Rapid growth of seed black holes during early bulge formation

Kavli Affiliate: Kohei Inayoshi | First 5 Authors: Kohei Inayoshi, Riouhei Nakatani, Daisuke Toyouchi, Takashi Hosokawa, Rolf Kuiper | Summary: We study the early growth of massive seed black holes (BHs) via accretion in protogalactic nuclei where the stellar bulge component is assembled, performing axisymmetric two-dimensional radiation hydrodynamical simulations. We find that when a seed […]


Continue.. Rapid growth of seed black holes during early bulge formation

Kilonova and Optical Afterglow from Binary Neutron Star Mergers. II. Optimal Search Strategy for Serendipitous Observations and Target-of-opportunity Observations of Gravitational-wave Triggers

Kavli Affiliate: Lijing Shao | First 5 Authors: Jin-Ping Zhu, Shichao Wu, Yuan-Pei Yang, Chang Liu, Bing Zhang | Summary: In the second work of this series, we explore the optimal search strategy for serendipitous and gravitational-wave-triggered target-of-opportunity (ToO) observations of kilonovae and optical short-duration gamma-ray burst (sGRB) afterglows from binary neutron star (BNS) mergers, […]


Continue.. Kilonova and Optical Afterglow from Binary Neutron Star Mergers. II. Optimal Search Strategy for Serendipitous Observations and Target-of-opportunity Observations of Gravitational-wave Triggers

Full tunability enabled by Floquet engineering in a multilevel quantum dot system

Kavli Affiliate: Ke Wang | First 5 Authors: Yuan Zhou, Sisi Gu, Ke Wang, Gang Cao, Xuedong Hu | Summary: Tunability of an artificial quantum system is crucial to its capability to process quantum information. However, tunability usually poses significant demand on the design and fabrication of a device. In this work, we demonstrate that […]


Continue.. Full tunability enabled by Floquet engineering in a multilevel quantum dot system

Universal finite-size amplitude and anomalous entanglement entropy of $z=2$ quantum Lifshitz criticalities in topological chains

Kavli Affiliate: Ke Wang | First 5 Authors: Ke Wang, T. A. Sedrakyan, , , | Summary: We consider Lifshitz criticalities with dynamical exponent $z=2$ that emerge in a class of topological chains. There, such a criticality plays a fundamental role in describing transitions between symmetry-enriched conformal field theories (CFTs). We report that, at such […]


Continue.. Universal finite-size amplitude and anomalous entanglement entropy of $z=2$ quantum Lifshitz criticalities in topological chains

Probing gluon helicity with heavy flavor at the EIC

Kavli Affiliate: Feng Yuan | First 5 Authors: Daniele Paolo Anderle, Xin Dong, Felix Hekhorn, Matthew Kelsey, Sooraj Radhakrishnan | Summary: We propose a new measurement of the heavy flavor hadron double spin asymmetry in deep-inelastic scattering at a future Electron-Ion Collider (EIC) to constrain the polarized gluon distribution function inside the proton. Statistical projection […]


Continue.. Probing gluon helicity with heavy flavor at the EIC

Ballistic magnetotransport in graphene

Kavli Affiliate: Ke Wang | First 5 Authors: Ke Wang, T. A. Sedrakyan, , , | Summary: We report that a perpendicular magnetic field introduces an anomalous interaction correction, $delta sigma$, to the static conductivity of doped graphene in the ballistic regime. The correction implies that the magnetoresistance, $delta rho_{xx}$ scales inversely with temperature $delta […]


Continue.. Ballistic magnetotransport in graphene

Relative Entropy Gradient Sampler for Unnormalized Distributions

Kavli Affiliate: Feng Yuan | First 5 Authors: Xingdong Feng, Yuan Gao, Jian Huang, Yuling Jiao, Xu Liu | Summary: We propose a relative entropy gradient sampler (REGS) for sampling from unnormalized distributions. REGS is a particle method that seeks a sequence of simple nonlinear transforms iteratively pushing the initial samples from a reference distribution […]


Continue.. Relative Entropy Gradient Sampler for Unnormalized Distributions

OAuthShield: Efficient Security Checking for OAuth Service Provider Implementations

Kavli Affiliate: Feng Yuan | First 5 Authors: Tamjid Al Rahat, Yu Feng, Yuan Tian, , | Summary: OAuth protocols have been widely adopted to simplify user authentication and service authorization for third-party applications. However, little effort has been devoted to automatically checking the security of libraries that are widely used by service providers. In […]


Continue.. OAuthShield: Efficient Security Checking for OAuth Service Provider Implementations

Cerberus: Query-driven Scalable Security Checking for OAuth Service Provider Implementations

Kavli Affiliate: Feng Yuan | First 5 Authors: Tamjid Al Rahat, Yu Feng, Yuan Tian, , | Summary: OAuth protocols have been widely adopted to simplify user authentication and service authorization for third-party applications. However, little effort has been devoted to automatically checking the security of the libraries that service providers widely use. In this […]


Continue.. Cerberus: Query-driven Scalable Security Checking for OAuth Service Provider Implementations

Cerberus: Query-driven Scalable Vulnerability Detection in OAuth Service Provider Implementations

Kavli Affiliate: Feng Yuan | First 5 Authors: Tamjid Al Rahat, Yu Feng, Yuan Tian, , | Summary: OAuth protocols have been widely adopted to simplify user authentication and service authorization for third-party applications. However, little effort has been devoted to automatically checking the security of the libraries that service providers widely use. In this […]


Continue.. Cerberus: Query-driven Scalable Vulnerability Detection in OAuth Service Provider Implementations