2,827 research outputs found

    Phenomenology of SUSY with intermediate scale physics

    Full text link
    The presence of fields at an intermediate scale between the Electroweak and the Grand Unification scale modifies the evolution of the gauge couplings and consequently the running of other parameters of the Minimal Supersymmetric Standard Model, such as gauginos and scalar masses. The net effect is a modification of the low energy spectrum which affects both the collider phenomenology and the dark matter relic density.Comment: 6 pages, 12 figures, contribution to Moriond EW 2012 proceeding

    Low energy processes to distinguish among seesaw models

    Full text link
    We consider the three basic seesaw scenarios (with fermionic singlets, scalar triplets or fermionic triplets) and discuss their phenomenology, aside from neutrino masses. We use the effective field theory approach and compare the dimension-six operators characteristic of these models. We discuss the possibility of having large dimension-six operators and small dimension-five (small neutrino masses) without any fine-tuning, if the lepton number is violated at a low energy scale. Finally, we discuss some peculiarities of the phenomenology of the fermionic triplet seesaw model.Comment: 3 pages, to appear in the proceedings of IFAE08, Bologna, Ital

    On Security and Sparsity of Linear Classifiers for Adversarial Settings

    Full text link
    Machine-learning techniques are widely used in security-related applications, like spam and malware detection. However, in such settings, they have been shown to be vulnerable to adversarial attacks, including the deliberate manipulation of data at test time to evade detection. In this work, we focus on the vulnerability of linear classifiers to evasion attacks. This can be considered a relevant problem, as linear classifiers have been increasingly used in embedded systems and mobile devices for their low processing time and memory requirements. We exploit recent findings in robust optimization to investigate the link between regularization and security of linear classifiers, depending on the type of attack. We also analyze the relationship between the sparsity of feature weights, which is desirable for reducing processing cost, and the security of linear classifiers. We further propose a novel octagonal regularizer that allows us to achieve a proper trade-off between them. Finally, we empirically show how this regularizer can improve classifier security and sparsity in real-world application examples including spam and malware detection

    Higgs-gauge unification without tadpoles

    Full text link
    In orbifold gauge theories localized tadpoles can be radiatively generated at the fixed points where U(1) subgroups are conserved. If the Standard Model Higgs fields are identified with internal components of the bulk gauge fields (Higgs-gauge unification) in the presence of these tadpoles the Higgs mass becomes sensitive to the UV cutoff and electroweak symmetry breaking is spoiled. We find the general conditions, based on symmetry arguments, for the absence/presence of localized tadpoles in models with an arbitrary number of dimensions D. We show that in the class of orbifold compactifications based on T^{D-4}/Z_N (D even, N>2) tadpoles are always allowed, while on T^{D-4}/\mathbb Z_2 (arbitrary D) with fermions in arbitrary representations of the bulk gauge group tadpoles can only appear in D=6 dimensions. We explicitly check this with one- and two-loops calculationsComment: 19 pages, 3 figures, axodraw.sty. v2: version to appear in Nucl. Phys.

    Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning

    Get PDF
    Learning-based pattern classifiers, including deep networks, have shown impressive performance in several application domains, ranging from computer vision to cybersecurity. However, it has also been shown that adversarial input perturbations carefully crafted either at training or at test time can easily subvert their predictions. The vulnerability of machine learning to such wild patterns (also referred to as adversarial examples), along with the design of suitable countermeasures, have been investigated in the research field of adversarial machine learning. In this work, we provide a thorough overview of the evolution of this research area over the last ten years and beyond, starting from pioneering, earlier work on the security of non-deep learning algorithms up to more recent work aimed to understand the security properties of deep learning algorithms, in the context of computer vision and cybersecurity tasks. We report interesting connections between these apparently-different lines of work, highlighting common misconceptions related to the security evaluation of machine-learning algorithms. We review the main threat models and attacks defined to this end, and discuss the main limitations of current work, along with the corresponding future challenges towards the design of more secure learning algorithms.Comment: Accepted for publication on Pattern Recognition, 201

    Tadpoles and Symmetries in Higgs-Gauge Unification Theories

    Full text link
    In theories with extra dimensions the Standard Model Higgs fields can be identified with internal components of bulk gauge fields (Higgs-gauge unification). The bulk gauge symmetry protects the Higgs mass from quadratic divergences, but at the fixed points localized tadpoles can be radiatively generated if U(1) subgroups are conserved, making the Higgs mass UV sensitive. We show that a global symmetry, remnant of the internal rotation group after orbifold projection, can prevent the generation of such tadpoles. In particular we consider the classes of orbifold compactifications T^d/Z_N (d even, N>2) and T^d/Z_2 (arbitrary d) and show that in the first case tadpoles are always allowed, while in the second they can appear only for d=2 (six dimensions).Comment: 10 pages, based on talks given by M.Q. at String Phenomenology 2004, University of Michigan, Ann Arbor, August 1-6, 2004 and 10th International Symposium on Particles, Strings and Cosmology (PASCOS'04 and Nath Fest), Northeastern University, Boston, August 16-22, 200

    Divergences and Symmetries in Higgs-Gauge Unification Theories

    Full text link
    In theories with extra dimensions the Standard Model Higgs field can be identified with the internal components of higher-dimensional gauge fields (Higgs-gauge unification). The higher-dimensional gauge symmetry prevents the Higgs mass from quadratic divergences, but at the fixed points of the orbifold this symmetry is broken and divergences can arise if U(1) subgroups are conserved. We show that another symmetry, remnant of the internal rotation group after orbifold projection, can avoid the generation of such divergences.Comment: 6 pages, 1 figure. Talk given at the "XL Rencontres de Moriond on Electroweak Interactions and Unified Theories", La Thuile, Italy, 5-12 Mar 200

    Is the 125 GeV Higgs the superpartner of a neutrino?

    Full text link
    Recent LHC searches have provided strong evidence for the Higgs, a boson whose gauge quantum numbers coincide with those of a SM fermion, the neutrino. This raises the mandatory question of whether Higgs and neutrino can be related by supersymmetry. We study this possibility in a model in which an approximate R-symmetry acts as a lepton number. We show that Higgs physics resembles that of the SM-Higgs with the exception of a novel invisible decay into Goldstino and neutrino with a branching fraction that can be as large as ~10%. Based on naturalness criteria, only stops and sbottoms are required to be lighter than the TeV with a phenomenology dictated by the R-symmetry. They have novel decays into quarks+leptons that could be seen at the LHC, allowing to distinguish these scenarios from the ordinary MSSM.Comment: 19 pages, 8 figure

    Detecting Adversarial Examples through Nonlinear Dimensionality Reduction

    Get PDF
    Deep neural networks are vulnerable to adversarial examples, i.e., carefully-perturbed inputs aimed to mislead classification. This work proposes a detection method based on combining non-linear dimensionality reduction and density estimation techniques. Our empirical findings show that the proposed approach is able to effectively detect adversarial examples crafted by non-adaptive attackers, i.e., not specifically tuned to bypass the detection method. Given our promising results, we plan to extend our analysis to adaptive attackers in future work.Comment: European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (ESANN) 201
    corecore