ترغب بنشر مسار تعليمي؟ اضغط هنا

193 - Jun Liu , Bei Ding , Yuan Yao 2021
Materials exhibiting zero thermal expansion (ZTE), namely, volume invariance during temperature change, can resist thermal shock and are highly desired in modern industries as high-precision components. However, pure ZTE materials are rare, especiall y those that are metallic. Here, we report the discovery of a pure metallic ZTE material: an orthorhombic Mn1-xNixCoSi spiral magnet. The introduction of Ni can efficiently enhance the ferromagnetic exchange interaction and construct the transition from a spiral magnetic state to a ferromagnetic-like state in MnCoSi-based alloys. Systematic in situ neutron powder diffraction revealed a new cycloidal spiral magnetic structure in bc plane at ground state which would transform to the helical spiral in the ab plane with increasing temperature. Combined with Lorentz transmission electron microscopy techniques, the cycloidal and helical spin order coherently rotated at varying periods along the c axis during the magnetic transition. This spin rotation drove the continuous movement of the coupled crystalline lattice and induced a large negative thermal expansion along the a axis, eventually leading to a wide-temperature ZTE effect. Our work not only introduces a new ZTE alloy but also presents a new mechanism by which to discover or design ZTE magnets.
266 - Yuan Yao , Mo Yang , Pantea Kiaei 2021
Lightweight block ciphers have been widely used in applications such as RFID tags, IoTs, and network sensors. Among them, with comparable parameters, the Light Encryption Device (LED) block cipher achieves the smallest area. However, implementation o f encryption algorithms manifest side-channel leakage, therefore, it is crucial to protect their design against side-channel analyses. In this paper, we present a threshold implementation of the LED cipher which has 64-bit data input and 128-bit key. The presented design splits secret information among multiple shares to achieve a higher security level. We demonstrate that our implementation can protect against first-order power side-channel attacks. As a cost, the design area is almost doubled and the maximum operating frequency is degraded by 30%. To make our design verifiable, we have also open-sourced our design online.
151 - Zhiyuan Yao , Lei Pan , Shang Liu 2021
In this letter, we study the PXP Hamiltonian with an external magnetic field that exhibits both quantum scar states and quantum criticality. It is known that this model hosts a series of quantum many-body scar states violating quantum thermalization at zero magnetic field, and it also exhibits an Ising quantum phase transition driven by finite magnetic field. Although the former involves the properties of generic excited states and the latter concerns the low-energy physics, we discover two surprising connections between them, inspired by the observation that both states possess log-volume law entanglement entropies. First, we show that the quantum many-body scar states can be tracked to a set of quantum critical states, whose nature can be understood as pair-wisely occupied Fermi sea states. Second, we show that the partial violation of quantum thermalization diminishes in the quantum critical regime. We envision that these connections can be extended to general situations and readily verified in existing cold atom experimental platforms.
Unsupervised learning algorithms (e.g., self-supervised learning, auto-encoder, contrastive learning) allow deep learning models to learn effective image representations from large-scale unlabeled data. In medical image analysis, even unannotated dat a can be difficult to obtain for individual labs. Fortunately, national-level efforts have been made to provide efficient access to obtain biomedical image data from previous scientific publications. For instance, NIH has launched the Open-i search engine that provides a large-scale image database with free access. However, the images in scientific publications consist of a considerable amount of compound figures with subplots. To extract and curate individual subplots, many different compound figure separation approaches have been developed, especially with the recent advances in deep learning. However, previous approaches typically required resource extensive bounding box annotation to train detection models. In this paper, we propose a simple compound figure separation (SimCFS) framework that uses weak classification annotations from individual images. Our technical contribution is three-fold: (1) we introduce a new side loss that is designed for compound figure separation; (2) we introduce an intra-class image augmentation method to simulate hard cases; (3) the proposed framework enables an efficient deployment to new classes of images, without requiring resource extensive bounding box annotations. From the results, the SimCFS achieved a new state-of-the-art performance on the ImageCLEF 2016 Compound Figure Separation Database. The source code of SimCFS is made publicly available at https://github.com/hrlblab/ImageSeperation.
Side-channel and fault injection attacks reveal secret information by monitoring or manipulating the physical effects of computations involving secret variables. Circuit-level countermeasures help to deter these attacks, and traditionally such counte rmeasures have been developed for each attack vector separately. We demonstrate a multipurpose ring oscillator design - Programmable Ring Oscillator (PRO) to address both fault attacks and side-channel attacks in a generic, application-independent manner. PRO, as an integrated primitive, can provide on-chip side-channel resistance, power monitoring, and fault detection capabilities to a secure design. We present a grid of PROs monitoring the on-chip power network to detect anomalies. Such power anomalies may be caused by external factors such as electromagnetic fault injection and power glitches, as well as by internal factors such as hardware Trojans. By monitoring the frequency of the ring oscillators, we are able to detect the on-chip power anomaly in time as well as in location. Moreover, we show that the PROs can also inject a random noise pattern into a designs power consumption. By randomly switching the frequency of a ring oscillator, the resulting power-noise pattern significantly reduces the power-based side-channel leakage of a cipher. We discuss the design of PRO and present measurement results on a Xilinx Spartan-6 FPGA prototype, and we show that side-channel and fault vulnerabilities can be addressed at a low cost by introducing PRO to the design. We conclude that PRO can serve as an application-independent, multipurpose countermeasure.
51 - Yuan Yao , C. J. Umrigar 2021
We study several approaches to orbital optimization in selected configuration interaction plus perturbation theory (SCI+PT) methods, and test them on the ground and excited states of three molecules using the semistochastic heatbath configuration int eraction (SHCI) method. We discuss the ways in which the orbital optimization problem in SCI resembles and differs from that in complete active space self-consistent field (CASSCF). Starting from natural orbitals, these approaches divide into three classes of optimization methods according to how they treat coupling between configuration interaction (CI) coefficients and orbital parameters, namely uncoupled, fully coupled, and quasi-fully coupled methods. We demonstrate that taking the coupling into account is crucial for fast convergence and recommend two quasi-fully coupled methods for such applications: accelerated diagonal Newton and Broyden-Fletcher-Goldfarb-Shanno (BFGS).
137 - Yuan Yao , Ao Zhang , Xu Han 2021
Scene graph generation aims to identify objects and their relations in images, providing structured image representations that can facilitate numerous applications in computer vision. However, scene graph models usually require supervised learning on large quantities of labeled data with intensive human annotation. In this work, we propose visual distant supervision, a novel paradigm of visual relation learning, which can train scene graph models without any human-labeled data. The intuition is that by aligning commonsense knowledge bases and images, we can automatically create large-scale labeled data to provide distant supervision for visual relation learning. To alleviate the noise in distantly labeled data, we further propose a framework that iteratively estimates the probabilistic relation labels and eliminates the noisy ones. Comprehensive experimental results show that our distantly supervised model outperforms strong weakly supervised and semi-supervised baselines. By further incorporating human-labeled data in a semi-supervised fashion, our model outperforms state-of-the-art fully supervised models by a large margin (e.g., 8.3 micro- and 7.8 macro-recall@50 improvements for predicate classification in Visual Genome evaluation). We make the data and code for this paper publicly available at https://github.com/thunlp/VisualDS.
The tau lepton plays important role in the correlation between the low-energy neutrino oscillation data and the lepton flavor structure in heavy neutrino decay. We investigate the lepton flavor signatures with tau lepton at hadron collider through le pton number violating (LNV) processes. In the Type I Seesaw with U$(1)_{rm B-L}$ extension, we study the pair production of heavy neutrinos via a $Z$ resonance. We present a detailed assessment of the search sensitivity to the channels with tau lepton in the subsequent decay of heavy neutrinos. For the benchmark model with $Z$ only coupled to the third generation fermions, we find that the future circular collider (FCC-hh) can discover the LNV signal with tau lepton for $M_{Z}$ up to 2.2 (3) TeV with the gauge coupling $g=0.6$ and the integrated luminosity of 3 (30) ab$^{-1}$. The test on the flavor combinations of SM charged leptons would reveal the specific nature of different heavy neutrinos.
Reliable evaluation of adversarial defenses is a challenging task, currently limited to an expert who manually crafts attacks that exploit the defenses inner workings, or to approaches based on ensemble of fixed attacks, none of which may be effectiv e for the specific defense at hand. Our key observation is that custom attacks are composed from a set of reusable building blocks, such as fine-tuning relevant attack parameters, network transformations, and custom loss functions. Based on this observation, we present an extensible framework that defines a search space over these reusable building blocks and automatically discovers an effective attack on a given model with an unknown defense by searching over suitable combinations of these blocks. We evaluated our framework on 23 adversarial defenses and showed it outperforms AutoAttack, the current state-of-the-art tool for reliable evaluation of adversarial defenses: our discovered attacks are either stronger, producing 3.0%-50.8% additional adversarial examples (10 cases), or are typically 2x faster while enjoying similar adversarial robustness (13 cases).
In this paper, we present a novel two-pass approach to unify streaming and non-streaming end-to-end (E2E) speech recognition in a single model. Our model adopts the hybrid CTC/attention architecture, in which the conformer layers in the encoder are m odified. We propose a dynamic chunk-based attention strategy to allow arbitrary right context length. At inference time, the CTC decoder generates n-best hypotheses in a streaming way. The inference latency could be easily controlled by only changing the chunk size. The CTC hypotheses are then rescored by the attention decoder to get the final result. This efficient rescoring process causes very little sentence-level latency. Our experiments on the open 170-hour AISHELL-1 dataset show that, the proposed method can unify the streaming and non-streaming model simply and efficiently. On the AISHELL-1 test set, our unified model achieves 5.60% relative character error rate (CER) reduction in non-streaming ASR compared to a standard non-streaming transformer. The same model achieves 5.42% CER with 640ms latency in a streaming ASR system.
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا