Workflow
最优传输理论
icon
Search documents
Nature子刊:原致远/赵屹/冯建峰合作提出3D数字器官重构新算法
生物世界· 2026-01-01 09:00
编辑丨王多鱼 排版丨水成文 细胞的功能不仅取决于其自身的基因表达,更取决于其在三维 (3D) 空间中的位置以及与周围微环境的 3D 互作,理解组织结构的 3D 复杂性是解析生物功能的关键。然而,当前主流的空间转录组学 (Spatial Transcriptomics,ST) 技术大多局限于二维 (2D) 平面,这种观测维度的局限导致我们难以还原器官 内部基因表达的连续梯度、细胞细胞微环境的立体分布以及精细的细胞互作网络。 尽管研究者们试图在Z轴上堆叠多张 2D 切片以近似三维结构,但受限于高昂的实验成本与有限的实验通 量,不得不对 Z 轴方向的采样密度做出妥协。这种折衷方案导致切片之间往往存在不可忽视的物理间距 (例如100微米 ,相当于缺失了约 5-10 层细胞的信息 ) ,使得最终获取的数据在Z轴上呈现为高度稀疏 的采样状态。这种采样方式将原本连续的生物组织割裂为离散的稀疏的断层面,使得现有的三维图谱往往 缺乏连续性与完整性。 2025 年 12 月 31 日,复旦大学 冯建峰 / 原致远 团队联合中国科学院计算技术研究所 赵屹 团队,在 Nature Methods 期刊发表了题为: Bridging ...
近500页史上最全扩散模型修炼宝典,宋飏等人一书覆盖三大主流视角
机器之心· 2025-10-29 07:23
Core Viewpoint - The article discusses the comprehensive guide on diffusion models, highlighting their transformative impact on generative AI across various domains such as images, audio, video, and 3D environments [2][4]. Summary by Sections Introduction to Diffusion Models - Diffusion models are presented as a method that views the generation process as a gradual transformation over time, contrasting with traditional generative models that directly learn mappings from noise to data [11]. - The article emphasizes the need for a systematic understanding of diffusion models, which the book aims to provide, making it a valuable resource for both researchers and beginners [6][9]. Core Principles of Diffusion Models - The book outlines the foundational principles of diffusion models, connecting three key perspectives: variational methods, score-based methods, and flow-based methods, which together form a unified theoretical framework [11][13]. - It discusses how these models achieve efficient sample generation and enhanced controllability during the generation process [12]. Detailed Exploration of Perspectives - The variational view relates to denoising diffusion probabilistic models (DDPMs), providing a basis for probabilistic inference and optimization [23]. - The score-based view focuses on learning score functions to guide the denoising process, linking diffusion modeling with classical differential equation theory [23][24]. - The flow-based view describes the generation process as a continuous flow transformation, allowing for broader applications beyond simple generation tasks [24]. Sampling Techniques and Efficiency - The article highlights the unique feature of diffusion models, which refine samples from coarse to fine through noise removal, and discusses the trade-off between performance and efficiency [27][28]. - It introduces methods for improving sampling performance without retraining models, such as classifier guidance and advanced numerical solvers to enhance generation quality and speed [29][30]. Learning Fast Generative Models - The book explores strategies for directly learning fast generative models that approximate the diffusion process, aiming to reduce reliance on multi-step inference [30][31]. - Distillation-based methods are discussed, where a student model mimics a slower teacher model to achieve faster sampling while maintaining quality [30]. Comprehensive Coverage of Diffusion Models - The book aims to establish a lasting theoretical framework for diffusion models, focusing on continuous time dynamical systems that connect simple prior distributions to data distributions [33]. - It emphasizes the importance of understanding the underlying principles and connections between different methods to design and improve next-generation generative models [36].
DeepSeek“防弹衣”来了,模型内生安全加固方案,拒绝杀敌一千自损八百|上海AI Lab
量子位· 2025-03-13 03:28
Core Viewpoint - The article discusses the hidden dangers of the DeepSeek-R1 model, which, despite its strong reasoning capabilities, may leak harmful content during its thought process even when it refuses to answer questions. Existing defense technologies face a dilemma: they either fail to prevent attacks or overly restrict the model's responses, leading to a situation where normal questions are also rejected [1][2]. Summary by Sections Section 1: Introduction of X-Boundary - Shanghai Jiao Tong University and Shanghai AI Lab have jointly developed a security defense solution called X-Boundary, aiming to resolve the dilemma of existing defense technologies by separating harmful representations and eliminating them without compromising the model's general performance [2][3]. Section 2: Performance Analysis - X-Boundary has shown significant improvements in the DeepSeek-R1-Distill-Llama-8B model, effectively blocking information leakage by removing harmful features, akin to implanting a "cognitive purification chip" [3][4]. Section 3: Defense Methods and Challenges - The article highlights a critical imbalance between safety and intelligence in mainstream defense methods (SFT/DPO/GA/CB). While these methods reduce the attack success rate (ASR), they also significantly impair the model's reasoning capabilities, with a reported 10% drop in mathematical ability and over 50% of safety questions being unjustly rejected [5][6]. Section 4: Multi-Round Defense Training - Introducing multi-round defense data into models like Qwen2.5-7B-Chat has led to a 30% increase in misclassification rates, indicating a strong correlation between increased defense strength and usability loss. The existing methods struggle to clearly distinguish between harmful and benign queries, leading to excessive safety measures [6][7]. Section 5: X-Boundary Framework - The X-Boundary defense framework aims to create an "internal safety system" for large models, allowing for precise interception of dangerous content while ensuring safe information can pass through without detection [7][8]. Section 6: Dynamic Protection Network - The framework consists of three steps: 1. Boundary Drawing: Optimizing representation separation to prevent confusion between harmful and safe requests [8]. 2. Threat Dissolution: Applying irreversible perturbations to harmful representations [8]. 3. Intelligent Preservation: Maintaining the integrity of safe representations during training [8]. Section 7: Theoretical and Practical Validation - X-Boundary is supported by optimal transport theory, which enhances the clustering of safe representations, leading to faster convergence during model training. Experiments show a 27% and 18% improvement in convergence speed for Llama-3-8B and Qwen2.5-7B models, respectively [9][10]. Section 8: Balancing Safety and Intelligence - X-Boundary successfully establishes a clear boundary between harmful and safe representations within the model, addressing the chaos of traditional methods that fail to differentiate between the two [10][11]. Section 9: Robust Multi-Round Defense - With a clear distinction in representations, X-Boundary achieves a balance between safety and usability, maintaining over 99% of the model's original performance while minimizing misclassification rates [13][14]. Section 10: Scalability - When applied to larger models, such as the 14 billion parameter Qwen2.5-14B-Chat, X-Boundary continues to provide effective zero-perception defense, demonstrating its robustness across different model scales [15].