414 research outputs found
The use of adversaries for optimal neural network training
B-decay data from the Belle experiment at the KEKB collider have a
substantial background from events. To suppress this
we employ deep neural network algorithms. These provide improved signal from
background discrimination. However, the deep neural network develops a
substantial correlation with the kinematic variable used to
distinguish signal from background in the final fit due to its relationship
with input variables. The effect of this correlation is reduced by deploying an
adversarial neural network. Overall the adversarial deep neural network
performs better than a Boosted Decision Tree algorithimn and a commercial
package, NeuroBayes, which employs a neural net with a single hidden layer
Reflection Equivariant Quantum Neural Networks for Enhanced Image Classification
Machine learning is among the most widely anticipated use cases for near-term
quantum computers, however there remain significant theoretical and
implementation challenges impeding its scale up. In particular, there is an
emerging body of work which suggests that generic, data agnostic quantum
machine learning (QML) architectures may suffer from severe trainability
issues, with the gradient of typical variational parameters vanishing
exponentially in the number of qubits. Additionally, the high expressibility of
QML models can lead to overfitting on training data and poor generalisation
performance. A promising strategy to combat both of these difficulties is to
construct models which explicitly respect the symmetries inherent in their
data, so-called geometric quantum machine learning (GQML). In this work, we
utilise the techniques of GQML for the task of image classification, building
new QML models which are equivariant with respect to reflections of the images.
We find that these networks are capable of consistently and significantly
outperforming generic ansatze on complicated real-world image datasets,
bringing high-resolution image classification via quantum computers closer to
reality. Our work highlights a potential pathway for the future development and
implementation of powerful QML models which directly exploit the symmetries of
data.Comment: 7 pages, 6 figure
Crosstalk Attacks and Defence in a Shared Quantum Computing Environment
Quantum computing has the potential to provide solutions to problems that are
intractable on classical computers, but the accuracy of the current generation
of quantum computers suffer from the impact of noise or errors such as leakage,
crosstalk, dephasing, and amplitude damping among others. As the access to
quantum computers is almost exclusively in a shared environment through
cloud-based services, it is possible that an adversary can exploit crosstalk
noise to disrupt quantum computations on nearby qubits, even carefully
designing quantum circuits to purposely lead to wrong answers. In this paper,
we analyze the extent and characteristics of crosstalk noise through tomography
conducted on IBM Quantum computers, leading to an enhanced crosstalk simulation
model. Our results indicate that crosstalk noise is a significant source of
errors on IBM quantum hardware, making crosstalk based attack a viable threat
to quantum computing in a shared environment. Based on our crosstalk simulator
benchmarked against IBM hardware, we assess the impact of crosstalk attacks and
develop strategies for mitigating crosstalk effects. Through a systematic set
of simulations, we assess the effectiveness of three crosstalk attack
mitigation strategies, namely circuit separation, qubit allocation optimization
via reinforcement learning, and the use of spectator qubits, and show that they
all overcome crosstalk attacks with varying degrees of success and help to
secure quantum computing in a shared platform.Comment: 13 pages, 7 figure
Benchmarking Adversarially Robust Quantum Machine Learning at Scale
Machine learning (ML) methods such as artificial neural networks are rapidly
becoming ubiquitous in modern science, technology and industry. Despite their
accuracy and sophistication, neural networks can be easily fooled by carefully
designed malicious inputs known as adversarial attacks. While such
vulnerabilities remain a serious challenge for classical neural networks, the
extent of their existence is not fully understood in the quantum ML setting. In
this work, we benchmark the robustness of quantum ML networks, such as quantum
variational classifiers (QVC), at scale by performing rigorous training for
both simple and complex image datasets and through a variety of high-end
adversarial attacks. Our results show that QVCs offer a notably enhanced
robustness against classical adversarial attacks by learning features which are
not detected by the classical neural networks, indicating a possible quantum
advantage for ML tasks. Contrarily, and remarkably, the converse is not true,
with attacks on quantum networks also capable of deceiving classical neural
networks. By combining quantum and classical network outcomes, we propose a
novel adversarial attack detection technology. Traditionally quantum advantage
in ML systems has been sought through increased accuracy or algorithmic
speed-up, but our work has revealed the potential for a new kind of quantum
advantage through superior robustness of ML models, whose practical realisation
will address serious security concerns and reliability issues of ML algorithms
employed in a myriad of applications including autonomous vehicles,
cybersecurity, and surveillance robotic systems.Comment: 10 pages, 5 Figure
Drastic Circuit Depth Reductions with Preserved Adversarial Robustness by Approximate Encoding for Quantum Machine Learning
Quantum machine learning (QML) is emerging as an application of quantum
computing with the potential to deliver quantum advantage, but its realisation
for practical applications remains impeded by challenges. Amongst those, a key
barrier is the computationally expensive task of encoding classical data into a
quantum state, which could erase any prospective speed-ups over classical
algorithms. In this work, we implement methods for the efficient preparation of
quantum states representing encoded image data using variational, genetic and
matrix product state based algorithms. Our results show that these methods can
approximately prepare states to a level suitable for QML using circuits two
orders of magnitude shallower than a standard state preparation implementation,
obtaining drastic savings in circuit depth and gate count without unduly
sacrificing classification accuracy. Additionally, the QML models trained and
evaluated on approximately encoded data display an increased robustness to
adversarially generated input data perturbations. This partial alleviation of
adversarial vulnerability, possible due to the "drowning out" of adversarial
perturbations while retaining the meaningful large-scale features of the data,
constitutes a considerable benefit for approximate state preparation in
addition to lessening the requirements of the quantum hardware. Our results,
based on simulations and experiments on IBM quantum devices, highlight a
promising pathway for the future implementation of accurate and robust QML
models on complex datasets relevant for practical applications, bringing the
possibility of NISQ-era QML advantage closer to reality.Comment: 14 pages, 8 figure
pi-pi scattering in a QCD based model field theory
A model field theory, in which the interaction between quarks is mediated by
dressed vector boson exchange, is used to analyse the pionic sector of QCD. It
is shown that this model, which incorporates dynamical chiral symmetry
breaking, asymptotic freedom and quark confinement, allows one to calculate
, , and the partial wave amplitudes in -
scattering and obtain good agreement with the experimental data, with the
latter being well described up to energies \mbox{ MeV}.Comment: 23 Pages, 4 figures in PostScript format, PHY-7512-TH-93, REVTEX
Available via anonymous ftp in /pub: login anonymou get pipi93.tex Fig1.ps
Fig2.ps Fig3.ps Fig4.p
Publication of the Belle II Software
The Belle II software was developed by a few hundred individual contributors over several years. Following the rising desire of making it publicly available, the collaboration established open source software policies and procedures. The political and technical challenges and their solutions at Belle II are discussed in this article. With the publication of the Belle II software, basf2, on GitHub and Zenodo in 2021 an important milestone towards open science was reached
Rigorous pion-pion scattering lengths from threshold pi N --> pi pi N data
A new evaluation of the universal scattering length relation is used
to extract the -wave scattering lengths from threshold pion
production data. Previous work has shown that the chiral perturbation series
relating threshold pion production to scattering lengths appears to
converge well only for the isospin-2 case, giving . A model-independent and data-insensitive universal curve then
implies for the isospin-0 scattering length.Comment: 13 pages, Latex 2.09, uses epsf.sty. Amended version, including
revised postscript figures (3) and added reference. To be published in
Physics Letters
- …