Fused Multinomial Logistic Regression Utilizing Summary-Level External Machine-learning Information
arXiv:2604.03939v1 Announce Type: cross Abstract: In many modern applications, a carefully designed primary study provides individual-level data for interpretable modeling, while summary-level external information is available through black-box, efficient, and nonparametric machine-learning predictions. Although summary-level external information has been studied in the data integration literature, there is limited methodology for leveraging external nonparametric machine-learning predictions to improve statistical inference in the primary study. We propose a general empirical-likelihood framework that incorporates external predictions through moment constraints. An advantage of nonparametric machine-learning prediction is that it induces a rich class of valid moment restrictions that rema
View PDF HTML (experimental)
Abstract:In many modern applications, a carefully designed primary study provides individual-level data for interpretable modeling, while summary-level external information is available through black-box, efficient, and nonparametric machine-learning predictions. Although summary-level external information has been studied in the data integration literature, there is limited methodology for leveraging external nonparametric machine-learning predictions to improve statistical inference in the primary study. We propose a general empirical-likelihood framework that incorporates external predictions through moment constraints. An advantage of nonparametric machine-learning prediction is that it induces a rich class of valid moment restrictions that remain robust to covariate shift under a mild overlap condition without requiring explicit density-ratio modeling. We focus on multinomial logistic regression as the primary model and address common data-quality issues in external sources, including coarsened outcomes, partially observed covariates, covariate shift, and heterogeneity in generating mechanisms known as concept shift. We establish large-sample properties of the resulting fused estimator, including consistency and asymptotic normality under regularity conditions. Moreover, we provide mild sufficient conditions under which incorporating external predictions delivers a strict efficiency gain relative to the primary-only estimator. Simulation studies and an application to the National Health and Nutrition Examination Survey on multiclass blood-pressure classification.
Comments: 24 pages, 2 figures
Subjects:
Methodology (stat.ME); Machine Learning (cs.LG); Machine Learning (stat.ML)
MSC classes: 62F12, 62H30, 62D20, 68T05
Cite as: arXiv:2604.03939 [stat.ME]
(or arXiv:2604.03939v1 [stat.ME] for this version)
https://doi.org/10.48550/arXiv.2604.03939
arXiv-issued DOI via DataCite (pending registration)
Submission history
From: Chi-Shian Dai [view email] [v1] Sun, 5 Apr 2026 02:37:23 UTC (76 KB)
Sign in to highlight and annotate this article

Conversation starters
Daily AI Digest
Get the top 5 AI stories delivered to your inbox every morning.
More about
modelannounceavailable
Gemma 4 is a huge improvement in many European languages, including Danish, Dutch, French and Italian
The benchmarks look really impressive for such small models. Even in general, they stand up well. Gemma 4 31B is (of all tested models): - 3rd on Dutch - 2nd on Danish - 3rd on English - 1st on Finish - 2nd on French - 5th on German - 2nd on Italian - 3rd on Swedish Curious if real-world experience matches that. Source: https://euroeval.com/leaderboards/ submitted by /u/Balance- [link] [comments]

Systematic Approach to Hyperbolic Quantum Error Correction Codes
arXiv:2504.07800v2 Announce Type: replace-cross Abstract: Quantum error correction codes defined on hyperbolic lattices leverage the unique geometric properties of the hyperbolic space to enhance the performance of quantum error correction. By embedding qubits in hyperbolic lattices, these codes achieve higher encoding rates and lower qubit overhead compared to those defined on conventional Euclidean lattices. Building on recent advances in hyperbolic crystallography, we introduce a unified framework for the systematic construction and scalable benchmarking of CSS quantum error correction codes on hyperbolic lattices. A central component of this framework is the Hyperbolic Cycle Basis algorithm, which employs graph-theoretic methods to efficiently identify all plaquette cycles (parity-chec

Block Encoding of Sparse Matrices via Coherent Permutation
arXiv:2508.21667v3 Announce Type: replace-cross Abstract: Block encoding of sparse matrices underpins powerful quantum algorithms such as quantum singular value transformation, Hamiltonian simulation, and quantum linear solvers, yet its efficient gate-level realization for general sparse matrices remains a major challenge. We introduce a unified framework that addresses key obstacles including the overhead of multi-controlled X (MCX) gates, amplitude reordering, and hardware connectivity, enabling simplified block encoding constructions with explicit gate-level implementations. Central to our approach is a connection to combinatorial optimization, which enables systematic assignment of control qubits to satisfy nearest-neighbor connectivity constraints, along with coherent permutation oper
Knowledge Map
Connected Articles — Knowledge Graph
This article is connected to other articles through shared AI topics and tags.
More in Products

Importance Sparsification for Sinkhorn Algorithm
arXiv:2306.06581v2 Announce Type: replace-cross Abstract: Sinkhorn algorithm has been used pervasively to approximate the solution to optimal transport (OT) and unbalanced optimal transport (UOT) problems. However, its practical application is limited due to the high computational complexity. To alleviate the computational burden, we propose a novel importance sparsification method, called Spar-Sink, to efficiently approximate entropy-regularized OT and UOT solutions. Specifically, our method employs natural upper bounds for unknown optimal transport plans to establish effective sampling probabilities, and constructs a sparse kernel matrix to accelerate Sinkhorn iterations, reducing the computational cost of each iteration from $O(n^2)$ to $\widetilde{O}(n)$ for a sample of size $n$. Theor

Beer Path Problems in Temporal Graphs
arXiv:2507.08685v3 Announce Type: replace Abstract: Computing paths in graph structures is a fundamental operation in a wide range of applications, from transportation networks to data analysis. The beer path problem, which captures the option of visiting points of interest, such as gas stations or convenience stops, prior to reaching the final destination, has been recently introduced and extensively studied in static graphs. However, existing approaches do not account for temporal information, which is often crucial in real-world scenarios. For instance, transit services may follow fixed schedules, and shops may only be accessible during certain hours. In this work, we introduce the notion of beer paths in temporal graphs, where edges are time-dependent and certain vertices (beer vertice

Partial Number Theoretic Transform Masking in Post Quantum Cryptography Hardware: A Security Margin Analysis
arXiv:2604.03813v1 Announce Type: new Abstract: Adams Bridge, a hardware accelerator for ML-DSA and ML-KEM designed for the Caliptra root of trust, masks 1 of its Inverse Number Theoretic Transform (INTT) layers and relies on shuffling for the remainder, claiming per-butterfly Correlation Power Analysis (CPA) complexities of 2^46 (ML-DSA) and 2^96 (ML-KEM). We evaluate these claims against published side-channel literature across seven analysis tracks with confidence-rated evidence. Register-Transfer Level (RTL) analysis confirms that the design's Random Start Index (RSI) shuffling provides 6 bits of entropy per layer (64 orderings) rather than the 296 bits of a full random permutation assumed in its scaling argument, with effective margins below the designers' estimates. A soft-analytical

A Faceted Classification of Authenticator-Centric Authentication Techniques
arXiv:2604.03627v1 Announce Type: new Abstract: Authentication is a fundamental security means for protecting system resources. Authenticator-centric authentication techniques (AuthN Techniques) address how mechanisms and credentials are used via Authenticators. There are many AuthN Techniques that differ in many ways and there exist classification approaches that aim to structure them. However, they are limited in the aspects they classify and are not flexible enough to accommodate the diverse nature of AuthN Techniques. This paper presents two contributions. First, novel, faceted classification schemes for AuthN Techniques and Authenticators are presented. The schemes were developed based on 345 papers identified through a targeted LLM-assisted literature review and semantic clustering.


Discussion
Sign in to join the discussion
No comments yet — be the first to share your thoughts!