-
Study of $η\rightarrowπ^+π^-l^+l^-$
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (637 additional authors not shown)
Abstract:
Using a sample of $(10087\pm44)\times10^{6}$ $J/ψ$ events accumulated with the BESIII detector, we analyze the decays $η\rightarrowπ^+π^-l^+l^-$ ($l=e$ or $μ$) via the process $J/ψ\rightarrowγη$. The branching fraction of $η\rightarrowπ^+π^-e^+e^-$ is measured to be $\mathcal{B}(η\rightarrowπ^+π^-e^+e^-)=(3.07\pm0.12_{\rm{stat.}}\pm0.19_{\rm{syst.}}) \times10^{-4}$. No signal events are observed f…
▽ More
Using a sample of $(10087\pm44)\times10^{6}$ $J/ψ$ events accumulated with the BESIII detector, we analyze the decays $η\rightarrowπ^+π^-l^+l^-$ ($l=e$ or $μ$) via the process $J/ψ\rightarrowγη$. The branching fraction of $η\rightarrowπ^+π^-e^+e^-$ is measured to be $\mathcal{B}(η\rightarrowπ^+π^-e^+e^-)=(3.07\pm0.12_{\rm{stat.}}\pm0.19_{\rm{syst.}}) \times10^{-4}$. No signal events are observed for the $η\rightarrowπ^{+}π^{-}μ^{+}μ^{-}$ decay, leading to an upper limit on the branching fraction of $\mathcal{B}(η\rightarrowπ^{+}π^{-}μ^{+}μ^{-})<4.0\times10^{-7}$ at the 90\% confidence level. Furthermore, the $CP$-violation asymmetry parameter is found to be $\mathcal{A}_{CP}(η\rightarrowπ^{+}π^{-}e^{+}e^{-})=(-4.04\pm4.69_{\rm{stat.}}\pm0.14_{\rm{syst.}})\%$, showing no evidence of $CP$-violation with current statistics. Additionally, we extract the transition form factor from the decay amplitude of $η\rightarrowπ^+π^-e^+e^-$. Finally, axion-like particles are searched for via the decay $η\rightarrowπ^+π^-a, a\rightarrow e^+e^-$, and upper limits on this branching fraction relative to that of $η\rightarrowπ^+π^-e^+e^-$ are presented as a function of the axion-like particle mass in the range $5-200\ \mathrm{MeV}/c^{2}$.
△ Less
Submitted 17 January, 2025;
originally announced January 2025.
-
Beyond the band edge: Unveiling high-mobility hot carriers in a two-dimensional conjugated coordination polymer
Authors:
Shuai Fu,
Xing Huang,
Guoquan Gao,
Petko St. Petkov,
Wenpei Gao,
Jianjun Zhang,
Lei Gao,
Heng Zhang,
Min Liu,
Mike Hambsch,
Wenjie Zhang,
Jiaxu Zhang,
Keming Li,
Ute Kaiser,
Stuart S. P. Parkin,
Stefan C. B. Mannsfeld,
Tong Zhu,
Hai I. Wang,
Zhiyong Wang,
Renhao Dong,
Xinliang Feng,
Mischa Bonn
Abstract:
Hot carriers, inheriting excess kinetic energy from high-energy photons, underpin numerous optoelectronic applications involving non-equilibrium transport processes. Current research on hot carriers has predominantly focused on inorganic materials, with little attention paid to organic-based systems due to their ultrafast energy relaxation and inefficient charge transport. Here, we overturn this p…
▽ More
Hot carriers, inheriting excess kinetic energy from high-energy photons, underpin numerous optoelectronic applications involving non-equilibrium transport processes. Current research on hot carriers has predominantly focused on inorganic materials, with little attention paid to organic-based systems due to their ultrafast energy relaxation and inefficient charge transport. Here, we overturn this paradigm by demonstrating highly mobile hot carriers in solution-processable, highly crystalline two-dimensional conjugated coordination polymer (2D c-CP) Cu3BHT (BHT = benzenehexathiol) films. Leveraging a suite of ultrafast spectroscopic and imaging techniques, we unravel the microscopic charge transport landscape in Cu3BHT films following non-equilibrium photoexcitation across temporal, spatial, and frequency domains, revealing two distinct high-mobility transport regimes. In the non-equilibrium transport regime, hot carriers achieve ultrahigh mobility of ~2,000 cm2 V-1 s-1, traversing grain boundaries up to 300 nm within a picosecond. In the quasi-equilibrium transport regime, free carriers exhibit Drude-type band-like transport with a remarkable mobility of ~400 cm2 V-1 s-1 and an intrinsic diffusion length exceeding 1 micrometer. These findings establish 2D c-CPs as versatile platforms for exploring high-mobility non-equilibrium transport, unlocking new opportunities for organic-based hot carrier applications.
△ Less
Submitted 15 January, 2025;
originally announced January 2025.
-
Search for the FCNC charmonium decay $J/ψ\to D^0 μ^+ μ^- + \text{c.c.}$
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Q. An,
Y. Bai,
O. Bakina,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere,
A. Brueggemann,
H. Cai
, et al. (680 additional authors not shown)
Abstract:
Based on a data sample of $(10087 \pm 44) \times 10^6$ $J/ψ$ events taken with the BESIII detector, we search for the flavor-changing neutral current charmonium decay $J/ψ\to D^{0} μ^{+} μ^{-} + \text{c.c.}$. No significant signal above the background is observed, and the upper limit on its branching fraction is set to be $\mathcal{B}(J/ψ\to D^{0}μ^{+}μ^{-} + \text{c.c.} ) < 1.1 \times 10^{-7}$ at…
▽ More
Based on a data sample of $(10087 \pm 44) \times 10^6$ $J/ψ$ events taken with the BESIII detector, we search for the flavor-changing neutral current charmonium decay $J/ψ\to D^{0} μ^{+} μ^{-} + \text{c.c.}$. No significant signal above the background is observed, and the upper limit on its branching fraction is set to be $\mathcal{B}(J/ψ\to D^{0}μ^{+}μ^{-} + \text{c.c.} ) < 1.1 \times 10^{-7}$ at the 90% confidence level. This marks the first search for a flavor-changing neutral current charmonium decay involving muons in the final state.
△ Less
Submitted 14 February, 2025; v1 submitted 14 January, 2025;
originally announced January 2025.
-
Towards A Hybrid Quantum Differential Privacy
Authors:
Baobao Song,
Shiva Raj Pokhrel,
Athanasios V. Vasilakos,
Tianqing Zhu,
Gang Li
Abstract:
Quantum computing offers unparalleled processing power but raises significant data privacy challenges. Quantum Differential Privacy (QDP) leverages inherent quantum noise to safeguard privacy, surpassing traditional DP. This paper develops comprehensive noise profiles, identifies noise types beneficial for QDP, and highlights teh need for practical implementations beyond theoretical models. Existi…
▽ More
Quantum computing offers unparalleled processing power but raises significant data privacy challenges. Quantum Differential Privacy (QDP) leverages inherent quantum noise to safeguard privacy, surpassing traditional DP. This paper develops comprehensive noise profiles, identifies noise types beneficial for QDP, and highlights teh need for practical implementations beyond theoretical models. Existing QDP mechanisms, limited to single noise sources, fail to reflect teh multi-source noise reality of quantum systems. We propose a resilient hybrid QDP mechanism utilizing channel and measurement noise, optimizing privacy budgets to balance privacy and utility. Additionally, we introduce Lifted Quantum Differential Privacy, offering enhanced randomness for improved privacy audits and quantum algorithm evaluation.
△ Less
Submitted 15 January, 2025; v1 submitted 14 January, 2025;
originally announced January 2025.
-
Understanding the Practice, Perception, and Challenge of Blind or Low Vision Students Learning through Accessible Technologies in Non-Inclusive 'Blind Colleges'
Authors:
Xiuqi Tommy Zhu,
Ziyue Qiu,
Ye Wei,
Jianhao Wang,
Yang Jiao
Abstract:
In developing and underdeveloped regions, many 'Blind Colleges' exclusively enroll individuals with Blindness or Vision Impairment (BLV) for higher education. While advancements in accessible technologies have facilitated BLV student integration into 'Integrated Colleges,' their implementation in 'Blind Colleges' remains uneven due to complex economic, social, and policy challenges. This study inv…
▽ More
In developing and underdeveloped regions, many 'Blind Colleges' exclusively enroll individuals with Blindness or Vision Impairment (BLV) for higher education. While advancements in accessible technologies have facilitated BLV student integration into 'Integrated Colleges,' their implementation in 'Blind Colleges' remains uneven due to complex economic, social, and policy challenges. This study investigates the practices, perceptions, and challenges of BLV students using accessible technologies in a Chinese 'Blind College' through a two-part empirical approach. Our findings demonstrate that tactile and digital technologies enhance access to education but face significant integration barriers. We emphasize the critical role of early education in addressing capability gaps, BLV students' aspirations for more inclusive educational environments, and the systemic obstacles within existing frameworks. We advocate for leveraging accessible technologies to transition 'Blind Colleges' into 'Integrated Colleges,' offering actionable insights for policymakers, designers, and educators. Finally, we outline future research directions on accessible technology innovation and its implications for BLV education in resource-constrained settings.
△ Less
Submitted 13 January, 2025;
originally announced January 2025.
-
Search for $K^0_S$ invisible decays
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (642 additional authors not shown)
Abstract:
Based on $(1.0087\pm0.0044)\times10^{10}$ $J/ψ$ events collected with the BESIII detector at the BEPCII $e^+e^-$ storage ring, we search for $K_{S}^{0}$ invisible decays via the $J/ψ\to φK_{S}^{0} K_{S}^{0}$ process. No significant signal is observed, and the upper limit of the branching fraction of these invisible decays is set at 8.4 $\times$ $10^{-4}$ at the 90\% confidence level. This is the f…
▽ More
Based on $(1.0087\pm0.0044)\times10^{10}$ $J/ψ$ events collected with the BESIII detector at the BEPCII $e^+e^-$ storage ring, we search for $K_{S}^{0}$ invisible decays via the $J/ψ\to φK_{S}^{0} K_{S}^{0}$ process. No significant signal is observed, and the upper limit of the branching fraction of these invisible decays is set at 8.4 $\times$ $10^{-4}$ at the 90\% confidence level. This is the first experimental search for $K^0_S$ invisible decays.
△ Less
Submitted 10 January, 2025;
originally announced January 2025.
-
ActMiner: Applying Causality Tracking and Increment Aligning for Graph-based Cyber Threat Hunting
Authors:
Mingjun Ma,
Tiantian Zhu,
Tieming Chen,
Shuang Li,
Jie Ying,
Chunlin Xiong,
Mingqi Lv,
Yan Chen
Abstract:
To defend against Advanced Persistent Threats on the endpoint, threat hunting employs security knowledge such as cyber threat intelligence to continuously analyze system audit logs through retrospective scanning, querying, or pattern matching, aiming to uncover attack patterns/graphs that traditional detection methods (e.g., recognition for Point of Interest) fail to capture. However, existing thr…
▽ More
To defend against Advanced Persistent Threats on the endpoint, threat hunting employs security knowledge such as cyber threat intelligence to continuously analyze system audit logs through retrospective scanning, querying, or pattern matching, aiming to uncover attack patterns/graphs that traditional detection methods (e.g., recognition for Point of Interest) fail to capture. However, existing threat hunting systems based on provenance graphs face challenges of high false negatives, high false positives, and low efficiency when confronted with diverse attack tactics and voluminous audit logs. To address these issues, we propose a system called Actminer, which constructs query graphs from descriptive relationships in cyber threat intelligence reports for precise threat hunting (i.e., graph alignment) on provenance graphs. First, we present a heuristic search strategy based on equivalent semantic transfer to reduce false negatives. Second, we establish a filtering mechanism based on causal relationships of attack behaviors to mitigate false positives. Finally, we design a tree structure to incrementally update the alignment results, significantly improving hunting efficiency. Evaluation on the DARPA Engagement dataset demonstrates that compared to the SOTA POIROT, Actminer reduces false positives by 39.1%, eliminates all false negatives, and effectively counters adversarial attacks.
△ Less
Submitted 10 January, 2025;
originally announced January 2025.
-
Search for the leptonic decay $D^{+}\to e^{+}ν_{e}$
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (646 additional authors not shown)
Abstract:
We search for the leptonic decay $D^+\to e^+ν_{e}$ using an $e^+e^-$ collision data sample with an integrated luminosity of 20.3~fb$^{-1}$ collected with the BESIII detector at the center-of-mass energy of 3.773~GeV. No significant signal is observed and an upper limit on the branching fraction of $D^+\to e^+ν_{e}$ is set as $9.7 \times 10^{-7}$, at the 90\% confidence level. Our upper limit is an…
▽ More
We search for the leptonic decay $D^+\to e^+ν_{e}$ using an $e^+e^-$ collision data sample with an integrated luminosity of 20.3~fb$^{-1}$ collected with the BESIII detector at the center-of-mass energy of 3.773~GeV. No significant signal is observed and an upper limit on the branching fraction of $D^+\to e^+ν_{e}$ is set as $9.7 \times 10^{-7}$, at the 90\% confidence level. Our upper limit is an order of magnitude smaller than the previous limit for this decay mode.
△ Less
Submitted 8 January, 2025;
originally announced January 2025.
-
Observation of the $W$-annihilation process $D_s^+ \to ωρ^+$ and measurement of $D_s^+ \to φρ^+$ in $D^+_s\to π^+π^+π^-π^0π^0$ decays
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (642 additional authors not shown)
Abstract:
We present the first amplitude analysis and branching fraction measurement of the decay $D^+_s\to π^+π^+π^-π^0π^0$, using $e^+e^-$ collision data collected with the BESIII detector at center-of-mass energies between 4.128 and 4.226 GeV corresponding to an integrated luminosity of 7.33 fb$^{-1}$, and report the first observation of the pure $W$-annihilation decay $D_s^+ \to ωρ^+$ with a branching f…
▽ More
We present the first amplitude analysis and branching fraction measurement of the decay $D^+_s\to π^+π^+π^-π^0π^0$, using $e^+e^-$ collision data collected with the BESIII detector at center-of-mass energies between 4.128 and 4.226 GeV corresponding to an integrated luminosity of 7.33 fb$^{-1}$, and report the first observation of the pure $W$-annihilation decay $D_s^+ \to ωρ^+$ with a branching fraction of $(0.99\pm0.08_{\rm stat}{\ ^{+0.05}_{-0.07}}_{\rm syst})\%$. %The absolute branching fraction is measured to be $(0.99\pm0.08_{\rm stat}\pm0.07_{\rm syst})\%$. In comparison to the low significance of the $\mathcal{D}$ wave in the decay $D_s^+ \to φρ^+$, the dominance of the $\mathcal{D}$ wave over the $\mathcal{S}$ and $\mathcal{P}$ waves, with a fraction of $(51.85\pm7.28_{\rm stat}{\ ^{+4.83}_{-7.90}}_{\rm syst})\%$ observed in the decay $D_s^+ \to ωρ^+$, provides crucial information for the``polarization puzzle", as well as for the understanding of charm meson decays. The branching fraction of $D^+_s\to π^+π^+π^-π^0π^0$ is measured to be ($4.41\pm0.15_{\rm stat}\pm0.13_{\rm syst}$)\%. Moreover, the branching fraction of $D_s^+ \to φρ^+$ is measured to be $(3.98\pm0.33_{\rm stat}{\ ^{+0.21}_{-0.19}}_{\rm syst})\%$, and the $R_φ= {\mathcal{B}(φ\toπ^+π^-π^0)}/{\mathcal{B}(φ\to K^+K^-)}$ is determined to be $(0.222\pm0.019_{\rm stat}{\ ^{+0.016}_{-0.016}}_{\rm syst}$), which is consistent with the previous measurement based on charm meson decays, but deviates from the results from $e^+e^-$ annihilation and $K$-$N$ scattering experiments by more than 3$σ$.
△ Less
Submitted 23 May, 2025; v1 submitted 8 January, 2025;
originally announced January 2025.
-
Study of the electromagnetic Dalitz decay $J/ψ\to e^+e^- π^0$
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (639 additional authors not shown)
Abstract:
We study the electromagnetic Dalitz decay $J/ψ\to e^+e^- π^0$ using $(10087 \pm 44) \times 10^6$ $J/ψ$ events collected by the \bes detector. The di-electron-invariant-mass dependent transition form factor of this decay is explored for the first time. A significant resonant structure corresponding to the $ρ/ω$ resonance is observed, which cannot be described by existing theoretical models, due to…
▽ More
We study the electromagnetic Dalitz decay $J/ψ\to e^+e^- π^0$ using $(10087 \pm 44) \times 10^6$ $J/ψ$ events collected by the \bes detector. The di-electron-invariant-mass dependent transition form factor of this decay is explored for the first time. A significant resonant structure corresponding to the $ρ/ω$ resonance is observed, which cannot be described by existing theoretical models, due to contributions from the isospin-conserving $J/ψ\to ρπ^0$ and isospin-volating $J/ψ\to ωπ^0$ decays. The observed $ρ$--$ω$ interference is consistent with that of the pion form factor but features a relatively narrow $ρ$ peak. By taking into account the contribution of this resonant structure, the branching fraction of $J/ψ\to e^+e^- π^0$ in the full $e^+e^-$ invariant mass spectrum range is also measured for the first time to be $(8.06 \pm 0.31 (\rm{stat}) \pm 0.38 (\rm{syst}))\times 10^{-7}$, which is two times larger than the prediction of the Vector Meson Dominance model due to the observed resonant contribution of $ρ/ω$ resonances.
△ Less
Submitted 8 January, 2025;
originally announced January 2025.
-
AFed: Algorithmic Fair Federated Learning
Authors:
Huiqiang Chen,
Tianqing Zhu,
Wanlei Zhou,
Wei Zhao
Abstract:
Federated Learning (FL) has gained significant attention as it facilitates collaborative machine learning among multiple clients without centralizing their data on a server. FL ensures the privacy of participating clients by locally storing their data, which creates new challenges in fairness. Traditional debiasing methods assume centralized access to sensitive information, rendering them impracti…
▽ More
Federated Learning (FL) has gained significant attention as it facilitates collaborative machine learning among multiple clients without centralizing their data on a server. FL ensures the privacy of participating clients by locally storing their data, which creates new challenges in fairness. Traditional debiasing methods assume centralized access to sensitive information, rendering them impractical for the FL setting. Additionally, FL is more susceptible to fairness issues than centralized machine learning due to the diverse client data sources that may be associated with group information. Therefore, training a fair model in FL without access to client local data is important and challenging. This paper presents AFed, a straightforward yet effective framework for promoting group fairness in FL. The core idea is to circumvent restricted data access by learning the global data distribution. This paper proposes two approaches: AFed-G, which uses a conditional generator trained on the server side, and AFed-GAN, which improves upon AFed-G by training a conditional GAN on the client side. We augment the client data with the generated samples to help remove bias. Our theoretical analysis justifies the proposed methods, and empirical results on multiple real-world datasets demonstrate a substantial improvement in AFed over several baselines.
△ Less
Submitted 5 January, 2025;
originally announced January 2025.
-
Observation of $ψ(3686) \to K^{-}Λ(1520)\barΞ^{+} + c.c.$
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (642 additional authors not shown)
Abstract:
Based on $(2712.4 \pm 14.3)\times 10^6$ $ψ(3686)$ events collected at the BESIII detector operating at the BEPCII collider, we present the first observation of the decay $ψ(3686) \to K^{-}Λ(1520)\barΞ^{+} + c.c.$. The product branching fraction ${\cal B}[ψ(3686) \to K^{-}Λ(1520)\barΞ^{+} + c.c.] \times {\cal B}[Λ(1520) \to pK^{-}]$ is measured to be $(9.5 \pm 0.8 \pm 1.1) \times 10^{-7}$, where th…
▽ More
Based on $(2712.4 \pm 14.3)\times 10^6$ $ψ(3686)$ events collected at the BESIII detector operating at the BEPCII collider, we present the first observation of the decay $ψ(3686) \to K^{-}Λ(1520)\barΞ^{+} + c.c.$. The product branching fraction ${\cal B}[ψ(3686) \to K^{-}Λ(1520)\barΞ^{+} + c.c.] \times {\cal B}[Λ(1520) \to pK^{-}]$ is measured to be $(9.5 \pm 0.8 \pm 1.1) \times 10^{-7}$, where the first uncertainty is statistical and the second systematic.
△ Less
Submitted 5 January, 2025;
originally announced January 2025.
-
Search for $η_c(2S)\to p\bar{p}K^+K^-$ and measurement of $χ_{cJ}\to p\bar{p}K^+K^-$ in $ψ(3686)$ radiative decays
Authors:
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere,
A. Brueggemann,
H. Cai
, et al. (639 additional authors not shown)
Abstract:
A search for $η_c(2S)\to p\bar{p}K^+K^-$, together with measurement of branching fractions of $χ_{cJ(J=0,1,2)}\to p\bar{p}K^+K^-$ in the $ψ(3686) \to γη_c(2S)$ and the $ψ(3686) \to γχ_{cJ}$ radiative decays, is performed with $(2712.4\pm14.3)\times 10^6$ $ψ(3686)$ events collected with the BESIII detector at the BEPCII collider. An evidence for $η_c(2S)\to p\bar{p}K^+K^-$ is found, with a signific…
▽ More
A search for $η_c(2S)\to p\bar{p}K^+K^-$, together with measurement of branching fractions of $χ_{cJ(J=0,1,2)}\to p\bar{p}K^+K^-$ in the $ψ(3686) \to γη_c(2S)$ and the $ψ(3686) \to γχ_{cJ}$ radiative decays, is performed with $(2712.4\pm14.3)\times 10^6$ $ψ(3686)$ events collected with the BESIII detector at the BEPCII collider. An evidence for $η_c(2S)\to p\bar{p}K^+K^-$ is found, with a significance of $3.3σ$. The product branching fraction of $\mathcal{B}[ψ(3686)\toγη_c(2S)]\cdot\mathcal{B}[η_c(2S)\to p\bar{p}K^+K^-]$ is determined to be $(1.98\mkern 2mu\pm\mkern 2mu0.41_{\text{stat.}}\mkern 2mu\pm\mkern 2mu0.99_{\text{syst.}})\times 10^{-7}$. The product branching fractions of $\mathcal{B}[ψ(3686)\toγχ_{cJ}]\cdot\mathcal{B}[χ_{cJ}\to p\bar{p}K^+K^-]$ are measured to be $(2.49\mkern 2mu\pm\mkern 2mu 0.03_{\text{stat.}}\mkern 2mu\pm\mkern 2mu 0.15_{\text{syst.}})\times 10^{-5}$, $(1.83\mkern 2mu \pm\mkern 2mu 0.02_{\text{stat.}}\mkern 2mu \pm\mkern 2mu 0.11_{\text{syst.}})\times 10^{-5}$, and $(2.43\mkern 2mu\pm\mkern 2mu 0.02_{\text{stat.}}\mkern 2mu\pm\mkern 2mu 0.15_{\text{syst.}})\times 10^{-5}$, for $J=0,\ 1$, and 2, respectively.
△ Less
Submitted 3 January, 2025;
originally announced January 2025.
-
Unifying Specialized Visual Encoders for Video Language Models
Authors:
Jihoon Chung,
Tyler Zhu,
Max Gonzalez Saez-Diez,
Juan Carlos Niebles,
Honglu Zhou,
Olga Russakovsky
Abstract:
The recent advent of Large Language Models (LLMs) has ushered sophisticated reasoning capabilities into the realm of video through Video Large Language Models (VideoLLMs). However, VideoLLMs currently rely on a single vision encoder for all of their visual processing, which limits the amount and type of visual information that can be conveyed to the LLM. Our method, MERV, Multi-Encoder Representat…
▽ More
The recent advent of Large Language Models (LLMs) has ushered sophisticated reasoning capabilities into the realm of video through Video Large Language Models (VideoLLMs). However, VideoLLMs currently rely on a single vision encoder for all of their visual processing, which limits the amount and type of visual information that can be conveyed to the LLM. Our method, MERV, Multi-Encoder Representation of Videos, instead leverages multiple frozen visual encoders to create a unified representation of a video, providing the VideoLLM with a comprehensive set of specialized visual knowledge. Spatio-temporally aligning the features from each encoder allows us to tackle a wider range of open-ended and multiple-choice video understanding questions and outperform prior state-of-the-art works. MERV is up to 3.7% better in accuracy than Video-LLaVA across the standard suite video understanding benchmarks, while also having a better Video-ChatGPT score. We also improve upon SeViLA, the previous best on zero-shot Perception Test accuracy, by 2.2%. MERV introduces minimal extra parameters and trains faster than equivalent single-encoder methods while parallelizing the visual processing. Finally, we provide qualitative evidence that MERV successfully captures domain knowledge from each of its encoders. Our results offer promising directions in utilizing multiple vision encoders for comprehensive video understanding.
△ Less
Submitted 2 January, 2025;
originally announced January 2025.
-
Analysis of Security in OS-Level Virtualization
Authors:
Krishna Sai Ketha,
Guanqun Song,
Ting Zhu
Abstract:
Virtualization is a technique that allows multiple instances typically running different guest operating systems on top of single physical hardware. A hypervisor, a layer of software running on top of the host operating system, typically runs and manages these different guest operating systems. Rather than to run different services on different servers for reliability and security reasons, compani…
▽ More
Virtualization is a technique that allows multiple instances typically running different guest operating systems on top of single physical hardware. A hypervisor, a layer of software running on top of the host operating system, typically runs and manages these different guest operating systems. Rather than to run different services on different servers for reliability and security reasons, companies started to employ virtualization over their servers to run these services within a single server. This approach proves beneficial to the companies as it provides much better reliability, stronger isolation, improved security and resource utilization compared to running services on multiple servers. Although hypervisor based virtualization offers better resource utilization and stronger isolation, it also suffers from high overhead as the host operating system has to maintain different guest operating systems.
To tackle this issue, another form of virtualization known as Operating System-level virtualization has emerged. This virtualization provides light-weight, minimal and efficient virtualization, as the different instances are run on top of the same host operating system, sharing the resources of the host operating system. But due to instances sharing the same host operating system affects the isolation of the instances. In this paper, we will first establish the basic concepts of virtualization and point out the differences between the hyper-visor based virtualization and operating system-level virtualization. Next, we will discuss the container creation life-cycle which helps in forming a container threat model for the container systems, which allows to map different potential attack vectors within these systems. Finally, we will discuss a case study, which further looks at isolation provided by the containers.
△ Less
Submitted 2 January, 2025;
originally announced January 2025.
-
From Interaction to Attitude: Exploring the Impact of Human-AI Cooperation on Mental Illness Stigma
Authors:
Tianqi Song,
Jack Jamieson,
Tianwen Zhu,
Naomi Yamashita,
Yi-Chieh Lee
Abstract:
AI conversational agents have demonstrated efficacy in social contact interventions for stigma reduction at a low cost. However, the underlying mechanisms of how interaction designs contribute to these effects remain unclear. This study investigates how participating in three human-chatbot interactions affects attitudes toward mental illness. We developed three chatbots capable of engaging in eith…
▽ More
AI conversational agents have demonstrated efficacy in social contact interventions for stigma reduction at a low cost. However, the underlying mechanisms of how interaction designs contribute to these effects remain unclear. This study investigates how participating in three human-chatbot interactions affects attitudes toward mental illness. We developed three chatbots capable of engaging in either one-way information dissemination from chatbot to a human or two-way cooperation where the chatbot and a human exchange thoughts and work together on a cooperation task. We then conducted a two-week mixed-methods study to investigate variations over time and across different group memberships. The results indicate that human-AI cooperation can effectively reduce stigma toward individuals with mental illness by fostering relationships between humans and AI through social contact. Additionally, compared to a one-way chatbot, interacting with a cooperative chatbot led participants to perceive it as more competent and likable, promoting greater empathy during the conversation. However, despite the success in reducing stigma, inconsistencies between the chatbot's role and the mental health context raised concerns. We discuss the implications of our findings for human-chatbot interaction designs aimed at changing human attitudes.
△ Less
Submitted 2 January, 2025;
originally announced January 2025.
-
DEHYDRATOR: Enhancing Provenance Graph Storage via Hierarchical Encoding and Sequence Generation
Authors:
Jie Ying,
Tiantian Zhu,
Mingqi Lv,
Tieming Chen
Abstract:
As the scope and impact of cyber threats have expanded, analysts utilize audit logs to hunt threats and investigate attacks. The provenance graphs constructed from kernel logs are increasingly considered as an ideal data source due to their powerful semantic expression and attack historic correlation ability. However, storing provenance graphs with traditional databases faces the challenge of high…
▽ More
As the scope and impact of cyber threats have expanded, analysts utilize audit logs to hunt threats and investigate attacks. The provenance graphs constructed from kernel logs are increasingly considered as an ideal data source due to their powerful semantic expression and attack historic correlation ability. However, storing provenance graphs with traditional databases faces the challenge of high storage overhead, given the high frequency of kernel events and the persistence of attacks. To address this, we propose Dehydrator, an efficient provenance graph storage system. For the logs generated by auditing frameworks, Dehydrator uses field mapping encoding to filter field-level redundancy, hierarchical encoding to filter structure-level redundancy, and finally learns a deep neural network to support batch querying. We have conducted evaluations on seven datasets totaling over one billion log entries. Experimental results show that Dehydrator reduces the storage space by 84.55%. Dehydrator is 7.36 times more efficient than PostgreSQL, 7.16 times than Neo4j, and 16.17 times than Leonard (the work most closely related to Dehydrator, published at Usenix Security'23).
△ Less
Submitted 31 December, 2024;
originally announced January 2025.
-
METANOIA: A Lifelong Intrusion Detection and Investigation System for Mitigating Concept Drift
Authors:
Jie Ying,
Tiantian Zhu,
Aohan Zheng,
Tieming Chen,
Mingqi Lv,
Yan Chen
Abstract:
As Advanced Persistent Threat (APT) complexity increases, provenance data is increasingly used for detection. Anomaly-based systems are gaining attention due to their attack-knowledge-agnostic nature and ability to counter zero-day vulnerabilities. However, traditional detection paradigms, which train on offline, limited-size data, often overlook concept drift - unpredictable changes in streaming…
▽ More
As Advanced Persistent Threat (APT) complexity increases, provenance data is increasingly used for detection. Anomaly-based systems are gaining attention due to their attack-knowledge-agnostic nature and ability to counter zero-day vulnerabilities. However, traditional detection paradigms, which train on offline, limited-size data, often overlook concept drift - unpredictable changes in streaming data distribution over time. This leads to high false positive rates. We propose incremental learning as a new paradigm to mitigate this issue. However, we identify FOUR CHALLENGES while integrating incremental learning as a new paradigm. First, the long-running incremental system must combat catastrophic forgetting (C1) and avoid learning malicious behaviors (C2). Then, the system needs to achieve precise alerts (C3) and reconstruct attack scenarios (C4). We present METANOIA, the first lifelong detection system that mitigates the high false positives due to concept drift. It connects pseudo edges to combat catastrophic forgetting, transfers suspicious states to avoid learning malicious behaviors, filters nodes at the path-level to achieve precise alerts, and constructs mini-graphs to reconstruct attack scenarios. Using state-of-the-art benchmarks, we demonstrate that METANOIA improves precision performance at the window-level, graph-level, and node-level by 30%, 54%, and 29%, respectively, compared to previous approaches.
△ Less
Submitted 31 December, 2024;
originally announced January 2025.
-
Optimizing Global Quantum Communication via Satellite Constellations
Authors:
Yichen Gao,
Guanqun Song,
Ting Zhu
Abstract:
In this paper, we investigate the optimization of global quantum communication through satellite constellations. We address the challenge of quantum key distribution (QKD) across vast distances and the limitations posed by terrestrial fiber-optic networks. Our research focuses on the configuration of satellite constellations to improve QKD between ground stations and the application of innovative…
▽ More
In this paper, we investigate the optimization of global quantum communication through satellite constellations. We address the challenge of quantum key distribution (QKD) across vast distances and the limitations posed by terrestrial fiber-optic networks. Our research focuses on the configuration of satellite constellations to improve QKD between ground stations and the application of innovative orbital mechanics to reduce latency in quantum information transfer. We introduce a novel approach using quantum relay satellites in Molniya orbits, enhancing communication efficiency and coverage. The use of these high eccentricity orbits allows us to extend the operational presence of satellites over targeted hemispheres, thus maximizing the quantum network's reach. Our findings provide a strategic framework for deploying quantum satellites and relay systems to achieve a robust and efficient global quantum communication network.
△ Less
Submitted 31 December, 2024;
originally announced January 2025.
-
Energy Efficient LoRaWAN in LEO Satellites
Authors:
Muskan Shergill,
Zach Thompson,
Guanqun Song,
Ting Zhu
Abstract:
LPWAN service's inexpensive cost and long range capabilities make it a promising addition and countless satellite companies have started taking advantage of this technology to connect IoT users across the globe. However, LEO satellites have the unique challenge of using rechargeable batteries and green solar energy to power their components. LPWAN technology is not optimized to maximize battery li…
▽ More
LPWAN service's inexpensive cost and long range capabilities make it a promising addition and countless satellite companies have started taking advantage of this technology to connect IoT users across the globe. However, LEO satellites have the unique challenge of using rechargeable batteries and green solar energy to power their components. LPWAN technology is not optimized to maximize battery lifespan of network nodes. By incorporating a MAC protocol that maximizes node the battery lifespan across the network, we can reduce battery waste and usage of scarce Earth resources to develop satellite batteries.
△ Less
Submitted 29 December, 2024;
originally announced December 2024.
-
Environmental and Economic Impact of I/O Device Obsolescence
Authors:
Patrick Gould,
Guanqun Song,
Ting Zhu
Abstract:
This paper analyzes the proportion of Input/output devices made obsolete by changes in technology generations. This obsolescence may be by new software/hardware generations rendering otherwise functional devices unusable. Concluding with brief analysis on the economic and environmental impacts of the e-waste produced.
This paper analyzes the proportion of Input/output devices made obsolete by changes in technology generations. This obsolescence may be by new software/hardware generations rendering otherwise functional devices unusable. Concluding with brief analysis on the economic and environmental impacts of the e-waste produced.
△ Less
Submitted 29 December, 2024;
originally announced December 2024.
-
Measurement of Born cross section of $e^+e^-\toΣ^0\barΣ^0$ at $\sqrt{s} = 3.50-4.95$ GeV
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere,
A. Brueggemann
, et al. (649 additional authors not shown)
Abstract:
Using $e^+e^-$ collision data collected with the BESIII detector at the BEPCII collider at thirty-two center-of-mass energies from 3.50 to 4.95 GeV, corresponding to an integrated luminosity of 25 $\rm{fb^{-1}}$, we measure the Born cross section of the $e^+e^-\toΣ^0\barΣ^0$ reaction and the effective form factor. No significant charmonium(-like) state, i.e., $ψ(3770)$, $ψ(4040)$, $ψ(4160)$,…
▽ More
Using $e^+e^-$ collision data collected with the BESIII detector at the BEPCII collider at thirty-two center-of-mass energies from 3.50 to 4.95 GeV, corresponding to an integrated luminosity of 25 $\rm{fb^{-1}}$, we measure the Born cross section of the $e^+e^-\toΣ^0\barΣ^0$ reaction and the effective form factor. No significant charmonium(-like) state, i.e., $ψ(3770)$, $ψ(4040)$, $ψ(4160)$, $ψ(4230)$, $ψ(4360)$, $ψ(4415)$, or $ψ(4660)$, decaying into the $Σ^0\barΣ^0$ final state is observed by fitting the $e^+e^- \to Σ^0\barΣ^0$ dressed cross section. The upper limits for the product of the branching fraction and the electronic partial width at the 90% confidence level are provided for each assumed charmonium(-like) state. In addition, the ratios of the Born cross section and the effective form factor between the $e^+e^-\toΣ^0\barΣ^0$ and the $e^+e^-\toΣ^+\barΣ^-$ reactions are provided, which can be used to validate the prediction of the vector meson dominance model.
△ Less
Submitted 14 March, 2025; v1 submitted 28 December, 2024;
originally announced December 2024.
-
Search for the double Dalitz decays $η/η' \to e^+e^-μ^+μ^-$ and $η' \to μ^+μ^-μ^+μ^-$
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere,
A. Brueggemann
, et al. (648 additional authors not shown)
Abstract:
Using a data sample of $(10087 \pm 44) \times {10^{6}}$ $J/ψ$ events collected with the BESIII detector, we search for the decays $η/η'\to e^+e^-μ^+μ^-$ and $η' \to μ^+μ^-μ^+μ^-$ via the radiative decays $J/ψ\toγη$/$γη'$. No excess of events over expected background is observed for any of the decays of interest. At 90% confidence level, we report the first upper limits on the branching fractions o…
▽ More
Using a data sample of $(10087 \pm 44) \times {10^{6}}$ $J/ψ$ events collected with the BESIII detector, we search for the decays $η/η'\to e^+e^-μ^+μ^-$ and $η' \to μ^+μ^-μ^+μ^-$ via the radiative decays $J/ψ\toγη$/$γη'$. No excess of events over expected background is observed for any of the decays of interest. At 90% confidence level, we report the first upper limits on the branching fractions of $η' \to e^{+}e^{-}μ^{+}μ^{-}$ and $η' \to μ^{+}μ^{-}μ^{+}μ^{-}$ to be $ 1.75 \times {10^{-6}}$ and $5.28 \times {10^{-7}}$, respectively. In addition, we set an upper limit on the branching fraction of $η\to e^{+}e^{-}μ^{+}μ^{-}$ to be $6.88 \times {10^{-6}}$, which improves the previous result by about two orders of magnitude.
△ Less
Submitted 27 December, 2024;
originally announced December 2024.
-
The distribution of powers of primes related to the Frobenius problem
Authors:
Enxun Huang,
Tengyou Zhu
Abstract:
Let $1<c<d$ be two relatively prime integers, $g_{c,d}=cd-c-d$ and $\mathbb{P}$ is the set of primes. For any given integer $k \geq 1$, we prove that $$\#\left\{p^k\le g_{c,d}:p\in \mathbb{P}, ~p^k=cx+dy,~x,y\in \mathbb{Z}_{\geqslant0} \right\}\sim \frac{k}{k+1}\frac{g^{1/k}}{\log g} \quad (\text{as}~c\rightarrow\infty),$$ which gives an extension of a recent result of Ding, Zhai and Zhao.
Let $1<c<d$ be two relatively prime integers, $g_{c,d}=cd-c-d$ and $\mathbb{P}$ is the set of primes. For any given integer $k \geq 1$, we prove that $$\#\left\{p^k\le g_{c,d}:p\in \mathbb{P}, ~p^k=cx+dy,~x,y\in \mathbb{Z}_{\geqslant0} \right\}\sim \frac{k}{k+1}\frac{g^{1/k}}{\log g} \quad (\text{as}~c\rightarrow\infty),$$ which gives an extension of a recent result of Ding, Zhai and Zhao.
△ Less
Submitted 25 December, 2024;
originally announced December 2024.
-
Quality Assurance and Quality Control of the $26~\text{m}^2$ SiPM production for the DarkSide-20k dark matter experiment
Authors:
F. Acerbi,
P. Adhikari,
P. Agnes,
I. Ahmad,
S. Albergo,
I. F. Albuquerque,
T. Alexander,
A. K. Alton,
P. Amaudruz,
M. Angiolilli. E. Aprile,
M. Atzori Corona,
D. J. Auty,
M. Ave,
I. C. Avetisov,
O. Azzolini,
H. O. Back,
Z. Balmforth,
A. Barrado Olmedo,
P. Barrillon,
G. Batignani,
P. Bhowmick,
M. Bloem,
S. Blua,
V. Bocci,
W. Bonivento
, et al. (267 additional authors not shown)
Abstract:
DarkSide-20k is a novel liquid argon dark matter detector currently under construction at the Laboratori Nazionali del Gran Sasso (LNGS) of the Istituto Nazionale di Fisica Nucleare (INFN) that will push the sensitivity for Weakly Interacting Massive Particle (WIMP) detection into the neutrino fog. The core of the apparatus is a dual-phase Time Projection Chamber (TPC), filled with \SI{50} {tonnes…
▽ More
DarkSide-20k is a novel liquid argon dark matter detector currently under construction at the Laboratori Nazionali del Gran Sasso (LNGS) of the Istituto Nazionale di Fisica Nucleare (INFN) that will push the sensitivity for Weakly Interacting Massive Particle (WIMP) detection into the neutrino fog. The core of the apparatus is a dual-phase Time Projection Chamber (TPC), filled with \SI{50} {tonnes} of low radioactivity underground argon (UAr) acting as the WIMP target. NUV-HD-cryo Silicon Photomultipliers (SiPM)s designed by Fondazione Bruno Kessler (FBK) (Trento, Italy) were selected as the photon sensors covering two $10.5~\text{m}^2$ Optical Planes, one at each end of the TPC, and a total of $5~\text{m}^2$ photosensitive surface for the liquid argon veto detectors. This paper describes the Quality Assurance and Quality Control (QA/QC) plan and procedures accompanying the production of FBK~NUV-HD-cryo SiPM wafers manufactured by LFoundry s.r.l. (Avezzano, AQ, Italy). SiPM characteristics are measured at 77~K at the wafer level with a custom-designed probe station. As of March~2025, 1314 of the 1400 production wafers (94% of the total) for DarkSide-20k were tested. The wafer yield is $93.2\pm2.5$\%, which exceeds the 80\% specification defined in the original DarkSide-20k production plan.
△ Less
Submitted 19 March, 2025; v1 submitted 25 December, 2024;
originally announced December 2024.
-
SAFLITE: Fuzzing Autonomous Systems via Large Language Models
Authors:
Taohong Zhu,
Adrians Skapars,
Fardeen Mackenzie,
Declan Kehoe,
William Newton,
Suzanne Embury,
Youcheng Sun
Abstract:
Fuzz testing effectively uncovers software vulnerabilities; however, it faces challenges with Autonomous Systems (AS) due to their vast search spaces and complex state spaces, which reflect the unpredictability and complexity of real-world environments. This paper presents a universal framework aimed at improving the efficiency of fuzz testing for AS. At its core is SaFliTe, a predictive component…
▽ More
Fuzz testing effectively uncovers software vulnerabilities; however, it faces challenges with Autonomous Systems (AS) due to their vast search spaces and complex state spaces, which reflect the unpredictability and complexity of real-world environments. This paper presents a universal framework aimed at improving the efficiency of fuzz testing for AS. At its core is SaFliTe, a predictive component that evaluates whether a test case meets predefined safety criteria. By leveraging the large language model (LLM) with information about the test objective and the AS state, SaFliTe assesses the relevance of each test case. We evaluated SaFliTe by instantiating it with various LLMs, including GPT-3.5, Mistral-7B, and Llama2-7B, and integrating it into four fuzz testing tools: PGFuzz, DeepHyperion-UAV, CAMBA, and TUMB. These tools are designed specifically for testing autonomous drone control systems, such as ArduPilot, PX4, and PX4-Avoidance. The experimental results demonstrate that, compared to PGFuzz, SaFliTe increased the likelihood of selecting operations that triggered bug occurrences in each fuzzing iteration by an average of 93.1\%. Additionally, after integrating SaFliTe, the ability of DeepHyperion-UAV, CAMBA, and TUMB to generate test cases that caused system violations increased by 234.5\%, 33.3\%, and 17.8\%, respectively. The benchmark for this evaluation was sourced from a UAV Testing Competition.
△ Less
Submitted 24 December, 2024;
originally announced December 2024.
-
Measurement of the Branching Fraction for the Decay $χ_{cJ}\to p\bar{p}ηπ^{0}$
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (642 additional authors not shown)
Abstract:
Using $(2712.4\pm 14.3)\times10^6 ψ(3686)$ events collected by the BESIII detector operating at the BEPCII collider, we present the first observations of the decays $χ_{cJ}(J=0,1,2)\to p\bar{p}ηπ^{0}$. Their decay branching fractions are determined to be ${\cal B}(χ_{c0}\to p\bar{p}ηπ^{0})=({2.41 \pm 0.07 \pm 0.19}) \times 10^{-4}$,…
▽ More
Using $(2712.4\pm 14.3)\times10^6 ψ(3686)$ events collected by the BESIII detector operating at the BEPCII collider, we present the first observations of the decays $χ_{cJ}(J=0,1,2)\to p\bar{p}ηπ^{0}$. Their decay branching fractions are determined to be ${\cal B}(χ_{c0}\to p\bar{p}ηπ^{0})=({2.41 \pm 0.07 \pm 0.19}) \times 10^{-4}$, ${\cal B}(χ_{c1}\to p\bar{p}ηπ^{0})=({1.95 \pm 0.05 \pm 0.12}) \times 10^{-4}$, and ${\cal B}(χ_{c2}\to p\bar{p}ηπ^{0})=({1.31 \pm 0.05 \pm 0.08}) \times 10^{-4}$, where the first uncertainties are statistical and the second systematic.
△ Less
Submitted 18 December, 2024; v1 submitted 18 December, 2024;
originally announced December 2024.
-
AnchorInv: Few-Shot Class-Incremental Learning of Physiological Signals via Representation Space Guided Inversion
Authors:
Chenqi Li,
Boyan Gao,
Gabriel Jones,
Timothy Denison,
Tingting Zhu
Abstract:
Deep learning models have demonstrated exceptional performance in a variety of real-world applications. These successes are often attributed to strong base models that can generalize to novel tasks with limited supporting data while keeping prior knowledge intact. However, these impressive results are based on the availability of a large amount of high-quality data, which is often lacking in speci…
▽ More
Deep learning models have demonstrated exceptional performance in a variety of real-world applications. These successes are often attributed to strong base models that can generalize to novel tasks with limited supporting data while keeping prior knowledge intact. However, these impressive results are based on the availability of a large amount of high-quality data, which is often lacking in specialized biomedical applications. In such fields, models are usually developed with limited data that arrive incrementally with novel categories. This requires the model to adapt to new information while preserving existing knowledge. Few-Shot Class-Incremental Learning (FSCIL) methods offer a promising approach to addressing these challenges, but they also depend on strong base models that face the same aforementioned limitations. To overcome these constraints, we propose AnchorInv following the straightforward and efficient buffer-replay strategy. Instead of selecting and storing raw data, AnchorInv generates synthetic samples guided by anchor points in the feature space. This approach protects privacy and regularizes the model for adaptation. When evaluated on three public physiological time series datasets, AnchorInv exhibits efficient knowledge forgetting prevention and improved adaptation to novel classes, surpassing state-of-the-art baselines.
△ Less
Submitted 18 December, 2024;
originally announced December 2024.
-
Large Language Model Federated Learning with Blockchain and Unlearning for Cross-Organizational Collaboration
Authors:
Xuhan Zuo,
Minghao Wang,
Tianqing Zhu,
Shui Yu,
Wanlei Zhou
Abstract:
Large language models (LLMs) have transformed the way computers understand and process human language, but using them effectively across different organizations remains still difficult. When organizations work together to improve LLMs, they face several main challenges. First, organizations hesitate to share their valuable data with others. Second, competition between organizations creates trust p…
▽ More
Large language models (LLMs) have transformed the way computers understand and process human language, but using them effectively across different organizations remains still difficult. When organizations work together to improve LLMs, they face several main challenges. First, organizations hesitate to share their valuable data with others. Second, competition between organizations creates trust problems during collaboration. Third, new privacy laws require organizations to be able to delete specific data when requested, which is especially difficult when multiple organizations are learning from shared data. Traditional federated learning approaches do not address these interconnected challenges, particularly in scenarios where participants cannot fully trust each other or the central aggregator. To overcome these limitations, we propose a hybrid blockchain-based federated learning framework that uniquely combines public and private blockchain architectures with multi-agent reinforcement learning. Our framework enables transparent sharing of model update through the public blockchain while protecting sensitive computations in private chains. Each organization operates as an intelligent agent, using Q-learning to optimize its participation strategy and resource allocation, thus aligning individual incentives with collective goals. Notably, we introduce an efficient unlearning mechanism based on Low-Rank Adaptation (LoRA) that enables selective removal of specific data contributions without compromising the model's overall performance. Through extensive experimentation on real-world datasets, we demonstrate that our framework effectively balances privacy protection, trust establishment, and regulatory compliance while maintaining high model performance.
△ Less
Submitted 18 December, 2024;
originally announced December 2024.
-
Observation of the charmonium decay $η_c\toγγ$ in $J/ψ\toγη_c$
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Q. An,
Y. Bai,
O. Bakina,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere,
A. Brueggemann,
H. Cai
, et al. (658 additional authors not shown)
Abstract:
Using $(2712.4\pm14.3)\times10^{6}$ $ψ(3686)$ events collected with the BESIII detector at the BEPCII collider, the decay $η_c\toγγ$ in $J/ψ\toγη_c$ is observed. We determine the product branching fraction $\mathcal{B}(J/ψ\toγη_c)\times\mathcal{B}(η_c\toγγ)=(5.23\pm0.26_{\rm{stat.}}\pm0.30_{\rm{syst.}})\times10^{-6}$. This result is consistent with the LQCD calculation…
▽ More
Using $(2712.4\pm14.3)\times10^{6}$ $ψ(3686)$ events collected with the BESIII detector at the BEPCII collider, the decay $η_c\toγγ$ in $J/ψ\toγη_c$ is observed. We determine the product branching fraction $\mathcal{B}(J/ψ\toγη_c)\times\mathcal{B}(η_c\toγγ)=(5.23\pm0.26_{\rm{stat.}}\pm0.30_{\rm{syst.}})\times10^{-6}$. This result is consistent with the LQCD calculation $(5.34\pm0.16)\times10^{-6}$ from HPQCD in 2023. By using the world-average values of $\mathcal{B}(J/ψ\toγη_c)$ and the total decay width of $η_c$, the partial decay width $Γ(η_c\toγγ)$ is determined to be $(11.30\pm0.56_{\rm{stat.}}\pm0.66_{\rm{syst.}}\pm1.14_{\rm{ref.}})~\rm{keV}$, which deviates from the corresponding world-average value by $3.4σ$.
△ Less
Submitted 2 April, 2025; v1 submitted 17 December, 2024;
originally announced December 2024.
-
Generative Inbetweening through Frame-wise Conditions-Driven Video Generation
Authors:
Tianyi Zhu,
Dongwei Ren,
Qilong Wang,
Xiaohe Wu,
Wangmeng Zuo
Abstract:
Generative inbetweening aims to generate intermediate frame sequences by utilizing two key frames as input. Although remarkable progress has been made in video generation models, generative inbetweening still faces challenges in maintaining temporal stability due to the ambiguous interpolation path between two key frames. This issue becomes particularly severe when there is a large motion gap betw…
▽ More
Generative inbetweening aims to generate intermediate frame sequences by utilizing two key frames as input. Although remarkable progress has been made in video generation models, generative inbetweening still faces challenges in maintaining temporal stability due to the ambiguous interpolation path between two key frames. This issue becomes particularly severe when there is a large motion gap between input frames. In this paper, we propose a straightforward yet highly effective Frame-wise Conditions-driven Video Generation (FCVG) method that significantly enhances the temporal stability of interpolated video frames. Specifically, our FCVG provides an explicit condition for each frame, making it much easier to identify the interpolation path between two input frames and thus ensuring temporally stable production of visually plausible video frames. To achieve this, we suggest extracting matched lines from two input frames that can then be easily interpolated frame by frame, serving as frame-wise conditions seamlessly integrated into existing video generation models. In extensive evaluations covering diverse scenarios such as natural landscapes, complex human poses, camera movements and animations, existing methods often exhibit incoherent transitions across frames. In contrast, our FCVG demonstrates the capability to generate temporally stable videos using both linear and non-linear interpolation curves. Our project page and code are available at \url{https://fcvg-inbetween.github.io/}.
△ Less
Submitted 16 December, 2024;
originally announced December 2024.
-
Vertical Federated Unlearning via Backdoor Certification
Authors:
Mengde Han,
Tianqing Zhu,
Lefeng Zhang,
Huan Huo,
Wanlei Zhou
Abstract:
Vertical Federated Learning (VFL) offers a novel paradigm in machine learning, enabling distinct entities to train models cooperatively while maintaining data privacy. This method is particularly pertinent when entities possess datasets with identical sample identifiers but diverse attributes. Recent privacy regulations emphasize an individual's \emph{right to be forgotten}, which necessitates the…
▽ More
Vertical Federated Learning (VFL) offers a novel paradigm in machine learning, enabling distinct entities to train models cooperatively while maintaining data privacy. This method is particularly pertinent when entities possess datasets with identical sample identifiers but diverse attributes. Recent privacy regulations emphasize an individual's \emph{right to be forgotten}, which necessitates the ability for models to unlearn specific training data. The primary challenge is to develop a mechanism to eliminate the influence of a specific client from a model without erasing all relevant data from other clients. Our research investigates the removal of a single client's contribution within the VFL framework. We introduce an innovative modification to traditional VFL by employing a mechanism that inverts the typical learning trajectory with the objective of extracting specific data contributions. This approach seeks to optimize model performance using gradient ascent, guided by a pre-defined constrained model. We also introduce a backdoor mechanism to verify the effectiveness of the unlearning procedure. Our method avoids fully accessing the initial training data and avoids storing parameter updates. Empirical evidence shows that the results align closely with those achieved by retraining from scratch. Utilizing gradient ascent, our unlearning approach addresses key challenges in VFL, laying the groundwork for future advancements in this domain. All the code and implementations related to this paper are publicly available at https://github.com/mengde-han/VFL-unlearn.
△ Less
Submitted 16 December, 2024;
originally announced December 2024.
-
Amplitude analysis and branching fraction measurement of the Cabibbo-favored decay $D^+ \to K^-π^+π^+π^0$
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere,
A. Brueggemann
, et al. (651 additional authors not shown)
Abstract:
An amplitude analysis of the Cabibbo-favored decay $D^+ \to K^-π^+π^+π^0$ is performed, using 7.93 $\rm{fb}^{-1}$ of $e^+e^-$ collision data collected with the BESIII detector at the center-of-mass energy of 3.773 GeV. The branching fractions of the intermediate processes are measured, with the dominant contribution $D^+ \to \bar{K}^{*}(892)^0ρ(770)^+$ observed to have a branching fraction of…
▽ More
An amplitude analysis of the Cabibbo-favored decay $D^+ \to K^-π^+π^+π^0$ is performed, using 7.93 $\rm{fb}^{-1}$ of $e^+e^-$ collision data collected with the BESIII detector at the center-of-mass energy of 3.773 GeV. The branching fractions of the intermediate processes are measured, with the dominant contribution $D^+ \to \bar{K}^{*}(892)^0ρ(770)^+$ observed to have a branching fraction of $(4.15\pm0.07_{\rm stat.}\pm0.17_{\rm syst.})\%$. With the detection efficiency derived from the amplitude analysis, the absolute branching fraction of $D^+ \to K^-π^+π^+π^0$ is measured to be $(6.06\pm0.04_{\rm stat.}\pm0.07_{\rm syst.})\%$.
△ Less
Submitted 14 December, 2024;
originally announced December 2024.
-
Study of the semileptonic decay $D^0\rightarrow \bar{K}^0π^-e^+ν_e$
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere,
A. Brueggemann
, et al. (650 additional authors not shown)
Abstract:
We report an improved study of the semileptonic decay $D^0 \rightarrow \bar{K}^0π^-e^+ν_{e}$ based on a sample of $7.9~\mathrm{fb}^{-1}$ of $e^+e^-$ annihilation data collected at a center-of-mass energy of 3.773~GeV with the BESIII detector at the BEPCII collider. The branching fraction of this decay is measured to be…
▽ More
We report an improved study of the semileptonic decay $D^0 \rightarrow \bar{K}^0π^-e^+ν_{e}$ based on a sample of $7.9~\mathrm{fb}^{-1}$ of $e^+e^-$ annihilation data collected at a center-of-mass energy of 3.773~GeV with the BESIII detector at the BEPCII collider. The branching fraction of this decay is measured to be $\mathcal{B}(D^0\rightarrow \bar{K}^0π^-e^+ν_{e}) = (1.444 \pm 0.022_{\rm stat} \pm 0.024_{\rm syst})\%$, which is the most precise to date, where the first uncertainty is statistical and the second is systematic. Based on investigation of the decay dynamics, we find that the decay is dominated by the $K^{*}(892)^-$ component and present an improved measurement of its branching fraction to be $\mathcal{B}(D^0\rightarrow K^{*}(892)^-e^+ν_e) = (2.039 \pm 0.032_{\rm stat} \pm 0.034_{\rm syst})\%$. We also determine the ratios of the hadronic form factors for the $K^{*}(892)^-e^+ν_e$ decay to be $r_{V} = V(0)/A_1(0) = 1.48 \pm 0.05_{\rm stat} \pm 0.02_{\rm syst}$ and $r_{2} = A_2(0)/A_1(0) = 0.70 \pm 0.04_{\rm stat} \pm 0.02_{\rm syst}$, where $V(0)$ is the vector form factor and $A_{1,2}(0)$ are the axial form factors. In addition, the $\bar{K}^0π^-$ $\mathcal{S}$-wave component is found to account for $(5.87 \pm 0.32_{\rm stat} \pm 0.16_{\rm syst})\%$ of the total decay rate, corresponding to a branching fraction of $\mathcal{B}[D^0\rightarrow (\bar{K}^0π^-)_{S-{\rm wave}}e^+ν_e] = (0.085 \pm 0.005_{\rm stat} \pm 0.003_{\rm syst})\%$.
△ Less
Submitted 14 December, 2024;
originally announced December 2024.
-
From Text to Trajectory: Exploring Complex Constraint Representation and Decomposition in Safe Reinforcement Learning
Authors:
Pusen Dong,
Tianchen Zhu,
Yue Qiu,
Haoyi Zhou,
Jianxin Li
Abstract:
Safe reinforcement learning (RL) requires the agent to finish a given task while obeying specific constraints. Giving constraints in natural language form has great potential for practical scenarios due to its flexible transfer capability and accessibility. Previous safe RL methods with natural language constraints typically need to design cost functions manually for each constraint, which require…
▽ More
Safe reinforcement learning (RL) requires the agent to finish a given task while obeying specific constraints. Giving constraints in natural language form has great potential for practical scenarios due to its flexible transfer capability and accessibility. Previous safe RL methods with natural language constraints typically need to design cost functions manually for each constraint, which requires domain expertise and lacks flexibility. In this paper, we harness the dual role of text in this task, using it not only to provide constraint but also as a training signal. We introduce the Trajectory-level Textual Constraints Translator (TTCT) to replace the manually designed cost function. Our empirical results demonstrate that TTCT effectively comprehends textual constraint and trajectory, and the policies trained by TTCT can achieve a lower violation rate than the standard cost function. Extra studies are conducted to demonstrate that the TTCT has zero-shot transfer capability to adapt to constraint-shift environments.
△ Less
Submitted 21 February, 2025; v1 submitted 11 December, 2024;
originally announced December 2024.
-
Defending Against Neural Network Model Inversion Attacks via Data Poisoning
Authors:
Shuai Zhou,
Dayong Ye,
Tianqing Zhu,
Wanlei Zhou
Abstract:
Model inversion attacks pose a significant privacy threat to machine learning models by reconstructing sensitive data from their outputs. While various defenses have been proposed to counteract these attacks, they often come at the cost of the classifier's utility, thus creating a challenging trade-off between privacy protection and model utility. Moreover, most existing defenses require retrainin…
▽ More
Model inversion attacks pose a significant privacy threat to machine learning models by reconstructing sensitive data from their outputs. While various defenses have been proposed to counteract these attacks, they often come at the cost of the classifier's utility, thus creating a challenging trade-off between privacy protection and model utility. Moreover, most existing defenses require retraining the classifier for enhanced robustness, which is impractical for large-scale, well-established models. This paper introduces a novel defense mechanism to better balance privacy and utility, particularly against adversaries who employ a machine learning model (i.e., inversion model) to reconstruct private data. Drawing inspiration from data poisoning attacks, which can compromise the performance of machine learning models, we propose a strategy that leverages data poisoning to contaminate the training data of inversion models, thereby preventing model inversion attacks.
Two defense methods are presented. The first, termed label-preserving poisoning attacks for all output vectors (LPA), involves subtle perturbations to all output vectors while preserving their labels. Our findings demonstrate that these minor perturbations, introduced through a data poisoning approach, significantly increase the difficulty of data reconstruction without compromising the utility of the classifier. Subsequently, we introduce a second method, label-flipping poisoning for partial output vectors (LFP), which selectively perturbs a small subset of output vectors and alters their labels during the process. Empirical results indicate that LPA is notably effective, outperforming the current state-of-the-art defenses. Our data poisoning-based defense provides a new retraining-free defense paradigm that preserves the victim classifier's utility.
△ Less
Submitted 10 December, 2024;
originally announced December 2024.
-
Study of the decay ψ(3686) \to Σ^{0}\barΣ^{0}φ
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (644 additional authors not shown)
Abstract:
Using $(27.12\pm 0.14)\times 10^{8}$ $ψ(3686)$ events collected with the BESIII detector operating at the BEPCII collider, the decay $ψ(3686)\toΣ^{0}\barΣ^{0}φ$ is observed for the first time with a statistical significance of 7.6$σ$. Its branching fraction is measured to be $(2.64 \pm 0.32_{\textrm{stat}} \pm 0.12_{\textrm{sys}}) \times 10^{-6}$, where the first uncertainty is statistical and the…
▽ More
Using $(27.12\pm 0.14)\times 10^{8}$ $ψ(3686)$ events collected with the BESIII detector operating at the BEPCII collider, the decay $ψ(3686)\toΣ^{0}\barΣ^{0}φ$ is observed for the first time with a statistical significance of 7.6$σ$. Its branching fraction is measured to be $(2.64 \pm 0.32_{\textrm{stat}} \pm 0.12_{\textrm{sys}}) \times 10^{-6}$, where the first uncertainty is statistical and the second is systematic. In addition, we search for potential intermediate states in the $Σ^{0}φ$($\barΣ^{0}φ$) invariant mass distribution and a possible threshold enhancement in the $Σ^{0}\barΣ^{0}$ system, but no conclusive evidence of is observed.
△ Less
Submitted 9 December, 2024;
originally announced December 2024.
-
Partial wave analyses of $ψ(3686)\to p\bar{p}π^0$ and $ψ(3686)\to p\bar{p}η$
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (644 additional authors not shown)
Abstract:
Using a sample of $(2712\pm14)\times10^6$ $ψ(3686)$ events collected with the BESIII detector, we perform partial wave analyses of the decays $ψ(3686)\to p\bar{p}π^0$ and $ψ(3686)\to p\bar{p}η$. The branching fractions of $ψ(3686)\to p\bar{p}π^0$ and $ψ(3686)\to p\bar{p}η$ are determined to be $(133.9\pm11.2\pm2.3)\times10^{-6}$ or $(183.7\pm13.7\pm3.2)\times10^{-6}$ and…
▽ More
Using a sample of $(2712\pm14)\times10^6$ $ψ(3686)$ events collected with the BESIII detector, we perform partial wave analyses of the decays $ψ(3686)\to p\bar{p}π^0$ and $ψ(3686)\to p\bar{p}η$. The branching fractions of $ψ(3686)\to p\bar{p}π^0$ and $ψ(3686)\to p\bar{p}η$ are determined to be $(133.9\pm11.2\pm2.3)\times10^{-6}$ or $(183.7\pm13.7\pm3.2)\times10^{-6}$ and $(61.5\pm6.5\pm1.1)\times10^{-6}$ or $(84.4\pm6.9\pm1.4)\times10^{-6}$, respectively, where the two solutions are caused by an ambiguous phase angle between resonant and continuum processes. Several well-established $N^*$ states are observed in the $pπ^0$ and $pη$ systems, and the corresponding branching fractions are measured. The ratio of decay widths $Γ_{N(1535)\to Nη}/Γ_{N(1535)\to Nπ}$ is determined to be $0.99\pm0.05\pm0.19$.
△ Less
Submitted 19 February, 2025; v1 submitted 9 December, 2024;
originally announced December 2024.
-
Large Language Models Merging for Enhancing the Link Stealing Attack on Graph Neural Networks
Authors:
Faqian Guan,
Tianqing Zhu,
Wenhan Chang,
Wei Ren,
Wanlei Zhou
Abstract:
Graph Neural Networks (GNNs), specifically designed to process the graph data, have achieved remarkable success in various applications. Link stealing attacks on graph data pose a significant privacy threat, as attackers aim to extract sensitive relationships between nodes (entities), potentially leading to academic misconduct, fraudulent transactions, or other malicious activities. Previous studi…
▽ More
Graph Neural Networks (GNNs), specifically designed to process the graph data, have achieved remarkable success in various applications. Link stealing attacks on graph data pose a significant privacy threat, as attackers aim to extract sensitive relationships between nodes (entities), potentially leading to academic misconduct, fraudulent transactions, or other malicious activities. Previous studies have primarily focused on single datasets and did not explore cross-dataset attacks, let alone attacks that leverage the combined knowledge of multiple attackers. However, we find that an attacker can combine the data knowledge of multiple attackers to create a more effective attack model, which can be referred to cross-dataset attacks. Moreover, if knowledge can be extracted with the help of Large Language Models (LLMs), the attack capability will be more significant. In this paper, we propose a novel link stealing attack method that takes advantage of cross-dataset and Large Language Models (LLMs). The LLM is applied to process datasets with different data structures in cross-dataset attacks. Each attacker fine-tunes the LLM on their specific dataset to generate a tailored attack model. We then introduce a novel model merging method to integrate the parameters of these attacker-specific models effectively. The result is a merged attack model with superior generalization capabilities, enabling effective attacks not only on the attackers' datasets but also on previously unseen (out-of-domain) datasets. We conducted extensive experiments in four datasets to demonstrate the effectiveness of our method. Additional experiments with three different GNN and LLM architectures further illustrate the generality of our approach.
△ Less
Submitted 8 December, 2024;
originally announced December 2024.
-
Video Quality Assessment: A Comprehensive Survey
Authors:
Qi Zheng,
Yibo Fan,
Leilei Huang,
Tianyu Zhu,
Jiaming Liu,
Zhijian Hao,
Shuo Xing,
Chia-Ju Chen,
Xiongkuo Min,
Alan C. Bovik,
Zhengzhong Tu
Abstract:
Video quality assessment (VQA) is an important processing task, aiming at predicting the quality of videos in a manner highly consistent with human judgments of perceived quality. Traditional VQA models based on natural image and/or video statistics, which are inspired both by models of projected images of the real world and by dual models of the human visual system, deliver only limited predictio…
▽ More
Video quality assessment (VQA) is an important processing task, aiming at predicting the quality of videos in a manner highly consistent with human judgments of perceived quality. Traditional VQA models based on natural image and/or video statistics, which are inspired both by models of projected images of the real world and by dual models of the human visual system, deliver only limited prediction performances on real-world user-generated content (UGC), as exemplified in recent large-scale VQA databases containing large numbers of diverse video contents crawled from the web. Fortunately, recent advances in deep neural networks and Large Multimodality Models (LMMs) have enabled significant progress in solving this problem, yielding better results than prior handcrafted models. Numerous deep learning-based VQA models have been developed, with progress in this direction driven by the creation of content-diverse, large-scale human-labeled databases that supply ground truth psychometric video quality data. Here, we present a comprehensive survey of recent progress in the development of VQA algorithms and the benchmarking studies and databases that make them possible. We also analyze open research directions on study design and VQA algorithm architectures. Github link: https://github.com/taco-group/Video-Quality-Assessment-A-Comprehensive-Survey.
△ Less
Submitted 11 December, 2024; v1 submitted 4 December, 2024;
originally announced December 2024.
-
Constraining polymerized black holes with quasi-circular extreme mass-ratio inspirals
Authors:
Sen Yang,
Yu-Peng Zhang,
Tao Zhu,
Li Zhao,
Yu-Xiao Liu
Abstract:
In this paper, we focus on the gravitational waves emitted by a stellar-mass object in a quasi-circular inspiral orbit around a central supermassive polymerized black hole in loop quantum gravity. Treating the stellar-mass object as a massive test particle, we derive its equations of motion and the corresponding radial effective potential. We find that the peak of the radial effective potential de…
▽ More
In this paper, we focus on the gravitational waves emitted by a stellar-mass object in a quasi-circular inspiral orbit around a central supermassive polymerized black hole in loop quantum gravity. Treating the stellar-mass object as a massive test particle, we derive its equations of motion and the corresponding radial effective potential. We find that the peak of the radial effective potential decreases with the quantum parameter $\hat{k}$. We also examine the impact of quantum corrections on the properties of stable circular orbits around the polymerized black hole. We model the smaller object's trajectory as an adiabatic evolution along stable circular orbits using a semi-relativistic approach. In this method, the motion of the object is described by relativistic geodesics, and changes in the object's energy and orbital angular momentum due to gravitational radiation are calculated using the mass quadrupole formula. The corresponding gravitational waveforms are generated using the numerical kludge method, revealing that quantum corrections cause phase advances in the gravitational waveforms. We further analyze the potential constraints on the quantum parameter $\hat{k}$ from future space-based gravitational wave observations, concluding that these observations will likely impose stronger constraints on $\hat{k}$ than those obtained from black hole shadow measurements.
△ Less
Submitted 10 April, 2025; v1 submitted 5 December, 2024;
originally announced December 2024.
-
Energy Extraction from Loop Quantum Black Holes: The Role of Magnetic Penrose Process and Quantum Gravity Effects with Astrophysical Insights
Authors:
Tursunali Xamidov,
Pankaj Sheoran,
Sanjar Shaymatov,
Tao Zhu
Abstract:
In this study, we explore the influence of quantum gravitational corrections, derived from Loop Quantum Gravity (LQG), on the efficiency of the magnetic Penrose process (MPP) in black hole (BH) environments. We begin by analyzing the rotating Loop Quantum Black Hole (LQBH) metric, describing the structure of the event horizon and ergosphere as functions of the quantum parameter $ε= γδ$, with $γ$ r…
▽ More
In this study, we explore the influence of quantum gravitational corrections, derived from Loop Quantum Gravity (LQG), on the efficiency of the magnetic Penrose process (MPP) in black hole (BH) environments. We begin by analyzing the rotating Loop Quantum Black Hole (LQBH) metric, describing the structure of the event horizon and ergosphere as functions of the quantum parameter $ε= γδ$, with $γ$ representing the Immirzi parameter and $δ$ the polymeric parameter, and the spin parameter $a$. These modifications provide a novel setting for exploring the dynamics of charged particles near the LQBH and evaluating the resultant energy extraction through the MPP. Interestingly, for a given value of the LQBH parameter $a$, we observe that the ergosphere region of the LQBH exhibits a more intricate structure compared to its classical counterpart, the Kerr BH, as $ε$ increases. Furthermore, we find that the overall efficiency of the process decreases with $ε$ that decreases $a_{max}$, again in contrast to the Kerr BH, where efficiency rises with an increasing $a$. Our analysis also extends to astrophysical contexts, applying constraints on the mass and magnetic field of LQBHs for astrophysical BH candidates, including SgrA*, M87*, NGC 1052, and BZ (Blandford and Znajek sources, i.e., supermassive BHs with masses around $10^9 M_\odot$ and magnetic fields in the range $10^3-10^4 \text{G}$). We assess these sources as potential accelerators of high-energy protons across different values of the quantum parameter $ε$. Additionally, we examine how variations in the magnetic field strength $B$ and quantum corrections impact the energy of protons accelerated from M87$^{\star}$ and Sgr A$^{\star}$ following beta decay.
△ Less
Submitted 31 March, 2025; v1 submitted 5 December, 2024;
originally announced December 2024.
-
Confined Magnetization at the Sublattice-Matched Ruthenium Oxide Heterointerface
Authors:
Yiyan Fan,
Qinghua Zhang,
Ting Lin,
He Bai,
Chuanrui Huo,
Qiao Jin,
Tielong Deng,
Songhee Choi,
Shengru Chen,
Haitao Hong,
Ting Cui,
Qianying Wang,
Dongke Rong,
Chen Liu,
Chen Ge,
Tao Zhu,
Lin Gu,
Kuijuan Jin,
Jun Chen,
Er-Jia Guo
Abstract:
Creating a heterostructure by combining two magnetically and structurally distinct ruthenium oxides is a crucial approach for investigating their emergent magnetic states and interactions. Previously, research has predominantly concentrated on the intrinsic properties of the ferromagnet SrRuO3 and recently discovered altermagnet RuO2 solely. Here, we engineered an ultrasharp sublattice-matched het…
▽ More
Creating a heterostructure by combining two magnetically and structurally distinct ruthenium oxides is a crucial approach for investigating their emergent magnetic states and interactions. Previously, research has predominantly concentrated on the intrinsic properties of the ferromagnet SrRuO3 and recently discovered altermagnet RuO2 solely. Here, we engineered an ultrasharp sublattice-matched heterointerface using pseudo-cubic SrRuO3 and rutile RuO2, conducting an in-depth analysis of their spin interactions. Structurally, to accommodate the lattice symmetry mismatch, the inverted RuO2 layer undergoes an in-plane rotation of 18 degrees during epitaxial growth on SrRuO3 layer, resulting in an interesting and rotational interface with perfect crystallinity and negligible chemical intermixing. Performance-wise, the interfacial layer of 6 nm in RuO2 adjacent to SrRuO3 exhibits a nonzero magnetic moment, contributing to an enhanced anomalous Hall effect (AHE) at low temperatures. Furthermore, our observations indicate that, in contrast to SrRuO3 single layers, the AHE of [(RuO2)15/(SrRuO3)n] heterostructures shows nonlinear behavior and reaches its maximum when the SrRuO3 thickness reaches tens of nm. These results suggest that the interfacial magnetic interaction surpasses that of all-perovskite oxides (~5-unit cells). This study underscores the significance and potential applications of magnetic interactions based on the crystallographic asymmetric interfaces in the design of spintronic devices.
△ Less
Submitted 4 December, 2024;
originally announced December 2024.
-
Particle dynamics and the accretion disk around a Self-dual Black Hole immersed in a magnetic field in Loop Quantum Gravity
Authors:
Uktamjon Uktamov,
Mirzabek Alloqulov,
Sanjar Shaymatov,
Tao Zhu,
Bobomurat Ahmedov
Abstract:
In this paper, we study the motion of magnetic dipoles and electrically charged particles in the vicinity of a self-dual black hole in Loop Quantum Gravity (LQG) immersed in an external asymptotically uniform magnetic field. We explore the effects of the quantum correction parameter and electromagnetic interactions on the particle geodesics. We derive the field equations and determine the electrom…
▽ More
In this paper, we study the motion of magnetic dipoles and electrically charged particles in the vicinity of a self-dual black hole in Loop Quantum Gravity (LQG) immersed in an external asymptotically uniform magnetic field. We explore the effects of the quantum correction parameter and electromagnetic interactions on the particle geodesics. We derive the field equations and determine the electromagnetic four-vector potential for the case of a self-dual black hole in LQG. We investigate the innermost stable circular orbits (ISCOs) for both magnetic dipoles and electrically charged particles in detail, demonstrating that the quantum correction parameter significantly influences on the ISCO radius, causing it to shrink. Additionally, we show that the ISCO radius of magnetic dipoles is greater than that of electrically charged particles due to the magnetic field interaction. We investigate the ISCO parameters (i.e., $r_{ISCO}$, $l_{ISCO}$, $\mathcal{E}_{ISCO}$, $v_{ISCO}$, and $Ω_{ISCO}$) for magnetic dipoles and electrically charged particles, providing detailed values. Furthermore, we examine the trajectories of charged particles under various scenarios resulting from the quantum correction parameter $P$. Finally, analyzing the ISCO parameters that define the inner edge of the accretion disk, we explore the accretion disk around a self-dual black hole in LQG. We delve into the electromagnetic radiation flux, temperature, and differential luminosity as radiation properties of the accretion disk in detail. We show that the quantum correction parameter shifts the profile of the electromagnetic flux and accretion disk temperature towards the central object, leading to a slight increase in these quantities.
△ Less
Submitted 2 December, 2024;
originally announced December 2024.
-
Yi-Lightning Technical Report
Authors:
Alan Wake,
Bei Chen,
C. X. Lv,
Chao Li,
Chengen Huang,
Chenglin Cai,
Chujie Zheng,
Daniel Cooper,
Fan Zhou,
Feng Hu,
Ge Zhang,
Guoyin Wang,
Heng Ji,
Howard Qiu,
Jiangcheng Zhu,
Jun Tian,
Katherine Su,
Lihuan Zhang,
Liying Li,
Ming Song,
Mou Li,
Peng Liu,
Qicheng Hu,
Shawn Wang,
Shijun Zhou
, et al. (19 additional authors not shown)
Abstract:
This technical report presents Yi-Lightning, our latest flagship large language model (LLM). It achieves exceptional performance, ranking 6th overall on Chatbot Arena, with particularly strong results (2nd to 4th place) in specialized categories including Chinese, Math, Coding, and Hard Prompts. Yi-Lightning leverages an enhanced Mixture-of-Experts (MoE) architecture, featuring advanced expert seg…
▽ More
This technical report presents Yi-Lightning, our latest flagship large language model (LLM). It achieves exceptional performance, ranking 6th overall on Chatbot Arena, with particularly strong results (2nd to 4th place) in specialized categories including Chinese, Math, Coding, and Hard Prompts. Yi-Lightning leverages an enhanced Mixture-of-Experts (MoE) architecture, featuring advanced expert segmentation and routing mechanisms coupled with optimized KV-caching techniques. Our development process encompasses comprehensive pre-training, supervised fine-tuning (SFT), and reinforcement learning from human feedback (RLHF), where we devise deliberate strategies for multi-stage training, synthetic data construction, and reward modeling. Furthermore, we implement RAISE (Responsible AI Safety Engine), a four-component framework to address safety issues across pre-training, post-training, and serving phases. Empowered by our scalable super-computing infrastructure, all these innovations substantially reduce training, deployment and inference costs while maintaining high-performance standards. With further evaluations on public academic benchmarks, Yi-Lightning demonstrates competitive performance against top-tier LLMs, while we observe a notable disparity between traditional, static benchmark results and real-world, dynamic human preferences. This observation prompts a critical reassessment of conventional benchmarks' utility in guiding the development of more intelligent and powerful AI systems for practical applications. Yi-Lightning is now available through our developer platform at https://platform.lingyiwanwu.com.
△ Less
Submitted 22 January, 2025; v1 submitted 2 December, 2024;
originally announced December 2024.
-
AniMer: Animal Pose and Shape Estimation Using Family Aware Transformer
Authors:
Jin Lyu,
Tianyi Zhu,
Yi Gu,
Li Lin,
Pujin Cheng,
Yebin Liu,
Xiaoying Tang,
Liang An
Abstract:
Quantitative analysis of animal behavior and biomechanics requires accurate animal pose and shape estimation across species, and is important for animal welfare and biological research. However, the small network capacity of previous methods and limited multi-species dataset leave this problem underexplored. To this end, this paper presents AniMer to estimate animal pose and shape using family awa…
▽ More
Quantitative analysis of animal behavior and biomechanics requires accurate animal pose and shape estimation across species, and is important for animal welfare and biological research. However, the small network capacity of previous methods and limited multi-species dataset leave this problem underexplored. To this end, this paper presents AniMer to estimate animal pose and shape using family aware Transformer, enhancing the reconstruction accuracy of diverse quadrupedal families. A key insight of AniMer is its integration of a high-capacity Transformer-based backbone and an animal family supervised contrastive learning scheme, unifying the discriminative understanding of various quadrupedal shapes within a single framework. For effective training, we aggregate most available open-sourced quadrupedal datasets, either with 3D or 2D labels. To improve the diversity of 3D labeled data, we introduce CtrlAni3D, a novel large-scale synthetic dataset created through a new diffusion-based conditional image generation pipeline. CtrlAni3D consists of about 10k images with pixel-aligned SMAL labels. In total, we obtain 41.3k annotated images for training and validation. Consequently, the combination of a family aware Transformer network and an expansive dataset enables AniMer to outperform existing methods not only on 3D datasets like Animal3D and CtrlAni3D, but also on out-of-distribution Animal Kingdom dataset. Ablation studies further demonstrate the effectiveness of our network design and CtrlAni3D in enhancing the performance of AniMer for in-the-wild applications. The project page of AniMer is https://luoxue-star.github.io/AniMer_project_page/.
△ Less
Submitted 1 December, 2024;
originally announced December 2024.
-
Measurement of the Inclusive Cross Sections of Prompt $J/ψ$ and $ψ(3686)$ Production in $e^{+}e^{-}$ Annihilation from $\sqrt{s}=3.808$ to $4.951$ GeV
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
X. C. Ai,
R. Aliberti,
A. Amoroso,
M. R. An,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere,
A. Brueggemann
, et al. (599 additional authors not shown)
Abstract:
The inclusive cross sections of prompt $J/ψ$ and $ψ(3686)$ production are measured at center-of-mass energies from 3.808 to 4.951 GeV. The dataset used is 22 fb$^{-1}$ of $e^{+}e^{-}$ annihilation data collected with the BESIII detector operating at the BEPCII storage ring. The results obtained are in agreement with the previous BESIII measurements of exclusive $J/ψ$ and $ψ(3686)$ production. The…
▽ More
The inclusive cross sections of prompt $J/ψ$ and $ψ(3686)$ production are measured at center-of-mass energies from 3.808 to 4.951 GeV. The dataset used is 22 fb$^{-1}$ of $e^{+}e^{-}$ annihilation data collected with the BESIII detector operating at the BEPCII storage ring. The results obtained are in agreement with the previous BESIII measurements of exclusive $J/ψ$ and $ψ(3686)$ production. The average values obtained for the cross sections measured in the center-of-mass energy ranges from 4.527 to 4.951 GeV for $J/ψ$ and from 4.843 to 4.951 GeV for $ψ(3686)$, where the impact of known resonances is negligible, are $14.0\pm1.7\pm3.1$ pb and $15.3\pm3.0$ pb, respectively. For $J/ψ$, the first and the second uncertainties are statistical and systematic, respectively. For $ψ(3686)$, the uncertainty is total. These values are useful for testing charmonium production models.
△ Less
Submitted 19 February, 2025; v1 submitted 29 November, 2024;
originally announced November 2024.
-
Embracing AI in Education: Understanding the Surge in Large Language Model Use by Secondary Students
Authors:
Tiffany Zhu,
Kexun Zhang,
William Yang Wang
Abstract:
The impressive essay writing and problem-solving capabilities of large language models (LLMs) like OpenAI's ChatGPT have opened up new avenues in education. Our goal is to gain insights into the widespread use of LLMs among secondary students to inform their future development. Despite school restrictions, our survey of over 300 middle and high school students revealed that a remarkable 70% of stu…
▽ More
The impressive essay writing and problem-solving capabilities of large language models (LLMs) like OpenAI's ChatGPT have opened up new avenues in education. Our goal is to gain insights into the widespread use of LLMs among secondary students to inform their future development. Despite school restrictions, our survey of over 300 middle and high school students revealed that a remarkable 70% of students have utilized LLMs, higher than the usage percentage among young adults, and this percentage remains consistent across 7th to 12th grade. Students also reported using LLMs for multiple subjects, including language arts, history, and math assignments, but expressed mixed thoughts on their effectiveness due to occasional hallucinations in historical contexts and incorrect answers for lack of rigorous reasoning. The survey feedback called for LLMs better adapted for students, and also raised questions to developers and educators on how to help students from underserved communities leverage LLMs' capabilities for equal access to advanced education resources. We propose a few ideas to address such issues, including subject-specific models, personalized learning, and AI classrooms.
△ Less
Submitted 27 November, 2024;
originally announced November 2024.
-
FASIONAD : FAst and Slow FusION Thinking Systems for Human-Like Autonomous Driving with Adaptive Feedback
Authors:
Kangan Qian,
Zhikun Ma,
Yangfan He,
Ziang Luo,
Tianyu Shi,
Tianze Zhu,
Jiayin Li,
Jianhui Wang,
Ziyu Chen,
Xiao He,
Yining Shi,
Zheng Fu,
Xinyu Jiao,
Kun Jiang,
Diange Yang,
Takafumi Matsumaru
Abstract:
Ensuring safe, comfortable, and efficient navigation is a critical goal for autonomous driving systems. While end-to-end models trained on large-scale datasets excel in common driving scenarios, they often struggle with rare, long-tail events. Recent progress in large language models (LLMs) has introduced enhanced reasoning capabilities, but their computational demands pose challenges for real-tim…
▽ More
Ensuring safe, comfortable, and efficient navigation is a critical goal for autonomous driving systems. While end-to-end models trained on large-scale datasets excel in common driving scenarios, they often struggle with rare, long-tail events. Recent progress in large language models (LLMs) has introduced enhanced reasoning capabilities, but their computational demands pose challenges for real-time decision-making and precise planning. This paper presents FASIONAD, a novel dual-system framework inspired by the cognitive model "Thinking, Fast and Slow." The fast system handles routine navigation tasks using rapid, data-driven path planning, while the slow system focuses on complex reasoning and decision-making in challenging or unfamiliar situations. A dynamic switching mechanism based on score distribution and feedback allows seamless transitions between the two systems. Visual prompts generated by the fast system enable human-like reasoning in the slow system, which provides high-quality feedback to enhance the fast system's decision-making. To evaluate FASIONAD, we introduce a new benchmark derived from the nuScenes dataset, specifically designed to differentiate fast and slow scenarios. FASIONAD achieves state-of-the-art performance on this benchmark, establishing a new standard for frameworks integrating fast and slow cognitive processes in autonomous driving. This approach paves the way for more adaptive, human-like autonomous driving systems.
△ Less
Submitted 26 November, 2024;
originally announced November 2024.
-
Rationality of the K-theoretical capped vertex function for Nakajima quiver varieties
Authors:
Tianqing Zhu
Abstract:
In this paper we prove the rationality of the capped vertex function with descendents for arbitrary Nakajima quiver varieties with generic stability conditions. We generalise the proof given by Smirnov to the general case, which requires to use techniques of tautological classes rather than the fixed-point basis. This result confirms that the "monodromy" of the capped vertex function is trivial, w…
▽ More
In this paper we prove the rationality of the capped vertex function with descendents for arbitrary Nakajima quiver varieties with generic stability conditions. We generalise the proof given by Smirnov to the general case, which requires to use techniques of tautological classes rather than the fixed-point basis. This result confirms that the "monodromy" of the capped vertex function is trivial, which gives a strong constraint for the monodromy of the capping operators. We will also provide a GIT wall-crossing formula for the capped vertex function in terms of the quantum difference operators and fusion operators.
△ Less
Submitted 19 December, 2024; v1 submitted 26 November, 2024;
originally announced November 2024.