Finite-Time Analysis of Crises in a Chaotically Forced Ocean Model
February 5, 2023
| |
Physics
Mathematics
Chaotic Dynamics
Dynamical Systems
We consider a coupling of the Stommel box model and the Lorenz model, with
the goal of investigating the so-called "crises" that are known to occur given
sufficient forcing. In this context, a crisis is characterized as the
destruction of a...
A structure theorem for homology 4-manifolds with g2​≤5
February 5, 2023
|
Mathematics
Geometric Topology
Combinatorics
Numerous structural findings of homology manifolds have been derived in
various ways in relation to g2​-values. The homology 4-manifolds with
g2​≤5 are characterized combinatorially in this article. It is well-known
that all homol...
A High Performance Compiler for Very Large Scale Surface Code
Computations
February 5, 2023
| | | | |
Physics
Quantum Physics
We present the first high performance compiler for very large scale quantum
error correction: it translates an arbitrary quantum circuit to surface code
operations based on lattice surgery. Our compiler offers an end to end error
correction...
CECT: Controllable Ensemble CNN and Transformer for COVID-19 Image
Classification
February 5, 2023
|
Electrical Engineering and Systems Science
Computer Science
Image and Video Processing
Computer Vision and Pattern Recognition
Machine Learning
The COVID-19 pandemic has resulted in hundreds of million cases and numerous
deaths worldwide. Here, we develop a novel classification network CECT by
controllable ensemble convolutional neural network and transformer to provide a
timely an...
New proofs of the septic Rogers-Ramanujan identities
February 5, 2023
Mathematics
Number Theory
Classical Analysis and ODEs
Combinatorics
We give new proofs of the twelve Rogers-Ramanujan-type identities due to
Rogers and Slater that are traditionally associated with the moduli 7, 14 and
28....
Uncertainty-Aware and Reliable Neural MIMO Receivers via Modular
Bayesian Deep Learning
February 5, 2023
| | |
Computer Science
Electrical Engineering and Systems Science
Mathematics
Information Theory
Signal Processing
Information Theory
Deep learning is envisioned to play a key role in the design of future
wireless receivers. A popular approach to design learning-aided receivers
combines deep neural networks (DNNs) with traditional model-based receiver
algorithms, realizin...
Online Reinforcement Learning in Non-Stationary Context-Driven
Environments
February 4, 2023
| | | | | | | | |
Computer Science
Machine Learning
Artificial Intelligence
Machine Learning
Artificial Intelligence
We study online reinforcement learning (RL) in non-stationary environments,
where a time-varying exogenous context process affects the environment
dynamics. Online RL is challenging in such environments due to "catastrophic
forgetting" (CF)...
AttNS: Attention-Inspired Numerical Solving For Limited Data Scenarios
February 4, 2023
| | | | | | |
Computer Science
Mathematics
Machine Learning
Artificial Intelligence
Numerical Analysis
Numerical Analysis
Machine Learning
Artificial Intelligence
Numerical Analysis
Numerical Analysis
We propose the attention-inspired numerical solver (AttNS), a concise method
that helps the generalization and robustness issues faced by the AI-Hybrid
numerical solver in solving differential equations due to limited data. AttNS
is inspire...
A theoretical basis for MEV
February 4, 2023
| | |
Computer Science
Cryptography and Security
Cryptography and Security
Maximal Extractable Value (MEV) refers to a wide class of economic attacks to
public blockchains, where adversaries with the power to reorder, drop or insert
transactions in a block can "extract" value from smart contracts. Empirical
resear...
AUTOLYCUS: Exploiting Explainable AI (XAI) for Model Extraction Attacks
against Interpretable Models
February 4, 2023
| |
Computer Science
Machine Learning
Cryptography and Security
Explainable Artificial Intelligence (XAI) aims to uncover the decision-making
processes of AI models. However, the data used for such explanations can pose
security and privacy risks. Existing literature identifies attacks on machine
learni...