-
Null Hypersurface Caustics, Closed Null Curves, and Super-Entropy
Authors:
Sousuke Noda,
Yen Chin Ong
Abstract:
Recently it was discovered that null hypersurfaces can develop caustics outside the event horizon of super-entropic Kerr-AdS black holes, in contrast to the usual Kerr-AdS case. In this work we explore a few more examples of black hole spacetimes in which such exterior caustics can develop. If a closed null curve is present, e.g., in the case of Taub-NUT and the "transunital" Kerr-AdS spacetimes,…
▽ More
Recently it was discovered that null hypersurfaces can develop caustics outside the event horizon of super-entropic Kerr-AdS black holes, in contrast to the usual Kerr-AdS case. In this work we explore a few more examples of black hole spacetimes in which such exterior caustics can develop. If a closed null curve is present, e.g., in the case of Taub-NUT and the "transunital" Kerr-AdS spacetimes, then it coincides with a null hypersurface caustic (NHC) of a minimal separation parameter. Thus a spacetime on the verge of forming closed timelike curves could develop a caustic. Known examples of super-entropic black holes also have exterior NHC, although such spacetimes are free of closed null/timelike curves. Nevertheless the relationship between closed causal curves, NHC, and super-entropy is not straightforward. This is best illustrated with the BTZ black string, which for some choices of the warp factor in the extra dimension and the value of the charge, can be super-entropic. However, even those that are not super-entropic can admit NHC outside the horizon.
△ Less
Submitted 1 November, 2020; v1 submitted 28 September, 2020;
originally announced September 2020.
-
Modulating Scalable Gaussian Processes for Expressive Statistical Learning
Authors:
Haitao Liu,
Yew-Soon Ong,
Xiaomo Jiang,
Xiaofang Wang
Abstract:
For a learning task, Gaussian process (GP) is interested in learning the statistical relationship between inputs and outputs, since it offers not only the prediction mean but also the associated variability. The vanilla GP however struggles to learn complicated distribution with the property of, e.g., heteroscedastic noise, multi-modality and non-stationarity, from massive data due to the Gaussian…
▽ More
For a learning task, Gaussian process (GP) is interested in learning the statistical relationship between inputs and outputs, since it offers not only the prediction mean but also the associated variability. The vanilla GP however struggles to learn complicated distribution with the property of, e.g., heteroscedastic noise, multi-modality and non-stationarity, from massive data due to the Gaussian marginal and the cubic complexity. To this end, this article studies new scalable GP paradigms including the non-stationary heteroscedastic GP, the mixture of GPs and the latent GP, which introduce additional latent variables to modulate the outputs or inputs in order to learn richer, non-Gaussian statistical representation. We further resort to different variational inference strategies to arrive at analytical or tighter evidence lower bounds (ELBOs) of the marginal likelihood for efficient and effective model training. Extensive numerical experiments against state-of-the-art GP and neural network (NN) counterparts on various tasks verify the superiority of these scalable modulated GPs, especially the scalable latent GP, for learning diverse data distributions.
△ Less
Submitted 29 August, 2020;
originally announced August 2020.
-
Delving into Inter-Image Invariance for Unsupervised Visual Representations
Authors:
Jiahao Xie,
Xiaohang Zhan,
Ziwei Liu,
Yew Soon Ong,
Chen Change Loy
Abstract:
Contrastive learning has recently shown immense potential in unsupervised visual representation learning. Existing studies in this track mainly focus on intra-image invariance learning. The learning typically uses rich intra-image transformations to construct positive pairs and then maximizes agreement using a contrastive loss. The merits of inter-image invariance, conversely, remain much less exp…
▽ More
Contrastive learning has recently shown immense potential in unsupervised visual representation learning. Existing studies in this track mainly focus on intra-image invariance learning. The learning typically uses rich intra-image transformations to construct positive pairs and then maximizes agreement using a contrastive loss. The merits of inter-image invariance, conversely, remain much less explored. One major obstacle to exploit inter-image invariance is that it is unclear how to reliably construct inter-image positive pairs, and further derive effective supervision from them since no pair annotations are available. In this work, we present a comprehensive empirical study to better understand the role of inter-image invariance learning from three main constituting components: pseudo-label maintenance, sampling strategy, and decision boundary design. To facilitate the study, we introduce a unified and generic framework that supports the integration of unsupervised intra- and inter-image invariance learning. Through carefully-designed comparisons and analysis, multiple valuable observations are revealed: 1) online labels converge faster and perform better than offline labels; 2) semi-hard negative samples are more reliable and unbiased than hard negative samples; 3) a less stringent decision boundary is more favorable for inter-image invariance learning. With all the obtained recipes, our final model, namely InterCLR, shows consistent improvements over state-of-the-art intra-image invariance learning methods on multiple standard benchmarks. We hope this work will provide useful experience for devising effective unsupervised inter-image invariance learning. Code: https://github.com/open-mmlab/mmselfsup.
△ Less
Submitted 15 September, 2022; v1 submitted 26 August, 2020;
originally announced August 2020.
-
Hawking Evaporation of Black Holes in Massive Gravity
Authors:
Meng-Shi Hou,
Hao Xu,
Yen Chin Ong
Abstract:
We study the Hawking evaporation of a class of black hole solutions in dRGT massive gravity, in which the graviton mass gives rise to an effective negative cosmological constant. We found that the effective emission surface can be either proportional to the square of the effective AdS length scale, or corresponds to the square of the impact parameter of the null geodesic that falls onto the photon…
▽ More
We study the Hawking evaporation of a class of black hole solutions in dRGT massive gravity, in which the graviton mass gives rise to an effective negative cosmological constant. We found that the effective emission surface can be either proportional to the square of the effective AdS length scale, or corresponds to the square of the impact parameter of the null geodesic that falls onto the photon orbit of the black hole. Furthermore, depending on the black hole parameters, the emission surface could switch from one to another as the black hole loses mass during the evaporation process. Furthermore, the black holes can either evaporate completely or become a remnant at late time. Our result is more generally applicable to any asymptotically anti-de Sitter-like black hole solution in any theory whose metric function has a term linear in the coordinate radius, with massive gravity being only a concrete example.
△ Less
Submitted 23 August, 2020;
originally announced August 2020.
-
Adversary Agnostic Robust Deep Reinforcement Learning
Authors:
Xinghua Qu,
Yew-Soon Ong,
Abhishek Gupta,
Zhu Sun
Abstract:
Deep reinforcement learning (DRL) policies have been shown to be deceived by perturbations (e.g., random noise or intensional adversarial attacks) on state observations that appear at test time but are unknown during training. To increase the robustness of DRL policies, previous approaches assume that the knowledge of adversaries can be added into the training process to achieve the corresponding…
▽ More
Deep reinforcement learning (DRL) policies have been shown to be deceived by perturbations (e.g., random noise or intensional adversarial attacks) on state observations that appear at test time but are unknown during training. To increase the robustness of DRL policies, previous approaches assume that the knowledge of adversaries can be added into the training process to achieve the corresponding generalization ability on these perturbed observations. However, such an assumption not only makes the robustness improvement more expensive but may also leave a model less effective to other kinds of attacks in the wild. In contrast, we propose an adversary agnostic robust DRL paradigm that does not require learning from adversaries. To this end, we first theoretically derive that robustness could indeed be achieved independently of the adversaries based on a policy distillation setting. Motivated by this finding, we propose a new policy distillation loss with two terms: 1) a prescription gap maximization loss aiming at simultaneously maximizing the likelihood of the action selected by the teacher policy and the entropy over the remaining actions; 2) a corresponding Jacobian regularization loss that minimizes the magnitude of the gradient with respect to the input state. The theoretical analysis shows that our distillation loss guarantees to increase the prescription gap and the adversarial robustness. Furthermore, experiments on five Atari games firmly verify the superiority of our approach in terms of boosting adversarial robustness compared to other state-of-the-art methods.
△ Less
Submitted 24 December, 2020; v1 submitted 14 August, 2020;
originally announced August 2020.
-
IBM Federated Learning: an Enterprise Framework White Paper V0.1
Authors:
Heiko Ludwig,
Nathalie Baracaldo,
Gegi Thomas,
Yi Zhou,
Ali Anwar,
Shashank Rajamoni,
Yuya Ong,
Jayaram Radhakrishnan,
Ashish Verma,
Mathieu Sinn,
Mark Purcell,
Ambrish Rawat,
Tran Minh,
Naoise Holohan,
Supriyo Chakraborty,
Shalisha Whitherspoon,
Dean Steuer,
Laura Wynter,
Hifaz Hassan,
Sean Laguna,
Mikhail Yurochkin,
Mayank Agarwal,
Ebube Chuba,
Annie Abay
Abstract:
Federated Learning (FL) is an approach to conduct machine learning without centralizing training data in a single place, for reasons of privacy, confidentiality or data volume. However, solving federated machine learning problems raises issues above and beyond those of centralized machine learning. These issues include setting up communication infrastructure between parties, coordinating the learn…
▽ More
Federated Learning (FL) is an approach to conduct machine learning without centralizing training data in a single place, for reasons of privacy, confidentiality or data volume. However, solving federated machine learning problems raises issues above and beyond those of centralized machine learning. These issues include setting up communication infrastructure between parties, coordinating the learning process, integrating party results, understanding the characteristics of the training data sets of different participating parties, handling data heterogeneity, and operating with the absence of a verification data set.
IBM Federated Learning provides infrastructure and coordination for federated learning. Data scientists can design and run federated learning jobs based on existing, centralized machine learning models and can provide high-level instructions on how to run the federation. The framework applies to both Deep Neural Networks as well as ``traditional'' approaches for the most common machine learning libraries. {\proj} enables data scientists to expand their scope from centralized to federated machine learning, minimizing the learning curve at the outset while also providing the flexibility to deploy to different compute environments and design custom fusion algorithms.
△ Less
Submitted 22 July, 2020;
originally announced July 2020.
-
Online Deep Clustering for Unsupervised Representation Learning
Authors:
Xiaohang Zhan,
Jiahao Xie,
Ziwei Liu,
Yew Soon Ong,
Chen Change Loy
Abstract:
Joint clustering and feature learning methods have shown remarkable performance in unsupervised representation learning. However, the training schedule alternating between feature clustering and network parameters update leads to unstable learning of visual representations. To overcome this challenge, we propose Online Deep Clustering (ODC) that performs clustering and network update simultaneousl…
▽ More
Joint clustering and feature learning methods have shown remarkable performance in unsupervised representation learning. However, the training schedule alternating between feature clustering and network parameters update leads to unstable learning of visual representations. To overcome this challenge, we propose Online Deep Clustering (ODC) that performs clustering and network update simultaneously rather than alternatingly. Our key insight is that the cluster centroids should evolve steadily in keeping the classifier stably updated. Specifically, we design and maintain two dynamic memory modules, i.e., samples memory to store samples labels and features, and centroids memory for centroids evolution. We break down the abrupt global clustering into steady memory update and batch-wise label re-assignment. The process is integrated into network update iterations. In this way, labels and the network evolve shoulder-to-shoulder rather than alternatingly. Extensive experiments demonstrate that ODC stabilizes the training process and boosts the performance effectively. Code: https://github.com/open-mmlab/OpenSelfSup.
△ Less
Submitted 18 June, 2020;
originally announced June 2020.
-
Event Horizon Wrinklification
Authors:
Brett McInnes,
Yen Chin Ong
Abstract:
The possible existence of stable black holes with entropies larger than the corresponding Schwarzschild black hole has been discussed extensively. The recently proposed "rough" black holes provide a concrete example of this. The fear is that, in accordance with the Second Law of thermodynamics, the familiar smooth-skinned black holes might spontaneously "wrinklify" into such an object. We show tha…
▽ More
The possible existence of stable black holes with entropies larger than the corresponding Schwarzschild black hole has been discussed extensively. The recently proposed "rough" black holes provide a concrete example of this. The fear is that, in accordance with the Second Law of thermodynamics, the familiar smooth-skinned black holes might spontaneously "wrinklify" into such an object. We show that this fear is to some extent justified, in the sense that AdS black holes with more entropy than the AdS-Schwarzschild black hole of the same mass do exist.
△ Less
Submitted 16 June, 2020;
originally announced June 2020.
-
CoCon: A Self-Supervised Approach for Controlled Text Generation
Authors:
Alvin Chan,
Yew-Soon Ong,
Bill Pung,
Aston Zhang,
Jie Fu
Abstract:
Pretrained Transformer-based language models (LMs) display remarkable natural language generation capabilities. With their immense potential, controlling text generation of such LMs is getting attention. While there are studies that seek to control high-level attributes (such as sentiment and topic) of generated text, there is still a lack of more precise control over its content at the word- and…
▽ More
Pretrained Transformer-based language models (LMs) display remarkable natural language generation capabilities. With their immense potential, controlling text generation of such LMs is getting attention. While there are studies that seek to control high-level attributes (such as sentiment and topic) of generated text, there is still a lack of more precise control over its content at the word- and phrase-level. Here, we propose Content-Conditioner (CoCon) to control an LM's output text with a content input, at a fine-grained level. In our self-supervised approach, the CoCon block learns to help the LM complete a partially-observed text sequence by conditioning with content inputs that are withheld from the LM. Through experiments, we show that CoCon can naturally incorporate target content into generated texts and control high-level text attributes in a zero-shot manner.
△ Less
Submitted 9 June, 2022; v1 submitted 5 June, 2020;
originally announced June 2020.
-
Regular Black Hole Interior Spacetime Supported by Three-Form Field
Authors:
Mariam Bouhmadi-López,
Che-Yu Chen,
Xiao Yan Chew,
Yen Chin Ong,
Dong-han Yeom
Abstract:
In this paper, we show that a minimally coupled 3-form endowed with a proper potential can support a regular black hole interior. By choosing an appropriate form for the metric function representing the radius of the 2-sphere, we solve for the 3-form field and its potential. Using the obtained solution, we construct an interior black hole spacetime which is everywhere regular. The singularity is r…
▽ More
In this paper, we show that a minimally coupled 3-form endowed with a proper potential can support a regular black hole interior. By choosing an appropriate form for the metric function representing the radius of the 2-sphere, we solve for the 3-form field and its potential. Using the obtained solution, we construct an interior black hole spacetime which is everywhere regular. The singularity is replaced with a Nariai-type spacetime, whose topology is $\text{dS}_2 \times \text{S}^2$, in which the radius of the 2-sphere is constant. So long as the interior continues to expand indefinitely, the geometry becomes essentially compactified. The 2-dimensional de Sitter geometry appears despite the negative potential of the 3-form field. Such a dynamical compactification could shed some light on the origin of de Sitter geometry of our Universe, exacerbated by the Swampland conjecture. In addition, we show that the spacetime is geodesically complete. The geometry is singularity-free due to the violation of the null energy condition.
△ Less
Submitted 5 April, 2021; v1 submitted 27 May, 2020;
originally announced May 2020.
-
Schwinger Pair Production and the Extended Uncertainty Principle: Can Heuristic Derivations Be Trusted?
Authors:
Yen Chin Ong
Abstract:
The rate of Schwinger pair production due to an external electric field can be derived heuristically from the uncertainty principle. In the presence of a cosmological constant, it has been argued in the literature that the uncertainty principle receives a correction due to the background curvature, which is known as the "extended uncertainty principle" (EUP). We show that EUP does indeed lead to t…
▽ More
The rate of Schwinger pair production due to an external electric field can be derived heuristically from the uncertainty principle. In the presence of a cosmological constant, it has been argued in the literature that the uncertainty principle receives a correction due to the background curvature, which is known as the "extended uncertainty principle" (EUP). We show that EUP does indeed lead to the correct result for Schwinger pair production rate in anti-de Sitter spacetime (the case for de Sitter spacetime is similar), provided that the EUP correction term is negative (positive for the de Sitter case). We compare the results with previous works in the EUP literature, which are not all consistent. Our result further highlights an important issue in the literature of generalizations of the uncertainty principle: how much can heuristic derivations be trusted?
△ Less
Submitted 18 October, 2020; v1 submitted 25 May, 2020;
originally announced May 2020.
-
Deep Latent-Variable Kernel Learning
Authors:
Haitao Liu,
Yew-Soon Ong,
Xiaomo Jiang,
Xiaofang Wang
Abstract:
Deep kernel learning (DKL) leverages the connection between Gaussian process (GP) and neural networks (NN) to build an end-to-end, hybrid model. It combines the capability of NN to learn rich representations under massive data and the non-parametric property of GP to achieve automatic regularization that incorporates a trade-off between model fit and model complexity. However, the deterministic en…
▽ More
Deep kernel learning (DKL) leverages the connection between Gaussian process (GP) and neural networks (NN) to build an end-to-end, hybrid model. It combines the capability of NN to learn rich representations under massive data and the non-parametric property of GP to achieve automatic regularization that incorporates a trade-off between model fit and model complexity. However, the deterministic encoder may weaken the model regularization of the following GP part, especially on small datasets, due to the free latent representation. We therefore present a complete deep latent-variable kernel learning (DLVKL) model wherein the latent variables perform stochastic encoding for regularized representation. We further enhance the DLVKL from two aspects: (i) the expressive variational posterior through neural stochastic differential equation (NSDE) to improve the approximation quality, and (ii) the hybrid prior taking knowledge from both the SDE prior and the posterior to arrive at a flexible trade-off. Intensive experiments imply that the DLVKL-NSDE performs similarly to the well calibrated GP on small datasets, and outperforms existing deep GPs on large datasets.
△ Less
Submitted 19 August, 2020; v1 submitted 18 May, 2020;
originally announced May 2020.
-
Spacetime Singularities and Cosmic Censorship Conjecture: A Review with Some Thoughts
Authors:
Yen Chin Ong
Abstract:
The singularity theorems of Hawking and Penrose tell us that singularities are common place in general relativity. Singularities not only occur at the beginning of the Universe at the Big Bang, but also in complete gravitational collapses that result in the formation of black holes. If singularities - except the one at the Big Bang - ever become "naked", i.e., not shrouded by black hole horizons,…
▽ More
The singularity theorems of Hawking and Penrose tell us that singularities are common place in general relativity. Singularities not only occur at the beginning of the Universe at the Big Bang, but also in complete gravitational collapses that result in the formation of black holes. If singularities - except the one at the Big Bang - ever become "naked", i.e., not shrouded by black hole horizons, then it is expected that problems would arise and render general relativity indeterministic. For this reason, Penrose proposed the cosmic censorship conjecture, which states that singularities should never be naked. Various counterexamples to the conjecture have since been discovered, but it is still not clear under which kind of physical processes one can expect violation of the conjecture. In this short review, I briefly examine some progresses in spacetime singularities and cosmic censorship conjecture. In particular, I shall discuss why we should still care about the conjecture, and whether we should be worried about some of the counterexamples. This is not meant to be a comprehensive review, but rather to give an introduction to the subject, which has recently seen an increase of interest.
△ Less
Submitted 26 May, 2020; v1 submitted 14 May, 2020;
originally announced May 2020.
-
Black Hole Evaporation in Hořava-Lifshitz Gravity
Authors:
Hao Xu,
Yen Chin Ong
Abstract:
Hořava-Lifshitz (HL) gravity was formulated in hope of solving the non-renormalization problem in Einstein gravity and the ghost problem in higher derivative gravity theories by violating Lorentz invariance. In this work we consider the spherically symmetric neutral AdS black hole evaporation process in HL gravity in various spacetime dimensions $d$, and with detailed balance violation parameter…
▽ More
Hořava-Lifshitz (HL) gravity was formulated in hope of solving the non-renormalization problem in Einstein gravity and the ghost problem in higher derivative gravity theories by violating Lorentz invariance. In this work we consider the spherically symmetric neutral AdS black hole evaporation process in HL gravity in various spacetime dimensions $d$, and with detailed balance violation parameter $0\leqslant ε^2\leqslant 1$. We find that the lifetime of the black holes under Hawking evaporation is dimensional dependent, with $d=4,5$ behave differently from $d\geqslant 6$. For the case of $ε=0$, in $d=4,5$, the black hole admits zero temperature state, and the lifetime of the black hole is always infinite. This phenomenon obeys the third law of black hole thermodynamics, and implies that the black holes become an effective remnant towards the end of the evaporation. As $d\geqslant 6$, however, the lifetime of black hole does not diverge with any initial black hole mass, and it is bounded by a time of the order of $\ell^{d-1}$, similar to the case of Schwarzschild-AdS in Einstein gravity (which corresponds to $ε^2=1$), though for the latter this holds for all $d\geqslant 4$. The case of $0<ε^2<1$ is also qualitatively similar with $ε=0$.
△ Less
Submitted 17 July, 2020; v1 submitted 5 May, 2020;
originally announced May 2020.
-
The Interior Volume of Kerr-AdS Black Holes
Authors:
Xiao Yan Chew,
Yen Chin Ong
Abstract:
The interior volume of black holes as defined by Christodoulou and Rovelli exhibits many surprising features. For example, it increases with time, even under Hawking evaporation. For some black holes, the interior volume is not even a monotonic increasing function of its area, which means one cannot infer how large a black hole is by just looking from the outside. Such a notion of volume, however,…
▽ More
The interior volume of black holes as defined by Christodoulou and Rovelli exhibits many surprising features. For example, it increases with time, even under Hawking evaporation. For some black holes, the interior volume is not even a monotonic increasing function of its area, which means one cannot infer how large a black hole is by just looking from the outside. Such a notion of volume, however, turns out to be useful in the context of holography, as it seems to be dual to the complexity of the boundary field theory. In this study, we investigate the properties of the interior volume of 4-dimensional Kerr-AdS black holes, fixing either the mass parameter $M$ or the physical mass $E$, whilst varying the values of the cosmological constant. We found that the volume as a function of the radial coordinate features a "double lobe" while fixing $M$, whereas fixing $E$ yields behaviors that are qualitatively similar to the asymptotically flat case. We briefly comment on the holographic complexity of Kerr-AdS black holes.
△ Less
Submitted 29 September, 2020; v1 submitted 4 May, 2020;
originally announced May 2020.
-
Heterogeneous Representation Learning: A Review
Authors:
Joey Tianyi Zhou,
Xi Peng,
Yew-Soon Ong
Abstract:
The real-world data usually exhibits heterogeneous properties such as modalities, views, or resources, which brings some unique challenges wherein the key is Heterogeneous Representation Learning (HRL) termed in this paper. This brief survey covers the topic of HRL, centered around several major learning settings and real-world applications. First of all, from the mathematical perspective, we pres…
▽ More
The real-world data usually exhibits heterogeneous properties such as modalities, views, or resources, which brings some unique challenges wherein the key is Heterogeneous Representation Learning (HRL) termed in this paper. This brief survey covers the topic of HRL, centered around several major learning settings and real-world applications. First of all, from the mathematical perspective, we present a unified learning framework which is able to model most existing learning settings with the heterogeneous inputs. After that, we conduct a comprehensive discussion on the HRL framework by reviewing some selected learning problems along with the mathematics perspectives, including multi-view learning, heterogeneous transfer learning, Learning using privileged information and heterogeneous multi-task learning. For each learning task, we also discuss some applications under these learning problems and instantiates the terms in the mathematical framework. Finally, we highlight the challenges that are less-touched in HRL and present future research directions. To the best of our knowledge, there is no such framework to unify these heterogeneous problems, and this survey would benefit the community.
△ Less
Submitted 30 April, 2020; v1 submitted 28 April, 2020;
originally announced April 2020.
-
Thermodynamics of Shearing Massless Scalar Field Spacetimes is Inconsistent With the Weyl Curvature Hypothesis
Authors:
Daniele Gregoris,
Yen Chin Ong,
Bin Wang
Abstract:
Our Universe has an arrow of time. In accordance with the second law of thermodynamics, entropy has been increasing ever since the Big Bang. The fact that matter is in thermal equilibrium in the very early Universe, as indicated by the cosmic microwave background, has led to the idea that gravitational entropy must be very low in the beginning. Penrose proposed that gravitational entropy can be qu…
▽ More
Our Universe has an arrow of time. In accordance with the second law of thermodynamics, entropy has been increasing ever since the Big Bang. The fact that matter is in thermal equilibrium in the very early Universe, as indicated by the cosmic microwave background, has led to the idea that gravitational entropy must be very low in the beginning. Penrose proposed that gravitational entropy can be quantified by the Weyl curvature, which increases as structures formed. A concrete realization of such a measure is the Clifton-Ellis-Tavakol gravitational entropy, which has been shown to be increasing in quite a number of cosmological models. In this work, we show a counter-example involving a class of inhomogeneous universes that are supported by a chameleon massless scalar field and exhibit anisotropic spacetime shearing effects. In fact, in our model the Clifton-Ellis-Tavakol gravitational entropy is increasing although the magnitude of the Weyl curvature is decreasing; this is due to the growth of the spacetime shear. The topology and the values of the three free parameters of the model are constrained by imposing a positive energy density for the cosmic fluid, and the thermodynamical requirements which follow from the cosmological holographic principle and the second law. It is shown that a negative deceleration parameter and a time decreasing Weyl curvature automatically follow from those conditions. Thus, we argue that our model can account for the formation of some primordial structures, like the Large Quasar Groups, which has required a non-standard evolution of the spatial anisotropies.
△ Less
Submitted 29 July, 2020; v1 submitted 21 April, 2020;
originally announced April 2020.
-
Particle spectrum of the Reissner-Nordström black hole
Authors:
Michael R. R. Good,
Yen Chin Ong
Abstract:
The Reissner-Nordström black hole - moving mirror correspondence is solved. The beta coefficients reveal that charge makes a black hole radiate fewer particles (neutral massless scalars) per frequency. An old Reissner-Nordström black hole emits particles in an explicit Planck distribution with temperature corresponding to the surface gravity of its outer horizon.
The Reissner-Nordström black hole - moving mirror correspondence is solved. The beta coefficients reveal that charge makes a black hole radiate fewer particles (neutral massless scalars) per frequency. An old Reissner-Nordström black hole emits particles in an explicit Planck distribution with temperature corresponding to the surface gravity of its outer horizon.
△ Less
Submitted 8 April, 2020;
originally announced April 2020.
-
The Quantum Atmosphere of Reissner-Nordström Black Holes
Authors:
Yen Chin Ong,
Michael R. R. Good
Abstract:
Hawking radiation originates from a "quantum atmosphere" around black holes, not necessarily from the vicinity of the horizon. We examine and discuss the properties of quantum atmospheres of asymptotically flat Reissner-Nordström black holes, which extends further and further away from the black hole as extremality is approached, though arguably it becomes indistinguishable from normal vacuum fluc…
▽ More
Hawking radiation originates from a "quantum atmosphere" around black holes, not necessarily from the vicinity of the horizon. We examine and discuss the properties of quantum atmospheres of asymptotically flat Reissner-Nordström black holes, which extends further and further away from the black hole as extremality is approached, though arguably it becomes indistinguishable from normal vacuum fluctuation at spatial infinity. In addition, following our previous findings on re-writing the Hawking temperature of a Kerr black hole in terms of a "spring constant", we generalize the same notion to the Reissner-Nordström case, which allows us to put a minimum size on the location where Hawking particles can be emitted near a black hole, which agrees with the stretched horizon.
△ Less
Submitted 23 March, 2020;
originally announced March 2020.
-
Relational Thematic Clustering with Mutually Preferred Neighbors
Authors:
Tiantian He,
Lu Bai,
Yew-Soon Ong
Abstract:
Automatically learning thematic clusters in network data has long been a challenging task in machine learning community. A number of approaches have been proposed to accomplish it, utilizing edges, vertex features, or both aforementioned. However, few of them consider how the quantification of dichotomous inclination w.r.t. network topology and vertex features may influence vertex-cluster preferen…
▽ More
Automatically learning thematic clusters in network data has long been a challenging task in machine learning community. A number of approaches have been proposed to accomplish it, utilizing edges, vertex features, or both aforementioned. However, few of them consider how the quantification of dichotomous inclination w.r.t. network topology and vertex features may influence vertex-cluster preferences, which deters previous methods from uncovering more interpretable latent groups in network data. To fill this void, we propose a novel probabilistic model, dubbed Relational Thematic Clustering with Mutually Preferred Neighbors (RTCMPN). Different from prevalent approaches which predetermine the learning significance of edge structure and vertex features, RTCMPN can further learn the latent preferences indicating which neighboring vertices are more possible to be in the same cluster, and the dichotomous inclinations describing how relative significance w.r.t. edge structure and vertex features may impact the association between pairwise vertices. Therefore, cluster structure implanted with edge structure, vertex features, neighboring preferences, and vertex-vertex dichotomous inclinations can be learned by RTCMPN. We additionally derive an effective Expectation-Maximization algorithm for RTCMPN to infer the optimal model parameters. RTCMPN has been compared with several strong baselines on various network data. The remarkable results validate the effectiveness of RTCMPN.
△ Less
Submitted 23 January, 2020;
originally announced January 2020.
-
Temporal Tensor Transformation Network for Multivariate Time Series Prediction
Authors:
Yuya Jeremy Ong,
Mu Qiao,
Divyesh Jadav
Abstract:
Multivariate time series prediction has applications in a wide variety of domains and is considered to be a very challenging task, especially when the variables have correlations and exhibit complex temporal patterns, such as seasonality and trend. Many existing methods suffer from strong statistical assumptions, numerical issues with high dimensionality, manual feature engineering efforts, and sc…
▽ More
Multivariate time series prediction has applications in a wide variety of domains and is considered to be a very challenging task, especially when the variables have correlations and exhibit complex temporal patterns, such as seasonality and trend. Many existing methods suffer from strong statistical assumptions, numerical issues with high dimensionality, manual feature engineering efforts, and scalability. In this work, we present a novel deep learning architecture, known as Temporal Tensor Transformation Network, which transforms the original multivariate time series into a higher order of tensor through the proposed Temporal-Slicing Stack Transformation. This yields a new representation of the original multivariate time series, which enables the convolution kernel to extract complex and non-linear features as well as variable interactional signals from a relatively large temporal region. Experimental results show that Temporal Tensor Transformation Network outperforms several state-of-the-art methods on window-based predictions across various tasks. The proposed architecture also demonstrates robust prediction performance through an extensive sensitivity analysis.
△ Less
Submitted 4 January, 2020;
originally announced January 2020.
-
Jacobian Adversarially Regularized Networks for Robustness
Authors:
Alvin Chan,
Yi Tay,
Yew Soon Ong,
Jie Fu
Abstract:
Adversarial examples are crafted with imperceptible perturbations with the intent to fool neural networks. Against such attacks, adversarial training and its variants stand as the strongest defense to date. Previous studies have pointed out that robust models that have undergone adversarial training tend to produce more salient and interpretable Jacobian matrices than their non-robust counterparts…
▽ More
Adversarial examples are crafted with imperceptible perturbations with the intent to fool neural networks. Against such attacks, adversarial training and its variants stand as the strongest defense to date. Previous studies have pointed out that robust models that have undergone adversarial training tend to produce more salient and interpretable Jacobian matrices than their non-robust counterparts. A natural question is whether a model trained with an objective to produce salient Jacobian can result in better robustness. This paper answers this question with affirmative empirical results. We propose Jacobian Adversarially Regularized Networks (JARN) as a method to optimize the saliency of a classifier's Jacobian by adversarially regularizing the model's Jacobian to resemble natural training images. Image classifiers trained with JARN show improved robust accuracy compared to standard models on the MNIST, SVHN and CIFAR-10 datasets, uncovering a new angle to boost robustness without using adversarial training examples.
△ Less
Submitted 29 January, 2020; v1 submitted 20 December, 2019;
originally announced December 2019.
-
What it Thinks is Important is Important: Robustness Transfers through Input Gradients
Authors:
Alvin Chan,
Yi Tay,
Yew-Soon Ong
Abstract:
Adversarial perturbations are imperceptible changes to input pixels that can change the prediction of deep learning models. Learned weights of models robust to such perturbations are previously found to be transferable across different tasks but this applies only if the model architecture for the source and target tasks is the same. Input gradients characterize how small changes at each input pixe…
▽ More
Adversarial perturbations are imperceptible changes to input pixels that can change the prediction of deep learning models. Learned weights of models robust to such perturbations are previously found to be transferable across different tasks but this applies only if the model architecture for the source and target tasks is the same. Input gradients characterize how small changes at each input pixel affect the model output. Using only natural images, we show here that training a student model's input gradients to match those of a robust teacher model can gain robustness close to a strong baseline that is robustly trained from scratch. Through experiments in MNIST, CIFAR-10, CIFAR-100 and Tiny-ImageNet, we show that our proposed method, input gradient adversarial matching, can transfer robustness across different tasks and even across different model architectures. This demonstrates that directly targeting the semantics of input gradients is a feasible way towards adversarial robustness.
△ Less
Submitted 29 October, 2020; v1 submitted 11 December, 2019;
originally announced December 2019.
-
Cosmic Censorship and the Evolution of d-Dimensional Charged Evaporating Black Holes
Authors:
Hao Xu,
Yen Chin Ong,
Man-Hong Yung
Abstract:
The cosmic censorship conjecture essentially states that naked singularities should not form from generic initial conditions. Since black hole parameters can change their values under Hawking evaporation, one has to ask whether it is possible to reach extremality by simply waiting for the black hole to evaporate. If so a slight perturbation would likely render the singularity naked. Fortunately, a…
▽ More
The cosmic censorship conjecture essentially states that naked singularities should not form from generic initial conditions. Since black hole parameters can change their values under Hawking evaporation, one has to ask whether it is possible to reach extremality by simply waiting for the black hole to evaporate. If so a slight perturbation would likely render the singularity naked. Fortunately, at least for the case of asymptotically flat 4-dimensional Reissner-Nordström black hole, Hiscock and Weems showed that it can never reach extremality despite the fact that for a sufficiently massive black hole, its charge-to-mass ratio can increase during Hawking evaporation. Hence cosmic censorship is never violated by Hawking emission. However, we know that under some processes, it is easier to violate cosmic censorship in higher dimensions, therefore it is crucial to generalize Hiscock and Weems model to dimensions above four to check cosmic censorship. We found that Hawking evaporation cannot lead to violation of cosmic censorship even in higher dimensional Reissner-Nordström spacetimes. Morerover, it seems to be more difficult to reach extremality as number of dimension increases.
△ Less
Submitted 21 February, 2020; v1 submitted 27 November, 2019;
originally announced November 2019.
-
Poison as a Cure: Detecting & Neutralizing Variable-Sized Backdoor Attacks in Deep Neural Networks
Authors:
Alvin Chan,
Yew-Soon Ong
Abstract:
Deep learning models have recently shown to be vulnerable to backdoor poisoning, an insidious attack where the victim model predicts clean images correctly but classifies the same images as the target class when a trigger poison pattern is added. This poison pattern can be embedded in the training dataset by the adversary. Existing defenses are effective under certain conditions such as a small si…
▽ More
Deep learning models have recently shown to be vulnerable to backdoor poisoning, an insidious attack where the victim model predicts clean images correctly but classifies the same images as the target class when a trigger poison pattern is added. This poison pattern can be embedded in the training dataset by the adversary. Existing defenses are effective under certain conditions such as a small size of the poison pattern, knowledge about the ratio of poisoned training samples or when a validated clean dataset is available. Since a defender may not have such prior knowledge or resources, we propose a defense against backdoor poisoning that is effective even when those prerequisites are not met. It is made up of several parts: one to extract a backdoor poison signal, detect poison target and base classes, and filter out poisoned from clean samples with proven guarantees. The final part of our defense involves retraining the poisoned model on a dataset augmented with the extracted poison signal and corrective relabeling of poisoned samples to neutralize the backdoor. Our approach has shown to be effective in defending against backdoor attacks that use both small and large-sized poison patterns on nine different target-base class pairs from the CIFAR10 dataset.
△ Less
Submitted 18 November, 2019;
originally announced November 2019.
-
A Multi-Task Gradient Descent Method for Multi-Label Learning
Authors:
Lu Bai,
Yew-Soon Ong,
Tiantian He,
Abhishek Gupta
Abstract:
Multi-label learning studies the problem where an instance is associated with a set of labels. By treating single-label learning problem as one task, the multi-label learning problem can be casted as solving multiple related tasks simultaneously. In this paper, we propose a novel Multi-task Gradient Descent (MGD) algorithm to solve a group of related tasks simultaneously. In the proposed algorithm…
▽ More
Multi-label learning studies the problem where an instance is associated with a set of labels. By treating single-label learning problem as one task, the multi-label learning problem can be casted as solving multiple related tasks simultaneously. In this paper, we propose a novel Multi-task Gradient Descent (MGD) algorithm to solve a group of related tasks simultaneously. In the proposed algorithm, each task minimizes its individual cost function using reformative gradient descent, where the relations among the tasks are facilitated through effectively transferring model parameter values across multiple tasks. Theoretical analysis shows that the proposed algorithm is convergent with a proper transfer mechanism. Compared with the existing approaches, MGD is easy to implement, has less requirement on the training model, can achieve seamless asymmetric transformation such that negative transfer is mitigated, and can benefit from parallel computing when the number of tasks is large. The competitive experimental results on multi-label learning datasets validate the effectiveness of the proposed algorithm.
△ Less
Submitted 19 November, 2019; v1 submitted 18 November, 2019;
originally announced November 2019.
-
Minimalistic Attacks: How Little it Takes to Fool a Deep Reinforcement Learning Policy
Authors:
Xinghua Qu,
Zhu Sun,
Yew-Soon Ong,
Abhishek Gupta,
Pengfei Wei
Abstract:
Recent studies have revealed that neural network-based policies can be easily fooled by adversarial examples. However, while most prior works analyze the effects of perturbing every pixel of every frame assuming white-box policy access, in this paper we take a more restrictive view towards adversary generation - with the goal of unveiling the limits of a model's vulnerability. In particular, we ex…
▽ More
Recent studies have revealed that neural network-based policies can be easily fooled by adversarial examples. However, while most prior works analyze the effects of perturbing every pixel of every frame assuming white-box policy access, in this paper we take a more restrictive view towards adversary generation - with the goal of unveiling the limits of a model's vulnerability. In particular, we explore minimalistic attacks by defining three key settings: (1) black-box policy access: where the attacker only has access to the input (state) and output (action probability) of an RL policy; (2) fractional-state adversary: where only several pixels are perturbed, with the extreme case being a single-pixel adversary; and (3) tactically-chanced attack: where only significant frames are tactically chosen to be attacked. We formulate the adversarial attack by accommodating the three key settings and explore their potency on six Atari games by examining four fully trained state-of-the-art policies. In Breakout, for example, we surprisingly find that: (i) all policies showcase significant performance degradation by merely modifying 0.01% of the input state, and (ii) the policy trained by DQN is totally deceived by perturbation to only 1% frames.
△ Less
Submitted 29 October, 2020; v1 submitted 9 November, 2019;
originally announced November 2019.
-
The Horizon of the McVittie Black Hole: On the Role of the Cosmic Fluid Modeling
Authors:
Daniele Gregoris,
Yen Chin Ong,
Bin Wang
Abstract:
In this paper, we investigate the existence and time evolution of the cosmological and event horizons in a McVittie universe whose expansion is driven by the Redlich-Kwong, (Modified) Berthelot, Dieterici, and Peng-Robinson fluids, respectively. The equations of state of these fluids are rich enough to account for both exotic and regular, as well as ideal and non-ideal matter contents of the unive…
▽ More
In this paper, we investigate the existence and time evolution of the cosmological and event horizons in a McVittie universe whose expansion is driven by the Redlich-Kwong, (Modified) Berthelot, Dieterici, and Peng-Robinson fluids, respectively. The equations of state of these fluids are rich enough to account for both exotic and regular, as well as ideal and non-ideal matter contents of the universe. We show that the cosmological horizon is expanding, while the event horizon is shrinking along the cosmic time evolution. The former achieves larger size for regular types of matter, contrary to the latter. The strength of interactions within the cosmic fluid are shown to play a more important role in affecting the evolution of the event horizon, rather than of the cosmological horizon in the case of a singularity-free universe. While the cosmological horizon always exists during the time evolution, the event horizon can exist only when a certain relationship between the Hawking-Hayward quasi-local mass and the Hubble function is fulfilled. In this manner, we can study the role played by the large-scale physics (cosmic evolution) on the local scale physics (evolution of a black hole).
△ Less
Submitted 2 March, 2020; v1 submitted 5 November, 2019;
originally announced November 2019.
-
DEVDAN: Deep Evolving Denoising Autoencoder
Authors:
Andri Ashfahani,
Mahardhika Pratama,
Edwin Lughofer,
Yew Soon Ong
Abstract:
The Denoising Autoencoder (DAE) enhances the flexibility of the data stream method in exploiting unlabeled samples. Nonetheless, the feasibility of DAE for data stream analytic deserves an in-depth study because it characterizes a fixed network capacity that cannot adapt to rapidly changing environments. Deep evolving denoising autoencoder (DEVDAN), is proposed in this paper. It features an open s…
▽ More
The Denoising Autoencoder (DAE) enhances the flexibility of the data stream method in exploiting unlabeled samples. Nonetheless, the feasibility of DAE for data stream analytic deserves an in-depth study because it characterizes a fixed network capacity that cannot adapt to rapidly changing environments. Deep evolving denoising autoencoder (DEVDAN), is proposed in this paper. It features an open structure in the generative phase and the discriminative phase where the hidden units can be automatically added and discarded on the fly. The generative phase refines the predictive performance of the discriminative model exploiting unlabeled data. Furthermore, DEVDAN is free of the problem-specific threshold and works fully in the single-pass learning fashion. We show that DEVDAN can find competitive network architecture compared with state-of-the-art methods on the classification task using ten prominent datasets simulated under the prequential test-then-train protocol.
△ Less
Submitted 9 January, 2020; v1 submitted 8 October, 2019;
originally announced October 2019.
-
Automatic Construction of Multi-layer Perceptron Network from Streaming Examples
Authors:
Mahardhika Pratama,
Choiru Za'in,
Andri Ashfahani,
Yew Soon Ong,
Weiping Ding
Abstract:
Autonomous construction of deep neural network (DNNs) is desired for data streams because it potentially offers two advantages: proper model's capacity and quick reaction to drift and shift. While the self-organizing mechanism of DNNs remains an open issue, this task is even more challenging to be developed for standard multi-layer DNNs than that using the different-depth structures, because the a…
▽ More
Autonomous construction of deep neural network (DNNs) is desired for data streams because it potentially offers two advantages: proper model's capacity and quick reaction to drift and shift. While the self-organizing mechanism of DNNs remains an open issue, this task is even more challenging to be developed for standard multi-layer DNNs than that using the different-depth structures, because the addition of a new layer results in information loss of previously trained knowledge. A Neural Network with Dynamically Evolved Capacity (NADINE) is proposed in this paper. NADINE features a fully open structure where its network structure, depth and width, can be automatically evolved from scratch in an online manner and without the use of problem-specific thresholds. NADINE is structured under a standard MLP architecture and the catastrophic forgetting issue during the hidden layer addition phase is resolved using the proposal of soft-forgetting and adaptive memory methods. The advantage of NADINE, namely elastic structure and online learning trait, is numerically validated using nine data stream classification and regression problems where it demonstrates performance improvement over prominent algorithms in all problems. In addition, it is capable of dealing with data stream regression and classification problems equally well.
△ Less
Submitted 9 January, 2020; v1 submitted 8 October, 2019;
originally announced October 2019.
-
The Attractor of Evaporating Reissner-Nordström Black Holes
Authors:
Yen Chin Ong
Abstract:
Hiscock and Weems showed that there is an attractor behavior in the evolution of asymptotically flat Reissner-Nordström black hole under Hawking evaporation. If the initial charge-to-mass ratio $Q/M$ of the black hole is relatively small, then the ratio first increases until the black hole hits the attractor, and then starts to discharge towards the Schwarzschild limit. Sufficiently charged black…
▽ More
Hiscock and Weems showed that there is an attractor behavior in the evolution of asymptotically flat Reissner-Nordström black hole under Hawking evaporation. If the initial charge-to-mass ratio $Q/M$ of the black hole is relatively small, then the ratio first increases until the black hole hits the attractor, and then starts to discharge towards the Schwarzschild limit. Sufficiently charged black holes, on the other hand, simply discharge steadily towards the Schwarzschild limit. In this work we further investigate the nature of the attractor, and found that it is characterized by the mass loss rate being equal to the charge loss rate. The attractor is not necessarily related to the specific heat in a general evaporating black hole spacetime, but for the Reissner-Nordström case part of the attractor lies very close to the boundary of the region where specific heat changes sign.
△ Less
Submitted 22 September, 2019;
originally announced September 2019.
-
The Charge of Electron, Weak Gravity Conjecture and Black Hole Evolution
Authors:
Yen Chin Ong
Abstract:
The charge of an electron is vastly larger than its mass. We found that black hole evolution under Hawking evaporation is very sensitive to the value of electron charge. If the electron charge is weakened by a mere one order of magnitude, then the evolutionary paths of Reissner-Nordström black holes under Hawking evaporation change substantially. In particular, weakening the electron charge causes…
▽ More
The charge of an electron is vastly larger than its mass. We found that black hole evolution under Hawking evaporation is very sensitive to the value of electron charge. If the electron charge is weakened by a mere one order of magnitude, then the evolutionary paths of Reissner-Nordström black holes under Hawking evaporation change substantially. In particular, weakening the electron charge causes some black holes that would otherwise immediately discharge towards Schwarzschild limit to first evolve towards extremality before turning around. We discuss the possible connections between the weak gravity conjecture, the cosmic censorship conjecture, and black hole evolution.
△ Less
Submitted 22 September, 2019;
originally announced September 2019.
-
Scalable Gaussian Process Classification with Additive Noise for Various Likelihoods
Authors:
Haitao Liu,
Yew-Soon Ong,
Ziwei Yu,
Jianfei Cai,
Xiaobo Shen
Abstract:
Gaussian process classification (GPC) provides a flexible and powerful statistical framework describing joint distributions over function space. Conventional GPCs however suffer from (i) poor scalability for big data due to the full kernel matrix, and (ii) intractable inference due to the non-Gaussian likelihoods. Hence, various scalable GPCs have been proposed through (i) the sparse approximation…
▽ More
Gaussian process classification (GPC) provides a flexible and powerful statistical framework describing joint distributions over function space. Conventional GPCs however suffer from (i) poor scalability for big data due to the full kernel matrix, and (ii) intractable inference due to the non-Gaussian likelihoods. Hence, various scalable GPCs have been proposed through (i) the sparse approximation built upon a small inducing set to reduce the time complexity; and (ii) the approximate inference to derive analytical evidence lower bound (ELBO). However, these scalable GPCs equipped with analytical ELBO are limited to specific likelihoods or additional assumptions. In this work, we present a unifying framework which accommodates scalable GPCs using various likelihoods. Analogous to GP regression (GPR), we introduce additive noises to augment the probability space for (i) the GPCs with step, (multinomial) probit and logit likelihoods via the internal variables; and particularly, (ii) the GPC using softmax likelihood via the noise variables themselves. This leads to unified scalable GPCs with analytical ELBO by using variational inference. Empirically, our GPCs showcase better results than state-of-the-art scalable GPCs for extensive binary/multi-class classification tasks with up to two million data points.
△ Less
Submitted 14 September, 2019;
originally announced September 2019.
-
Charged Particle Production Rate from Cosmic Censorship in Dilaton Black Hole Spacetimes
Authors:
Yen Chin Ong,
Yuan Yao
Abstract:
Hiscock and Weems showed that under Hawking evaporation, an isolated asymptotically flat Reissner-Nordstrom (RN) black hole evolves in a surprising manner: if it starts with a relatively small value of charge-to-mass ratio Q/M, then said value will temporarily increase along its evolutionary path, before finally decreases towards zero. This contrasts with highly charged ones that simply radiate aw…
▽ More
Hiscock and Weems showed that under Hawking evaporation, an isolated asymptotically flat Reissner-Nordstrom (RN) black hole evolves in a surprising manner: if it starts with a relatively small value of charge-to-mass ratio Q/M, then said value will temporarily increase along its evolutionary path, before finally decreases towards zero. This contrasts with highly charged ones that simply radiate away its charge steadily. The combination of these two effects is the cosmic censor at work: there exists an attractor that flows towards the Schwazschild limit, which ensures that extremality -- and hence naked singularity -- can never be reached under Hawking evaporation. We apply the scheme of Hiscock and Weems to model the evaporation of an asymptotically flat dilatonic charge black hole known as the Garfinkle-Horowitz-Strominger (GHS) black hole. We found that upholding the cosmic censorship requires us to modify the charged particle production rate, which remarkably agrees with the expression obtained independently via direct computation of charged particle production rate on curved spacetime background. This not only strengthens the case for cosmic censorship, but also provides an example in which cosmic censorship can be a useful principle to deduce other physics. We also found that the attractor behavior is not necessarily related to the specific heat, contrary to the claim by Hiscock and Weems.
△ Less
Submitted 23 October, 2019; v1 submitted 17 July, 2019;
originally announced July 2019.
-
No Violation of the Second Law in Extended Black Hole Thermodynamics
Authors:
Shi-Qian Hu,
Yen Chin Ong,
Don N. Page
Abstract:
Recently a number of papers have claimed that the horizon area - and thus the entropy - of near extremal black holes in anti-de Sitter spacetimes can be reduced by dropping particles into them. In this note we point out that this is a consequence of an underlying assumption that the energy of an infalling particle changes only the internal energy of the black hole, whereas a more physical assumpti…
▽ More
Recently a number of papers have claimed that the horizon area - and thus the entropy - of near extremal black holes in anti-de Sitter spacetimes can be reduced by dropping particles into them. In this note we point out that this is a consequence of an underlying assumption that the energy of an infalling particle changes only the internal energy of the black hole, whereas a more physical assumption would be that it changes the enthalpy (mass). In fact, under the latter choice, the second law of extended black hole thermodynamics is no longer violated.
△ Less
Submitted 13 June, 2019;
originally announced June 2019.
-
Holographic Principle and the Second Law in Stephani Cosmology Revisited
Authors:
Daniele Gregoris,
Yen Chin Ong,
Bin Wang
Abstract:
We show in a model-independent way that the inhomogeneous cosmological class II Stephani model fulfills both the the cosmological holographic principle, and that the entropy is increasing with time. By this we mean the result does not depend on any assumption on the time evolution of the scale factor, or on the matter content of the Universe, we also do not need to use the numerical values of the…
▽ More
We show in a model-independent way that the inhomogeneous cosmological class II Stephani model fulfills both the the cosmological holographic principle, and that the entropy is increasing with time. By this we mean the result does not depend on any assumption on the time evolution of the scale factor, or on the matter content of the Universe, we also do not need to use the numerical values of the cosmological parameters, which are inferred in the framework of the usual homogeneous Friedmann model. Therefore our analysis is not affected by the tension of the current estimates of the Hubble parameter, and does not rely on any model-dependent assumption of the entropy amount at the present epoch. Our analysis allows us to set an upper limit for the inhomogeneity parameter of the model, an upper bound for the size that this type of universe can reach during the time evolution, a lower bound for the entropy abundance, and an estimate of the present day value of the deceleration parameter.
△ Less
Submitted 24 February, 2020; v1 submitted 6 June, 2019;
originally announced June 2019.
-
CASS: Cross Adversarial Source Separation via Autoencoder
Authors:
Yong Zheng Ong,
Charles K. Chui,
Haizhao Yang
Abstract:
This paper introduces a cross adversarial source separation (CASS) framework via autoencoder, a new model that aims at separating an input signal consisting of a mixture of multiple components into individual components defined via adversarial learning and autoencoder fitting. CASS unifies popular generative networks like auto-encoders (AEs) and generative adversarial networks (GANs) in a single f…
▽ More
This paper introduces a cross adversarial source separation (CASS) framework via autoencoder, a new model that aims at separating an input signal consisting of a mixture of multiple components into individual components defined via adversarial learning and autoencoder fitting. CASS unifies popular generative networks like auto-encoders (AEs) and generative adversarial networks (GANs) in a single framework. The basic building block that filters the input signal and reconstructs the $i$-th target component is a pair of deep neural networks $\mathcal{EN}_i$ and $\mathcal{DE}_i$ as an encoder for dimension reduction and a decoder for component reconstruction, respectively. The decoder $\mathcal{DE}_i$ as a generator is enhanced by a discriminator network $\mathcal{D}_i$ that favors signal structures of the $i$-th component in the $i$-th given dataset as guidance through adversarial learning. In contrast with existing practices in AEs which trains each Auto-Encoder independently, or in GANs that share the same generator, we introduce cross adversarial training that emphasizes adversarial relation between any arbitrary network pairs $(\mathcal{DE}_i,\mathcal{D}_j)$, achieving state-of-the-art performance especially when target components share similar data structures.
△ Less
Submitted 23 May, 2019;
originally announced May 2019.
-
Curvature Invariants and Lower Dimensional Black Hole Horizons
Authors:
Daniele Gregoris,
Yen Chin Ong,
Bin Wang
Abstract:
It is known that the event horizon of a black hole can often be identified from the zeroes of some curvature invariants. The situation in lower dimensions has not been thoroughly clarified. In this work we investigate both (2+1)- and (1+1)-dimensional black hole horizons of static, stationary and dynamical black holes, identified with the zeroes of scalar polynomial and Cartan curvature invariants…
▽ More
It is known that the event horizon of a black hole can often be identified from the zeroes of some curvature invariants. The situation in lower dimensions has not been thoroughly clarified. In this work we investigate both (2+1)- and (1+1)-dimensional black hole horizons of static, stationary and dynamical black holes, identified with the zeroes of scalar polynomial and Cartan curvature invariants, with the purpose of discriminating the different roles played by the Weyl and Riemann curvature tensors. The situations and applicability of the methods are found to be quite different from that in 4-dimensional spacetime. The suitable Cartan invariants employed for detecting the horizon can be interpreted as a local extremum of the tidal force suggesting that the horizon of a black hole is a genuine special hypersurface within the full manifold, contrary to the usual claim that there is nothing special at the horizon, which is said to be a consequence of the equivalence principle.
△ Less
Submitted 17 November, 2019; v1 submitted 14 February, 2019;
originally announced February 2019.
-
General Black Hole Solutions in (2+1)-dimensions with a Scalar Field Non-Minimally Coupled to Gravity
Authors:
Zi-Yu Tang,
Yen Chin Ong,
Bin Wang,
Eleftherios Papantonopoulos
Abstract:
We discuss black hole solutions in (2+1)-dimensions with a scalar field non-minimally coupled to Einstein's gravity in the presence of a cosmological constant and a self-interacting scalar potential. Without specifying the form of the potential, we find a general solution of the field equations, which includes all the known asymptotically anti-de Sitter (AdS) black hole solutions in (2+1)-dimensio…
▽ More
We discuss black hole solutions in (2+1)-dimensions with a scalar field non-minimally coupled to Einstein's gravity in the presence of a cosmological constant and a self-interacting scalar potential. Without specifying the form of the potential, we find a general solution of the field equations, which includes all the known asymptotically anti-de Sitter (AdS) black hole solutions in (2+1)-dimensions as special cases once values of the coupling constants are chosen appropriately. In addition, we obtain numerically new black hole solutions and for some specific choices of the coupling constants we derive new exact AdS black hole solutions. We also discuss the possibility of obtaining asymptotically de Sitter black hole solutions with or without an electromagnetic field.
△ Less
Submitted 13 June, 2019; v1 submitted 22 January, 2019;
originally announced January 2019.
-
A Survey on Multi-output Learning
Authors:
Donna Xu,
Yaxin Shi,
Ivor W. Tsang,
Yew-Soon Ong,
Chen Gong,
Xiaobo Shen
Abstract:
Multi-output learning aims to simultaneously predict multiple outputs given an input. It is an important learning problem due to the pressing need for sophisticated decision making in real-world applications. Inspired by big data, the 4Vs characteristics of multi-output imposes a set of challenges to multi-output learning, in terms of the volume, velocity, variety and veracity of the outputs. Incr…
▽ More
Multi-output learning aims to simultaneously predict multiple outputs given an input. It is an important learning problem due to the pressing need for sophisticated decision making in real-world applications. Inspired by big data, the 4Vs characteristics of multi-output imposes a set of challenges to multi-output learning, in terms of the volume, velocity, variety and veracity of the outputs. Increasing number of works in the literature have been devoted to the study of multi-output learning and the development of novel approaches for addressing the challenges encountered. However, it lacks a comprehensive overview on different types of challenges of multi-output learning brought by the characteristics of the multiple outputs and the techniques proposed to overcome the challenges. This paper thus attempts to fill in this gap to provide a comprehensive review on this area. We first introduce different stages of the life cycle of the output labels. Then we present the paradigm on multi-output learning, including its myriads of output structures, definitions of its different sub-problems, model evaluation metrics and popular data repositories used in the study. Subsequently, we review a number of state-of-the-art multi-output learning methods, which are categorized based on the challenges.
△ Less
Submitted 13 October, 2019; v1 submitted 1 January, 2019;
originally announced January 2019.
-
AIR5: Five Pillars of Artificial Intelligence Research
Authors:
Yew-Soon Ong,
Abhishek Gupta
Abstract:
In this article, we provide and overview of what we consider to be some of the most pressing research questions facing the fields of artificial intelligence (AI) and computational intelligence (CI); with the latter focusing on algorithms that are inspired by various natural phenomena. We demarcate these questions using five unique Rs - namely, (i) rationalizability, (ii) resilience, (iii) reproduc…
▽ More
In this article, we provide and overview of what we consider to be some of the most pressing research questions facing the fields of artificial intelligence (AI) and computational intelligence (CI); with the latter focusing on algorithms that are inspired by various natural phenomena. We demarcate these questions using five unique Rs - namely, (i) rationalizability, (ii) resilience, (iii) reproducibility, (iv) realism, and (v) responsibility. Notably, just as air serves as the basic element of biological life, the term AIR5 - cumulatively referring to the five aforementioned Rs - is introduced herein to mark some of the basic elements of artificial life (supporting the sustained growth of AI and CI). A brief summary of each of the Rs is presented, highlighting their relevance as pillars of future research in this arena.
△ Less
Submitted 2 January, 2019; v1 submitted 30 December, 2018;
originally announced December 2018.
-
A Complementary Third Law for Black Hole Thermodynamics
Authors:
Yuan Yao,
Meng-Shi Hou,
Yen Chin Ong
Abstract:
There are some examples in the literature, in which despite the fact that the underlying theory or model does not impose a lower bound on the size of black holes, the final temperature under Hawking evaporation is nevertheless finite and nonzero. We show that under some loose conditions, the black hole is necessarily an effective remnant, in the sense that its evaporation time is infinite. That is…
▽ More
There are some examples in the literature, in which despite the fact that the underlying theory or model does not impose a lower bound on the size of black holes, the final temperature under Hawking evaporation is nevertheless finite and nonzero. We show that under some loose conditions, the black hole is necessarily an effective remnant, in the sense that its evaporation time is infinite. That is, the final state that there is nonzero finite temperature despite having no black hole remaining cannot be realized. We discuss the limitations, subtleties, and the implications of this result, which is reminiscent of the third law of black hole thermodynamics, but with the roles of temperature and size interchanged. We therefore refer to our result as the "complementary third law" for black hole thermodynamics.
△ Less
Submitted 22 June, 2019; v1 submitted 7 December, 2018;
originally announced December 2018.
-
Towards Safer Smart Contracts: A Sequence Learning Approach to Detecting Security Threats
Authors:
Wesley Joon-Wie Tann,
Xing Jie Han,
Sourav Sen Gupta,
Yew-Soon Ong
Abstract:
Symbolic analysis of security exploits in smart contracts has demonstrated to be valuable for analyzing predefined vulnerability properties. While some symbolic tools perform complex analysis steps, they require a predetermined invocation depth to search vulnerable execution paths, and the search time increases with depth. The number of contracts on blockchains like Ethereum has increased 176 fold…
▽ More
Symbolic analysis of security exploits in smart contracts has demonstrated to be valuable for analyzing predefined vulnerability properties. While some symbolic tools perform complex analysis steps, they require a predetermined invocation depth to search vulnerable execution paths, and the search time increases with depth. The number of contracts on blockchains like Ethereum has increased 176 fold since December 2015. If these symbolic tools fail to analyze the increasingly large number of contracts in time, entire classes of exploits could cause irrevocable damage. In this paper, we aim to have safer smart contracts against emerging threats. We propose the approach of sequential learning of smart contract weaknesses using machine learning---long-short term memory (LSTM)---that allows us to be able to detect new attack trends relatively quickly, leading to safer smart contracts. Our experimental studies on 620,000 smart contracts prove that our model can easily scale to analyze a massive amount of contracts; that is, the LSTM maintains near constant analysis time as contracts increase in complexity. In addition, our approach achieves $99\%$ test accuracy and correctly analyzes contracts that were false positive (FP) errors made by a symbolic tool.
△ Less
Submitted 7 June, 2019; v1 submitted 15 November, 2018;
originally announced November 2018.
-
Large-scale Heteroscedastic Regression via Gaussian Process
Authors:
Haitao Liu,
Yew-Soon Ong,
Jianfei Cai
Abstract:
Heteroscedastic regression considering the varying noises among observations has many applications in the fields like machine learning and statistics. Here we focus on the heteroscedastic Gaussian process (HGP) regression which integrates the latent function and the noise function together in a unified non-parametric Bayesian framework. Though showing remarkable performance, HGP suffers from the c…
▽ More
Heteroscedastic regression considering the varying noises among observations has many applications in the fields like machine learning and statistics. Here we focus on the heteroscedastic Gaussian process (HGP) regression which integrates the latent function and the noise function together in a unified non-parametric Bayesian framework. Though showing remarkable performance, HGP suffers from the cubic time complexity, which strictly limits its application to big data. To improve the scalability, we first develop a variational sparse inference algorithm, named VSHGP, to handle large-scale datasets. Furthermore, two variants are developed to improve the scalability and capability of VSHGP. The first is stochastic VSHGP (SVSHGP) which derives a factorized evidence lower bound, thus enhancing efficient stochastic variational inference. The second is distributed VSHGP (DVSHGP) which (i) follows the Bayesian committee machine formalism to distribute computations over multiple local VSHGP experts with many inducing points; and (ii) adopts hybrid parameters for experts to guard against over-fitting and capture local variety. The superiority of DVSHGP and SVSHGP as compared to existing scalable heteroscedastic/homoscedastic GPs is then extensively verified on various datasets.
△ Less
Submitted 21 January, 2020; v1 submitted 3 November, 2018;
originally announced November 2018.
-
Understanding and Comparing Scalable Gaussian Process Regression for Big Data
Authors:
Haitao Liu,
Jianfei Cai,
Yew-Soon Ong,
Yi Wang
Abstract:
As a non-parametric Bayesian model which produces informative predictive distribution, Gaussian process (GP) has been widely used in various fields, like regression, classification and optimization. The cubic complexity of standard GP however leads to poor scalability, which poses challenges in the era of big data. Hence, various scalable GPs have been developed in the literature in order to impro…
▽ More
As a non-parametric Bayesian model which produces informative predictive distribution, Gaussian process (GP) has been widely used in various fields, like regression, classification and optimization. The cubic complexity of standard GP however leads to poor scalability, which poses challenges in the era of big data. Hence, various scalable GPs have been developed in the literature in order to improve the scalability while retaining desirable prediction accuracy. This paper devotes to investigating the methodological characteristics and performance of representative global and local scalable GPs including sparse approximations and local aggregations from four main perspectives: scalability, capability, controllability and robustness. The numerical experiments on two toy examples and five real-world datasets with up to 250K points offer the following findings. In terms of scalability, most of the scalable GPs own a time complexity that is linear to the training size. In terms of capability, the sparse approximations capture the long-term spatial correlations, the local aggregations capture the local patterns but suffer from over-fitting in some scenarios. In terms of controllability, we could improve the performance of sparse approximations by simply increasing the inducing size. But this is not the case for local aggregations. In terms of robustness, local aggregations are robust to various initializations of hyperparameters due to the local attention mechanism. Finally, we highlight that the proper hybrid of global and local scalable GPs may be a promising way to improve both the model capability and scalability for big data.
△ Less
Submitted 3 November, 2018;
originally announced November 2018.
-
Ockham's Razor in Memetic Computing: Three Stage Optimal Memetic Exploration
Authors:
G. Iacca,
F. Neri,
E. Mininno,
Y. S. Ong,
M. H. Lim
Abstract:
Memetic Computing is a subject in computer science which considers complex structures as the combination of simple agents, memes, whose evolutionary interactions lead to intelligent structures capable of problem-solving. This paper focuses on Memetic Computing optimization algorithms and proposes a counter-tendency approach for algorithmic design. Research in the field tends to go in the direction…
▽ More
Memetic Computing is a subject in computer science which considers complex structures as the combination of simple agents, memes, whose evolutionary interactions lead to intelligent structures capable of problem-solving. This paper focuses on Memetic Computing optimization algorithms and proposes a counter-tendency approach for algorithmic design. Research in the field tends to go in the direction of improving existing algorithms by combining different methods or through the formulation of more complicated structures. Contrary to this trend, we instead focus on simplicity, proposing a structurally simple algorithm with emphasis on processing only one solution at a time. The proposed algorithm, namely Three Stage Optimal Memetic Exploration, is composed of three memes; the first stochastic and with a long search radius, the second stochastic and with a moderate search radius and the third deterministic and with a short search radius. The bottom-up combination of the three operators by means of a natural trial and error logic, generates a robust and efficient optimizer, capable of competing with modern complex and computationally expensive algorithms. This is suggestive of the fact that complexity in algorithmic structures can be unnecessary, if not detrimental, and that simple bottom-up approaches are likely to be competitive is here invoked as an extension to Memetic Computing basing on the philosophical concept of Ockham's Razor. An extensive experimental setup on various test problems and one digital signal processing application is presented. Numerical results show that the proposed approach, despite its simplicity and low computational cost displays a very good performance on several problems, and is competitive with sophisticated algorithms representing the-state-of-the-art in computational intelligence optimization.
△ Less
Submitted 5 October, 2018;
originally announced October 2018.
-
A Note on Smarr Relation and Coupling Constants
Authors:
Shi-Qian Hu,
Xiao-Mei Kuang,
Yen Chin Ong
Abstract:
The Smarr relation plays an important role in black hole thermodynamics. It is often claimed that the Smarr relation can be written down simply by observing the scaling behavior of the various thermodynamical quantities. We point out that this is not necessarily so in the presence of dimensionful coupling constants, and discuss the issues involving the identification of thermodynamical variables.
The Smarr relation plays an important role in black hole thermodynamics. It is often claimed that the Smarr relation can be written down simply by observing the scaling behavior of the various thermodynamical quantities. We point out that this is not necessarily so in the presence of dimensionful coupling constants, and discuss the issues involving the identification of thermodynamical variables.
△ Less
Submitted 13 May, 2019; v1 submitted 14 October, 2018;
originally announced October 2018.
-
An Automated System for Checking Lithography Friendliness of Standard Cells
Authors:
I-Lun Tseng,
Yongfu Li,
Valerio Perez,
Vikas Tripathi,
Zhao Chuan Lee,
Jonathan Yoong Seang Ong
Abstract:
At advanced process nodes, lithography weakpoints can exist in physical layouts of integrated circuit designs even if the layouts pass design rule checking (DRC). Existence of lithography weakpoints in a physical layout can cause manufacturability issues, which in turn can result in yield losses. In our experiments, we have found that specific standard cells have tendencies to create lithography w…
▽ More
At advanced process nodes, lithography weakpoints can exist in physical layouts of integrated circuit designs even if the layouts pass design rule checking (DRC). Existence of lithography weakpoints in a physical layout can cause manufacturability issues, which in turn can result in yield losses. In our experiments, we have found that specific standard cells have tendencies to create lithography weakpoints after their cell instances are placed and routed, even though each of these cells does not contain any lithography weakpoint before performing placement and routing. In addition, our experiments have shown that abutted standard cell instances can induce lithography weakpoints. Therefore, in this paper, we propose methodologies that are used in a novel software system for checking standard cells in terms of the aforementioned lithography issues. Specifically, the software system is capable of detecting and sorting problematic standard cells which are prone to generate lithography weakpoints, as well as reporting standard cells that should not be abutted. Methodologies proposed in this paper allow us to reduce or even prevent the generation of undesirable lithography weakpoints during the physical synthesis phase of designing a digital integrated circuit.
△ Less
Submitted 2 October, 2018;
originally announced October 2018.
-
Autonomous Deep Learning: Incremental Learning of Denoising Autoencoder for Evolving Data Streams
Authors:
Mahardhika Pratama,
Andri Ashfahani,
Yew Soon Ong,
Savitha Ramasamy,
Edwin Lughofer
Abstract:
The generative learning phase of Autoencoder (AE) and its successor Denosing Autoencoder (DAE) enhances the flexibility of data stream method in exploiting unlabelled samples. Nonetheless, the feasibility of DAE for data stream analytic deserves in-depth study because it characterizes a fixed network capacity which cannot adapt to rapidly changing environments. An automated construction of a denoi…
▽ More
The generative learning phase of Autoencoder (AE) and its successor Denosing Autoencoder (DAE) enhances the flexibility of data stream method in exploiting unlabelled samples. Nonetheless, the feasibility of DAE for data stream analytic deserves in-depth study because it characterizes a fixed network capacity which cannot adapt to rapidly changing environments. An automated construction of a denoising autoeconder, namely deep evolving denoising autoencoder (DEVDAN), is proposed in this paper. DEVDAN features an open structure both in the generative phase and in the discriminative phase where input features can be automatically added and discarded on the fly. A network significance (NS) method is formulated in this paper and is derived from the bias-variance concept. This method is capable of estimating the statistical contribution of the network structure and its hidden units which precursors an ideal state to add or prune input features. Furthermore, DEVDAN is free of the problem- specific threshold and works fully in the single-pass learning fashion. The efficacy of DEVDAN is numerically validated using nine non-stationary data stream problems simulated under the prequential test-then-train protocol where DEVDAN is capable of delivering an improvement of classification accuracy to recently published online learning works while having flexibility in the automatic extraction of robust input features and in adapting to rapidly changing environments.
△ Less
Submitted 24 September, 2018;
originally announced September 2018.
-
Generalized Uncertainty Principle and White Dwarfs Redux: How Cosmological Constant Protects Chandrasekhar Limit
Authors:
Yen Chin Ong,
Yuan Yao
Abstract:
It was previously argued that generalized uncertainty principle (GUP) with a positive parameter removes the Chandrasekhar limit. One way to restore the limit is by taking the GUP parameter to be negative. In this work we discuss an alternative method that achieves the same effect: by including a cosmological constant term in the GUP (known as "extended GUP" in the literature). We show that an arbi…
▽ More
It was previously argued that generalized uncertainty principle (GUP) with a positive parameter removes the Chandrasekhar limit. One way to restore the limit is by taking the GUP parameter to be negative. In this work we discuss an alternative method that achieves the same effect: by including a cosmological constant term in the GUP (known as "extended GUP" in the literature). We show that an arbitrarily small but nonzero cosmological constant can restore the Chandrasekhar limit. We also remark that if the extended GUP is correct, then the existence of white dwarfs gives an upper bound for the cosmological constant, which -- while still large compared to observation -- is approximately 86 orders of magnitude smaller than the natural scale.
△ Less
Submitted 22 December, 2018; v1 submitted 17 September, 2018;
originally announced September 2018.