• The distance duality relation (DDR) is valid in Riemannian spacetime. The astronomical data hint that the universe may have certain preferred direction. If the universe is described by anisotropic cosmological models based on Riemannian spacetime, then DDR still valid. If the anisotropy universe is described by other models which are not based on Riemannian spacetime, then DDR is violated. Thus, DDR could be used to test the validity of these anisotropic cosmological models. In this paper, we perform anisotropic DDR parametrization with the dipolar structures. The DDR is tested by comparing the luminosity distance from type-Ia supernovae (Union 2.1 and JLA compilations) and the angular diameter distance from strong gravitational lensing (SL) systems at the same redshift. It is shown that, the DDR is valid with the Union2.1 compilation, while is violated more than 1$\sigma$ confidence level with the JLA compilation. Additionally, we verify the statistical signification of our method with Monte Carlo simulations. Due to the large uncertainty of available data, no strong evidence is found to violate the DDR in the anisotropic models.
  • Sparse representations using data dictionaries provide an efficient model particularly for signals that do not enjoy alternate analytic sparsifying transformations. However, solving inverse problems with sparsifying dictionaries can be computationally expensive, especially when the dictionary under consideration has a large number of atoms. In this paper, we incorporate additional structure on to dictionary-based sparse representations for visual signals to enable speedups when solving sparse approximation problems. The specific structure that we endow onto sparse models is that of a multi-scale modeling where the sparse representation at each scale is constrained by the sparse representation at coarser scales. We show that this cross-scale predictive model delivers significant speedups, often in the range of 10-60$\times$, with little loss in accuracy for linear inverse problems associated with images, videos, and light fields.
  • Randomness extractors, which extract high quality (almost-uniform) random bits from biased random sources, are important objects both in theory and in practice. While there have been significant progress in obtaining near optimal constructions of randomness extractors in various settings, the computational complexity of randomness extractors is still much less studied. In particular, it is not clear whether randomness extractors with good parameters can be computed in several interesting complexity classes that are much weaker than P. In this paper we study randomness extractors in the following two models of computation: (1) constant-depth circuits (AC0), and (2) the local computation model. Previous work in these models, such as [Vio05a], [GVW15] and [BG13], only achieve constructions with weak parameters. In this work we give explicit constructions of randomness extractors with much better parameters. As an application, we use our AC0 extractors to study pseudorandom generators in AC0, and show that we can construct both cryptographic pseudorandom generators (under reasonable computational assumptions) and unconditional pseudorandom generators for space bounded computation with very good parameters. Our constructions combine several previous techniques in randomness extractors, as well as introduce new techniques to reduce or preserve the complexity of extractors, which may be of independent interest. These include (1) a general way to reduce the error of strong seeded extractors while preserving the AC0 property and small locality, and (2) a seeded randomness condenser with small locality.
  • Deep Reinforcement Learning (RL) recently emerged as one of the most competitive approaches for learning in sequential decision making problems with fully observable environments, e.g., computer Go. However, very little work has been done in deep RL to handle partially observable environments. We propose a new architecture called Action-specific Deep Recurrent Q-Network (ADRQN) to enhance learning performance in partially observable domains. Actions are encoded by a fully connected layer and coupled with a convolutional observation to form an action-observation pair. The time series of action-observation pairs are then integrated by an LSTM layer that learns latent states based on which a fully connected layer computes Q-values as in conventional Deep Q-Networks (DQNs). We demonstrate the effectiveness of our new architecture in several partially observable domains, including flickering Atari games.
  • We suggest that the vacuum field equation in Finsler spacetime is equivalent to vanishing of Ricci scalar. Schwarzschild metric can be deduced from a solution of our field equation if the spacetime preserve spherical symmetry. Supposing spacetime to preserve the symmetry of "Finslerian sphere", we find a non-Riemannian exact solution of the Finslerian vacuum field equation. The solution is similar to the Schwarzschild metric. It reduces to Schwarzschild metric while the Finslerian parameter $\epsilon$ vanishes. It is proved that the Finslerian covariant derivative of the geometrical part of the gravitational field equation is conserved. The interior solution is also given. We get solutions of geodesic equation in such a Schwarzschild-like spacetime, and show that the geodesic equation returns to the counterpart in Newton's gravity at weak field approximation. The celestial observations give constraint on the Finslerian parameter $\epsilon<10^{-4}$. And the recent Michelson-Morley experiment requires $\epsilon<10^{-16}$. The counterpart of Birkhoff's theorem exist in Finslerian vacuum. It shows that the Finslerian gravitational field with the symmetry of "Finslerian sphere" in vacuum must be static.
  • The detection of gravitational waves (GWs) provides a powerful tool to constrain the cosmological parameters. In this paper, we investigate the possibility of using GWs as standard sirens in testing the anisotropy of the universe. We consider the GW signals produced by the coalescence of binary black hole systems and simulate hundreds of GW events from the advanced Laser Interferometer Gravitational-Wave Observatory (LIGO) and Virgo. It is found that the anisotropy of the universe can be tightly constrained if the redshift of the GW source is precisely known. The anisotropic amplitude can be constrained with an accuracy comparable to the Union2.1 complication of type-Ia supernovae if $\gtrsim 400$ GW events are observed. As for the preferred direction, $\gtrsim 800$ GW events are needed in order to achieve the accuracy of Union2.1. With 800 GW events, the probability of pseudo anisotropic signals with an amplitude comparable to Union2.1 is negligible. These results show that GWs can provide a complementary tool to supernovae in testing the anisotropy of the universe.
  • We have obtained Finslerian Ressiner-Nordstrom solution where it is asymptotic to a Finsler spacetime with constant flag curvature while $r\rightarrow\infty$. The covariant derivative of modified Einstein tensor in Finslerian gravitational field equation for this solution is conserved. The symmetry of the special Finslerian Ressiner-Nordstrom spacetime, namely, Finsler spacetime with constant flag curvature, has been investigated. It admits six independent Killing vectors. The Finslerian Ressiner-Nordstrom solution differs from Ressiner-Nordstrom metric only in two dimensional subspace. And our solution requires that its two dimensional subspace have constant flag curvature. We have obtained eigenfunction of Finslerian Laplace operator of "Finslerian sphere", namely, a special subspace with positive constant flag curvature. The eigenfunction is of the form $\bar{Y}_l^m=Y_l^m+\epsilon^2(C_{l+2}^m Y_{l+2}^m+C_{l-2}^m Y_{l-2}^m)$ in powers of Finslerian parameter $\epsilon$, where $C_{l+2}^m$ and $C_{l-2}^m$ are constant. However, the eigenvalue depends on both $l$ and $m$. The eigenvalues corresponded to $Y_1^0$ remain the same with Riemannian Laplace operator and the eigenvalues corresponded to $Y_1^{\pm1}$ are different. This fact just reflect the symmetry of "Finslerian sphere", which admits a rotational symmetry along $z$-axis and breaks other symmetry of Riemannian sphere. The eigenfunction of Finslerian Laplace operator implies that monopolar and dipolar terms of multipole expansion of gravitational potential are unchanged and other multipole terms are changed.
  • Deep Reinforcement Learning (RL) recently emerged as one of the most competitive approaches for learning in sequential decision making problems with fully observable environments, e.g., computer Go. However, very little work has been done in deep RL to handle partially observable environments. We propose a new architecture called Action-specific Deep Recurrent Q-Network (ADRQN) to enhance learning performance in partially observable domains. Actions are encoded by a fully connected layer and coupled with a convolutional observation to form an action-observation pair. The time series of action-observation pairs are then integrated by an LSTM layer that learns latent states based on which a fully connected layer computes Q-values as in conventional Deep Q-Networks (DQNs). We demonstrate the effectiveness of our new architecture in several partially observable domains, including flickering Atari games.
  • Existing approaches towards single image dehazing including both model-based and learning-based heavily rely on the estimation of so-called transmission maps. Despite its conceptual simplicity, using transmission maps as an intermediate step often makes it more difficult to optimize the perceptual quality of reconstructed images. To overcome this weakness, we propose a direct deep learning approach toward image dehazing bypassing the step of transmission map estimation and facilitating end-to-end perceptual optimization. Our technical contributions are mainly three-fold. First, based on the analogy between dehazing and denoising, we propose to directly learn a nonlinear mapping from the space of degraded images to that of haze-free ones via recursive deep residual learning; Second, inspired by the success of generative adversarial networks (GAN), we propose to optimize the perceptual quality of dehazed images by introducing a discriminator and a loss function adaptive to hazy conditions; Third, we propose to remove notorious halo-like artifacts at large scene depth discontinuities by a novel application of guided filtering. Extensive experimental results have shown that the subjective qualities of dehazed images by the proposed perceptually optimized GAN (POGAN) are often more favorable than those by existing state-of-the-art approaches especially when hazy condition varies.
  • Target-oriented sentiment classification aims at classifying sentiment polarities over individual opinion targets in a sentence. RNN with attention seems a good fit for the characteristics of this task, and indeed it achieves the state-of-the-art performance. After re-examining the drawbacks of attention mechanism and the obstacles that block CNN to perform well in this classification task, we propose a new model to overcome these issues. Instead of attention, our model employs a CNN layer to extract salient features from the transformed word representations originated from a bi-directional RNN layer. Between the two layers, we propose a component to generate target-specific representations of words in the sentence, meanwhile incorporate a mechanism for preserving the original contextual information from the RNN layer. Experiments show that our model achieves a new state-of-the-art performance on a few benchmarks.
  • Aspect Term Extraction (ATE), a key sub-task in Aspect-Based Sentiment Analysis, aims to extract explicit aspect expressions from online user reviews. We present a new framework for tackling ATE. It can exploit two useful clues, namely opinion summary and aspect detection history. Opinion summary is distilled from the whole input sentence, conditioned on each current token for aspect prediction, and thus the tailor-made summary can help aspect prediction on this token. Another clue is the information of aspect detection history, and it is distilled from the previous aspect predictions so as to leverage the coordinate structure and tagging schema constraints to upgrade the aspect prediction. Experimental results over four benchmark datasets clearly demonstrate that our framework can outperform all state-of-the-art methods.
  • The topological invariants of a periodic system can be used to define the topological phase of each band and determine the existence of topological interface states within a certain bandgap. Here, we propose a scheme based on the full phase diagrams, and design the topological interface states within any specified bandgaps. As an example, here we propose a kind of one-dimensional phononic crystals. By connecting two semi-infinite structures with different topological phases, the interface states within any specific bandgap or their combinations can be achieved in a rational manner. The existence of interface states in a single bandgap, in all odd bandgaps, in all even bandgaps, or in all bandgaps, are verified in simulations and experiments. The scheme of full phase diagrams we introduce here can be extended to other kinds of periodic systems, such as photonic crystals and designer plasmonic crystals.
  • We construct Cartan subalgebras in all classifiable stably finite C*-algebras which are unital or stably projectionless with trivial pairing between K-theory and traces.
  • We study two basic problems regarding edit error, i.e. document exchange and error correcting codes for edit errors (insdel codes). For message length $n$ and edit error upper bound $k$, it is known that in both problems the optimal sketch size or the optimal number of redundant bits is $\Theta(k \log \frac{n}{k})$. However, known constructions are far from achieving these bounds. We significantly improve previous results on both problems. For document exchange, we give an efficient deterministic protocol with sketch size $O(k\log^2 \frac{n}{k})$. This significantly improves the previous best known deterministic protocol, which has sketch size $O(k^2 + k \log^2 n)$ (Belazzougui15). For binary insdel codes, we obtain the following results: 1. An explicit binary insdel code which encodes an $n$-bit message $x$ against $k$ errors with redundancy $O(k \log^2 \frac{n}{k})$. In particular this implies an explicit family of binary insdel codes that can correct $\varepsilon$ fraction of insertions and deletions with rate $1-O(\varepsilon \log^2 (\frac{1}{\varepsilon}))=1-\widetilde{O}(\varepsilon)$. 2. An explicit binary insdel code which encodes an $n$-bit message $x$ against $k$ errors with redundancy $O(k \log n)$. This is the first explicit construction of binary insdel codes that has optimal redundancy for a wide range of error parameters $k$, and this brings our understanding of binary insdel codes much closer to that of standard binary error correcting codes. In obtaining our results we introduce the notion of \emph{$\varepsilon$-self matching hash functions} and \emph{$\varepsilon$-synchronization hash functions}. We believe our techniques can have further applications in the literature.
  • We show that the Liouville property and Reiter's condition are equivalent for semigroupoids. This result applies to semigroups as well as semigroup actions. In the special case of measured groupoids and locally compact groupoids, our result proves Kaimanovich's conjecture of the equivalence of amenability and the Liouville property.
  • We primarily study a special a weighted low-rank approximation of matrices and then apply it to solve the background modeling problem. We propose two algorithms for this purpose: one operates in the batch mode on the entire data and the other one operates in the batch-incremental mode on the data and naturally captures more background variations and computationally more effective. Moreover, we propose a robust technique that learns the background frame indices from the data and does not require any training frames. We demonstrate through extensive experiments that by inserting a simple weight in the Frobenius norm, it can be made robust to the outliers similar to the $\ell_1$ norm. Our methods match or outperform several state-of-the-art online and batch background modeling methods in virtually all quantitative and qualitative measures.
  • We present explicit constructions of non-malleable codes with respect to the following tampering classes. (i) Linear functions composed with split-state adversaries: In this model, the codeword is first tampered by a split-state adversary, and then the whole tampered codeword is further tampered by a linear function. (ii) Interleaved split-state adversary: Here the codeword is partitioned in an unknown (but fixed) way, and then tampered by a split-state adversary. (iii) Bounded communication split-state model: In this model, the split-state adversaries are allowed to participate in a communication protocol (with bounded communication budget) to tamper the codeword. Our results are the first explicit constructions of non-malleable codes in any of these tampering models. We derive all our non-malleable codes from explicit constructions of seedless non-malleable extractors. We believe that our results on seedless non-malleable extractors and the techniques developed are of independent interest. Using our techniques, we also give an improved extractor for an unknown interleaving of two independent sources.
  • The recent line of study on randomness extractors has been a great success, resulting in exciting new techniques, new connections, and breakthroughs to long standing open problems in several seemingly different topics. These include seeded non-malleable extractors, privacy amplification protocols with an active adversary, independent source extractors (and explicit Ramsey graphs), and non-malleable codes in the split state model. However, in all cases there is still a gap to optimum and the motivation to close this gap remains strong. In this paper, we introduce a set of new techniques to further push the frontier in the above questions. Our techniques lead to improvements in all of the above questions, and in several cases partially optimal constructions. Specifically, we obtain: 1. A seeded non-malleable extractor with seed length $O(log n)+log^{1+o(1)}(1/\epsilon) and entropy requirement O(log log n+log(1/\epsilon)), where the entropy requirement is asymptotically optimal by a recent result of Gur and Shinkar \cite{GurS17}; 2. A two-round privacy amplification protocol with optimal entropy loss for security parameter up to \Omega(k), which solves the privacy amplification problem completely; 3. A two-source extractor for entropy O(\frac{log n log log n}{log log log n}), which also gives an explicit Ramsey graph on N vertices with no clique or independent set of size (log N)^{O(\frac{log log log N}{log log log log N})}; and 4. The first explicit non-malleable code in the 2-split state model with \emph{constant} rate, which has been a major goal in the study of non-malleable codes for quite some time. One small caveat is that the error of this code is only (an arbitrarily small) constant, but we can also achieve negligible error with rate \Omega(log log log n/log log n), which already improves the rate in \cite{Li17} exponentially.
  • We compute K-theory for the reduced group C*-algebras of generalized Lamplighter groups.
  • Synchronization strings are recently introduced by Haeupler and Shahrasbi (STOC 2017) in the study of codes for correcting insertion and deletion errors (insdel codes). They showed that for any parameter $\varepsilon>0$, synchronization strings of arbitrary length exist over an alphabet whose size depends only on $\varepsilon$. Specifically, they obtained an alphabet size of $O(\varepsilon^{-4})$, which left an open question on where the minimal size of such alphabets lies between $\Omega(\varepsilon^{-1})$ and $O(\varepsilon^{-4})$. In this work, we partially bridge this gap by providing an improved lower bound of $\Omega(\varepsilon^{-3/2})$, and an improved upper bound of $O(\varepsilon^{-2})$. We also provide fast explicit constructions of synchronization strings over small alphabets. Further, along the lines of previous work on similar combinatorial objects, we study the extremal question of the smallest possible alphabet size over which synchronization strings can exist for some constant $\varepsilon < 1$. We show that one can construct $\varepsilon$-synchronization strings over alphabets of size four while no such string exists over binary alphabets. This reduces the extremal question to whether synchronization strings exist over ternary alphabets.
  • Designing a scheme that can achieve a good performance in predicting single person activities and group activities is a challenging task. In this paper, we propose a novel robust and efficient human activity recognition scheme called ReHAR, which can be used to handle single person activities and group activities prediction. First, we generate an optical flow image for each video frame. Then, both video frames and their corresponding optical flow images are fed into a Single Frame Representation Model to generate representations. Finally, an LSTM is used to pre- dict the final activities based on the generated representations. The whole model is trained end-to-end to allow meaningful representations to be generated for the final activity recognition. We evaluate ReHAR using two well-known datasets: the NCAA Basketball Dataset and the UCFSports Action Dataset. The experimental results show that the pro- posed ReHAR achieves a higher activity recognition accuracy with an order of magnitude shorter computation time compared to the state-of-the-art methods.
  • We demonstrate a ventilated metamaterial absorber operating at low frequency (< 500 Hz).With only two layers of the absorption units, high-efficiency absorption (> 90%) has been achieved in both simulations and experiments. This high-efficiency absorption under ventilation condition is originated from the weak coupling of the two identical split tube resonators constituting the absorber, which leads to the hybridization of the degenerate eigenmodes and breaks the absorption upper limit of 50% for conventional transmissive symmetric acoustic absorbers. The absorber can also be extended to an array and work in free space. The absorber should have potential applications in acoustic engineering where both noise reduction and ventilation are required.
  • We demonstrate that a strong asymmetric transmission for forward and backward propagation of tilted circular polarized optical waves is supported by ultrathin epsilon-near-zero hyperbolic slabs. We find that, remarkably, this effect is solely triggered by anisotropy without resorting to any breaking of reciprocity and chiral symmetries or spatial nonlocal effects. In addition, we show that the asymmetric transmission undergoes a dramatic enhancement if the slab is hyperbolic in the epsilon-near-zero regime. This happens since, close to epsilon-near-zero point, the hyperbolic dispersion activates etalon resonances where extraordinary waves accumulate propagation phase even though the slab is ultrathin. The proposed strategy holds promise for realizing ultra-compact and efficient polarization devices at different frequency bands.
  • Collective migration dominates many phenomena, from cell movement in living systems to abiotic self-propelling particles. Focusing on the early stages of tumor evolution, we enunciate the principles involved in cell dynamics and highlight their implications in understanding similar behavior in seemingly unrelated soft glassy materials and possibly chemokine-induced migration of CD8$^{+}$ T cells. We performed simulations of tumor invasion using a minimal three dimensional model, accounting for cell elasticity and adhesive cell-cell interactions as well as cell birth and death to establish that cell growth rate-dependent tumor expansion results in the emergence of distinct topological niches. Cells at the periphery move with higher velocity perpendicular to the tumor boundary, while motion of interior cells is slower and isotropic. The mean square displacement, $\Delta(t)$, of cells exhibits glassy behavior at times comparable to the cell cycle time, while exhibiting super-diffusive behavior, $\Delta (t) \approx t^{\alpha}$ ($\alpha > 1$), at longer times. We derive the value of $\alpha \approx 1.33$ using a field theoretic approach based on stochastic quantization. In the process we establish the universality of super-diffusion in a class of seemingly unrelated non-equilibrium systems. Super diffusion at long times arises only if there is an imbalance between cell birth and death rates. Our findings for the collective migration, which also suggests that tumor evolution occurs in a polarized manner, are in quantitative agreement with {\it in vitro} experiments. Although set in the context of tumor invasion the findings should also hold in describing collective motion in growing cells and in active systems where creation and annihilation of particles play a role.
  • Image demosaicing - one of the most important early stages in digital camera pipelines - addressed the problem of reconstructing a full-resolution image from so-called color-filter-arrays. Despite tremendous progress made in the pase decade, a fundamental issue that remains to be addressed is how to assure the visual quality of reconstructed images especially in the presence of noise corruption. Inspired by recent advances in generative adversarial networks (GAN), we present a novel deep learning approach toward joint demosaicing and denoising (JDD) with perceptual optimization in order to ensure the visual quality of reconstructed images. The key contributions of this work include: 1) we have developed a GAN-based approach toward image demosacing in which a discriminator network with both perceptual and adversarial loss functions are used for quality assurance; 2) we propose to optimize the perceptual quality of reconstructed images by the proposed GAN in an end-to-end manner. Such end-to-end optimization of GAN is particularly effective for jointly exploiting the gain brought by each modular component (e.g., residue learning in the generative network and perceptual loss in the discriminator network). Our extensive experimental results have shown convincingly improved performance over existing state-of-the-art methods in terms of both subjective and objective quality metrics with a comparable computational cost.