Integer Quadratic Programming (IQP), $\min\{x^T Q x + c^T x : Ax \le b,\, x\in\Z^n\}$, is a fundamental problem in combinatorial optimization. While the convex and concave special cases admit polynomial-time algorithms for fixed~$n$, the general indefinite case is considerably harder: it was only recently shown to lie in NP, and the FPT algorithm, due to Lokshtanov, establishes fixed-parameter tractability parameterized by $n$ and the largest coefficient~$L$ without giving an explicit running time. We give the first single-exponential algorithm for IQP, solving it in time $ \bigl(n\,L^n_A\,Δ(A)\,L_Q\bigr)^{O(n)}\cdot\mathrm{poly}(\varphi), $ which is $(nL)^{O(n^2)}\cdot\mathrm{poly}(\varphi)$ in general using the same parameterization. We achieve improvements for structured cases like total unimodularity and further state explicit complexity results for a number of FPT algorithms and optimization problems. The single-exponential bound is achieved via curvature batching: we classify kernel directions by the sign of their quadratic curvature and observe that when no negative-curvature direction exists, all gradient constraints can be imposed simultaneously in a single batch. This rep
Large Language Models (LLMs) are increasingly integrated into daily routines, yet they raise significant privacy and safety concerns. Recent research proposes collaborative inference, which outsources the early-layer inference to ensure data locality, and introduces model safety auditing based on inner neuron patterns. Both techniques expose the LLM's Internal States (ISs), which are traditionally considered irreversible to inputs due to optimization challenges and the highly abstract representations in deep layers. In this work, we challenge this assumption by proposing four inversion attacks that significantly improve the semantic similarity and token matching rate of inverted inputs. Specifically, we first develop two white-box optimization-based attacks tailored for low-depth and high-depth ISs. These attacks avoid local minima convergence, a limitation observed in prior work, through a two-phase inversion process. Then, we extend our optimization attack under more practical black-box weight access by leveraging the transferability between the source and the derived LLMs. Additionally, we introduce a generation-based attack that treats inversion as a translation task, employing
The modular group $Γ$ (which is the Hecke group $H_3$) can be used to study triangular maps. Here we use the Hecke group $H_4$ to study the regular map that underlies Bring's surface of genus 4. Our main result is the determination of the 20-sided hyperbolic polygon that gives Bring's surface.
Language Models (LMs) are prone to ''memorizing'' training data, including substantial sensitive user information. To mitigate privacy risks and safeguard the right to be forgotten, machine unlearning has emerged as a promising approach for enabling LMs to efficiently ''forget'' specific texts. However, despite the good intentions, is textual unlearning really as effective and reliable as expected? To address the concern, we first propose Unlearning Likelihood Ratio Attack+ (U-LiRA+), a rigorous textual unlearning auditing method, and find that unlearned texts can still be detected with very high confidence after unlearning. Further, we conduct an in-depth investigation on the privacy risks of textual unlearning mechanisms in deployment and present the Textual Unlearning Leakage Attack (TULA), along with its variants in both black- and white-box scenarios. We show that textual unlearning mechanisms could instead reveal more about the unlearned texts, exposing them to significant membership inference and data reconstruction risks. Our findings highlight that existing textual unlearning actually gives a false sense of unlearning, underscoring the need for more robust and secure unlea
Splitting operation in Matroid Theory does not preserve graphicness, connectedness, cographicness, etc. Also, the splitting of binary gammoid does not necessarily be binary gammoid after splitting. We have characterized a class of graphic matroids that gives binary gammoids after splitting. We have obtained prohibited minors for graphic and cographic matroid which gives binary gammoid after splitting using two and three elements.
We prove that weakly elliptic damping gives sharp energy decay for the abstract damped wave semigroup, where the damping is not in the functional calculus. In this case, there is no overdamping. We show applications in linearised water waves and Kelvin--Voigt damping.
Federated learning has been proposed as a privacy-preserving machine learning framework that enables multiple clients to collaborate without sharing raw data. However, client privacy protection is not guaranteed by design in this framework. Prior work has shown that the gradient sharing strategies in federated learning can be vulnerable to data reconstruction attacks. In practice, though, clients may not transmit raw gradients considering the high communication cost or due to privacy enhancement requirements. Empirical studies have demonstrated that gradient obfuscation, including intentional obfuscation via gradient noise injection and unintentional obfuscation via gradient compression, can provide more privacy protection against reconstruction attacks. In this work, we present a new data reconstruction attack framework targeting the image classification task in federated learning. We show that commonly adopted gradient postprocessing procedures, such as gradient quantization, gradient sparsification, and gradient perturbation, may give a false sense of security in federated learning. Contrary to prior studies, we argue that privacy enhancement should not be treated as a byproduct
Approximate Bayesian computation (ABC) or likelihood-free inference algorithms are used to find approximations to posterior distributions without making explicit use of the likelihood function, depending instead on simulation of sample data sets from the model. In this paper we show that under the assumption of the existence of a uniform additive model error term, ABC algorithms give exact results when sufficient summaries are used. This interpretation allows the approximation made in many previous application papers to be understood, and should guide the choice of metric and tolerance in future work. ABC algorithms can be generalized by replacing the 0-1 cut-off with an acceptance probability that varies with the distance of the simulated data from the observed data. The acceptance density gives the distribution of the error term, enabling the uniform error usually used to be replaced by a general distribution. This generalization can also be applied to approximate Markov chain Monte Carlo algorithms. In light of this work, ABC algorithms can be seen as calibration techniques for implicit stochastic models, inferring parameter values in light of the computer model, data, prior bel
Benford's law is an empirical law predicting the distribution of the first significant digits of numbers obtained from natural phenomena and mathematical tables. It has been found to be applicable for numbers coming from a plethora of sources, varying from seismographic, biological, financial, to astronomical. We apply this law to analyze the data obtained from physical many-body systems described by the one-dimensional anisotropic quantum XY models in a transverse magnetic field. We detect the zero-temperature quantum phase transition and find that our method gives better finite-size scaling exponents for the critical point than many other known scaling exponents using measurable quantities like magnetization, entanglement, and quantum discord. We extend our analysis to the same system but at finite temperature and find that it also detects the finite temperature phase transition in the model. Moreover, we compare the Benford distribution analysis with the same obtained from the uniform and Poisson distributions. The analysis is furthermore important in that the high-precision detection of the cooperative physical phenomena is possible even from low-precision experimental data.
We show that deleting an edge of a 3-cycle in an intrinsically knotted graph gives an intrinsically linked graph.
Translation from the Latin original, "Demonstratio gemina theorematis Neutoniani, quo traditur relatio inter coefficientes cuiusvis aequationis algebraicae et summas potestatum radicum eiusdem" (1747). E153 in the Enestrom index. In this paper Euler gives two proofs of Newton's identities, which express the sums of powers of the roots of a polynomial in terms of its coefficients. The first proof takes the derivative of a logarithm. The second proof uses induction and the fact that in a polynomial of degree $n$, the coefficient of $x^{n-k}$ is equal to the sum of the products of $k$ roots, times $(-1)^k$.
We give a simple, direct proof of the easy fact about the Weierstrass Representation, namely, that it always gives a minimal surface. Most presentations include the much harder converse that every simply connected minimal surface is given by the Weierstrass Representation.
Solutions to both the diffeomorphism and the hamiltonian constraint of quantum gravity have been found in the loop representation, which is based on Ashtekar's new variables. While the diffeomorphism constraint is easily solved by considering loop functionals which are knot invariants, there remains the puzzle why several of the known knot invariants are also solutions to the hamiltonian constraint. We show how the Jones polynomial gives rise to an infinite set of solutions to all the constraints of quantum gravity thereby illuminating the structure of the space of solutions and suggesting the existance of a deep connection between quantum gravity and knot theory at a dynamical level.
Electromagnetic negative refraction in metamaterials has attracted increasingly great interest, since its first experimental verification in 2001. It potentially leads to the applications superior to conventional devices including compact antennas for mobile stations, imaging beyond the diffraction limit, and high-resolution radars, not to mention the anamolous wave propagation in fundamental optics. Here, we report how metamaterials could be used to simulate the "negative refraction of spin-zero particles interacting with a strong potential barrier", which gives rise to the Klein paradox--a counterintuitive relativistic process. We address the underlying physics of analogous wave propagation behaviours in those two entirely different domains of quantum and classical.
Several important PDE systems, like magnetohydrodynamics and computational electrodynamics, are known to support involutions where the divergence of a vector field evolves in divergence-free or divergence constraint-preserving fashion. Recently, new classes of PDE systems have emerged for hyperelasticity, compressible multiphase flows, so-called first order reductions of the Einstein field equations, or a novel first order hyperbolic reformulation of Schrödinger's equation, to name a few, where the involution in the PDE supports curl-free or curl constraint-preserving evolution of a vector field. Since mimetic numerical schemes for the solution of the former class of PDEs are well-developed, we draw guidance from them for the solution of the latter class of PDEs. We show that a study of the curl constraint-preserving reconstruction gives us a great deal of insight into the design of consistent, mimetic schemes for these involutionary PDEs. The importance of multidimensional Riemann solvers in facilitating the design of such schemes is also documented. We study the problem of curl constraint-preserving reconstruction as it pertains to the design of mimetic discontinuous Galerkin (DG
HATLAS J084933.4+021443 was identified as a dusty starburst via its rest-frame far-IR emission. Multi-frequency imaging and spectroscopy revealed a cluster of four dusty galaxies at $z = 2.41$, covering 80 kpc. Here, we use ALMA to confirm a more distant, fifth protocluster member, and present X-ray and rest-frame optical imaging spectroscopy of the brightest, an unlensed hyperluminous IR galaxy (HyLIRG). The data reveal broad H αand bright [N II] lines, and bright X-ray emission, characteristics that betray a Type-1 active galactic nucleus (AGN), strengthening evidence that AGN are ubiquitous amongst HyLIRGs. The accreting black hole is super massive, $M_{\rm bh}\approx 2\times 10^9$ M$_\odot$, with little intrinsic absorption, $N_{\rm H}\approx 5\times 10^{21}$ cm$^{-2}$. The X-ray properties suggest the accretion luminosity rivals that of the starburst, yet it is not obvious where this emerges in its panchromatic spectral energy distribution (SED). We outline three scenarios that could give rise to the observed characteristics, and how we might distinguish between them. In the first, we see the AGN through the host galaxy because of the cavity it excavates. In the others, the AG
[This is the unpublished supplemental information from 1989 to the paper: J.M. Deutsch, "Quantum statistical mechanics in a closed system." Phys. Rev. A, 43(4), 2046 (1991).] A closed quantum mechanical system does not necessarily give time averages in accordance with the microcanonical distribution. This question is investigated if the number of degrees of freedom N is large. For systems where the different degrees of freedom are uncoupled, experimental situations are discussed that show a violation of the usual statistical mechanical rules. It is shown that by applying a finite but very small perturbation to such systems, the results of quantum statistical mechanics can indeed be recovered. The form of the perturbation is that of a banded random matrix, which has been used previously to describe strongly chaotic systems in the semiclassical limit. The properties of energy eigenfunctions for this perturbed system are also discussed, and deviations from the microcanonical result are shown to become exponentially small in the limit of large N.
Large language models demonstrate strong problem-solving abilities through reasoning techniques such as chain-of-thought prompting and reflection. However, it remains unclear whether these reasoning capabilities extend to a form of social intelligence: making effective decisions in cooperative contexts. We examine this question using economic games that simulate social dilemmas. First, we apply chain-of-thought and reflection prompting to GPT-4o in a Public Goods Game. We then evaluate multiple off-the-shelf models across six cooperation and punishment games, comparing those with and without explicit reasoning mechanisms. We find that reasoning models consistently reduce cooperation and norm enforcement, favoring individual rationality. In repeated interactions, groups with more reasoning agents exhibit lower collective gains. These behaviors mirror human patterns of "spontaneous giving and calculated greed." Our findings underscore the need for LLM architectures that incorporate social intelligence alongside reasoning, to help address--rather than reinforce--the challenges of collective action.
Multimodal Large Language Models have advanced AI in applications like text-to-video generation and visual question answering. These models rely on visual encoders to convert non-text data into vectors, but current encoders either lack semantic alignment or overlook non-salient objects. We propose the Guiding Visual Encoder to Perceive Overlooked Information (GiVE) approach. GiVE enhances visual representation with an Attention-Guided Adapter (AG-Adapter) module and an Object-focused Visual Semantic Learning module. These incorporate three novel loss terms: Object-focused Image-Text Contrast (OITC) loss, Object-focused Image-Image Contrast (OIIC) loss, and Object-focused Image Discrimination (OID) loss, improving object consideration, retrieval accuracy, and comprehensiveness. Our contributions include dynamic visual focus adjustment, novel loss functions to enhance object retrieval, and the Multi-Object Instruction (MOInst) dataset. Experiments show our approach achieves state-of-the-art performance.
The driver's willingness to give (WTG) control in conditionally automated driving is assessed in a virtual reality based driving-rig, through their choice to give away driving control and through the extent to which automated driving is adopted in a mixed-traffic environment. Within- and across-class unobserved heterogeneity and locus of control variations are taken into account. The choice of giving away control is modelled using the mixed logit (MIXL) and mixed latent class (LCML) model. The significant latent segments of the locus of control are developed into internalizers and externalizers by the latent class model (LCM) based on the taste heterogeneity identified from the MIXL model. Results suggest that drivers choose to "giveAway" control of the vehicle when greater concentration/attentiveness is required (e.g., in the nighttime) or when they are interested in performing a non-driving-related task (NDRT). In addition, it is observed that internalizers demonstrate more heterogeneity compared to externalizers in terms of WTG.