-
An effective density matrix for vacua in asymptotically flat gravity
Authors:
Temple He,
Prahar Mitra,
Kathryn M. Zurek
Abstract:
We explicitly construct the density matrix associated to the vacuum state of a large spherically symmetric causal diamond of area $A$ in four-dimensional asymptotically flat gravity. We achieve this using the soft effective action, which characterizes the low-energy gravitational degrees of freedom that arise in the long-distance limit of the Einstein-Hilbert action and consists of both the soft g…
▽ More
We explicitly construct the density matrix associated to the vacuum state of a large spherically symmetric causal diamond of area $A$ in four-dimensional asymptotically flat gravity. We achieve this using the soft effective action, which characterizes the low-energy gravitational degrees of freedom that arise in the long-distance limit of the Einstein-Hilbert action and consists of both the soft graviton mode and the Goldstone mode arising from the spontaneous breaking of supertranslation symmetry. Integrating out the soft graviton mode, we obtain an effective action for purely the Goldstone mode, from which we extract the density matrix and therefore the modular Hamiltonian $K_{s}$ associated to the vacuum state. We explicitly compute the mean and variance of $K_{s}$, finding $\langle ΔK_{s}^{2} \rangle = A/ε_{\text{UV}}^{2}$, with $ε_{\text{UV}}$ being a length-scale UV cutoff on the celestial sphere.
△ Less
Submitted 16 September, 2025;
originally announced September 2025.
-
Vector Differential Operators in arbitrary coordinates: a general approach
Authors:
Priyabrata Mitra,
Dhrubaditya Mitra
Abstract:
We present a method for calculating the results of operation of differential operators operating on components of vector in generalized coordinates not restricted to orthogonal one. For this we use the relationships between covariant, contravariant and physical components of a vector and the idea of covariant differentiation. This not only simplifies vector calculus in common curvilinear coordinat…
▽ More
We present a method for calculating the results of operation of differential operators operating on components of vector in generalized coordinates not restricted to orthogonal one. For this we use the relationships between covariant, contravariant and physical components of a vector and the idea of covariant differentiation. This not only simplifies vector calculus in common curvilinear coordinates, e.g., cylindrical or spherical polar, but also provides a deeper understanding of these operators in coordinate independent form.
△ Less
Submitted 23 August, 2025;
originally announced August 2025.
-
MOTIF: Modular Thinking via Reinforcement Fine-tuning in LLMs
Authors:
Purbesh Mitra,
Sennur Ulukus
Abstract:
Recent advancements in the reasoning capabilities of large language models (LLMs) show that employing group relative policy optimization (GRPO) algorithm for reinforcement learning (RL) training allows the models to use more thinking/reasoning tokens for generating better responses. However, LLMs can generate only a finite amount of tokens while maintaining attention to the previously generated to…
▽ More
Recent advancements in the reasoning capabilities of large language models (LLMs) show that employing group relative policy optimization (GRPO) algorithm for reinforcement learning (RL) training allows the models to use more thinking/reasoning tokens for generating better responses. However, LLMs can generate only a finite amount of tokens while maintaining attention to the previously generated tokens. This limit, also known as the context size of an LLM, is a bottleneck in LLM reasoning with arbitrarily large number of tokens. To think beyond the limit of context size, an LLM must employ a modular thinking strategy to reason over multiple rounds. In this work, we propose $\textbf{MOTIF: Modular Thinking via Reinforcement Finetuning}$ -- an RL training method for generating thinking tokens in multiple rounds, effectively allowing the model to think with additional context size. We trained the open-source model Qwen2.5-3B-Instruct on GSM8K dataset via parameter efficient fine-tuning and tested its accuracy on MATH500 and AIME2024 benchmarks. Our experiments show 3.8\% and 3.3\% improvements over vanilla GRPO based training in the respective benchmarks. Furthermore, this improvement was achieved with only 15\% of samples, thus demonstrating sample efficiency of MOTIF. Our code and models are available at https://github.com/purbeshmitra/MOTIF and https://huggingface.co/purbeshmitra/MOTIF, respectively.
△ Less
Submitted 3 July, 2025;
originally announced July 2025.
-
TaxoAdapt: Aligning LLM-Based Multidimensional Taxonomy Construction to Evolving Research Corpora
Authors:
Priyanka Kargupta,
Nan Zhang,
Yunyi Zhang,
Rui Zhang,
Prasenjit Mitra,
Jiawei Han
Abstract:
The rapid evolution of scientific fields introduces challenges in organizing and retrieving scientific literature. While expert-curated taxonomies have traditionally addressed this need, the process is time-consuming and expensive. Furthermore, recent automatic taxonomy construction methods either (1) over-rely on a specific corpus, sacrificing generalizability, or (2) depend heavily on the genera…
▽ More
The rapid evolution of scientific fields introduces challenges in organizing and retrieving scientific literature. While expert-curated taxonomies have traditionally addressed this need, the process is time-consuming and expensive. Furthermore, recent automatic taxonomy construction methods either (1) over-rely on a specific corpus, sacrificing generalizability, or (2) depend heavily on the general knowledge of large language models (LLMs) contained within their pre-training datasets, often overlooking the dynamic nature of evolving scientific domains. Additionally, these approaches fail to account for the multi-faceted nature of scientific literature, where a single research paper may contribute to multiple dimensions (e.g., methodology, new tasks, evaluation metrics, benchmarks). To address these gaps, we propose TaxoAdapt, a framework that dynamically adapts an LLM-generated taxonomy to a given corpus across multiple dimensions. TaxoAdapt performs iterative hierarchical classification, expanding both the taxonomy width and depth based on corpus' topical distribution. We demonstrate its state-of-the-art performance across a diverse set of computer science conferences over the years to showcase its ability to structure and capture the evolution of scientific fields. As a multidimensional method, TaxoAdapt generates taxonomies that are 26.51% more granularity-preserving and 50.41% more coherent than the most competitive baselines judged by LLMs.
△ Less
Submitted 12 June, 2025;
originally announced June 2025.
-
Mechanism of Conductivity Enhancement of Polymers Employing Microbubble Lithography
Authors:
Anand Dev Ranjan,
Dhananjay Mahapatra,
Partha Mitra,
Ayan Banerjee
Abstract:
The pursuit of green methodologies for fabricating optoelectronic devices necessitates the adoption of self-assembly-based strategies to engineer efficient and sustainable platforms. Microbubble lithography (MBL) stands out as a directed self-assembly technique, enabling real-time micropatterning of conductive structures. Notably, this approach achieves significant enhancements in the conductivity…
▽ More
The pursuit of green methodologies for fabricating optoelectronic devices necessitates the adoption of self-assembly-based strategies to engineer efficient and sustainable platforms. Microbubble lithography (MBL) stands out as a directed self-assembly technique, enabling real-time micropatterning of conductive structures. Notably, this approach achieves significant enhancements in the conductivity of patterned polymers without requiring external dopants. However, the underlying mechanisms driving this enhancement remain poorly understood. In this study, we address this knowledge gap through a combined theoretical and experimental investigation of a binary polymer system. Molecular dynamics simulations and percolation theory reveal structural transformations that underpin improved charge transport. Furthermore, we demonstrate that phase separation at the interfaces of interacting polymers plays a pivotal role in enhancing conductivity. This separation optimizes the conformational states of the polymers, facilitating more efficient charge carrier transport and ultimately leading to higher conductivity. Our findings establish MBL-induced self-assembly as a robust and sustainable technique for fabricating conductive patterns, paving the way for its integration into next-generation optoelectronic devices.
△ Less
Submitted 11 June, 2025;
originally announced June 2025.
-
Removal of spallation-induced tritium from silicon through diffusion
Authors:
R. Saldanha,
D. Reading,
P. E. Warwick,
A. E. Chavarria,
B. Loer,
P. Mitra,
L. Pagani,
P. Privitera
Abstract:
Tritium, predominantly produced through spallation reactions caused by cosmic ray interactions, is a significant radioactive background for silicon-based rare event detection experiments, such as dark matter searches. We have investigated the feasibility of removing cosmogenic tritium from high-purity silicon intended for use in low-background experiments. We demonstrate that significant tritium r…
▽ More
Tritium, predominantly produced through spallation reactions caused by cosmic ray interactions, is a significant radioactive background for silicon-based rare event detection experiments, such as dark matter searches. We have investigated the feasibility of removing cosmogenic tritium from high-purity silicon intended for use in low-background experiments. We demonstrate that significant tritium removal is possible through diffusion by subjecting silicon to high-temperature (> 400C) baking. Using an analytical model for the de-trapping and diffusion of tritium in silicon, our measurements indicate that cosmogenic tritium diffusion constants are comparable to previous measurements of thermally-introduced tritium, with complete de-trapping and removal achievable above 750C. This approach has the potential to alleviate the stringent constraints of cosmic ray exposure prior to device fabrication and significantly reduce the cosmogenic tritium backgrounds of silicon-based detectors for next-generation rare event searches.
△ Less
Submitted 6 June, 2025;
originally announced June 2025.
-
Modeling Ranking Properties with In-Context Learning
Authors:
Nilanjan Sinhababu,
Andrew Parry,
Debasis Ganguly,
Pabitra Mitra
Abstract:
While standard IR models are mainly designed to optimize relevance, real-world search often needs to balance additional objectives such as diversity and fairness. These objectives depend on inter-document interactions and are commonly addressed using post-hoc heuristics or supervised learning methods, which require task-specific training for each ranking scenario and dataset. In this work, we prop…
▽ More
While standard IR models are mainly designed to optimize relevance, real-world search often needs to balance additional objectives such as diversity and fairness. These objectives depend on inter-document interactions and are commonly addressed using post-hoc heuristics or supervised learning methods, which require task-specific training for each ranking scenario and dataset. In this work, we propose an in-context learning (ICL) approach that eliminates the need for such training. Instead, our method relies on a small number of example rankings that demonstrate the desired trade-offs between objectives for past queries similar to the current input. We evaluate our approach on four IR test collections to investigate multiple auxiliary objectives: group fairness (TREC Fairness), polarity diversity (Touché), and topical diversity (TREC Deep Learning 2019/2020). We empirically validate that our method enables control over ranking behavior through demonstration engineering, allowing nuanced behavioral adjustments without explicit optimization.
△ Less
Submitted 23 May, 2025;
originally announced May 2025.
-
Skeletonization of neuronal processes using Discrete Morse techniques from computational topology
Authors:
Samik Banerjee,
Caleb Stam,
Daniel J. Tward,
Steven Savoia,
Yusu Wang,
Partha P. Mitra
Abstract:
To understand biological intelligence we need to map neuronal networks in vertebrate brains. Mapping mesoscale neural circuitry is done using injections of tracers that label groups of neurons whose axons project to different brain regions. Since many neurons are labeled, it is difficult to follow individual axons. Previous approaches have instead quantified the regional projections using the tota…
▽ More
To understand biological intelligence we need to map neuronal networks in vertebrate brains. Mapping mesoscale neural circuitry is done using injections of tracers that label groups of neurons whose axons project to different brain regions. Since many neurons are labeled, it is difficult to follow individual axons. Previous approaches have instead quantified the regional projections using the total label intensity within a region. However, such a quantification is not biologically meaningful. We propose a new approach better connected to the underlying neurons by skeletonizing labeled axon fragments and then estimating a volumetric length density. Our approach uses a combination of deep nets and the Discrete Morse (DM) technique from computational topology. This technique takes into account nonlocal connectivity information and therefore provides noise-robustness. We demonstrate the utility and scalability of the approach on whole-brain tracer injected data. We also define and illustrate an information theoretic measure that quantifies the additional information obtained, compared to the skeletonized tracer injection fragments, when individual axon morphologies are available. Our approach is the first application of the DM technique to computational neuroanatomy. It can help bridge between single-axon skeletons and tracer injections, two important data types in mapping neural networks in vertebrates.
△ Less
Submitted 12 May, 2025;
originally announced May 2025.
-
How to Backdoor the Knowledge Distillation
Authors:
Chen Wu,
Qian Ma,
Prasenjit Mitra,
Sencun Zhu
Abstract:
Knowledge distillation has become a cornerstone in modern machine learning systems, celebrated for its ability to transfer knowledge from a large, complex teacher model to a more efficient student model. Traditionally, this process is regarded as secure, assuming the teacher model is clean. This belief stems from conventional backdoor attacks relying on poisoned training data with backdoor trigger…
▽ More
Knowledge distillation has become a cornerstone in modern machine learning systems, celebrated for its ability to transfer knowledge from a large, complex teacher model to a more efficient student model. Traditionally, this process is regarded as secure, assuming the teacher model is clean. This belief stems from conventional backdoor attacks relying on poisoned training data with backdoor triggers and attacker-chosen labels, which are not involved in the distillation process. Instead, knowledge distillation uses the outputs of a clean teacher model to guide the student model, inherently preventing recognition or response to backdoor triggers as intended by an attacker. In this paper, we challenge this assumption by introducing a novel attack methodology that strategically poisons the distillation dataset with adversarial examples embedded with backdoor triggers. This technique allows for the stealthy compromise of the student model while maintaining the integrity of the teacher model. Our innovative approach represents the first successful exploitation of vulnerabilities within the knowledge distillation process using clean teacher models. Through extensive experiments conducted across various datasets and attack settings, we demonstrate the robustness, stealthiness, and effectiveness of our method. Our findings reveal previously unrecognized vulnerabilities and pave the way for future research aimed at securing knowledge distillation processes against backdoor attacks.
△ Less
Submitted 30 April, 2025;
originally announced April 2025.
-
Absorption of Fermionic Dark Matter in the PICO-60 C$_{3}$F$_{8}$ Bubble Chamber
Authors:
E. Adams,
B. Ali,
R. Anderson-Dornan,
I. J. Arnquist,
M. Bai,
D. Baxter,
E. Behnke,
B. Broerman,
C. J. Chen,
K. Clark,
J. I. Collar,
P. S. Cooper,
D. Cranshaw,
C. Cripe,
M. Crisler,
C. E. Dahl,
M. Das,
S. Das,
S. Fallows,
J. Farine,
R. Filgas,
A. García-Viltres,
G. Giroux,
O. Harris,
H. Hawley-Herrera
, et al. (36 additional authors not shown)
Abstract:
Fermionic dark matter absorption on nuclear targets via neutral current interactions is explored using a non-relativistic effective field theory framework. An analysis of data from the PICO-60 C$_{3}$F$_{8}$ bubble chamber sets leading constraints on spin-independent absorption for dark matter masses below 23 MeV/$\textit{c}^2$ and establishes the first limits on spin-dependent absorptive interact…
▽ More
Fermionic dark matter absorption on nuclear targets via neutral current interactions is explored using a non-relativistic effective field theory framework. An analysis of data from the PICO-60 C$_{3}$F$_{8}$ bubble chamber sets leading constraints on spin-independent absorption for dark matter masses below 23 MeV/$\textit{c}^2$ and establishes the first limits on spin-dependent absorptive interactions. These results demonstrate the sensitivity of bubble chambers to low-mass dark matter and underscore the importance of absorption searches in expanding the parameter space of direct detection experiments.
△ Less
Submitted 24 June, 2025; v1 submitted 17 April, 2025;
originally announced April 2025.
-
When Reasoning Meets Compression: Understanding the Effects of LLMs Compression on Large Reasoning Models
Authors:
Nan Zhang,
Eugene Kwek,
Yusen Zhang,
Ngoc-Hieu Nguyen,
Prasenjit Mitra,
Rui Zhang
Abstract:
Compression methods, including quantization, distillation, and pruning, improve the computational efficiency of large reasoning models (LRMs). However, existing studies either fail to sufficiently compare all three compression methods on LRMs or lack in-depth interpretation analysis. In this paper, we investigate how the reasoning capabilities of LRMs are compromised during compression, through pe…
▽ More
Compression methods, including quantization, distillation, and pruning, improve the computational efficiency of large reasoning models (LRMs). However, existing studies either fail to sufficiently compare all three compression methods on LRMs or lack in-depth interpretation analysis. In this paper, we investigate how the reasoning capabilities of LRMs are compromised during compression, through performance benchmarking and mechanistic interpretation. To uncover the effects of compression on reasoning performance, we benchmark quantized, distilled, and pruned DeepSeek-R1 models on four reasoning datasets (AIME 2024, FOLIO, Temporal Sequences, and MuSiQue). To precisely locate compression effects on model weights, we adapt difference of means and attribution patching techniques, focusing on the activation of every linear component in compressed LRMs, to interpret fine-grained causal relationships between weights and various reasoning capabilities. This fine-grained interpretation addresses a fundamental question of compression: which weights are the most important for reasoning? Overall, we find dynamically quantized 2.51-bit R1 reaches close-to-R1 performance. With empirical verification, we present three main findings that generalize across both Llama and Qwen: (1) Weight count has a greater impact on LRMs' knowledge memorization than reasoning, highlighting the risks of pruning and distillation; (2) The MLP up projection in the final layer of distilled LRMs is one of the most important components, offering a new perspective on locating critical weights - a fundamental problem in model compression; and (3) Current quantization methods overly compress the final-layer modules and MLP gate projections, so protecting just 2% of all weights that are excessively compressed can raise average accuracy by 6.57%, greatly surpassing the state-of-the-art.
△ Less
Submitted 1 October, 2025; v1 submitted 2 April, 2025;
originally announced April 2025.
-
Iterative Hypothesis Generation for Scientific Discovery with Monte Carlo Nash Equilibrium Self-Refining Trees
Authors:
Gollam Rabby,
Diyana Muhammed,
Prasenjit Mitra,
Sören Auer
Abstract:
Scientific hypothesis generation is a fundamentally challenging task in research, requiring the synthesis of novel and empirically grounded insights. Traditional approaches rely on human intuition and domain expertise, while purely large language model (LLM) based methods often struggle to produce hypotheses that are both innovative and reliable. To address these limitations, we propose the Monte…
▽ More
Scientific hypothesis generation is a fundamentally challenging task in research, requiring the synthesis of novel and empirically grounded insights. Traditional approaches rely on human intuition and domain expertise, while purely large language model (LLM) based methods often struggle to produce hypotheses that are both innovative and reliable. To address these limitations, we propose the Monte Carlo Nash Equilibrium Self-Refine Tree (MC-NEST), a novel framework that integrates Monte Carlo Tree Search with Nash Equilibrium strategies to iteratively refine and validate hypotheses. MC-NEST dynamically balances exploration and exploitation through adaptive sampling strategies, which prioritize high-potential hypotheses while maintaining diversity in the search space. We demonstrate the effectiveness of MC-NEST through comprehensive experiments across multiple domains, including biomedicine, social science, and computer science. MC-NEST achieves average scores of 2.65, 2.74, and 2.80 (on a 1-3 scale) for novelty, clarity, significance, and verifiability metrics on the social science, computer science, and biomedicine datasets, respectively, outperforming state-of-the-art prompt-based methods, which achieve 2.36, 2.51, and 2.52 on the same datasets. These results underscore MC-NEST's ability to generate high-quality, empirically grounded hypotheses across diverse domains. Furthermore, MC-NEST facilitates structured human-AI collaboration, ensuring that LLMs augment human creativity rather than replace it. By addressing key challenges such as iterative refinement and the exploration-exploitation balance, MC-NEST sets a new benchmark in automated hypothesis generation. Additionally, MC-NEST's ethical design enables responsible AI use, emphasizing transparency and human supervision in hypothesis generation.
△ Less
Submitted 24 March, 2025;
originally announced March 2025.
-
SCI-IDEA: Context-Aware Scientific Ideation Using Token and Sentence Embeddings
Authors:
Farhana Keya,
Gollam Rabby,
Prasenjit Mitra,
Sahar Vahdati,
Sören Auer,
Yaser Jaradeh
Abstract:
Every scientific discovery starts with an idea inspired by prior work, interdisciplinary concepts, and emerging challenges. Recent advancements in large language models (LLMs) trained on scientific corpora have driven interest in AI-supported idea generation. However, generating context-aware, high-quality, and innovative ideas remains challenging. We introduce SCI-IDEA, a framework that uses LLM…
▽ More
Every scientific discovery starts with an idea inspired by prior work, interdisciplinary concepts, and emerging challenges. Recent advancements in large language models (LLMs) trained on scientific corpora have driven interest in AI-supported idea generation. However, generating context-aware, high-quality, and innovative ideas remains challenging. We introduce SCI-IDEA, a framework that uses LLM prompting strategies and Aha Moment detection for iterative idea refinement. SCI-IDEA extracts essential facets from research publications, assessing generated ideas on novelty, excitement, feasibility, and effectiveness. Comprehensive experiments validate SCI-IDEA's effectiveness, achieving average scores of 6.84, 6.86, 6.89, and 6.84 (on a 1-10 scale) across novelty, excitement, feasibility, and effectiveness, respectively. Evaluations employed GPT-4o, GPT-4.5, DeepSeek-32B (each under 2-shot prompting), and DeepSeek-70B (3-shot prompting), with token-level embeddings used for Aha Moment detection. Similarly, it achieves scores of 6.87, 6.86, 6.83, and 6.87 using GPT-4o under 5-shot prompting, GPT-4.5 under 3-shot prompting, DeepSeek-32B under zero-shot chain-of-thought prompting, and DeepSeek-70B under 5-shot prompting with sentence-level embeddings. We also address ethical considerations such as intellectual credit, potential misuse, and balancing human creativity with AI-driven ideation. Our results highlight SCI-IDEA's potential to facilitate the structured and flexible exploration of context-aware scientific ideas, supporting innovation while maintaining ethical standards.
△ Less
Submitted 24 March, 2025;
originally announced March 2025.
-
Separating the bulk and interface contribution of spin-orbit torque in ferromagnet-Heavy metal bilayers tuned by variation of resistivity of heavy metal
Authors:
Abu Bakkar Miah,
Dhananjaya Mahapatra,
Soumik Aon,
Harekrishna Bhunia,
Partha Mitra
Abstract:
Harmonic Hall measurements were conducted on a series of Ferromagnetic metal/Heavy metal (FM/HM) bilayers with beta-Tungsten (W) as the HM and in-plane magnetized permalloy (Py) as the FM and the efficiencies of the two orthogonal components of the spin orbit-torque were extracted. Two sets of Hall bar-shaped devices were considered where the HM resistivity systematically varied over a wide range…
▽ More
Harmonic Hall measurements were conducted on a series of Ferromagnetic metal/Heavy metal (FM/HM) bilayers with beta-Tungsten (W) as the HM and in-plane magnetized permalloy (Py) as the FM and the efficiencies of the two orthogonal components of the spin orbit-torque were extracted. Two sets of Hall bar-shaped devices were considered where the HM resistivity systematically varied over a wide range (sim150-1000 muOmega-cm) while the FM layer remained the same and each set having a different aspect ratio of voltage pickup line width and Hall bar width. Using numerical simulations of current distribution at the region between voltage pickup lines we have normalised the SOT efficiencies and examined their dependence. The current-induced spin-orbit torque efficiency in ferromagnetic metal (FM)/heavy metal (HM) bilayers is quantitatively investigated in this study.beta-W, known for its high spin-orbit coupling, served as the HM layer, while Py, an FM with an in-plane magnetic anisotropy, comprised the other layer. We performed a thorough analysis of the second harmonic Hall resistance (R_{xy}^{2ω}) obtained from Py/beta-W bilayer devices, systematically varying the resistivity (rho_W) of the beta-W layer within the range of 200 to 1000 μΩ-cm by employing a fixed current density (J_W\sim0.8\times10^{11} A/m^2) through beta-W. Through this analysis, we derived the Slonczewski-like efficiency (xi_{SL}) and field-like efficiency (ξ_{FL}) as a function of rho_W. Notably, the device with a resistivity of 980 muOmega-cm exhibited the highest xi_{SL}, yielding a value of -0.42 0.09. These results highlight the promising potential of highly resistiv beta-W as a material of interest in spintronics research.
△ Less
Submitted 7 March, 2025;
originally announced March 2025.
-
Graph-based Molecular In-context Learning Grounded on Morgan Fingerprints
Authors:
Ali Al-Lawati,
Jason Lucas,
Zhiwei Zhang,
Prasenjit Mitra,
Suhang Wang
Abstract:
In-context learning (ICL) effectively conditions large language models (LLMs) for molecular tasks, such as property prediction and molecule captioning, by embedding carefully selected demonstration examples into the input prompt. This approach avoids the computational overhead of extensive pertaining and fine-tuning. However, current prompt retrieval methods for molecular tasks have relied on mole…
▽ More
In-context learning (ICL) effectively conditions large language models (LLMs) for molecular tasks, such as property prediction and molecule captioning, by embedding carefully selected demonstration examples into the input prompt. This approach avoids the computational overhead of extensive pertaining and fine-tuning. However, current prompt retrieval methods for molecular tasks have relied on molecule feature similarity, such as Morgan fingerprints, which do not adequately capture the global molecular and atom-binding relationships. As a result, these methods fail to represent the full complexity of molecular structures during inference. Moreover, small-to-medium-sized LLMs, which offer simpler deployment requirements in specialized systems, have remained largely unexplored in the molecular ICL literature. To address these gaps, we propose a self-supervised learning technique, GAMIC (Graph-Aligned Molecular In-Context learning, which aligns global molecular structures, represented by graph neural networks (GNNs), with textual captions (descriptions) while leveraging local feature similarity through Morgan fingerprints. In addition, we introduce a Maximum Marginal Relevance (MMR) based diversity heuristic during retrieval to optimize input prompt demonstration samples. Our experimental findings using diverse benchmark datasets show GAMIC outperforms simple Morgan-based ICL retrieval methods across all tasks by up to 45%.
△ Less
Submitted 7 February, 2025;
originally announced February 2025.
-
Semantic Captioning: Benchmark Dataset and Graph-Aware Few-Shot In-Context Learning for SQL2Text
Authors:
Ali Al-Lawati,
Jason Lucas,
Prasenjit Mitra
Abstract:
Large Language Models (LLMs) have demonstrated remarkable performance in various NLP tasks, including semantic parsing, which translates natural language into formal code representations. However, the reverse process, translating code into natural language, termed semantic captioning, has received less attention. This task is becoming increasingly important as LLMs are integrated into platforms fo…
▽ More
Large Language Models (LLMs) have demonstrated remarkable performance in various NLP tasks, including semantic parsing, which translates natural language into formal code representations. However, the reverse process, translating code into natural language, termed semantic captioning, has received less attention. This task is becoming increasingly important as LLMs are integrated into platforms for code generation, security analysis, and educational purposes. In this paper, we focus on the captioning of SQL query (SQL2Text) to address the critical need for understanding and explaining SQL queries in an era where LLM-generated code poses potential security risks. We repurpose Text2SQL datasets for SQL2Text by introducing an iterative ICL prompt using GPT-4o to generate multiple additional utterances, which enhances the robustness of the datasets for the reverse task. We conduct our experiments using in-context learning (ICL) based on different sample selection methods, emphasizing smaller, more computationally efficient LLMs. Our findings demonstrate that leveraging the inherent graph properties of SQL for ICL sample selection significantly outperforms random selection by up to 39% on BLEU score and provides better results than alternative methods. Dataset and codes are published: https://github.com/aliwister/ast-icl.
△ Less
Submitted 7 February, 2025; v1 submitted 6 January, 2025;
originally announced January 2025.
-
Distributed Mixture-of-Agents for Edge Inference with Large Language Models
Authors:
Purbesh Mitra,
Priyanka Kaswan,
Sennur Ulukus
Abstract:
Mixture-of-Agents (MoA) has recently been proposed as a method to enhance performance of large language models (LLMs), enabling multiple individual LLMs to work together for collaborative inference. This collaborative approach results in improved responses to user prompts compared to relying on a single LLM. In this paper, we consider such an MoA architecture in a distributed setting, where LLMs o…
▽ More
Mixture-of-Agents (MoA) has recently been proposed as a method to enhance performance of large language models (LLMs), enabling multiple individual LLMs to work together for collaborative inference. This collaborative approach results in improved responses to user prompts compared to relying on a single LLM. In this paper, we consider such an MoA architecture in a distributed setting, where LLMs operate on individual edge devices, each uniquely associated with a user and equipped with its own distributed computing power. These devices exchange information using decentralized gossip algorithms, allowing different device nodes to talk without the supervision of a centralized server. In the considered setup, different users have their own LLM models to address user prompts. Additionally, the devices gossip either their own user-specific prompts or augmented prompts to generate more refined answers to certain queries. User prompts are temporarily stored in the device queues when their corresponding LLMs are busy. Given the memory limitations of edge devices, it is crucial to ensure that the average queue sizes in the system remain bounded. In this paper, we address this by theoretically calculating the queuing stability conditions for the device queues under reasonable assumptions, which we validate experimentally as well. Further, we demonstrate through experiments, leveraging open-source LLMs for the implementation of distributed MoA, that certain MoA configurations produce higher-quality responses compared to others, as evaluated on AlpacaEval 2.0 benchmark. The implementation is available at: https://github.com/purbeshmitra/distributed_moa.
△ Less
Submitted 30 December, 2024;
originally announced December 2024.
-
SiReRAG: Indexing Similar and Related Information for Multihop Reasoning
Authors:
Nan Zhang,
Prafulla Kumar Choubey,
Alexander Fabbri,
Gabriel Bernadett-Shapiro,
Rui Zhang,
Prasenjit Mitra,
Caiming Xiong,
Chien-Sheng Wu
Abstract:
Indexing is an important step towards strong performance in retrieval-augmented generation (RAG) systems. However, existing methods organize data based on either semantic similarity (similarity) or related information (relatedness), but do not cover both perspectives comprehensively. Our analysis reveals that modeling only one perspective results in insufficient knowledge synthesis, leading to sub…
▽ More
Indexing is an important step towards strong performance in retrieval-augmented generation (RAG) systems. However, existing methods organize data based on either semantic similarity (similarity) or related information (relatedness), but do not cover both perspectives comprehensively. Our analysis reveals that modeling only one perspective results in insufficient knowledge synthesis, leading to suboptimal performance on complex tasks requiring multihop reasoning. In this paper, we propose SiReRAG, a novel RAG indexing approach that explicitly considers both similar and related information. On the similarity side, we follow existing work and explore some variances to construct a similarity tree based on recursive summarization. On the relatedness side, SiReRAG extracts propositions and entities from texts, groups propositions via shared entities, and generates recursive summaries to construct a relatedness tree. We index and flatten both similarity and relatedness trees into a unified retrieval pool. Our experiments demonstrate that SiReRAG consistently outperforms state-of-the-art indexing methods on three multihop datasets (MuSiQue, 2WikiMultiHopQA, and HotpotQA), with an average 1.9% improvement in F1 scores. As a reasonably efficient solution, SiReRAG enhances existing reranking methods significantly, with up to 7.8% improvement in average F1 scores. Our code is available at https://github.com/SalesforceAIResearch/SiReRAG .
△ Less
Submitted 7 April, 2025; v1 submitted 8 December, 2024;
originally announced December 2024.
-
A PDD-Inspired Channel Estimation Scheme in NOMA Network
Authors:
Sumita Majhi,
Pinaki Mitra
Abstract:
In 5G networks, non-orthogonal multiple access (NOMA) provides a number of benefits by providing uneven power distribution to multiple users at once. On the other hand, effective power allocation, successful successive interference cancellation (SIC), and user fairness all depend on precise channel state information (CSI). Because of dynamic channels, imperfect models, and feedback overhead, CSI p…
▽ More
In 5G networks, non-orthogonal multiple access (NOMA) provides a number of benefits by providing uneven power distribution to multiple users at once. On the other hand, effective power allocation, successful successive interference cancellation (SIC), and user fairness all depend on precise channel state information (CSI). Because of dynamic channels, imperfect models, and feedback overhead, CSI prediction in NOMA is difficult. Our aim is to propose a CSI prediction technique based on an ML model that accounts for partially decoded data (PDD), a byproduct of the SIC process. Our proposed technique has been shown to be efficient in handover failure (HOF) prediction and reducing pilot overhead, which is particularly important in 5G. We have shown how machine learning (ML) models may be used to forecast CSI in NOMA handover.
△ Less
Submitted 29 November, 2024;
originally announced November 2024.
-
Charged Rotating Hairy Black Holes in AdS$_5 \times S^5$: Unveiling their Secrets
Authors:
Oscar J. C. Dias,
Prahar Mitra,
Jorge E. Santos
Abstract:
Using a mix of analytical and numerical methods, we construct new rotating, charged "hairy" black hole solutions of $D=5$, ${\cal N}=8$ gauged supergravity that are dual, via the AdS/CFT correspondence, to thermal states in $D=4$, ${\cal N}=4$ SYM at finite chemical and angular potential, thereby complementing and extending the results of [arXiv:1005.1287, arXiv:1806.01849, arXiv:1809.04084]. Thes…
▽ More
Using a mix of analytical and numerical methods, we construct new rotating, charged "hairy" black hole solutions of $D=5$, ${\cal N}=8$ gauged supergravity that are dual, via the AdS/CFT correspondence, to thermal states in $D=4$, ${\cal N}=4$ SYM at finite chemical and angular potential, thereby complementing and extending the results of [arXiv:1005.1287, arXiv:1806.01849, arXiv:1809.04084]. These solutions uplift to asymptotically AdS$_5 \times S^5$ solutions of Type IIB supergravity with equal angular momenta along AdS$_5$ ($J=J_1=J_2$) and $S^5$ ($Q=Q_1=Q_2=Q_3$). As we lower the mass $E$ at fixed $Q$ and $J$, the known Cvetič-Lü-Pope (CLP) black holes are unstable to scalar condensation and the hairy black holes constructed here emerge as novel solutions associated to the instability. In the region of phase space where the CLP and hairy black holes coexist, the hairy black holes dominate the microcanonical ensemble and, therefore, describe a new thermodynamic phase of SYM. The hairy black holes extend beyond the CLP extremality surface all the way to the BPS surface, defined by $E = 3 Q + 2 J / L$. Through a combination of analytical and numerical techniques, we argue that the BPS limit of the hairy black holes is a singular, horizonless solution, and $not$ a new two-parameter family of BPS black holes that extend the known one-parameter Gutowski-Reall (GR) black hole solution, in contradiction with the conjectures of [arXiv:1005.1287, arXiv:1806.01849]. To further support our conclusions, we perform a near-horizon analysis of the BPS equations and argue that they do not admit any regular solutions with an horizon.
△ Less
Submitted 27 November, 2024;
originally announced November 2024.
-
Evidence of orbital Hall current induced correlation in second harmonic response of longitudinal and transverse voltage in light metal-ferromagnet bilayers
Authors:
Dhananjaya Mahapatra,
Abu Bakkar Miah,
HareKrishna Bhunia,
Soumik Aon,
Partha Mitra
Abstract:
We investigate the effect of orbital current arising from orbital Hall effect in thin films of Nb and Ti in ohmic contact with ferromagnetic Ni in the second harmonic longitudinal and transverse voltages in response to an a.c. current applied to the bilayer structures. Our experiments were analogous to those on Heavy Metal-Ferromagnet bilayers and we extract the Orbital Hall Torque efficiency and…
▽ More
We investigate the effect of orbital current arising from orbital Hall effect in thin films of Nb and Ti in ohmic contact with ferromagnetic Ni in the second harmonic longitudinal and transverse voltages in response to an a.c. current applied to the bilayer structures. Our experiments were analogous to those on Heavy Metal-Ferromagnet bilayers and we extract the Orbital Hall Torque efficiency and unidirectional magnetoresistance (UMR). Through second-harmonic measurements, we investigate orbital Hall torque and UMR in bilayer devices composed of ferromagnetic materials (FM), such as Ni and NiFe, paired with light metals (LM), such as Ti and Nb. Our results demonstrate that LM/Ni bilayers exhibit enhanced damping-like torque and unidirectional magnetoresistance (UMR) compared to LM/NiFe bilayers. This enhancement suggests that angular momentum is generated via the orbital Hall effect within the light metal, where it undergoes orbital-to-spin conversion within the Ni ferromagnet, ultimately transferring to the magnetization of the ferromagnetic layer. Torque and UMR are also absent in single-layer devices, highlighting the necessity of the bilayer structure for orbital current generation.
△ Less
Submitted 11 June, 2025; v1 submitted 13 November, 2024;
originally announced November 2024.
-
MorCode: Face Morphing Attack Generation using Generative Codebooks
Authors:
Aravinda Reddy PN,
Raghavendra Ramachandra,
Sushma Venkatesh,
Krothapalli Sreenivasa Rao,
Pabitra Mitra,
Rakesh Krishna
Abstract:
Face recognition systems (FRS) can be compromised by face morphing attacks, which blend textural and geometric information from multiple facial images. The rapid evolution of generative AI, especially Generative Adversarial Networks (GAN) or Diffusion models, where encoded images are interpolated to generate high-quality face morphing images. In this work, we present a novel method for the automat…
▽ More
Face recognition systems (FRS) can be compromised by face morphing attacks, which blend textural and geometric information from multiple facial images. The rapid evolution of generative AI, especially Generative Adversarial Networks (GAN) or Diffusion models, where encoded images are interpolated to generate high-quality face morphing images. In this work, we present a novel method for the automatic face morphing generation method \textit{MorCode}, which leverages a contemporary encoder-decoder architecture conditioned on codebook learning to generate high-quality morphing images. Extensive experiments were performed on the newly constructed morphing dataset using five state-of-the-art morphing generation techniques using both digital and print-scan data. The attack potential of the proposed morphing generation technique, \textit{MorCode}, was benchmarked using three different face recognition systems. The obtained results indicate the highest attack potential of the proposed \textit{MorCode} when compared with five state-of-the-art morphing generation methods on both digital and print scan data.
△ Less
Submitted 10 October, 2024;
originally announced October 2024.
-
Few-shot Prompting for Pairwise Ranking: An Effective Non-Parametric Retrieval Model
Authors:
Nilanjan Sinhababu,
Andrew Parry,
Debasis Ganguly,
Debasis Samanta,
Pabitra Mitra
Abstract:
A supervised ranking model, despite its advantage of being effective, usually involves complex processing - typically multiple stages of task-specific pre-training and fine-tuning. This has motivated researchers to explore simpler pipelines leveraging large language models (LLMs) that are capable of working in a zero-shot manner. However, since zero-shot inference does not make use of a training s…
▽ More
A supervised ranking model, despite its advantage of being effective, usually involves complex processing - typically multiple stages of task-specific pre-training and fine-tuning. This has motivated researchers to explore simpler pipelines leveraging large language models (LLMs) that are capable of working in a zero-shot manner. However, since zero-shot inference does not make use of a training set of pairs of queries and their relevant documents, its performance is mostly worse than that of supervised models, which are trained on such example pairs. Motivated by the existing findings that training examples generally improve zero-shot performance, in our work, we explore if this also applies to ranking models. More specifically, given a query and a pair of documents, the preference prediction task is improved by augmenting examples of preferences for similar queries from a training set. Our proposed pairwise few-shot ranker demonstrates consistent improvements over the zero-shot baseline on both in-domain (TREC DL) and out-domain (BEIR subset) retrieval benchmarks. Our method also achieves a close performance to that of a supervised model without requiring any complex training pipeline.
△ Less
Submitted 4 October, 2024; v1 submitted 26 September, 2024;
originally announced September 2024.
-
Transfer Learning and Double U-Net Empowered Wave Propagation Model in Complex Indoor Environment
Authors:
Ziheng Fu,
Swagato Mukherjee,
Michael T. Lanagan,
Prasenjit Mitra,
Tarun Chawla,
Ram M. Narayanan
Abstract:
A Machine Learning (ML) network based on transfer learning and transformer networks is applied to wave propagation models for complex indoor settings. This network is designed to predict signal propagation in environments with a variety of objects, effectively simulating the diverse range of furniture typically found in indoor spaces. We propose Attention U-Net with Efficient Networks as the backb…
▽ More
A Machine Learning (ML) network based on transfer learning and transformer networks is applied to wave propagation models for complex indoor settings. This network is designed to predict signal propagation in environments with a variety of objects, effectively simulating the diverse range of furniture typically found in indoor spaces. We propose Attention U-Net with Efficient Networks as the backbone, to process images encoded with the essential information of the indoor environment. The indoor environment is defined by its fundamental structure, such as the arrangement of walls, windows, and doorways, alongside varying configurations of furniture placement. An innovative algorithm is introduced to generate a 3D environment from a 2D floorplan, which is crucial for efficient collection of data for training. The model is evaluated by comparing the predicted signal coverage map with ray tracing (RT) simulations. The prediction results show a root mean square error of less than 6 dB across all tested scenarios, with significant improvements observed when using a Double U-Net structure compared to a single U-Net model.
△ Less
Submitted 25 January, 2025; v1 submitted 20 September, 2024;
originally announced September 2024.
-
The Giant Radio Array for Neutrino Detection (GRAND) Collaboration -- Contributions to the 10th International Workshop on Acoustic and Radio EeV Neutrino Detection Activities (ARENA 2024)
Authors:
Rafael Alves Batista,
Aurélien Benoit-Lévy,
Teresa Bister,
Martina Bohacova,
Mauricio Bustamante,
Washington Carvalho,
Yiren Chen,
LingMei Cheng,
Simon Chiche,
Jean-Marc Colley,
Pablo Correa,
Nicoleta Cucu Laurenciu,
Zigao Dai,
Rogerio M. de Almeida,
Beatriz de Errico,
Sijbrand de Jong,
João R. T. de Mello Neto,
Krijn D de Vries,
Valentin Decoene,
Peter B. Denton,
Bohao Duan,
Kaikai Duan,
Ralph Engel,
William Erba,
Yizhong Fan
, et al. (100 additional authors not shown)
Abstract:
This is an index of the contributions by the Giant Radio Array for Neutrino Detection (GRAND) Collaboration to the 10th International Workshop on Acoustic and Radio EeV Neutrino Detection Activities (ARENA 2024, University of Chicago, June 11-14, 2024). The contributions include an overview of GRAND in its present and future incarnations, methods of radio-detection that are being developed for the…
▽ More
This is an index of the contributions by the Giant Radio Array for Neutrino Detection (GRAND) Collaboration to the 10th International Workshop on Acoustic and Radio EeV Neutrino Detection Activities (ARENA 2024, University of Chicago, June 11-14, 2024). The contributions include an overview of GRAND in its present and future incarnations, methods of radio-detection that are being developed for them, and ongoing joint work between the GRAND and BEACON experiments.
△ Less
Submitted 5 September, 2024;
originally announced September 2024.
-
Quantum Mechanics of a Spherically Symmetric Causal Diamond in Minkowski Spacetime
Authors:
Mathew W. Bub,
Temple He,
Prahar Mitra,
Yiwen Zhang,
Kathryn M. Zurek
Abstract:
We construct the phase space of a spherically symmetric causal diamond in $(d+2)$-dimensional Minkowski spacetime. Utilizing the covariant phase space formalism, we identify the relevant degrees of freedom that localize to the $d$-dimensional bifurcate horizon and, upon canonical quantization, determine their commutators. On this phase space, we find two Iyer-Wald charges. The first of these charg…
▽ More
We construct the phase space of a spherically symmetric causal diamond in $(d+2)$-dimensional Minkowski spacetime. Utilizing the covariant phase space formalism, we identify the relevant degrees of freedom that localize to the $d$-dimensional bifurcate horizon and, upon canonical quantization, determine their commutators. On this phase space, we find two Iyer-Wald charges. The first of these charges, proportional to the area of the causal diamond, is responsible for shifting the null time along the horizon and has been well-documented in the literature. The second charge is much less understood, being integrable for $d \geq 2$ only if we allow for field-dependent diffeomorphisms and is responsible for changing the size of the causal diamond.
△ Less
Submitted 25 March, 2025; v1 submitted 20 August, 2024;
originally announced August 2024.
-
GRANDlib: A simulation pipeline for the Giant Radio Array for Neutrino Detection (GRAND)
Authors:
GRAND Collaboration,
Rafael Alves Batista,
Aurélien Benoit-Lévy,
Teresa Bister,
Martina Bohacova,
Mauricio Bustamante,
Washington Carvalho,
Yiren Chen,
LingMei Cheng,
Simon Chiche,
Jean-Marc Colley,
Pablo Correa,
Nicoleta Cucu Laurenciu,
Zigao Dai,
Rogerio M. de Almeida,
Beatriz de Errico,
Sijbrand de Jong,
João R. T. de Mello Neto,
Krijn D. de Vries,
Valentin Decoene,
Peter B. Denton,
Bohao Duan,
Kaikai Duan,
Ralph Engel,
William Erba
, et al. (90 additional authors not shown)
Abstract:
The operation of upcoming ultra-high-energy cosmic-ray, gamma-ray, and neutrino radio-detection experiments, like the Giant Radio Array for Neutrino Detection (GRAND), poses significant computational challenges involving the production of numerous simulations of particle showers and their detection, and a high data throughput. GRANDlib is an open-source software tool designed to meet these challen…
▽ More
The operation of upcoming ultra-high-energy cosmic-ray, gamma-ray, and neutrino radio-detection experiments, like the Giant Radio Array for Neutrino Detection (GRAND), poses significant computational challenges involving the production of numerous simulations of particle showers and their detection, and a high data throughput. GRANDlib is an open-source software tool designed to meet these challenges. Its primary goal is to perform end-to-end simulations of the detector operation, from the interaction of ultra-high-energy particles, through -- by interfacing with external air-shower simulations -- the ensuing particle shower development and its radio emission, to its detection by antenna arrays and its processing by data-acquisition systems. Additionally, GRANDlib manages the visualization, storage, and retrieval of experimental and simulated data. We present an overview of GRANDlib to serve as the basis of future GRAND analyses.
△ Less
Submitted 11 December, 2024; v1 submitted 20 August, 2024;
originally announced August 2024.
-
NeuralMultiling: A Novel Neural Architecture Search for Smartphone based Multilingual Speaker Verification
Authors:
Aravinda Reddy PN,
Raghavendra Ramachandra,
K. Sreenivasa Rao,
Pabitra Mitra
Abstract:
Multilingual speaker verification introduces the challenge of verifying a speaker in multiple languages. Existing systems were built using i-vector/x-vector approaches along with Bi-LSTMs, which were trained to discriminate speakers, irrespective of the language. Instead of exploring the design space manually, we propose a neural architecture search for multilingual speaker verification suitable f…
▽ More
Multilingual speaker verification introduces the challenge of verifying a speaker in multiple languages. Existing systems were built using i-vector/x-vector approaches along with Bi-LSTMs, which were trained to discriminate speakers, irrespective of the language. Instead of exploring the design space manually, we propose a neural architecture search for multilingual speaker verification suitable for mobile devices, called \textbf{NeuralMultiling}. First, our algorithm searches for an optimal operational combination of neural cells with different architectures for normal cells and reduction cells and then derives a CNN model by stacking neural cells. Using the derived architecture, we performed two different studies:1) language agnostic condition and 2) interoperability between languages and devices on the publicly available Multilingual Audio-Visual Smartphone (MAVS) dataset. The experimental results suggest that the derived architecture significantly outperforms the existing Autospeech method by a 5-6\% reduction in the Equal Error Rate (EER) with fewer model parameters.
△ Less
Submitted 8 August, 2024;
originally announced August 2024.
-
The DAMIC-M Low Background Chamber
Authors:
I. Arnquist,
N. Avalos,
P. Bailly,
D. Baxter,
X. Bertou,
M. Bogdan,
C. Bourgeois,
J. Brandt,
A. Cadiou,
N. Castello-Mor,
A. E. Chavarria,
M. Conde,
J. Cuevas-Zepeda,
A. Dastgheibi-Fard,
C. De Dominicis,
O. Deligny,
R. Desani,
M. Dhellot,
J. Duarte-Campderros,
E. Estrada,
D. Florin,
N. Gadola,
R. Gaior,
E. -L. Gkougkousis,
J. Gonzalez Sanchez
, et al. (44 additional authors not shown)
Abstract:
The DArk Matter In CCDs at Modane (DAMIC-M) experiment is designed to search for light dark matter (m$_χ$<10\,GeV/c$^2$) at the Laboratoire Souterrain de Modane (LSM) in France. DAMIC-M will use skipper charge-coupled devices (CCDs) as a kg-scale active detector target. Its single-electron resolution will enable eV-scale energy thresholds and thus world-leading sensitivity to a range of hidden sec…
▽ More
The DArk Matter In CCDs at Modane (DAMIC-M) experiment is designed to search for light dark matter (m$_χ$<10\,GeV/c$^2$) at the Laboratoire Souterrain de Modane (LSM) in France. DAMIC-M will use skipper charge-coupled devices (CCDs) as a kg-scale active detector target. Its single-electron resolution will enable eV-scale energy thresholds and thus world-leading sensitivity to a range of hidden sector dark matter candidates. A DAMIC-M prototype, the Low Background Chamber (LBC), has been taking data at LSM since 2022. The LBC provides a low-background environment, which has been used to characterize skipper CCDs, study dark current, and measure radiopurity of materials planned for DAMIC-M. It also allows testing of various subsystems like readout electronics, data acquisition software, and slow control. This paper describes the technical design and performance of the LBC.
△ Less
Submitted 27 September, 2024; v1 submitted 25 July, 2024;
originally announced July 2024.
-
6G at $\frac{1}{6}g$: The Future of Cislunar Communications
Authors:
Sahan Liyanaarachchi,
Stavros Mitrolaris,
Purbesh Mitra,
Sennur Ulukus
Abstract:
What will the future of cislunar communications be? The ever-expanding horizons of the space exploration missions, and the need for establishing sustainable space communication and navigation infrastructure necessitate to think this question thoroughly. In this article, we examine how some of the concepts of 6G technologies developed for terrestrial networks can be relevant in the context of cislu…
▽ More
What will the future of cislunar communications be? The ever-expanding horizons of the space exploration missions, and the need for establishing sustainable space communication and navigation infrastructure necessitate to think this question thoroughly. In this article, we examine how some of the concepts of 6G technologies developed for terrestrial networks can be relevant in the context of cislunar networks. We discuss how 6G concepts, such as reconfigurable intelligent surfaces, quantum-resistant physical layer security, private information read/write/cache networks, semantic and goal-oriented communications, information freshness based quality of communication metrics, multi-relay and cooperative networks, hold the potential to shape the future of cislunar communications.
△ Less
Submitted 23 July, 2024;
originally announced July 2024.
-
Automated Computational Energy Minimization of ML Algorithms using Constrained Bayesian Optimization
Authors:
Pallavi Mitra,
Felix Biessmann
Abstract:
Bayesian optimization (BO) is an efficient framework for optimization of black-box objectives when function evaluations are costly and gradient information is not easily accessible. BO has been successfully applied to automate the task of hyperparameter optimization (HPO) in machine learning (ML) models with the primary objective of optimizing predictive performance on held-out data. In recent yea…
▽ More
Bayesian optimization (BO) is an efficient framework for optimization of black-box objectives when function evaluations are costly and gradient information is not easily accessible. BO has been successfully applied to automate the task of hyperparameter optimization (HPO) in machine learning (ML) models with the primary objective of optimizing predictive performance on held-out data. In recent years, however, with ever-growing model sizes, the energy cost associated with model training has become an important factor for ML applications. Here we evaluate Constrained Bayesian Optimization (CBO) with the primary objective of minimizing energy consumption and subject to the constraint that the generalization performance is above some threshold. We evaluate our approach on regression and classification tasks and demonstrate that CBO achieves lower energy consumption without compromising the predictive performance of ML models.
△ Less
Submitted 8 July, 2024;
originally announced July 2024.
-
Straight Through Gumbel Softmax Estimator based Bimodal Neural Architecture Search for Audio-Visual Deepfake Detection
Authors:
Aravinda Reddy PN,
Raghavendra Ramachandra,
Krothapalli Sreenivasa Rao,
Pabitra Mitra,
Vinod Rathod
Abstract:
Deepfakes are a major security risk for biometric authentication. This technology creates realistic fake videos that can impersonate real people, fooling systems that rely on facial features and voice patterns for identification. Existing multimodal deepfake detectors rely on conventional fusion methods, such as majority rule and ensemble voting, which often struggle to adapt to changing data char…
▽ More
Deepfakes are a major security risk for biometric authentication. This technology creates realistic fake videos that can impersonate real people, fooling systems that rely on facial features and voice patterns for identification. Existing multimodal deepfake detectors rely on conventional fusion methods, such as majority rule and ensemble voting, which often struggle to adapt to changing data characteristics and complex patterns. In this paper, we introduce the Straight-through Gumbel-Softmax (STGS) framework, offering a comprehensive approach to search multimodal fusion model architectures. Using a two-level search approach, the framework optimizes the network architecture, parameters, and performance. Initially, crucial features were efficiently identified from backbone networks, whereas within the cell structure, a weighted fusion operation integrated information from various sources. An architecture that maximizes the classification performance is derived by varying parameters such as temperature and sampling time. The experimental results on the FakeAVCeleb and SWAN-DF datasets demonstrated an impressive AUC value 94.4\% achieved with minimal model parameters.
△ Less
Submitted 19 June, 2024;
originally announced June 2024.
-
Using graph neural networks to reconstruct charged pion showers in the CMS High Granularity Calorimeter
Authors:
M. Aamir,
G. Adamov,
T. Adams,
C. Adloff,
S. Afanasiev,
C. Agrawal,
C. Agrawal,
A. Ahmad,
H. A. Ahmed,
S. Akbar,
N. Akchurin,
B. Akgul,
B. Akgun,
R. O. Akpinar,
E. Aktas,
A. Al Kadhim,
V. Alexakhin,
J. Alimena,
J. Alison,
A. Alpana,
W. Alshehri,
P. Alvarez Dominguez,
M. Alyari,
C. Amendola,
R. B. Amir
, et al. (550 additional authors not shown)
Abstract:
A novel method to reconstruct the energy of hadronic showers in the CMS High Granularity Calorimeter (HGCAL) is presented. The HGCAL is a sampling calorimeter with very fine transverse and longitudinal granularity. The active media are silicon sensors and scintillator tiles readout by SiPMs and the absorbers are a combination of lead and Cu/CuW in the electromagnetic section, and steel in the hadr…
▽ More
A novel method to reconstruct the energy of hadronic showers in the CMS High Granularity Calorimeter (HGCAL) is presented. The HGCAL is a sampling calorimeter with very fine transverse and longitudinal granularity. The active media are silicon sensors and scintillator tiles readout by SiPMs and the absorbers are a combination of lead and Cu/CuW in the electromagnetic section, and steel in the hadronic section. The shower reconstruction method is based on graph neural networks and it makes use of a dynamic reduction network architecture. It is shown that the algorithm is able to capture and mitigate the main effects that normally hinder the reconstruction of hadronic showers using classical reconstruction methods, by compensating for fluctuations in the multiplicity, energy, and spatial distributions of the shower's constituents. The performance of the algorithm is evaluated using test beam data collected in 2018 prototype of the CMS HGCAL accompanied by a section of the CALICE AHCAL prototype. The capability of the method to mitigate the impact of energy leakage from the calorimeter is also demonstrated.
△ Less
Submitted 18 December, 2024; v1 submitted 17 June, 2024;
originally announced June 2024.
-
PromptFix: Few-shot Backdoor Removal via Adversarial Prompt Tuning
Authors:
Tianrong Zhang,
Zhaohan Xi,
Ting Wang,
Prasenjit Mitra,
Jinghui Chen
Abstract:
Pre-trained language models (PLMs) have attracted enormous attention over the past few years with their unparalleled performances. Meanwhile, the soaring cost to train PLMs as well as their amazing generalizability have jointly contributed to few-shot fine-tuning and prompting as the most popular training paradigms for natural language processing (NLP) models. Nevertheless, existing studies have s…
▽ More
Pre-trained language models (PLMs) have attracted enormous attention over the past few years with their unparalleled performances. Meanwhile, the soaring cost to train PLMs as well as their amazing generalizability have jointly contributed to few-shot fine-tuning and prompting as the most popular training paradigms for natural language processing (NLP) models. Nevertheless, existing studies have shown that these NLP models can be backdoored such that model behavior is manipulated when trigger tokens are presented. In this paper, we propose PromptFix, a novel backdoor mitigation strategy for NLP models via adversarial prompt-tuning in few-shot settings. Unlike existing NLP backdoor removal methods, which rely on accurate trigger inversion and subsequent model fine-tuning, PromptFix keeps the model parameters intact and only utilizes two extra sets of soft tokens which approximate the trigger and counteract it respectively. The use of soft tokens and adversarial optimization eliminates the need to enumerate possible backdoor configurations and enables an adaptive balance between trigger finding and preservation of performance. Experiments with various backdoor attacks validate the effectiveness of the proposed method and the performances when domain shift is present further shows PromptFix's applicability to models pretrained on unknown data source which is the common case in prompt tuning scenarios.
△ Less
Submitted 6 June, 2024;
originally announced June 2024.
-
Investigating Calibration and Corruption Robustness of Post-hoc Pruned Perception CNNs: An Image Classification Benchmark Study
Authors:
Pallavi Mitra,
Gesina Schwalbe,
Nadja Klein
Abstract:
Convolutional Neural Networks (CNNs) have achieved state-of-the-art performance in many computer vision tasks. However, high computational and storage demands hinder their deployment into resource-constrained environments, such as embedded devices. Model pruning helps to meet these restrictions by reducing the model size, while maintaining superior performance. Meanwhile, safety-critical applicati…
▽ More
Convolutional Neural Networks (CNNs) have achieved state-of-the-art performance in many computer vision tasks. However, high computational and storage demands hinder their deployment into resource-constrained environments, such as embedded devices. Model pruning helps to meet these restrictions by reducing the model size, while maintaining superior performance. Meanwhile, safety-critical applications pose more than just resource and performance constraints. In particular, predictions must not be overly confident, i.e., provide properly calibrated uncertainty estimations (proper uncertainty calibration), and CNNs must be robust against corruptions like naturally occurring input perturbations (natural corruption robustness). This work investigates the important trade-off between uncertainty calibration, natural corruption robustness, and performance for current state-of-research post-hoc CNN pruning techniques in the context of image classification tasks. Our study reveals that post-hoc pruning substantially improves the model's uncertainty calibration, performance, and natural corruption robustness, sparking hope for safe and robust embedded CNNs.Furthermore, uncertainty calibration and natural corruption robustness are not mutually exclusive targets under pruning, as evidenced by the improved safety aspects obtained by post-hoc unstructured pruning with increasing compression.
△ Less
Submitted 31 May, 2024;
originally announced May 2024.
-
Towards Precision Healthcare: Robust Fusion of Time Series and Image Data
Authors:
Ali Rasekh,
Reza Heidari,
Amir Hosein Haji Mohammad Rezaie,
Parsa Sharifi Sedeh,
Zahra Ahmadi,
Prasenjit Mitra,
Wolfgang Nejdl
Abstract:
With the increasing availability of diverse data types, particularly images and time series data from medical experiments, there is a growing demand for techniques designed to combine various modalities of data effectively. Our motivation comes from the important areas of predicting mortality and phenotyping where using different modalities of data could significantly improve our ability to predic…
▽ More
With the increasing availability of diverse data types, particularly images and time series data from medical experiments, there is a growing demand for techniques designed to combine various modalities of data effectively. Our motivation comes from the important areas of predicting mortality and phenotyping where using different modalities of data could significantly improve our ability to predict. To tackle this challenge, we introduce a new method that uses two separate encoders, one for each type of data, allowing the model to understand complex patterns in both visual and time-based information. Apart from the technical challenges, our goal is to make the predictive model more robust in noisy conditions and perform better than current methods. We also deal with imbalanced datasets and use an uncertainty loss function, yielding improved results while simultaneously providing a principled means of modeling uncertainty. Additionally, we include attention mechanisms to fuse different modalities, allowing the model to focus on what's important for each task. We tested our approach using the comprehensive multimodal MIMIC dataset, combining MIMIC-IV and MIMIC-CXR datasets. Our experiments show that our method is effective in improving multimodal deep learning for clinical applications. The code will be made available online.
△ Less
Submitted 24 May, 2024;
originally announced May 2024.
-
WordGame: Efficient & Effective LLM Jailbreak via Simultaneous Obfuscation in Query and Response
Authors:
Tianrong Zhang,
Bochuan Cao,
Yuanpu Cao,
Lu Lin,
Prasenjit Mitra,
Jinghui Chen
Abstract:
The recent breakthrough in large language models (LLMs) such as ChatGPT has revolutionized production processes at an unprecedented pace. Alongside this progress also comes mounting concerns about LLMs' susceptibility to jailbreaking attacks, which leads to the generation of harmful or unsafe content. While safety alignment measures have been implemented in LLMs to mitigate existing jailbreak atte…
▽ More
The recent breakthrough in large language models (LLMs) such as ChatGPT has revolutionized production processes at an unprecedented pace. Alongside this progress also comes mounting concerns about LLMs' susceptibility to jailbreaking attacks, which leads to the generation of harmful or unsafe content. While safety alignment measures have been implemented in LLMs to mitigate existing jailbreak attempts and force them to become increasingly complicated, it is still far from perfect. In this paper, we analyze the common pattern of the current safety alignment and show that it is possible to exploit such patterns for jailbreaking attacks by simultaneous obfuscation in queries and responses. Specifically, we propose WordGame attack, which replaces malicious words with word games to break down the adversarial intent of a query and encourage benign content regarding the games to precede the anticipated harmful content in the response, creating a context that is hardly covered by any corpus used for safety alignment. Extensive experiments demonstrate that WordGame attack can break the guardrails of the current leading proprietary and open-source LLMs, including the latest Claude-3, GPT-4, and Llama-3 models. Further ablation studies on such simultaneous obfuscation in query and response provide evidence of the merits of the attack strategy beyond an individual attack.
△ Less
Submitted 22 May, 2024;
originally announced May 2024.
-
Diamond of Infrared Equivalences in Abelian Gauge Theories
Authors:
Temple He,
Prahar Mitra,
Kathryn M. Zurek
Abstract:
We demonstrate a tree-level equivalence between four distinct infrared objects in $(d+2)$-dimensional abelian gauge theories. These are ($i$) the large gauge charge $Q_\varepsilon$ where the function $\varepsilon$ on the sphere parameterizing large gauge transformations is identified with the Goldstone mode $θ$ of spontaneously broken large gauge symmetry; ($ii$) the soft effective action that cap…
▽ More
We demonstrate a tree-level equivalence between four distinct infrared objects in $(d+2)$-dimensional abelian gauge theories. These are ($i$) the large gauge charge $Q_\varepsilon$ where the function $\varepsilon$ on the sphere parameterizing large gauge transformations is identified with the Goldstone mode $θ$ of spontaneously broken large gauge symmetry; ($ii$) the soft effective action that captures the dynamics of the soft and Goldstone modes; ($iii$) the edge mode action with Neumann boundary conditions; and ($iv$) the Wilson line dressing of a scattering amplitude, including a novel dressing for soft photons, which have local charge distributions despite having vanishing global charge. The promotion of the large gauge parameter to the dynamical Goldstone and the novel dressing of soft gauge particles give rise to intriguing possibilities for the future study of infrared dynamics of gauge theories and gravity.
△ Less
Submitted 26 November, 2024; v1 submitted 20 May, 2024;
originally announced May 2024.
-
Pruning as a Domain-specific LLM Extractor
Authors:
Nan Zhang,
Yanchi Liu,
Xujiang Zhao,
Wei Cheng,
Runxue Bao,
Rui Zhang,
Prasenjit Mitra,
Haifeng Chen
Abstract:
Large Language Models (LLMs) have exhibited remarkable proficiency across a wide array of NLP tasks. However, the escalation in model size also engenders substantial deployment costs. While few efforts have explored model pruning techniques to reduce the size of LLMs, they mainly center on general or task-specific weights. This leads to suboptimal performance due to lacking specificity on the targ…
▽ More
Large Language Models (LLMs) have exhibited remarkable proficiency across a wide array of NLP tasks. However, the escalation in model size also engenders substantial deployment costs. While few efforts have explored model pruning techniques to reduce the size of LLMs, they mainly center on general or task-specific weights. This leads to suboptimal performance due to lacking specificity on the target domain or generality on different tasks when applied to domain-specific challenges. This work introduces an innovative unstructured dual-pruning methodology, D-Pruner, for domain-specific compression on LLM. It extracts a compressed, domain-specific, and task-agnostic LLM by identifying LLM weights that are pivotal for general capabilities, like linguistic capability and multi-task solving, and domain-specific knowledge. More specifically, we first assess general weight importance by quantifying the error incurred upon their removal with the help of an open-domain calibration dataset. Then, we utilize this general weight importance to refine the training loss, so that it preserves generality when fitting into a specific domain. Moreover, by efficiently approximating weight importance with the refined training loss on a domain-specific calibration dataset, we obtain a pruned model emphasizing generality and specificity. Our comprehensive experiments across various tasks in healthcare and legal domains show the effectiveness of D-Pruner in domain-specific compression. Our code is available at https://github.com/psunlpgroup/D-Pruner.
△ Less
Submitted 10 May, 2024;
originally announced May 2024.
-
Anomalous Inverse Spin Hall Effect (AISHE) due to Unconventional Spin Currents in Ferromagnetic Films with Tailored Interfacial Magnetic Anisotropy
Authors:
Soumik Aon,
Harekrishna Bhunia,
Pratap Kumar Pal,
Abu Bakkar Miah,
Dhananjaya Mahapatra,
Anjan Barman,
Partha Mitra
Abstract:
A single layer ferromagnetic film magnetized in the plane of an ac current flow, exhibits a characteristic Hall voltage with harmonic and second harmonic components, which is attributed to the presence of spin currents with polarization non-collinear with the magnetization. A set of 30 nm thick permalloy (Py) films used in this study are deposited at an oblique angle with respect to the substrate…
▽ More
A single layer ferromagnetic film magnetized in the plane of an ac current flow, exhibits a characteristic Hall voltage with harmonic and second harmonic components, which is attributed to the presence of spin currents with polarization non-collinear with the magnetization. A set of 30 nm thick permalloy (Py) films used in this study are deposited at an oblique angle with respect to the substrate plane which induces an in-plane easy axis in the magnetization of the initial nucleating layers of the films which is distinct from the overall bulk magnetic properties of the film. This unusual magnetic texture provides a platform for the direct detection of inverse spin Hall effect in Hall bar shaped macroscopic devices at room temperatures which we denote as Anomalous Inverse Spin Hall Effect (AISHE). Control samples fabricated by normal deposition of permalloy with slow rotation of substrate shows significant reduction of the harmonic Hall signal that further substantiates the model. The analysis of the second harmonic Hall signal corroborates the presence of spin-orbit torque arising from the unconventional spin-currents in the single-layer ferromagnets.
△ Less
Submitted 6 May, 2024;
originally announced May 2024.
-
Scale-Robust Timely Asynchronous Decentralized Learning
Authors:
Purbesh Mitra,
Sennur Ulukus
Abstract:
We consider an asynchronous decentralized learning system, which consists of a network of connected devices trying to learn a machine learning model without any centralized parameter server. The users in the network have their own local training data, which is used for learning across all the nodes in the network. The learning method consists of two processes, evolving simultaneously without any n…
▽ More
We consider an asynchronous decentralized learning system, which consists of a network of connected devices trying to learn a machine learning model without any centralized parameter server. The users in the network have their own local training data, which is used for learning across all the nodes in the network. The learning method consists of two processes, evolving simultaneously without any necessary synchronization. The first process is the model update, where the users update their local model via a fixed number of stochastic gradient descent steps. The second process is model mixing, where the users communicate with each other via randomized gossiping to exchange their models and average them to reach consensus. In this work, we investigate the staleness criteria for such a system, which is a sufficient condition for convergence of individual user models. We show that for network scaling, i.e., when the number of user devices $n$ is very large, if the gossip capacity of individual users scales as $Ω(\log n)$, we can guarantee the convergence of user models in finite time. Furthermore, we show that the bounded staleness can only be guaranteed by any distributed opportunistic scheme by $Ω(n)$ scaling.
△ Less
Submitted 30 April, 2024;
originally announced April 2024.
-
MLSD-GAN -- Generating Strong High Quality Face Morphing Attacks using Latent Semantic Disentanglement
Authors:
Aravinda Reddy PN,
Raghavendra Ramachandra,
Krothapalli Sreenivasa Rao,
Pabitra Mitra
Abstract:
Face-morphing attacks are a growing concern for biometric researchers, as they can be used to fool face recognition systems (FRS). These attacks can be generated at the image level (supervised) or representation level (unsupervised). Previous unsupervised morphing attacks have relied on generative adversarial networks (GANs). More recently, researchers have used linear interpolation of StyleGAN-en…
▽ More
Face-morphing attacks are a growing concern for biometric researchers, as they can be used to fool face recognition systems (FRS). These attacks can be generated at the image level (supervised) or representation level (unsupervised). Previous unsupervised morphing attacks have relied on generative adversarial networks (GANs). More recently, researchers have used linear interpolation of StyleGAN-encoded images to generate morphing attacks. In this paper, we propose a new method for generating high-quality morphing attacks using StyleGAN disentanglement. Our approach, called MLSD-GAN, spherically interpolates the disentangled latents to produce realistic and diverse morphing attacks. We evaluate the vulnerability of MLSD-GAN on two deep-learning-based FRS techniques. The results show that MLSD-GAN poses a significant threat to FRS, as it can generate morphing attacks that are highly effective at fooling these systems.
△ Less
Submitted 19 April, 2024;
originally announced April 2024.
-
WildGraph: Realistic Graph-based Trajectory Generation for Wildlife
Authors:
Ali Al-Lawati,
Elsayed Eshra,
Prasenjit Mitra
Abstract:
Trajectory generation is an important task in movement studies; it circumvents the privacy, ethical, and technical challenges of collecting real trajectories from the target population. In particular, real trajectories in the wildlife domain are scarce as a result of ethical and environmental constraints of the collection process. In this paper, we consider the problem of generating long-horizon t…
▽ More
Trajectory generation is an important task in movement studies; it circumvents the privacy, ethical, and technical challenges of collecting real trajectories from the target population. In particular, real trajectories in the wildlife domain are scarce as a result of ethical and environmental constraints of the collection process. In this paper, we consider the problem of generating long-horizon trajectories, akin to wildlife migration, based on a small set of real samples. We propose a hierarchical approach to learn the global movement characteristics of the real dataset and recursively refine localized regions. Our solution, WildGraph, discretizes the geographic path into a prototype network of H3 (https://www.uber.com/blog/h3/) regions and leverages a recurrent variational auto-encoder to probabilistically generate paths over the regions, based on occupancy. WildGraph successfully generates realistic months-long trajectories using a sample size as small as 60. Experiments performed on two wildlife migration datasets demonstrate that our proposed method improves the generalization of the generated trajectories in comparison to existing work while achieving superior or comparable performance in several benchmark metrics. Our code is published on the following repository: https://github.com/aliwister/wildgraph.
△ Less
Submitted 7 February, 2025; v1 submitted 11 April, 2024;
originally announced April 2024.
-
Direct Electrical Detection of Spin Chemical Potential Due to Spin Hall Effect in $β$-Tungsten and Platinum Using a Pair of Ferromagnetic and Normal Metal Voltage probes
Authors:
Soumik Aon,
Abu Bakkar Miah,
Arpita Mandal,
Harekrishna Bhunia,
Dhananjaya Mahapatra,
Partha Mitra
Abstract:
The phenomenon of Spin Hall Effect (SHE) generates a pure spin current transverse to an applied current in materials with strong spin-orbit coupling, although not detectable through conventional electrical measurement. An intuitive Hall effect like measurement configuration is implemented to directly measure pure spin chemical potential of the accumulated spins at the edges of heavy metal (HM) cha…
▽ More
The phenomenon of Spin Hall Effect (SHE) generates a pure spin current transverse to an applied current in materials with strong spin-orbit coupling, although not detectable through conventional electrical measurement. An intuitive Hall effect like measurement configuration is implemented to directly measure pure spin chemical potential of the accumulated spins at the edges of heavy metal (HM) channels that generates large SHE. A pair of transverse linearly aligned voltage probes in placed in ohmic contact with the top surface of HM , one being a ferromagnetic metal (FM) with non-zero spin polarization and other is the reference metal (RM) with zero polarization of carriers. This combination of FM/RM electrodes is shown to induce an additional voltage proportional to a spin accumulation potential, which is anti symmetric with respect to opposite orientations of FM controlled by a 2D vector magnet. Proof of concept of the measurement scheme is verified by comparing the signs of voltages for HM channels of Tungsten (W) and Platinum (Pt) which are known to generate opposite spin accumulation under similar conditions of applied current. The same devices are also able to detect the reciprocal effect, inverse spin Hall effect (ISHE) by swapping the current and voltage leads and the results are consistent with reciprocity principle. Further, exploiting a characteristic feature of W thin film deposition, a series of devices were fabricated with W resistivity varying over a wide range of 10 - 750 $μΩ$-cm and the calculated spin Hall resistivity exhibits a pronounced power law dependence on resistivity. Our measurement scheme combined with almost two decades of HM resistivity variation provides the ideal platform required to test the underlying microscopic mechanism responsible for SHE/ISHE.
△ Less
Submitted 5 April, 2024;
originally announced April 2024.
-
Information Security and Privacy in the Digital World: Some Selected Topics
Authors:
Jaydip Sen,
Joceli Mayer,
Subhasis Dasgupta,
Subrata Nandi,
Srinivasan Krishnaswamy,
Pinaki Mitra,
Mahendra Pratap Singh,
Naga Prasanthi Kundeti,
Chandra Sekhara Rao MVP,
Sudha Sree Chekuri,
Seshu Babu Pallapothu,
Preethi Nanjundan,
Jossy P. George,
Abdelhadi El Allahi,
Ilham Morino,
Salma AIT Oussous,
Siham Beloualid,
Ahmed Tamtaoui,
Abderrahim Bajit
Abstract:
In the era of generative artificial intelligence and the Internet of Things, while there is explosive growth in the volume of data and the associated need for processing, analysis, and storage, several new challenges are faced in identifying spurious and fake information and protecting the privacy of sensitive data. This has led to an increasing demand for more robust and resilient schemes for aut…
▽ More
In the era of generative artificial intelligence and the Internet of Things, while there is explosive growth in the volume of data and the associated need for processing, analysis, and storage, several new challenges are faced in identifying spurious and fake information and protecting the privacy of sensitive data. This has led to an increasing demand for more robust and resilient schemes for authentication, integrity protection, encryption, non-repudiation, and privacy-preservation of data. The chapters in this book present some of the state-of-the-art research works in the field of cryptography and security in computing and communications.
△ Less
Submitted 29 March, 2024;
originally announced April 2024.
-
PEaCE: A Chemistry-Oriented Dataset for Optical Character Recognition on Scientific Documents
Authors:
Nan Zhang,
Connor Heaton,
Sean Timothy Okonsky,
Prasenjit Mitra,
Hilal Ezgi Toraman
Abstract:
Optical Character Recognition (OCR) is an established task with the objective of identifying the text present in an image. While many off-the-shelf OCR models exist, they are often trained for either scientific (e.g., formulae) or generic printed English text. Extracting text from chemistry publications requires an OCR model that is capable in both realms. Nougat, a recent tool, exhibits strong ab…
▽ More
Optical Character Recognition (OCR) is an established task with the objective of identifying the text present in an image. While many off-the-shelf OCR models exist, they are often trained for either scientific (e.g., formulae) or generic printed English text. Extracting text from chemistry publications requires an OCR model that is capable in both realms. Nougat, a recent tool, exhibits strong ability to parse academic documents, but is unable to parse tables in PubMed articles, which comprises a significant part of the academic community and is the focus of this work. To mitigate this gap, we present the Printed English and Chemical Equations (PEaCE) dataset, containing both synthetic and real-world records, and evaluate the efficacy of transformer-based OCR models when trained on this resource. Given that real-world records contain artifacts not present in synthetic records, we propose transformations that mimic such qualities. We perform a suite of experiments to explore the impact of patch size, multi-domain training, and our proposed transformations, ultimately finding that models with a small patch size trained on multiple domains using the proposed transformations yield the best performance. Our dataset and code is available at https://github.com/ZN1010/PEaCE.
△ Less
Submitted 23 March, 2024;
originally announced March 2024.
-
An On-Shell Derivation of the Soft Effective Action in Abelian Gauge Theories
Authors:
Temple He,
Prahar Mitra,
Allic Sivaramakrishnan,
Kathryn M. Zurek
Abstract:
We derive the soft effective action in $(d+2)$-dimensional abelian gauge theories from the on-shell action obeying Neumann boundary conditions at timelike and null infinity and Dirichlet boundary conditions at spatial infinity. This allows us to identify the on-shell degrees of freedom on the boundary with the soft modes living on the celestial sphere. Following the work of Donnelly and Wall, this…
▽ More
We derive the soft effective action in $(d+2)$-dimensional abelian gauge theories from the on-shell action obeying Neumann boundary conditions at timelike and null infinity and Dirichlet boundary conditions at spatial infinity. This allows us to identify the on-shell degrees of freedom on the boundary with the soft modes living on the celestial sphere. Following the work of Donnelly and Wall, this suggests that we can interpret soft modes as entanglement edge modes on the celestial sphere and study entanglement properties of soft modes in abelian gauge theories.
△ Less
Submitted 27 June, 2025; v1 submitted 21 March, 2024;
originally announced March 2024.
-
Graph Expansion in Pruned Recurrent Neural Network Layers Preserve Performance
Authors:
Suryam Arnav Kalra,
Arindam Biswas,
Pabitra Mitra,
Biswajit Basu
Abstract:
Expansion property of a graph refers to its strong connectivity as well as sparseness. It has been reported that deep neural networks can be pruned to a high degree of sparsity while maintaining their performance. Such pruning is essential for performing real time sequence learning tasks using recurrent neural networks in resource constrained platforms. We prune recurrent networks such as RNNs and…
▽ More
Expansion property of a graph refers to its strong connectivity as well as sparseness. It has been reported that deep neural networks can be pruned to a high degree of sparsity while maintaining their performance. Such pruning is essential for performing real time sequence learning tasks using recurrent neural networks in resource constrained platforms. We prune recurrent networks such as RNNs and LSTMs, maintaining a large spectral gap of the underlying graphs and ensuring their layerwise expansion properties. We also study the time unfolded recurrent network graphs in terms of the properties of their bipartite layers. Experimental results for the benchmark sequence MNIST, CIFAR-10, and Google speech command data show that expander graph properties are key to preserving classification accuracy of RNN and LSTM.
△ Less
Submitted 17 March, 2024;
originally announced March 2024.
-
Anisotropic magneto-photothermal voltage in Sb2Te3 topological insulator thin films
Authors:
Subhadip Manna,
Sambhu G Nath,
Samrat Roy,
Soumik Aon,
Sayani Pal,
Kanav Sharma,
Dhananjaya Mahapatra,
Partha Mitra,
Sourin Das,
Bipul Pal,
Chiranjib Mitra
Abstract:
We studied longitudinal and Hall photothermal voltages under a planar magnetic field scan in epitaxial thin films of the Topological Insulator (TI) Sb2Te3, grown using pulsed laser deposition (PLD). Unlike prior research that utilised polarised light-induced photocurrent to investigate the TI, our study introduces advancements based on unpolarized light-induced local heating. This method yields a…
▽ More
We studied longitudinal and Hall photothermal voltages under a planar magnetic field scan in epitaxial thin films of the Topological Insulator (TI) Sb2Te3, grown using pulsed laser deposition (PLD). Unlike prior research that utilised polarised light-induced photocurrent to investigate the TI, our study introduces advancements based on unpolarized light-induced local heating. This method yields a thermoelectric response exhibiting a direct signature of strong spin-orbit coupling. Our analysis reveals three distinct contributions when fitting the photothermal voltage data to the angular dependence of the planar magnetic field. The interaction between the applied magnetic field and the thermal gradient on the bulk band orbitals enables the differentiation between the ordinary Nernst effect from the out-of-plane thermal gradient and an extraordinary magneto-thermal contribution from the planar thermal gradient. The fitting of our data to theoretical models indicates that these effects primarily arise from the bulk states of the TI rather than the surface states. These findings highlight PLD-grown epitaxial topological insulator thin films as promising candidates for optoelectronic devices, including sensors and actuators. Such devices offer controllable responses through position-dependent, non-invasive local heating via focused incident light and variations in the applied magnetic field direction.
△ Less
Submitted 15 March, 2024;
originally announced March 2024.
-
Automated Multi-Task Learning for Joint Disease Prediction on Electronic Health Records
Authors:
Suhan Cui,
Prasenjit Mitra
Abstract:
In the realm of big data and digital healthcare, Electronic Health Records (EHR) have become a rich source of information with the potential to improve patient care and medical research. In recent years, machine learning models have proliferated for analyzing EHR data to predict patients future health conditions. Among them, some studies advocate for multi-task learning (MTL) to jointly predict mu…
▽ More
In the realm of big data and digital healthcare, Electronic Health Records (EHR) have become a rich source of information with the potential to improve patient care and medical research. In recent years, machine learning models have proliferated for analyzing EHR data to predict patients future health conditions. Among them, some studies advocate for multi-task learning (MTL) to jointly predict multiple target diseases for improving the prediction performance over single task learning. Nevertheless, current MTL frameworks for EHR data have significant limitations due to their heavy reliance on human experts to identify task groups for joint training and design model architectures. To reduce human intervention and improve the framework design, we propose an automated approach named AutoDP, which can search for the optimal configuration of task grouping and architectures simultaneously. To tackle the vast joint search space encompassing task combinations and architectures, we employ surrogate model-based optimization, enabling us to efficiently discover the optimal solution. Experimental results on real-world EHR data demonstrate the efficacy of the proposed AutoDP framework. It achieves significant performance improvements over both hand-crafted and automated state-of-the-art methods, also maintains a feasible search cost at the same time. Source code can be found via the link: \url{https://github.com/SH-Src/AutoDP}.
△ Less
Submitted 8 October, 2024; v1 submitted 6 March, 2024;
originally announced March 2024.