
This is the second part of the project toward an effective algorithm to
evaluate all genus GromovWitten invariants of quintic CalabiYau threefolds.
In this paper, the localization formula is derived, and algorithms toward
evaluating these GromovWitten invariants are derived.

We geometrically describe a canonical sequence of modular blowups of the
relative Picard stack of the Artin stack of prestable genus two curves. The
final blowup stack locally diagonalizes certain tautological derived objects.
This implies a resolution of the primary component of the moduli space of genus
two stable maps to projective space and meanwhile makes the whole moduli space
admit only normal crossing singularities. Our approach should extend to higher
genera.

We construct a cosection localized virtual structure sheaf when a
DeligneMumford stack is equipped with a perfect obstruction theory and a
cosection of the obstruction sheaf.

A multistep steadystate (MSSS) method is proposed here for the measurement
of low permeability. This new method can accurately and easily measure very low
permeabilities of rock samples using a new setup, where the targeted rock
sample and ordinary apparatus components are connected with a reference rock
sample to form a series circuit. Any conventional rock sample with high
permeability could be used as a reference rock sample such that the traditional
steadystate measurement is feasible to accurately determine its permeability
as a reference value in the MSSS method. The challenging measurement of tiny
mass flux rate by advanced pump system is avoided and the permeability of
targeted rock sample can be directly computed using the pressure drops,
sectional areas and lengths of the two connected rock samples, and the known
permeability of the reference rock sample, based on the mass conservation
principle in a series circuit at steady state. Multistep measurements using
additional reference rock samples will be needed if the pressure drop across
the first reference rock sample is too small to be accurately measured due to
high permeability ratio when it is connected with the targeted rock sample to
form a series circuit. The relative pressure drops can be small since the
measurement of flow speed is unnecessary, which improves the accuracy in
studying the dependence of gas permeability on the pore pressure. Consequently,
the advantages of the MSSS method include low expense, simplicity, high
accuracy and efficiency.

Covert communication aims to hide the very existence of wireless
transmissions in order to guarantee a strong security in wireless networks. In
this work, we examine the possibility and achievable performance of covert
communication in oneway relay networks. Specifically, the relay is greedy and
opportunistically transmits its own information to the destination covertly on
top of forwarding the source's message, while the source tries to detect this
covert transmission to discover the illegitimate usage of the resource (e.g.,
power, spectrum) allocated only for the purpose of forwarding source's
information. We propose two strategies for the relay to transmit its covert
information, namely fixedrate and fixedpower transmission schemes, for which
the source's detection limits are analysed in terms of the false alarm and miss
detection rates and the achievable effective covert rates from the relay to
destination are derived. Our examination determines the conditions under which
the fixedrate transmission scheme outperforms the fixedpower transmission
scheme, and vice versa, which enables the relay to achieve the maximum
effective covert rate. Our analysis indicates that the relay has to forward the
source's message to shield its covert transmission and the effective covert
rate increases with its forwarding ability (e.g., its maximum transmit power).

Topological orders are a class of exotic states of matter characterized by
patterns of longrange entanglement. Certain topologically ordered systems are
proposed as potential realization of faulttolerant quantum computation.
Topological orders can arise in twodimensional spinlattice models. In this
paper, we engineer a timedependent Hamiltonian to prepare a topologically
ordered state through adiabatic evolution. The other sectors in the degenerate
groundstate space of the model are obtained by applying nontrivial operations
corresponding to closed string operators. Each sector is highly entangled, as
shown from the completely reconstructed density matrices. This paves the way
towards exploring the properties of topological orders and the application of
topological orders in topological quantum memory.

In this paper, we studied a SLAM method for vectorbased road structure
mapping using multibeam LiDAR. We propose to use the polyline as the primary
mapping element instead of grid cell or point cloud, because the vectorbased
representation is precise and lightweight, and it can directly generate
vectorbased HighDefinition (HD) driving map as demanded by autonomous driving
systems. We explored: 1) the extraction and vectorization of road structures
based on local probabilistic fusion. 2) the efficient vectorbased matching
between frames of road structures. 3) the loop closure and optimization based
on the posegraph. In this study, we took a specific road structure, the road
boundary, as an example. We applied the proposed matching method in three
different scenes and achieved the average absolute matching error of 0.07 m. We
further applied the mapping system to the urban road with the length of 860
meters and achieved an average global accuracy of 0.466 m without the help of
high precision GPS.

TiEV is an autonomous driving platform implemented by Tongji University of
China. The vehicle is drivebywire and is fully powered by electricity. We
devised the software system of TiEV from scratch, which is capable of driving
the vehicle autonomously in urban paths as well as on fast express roads. We
describe our whole system, especially novel modules of probabilistic perception
fusion, incremental mapping, the 1st and the 2nd planning and the overall
safety concern. TiEV finished 2016 and 2017 Intelligent Vehicle Future
Challenge of China held at Changshu. We show our experiences on the development
of autonomous vehicles and future trends.

The phenomenon of phase separation into antiferromagnetic (AFM) and
superconducting (SC) or normalstate regions has great implication for the
origin of hightemperature (highTc) superconductivity. However, the occurrence
of an intrinsic antiferromagnetism above the Tc of (Li, Fe)OHFeSe
superconductor is questioned. Here we report a systematic study on a series of
(Li, Fe)OHFeSe single crystal samples with Tc up to ~41 K. We observe an
evident drop in the static magnetization at Tafm ~125 K, in some of the SC (Tc
< ~38 K, cell parameter c < ~9.27 {\AA}) and nonSC samples. We verify that
this AFM signal is intrinsic to (Li, Fe)OHFeSe. Thus, our observations indicate
mesoscopictomacroscopic coexistence of an AFM state with the normal (below
Tafm) or SC (below Tc) state in (Li, Fe)OHFeSe. We explain such coexistence by
electronic phase separation, similar to that in highTc cuprates and iron
arsenides. However, such an AFM signal can be absent in some other samples of
(Li, Fe)OHFeSe, particularly it is never observed in the SC samples of Tc > ~38
K, owing to a spatial scale of the phase separation too small for the
macroscopic magnetic probe. For this case, we propose a microscopic electronic
phase separation. It is suggested that the microscopic static phase separation
reaches vanishing point in highTc (Li, Fe)OHFeSe, by the occurrence of
twodimensional AFM spin fluctuations below nearly the same temperature as Tafm
reported previously for a (Li, Fe)OHFeSe (Tc ~42 K) single crystal. A complete
phase diagram is thus established. Our study provides key information of the
underlying physics for highTc superconductivity.

In this paper, wireless power transfer and cooperative jamming (CJ) are
combined to enhance physical security in public transportation networks. First,
a new secure system model with both fixed and mobile jammers is proposed to
guarantee secrecy in the worstcase scenario. All jammers are endowed with
energy harvesting (EH) capability. Following this, two CJ based schemes, namely
BCJSRM and BCJTPM, are proposed, where SRM and TPM are short for secrecy
rate maximization and transmit power minimization, respectively. They
respectively maximize the secrecy rate (SR) with transmit power constraint and
minimize the transmit power of the BS with SR constraint, by optimizing
beamforming vector and artificial noise covariance matrix. To further reduce
the complexity of our proposed optimal schemes, their lowcomplexity (LC)
versions, called LCBCJSRM and LCBCJTPM are developed. Simulation results
show that our proposed schemes, BCJSRM and BCJTPM, achieve significant SR
performance improvement over existing zeroforcing and QoSD methods.
Additionally, the SR performance of the proposed LC schemes are close to those
of their original versions.

In this paper, a new datadriven information hiding scheme called generative
steganography by sampling (GSS) is proposed. The stego is directly sampled by a
powerful generator without an explicit cover. Secret key shared by both parties
is used for message embedding and extraction, respectively. JensenShannon
Divergence is introduced as new criteria for evaluation of the security of the
generative steganography. Based on these principles, a simple practical
generative steganography method is proposed using semantic image inpainting.
Experiments demonstrate the potential of the framework through qualitative and
quantitative evaluation of the generated stego images.

Due to network practices such as traffic engineering and multihoming, the
number of routesalso known as IP prefixesin the global forwarding tables
has been increasing significantly in the last decade and continues growing in a
super linear trend. One of the most promising solutions is to use smart
Forwarding Information Base (FIB) aggregation algorithms to aggregate the
prefixes and convert a large table into a small one. Doing so poses a research
question, however, i.e., how can we quickly verify that the original table
yields the same forwarding behaviors as the aggregated one? We answer this
question in this paper, including addressing the challenges caused by the
longest prefix matching (LPM) lookups. In particular, we propose the VeriTable
algorithm that can employ a single tree/trie traversal to quickly check if
multiple forwarding tables are forwarding equivalent, as well as if they could
result in routing loops or black holes. The VeriTable algorithm significantly
outperforms the stateoftheart work for both IPv4 and IPv6 tables in every
aspect, including the total running time, memory access times and memory
consumption.

We propose to recover 3D shape structures from single RGB images, where
structure refers to shape parts represented by cuboids and part relations
encompassing connectivity and symmetry. Given a single 2D image with an object
depicted, our goal is automatically recover a cuboid structure of the object
parts as well as their mutual relations. We develop a convolutionalrecursive
autoencoder comprised of structure parsing of a 2D image followed by structure
recovering of a cuboid hierarchy. The encoder is achieved by a multiscale
convolutional network trained with the task of shape contour estimation,
thereby learning to discern object structures in various forms and scales. The
decoder fuses the features of the structure parsing network and the original
image, and recursively decodes a hierarchy of cuboids. Since the decoder
network is learned to recover part relations including connectivity and
symmetry explicitly, the plausibility and generality of part structure recovery
can be ensured. The two networks are jointly trained using the training data of
contourmask and cuboid structure pairs. Such pairs are generated by rendering
stock 3D CAD models coming with part segmentation. Our method achieves
unprecedentedly faithful and detailed recovery of diverse 3D part structures
from singleview 2D images. We demonstrate two applications of our method
including structureguided completion of 3D volumes reconstructed from
singleview images and structureaware interactive editing of 2D images.

Monogamy relations characterize the distributions of entanglement in
multipartite systems. We investigate monogamy relations related to the
concurrence C, the entanglement of formation E, negativity Nc and Tsallisq
entanglement Tq. Monogamy relations for the $\alpha$th power of entanglement
have been derived, which are tighter than the existing entanglement monogamy
relations for some classes of quantum states. Detailed examples are presented.

Considering Rayleigh fading channels, in this work we adopt channel inversion
power control to achieve covert communications, where a transmitter can
possibly hide itself from a warden while transmitting information to a
receiver. Specifically, we examine the performance of the achieved covert
communications in two scenarios in terms of the effective covert rate (ECR),
which quantifies the amount of information that the transmitter can reliably
convey to the receiver subject to the warden's detection error probability
being no less than some specific value. In the first scenario, the noise
uncertainty at the warden serves as the enabler of covert communications and
our examination shows that increasing the noise uncertainty at the warden and
the receiver simultaneously may not continuously improve the ECR. In the second
scenario, covert communications are aided by a fullduplex receiver, which
always transmits artificial noise (AN) with a random power. Our analysis
indicates that the achieved ECR approaches to an upper bound as the transmit
power of AN approaches to infinity. This work provides useful guidelines and
performance limits on achieving covert communications and potentially hiding a
transmitter in practical Rayleigh fading channels.

Secure wireless information and power transfer based on directional
modulation is conceived for amplifyandforward (AF) relaying networks.
Explicitly, we first formulate a secrecy rate maximization (SRM) problem, which
can be decomposed into a twinlevel optimization problem and solved by a
onedimensional (1D) search and semidefinite relaxation (SDR) technique. Then
in order to reduce the search complexity, we formulate an optimization problem
based on maximizing the signaltoleakageANnoiseratio (MaxSLANR) criterion,
and transform it into a SDR problem. Additionally, the relaxation is proved to
be tight according to the classic KarushKuhnTucker (KKT) conditions. Finally,
to reduce the computational complexity, a successive convex approximation (SCA)
scheme is proposed to find a nearoptimal solution. The complexity of the SCA
scheme is much lower than that of the SRM and the MaxSLANR schemes. Simulation
results demonstrate that the performance of the SCA scheme is very close to
that of the SRM scheme in terms of its secrecy rate and bit error rate (BER),
but much better than that of the zero forcing (ZF) scheme.

Many online applications, such as online social networks or knowledge bases,
are often attacked by malicious users who commit different types of actions
such as vandalism on Wikipedia or fraudulent reviews on eBay. Currently, most
of the fraud detection approaches require a training dataset that contains
records of both benign and malicious users. However, in practice, there are
often no or very few records of malicious users. In this paper, we develop
oneclass adversarial nets (OCAN) for fraud detection using training data with
only benign users. OCAN first uses LSTMAutoencoder to learn the
representations of benign users from their sequences of online activities. It
then detects malicious users by training a discriminator with a complementary
GAN model that is different from the regular GAN model. Experimental results
show that our OCAN outperforms the stateoftheart oneclass classification
models and achieves comparable performance with the latest multisource LSTM
model that requires both benign and malicious users in the training phase.

We consider three challenges in multiblock Alternating Direction Method of
Multipliers (ADMM): building convergence conditions for ADMM with any block
(variable) sequence, finding available block sequences to be fit for ADMM, and
designing useful parameter controllers for ADMM with unfixed parameters. To
address these challenges, we develop a switched control framework for studying
multiblock ADMM. First, since ADMM recursively and alternately updates the
blockvariables, it is converted into a discretetime switched dynamical
system. Second, we study exponential stability and stabilizability of the
switched system for linear convergence analysis and design of ADMM by employing
switched Lyapunov functions. Moreover, linear matrix inequalities conditions
are proposed to ensure convergence of ADMM under arbitrary sequence, to find
convergent sequences, and to design the fixed parameters. These conditions are
checked and solved by employing semidefinite programming. Numerical experiments
further verify the effectiveness of our proposed theories.

We extend profound results in pluripotential theory on Kahler manifolds to
Sasaki setting via its transverse Kahler structure. As in Kahler case, these
results form a very important piece to solve the existence of Sasaki metrics
with constant scalar curvature (cscs) in terms of properness of Kenergy. One
main result is to generalize T. Darvas' theory on the geometric structure of
the space of Kahler potentials in Sasaki setting. Along the way we extend most
of corresponding results in pluripotential theory to Sasaki setting via its
transverse Kahler structure.

We present uncertainty relations based on WignerYanaseDyson skew
information with quantum memory. Uncertainty inequalities both in product and
summation forms are derived. \mbox{It is} shown that the lower bounds contain
two terms: one characterizes the degree of compatibility of two measurements,
and the other is the quantum correlation between the measured system and the
quantum memory. Detailed examples are given for product, separable and
entangled states.

The electronic nematic phase is characterized as an ordered state of matter
with rotational symmetry breaking, and has been well studied in the quantum
Hall system and the high$T_c$ superconductors, regardless of cuprate or
pnictide family. The nematic state in high$T_c$ systems often relates to the
structural transition or electronic instability in the normal phase.
Nevertheless, the electronic states below the superconducting transition
temperature is still an open question. With highresolution scanning tunneling
microscope measurements, direct observation of vortex core in FeSe thin films
revealed the nematic superconducting state by Song \emph{et al}. Here,
motivated by the experiment, we construct the extended GinzburgLandau free
energy to describe the elliptical vortex, where a mixed \emph{s}wave and
\emph{d}wave superconducting order is coupled to the nematic order. The
nematic order induces the mixture of two superconducting orders and enhances
the anisotropic interaction between the two superconducting orders, resulting
in a symmetry breaking from $C_4$ to $C_2$. Consequently, the vortex cores are
stretched into an elliptical shape. In the equilibrium state, the elliptical
vortices assemble a lozengelike vortex lattice, being well consistent with
experimental results.

In the past decades, intensive efforts have been put to design various loss
functions and metric forms for metric learning problem. These improvements have
shown promising results when the test data is similar to the training data.
However, the trained models often fail to produce reliable distances on the
ambiguous test pairs due to the distribution bias between training set and test
set. To address this problem, the Adversarial Metric Learning (AML) is proposed
in this paper, which automatically generates adversarial pairs to remedy the
distribution bias and facilitate robust metric learning. Specifically, AML
consists of two adversarial stages, i.e. confusion and distinguishment. In
confusion stage, the ambiguous but critical adversarial data pairs are
adaptively generated to mislead the learned metric. In distinguishment stage, a
metric is exhaustively learned to try its best to distinguish both the
adversarial pairs and the original training pairs. Thanks to the challenges
posed by the confusion stage in such competing process, the AML model is able
to grasp plentiful difficult knowledge that has not been contained by the
original training pairs, so the discriminability of AML can be significantly
improved. The entire model is formulated into optimization framework, of which
the global convergence is theoretically proved. The experimental results on toy
data and practical datasets clearly demonstrate the superiority of AML to the
representative stateoftheart metric learning methodologies.

In this paper, given the beamforming vector of confidential messages and
artificial noise (AN) projection matrix and total power constraint, a power
allocation (PA) strategy of maximizing secrecy rate (MaxSR) is proposed for
secure directional modulation (DM) networks. By the method of Lagrange
multiplier, the analytic expression of the proposed PA strategy is derived. To
confirm the benefit from the MaxSRbased PA strategy, we take the nullspace
projection (NSP) beamforming scheme as an example and derive its closedform
expression of optimal PA strategy. From simulation results, we find the
following facts: in the medium and high signaltonoiseratio (SNR) regions,
compared with three typical PA parameters such $\beta=0.1, 0.5$, and $0.9$, the
optimal PA shows a substantial SR performance gain with maximum gain percent up
to more than $60\%$. Additionally, as the PA factor increases from 0 to 1, the
achievable SR increases accordingly in the low SNR region whereas it first
increases and then decreases in the medium and high SNR regions, where the SR
can be approximately viewed as a convex function of the PA factor. Finally, as
the number of antennas increases, the optimal PA factor becomes large and tends
to one in the medium and high SNR region. In other words, the contribution of
AN to SR can be trivial in such a situation.

Many tests have been proposed to remedy the classical Hotelling's $T^2$ test
in the "large $p$, small $n$" paradigm, but the existence of an optimal
sumofsquares type test has not been explored. This paper shows that under
certain conditions, the population Hotelling's $T^2$ test with the known
$\Sigma^{1}$ attains the best power among all the $L_2$norm based tests with
the data transformation by $\Sigma^{\eta}$ for $\eta \in (\infty, \infty)$. To
extend the result to the case of unknown $\Sigma^{1}$, we propose a
NeighborhoodAssisted Hotelling's $T^2$ statistic obtained by replacing the
inverse of sample covariance matrix in the classical Hotelling's $T^2$
statistic with a regularized covariance estimator. Utilizing a regression
model, we establish its asymptotic normality under mild conditions. We show
that the proposed test is able to match the performance of the population
Hotelling's $T^2$ test under certain conditions, and thus possesses certain
optimality. Moreover, it can adaptively attain the best power by empirically
choosing a neighborhood size to maximize its signaltonoise ratio. Simulation
experiments and case studies are given to demonstrate the empirical performance
of the proposed test.

In this work, an adaptive and robust nullspace projection (ARNSP) scheme is
proposed for secure transmission with artificial noise (AN)aided directional
modulation (DM) in wireless networks. The proposed scheme is carried out in
three steps. Firstly, the directions of arrival (DOAs) of the signals from the
desired user and eavesdropper are estimated by the Root Multiple Signal
Classificaiton (RootMUSIC) algorithm and the related signaltonoise ratios
(SNRs) are estimated based on the ratio of the corresponding eigenvalue to the
minimum eigenvalue of the covariance matrix of the received signals. In the
second step, the value intervals of DOA estimation errors are predicted based
on the DOA and SNR estimations. Finally, a robust NSP beamforming DM system is
designed according to the aforeobtained estimations and predictions. Our
examination shows that the proposed scheme can significantly outperform the
conventional nonadaptive robust scheme and nonrobust NSP scheme in terms of
achieving a much lower bit error rate (BER) at the desired user and a much
higher secrecy rate (SR). In addition, the BER and SR performance gains
achieved by the proposed scheme relative to other schemes increase with the
value range of DOA estimation error.