Connecting quantum computers to a quantum network opens a wide array of new applications, such as securely performing computations on distributed data sets. Near-term quantum networks are noisy, however, and hence cor...
详细信息
ISBN:
(纸本)9783031637773;9783031637780
Connecting quantum computers to a quantum network opens a wide array of new applications, such as securely performing computations on distributed data sets. Near-term quantum networks are noisy, however, and hence correctness and security of protocols are not guaranteed. To study the impact of noise, we consider a multiparty summation protocol with imperfect shared entangled states. We study analytically the impact of both depolarising and dephasing noise on this protocol and the noise patterns arising in the probability distributions. We conclude by eliminating the need for a trusted third party in the protocol using Shamir's secret sharing.
The rapid expansion of the Internet of Things (IoT) industry highlights the significance of workload characterization when evaluating microprocessors tailored for IoT applications. The streamlined yet comprehensive sy...
ISBN:
(数字)9789819703166
ISBN:
(纸本)9789819703159;9789819703166
The rapid expansion of the Internet of Things (IoT) industry highlights the significance of workload characterization when evaluating microprocessors tailored for IoT applications. The streamlined yet comprehensive system stack of an IoT system is highly suitable for synergistic software and hardware co-design. This stack comprises various layers, including programming languages, frameworks, runtime environments, instruction set architectures (ISA), operating systems (OS), and microarchitecture. These layers can be bucketed into three primary categories: the intermediate representation (IR) layer, the ISA layer, and the microarchitecture layer. Consequently, conducting cross-layer workload characterization constitutes the initial stride in IoT design, especially in co-design. In this paper, we use a cross-layer profiling methodology to conduct an exhaustive analysis of IoTBench-an IoT workload benchmark. Each layer's key metrics, including instruction, data, and branch locality, were meticulously examined. Experimental evaluations were performed on both ARM and X86 architectures. Our findings revealed general patterns in how IoTBench's metrics fluctuate with different input data. Additionally, we noted that the same metrics could demonstrate varied characteristics across different layers, suggesting that isolated layer analysis might yield incomplete conclusions. Besides, our cross-layer profiling disclosed that the convolution task, characterized by deeply nested loops, significantly amplified branch locality at the microarchitecture layer on the ARM platform. Interestingly, optimization with the GNU C++ compiler (G++), intended to boost performance, had a counterproductive effect, exacerbating the branch locality issue and resulting in performance degradation.
GIFT is a family of lightweight block ciphers based on SPN structure and composed of two versions named GIFT-64 and GIFT-128. In this paper, we reevaluate the security of GIFT-64 against the rectangle attack under the...
ISBN:
(纸本)9783031533679;9783031533686
GIFT is a family of lightweight block ciphers based on SPN structure and composed of two versions named GIFT-64 and GIFT-128. In this paper, we reevaluate the security of GIFT-64 against the rectangle attack under the related-key setting. Investigating the previous rectangle key recovery attack on GIFT-64, we obtain the core idea of improving the attack-trading off the time complexity of each attack phase. We flexibly guess part of the involved subkey bits to balance the time cost of each phase so that the overall time complexity of the attack is reduced. Moreover, the reused subkey bits are identified according to the linear key schedule of GIFT-64 and bring additional advantages for our attacks. Furthermore, we incorporate the above ideas and propose a dedicated MILP model for finding the best rectangle key recovery attack on GIFT-64. As a result, we get the improved rectangle attacks on 26-round GIFT-64, which are the best attacks on it in terms of time complexity so far.
Atrial Fibrillation (AF) is the most common type of cardiac arrhythmia. Most AF-related thrombi originate within the left atrial appendage (LAA). This study investigated the key factors influencing thrombus formation ...
ISBN:
(纸本)9783031524479;9783031524486
Atrial Fibrillation (AF) is the most common type of cardiac arrhythmia. Most AF-related thrombi originate within the left atrial appendage (LAA). This study investigated the key factors influencing thrombus formation in the LAA using global sensitivity analysis (GSA) based on computational fluid dynamics (CFD) simulations. GSA was conducted to assess the effects of four physiological input parameters: initial thrombin location within the LAA, fibrinogen (Fg) concentration in the blood, sensitivity to activated protein C (K3 constant), and inlet velocity. A total of 160 CFD simulations were performed using a 2D idealized left atrial geometry with the most common LAA morphologies: Cactus (CA), Chickenwing (CW), Windsock (WS), and Broccoli (BR). The area under the curve (AUC) of fibrin, which is a precursor of thrombus formation, was computed in the LAA to quantify net fibrin formation over time. Gaussian Process Emulators (GPE) were trained using the simulations' results to predict the Sobol indices from the input parameters. Fg concentration, initial thrombin location, and their interaction exhibited the largest Sobol indices in all LAA morphologies, impacting both average and maximum AUC. Inlet velocity affected the average AUC in BR, and its interaction with the initial thrombus location was significant for this morphology. Additionally, K3 contributed to the output variance in CW and BR. These findings emphasize the overall significance of Fg concentration and initial thrombin location, along with their interaction, in thrombus formation. The impacts of inlet velocity and K3 concentration appear to be morphology-specific. The distinct values obtained from maximum and average fibrin AUC provide complementary insights into thrombus formation.
Blockage detection is a critical functionality for the air interface in modern 5G and future 6G systems operating in millimeter wave (mmWave, 30-300 GHz) and terahertz (0.3-3 THz) frequency bands. In operational syste...
ISBN:
(纸本)9783031609930;9783031609947
Blockage detection is a critical functionality for the air interface in modern 5G and future 6G systems operating in millimeter wave (mmWave, 30-300 GHz) and terahertz (0.3-3 THz) frequency bands. In operational systems, blockage has to be detected prior to its occurrence to allow for time to take some actions to avoid the loss of connectivity, e.g., switching over to the back-up link. However, up to date, most of the proposed approaches are reactive detecting blockage only when it already started. In this paper, by utilizing the special signal oscillations occurring just prior to the blockage, we propose a new method for proactive blockage detection. The proposed approach is based on a periodogram of the received signal that can be estimated efficiently using modern signal processing techniques. We then proceed comparing the proposed approach to reactive and proactive methods reported to date using the blockage detection probability as the metric of interest. Our results illustrate that the proposed approach allows to detect blockage with probability one, at least few tens of milliseconds prior to the actual blockage time instant.
We introduce four recursion schemes, which, operating on a tree-like data structure, capture different models of computation based on alternating bounded quantifiers. By encoding inputs as paths, we recover and expand...
ISBN:
(纸本)9783031643088;9783031643095
We introduce four recursion schemes, which, operating on a tree-like data structure, capture different models of computation based on alternating bounded quantifiers. By encoding inputs as paths, we recover and expand characterizations of complexity classes between deterministic linear time and polynomial space;by encoding them as balanced trees, we recover characterizations of alternating logarithmic time and polylogarithmic space. We propose recursion-theoretic characterizations of logarithmic and polylogarithmic time, as defined via Turing machines with random access to the input, and show that the classes of functions obtained capture, at least, the desired classes, and, at most, their alternating versions. Should the proposed characterizations be precise, we show that characterizations of linear and polynomially bounded alternating classes can be adapted to alternating classes with logarithmic and polylogarithmic resource bounds, simply by changing the way in which inputs are encoded. We discuss how, from these characterizations, some open problems in complexity theory can be obtained from known results by making alterations to recursion schemes.
Persuasive systems design encompasses a wide range of concepts that may help users be motivated to achieve the targeted goal or behavior change. This study evaluates contemporary applications that seek to promote phys...
ISBN:
(数字)9783031582264
ISBN:
(纸本)9783031582257;9783031582264
Persuasive systems design encompasses a wide range of concepts that may help users be motivated to achieve the targeted goal or behavior change. This study evaluates contemporary applications that seek to promote physical activity and finds that, although there are different implementations of competition-related features, they are not designed for individuals motivated by self-competition, a type of competition that allows individuals to compete against themselves to beat their own personal best performance. Furthermore, it explores how the psychological construct of competitive orientation can be used as a basis for personalizing persuasive systems. The paper then conceptualizes the design features of a system that addresses and caters to the self-competitive orientation of a user.
Federated learning is an emerging paradigm for distributed machine learning that enables clients to collaboratively train models while maintaining data privacy. However, this approach introduces vulnerabilities, notab...
ISBN:
(纸本)9783031709029;9783031709036
Federated learning is an emerging paradigm for distributed machine learning that enables clients to collaboratively train models while maintaining data privacy. However, this approach introduces vulnerabilities, notably the risk of backdoor attacks where compromised models may perform normally on clean data but maliciously on poisoned inputs. A range of defences has been proposed in the literature based on robust aggregation, differential privacy or certified robustness and clustering/trust score-based approaches. In this work, we introduce FedAvgCKA, a novel defence mechanism that leverages the learned representations of neural networks to distinguish between benign and malicious submissions from clients. We demonstrate the effectiveness of FedAvgCKA across various federated learning scenarios and datasets, showcasing its ability to maintain high main task accuracy and significantly reduce backdoor attack success rates even in non-iid settings.
Entertainment-oriented singing voice synthesis (SVS) requires a vocoder to generate high-fidelity (e.g. 48 kHz) audio. However, most text-to-speech (TTS) vocoders cannot reconstruct the waveform well in this scenario....
ISBN:
(纸本)9789819743988;9789819743995
Entertainment-oriented singing voice synthesis (SVS) requires a vocoder to generate high-fidelity (e.g. 48 kHz) audio. However, most text-to-speech (TTS) vocoders cannot reconstruct the waveform well in this scenario. In this paper, we propose HiFi-WaveGAN to synthesize the 48 kHz high-quality singing voices in real-time. Specifically, it consists of an Extended WaveNet that served as a generator, a multi-period discriminator proposed in HiFiGAN, and a multi-resolution spectrogram discriminator borrowed from UnivNet. To better reconstruct the high-frequency part from the full-band mel-spectrogram, we incorporate a pulse extractor to generate the constraint for the synthesized waveform. Additionally, an auxiliary spectrogram-phase loss is utilized to approximate the real distribution further. The experimental results (Demo page: https://***/hifi-wavegan/) show that our proposed HiFi-WaveGAN obtains 4.23 in the mean opinion score (MOS) metric for the 48 kHz SVS task, significantly outperforming other neural vocoders.
Tabulation is a well-known technique for improving the efficiency of recursive functions with redundant function calls. A key point in the application of this technique is to identify a suitable representation for the...
ISBN:
(纸本)9789819722990;9789819723003
Tabulation is a well-known technique for improving the efficiency of recursive functions with redundant function calls. A key point in the application of this technique is to identify a suitable representation for the table. In this paper, we propose the use of zippers as tables in the tabulation process. Our approach relies on a generic function zipWithZipper, that makes strong use of lazy evaluation to traverse two zippers in a circular manner. The technique turns out to be particularly efficient when the arguments to recursive calls are closely situated within the function domain. For example, in the case of natural numbers this means function calls on fairly contiguous values. Likewise, when dealing with tree structures, it means functions calls on immediate sub-trees and parent nodes. This results in a concise and efficient zipper-based embedding of attribute grammars.
暂无评论