Papers
Research papers from arXiv and related sources
On Utility Maximization under Multivariate Fake Stationary Affine Volterra Models
This paper is concerned with Merton's portfolio optimization problem in a Volterra stochastic environment described by a multivariate fake stationary Volterra--Heston model. Due to the non-Markovia...
Emmanuel Gnabeyeu
V2M-Zero: Zero-Pair Time-Aligned Video-to-Music Generation
Generating music that temporally aligns with video events is challenging for existing text-to-music models, which lack fine-grained temporal control. We introduce V2M-Zero, a zero-pair video-to-mus...
Yan-Bo Lin, Jonah Casebeer, Long Mai, Aniruddha Mahapatra, Gedas Bertasius, Nicholas J. Bryan
Gravitational Anomaly Measurement in Wide Binaries is Sensitive to Orbital Modeling
Recent work by Chae et al. (2026) reported a gravitational anomaly in 36 wide-binary pairs, finding a gravity boost factor of $γ\equiv G_{\rm eff}/G_{\rm N} \approx 1.60_{-0.14}^{+0.17}$ at low acc...
Serat M. Saad, Yuan-Sen Ting
Layered Performance Analysis of TLS 1.3 Handshakes: Classical, Hybrid, and Pure Post-Quantum Key Exchange
In this paper, we present a laboratory study focused on the impact of post-quantum cryptography (PQC) algorithms on multiple layers of stateful HTTP over TLS transactions: the TCP handshake, the in...
David Gómez-Cambronero, Daniel Munteanu, Ana Isabel González-Tablas
Searching for Magnetic White Dwarfs in LAMOST DR10
Magnetic white dwarfs (MWDs) are key to understanding the origin and evolution of magnetic fields in compact stars. While large spectroscopic surveys such as SDSS have greatly expanded the known sa...
Si-Cheng Yu, Juan-Juan Ren, Vitaly V. Neustroev, Thomas Hackman, Hao-Tong Zhang, Yi-Qiao Dong, Zh...
Theory of Cell Body Lensing and Phototaxis Sign Reversal in "Eyeless" Mutants of $Chlamydomonas$
Phototaxis of many species of green algae relies upon directional sensitivity of their membrane-bound photoreceptors, which arises from the presence of a pigmented "eyespot" behind them that blocks...
Sumit Kumar Birwa, Ming Yang, Adriana I. Pesci, Raymond E. Goldstein
Violating the All-or-Nothing Picture of Local Charges in Non-Hermitian Bosonic Chains
We present explicit counterexamples to a widespread empirical expectation that local commuting charges display all-or-nothing behavior. In the class of bosonic chains with symmetric nearest-neighbo...
Mizuki Yamaguchi, Naoto Shiraishi
Island Sliding Barriers: A first-principles metric for determining remote epitaxy viability
Remote epitaxy, where a 2D van der Waals material (usually graphene) is inserted on top of the substrate before film epitaxy, has emerged as a promising path for growing electronics with lower defe...
Quinn T. Campbell, Manny Xavier de Jesus Lopez, Anthony Rice, Timothy J. Ruggles, Taisuke Ohta, C...
Covariate-adjusted statistical dependence representation through partial copulas: bounds and new insights
In this paper, we revisit the notion of partial copula, originally introduced to test conditional independence, highlighting its capability to represent the dependence between two random variables ...
Vinícius Litvinoff Justus, Felipe Fontana Vieira
STADA: Specification-based Testing for Autonomous Driving Agents
Simulation-based testing has become a standard approach to validating autonomous driving agents prior to real-world deployment. A high-quality validation campaign will exercise an agent in diverse ...
Joy Saha, Trey Woodlief, Sebastian Elbaum, Matthew B. Dwyer
Novel Architecture of RPA In Oral Cancer Lesion Detection
Accurate and early detection of oral cancer lesions is crucial for effective diagnosis and treatment. This study evaluates two RPA implementations, OC-RPAv1 and OC-RPAv2, using a test set of 31 ima...
Revana Magdy, Joy Naoum, Ali Hamdi
Training-Free Multi-Step Inference for Target Speaker Extraction
Target speaker extraction (TSE) aims to recover a target speaker's speech from a mixture using a reference utterance as a cue. Most TSE systems adopt conditional auto-encoder architectures with one...
Zhenghai You, Ying Shi, Lantian Li, Dong Wang
Kernel Tests of Equivalence
We propose novel kernel-based tests for assessing the equivalence between distributions. Traditional goodness-of-fit testing is inappropriate for concluding the absence of distributional difference...
Xing Liu, Axel Gandy
SNPgen: Phenotype-Supervised Genotype Representation and Synthetic Data Generation via Latent Diffusion
Polygenic risk scores and other genomic analyses require large individual-level genotype datasets, yet strict data access restrictions impede sharing. Synthetic genotype generation offers a privacy...
Andrea Lampis, Michela Carlotta Massi, Nicola Pirastu, Francesca Ieva, Matteo Matteucci, Emanuele...
Exploring Indicators of Developers' Sentiment Perceptions in Student Software Projects
Communication is a crucial social factor in the success of software projects, as positively or negatively perceived statements can influence how recipients feel and affect team collaboration throug...
Martin Obaidi, Marc Herrmann, Jendrik Martensen, Jil Klünder, Kurt Schneider
Spectroscopic galaxy redshifts in the Peanut cluster - a massive nearly head-on cluster merger shortly after pericenter passage
The Peanut cluster (SRGe J023820.8+200556, SRGe CL0238.3+2005, $z_{spec}$ = 0.42) has recently emerged as a candidate for a rare, massive merger, potentially analogous to the Bullet cluster. We pre...
I. Zaznobin, N. Lyskova, I. Bikmaev, R. Burenin, A. Arshinova, E. Churazov, S. Dodonov, M. Gilfan...
$V_{0.5}$: Generalist Value Model as a Prior for Sparse RL Rollouts
In Reinforcement Learning with Verifiable Rewards (RLVR), constructing a robust advantage baseline is critical for policy gradients, effectively guiding the policy model to reinforce desired behavi...
Yi-Kai Zhang, Yueqing Sun, Hongyan Hao, Qi Gu, Xunliang Cai, De-Chuan Zhan, Han-Jia Ye
Evaluating Few-Shot Pill Recognition Under Visual Domain Shift
Adverse drug events are a significant source of preventable harm, which has led to the development of automated pill recognition systems to enhance medication safety. Real-world deployment of these...
W. I. Chu, G. Tarroni, L. Li
Evaluating randomized smoothing as a defense against adversarial attacks in trajectory prediction
Accurate and robust trajectory prediction is essential for safe and efficient autonomous driving, yet recent work has shown that even state-of-the-art prediction models are highly vulnerable to inp...
Julian F. Schumann, Eduardo Figueiredo, Frederik Baymler Mathiesen, Luca Laurenti, Jens Kober, Ar...
Backdoor Directions in Vision Transformers
This paper investigates how Backdoor Attacks are represented within Vision Transformers (ViTs). By assuming knowledge of the trigger, we identify a specific ``trigger direction'' in the model's act...
Sengim Karayalcin, Marina Krcek, Pin-Yu Chen, Stjepan Picek