-
An efficient quantum algorithm for generation of ab initio n-th order susceptibilities for non-linear spectroscopies
Authors:
Tyler Kharazi,
Torin F. Stetina,
Liwen Ko,
Guang Hao Low,
K. Birgitta Whaley
Abstract:
We develop and analyze a fault-tolerant quantum algorithm for computing $n$-th order response properties necessary for analysis of non-linear spectroscopies of molecular and condensed phase systems. We use a semi-classical description in which the electronic degrees of freedom are treated quantum mechanically and the light is treated as a classical field. The algorithm we present can be viewed as…
▽ More
We develop and analyze a fault-tolerant quantum algorithm for computing $n$-th order response properties necessary for analysis of non-linear spectroscopies of molecular and condensed phase systems. We use a semi-classical description in which the electronic degrees of freedom are treated quantum mechanically and the light is treated as a classical field. The algorithm we present can be viewed as an implementation of standard perturbation theory techniques, focused on {\it ab initio} calculation of $n$-th order response functions. We provide cost estimates in terms of the number of queries to the block encoding of the unperturbed Hamiltonian, as well as the block encodings of the perturbing dipole operators. Using the technique of eigenstate filtering, we provide an algorithm to extract excitation energies to resolution $γ$, and the corresponding linear response amplitude to accuracy $ε$ using ${O}\left(N^{6}η^2{γ^{-1}ε^{-1}}\log(1/ε)\right)$ queries to the block encoding of the unperturbed Hamiltonian $H_0$, in double factorized representation. Thus, our approach saturates the Heisenberg $O(γ^{-1})$ limit for energy estimation and allows for the approximation of relevant transition dipole moments. These quantities, combined with sum-over-states formulation of polarizabilities, can be used to compute the $n$-th order susceptibilities and response functions for non-linear spectroscopies under limited assumptions using $\widetilde{O}\left({N^{5n+1}η^{n+1}}/{γ^nε}\right)$ queries to the block encoding of $H_0$.
△ Less
Submitted 1 April, 2024;
originally announced April 2024.
-
Federated Deep Q-Learning and 5G load balancing
Authors:
Hsin Lin,
Yi-Kang Su,
Hong-Qi Chen,
La-Fei Ko
Abstract:
Despite advances in cellular network technology, base station (BS) load balancing remains a persistent problem. Although centralized resource allocation methods can address the load balancing problem, it still remains an NP-hard problem. In this research, we study how federated deep Q learning can be used to inform each user equipment (UE) of the each BS's load conditions. Federated deep Q learnin…
▽ More
Despite advances in cellular network technology, base station (BS) load balancing remains a persistent problem. Although centralized resource allocation methods can address the load balancing problem, it still remains an NP-hard problem. In this research, we study how federated deep Q learning can be used to inform each user equipment (UE) of the each BS's load conditions. Federated deep Q learning's load balancing enables intelligent UEs to independently select the best BS while also limiting the amount of private information exposed to the network.
In this study, we propose and analyze a federated deep Q learning load balancing system, which is implemented using the Open-RAN xAPP framework and the near-Real Time Radio Interface Controller (near-RT RIC). Our simulation results indicate that compared to the maximum Signal-To-Noise-Ratio (MAX-SINR) method currently used by UEs, our proposed deep Q learning model can consistently provide better High average UE quality of service
△ Less
Submitted 10 February, 2024;
originally announced March 2024.
-
All Attention U-NET for Semantic Segmentation of Intracranial Hemorrhages In Head CT Images
Authors:
Chia Shuo Chang,
Tian Sheuan Chang,
Jiun Lin Yan,
Li Ko
Abstract:
Intracranial hemorrhages in head CT scans serve as a first line tool to help specialists diagnose different types. However, their types have diverse shapes in the same type but similar confusing shape, size and location between types. To solve this problem, this paper proposes an all attention U-Net. It uses channel attentions in the U-Net encoder side to enhance class specific feature extraction,…
▽ More
Intracranial hemorrhages in head CT scans serve as a first line tool to help specialists diagnose different types. However, their types have diverse shapes in the same type but similar confusing shape, size and location between types. To solve this problem, this paper proposes an all attention U-Net. It uses channel attentions in the U-Net encoder side to enhance class specific feature extraction, and space and channel attentions in the U-Net decoder side for more accurate shape extraction and type classification. The simulation results show up to a 31.8\% improvement compared to baseline, ResNet50 + U-Net, and better performance than in cases with limited attention.
△ Less
Submitted 16 December, 2023;
originally announced December 2023.
-
Performing quantum entangled biphoton spectroscopy using classical light pulses
Authors:
Liwen Ko,
Robert L. Cook,
K. Birgitta Whaley
Abstract:
We show that for a class of quantum light spectroscopy (QLS) experiments using n = 0,1,2,$\cdots$ classical light pulses and an entangled photon pair (a biphoton state) where one photon acts as a reference without interacting with the matter sample, identical signals can be obtained by replacing the biphotons with classical-like coherent states of light, where these are defined explicitly in terms…
▽ More
We show that for a class of quantum light spectroscopy (QLS) experiments using n = 0,1,2,$\cdots$ classical light pulses and an entangled photon pair (a biphoton state) where one photon acts as a reference without interacting with the matter sample, identical signals can be obtained by replacing the biphotons with classical-like coherent states of light, where these are defined explicitly in terms of the parameters of the biphoton states. An input-output formulation of quantum nonlinear spectroscopy is used to prove this equivalence. We demonstrate the equivalence numerically by comparing a classical pump - quantum probe experiment with the corresponding classical pump - classical probe experiment. This analysis shows that understanding the equivalence between entangled biphoton probes and carefully designed classical-like coherent state probes leads to quantum-inspired classical experiments and provides insights for future design of QLS experiments that could provide a true quantum advantage.
△ Less
Submitted 26 June, 2023;
originally announced June 2023.
-
Comparing disorder and adaptability in stochasticity
Authors:
Liling Ko,
Justin Miller
Abstract:
In the literature, there are various notions of stochasticity which measure how well an algorithmically random set satisfies the law of large numbers. Such notions can be categorized by disorder and adaptability: adaptive strategies may use information observed about the set when deciding how to act, and disorderly strategies may act out of order. In the disorderly setting, adaptive strategies are…
▽ More
In the literature, there are various notions of stochasticity which measure how well an algorithmically random set satisfies the law of large numbers. Such notions can be categorized by disorder and adaptability: adaptive strategies may use information observed about the set when deciding how to act, and disorderly strategies may act out of order. In the disorderly setting, adaptive strategies are more powerful than non-adaptive ones. In the adaptive setting, Merkle et al. showed that disorderly strategies are more powerful than orderly ones. This leaves open the question of how disorderly, non-adaptive strategies compare to orderly, adaptive strategies, as well as how both relate to orderly, non-adaptive strategies. In this paper, we show that orderly, adaptive strategies and disorderly, non-adaptive strategies are both strictly more powerful than orderly, non-adaptive strategies. Using the techniques developed to prove this, we also make progress towards the former open question by introducing a notion of orderly, ``weakly adaptable'' strategies which we prove is incomparable with disorderly, non-adaptive strategies.
△ Less
Submitted 24 October, 2023; v1 submitted 3 June, 2023;
originally announced June 2023.
-
TypeScript's Evolution: An Analysis of Feature Adoption Over Time
Authors:
Joshua D. Scarsbrook,
Mark Utting,
Ryan K. L. Ko
Abstract:
TypeScript is a quickly evolving superset of JavaScript with active development of new features. Our paper seeks to understand how quickly these features are adopted by the developer community. Existing work in JavaScript shows the adoption of dynamic language features can be a major hindrance to static analysis. As TypeScript evolves the addition of features makes the underlying standard more and…
▽ More
TypeScript is a quickly evolving superset of JavaScript with active development of new features. Our paper seeks to understand how quickly these features are adopted by the developer community. Existing work in JavaScript shows the adoption of dynamic language features can be a major hindrance to static analysis. As TypeScript evolves the addition of features makes the underlying standard more and more difficult to keep up with. In our work we present an analysis of 454 open source TypeScript repositories and study the adoption of 13 language features over the past three years. We show that while new versions of the TypeScript compiler are aggressively adopted by the community, the same cannot be said for language features. While some experience strong growth others are rarely adopted by projects. Our work serves as a starting point for future study of the adoption of features in TypeScript. We also release our analysis and data gathering software as open source in the hope it helps the programming languages community.
△ Less
Submitted 17 March, 2023;
originally announced March 2023.
-
Positive-Unlabeled Learning using Random Forests via Recursive Greedy Risk Minimization
Authors:
Jonathan Wilton,
Abigail M. Y. Koay,
Ryan K. L. Ko,
Miao Xu,
Nan Ye
Abstract:
The need to learn from positive and unlabeled data, or PU learning, arises in many applications and has attracted increasing interest. While random forests are known to perform well on many tasks with positive and negative data, recent PU algorithms are generally based on deep neural networks, and the potential of tree-based PU learning is under-explored. In this paper, we propose new random fores…
▽ More
The need to learn from positive and unlabeled data, or PU learning, arises in many applications and has attracted increasing interest. While random forests are known to perform well on many tasks with positive and negative data, recent PU algorithms are generally based on deep neural networks, and the potential of tree-based PU learning is under-explored. In this paper, we propose new random forest algorithms for PU-learning. Key to our approach is a new interpretation of decision tree algorithms for positive and negative data as \emph{recursive greedy risk minimization algorithms}. We extend this perspective to the PU setting to develop new decision tree learning algorithms that directly minimizes PU-data based estimators for the expected risk. This allows us to develop an efficient PU random forest algorithm, PU extra trees. Our approach features three desirable properties: it is robust to the choice of the loss function in the sense that various loss functions lead to the same decision trees; it requires little hyperparameter tuning as compared to neural network based PU learning; it supports a feature importance that directly measures a feature's contribution to risk minimization. Our algorithms demonstrate strong performance on several datasets. Our code is available at \url{https://github.com/puetpaper/PUExtraTrees}.
△ Less
Submitted 16 October, 2022;
originally announced October 2022.
-
Minimax AUC Fairness: Efficient Algorithm with Provable Convergence
Authors:
Zhenhuan Yang,
Yan Lok Ko,
Kush R. Varshney,
Yiming Ying
Abstract:
The use of machine learning models in consequential decision making often exacerbates societal inequity, in particular yielding disparate impact on members of marginalized groups defined by race and gender. The area under the ROC curve (AUC) is widely used to evaluate the performance of a scoring function in machine learning, but is studied in algorithmic fairness less than other performance metri…
▽ More
The use of machine learning models in consequential decision making often exacerbates societal inequity, in particular yielding disparate impact on members of marginalized groups defined by race and gender. The area under the ROC curve (AUC) is widely used to evaluate the performance of a scoring function in machine learning, but is studied in algorithmic fairness less than other performance metrics. Due to the pairwise nature of the AUC, defining an AUC-based group fairness metric is pairwise-dependent and may involve both \emph{intra-group} and \emph{inter-group} AUCs. Importantly, considering only one category of AUCs is not sufficient to mitigate unfairness in AUC optimization. In this paper, we propose a minimax learning and bias mitigation framework that incorporates both intra-group and inter-group AUCs while maintaining utility. Based on this Rawlsian framework, we design an efficient stochastic optimization algorithm and prove its convergence to the minimum group-level AUC. We conduct numerical experiments on both synthetic and real-world datasets to validate the effectiveness of the minimax framework and the proposed optimization algorithm.
△ Less
Submitted 28 November, 2022; v1 submitted 22 August, 2022;
originally announced August 2022.
-
High-temperature superconductivity in hydrides: experimental evidence and details
Authors:
M. I. Eremets,
V. S. Minkov,
A. P. Drozdov,
P. P. Kong,
V. Ksenofontov,
S. I. Shylin,
S. L. Bud ko,
R. Prozorov,
F. F. Balakirev,
Dan Sun,
S. Mozaffari,
L. Balicas
Abstract:
Since the discovery of superconductivity at 200 K in H3S [1] similar or higher transition temperatures, Tcs, have been reported for various hydrogen-rich compounds under ultra-high pressures [2]. Superconductivity was experimentally proved by different methods, including electrical resistance, magnetic susceptibility, optical infrared, and nuclear resonant scattering measurements. The crystal stru…
▽ More
Since the discovery of superconductivity at 200 K in H3S [1] similar or higher transition temperatures, Tcs, have been reported for various hydrogen-rich compounds under ultra-high pressures [2]. Superconductivity was experimentally proved by different methods, including electrical resistance, magnetic susceptibility, optical infrared, and nuclear resonant scattering measurements. The crystal structures of superconducting phases were determined by X-ray diffraction. Numerous electrical transport measurements demonstrate the typical behaviour of a conventional phonon-mediated superconductor: zero resistance below Tc, the shift of Tc to lower temperatures under external magnetic fields, and pronounced isotope effect. Remarkably, the results are in good agreement with the theoretical predictions, which describe superconductivity in hydrides within the framework of the conventional BCS theory. However, despite this acknowledgment, experimental evidence for the superconducting state in these compounds has recently been treated with criticism [3, 4], which apparently stems from misunderstanding and misinterpretation of complicated experiments performed under very high pressures. Here, we describe in greater detail the experiments revealing high-temperature superconductivity in hydrides under high pressures. We show that the arguments against superconductivity [3, 4] can be either refuted or explained. The experiments on the high-temperature superconductivity in hydrides clearly contradict the theory of hole superconductivity [4] and eliminate it [3].
△ Less
Submitted 13 January, 2022;
originally announced January 2022.
-
Dynamics of photosynthetic light harvesting systems interacting with N-photon Fock states
Authors:
Liwen Ko,
Robert L. Cook,
K. Birgitta Whaley
Abstract:
We develop a method to simulate the excitonic dynamics of realistic photosynthetic light harvesting systems including non-Markovian coupling to phonon degrees of freedom, under excitation by N-photon Fock state pulses. This method combines the input-output formalism and the hierarchical equations of motion (HEOM) formalism into a double hierarchy of coupled linear equations in density matrices. We…
▽ More
We develop a method to simulate the excitonic dynamics of realistic photosynthetic light harvesting systems including non-Markovian coupling to phonon degrees of freedom, under excitation by N-photon Fock state pulses. This method combines the input-output formalism and the hierarchical equations of motion (HEOM) formalism into a double hierarchy of coupled linear equations in density matrices. We show analytically that, under weak field excitation relevant to natural photosynthesis conditions, an N-photon Fock state input and a corresponding coherent state input give rise to equal density matrices in the excited manifold. However, an important difference is that an N-photon Fock state input has no off-diagonal coherence between the ground and excited subspaces, in contrast with the coherences created by a coherent state input. We derive expressions for the probability to absorb a single Fock state photon, with or without the influence of phonons. For short pulses (or equivalently, wide bandwidth pulses), we show that the absorption probability has a universal behavior that depends only upon a system-dependent effective energy spread parameter Δ and an exciton-light coupling constant Γ. This holds for a broad range of chromophore systems and for a variety of pulse shapes. We also analyse the absorption probability in the opposite long pulses (narrow bandwidth) regime. We also derive an expression for the long time emission rate in the presence of phonons and use it to study the difference between collective versus independent emission. Finally, we present a numerical simulation for the LHCII monomer (14-mer) system under single photon excitation that illustrates the use of the double hierarchy for calculation of Fock state excitation of a light harvesting system including chromophore coupling to a non-Markovian phonon bath.
△ Less
Submitted 24 November, 2021; v1 submitted 12 November, 2021;
originally announced November 2021.
-
A Quantum trajectory picture of single photon absorption and energy transport in photosystem II
Authors:
Robert L. Cook,
Liwen Ko,
K. Birgitta Whaley
Abstract:
In this work we study the first step in photosynthesis for the limiting case of a single photon interacting with photosystem II (PSII). We model our system using quantum trajectory theory, which allows us to consider not only the average evolution, but also the conditional evolution of the system given individual realizations of idealized measurements of photons that have been absorbed and subsequ…
▽ More
In this work we study the first step in photosynthesis for the limiting case of a single photon interacting with photosystem II (PSII). We model our system using quantum trajectory theory, which allows us to consider not only the average evolution, but also the conditional evolution of the system given individual realizations of idealized measurements of photons that have been absorbed and subsequently emitted as fluorescence. The quantum nature of the single photon input requires a fully quantum model of both the input and output light fields. We show that PSII coupled to the field via three collective ``bright states'', whose orientation and distribution correlate strongly with its natural geometry. Measurements of the transmitted beam strongly affects the system state, since a (null) detection of the outgoing photon confirms that the system must be in the electronic (excited) ground state. Using numerical and analytical calculations we show that observing the null result transforms a state with a low excited state population $O( 10^{-5} )$ to a state with nearly all population contained in the excited states. This is solely a property of the single photon input, as we confirm by comparing this behavior with that for excitation by a coherent state possessing an average of one photon, using a smaller five site ``pentamer'' system. We also examine the effect of a dissipative phononic environment on the conditional excited state dynamics. We show that the environment has a strong effect on the observed rates of fluorescence, which could act as a new photon-counting witness of excitonic coherence. The long time evolution of the phononic model predicts an experimentally consistent quantum efficiency of 92%.
△ Less
Submitted 8 August, 2022; v1 submitted 24 October, 2021;
originally announced October 2021.
-
Interplay of vibration- and environment-assisted energy transfer
Authors:
Zeng-Zhao Li,
Liwen Ko,
Zhibo Yang,
Mohan Sarovar,
K. Birgitta Whaley
Abstract:
We study the interplay between two environmental influences on excited state energy transfer in photosynthetic light harvesting complexes, namely, vibrationally assisted energy transfer (VAET) and environment-assisted quantum transport (ENAQT), considering a dimeric chromophore donor-acceptor model as a prototype for larger systems. We demonstrate how the basic features of the excitonic energy tra…
▽ More
We study the interplay between two environmental influences on excited state energy transfer in photosynthetic light harvesting complexes, namely, vibrationally assisted energy transfer (VAET) and environment-assisted quantum transport (ENAQT), considering a dimeric chromophore donor-acceptor model as a prototype for larger systems. We demonstrate how the basic features of the excitonic energy transfer are influenced by these two environments, both separately and together, with the environment being fully quantum in the case of VAET and treated in the Haken-Strobl-Reineker classical limit in the case of ENAQT. Our results reveal that in the weak noise regime, the presence of a classical noise source is detrimental to the energy transfer that is resonantly assisted by the exciton-vibration interactions intrinsic to VAET. In the strong noise regime we reproduce all the features of ENAQT including the turnover into a Zeno regime where energy transfer is suppressed, and VAET is insignificant.
△ Less
Submitted 25 March, 2022; v1 submitted 16 October, 2021;
originally announced October 2021.
-
Towards characterizing the $>ω^2$-fickle recursively enumerable Turing degrees
Authors:
Liling Ko
Abstract:
Given a finite lattice $L$ that can be embedded in the recursively enumerable (r.e.) Turing degrees $\mathcal{R}_{\mathrm{T}}$, it is not known how one can characterize the degrees $\mathbf{d}\in\mathcal{R}_{\mathrm{T}}$ below which $L$ can be bounded. Two important characterizations are of the $L_7$ and $M_3$ lattices, where the lattices are bounded below $\mathbf{d}$ if and only if $\mathbf{d}$…
▽ More
Given a finite lattice $L$ that can be embedded in the recursively enumerable (r.e.) Turing degrees $\mathcal{R}_{\mathrm{T}}$, it is not known how one can characterize the degrees $\mathbf{d}\in\mathcal{R}_{\mathrm{T}}$ below which $L$ can be bounded. Two important characterizations are of the $L_7$ and $M_3$ lattices, where the lattices are bounded below $\mathbf{d}$ if and only if $\mathbf{d}$ contains sets of ``\emph{fickleness}'' $>ω$ and $\geqω^ω$ respectively. We work towards finding a lattice that characterizes the levels above $ω^2$, the first non-trivial level after $ω$. We considered lattices that are as ``short'' and ``narrow'' as $L_7$ and $M_3$, but the lattices characterize also the $>ω$ or $\geqω^ω$ levels, if the lattices are not already embeddable below all non-zero r.e.\ degrees. We also considered upper semilattices (USLs) by removing the bottom meet(s) of some previously considered lattices, but the removals did not change the levels characterized. This leads us to conjecture that a USL characterizes the same r.e.\ degrees as the lattice it is based on. We discovered three lattices besides $M_3$ that also characterize the $\geqω^ω$-levels. Our search for a $>ω^2$-candidate therefore involves the lattice-theoretic problem of finding lattices that do not contain any of the four $\geqω^ω$-lattices as sublattices.
△ Less
Submitted 27 November, 2021; v1 submitted 19 September, 2021;
originally announced September 2021.
-
Confined Gradient Descent: Privacy-preserving Optimization for Federated Learning
Authors:
Yanjun Zhang,
Guangdong Bai,
Xue Li,
Surya Nepal,
Ryan K L Ko
Abstract:
Federated learning enables multiple participants to collaboratively train a model without aggregating the training data. Although the training data are kept within each participant and the local gradients can be securely synthesized, recent studies have shown that such privacy protection is insufficient. The global model parameters that have to be shared for optimization are susceptible to leak in…
▽ More
Federated learning enables multiple participants to collaboratively train a model without aggregating the training data. Although the training data are kept within each participant and the local gradients can be securely synthesized, recent studies have shown that such privacy protection is insufficient. The global model parameters that have to be shared for optimization are susceptible to leak information about training data. In this work, we propose Confined Gradient Descent (CGD) that enhances privacy of federated learning by eliminating the sharing of global model parameters. CGD exploits the fact that a gradient descent optimization can start with a set of discrete points and converges to another set at the neighborhood of the global minimum of the objective function. It lets the participants independently train on their local data, and securely share the sum of local gradients to benefit each other. We formally demonstrate CGD's privacy enhancement over traditional FL. We prove that less information is exposed in CGD compared to that of traditional FL. CGD also guarantees desired model accuracy. We theoretically establish a convergence rate for CGD. We prove that the loss of the proprietary models learned for each participant against a model learned by aggregated training data is bounded. Extensive experimental results on two real-world datasets demonstrate the performance of CGD is comparable with the centralized learning, with marginal differences on validation loss (mostly within 0.05) and accuracy (mostly within 1%).
△ Less
Submitted 27 April, 2021;
originally announced April 2021.
-
ColdPress: An Extensible Malware Analysis Platform for Threat Intelligence
Authors:
Haoxi Tan,
Mahin Chandramohan,
Cristina Cifuentes,
Guangdong Bai,
Ryan K. L. Ko
Abstract:
Malware analysis is still largely a manual task. This slow and inefficient approach does not scale to the exponential rise in the rate of new unique malware generated. Hence, automating the process as much as possible becomes desirable.
In this paper, we present ColdPress - an extensible malware analysis platform that automates the end-to-end process of malware threat intelligence gathering inte…
▽ More
Malware analysis is still largely a manual task. This slow and inefficient approach does not scale to the exponential rise in the rate of new unique malware generated. Hence, automating the process as much as possible becomes desirable.
In this paper, we present ColdPress - an extensible malware analysis platform that automates the end-to-end process of malware threat intelligence gathering integrated output modules to perform report generation of arbitrary file formats. ColdPress combines state-of-the-art tools and concepts into a modular system that aids the analyst to efficiently and effectively extract information from malware samples. It is designed as a user-friendly and extensible platform that can be easily extended with user-defined modules.
We evaluated ColdPress with complex real-world malware samples (e.g., WannaCry), demonstrating its efficiency, performance and usefulness to security analysts.
△ Less
Submitted 11 March, 2021;
originally announced March 2021.
-
An Analytics Framework for Heuristic Inference Attacks against Industrial Control Systems
Authors:
Taejun Choi,
Guangdong Bai,
Ryan K L Ko,
Naipeng Dong,
Wenlu Zhang,
Shunyao Wang
Abstract:
Industrial control systems (ICS) of critical infrastructure are increasingly connected to the Internet for remote site management at scale. However, cyber attacks against ICS - especially at the communication channels between humanmachine interface (HMIs) and programmable logic controllers (PLCs) - are increasing at a rate which outstrips the rate of mitigation.
In this paper, we introduce a ven…
▽ More
Industrial control systems (ICS) of critical infrastructure are increasingly connected to the Internet for remote site management at scale. However, cyber attacks against ICS - especially at the communication channels between humanmachine interface (HMIs) and programmable logic controllers (PLCs) - are increasing at a rate which outstrips the rate of mitigation.
In this paper, we introduce a vendor-agnostic analytics framework which allows security researchers to analyse attacks against ICS systems, even if the researchers have zero control automation domain knowledge or are faced with a myriad of heterogenous ICS systems. Unlike existing works that require expertise in domain knowledge and specialised tool usage, our analytics framework does not require prior knowledge about ICS communication protocols, PLCs, and expertise of any network penetration testing tool. Using `digital twin' scenarios comprising industry-representative HMIs, PLCs and firewalls in our test lab, our framework's steps were demonstrated to successfully implement a stealthy deception attack based on false data injection attacks (FDIA). Furthermore, our framework also demonstrated the relative ease of attack dataset collection, and the ability to leverage well-known penetration testing tools.
We also introduce the concept of `heuristic inference attacks', a new family of attack types on ICS which is agnostic to PLC and HMI brands/models commonly deployed in ICS. Our experiments were also validated on a separate ICS dataset collected from a cyber-physical scenario of water utilities. Finally, we utilized time complexity theory to estimate the difficulty for the attacker to conduct the proposed packet analyses, and recommended countermeasures based on our findings.
△ Less
Submitted 28 January, 2021;
originally announced January 2021.
-
Cyber Autonomy: Automating the Hacker- Self-healing, self-adaptive, automatic cyber defense systems and their impact to the industry, society and national security
Authors:
Ryan K L Ko
Abstract:
This paper sets the context for the urgency for cyber autonomy, and the current gaps of the cyber security industry. A novel framework proposing four phases of maturity for full cyber autonomy will be discussed. The paper also reviews new and emerging cyber security automation techniques and tools, and discusses their impact on society, the perceived cyber security skills gap/shortage and national…
▽ More
This paper sets the context for the urgency for cyber autonomy, and the current gaps of the cyber security industry. A novel framework proposing four phases of maturity for full cyber autonomy will be discussed. The paper also reviews new and emerging cyber security automation techniques and tools, and discusses their impact on society, the perceived cyber security skills gap/shortage and national security. We will also be discussing the delicate balance between national security, human rights and ethics, and the potential demise of the manual penetration testing industry in the face of automation.
△ Less
Submitted 8 December, 2020;
originally announced December 2020.
-
Unraveling excitation energy transfer assisted by collective behaviors of vibrations
Authors:
Zeng-Zhao Li,
Liwen Ko,
Zhibo Yang,
Mohan Sarovar,
K. Birgitta Whaley
Abstract:
We investigate how collective behaviors of vibrations such as cooperativity and interference can enhance energy transfer in a nontrivial way, focusing on an example of a donor-bridge-acceptor trimeric chromophore system coupled to two vibrational degrees of freedom. Employing parameters selected to provide an overall uphill energy transfer from donor to acceptor, we use numerical calculations of d…
▽ More
We investigate how collective behaviors of vibrations such as cooperativity and interference can enhance energy transfer in a nontrivial way, focusing on an example of a donor-bridge-acceptor trimeric chromophore system coupled to two vibrational degrees of freedom. Employing parameters selected to provide an overall uphill energy transfer from donor to acceptor, we use numerical calculations of dynamics in a coupled exciton-vibration basis, together with perturbation-based analytics and calculation of vibronic spectra, we identify clear spectral features of single- and multi-phonon vibrationally-assisted energy transfer (VAET) dynamics, where the latter include up to six-phonon contributions. We identify signatures of vibrational cooperation and interference that provide enhancement of energy transfer relative to that obtained from VAET with a single vibrational mode. We observe a phononic analogue of two-photon absorption, as well as a novel heteroexcitation mechanism in which a single phonon gives rise to simultaneous excitation of both the trimeric system and the vibrational degrees of freedom. The impact of vibrations and of the one- and two-phonon VAET processes on the energy transfer are seen to be quite different in the weak and strong site-vibration coupling regimes. In the weak coupling regime, two-phonon processes dominate, whereas in the strong coupling regime up to six-phonon VAET processes can be induced. The VAET features are seen to be enhanced with increasing temperature and site-vibration coupling strength, and are reduced in the presence of dissipation. We analyze the dependence of these phenomena on the explicit form of the chromophore-vibration couplings, with comparison of VAET spectra for local and non-local couplings.
△ Less
Submitted 8 October, 2020;
originally announced October 2020.
-
Pandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools
Authors:
Hetong Jiang,
Taejun Choi,
Ryan K. L. Ko
Abstract:
Cybersecurity tools are increasingly automated with artificial intelligent (AI) capabilities to match the exponential scale of attacks, compensate for the relatively slower rate of training new cybersecurity talents, and improve of the accuracy and performance of both tools and users. However, the safe and appropriate usage of autonomous cyber attack tools - especially at the development stages fo…
▽ More
Cybersecurity tools are increasingly automated with artificial intelligent (AI) capabilities to match the exponential scale of attacks, compensate for the relatively slower rate of training new cybersecurity talents, and improve of the accuracy and performance of both tools and users. However, the safe and appropriate usage of autonomous cyber attack tools - especially at the development stages for these tools - is still largely an unaddressed gap. Our survey of current literature and tools showed that most of the existing cyber range designs are mostly using manual tools and have not considered augmenting automated tools or the potential security issues caused by the tools. In other words, there is still room for a novel cyber range design which allow security researchers to safely deploy autonomous tools and perform automated tool testing if needed. In this paper, we introduce Pandora, a safe testing environment which allows security researchers and cyber range users to perform experiments on automated cyber attack tools that may have strong potential of usage and at the same time, a strong potential for risks. Unlike existing testbeds and cyber ranges which have direct compatibility with enterprise computer systems and the potential for risk propagation across the enterprise network, our test system is intentionally designed to be incompatible with enterprise real-world computing systems to reduce the risk of attack propagation into actual infrastructure. Our design also provides a tool to convert in-development automated cyber attack tools into to executable test binaries for validation and usage realistic enterprise system environments if required. Our experiments tested automated attack tools on our proposed system to validate the usability of our proposed environment. Our experiments also proved the safety of our environment by compatibility testing using simple malicious code.
△ Less
Submitted 24 September, 2020;
originally announced September 2020.
-
PrivColl: Practical Privacy-Preserving Collaborative Machine Learning
Authors:
Yanjun Zhang,
Guangdong Bai,
Xue Li,
Caitlin Curtis,
Chen Chen,
Ryan K L Ko
Abstract:
Collaborative learning enables two or more participants, each with their own training dataset, to collaboratively learn a joint model. It is desirable that the collaboration should not cause the disclosure of either the raw datasets of each individual owner or the local model parameters trained on them. This privacy-preservation requirement has been approached through differential privacy mechanis…
▽ More
Collaborative learning enables two or more participants, each with their own training dataset, to collaboratively learn a joint model. It is desirable that the collaboration should not cause the disclosure of either the raw datasets of each individual owner or the local model parameters trained on them. This privacy-preservation requirement has been approached through differential privacy mechanisms, homomorphic encryption (HE) and secure multiparty computation (MPC), but existing attempts may either introduce the loss of model accuracy or imply significant computational and/or communicational overhead. In this work, we address this problem with the lightweight additive secret sharing technique. We propose PrivColl, a framework for protecting local data and local models while ensuring the correctness of training processes. PrivColl employs secret sharing technique for securely evaluating addition operations in a multiparty computation environment, and achieves practicability by employing only the homomorphic addition operations. We formally prove that it guarantees privacy preservation even though the majority (n-2 out of n) of participants are corrupted. With experiments on real-world datasets, we further demonstrate that PrivColl retains high efficiency. It achieves a speedup of more than 45X over the state-of-the-art MPC/HE based schemes for training linear/logistic regression, and 216X faster for training neural network.
△ Less
Submitted 14 July, 2020;
originally announced July 2020.
-
Local Editing in LZ-End Compressed Data
Authors:
Daniel Roodt,
Ulrich Speidel,
Vimal Kumar,
Ryan K. L. Ko
Abstract:
This paper presents an algorithm for the modification of data compressed using LZ-End, a derivate of LZ77, without prior decompression. The performance of the algorithm and the impact of the modifications on the compression ratio is evaluated. Finally, we discuss the importance of this work as a first step towards local editing in Lempel-Ziv compressed data.
This paper presents an algorithm for the modification of data compressed using LZ-End, a derivate of LZ77, without prior decompression. The performance of the algorithm and the impact of the modifications on the compression ratio is evaluated. Finally, we discuss the importance of this work as a first step towards local editing in Lempel-Ziv compressed data.
△ Less
Submitted 12 July, 2020;
originally announced July 2020.
-
Nonlowness independent from frequent mind changes
Authors:
Liling Ko
Abstract:
It was recently shown that the computably enumerable (c.e.) degrees that embed the critical triple (Downey, Greenberg, Weber 2007) and the M3 lattice structure (Downey, Greenberg 2015) are exactly those that change their minds sufficiently often. Therefore the embeddability strength of a c.e. degree has much to do with the degree's mind change frequency. Nonlowness is another common measure of deg…
▽ More
It was recently shown that the computably enumerable (c.e.) degrees that embed the critical triple (Downey, Greenberg, Weber 2007) and the M3 lattice structure (Downey, Greenberg 2015) are exactly those that change their minds sufficiently often. Therefore the embeddability strength of a c.e. degree has much to do with the degree's mind change frequency. Nonlowness is another common measure of degree strength, with nonlow degrees expected to compute more degrees than low ones. We ask if nonlowness and frequent mind changes are independent measures of strength. Downey and Greenberg (2015) claimed this to be true without proof, so we present one here. We prove the claim by building low and nonlow c.e. sets with an arbitrary number of mind changes. We base our proof on our direct construction of a nonlow low2 array computable set. Such sets were always known to exist, but also never constructed directly in any publication.
△ Less
Submitted 14 June, 2019;
originally announced June 2019.
-
PFML-based Semantic BCI Agent for Game of Go Learning and Prediction
Authors:
Chang-Shing Lee,
Mei-Hui Wang,
Li-Wei Ko,
Bo-Yu Tsai,
Yi-Lin Tsai,
Sheng-Chi Yang,
Lu-An Lin,
Yi-Hsiu Lee,
Hirofumi Ohashi,
Naoyuki Kubota,
Nan Shuo
Abstract:
This paper presents a semantic brain computer interface (BCI) agent with particle swarm optimization (PSO) based on a Fuzzy Markup Language (FML) for Go learning and prediction applications. Additionally, we also establish an Open Go Darkforest (OGD) cloud platform with Facebook AI research (FAIR) open source Darkforest and ELF OpenGo AI bots. The Japanese robot Palro will simultaneously predict t…
▽ More
This paper presents a semantic brain computer interface (BCI) agent with particle swarm optimization (PSO) based on a Fuzzy Markup Language (FML) for Go learning and prediction applications. Additionally, we also establish an Open Go Darkforest (OGD) cloud platform with Facebook AI research (FAIR) open source Darkforest and ELF OpenGo AI bots. The Japanese robot Palro will simultaneously predict the move advantage in the board game Go to the Go players for reference or learning. The proposed semantic BCI agent operates efficiently by the human-based BCI data from their brain waves and machine-based game data from the prediction of the OGD cloud platform for optimizing the parameters between humans and machines. Experimental results show that the proposed human and smart machine co-learning mechanism performs favorably. We hope to provide students with a better online learning environment, combining different kinds of handheld devices, robots, or computer equipment, to achieve a desired and intellectual learning goal in the future.
△ Less
Submitted 9 January, 2019;
originally announced January 2019.
-
Extraction of SSVEPs-based Inherent Fuzzy Entropy Using a Wearable Headband EEG in Migraine Patients
Authors:
Zehong Cao,
Chin-Teng Lin,
Kuan-Lin Lai,
Li-Wei Ko,
Jung-Tai King,
Jong-Ling Fuh,
Shuu-Jiun Wang
Abstract:
Inherent fuzzy entropy is an objective measurement of electroencephalography (EEG) complexity, reflecting the robustness of brain systems. In this study, we present a novel application of multi-scale relative inherent fuzzy entropy using repetitive steady-state visual evoked potentials (SSVEPs) to investigate EEG complexity change between two migraine phases, i.e. inter-ictal (baseline) and pre-ic…
▽ More
Inherent fuzzy entropy is an objective measurement of electroencephalography (EEG) complexity, reflecting the robustness of brain systems. In this study, we present a novel application of multi-scale relative inherent fuzzy entropy using repetitive steady-state visual evoked potentials (SSVEPs) to investigate EEG complexity change between two migraine phases, i.e. inter-ictal (baseline) and pre-ictal (before migraine attacks) phases. We used a wearable headband EEG device with O1, Oz, O2 and Fpz electrodes to collect EEG signals from 80 participants (40 migraine patients and 40 healthy controls [HCs]) under the following two conditions: during resting state and SSVEPs with five 15-Hz photic stimuli. We found a significant enhancement in occipital EEG entropy with increasing stimulus times in both HCs and patients in the inter-ictal phase but a reverse trend in patients in the pre-ictal phase. In the 1st SSVEP , occipital EEG entropy of the HCs was significantly higher than that of patents in the pre-ictal phase (FDR-adjusted p < 0.05). Regarding the transitional variance of EEG entropy between the 1st and 5th SSVEPs, patients in the pre-ictal phase exhibited significantly lower values than patients in the inter-ictal phase (FDR-adjusted p < 0.05). Furthermore, in the classification model, the AdaBoost ensemble learning showed an accuracy of 81% and AUC of 0.87 for classifying inter-ictal and pre-ictal phases. In contrast, there were no differences in EEG entropy among groups or sessions by using other competing entropy models, including approximate entropy, sample entropy and fuzzy entropy on the same dataset. In conclusion, inherent fuzzy entropy offers novel applications in visual stimulus environments and may have the potential to provide a pre-ictal alert to migraine patients.
△ Less
Submitted 20 September, 2018; v1 submitted 18 September, 2018;
originally announced September 2018.
-
Human and Smart Machine Co-Learning with Brain Computer Interface
Authors:
Chang-Shing Lee,
Mei-Hui Wang,
Li-Wei Ko,
Naoyuki Kubota,
Lu-An Lin,
Shinya Kitaoka,
Yu-Te Wang,
Shun-Feng Su
Abstract:
Machine learning has become a very popular approach for cybernetics systems, and it has always been considered important research in the Computational Intelligence area. Nevertheless, when it comes to smart machines, it is not just about the methodologies. We need to consider systems and cybernetics as well as include human in the loop. The purpose of this article is as follows: (1) To integrate t…
▽ More
Machine learning has become a very popular approach for cybernetics systems, and it has always been considered important research in the Computational Intelligence area. Nevertheless, when it comes to smart machines, it is not just about the methodologies. We need to consider systems and cybernetics as well as include human in the loop. The purpose of this article is as follows: (1) To integrate the open source Facebook AI Research (FAIR) DarkForest program of Facebook with Item Response Theory (IRT), to the new open learning system, namely, DDF learning system; (2) To integrate DDF Go with Robot namely Robotic DDF Go system; (3) To invite the professional Go players to attend the activity to play Go games on site with a smart machine. The research team will apply this technology to education, such as, playing games to enhance the children concentration on learning mathematics, languages, and other topics. With the detected brainwaves, the robot will be able to speak some words that are very much to the point for the students and to assist the teachers in classroom in the future.
△ Less
Submitted 19 February, 2018;
originally announced February 2018.
-
Cortical Brain Computer Interface for Closed-Loop Deep Brain Stimulation
Authors:
Jeffrey A. Herron,
Margaret C. Thompson,
Timothy Brown,
Howard J. Chizeck,
Jeffrey G. Ojemann,
Andrew L. Ko
Abstract:
Essential Tremor is the most common neurological movement disorder. This progressive disease causes uncontrollable rhythmic motions -most often affecting the patient's dominant upper extremity- that occur during volitional movement and make it difficult for the patient to perform everyday tasks. Medication may also become ineffective as the disorder progresses. For many patients, deep brain stimul…
▽ More
Essential Tremor is the most common neurological movement disorder. This progressive disease causes uncontrollable rhythmic motions -most often affecting the patient's dominant upper extremity- that occur during volitional movement and make it difficult for the patient to perform everyday tasks. Medication may also become ineffective as the disorder progresses. For many patients, deep brain stimulation (DBS) of the thalamus is an effective means of treating this condition when medication fails. In current use, however, clinicians set the patient's stimulator to apply stimulation at all times- whether it is needed or not. This practice leads to excess power use, and more rapid depletion of batteries that require surgical replacement. In the work described here, for the first time, neural sensing of movement (using chronically-implanted cortical electrodes) is used to enable or disable stimulation for tremor. Therapeutic stimulation is delivered only when the patient is actively using their effected limb, thereby reducing the total stimulation applied, and potentially extending the lifetime of surgically-implanted batteries. This work, which involves both implanted and external subsystems, paves the way for the future fully-implanted closed-loop deep brain stimulators.
△ Less
Submitted 1 June, 2017; v1 submitted 4 December, 2016;
originally announced December 2016.
-
Understanding Repository Growth at the University of North Texas: A Case Study
Authors:
Mark Phillips,
Lauren Ko
Abstract:
Over the past decade the University of North Texas Libraries (UNTL) has developed a sizable digital library infrastructure for use in carrying out its core mission to the students, faculty, staff and associated communities of the university. This repository of content offers countless research possibilities for end users across the Internet when it is discovered and used in research, scholarship,…
▽ More
Over the past decade the University of North Texas Libraries (UNTL) has developed a sizable digital library infrastructure for use in carrying out its core mission to the students, faculty, staff and associated communities of the university. This repository of content offers countless research possibilities for end users across the Internet when it is discovered and used in research, scholarship, entertainment, and lifelong learning. The characteristics of the repository itself provide insight into the workings of a modern digital library infrastructure, how it was created, how often it is updated, or how often it is modified. In that vein, the authors created a dataset comprised of information extracted from the UNT Libraries' archival repository Coda and analyzed this dataset in order to demonstrate the value and insights that can be gained from sharing repository characteristics more broadly. This case study presents the findings from an analysis of this dataset.
△ Less
Submitted 2 July, 2014;
originally announced July 2014.
-
From Linked Data to Relevant Data -- Time is the Essence
Authors:
Markus Kirchberg,
Ryan K L Ko,
Bu Sung Lee
Abstract:
The Semantic Web initiative puts emphasis not primarily on putting data on the Web, but rather on creating links in a way that both humans and machines can explore the Web of data. When such users access the Web, they leave a trail as Web servers maintain a history of requests. Web usage mining approaches have been studied since the beginning of the Web given the log's huge potential for purposes…
▽ More
The Semantic Web initiative puts emphasis not primarily on putting data on the Web, but rather on creating links in a way that both humans and machines can explore the Web of data. When such users access the Web, they leave a trail as Web servers maintain a history of requests. Web usage mining approaches have been studied since the beginning of the Web given the log's huge potential for purposes such as resource annotation, personalization, forecasting etc. However, the impact of any such efforts has not really gone beyond generating statistics detailing who, when, and how Web pages maintained by a Web server were visited.
△ Less
Submitted 25 March, 2011;
originally announced March 2011.
-
Scaling and chaos in periodic approximations to the two-dimensional Ising spin glass
Authors:
David A Huse,
Lee-Fen Ko
Abstract:
We approximate a 2D Ising spin glass by tiling an infinite square lattice with large identical unit cells. The interactions within the unit cell are random. Each such sample shows one or more critical points. We examine the scaling of the critical temperatures with unit cell size. Due to chaos, the correlations between unit cells can change sign with changing temperature. We also examine the sca…
▽ More
We approximate a 2D Ising spin glass by tiling an infinite square lattice with large identical unit cells. The interactions within the unit cell are random. Each such sample shows one or more critical points. We examine the scaling of the critical temperatures with unit cell size. Due to chaos, the correlations between unit cells can change sign with changing temperature. We also examine the scaling of this chaos. This chaos causes many samples to have multiple phase transitions, because the interaction between adjacent unit cells changes sign within the ordered phases.
△ Less
Submitted 25 July, 1997;
originally announced July 1997.