• Human action recognition refers to automatic recognizing human actions from a video clip. In reality, there often exist multiple human actions in a video stream. Such a video stream is often weakly-annotated with a set of relevant human action labels at a global level rather than assigning each label to a specific video episode corresponding to a single action, which leads to a multi-label learning problem. Furthermore, there are many meaningful human actions in reality but it would be extremely difficult to collect/annotate video clips regarding all of various human actions, which leads to a zero-shot learning scenario. To the best of our knowledge, there is no work that has addressed all the above issues together in human action recognition. In this paper, we formulate a real-world human action recognition task as a multi-label zero-shot learning problem and propose a framework to tackle this problem in a holistic way. Our framework holistically tackles the issue of unknown temporal boundaries between different actions for multi-label learning and exploits the side information regarding the semantic relationship between different human actions for knowledge transfer. Consequently, our framework leads to a joint latent ranking embedding for multi-label zero-shot human action recognition. A novel neural architecture of two component models and an alternate learning algorithm are proposed to carry out the joint latent ranking embedding learning. Thus, multi-label zero-shot recognition is done by measuring relatedness scores of action labels to a test video clip in the joint latent visual and semantic embedding spaces. We evaluate our framework with different settings, including a novel data split scheme designed especially for evaluating multi-label zero-shot learning, on two datasets: Breakfast and Charades. The experimental results demonstrate the effectiveness of our framework.
  • Running off-site software middleboxes at third-party service providers has been a popular practice. However, routing large volumes of raw traffic, which may carry sensitive information, to a remote site for processing raises severe security concerns. Prior solutions often abstract away important factors pertinent to real-world deployment. In particular, they overlook the significance of metadata protection and stateful processing. Unprotected traffic metadata like low-level headers, size and count, can be exploited to learn supposedly encrypted application contents. Meanwhile, tracking the states of 100,000s of flows concurrently is often indispensable in production-level middleboxes deployed at real networks. We present LightBox, the first system that can drive off-site middleboxes at near-native speed with stateful processing and the most comprehensive protection to date. Built upon commodity trusted hardware, Intel SGX, LightBox is the product of our systematic investigation of how to overcome the inherent limitations of secure enclaves using domain knowledge and customization. First, we introduce an elegant virtual network interface that allows convenient access to fully protected packets at line rate without leaving the enclave, as if from the trusted source network. Second, we provide complete flow state management for efficient stateful processing, by tailoring a set of data structures and algorithms optimized for the highly constrained enclave space. Extensive evaluations demonstrate that LightBox, with all security benefits, can achieve 10Gbps packet I/O, and that with case studies on three stateful middleboxes, it can operate at near-native speed.
  • We examine the effects of the Dzyaloshinsky-Moriya (DM) interaction on the nonequilibrium thermodynamics in an anisotropic $XY$ spin chain, which is driven out of equilibrium by a sudden quench of the control parameter of the Hamiltonian. By analytically evaluating the statistical properties of the work distribution and the irreversible entropy production, we investigate the influences of the DM interaction on the nonequilibrium thermodynamics of the system with different parameters at various temperatures. We find that depending on the anisotropy of the system and the temperature, the DM interaction may have different impacts on the nonequilibrium thermodynamics. Interestingly, the critical line induced by the DM interaction can be revealed via the properties of the nonequilibrium thermodynamics. In addition, our results suggest that the strength of the DM interaction can be detected experimentally by studying the nonequilibrium thermodynamics.
  • So far, several macroscopic quantum phenomena have been discovered in the Josephson junction. Through introducing such a structure with a liquid membrane sandwiched between two liquid metal electrodes, we had ever observed a lighting and sound phenomenon which was explained before as discharge plasma. In fact, such an effect also belongs to a quantum process. It is based on this conceiving, we proposed here that an electrically controllable method can thus be established to generate and manipulate as much photonic quantum as desired. We attributed such electrically induced lighting among liquid metal droplets immersed inside aqueous solution as photonic quantum effect. Our experiments clarified that a small electrical voltage would be strong enough to trigger blue-violet light and sound inside the aqueous solution system. Meanwhile, thermal heat is released, and chemical reaction occurs over the solution. From an alternative way which differs from former effort in interpreting such effect as discharge plasma, we treated this process as a quantum one and derived new conceptual equations to theoretically quantify this phenomenon in light of quantum mechanics principle. It can be anticipated that given specific designing, such spontaneously generated tremendous quantum can be manipulated to entangle together which would possibly help mold functional elements for developing future quantum computing or communication system. With superior adaptability than that of the conventional rigid junction, the present electro-photonic quantum generation system made of liquid metal droplets structure could work in solution, room temperature situation and is easy to be adjusted. It suggests a macroscopic way to innovate the classical strategies and technologies in generating quantum as frequently adopted in classical quantum engineering area.
  • Non-rigid inter-modality registration can facilitate accurate information fusion from different modalities, but it is challenging due to the very different image appearances across modalities. In this paper, we propose to train a non-rigid inter-modality image registration network, which can directly predict the transformation field from the input multimodal images, such as CT and MR images. In particular, the training of our inter-modality registration network is supervised by intra-modality similarity metric based on the available paired data, which is derived from a pre-aligned CT and MR dataset. Specifically, in the training stage, to register the input CT and MR images, their similarity is evaluated on the warped MR image and the MR image that is paired with the input CT. So that, the intra-modality similarity metric can be directly applied to measure whether the input CT and MR images are well registered. Moreover, we use the idea of dual-modality fashion, in which we measure the similarity on both CT modality and MR modality. In this way, the complementary anatomies in both modalities can be jointly considered to more accurately train the inter-modality registration network. In the testing stage, the trained inter-modality registration network can be directly applied to register the new multimodal images without any paired data. Experimental results have shown that, the proposed method can achieve promising accuracy and efficiency for the challenging non-rigid inter-modality registration task and also outperforms the state-of-the-art approaches.
  • Mobile relaying is emerged as a promising technique to assist wireless communication, driven by the rapid development of unmanned aerial vehicles (UAVs). In this paper, we study secure transmission in a four-node (source, destination, mobile relay, and eavesdropper) system, wherein we focus on maximizing the secrecy rate via jointly optimizing the relay trajectory and the source/relay transmit power. Nevertheless, due to the coupling of the trajectory designing and the power allocating, the secrecy rate maximization (SRM) problem is intractable to solve. Accordingly, we propose an alternating optimization (AO) approach, wherein the trajectory designing and the power allocating are tackled in an alternating manner. Unfortunately, the trajectory designing is a nonconvex problem, and thus is still hard to solve. To circumvent the nonconvexity, we exploit sequential convex programming (SCP) to derive an iterative algorithm, which is proven to converge to a Karush-Kuhn-Tucker (KKT) point of the trajectory design problem. The simulation results demonstrate the efficacy of the joint power and trajectory design in improving the secrecy throughput.
  • Hash coding has been widely used in the approximate nearest neighbor search for large-scale image retrieval. Recently, many deep hashing methods have been proposed and shown largely improved performance over traditional feature-learning-based methods. Most of these methods examine the pairwise similarity on the semantic-level labels, where the pairwise similarity is generally defined in a hard-assignment way. That is, the pairwise similarity is '1' if they share no less than one class label and '0' if they do not share any. However, such similarity definition cannot reflect the similarity ranking for pairwise images that hold multiple labels. In this paper, a new deep hashing method is proposed for multi-label image retrieval by re-defining the pairwise similarity into an instance similarity, where the instance similarity is quantified into a percentage based on the normalized semantic labels. Based on the instance similarity, a weighted cross-entropy loss and a minimum mean square error loss are tailored for loss-function construction, and are efficiently used for simultaneous feature learning and hash coding. Experiments on three popular datasets demonstrate that, the proposed method outperforms the competing methods and achieves the state-of-the-art performance in multi-label image retrieval.
  • We studied the prominent bow shock in the merging galaxy cluster A520 using a deep Chandra X-ray observation and archival VLA radio data. This shock is a useful diagnostic tool, owing to its clear geometry and relatively high Mach number. At the "nose" of the shock, we measure a Mach number of $M=2.4_{-0.2}^{+0.4}$. The shock becomes oblique away from the merger axis, with the Mach number falling to $\simeq$1.6 around 30$^{\circ}$ from the nose. The electron temperature immediately behind the shock nose is consistent with that from the Rankine-Hugoniot adiabat, and is higher (at a 95% confidence) than expected for adiabatic compression of electrons followed by Coulomb electron-proton equilibration, indicating the presence of equilibration mechanisms faster than Coulomb collisions. This is similar to an earlier finding for the Bullet cluster. We also combined four archival VLA datasets to obtain a better image of the cluster's giant radio halo at 1.4 GHz. An abrupt edge of the radio halo traces the shock front, and no emission is detected in the pre-shock region. If the radio edge were due only to adiabatic compression of relativistic electrons in pre-shock plasma, we would expect a pre-shock radio emission detectable in this radio dataset; however, an interferometric artifact dominates the uncertainty, so we cannot rule this model out. Other interesting features of the radio halo include a peak at the remnant of the cool core, suggesting that the core used to have a radio minihalo, and a peak marking a possible region of high turbulence.
  • We derive the asymptotic properties of the mMKG system (Maxwell coupled with a massive Klein-Gordon scalar field), in the exterior of the domain of influence of a compact set. This complements the previous well known results, restricted to compactly supported initial conditions, based on the so called hyperboloidal method. That method takes advantage of the commutation properties of the Maxwell and Klein Gordon with the generators of the Poincar\'e group to resolve the difficulties caused by the fact that they have, separately, different asymptotic properties. Though the hyperboloidal method is very robust and applies well to other related systems it has the well known drawback that it requires compactly supported data. In this paper we remove this limitation based on a further extension of the vector-field method adapted to the exterior region. Our method applies, in particular, to nontrivial charges. The full problem could then be treated by patching together the new estimates in the exterior with the hyperboloidal ones in the interior. This purely physical space approach introduced here maintains the robust properties of the old method and can thus be applied to other situations such as the coupled Einstein Klein-Gordon equation.
  • In this work, an adaptive and robust null-space projection (AR-NSP) scheme is proposed for secure transmission with artificial noise (AN)-aided directional modulation (DM) in wireless networks. The proposed scheme is carried out in three steps. Firstly, the directions of arrival (DOAs) of the signals from the desired user and eavesdropper are estimated by the Root Multiple Signal Classificaiton (Root-MUSIC) algorithm and the related signal-to-noise ratios (SNRs) are estimated based on the ratio of the corresponding eigenvalue to the minimum eigenvalue of the covariance matrix of the received signals. In the second step, the value intervals of DOA estimation errors are predicted based on the DOA and SNR estimations. Finally, a robust NSP beamforming DM system is designed according to the afore-obtained estimations and predictions. Our examination shows that the proposed scheme can significantly outperform the conventional non-adaptive robust scheme and non-robust NSP scheme in terms of achieving a much lower bit error rate (BER) at the desired user and a much higher secrecy rate (SR). In addition, the BER and SR performance gains achieved by the proposed scheme relative to other schemes increase with the value range of DOA estimation error.
  • Both reviews and user-item interactions (i.e., rating scores) have been widely adopted for user rating prediction. However, these existing techniques mainly extract the latent representations for users and items in an independent and static manner. That is, a single static feature vector is derived to encode her preference without considering the particular characteristics of each candidate item. We argue that this static encoding scheme is difficult to fully capture the users' preference. In this paper, we propose a novel context-aware user-item representation learning model for rating prediction, named CARL. Namely, CARL derives a joint representation for a given user-item pair based on their individual latent features and latent feature interactions. Then, CARL adopts Factorization Machines to further model higher-order feature interactions on the basis of the user-item pair for rating prediction. Specifically, two separate learning components are devised in CARL to exploit review data and interaction data respectively: review-based feature learning and interaction-based feature learning. In review-based learning component, with convolution operations and attention mechanism, the relevant features for a user-item pair are extracted by jointly considering their corresponding reviews. However, these features are only review-driven and may not be comprehensive. Hence, interaction-based learning component further extracts complementary features from interaction data alone, also on the basis of user-item pairs. The final rating score is then derived with a dynamic linear fusion mechanism. Experiments on five real-world datasets show that CARL achieves significantly better rating prediction accuracy than existing state-of-the-art alternatives. Also, with attention mechanism, we show that the relevant information in reviews can be highlighted to interpret the rating prediction.
  • Spectral computed tomography (CT) has a great superiority in lesion detection, tissue characterization and material decomposition. To further extend its potential clinical applications, in this work, we propose an improved tensor dictionary learning method for low-dose spectral CT reconstruction with a constraint of image gradient L0-norm, which is named as L0TDL. The L0TDL method inherits the advantages of tensor dictionary learning (TDL) by employing the similarity of spectral CT images. On the other hand, by introducing the L0-norm constraint in gradient image domain, the proposed method emphasizes the spatial sparsity to overcome the weakness of TDL on preserving edge information. The alternative direction minimization method (ADMM) is employed to solve the proposed method. Both numerical simulations and real mouse studies are perform to evaluate the proposed method. The results show that the proposed L0TDL method outperforms other competing methods, such as total variation (TV) minimization, TV with low rank (TV+LR), and TDL methods.
  • By analyzing the probability distributions of the Loschmidt echo (LE) and quantum work, we examine the nonequilibrium effects of a quantum many-body system, which exhibits an excited-state quantum phase transition (ESQPT). We find that depending on the value of the controlling parameter the distribution of the LE displays different patterns. At the critical point of the ESQPT, both the averaged LE and the averaged work show a cusplike shape. Furthermore, by employing the finite-size scaling analysis of the averaged work, we obtain the critical exponent of the ESQPT. Finally, we show that at the critical point of ESQPT the eigenstate is a highly localized state, further highlighting the influence of the ESQPT on the properties of the many-body system.
  • We present a trajectory dynamically tracing compensation method to smooth the spatial fluctuation of the static magnetic field (C-field) that provides a quantization axis in the fountain clock. The C-field coil current is point-to-point adjusted in accordance to the atoms experienced magnetic field along the flight trajectory. A homogeneous field with a 0.2 nT uncertainty is realized compared to 5 nT under the static magnetic field with constant current during the Ramsey interrogation. The corresponding uncertainty associated with the second-order Zeeman shift that we calculate is improved by one order of magnitude. The technique provides an alternative method to improve the magnetic field uniformity particularly for large-scale equipment that is difficult to machine with magnetic shielding. Our method is simple, robust, and essentially important in frequency evaluations concerning the dominant uncertainty contribution due to the quadratic Zeeman shift.
  • A large number of experimental discoveries especially in the heavy quarkonium sector that did not at all fit to the expectations of the until then very successful quark model led to a renaissance of hadron spectroscopy. Among various explanations of the internal structure of these excitations, hadronic molecules, being analogues of light nuclei, play a unique role since for those predictions can be made with controlled uncertainty. We review experimental evidences of various candidates of hadronic molecules, and methods of identifying such structures. Nonrelativistic effective field theories are the suitable framework for studying hadronic molecules, and are discussed in both the continuum and finite volumes. Also pertinent lattice QCD results are presented. Further, we discuss the production mechanisms and decays of hadronic molecules, and comment on the reliability of certain assertions often made in the literature.
  • Recently, more and more attention is drawn to the field of medical image synthesis across modalities. Among them, the synthesis of computed tomography (CT) image from T1-weighted magnetic resonance (MR) image is of great importance, although the mapping between them is highly complex due to large gaps of appearances of the two modalities. In this work, we aim to tackle this MR-to-CT synthesis by a novel deep embedding convolutional neural network (DECNN). Specifically, we generate the feature maps from MR images, and then transform these feature maps forward through convolutional layers in the network. We can further compute a tentative CT synthesis from the midway of the flow of feature maps, and then embed this tentative CT synthesis back to the feature maps. This embedding operation results in better feature maps, which are further transformed forward in DECNN. After repeat-ing this embedding procedure for several times in the network, we can eventually synthesize a final CT image in the end of the DECNN. We have validated our proposed method on both brain and prostate datasets, by also compar-ing with the state-of-the-art methods. Experimental results suggest that our DECNN (with repeated embedding op-erations) demonstrates its superior performances, in terms of both the perceptive quality of the synthesized CT image and the run-time cost for synthesizing a CT image.
  • Link-flooding attack (LFA) has emerged as a serious threat to Internet which cuts off connections between legitimate hosts and targeted servers by flooding only a few links (e.g., target links). Several mechanisms have been proposed to mitigate LFA, however, they can only mitigate LFA after target links have been compromised by adversaries. Based on the fact that adversaries rely on network linkmap to discover weakness of the network, in this paper, we propose an active LFA mitigation mechanism, called Linkbait, that actively and preventively mitigates LFA by providing a fake linkmap to adversaries. Inspired by Moving Target Defense (MTD), we propose a link obfuscation algorithm in Linkbait that selectively reroutes probing flows to hide target links from adversaries and mislead them to consider some bait links as target links. By providing the faked linkmap to adversaries, Linkbait can actively mitigate LFA even without identifying bots and does not affect flows from legitimate hosts. In order to further reduce the junk traffic generated by adversaries from entering the network, we propose a bot detection algorithm in Linkbait that extracts unique traffic patterns from LFA and leverages Support Vector Machine to accurately distinguish bots from legitimate hosts. Finally, we evaluate the feasibility of implementing Linkbait in real Internet, and evaluate its performance by using both a real-world testbed and large-scale simulations. The analyses and experiments results demonstrate the effectiveness of Linkbait.
  • We present results from a deep Chandra X-ray observation of a merging galaxy cluster A520. A high-resolution gas temperature map, after the subtraction of the cluster-scale emission, reveals a long trail of dense, cool clumps --- apparently the fragments of a cool core that has been completely stripped from the infalling subcluster by ram pressure. In this scenario, we can assume that the clumps are still connected by the magnetic field lines. The observed temperature variations imply that thermal conductivity is suppressed by a factor >100 across the presumed direction of the magnetic field (as found in other clusters), and is also suppressed -along- the field lines by a factor of several. Two massive clumps in the periphery of A520, visible in the weak lensing mass map and the X-ray image, have apparently been completely stripped of gas during the merger, but then re-accreted the surrounding high-entropy gas upon exit from the cluster. An X-ray hydrostatic mass estimate for one of the clumps (that has simple geometry) agrees with the lensing mass. Its current gas mass to total mass ratio is very low, 1.5-3%, which makes it a "dark subcluster". We also found a curious low X-ray brightness channel (likely a low-density sheet in projection) going across the cluster along the direction of an apparent secondary merger. The channel may be caused by plasma depletion in a region of an amplified magnetic field (with plasma $\beta\sim 10-20$). The shock in A520 will be studied in a separate paper.
  • A proper semantic representation for encoding side information is key to the success of zero-shot learning. In this paper, we explore two alternative semantic representations especially for zero-shot human action recognition: textual descriptions of human actions and deep features extracted from still images relevant to human actions. Such side information are accessible on Web with little cost, which paves a new way in gaining side information for large-scale zero-shot human action recognition. We investigate different encoding methods to generate semantic representations for human actions from such side information. Based on our zero-shot visual recognition method, we conducted experiments on UCF101 and HMDB51 to evaluate two proposed semantic representations . The results suggest that our proposed text- and image-based semantic representations outperform traditional attributes and word vectors considerably for zero-shot human action recognition. In particular, the image-based semantic representations yield the favourable performance even though the representation is extracted from a small number of images per class.
  • We study the isospin amplitudes in the exclusive $B$ to $D^*\bar{D}K$ decay process and fit the available $D^{*0}\bar{D}^0$ invariant mass distributions near threshold. The analysis demonstrates that the production of the isospin triplet $D^*\bar{D}$ state is highly suppressed compared to the isospin singlet one. That explains why the $Z_c(3900)$ has not been found in $B$ decays. In addition, the production of the negative charge-parity state might be further suppressed in the heavy quark limit. These two reasons which are based on the molecular assumption offer the first explanation why the $Z_c(3900)$ is absent in $B$ decays. Further studies of the absence from both the experimental and the theoretical side is extremely important for understanding the nature of the $X(3872)$ and the $Z_c(3900)$.
  • Zero-shot learning for visual recognition, e.g., object and action recognition, has recently attracted a lot of attention. However, it still remains challenging in bridging the semantic gap between visual features and their underlying semantics and transferring knowledge to semantic categories unseen during learning. Unlike most of the existing zero-shot visual recognition methods, we propose a stagewise bidirectional latent embedding framework to two subsequent learning stages for zero-shot visual recognition. In the bottom-up stage, a latent embedding space is first created by exploring the topological and labeling information underlying training data of known classes via a proper supervised subspace learning algorithm and the latent embedding of training data are used to form landmarks that guide embedding semantics underlying unseen classes into this learned latent space. In the top-down stage, semantic representations of unseen-class labels in a given label vocabulary are then embedded to the same latent space to preserve the semantic relatedness between all different classes via our proposed semi-supervised Sammon mapping with the guidance of landmarks. Thus, the resultant latent embedding space allows for predicting the label of a test instance with a simple nearest-neighbor rule. To evaluate the effectiveness of the proposed framework, we have conducted extensive experiments on four benchmark datasets in object and action recognition, i.e., AwA, CUB-200-2011, UCF101 and HMDB51. The experimental results under comparative studies demonstrate that our proposed approach yields the state-of-the-art performance under inductive and transductive settings.
  • We derive a representation formula for the tensorial wave equation $\Box_\bg \phi^I=F^I$ in globally hyperbolic Lorentzian spacetimes $(\M^{2+1}, \bg)$ by giving a geometric formulation of the method of descent which is applicable for any dimension.
  • Based on previous studies in a single particle system in both the integrable [Jarzynski, Quan, and Rahav, Phys.~Rev.~X {\bf 5}, 031038 (2015)] and the chaotic systems [Zhu, Gong, Wu, and Quan, Phys.~Rev.~E {\bf 93}, 062108 (2016)], we study the the correspondence principle between quantum and classical work distributions in a quantum many-body system. Even though the interaction and the indistinguishability of identical particles increase the complexity of the system, we find that for a quantum many-body system the cumulative quantum work distribution still converges to its classical counterpart in the semiclassical limit. Our results imply that there exists a correspondence principle between quantum and classical work distributions in an interacting quantum many-body system, especially in the large particle number limit, and further justify the definition of quantum work via two point energy measurements in quantum many-body systems.
  • This contribution presents a novel bunch current measurement system based on an ultra-fast photodetector and a high-speed digitizer at Hefei Light Source II (HLS II). In order to achieve bunch-by-bunch resolution, the sampling rate of the system is nearly 225 GS/s via a dedicated equivalent sampling algorithm. According to preliminary tests of daily operation mode and single-bunch mode, the root-mean-square (rms) of current relative error distribution is 1.03%, which illustrates the new system satisfies requirements for high-precision bunch current measurement. In addition, experiment results of "HLS" Morse code fill pattern mode demonstrate this system also could be a convenient and robust tool for beam top-up mode in the future.
  • Traffic accident data are usually noisy, contain missing values, and heterogeneous. How to select the most important variables to improve real-time traffic accident risk prediction has become a concern of many recent studies. This paper proposes a novel variable selection method based on the Frequent Pattern tree (FP tree) algorithm. First, all the frequent patterns in the traffic accident dataset are discovered. Then for each frequent pattern, a new criterion, called the Relative Object Purity Ratio (ROPR) which we proposed, is calculated. This ROPR is added to the importance score of the variables that differentiates one frequent pattern from the others. To test the proposed method, a dataset was compiled from the traffic accidents records detected by only one detector on interstate highway I-64 in Virginia in 2005. This data set was then linked to other variables such as real-time traffic information and weather conditions. Both the proposed method based on the FP tree algorithm, as well as the widely utilized, random forest method, were then used to identify the important variables or the Virginia data set. The results indicate that there are some differences between the variables deemed important by the FP tree and those selected by the random forest method. Following this, two baseline models (i.e. a nearest neighbor (k-NN) method and a Bayesian network) were developed to predict accident risk based on the variables identified by both the FP tree method and the random forest method. The results show that the models based on the variable selection using the FP tree performed better than those based on the random forest method for several versions of the k-NN and Bayesian network models.The best results were derived from a Bayesian network model using variables from FP tree. That model could predict 61.11% of accidents accurately, while having a false alarm rate of 38.16%.