3,324 research outputs found

    Gravitational Effects of Rotating Bodies

    Full text link
    We study two type effects of gravitational field on mechanical gyroscopes (i.e. rotating extended bodies). The first depends on special relativity and equivalence principle. The second is related to the coupling (i.e. a new force) between the spins of mechanical gyroscopes, which would violate the equivalent principle. In order to give a theoretical prediction to the second we suggest a spin-spin coupling model for two mechanical gyroscopes. An upper limit on the coupling strength is then determined by using the observed perihelion precession of the planet's orbits in solar system. We also give predictions violating the equivalence principle for free-fall gyroscopes .Comment: LaTex, 6 page

    Trade-off between multiple-copy transformation and entanglement catalysis

    Full text link
    We demonstrate that multiple copies of a bipartite entangled pure state may serve as a catalyst for certain entanglement transformations while a single copy cannot. Such a state is termed a "multiple-copy catalyst" for the transformations. A trade-off between the number of copies of source state and that of the catalyst is also observed. These results can be generalized to probabilistic entanglement transformations directly.Comment: Essentially the journal version. 7 pages, no figures. Minor correction

    Multiple-copy entanglement transformation and entanglement catalysis

    Full text link
    We prove that any multiple-copy entanglement transformation [S. Bandyopadhyay, V. Roychowdhury, and U. Sen, Phys. Rev. A \textbf{65}, 052315 (2002)] can be implemented by a suitable entanglement-assisted local transformation [D. Jonathan and M. B. Plenio, Phys. Rev. Lett. \textbf{83}, 3566 (1999)]. Furthermore, we show that the combination of multiple-copy entanglement transformation and the entanglement-assisted one is still equivalent to the pure entanglement-assisted one. The mathematical structure of multiple-copy entanglement transformations then is carefully investigated. Many interesting properties of multiple-copy entanglement transformations are presented, which exactly coincide with those satisfied by the entanglement-assisted ones. Most interestingly, we show that an arbitrarily large number of copies of state should be considered in multiple-copy entanglement transformations.Comment: 11 pages, RevTex 4. Main results unchanged. Journal versio

    Data-Agnostic Model Poisoning against Federated Learning: A Graph Autoencoder Approach

    Full text link
    This paper proposes a novel, data-agnostic, model poisoning attack on Federated Learning (FL), by designing a new adversarial graph autoencoder (GAE)-based framework. The attack requires no knowledge of FL training data and achieves both effectiveness and undetectability. By listening to the benign local models and the global model, the attacker extracts the graph structural correlations among the benign local models and the training data features substantiating the models. The attacker then adversarially regenerates the graph structural correlations while maximizing the FL training loss, and subsequently generates malicious local models using the adversarial graph structure and the training data features of the benign ones. A new algorithm is designed to iteratively train the malicious local models using GAE and sub-gradient descent. The convergence of FL under attack is rigorously proved, with a considerably large optimality gap. Experiments show that the FL accuracy drops gradually under the proposed attack and existing defense mechanisms fail to detect it. The attack can give rise to an infection across all benign devices, making it a serious threat to FL.Comment: 15 pages, 10 figures, submitted to IEEE Transactions on Information Forensics and Security (TIFS

    Adversarial Attacks and Defenses in Machine Learning-Powered Networks: A Contemporary Survey

    Full text link
    Adversarial attacks and defenses in machine learning and deep neural network have been gaining significant attention due to the rapidly growing applications of deep learning in the Internet and relevant scenarios. This survey provides a comprehensive overview of the recent advancements in the field of adversarial attack and defense techniques, with a focus on deep neural network-based classification models. Specifically, we conduct a comprehensive classification of recent adversarial attack methods and state-of-the-art adversarial defense techniques based on attack principles, and present them in visually appealing tables and tree diagrams. This is based on a rigorous evaluation of the existing works, including an analysis of their strengths and limitations. We also categorize the methods into counter-attack detection and robustness enhancement, with a specific focus on regularization-based methods for enhancing robustness. New avenues of attack are also explored, including search-based, decision-based, drop-based, and physical-world attacks, and a hierarchical classification of the latest defense methods is provided, highlighting the challenges of balancing training costs with performance, maintaining clean accuracy, overcoming the effect of gradient masking, and ensuring method transferability. At last, the lessons learned and open challenges are summarized with future research opportunities recommended.Comment: 46 pages, 21 figure
    • …
    corecore