Skip to main content

Showing 1–50 of 979 results for author: Pan, S

.
  1. arXiv:2512.21706  [pdf, ps, other

    cs.CL cs.AI

    Enabling Conversational Behavior Reasoning Capabilities in Full-Duplex Speech

    Authors: Shuchang Pan, Siddharth Banerjee, Dhruv Hebbar, Siddhant Patel, Akshaj Gupta, Kan Jen Cheng, Hanjo Kim, Zeyi Austin Li, Martin Q. Ma, Tingle Li, Gopala Anumanchipalli, Jiachen Lian

    Abstract: Human conversation is organized by an implicit chain of thoughts that manifests as timed speech acts. Capturing this causal pathway is key to building natural full-duplex interactive systems. We introduce a framework that enables reasoning over conversational behaviors by modeling this process as causal inference within a Graph-of-Thoughts (GoT). Our approach formalizes the intent-to-action pathwa… ▽ More

    Submitted 25 December, 2025; originally announced December 2025.

  2. arXiv:2512.18733  [pdf, ps, other

    cs.CR cs.AI cs.MA

    Explainable and Fine-Grained Safeguarding of LLM Multi-Agent Systems via Bi-Level Graph Anomaly Detection

    Authors: Junjun Pan, Yixin Liu, Rui Miao, Kaize Ding, Yu Zheng, Quoc Viet Hung Nguyen, Alan Wee-Chung Liew, Shirui Pan

    Abstract: Large language model (LLM)-based multi-agent systems (MAS) have shown strong capabilities in solving complex tasks. As MAS become increasingly autonomous in various safety-critical tasks, detecting malicious agents has become a critical security concern. Although existing graph anomaly detection (GAD)-based defenses can identify anomalous agents, they mainly rely on coarse sentence-level informati… ▽ More

    Submitted 21 December, 2025; originally announced December 2025.

    Comments: 14 pages, 3 tables, 5 figures

  3. arXiv:2512.15374  [pdf, ps, other

    cs.AI

    SCOPE: Prompt Evolution for Enhancing Agent Effectiveness

    Authors: Zehua Pei, Hui-Ling Zhen, Shixiong Kai, Sinno Jialin Pan, Yunhe Wang, Mingxuan Yuan, Bei Yu

    Abstract: Large Language Model (LLM) agents are increasingly deployed in environments that generate massive, dynamic contexts. However, a critical bottleneck remains: while agents have access to this context, their static prompts lack the mechanisms to manage it effectively, leading to recurring Corrective and Enhancement failures. To address this capability gap, we introduce \textbf{SCOPE} (Self-evolving C… ▽ More

    Submitted 17 December, 2025; originally announced December 2025.

  4. arXiv:2512.13564  [pdf, ps, other

    cs.CL cs.AI

    Memory in the Age of AI Agents

    Authors: Yuyang Hu, Shichun Liu, Yanwei Yue, Guibin Zhang, Boyang Liu, Fangyi Zhu, Jiahang Lin, Honglin Guo, Shihan Dou, Zhiheng Xi, Senjie Jin, Jiejun Tan, Yanbin Yin, Jiongnan Liu, Zeyu Zhang, Zhongxiang Sun, Yutao Zhu, Hao Sun, Boci Peng, Zhenrong Cheng, Xuanbo Fan, Jiaxin Guo, Xinlei Yu, Zhenhong Zhou, Zewen Hu , et al. (22 additional authors not shown)

    Abstract: Memory has emerged, and will continue to remain, a core capability of foundation model-based agents. As research on agent memory rapidly expands and attracts unprecedented attention, the field has also become increasingly fragmented. Existing works that fall under the umbrella of agent memory often differ substantially in their motivations, implementations, and evaluation protocols, while the prol… ▽ More

    Submitted 15 December, 2025; originally announced December 2025.

  5. arXiv:2512.12565  [pdf, ps, other

    math.DG math.AP

    The quermassintegral inequalities for horo-convex domains in the sphere

    Authors: Shujing Pan, Julian Scheuer

    Abstract: We study a new notion of convexity for subsets of the unit sphere, which closely resembles the horo-convexity for subsets of the hyperbolic space. We call this notion, accordingly, horo-convexity. For horo-convex hypersurfaces of the unit sphere, we prove the smooth convergence of the classical Guan/Li flow of inverse type and use this result to prove the full set of quermassintegral inequalities… ▽ More

    Submitted 14 December, 2025; originally announced December 2025.

    Comments: 13 pages

  6. arXiv:2512.11285  [pdf, ps, other

    hep-ph hep-ex

    JUNO's Impact on the Neutrino Mass Ordering from Lorentz Invariance Violation

    Authors: Tatiana Araya-Santander, Cesar Bonilla, Supriya Pan

    Abstract: We explore the potential of the Jiangmen Underground Neutrino Observatory (JUNO) to probe new physics by searching for Lorentz-invariance violation (LIV). Using the 59.1-day dataset recently released by this experiment, we analyze neutrino oscillations to place new constraints on the LIV parameters in the CPT-even ($c_{ee} - c_{eμ}$, $c_{ee} - c_{eτ}$) and CPT-odd ($a_{ee} - a_{eμ}$,… ▽ More

    Submitted 18 December, 2025; v1 submitted 12 December, 2025; originally announced December 2025.

    Comments: 21 pages, 12 figures. Fig. 7 and 12 updated; Table 4 and 5 updated; results and conclusions unchanged; references added

  7. arXiv:2512.09866  [pdf, ps, other

    astro-ph.CO gr-qc

    Beyond Two Parameters: Revisiting Dark Energy with the Latest Cosmic Probes

    Authors: Hanyu Cheng, Supriya Pan, Eleonora Di Valentino

    Abstract: Dark energy (DE) models with many free parameters are often considered excessive, as constraining all parameters poses a significant challenge. On the other hand, such models offer greater flexibility to probe the DE sector in more detail. With the rapid advancement of astronomical surveys and the availability of diverse datasets, it is timely to examine whether current combined observations can e… ▽ More

    Submitted 10 December, 2025; originally announced December 2025.

    Comments: 12 pages including references, 9 figures, 2 tables; comments are welcome

  8. arXiv:2512.08991  [pdf, ps, other

    cs.CV cs.LG

    Deterministic World Models for Verification of Closed-loop Vision-based Systems

    Authors: Yuang Geng, Zhuoyang Zhou, Zhongzheng Zhang, Siyuan Pan, Hoang-Dung Tran, Ivan Ruchkin

    Abstract: Verifying closed-loop vision-based control systems remains a fundamental challenge due to the high dimensionality of images and the difficulty of modeling visual environments. While generative models are increasingly used as camera surrogates in verification, their reliance on stochastic latent variables introduces unnecessary overapproximation error. To address this bottleneck, we propose a Deter… ▽ More

    Submitted 7 December, 2025; originally announced December 2025.

    Comments: 22 pages, 10 figures. Submitted to FM 2026

  9. arXiv:2512.06944  [pdf, ps, other

    cs.LG cs.AI cs.CY

    A Unifying Human-Centered AI Fairness Framework

    Authors: Munshi Mahbubur Rahman, Shimei Pan, James R. Foulds

    Abstract: The increasing use of Artificial Intelligence (AI) in critical societal domains has amplified concerns about fairness, particularly regarding unequal treatment across sensitive attributes such as race, gender, and socioeconomic status. While there has been substantial work on ensuring AI fairness, navigating trade-offs between competing notions of fairness as well as predictive accuracy remains ch… ▽ More

    Submitted 7 December, 2025; originally announced December 2025.

  10. arXiv:2512.04578  [pdf, ps, other

    cs.CL

    LexGenius: An Expert-Level Benchmark for Large Language Models in Legal General Intelligence

    Authors: Wenjin Liu, Haoran Luo, Xin Feng, Xiang Ji, Lijuan Zhou, Rui Mao, Jiapu Wang, Shirui Pan, Erik Cambria

    Abstract: Legal general intelligence (GI) refers to artificial intelligence (AI) that encompasses legal understanding, reasoning, and decision-making, simulating the expertise of legal experts across domains. However, existing benchmarks are result-oriented and fail to systematically evaluate the legal intelligence of large language models (LLMs), hindering the development of legal GI. To address this, we p… ▽ More

    Submitted 4 December, 2025; originally announced December 2025.

  11. arXiv:2512.02556  [pdf, ps, other

    cs.CL

    DeepSeek-V3.2: Pushing the Frontier of Open Large Language Models

    Authors: DeepSeek-AI, Aixin Liu, Aoxue Mei, Bangcai Lin, Bing Xue, Bingxuan Wang, Bingzheng Xu, Bochao Wu, Bowei Zhang, Chaofan Lin, Chen Dong, Chengda Lu, Chenggang Zhao, Chengqi Deng, Chenhao Xu, Chong Ruan, Damai Dai, Daya Guo, Dejian Yang, Deli Chen, Erhang Li, Fangqi Zhou, Fangyun Lin, Fucong Dai, Guangbo Hao , et al. (239 additional authors not shown)

    Abstract: We introduce DeepSeek-V3.2, a model that harmonizes high computational efficiency with superior reasoning and agent performance. The key technical breakthroughs of DeepSeek-V3.2 are as follows: (1) DeepSeek Sparse Attention (DSA): We introduce DSA, an efficient attention mechanism that substantially reduces computational complexity while preserving model performance in long-context scenarios. (2)… ▽ More

    Submitted 2 December, 2025; originally announced December 2025.

  12. arXiv:2511.22119  [pdf, ps, other

    cs.CV

    PROMPTMINER: Black-Box Prompt Stealing against Text-to-Image Generative Models via Reinforcement Learning and Fuzz Optimization

    Authors: Mingzhe Li, Renhao Zhang, Zhiyang Wen, Siqi Pan, Bruno Castro da Silva, Juan Zhai, Shiqing Ma

    Abstract: Text-to-image (T2I) generative models such as Stable Diffusion and FLUX can synthesize realistic, high-quality images directly from textual prompts. The resulting image quality depends critically on well-crafted prompts that specify both subjects and stylistic modifiers, which have become valuable digital assets. However, the rising value and ubiquity of high-quality prompts expose them to securit… ▽ More

    Submitted 27 November, 2025; originally announced November 2025.

  13. arXiv:2511.21758  [pdf, ps, other

    cs.CR cs.AI cs.CY

    A Longitudinal Measurement of Privacy Policy Evolution for Large Language Models

    Authors: Zhen Tao, Shidong Pan, Zhenchang Xing, Emily Black, Talia Gillis, Chunyang Chen

    Abstract: Large language model (LLM) services have been rapidly integrated into people's daily lives as chatbots and agentic systems. They are nourished by collecting rich streams of data, raising privacy concerns around excessive collection of sensitive personal information. Privacy policies are the fundamental mechanism for informing users about data practices in modern information privacy paradigm. Altho… ▽ More

    Submitted 24 November, 2025; originally announced November 2025.

  14. arXiv:2511.19171  [pdf, ps, other

    cs.CR

    Can LLMs Threaten Human Survival? Benchmarking Potential Existential Threats from LLMs via Prefix Completion

    Authors: Yu Cui, Yifei Liu, Hang Fu, Sicheng Pan, Haibin Zhang, Cong Zuo, Licheng Wang

    Abstract: Research on the safety evaluation of large language models (LLMs) has become extensive, driven by jailbreak studies that elicit unsafe responses. Such response involves information already available to humans, such as the answer to "how to make a bomb". When LLMs are jailbroken, the practical threat they pose to humans is negligible. However, it remains unclear whether LLMs commonly produce unpred… ▽ More

    Submitted 20 December, 2025; v1 submitted 24 November, 2025; originally announced November 2025.

  15. arXiv:2511.19059  [pdf, ps, other

    cs.SE

    LLMAID: Identifying AI Capabilities in Android Apps with LLMs

    Authors: Pei Liu, Terry Zhuo, Jiawei Deng, Thong James, Shidong Pan, Sherry Xu, Zhenchang Xing, Qinghua Lu, Xiaoning Du, Hongyu Zhang

    Abstract: Recent advancements in artificial intelligence (AI) and its widespread integration into mobile software applications have received significant attention, highlighting the growing prominence of AI capabilities in modern software systems. However, the inherent hallucination and reliability issues of AI continue to raise persistent concerns. Consequently, application users and regulators increasingly… ▽ More

    Submitted 28 November, 2025; v1 submitted 24 November, 2025; originally announced November 2025.

  16. arXiv:2511.16123  [pdf, ps, other

    cs.SE

    Domain-constrained Synthesis of Inconsistent Key Aspects in Textual Vulnerability Descriptions

    Authors: Linyi Han, Shidong Pan, Zhenchang Xing, Sofonias Yitagesu, Xiaowang Zhang, Zhiyong Feng, Jiamou Sun, Qing Huang

    Abstract: Textual Vulnerability Descriptions (TVDs) are crucial for security analysts to understand and address software vulnerabilities. However, the key aspect inconsistencies in TVDs from different repositories pose challenges for achieving a comprehensive understanding of vulnerabilities. Existing approaches aim to mitigate inconsistencies by aligning TVDs with external knowledge bases, but they often d… ▽ More

    Submitted 20 November, 2025; originally announced November 2025.

  17. arXiv:2511.13588  [pdf, ps, other

    eess.SY cs.AI math.DS

    Data-driven Acceleration of MPC with Guarantees

    Authors: Agustin Castellano, Shijie Pan, Enrique Mallada

    Abstract: Model Predictive Control (MPC) is a powerful framework for optimal control but can be too slow for low-latency applications. We present a data-driven framework to accelerate MPC by replacing online optimization with a nonparametric policy constructed from offline MPC solutions. Our policy is greedy with respect to a constructed upper bound on the optimal cost-to-go, and can be implemented as a non… ▽ More

    Submitted 17 November, 2025; originally announced November 2025.

  18. arXiv:2511.13462  [pdf, ps, other

    hep-ex

    Measurement of Exclusive $π^+$--argon Interactions Using ProtoDUNE-SP

    Authors: DUNE Collaboration, S. Abbaslu, A. Abed Abud, R. Acciarri, L. P. Accorsi, M. A. Acero, M. R. Adames, G. Adamov, M. Adamowski, C. Adriano, F. Akbar, F. Alemanno, N. S. Alex, K. Allison, M. Alrashed, A. Alton, R. Alvarez, T. Alves, A. Aman, H. Amar, P. Amedo, J. Anderson, D. A. Andrade, C. Andreopoulos, M. Andreotti , et al. (1304 additional authors not shown)

    Abstract: We present the measurement of $π^{+}$--argon inelastic cross sections using the ProtoDUNE Single-Phase liquid argon time projection chamber in the incident $π^+$ kinetic energy range of 500 -- 800 MeV in multiple exclusive channels (absorption, charge exchange, and the remaining inelastic interactions). The results of this analysis are important inputs to simulations of liquid argon neutrino exper… ▽ More

    Submitted 17 November, 2025; originally announced November 2025.

    Report number: CERN-EP-2025-268; FERMILAB-PUB-25-0732-LBNF

  19. arXiv:2511.11925  [pdf, ps, other

    nucl-ex hep-ex

    First Measurement of $π^+$-Ar and $p$-Ar Total Inelastic Cross Sections in the Sub-GeV Energy Regime with ProtoDUNE-SP Data

    Authors: DUNE Collaboration, S. Abbaslu, F. Abd Alrahman, A. Abed Abud, R. Acciarri, L. P. Accorsi, M. A. Acero, M. R. Adames, G. Adamov, M. Adamowski, C. Adriano, F. Akbar, F. Alemanno, N. S. Alex, L. Aliaga Soplin, K. Allison, M. Alrashed, A. Alton, R. Alvarez, T. Alves, A. Aman, H. Amar, P. Amedo, J. Anderson, D. A. Andrade , et al. (1327 additional authors not shown)

    Abstract: The ProtoDUNE-SP detector, a kiloton-scale prototype for the Deep Underground Neutrino Experiment (DUNE), is the largest liquid argon time projection chamber built to date. Operated at CERN from 2018 to 2020, it collected both cosmic-ray data and a beam consisting of positively-charged particles with discrete momentum settings across a range of 0.3 GeV/$c$ to 7 GeV/$c$. In this letter, we report t… ▽ More

    Submitted 14 November, 2025; originally announced November 2025.

    Report number: FERMILAB-PUB-25-0814-LBNF, CERN-EP-2025-266

  20. arXiv:2511.09940  [pdf, ps, other

    math.OC

    Convergence analysis of inexact MBA method for constrained upper-$\mathcal{C}^2$ optimization problems

    Authors: Ruyu Liu, Shaohua Pan

    Abstract: This paper concerns a class of constrained optimization problems in which, the objective and constraint functions are both upper-$\mathcal{C}^2$. For such nonconvex and nonsmooth optimization problems, we develop an inexact moving balls approximation (MBA) method by a workable inexactness criterion for the solving of subproblems. By leveraging a global error bound for the strongly convex program a… ▽ More

    Submitted 12 November, 2025; originally announced November 2025.

  21. arXiv:2511.07023  [pdf, ps, other

    cs.LG

    Correcting False Alarms from Unseen: Adapting Graph Anomaly Detectors at Test Time

    Authors: Junjun Pan, Yixin Liu, Chuan Zhou, Fei Xiong, Alan Wee-Chung Liew, Shirui Pan

    Abstract: Graph anomaly detection (GAD), which aims to detect outliers in graph-structured data, has received increasing research attention recently. However, existing GAD methods assume identical training and testing distributions, which is rarely valid in practice. In real-world scenarios, unseen but normal samples may emerge during deployment, leading to a normality shift that degrades the performance of… ▽ More

    Submitted 10 November, 2025; originally announced November 2025.

    Comments: 9 pages, 5 figures, accepted by AAAI 2026

  22. arXiv:2511.05159  [pdf, ps, other

    stat.ML cs.LG

    A New Framework for Convex Clustering in Kernel Spaces: Finite Sample Bounds, Consistency and Performance Insights

    Authors: Shubhayan Pan, Saptarshi Chakraborty, Debolina Paul, Kushal Bose, Swagatam Das

    Abstract: Convex clustering is a well-regarded clustering method, resembling the similar centroid-based approach of Lloyd's $k$-means, without requiring a predefined cluster count. It starts with each data point as its centroid and iteratively merges them. Despite its advantages, this method can fail when dealing with data exhibiting linearly non-separable or non-convex structures. To mitigate the limitatio… ▽ More

    Submitted 7 November, 2025; originally announced November 2025.

  23. arXiv:2511.03673  [pdf, ps, other

    cs.HC

    OriFeel: Origami-Inspired Actuation for Force-Based Tactile Feedback on Ambient Surfaces

    Authors: Shubham Rohal, Shijia Pan

    Abstract: People are constantly in touch with surfaces in their lives, such as a sofa, armrest, and table, making them natural tactile interfaces. Despite the recent advancements in shape-changing surfaces, current available solutions are often challenging to retrofit into ambient surfaces due to their bulky form factor or high power requirements. We present \name, a foldable structure-enabled tactile feedb… ▽ More

    Submitted 5 November, 2025; originally announced November 2025.

  24. arXiv:2511.01149  [pdf

    cs.AI

    Modular Task Decomposition and Dynamic Collaboration in Multi-Agent Systems Driven by Large Language Models

    Authors: Shuaidong Pan, Di Wu

    Abstract: This paper addresses the limitations of a single agent in task decomposition and collaboration during complex task execution, and proposes a multi-agent architecture for modular task decomposition and dynamic collaboration based on large language models. The method first converts natural language task descriptions into unified semantic representations through a large language model. On this basis,… ▽ More

    Submitted 2 November, 2025; originally announced November 2025.

  25. arXiv:2511.00467  [pdf, ps, other

    cs.SE

    A Big Step Forward? A User-Centric Examination of iOS App Privacy Report and Enhancements

    Authors: Liu Wang, Dong Wang, Shidong Pan, Zheng Jiang, Haoyu Wang, Yi Wang

    Abstract: The prevalent engagement with mobile apps underscores the importance of understanding their data practices. Transparency plays a crucial role in this context, ensuring users to be informed and give consent before any data access occurs. Apple introduced a new feature since iOS 15.2, App Privacy Report, to inform users about detailed insights into apps' data access and sharing. This feature continu… ▽ More

    Submitted 1 November, 2025; originally announced November 2025.

    Comments: Accepted to S&P 2025

  26. arXiv:2510.26692  [pdf, ps, other

    cs.CL cs.LG

    Kimi Linear: An Expressive, Efficient Attention Architecture

    Authors: Kimi Team, Yu Zhang, Zongyu Lin, Xingcheng Yao, Jiaxi Hu, Fanqing Meng, Chengyin Liu, Xin Men, Songlin Yang, Zhiyuan Li, Wentao Li, Enzhe Lu, Weizhou Liu, Yanru Chen, Weixin Xu, Longhui Yu, Yejie Wang, Yu Fan, Longguang Zhong, Enming Yuan, Dehao Zhang, Yizhi Zhang, T. Y. Liu, Haiming Wang, Shengjun Fang , et al. (35 additional authors not shown)

    Abstract: We introduce Kimi Linear, a hybrid linear attention architecture that, for the first time, outperforms full attention under fair comparisons across various scenarios -- including short-context, long-context, and reinforcement learning (RL) scaling regimes. At its core lies Kimi Delta Attention (KDA), an expressive linear attention module that extends Gated DeltaNet with a finer-grained gating mech… ▽ More

    Submitted 1 November, 2025; v1 submitted 30 October, 2025; originally announced October 2025.

    Comments: Kimi Linear tech report

  27. arXiv:2510.20084  [pdf, ps, other

    cs.LG cs.AI

    ShapeX: Shapelet-Driven Post Hoc Explanations for Time Series Classification Models

    Authors: Bosong Huang, Ming Jin, Yuxuan Liang, Johan Barthelemy, Debo Cheng, Qingsong Wen, Chenghao Liu, Shirui Pan

    Abstract: Explaining time series classification models is crucial, particularly in high-stakes applications such as healthcare and finance, where transparency and trust play a critical role. Although numerous time series classification methods have identified key subsequences, known as shapelets, as core features for achieving state-of-the-art performance and validating their pivotal role in classification… ▽ More

    Submitted 24 October, 2025; v1 submitted 22 October, 2025; originally announced October 2025.

  28. arXiv:2510.19347  [pdf, ps, other

    cs.LG cs.AI cs.GR

    A New Type of Adversarial Examples

    Authors: Xingyang Nie, Guojie Xiao, Su Pan, Biao Wang, Huilin Ge, Tao Fang

    Abstract: Most machine learning models are vulnerable to adversarial examples, which poses security concerns on these models. Adversarial examples are crafted by applying subtle but intentionally worst-case modifications to examples from the dataset, leading the model to output a different answer from the original example. In this paper, adversarial examples are formed in an exactly opposite manner, which a… ▽ More

    Submitted 22 October, 2025; originally announced October 2025.

  29. arXiv:2510.17765  [pdf, ps, other

    gr-qc astro-ph.CO

    Phantom scalar field with arbitrary potential: accelerating scaling attractors

    Authors: Sudip Halder, Supriya Pan, Paulo M. Sá, Tapan Saha

    Abstract: In this article, we investigate the dynamics of a phantom scalar field with an arbitrary potential, focusing on accelerating scaling solutions of cosmological relevance. We consider both uncoupled and coupled cosmological scenarios. In the latter case, the coupling between phantom dark energy and dark matter is motivated by the warm inflationary paradigm, with the dissipation coefficient assumed t… ▽ More

    Submitted 20 October, 2025; originally announced October 2025.

    Comments: 15 pages including references, 3 tables and one figure; comments are welcome

  30. arXiv:2510.16823  [pdf, ps, other

    cs.SE cs.CR

    When AI Takes the Wheel: Security Analysis of Framework-Constrained Program Generation

    Authors: Yue Liu, Zhenchang Xing, Shidong Pan, Chakkrit Tantithamthavorn

    Abstract: In recent years, the AI wave has grown rapidly in software development. Even novice developers can now design and generate complex framework-constrained software systems based on their high-level requirements with the help of Large Language Models (LLMs). However, when LLMs gradually "take the wheel" of software development, developers may only check whether the program works. They often miss secu… ▽ More

    Submitted 12 November, 2025; v1 submitted 19 October, 2025; originally announced October 2025.

  31. arXiv:2510.16771  [pdf

    cs.RO

    A Preliminary Exploration of the Differences and Conjunction of Traditional PNT and Brain-inspired PNT

    Authors: Xu He, Xiaolin Meng, Wenxuan Yin, Youdong Zhang, Lingfei Mo, Xiangdong An, Fangwen Yu, Shuguo Pan, Yufeng Liu, Jingnan Liu, Yujia Zhang, Wang Gao

    Abstract: Developing universal Positioning, Navigation, and Timing (PNT) is our enduring goal. Today's complex environments demand PNT that is more resilient, energy-efficient and cognitively capable. This paper asks how we can endow unmanned systems with brain-inspired spatial cognition navigation while exploiting the high precision of machine PNT to advance universal PNT. We provide a new perspective and… ▽ More

    Submitted 19 October, 2025; originally announced October 2025.

  32. arXiv:2510.15081  [pdf, ps, other

    cs.CL cs.SI

    A Generalizable Rhetorical Strategy Annotation Model Using LLM-based Debate Simulation and Labelling

    Authors: Shiyu Ji, Farnoosh Hashemi, Joice Chen, Juanwen Pan, Weicheng Ma, Hefan Zhang, Sophia Pan, Ming Cheng, Shubham Mohole, Saeed Hassanpour, Soroush Vosoughi, Michael Macy

    Abstract: Rhetorical strategies are central to persuasive communication, from political discourse and marketing to legal argumentation. However, analysis of rhetorical strategies has been limited by reliance on human annotation, which is costly, inconsistent, difficult to scale. Their associated datasets are often limited to specific topics and strategies, posing challenges for robust model development. We… ▽ More

    Submitted 16 October, 2025; originally announced October 2025.

    Comments: The first two authors contributed equally

  33. arXiv:2510.14584  [pdf, ps, other

    cs.RO

    A Generalized Placeability Metric for Model-Free Unified Pick-and-Place Reasoning

    Authors: Benno Wingender, Nils Dengler, Rohit Menon, Sicong Pan, Maren Bennewitz

    Abstract: To reliably pick and place unknown objects under real-world sensing noise remains a challenging task, as existing methods rely on strong object priors (e.g., CAD models), or planar-support assumptions, limiting generalization and unified reasoning between grasping and placing. In this work, we introduce a generalized placeability metric that evaluates placement poses directly from noisy point clou… ▽ More

    Submitted 16 October, 2025; originally announced October 2025.

  34. arXiv:2510.14299  [pdf, ps, other

    cs.LG cs.AI

    TED++: Submanifold-Aware Backdoor Detection via Layerwise Tubular-Neighbourhood Screening

    Authors: Nam Le, Leo Yu Zhang, Kewen Liao, Shirui Pan, Wei Luo

    Abstract: As deep neural networks power increasingly critical applications, stealthy backdoor attacks, where poisoned training inputs trigger malicious model behaviour while appearing benign, pose a severe security risk. Many existing defences are vulnerable when attackers exploit subtle distance-based anomalies or when clean examples are scarce. To meet this challenge, we introduce TED++, a submanifold-awa… ▽ More

    Submitted 16 October, 2025; originally announced October 2025.

    Comments: Accepted by ICDM 2025

    MSC Class: 68T07; 62H30; 53Z50 ACM Class: I.2.6; I.5.1; K.6.5

  35. arXiv:2510.13909  [pdf, ps, other

    cs.CL cs.AI

    Knowledge Reasoning Language Model: Unifying Knowledge and Language for Inductive Knowledge Graph Reasoning

    Authors: Xingrui Zhuo, Jiapu Wang, Gongqing Wu, Zhongyuan Wang, Jichen Zhang, Shirui Pan, Xindong Wu

    Abstract: Inductive Knowledge Graph Reasoning (KGR) aims to discover facts in open-domain KGs containing unknown entities and relations, which poses a challenge for KGR models in comprehending uncertain KG components. Existing studies have proposed Knowledge Graph Foundation Models (KGFMs) that learn structural invariances across KGs to handle this uncertainty. Recently, Large Language Models (LLMs) have de… ▽ More

    Submitted 14 October, 2025; originally announced October 2025.

  36. arXiv:2510.13478  [pdf

    physics.optics

    High Bandwidth and Ultra-low Dark Current Ge Photodetector Enabled by Frequency Domain Equalization

    Authors: Wenxin Deng, Hengsong Yue, Xiaoyan Liu, Jianhong Liang, Jianbin Fu, Shilong Pan, Tao Chu

    Abstract: High bandwidth and low dark current germanium (Ge) photodetectors are crucial in silicon photonic integrated circuits. The bandwidth of Ge photodetectors is restricted by carrier transit time and parasitic parameters. And thermal generation of carriers within the Ge P-N junction results in an inherent dark current, typically in nA-μA range. Here, we propose an equalization photodetector (EqPD) uti… ▽ More

    Submitted 15 October, 2025; originally announced October 2025.

  37. arXiv:2510.10613  [pdf

    cs.CL cs.AI

    Dynamic Topic Evolution with Temporal Decay and Attention in Large Language Models

    Authors: Di Wu, Shuaidong Pan

    Abstract: This paper proposes a modeling framework for dynamic topic evolution based on temporal large language models. The method first uses a large language model to obtain contextual embeddings of text and then introduces a temporal decay function and an attention mechanism. These components allow the model to adjust the importance of semantic units according to time intervals and capture topic variation… ▽ More

    Submitted 2 November, 2025; v1 submitted 12 October, 2025; originally announced October 2025.

  38. Is Dark Energy Changing? Probing the Universe's Expansion with present and future astronomical probes

    Authors: Mehdi Rezaei, Supriya Pan, Weiqiang Yang, David F. Mota

    Abstract: This study explores the possibility of a time-varying dark energy (DE) equation of state (EoS) deviating from -1. We employ a comprehensive dataset of usual astronomical probes (Type Ia supernovae, baryon acoustic oscillations, Big Bang nucleosynthesis, Hubble data, and Planck 2018 CMB) alongside future mock gravitational wave (GW) distance measurements from the Einstein Telescope. We utilize the… ▽ More

    Submitted 22 December, 2025; v1 submitted 10 October, 2025; originally announced October 2025.

    Comments: 8 figures and 4 tables, accepted for publication in APJ

    Journal ref: The Astrophysical Journal, 995:164 (16pp), 2025 December 20

  39. arXiv:2510.08900  [pdf, ps, other

    cs.CE

    Few-shot Molecular Property Prediction: A Survey

    Authors: Zeyu Wang, Tianyi Jiang, Huanchang Ma, Yao Lu, Xiaoze Bao, Shanqing Yu, Qi Xuan, Shirui Pan, Xin Zheng

    Abstract: AI-assisted molecular property prediction has become a promising technique in early-stage drug discovery and materials design in recent years. However, due to high-cost and complex wet-lab experiments, real-world molecules usually experience the issue of scarce annotations, leading to limited labeled data for effective supervised AI model learning. In light of this, few-shot molecular property pre… ▽ More

    Submitted 9 October, 2025; originally announced October 2025.

    Comments: Its a survey about few-shot molecular property prediction

  40. arXiv:2510.08380  [pdf, ps, other

    hep-ex

    Identification of low-energy kaons in the ProtoDUNE-SP detector

    Authors: DUNE Collaboration, S. Abbaslu, F. Abd Alrahman, A. Abed Abud, R. Acciarri, L. P. Accorsi, M. A. Acero, M. R. Adames, G. Adamov, M. Adamowski, C. Adriano, F. Akbar, F. Alemanno, N. S. Alex, K. Allison, M. Alrashed, A. Alton, R. Alvarez, T. Alves, A. Aman, H. Amar, P. Amedo, J. Anderson, D. A. Andrade, C. Andreopoulos , et al. (1325 additional authors not shown)

    Abstract: The Deep Underground Neutrino Experiment (DUNE) is a next-generation neutrino experiment with a rich physics program that includes searches for the hypothetical phenomenon of proton decay. Utilizing liquid-argon time-projection chamber technology, DUNE is expected to achieve world-leading sensitivity in the proton decay channels that involve charged kaons in their final states. The first DUNE demo… ▽ More

    Submitted 9 October, 2025; originally announced October 2025.

    Report number: CERN-EP-2025-231, FERMILAB-PUB-25-0717-LBNF

  41. arXiv:2510.07835  [pdf, ps, other

    cs.LG cs.AI cs.CL cs.CR

    MetaDefense: Defending Finetuning-based Jailbreak Attack Before and During Generation

    Authors: Weisen Jiang, Sinno Jialin Pan

    Abstract: This paper introduces MetaDefense, a novel framework for defending against finetuning-based jailbreak attacks in large language models (LLMs). We observe that existing defense mechanisms fail to generalize to harmful queries disguised by unseen attack templates, despite LLMs being capable of distinguishing disguised harmful queries in the embedding space. Based on these insights, we propose a two-… ▽ More

    Submitted 9 October, 2025; originally announced October 2025.

    Comments: Accepted By NeurIPS 2025

  42. arXiv:2510.07028  [pdf, ps, other

    cs.RO

    Temporal-Prior-Guided View Planning for Periodic 3D Plant Reconstruction

    Authors: Sicong Pan, Xuying Huang, Maren Bennewitz

    Abstract: Periodic 3D reconstruction is essential for crop monitoring, but costly when each cycle restarts from scratch, wasting resources and ignoring information from previous captures. We propose temporal-prior-guided view planning for periodic plant reconstruction, in which a previously reconstructed model of the same plant is non-rigidly aligned to a new partial observation to form an approximation of… ▽ More

    Submitted 8 October, 2025; originally announced October 2025.

    Comments: Accepted to the Active Perception Workshop at IROS 2025

  43. arXiv:2510.06039  [pdf, ps, other

    cs.CL cs.AI

    CDTP: A Large-Scale Chinese Data-Text Pair Dataset for Comprehensive Evaluation of Chinese LLMs

    Authors: Chengwei Wu, Jiapu Wang, Mingyang Gao, Xingrui Zhuo, Jipeng Guo, Runlin Lei, Haoran Luo, Tianyu Chen, Haoyi Zhou, Shirui Pan, Zechao Li

    Abstract: Large Language Models (LLMs) have achieved remarkable success across a wide range of natural language processing tasks. However, Chinese LLMs face unique challenges, primarily due to the dominance of unstructured free text and the lack of structured representations in Chinese corpora. While existing benchmarks for LLMs partially assess Chinese LLMs, they are still predominantly English-centric and… ▽ More

    Submitted 7 October, 2025; originally announced October 2025.

  44. arXiv:2510.04261  [pdf, ps, other

    cs.CR

    VortexPIA: Indirect Prompt Injection Attack against LLMs for Efficient Extraction of User Privacy

    Authors: Yu Cui, Sicheng Pan, Yifei Liu, Haibin Zhang, Cong Zuo

    Abstract: Large language models (LLMs) have been widely deployed in Conversational AIs (CAIs), while exposing privacy and security threats. Recent research shows that LLM-based CAIs can be manipulated to extract private information from human users, posing serious security threats. However, the methods proposed in that study rely on a white-box setting that adversaries can directly modify the system prompt.… ▽ More

    Submitted 5 October, 2025; originally announced October 2025.

  45. arXiv:2510.03217  [pdf, ps, other

    cs.SE cs.AI

    Abstain and Validate: A Dual-LLM Policy for Reducing Noise in Agentic Program Repair

    Authors: José Cambronero, Michele Tufano, Sherry Shi, Renyao Wei, Grant Uy, Runxiang Cheng, Chin-Jung Liu, Shiying Pan, Satish Chandra, Pat Rondon

    Abstract: Agentic Automated Program Repair (APR) is increasingly tackling complex, repository-level bugs in industry, but ultimately agent-generated patches still need to be reviewed by a human before committing them to ensure they address the bug. Showing unlikely patches to developers can lead to substantial noise, wasting valuable developer time and eroding trust in automated code changes. We introduce t… ▽ More

    Submitted 3 October, 2025; originally announced October 2025.

  46. arXiv:2510.01231  [pdf

    cs.CL cs.AI stat.ML

    Trustworthy Summarization via Uncertainty Quantification and Risk Awareness in Large Language Models

    Authors: Shuaidong Pan, Di Wu

    Abstract: This study addresses the reliability of automatic summarization in high-risk scenarios and proposes a large language model framework that integrates uncertainty quantification and risk-aware mechanisms. Starting from the demands of information overload and high-risk decision-making, a conditional generation-based summarization model is constructed, and Bayesian inference is introduced during gener… ▽ More

    Submitted 23 September, 2025; originally announced October 2025.

  47. arXiv:2509.26223  [pdf, ps, other

    q-bio.GN

    Nephrobase Cell+: Multimodal Single-Cell Foundation Model for Decoding Kidney Biology

    Authors: Chenyu Li, Elias Ziyadeh, Yash Sharma, Bernhard Dumoulin, Jonathan Levinsohn, Eunji Ha, Siyu Pan, Vishwanatha Rao, Madhav Subramaniyam, Mario Szegedy, Nancy Zhang, Katalin Susztak

    Abstract: Background: Large foundation models have revolutionized single-cell analysis, yet no kidney-specific model currently exists, and it remains unclear whether organ-focused models can outperform generalized models. The kidney's complex cellular architecture further complicate integration of large-scale omics data, where current frameworks trained on limited datasets struggle to correct batch effects,… ▽ More

    Submitted 30 September, 2025; originally announced September 2025.

  48. arXiv:2509.24803  [pdf, ps, other

    cs.AI cs.CL

    TimeOmni-1: Incentivizing Complex Reasoning with Time Series in Large Language Models

    Authors: Tong Guan, Zijie Meng, Dianqi Li, Shiyu Wang, Chao-Han Huck Yang, Qingsong Wen, Zuozhu Liu, Sabato Marco Siniscalchi, Ming Jin, Shirui Pan

    Abstract: Recent advances in multimodal time series learning underscore a paradigm shift from analytics centered on basic patterns toward advanced time series understanding and reasoning. However, existing multimodal time series datasets mostly remain at the level of surface alignment and question answering, without reaching the depth of genuine reasoning. The absence of well-defined tasks that genuinely re… ▽ More

    Submitted 29 September, 2025; originally announced September 2025.

  49. arXiv:2509.24419  [pdf, ps, other

    cs.SE

    Unit Test Update through LLM-Driven Context Collection and Error-Type-Aware Refinement

    Authors: Yuanhe Zhang, Zhiquan Yang, Shengyi Pan, Zhongxin Liu

    Abstract: Unit testing is critical for ensuring software quality and software system stability. The current practice of manually maintaining unit tests suffers from low efficiency and the risk of delayed or overlooked fixes. Therefore, an automated approach is required to instantly update unit tests, with the capability to both repair and enhance unit tests. However, existing automated test maintenance meth… ▽ More

    Submitted 29 September, 2025; originally announced September 2025.

  50. arXiv:2509.24276  [pdf, ps, other

    cs.AI

    G-reasoner: Foundation Models for Unified Reasoning over Graph-structured Knowledge

    Authors: Linhao Luo, Zicheng Zhao, Junnan Liu, Zhangchi Qiu, Junnan Dong, Serge Panev, Chen Gong, Thuy-Trang Vu, Gholamreza Haffari, Dinh Phung, Alan Wee-Chung Liew, Shirui Pan

    Abstract: Large language models (LLMs) excel at complex reasoning but remain limited by static and incomplete parametric knowledge. Retrieval-augmented generation (RAG) mitigates this by incorporating external knowledge, yet existing RAGs struggle with knowledge-intensive tasks due to fragmented information and weak modeling of knowledge structure. Graphs offer a natural way to model relationships within kn… ▽ More

    Submitted 29 September, 2025; originally announced September 2025.

    Comments: 22 pages, 6 figures