Multi-view clustering is an important task in multimedia and machine learning. In multi-view clustering, multi-view spectral clustering is one kind of the most popular and effective methods. However, existing multi-vi...
详细信息
We analyze the experimental error budget of parametric resonance gates in a tunable coupler architecture. We identify and characterize various sources of errors, including incoherent, leakage, amplitude, and phase err...
详细信息
We analyze the experimental error budget of parametric resonance gates in a tunable coupler architecture. We identify and characterize various sources of errors, including incoherent, leakage, amplitude, and phase errors. By varying the two-qubit gate time, we explore the dynamics of these errors and their impact on the gate fidelity. To accurately capture the impact of incoherent errors on gate fidelity, we measure the coherence times of qubits under gate operating conditions. Our findings reveal that the incoherent errors, mainly arising from qubit relaxation and dephasing due to white noise, limit the fidelity of the two-qubit gates. Moreover, we demonstrate that leakage to noncomputational states is the second largest contributor to the two-qubit gates infidelity, as characterized using leakage-randomized benchmarking. The error budgeting methodology we develop here can be effectively applied to other types of gate implementations.
With the advancement and availability of the internet in the present age, everything is being wireless. Be it our home appliances or high defined monitoring systems, Wireless sensor networks play an important role. Bu...
详细信息
We provide an efficient algorithm to compile quantum circuits for fault-tolerant execution. We target surface codes, which form a two-dimensional grid of logical qubits with nearest-neighbor logical operations. Embedd...
详细信息
We provide an efficient algorithm to compile quantum circuits for fault-tolerant execution. We target surface codes, which form a two-dimensional grid of logical qubits with nearest-neighbor logical operations. Embedding an input circuit’s qubits in surface codes can result in long-range two-qubit operations across the grid. We show how to prepare many long-range Bell pairs on qubits connected by edge-disjoint paths of ancillae in constant depth that can be used to perform these long-range operations. This forms one core part of our edge-disjoint path compilation (EDPC) algorithm, by easily performing many parallel long-range Clifford operations in constant depth. It also allows us to establish a connection between surface code compilation and several well-studied edge-disjoint path problems. Similar techniques allow us to perform non-Clifford single-qubit rotations far from magic state distillation factories. In this case, we can easily find the maximum set of paths by a max-flow reduction, which forms the other major part of EDPC. EDPC has the best asymptotic worst-case performance guarantees on the circuit depth for compiling parallel operations when compared to related compilation methods based on swap gates and network coding. EDPC also shows a quadratic depth improvement over sequential Pauli-based compilation for parallel rotations requiring magic resources. We implement EDPC and find significantly improved performance for circuits built from parallel controlled-not (cnot) gates, and for circuits that implement the multicontrolled X gate CkNOT.
Recently, an algorithm has been constructed that shows that the binary icosahedral group 2I together with a T-like gate forms the most efficient single-qubit universal gate set. To carry out the algorithm fault tolera...
详细信息
Recently, an algorithm has been constructed that shows that the binary icosahedral group 2I together with a T-like gate forms the most efficient single-qubit universal gate set. To carry out the algorithm fault tolerantly requires a code that implements 2I transversally. However, no such code has ever been demonstrated in the literature. We fill this void by constructing a family of distance d=3 codes that all implement 2I transversally. A surprising feature of this family is that the codes can be deduced entirely from symmetry considerations that only 2I affords.
In recent years, the proliferation of deep learning (DL) techniques has given rise to a significant challenge in the form of deepfake videos, posing a grave threat to the authenticity of media content. With the rapid ...
详细信息
In recent years, the proliferation of deep learning (DL) techniques has given rise to a significant challenge in the form of deepfake videos, posing a grave threat to the authenticity of media content. With the rapid advancement of DL technology, the creation of convincingly realistic deepfake videos has become increasingly prevalent, raising serious concerns about the potential misuse of such content. Deepfakes have the potential to undermine trust in visual media, with implications for fields as diverse as journalism, entertainment, and security. This study presents an innovative solution by harnessing blockchain-based federated learning (FL) to address this issue, focusing on preserving data source anonymity. The approach combines the strengths of SegCaps and convolutional neural network (CNN) methods for improved image feature extraction, followed by capsule network (CN) training to enhance generalization. A novel data normalization technique is introduced to tackle data heterogeneity stemming from diverse global data sources. Moreover, transfer learning (TL) and preprocessing methods are deployed to elevate DL performance. These efforts culminate in collaborative global model training zfacilitated by blockchain and FL while maintaining the utmost confidentiality of data sources. The effectiveness of our methodology is rigorously tested and validated through extensive experiments. These experiments reveal a substantial improvement in accuracy, with an impressive average increase of 6.6% compared to six benchmark models. Furthermore, our approach demonstrates a 5.1% enhancement in the area under the curve (AUC) metric, underscoring its ability to outperform existing detection methods. These results substantiate the effectiveness of our proposed solution in countering the proliferation of deepfake content. In conclusion, our innovative approach represents a promising avenue for advancing deepfake detection. By leveraging existing data resources and the power of FL
quantum computing is an essential issue for taking advantage of quantum properties in real-world applications. Realizing quantum computing with a corresponding quantum circuit is a critical step. This study introduces...
详细信息
Self-testing is the task where spatially separated Alice and Bob cooperate to deduce the inner workings of untrusted quantum devices by interacting with them in a classical manner. We examine the task above where Alic...
详细信息
Self-testing is the task where spatially separated Alice and Bob cooperate to deduce the inner workings of untrusted quantum devices by interacting with them in a classical manner. We examine the task above where Alice and Bob do not trust each other which we call adversarial self-testing. We show that adversarial self-testing implies secure sampling—a simpler task that we introduce where distrustful Alice and Bob wish to sample from a joint probability distribution with the guarantee that an honest party's marginal is not biased. By extending impossibility results in two-party quantum cryptography, we give a simple proof that both of these tasks are impossible in all but trivial settings.
Cloud Computing(CC)is the most promising and advanced technology to store data and offer online services in an effective *** such fast evolving technologies are used in the protection of computerbased systems from cyb...
详细信息
Cloud Computing(CC)is the most promising and advanced technology to store data and offer online services in an effective *** such fast evolving technologies are used in the protection of computerbased systems from cyberattacks,it brings several advantages compared to conventional data protection *** of the computer-based systems that effectively protect the data include Cyber-Physical Systems(CPS),Internet of Things(IoT),mobile devices,desktop and laptop computer,and critical *** software(malware)is nothing but a type of software that targets the computer-based systems so as to launch cyberattacks and threaten the integrity,secrecy,and accessibility of the *** current study focuses on design of Optimal Bottleneck driven Deep Belief Network-enabled Cybersecurity Malware Classification(OBDDBNCMC)*** presentedOBDDBN-CMCmodel intends to recognize and classify the malware that exists in IoT-based cloud *** attain this,Zscore data normalization is utilized to scale the data into a uniform *** addition,BDDBN model is also exploited for recognition and categorization of *** effectually fine-tune the hyperparameters related to BDDBN model,GrasshopperOptimizationAlgorithm(GOA)is *** scenario enhances the classification results and also shows the novelty of current *** experimental analysis was conducted upon OBDDBN-CMC model for validation and the results confirmed the enhanced performance ofOBDDBNCMC model over recent approaches.
Digital transformation is about transforming processes, business models, domains, and culture. Studies show that the failure rate of digital transformation is quite high up to 90%. Studies show that the transformation...
详细信息
暂无评论