• This is the second part of the project toward an effective algorithm to evaluate all genus Gromov-Witten invariants of quintic Calabi-Yau threefolds. In this paper, the localization formula is derived, and algorithms toward evaluating these Gromov-Witten invariants are derived.
  • We geometrically describe a canonical sequence of modular blowups of the relative Picard stack of the Artin stack of pre-stable genus two curves. The final blowup stack locally diagonalizes certain tautological derived objects. This implies a resolution of the primary component of the moduli space of genus two stable maps to projective space and meanwhile makes the whole moduli space admit only normal crossing singularities. Our approach should extend to higher genera.
  • We construct a cosection localized virtual structure sheaf when a Deligne-Mumford stack is equipped with a perfect obstruction theory and a cosection of the obstruction sheaf.
  • A multi-step steady-state (MSSS) method is proposed here for the measurement of low permeability. This new method can accurately and easily measure very low permeabilities of rock samples using a new setup, where the targeted rock sample and ordinary apparatus components are connected with a reference rock sample to form a series circuit. Any conventional rock sample with high permeability could be used as a reference rock sample such that the traditional steady-state measurement is feasible to accurately determine its permeability as a reference value in the MSSS method. The challenging measurement of tiny mass flux rate by advanced pump system is avoided and the permeability of targeted rock sample can be directly computed using the pressure drops, sectional areas and lengths of the two connected rock samples, and the known permeability of the reference rock sample, based on the mass conservation principle in a series circuit at steady state. Multi-step measurements using additional reference rock samples will be needed if the pressure drop across the first reference rock sample is too small to be accurately measured due to high permeability ratio when it is connected with the targeted rock sample to form a series circuit. The relative pressure drops can be small since the measurement of flow speed is unnecessary, which improves the accuracy in studying the dependence of gas permeability on the pore pressure. Consequently, the advantages of the MSSS method include low expense, simplicity, high accuracy and efficiency.
  • Covert communication aims to hide the very existence of wireless transmissions in order to guarantee a strong security in wireless networks. In this work, we examine the possibility and achievable performance of covert communication in one-way relay networks. Specifically, the relay is greedy and opportunistically transmits its own information to the destination covertly on top of forwarding the source's message, while the source tries to detect this covert transmission to discover the illegitimate usage of the resource (e.g., power, spectrum) allocated only for the purpose of forwarding source's information. We propose two strategies for the relay to transmit its covert information, namely fixed-rate and fixed-power transmission schemes, for which the source's detection limits are analysed in terms of the false alarm and miss detection rates and the achievable effective covert rates from the relay to destination are derived. Our examination determines the conditions under which the fixed-rate transmission scheme outperforms the fixed-power transmission scheme, and vice versa, which enables the relay to achieve the maximum effective covert rate. Our analysis indicates that the relay has to forward the source's message to shield its covert transmission and the effective covert rate increases with its forwarding ability (e.g., its maximum transmit power).
  • Topological orders are a class of exotic states of matter characterized by patterns of long-range entanglement. Certain topologically ordered systems are proposed as potential realization of fault-tolerant quantum computation. Topological orders can arise in two-dimensional spin-lattice models. In this paper, we engineer a time-dependent Hamiltonian to prepare a topologically ordered state through adiabatic evolution. The other sectors in the degenerate ground-state space of the model are obtained by applying nontrivial operations corresponding to closed string operators. Each sector is highly entangled, as shown from the completely reconstructed density matrices. This paves the way towards exploring the properties of topological orders and the application of topological orders in topological quantum memory.
  • In this paper, we studied a SLAM method for vector-based road structure mapping using multi-beam LiDAR. We propose to use the polyline as the primary mapping element instead of grid cell or point cloud, because the vector-based representation is precise and lightweight, and it can directly generate vector-based High-Definition (HD) driving map as demanded by autonomous driving systems. We explored: 1) the extraction and vectorization of road structures based on local probabilistic fusion. 2) the efficient vector-based matching between frames of road structures. 3) the loop closure and optimization based on the pose-graph. In this study, we took a specific road structure, the road boundary, as an example. We applied the proposed matching method in three different scenes and achieved the average absolute matching error of 0.07 m. We further applied the mapping system to the urban road with the length of 860 meters and achieved an average global accuracy of 0.466 m without the help of high precision GPS.
  • TiEV is an autonomous driving platform implemented by Tongji University of China. The vehicle is drive-by-wire and is fully powered by electricity. We devised the software system of TiEV from scratch, which is capable of driving the vehicle autonomously in urban paths as well as on fast express roads. We describe our whole system, especially novel modules of probabilistic perception fusion, incremental mapping, the 1st and the 2nd planning and the overall safety concern. TiEV finished 2016 and 2017 Intelligent Vehicle Future Challenge of China held at Changshu. We show our experiences on the development of autonomous vehicles and future trends.
  • The phenomenon of phase separation into antiferromagnetic (AFM) and superconducting (SC) or normal-state regions has great implication for the origin of high-temperature (high-Tc) superconductivity. However, the occurrence of an intrinsic antiferromagnetism above the Tc of (Li, Fe)OHFeSe superconductor is questioned. Here we report a systematic study on a series of (Li, Fe)OHFeSe single crystal samples with Tc up to ~41 K. We observe an evident drop in the static magnetization at Tafm ~125 K, in some of the SC (Tc < ~38 K, cell parameter c < ~9.27 {\AA}) and non-SC samples. We verify that this AFM signal is intrinsic to (Li, Fe)OHFeSe. Thus, our observations indicate mesoscopic-to-macroscopic coexistence of an AFM state with the normal (below Tafm) or SC (below Tc) state in (Li, Fe)OHFeSe. We explain such coexistence by electronic phase separation, similar to that in high-Tc cuprates and iron arsenides. However, such an AFM signal can be absent in some other samples of (Li, Fe)OHFeSe, particularly it is never observed in the SC samples of Tc > ~38 K, owing to a spatial scale of the phase separation too small for the macroscopic magnetic probe. For this case, we propose a microscopic electronic phase separation. It is suggested that the microscopic static phase separation reaches vanishing point in high-Tc (Li, Fe)OHFeSe, by the occurrence of two-dimensional AFM spin fluctuations below nearly the same temperature as Tafm reported previously for a (Li, Fe)OHFeSe (Tc ~42 K) single crystal. A complete phase diagram is thus established. Our study provides key information of the underlying physics for high-Tc superconductivity.
  • In this paper, wireless power transfer and cooperative jamming (CJ) are combined to enhance physical security in public transportation networks. First, a new secure system model with both fixed and mobile jammers is proposed to guarantee secrecy in the worst-case scenario. All jammers are endowed with energy harvesting (EH) capability. Following this, two CJ based schemes, namely B-CJ-SRM and B-CJ-TPM, are proposed, where SRM and TPM are short for secrecy rate maximization and transmit power minimization, respectively. They respectively maximize the secrecy rate (SR) with transmit power constraint and minimize the transmit power of the BS with SR constraint, by optimizing beamforming vector and artificial noise covariance matrix. To further reduce the complexity of our proposed optimal schemes, their low-complexity (LC) versions, called LC-B-CJ-SRM and LC-B-CJ-TPM are developed. Simulation results show that our proposed schemes, B-CJ-SRM and B-CJ-TPM, achieve significant SR performance improvement over existing zero-forcing and QoSD methods. Additionally, the SR performance of the proposed LC schemes are close to those of their original versions.
  • In this paper, a new data-driven information hiding scheme called generative steganography by sampling (GSS) is proposed. The stego is directly sampled by a powerful generator without an explicit cover. Secret key shared by both parties is used for message embedding and extraction, respectively. Jensen-Shannon Divergence is introduced as new criteria for evaluation of the security of the generative steganography. Based on these principles, a simple practical generative steganography method is proposed using semantic image inpainting. Experiments demonstrate the potential of the framework through qualitative and quantitative evaluation of the generated stego images.
  • Due to network practices such as traffic engineering and multi-homing, the number of routes---also known as IP prefixes---in the global forwarding tables has been increasing significantly in the last decade and continues growing in a super linear trend. One of the most promising solutions is to use smart Forwarding Information Base (FIB) aggregation algorithms to aggregate the prefixes and convert a large table into a small one. Doing so poses a research question, however, i.e., how can we quickly verify that the original table yields the same forwarding behaviors as the aggregated one? We answer this question in this paper, including addressing the challenges caused by the longest prefix matching (LPM) lookups. In particular, we propose the VeriTable algorithm that can employ a single tree/trie traversal to quickly check if multiple forwarding tables are forwarding equivalent, as well as if they could result in routing loops or black holes. The VeriTable algorithm significantly outperforms the state-of-the-art work for both IPv4 and IPv6 tables in every aspect, including the total running time, memory access times and memory consumption.
  • We propose to recover 3D shape structures from single RGB images, where structure refers to shape parts represented by cuboids and part relations encompassing connectivity and symmetry. Given a single 2D image with an object depicted, our goal is automatically recover a cuboid structure of the object parts as well as their mutual relations. We develop a convolutional-recursive auto-encoder comprised of structure parsing of a 2D image followed by structure recovering of a cuboid hierarchy. The encoder is achieved by a multi-scale convolutional network trained with the task of shape contour estimation, thereby learning to discern object structures in various forms and scales. The decoder fuses the features of the structure parsing network and the original image, and recursively decodes a hierarchy of cuboids. Since the decoder network is learned to recover part relations including connectivity and symmetry explicitly, the plausibility and generality of part structure recovery can be ensured. The two networks are jointly trained using the training data of contour-mask and cuboid structure pairs. Such pairs are generated by rendering stock 3D CAD models coming with part segmentation. Our method achieves unprecedentedly faithful and detailed recovery of diverse 3D part structures from single-view 2D images. We demonstrate two applications of our method including structure-guided completion of 3D volumes reconstructed from single-view images and structure-aware interactive editing of 2D images.
  • Monogamy relations characterize the distributions of entanglement in multipartite systems. We investigate monogamy relations related to the concurrence C, the entanglement of formation E, negativity Nc and Tsallis-q entanglement Tq. Monogamy relations for the $\alpha$th power of entanglement have been derived, which are tighter than the existing entanglement monogamy relations for some classes of quantum states. Detailed examples are presented.
  • Considering Rayleigh fading channels, in this work we adopt channel inversion power control to achieve covert communications, where a transmitter can possibly hide itself from a warden while transmitting information to a receiver. Specifically, we examine the performance of the achieved covert communications in two scenarios in terms of the effective covert rate (ECR), which quantifies the amount of information that the transmitter can reliably convey to the receiver subject to the warden's detection error probability being no less than some specific value. In the first scenario, the noise uncertainty at the warden serves as the enabler of covert communications and our examination shows that increasing the noise uncertainty at the warden and the receiver simultaneously may not continuously improve the ECR. In the second scenario, covert communications are aided by a full-duplex receiver, which always transmits artificial noise (AN) with a random power. Our analysis indicates that the achieved ECR approaches to an upper bound as the transmit power of AN approaches to infinity. This work provides useful guidelines and performance limits on achieving covert communications and potentially hiding a transmitter in practical Rayleigh fading channels.
  • Secure wireless information and power transfer based on directional modulation is conceived for amplify-and-forward (AF) relaying networks. Explicitly, we first formulate a secrecy rate maximization (SRM) problem, which can be decomposed into a twin-level optimization problem and solved by a one-dimensional (1D) search and semidefinite relaxation (SDR) technique. Then in order to reduce the search complexity, we formulate an optimization problem based on maximizing the signal-to-leakage-AN-noise-ratio (Max-SLANR) criterion, and transform it into a SDR problem. Additionally, the relaxation is proved to be tight according to the classic Karush-Kuhn-Tucker (KKT) conditions. Finally, to reduce the computational complexity, a successive convex approximation (SCA) scheme is proposed to find a near-optimal solution. The complexity of the SCA scheme is much lower than that of the SRM and the Max-SLANR schemes. Simulation results demonstrate that the performance of the SCA scheme is very close to that of the SRM scheme in terms of its secrecy rate and bit error rate (BER), but much better than that of the zero forcing (ZF) scheme.
  • Many online applications, such as online social networks or knowledge bases, are often attacked by malicious users who commit different types of actions such as vandalism on Wikipedia or fraudulent reviews on eBay. Currently, most of the fraud detection approaches require a training dataset that contains records of both benign and malicious users. However, in practice, there are often no or very few records of malicious users. In this paper, we develop one-class adversarial nets (OCAN) for fraud detection using training data with only benign users. OCAN first uses LSTM-Autoencoder to learn the representations of benign users from their sequences of online activities. It then detects malicious users by training a discriminator with a complementary GAN model that is different from the regular GAN model. Experimental results show that our OCAN outperforms the state-of-the-art one-class classification models and achieves comparable performance with the latest multi-source LSTM model that requires both benign and malicious users in the training phase.
  • We consider three challenges in multi-block Alternating Direction Method of Multipliers (ADMM): building convergence conditions for ADMM with any block (variable) sequence, finding available block sequences to be fit for ADMM, and designing useful parameter controllers for ADMM with unfixed parameters. To address these challenges, we develop a switched control framework for studying multi-block ADMM. First, since ADMM recursively and alternately updates the block-variables, it is converted into a discrete-time switched dynamical system. Second, we study exponential stability and stabilizability of the switched system for linear convergence analysis and design of ADMM by employing switched Lyapunov functions. Moreover, linear matrix inequalities conditions are proposed to ensure convergence of ADMM under arbitrary sequence, to find convergent sequences, and to design the fixed parameters. These conditions are checked and solved by employing semidefinite programming. Numerical experiments further verify the effectiveness of our proposed theories.
  • We extend profound results in pluripotential theory on Kahler manifolds to Sasaki setting via its transverse Kahler structure. As in Kahler case, these results form a very important piece to solve the existence of Sasaki metrics with constant scalar curvature (cscs) in terms of properness of K-energy. One main result is to generalize T. Darvas' theory on the geometric structure of the space of Kahler potentials in Sasaki setting. Along the way we extend most of corresponding results in pluripotential theory to Sasaki setting via its transverse Kahler structure.
  • We present uncertainty relations based on Wigner--Yanase--Dyson skew information with quantum memory. Uncertainty inequalities both in product and summation forms are derived. \mbox{It is} shown that the lower bounds contain two terms: one characterizes the degree of compatibility of two measurements, and the other is the quantum correlation between the measured system and the quantum memory. Detailed examples are given for product, separable and entangled states.
  • The electronic nematic phase is characterized as an ordered state of matter with rotational symmetry breaking, and has been well studied in the quantum Hall system and the high-$T_c$ superconductors, regardless of cuprate or pnictide family. The nematic state in high-$T_c$ systems often relates to the structural transition or electronic instability in the normal phase. Nevertheless, the electronic states below the superconducting transition temperature is still an open question. With high-resolution scanning tunneling microscope measurements, direct observation of vortex core in FeSe thin films revealed the nematic superconducting state by Song \emph{et al}. Here, motivated by the experiment, we construct the extended Ginzburg-Landau free energy to describe the elliptical vortex, where a mixed \emph{s}-wave and \emph{d}-wave superconducting order is coupled to the nematic order. The nematic order induces the mixture of two superconducting orders and enhances the anisotropic interaction between the two superconducting orders, resulting in a symmetry breaking from $C_4$ to $C_2$. Consequently, the vortex cores are stretched into an elliptical shape. In the equilibrium state, the elliptical vortices assemble a lozenge-like vortex lattice, being well consistent with experimental results.
  • In the past decades, intensive efforts have been put to design various loss functions and metric forms for metric learning problem. These improvements have shown promising results when the test data is similar to the training data. However, the trained models often fail to produce reliable distances on the ambiguous test pairs due to the distribution bias between training set and test set. To address this problem, the Adversarial Metric Learning (AML) is proposed in this paper, which automatically generates adversarial pairs to remedy the distribution bias and facilitate robust metric learning. Specifically, AML consists of two adversarial stages, i.e. confusion and distinguishment. In confusion stage, the ambiguous but critical adversarial data pairs are adaptively generated to mislead the learned metric. In distinguishment stage, a metric is exhaustively learned to try its best to distinguish both the adversarial pairs and the original training pairs. Thanks to the challenges posed by the confusion stage in such competing process, the AML model is able to grasp plentiful difficult knowledge that has not been contained by the original training pairs, so the discriminability of AML can be significantly improved. The entire model is formulated into optimization framework, of which the global convergence is theoretically proved. The experimental results on toy data and practical datasets clearly demonstrate the superiority of AML to the representative state-of-the-art metric learning methodologies.
  • In this paper, given the beamforming vector of confidential messages and artificial noise (AN) projection matrix and total power constraint, a power allocation (PA) strategy of maximizing secrecy rate (Max-SR) is proposed for secure directional modulation (DM) networks. By the method of Lagrange multiplier, the analytic expression of the proposed PA strategy is derived. To confirm the benefit from the Max-SR-based PA strategy, we take the null-space projection (NSP) beamforming scheme as an example and derive its closed-form expression of optimal PA strategy. From simulation results, we find the following facts: in the medium and high signal-to-noise-ratio (SNR) regions, compared with three typical PA parameters such $\beta=0.1, 0.5$, and $0.9$, the optimal PA shows a substantial SR performance gain with maximum gain percent up to more than $60\%$. Additionally, as the PA factor increases from 0 to 1, the achievable SR increases accordingly in the low SNR region whereas it first increases and then decreases in the medium and high SNR regions, where the SR can be approximately viewed as a convex function of the PA factor. Finally, as the number of antennas increases, the optimal PA factor becomes large and tends to one in the medium and high SNR region. In other words, the contribution of AN to SR can be trivial in such a situation.
  • Many tests have been proposed to remedy the classical Hotelling's $T^2$ test in the "large $p$, small $n$" paradigm, but the existence of an optimal sum-of-squares type test has not been explored. This paper shows that under certain conditions, the population Hotelling's $T^2$ test with the known $\Sigma^{-1}$ attains the best power among all the $L_2$-norm based tests with the data transformation by $\Sigma^{\eta}$ for $\eta \in (-\infty, \infty)$. To extend the result to the case of unknown $\Sigma^{-1}$, we propose a Neighborhood-Assisted Hotelling's $T^2$ statistic obtained by replacing the inverse of sample covariance matrix in the classical Hotelling's $T^2$ statistic with a regularized covariance estimator. Utilizing a regression model, we establish its asymptotic normality under mild conditions. We show that the proposed test is able to match the performance of the population Hotelling's $T^2$ test under certain conditions, and thus possesses certain optimality. Moreover, it can adaptively attain the best power by empirically choosing a neighborhood size to maximize its signal-to-noise ratio. Simulation experiments and case studies are given to demonstrate the empirical performance of the proposed test.
  • In this work, an adaptive and robust null-space projection (AR-NSP) scheme is proposed for secure transmission with artificial noise (AN)-aided directional modulation (DM) in wireless networks. The proposed scheme is carried out in three steps. Firstly, the directions of arrival (DOAs) of the signals from the desired user and eavesdropper are estimated by the Root Multiple Signal Classificaiton (Root-MUSIC) algorithm and the related signal-to-noise ratios (SNRs) are estimated based on the ratio of the corresponding eigenvalue to the minimum eigenvalue of the covariance matrix of the received signals. In the second step, the value intervals of DOA estimation errors are predicted based on the DOA and SNR estimations. Finally, a robust NSP beamforming DM system is designed according to the afore-obtained estimations and predictions. Our examination shows that the proposed scheme can significantly outperform the conventional non-adaptive robust scheme and non-robust NSP scheme in terms of achieving a much lower bit error rate (BER) at the desired user and a much higher secrecy rate (SR). In addition, the BER and SR performance gains achieved by the proposed scheme relative to other schemes increase with the value range of DOA estimation error.