce the ground-truth. We extend this to a perfect embedding of the maximal unambiguous subset of the \textit{WordNet} with 82{,}115 noun tokens and a single hierarchy per token. We introduce a novel retrieval mechanism in which causality, not distance, governs hierarchical access. Our results seem to indicate that all discrete data has a perfect geometrical representation that is three-dimensional. The resulting embeddings are nearly conformally invariant, indicating deep connections with general relativity and field theory. These results suggest that concepts, categories, and their interrelations, namely hierarchical meaning itself, is geometric.
[ { "version": "v1", "created": "Wed, 7 May 2025 20:41:06 GMT" } ]
2025-05-15T00:00:00
[ [ "Anabalon", "Andres", "" ], [ "Garces", "Hugo", "" ], [ "Oliva", "Julio", "" ], [ "Cifuentes", "Jose", "" ] ]
2505.08796
Robbe De Prins
Robbe De Prins, Jacob Lamers, Peter Bienstman, Guy Van der Sande, Guy Verschaffelt, Thomas Van Vaerenbergh
How to Incorporate External Fields in Analog Ising Machines
30 pages, 17 figures, and 2 tables, including Supplementary Material. The first two authors contributed equally
null
null
null
cond-mat.stat-mech cs.ET quant-ph
http://creativecommons.org/licenses/by/4.0/
Ising machines (IMs) are specialized devices designed to efficiently solve combinatorial optimization problems (COPs). They consist of artificial spins that evolve towards a low-energy configuration representing a problem's solution. Most realistic COPs require both spin-spin couplings and external fields. In IMs with analog spins, these interactions scale differently with the continuous spin amplitudes, leading to imbalances that affect performance. Various techniques have been proposed to mitigate this issue, but their performance has not been benchmarked. We address this gap through a numerical analysis. We evaluate the time-to-solution of these methods across three distinct problem classes with up to 500 spins. Our results show that the most effective way to incorporate external fields is through an approach where the spin interactions are proportional to the spin signs, rather than their continuous amplitudes.
[ { "version": "v1", "created": "Thu, 8 May 2025 18:01:02 GMT" } ]
2025-05-15T00:00:00
[ [ "De Prins", "Robbe", "" ], [ "Lamers", "Jacob", "" ], [ "Bienstman", "Peter", "" ], [ "Van der Sande", "Guy", "" ], [ "Verschaffelt", "Guy", "" ], [ "Van Vaerenbergh", "Thomas", "" ] ]
2505.08797
Annaki Fouad
F. Annaki, S. Ouassou and S. Igamane
Visibility and Influence in Digital Social Relations: Towards a New Symbolic Capital?
null
null
10.5281/zenodo.15364096
null
cs.SI cs.CY econ.GN q-fin.EC
http://creativecommons.org/licenses/by-nc-nd/4.0/
This study explores the dynamics of visibility and influence in digital social relations, examining their implications for the emergence of a new symbolic capital. Using a mixedmethods design, the research combined semi-structured interviews with 20 digitally active individuals and quantitative social media data analysis to identify key predictors of digital symbolic capital. Findings reveal that visibility is influenced by content quality, network size, and engagement strategies, while influence depends on credibility, authority, and trust. The study identifies a new form of symbolic capital based on online visibility, influence, and reputation, distinct from traditional forms. The research discusses the ethical implications of these dynamics and suggests future research directions, emphasizing the need to update social theories to account for digital transformations.
[ { "version": "v1", "created": "Thu, 8 May 2025 19:10:47 GMT" } ]
2025-05-15T00:00:00
[ [ "Annaki", "F.", "" ], [ "Ouassou", "S.", "" ], [ "Igamane", "S.", "" ] ]
2505.08798
Mobina Shrestha
Mobina Shrestha, Bishwas Mandal, Vishal Mandal, Asis Shrestha
In-Context Learning for Label-Efficient Cancer Image Classification in Oncology
null
null
null
null
eess.IV cs.AI cs.CV
http://creativecommons.org/licenses/by/4.0/
The application of AI in oncology has been limited by its reliance on large, annotated datasets and the need for retraining models for domain-specific diagnostic tasks. Taking heed of these limitations, we investigated in-context learning as a pragmatic alternative to model retraining by allowing models to adapt to new diagnostic tasks using only a few labeled examples at inference, without the need for retraining. Using four vision-language models (VLMs)-Paligemma, CLIP, ALIGN and GPT-4o, we evaluated the performance across three oncology datasets: MHIST, PatchCamelyon and HAM10000. To the best of our knowledge, this is the first study to compare the performance of multiple VLMs on different oncology classification tasks. Without any parameter updates, all models showed significant gains with few-shot prompting, with GPT-4o reaching an F1 score of 0.81 in binary classification and 0.60 in multi-class classification settings. While these results remain below the ceiling of fully fine-tuned systems, they highlight the potential of ICL to approximate task-specific behavior using only a handful of examples, reflecting how clinicians often reason from prior cases. Notably, open-source models like Paligemma and CLIP demonstrated competitive gains despite their smaller size, suggesting feasibility for deployment in computing constrained clinical environments. Overall, these findings highlight the potential of ICL as a practical solution in oncology, particularly for rare cancers and resource-limited contexts where fine-tuning is infeasible and annotated data is difficult to obtain.
[ { "version": "v1", "created": "Thu, 8 May 2025 20:49:01 GMT" } ]
2025-05-15T00:00:00
[ [ "Shrestha", "Mobina", "" ], [ "Mandal", "Bishwas", "" ], [ "Mandal", "Vishal", "" ], [ "Shrestha", "Asis", "" ] ]
2505.08799
Loay Abdelrazek
Loay Abdelrazek, Rim ElMalki, Filippo Rebecchi, Daniel Cho
Measuring Security in 5G and Future Networks
Accepted and presented in IEEE Future Networks World Forum 2024 conference, This is a pre-print version
null
null
null
cs.CR
http://creativecommons.org/licenses/by/4.0/
In today's increasingly interconnected and fast-paced digital ecosystem, mobile networks, such as 5G and future generations such as 6G, play a pivotal role and must be considered as critical infrastructures. Ensuring their security is paramount to safeguard both individual users and the industries that depend on these networks. An essential condition for maintaining and improving the security posture of a system is the ability to effectively measure and monitor its security state. In this work we address the need for an objective measurement of the security state of 5G and future networks. We introduce a state machine model designed to capture the security life cycle of network functions and the transitions between different states within the life cycle. Such a model can be computed locally at each node, or hierarchically, by aggregating measurements into security domains or the whole network. We identify three essential security metrics -- attack surface exposure, impact of system vulnerabilities, and effectiveness of applied security controls -- that collectively form the basis for calculating the overall security score. With this approach, it is possible to provide a holistic understanding of the security posture, laying the foundation for effective security management in the expected dynamic threat landscape of 6G networks. Through practical examples, we illustrate the real-world application of our proposed methodology, offering valuable insights for developing risk management and informed decision-making strategies in 5G and 6G security operations and laying the foundation for effective security management in the expected dynamic threat landscape of 6G networks.
[ { "version": "v1", "created": "Fri, 9 May 2025 04:24:17 GMT" } ]
2025-05-15T00:00:00
[ [ "Abdelrazek", "Loay", "" ], [ "ElMalki", "Rim", "" ], [ "Rebecchi", "Filippo", "" ], [ "Cho", "Daniel", "" ] ]
2505.08800
Olivia Nocentini
Olivia Nocentini, Marta Lagomarsino, Gokhan Solak, Younggeol Cho, Qiyi Tong, Marta Lorenzini, and Arash Ajoudani
Graph-based Online Monitoring of Train Driver States via Facial and Skeletal Features
null
null
null
null
cs.CV cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Driver fatigue poses a significant challenge to railway safety, with traditional systems like the dead-man switch offering limited and basic alertness checks. This study presents an online behavior-based monitoring system utilizing a customised Directed-Graph Neural Network (DGNN) to classify train driver's states into three categories: alert, not alert, and pathological. To optimize input representations for the model, an ablation study was performed, comparing three feature configurations: skeletal-only, facial-only, and a combination of both. Experimental results show that combining facial and skeletal features yields the highest accuracy (80.88%) in the three-class model, outperforming models using only facial or skeletal features. Furthermore, this combination achieves over 99% accuracy in the binary alertness classification. Additionally, we introduced a novel dataset that, for the first time, incorporates simulated pathological conditions into train driver monitoring, broadening the scope for assessing risks related to fatigue and health. This work represents a step forward in enhancing railway safety through advanced online monitoring using vision-based technologies.
[ { "version": "v1", "created": "Fri, 9 May 2025 15:06:19 GMT" } ]
2025-05-15T00:00:00
[ [ "Nocentini", "Olivia", "" ], [ "Lagomarsino", "Marta", "" ], [ "Solak", "Gokhan", "" ], [ "Cho", "Younggeol", "" ], [ "Tong", "Qiyi", "" ], [ "Lorenzini", "Marta", "" ], [ "Ajoudani", "Arash", "" ] ]
2505.08801
Bishowjit Paul Jit
Md. Sakib Hassan Chowdhury, Md. Hafiz Ahamed, Bishowjit Paul, Sarafat Hussain Abhi, Abu Bakar Siddique, Md. Robius Sany
OptiGait-LGBM: An Efficient Approach of Gait-based Person Re-identification in Non-Overlapping Regions
12 pages, 17 figures
null
null
null
cs.CV cs.LG eess.IV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Gait recognition, known for its ability to identify individuals from a distance, has gained significant attention in recent times due to its non-intrusive verification. While video-based gait identification systems perform well on large public datasets, their performance drops when applied to real-world, unconstrained gait data due to various factors. Among these, uncontrolled outdoor environments, non-overlapping camera views, varying illumination, and computational efficiency are core challenges in gait-based authentication. Currently, no dataset addresses all these challenges simultaneously. In this paper, we propose an OptiGait-LGBM model capable of recognizing person re-identification under these constraints using a skeletal model approach, which helps mitigate inconsistencies in a person's appearance. The model constructs a dataset from landmark positions, minimizing memory usage by using non-sequential data. A benchmark dataset, RUET-GAIT, is introduced to represent uncontrolled gait sequences in complex outdoor environments. The process involves extracting skeletal joint landmarks, generating numerical datasets, and developing an OptiGait-LGBM gait classification model. Our aim is to address the aforementioned challenges with minimal computational cost compared to existing methods. A comparative analysis with ensemble techniques such as Random Forest and CatBoost demonstrates that the proposed approach outperforms them in terms of accuracy, memory usage, and training time. This method provides a novel, low-cost, and memory-efficient video-based gait recognition solution for real-world scenarios.
[ { "version": "v1", "created": "Sat, 10 May 2025 08:28:57 GMT" } ]
2025-05-15T00:00:00
[ [ "Chowdhury", "Md. Sakib Hassan", "" ], [ "Ahamed", "Md. Hafiz", "" ], [ "Paul", "Bishowjit", "" ], [ "Abhi", "Sarafat Hussain", "" ], [ "Siddique", "Abu Bakar", "" ], [ "Sany", "Md. Robius", "" ] ]
2505.08802
Hyunseo Choi Mr.
Sanghyeon Park, Yuseung Hong, Hyunseo Choi
Enhanced Performance of Highly Activated Carbon and Surface-Treated Porous Polymers as Physical Adsorbents for Chemical Warfare Agents
14 Pages, 7 figures, This manuscript is formatted according to journal submission standards and is posted on arXiv as a preprint for dissemination and research record purposes. The study presents adsorption-driven protective material strategies against chemical warfare agents using activated carbon and functionalized porous organic polymers
null
null
null
physics.chem-ph cond-mat.mtrl-sci
http://creativecommons.org/licenses/by/4.0/
The use of chemical warfare agents (CWAs) in modern warfare cannot be disregarded due to their ease of use and potential for large-scale incapacitation. An effective countermeasure involves the physical adsorption of these agents, preventing their entry through the respiratory tract by non-specific adsorption. In this study, we investigate the physical interaction between potential adsorbents and model gases mimicking CWAs, thereby identifying sufficient conditions for higher physical adsorption performance. Our findings reveal that the physical adsorption capacity is highly sensitive to the surface properties of the adsorbents, with uniform development of micropores, rather than solely high surface area, emerging as a critical factor. Additionally, we identified the potential of porous organic polymers as promising alternatives to conventional activated carbon-based adsorbents. Through a facile introduction of polar sulfone functional groups on the polymer surface, we demonstrated that these polar surface polymers exhibit physical adsorption capabilities for formaldehyde under ambient conditions comparable to high-performance activated carbons. Notably, the superior activated carbon possessed a high BET surface area of 2400 m^2/g and an exceptionally uniform micropore structure with an average pore size of approximately 11 Angstroms. This research paves the way for designing adsorbents with high physical adsorption capacities tailored for CWAs protection, offering a significant advancement in developing next-generation protective materials.
[ { "version": "v1", "created": "Sat, 10 May 2025 17:20:06 GMT" } ]
2025-05-15T00:00:00
[ [ "Park", "Sanghyeon", "" ], [ "Hong", "Yuseung", "" ], [ "Choi", "Hyunseo", "" ] ]
2505.08803
Zizhao Hu
Zizhao Hu, Mohammad Rostami, Jesse Thomason
Multi-modal Synthetic Data Training and Model Collapse: Insights from VLMs and Diffusion Models
null
null
null
null
cs.LG cs.AI
http://creativecommons.org/licenses/by/4.0/
Recent research has highlighted the risk of generative model collapse, where performance progressively degrades when continually trained on self-generated data. However, existing exploration on model collapse is limited to single, unimodal models, limiting our understanding in more realistic scenarios, such as diverse multi-modal AI agents interacting autonomously through synthetic data and continually evolving. We expand the synthetic data training and model collapse study to multi-modal vision-language generative systems, such as vision-language models (VLMs) and text-to-image diffusion models, as well as recursive generate-train loops with multiple models. We find that model collapse, previously observed in single-modality generative models, exhibits distinct characteristics in the multi-modal context, such as improved vision-language alignment and increased variance in VLM image-captioning task. Additionally, we find that general approaches such as increased decoding budgets, greater model diversity, and relabeling with frozen models can effectively mitigate model collapse. Our findings provide initial insights and practical guidelines for reducing the risk of model collapse in self-improving multi-agent AI systems and curating robust multi-modal synthetic datasets.
[ { "version": "v1", "created": "Sat, 10 May 2025 22:42:29 GMT" } ]
2025-05-15T00:00:00
[ [ "Hu", "Zizhao", "" ], [ "Rostami", "Mohammad", "" ], [ "Thomason", "Jesse", "" ] ]
2505.08804
Longtian Wang
Longtian Wang, Xiaofei Xie, Tianlin Li, Yuhan Zhi, Chao Shen
TokenProber: Jailbreaking Text-to-image Models via Fine-grained Word Impact Analysis
13 pages, 5 figures
null
null
null
cs.CR cs.LG
http://creativecommons.org/licenses/by/4.0/
Text-to-image (T2I) models have significantly advanced in producing high-quality images. However, such models have the ability to generate images containing not-safe-for-work (NSFW) content, such as pornography, violence, political content, and discrimination. To mitigate the risk of generating NSFW content, refusal mechanisms, i.e., safety checkers, have been developed to check potential NSFW content. Adversarial prompting techniques have been developed to evaluate the robustness of the refusal mechanisms. The key challenge remains to subtly modify the prompt in a way that preserves its sensitive nature while bypassing the refusal mechanisms. In this paper, we introduce TokenProber, a method designed for sensitivity-aware differential testing, aimed at evaluating the robustness of the refusal mechanisms in T2I models by generating adversarial prompts. Our approach is based on the key observation that adversarial prompts often succeed by exploiting discrepancies in how T2I models and safety checkers interpret sensitive content. Thus, we conduct a fine-grained analysis of the impact of specific words within prompts, distinguishing between dirty words that are essential for NSFW content generation and discrepant words that highlight the different sensitivity assessments between T2I models and safety checkers. Through the sensitivity-aware mutation, TokenProber generates adversarial prompts, striking a balance between maintaining NSFW content generation and evading detection. Our evaluation of TokenProber against 5 safety checkers on 3 popular T2I models, using 324 NSFW prompts, demonstrates its superior effectiveness in bypassing safety filters compared to existing methods (e.g., 54%+ increase on average), highlighting TokenProber's ability to uncover robustness issues in the existing refusal mechanisms.
[ { "version": "v1", "created": "Sun, 11 May 2025 06:32:33 GMT" } ]
2025-05-15T00:00:00
[ [ "Wang", "Longtian", "" ], [ "Xie", "Xiaofei", "" ], [ "Li", "Tianlin", "" ], [ "Zhi", "Yuhan", "" ], [ "Shen", "Chao", "" ] ]
2505.08805
Anastasia Konik
Anastasia Konik and Laurent Desbat
Range conditions on distributions and their possible application to geometric calibration in 2D parallel and fan-beam geometries
null
null
null
null
stat.AP eess.IV
http://creativecommons.org/licenses/by/4.0/
In tomography, range conditions or data consistency conditions (DCCs) on functions have proven useful for geometric self-calibration, which involves identifying geometric parameters of acquisition systems based only on acquired radiographic images. These self-calibration methods using range conditions on functions typically require non-truncated data. In this work, we derive range conditions on distributions and demonstrate their application in addressing data truncation issues during the calibration process. We propose a novel approach based on range conditions on distributions, employing Dirac distributions to model markers within the field-of-view of an X-ray system. Our calibration methods are based on the local geometric information from non-truncated projections of a marker set. By applying range conditions to projections of sums of Dirac distributions, combined with specific calibration marker sets, we derive analytical formulas that enable the identification of geometric calibration parameters. We aim to present DCCs on distributions in tomography and explore the potential of DCCs on distributions as a possible tool in calibration. This approach represents one possible application, demonstrating how DCCs on distributions can effectively address challenges such as data truncation and incomplete marker set information. We present results for the 2D parallel geometry (Radon transform) and the 2D fan-beam geometry with sources on a line.
[ { "version": "v1", "created": "Sun, 11 May 2025 14:06:45 GMT" } ]
2025-05-15T00:00:00
[ [ "Konik", "Anastasia", "" ], [ "Desbat", "Laurent", "" ] ]
2505.08806
Amaury Cruz Alvarez Dr.
A.C. Alvarez, H. Bruining, D. Marchesin
Estimation of oil recovery due to wettability changes in carbonate reservoirs
null
null
null
null
cond-mat.mtrl-sci physics.chem-ph
http://creativecommons.org/licenses/by/4.0/
Low salinity waterflooding (LSWF) enhances oil recovery at low cost in carbonate reservoirs, but its effectiveness requires precise control of injected water chemistry and interaction with reservoir minerals. This study develops an integrated reactive transport model coupling geochemical surface complexation modeling (SCM) with multiphase compositional dynamics to quantify wettability alteration during LSWF. The framework combines PHREEQC-based equilibrium calculations of the Total Bond Product (TBP), a wettability indicator derived from oil-calcite ionic bridging, with Corey-type relative permeability interpolation, resolved via COMSOL Multiphysics. Core flooding simulations, compared with experimental data from calcite systems at 100 degrees Celsius and 220 bar, reveal that magnesium and sulfate concentrations modulate TBP, reducing oil-rock adhesion under controlled low-salinity conditions. Parametric analysis demonstrates that acidic crude oils (TAN higher than 1 mg KOH per gram) exhibit TBP values approximately 2.5 times higher than sweet crudes, due to carboxylate-calcite bridging, while pH elevation (above 7.5) amplifies wettability shifts by promoting deprotonated carboxyl interactions. The model further identifies synergistic effects between magnesium (50 to 200 millimoles per kilogram of water) and sulfate (above 500 millimoles per kilogram of water), which reduce calcium-mediated oil adhesion through competitive mineral surface binding. By correlating TBP with fractional flow dynamics, this framework could support the optimization of injection strategies in carbonate reservoirs, suggesting that ion-specific adjustments are more effective than bulk salinity reduction.
[ { "version": "v1", "created": "Sun, 11 May 2025 22:11:15 GMT" } ]
2025-05-15T00:00:00
[ [ "Alvarez", "A. C.", "" ], [ "Bruining", "H.", "" ], [ "Marchesin", "D.", "" ] ]
2505.08807
Yuntao Wang
Yuntao Wang, Yanghe Pan, Shaolong Guo, and Zhou Su
Security of Internet of Agents: Attacks and Countermeasures
11 pages, 5 figures, 3 tables, submitted to IEEE OJCS
null
null
null
cs.CR cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the rise of large language and vision-language models, AI agents have evolved into autonomous, interactive systems capable of perception, reasoning, and decision-making. As they proliferate across virtual and physical domains, the Internet of Agents (IoA) has emerged as a key infrastructure for enabling scalable and secure coordination among heterogeneous agents. This survey offers a comprehensive examination of the security and privacy landscape in IoA systems. We begin by outlining the IoA architecture and its distinct vulnerabilities compared to traditional networks, focusing on four critical aspects: identity authentication threats, cross-agent trust issues, embodied security, and privacy risks. We then review existing and emerging defense mechanisms and highlight persistent challenges. Finally, we identify open research directions to advance the development of resilient and privacy-preserving IoA ecosystems.
[ { "version": "v1", "created": "Mon, 12 May 2025 02:04:57 GMT" } ]
2025-05-15T00:00:00
[ [ "Wang", "Yuntao", "" ], [ "Pan", "Yanghe", "" ], [ "Guo", "Shaolong", "" ], [ "Su", "Zhou", "" ] ]
2505.08808
Anqing Jiang
Anqing Jiang, Jinhao Chai, Yu Gao, Yiru Wang, Yuwen Heng, Zhigang Sun, Hao Sun, Zezhong Zhao, Li Sun, Jian Zhou, Lijuan Zhu, Shugong Xu, Hao Zhao
SparseMeXT Unlocking the Potential of Sparse Representations for HD Map Construction
null
null
null
null
cs.CV cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent advancements in high-definition \emph{HD} map construction have demonstrated the effectiveness of dense representations, which heavily rely on computationally intensive bird's-eye view \emph{BEV} features. While sparse representations offer a more efficient alternative by avoiding dense BEV processing, existing methods often lag behind due to the lack of tailored designs. These limitations have hindered the competitiveness of sparse representations in online HD map construction. In this work, we systematically revisit and enhance sparse representation techniques, identifying key architectural and algorithmic improvements that bridge the gap with--and ultimately surpass--dense approaches. We introduce a dedicated network architecture optimized for sparse map feature extraction, a sparse-dense segmentation auxiliary task to better leverage geometric and semantic cues, and a denoising module guided by physical priors to refine predictions. Through these enhancements, our method achieves state-of-the-art performance on the nuScenes dataset, significantly advancing HD map construction and centerline detection. Specifically, SparseMeXt-Tiny reaches a mean average precision \emph{mAP} of 55.5% at 32 frames per second \emph{fps}, while SparseMeXt-Base attains 65.2% mAP. Scaling the backbone and decoder further, SparseMeXt-Large achieves an mAP of 68.9% at over 20 fps, establishing a new benchmark for sparse representations in HD map construction. These results underscore the untapped potential of sparse methods, challenging the conventional reliance on dense representations and redefining efficiency-performance trade-offs in the field.
[ { "version": "v1", "created": "Mon, 12 May 2025 02:26:58 GMT" } ]
2025-05-15T00:00:00
[ [ "Jiang", "Anqing", "" ], [ "Chai", "Jinhao", "" ], [ "Gao", "Yu", "" ], [ "Wang", "Yiru", "" ], [ "Heng", "Yuwen", "" ], [ "Sun", "Zhigang", "" ], [ "Sun", "Hao", "" ], [ "Zhao", "Zezhong", "" ], [ "Sun", "Li", "" ], [ "Zhou", "Jian", "" ], [ "Zhu", "Lijuan", "" ], [ "Xu", "Shugong", "" ], [ "Zhao", "Hao", "" ] ]
2505.08809
Shixi Qin
Shixi Qin, Zhiyong Yang, Shilong Bao, Shi Wang, Qianqian Xu, Qingming Huang
MixBridge: Heterogeneous Image-to-Image Backdoor Attack through Mixture of Schr\"odinger Bridges
null
null
null
null
cs.CR cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper focuses on implanting multiple heterogeneous backdoor triggers in bridge-based diffusion models designed for complex and arbitrary input distributions. Existing backdoor formulations mainly address single-attack scenarios and are limited to Gaussian noise input models. To fill this gap, we propose MixBridge, a novel diffusion Schr\"odinger bridge (DSB) framework to cater to arbitrary input distributions (taking I2I tasks as special cases). Beyond this trait, we demonstrate that backdoor triggers can be injected into MixBridge by directly training with poisoned image pairs. This eliminates the need for the cumbersome modifications to stochastic differential equations required in previous studies, providing a flexible tool to study backdoor behavior for bridge models. However, a key question arises: can a single DSB model train multiple backdoor triggers? Unfortunately, our theory shows that when attempting this, the model ends up following the geometric mean of benign and backdoored distributions, leading to performance conflict across backdoor tasks. To overcome this, we propose a Divide-and-Merge strategy to mix different bridges, where models are independently pre-trained for each specific objective (Divide) and then integrated into a unified model (Merge). In addition, a Weight Reallocation Scheme (WRS) is also designed to enhance the stealthiness of MixBridge. Empirical studies across diverse generation tasks speak to the efficacy of MixBridge.
[ { "version": "v1", "created": "Mon, 12 May 2025 06:40:23 GMT" } ]
2025-05-15T00:00:00
[ [ "Qin", "Shixi", "" ], [ "Yang", "Zhiyong", "" ], [ "Bao", "Shilong", "" ], [ "Wang", "Shi", "" ], [ "Xu", "Qianqian", "" ], [ "Huang", "Qingming", "" ] ]
2505.08810
Bappa Muktar
Bappa Muktar, Vincent Fono and Adama Nouboukpo
Machine Learning-Based Detection of DDoS Attacks in VANETs for Emergency Vehicle Communication
null
null
null
null
cs.CR cs.AI
http://creativecommons.org/licenses/by/4.0/
Vehicular Ad Hoc Networks (VANETs) play a key role in Intelligent Transportation Systems (ITS), particularly in enabling real-time communication for emergency vehicles. However, Distributed Denial of Service (DDoS) attacks, which interfere with safety-critical communication channels, can severely impair their reliability. This study introduces a robust and scalable framework to detect DDoS attacks in highway-based VANET environments. A synthetic dataset was constructed using Network Simulator 3 (NS-3) in conjunction with the Simulation of Urban Mobility (SUMO) and further enriched with real-world mobility traces from Germany's A81 highway, extracted via OpenStreetMap (OSM). Three traffic categories were simulated: DDoS, VoIP, and TCP-based video streaming (VideoTCP). The data preprocessing pipeline included normalization, signal-to-noise ratio (SNR) feature engineering, missing value imputation, and class balancing using the Synthetic Minority Over-sampling Technique (SMOTE). Feature importance was assessed using SHapley Additive exPlanations (SHAP). Eleven classifiers were benchmarked, among them XGBoost (XGB), CatBoost (CB), AdaBoost (AB), GradientBoosting (GB), and an Artificial Neural Network (ANN). XGB and CB achieved the best performance, each attaining an F1-score of 96%. These results highlight the robustness of the proposed framework and its potential for real-time deployment in VANETs to secure critical emergency communications.
[ { "version": "v1", "created": "Mon, 12 May 2025 07:00:04 GMT" } ]
2025-05-15T00:00:00
[ [ "Muktar", "Bappa", "" ], [ "Fono", "Vincent", "" ], [ "Nouboukpo", "Adama", "" ] ]
2505.08811
Shijie Lian
Shijie Lian and Ziyi Zhang and Laurence Tianruo Yang and, Mengyu Ren and Debin Liu and Hua Li
TUGS: Physics-based Compact Representation of Underwater Scenes by Tensorized Gaussian
null
null
null
null
cs.CV cs.RO
http://creativecommons.org/publicdomain/zero/1.0/
Underwater 3D scene reconstruction is crucial for undewater robotic perception and navigation. However, the task is significantly challenged by the complex interplay between light propagation, water medium, and object surfaces, with existing methods unable to model their interactions accurately. Additionally, expensive training and rendering costs limit their practical application in underwater robotic systems. Therefore, we propose Tensorized Underwater Gaussian Splatting (TUGS), which can effectively solve the modeling challenges of the complex interactions between object geometries and water media while achieving significant parameter reduction. TUGS employs lightweight tensorized higher-order Gaussians with a physics-based underwater Adaptive Medium Estimation (AME) module, enabling accurate simulation of both light attenuation and backscatter effects in underwater environments. Compared to other NeRF-based and GS-based methods designed for underwater, TUGS is able to render high-quality underwater images with faster rendering speeds and less memory usage. Extensive experiments on real-world underwater datasets have demonstrated that TUGS can efficiently achieve superior reconstruction quality using a limited number of parameters, making it particularly suitable for memory-constrained underwater UAV applications
[ { "version": "v1", "created": "Mon, 12 May 2025 07:09:35 GMT" } ]
2025-05-15T00:00:00
[ [ "Lian", "Shijie", "" ], [ "Zhang", "Ziyi", "" ], [ "and", "Laurence Tianruo Yang", "" ], [ "Ren", "Mengyu", "" ], [ "Liu", "Debin", "" ], [ "Li", "Hua", "" ] ]
2505.08812
Nicolas Ressayre
Micha\"el Bulois (ICJ, AGL), Roland Denis (INSMI-CNRS, CNRS, ICJ), Nicolas Ressayre (ICJ, AGL)
An Algorithm to compute the Kronecker cone and other moment cones
null
null
null
null
math.AG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe an algorithm that computes the minimal list of inequalities for the moment cone of any representation of a complex reductive group. We give more details for the Kronecker cone (that is the asymptotic support of the Kronecker coefficients) and the fermionic cone. These two cases correspond to the action of $GL_{d_1}(\mathbb C)\times\cdots\times GL_{d_s}(\mathbb C)$ on $\mathbb C^{d_1}\otimes\cdots\otimes \mathbb C^{d_s}$ and $GL_d(\mathbb C)$ on $\bigwedge^r\mathbb C^d$, respectively. These two cases are implemented in Python-Sage. Available at https://ea-icj.github.io/, our algorithm improves in several directions, the one given by Vergne-Walter in Inequalities for Moment Cones of Finite-Dimensional Representations. For example, it can compute the minimal list of 463 inequalities for the Kronecker cone $(5,5,5)$ in 20 minutes. An important ingredient is an algorithm that decides whether an application is birational or not. It could be of independent interest in effective algebraic geometry.
[ { "version": "v1", "created": "Mon, 12 May 2025 08:03:36 GMT" } ]
2025-05-15T00:00:00
[ [ "Bulois", "Michaël", "", "ICJ, AGL" ], [ "Denis", "Roland", "", "INSMI-CNRS, CNRS, ICJ" ], [ "Ressayre", "Nicolas", "", "ICJ, AGL" ] ]
2505.08813
Francesco Russo
Carlo Ciccarella, Francesco Russo (OC, ENSTA)
$C^{ 0,1}$ -It{\^o} chain rules and generalized solutions of parabolic PDEs
arXiv admin note: substantial text overlap with arXiv:2407.06243
null
null
null
math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we first establish an It\^o formula for a finite quadratic variation process $X$ expanding $f(t,X_t),$ when $f$ is of class $C^2$ in space and is absolutely continuous in time. Second, via a Fukushima-Dirichlet decomposition we obtain an explicit chain rule for $f(t,X_t)$, when $X$ is a continuous semimartingale and $f$ is a ``quasi-strong solution'' (in the sense of approximation of classical solutions) of a parabolic PDE.
[ { "version": "v1", "created": "Mon, 12 May 2025 08:13:51 GMT" } ]
2025-05-15T00:00:00
[ [ "Ciccarella", "Carlo", "", "OC, ENSTA" ], [ "Russo", "Francesco", "", "OC, ENSTA" ] ]
2505.08814
Wenkai Li
Wenkai Li, Xiaoqi Li, Yingjie Mao, Yishun Wang
Towards Understanding Deep Learning Model in Image Recognition via Coverage Test
null
null
null
null
cs.CV cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Deep neural networks (DNNs) play a crucial role in the field of artificial intelligence, and their security-related testing has been a prominent research focus. By inputting test cases, the behavior of models is examined for anomalies, and coverage metrics are utilized to determine the extent of neurons covered by these test cases. With the widespread application and advancement of DNNs, different types of neural behaviors have garnered attention, leading to the emergence of various coverage metrics for neural networks. However, there is currently a lack of empirical research on these coverage metrics, specifically in analyzing the relationships and patterns between model depth, configuration information, and neural network coverage. This paper aims to investigate the relationships and patterns of four coverage metrics: primary functionality, boundary, hierarchy, and structural coverage. A series of empirical experiments were conducted, selecting LeNet, VGG, and ResNet as different DNN architectures, along with 10 models of varying depths ranging from 5 to 54 layers, to compare and study the relationships between different depths, configuration information, and various neural network coverage metrics. Additionally, an investigation was carried out on the relationships between modified decision/condition coverage and dataset size. Finally, three potential future directions are proposed to further contribute to the security testing of DNN Models.
[ { "version": "v1", "created": "Mon, 12 May 2025 08:25:55 GMT" } ]
2025-05-15T00:00:00
[ [ "Li", "Wenkai", "" ], [ "Li", "Xiaoqi", "" ], [ "Mao", "Yingjie", "" ], [ "Wang", "Yishun", "" ] ]
2505.08815
Yuejiang Shi
Yuejiang Shi
Achievement of 1 MA Discharges in Hydrogen-Boron Plasmas on EXL-50U
null
null
null
null
physics.plasm-ph
http://creativecommons.org/licenses/by/4.0/
One mega ampere (MA) plasma discharges were achieved on the EXL-50U spherical torus (ST) in hydrogen-boron (p-B) plasmas with toroidal fields up to 1 T at major radii up to 0.6m. A key innovation in these experiments was the use of a boron-rich fueling strategy, incorporating a high-concentration boron-containing gas mixture and real-time boron powder injection during the discharges. The boron content in the fueling reached 10%, representing the first publicly reported MA-class hydrogen-boron plasma with such a high boron concentration. Non-inductive plasma startup was achieved using electron cyclotron resonance heating (ECRH), and a rapid current ramp-up to 1 MA was realized through the synergistic use of ECRH and the central solenoid (CS). With 800 kW of ECRH power, core electron temperatures of up to 3 keV were attained. These results demonstrate the feasibility of producing high-performance hydrogen-boron plasmas in a spherical torus configuration and offer important physics and engineering insights for future reactor-scale applications - particularly in the areas of low loop voltage current start-up and real-time boronization techniques.
[ { "version": "v1", "created": "Mon, 12 May 2025 09:55:58 GMT" } ]
2025-05-15T00:00:00
[ [ "Shi", "Yuejiang", "" ] ]
2505.08816
Ilias Syrigos
Ippokratis Koukoulis, Ilias Syrigos, and Thanasis Korakis
Self-Supervised Transformer-based Contrastive Learning for Intrusion Detection Systems
Accepted at IFIP Networking 2025. Code available at https://github.com/koukipp/contrastive_transformers_ids
null
null
null
cs.CR cs.LG
http://creativecommons.org/licenses/by/4.0/
As the digital landscape becomes more interconnected, the frequency and severity of zero-day attacks, have significantly increased, leading to an urgent need for innovative Intrusion Detection Systems (IDS). Machine Learning-based IDS that learn from the network traffic characteristics and can discern attack patterns from benign traffic offer an advanced solution to traditional signature-based IDS. However, they heavily rely on labeled datasets, and their ability to generalize when encountering unseen traffic patterns remains a challenge. This paper proposes a novel self-supervised contrastive learning approach based on transformer encoders, specifically tailored for generalizable intrusion detection on raw packet sequences. Our proposed learning scheme employs a packet-level data augmentation strategy combined with a transformer-based architecture to extract and generate meaningful representations of traffic flows. Unlike traditional methods reliant on handcrafted statistical features (NetFlow), our approach automatically learns comprehensive packet sequence representations, significantly enhancing performance in anomaly identification tasks and supervised learning for intrusion detection. Our transformer-based framework exhibits better performance in comparison to existing NetFlow self-supervised methods. Specifically, we achieve up to a 3% higher AUC in anomaly detection for intra-dataset evaluation and up to 20% higher AUC scores in inter-dataset evaluation. Moreover, our model provides a strong baseline for supervised intrusion detection with limited labeled data, exhibiting an improvement over self-supervised NetFlow models of up to 1.5% AUC when pretrained and evaluated on the same dataset. Additionally, we show the adaptability of our pretrained model when fine-tuned across different datasets, demonstrating strong performance even when lacking benign data from the target domain.
[ { "version": "v1", "created": "Mon, 12 May 2025 13:42:00 GMT" } ]
2025-05-15T00:00:00
[ [ "Koukoulis", "Ippokratis", "" ], [ "Syrigos", "Ilias", "" ], [ "Korakis", "Thanasis", "" ] ]
2505.08817
Camilo Carvajal Reyes
Camilo Carvajal Reyes, Joaqu\'in Fontbona and Felipe Tobar
Towards SFW sampling for diffusion models via external conditioning
Accepcted at IJCNN 2025
null
null
null
cs.CV cs.LG
http://creativecommons.org/licenses/by/4.0/
Score-based generative models (SBM), also known as diffusion models, are the de facto state of the art for image synthesis. Despite their unparalleled performance, SBMs have recently been in the spotlight for being tricked into creating not-safe-for-work (NSFW) content, such as violent images and non-consensual nudity. Current approaches that prevent unsafe generation are based on the models' own knowledge, and the majority of them require fine-tuning. This article explores the use of external sources for ensuring safe outputs in SBMs. Our safe-for-work (SFW) sampler implements a Conditional Trajectory Correction step that guides the samples away from undesired regions in the ambient space using multimodal models as the source of conditioning. Furthermore, using Contrastive Language Image Pre-training (CLIP), our method admits user-defined NSFW classes, which can vary in different settings. Our experiments on the text-to-image SBM Stable Diffusion validate that the proposed SFW sampler effectively reduces the generation of explicit content while being competitive with other fine-tuning-based approaches, as assessed via independent NSFW detectors. Moreover, we evaluate the impact of the SFW sampler on image quality and show that the proposed correction scheme comes at a minor cost with negligible effect on samples not needing correction. Our study confirms the suitability of the SFW sampler towards aligned SBM models and the potential of using model-agnostic conditioning for the prevention of unwanted images.
[ { "version": "v1", "created": "Mon, 12 May 2025 17:27:40 GMT" } ]
2025-05-15T00:00:00
[ [ "Reyes", "Camilo Carvajal", "" ], [ "Fontbona", "Joaquín", "" ], [ "Tobar", "Felipe", "" ] ]
2505.08818
Amara Tariq
Amara Tariq, Rimita Lahiri, Charles Kahn, Imon Banerjee
Position: Restructuring of Categories and Implementation of Guidelines Essential for VLM Adoption in Healthcare
15 pages, 2, tables, 3 figures
null
null
null
cs.CY cs.AI cs.LG
http://creativecommons.org/licenses/by/4.0/
The intricate and multifaceted nature of vision language model (VLM) development, adaptation, and application necessitates the establishment of clear and standardized reporting protocols, particularly within the high-stakes context of healthcare. Defining these reporting standards is inherently challenging due to the diverse nature of studies involving VLMs, which vary significantly from the development of all new VLMs or finetuning for domain alignment to off-the-shelf use of VLM for targeted diagnosis and prediction tasks. In this position paper, we argue that traditional machine learning reporting standards and evaluation guidelines must be restructured to accommodate multiphase VLM studies; it also has to be organized for intuitive understanding of developers while maintaining rigorous standards for reproducibility. To facilitate community adoption, we propose a categorization framework for VLM studies and outline corresponding reporting standards that comprehensively address performance evaluation, data reporting protocols, and recommendations for manuscript composition. These guidelines are organized according to the proposed categorization scheme. Lastly, we present a checklist that consolidates reporting standards, offering a standardized tool to ensure consistency and quality in the publication of VLM-related research.
[ { "version": "v1", "created": "Mon, 12 May 2025 18:39:54 GMT" } ]
2025-05-15T00:00:00
[ [ "Tariq", "Amara", "" ], [ "Lahiri", "Rimita", "" ], [ "Kahn", "Charles", "" ], [ "Banerjee", "Imon", "" ] ]
2505.08819
Tsuyoshi Okita
Asahi Miyazaki, Tsuyoshi Okita
Thoughts on Objectives of Sparse and Hierarchical Masked Image Model
9 pages, 11 figures
null
null
null
eess.IV cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Masked image modeling is one of the most poplular objectives of training. Recently, the SparK model has been proposed with superior performance among self-supervised learning models. This paper proposes a new mask pattern for this SparK model, proposing it as the Mesh Mask-ed SparK model. We report the effect of the mask pattern used for image masking in pre-training on performance.
[ { "version": "v1", "created": "Mon, 12 May 2025 18:40:46 GMT" } ]
2025-05-15T00:00:00
[ [ "Miyazaki", "Asahi", "" ], [ "Okita", "Tsuyoshi", "" ] ]
2505.08820
Xi-Wang Luo
Xian-Hao Wei, Xi-Wang Luo, Guang-Can Guo and Zheng-Wei Zhou
Higher-order Topological Parity Anomaly and Half-integer Hall Effect in High-dimensional Synthetic Lattices
5 pages, 4 figures, with 15 page Supplementary information
null
null
null
cond-mat.mes-hall cond-mat.other physics.optics quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent advances in constructing synthetic dimension provide a powerful tool for exploring exotic topological states of matter in high dimensions. Here we report that the parity anomaly and associated \textit{half-integer} quantized Hall conductance, arising in 2$j$+1 (space-time) dimensions with a single or odd number of Dirac cones, can be realized by the boundary states of $n$-th order topological insulators in (2$j$+$n$)-dimensional synthetic lattices. We establish a general bulk-boundary correspondence by integrating the ``nested" Wilson loop theory with the time-reversal polarization at highly-symmetric momenta, a set of $Z_2$ topological invariants are extracted which determines the number of higher-order-boundary Dirac cones and their locations. We develop a general construction procedure for Hamiltonians supporting such higher-order topological parity anomaly. Moreover, we propose an experimental implementation scheme based on photonic synthetic dimensions and provide a method for probing the associated half-integer Hall conductance by the transmission spectra. Our work offers the realization and characterization of parity anomaly in general high-dimensional higher-order topological insulators and opens an avenue for exploring fundamental physics and possible device applications enabled by manipulating Dirac cones.
[ { "version": "v1", "created": "Mon, 12 May 2025 18:44:54 GMT" } ]
2025-05-15T00:00:00
[ [ "Wei", "Xian-Hao", "" ], [ "Luo", "Xi-Wang", "" ], [ "Guo", "Guang-Can", "" ], [ "Zhou", "Zheng-Wei", "" ] ]
2505.08821
Meryem Karagoz
Meryem Altin Karagoz, Marc D. Breton, Anas El Fathi
A Comparative Study of Transformer-Based Models for Multi-Horizon Blood Glucose Prediction
7 pages, 2 figures, 1 table, 1st IFAC Workshop on Engineering Diabetes Technologies (EDT 2025)
null
null
null
q-bio.QM cs.AI stat.AP
http://creativecommons.org/licenses/by-nc-nd/4.0/
Accurate blood glucose prediction can enable novel interventions for type 1 diabetes treatment, including personalized insulin and dietary adjustments. Although recent advances in transformer-based architectures have demonstrated the power of attention mechanisms in complex multivariate time series prediction, their potential for blood glucose (BG) prediction remains underexplored. We present a comparative analysis of transformer models for multi-horizon BG prediction, examining forecasts up to 4 hours and input history up to 1 week. The publicly available DCLP3 dataset (n=112) was split (80%-10%-10%) for training, validation, and testing, and the OhioT1DM dataset (n=12) served as an external test set. We trained networks with point-wise, patch-wise, series-wise, and hybrid embeddings, using CGM, insulin, and meal data. For short-term blood glucose prediction, Crossformer, a patch-wise transformer architecture, achieved a superior 30-minute prediction of RMSE (15.6 mg / dL on OhioT1DM). For longer-term predictions (1h, 2h, and 4h), PatchTST, another path-wise transformer, prevailed with the lowest RMSE (24.6 mg/dL, 36.1 mg/dL, and 46.5 mg/dL on OhioT1DM). In general, models that used tokenization through patches demonstrated improved accuracy with larger input sizes, with the best results obtained with a one-week history. These findings highlight the promise of transformer-based architectures for BG prediction by capturing and leveraging seasonal patterns in multivariate time-series data to improve accuracy.
[ { "version": "v1", "created": "Mon, 12 May 2025 20:22:44 GMT" } ]
2025-05-15T00:00:00
[ [ "Karagoz", "Meryem Altin", "" ], [ "Breton", "Marc D.", "" ], [ "Fathi", "Anas El", "" ] ]
2505.08822
Kailai Wang
Yuhao Wang, Kailai Wang, Songhua Hu, Yunpeng (Jack) Zhang, Gino Lim, and Pengyu Zhu
The Geography of Transportation Cybersecurity: Visitor Flows, Industry Clusters, and Spatial Dynamics
null
null
null
null
cs.CY cs.LG physics.soc-ph
http://creativecommons.org/licenses/by/4.0/
The rapid evolution of the transportation cybersecurity ecosystem, encompassing cybersecurity, automotive, and transportation and logistics sectors, will lead to the formation of distinct spatial clusters and visitor flow patterns across the US. This study examines the spatiotemporal dynamics of visitor flows, analyzing how socioeconomic factors shape industry clustering and workforce distribution within these evolving sectors. To model and predict visitor flow patterns, we develop a BiTransGCN framework, integrating an attention-based Transformer architecture with a Graph Convolutional Network backbone. By integrating AI-enabled forecasting techniques with spatial analysis, this study improves our ability to track, interpret, and anticipate changes in industry clustering and mobility trends, thereby supporting strategic planning for a secure and resilient transportation network. It offers a data-driven foundation for economic planning, workforce development, and targeted investments in the transportation cybersecurity ecosystem.
[ { "version": "v1", "created": "Mon, 12 May 2025 20:44:02 GMT" } ]
2025-05-15T00:00:00
[ [ "Wang", "Yuhao", "", "Jack" ], [ "Wang", "Kailai", "", "Jack" ], [ "Hu", "Songhua", "", "Jack" ], [ "Yunpeng", "", "", "Jack" ], [ "Zhang", "", "" ], [ "Lim", "Gino", "" ], [ "Zhu", "Pengyu", "" ] ]
2505.08823
Cody Steinmetz
Cody Steinmetz, Gavin Childress, Aaron Herbst, Gavin Jones, Jasdeep Singh, Eli Vang, and Keagan Weinstock
An Extra RMSNorm is All You Need for Fine Tuning to 1.58 Bits
null
null
null
null
cs.LG cs.AI cs.CL
http://creativecommons.org/licenses/by/4.0/
Large language models (LLMs) have transformed natural-language processing, yet their scale makes real-world deployment costly. Post-training quantization reduces memory and computation but often degrades accuracy, while quantization-aware training can recover performance at the cost of extra training. Pushing quantization to the ternary (2-bit) regime yields even larger savings but is notoriously unstable. Building on recent work showing that a bias-free, RMS-normalized Transformer with straight-through estimation can reach 1.58-bit precision, we demonstrate that simply inserting RMS normalization before every linear projection and applying a gradual, layer-wise quantization schedule stably fine-tunes full-precision checkpoints into ternary LLMs. Our approach matches or surpasses more elaborate knowledge-distillation pipelines on standard language-modeling benchmarks without adding model complexity. These results indicate that careful normalization alone can close much of the accuracy gap between ternary and full-precision LLMs, making ultra-low-bit inference practical.
[ { "version": "v1", "created": "Mon, 12 May 2025 21:14:29 GMT" } ]
2025-05-15T00:00:00
[ [ "Steinmetz", "Cody", "" ], [ "Childress", "Gavin", "" ], [ "Herbst", "Aaron", "" ], [ "Jones", "Gavin", "" ], [ "Singh", "Jasdeep", "" ], [ "Vang", "Eli", "" ], [ "Weinstock", "Keagan", "" ] ]
2505.08824
Swagat Saurav Mishra
Varun Sahni
Remembering Alexei Starobinsky -- the gentle giant of cosmology
23 pages, 10 figures, Contribution to the book "Open Issues in Gravitation and Cosmology - Original Contributions, Essays and Recollections in Honor of Alexei Starobinsky", to be published by Springer, edited by Andrei Barvinsky and Alexander Kamenshchik
null
null
null
gr-qc astro-ph.CO hep-ph hep-th
http://creativecommons.org/licenses/by/4.0/
I share fond memories of my former PhD advisor Alexei Starobinsky with whom I was closely associated for nearly 45 years. I reflect upon my early years in Moscow when I worked with him on my thesis, and touch upon the seminal work on inflation which he did during that period. Alexei visited India often and actively interacted with Indian scientists and students on issues relating to inflation, large scale structure and dark energy. This extensive collaboration, which lasted several decades, resulted in the publication of over a dozen important papers, several PhD's, and the development of the Statefinder and Om diagnostics, which I briefly discuss.
[ { "version": "v1", "created": "Mon, 12 May 2025 21:30:31 GMT" } ]
2025-05-15T00:00:00
[ [ "Sahni", "Varun", "" ] ]
2505.08825
Pedro Antonio Alarcon Granadeno
Pedro Antonio Alarcon Granadeno, Theodore Chambers, Jane Cleland-Huang
Multi-source Plume Tracing via Multi-Agent Reinforcement Learning
13 pages, 7 figures
null
null
null
cs.MA cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Industrial catastrophes like the Bhopal disaster (1984) and the Aliso Canyon gas leak (2015) demonstrate the urgent need for rapid and reliable plume tracing algorithms to protect public health and the environment. Traditional methods, such as gradient-based or biologically inspired approaches, often fail in realistic, turbulent conditions. To address these challenges, we present a Multi-Agent Reinforcement Learning (MARL) algorithm designed for localizing multiple airborne pollution sources using a swarm of small uncrewed aerial systems (sUAS). Our method models the problem as a Partially Observable Markov Game (POMG), employing a Long Short-Term Memory (LSTM)-based Action-specific Double Deep Recurrent Q-Network (ADDRQN) that uses full sequences of historical action-observation pairs, effectively approximating latent states. Unlike prior work, we use a general-purpose simulation environment based on the Gaussian Plume Model (GPM), incorporating realistic elements such as a three-dimensional environment, sensor noise, multiple interacting agents, and multiple plume sources. The incorporation of action histories as part of the inputs further enhances the adaptability of our model in complex, partially observable environments. Extensive simulations show that our algorithm significantly outperforms conventional approaches. Specifically, our model allows agents to explore only 1.29\% of the environment to successfully locate pollution sources.
[ { "version": "v1", "created": "Mon, 12 May 2025 21:33:15 GMT" } ]
2025-05-15T00:00:00
[ [ "Granadeno", "Pedro Antonio Alarcon", "" ], [ "Chambers", "Theodore", "" ], [ "Cleland-Huang", "Jane", "" ] ]
2505.08826
Phil Attard
Phil Attard
The Two-Fluid Theory for Superfluid Hydrodynamics and the Fountain Pressure Paradox
6 pages
null
null
null
cond-mat.stat-mech
http://creativecommons.org/licenses/by/4.0/
The two-fluid theory for superfluid hydrodynamics is derived from the fountain pressure result that condensed bosons move at constant entropy, and that therefore steady superfluid flow connects regions of equal chemical potential. The paradox of the fountain pressure equation is resolved with a quantitative prediction.
[ { "version": "v1", "created": "Mon, 12 May 2025 21:57:44 GMT" } ]
2025-05-15T00:00:00
[ [ "Attard", "Phil", "" ] ]
2505.08827
Toby Simonds
Toby Simonds, Kevin Lopez, Akira Yoshiyama, Dominique Garmier
Self Rewarding Self Improving
null
null
null
null
cs.LG cs.AI
http://creativecommons.org/licenses/by/4.0/
We demonstrate that large language models can effectively self-improve through self-judging without requiring reference solutions, leveraging the inherent asymmetry between generating and verifying solutions. Our experiments on Countdown puzzles and MIT Integration Bee problems show that models can provide reliable reward signals without ground truth answers, enabling reinforcement learning in domains previously not possible. By implementing self-judging, we achieve significant performance gains maintaining alignment with formal verification. When combined with synthetic question generation, we establish a complete self-improvement loop where models generate practice problems, solve them, and evaluate their own performance-achieving an 8% improvement with Qwen 2.5 7B over baseline and surpassing GPT-4o performance on integration tasks. Our findings demonstrate that LLM judges can provide effective reward signals for training models, unlocking many reinforcement learning environments previously limited by the difficulty of creating programmatic rewards. This suggests a potential paradigm shift toward AI systems that continuously improve through self-directed learning rather than human-guided training, potentially accelerating progress in domains with scarce training data or complex evaluation requirements.
[ { "version": "v1", "created": "Mon, 12 May 2025 23:51:04 GMT" } ]
2025-05-15T00:00:00
[ [ "Simonds", "Toby", "" ], [ "Lopez", "Kevin", "" ], [ "Yoshiyama", "Akira", "" ], [ "Garmier", "Dominique", "" ] ]
2505.08828
Eduardo Oliveira
Eduardo Araujo Oliveira, Madhavi Mohoni, Sonsoles L\'opez-Pernas, Mohammed Saqr
Human-AI Collaboration or Academic Misconduct? Measuring AI Use in Student Writing Through Stylometric Evidence
19 pages, 10 figures, 11 tables
null
null
null
cs.CL cs.AI cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As human-AI collaboration becomes increasingly prevalent in educational contexts, understanding and measuring the extent and nature of such interactions pose significant challenges. This research investigates the use of authorship verification (AV) techniques not as a punitive measure, but as a means to quantify AI assistance in academic writing, with a focus on promoting transparency, interpretability, and student development. Building on prior work, we structured our investigation into three stages: dataset selection and expansion, AV method development, and systematic evaluation. Using three datasets - including a public dataset (PAN-14) and two from University of Melbourne students from various courses - we expanded the data to include LLM-generated texts, totalling 1,889 documents and 540 authorship problems from 506 students. We developed an adapted Feature Vector Difference AV methodology to construct robust academic writing profiles for students, designed to capture meaningful, individual characteristics of their writing. The method's effectiveness was evaluated across multiple scenarios, including distinguishing between student-authored and LLM-generated texts and testing resilience against LLMs' attempts to mimic student writing styles. Results demonstrate the enhanced AV classifier's ability to identify stylometric discrepancies and measure human-AI collaboration at word and sentence levels while providing educators with a transparent tool to support academic integrity investigations. This work advances AV technology, offering actionable insights into the dynamics of academic writing in an AI-driven era.
[ { "version": "v1", "created": "Tue, 13 May 2025 00:36:36 GMT" } ]
2025-05-15T00:00:00
[ [ "Oliveira", "Eduardo Araujo", "" ], [ "Mohoni", "Madhavi", "" ], [ "López-Pernas", "Sonsoles", "" ], [ "Saqr", "Mohammed", "" ] ]
2505.08830
Wenhao Jiang
Wenhao Jiang and Yuchuan Luo and Guilin Deng and Silong Chen and Xu Yang and Shihong Wu and Xinwen Gao and Lin Liu and Shaojing Fu
Federated Large Language Models: Feasibility, Robustness, Security and Future Directions
35 pages
null
null
null
cs.CR cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The integration of Large Language Models (LLMs) and Federated Learning (FL) presents a promising solution for joint training on distributed data while preserving privacy and addressing data silo issues. However, this emerging field, known as Federated Large Language Models (FLLM), faces significant challenges, including communication and computation overheads, heterogeneity, privacy and security concerns. Current research has primarily focused on the feasibility of FLLM, but future trends are expected to emphasize enhancing system robustness and security. This paper provides a comprehensive review of the latest advancements in FLLM, examining challenges from four critical perspectives: feasibility, robustness, security, and future directions. We present an exhaustive survey of existing studies on FLLM feasibility, introduce methods to enhance robustness in the face of resource, data, and task heterogeneity, and analyze novel risks associated with this integration, including privacy threats and security challenges. We also review the latest developments in defense mechanisms and explore promising future research directions, such as few-shot learning, machine unlearning, and IP protection. This survey highlights the pressing need for further research to enhance system robustness and security while addressing the unique challenges posed by the integration of FL and LLM.
[ { "version": "v1", "created": "Tue, 13 May 2025 03:23:54 GMT" } ]
2025-05-15T00:00:00
[ [ "Jiang", "Wenhao", "" ], [ "Luo", "Yuchuan", "" ], [ "Deng", "Guilin", "" ], [ "Chen", "Silong", "" ], [ "Yang", "Xu", "" ], [ "Wu", "Shihong", "" ], [ "Gao", "Xinwen", "" ], [ "Liu", "Lin", "" ], [ "Fu", "Shaojing", "" ] ]
2505.08831
Arish Alreja
Arish Alreja, Michael J. Ward, Lisa S. Parker, R. Mark Richardson, Louis-Philippe Morency, Taylor J. Abel, Avniel Singh Ghuman
Neural encoding of real world face perception
null
null
null
null
q-bio.NC
http://creativecommons.org/licenses/by-nc-nd/4.0/
Social perception unfolds as we freely interact with people around us. We investigated the neural basis of real world face perception using multi electrode intracranial recordings in humans during spontaneous interactions with friends, family, and others. Computational models reconstructed the faces participants looked at during natural interactions, including facial expressions and motion, from brain activity alone. The results highlighted a critical role for the social vision pathway, a network of areas spanning parietal, temporal, and occipital cortex. This network was more sharply tuned to subtle expressions compared to intense expressions, which was confirmed with controlled psychophysical experiments. These findings reveal that the human social vision pathway encodes facial expressions and motion as deviations from a neutral expression prototype during natural social interactions in real life.
[ { "version": "v1", "created": "Tue, 13 May 2025 03:26:56 GMT" } ]
2025-05-15T00:00:00
[ [ "Alreja", "Arish", "" ], [ "Ward", "Michael J.", "" ], [ "Parker", "Lisa S.", "" ], [ "Richardson", "R. Mark", "" ], [ "Morency", "Louis-Philippe", "" ], [ "Abel", "Taylor J.", "" ], [ "Ghuman", "Avniel Singh", "" ] ]
2505.08832
Leif Svalgaard
Leif Svalgaard
A Possible Problem with the Sunspot Number
8 Figures
null
null
null
astro-ph.IM astro-ph.SR physics.space-ph
http://creativecommons.org/licenses/by/4.0/
Sunspots are areas of strong magnetic fields driven by a convective dynamo. Rudolf Wolf devised his Sunspot Number (SN) series to describe its variation with time. Most other solar phenomena vary in concert with SN, in particular the microwave radiation. During the interval 2014-Jul to 2015-Dec, the variation of the SN with the microwave flux (e.g. F10.7) was anomalous, although microwave flux did not exhibit any anomaly with respect to the solar magnetic field measured by the HMI instrument on the SDO spacecraft. This points to a possible problem with the derivation of the SN using the 148,714 reports of sunspot observations received by the World Data Center Solar Influences (SIDC/SILSO at ROB) since 2011 (when the last public raw data was released). The unavailability of the raw data since then, contrary to avowed open data policy of ROB, prevents independent assessment and possible correction of the anomaly. We urge ROB to make the raw data available.
[ { "version": "v1", "created": "Tue, 13 May 2025 04:17:29 GMT" } ]
2025-05-15T00:00:00
[ [ "Svalgaard", "Leif", "" ] ]