216 research outputs found

    Learning to Prove Theorems via Interacting with Proof Assistants

    Full text link
    Humans prove theorems by relying on substantial high-level reasoning and problem-specific insights. Proof assistants offer a formalism that resembles human mathematical reasoning, representing theorems in higher-order logic and proofs as high-level tactics. However, human experts have to construct proofs manually by entering tactics into the proof assistant. In this paper, we study the problem of using machine learning to automate the interaction with proof assistants. We construct CoqGym, a large-scale dataset and learning environment containing 71K human-written proofs from 123 projects developed with the Coq proof assistant. We develop ASTactic, a deep learning-based model that generates tactics as programs in the form of abstract syntax trees (ASTs). Experiments show that ASTactic trained on CoqGym can generate effective tactics and can be used to prove new theorems not previously provable by automated methods. Code is available at https://github.com/princeton-vl/CoqGym.Comment: Accepted to ICML 201

    The New Development of “Substantial Rule of Law” in China: Substantive Settlement of Administrative Disputes

    Get PDF
    The current reform of China’s judicial system is carried out under the background of the rule of law construction from the “formal rule of law” to the “substantial rule of law.” Therefore, the substantive settlement of administrative disputes has become one of the criteria for the value judgment of China’s judicial system reform. The substantive settlement of administrative disputes depends on the following two ways: administrative reconsideration, letters and visits, administrative appeals and other non-litigation mechanisms; administrative litigation. Of course, Chinese scholars are also increasingly aware that the substantive resolution of administrative disputes cannot be accomplished in a single way. At present, while improving the above various systems themselves, China has begun to pay more attention to the construction of the connection mechanism among the above systems

    Rel3D: A Minimally Contrastive Benchmark for Grounding Spatial Relations in 3D

    Full text link
    Understanding spatial relations (e.g., "laptop on table") in visual input is important for both humans and robots. Existing datasets are insufficient as they lack large-scale, high-quality 3D ground truth information, which is critical for learning spatial relations. In this paper, we fill this gap by constructing Rel3D: the first large-scale, human-annotated dataset for grounding spatial relations in 3D. Rel3D enables quantifying the effectiveness of 3D information in predicting spatial relations on large-scale human data. Moreover, we propose minimally contrastive data collection -- a novel crowdsourcing method for reducing dataset bias. The 3D scenes in our dataset come in minimally contrastive pairs: two scenes in a pair are almost identical, but a spatial relation holds in one and fails in the other. We empirically validate that minimally contrastive examples can diagnose issues with current relation detection models as well as lead to sample-efficient training. Code and data are available at https://github.com/princeton-vl/Rel3D.Comment: Accepted to NeurIPS 202

    SpatialSense: An Adversarially Crowdsourced Benchmark for Spatial Relation Recognition

    Full text link
    Understanding the spatial relations between objects in images is a surprisingly challenging task. A chair may be "behind" a person even if it appears to the left of the person in the image (depending on which way the person is facing). Two students that appear close to each other in the image may not in fact be "next to" each other if there is a third student between them. We introduce SpatialSense, a dataset specializing in spatial relation recognition which captures a broad spectrum of such challenges, allowing for proper benchmarking of computer vision techniques. SpatialSense is constructed through adversarial crowdsourcing, in which human annotators are tasked with finding spatial relations that are difficult to predict using simple cues such as 2D spatial configuration or language priors. Adversarial crowdsourcing significantly reduces dataset bias and samples more interesting relations in the long tail compared to existing datasets. On SpatialSense, state-of-the-art recognition models perform comparably to simple baselines, suggesting that they rely on straightforward cues instead of fully reasoning about this complex task. The SpatialSense benchmark provides a path forward to advancing the spatial reasoning capabilities of computer vision systems. The dataset and code are available at https://github.com/princeton-vl/SpatialSense.Comment: Accepted to ICCV 201

    A Study of Face Obfuscation in ImageNet

    Full text link
    Face obfuscation (blurring, mosaicing, etc.) has been shown to be effective for privacy protection; nevertheless, object recognition research typically assumes access to complete, unobfuscated images. In this paper, we explore the effects of face obfuscation on the popular ImageNet challenge visual recognition benchmark. Most categories in the ImageNet challenge are not people categories; however, many incidental people appear in the images, and their privacy is a concern. We first annotate faces in the dataset. Then we demonstrate that face obfuscation has minimal impact on the accuracy of recognition models. Concretely, we benchmark multiple deep neural networks on obfuscated images and observe that the overall recognition accuracy drops only slightly (<= 1.0%). Further, we experiment with transfer learning to 4 downstream tasks (object recognition, scene recognition, face attribute classification, and object detection) and show that features learned on obfuscated images are equally transferable. Our work demonstrates the feasibility of privacy-aware visual recognition, improves the highly-used ImageNet challenge benchmark, and suggests an important path for future visual datasets. Data and code are available at https://github.com/princetonvisualai/imagenet-face-obfuscation.Comment: Accepted to ICML 202

    On the Temporal-spatial Analysis of Estimating Urban Traffic Patterns Via GPS Trace Data of Car-hailing Vehicles

    Full text link
    Car-hailing services have become a prominent data source for urban traffic studies. Extracting useful information from car-hailing trace data is essential for effective traffic management, while discrepancies between car-hailing vehicles and urban traffic should be considered. This paper proposes a generic framework for estimating and analyzing urban traffic patterns using car-hailing trace data. The framework consists of three layers: the data layer, the interactive software layer, and the processing method layer. By pre-processing car-hailing GPS trace data with operations such as data cutting, map matching, and trace correction, the framework generates tensor matrices that estimate traffic patterns for car-hailing vehicle flow and average road speed. An analysis block based on these matrices examines the relationships and differences between car-hailing vehicles and urban traffic patterns, which have been overlooked in previous research. Experimental results demonstrate the effectiveness of the proposed framework in examining temporal-spatial patterns of car-hailing vehicles and urban traffic. For temporal analysis, urban road traffic displays a bimodal characteristic while car-hailing flow exhibits a 'multi-peak' pattern, fluctuating significantly during holidays and thus generating a hierarchical structure. For spatial analysis, the heat maps generated from the matrices exhibit certain discrepancies, but the spatial distribution of hotspots and vehicle aggregation areas remains similar

    Effect of Alkali-free Accelerator Containing Nano-silica on the Durability of Shotcrete

    Get PDF
    The effect of nano-silica-containing alkali-free accelerator and ordinary alkali-free accelerator on the durability of C30 shotcrete was investigated by means of seepage resistance tests and frost resistance tests. The results show that under the same conditions, the C30 shotcrete with nanosilica-containing alkali-free accelerator has a lower electrical flux and a greater impermeability rating than P10. The C30 shotcrete with nano-silica-containing alkali-free accelerator maintains a mass loss rate of about 0.4% after 200 freeze-thaw cycles, a 10.5% decrease in relative dynamic modulus of elasticity, a compressive strength loss rate of less than 20%, the bubble spacing coefficient and the average bubble diameter increased by 20.9% and 60.5% respectively, showing good frost resistance performance. This indicates that alkali-free accelerator containing nano-silica can improve the durability of shotcrete. In addition, a comparison was also made between ordinary accelerator shotcrete with nano-silica, and when 5% nano-silica was added, the properties of shotcrete were comparable to those of 2% nano-silica alkali-free accelerator shotcrete

    Similar operation template attack on RSA-CRT as a case study

    Get PDF
    A template attack, the most powerful side-channel attack methods, usually first builds the leakage profiles from a controlled profiling device, and then uses these profiles to recover the secret of the target device. It is based on the fact that the profiling device shares similar leakage characteristics with the target device. In this study, we focus on the similar operations in a single device and propose a new variant of the template attack, called the similar operation template attack (SOTA). SOTA builds the models on public variables (e.g., input/output) and recovers the values of the secret variables that leak similar to the public variables. SOTA’s advantage is that it can avoid the requirement of an additional profiling device. In this study, the proposed SOTA method is applied to a straightforward RSA-CRT implementation. Because the leakage is (almost) the same in similar operations, we reduce the security of RSA-CRT to a hidden multiplier problem (HMP) over GF(q), which can be solved byte-wise using our proposed heuristic algorithm. The effectiveness of our proposed method is verified as an entire prime recovery procedure in a practical leakage scenario

    Quantum information processing using Josephson junctions coupled through cavities

    Get PDF
    Josephson junctions have been shown to be a promising solid-state system for implementation of quantum computation. The significant two-qubit gates are generally realized by the capacitive coupling between the nearest neighbour qubits. We propose an effective Hamiltonian to describe charge qubits coupled through the cavity. We find that nontrivial two-qubit gates may be achieved by this coupling. The ability to interconvert localized charge qubits and flying qubits in the proposed scheme implies that quantum network can be constructed using this large scalable solid-state system.Comment: 5 pages, to appear in Phys Rev A; typos corrected, solutions in last eqs. correcte
    corecore