34 research outputs found
Driving Rabi oscillations at the giant dipole resonance in xenon
Free-electron lasers (FELs) produce short and very intense light pulses in
the XUV and x-ray regimes. We investigate the possibility to drive Rabi
oscillations in xenon with an intense FEL pulse by using the unusually large
dipole strength of the giant-dipole resonance (GDR). The GDR decays within less
than 30 as due to its position, which is above the ionization threshold.
We find that intensities around 10 W/cm are required to induce Rabi
oscillations with a period comparable to the lifetime. The pulse duration
should not exceed 100 as because xenon will be fully ionized within a few
lifetimes. Rabi oscillations reveal themselves also in the photoelectron
spectrum in form of Autler-Townes splittings extending over several tens of
electronvolt.Comment: 6 pages, 5 figure
Parallel Self-Testing of EPR Pairs Under Computational Assumptions
Self-testing is a fundamental feature of quantum mechanics that allows a classical verifier to force untrusted quantum devices to prepare certain states and perform certain measurements on them. The standard approach assumes at least two spatially separated devices. Recently, Metger and Vidick [Metger and Vidick, 2021] showed that a single EPR pair of a single quantum device can be self-tested under computational assumptions. In this work, we generalize their results to give the first parallel self-test of N EPR pairs and measurements on them in the single-device setting under the same computational assumptions. We show that our protocol can be passed with probability negligibly close to 1 by an honest quantum device using poly(N) resources. Moreover, we show that any quantum device that fails our protocol with probability at most ? must be poly(N,?)-close to being honest in the appropriate sense. In particular, our protocol can test any distribution over tensor products of computational or Hadamard basis measurements, making it suitable for applications such as device-independent quantum key distribution [Metger et al., 2021] under computational assumptions. Moreover, a simplified version of our protocol is the first that can efficiently certify an arbitrary number of qubits of a single cloud quantum computer using only classical communication
FinGPT: Democratizing Internet-scale Data for Financial Large Language Models
Large language models (LLMs) have demonstrated remarkable proficiency in
understanding and generating human-like texts, which may potentially
revolutionize the finance industry. However, existing LLMs often fall short in
the financial field, which is mainly attributed to the disparities between
general text data and financial text data. Unfortunately, there is only a
limited number of financial text datasets available (quite small size), and
BloombergGPT, the first financial LLM (FinLLM), is close-sourced (only the
training logs were released). In light of this, we aim to democratize
Internet-scale financial data for LLMs, which is an open challenge due to
diverse data sources, low signal-to-noise ratio, and high time-validity. To
address the challenges, we introduce an open-sourced and data-centric
framework, \textit{Financial Generative Pre-trained Transformer (FinGPT)}, that
automates the collection and curation of real-time financial data from >34
diverse sources on the Internet, providing researchers and practitioners with
accessible and transparent resources to develop their FinLLMs. Additionally, we
propose a simple yet effective strategy for fine-tuning FinLLM using the
inherent feedback from the market, dubbed Reinforcement Learning with Stock
Prices (RLSP). We also adopt the Low-rank Adaptation (LoRA, QLoRA) method that
enables users to customize their own FinLLMs from open-source general-purpose
LLMs at a low cost. Finally, we showcase several FinGPT applications, including
robo-advisor, sentiment analysis for algorithmic trading, and low-code
development. FinGPT aims to democratize FinLLMs, stimulate innovation, and
unlock new opportunities in open finance. The codes are available at
https://github.com/AI4Finance-Foundation/FinGPT and
https://github.com/AI4Finance-Foundation/FinNLPComment: 43 pages, 9 tables, and 3 figure
Evaluating the security of CRYSTALS-Dilithium in the quantum random oracle model
In the wake of recent progress on quantum computing hardware, the National
Institute of Standards and Technology (NIST) is standardizing cryptographic
protocols that are resistant to attacks by quantum adversaries. The primary
digital signature scheme that NIST has chosen is CRYSTALS-Dilithium. The
hardness of this scheme is based on the hardness of three computational
problems: Module Learning with Errors (MLWE), Module Short Integer Solution
(MSIS), and SelfTargetMSIS. MLWE and MSIS have been well-studied and are widely
believed to be secure. However, SelfTargetMSIS is novel and, though classically
as hard as MSIS, its quantum hardness is unclear. In this paper, we provide the
first proof of the hardness of SelfTargetMSIS via a reduction from MLWE in the
Quantum Random Oracle Model (QROM). Our proof uses recently developed
techniques in quantum reprogramming and rewinding. A central part of our
approach is a proof that a certain hash function, derived from the MSIS
problem, is collapsing. From this approach, we deduce a new security proof for
Dilithium under appropriate parameter settings. Compared to the previous work
by Kiltz, Lyubashevsky, and Schaffner (EUROCRYPT 2018) that gave the only other
rigorous security proof for a variant of Dilithium, our proof has the advantage
of being applicable under the condition q = 1 mod 2n, where q denotes the
modulus and n the dimension of the underlying algebraic ring. This condition is
part of the original Dilithium proposal and is crucial for the efficient
implementation of the scheme. We provide new secure parameter sets for
Dilithium under the condition q = 1 mod 2n, finding that our public key size
and signature size are about 2.9 times and 1.3 times larger, respectively, than
those proposed by Kiltz et al. at the same security level.Comment: 23 pages; v2: added description of CRYSTALS-Dilithium, improved
analysis of concrete parameter
Interactive System-wise Anomaly Detection
Anomaly detection, where data instances are discovered containing feature
patterns different from the majority, plays a fundamental role in various
applications. However, it is challenging for existing methods to handle the
scenarios where the instances are systems whose characteristics are not readily
observed as data. Appropriate interactions are needed to interact with the
systems and identify those with abnormal responses. Detecting system-wise
anomalies is a challenging task due to several reasons including: how to
formally define the system-wise anomaly detection problem; how to find the
effective activation signal for interacting with systems to progressively
collect the data and learn the detector; how to guarantee stable training in
such a non-stationary scenario with real-time interactions? To address the
challenges, we propose InterSAD (Interactive System-wise Anomaly Detection).
Specifically, first, we adopt Markov decision process to model the interactive
systems, and define anomalous systems as anomalous transition and anomalous
reward systems. Then, we develop an end-to-end approach which includes an
encoder-decoder module that learns system embeddings, and a policy network to
generate effective activation for separating embeddings of normal and anomaly
systems. Finally, we design a training method to stabilize the learning
process, which includes a replay buffer to store historical interaction data
and allow them to be re-sampled. Experiments on two benchmark environments,
including identifying the anomalous robotic systems and detecting user data
poisoning in recommendation models, demonstrate the superiority of InterSAD
compared with state-of-the-art baselines methods
Quantum exploration algorithms for multi-armed bandits
Identifying the best arm of a multi-armed bandit is a central problem in
bandit optimization. We study a quantum computational version of this problem
with coherent oracle access to states encoding the reward probabilities of each
arm as quantum amplitudes. Specifically, we show that we can find the best arm
with fixed confidence using
quantum
queries, where represents the difference between the mean reward
of the best arm and the -best arm. This algorithm, based on
variable-time amplitude amplification and estimation, gives a quadratic speedup
compared to the best possible classical result. We also prove a matching
quantum lower bound (up to poly-logarithmic factors).Comment: 18 pages, 1 figure. To appear in the Thirty-Fifth AAAI Conference on
Artificial Intelligence (AAAI 2021