-
Dissecting the gender divide: Authorship and acknowledgment in scientific publications
Authors:
Keigo Kusumegi,
Yukie Sano,
Daniel E. Acuña
Abstract:
The issue of gender bias in scientific publications has been the subject of ongoing debate. One aspect of this debate concerns whether women receive equal credit for their contributions compared to men. Conventional wisdom suggests that women are more likely to be acknowledged than listed as co-authors, a role that carries greater prestige. Here, we analyze data from hundreds of thousands of scien…
▽ More
The issue of gender bias in scientific publications has been the subject of ongoing debate. One aspect of this debate concerns whether women receive equal credit for their contributions compared to men. Conventional wisdom suggests that women are more likely to be acknowledged than listed as co-authors, a role that carries greater prestige. Here, we analyze data from hundreds of thousands of scientists across nine disciplines and a broad range of publications. Our results confirm persistent gender disparities: women are more frequently acknowledged than credited as co-authors, especially in roles involving investigation and analysis. To account for status and disciplinary effects, we examined collaboration pairs composed of highly cited (high-status) and less cited (low-status) scientists. In such collaborations, the highly cited scientist is more likely to be listed as a co-author, regardless of gender. Notably, highly cited women in these pairs are even more likely to be listed as co-authors than their male counterparts. These findings suggest that power dynamics and perceived success heavily influence how credit is distributed in scientific publishing. The results underscore the role of status in shaping authorship and call for a more nuanced understanding of how gender, power, and recognition interact. This research offers valuable insights for scientists, editors, and funding agencies committed to advancing equity in science.
△ Less
Submitted 18 June, 2025;
originally announced June 2025.
-
Analyzing the Safety of Japanese Large Language Models in Stereotype-Triggering Prompts
Authors:
Akito Nakanishi,
Yukie Sano,
Geng Liu,
Francesco Pierri
Abstract:
In recent years, Large Language Models have attracted growing interest for their significant potential, though concerns have rapidly emerged regarding unsafe behaviors stemming from inherent stereotypes and biases. Most research on stereotypes in LLMs has primarily relied on indirect evaluation setups, in which models are prompted to select between pairs of sentences associated with particular soc…
▽ More
In recent years, Large Language Models have attracted growing interest for their significant potential, though concerns have rapidly emerged regarding unsafe behaviors stemming from inherent stereotypes and biases. Most research on stereotypes in LLMs has primarily relied on indirect evaluation setups, in which models are prompted to select between pairs of sentences associated with particular social groups. Recently, direct evaluation methods have emerged, examining open-ended model responses to overcome limitations of previous approaches, such as annotator biases. Most existing studies have focused on English-centric LLMs, whereas research on non-English models, particularly Japanese, remains sparse, despite the growing development and adoption of these models. This study examines the safety of Japanese LLMs when responding to stereotype-triggering prompts in direct setups. We constructed 3,612 prompts by combining 301 social group terms, categorized by age, gender, and other attributes, with 12 stereotype-inducing templates in Japanese. Responses were analyzed from three foundational models trained respectively on Japanese, English, and Chinese language. Our findings reveal that LLM-jp, a Japanese native model, exhibits the lowest refusal rate and is more likely to generate toxic and negative responses compared to other models. Additionally, prompt format significantly influence the output of all models, and the generated responses include exaggerated reactions toward specific social groups, varying across models. These findings underscore the insufficient ethical safety mechanisms in Japanese LLMs and demonstrate that even high-accuracy models can produce biased outputs when processing Japanese-language prompts. We advocate for improving safety mechanisms and bias mitigation strategies in Japanese LLMs, contributing to ongoing discussions on AI ethics beyond linguistic boundaries.
△ Less
Submitted 4 March, 2025; v1 submitted 3 March, 2025;
originally announced March 2025.
-
Quantifying Collective Emotions: Japan's Societal Trends Through Enhanced Sentiment Index Using POMS2 and SNS
Authors:
Koutarou Tamura,
Yukie Sano,
Junichi Shiozaki
Abstract:
In this study, we constructed an emotion index that quantitatively represents the collective emotions present in the Japanese web space by utilizing Social Networking Service (SNS) post data. Building upon previous research that used blog data and the Profile of Mood States (POMS), we restructured the methodology using posts from X (formerly Twitter) and updated the model by adding the ``Friendlin…
▽ More
In this study, we constructed an emotion index that quantitatively represents the collective emotions present in the Japanese web space by utilizing Social Networking Service (SNS) post data. Building upon previous research that used blog data and the Profile of Mood States (POMS), we restructured the methodology using posts from X (formerly Twitter) and updated the model by adding the ``Friendliness" indicator from the POMS2 metrics. Through periodic and trend analyses of the emotional indicators derived from X's post data, we found that the extension is consistent with results previously reported using blog data. This suggests that our methodology effectively captures typical emotional fluctuations in Japanese society, independent of specific SNS platforms, and is expected to serve as an index to visualize societal trends.
△ Less
Submitted 12 February, 2025;
originally announced February 2025.
-
Qubit Reduction and Quantum Speedup for Wireless Channel Assignment Problem
Authors:
Yuki Sano,
Masaya Norimoto,
Naoki Ishikawa
Abstract:
In this paper, we propose a novel method of formulating an NP-hard wireless channel assignment problem as a higher-order unconstrained binary optimization (HUBO), where the Grover adaptive search (GAS) is used to provide a quadratic speedup for solving the problem. The conventional method relies on a one-hot encoding of the channel indices, resulting in a quadratic formulation. By contrast, we con…
▽ More
In this paper, we propose a novel method of formulating an NP-hard wireless channel assignment problem as a higher-order unconstrained binary optimization (HUBO), where the Grover adaptive search (GAS) is used to provide a quadratic speedup for solving the problem. The conventional method relies on a one-hot encoding of the channel indices, resulting in a quadratic formulation. By contrast, we conceive ascending and descending binary encodings of the channel indices, construct a specific quantum circuit, and derive the exact numbers of qubits and gates required by GAS. Our analysis clarifies that the proposed HUBO formulation significantly reduces the number of qubits and the query complexity compared with the conventional quadratic formulation. This advantage is achieved at the cost of an increased number of quantum gates, which we demonstrate can be reduced by our proposed descending binary encoding.
△ Less
Submitted 1 August, 2023; v1 submitted 10 August, 2022;
originally announced August 2022.
-
Quantum Money Generated by Multiple Untrustworthy Banks
Authors:
Yuichi Sano
Abstract:
While classical money can be copied, it is impossible to copy quantum money in principle, with only the bank that issues it knowing how to generate it, meaning only the bank can make exact copies. Not all reliable banks, such as central banks, will issue quantum money, so there is the possibility that untrustworthy banks are distributing fake or multiple copies of the same quantum money without th…
▽ More
While classical money can be copied, it is impossible to copy quantum money in principle, with only the bank that issues it knowing how to generate it, meaning only the bank can make exact copies. Not all reliable banks, such as central banks, will issue quantum money, so there is the possibility that untrustworthy banks are distributing fake or multiple copies of the same quantum money without the users' knowledge. As such, we propose a quantum patchwork money scheme in which banks cannot distribute exact copies to users. This scheme involves multiple banks providing public-key quantum money as shards and generating quantum patchwork money by combining them. The banks can use the quantum patchwork money without completely trusting the other banks. In addition, nonbank users can use safely the quantum patchwork money without trusting any banks potentially focused on self-interest by adding a protocol for monitoring the distribution of copies.
△ Less
Submitted 18 May, 2022;
originally announced May 2022.
-
Multi-server Blind Quantum Computation Protocol With Limited Classical Communication Among Servers
Authors:
Yuichi Sano
Abstract:
A user who does not have a quantum computer but wants to perform quantum computations may delegate his computation to a quantum cloud server. In order that the delegation works, it must be assured that no evil server can obtain any important information on the computation. The blind protocol was proposed as a way for the user to protect his information from the unauthorized actions of the server.…
▽ More
A user who does not have a quantum computer but wants to perform quantum computations may delegate his computation to a quantum cloud server. In order that the delegation works, it must be assured that no evil server can obtain any important information on the computation. The blind protocol was proposed as a way for the user to protect his information from the unauthorized actions of the server. Among the blind protocols proposed thus far, a protocol with two servers sharing entanglement, while it does not require to a user any quantum resource, does not allow the servers to communicate even after the computation. In this paper, we propose a protocol, by extend this two-server protocol to multiple servers, which remains secure even if some servers communicate with each other after the computation. Dummy gates and a circuit modeled after brickwork states play a crucial role in the new protocol.
△ Less
Submitted 22 February, 2022; v1 submitted 10 June, 2021;
originally announced June 2021.
-
Citations and gender diversity in reciprocal acknowledgement networks
Authors:
Keigo Kusumegi,
Yukie Sano
Abstract:
Acknowledgements in scientific articles suggest not only gratitude, but also the interactions among scientists. In this study, we examine the acknowledgement interactions employing data from open-access journals (PLOS series). We built an acknowledgement network where the nodes represent authors and acknowledged people, while the links correspond to being mentioned in acknowledgements. Employing m…
▽ More
Acknowledgements in scientific articles suggest not only gratitude, but also the interactions among scientists. In this study, we examine the acknowledgement interactions employing data from open-access journals (PLOS series). We built an acknowledgement network where the nodes represent authors and acknowledged people, while the links correspond to being mentioned in acknowledgements. Employing motif analysis, we showed how acknowledgement networks have developed, and how reciprocal relationships tend to emerge. To better understand these reciprocal relationships, we analysed the reciprocal sub-graphs of acknowledgement from two perspectives: citations and gender diversity. Firstly, we counted the number of citations, from both reciprocal and non-reciprocal authors. We found that reciprocal authors predominantly tend to cite other reciprocal authors rather than non-reciprocal ones. For gender diversity, we found that reciprocal pairs that include females tend to emerge more than male-male pairs of reciprocity in various fields, despite the fewer number of females.
△ Less
Submitted 4 April, 2021;
originally announced April 2021.
-
Identifying long-term periodic cycles and memories of collective emotion in online social media
Authors:
Yukie Sano,
Hideki Takayasu,
Shlomo Havlin,
Misako Takayasu
Abstract:
Collective emotion has been traditionally evaluated by questionnaire survey on a limited number of people. Recently, big data of written texts on the Internet has been available for analyzing collective emotion for very large scales. Although short-term reflection between collective emotion and real social phenomena has been widely studied, long-term dynamics of collective emotion has not been stu…
▽ More
Collective emotion has been traditionally evaluated by questionnaire survey on a limited number of people. Recently, big data of written texts on the Internet has been available for analyzing collective emotion for very large scales. Although short-term reflection between collective emotion and real social phenomena has been widely studied, long-term dynamics of collective emotion has not been studied so far due to the lack of long persistent data sets. In this study, we extracted collective emotion over a 10-year period from 3.6 billion Japanese blog articles. Firstly, we find that collective emotion shows clear periodic cycles, i.e., weekly and seasonal behaviors, accompanied with pulses caused by natural disasters. For example, April is represented by high Tension, probably due to starting school in Japan. We also identified long-term memory in the collective emotion that is characterized by the power-law decay of the autocorrelation function over several months.
△ Less
Submitted 17 March, 2019; v1 submitted 15 March, 2019;
originally announced March 2019.
-
Configuration model for correlation matrices preserving the node strength
Authors:
Naoki Masuda,
Sadamori Kojaku,
Yukie Sano
Abstract:
Correlation matrices are a major type of multivariate data. To examine properties of a given correlation matrix, a common practice is to compare the same quantity between the original correlation matrix and reference correlation matrices, such as those derived from random matrix theory, that partially preserve properties of the original matrix. We propose a model to generate such reference correla…
▽ More
Correlation matrices are a major type of multivariate data. To examine properties of a given correlation matrix, a common practice is to compare the same quantity between the original correlation matrix and reference correlation matrices, such as those derived from random matrix theory, that partially preserve properties of the original matrix. We propose a model to generate such reference correlation and covariance matrices for the given matrix. Correlation matrices are often analysed as networks, which are heterogeneous across nodes in terms of the total connectivity to other nodes for each node. Given this background, the present algorithm generates random networks that preserve the expectation of total connectivity of each node to other nodes, akin to configuration models for conventional networks. Our algorithm is derived from the maximum entropy principle. We will apply the proposed algorithm to measurement of clustering coefficients and community detection, both of which require a null model to assess the statistical significance of the obtained results.
△ Less
Submitted 22 July, 2018; v1 submitted 22 June, 2018;
originally announced June 2018.
-
Fake news propagate differently from real news even at early stages of spreading
Authors:
Zilong Zhao,
Jichang Zhao,
Yukie Sano,
Orr levy,
Hideki Takayasu,
Misako Takayasu,
Daqing Li,
Junjie Wu,
Shlomo Havlin
Abstract:
Social media can be a double-edged sword for society, either as a convenient channel exchanging ideas or as an unexpected conduit circulating fake news through a large population. While existing studies of fake news focus on theoretical modeling of propagation or identification methods based on machine learning, it is important to understand the realistic mechanisms between theoretical models and…
▽ More
Social media can be a double-edged sword for society, either as a convenient channel exchanging ideas or as an unexpected conduit circulating fake news through a large population. While existing studies of fake news focus on theoretical modeling of propagation or identification methods based on machine learning, it is important to understand the realistic mechanisms between theoretical models and black-box methods. Here we track large databases of fake news and real news in both, Weibo in China and Twitter in Japan from different culture, which include their complete traces of re-postings. We find in both online social networks that fake news spreads distinctively from real news even at early stages of propagation, e.g. five hours after the first re-postings. Our finding demonstrates collective structural signals that help to understand the different propagation evolution of fake news and real news. Different from earlier studies, identifying the topological properties of the information propagation at early stages may offer novel features for early detection of fake news in social media.
△ Less
Submitted 15 April, 2019; v1 submitted 9 March, 2018;
originally announced March 2018.
-
Statistical properties of fluctuations of time series representing the appearance of words in nationwide blog data and their applications: An example of observations and the modelling of fluctuation scalings of nonstationary time series
Authors:
Hayafumi Watanabe,
Yukie Sano,
Hideki Takayasu,
Misako Takayasu
Abstract:
To elucidate the non-trivial empirical statistical properties of fluctuations of a typical non-steady time series representing the appearance of words in blogs, we investigated approximately five billion Japanese blogs over a period of six years and analyse some corresponding mathematical models. First, we introduce a solvable non-steady extension of the random diffusion model, which can be deduce…
▽ More
To elucidate the non-trivial empirical statistical properties of fluctuations of a typical non-steady time series representing the appearance of words in blogs, we investigated approximately five billion Japanese blogs over a period of six years and analyse some corresponding mathematical models. First, we introduce a solvable non-steady extension of the random diffusion model, which can be deduced by modelling the behaviour of heterogeneous random bloggers. Next, we deduce theoretical expressions for both the temporal and ensemble fluctuation scalings of this model, and demonstrate that these expressions can reproduce all empirical scalings over eight orders of magnitude. Furthermore, we show that the model can reproduce other statistical properties of time series representing the appearance of words in blogs, such as functional forms of the probability density and correlations in the total number of blogs. As an application, we quantify the abnormality of special nationwide events by measuring the fluctuation scalings of 1771 basic adjectives.
△ Less
Submitted 7 November, 2016; v1 submitted 4 April, 2016;
originally announced April 2016.
-
T-partition systems and travel groupoids on a graph
Authors:
Jung Rae Cho,
Jeongmi Park,
Yoshio Sano
Abstract:
The notion of travel groupoids was introduced by L. Nebeský in 2006 in connection with a study on geodetic graphs. A travel groupoid is a pair of a set $V$ and a binary operation $*$ on $V$ satisfying two axioms. For a travel groupoid, we can associate a graph. We say that a graph $G$ has a travel groupoid if the graph associated with the travel groupoid is equal to $G$. Nebeský gave a characteriz…
▽ More
The notion of travel groupoids was introduced by L. Nebeský in 2006 in connection with a study on geodetic graphs. A travel groupoid is a pair of a set $V$ and a binary operation $*$ on $V$ satisfying two axioms. For a travel groupoid, we can associate a graph. We say that a graph $G$ has a travel groupoid if the graph associated with the travel groupoid is equal to $G$. Nebeský gave a characterization for finite graphs to have a travel groupoid. In this paper, we introduce the notion of T-partition systems on a graph and give a characterization of travel groupoids on a graph in terms of T-partition systems.
△ Less
Submitted 1 December, 2015;
originally announced December 2015.
-
On the smallest eigenvalues of the line graphs of some trees
Authors:
Akihiro Munemasa,
Yoshio Sano,
Tetsuji Taniguchi
Abstract:
In this paper, we study the characteristic polynomials of the line graphs of generalized Bethe trees. We give an infinite family of such graphs sharing the same smallest eigenvalue. Our family generalizes the family of coronas of complete graphs discovered by Cvetković and Stevanović.
In this paper, we study the characteristic polynomials of the line graphs of generalized Bethe trees. We give an infinite family of such graphs sharing the same smallest eigenvalue. Our family generalizes the family of coronas of complete graphs discovered by Cvetković and Stevanović.
△ Less
Submitted 20 October, 2014; v1 submitted 14 May, 2014;
originally announced May 2014.
-
The double competition multigraph of a digraph
Authors:
Jeongmi Park,
Yoshio Sano
Abstract:
In this article, we introduce the notion of the double competition multigraph of a digraph. We give characterizations of the double competition multigraphs of arbitrary digraphs, loopless digraphs, reflexive digraphs, and acyclic digraphs in terms of edge clique partitions of the multigraphs.
In this article, we introduce the notion of the double competition multigraph of a digraph. We give characterizations of the double competition multigraphs of arbitrary digraphs, loopless digraphs, reflexive digraphs, and acyclic digraphs in terms of edge clique partitions of the multigraphs.
△ Less
Submitted 31 January, 2016; v1 submitted 21 July, 2013;
originally announced July 2013.
-
The niche graphs of interval orders
Authors:
Jeongmi Park,
Yoshio Sano
Abstract:
The niche graph of a digraph $D$ is the (simple undirected) graph which has the same vertex set as $D$ and has an edge between two distinct vertices $x$ and $y$ if and only if $N^+_D(x) \cap N^+_D(y) \neq \emptyset$ or $N^-_D(x) \cap N^-_D(y) \neq \emptyset$, where $N^+_D(x)$ (resp. $N^-_D(x)$) is the set of out-neighbors (resp. in-neighbors) of $x$ in $D$. A digraph $D=(V,A)$ is called a semiorde…
▽ More
The niche graph of a digraph $D$ is the (simple undirected) graph which has the same vertex set as $D$ and has an edge between two distinct vertices $x$ and $y$ if and only if $N^+_D(x) \cap N^+_D(y) \neq \emptyset$ or $N^-_D(x) \cap N^-_D(y) \neq \emptyset$, where $N^+_D(x)$ (resp. $N^-_D(x)$) is the set of out-neighbors (resp. in-neighbors) of $x$ in $D$. A digraph $D=(V,A)$ is called a semiorder (or a unit interval order) if there exist a real-valued function $f:V \to \mathbb{R}$ on the set $V$ and a positive real number $δ\in \mathbb{R}$ such that $(x,y) \in A$ if and only if $f(x) > f(y) + δ$. A digraph $D=(V,A)$ is called an interval order if there exists an assignment $J$ of a closed real interval $J(x) \subset \mathbb{R}$ to each vertex $x \in V$ such that $(x,y) \in A$ if and only if $\min J(x) > \max J(y)$.
S. -R. Kim and F. S. Roberts characterized the competition graphs of semiorders and interval orders in 2002, and Y. Sano characterized the competition-common enemy graphs of semiorders and interval orders in 2010. In this note, we give characterizations of the niche graphs of semiorders and interval orders.
△ Less
Submitted 19 April, 2013;
originally announced April 2013.
-
Fat Hoffman graphs with smallest eigenvalue greater than -3
Authors:
Akihiro Munemasa,
Yoshio Sano,
Tetsuji Taniguchi
Abstract:
In this paper, we give a combinatorial characterization of the special graphs of fat Hoffman graphs containing $\mathfrak{K}_{1,2}$ with smallest eigenvalue greater than -3, where $\mathfrak{K}_{1,2}$ is the Hoffman graph having one slim vertex and two fat vertices.
In this paper, we give a combinatorial characterization of the special graphs of fat Hoffman graphs containing $\mathfrak{K}_{1,2}$ with smallest eigenvalue greater than -3, where $\mathfrak{K}_{1,2}$ is the Hoffman graph having one slim vertex and two fat vertices.
△ Less
Submitted 23 December, 2013; v1 submitted 16 November, 2012;
originally announced November 2012.
-
Fat Hoffman graphs with smallest eigenvalue at least $-1-τ$
Authors:
Akihiro Munemasa,
Yoshio Sano,
Tetsuji Taniguchi
Abstract:
In this paper, we show that all fat Hoffman graphs with smallest eigenvalue at least -1-τ, where τis the golden ratio, can be described by a finite set of fat (-1-τ)-irreducible Hoffman graphs. In the terminology of Woo and Neumaier, we mean that every fat Hoffman graph with smallest eigenvalue at least -1-τis an H-line graph, where H is the set of isomorphism classes of maximal fat (-1-τ)-irreduc…
▽ More
In this paper, we show that all fat Hoffman graphs with smallest eigenvalue at least -1-τ, where τis the golden ratio, can be described by a finite set of fat (-1-τ)-irreducible Hoffman graphs. In the terminology of Woo and Neumaier, we mean that every fat Hoffman graph with smallest eigenvalue at least -1-τis an H-line graph, where H is the set of isomorphism classes of maximal fat (-1-τ)-irreducible Hoffman graphs. It turns out that there are 37 fat (-1-τ)-irreducible Hoffman graphs, up to isomorphism.
△ Less
Submitted 30 April, 2013; v1 submitted 30 November, 2011;
originally announced November 2011.
-
On the rank functions of $\mathcal{H}$-matroids
Authors:
Yoshio Sano
Abstract:
The notion of $\mathcal{H}$-matroids was introduced by U. Faigle and S. Fujishige in 2009 as a general model for matroids and the greedy algorithm. They gave a characterization of $\mathcal{H}$-matroids by the greedy algorithm. In this note, we give a characterization of some $\mathcal{H}$-matroids by rank functions.
The notion of $\mathcal{H}$-matroids was introduced by U. Faigle and S. Fujishige in 2009 as a general model for matroids and the greedy algorithm. They gave a characterization of $\mathcal{H}$-matroids by the greedy algorithm. In this note, we give a characterization of some $\mathcal{H}$-matroids by rank functions.
△ Less
Submitted 31 January, 2016; v1 submitted 10 November, 2011;
originally announced November 2011.
-
Empirical analysis of collective human behavior for extraordinary events in blogosphere
Authors:
Yukie Sano,
Kenta Yamada,
Hayafumi Watanabe,
Hideki Takayasu,
Misako Takayasu
Abstract:
To uncover underlying mechanism of collective human dynamics, we survey more than 1.8 billion blog entries and observe the statistical properties of word appearances. We focus on words that show dynamic growth and decay with a tendency to diverge on a certain day. After careful pretreatment and fitting method, we found power laws generally approximate the functional forms of growth and decay with…
▽ More
To uncover underlying mechanism of collective human dynamics, we survey more than 1.8 billion blog entries and observe the statistical properties of word appearances. We focus on words that show dynamic growth and decay with a tendency to diverge on a certain day. After careful pretreatment and fitting method, we found power laws generally approximate the functional forms of growth and decay with various exponents values between -0.1 and -2.5. We also observe news words whose frequency increase suddenly and decay following power laws. In order to explain these dynamics, we propose a simple model of posting blogs involving a keyword, and its validity is checked directly from the data. The model suggests that bloggers are not only responding to the latest number of blogs but also suffering deadline pressure from the divergence day. Our empirical results can be used for predicting the number of blogs in advance and for estimating the period to return to the normal fluctuation level.
△ Less
Submitted 25 December, 2012; v1 submitted 24 July, 2011;
originally announced July 2011.