Papers
Research papers from arXiv and related sources
Lepton flavor violating $τ^- \to \ell_i^- \ell_i^- \ell_j^+$ ($\ell_i\neq \ell_j$) decays induced by $S_1$ and $R_2$ scalar leptoquarks
Charged lepton flavor violation provides a clear experimental signature in the search for physics beyond the Standard Model. In this work, we study the flavor-violating three-body tau decays $τ^- \...
G. Hernández-Tomé, J. P. Hoyos-Daza, O. G. Miranda, R. Sánchez-Vélez
Design and First Results of COFFEE3: A 55nm HVCMOS Pixel Sensor Prototype for High-Energy Physics Applications
Motivated by the stringent requirements of the Upstream Pixel (UP) tracker in the LHCb Upgrade II and the Inner Tracking detector (ITK) of the Circular Electron Positron Collider, the COFFEE series...
Xiaomin Wei, Zijun Xu, Weiguo Lu, Yang Zhou, Zhan Shi, Leyi Li, Xiaoxu Zhang, Pengxu Li, Jianpeng...
Bar-Informed Kinematic-Distance Mapping of Molecular Gas in the Inner Milky Way
We present a bar-informed kinematic-distance (BIKD) method to reconstruct face-on molecular-gas maps of the inner Milky Way from PPV data, relaxing the standard assumption of axisymmetric circular ...
Junichi Baba
citecheck: An MCP Server for Automated Bibliographic Verification and Repair in Scholarly Manuscripts
Reference lists in scholarly manuscripts frequently contain errors, including incorrect identifiers, incomplete metadata, misattributed authors, and mismatches between preprint and published versio...
Junhyeok Lee
Federated Computing as Code (FCaC): Sovereignty-aware Systems by Design
Federated computing (FC) enables collaborative computation such as machine learning, analytics, or data processing across distributed organizations keeping raw data local. Built on four architectur...
Enzo Fenoglio, Philip Treleaven
GUIDE: GenAI Units In Digital Design Education
GenAI Units In Digital Design Education (GUIDE) is an open courseware repository with runnable Google Colab labs and other materials. We describe the repository's architecture and educational appro...
Weihua Xiao, Jason Blocklove, Matthew DeLorenzo, Johann Knechtel, Ozgur Sinanoglu, Kanad Basu, Je...
Revisiting Vulnerability Patch Identification on Data in the Wild
Attacks can exploit zero-day or one-day vulnerabilities that are not publicly disclosed. To detect these vulnerabilities, security researchers monitor development activities in open-source reposito...
Ivana Clairine Irsan, Ratnadira Widyasari, Ting Zhang, Huihui Huang, Ferdian Thung, Yikun Li, Lwi...
Physics of Collectivity and EOS from the RHIC Beam Energy Scan Program
In this article we will review recent measurements of directed flow $v_1$ and elliptic flow $v_2$ in Au+Au collisions from the STAR Beam Energy Scan (BES) program. We systematically analyze the $v_...
Xionghong He, Shusu Shi, Nu Xu
AppFlow: Memory Scheduling for Cold Launch of Large Apps on Mobile and Vehicle Systems
GB-scale large apps like on-device LLMs and rich media editors are becoming the next-generation trend, but their heavy memory and I/O demands, especially during multitasking, cause devices to recla...
Xiaochen Li, Sicong Liu, Bin Guo, Yu Ouyang, Fengmin Wu, Yuan Xu, Zhiwen Yu
Graph-Native Cognitive Memory for AI Agents: Formal Belief Revision Semantics for Versioned Memory Architectures
While individual components for AI agent memory exist in prior systems, their architectural synthesis and formal grounding remain underexplored. We present Kumiho, a graph-native cognitive memory a...
Young Bin Park
LAAF: Logic-layer Automated Attack Framework A Systematic Red-Teaming Methodology for LPCI Vulnerabilities in Agentic Large Language Model Systems
Agentic LLM systems equipped with persistent memory, RAG pipelines, and external tool connectors face a class of attacks - Logic-layer Prompt Control Injection (LPCI) - for which no automated red-t...
Hammad Atta, Ken Huang, Kyriakos Rock Lambros, Yasir Mehmood, Zeeshan Baig, Mohamed Abdur Rahman,...
Field-angle dependence of magnetoresistance in UTe2
We theoretically study angle-resolved magnetoresistance under rotated magnetic field in the normal state of a spin-triplet superconductor UTe$_2$. The Wannier model derived from a GGA+$U$ calculati...
Jun Ishizuka, Youichi Yanase
Draft-and-Prune: Improving the Reliability of Auto-formalization for Logical Reasoning
Auto-formalization (AF) translates natural-language reasoning problems into solver-executable programs, enabling symbolic solvers to perform sound logical deduction. In practice, however, AF pipeli...
Zhiyu Ni, Zheng Liang, Liangcheng Song, Chenrui Cao, Xian Zhang, Alberto Sangiovanni-Vincentelli,...
From Drop-off to Recovery: A Mechanistic Analysis of Segmentation in MLLMs
Multimodal Large Language Models (MLLMs) are increasingly applied to pixel-level vision tasks, yet their intrinsic capacity for spatial understanding remains poorly understood. We investigate segme...
Boyong Wu, Sanghwan Kim, Zeynep Akata
Alignment Makes Language Models Normative, Not Descriptive
Post-training alignment optimizes language models to match human preference signals, but this objective is not equivalent to modeling observed human behavior. We compare 120 base-aligned model pair...
Eilam Shapira, Moshe Tennenholtz, Roi Reichart
Talk is Cheap, Logic is Hard: Benchmarking LLMs on Post-Condition Formalization
Formal specifications, such as pre- and post-conditions provide a solid basis for performing thorough program verification. However, developers rarely provide such formal specifications, hence if A...
I. S. W. B. Prasetya, Fitsum Kifetew, Davide Prandi
Influence of Gripper Design on Human Demonstration Quality for Robot Learning
Opening sterile medical packaging is routine for healthcare workers but remains challenging for robots. Learning from demonstration enables robots to acquire manipulation skills directly from human...
Gina L. Georgadarellis, Natalija Beslic, Seonhun Lee, Frank C. Sup, Meghan E. Huber
Reconstructing the Type Ia Supernova Absolute Magnitude with Two-Probe Physics-Informed Neural Networks
We apply two variants of Physics-Informed Neural Networks (PINNs) to reconstruct the Type Ia supernova absolute magnitude $M_B(z)$ from joint BAO and supernova data under four cosmological models (...
Denitsa Staicova
Generalist Multimodal LLMs Gain Biometric Expertise via Human Salience
Iris presentation attack detection (PAD) is critical for secure biometric deployments, yet developing specialized models faces significant practical barriers: collecting data representing future un...
Jacob Piland, Byron Dowling, Christopher Sweet, Adam Czajka
Noise-Response Calibration: A Causal Intervention Protocol for LLM-Judges
Large language models (LLMs) are increasingly used as automated judges and synthetic labelers, especially in low-label settings. Yet these systems are stochastic and often overconfident, which make...
Maxim Khomiakov, Jes Frellsen