The Distance Conjecture of Ooguri and Vafa holds that any infinite-distance
limit in the moduli space of a quantum gravity theory must be accompanied by a
tower of exponentially light particles, which places tight constraints on the
low-ene...
CAT-Seg: Cost Aggregation for Open-Vocabulary Semantic Segmentation
March 21, 2023
| | | | |
Computer Science
Computer Vision and Pattern Recognition
Open-vocabulary semantic segmentation presents the challenge of labeling each
pixel within an image based on a wide range of text descriptions. In this work,
we introduce a novel cost-based approach to adapt vision-language foundation
model...
3-braid knots with maximal 4-genus
March 21, 2023
| | |
Mathematics
Geometric Topology
We classify 3-braid knots whose topological 4-genus coincides with their
Seifert genus, using McCoy's twisting method and the Xu normal form. In
addition, we give upper bounds for the topological 4-genus of positive and
strongly quasipositi...
Alpha shapes in kernel density estimation
March 21, 2023
|
Mathematics
Algebraic Topology
A foundational problem in topology and data is to determine the topological
type (e.g. the persistent homology groups) of the superlevel sets
L(a)=f−1[e−a,∞) of a sum of Gaussian kernels
$f(x)=\sum_i a_i \exp(-\lVert ...
Adaptive Negative Evidential Deep Learning for Open-set Semi-supervised
Learning
March 21, 2023
| | | | | |
Computer Science
Machine Learning
Artificial Intelligence
Computer Vision and Pattern Recognition
Semi-supervised learning (SSL) methods assume that labeled data, unlabeled
data and test data are from the same distribution. Open-set semi-supervised
learning (Open-set SSL) considers a more practical scenario, where unlabeled
data and tes...
Influencer Backdoor Attack on Semantic Segmentation
March 21, 2023
| | |
Computer Science
Computer Vision and Pattern Recognition
When a small number of poisoned samples are injected into the training
dataset of a deep neural network, the network can be induced to exhibit
malicious behavior during inferences, which poses potential threats to
real-world applications. W...
Marked length spectrum rigidity for Anosov surfaces
March 21, 2023
| |
Mathematics
Differential Geometry
Dynamical Systems
Let Σ be a smooth closed oriented surface of genus ≥2. We prove
that two metrics on Σ with the same marked length spectrum and Anosov
geodesic flow are isometric via an isometry isotopic to the identity. The proof
combin...
Quantics Tensor Cross Interpolation for High-Resolution, Parsimonious
Representations of Multivariate Functions in Physics and Beyond
March 21, 2023
| | | | |
Physics
Computational Physics
Strongly Correlated Electrons
Quantum Physics
Multivariate functions of continuous variables arise in countless branches of
science. Numerical computations with such functions typically involve a
compromise between two contrary desiderata: accurate resolution of the
functional dependen...
Observation of the 4f146s21S0−4f135d6s2(J=2) clock
transition at 431 nm in 171Yb
March 21, 2023
| | | |
Physics
Atomic Physics
We report on the observation of the 4f146s21S0−4f135d6s2(J=2) transition at 431 nm in 171Yb by depleting atoms in
a magneto-optical trap formed by the 6s21S0−6s6p3P1 intercombination
transition. The absolut...
X-CANIDS: Signal-Aware Explainable Intrusion Detection System for
Controller Area Network-Based In-Vehicle Network
March 21, 2023
| | |
Computer Science
Electrical Engineering and Systems Science
Cryptography and Security
Signal Processing
Controller Area Network (CAN) is an essential networking protocol that
connects multiple electronic control units (ECUs) in a vehicle. However,
CAN-based in-vehicle networks (IVNs) face security risks owing to the CAN
mechanisms. An adversa...