-
Exploring Quantum Active Learning for Materials Design and Discovery
Authors:
Maicon Pierre Lourenço,
Hadi Zadeh-Haghighi,
Jiří Hostaš,
Mosayeb Naseri,
Daya Gaur,
Christoph Simon,
Dennis R. Salahub
Abstract:
The meeting of artificial intelligence (AI) and quantum computing is already a reality; quantum machine learning (QML) promises the design of better regression models. In this work, we extend our previous studies of materials discovery using classical active learning (AL), which showed remarkable economy of data, to explore the use of quantum algorithms within the AL framework (QAL) as implemented…
▽ More
The meeting of artificial intelligence (AI) and quantum computing is already a reality; quantum machine learning (QML) promises the design of better regression models. In this work, we extend our previous studies of materials discovery using classical active learning (AL), which showed remarkable economy of data, to explore the use of quantum algorithms within the AL framework (QAL) as implemented in the MLChem4D and QMLMaterials codes. The proposed QAL uses quantum support vector regressor (QSVR) or a quantum Gaussian process regressor (QGPR) with various quantum kernels and different feature maps. Data sets include perovskite properties (piezoelectric coefficient, band gap, energy storage) and the structure optimization of a doped nanoparticle (3Al@Si11) chosen to compare with classical AL results. Our results revealed that the QAL method improved the searches in most cases, but not all, seemingly correlated with the roughness of the data. QAL has the potential of finding optimum solutions, within chemical space, in materials science and elsewhere in chemistry.
△ Less
Submitted 26 July, 2024;
originally announced July 2024.
-
Exploring pathways to forming twin stars
Authors:
Mahdi Naseri,
Gabriele Bozzola,
Vasileios Paschalidis
Abstract:
A viable model for the dense matter equation of state above the nuclear saturation density includes a hadron-to-quark phase transition at densities relevant to compact objects. In this case, stable hybrid hadron-quark stars can arise. An even more interesting scenario is one where the hadron-to-quark phase transition results in the emergence of a third branch of stable compact objects (in addition…
▽ More
A viable model for the dense matter equation of state above the nuclear saturation density includes a hadron-to-quark phase transition at densities relevant to compact objects. In this case, stable hybrid hadron-quark stars can arise. An even more interesting scenario is one where the hadron-to-quark phase transition results in the emergence of a third branch of stable compact objects (in addition to white dwarfs and neutron stars). Inherent to the presence of a third family of compact stars is the existence of twin stars - hybrid stars with the same mass as the corresponding neutron stars, but with smaller radii. Interestingly, the neutron star-twin star scenario is consistent with GW170817. If twin stars exist in nature, it raises a question about the mechanism that leads to their formation. Here, we explore gravitational collapse as a pathway to the formation of low-mass twin stars. We perform fully general relativistic simulations of the collapse of a stellar iron core, modeled as a cold degenerate gas, to investigate whether the end product is a neutron star or a twin star. Our simulations show that even with unrealistically large perturbations in the initial conditions, the core bounces well below the hadron-to-quark phase transition density, if the initial total rest mass is in the twin star range. Following cooling, these configurations produce neutron stars. We find that twin stars can potentially form due to mass loss, e.g., through winds, from a slightly more massive hybrid star that was initially produced in the collapse of a more massive core or if the maximum neutron star mass is below the Chandrasekhar mass limit. The challenge in producing twin stars in gravitational collapse, in conjunction with the fine-tuning required because of their narrow mass range, suggests the rarity of twin stars in nature.
△ Less
Submitted 19 August, 2024; v1 submitted 21 June, 2024;
originally announced June 2024.
-
Generated Contents Enrichment
Authors:
Mahdi Naseri,
Jiayan Qiu,
Zhou Wang
Abstract:
In this paper, we investigate a novel artificial intelligence generation task, termed as generated contents enrichment (GCE). Different from conventional artificial intelligence contents generation task that enriches the given textual description implicitly with limited semantics for generating visually real content, our proposed GCE strives to perform content enrichment explicitly on both the vis…
▽ More
In this paper, we investigate a novel artificial intelligence generation task, termed as generated contents enrichment (GCE). Different from conventional artificial intelligence contents generation task that enriches the given textual description implicitly with limited semantics for generating visually real content, our proposed GCE strives to perform content enrichment explicitly on both the visual and textual domain, from which the enriched contents are visually real, structurally reasonable, and semantically abundant. Towards to solve GCE, we propose a deep end-to-end method that explicitly explores the semantics and inter-semantic relationships during the enrichment. Specifically, we first model the input description as a semantic graph, wherein each node represents an object and each edge corresponds to the inter-object relationship. We then adopt Graph Convolutional Networks on top of the input scene description to predict the enriching objects and their relationships with the input objects. Finally, the enriched description is fed into an image synthesis model to carry out the visual contents generation. Our experiments conducted on the Visual Genome dataset exhibit promising and visually plausible results.
△ Less
Submitted 11 June, 2024; v1 submitted 6 May, 2024;
originally announced May 2024.
-
Coherence generation with Hamiltonians
Authors:
Manfredi Scalici,
Moein Naseri,
Alexander Streltsov
Abstract:
We explore methods to generate quantum coherence through unitary evolutions, by introducing and studying the coherence generating capacity of Hamiltonians. This quantity is defined as the maximum derivative of coherence that can be achieved by a Hamiltonian. By adopting the relative entropy of coherence as our figure of merit, we evaluate the maximal coherence generating capacity with the constrai…
▽ More
We explore methods to generate quantum coherence through unitary evolutions, by introducing and studying the coherence generating capacity of Hamiltonians. This quantity is defined as the maximum derivative of coherence that can be achieved by a Hamiltonian. By adopting the relative entropy of coherence as our figure of merit, we evaluate the maximal coherence generating capacity with the constraint of a bounded Hilbert-Schmidt norm for the Hamiltonian. Our investigation yields closed-form expressions for both Hamiltonians and quantum states that induce the maximal derivative of coherence under these conditions. Specifically, for qubit systems, we solve this problem comprehensively for any given Hamiltonian, identifying the quantum states that lead to the largest coherence derivative induced by the Hamiltonian. Our investigation enables a precise identification of conditions under which quantum coherence is optimally enhanced, offering valuable insights for the manipulation and control of quantum coherence in quantum systems.
△ Less
Submitted 27 February, 2024;
originally announced February 2024.
-
ExGRG: Explicitly-Generated Relation Graph for Self-Supervised Representation Learning
Authors:
Mahdi Naseri,
Mahdi Biparva
Abstract:
Self-supervised Learning (SSL) has emerged as a powerful technique in pre-training deep learning models without relying on expensive annotated labels, instead leveraging embedded signals in unlabeled data. While SSL has shown remarkable success in computer vision tasks through intuitive data augmentation, its application to graph-structured data poses challenges due to the semantic-altering and co…
▽ More
Self-supervised Learning (SSL) has emerged as a powerful technique in pre-training deep learning models without relying on expensive annotated labels, instead leveraging embedded signals in unlabeled data. While SSL has shown remarkable success in computer vision tasks through intuitive data augmentation, its application to graph-structured data poses challenges due to the semantic-altering and counter-intuitive nature of graph augmentations. Addressing this limitation, this paper introduces a novel non-contrastive SSL approach to Explicitly Generate a compositional Relation Graph (ExGRG) instead of relying solely on the conventional augmentation-based implicit relation graph. ExGRG offers a framework for incorporating prior domain knowledge and online extracted information into the SSL invariance objective, drawing inspiration from the Laplacian Eigenmap and Expectation-Maximization (EM). Employing an EM perspective on SSL, our E-step involves relation graph generation to identify candidates to guide the SSL invariance objective, and M-step updates the model parameters by integrating the derived relational information. Extensive experimentation on diverse node classification datasets demonstrates the superiority of our method over state-of-the-art techniques, affirming ExGRG as an effective adoption of SSL for graph representation learning.
△ Less
Submitted 4 June, 2024; v1 submitted 9 February, 2024;
originally announced February 2024.
-
Starlit: Privacy-Preserving Federated Learning to Enhance Financial Fraud Detection
Authors:
Aydin Abadi,
Bradley Doyle,
Francesco Gini,
Kieron Guinamard,
Sasi Kumar Murakonda,
Jack Liddell,
Paul Mellor,
Steven J. Murdoch,
Mohammad Naseri,
Hector Page,
George Theodorakopoulos,
Suzanne Weller
Abstract:
Federated Learning (FL) is a data-minimization approach enabling collaborative model training across diverse clients with local data, avoiding direct data exchange. However, state-of-the-art FL solutions to identify fraudulent financial transactions exhibit a subset of the following limitations. They (1) lack a formal security definition and proof, (2) assume prior freezing of suspicious customers…
▽ More
Federated Learning (FL) is a data-minimization approach enabling collaborative model training across diverse clients with local data, avoiding direct data exchange. However, state-of-the-art FL solutions to identify fraudulent financial transactions exhibit a subset of the following limitations. They (1) lack a formal security definition and proof, (2) assume prior freezing of suspicious customers' accounts by financial institutions (limiting the solutions' adoption), (3) scale poorly, involving either $O(n^2)$ computationally expensive modular exponentiation (where $n$ is the total number of financial institutions) or highly inefficient fully homomorphic encryption, (4) assume the parties have already completed the identity alignment phase, hence excluding it from the implementation, performance evaluation, and security analysis, and (5) struggle to resist clients' dropouts. This work introduces Starlit, a novel scalable privacy-preserving FL mechanism that overcomes these limitations. It has various applications, such as enhancing financial fraud detection, mitigating terrorism, and enhancing digital health. We implemented Starlit and conducted a thorough performance analysis using synthetic data from a key player in global financial transactions. The evaluation indicates Starlit's scalability, efficiency, and accuracy.
△ Less
Submitted 22 January, 2024; v1 submitted 19 January, 2024;
originally announced January 2024.
-
Local Purity Distillation in Quantum Systems: Exploring the Complementarity Between Purity and Entanglement
Authors:
Ray Ganardi,
Piotr Masajada,
Moein Naseri,
Alexander Streltsov
Abstract:
Quantum thermodynamics and quantum entanglement represent two pivotal quantum resource theories with significant relevance in quantum information science. Despite their importance, the intricate relationship between these two theories is still not fully understood. Here, we delve into the interplay between entanglement and thermodynamics, particularly in the context of local cooling processes. We…
▽ More
Quantum thermodynamics and quantum entanglement represent two pivotal quantum resource theories with significant relevance in quantum information science. Despite their importance, the intricate relationship between these two theories is still not fully understood. Here, we delve into the interplay between entanglement and thermodynamics, particularly in the context of local cooling processes. We introduce and develop the framework of Gibbs-preserving local operations and classical communication. Within this framework, we explore strategies enabling remote parties to effectively cool their local systems to the ground state. Our analysis is centered on scenarios where only a single copy of a quantum state is accessible, with the ideal performance defined by the highest possible fidelity to the ground state achievable under these constraints. We focus on systems with fully degenerate local Hamiltonians, where local cooling aligns with the extraction of local purity. In this context, we establish a powerful link between the efficiency of local purity extraction and the degree of entanglement present in the system, a concept we define as purity-entanglement complementarity. Moreover, we demonstrate that in many pertinent scenarios, the optimal performance can be precisely determined through semidefinite programming techniques. Our findings open doors to various practical applications, including techniques for entanglement detection and estimation. We demonstrate this by evaluating the amount of entanglement for a class of bound entangled states.
△ Less
Submitted 29 May, 2024; v1 submitted 20 November, 2023;
originally announced November 2023.
-
Scalable noisy quantum circuits for biased-noise qubits
Authors:
Marco Fellous-Asiani,
Moein Naseri,
Chandan Datta,
Alexander Streltsov,
Michał Oszmaniec
Abstract:
In this work, we consider biased-noise qubits affected only by bit-flip errors, which is motivated by existing systems of stabilized cat qubits. This property allows us to design a class of noisy Hadamard-tests involving entangling and certain non-Clifford gates, which can be conducted reliably with only a polynomial overhead in algorithm repetitions. On the flip side we also found classical algor…
▽ More
In this work, we consider biased-noise qubits affected only by bit-flip errors, which is motivated by existing systems of stabilized cat qubits. This property allows us to design a class of noisy Hadamard-tests involving entangling and certain non-Clifford gates, which can be conducted reliably with only a polynomial overhead in algorithm repetitions. On the flip side we also found classical algorithms able to efficiently simulate both the noisy and noiseless versions of our specific variants of Hadamard test. We propose to use these algorithms as a simple benchmark of the biasness of the noise at the scale of large circuits. The bias being checked on a full computational task, it makes our benchmark sensitive to crosstalk or time-correlated errors, which are usually invisible from individual gate tomography. For realistic noise models, phase-flip will not be negligible, but in the Pauli-Twirling approximation, we show that our benchmark could check the correctness of circuits containing up to $10^6$ gates, several orders of magnitudes larger than circuits not exploiting a noise-bias. Our benchmark is applicable for an arbitrary noise-bias, beyond Pauli models.
△ Less
Submitted 19 August, 2024; v1 submitted 3 May, 2023;
originally announced May 2023.
-
BadVFL: Backdoor Attacks in Vertical Federated Learning
Authors:
Mohammad Naseri,
Yufei Han,
Emiliano De Cristofaro
Abstract:
Federated learning (FL) enables multiple parties to collaboratively train a machine learning model without sharing their data; rather, they train their own model locally and send updates to a central server for aggregation. Depending on how the data is distributed among the participants, FL can be classified into Horizontal (HFL) and Vertical (VFL). In VFL, the participants share the same set of t…
▽ More
Federated learning (FL) enables multiple parties to collaboratively train a machine learning model without sharing their data; rather, they train their own model locally and send updates to a central server for aggregation. Depending on how the data is distributed among the participants, FL can be classified into Horizontal (HFL) and Vertical (VFL). In VFL, the participants share the same set of training instances but only host a different and non-overlapping subset of the whole feature space. Whereas in HFL, each participant shares the same set of features while the training set is split into locally owned training data subsets.
VFL is increasingly used in applications like financial fraud detection; nonetheless, very little work has analyzed its security. In this paper, we focus on robustness in VFL, in particular, on backdoor attacks, whereby an adversary attempts to manipulate the aggregate model during the training process to trigger misclassifications. Performing backdoor attacks in VFL is more challenging than in HFL, as the adversary i) does not have access to the labels during training and ii) cannot change the labels as she only has access to the feature embeddings. We present a first-of-its-kind clean-label backdoor attack in VFL, which consists of two phases: a label inference and a backdoor phase. We demonstrate the effectiveness of the attack on three different datasets, investigate the factors involved in its success, and discuss countermeasures to mitigate its impact.
△ Less
Submitted 23 August, 2023; v1 submitted 18 April, 2023;
originally announced April 2023.
-
An Observer-Based Key Agreement Scheme for Remotely Controlled Mobile Robots
Authors:
Amir Mohammad Naseri,
Walter Lucia,
Amr Youssef
Abstract:
Remotely controlled mobile robots are important examples of Cyber-Physical Systems (CPSs). Recently, these robots are being deployed in many safety critical applications. Therefore, ensuring their cyber-security is of paramount importance. Different control schemes that have been proposed to secure such systems against sophisticated cyber-attacks require the exchange of secret messages between the…
▽ More
Remotely controlled mobile robots are important examples of Cyber-Physical Systems (CPSs). Recently, these robots are being deployed in many safety critical applications. Therefore, ensuring their cyber-security is of paramount importance. Different control schemes that have been proposed to secure such systems against sophisticated cyber-attacks require the exchange of secret messages between their smart actuators and the remote controller. Thus, these schemes require pre-shared secret keys, or an established Public Key Infrastructure (PKI) that allows for key agreement. Such cryptographic approaches might not always be suitable for the deployment environments of such remotely mobile robots. To address this problem, in this paper, we consider a control theoretic approach for establishing a secret key between the remotely controlled robot and the networked controller without resorting to traditional cryptographic techniques. Our key agreement scheme leverages a nonlinear unknown input observer and an error correction code mechanism to allow the robot to securely agree on a secret key with its remote controller. To validate the proposed scheme, we implement it using a Khepera-IV differential drive robot and evaluate its efficiency and the additional control cost acquired by it. Our experimental results confirm the effectiveness of the proposed key establishment scheme.
△ Less
Submitted 23 October, 2023; v1 submitted 8 March, 2023;
originally announced March 2023.
-
Quantum Speed Limit for Change of Basis
Authors:
Moein Naseri,
Chiara Macchiavello,
Dagmar Bruß,
Paweł Horodecki,
Alexander Streltsov
Abstract:
Quantum speed limits provide ultimate bounds on the time required to transform one quantum state into another. Here, we extend the notion of quantum speed limits to collections of quantum states, investigating the time for converting a basis of states into an unbiased one. We provide tight bounds for systems of dimension smaller than 5, and general bounds for multi-qubit systems and Hilbert space…
▽ More
Quantum speed limits provide ultimate bounds on the time required to transform one quantum state into another. Here, we extend the notion of quantum speed limits to collections of quantum states, investigating the time for converting a basis of states into an unbiased one. We provide tight bounds for systems of dimension smaller than 5, and general bounds for multi-qubit systems and Hilbert space dimension $d$. For two-qubit systems, we show that the fastest transformation implements two Hadamards and a swap of the qubits simultaneously. We further prove that for qutrit systems the evolution time depends on the particular type of the unbiased basis. We also investigate speed limits for coherence generation, providing the minimal time to establish a certain amount of coherence with a unitary evolution.
△ Less
Submitted 23 December, 2022;
originally announced December 2022.
-
Cerberus: Exploring Federated Prediction of Security Events
Authors:
Mohammad Naseri,
Yufei Han,
Enrico Mariconti,
Yun Shen,
Gianluca Stringhini,
Emiliano De Cristofaro
Abstract:
Modern defenses against cyberattacks increasingly rely on proactive approaches, e.g., to predict the adversary's next actions based on past events. Building accurate prediction models requires knowledge from many organizations; alas, this entails disclosing sensitive information, such as network structures, security postures, and policies, which might often be undesirable or outright impossible. I…
▽ More
Modern defenses against cyberattacks increasingly rely on proactive approaches, e.g., to predict the adversary's next actions based on past events. Building accurate prediction models requires knowledge from many organizations; alas, this entails disclosing sensitive information, such as network structures, security postures, and policies, which might often be undesirable or outright impossible. In this paper, we explore the feasibility of using Federated Learning (FL) to predict future security events. To this end, we introduce Cerberus, a system enabling collaborative training of Recurrent Neural Network (RNN) models for participating organizations. The intuition is that FL could potentially offer a middle-ground between the non-private approach where the training data is pooled at a central server and the low-utility alternative of only training local models. We instantiate Cerberus on a dataset obtained from a major security company's intrusion prevention product and evaluate it vis-a-vis utility, robustness, and privacy, as well as how participants contribute to and benefit from the system. Overall, our work sheds light on both the positive aspects and the challenges of using FL for this task and paves the way for deploying federated approaches to predictive security.
△ Less
Submitted 7 September, 2022;
originally announced September 2022.
-
Bayesian Estimation of Differential Privacy
Authors:
Santiago Zanella-Béguelin,
Lukas Wutschitz,
Shruti Tople,
Ahmed Salem,
Victor Rühle,
Andrew Paverd,
Mohammad Naseri,
Boris Köpf,
Daniel Jones
Abstract:
Algorithms such as Differentially Private SGD enable training machine learning models with formal privacy guarantees. However, there is a discrepancy between the protection that such algorithms guarantee in theory and the protection they afford in practice. An emerging strand of work empirically estimates the protection afforded by differentially private training as a confidence interval for the p…
▽ More
Algorithms such as Differentially Private SGD enable training machine learning models with formal privacy guarantees. However, there is a discrepancy between the protection that such algorithms guarantee in theory and the protection they afford in practice. An emerging strand of work empirically estimates the protection afforded by differentially private training as a confidence interval for the privacy budget $\varepsilon$ spent on training a model. Existing approaches derive confidence intervals for $\varepsilon$ from confidence intervals for the false positive and false negative rates of membership inference attacks. Unfortunately, obtaining narrow high-confidence intervals for $ε$ using this method requires an impractically large sample size and training as many models as samples. We propose a novel Bayesian method that greatly reduces sample size, and adapt and validate a heuristic to draw more than one sample per trained model. Our Bayesian method exploits the hypothesis testing interpretation of differential privacy to obtain a posterior for $\varepsilon$ (not just a confidence interval) from the joint posterior of the false positive and false negative rates of membership inference attacks. For the same sample size and confidence, we derive confidence intervals for $\varepsilon$ around 40% narrower than prior work. The heuristic, which we adapt from label-only DP, can be used to further reduce the number of trained models needed to get enough samples by up to 2 orders of magnitude.
△ Less
Submitted 15 June, 2022; v1 submitted 10 June, 2022;
originally announced June 2022.
-
Entanglement and coherence in Bernstein-Vazirani algorithm
Authors:
Moein Naseri,
Tulja Varun Kondra,
Suchetana Goswami,
Marco Fellous-Asiani,
Alexander Streltsov
Abstract:
Quantum algorithms allow to outperform their classical counterparts in various tasks, most prominent example being Shor's algorithm for efficient prime factorization on a quantum computer. It is clear that one of the reasons for the speedup is the superposition principle of quantum mechanics, which allows a quantum processor to be in a superposition of different states at the same time. While such…
▽ More
Quantum algorithms allow to outperform their classical counterparts in various tasks, most prominent example being Shor's algorithm for efficient prime factorization on a quantum computer. It is clear that one of the reasons for the speedup is the superposition principle of quantum mechanics, which allows a quantum processor to be in a superposition of different states at the same time. While such superposition can lead to entanglement across different qubits of the processors, there also exists quantum algorithms which outperform classical ones using superpositions of individual qubits without entangling them. As an example, the Bernstein-Vazirani algorithm allows one to determine a bit string encoded into an oracle. While the classical version of the algorithm requires multiple calls of the oracle to learn the bit string, a single query of the oracle is enough in the quantum case. In this Letter, we analyze in detail the quantum resources in the Bernstein-Vazirani algorithm. For this, we introduce and study its probabilistic version, where the goal is to guess the bit string after a single call of the oracle. We show that in the absence of entanglement, the performance of the algorithm is directly related to the amount of quantum coherence in the initial state. We further demonstrate that a large amount of entanglement in the initial state prevents the algorithm from achieving optimal performance. We also apply our methods to quantum computation with mixed states, proving that pseudopure states achieve optimal performance for a given purity in the Bernstein-Vazirani algorithm. We further investigate quantum resources in the one clean qubit model, showing that the model can exhibit speedup over any known classical algorithm even with arbitrary little amount of multipartite entanglement, general quantum correlations, and coherence.
△ Less
Submitted 26 May, 2022;
originally announced May 2022.
-
Response to "Comment on 'A novel two-dimensional boron-carbon-nitride (BCN) monolayer: A first-principles insight [J. Appl. Phys. 2021, 130, 114301]'"
Authors:
Asadollah Bafekry,
Mosayeb Naseri,
Mohamed M. Fadlallah,
Ismaeil Abdolhosseini Sarsari,
Mehrdad faraji,
Abbas bagheri khatibani,
Mitra Ghergherehchi,
Daniela Gogova
Abstract:
Recently, reported a comments on the our paper [JAP21-AR-03574R].. For clarification, we applied the fingerprint theory to examine the similarity between the distinct structures. The fingerprint function is a crystal structure descriptor, an 1D-function related to the pair correlation function and diffraction patterns. It does not depend on absolute atomic coordinates, but only on interatomic dist…
▽ More
Recently, reported a comments on the our paper [JAP21-AR-03574R].. For clarification, we applied the fingerprint theory to examine the similarity between the distinct structures. The fingerprint function is a crystal structure descriptor, an 1D-function related to the pair correlation function and diffraction patterns. It does not depend on absolute atomic coordinates, but only on interatomic distances. Small deviations in atomic positions will influence the fingerprints only slightly [1-3]. Fingerprint theory allows quantification of the degree of order and complexity of a crystal structure.
△ Less
Submitted 14 August, 2023; v1 submitted 7 May, 2022;
originally announced May 2022.
-
Primordial Black Hole Merger Rate in Self-Interacting Dark Matter Halo Models
Authors:
Saeed Fakhry,
Mahdi Naseri,
Javad T. Firouzjaee,
Mehrdad Farhoudi
Abstract:
We study the merger rate of primordial black holes (PBHs) in self-interacting dark matter (SIDM) halo models. To explore a numerical description for the density profile of SIDM halo models, we use the result of a previously performed simulation for SIDM halo models with $σ/m=10~{\rm cm^{2}g^{-1}}$. We also propose a concentration-mass-time relation that can explain the evolution of the halo densit…
▽ More
We study the merger rate of primordial black holes (PBHs) in self-interacting dark matter (SIDM) halo models. To explore a numerical description for the density profile of SIDM halo models, we use the result of a previously performed simulation for SIDM halo models with $σ/m=10~{\rm cm^{2}g^{-1}}$. We also propose a concentration-mass-time relation that can explain the evolution of the halo density profile related to SIDM models. Furthermore, we investigate the encounter condition of PBHs that may have been randomly distributed in the medium of dark matter halos. Under these assumptions, we calculate the merger rate of PBHs within each halo considering SIDM halo models and compare the results with that obtained for cold dark matter (CDM) halo models. To do this, we employ the definition of the time after halo virialization as a function of halo mass. We indicate that SIDM halo models for $f_{\rm PBH}>0.32$ can generate sufficient PBH mergers in such a way that those exceed the one resulted from CDM halo models. By considering the spherical-collapse halo mass function, we obtain similar results for the cumulative merger rate of PBHs. Moreover, we calculate the redshift evolution of the PBH total merger rate. To determine a constraint on the PBH abundance, we study the merger rate of PBHs in terms of their fraction and masses and compare those with the black hole merger rate estimated by the Advanced LIGO (aLIGO)-Advanced Virgo (aVirgo) detectors during the third observing run. The results demonstrate that within the context of SIDM halo models, the merger rate of $10~M_{\odot}-10~M_{\odot}$ events can potentially fall within the aLIGO-aVirgo window. We also estimate a relation between the fraction of PBHs and their masses, which is well consistent with our findings.
△ Less
Submitted 25 July, 2022; v1 submitted 11 June, 2021;
originally announced June 2021.
-
On Securing Cloud-hosted Cyber-physical Systems Using Trusted Execution Environments
Authors:
Amir Mohammad Naseri,
Walter Lucia,
Mohammad Mannan,
Amr Youssef
Abstract:
Recently, cloud control systems have gained increasing attention from the research community as a solution to implement networked cyber-physical systems (CPSs). Such an architecture can reduce deployment and maintenance costs albeit at the expense of additional security and privacy concerns. In this paper, first, we discuss state-of-the-art security solutions for cloud control systems and their li…
▽ More
Recently, cloud control systems have gained increasing attention from the research community as a solution to implement networked cyber-physical systems (CPSs). Such an architecture can reduce deployment and maintenance costs albeit at the expense of additional security and privacy concerns. In this paper, first, we discuss state-of-the-art security solutions for cloud control systems and their limitations. Then, we propose a novel control architecture based on Trusted Execution Environments (TEE). We show that such an approach can potentially address major security and privacy issues for cloud-hosted control systems. Finally, we present an implementation setup based on Intel Software Guard Extensions (SGX) and validate its effectiveness on a testbed system.
△ Less
Submitted 31 March, 2021;
originally announced April 2021.
-
Super Interacting Dark Sector: An Improvement on Self-Interacting Dark Matter via Scaling Relations of Galaxy Clusters
Authors:
Mahdi Naseri,
Javad T. Firouzjaee
Abstract:
Self-interacting dark matter is known as one of the most appropriate candidates for dark matter. Due to its excellent success in removing many astrophysical problems, particularly in small scale structure, studying this model has taken on added significance. In this paper, we focus on the results of two previously performed simulations of cluster sized halos with self-interacting dark matter and i…
▽ More
Self-interacting dark matter is known as one of the most appropriate candidates for dark matter. Due to its excellent success in removing many astrophysical problems, particularly in small scale structure, studying this model has taken on added significance. In this paper, we focus on the results of two previously performed simulations of cluster sized halos with self-interacting dark matter and introduce a new function for the density profile of galaxy clusters, which can perfectly describe the result of these simulations. This density profile helps to find a velocity dispersion profile and also a relation between cluster mass and concentration parameter. Using these relations, we investigate two scaling relations of galaxy clusters, namely mass-velocity dispersion and mass-temperature relations. The scaling relations reveal that in the self-interacting dark matter model, halos are more massive than what the standard non-interacting model predicts for any fixed temperature. We also study the mass-temperature relation for a hybrid interacting model, which is a combination of self-interacting dark matter idea with another model of the dark sector in which dark matter particle mass is determined according to its interaction with dark energy. This super interacting dark sector (SIDS) model can change the mass-temperature relation to a modified form that has the same result as a non-interacting model. Finally, we provide quantitative expressions which can describe the constants of this interacting model with the value of cross-section per unit mass of dark matter particles.
△ Less
Submitted 28 October, 2021; v1 submitted 15 November, 2020;
originally announced November 2020.
-
Coherence Based Characterization of Macroscopic Quantumness
Authors:
Moein Naseri,
Sadegh Raeisi
Abstract:
One of the most elusive problems in quantum mechanics is the transition between classical and quantum physics. This problem can be traced back to the Schrödinger's cat. A key element that lies at the center of this problem is the lack of a clear understanding and characterization of macroscopic quantum states. Our understanding of Macroscopic Quantumness relies on states such as the Greenberger-Ho…
▽ More
One of the most elusive problems in quantum mechanics is the transition between classical and quantum physics. This problem can be traced back to the Schrödinger's cat. A key element that lies at the center of this problem is the lack of a clear understanding and characterization of macroscopic quantum states. Our understanding of Macroscopic Quantumness relies on states such as the Greenberger-Horne-Zeilinger(GHZ) or the NOON state. Here we take a first principle approach to this problem. We start from coherence as the key quantity that captures the notion of quantumness and demand the quantumness to be collective and macroscopic. To this end, we introduce macroscopic coherence which is the coherence between macroscopically distinct quantum states. We construct a measure that quantifies how global and collective the coherence of the state is. Our work also provides a first-principle way to derive well-established states like the GHZ and the NOON state as the states that maximize our measure. This new approach paves the way towards a better understanding of the Quantum-to-Classical transition.
△ Less
Submitted 26 October, 2020;
originally announced October 2020.
-
The Effect of Interacting Dark Energy on Mass-Temperature Relation in Galaxy Clusters
Authors:
Mahdi Naseri,
Javad T. Firouzjaee
Abstract:
There are a variety of cosmological models for dark matter and dark energy in which a possible interaction is considered between these two significant components of the universe. We focus on five suggested models of interacting dark matter and dark energy and derive the modified virial theorem for them by developing a previous approach. It provides an opportunity to study the evolution of this mod…
▽ More
There are a variety of cosmological models for dark matter and dark energy in which a possible interaction is considered between these two significant components of the universe. We focus on five suggested models of interacting dark matter and dark energy and derive the modified virial theorem for them by developing a previous approach. It provides an opportunity to study the evolution of this modified virial theorem with time and interacting constants for different interacting models. Then we use this obtained virial condition to investigate the modified mass-temperature relation in galaxy clusters via three various methods. It reveals that the effect of interaction between dark matter and dark energy merely appears in the normalization factor of $M\propto T^{\frac{3}{2}}$. This relation also leads to a new constraint on the constants of interacting models, which only depends on the concentration parameter and density profile of the cluster. Then we use five observational data sets to check some proposed figures for the constants of interaction which have been resulted from other observational constraints. Finally, by fitting the observational results to the modified mass-temperature relation, we obtain values for interacting constants of three models and four specific cases of the two remained models. In agreement with many other observational outcomes, we find that according to observational data for masses and temperatures of the galaxy clusters, energy transfer occurs from dark matter to dark energy in the seven investigated models.
△ Less
Submitted 12 November, 2020; v1 submitted 21 September, 2020;
originally announced September 2020.
-
Local and Central Differential Privacy for Robustness and Privacy in Federated Learning
Authors:
Mohammad Naseri,
Jamie Hayes,
Emiliano De Cristofaro
Abstract:
Federated Learning (FL) allows multiple participants to train machine learning models collaboratively by keeping their datasets local while only exchanging model updates. Alas, this is not necessarily free from privacy and robustness vulnerabilities, e.g., via membership, property, and backdoor attacks. This paper investigates whether and to what extent one can use differential Privacy (DP) to pro…
▽ More
Federated Learning (FL) allows multiple participants to train machine learning models collaboratively by keeping their datasets local while only exchanging model updates. Alas, this is not necessarily free from privacy and robustness vulnerabilities, e.g., via membership, property, and backdoor attacks. This paper investigates whether and to what extent one can use differential Privacy (DP) to protect both privacy and robustness in FL. To this end, we present a first-of-its-kind evaluation of Local and Central Differential Privacy (LDP/CDP) techniques in FL, assessing their feasibility and effectiveness. Our experiments show that both DP variants do d fend against backdoor attacks, albeit with varying levels of protection-utility trade-offs, but anyway more effectively than other robustness defenses. DP also mitigates white-box membership inference attacks in FL, and our work is the first to show it empirically. Neither LDP nor CDP, however, defend against property inference. Overall, our work provides a comprehensive, re-usable measurement methodology to quantify the trade-offs between robustness/privacy and utility in differentially private FL.
△ Less
Submitted 27 May, 2022; v1 submitted 8 September, 2020;
originally announced September 2020.
-
Ergodic Capacity of Triple-Hop All-Optical Amplify-and-Forward Relaying over Free-Space Optical Channels
Authors:
Mohsen Naseri,
Mohammad Taghi Dabiri,
Seyed Mohammad Sajad Sadough
Abstract:
In this paper, we propose a comprehensive research over triple hop all-optical relaying free-space optical (FSO) systems in the presence of all main noise sources including background, thermal and amplified spontaneous emission (ASE) noise and by considering the effect of the optical degree-of- freedom (DoF). Using full CSI relaying, we derive the exact expressions for the noise variance at the de…
▽ More
In this paper, we propose a comprehensive research over triple hop all-optical relaying free-space optical (FSO) systems in the presence of all main noise sources including background, thermal and amplified spontaneous emission (ASE) noise and by considering the effect of the optical degree-of- freedom (DoF). Using full CSI relaying, we derive the exact expressions for the noise variance at the destination. Then, in order to simplify the analytical expressions of full CSI relaying, we also propose and investigate the validity of different approximations over noise variance at the destination. Finally, we evaluate the the performance of considered triple-hop all-optical relaying FSO system in term of ergodic capacity.
△ Less
Submitted 4 October, 2018;
originally announced October 2018.
-
Charge asymmetry measurements in $t\bar{t}$ events at the LHC
Authors:
Mohsen Naseri
Abstract:
An overview of the most recent measurements on top quark charge asymmetry in top quark pair production is presented. The results are obtained using data collected with ATLAS and CMS detectors in proton-proton collisions at centre-of-mass energies of 8 TeV. In these studies, either dileptonic or semileptonic top pair decays are analyzed. All measurements are comparable with the standard model predi…
▽ More
An overview of the most recent measurements on top quark charge asymmetry in top quark pair production is presented. The results are obtained using data collected with ATLAS and CMS detectors in proton-proton collisions at centre-of-mass energies of 8 TeV. In these studies, either dileptonic or semileptonic top pair decays are analyzed. All measurements are comparable with the standard model prediction and no sign of new physics is observed.
△ Less
Submitted 10 March, 2017;
originally announced March 2017.
-
Measurement of the W boson helicity using top pair events at $\sqrt{s}$ = 8 TeV with the CMS detector
Authors:
Mohsen Naseri
Abstract:
This document gives an overview over the recent results on helicity measurement of W boson originated from top pair events. The results are obtained using data collected by the CMS detector at a center-of-mass energy of 8 TeV. The helicity measurements are confronted with the most precise theoretical predictions of the standard model.
This document gives an overview over the recent results on helicity measurement of W boson originated from top pair events. The results are obtained using data collected by the CMS detector at a center-of-mass energy of 8 TeV. The helicity measurements are confronted with the most precise theoretical predictions of the standard model.
△ Less
Submitted 6 March, 2017;
originally announced March 2017.
-
Trapping in irradiated p-on-n silicon sensors at fluences anticipated at the HL-LHC outer tracker
Authors:
W. Adam,
T. Bergauer,
M. Dragicevic,
M. Friedl,
R. Fruehwirth,
M. Hoch,
J. Hrubec,
M. Krammer,
W. Treberspurg,
W. Waltenberger,
S. Alderweireldt,
W. Beaumont,
X. Janssen,
S. Luyckx,
P. Van Mechelen,
N. Van Remortel,
A. Van Spilbeeck,
P. Barria,
C. Caillol,
B. Clerbaux,
G. De Lentdecker,
D. Dobur,
L. Favart,
A. Grebenyuk,
Th. Lenzi
, et al. (663 additional authors not shown)
Abstract:
The degradation of signal in silicon sensors is studied under conditions expected at the CERN High-Luminosity LHC. 200 $μ$m thick n-type silicon sensors are irradiated with protons of different energies to fluences of up to $3 \cdot 10^{15}$ neq/cm$^2$. Pulsed red laser light with a wavelength of 672 nm is used to generate electron-hole pairs in the sensors. The induced signals are used to determi…
▽ More
The degradation of signal in silicon sensors is studied under conditions expected at the CERN High-Luminosity LHC. 200 $μ$m thick n-type silicon sensors are irradiated with protons of different energies to fluences of up to $3 \cdot 10^{15}$ neq/cm$^2$. Pulsed red laser light with a wavelength of 672 nm is used to generate electron-hole pairs in the sensors. The induced signals are used to determine the charge collection efficiencies separately for electrons and holes drifting through the sensor. The effective trapping rates are extracted by comparing the results to simulation. The electric field is simulated using Synopsys device simulation assuming two effective defects. The generation and drift of charge carriers are simulated in an independent simulation based on PixelAV. The effective trapping rates are determined from the measured charge collection efficiencies and the simulated and measured time-resolved current pulses are compared. The effective trapping rates determined for both electrons and holes are about 50% smaller than those obtained using standard extrapolations of studies at low fluences and suggests an improved tracker performance over initial expectations.
△ Less
Submitted 7 May, 2015;
originally announced May 2015.
-
Observation of the rare $B^0_s\toμ^+μ^-$ decay from the combined analysis of CMS and LHCb data
Authors:
The CMS,
LHCb Collaborations,
:,
V. Khachatryan,
A. M. Sirunyan,
A. Tumasyan,
W. Adam,
T. Bergauer,
M. Dragicevic,
J. Erö,
M. Friedl,
R. Frühwirth,
V. M. Ghete,
C. Hartl,
N. Hörmann,
J. Hrubec,
M. Jeitler,
W. Kiesenhofer,
V. Knünz,
M. Krammer,
I. Krätschmer,
D. Liko,
I. Mikulec,
D. Rabady,
B. Rahbaran
, et al. (2807 additional authors not shown)
Abstract:
A joint measurement is presented of the branching fractions $B^0_s\toμ^+μ^-$ and $B^0\toμ^+μ^-$ in proton-proton collisions at the LHC by the CMS and LHCb experiments. The data samples were collected in 2011 at a centre-of-mass energy of 7 TeV, and in 2012 at 8 TeV. The combined analysis produces the first observation of the $B^0_s\toμ^+μ^-$ decay, with a statistical significance exceeding six sta…
▽ More
A joint measurement is presented of the branching fractions $B^0_s\toμ^+μ^-$ and $B^0\toμ^+μ^-$ in proton-proton collisions at the LHC by the CMS and LHCb experiments. The data samples were collected in 2011 at a centre-of-mass energy of 7 TeV, and in 2012 at 8 TeV. The combined analysis produces the first observation of the $B^0_s\toμ^+μ^-$ decay, with a statistical significance exceeding six standard deviations, and the best measurement of its branching fraction so far. Furthermore, evidence for the $B^0\toμ^+μ^-$ decay is obtained with a statistical significance of three standard deviations. The branching fraction measurements are statistically compatible with SM predictions and impose stringent constraints on several theories beyond the SM.
△ Less
Submitted 17 August, 2015; v1 submitted 17 November, 2014;
originally announced November 2014.
-
Design, fabrication and characterization of the first AC-coupled silicon microstrip sensors in India
Authors:
T. Aziz,
S. R. Chendvankar,
G. B. Mohanty,
M. R. Patil,
K. K. Rao,
Y. R. Rani,
Y. P. P. Rao,
H. Behnamian,
S. Mersi,
M. Naseri
Abstract:
This paper reports the design, fabrication and characterization of single-sided silicon microstrip sensors with integrated biasing resistors and coupling capacitors, produced for the first time in India. We have first developed a prototype sensor on a four-inch wafer. After finding suitable test procedures for characterizing these AC coupled sensors, we have fine-tuned various process parameters i…
▽ More
This paper reports the design, fabrication and characterization of single-sided silicon microstrip sensors with integrated biasing resistors and coupling capacitors, produced for the first time in India. We have first developed a prototype sensor on a four-inch wafer. After finding suitable test procedures for characterizing these AC coupled sensors, we have fine-tuned various process parameters in order to produce sensors with the desired specifications.
△ Less
Submitted 8 May, 2014; v1 submitted 11 February, 2014;
originally announced February 2014.
-
Thermodynamics of the spin-1/2 two-leg ladder compound $(C_{5}H_{12}N)_{2} CuBr_{4}$
Authors:
Fatemeh Amiri,
Saeed Mahdavifar,
Mahboobeh Shahri Naseri
Abstract:
The thermodynamic behavior of the spin $S=1/2$ antiferromagnetic two-leg ladder compound $(C_{5}H_{12}N)_{2} CuBr_{4}$ in a uniform magnetic field is studied using numerical and analytical approaches. The entropy $S(H,T)$ and specific heat $C(H,T)$ are calculated. The specific heat shows various behaviors in different regions of the magnetic field. The field-dependence of the specific heat is almo…
▽ More
The thermodynamic behavior of the spin $S=1/2$ antiferromagnetic two-leg ladder compound $(C_{5}H_{12}N)_{2} CuBr_{4}$ in a uniform magnetic field is studied using numerical and analytical approaches. The entropy $S(H,T)$ and specific heat $C(H,T)$ are calculated. The specific heat shows various behaviors in different regions of the magnetic field. The field-dependence of the specific heat is almost symmetric about the average of quantum critical fields in complete agreement with experimental results. In addition, it is found that during an adiabatic demagnetization process, temperature drops in the vicinity of the field induced zero-temperature quantum phase transitions.
△ Less
Submitted 6 September, 2013;
originally announced September 2013.
-
Quantum phase transition in a dimerized chain with hexamer distortion
Authors:
Mahboobeh Shahri Naseri,
George I. Japaridze,
Saeed Mahdavifar,
Saber Farjami Shayesteh
Abstract:
We consider the dimerized spin-1/2 Heisenberg chain with spin hexameric distortion of the exchange pattern and study the zero-temperature phase diagram in the parameter space $(J_{1}, J_{2}, J_{3})$ by continuum-limit bosonization approach and the exact diagonalization method. The phase diagram is rich and has two gaped dimer phases.
We obtain an estimate of the critical line separating the differ…
▽ More
We consider the dimerized spin-1/2 Heisenberg chain with spin hexameric distortion of the exchange pattern and study the zero-temperature phase diagram in the parameter space $(J_{1}, J_{2}, J_{3})$ by continuum-limit bosonization approach and the exact diagonalization method. The phase diagram is rich and has two gaped dimer phases.
We obtain an estimate of the critical line separating the different gapped dimer phases by the bosonization approach. The existence of the transition line and the difference between dimer phases is checked numerically. The behavior of the energy gap and the dimer order parameter supports the exact location of the gapless line.
△ Less
Submitted 29 August, 2012;
originally announced August 2012.
-
Magnetic properties of the spin $S=1/2$ Heisenberg chain with hexamer modulation of exchange
Authors:
M. Shahri Naseri,
G. I. Japaridze,
S. Mahdavifar,
S. Farjami Shayesteh
Abstract:
We consider the spin-1/2 Heisenberg chain with alternating spin exchange %on even and odd sites in the presence of additional modulation of exchange on odd bonds with period three. We study the ground state magnetic phase diagram of this hexamer spin chain in the limit of very strong antiferromagnetic (AF) exchange on odd bonds using the numerical Lanczos method and bosonization approach. In the l…
▽ More
We consider the spin-1/2 Heisenberg chain with alternating spin exchange %on even and odd sites in the presence of additional modulation of exchange on odd bonds with period three. We study the ground state magnetic phase diagram of this hexamer spin chain in the limit of very strong antiferromagnetic (AF) exchange on odd bonds using the numerical Lanczos method and bosonization approach. In the limit of strong magnetic field commensurate with the dominating AF exchange, the model is mapped onto an effective $XXZ$ Heisenberg chain in the presence of uniform and spatially modulated fields, which is studied using the standard continuum-limit bosonization approach. In absence of additional hexamer modulation, the model undergoes a quantum phase transition from a gapped string order into the only one gapless Lüttinger liquid (LL) phase by increasing the magnetic field. In the presence of hexamer modulation, two new gapped phases are identified in the ground state at magnetization equal to 1/3 and 2/3 of the saturation value. These phases reveal themselves also in magnetization curve as plateaus at corresponding values of magnetization. As the result, the magnetic phase diagram of the hexamer chain shows seven different quantum phases, four gapped and three gapless and the system is characterized by six critical fields which mark quantum phase transitions between the ordered gapped and the LL gapless phases.
△ Less
Submitted 25 July, 2012; v1 submitted 20 October, 2011;
originally announced October 2011.
-
Casimir effect on nontrivial topology spaces in Krein space quantization
Authors:
M. Naseri,
S. Rouhani,
M. V. Takook
Abstract:
Casimir effect of a topologically nontrivial two-dimensional space-time, through Krein space quantization [1,2], has been calculated. In other words, auxiliary negative norm states have been utilized here. Presence of negative norm states play the role of an automatic renormalization device for the theory. The negative norm states (which do not interact with the physical world) could be chosen i…
▽ More
Casimir effect of a topologically nontrivial two-dimensional space-time, through Krein space quantization [1,2], has been calculated. In other words, auxiliary negative norm states have been utilized here. Presence of negative norm states play the role of an automatic renormalization device for the theory. The negative norm states (which do not interact with the physical world) could be chosen in two perspective. In the first case our method results in zero or vanishing values for energy. In the second case, however, the result are the same as the renormalization procedure.
△ Less
Submitted 18 April, 2007;
originally announced April 2007.
-
Casimir Effect In Krein Space Quantization
Authors:
H. Khosravi,
M. Naseri,
S. Rouhani,
M. V. Takook
Abstract:
An explicit calculation of Casimir effect through an alternative approach of field quantization [1, 2], has been presented in this paper. In this method, the auxiliary negative norm states have been utilized, the modes of which do not interact with the physical states or real physical world. Naturally these modes cannot be affected by the physical boundary conditions. Presence of negative norm s…
▽ More
An explicit calculation of Casimir effect through an alternative approach of field quantization [1, 2], has been presented in this paper. In this method, the auxiliary negative norm states have been utilized, the modes of which do not interact with the physical states or real physical world. Naturally these modes cannot be affected by the physical boundary conditions. Presence of negative norm states play the rule of an automatic renormalization device for the theory.
△ Less
Submitted 9 April, 2006;
originally announced April 2006.