-
Easy, Interpretable, Effective: openSMILE for voice deepfake detection
Authors:
Octavian Pascu,
Dan Oneata,
Horia Cucu,
Nicolas M. Müller
Abstract:
In this paper, we demonstrate that attacks in the latest ASVspoof5 dataset -- a de facto standard in the field of voice authenticity and deepfake detection -- can be identified with surprising accuracy using a small subset of very simplistic features. These are derived from the openSMILE library, and are scalar-valued, easy to compute, and human interpretable. For example, attack A10`s unvoiced se…
▽ More
In this paper, we demonstrate that attacks in the latest ASVspoof5 dataset -- a de facto standard in the field of voice authenticity and deepfake detection -- can be identified with surprising accuracy using a small subset of very simplistic features. These are derived from the openSMILE library, and are scalar-valued, easy to compute, and human interpretable. For example, attack A10`s unvoiced segments have a mean length of 0.09 +- 0.02, while bona fide instances have a mean length of 0.18 +- 0.07. Using this feature alone, a threshold classifier achieves an Equal Error Rate (EER) of 10.3% for attack A10. Similarly, across all attacks, we achieve up to 0.8% EER, with an overall EER of 15.7 +- 6.0%. We explore the generalization capabilities of these features and find that some of them transfer effectively between attacks, primarily when the attacks originate from similar Text-to-Speech (TTS) architectures. This finding may indicate that voice anti-spoofing is, in part, a problem of identifying and remembering signatures or fingerprints of individual TTS systems. This allows to better understand anti-spoofing models and their challenges in real-world application.
△ Less
Submitted 29 August, 2024; v1 submitted 28 August, 2024;
originally announced August 2024.
-
Bosonic Quantum Error Correction with Neutral Atoms in Optical Dipole Traps
Authors:
Leon H. Bohnmann,
David F. Locher,
Johannes Zeiher,
Markus Müller
Abstract:
Bosonic quantum error correction codes encode logical qubits in the Hilbert space of one or multiple harmonic oscillators. A prominent class of bosonic codes are Gottesman-Kitaev-Preskill (GKP) codes of which implementations have been demonstrated with trapped ions and microwave cavities. In this work, we investigate theoretically the preparation and error correction of a GKP qubit in a vibrationa…
▽ More
Bosonic quantum error correction codes encode logical qubits in the Hilbert space of one or multiple harmonic oscillators. A prominent class of bosonic codes are Gottesman-Kitaev-Preskill (GKP) codes of which implementations have been demonstrated with trapped ions and microwave cavities. In this work, we investigate theoretically the preparation and error correction of a GKP qubit in a vibrational mode of a neutral atom stored in an optical dipole trap. This platform has recently shown remarkable progress in simultaneously controlling the motional and electronic degrees of freedom of trapped atoms. The protocols we develop make use of motional states and, additionally, internal electronic states of the trapped atom to serve as an ancilla qubit. We compare optical tweezer arrays and optical lattices and find that the latter provide more flexible control over the confinement in the out-of-plane direction, which can be utilized to optimize the conditions for the implementation of GKP codes. Concretely, the different frequency scales that the harmonic oscillators in the axial and radial lattice directions exhibit and a small oscillator anharmonicity prove to be beneficial for robust encodings of GKP states. Finally, we underpin the experimental feasibility of the proposed protocols by numerically simulating the preparation of GKP qubits in optical lattices with realistic parameters.
△ Less
Submitted 26 August, 2024;
originally announced August 2024.
-
Automated Synthesis of Fault-Tolerant State Preparation Circuits for Quantum Error Correction Codes
Authors:
Tom Peham,
Ludwig Schmid,
Lucas Berent,
Markus Müller,
Robert Wille
Abstract:
A central ingredient in fault-tolerant quantum algorithms is the initialization of a logical state for a given quantum error-correcting code from a set of noisy qubits. A scheme that has demonstrated promising results for small code instances that are realizable on currently available hardware composes a non-fault-tolerant state preparation step with a verification step that checks for spreading e…
▽ More
A central ingredient in fault-tolerant quantum algorithms is the initialization of a logical state for a given quantum error-correcting code from a set of noisy qubits. A scheme that has demonstrated promising results for small code instances that are realizable on currently available hardware composes a non-fault-tolerant state preparation step with a verification step that checks for spreading errors. Known circuit constructions of this scheme are mostly obtained manually, and no algorithmic techniques for constructing depth- or gate-optimal circuits exist. As a consequence, the current state of the art exploits this scheme only for specific code instances and mostly for the special case of distance 3 codes. In this work, we propose an automated approach for synthesizing fault-tolerant state preparation circuits for arbitrary CSS codes. We utilize methods based on satisfiability solving (SAT) techniques to construct fault-tolerant state preparation circuits consisting of depth- and gate-optimal preparation and verification circuits. We also provide heuristics that can synthesize fault-tolerant state preparation circuits for code instances where no optimal solution can be obtained in an adequate timeframe. Moreover, we give a general construction for non-deterministic state preparation circuits beyond distance 3. Numerical evaluations using $d=3$ and $d=5$ codes confirm that the generated circuits exhibit the desired scaling of the logical error rates. The resulting methods are publicly available as part of the Munich Quantum Toolkit (MQT) at https://github.com/cda-tum/mqt-qecc. Such methods are an important step in providing fault-tolerant circuit constructions that can aid in near-term demonstration of fault-tolerant quantum computing.
△ Less
Submitted 21 August, 2024;
originally announced August 2024.
-
Gaussian Processes with Noisy Regression Inputs for Dynamical Systems
Authors:
Tobias M. Wolff,
Victor G. Lopez,
Matthias A. Müller
Abstract:
This paper is centered around the approximation of dynamical systems by means of Gaussian processes. To this end, trajectories of such systems must be collected to be used as training data. The measurements of these trajectories are typically noisy, which implies that both the regression inputs and outputs are corrupted by noise. However, most of the literature considers only noise in the regressi…
▽ More
This paper is centered around the approximation of dynamical systems by means of Gaussian processes. To this end, trajectories of such systems must be collected to be used as training data. The measurements of these trajectories are typically noisy, which implies that both the regression inputs and outputs are corrupted by noise. However, most of the literature considers only noise in the regression outputs. In this paper, we show how to account for the noise in the regression inputs in an extended Gaussian process framework to approximate scalar and multidimensional systems. We demonstrate the potential of our framework by comparing it to different state-of-the-art methods in several simulation examples.
△ Less
Submitted 16 August, 2024;
originally announced August 2024.
-
Event-triggered moving horizon estimation for nonlinear systems
Authors:
Isabelle Krauss,
Julian D. Schiller,
Victor G. Lopez,
Matthias A. Müller
Abstract:
This work proposes an event-triggered moving horizon estimation (ET-MHE) scheme for general nonlinear systems. The key components of the proposed scheme are a novel event-triggering mechanism (ETM) and the suitable design of the MHE cost function. The main characteristic of our method is that the MHE's nonlinear optimization problem is only solved when the ETM triggers the transmission of measured…
▽ More
This work proposes an event-triggered moving horizon estimation (ET-MHE) scheme for general nonlinear systems. The key components of the proposed scheme are a novel event-triggering mechanism (ETM) and the suitable design of the MHE cost function. The main characteristic of our method is that the MHE's nonlinear optimization problem is only solved when the ETM triggers the transmission of measured data to the remote state estimator. If no event occurs, then the current state estimate results from an open-loop prediction using the system dynamics. Furthermore, we show robust global exponential stability of the ET-MHE under a suitable detectability condition. Finally, we illustrate the applicability of the proposed method in terms of a nonlinear benchmark example, where we achieved similar estimation performance compared to standard MHE using 86% less computational resources.
△ Less
Submitted 12 August, 2024;
originally announced August 2024.
-
Surveys Considered Harmful? Reflecting on the Use of Surveys in AI Research, Development, and Governance
Authors:
Mohammmad Tahaei,
Daricia Wilkinson,
Alisa Frik,
Michael Muller,
Ruba Abu-Salma,
Lauren Wilcox
Abstract:
Calls for engagement with the public in Artificial Intelligence (AI) research, development, and governance are increasing, leading to the use of surveys to capture people's values, perceptions, and experiences related to AI. In this paper, we critically examine the state of human participant surveys associated with these topics. Through both a reflexive analysis of a survey pilot spanning six coun…
▽ More
Calls for engagement with the public in Artificial Intelligence (AI) research, development, and governance are increasing, leading to the use of surveys to capture people's values, perceptions, and experiences related to AI. In this paper, we critically examine the state of human participant surveys associated with these topics. Through both a reflexive analysis of a survey pilot spanning six countries and a systematic literature review of 44 papers featuring public surveys related to AI, we explore prominent perspectives and methodological nuances associated with surveys to date. We find that public surveys on AI topics are vulnerable to specific Western knowledge, values, and assumptions in their design, including in their positioning of ethical concepts and societal values, lack sufficient critical discourse surrounding deployment strategies, and demonstrate inconsistent forms of transparency in their reporting. Based on our findings, we distill provocations and heuristic questions for our community, to recognize the limitations of surveys for meeting the goals of engagement, and to cultivate shared principles to design, deploy, and interpret surveys cautiously and responsibly.
△ Less
Submitted 26 July, 2024;
originally announced August 2024.
-
Off-axis Hartmann wavefront sensing for the GMT-Consortium Large Earth Finder (G-CLEF) red camera optics
Authors:
Matthew C. H. Leung,
Colby A. Jurgenson,
Andrew Szentgyorgyi,
Brian McLeod,
Cem Onyuksel,
Joseph Zajac,
David Charbonneau,
William Podgorski,
Abigail Unger,
Mark Mueller,
Matthew Smith,
Daniel Baldwin,
V. Ashley Villar
Abstract:
The Hartmann test is a method used to measure the wavefront error in a focal optical system, wherein a mask with a pattern of small holes is placed at the system's aperture stop. By taking an image at a defocused plane, the differences between the ideal and real positions of the reimaged holes (called the transverse ray aberrations) can be measured, which can then be used to estimate the wavefront…
▽ More
The Hartmann test is a method used to measure the wavefront error in a focal optical system, wherein a mask with a pattern of small holes is placed at the system's aperture stop. By taking an image at a defocused plane, the differences between the ideal and real positions of the reimaged holes (called the transverse ray aberrations) can be measured, which can then be used to estimate the wavefront error. However, the Hartmann test is usually used with an on-axis field. In this paper, we present a wavefront sensing method which generalizes the classical Hartmann test for off-axis field angles and arbitrary reference wavefronts. Our method involves taking images at two defocused planes, and then using the real reimaged hole positions on both planes to estimate the trajectories of rays from the system's exit pupil, at which the reference wavefront is situated. We then propagate the rays forward from the reference wavefront to one of the two defocused planes, in order to find the ideal reimaged hole positions, from which we can compute transverse ray aberrations. We derive and solve a pair of nonlinear partial differential equations relating transverse ray aberrations to wavefront error, using Zernike decomposition and nonlinear least squares. Our method has been verified on simulated data from the 7-lens f/2.25 red camera system of the GMT-Consortium Large Earth Finder (G-CLEF), a high resolution optical echelle spectrograph which will be a first light instrument for the Giant Magellan Telescope (GMT).
△ Less
Submitted 29 July, 2024;
originally announced July 2024.
-
Svalbard Marginal Ice Zone 2024 Campaign -- Cruise Report
Authors:
Malte Müller,
Jean Rabault,
Cyril Palerme
Abstract:
The coupling of weather, sea-ice, ocean, and wave forecasting systems has been a long-standing research focus to improve Arctic forecasting system and their realism and is also a priority of international initiatives such as the WMO research project PCAPS. The goal of the Svalbard Marginal Ice Zone 2024 Campaign was to observe and better understand the complex interplay between atmosphere, waves,…
▽ More
The coupling of weather, sea-ice, ocean, and wave forecasting systems has been a long-standing research focus to improve Arctic forecasting system and their realism and is also a priority of international initiatives such as the WMO research project PCAPS. The goal of the Svalbard Marginal Ice Zone 2024 Campaign was to observe and better understand the complex interplay between atmosphere, waves, and sea-ice in the winter Marginal Ice Zone (MIZ) in order to advance the predictive skill of coupled Arctic forecasting systems. The main objective has been to set up a network of observations with a spatial distribution that allows for a representative comparison between in situ observations and gridded model data. The observed variables include air and surface temperature, sea-ice drift, and wave energy spectra. With the support of the Norwegian Coast Guard, we participated in the research cruise with KV Svalbard from 4. April - 21.April 2024. In total 34 buoys were deployed in the Marginal Ice Zone north of the Svalbard Archipelago. The first part of the report describes the instruments and their calibration (Section 2), and the second part briefly describes the weather, sea ice, and wave conditions during the campaign.
△ Less
Submitted 10 July, 2024;
originally announced July 2024.
-
AI-based Density Recognition
Authors:
Simone Müller,
Daniel Kolb,
Matthias Müller,
Dieter Kranzlmüller
Abstract:
Learning-based analysis of images is commonly used in the fields of mobility and robotics for safe environmental motion and interaction. This requires not only object recognition but also the assignment of certain properties to them. With the help of this information, causally related actions can be adapted to different circumstances. Such logical interactions can be optimized by recognizing objec…
▽ More
Learning-based analysis of images is commonly used in the fields of mobility and robotics for safe environmental motion and interaction. This requires not only object recognition but also the assignment of certain properties to them. With the help of this information, causally related actions can be adapted to different circumstances. Such logical interactions can be optimized by recognizing object-assigned properties. Density as a physical property offers the possibility to recognize how heavy an object is, which material it is made of, which forces are at work, and consequently which influence it has on its environment. Our approach introduces an AI-based concept for assigning physical properties to objects through the use of associated images. Based on synthesized data, we derive specific patterns from 2D images using a neural network to extract further information such as volume, material, or density. Accordingly, we discuss the possibilities of property-based feature extraction to improve causally related logics.
△ Less
Submitted 24 July, 2024;
originally announced July 2024.
-
Mitigating Catastrophic Forgetting in Language Transfer via Model Merging
Authors:
Anton Alexandrov,
Veselin Raychev,
Mark Niklas Müller,
Ce Zhang,
Martin Vechev,
Kristina Toutanova
Abstract:
As open-weight large language models (LLMs) achieve ever more impressive performances across a wide range of tasks in English, practitioners aim to adapt these models to different languages. However, such language adaptation is often accompanied by catastrophic forgetting of the base model's capabilities, severely limiting the usefulness of the resulting model. We address this issue by proposing B…
▽ More
As open-weight large language models (LLMs) achieve ever more impressive performances across a wide range of tasks in English, practitioners aim to adapt these models to different languages. However, such language adaptation is often accompanied by catastrophic forgetting of the base model's capabilities, severely limiting the usefulness of the resulting model. We address this issue by proposing Branch-and-Merge (BaM), a new adaptation method based on iteratively merging multiple models, fine-tuned on a subset of the available training data. BaM is based on the insight that this yields lower magnitude but higher quality weight changes, reducing forgetting of the source domain while maintaining learning on the target domain. We demonstrate in an extensive empirical study on Bulgarian and German that BaM can significantly reduce forgetting while matching or even improving target domain performance compared to both standard continued pretraining and instruction finetuning across different model architectures.
△ Less
Submitted 16 July, 2024; v1 submitted 11 July, 2024;
originally announced July 2024.
-
The XYZ ruby code: Making a case for a three-colored graphical calculus for quantum error correction in spacetime
Authors:
Julio C. Magdalena de la Fuente,
Josias Old,
Alex Townsend-Teague,
Manuel Rispler,
Jens Eisert,
Markus Müller
Abstract:
Analyzing and developing new quantum error-correcting schemes is one of the most prominent tasks in quantum computing research. In such efforts, introducing time dynamics explicitly in both analysis and design of error-correcting protocols constitutes an important cornerstone. In this work, we present a graphical formalism based on tensor networks to capture the logical action and error-correcting…
▽ More
Analyzing and developing new quantum error-correcting schemes is one of the most prominent tasks in quantum computing research. In such efforts, introducing time dynamics explicitly in both analysis and design of error-correcting protocols constitutes an important cornerstone. In this work, we present a graphical formalism based on tensor networks to capture the logical action and error-correcting capabilities of any Clifford circuit with Pauli measurements. We showcase the formalism on new Floquet codes derived from topological subsystem codes, which we call XYZ ruby codes. Based on the projective symmetries of the building blocks of the tensor network we develop a framework of Pauli flows. Pauli flows allow for a graphical understanding of all quantities entering an error correction analysis of a circuit, including different types of QEC experiments, such as memory and stability experiments. We lay out how to derive a well-defined decoding problem from the tensor network representation of a protocol and its Pauli flows alone, independent of any stabilizer code or fixed circuit. Importantly, this framework applies to all Clifford protocols and encompasses both measurement- and circuit-based approaches to fault tolerance. We apply our method to our new family of dynamical codes which are in the same topological phase as the 2+1d color code, making them a promising candidate for low-overhead logical gates. In contrast to its static counterpart, the dynamical protocol applies a Z3 automorphism to the logical Pauli group every three timesteps. We highlight some of its topological properties and comment on the anyon physics behind a planar layout. Lastly, we benchmark the performance of the XYZ ruby code on a torus by performing both memory and stability experiments and find competitive circuit-level noise thresholds of 0.18%, comparable with other Floquet codes and 2+1d color codes.
△ Less
Submitted 11 July, 2024;
originally announced July 2024.
-
Contrastive Learning of Preferences with a Contextual InfoNCE Loss
Authors:
Timo Bertram,
Johannes Fürnkranz,
Martin Müller
Abstract:
A common problem in contextual preference ranking is that a single preferred action is compared against several choices, thereby blowing up the complexity and skewing the preference distribution. In this work, we show how one can solve this problem via a suitable adaptation of the CLIP framework.This adaptation is not entirely straight-forward, because although the InfoNCE loss used by CLIP has ac…
▽ More
A common problem in contextual preference ranking is that a single preferred action is compared against several choices, thereby blowing up the complexity and skewing the preference distribution. In this work, we show how one can solve this problem via a suitable adaptation of the CLIP framework.This adaptation is not entirely straight-forward, because although the InfoNCE loss used by CLIP has achieved great success in computer vision and multi-modal domains, its batch-construction technique requires the ability to compare arbitrary items, and is not well-defined if one item has multiple positive associations in the same batch. We empirically demonstrate the utility of our adapted version of the InfoNCE loss in the domain of collectable card games, where we aim to learn an embedding space that captures the associations between single cards and whole card pools based on human selections. Such selection data only exists for restricted choices, thus generating concrete preferences of one item over a set of other items rather than a perfect fit between the card and the pool.
Our results show that vanilla CLIP does not perform well due to the aforementioned intuitive issues. However, by adapting CLIP to the problem, we receive a model outperforming previous work trained with the triplet loss, while also alleviating problems associated with mining triplets.
△ Less
Submitted 8 July, 2024;
originally announced July 2024.
-
Learning With Generalised Card Representations for "Magic: The Gathering"
Authors:
Timo Bertram,
Johannes Fürnkranz,
Martin Müller
Abstract:
A defining feature of collectable card games is the deck building process prior to actual gameplay, in which players form their decks according to some restrictions. Learning to build decks is difficult for players and models alike due to the large card variety and highly complex semantics, as well as requiring meaningful card and deck representations when aiming to utilise AI. In addition, regula…
▽ More
A defining feature of collectable card games is the deck building process prior to actual gameplay, in which players form their decks according to some restrictions. Learning to build decks is difficult for players and models alike due to the large card variety and highly complex semantics, as well as requiring meaningful card and deck representations when aiming to utilise AI. In addition, regular releases of new card sets lead to unforeseeable fluctuations in the available card pool, thus affecting possible deck configurations and requiring continuous updates. Previous Game AI approaches to building decks have often been limited to fixed sets of possible cards, which greatly limits their utility in practice. In this work, we explore possible card representations that generalise to unseen cards, thus greatly extending the real-world utility of AI-based deck building for the game "Magic: The Gathering".We study such representations based on numerical, nominal, and text-based features of cards, card images, and meta information about card usage from third-party services. Our results show that while the particular choice of generalised input representation has little effect on learning to predict human card selections among known cards, the performance on new, unseen cards can be greatly improved. Our generalised model is able to predict 55\% of human choices on completely unseen cards, thus showing a deep understanding of card quality and strategy.
△ Less
Submitted 8 July, 2024;
originally announced July 2024.
-
Efficiently Training Neural Networks for Imperfect Information Games by Sampling Information Sets
Authors:
Timo Bertram,
Johannes Fürnkranz,
Martin Müller
Abstract:
In imperfect information games, the evaluation of a game state not only depends on the observable world but also relies on hidden parts of the environment. As accessing the obstructed information trivialises state evaluations, one approach to tackle such problems is to estimate the value of the imperfect state as a combination of all states in the information set, i.e., all possible states that ar…
▽ More
In imperfect information games, the evaluation of a game state not only depends on the observable world but also relies on hidden parts of the environment. As accessing the obstructed information trivialises state evaluations, one approach to tackle such problems is to estimate the value of the imperfect state as a combination of all states in the information set, i.e., all possible states that are consistent with the current imperfect information. In this work, the goal is to learn a function that maps from the imperfect game information state to its expected value. However, constructing a perfect training set, i.e. an enumeration of the whole information set for numerous imperfect states, is often infeasible. To compute the expected values for an imperfect information game like \textit{Reconnaissance Blind Chess}, one would need to evaluate thousands of chess positions just to obtain the training target for a single state. Still, the expected value of a state can already be approximated with appropriate accuracy from a much smaller set of evaluations. Thus, in this paper, we empirically investigate how a budget of perfect information game evaluations should be distributed among training samples to maximise the return. Our results show that sampling a small number of states, in our experiments roughly 3, for a larger number of separate positions is preferable over repeatedly sampling a smaller quantity of states. Thus, we find that in our case, the quantity of different samples seems to be more important than higher target quality.
△ Less
Submitted 8 July, 2024;
originally announced July 2024.
-
Neural Network-based Information Set Weighting for Playing Reconnaissance Blind Chess
Authors:
Timo Bertram,
Johannes Fürnkranz,
Martin Müller
Abstract:
In imperfect information games, the game state is generally not fully observable to players. Therefore, good gameplay requires policies that deal with the different information that is hidden from each player. To combat this, effective algorithms often reason about information sets; the sets of all possible game states that are consistent with a player's observations. While there is no way to dist…
▽ More
In imperfect information games, the game state is generally not fully observable to players. Therefore, good gameplay requires policies that deal with the different information that is hidden from each player. To combat this, effective algorithms often reason about information sets; the sets of all possible game states that are consistent with a player's observations. While there is no way to distinguish between the states within an information set, this property does not imply that all states are equally likely to occur in play. We extend previous research on assigning weights to the states in an information set in order to facilitate better gameplay in the imperfect information game of Reconnaissance Blind Chess. For this, we train two different neural networks which estimate the likelihood of each state in an information set from historical game data. Experimentally, we find that a Siamese neural network is able to achieve higher accuracy and is more efficient than a classical convolutional neural network for the given domain. Finally, we evaluate an RBC-playing agent that is based on the generated weightings and compare different parameter settings that influence how strongly it should rely on them. The resulting best player is ranked 5th on the public leaderboard.
△ Less
Submitted 8 July, 2024;
originally announced July 2024.
-
SignCLIP: Connecting Text and Sign Language by Contrastive Learning
Authors:
Zifan Jiang,
Gerard Sant,
Amit Moryossef,
Mathias Müller,
Rico Sennrich,
Sarah Ebling
Abstract:
We present SignCLIP, which re-purposes CLIP (Contrastive Language-Image Pretraining) to project spoken language text and sign language videos, two classes of natural languages of distinct modalities, into the same space. SignCLIP is an efficient method of learning useful visual representations for sign language processing from large-scale, multilingual video-text pairs, without directly optimizing…
▽ More
We present SignCLIP, which re-purposes CLIP (Contrastive Language-Image Pretraining) to project spoken language text and sign language videos, two classes of natural languages of distinct modalities, into the same space. SignCLIP is an efficient method of learning useful visual representations for sign language processing from large-scale, multilingual video-text pairs, without directly optimizing for a specific task or sign language which is often of limited size.
We pretrain SignCLIP on Spreadthesign, a prominent sign language dictionary consisting of ~500 thousand video clips in up to 44 sign languages, and evaluate it with various downstream datasets. SignCLIP discerns in-domain signing with notable text-to-video/video-to-text retrieval accuracy. It also performs competitively for out-of-domain downstream tasks such as isolated sign language recognition upon essential few-shot prompting or fine-tuning.
We analyze the latent space formed by the spoken language text and sign language poses, which provides additional linguistic insights. Our code and models are openly available.
△ Less
Submitted 1 July, 2024;
originally announced July 2024.
-
The basis problem for modular forms for the Weil representation
Authors:
Manuel K. -H. Müller
Abstract:
The vector valued theta series of a positive-definite even lattice is a modular form for the Weil representation of $\mathrm{SL}_2(\mathbb{Z})$. We show that the space of cusp forms for the Weil representation is generated by such functions. This gives a positive answer to Eichler's basis problem in this case. As applications we derive Waldspurger's result on the basis problem for scalar valued mo…
▽ More
The vector valued theta series of a positive-definite even lattice is a modular form for the Weil representation of $\mathrm{SL}_2(\mathbb{Z})$. We show that the space of cusp forms for the Weil representation is generated by such functions. This gives a positive answer to Eichler's basis problem in this case. As applications we derive Waldspurger's result on the basis problem for scalar valued modular forms and give a new proof of the surjectivity of the Borcherds lift based on the analysis of local Picard groups.
△ Less
Submitted 1 July, 2024;
originally announced July 2024.
-
Meta-experiments: Improving experimentation through experimentation
Authors:
Melanie J. I. Müller
Abstract:
A/B testing is widexly used in the industry to optimize customer facing websites. Many companies employ experimentation specialists to facilitate and improve the process of A/B testing. Here, we present the application of A/B testing to this improvement effort itself, by running experiments on the experimentation process, which we call 'meta-experiments'. We discuss the challenges of this approach…
▽ More
A/B testing is widexly used in the industry to optimize customer facing websites. Many companies employ experimentation specialists to facilitate and improve the process of A/B testing. Here, we present the application of A/B testing to this improvement effort itself, by running experiments on the experimentation process, which we call 'meta-experiments'. We discuss the challenges of this approach using the example of one of our meta-experiments, which helped experimenters to run more sufficiently powered A/B tests. We also point out the benefits of 'dog fooding' for the experimentation specialists when running their own experiments.
△ Less
Submitted 24 June, 2024;
originally announced June 2024.
-
Grokking the Sequent Calculus (Functional Pearl)
Authors:
David Binder,
Marco Tzschentke,
Marius Müller,
Klaus Ostermann
Abstract:
The sequent calculus is a proof system which was designed as a more symmetric alternative to natural deduction. The λμμ-calculus is a term assignment system for the sequent calculus and a great foundation for compiler intermediate languages due to its first-class representation of evaluation contexts. Unfortunately, only experts of the sequent calculus can appreciate its beauty. To remedy this, we…
▽ More
The sequent calculus is a proof system which was designed as a more symmetric alternative to natural deduction. The λμμ-calculus is a term assignment system for the sequent calculus and a great foundation for compiler intermediate languages due to its first-class representation of evaluation contexts. Unfortunately, only experts of the sequent calculus can appreciate its beauty. To remedy this, we present the first introduction to the λμμ-calculus which is not directed at type theorists or logicians but at compiler hackers and programming-language enthusiasts. We do this by writing a compiler from a small but interesting surface language to the λμμ-calculus as a compiler intermediate language.
△ Less
Submitted 20 June, 2024;
originally announced June 2024.
-
Abundant hydrocarbons in the disk around a very-low-mass star
Authors:
A. M. Arabhavi,
I. Kamp,
Th. Henning,
E. F. van Dishoeck,
V. Christiaens,
D. Gasman,
A. Perrin,
M. Güdel,
B. Tabone,
J. Kanwar,
L. B. F. M. Waters,
I. Pascucci,
M. Samland,
G. Perotti,
G. Bettoni,
S. L. Grant,
P. O. Lagage,
T. P. Ray,
B. Vandenbussche,
O. Absil,
I. Argyriou,
D. Barrado,
A. Boccaletti,
J. Bouwman,
A. Caratti o Garatti
, et al. (18 additional authors not shown)
Abstract:
Very low-mass stars (those <0.3 solar masses) host orbiting terrestrial planets more frequently than other types of stars, but the compositions of those planets are largely unknown. We use mid-infrared spectroscopy with the James Webb Space Telescope to investigate the chemical composition of the planet-forming disk around ISO-ChaI 147, a 0.11 solar-mass star. The inner disk has a carbon-rich chem…
▽ More
Very low-mass stars (those <0.3 solar masses) host orbiting terrestrial planets more frequently than other types of stars, but the compositions of those planets are largely unknown. We use mid-infrared spectroscopy with the James Webb Space Telescope to investigate the chemical composition of the planet-forming disk around ISO-ChaI 147, a 0.11 solar-mass star. The inner disk has a carbon-rich chemistry: we identify emission from 13 carbon-bearing molecules including ethane and benzene. We derive large column densities of hydrocarbons indicating that we probe deep into the disk. The high carbon to oxygen ratio we infer indicates radial transport of material within the disk, which we predict would affect the bulk composition of any planets forming in the disk.
△ Less
Submitted 20 June, 2024;
originally announced June 2024.
-
Certificates of Differential Privacy and Unlearning for Gradient-Based Training
Authors:
Matthew Wicker,
Philip Sosnin,
Adrianna Janik,
Mark N. Müller,
Adrian Weller,
Calvin Tsay
Abstract:
Proper data stewardship requires that model owners protect the privacy of individuals' data used during training. Whether through anonymization with differential privacy or the use of unlearning in non-anonymized settings, the gold-standard techniques for providing privacy guarantees can come with significant performance penalties or be too weak to provide practical assurances. In part, this is du…
▽ More
Proper data stewardship requires that model owners protect the privacy of individuals' data used during training. Whether through anonymization with differential privacy or the use of unlearning in non-anonymized settings, the gold-standard techniques for providing privacy guarantees can come with significant performance penalties or be too weak to provide practical assurances. In part, this is due to the fact that the guarantee provided by differential privacy represents the worst-case privacy leakage for any individual, while the true privacy leakage of releasing the prediction for a given individual might be substantially smaller or even, as we show, non-existent. This work provides a novel framework based on convex relaxations and bounds propagation that can compute formal guarantees (certificates) that releasing specific predictions satisfies $ε=0$ privacy guarantees or do not depend on data that is subject to an unlearning request. Our framework offers a new verification-centric approach to privacy and unlearning guarantees, that can be used to further engender user trust with tighter privacy guarantees, provide formal proofs of robustness to certain membership inference attacks, identify potentially vulnerable records, and enhance current unlearning approaches. We validate the effectiveness of our approach on tasks from financial services, medical imaging, and natural language processing.
△ Less
Submitted 19 June, 2024;
originally announced June 2024.
-
Winning Through Simplicity: Autonomous Car Design for Formula Student
Authors:
Tobias Friedrich,
Marco Müller,
Adrian Bauske,
Simon Härtl,
Johannes Herrmann,
David Förster,
Tobias Tietze,
Sebastian Sartor
Abstract:
This paper presents the design of an autonomous race car that is self-designed, self-developed, and self-built by the Elefant Racing team at the University of Bayreuth. The system is created to compete in the Formula Student Driverless competition. Its primary focus is on the Acceleration track, a straight 75-meter-long course, and the Skidpad track, which comprises two circles forming an eight. A…
▽ More
This paper presents the design of an autonomous race car that is self-designed, self-developed, and self-built by the Elefant Racing team at the University of Bayreuth. The system is created to compete in the Formula Student Driverless competition. Its primary focus is on the Acceleration track, a straight 75-meter-long course, and the Skidpad track, which comprises two circles forming an eight. Additionally, it is experimentally capable of competing in the Autocross and Trackdrive events, which feature tracks with previously unknown straights and curves. The paper details the hardware, software and sensor setup employed during the 2020/2021 season. Despite being developed by a small team with limited computer science expertise, the design won the Formula Student East Engineering Design award. Emphasizing simplicity and efficiency, the team employed streamlined techniques to achieve their success.
△ Less
Submitted 19 June, 2024;
originally announced June 2024.
-
Code Agents are State of the Art Software Testers
Authors:
Niels Mündler,
Mark Niklas Müller,
Jingxuan He,
Martin Vechev
Abstract:
Rigorous software testing is crucial for developing and maintaining high-quality code, making automated test generation a promising avenue for both improving software quality and boosting the effectiveness of code generation methods. However, while code generation with Large Language Models (LLMs) is an extraordinarily active research area, test generation remains relatively unexplored. We address…
▽ More
Rigorous software testing is crucial for developing and maintaining high-quality code, making automated test generation a promising avenue for both improving software quality and boosting the effectiveness of code generation methods. However, while code generation with Large Language Models (LLMs) is an extraordinarily active research area, test generation remains relatively unexplored. We address this gap and investigate the capability of LLM-based Code Agents for formalizing user issues into test cases. To this end, we propose a novel benchmark based on popular GitHub repositories, containing real-world issues, ground-truth patches, and golden tests. We find that LLMs generally perform surprisingly well at generating relevant test cases with Code Agents designed for code repair exceeding the performance of systems designed specifically for test generation. Further, as test generation is a similar but more structured task than code generation, it allows for a more fine-grained analysis using fail-to-pass rate and coverage metrics, providing a dual metric for analyzing systems designed for code repair. Finally, we find that generated tests are an effective filter for proposed code fixes, doubling the precision of SWE-Agent.
△ Less
Submitted 18 June, 2024;
originally announced June 2024.
-
Be careful in multi-messenger inference of the Hubble constant: A path forward for robust inference
Authors:
Michael Müller,
Suvodip Mukherjee,
Geoffrey Ryan
Abstract:
Multi-messenger observations of coalescing binary neutron stars (BNSs) are a direct probe of the expansion history of the universe and carry the potential to shed light on the disparity between low- and high-redshift measurements of the Hubble constant $H_0$. To measure the value of $H_0$ with such observations requires pristine inference of the luminosity distance and the true source redshift wit…
▽ More
Multi-messenger observations of coalescing binary neutron stars (BNSs) are a direct probe of the expansion history of the universe and carry the potential to shed light on the disparity between low- and high-redshift measurements of the Hubble constant $H_0$. To measure the value of $H_0$ with such observations requires pristine inference of the luminosity distance and the true source redshift with minimal impact from systematics. In this analysis, we carry out joint inference on mock gravitational wave (GW) signals and their electromagnetic (EM) afterglows from BNS coalescences and find that the inclination angle inferred from the afterglow light curve and apparent superluminal motion can be precise, but need not be accurate and is subject to systematic uncertainty that could be as large as $1.5σ$. This produces a disparity between the EM and GW inferred inclination angles, which if not carefully treated when combining observations can bias the inferred value of $H_0$. We also find that already small misalignments of $3^{\circ}-6^{\circ}$ between the inherent system inclinations for the GW and EM emission can bias the inference by $\mathcal{O}(1-2σ)$ if not taken into account. As multi-messenger BNS observations are rare, we must make the most out of a small number of events and harness the increased precision, while avoiding reduced accuracy. We demonstrate how to mitigate these potential sources of bias by jointly inferring the mismatch between the GW- and EM-based inclination angles and $H_0$.
△ Less
Submitted 17 June, 2024;
originally announced June 2024.
-
Expedient Assistance and Consequential Misunderstanding: Envisioning an Operationalized Mutual Theory of Mind
Authors:
Justin D. Weisz,
Michael Muller,
Arielle Goldberg,
Dario Andres Silva Moran
Abstract:
Design fictions allow us to prototype the future. They enable us to interrogate emerging or non-existent technologies and examine their implications. We present three design fictions that probe the potential consequences of operationalizing a mutual theory of mind (MToM) between human users and one (or more) AI agents. We use these fictions to explore many aspects of MToM, including how models of…
▽ More
Design fictions allow us to prototype the future. They enable us to interrogate emerging or non-existent technologies and examine their implications. We present three design fictions that probe the potential consequences of operationalizing a mutual theory of mind (MToM) between human users and one (or more) AI agents. We use these fictions to explore many aspects of MToM, including how models of the other party are shaped through interaction, how discrepancies between these models lead to breakdowns, and how models of a human's knowledge and skills enable AI agents to act in their stead. We examine these aspects through two lenses: a utopian lens in which MToM enhances human-human interactions and leads to synergistic human-AI collaborations, and a dystopian lens in which a faulty or misaligned MToM leads to problematic outcomes. Our work provides an aspirational vision for human-centered MToM research while simultaneously warning of the consequences when implemented incorrectly.
△ Less
Submitted 17 June, 2024;
originally announced June 2024.
-
Model-Based Deep Learning for Music Information Research
Authors:
Gael Richard,
Vincent Lostanlen,
Yi-Hsuan Yang,
Meinard Müller
Abstract:
In this article, we investigate the notion of model-based deep learning in the realm of music information research (MIR). Loosely speaking, we refer to the term model-based deep learning for approaches that combine traditional knowledge-based methods with data-driven techniques, especially those based on deep learning, within a diff erentiable computing framework. In music, prior knowledge for ins…
▽ More
In this article, we investigate the notion of model-based deep learning in the realm of music information research (MIR). Loosely speaking, we refer to the term model-based deep learning for approaches that combine traditional knowledge-based methods with data-driven techniques, especially those based on deep learning, within a diff erentiable computing framework. In music, prior knowledge for instance related to sound production, music perception or music composition theory can be incorporated into the design of neural networks and associated loss functions. We outline three specifi c scenarios to illustrate the application of model-based deep learning in MIR, demonstrating the implementation of such concepts and their potential.
△ Less
Submitted 17 June, 2024;
originally announced June 2024.
-
Certified Robustness to Data Poisoning in Gradient-Based Training
Authors:
Philip Sosnin,
Mark N. Müller,
Maximilian Baader,
Calvin Tsay,
Matthew Wicker
Abstract:
Modern machine learning pipelines leverage large amounts of public data, making it infeasible to guarantee data quality and leaving models open to poisoning and backdoor attacks. However, provably bounding model behavior under such attacks remains an open problem. In this work, we address this challenge and develop the first framework providing provable guarantees on the behavior of models trained…
▽ More
Modern machine learning pipelines leverage large amounts of public data, making it infeasible to guarantee data quality and leaving models open to poisoning and backdoor attacks. However, provably bounding model behavior under such attacks remains an open problem. In this work, we address this challenge and develop the first framework providing provable guarantees on the behavior of models trained with potentially manipulated data. In particular, our framework certifies robustness against untargeted and targeted poisoning as well as backdoor attacks for both input and label manipulations. Our method leverages convex relaxations to over-approximate the set of all possible parameter updates for a given poisoning threat model, allowing us to bound the set of all reachable parameters for any gradient-based learning algorithm. Given this set of parameters, we provide bounds on worst-case behavior, including model performance and backdoor success rate. We demonstrate our approach on multiple real-world datasets from applications including energy consumption, medical imaging, and autonomous driving.
△ Less
Submitted 9 June, 2024;
originally announced June 2024.
-
Traversing Mars: Cooperative Informative Path Planning to Efficiently Navigate Unknown Scenes
Authors:
Friedrich M. Rockenbauer,
Jaeyoung Lim,
Marcus G. Müller,
Roland Siegwart,
Lukas Schmid
Abstract:
The ability to traverse an unknown environment is crucial for autonomous robot operations. However, due to the limited sensing capabilities and system constraints, approaching this problem with a single robot agent can be slow, costly, and unsafe. For example, in planetary exploration missions, the wear on the wheels of a rover from abrasive terrain should be minimized at all costs as reparations…
▽ More
The ability to traverse an unknown environment is crucial for autonomous robot operations. However, due to the limited sensing capabilities and system constraints, approaching this problem with a single robot agent can be slow, costly, and unsafe. For example, in planetary exploration missions, the wear on the wheels of a rover from abrasive terrain should be minimized at all costs as reparations are infeasible. On the other hand, utilizing a scouting robot such as a micro aerial vehicle (MAV) has the potential to reduce wear and time costs and increasing safety of a follower robot. This work proposes a novel cooperative IPP framework that allows a scout (e.g., an MAV) to efficiently explore the minimum-cost-path for a follower (e.g., a rover) to reach the goal. We derive theoretic guarantees for our algorithm, and prove that the algorithm always terminates, always finds the optimal path if it exists, and terminates early when the found path is shown to be optimal or infeasible. We show in thorough experimental evaluation that the guarantees hold in practice, and that our algorithm is 22.5% quicker to find the optimal path and 15% quicker to terminate compared to existing methods.
△ Less
Submitted 12 June, 2024; v1 submitted 7 June, 2024;
originally announced June 2024.
-
High-Fidelity Electron Spin Gates in a Scalable Diamond Quantum Register
Authors:
Timo Joas,
Florian Ferlemann,
Roberto Sailer,
Philipp J. Vetter,
Jingfu Zhang,
Ressa S. Said,
Tokuyuki Teraji,
Shinobu Onoda,
Tommaso Calarco,
Genko Genov,
Matthias M. Müller,
Fedor Jelezko
Abstract:
Diamond is a promising platform for quantum information processing as it can host highly coherent qubits that could allow for the construction of large quantum registers. A prerequisite for such devices is a coherent interaction between nitrogen vacancy (NV) electron spins. Entanglement between dipolar-coupled NV spin pairs has been demonstrated, but with a limited entanglement fidelity and its er…
▽ More
Diamond is a promising platform for quantum information processing as it can host highly coherent qubits that could allow for the construction of large quantum registers. A prerequisite for such devices is a coherent interaction between nitrogen vacancy (NV) electron spins. Entanglement between dipolar-coupled NV spin pairs has been demonstrated, but with a limited entanglement fidelity and its error sources have not been characterized. Here, we design and implement a robust, easy to implement entangling gate between NV spins in diamond and quantify the influence of multiple error sources on the gate performance. Experimentally, we demonstrate a record gate fidelity of $F=(96.0 \pm 2.5)$ % under ambient conditions. Our identification of the dominant errors paves the way towards NV-NV gates beyond the error correction threshold.
△ Less
Submitted 22 July, 2024; v1 submitted 6 June, 2024;
originally announced June 2024.
-
Harder or Different? Understanding Generalization of Audio Deepfake Detection
Authors:
Nicolas M. Müller,
Nicholas Evans,
Hemlata Tak,
Philip Sperl,
Konstantin Böttinger
Abstract:
Recent research has highlighted a key issue in speech deepfake detection: models trained on one set of deepfakes perform poorly on others. The question arises: is this due to the continuously improving quality of Text-to-Speech (TTS) models, i.e., are newer DeepFakes just 'harder' to detect? Or, is it because deepfakes generated with one model are fundamentally different to those generated using a…
▽ More
Recent research has highlighted a key issue in speech deepfake detection: models trained on one set of deepfakes perform poorly on others. The question arises: is this due to the continuously improving quality of Text-to-Speech (TTS) models, i.e., are newer DeepFakes just 'harder' to detect? Or, is it because deepfakes generated with one model are fundamentally different to those generated using another model? We answer this question by decomposing the performance gap between in-domain and out-of-domain test data into 'hardness' and 'difference' components. Experiments performed using ASVspoof databases indicate that the hardness component is practically negligible, with the performance gap being attributed primarily to the difference component. This has direct implications for real-world deepfake detection, highlighting that merely increasing model capacity, the currently-dominant research trend, may not effectively address the generalization challenge.
△ Less
Submitted 12 June, 2024; v1 submitted 5 June, 2024;
originally announced June 2024.
-
Demonstration of two-dimensional connectivity for a scalable error-corrected ion-trap quantum processor architecture
Authors:
Marco Valentini,
Martin W. van Mourik,
Friederike Butt,
Jakob Wahl,
Matthias Dietl,
Michael Pfeifer,
Fabian Anmasser,
Yves Colombe,
Clemens Rössler,
Philip Holz,
Rainer Blatt,
Markus Müller,
Thomas Monz,
Philipp Schindler
Abstract:
A major hurdle for building a large-scale quantum computer is to scale up the number of qubits while maintaining connectivity between them. In trapped-ion devices, this connectivity can be provided by physically moving subregisters consisting of a few ions across the processor. The topology of the connectivity is given by the layout of the ion trap where one-dimensional and two-dimensional arrange…
▽ More
A major hurdle for building a large-scale quantum computer is to scale up the number of qubits while maintaining connectivity between them. In trapped-ion devices, this connectivity can be provided by physically moving subregisters consisting of a few ions across the processor. The topology of the connectivity is given by the layout of the ion trap where one-dimensional and two-dimensional arrangements are possible. Here, we focus on an architecture based on a rectangular two-dimensional lattice, where each lattice site contains a subregister with a linear string of ions. We refer to this architecture as the Quantum Spring Array (QSA). Subregisters placed in neighboring lattice sites can be coupled by bringing the respective ion strings close to each other while avoiding merging them into a single trapping potential. Control of the separation of subregisters along one axis of the lattice, known as the axial direction, uses quasi-static voltages, while the second axis, the radial, requires control of radio frequency signals. In this work, we investigate key elements of the 2D lattice quantum computation architecture along both axes: We show that the coupling rate between neighboring lattice sites increases with the number of ions per site and the motion of the coupled system can be resilient to noise. The coherence of the coupling is assessed, and an entangled state of qubits in separate trapping regions along the radial axis is demonstrated. Moreover, we demonstrate control over radio frequency signals to adjust radial separation between strings, and thus tune their coupling rate. We further map the 2D lattice architecture to code primitives for fault-tolerant quantum error correction, providing a step towards a quantum processor architecture that is optimized for large-scale fault-tolerant operation.
△ Less
Submitted 4 June, 2024;
originally announced June 2024.
-
L-MAGIC: Language Model Assisted Generation of Images with Coherence
Authors:
Zhipeng Cai,
Matthias Mueller,
Reiner Birkl,
Diana Wofk,
Shao-Yen Tseng,
JunDa Cheng,
Gabriela Ben-Melech Stan,
Vasudev Lal,
Michael Paulitsch
Abstract:
In the current era of generative AI breakthroughs, generating panoramic scenes from a single input image remains a key challenge. Most existing methods use diffusion-based iterative or simultaneous multi-view inpainting. However, the lack of global scene layout priors leads to subpar outputs with duplicated objects (e.g., multiple beds in a bedroom) or requires time-consuming human text inputs for…
▽ More
In the current era of generative AI breakthroughs, generating panoramic scenes from a single input image remains a key challenge. Most existing methods use diffusion-based iterative or simultaneous multi-view inpainting. However, the lack of global scene layout priors leads to subpar outputs with duplicated objects (e.g., multiple beds in a bedroom) or requires time-consuming human text inputs for each view. We propose L-MAGIC, a novel method leveraging large language models for guidance while diffusing multiple coherent views of 360 degree panoramic scenes. L-MAGIC harnesses pre-trained diffusion and language models without fine-tuning, ensuring zero-shot performance. The output quality is further enhanced by super-resolution and multi-view fusion techniques. Extensive experiments demonstrate that the resulting panoramic scenes feature better scene layouts and perspective view rendering quality compared to related works, with >70% preference in human evaluations. Combined with conditional diffusion models, L-MAGIC can accept various input modalities, including but not limited to text, depth maps, sketches, and colored scripts. Applying depth estimation further enables 3D point cloud generation and dynamic scene exploration with fluid camera motion. Code is available at https://github.com/IntelLabs/MMPano. The video presentation is available at https://youtu.be/XDMNEzH4-Ec?list=PLG9Zyvu7iBa0-a7ccNLO8LjcVRAoMn57s.
△ Less
Submitted 3 June, 2024;
originally announced June 2024.
-
The Role of Bases in Quantum Optimal Control
Authors:
Alice Pagano,
Matthias M Müller,
Tommaso Calarco,
Simone Montangero,
Phila Rembold
Abstract:
Quantum Optimal Control (QOC) supports the advance of quantum technologies by tackling its problems at the pulse level: Numerical approaches iteratively work towards a given target by parametrising the applied time-dependent fields with a finite set of variables. The effectiveness of the resulting optimisation depends on the complexity of the problem and the number of variables. We consider differ…
▽ More
Quantum Optimal Control (QOC) supports the advance of quantum technologies by tackling its problems at the pulse level: Numerical approaches iteratively work towards a given target by parametrising the applied time-dependent fields with a finite set of variables. The effectiveness of the resulting optimisation depends on the complexity of the problem and the number of variables. We consider different parametrisations in terms of basis functions, asking whether the choice of the applied basis affects the quality of the optimisation. Furthermore, we consider strategies to choose the most suitable basis. For the comparison, we test three different randomisable bases - introducing the sinc and sigmoid bases as alternatives to the Fourier basis - on QOC problems of varying complexity. For each problem, the basis-specific convergence rates result in a unique ranking. Especially for expensive evaluations, e.g., in closed-loop, a potential speed-up by a factor of up to 10 may be crucial for the optimisation's feasibility. We conclude that a problem-dependent basis choice is an influential factor for QOC efficiency and provide advice for its approach.
△ Less
Submitted 6 August, 2024; v1 submitted 31 May, 2024;
originally announced May 2024.
-
How to train your ViT for OOD Detection
Authors:
Maximilian Mueller,
Matthias Hein
Abstract:
VisionTransformers have been shown to be powerful out-of-distribution detectors for ImageNet-scale settings when finetuned from publicly available checkpoints, often outperforming other model types on popular benchmarks. In this work, we investigate the impact of both the pretraining and finetuning scheme on the performance of ViTs on this task by analyzing a large pool of models. We find that the…
▽ More
VisionTransformers have been shown to be powerful out-of-distribution detectors for ImageNet-scale settings when finetuned from publicly available checkpoints, often outperforming other model types on popular benchmarks. In this work, we investigate the impact of both the pretraining and finetuning scheme on the performance of ViTs on this task by analyzing a large pool of models. We find that the exact type of pretraining has a strong impact on which method works well and on OOD detection performance in general. We further show that certain training schemes might only be effective for a specific type of out-distribution, but not in general, and identify a best-practice training recipe.
△ Less
Submitted 21 May, 2024;
originally announced May 2024.
-
ConStat: Performance-Based Contamination Detection in Large Language Models
Authors:
Jasper Dekoninck,
Mark Niklas Müller,
Martin Vechev
Abstract:
Public benchmarks play an essential role in the evaluation of large language models. However, data contamination can lead to inflated performance, rendering them unreliable for model comparison. It is therefore crucial to detect contamination and estimate its impact on measured performance. Unfortunately, existing detection methods can be easily evaded and fail to quantify contamination. To overco…
▽ More
Public benchmarks play an essential role in the evaluation of large language models. However, data contamination can lead to inflated performance, rendering them unreliable for model comparison. It is therefore crucial to detect contamination and estimate its impact on measured performance. Unfortunately, existing detection methods can be easily evaded and fail to quantify contamination. To overcome these limitations, we propose a novel definition of contamination as artificially inflated and non-generalizing benchmark performance instead of the inclusion of benchmark samples in the training data. This perspective enables us to detect any model with inflated performance, i.e., performance that does not generalize to rephrased samples, synthetic samples from the same distribution, or different benchmarks for the same task. Based on this insight, we develop ConStat, a statistical method that reliably detects and quantifies contamination by comparing performance between a primary and reference benchmark relative to a set of reference models. We demonstrate the effectiveness of ConStat in an extensive evaluation of diverse model architectures, benchmarks, and contamination scenarios and find high levels of contamination in multiple popular models including Mistral, Llama, Yi, and the top-3 Open LLM Leaderboard models.
△ Less
Submitted 25 May, 2024;
originally announced May 2024.
-
DAGER: Exact Gradient Inversion for Large Language Models
Authors:
Ivo Petrov,
Dimitar I. Dimitrov,
Maximilian Baader,
Mark Niklas Müller,
Martin Vechev
Abstract:
Federated learning works by aggregating locally computed gradients from multiple clients, thus enabling collaborative training without sharing private client data. However, prior work has shown that the data can actually be recovered by the server using so-called gradient inversion attacks. While these attacks perform well when applied on images, they are limited in the text domain and only permit…
▽ More
Federated learning works by aggregating locally computed gradients from multiple clients, thus enabling collaborative training without sharing private client data. However, prior work has shown that the data can actually be recovered by the server using so-called gradient inversion attacks. While these attacks perform well when applied on images, they are limited in the text domain and only permit approximate reconstruction of small batches and short input sequences. In this work, we propose DAGER, the first algorithm to recover whole batches of input text exactly. DAGER leverages the low-rank structure of self-attention layer gradients and the discrete nature of token embeddings to efficiently check if a given token sequence is part of the client data. We use this check to exactly recover full batches in the honest-but-curious setting without any prior on the data for both encoder- and decoder-based architectures using exhaustive heuristic search and a greedy approach, respectively. We provide an efficient GPU implementation of DAGER and show experimentally that it recovers full batches of size up to 128 on large language models (LLMs), beating prior attacks in speed (20x at same batch size), scalability (10x larger batches), and reconstruction quality (ROUGE-1/2 > 0.99).
△ Less
Submitted 24 May, 2024;
originally announced May 2024.
-
An input-output continuous-time version of Willems' lemma
Authors:
Victor G. Lopez,
Matthias A. Müller,
Paolo Rapisarda
Abstract:
We illustrate a novel version of Willems' lemma for data-based representation of continuous-time systems. The main novelties compared to previous works are two. First, the proposed framework relies only on measured input-output trajectories from the system and no internal (state) information is required. Second, our system representation makes use of exact system trajectories, without resorting to…
▽ More
We illustrate a novel version of Willems' lemma for data-based representation of continuous-time systems. The main novelties compared to previous works are two. First, the proposed framework relies only on measured input-output trajectories from the system and no internal (state) information is required. Second, our system representation makes use of exact system trajectories, without resorting to orthogonal bases representations and consequent approximations. We first establish sufficient and necessary conditions for data-based generation of system trajectories in terms of suitable latent variables. Subsequently, we reformulate these conditions using measured input-output data and show how to span the full behavior of the system. Furthermore, we show how to use the developed framework to solve the data-based continuous-time simulation problem.
△ Less
Submitted 24 May, 2024;
originally announced May 2024.
-
On discount functions for economic model predictive control without terminal conditions
Authors:
Lukas Schwenkel,
Daniel Briem,
Matthias A. Müller,
Frank Allgöwer
Abstract:
In this paper, we investigate discounted economic model predictive control (E-MPC) schemes without terminal conditions in scenarios where the optimal operating behavior is a periodic orbit. For such a setting, it is known that a linearly discounted stage cost guarantees asymptotic stability of any arbitrarily small neighborhood of the optimal orbit if the prediction horizon is sufficiently long. H…
▽ More
In this paper, we investigate discounted economic model predictive control (E-MPC) schemes without terminal conditions in scenarios where the optimal operating behavior is a periodic orbit. For such a setting, it is known that a linearly discounted stage cost guarantees asymptotic stability of any arbitrarily small neighborhood of the optimal orbit if the prediction horizon is sufficiently long. However, in some examples very long prediction horizons are needed to achieve the desired performance. In this work, we extend these results by providing the same qualitative stability guarantees for a large class of discount functions. Numerical examples illustrate the influence of the discount function and show that with suitable discounting we can achieve significantly better performance than the linearly discounted E-MPC, even for short prediction horizons.
△ Less
Submitted 23 May, 2024;
originally announced May 2024.
-
DarkDNS: Revisiting the Value of Rapid Zone Update
Authors:
Raffaele Sommese,
Gautam Akiwate,
Antonia Affinito,
Moritz Muller,
Mattijs Jonker,
KC Claffy
Abstract:
Malicious actors exploit the DNS namespace to launch spam campaigns, phishing attacks, malware, and other harmful activities. Combating these threats requires visibility into domain existence, ownership and nameservice activity that the DNS protocol does not itself provide. To facilitate visibility and security-related study of the expanding gTLD namespace, ICANN introduced the Centralized Zone Da…
▽ More
Malicious actors exploit the DNS namespace to launch spam campaigns, phishing attacks, malware, and other harmful activities. Combating these threats requires visibility into domain existence, ownership and nameservice activity that the DNS protocol does not itself provide. To facilitate visibility and security-related study of the expanding gTLD namespace, ICANN introduced the Centralized Zone Data Service (CZDS) that shares daily zone file snapshots of new gTLD zones. However, a remarkably high concentration of malicious activity is associated with domains that do not live long enough make it into these daily snapshots. Using public and private sources of newly observed domains to identify this activity, we discover that even with the best available data there is a considerable visibility gap. We find that the daily snapshots miss at least 1% of newly registered and short-lived domains, which are almost always registered with malicious intent. In reducing this critical visibility gap using public sources of data, we demonstrate how more timely access to TLD zone changes can help better prevent abuse. We hope that this work sparks a discussion in the community on how to effectively and safely revive the concept of sharing Rapid Zone Updates for security research.
△ Less
Submitted 20 May, 2024;
originally announced May 2024.
-
On bicrossed product of fusion categories and exact factorizations
Authors:
Monique Müller,
Héctor Martín Peña Pollastri,
Julia Plavnik
Abstract:
We introduce the notion of a matched pair of fusion rings and fusion categories, generalizing the one for groups. Using this concept, we define the bicrossed product of fusion rings and fusion categories and we construct exact factorizations for them. This concept generalizes the bicrossed product, also known as external Zappa-Szép product, of groups. We also show that every exact factorization of…
▽ More
We introduce the notion of a matched pair of fusion rings and fusion categories, generalizing the one for groups. Using this concept, we define the bicrossed product of fusion rings and fusion categories and we construct exact factorizations for them. This concept generalizes the bicrossed product, also known as external Zappa-Szép product, of groups. We also show that every exact factorization of fusion rings can be presented as a bicrossed product. With this characterization, we describe the adjoint subcategory and universal grading group of an exact factorization of fusion categories. We give explicit fusion rules and associativity constraints for examples of fusion categories arising as a bicrossed product of combinations of Tambara-Yamagami categories and pointed fusion categories. These examples are new to the best of the knowledge of the authors.
△ Less
Submitted 16 May, 2024;
originally announced May 2024.
-
OpenBot-Fleet: A System for Collective Learning with Real Robots
Authors:
Matthias Müller,
Samarth Brahmbhatt,
Ankur Deka,
Quentin Leboutet,
David Hafner,
Vladlen Koltun
Abstract:
We introduce OpenBot-Fleet, a comprehensive open-source cloud robotics system for navigation. OpenBot-Fleet uses smartphones for sensing, local compute and communication, Google Firebase for secure cloud storage and off-board compute, and a robust yet low-cost wheeled robot toact in real-world environments. The robots collect task data and upload it to the cloud where navigation policies can be le…
▽ More
We introduce OpenBot-Fleet, a comprehensive open-source cloud robotics system for navigation. OpenBot-Fleet uses smartphones for sensing, local compute and communication, Google Firebase for secure cloud storage and off-board compute, and a robust yet low-cost wheeled robot toact in real-world environments. The robots collect task data and upload it to the cloud where navigation policies can be learned either offline or online and can then be sent back to the robot fleet. In our experiments we distribute 72 robots to a crowd of workers who operate them in homes, and show that OpenBot-Fleet can learn robust navigation policies that generalize to unseen homes with >80% success rate. OpenBot-Fleet represents a significant step forward in cloud robotics, making it possible to deploy large continually learning robot fleets in a cost-effective and scalable manner. All materials can be found at https://www.openbot.org. A video is available at https://youtu.be/wiv2oaDgDi8
△ Less
Submitted 13 May, 2024;
originally announced May 2024.
-
Expected Work Search: Combining Win Rate and Proof Size Estimation
Authors:
Owen Randall,
Martin Müller,
Ting Han Wei,
Ryan Hayward
Abstract:
We propose Expected Work Search (EWS), a new game solving algorithm. EWS combines win rate estimation, as used in Monte Carlo Tree Search, with proof size estimation, as used in Proof Number Search. The search efficiency of EWS stems from minimizing a novel notion of Expected Work, which predicts the expected computation required to solve a position. EWS outperforms traditional solving algorithms…
▽ More
We propose Expected Work Search (EWS), a new game solving algorithm. EWS combines win rate estimation, as used in Monte Carlo Tree Search, with proof size estimation, as used in Proof Number Search. The search efficiency of EWS stems from minimizing a novel notion of Expected Work, which predicts the expected computation required to solve a position. EWS outperforms traditional solving algorithms on the games of Go and Hex. For Go, we present the first solution to the empty 5x5 board with the commonly used positional superko ruleset. For Hex, our algorithm solves the empty 8x8 board in under 4 minutes. Experiments show that EWS succeeds both with and without extensive domain-specific knowledge.
△ Less
Submitted 9 May, 2024;
originally announced May 2024.
-
POV Learning: Individual Alignment of Multimodal Models using Human Perception
Authors:
Simon Werner,
Katharina Christ,
Laura Bernardy,
Marion G. Müller,
Achim Rettinger
Abstract:
Aligning machine learning systems with human expectations is mostly attempted by training with manually vetted human behavioral samples, typically explicit feedback. This is done on a population level since the context that is capturing the subjective Point-Of-View (POV) of a concrete person in a specific situational context is not retained in the data. However, we argue that alignment on an indiv…
▽ More
Aligning machine learning systems with human expectations is mostly attempted by training with manually vetted human behavioral samples, typically explicit feedback. This is done on a population level since the context that is capturing the subjective Point-Of-View (POV) of a concrete person in a specific situational context is not retained in the data. However, we argue that alignment on an individual level can boost the subjective predictive performance for the individual user interacting with the system considerably. Since perception differs for each person, the same situation is observed differently. Consequently, the basis for decision making and the subsequent reasoning processes and observable reactions differ. We hypothesize that individual perception patterns can be used for improving the alignment on an individual level. We test this, by integrating perception information into machine learning systems and measuring their predictive performance wrt.~individual subjective assessments. For our empirical study, we collect a novel data set of multimodal stimuli and corresponding eye tracking sequences for the novel task of Perception-Guided Crossmodal Entailment and tackle it with our Perception-Guided Multimodal Transformer. Our findings suggest that exploiting individual perception signals for the machine learning of subjective human assessments provides a valuable cue for individual alignment. It does not only improve the overall predictive performance from the point-of-view of the individual user but might also contribute to steering AI systems towards every person's individual expectations and values.
△ Less
Submitted 7 May, 2024;
originally announced May 2024.
-
Locality Regularized Reconstruction: Structured Sparsity and Delaunay Triangulations
Authors:
Marshall Mueller,
James M. Murphy,
Abiy Tasissa
Abstract:
Linear representation learning is widely studied due to its conceptual simplicity and empirical utility in tasks such as compression, classification, and feature extraction. Given a set of points $[\mathbf{x}_1, \mathbf{x}_2, \ldots, \mathbf{x}_n] = \mathbf{X} \in \mathbb{R}^{d \times n}$ and a vector $\mathbf{y} \in \mathbb{R}^d$, the goal is to find coefficients $\mathbf{w} \in \mathbb{R}^n$ so…
▽ More
Linear representation learning is widely studied due to its conceptual simplicity and empirical utility in tasks such as compression, classification, and feature extraction. Given a set of points $[\mathbf{x}_1, \mathbf{x}_2, \ldots, \mathbf{x}_n] = \mathbf{X} \in \mathbb{R}^{d \times n}$ and a vector $\mathbf{y} \in \mathbb{R}^d$, the goal is to find coefficients $\mathbf{w} \in \mathbb{R}^n$ so that $\mathbf{X} \mathbf{w} \approx \mathbf{y}$, subject to some desired structure on $\mathbf{w}$. In this work we seek $\mathbf{w}$ that forms a local reconstruction of $\mathbf{y}$ by solving a regularized least squares regression problem. We obtain local solutions through a locality function that promotes the use of columns of $\mathbf{X}$ that are close to $\mathbf{y}$ when used as a regularization term. We prove that, for all levels of regularization and under a mild condition that the columns of $\mathbf{X}$ have a unique Delaunay triangulation, the optimal coefficients' number of non-zero entries is upper bounded by $d+1$, thereby providing local sparse solutions when $d \ll n$. Under the same condition we also show that for any $\mathbf{y}$ contained in the convex hull of $\mathbf{X}$ there exists a regime of regularization parameter such that the optimal coefficients are supported on the vertices of the Delaunay simplex containing $\mathbf{y}$. This provides an interpretation of the sparsity as having structure obtained implicitly from the Delaunay triangulation of $\mathbf{X}$. We demonstrate that our locality regularized problem can be solved in comparable time to other methods that identify the containing Delaunay simplex.
△ Less
Submitted 1 May, 2024;
originally announced May 2024.
-
Magnetic domains in ultrathin, bulk-like and proximity-coupled Europium Oxide
Authors:
Seema,
Moumita Kundu,
Paul Rosenberger,
Henrik Jentgens,
Ulrich Nowak,
Martina Müller
Abstract:
The control of electron spins in materials that are simultaneously ferromagnetic and insulating opens up a wealth of quantum phenomena in spin-based electronics. Thin films of europium oxide (EuO) are ideal for the generation and manipulation of spin-polarized states, but so far there are no experimental literature reports on the magnetic domain patterns for EuO. However, at these microscopic leng…
▽ More
The control of electron spins in materials that are simultaneously ferromagnetic and insulating opens up a wealth of quantum phenomena in spin-based electronics. Thin films of europium oxide (EuO) are ideal for the generation and manipulation of spin-polarized states, but so far there are no experimental literature reports on the magnetic domain patterns for EuO. However, at these microscopic length scales, magnetic relaxation between the remanent and demagnetized states takes place in any spintronic device. This relaxation process involves displacements of magnetic domain walls and can therefore be strongly influenced by the film structure and thickness. Here we present an investigation of the temperature-dependent behavior of magnetic domains and hysteresis in bulk-like (25 nm) and ultrathin (3 nm) EuO films. Magneto-optical Kerr microscopy is used, a technique that is a valuable tool to explore microscopic features such as spin dynamics and magnetic domain walls. Significant Kerr rotation in EuO led to high-contrast magnetic domain images in thick films, facilitating observation of domain dynamics. The critical temperature (TC) and coercivity shows strong thickness-dependent variations. The analysis and comparison of hysteresis loops and domain imaging in EuO and EuO/Co reveal proximity effect-induced antiferromagnetic coupling of both layers. To elucidate the magnetization reversal dynamics in EuO, micromagnetic simulations using MuMax3 were performed below and above TC. This comprehensive approach aims to comprehend the impact of magnetism and magnetic proximity effect in EuO on the micromagnetic scale, potentially extending its magnetic ordering beyond TC.
△ Less
Submitted 26 April, 2024;
originally announced April 2024.
-
Rotating spintronic terahertz emitter optimized for microjoule pump-pulse energies and megahertz repetition rates
Authors:
Alkisti Vaitsi,
Vivien Sleziona,
Luis E. Parra López,
Yannic Behovits,
Fabian Schulz,
Natalia Martín Sabanés,
Tobias Kampfrath,
Martin Wolf,
Tom S. Seifert,
Melanie Müller
Abstract:
Spintronic terahertz emitters (STEs) are powerful sources of ultra-broadband single-cycle terahertz (THz) field transients. They work with any pump wavelength, and their polarity and polarization direction are easily adjustable. However, at high pump powers and high repetition rates, STE operation is hampered by a significant increase in the local temperature. Here, we resolve this issue by rotati…
▽ More
Spintronic terahertz emitters (STEs) are powerful sources of ultra-broadband single-cycle terahertz (THz) field transients. They work with any pump wavelength, and their polarity and polarization direction are easily adjustable. However, at high pump powers and high repetition rates, STE operation is hampered by a significant increase in the local temperature. Here, we resolve this issue by rotating the STE at a few 100 Hz, thereby distributing the absorbed pump power over a larger area. Our approach permits stable STE operation at a fluence of ~1 mJ/cm$^2$ with up to 18 W pump power at megahertz repetition rates, corresponding to pump-pulse energies of a few 10 $μ$J and a power density far above the melting threshold of metallic films. The rotating STE is of interest for all ultra-broadband high-power THz applications requiring high repetition rates. As an example, we show that THz pulses with peak fields of 10 kV/cm can be coupled to a THz-lightwave-driven scanning tunneling microscope at 1 MHz repetition rate, demonstrating that the rotating STE can compete with standard THz sources such as LiNbO$_3$.
△ Less
Submitted 25 April, 2024;
originally announced April 2024.
-
TimeFlows: Visualizing Process Chronologies from Vast Collections of Heterogeneous Information Objects
Authors:
Max Lonysa Muller,
Erik Saaman,
Jan Martijn E. M. van der Werf,
Charles Jeurgens,
Hajo A. Reijers
Abstract:
In many fact-finding investigations, notably parliamentary inquiries, process chronologies are created to reconstruct how a controversial policy or decision came into existence. Current approaches, like timelines, lack the expressiveness to represent the variety of relations in which historic events may link to the overall chronology. This obfuscates the nature of the interdependence among the eve…
▽ More
In many fact-finding investigations, notably parliamentary inquiries, process chronologies are created to reconstruct how a controversial policy or decision came into existence. Current approaches, like timelines, lack the expressiveness to represent the variety of relations in which historic events may link to the overall chronology. This obfuscates the nature of the interdependence among the events, and the texts from which they are distilled. Based on explorative interviews with expert analysts, we propose an extended, rich set of relationships. We describe how these can be visualized as TimeFlows. We provide an example of such a visualization by illustrating the Childcare Benefits Scandal -- an affair that deeply affected Dutch politics in recent years. This work extends the scope of existing process discovery research into the direction of unveiling non-repetitive processes from unstructured information objects.
△ Less
Submitted 2 May, 2024; v1 submitted 10 April, 2024;
originally announced April 2024.
-
Data-Based System Representation and Synchronization for Multiagent Systems
Authors:
Victor G. Lopez,
Matthias A. Müller
Abstract:
This paper presents novel solutions of the data-based synchronization problem for continuous-time multiagent systems. We consider the cases of homogeneous and heterogeneous systems. First, we obtain a data-based representation of the synchronization error dynamics for homogeneous systems and show how to extend existing data-based stabilization results to stabilize such error dynamics. The proposed…
▽ More
This paper presents novel solutions of the data-based synchronization problem for continuous-time multiagent systems. We consider the cases of homogeneous and heterogeneous systems. First, we obtain a data-based representation of the synchronization error dynamics for homogeneous systems and show how to extend existing data-based stabilization results to stabilize such error dynamics. The proposed method relies on the solution of a set of linear matrix inequalities that are shown to be feasible. Then, we solve the synchronization problem for heterogeneous systems by means of dynamic controllers. Different from existing results, we do not require model knowledge for the followers and the leader. The theoretical results are finally validated using a numerical simulation.
△ Less
Submitted 7 August, 2024; v1 submitted 22 April, 2024;
originally announced April 2024.
-
2D synthetic ferrimagnets by magnetic proximity coupling
Authors:
Paul Rosenberger,
Moumita Kundu,
Andrei Gloskovskii,
Christoph Schlueter,
Ulrich Nowak,
Martina Müller
Abstract:
Proximity effects allow for the adjustment of magnetic properties in a physically elegant way. If two thin ferromagnetic (FM) films are brought into contact, electronic coupling alters their magnetic exchange interaction at their interface. For a low-TC rare-earth FM coupled to a 3d transition metal FM, even room temperature magnetism is within reach. In addition, magnetic proximity coupling is pa…
▽ More
Proximity effects allow for the adjustment of magnetic properties in a physically elegant way. If two thin ferromagnetic (FM) films are brought into contact, electronic coupling alters their magnetic exchange interaction at their interface. For a low-TC rare-earth FM coupled to a 3d transition metal FM, even room temperature magnetism is within reach. In addition, magnetic proximity coupling is particularly promising for increasing the magnetic order of metastable materials such as europium monoxide (EuO) beyond their bulk TC, since neither the stoichiometry nor the insulating properties are modified.
We investigate the magnetic proximity effect at Fe/EuO and Co/EuO interfaces using hard X-ray photoelectron spectroscopy. By exciting the FM layers with circularly polarized light, magnetic dichroism is observed in angular dependence on the photoemission geometry. In this way, the depth-dependence of the magnetic signal is determined element-specifically for the EuO and 3d FM parts of the bilayers. In connection with atomistic spin dynamics simulations, the thickness of EuO layer is found to be crucial, indicating that the observed antiferromagnetic proximity coupling is a short-ranged and genuine interface phenomenon. This fact turns the bilayer into a strong synthetic ferrimagnet. The increase in magnetic order in EuO occurs in a finite spatial range and is therefore particularly strong in the 2D limit-a counterintuitive but very useful phenomenon for spin-based device applications.
△ Less
Submitted 19 April, 2024;
originally announced April 2024.
-
Optimized measurement-free and fault-tolerant quantum error correction for neutral atoms
Authors:
Stefano Veroni,
Markus Müller,
Giacomo Giudice
Abstract:
A major challenge in performing quantum error correction (QEC) is implementing reliable measurements and conditional feed-forward operations. In quantum computing platforms supporting unconditional qubit resets, or a constant supply of fresh qubits, alternative schemes which do not require measurements are possible. In such schemes, the error correction is realized via crafted coherent quantum fee…
▽ More
A major challenge in performing quantum error correction (QEC) is implementing reliable measurements and conditional feed-forward operations. In quantum computing platforms supporting unconditional qubit resets, or a constant supply of fresh qubits, alternative schemes which do not require measurements are possible. In such schemes, the error correction is realized via crafted coherent quantum feedback. We propose implementations of small measurement-free QEC schemes, which are fault-tolerant to circuit-level noise. These implementations are guided by several heuristics to achieve fault-tolerance: redundant syndrome information is extracted, and additional single-shot flag qubits are used. By carefully designing the circuit, the additional overhead of these measurement-free schemes is moderate compared to their conventional measurement-and-feed-forward counterparts. We highlight how this alternative approach paves the way towards implementing resource-efficient measurement-free QEC on neutral-atom arrays.
△ Less
Submitted 17 April, 2024;
originally announced April 2024.