Papers
Research papers from arXiv and related sources
HMS-VesselNet: Hierarchical Multi-Scale Attention Network with Topology-Preserving Loss for Retinal Vessel Segmentation
Retinal vessel segmentation methods based on standard overlap losses tend to miss thin peripheral vessels because these structures occupy very few pixels and have low contrast against the backgroun...
Amarnath R
On the Constraints and Observational Manifestations of Failed Solar Eruptions in Toroidal Magnetic Cage
Observations show that many solar eruptions remain confined within strong overlying magnetic fields, forming a so-called magnetic cage. While confinement by poloidal overlying fields has been widel...
Jinhan Guo, Y. Guo, H. Wu, B. Schmieder, P. Démoulin, Y. W. Ni, C. Wang, S. Poedts, T. Li, Wensi ...
Disentangling Speaker Traits for Deepfake Source Verification via Chebyshev Polynomial and Riemannian Metric Learning
Speech deepfake source verification systems aims to determine whether two synthetic speech utterances originate from the same source generator, often assuming that the resulting source embeddings a...
Xi Xuan, Wenxin Zhang, Zhiyu Li, Jennifer Williams, Ville Hautamäki, Tomi H. Kinnunen
Adversarial Camouflage
While the rapid development of facial recognition algorithms has enabled numerous beneficial applications, their widespread deployment has raised significant concerns about the risks of mass survei...
Paweł Borsukiewicz, Daniele Lunghi, Melissa Tessa, Jacques Klein, Tegawendé F. Bissyandé
Verify Implementation Equivalence of Large Models
Verifying whether two implementations of the same large model are equivalent across frameworks is difficult in practice. Even when they realize the same computation, their graphs may differ subst...
Qi Zhan, Xing Hu, Xin Xia, Shanping Li
On the Number of Conditional Independence Tests in Constraint-based Causal Discovery
Learning causal relations from observational data is a fundamental problem with wide-ranging applications across many fields. Constraint-based methods infer the underlying causal structure by perfo...
Marc Franquesa Monés, Jiaqi Zhang, Caroline Uhler
Select, Label, Evaluate: Active Testing in NLP
Human annotation cost and time remain significant bottlenecks in Natural Language Processing (NLP), with test data annotation being particularly expensive due to the stringent requirement for low-e...
Antonio Purificato, Maria Sofia Bucarelli, Andrea Bacciu, Amin Mantrach, Fabrizio Silvestri
A Unified Heterogeneous Implementation of Numerical Atomic Orbitals-Based Real-Time TDDFT within the ABACUS Package
We present a unified heterogeneous computing framework for real-time time-dependent density functional theory (RT-TDDFT) based on numerical atomic orbitals (NAOs), implemented in the ABACUS package...
Taoni Bao, Yuanbo Li, Zichao Deng, Haotian Zhao, Denghui Lu, Yike Huang, Chao Lian, Lixin He, Moh...
Publicly Understandable Electronic Voting: A Non-Cryptographic, End-to-End Verifiable Scheme
Modern democracies face an existential crisis of waning public trust in election results. While End-to-End Verifiable (E2E-V) voting systems promise mathematically secure elections, their reliance ...
Alon Gat
Can Renewable Energy Mitigate Inflationary Pressures from Energy Imports? Evidence from Türkiye
This study analyses the potential of renewable energy to reduce inflationary pressures arising from energy imports in Turkiye. Annual data for the period 1980-2022 are used in the analysis. In this...
Emre Akusta
Using spatiotemporal Born rule for testing macroscopic realism: some applications to the pseudo-density matrices and nonclassical temporal correlations
We show that, given an evolving quantum system and the quasiprobability distribution generated by the spatiotemporal generalization of the Born rule in pseudo density-matrices (PDMs), this distribu...
Naim Elias Comar, Lucas C. Céleri, Mia Stamatova, Vlatko Vedral, Aditya Varna Iyer, Rafael Chaves
Why does it fail? Explanation of verification failures
Satisfiability solving is a common technique for formal verification forming the basis of many proof and model checking systems. Failure to show a proof obligation will produce a counterexample or ...
Lars-Henrik Eriksson
The Universal Normal Embedding
Generative models and vision encoders have largely advanced on separate tracks, optimized for different goals and grounded in different mathematical principles. Yet, they share a fundamental proper...
Chen Tasker, Roy Betser, Eyal Gofer, Meir Yossef Levi, Guy Gilboa
Quantifying Uncertainty in FMEDA Safety Metrics: An Error Propagation Approach for Enhanced ASIC Verification
Accurate and reliable safety metrics are paramount for functional safety verification of ASICs in automotive systems. Traditional FMEDA (Failure Modes, Effects, and Diagnostic Analysis) metrics, su...
Antonino Armato, Christian Kehl, Sebastian Fischer
Strict Entropy Decrease of Clausius Entropy in an Isolated System with Energy-Form Conversion: Theoretical Proof, Numerical Illustration, and Critical Examination
This paper is accountable only to explicitly stated physical assumptions and strict logical inference. Its goal is to run a rigorous stress test of second-law claims within the Clausius framework. ...
Ting Peng
The fragility of the Uranian moons during the giant planet instability
It is thought that, sometime after their formation, the solar system's giant planets experienced a dynamical instability that caused their orbits to excite, diverge, and ejected one or more objects...
Matthew S. Clement, Nathan A. Kaib, Andre Izidoro, Rogerio Deienno
CellFluxRL: Biologically-Constrained Virtual Cell Modeling via Reinforcement Learning
Building virtual cells with generative models to simulate cellular behavior in silico is emerging as a promising paradigm for accelerating drug discovery. However, prior image-based generative appr...
Dongxia Wu, Shiye Su, Yuhui Zhang, Elaine Sui, Emma Lundberg, Emily B. Fox, Serena Yeung-Levy
Charmed baryon decays at Belle and Belle II
Belle and Belle II experiments have collected $e^+e^-$ collision data with center-of-mass energies at or near the $Υ(4S)$ resonance. Using total $1.4\,\mathrm{ab}^{-1}$ combined dataset, we present...
Jaeyoung Kim
Comprehensive Dosimetric Verification and Positional Sensitivity Analysis in Brachytherapy: A Unified ESAPI Tool for HDR and LDR Treatments
This study presents the development and validation of an independent software tool based on the Varian Eclipse Scripting API (ESAPI) for multi-modal brachytherapy Quality Assurance (QA). The tool a...
J. A. Valgoma
A Job I Like or a Job I Can Get: Designing Job Recommender Systems Using Field Experiments
Recommendation systems (RSs) are increasingly used to guide job seekers on online platforms, yet the algorithms currently deployed are typically optimized for predictive objectives such as clicks, ...
Guillaume Bied, Philippe Caillou, Bruno Crépon, Christophe Gaillac, Elia Pérennes, Michèle Sebag