81,068 research outputs found
Construction of spherical cubature formulas using lattices
We construct cubature formulas on spheres supported by homothetic images of
shells in some Euclidian lattices. Our analysis of these cubature formulas uses
results from the theory of modular forms. Examples are worked out on the sphere
of dimension n-1 for n=4, 8, 12, 14, 16, 20, 23, and 24, and the sizes of the
cubature formulas we obtain are compared with the lower bounds given by Linear
Programming
Growth rate for the expected value of a generalized random Fibonacci sequence
A random Fibonacci sequence is defined by the relation g_n = | g_{n-1} +/-
g_{n-2} |, where the +/- sign is chosen by tossing a balanced coin for each n.
We generalize these sequences to the case when the coin is unbalanced (denoting
by p the probability of a +), and the recurrence relation is of the form g_n =
|\lambda g_{n-1} +/- g_{n-2} |. When \lambda >=2 and 0 < p <= 1, we prove that
the expected value of g_n grows exponentially fast. When \lambda = \lambda_k =
2 cos(\pi/k) for some fixed integer k>2, we show that the expected value of g_n
grows exponentially fast for p>(2-\lambda_k)/4 and give an algebraic expression
for the growth rate. The involved methods extend (and correct) those introduced
in a previous paper by the second author
MTDeep: Boosting the Security of Deep Neural Nets Against Adversarial Attacks with Moving Target Defense
Present attack methods can make state-of-the-art classification systems based
on deep neural networks misclassify every adversarially modified test example.
The design of general defense strategies against a wide range of such attacks
still remains a challenging problem. In this paper, we draw inspiration from
the fields of cybersecurity and multi-agent systems and propose to leverage the
concept of Moving Target Defense (MTD) in designing a meta-defense for
'boosting' the robustness of an ensemble of deep neural networks (DNNs) for
visual classification tasks against such adversarial attacks. To classify an
input image, a trained network is picked randomly from this set of networks by
formulating the interaction between a Defender (who hosts the classification
networks) and their (Legitimate and Malicious) users as a Bayesian Stackelberg
Game (BSG). We empirically show that this approach, MTDeep, reduces
misclassification on perturbed images in various datasets such as MNIST,
FashionMNIST, and ImageNet while maintaining high classification accuracy on
legitimate test images. We then demonstrate that our framework, being the first
meta-defense technique, can be used in conjunction with any existing defense
mechanism to provide more resilience against adversarial attacks that can be
afforded by these defense mechanisms. Lastly, to quantify the increase in
robustness of an ensemble-based classification system when we use MTDeep, we
analyze the properties of a set of DNNs and introduce the concept of
differential immunity that formalizes the notion of attack transferability.Comment: Accepted to the Conference on Decision and Game Theory for Security
(GameSec), 201
The rigged Hilbert space approach to the Lippmann-Schwinger equation. Part I
We exemplify the way the rigged Hilbert space deals with the
Lippmann-Schwinger equation by way of the spherical shell potential. We
explicitly construct the Lippmann-Schwinger bras and kets along with their
energy representation, their time evolution and the rigged Hilbert spaces to
which they belong. It will be concluded that the natural setting for the
solutions of the Lippmann-Schwinger equation--and therefore for scattering
theory--is the rigged Hilbert space rather than just the Hilbert space.Comment: 34 pages, 1 figur
Diffusive Transport Enhanced by Thermal Velocity Fluctuations
We study the contribution of advection by thermal velocity fluctuations to
the effective diffusion coefficient in a mixture of two indistinguishable
fluids. The enhancement of the diffusive transport depends on the system size L
and grows as \ln(L/L_0) in quasi two-dimensional systems, while in three
dimensions it scales as L_0^{-1}-L^{-1}, where L_0 is a reference length. The
predictions of a simple fluctuating hydrodynamics theory are compared to
results from particle simulations and a finite-volume solver and excellent
agreement is observed. Our results conclusively demonstrate that the nonlinear
advective terms need to be retained in the equations of fluctuating
hydrodynamics when modeling transport in small-scale finite systems.Comment: To appear in Phys. Rev. Lett., 201
Which finitely generated Abelian groups admit isomorphic Cayley graphs?
We show that Cayley graphs of finitely generated Abelian groups are rather
rigid. As a consequence we obtain that two finitely generated Abelian groups
admit isomorphic Cayley graphs if and only if they have the same rank and their
torsion parts have the same cardinality. The proof uses only elementary
arguments and is formulated in a geometric language.Comment: 16 pages; v2: added reference, reformulated quasi-convexity, v3:
small corrections; to appear in Geometriae Dedicat
- …