414 research outputs found

    The use of adversaries for optimal neural network training

    Get PDF
    B-decay data from the Belle experiment at the KEKB collider have a substantial background from e+eqqˉe^{+}e^{-}\to q \bar{q} events. To suppress this we employ deep neural network algorithms. These provide improved signal from background discrimination. However, the deep neural network develops a substantial correlation with the ΔE\Delta E kinematic variable used to distinguish signal from background in the final fit due to its relationship with input variables. The effect of this correlation is reduced by deploying an adversarial neural network. Overall the adversarial deep neural network performs better than a Boosted Decision Tree algorithimn and a commercial package, NeuroBayes, which employs a neural net with a single hidden layer

    Reflection Equivariant Quantum Neural Networks for Enhanced Image Classification

    Full text link
    Machine learning is among the most widely anticipated use cases for near-term quantum computers, however there remain significant theoretical and implementation challenges impeding its scale up. In particular, there is an emerging body of work which suggests that generic, data agnostic quantum machine learning (QML) architectures may suffer from severe trainability issues, with the gradient of typical variational parameters vanishing exponentially in the number of qubits. Additionally, the high expressibility of QML models can lead to overfitting on training data and poor generalisation performance. A promising strategy to combat both of these difficulties is to construct models which explicitly respect the symmetries inherent in their data, so-called geometric quantum machine learning (GQML). In this work, we utilise the techniques of GQML for the task of image classification, building new QML models which are equivariant with respect to reflections of the images. We find that these networks are capable of consistently and significantly outperforming generic ansatze on complicated real-world image datasets, bringing high-resolution image classification via quantum computers closer to reality. Our work highlights a potential pathway for the future development and implementation of powerful QML models which directly exploit the symmetries of data.Comment: 7 pages, 6 figure

    Crosstalk Attacks and Defence in a Shared Quantum Computing Environment

    Full text link
    Quantum computing has the potential to provide solutions to problems that are intractable on classical computers, but the accuracy of the current generation of quantum computers suffer from the impact of noise or errors such as leakage, crosstalk, dephasing, and amplitude damping among others. As the access to quantum computers is almost exclusively in a shared environment through cloud-based services, it is possible that an adversary can exploit crosstalk noise to disrupt quantum computations on nearby qubits, even carefully designing quantum circuits to purposely lead to wrong answers. In this paper, we analyze the extent and characteristics of crosstalk noise through tomography conducted on IBM Quantum computers, leading to an enhanced crosstalk simulation model. Our results indicate that crosstalk noise is a significant source of errors on IBM quantum hardware, making crosstalk based attack a viable threat to quantum computing in a shared environment. Based on our crosstalk simulator benchmarked against IBM hardware, we assess the impact of crosstalk attacks and develop strategies for mitigating crosstalk effects. Through a systematic set of simulations, we assess the effectiveness of three crosstalk attack mitigation strategies, namely circuit separation, qubit allocation optimization via reinforcement learning, and the use of spectator qubits, and show that they all overcome crosstalk attacks with varying degrees of success and help to secure quantum computing in a shared platform.Comment: 13 pages, 7 figure

    Benchmarking Adversarially Robust Quantum Machine Learning at Scale

    Full text link
    Machine learning (ML) methods such as artificial neural networks are rapidly becoming ubiquitous in modern science, technology and industry. Despite their accuracy and sophistication, neural networks can be easily fooled by carefully designed malicious inputs known as adversarial attacks. While such vulnerabilities remain a serious challenge for classical neural networks, the extent of their existence is not fully understood in the quantum ML setting. In this work, we benchmark the robustness of quantum ML networks, such as quantum variational classifiers (QVC), at scale by performing rigorous training for both simple and complex image datasets and through a variety of high-end adversarial attacks. Our results show that QVCs offer a notably enhanced robustness against classical adversarial attacks by learning features which are not detected by the classical neural networks, indicating a possible quantum advantage for ML tasks. Contrarily, and remarkably, the converse is not true, with attacks on quantum networks also capable of deceiving classical neural networks. By combining quantum and classical network outcomes, we propose a novel adversarial attack detection technology. Traditionally quantum advantage in ML systems has been sought through increased accuracy or algorithmic speed-up, but our work has revealed the potential for a new kind of quantum advantage through superior robustness of ML models, whose practical realisation will address serious security concerns and reliability issues of ML algorithms employed in a myriad of applications including autonomous vehicles, cybersecurity, and surveillance robotic systems.Comment: 10 pages, 5 Figure

    Drastic Circuit Depth Reductions with Preserved Adversarial Robustness by Approximate Encoding for Quantum Machine Learning

    Full text link
    Quantum machine learning (QML) is emerging as an application of quantum computing with the potential to deliver quantum advantage, but its realisation for practical applications remains impeded by challenges. Amongst those, a key barrier is the computationally expensive task of encoding classical data into a quantum state, which could erase any prospective speed-ups over classical algorithms. In this work, we implement methods for the efficient preparation of quantum states representing encoded image data using variational, genetic and matrix product state based algorithms. Our results show that these methods can approximately prepare states to a level suitable for QML using circuits two orders of magnitude shallower than a standard state preparation implementation, obtaining drastic savings in circuit depth and gate count without unduly sacrificing classification accuracy. Additionally, the QML models trained and evaluated on approximately encoded data display an increased robustness to adversarially generated input data perturbations. This partial alleviation of adversarial vulnerability, possible due to the "drowning out" of adversarial perturbations while retaining the meaningful large-scale features of the data, constitutes a considerable benefit for approximate state preparation in addition to lessening the requirements of the quantum hardware. Our results, based on simulations and experiments on IBM quantum devices, highlight a promising pathway for the future implementation of accurate and robust QML models on complex datasets relevant for practical applications, bringing the possibility of NISQ-era QML advantage closer to reality.Comment: 14 pages, 8 figure

    pi-pi scattering in a QCD based model field theory

    Full text link
    A model field theory, in which the interaction between quarks is mediated by dressed vector boson exchange, is used to analyse the pionic sector of QCD. It is shown that this model, which incorporates dynamical chiral symmetry breaking, asymptotic freedom and quark confinement, allows one to calculate fπf_\pi, mπm_\pi, rπr_\pi and the partial wave amplitudes in π\pi-π\pi scattering and obtain good agreement with the experimental data, with the latter being well described up to energies \mbox{E700E\simeq 700 MeV}.Comment: 23 Pages, 4 figures in PostScript format, PHY-7512-TH-93, REVTEX Available via anonymous ftp in /pub: login anonymou get pipi93.tex Fig1.ps Fig2.ps Fig3.ps Fig4.p

    Publication of the Belle II Software

    Get PDF
    The Belle II software was developed by a few hundred individual contributors over several years. Following the rising desire of making it publicly available, the collaboration established open source software policies and procedures. The political and technical challenges and their solutions at Belle II are discussed in this article. With the publication of the Belle II software, basf2, on GitHub and Zenodo in 2021 an important milestone towards open science was reached

    Rigorous pion-pion scattering lengths from threshold pi N --> pi pi N data

    Full text link
    A new evaluation of the universal ππ\pi\pi scattering length relation is used to extract the ππ\pi\pi ss-wave scattering lengths from threshold pion production data. Previous work has shown that the chiral perturbation series relating threshold pion production to ππ\pi\pi scattering lengths appears to converge well only for the isospin-2 case, giving a2=0.031±0.007mπ1a_2 = -0.031\pm 0.007 m_\pi^{-1}. A model-independent and data-insensitive universal curve then implies a0=0.235±0.03mπ1a_0 = 0.235\pm 0.03 m_\pi^{-1} for the isospin-0 scattering length.Comment: 13 pages, Latex 2.09, uses epsf.sty. Amended version, including revised postscript figures (3) and added reference. To be published in Physics Letters
    corecore