12,658 research outputs found
Cryptanalyzing a discrete-time chaos synchronization secure communication system
This paper describes the security weakness of a recently proposed secure
communication method based on discrete-time chaos synchronization. We show that
the security is compromised even without precise knowledge of the chaotic
system used. We also make many suggestions to improve its security in future
versions.Comment: 11 pages, 3 figures, latex forma
Breaking projective chaos synchronization secure communication using filtering and generalized synchronization
This paper describes the security weaknesses of a recently proposed secure
communication method based on chaotic masking using projective synchronization
of two chaotic systems. We show that the system is insecure and how to break it
in two different ways, by high-pass filtering and by generalized
synchronization.Comment: 14 pages, 6 figures, latex forma
Nonparametric Bayesian Mixed-effect Model: a Sparse Gaussian Process Approach
Multi-task learning models using Gaussian processes (GP) have been developed
and successfully applied in various applications. The main difficulty with this
approach is the computational cost of inference using the union of examples
from all tasks. Therefore sparse solutions, that avoid using the entire data
directly and instead use a set of informative "representatives" are desirable.
The paper investigates this problem for the grouped mixed-effect GP model where
each individual response is given by a fixed-effect, taken from one of a set of
unknown groups, plus a random individual effect function that captures
variations among individuals. Such models have been widely used in previous
work but no sparse solutions have been developed. The paper presents the first
sparse solution for such problems, showing how the sparse approximation can be
obtained by maximizing a variational lower bound on the marginal likelihood,
generalizing ideas from single-task Gaussian processes to handle the
mixed-effect model as well as grouping. Experiments using artificial and real
data validate the approach showing that it can recover the performance of
inference with the full sample, that it outperforms baseline methods, and that
it outperforms state of the art sparse solutions for other multi-task GP
formulations.Comment: Preliminary version appeared in ECML201
Breaking a secure communication scheme based on the phase synchronization of chaotic systems
A security analysis of a recently proposed secure communication scheme based
on the phase synchronization of chaotic systems is presented. It is shown that
the system parameters directly determine the ciphertext waveform, hence it can
be readily broken by parameter estimation of the ciphertext signal.Comment: 4 pages, 6 figure
Breaking parameter modulated chaotic secure communication system
This paper describes the security weakness of a recently proposed secure
communication method based on parameter modulation of a chaotic system and
adaptive observer-based synchronization scheme. We show that the security is
compromised even without precise knowledge of the chaotic system used.Comment: 8 pages, 3 figures, latex forma
Polynomial algebras and exact solutions of general quantum non-linear optical models I: Two-mode boson systems
We introduce higher order polynomial deformations of Lie algebra. We
construct their unitary representations and the corresponding single-variable
differential operator realizations. We then use the results to obtain exact
(Bethe ansatz) solutions to a class of 2-mode boson systems, including the
Boson-Einstein Condensate models as special cases. Up to an overall factor, the
eigenfunctions of the 2-mode boson systems are given by polynomials whose roots
are solutions of the associated Bethe ansatz equations. The corresponding
eigenvalues are expressed in terms of these roots. We also establish the
spectral equivalence between the BEC models and certain quasi-exactly solvable
Sch\"ordinger potentials.Comment: 20 pages, final version to appear in J. Phys. A: Math. Theor
Rudiments of Holography
An elementary introduction to Maldacena's AdS/CFT correspondence is given,
with some emphasis in the Fefferman-Graham construction. This is based on
lectures given by one of us (E.A.) at the Universidad Autonoma de Madrid.Comment: 60 pages, additional misprints corrected, references adde
- …