Implementing quantum wireless multi-hop network communication is essential to improve the global quantum network system. In this paper, we employ eight-level GHZ states as quantum channels to realize multi-hop quantum...
详细信息
Implementing quantum wireless multi-hop network communication is essential to improve the global quantum network system. In this paper, we employ eight-level GHZ states as quantum channels to realize multi-hop quantum communication, and utilize the logical relationship between the measurements of each node to derive the unitary operation performed by the end node. The hierarchical simultaneous entanglement switching(HSES) method is adopted, resulting in a significant reduction in the consumption of classical information compared to multi-hop quantum teleportation(QT)based on general simultaneous entanglement switching(SES). In addition, the proposed protocol is simulated on the IBM Quantum Experiment platform(IBM QE). Then, the data obtained from the experiment are analyzed using quantum state tomography, which verifies the protocol's good fidelity and accuracy. Finally, by calculating fidelity, we analyze the impact of four different types of noise(phase-damping, amplitude-damping, phase-flip and bit-flip) in this protocol.
Video question answering(VideoQA) is a challenging yet important task that requires a joint understanding of low-level video content and high-level textual semantics. Despite the promising progress of existing efforts...
详细信息
Video question answering(VideoQA) is a challenging yet important task that requires a joint understanding of low-level video content and high-level textual semantics. Despite the promising progress of existing efforts, recent studies revealed that current VideoQA models mostly tend to over-rely on the superficial correlations rooted in the dataset bias while overlooking the key video content, thus leading to unreliable results. Effectively understanding and modeling the temporal and semantic characteristics of a given video for robust VideoQA is crucial but, to our knowledge, has not been well investigated. To fill the research gap, we propose a robust VideoQA framework that can effectively model the cross-modality fusion and enforce the model to focus on the temporal and global content of videos when making a QA decision instead of exploiting the shortcuts in datasets. Specifically, we design a self-supervised contrastive learning objective to contrast the positive and negative pairs of multimodal input, where the fused representation of the original multimodal input is enforced to be closer to that of the intervened input based on video perturbation. We expect the fused representation to focus more on the global context of videos rather than some static keyframes. Moreover, we introduce an effective temporal order regularization to enforce the inherent sequential structure of videos for video representation. We also design a Kullback-Leibler divergence-based perturbation invariance regularization of the predicted answer distribution to improve the robustness of the model against temporal content perturbation of videos. Our method is model-agnostic and can be easily compatible with various VideoQA backbones. Extensive experimental results and analyses on several public datasets show the advantage of our method over the state-of-the-art methods in terms of both accuracy and robustness.
With the development of information technology and cloud computing,data sharing has become an important part of scientific *** traditional data sharing,data is stored on a third-party storage platform,which causes the...
详细信息
With the development of information technology and cloud computing,data sharing has become an important part of scientific *** traditional data sharing,data is stored on a third-party storage platform,which causes the owner to lose control of the *** a result,there are issues of intentional data leakage and tampering by third parties,and the private information contained in the data may lead to more significant ***,data is frequently maintained on multiple storage platforms,posing significant hurdles in terms of enlisting multiple parties to engage in data sharing while maintaining *** this work,we propose a new architecture for applying blockchains to data sharing and achieve efficient and reliable data sharing among heterogeneous *** design a new data sharing transaction mechanism based on the system architecture to protect the security of the raw data and the processing *** also design and implement a hybrid concurrency control protocol to overcome issues caused by the large differences in blockchain performance in our system and to improve the success rate of data sharing *** took Ethereum and Hyperledger Fabric as examples to conduct crossblockchain data sharing *** results show that our system achieves data sharing across heterogeneous blockchains with reasonable performance and has high scalability.
Graph processing has been widely used in many scenarios,from scientific computing to artificial *** processing exhibits irregular computational parallelism and random memory accesses,unlike traditional ***,running gra...
详细信息
Graph processing has been widely used in many scenarios,from scientific computing to artificial *** processing exhibits irregular computational parallelism and random memory accesses,unlike traditional ***,running graph processing workloads on conventional architectures(e.g.,CPUs and GPUs)often shows a significantly low compute-memory ratio with few performance benefits,which can be,in many cases,even slower than a specialized single-thread graph *** domain-specific hardware designs are essential for graph processing,it is still challenging to transform the hardware capability to performance boost without coupled software *** article presents a graph processing ecosystem from hardware to *** start by introducing a series of hardware accelerators as the foundation of this ***,the codesigned parallel graph systems and their distributed techniques are presented to support graph ***,we introduce our efforts on novel graph applications and hardware *** results show that various graph applications can be efficiently accelerated in this graph processing ecosystem.
At present,most quantum secret sharing(QSS)protocols are more or less designed with the incorporation of classical secret sharing *** the increasing maturity of quantum technology,QSS protocols based on pure quantum m...
详细信息
At present,most quantum secret sharing(QSS)protocols are more or less designed with the incorporation of classical secret sharing *** the increasing maturity of quantum technology,QSS protocols based on pure quantum mechanics are becoming more *** secret sharing schemes cannot achieve absolute security,and their involvement can compromise the security of QSS *** paper proposes a QSS scheme based on Greenberger-Horn-Zeilinger(GHZ)basis measurement and quantum entanglement *** this protocol,the secret sender stores the secret information using Pauli *** obtain their shares by measuring the product state ***,participants complete the secret reconstruction through quantum entanglement exchange and other related quantum *** addition,the particles held by participants in the protocol do not contain any secret *** participant's particles are in a state of maximum entanglement,and no participant can deduce the particle information of other participants through their own *** the same time,the protocol is based on pure quantum mechanics and does not involve classical schemes,which avoids the problem of reduced security of the *** analysis indicates that the protocol is not vulnerable to retransmission interception and collusion ***,it is capable of detecting and terminating the protocol promptly when facing with attacks from dishonest participants.
The proliferation of deep learning(DL)has amplified the demand for processing large and complex datasets for tasks such as modeling,classification,and ***,traditional DL methods compromise client privacy by collecting...
详细信息
The proliferation of deep learning(DL)has amplified the demand for processing large and complex datasets for tasks such as modeling,classification,and ***,traditional DL methods compromise client privacy by collecting sensitive data,underscoring the necessity for privacy-preserving solutions like Federated Learning(FL).FL effectively addresses escalating privacy concerns by facilitating collaborative model training without necessitating the sharing of raw *** that FL clients autonomously manage training data,encouraging client engagement is pivotal for successful model *** overcome challenges like unreliable communication and budget constraints,we present ENTIRE,a contract-based dynamic participation incentive mechanism for *** ensures impartial model training by tailoring participation levels and payments to accommodate diverse client *** approach involves several key ***,we examine how random client participation impacts FL convergence in non-convex scenarios,establishing the correlation between client participation levels and model ***,we reframe model performance optimization as an optimal contract design challenge to guide the distribution of rewards among clients with varying participation *** balancing budget considerations with model effectiveness,we craft optimal contracts for different budgetary constraints,prompting clients to disclose their participation preferences and select suitable contracts for contributing to model ***,we conduct a comprehensive experimental evaluation of ENTIRE using three real *** results demonstrate a significant 12.9%enhancement in model performance,validating its adherence to anticipated economic properties.
Spatial relations in text refer to how a geographical entity is located in space in relation to a reference *** spatial relations from text is a fundamental task in natural language *** studies have only focused on ge...
详细信息
Spatial relations in text refer to how a geographical entity is located in space in relation to a reference *** spatial relations from text is a fundamental task in natural language *** studies have only focused on generic fine-tuning methods with additional classifiers,ignoring the importance of the semantic correlation between different spatial elements and the large offset between the relation extraction task and the pre-trained *** address the above two issues,we propose a spatial relation extraction model based on Dual-view Prompt and Element Correlation(DPEC).Specifically,we first reformulate spatial relation extraction as a mask language model with a Dual-view Prompt(i.e.,Link Prompt and Confidence Prompt).Link Prompt can not only guide the model to incorporate more contextual information related to the spatial relation extraction task,but also better adapt to the original pre-training task of the language ***,Confidence Prompt can measure the confidence of candidate triplets in Link Prompt and work as a supplement to identify those easily confused examples in Link ***,we incorporate the element correlation to measure the consistency between different spatial elements,which is an effective cue for identifying the rationality of spatial *** results on the popular SpaceEval show that our DPEC significantly outperforms the SOTA baselines.
This paper examines fault-tolerant quantized control for neural networks under persistent dwell-time switching, considering the presence of actuator faults and dynamic output quantization. The dynamic scaling factor (...
详细信息
The use of generative adversarial network(GAN)-based models for the conditional generation of image semantic segmentation has shown promising results in recent ***,there are still some limitations,including limited di...
详细信息
The use of generative adversarial network(GAN)-based models for the conditional generation of image semantic segmentation has shown promising results in recent ***,there are still some limitations,including limited diversity of image style,distortion of detailed texture,unbalanced color tone,and lengthy training *** address these issues,we propose an asymmetric pre-training and fine-tuning(APF)-GAN model.
Anomaly detection(AD) has been extensively studied and applied across various scenarios in recent years. However, gaps remain between the current performance and the desired recognition accuracy required for practical...
详细信息
Anomaly detection(AD) has been extensively studied and applied across various scenarios in recent years. However, gaps remain between the current performance and the desired recognition accuracy required for practical *** paper analyzes two fundamental failure cases in the baseline AD model and identifies key reasons that limit the recognition accuracy of existing approaches. Specifically, by Case-1, we found that the main reason detrimental to current AD methods is that the inputs to the recovery model contain a large number of detailed features to be recovered, which leads to the normal/abnormal area has not/has been recovered into its original state. By Case-2, we surprisingly found that the abnormal area that cannot be recognized in image-level representations can be easily recognized in the feature-level representation. Based on the above observations, we propose a novel recover-then-discriminate(ReDi) framework for *** takes a self-generated feature map(e.g., histogram of oriented gradients) and a selected prompted image as explicit input information to address the identified in Case-1. Additionally, a feature-level discriminative network is introduced to amplify abnormal differences between the recovered and input representations. Extensive experiments on two widely used yet challenging AD datasets demonstrate that ReDi achieves state-of-the-art recognition accuracy.
暂无评论