81,068 research outputs found

    Construction of spherical cubature formulas using lattices

    Full text link
    We construct cubature formulas on spheres supported by homothetic images of shells in some Euclidian lattices. Our analysis of these cubature formulas uses results from the theory of modular forms. Examples are worked out on the sphere of dimension n-1 for n=4, 8, 12, 14, 16, 20, 23, and 24, and the sizes of the cubature formulas we obtain are compared with the lower bounds given by Linear Programming

    Growth rate for the expected value of a generalized random Fibonacci sequence

    Get PDF
    A random Fibonacci sequence is defined by the relation g_n = | g_{n-1} +/- g_{n-2} |, where the +/- sign is chosen by tossing a balanced coin for each n. We generalize these sequences to the case when the coin is unbalanced (denoting by p the probability of a +), and the recurrence relation is of the form g_n = |\lambda g_{n-1} +/- g_{n-2} |. When \lambda >=2 and 0 < p <= 1, we prove that the expected value of g_n grows exponentially fast. When \lambda = \lambda_k = 2 cos(\pi/k) for some fixed integer k>2, we show that the expected value of g_n grows exponentially fast for p>(2-\lambda_k)/4 and give an algebraic expression for the growth rate. The involved methods extend (and correct) those introduced in a previous paper by the second author

    MTDeep: Boosting the Security of Deep Neural Nets Against Adversarial Attacks with Moving Target Defense

    Full text link
    Present attack methods can make state-of-the-art classification systems based on deep neural networks misclassify every adversarially modified test example. The design of general defense strategies against a wide range of such attacks still remains a challenging problem. In this paper, we draw inspiration from the fields of cybersecurity and multi-agent systems and propose to leverage the concept of Moving Target Defense (MTD) in designing a meta-defense for 'boosting' the robustness of an ensemble of deep neural networks (DNNs) for visual classification tasks against such adversarial attacks. To classify an input image, a trained network is picked randomly from this set of networks by formulating the interaction between a Defender (who hosts the classification networks) and their (Legitimate and Malicious) users as a Bayesian Stackelberg Game (BSG). We empirically show that this approach, MTDeep, reduces misclassification on perturbed images in various datasets such as MNIST, FashionMNIST, and ImageNet while maintaining high classification accuracy on legitimate test images. We then demonstrate that our framework, being the first meta-defense technique, can be used in conjunction with any existing defense mechanism to provide more resilience against adversarial attacks that can be afforded by these defense mechanisms. Lastly, to quantify the increase in robustness of an ensemble-based classification system when we use MTDeep, we analyze the properties of a set of DNNs and introduce the concept of differential immunity that formalizes the notion of attack transferability.Comment: Accepted to the Conference on Decision and Game Theory for Security (GameSec), 201

    The rigged Hilbert space approach to the Lippmann-Schwinger equation. Part I

    Full text link
    We exemplify the way the rigged Hilbert space deals with the Lippmann-Schwinger equation by way of the spherical shell potential. We explicitly construct the Lippmann-Schwinger bras and kets along with their energy representation, their time evolution and the rigged Hilbert spaces to which they belong. It will be concluded that the natural setting for the solutions of the Lippmann-Schwinger equation--and therefore for scattering theory--is the rigged Hilbert space rather than just the Hilbert space.Comment: 34 pages, 1 figur

    Diffusive Transport Enhanced by Thermal Velocity Fluctuations

    Get PDF
    We study the contribution of advection by thermal velocity fluctuations to the effective diffusion coefficient in a mixture of two indistinguishable fluids. The enhancement of the diffusive transport depends on the system size L and grows as \ln(L/L_0) in quasi two-dimensional systems, while in three dimensions it scales as L_0^{-1}-L^{-1}, where L_0 is a reference length. The predictions of a simple fluctuating hydrodynamics theory are compared to results from particle simulations and a finite-volume solver and excellent agreement is observed. Our results conclusively demonstrate that the nonlinear advective terms need to be retained in the equations of fluctuating hydrodynamics when modeling transport in small-scale finite systems.Comment: To appear in Phys. Rev. Lett., 201

    Which finitely generated Abelian groups admit isomorphic Cayley graphs?

    Full text link
    We show that Cayley graphs of finitely generated Abelian groups are rather rigid. As a consequence we obtain that two finitely generated Abelian groups admit isomorphic Cayley graphs if and only if they have the same rank and their torsion parts have the same cardinality. The proof uses only elementary arguments and is formulated in a geometric language.Comment: 16 pages; v2: added reference, reformulated quasi-convexity, v3: small corrections; to appear in Geometriae Dedicat
    • …
    corecore