4,620 research outputs found
A Turing Test: Are AI Chatbots Behaviorally Similar to Humans?
We administer a Turing Test to AI Chatbots. We examine how Chatbots behave in
a suite of classic behavioral games that are designed to elicit characteristics
such as trust, fairness, risk-aversion, cooperation, \textit{etc.}, as well as
how they respond to a traditional Big-5 psychological survey that measures
personality traits. ChatGPT-4 exhibits behavioral and personality traits that
are statistically indistinguishable from a random human from tens of thousands
of human subjects from more than 50 countries. Chatbots also modify their
behavior based on previous experience and contexts ``as if'' they were learning
from the interactions, and change their behavior in response to different
framings of the same strategic situation. Their behaviors are often distinct
from average and modal human behaviors, in which case they tend to behave on
the more altruistic and cooperative end of the distribution. We estimate that
they act as if they are maximizing an average of their own and partner's
payoffs
Weakly Supervised Semantic Segmentation for Large-Scale Point Cloud
Existing methods for large-scale point cloud semantic segmentation require
expensive, tedious and error-prone manual point-wise annotations. Intuitively,
weakly supervised training is a direct solution to reduce the cost of labeling.
However, for weakly supervised large-scale point cloud semantic segmentation,
too few annotations will inevitably lead to ineffective learning of network. We
propose an effective weakly supervised method containing two components to
solve the above problem. Firstly, we construct a pretext task, \textit{i.e.,}
point cloud colorization, with a self-supervised learning to transfer the
learned prior knowledge from a large amount of unlabeled point cloud to a
weakly supervised network. In this way, the representation capability of the
weakly supervised network can be improved by the guidance from a heterogeneous
task. Besides, to generate pseudo label for unlabeled data, a sparse label
propagation mechanism is proposed with the help of generated class prototypes,
which is used to measure the classification confidence of unlabeled point. Our
method is evaluated on large-scale point cloud datasets with different
scenarios including indoor and outdoor. The experimental results show the large
gain against existing weakly supervised and comparable results to fully
supervised methods\footnote{Code based on mindspore:
https://github.com/dmcv-ecnu/MindSpore\_ModelZoo/tree/main/WS3\_MindSpore}
First report on the occurrence of Rickettsia slovaca and Rickettsia raoultii in Dermacentor silvarum in China
10.1186/1756-3305-5-19Parasites and Vectors511
Experimental Quantum Communication Overcomes the Rate-loss Limit without Global Phase Tracking
Secure key rate (SKR) of point-point quantum key distribution (QKD) is
fundamentally bounded by the rate-loss limit. Recent breakthrough of twin-field
(TF) QKD can overcome this limit and enables long distance quantum
communication, but its implementation necessitates complex global phase
tracking and requires strong phase references which not only add to noise but
also reduce the duty cycle for quantum transmission. Here, we resolve these
shortcomings, and importantly achieve even higher SKRs than TF-QKD, via
implementing an innovative but simpler measurement-device-independent QKD which
realizes repeater-like communication through asynchronous coincidence pairing.
Over 413 and 508 km optical fibers, we achieve finite-size SKRs of 590.61 and
42.64 bit/s, which are respectively 1.80 and 4.08 times of their corresponding
absolute rate limits. Significantly, the SKR at 306 km exceeds 5 kbit/s and
meets the bitrate requirement for live one-time-pad encryption of voice
communication. Our work will bring forward economical and efficient intercity
quantum-secure networks.Comment: 29 pages, 10 figures, 3 table
Asynchronous measurement-device-independent quantum key distribution with hybrid source
The linear constraint of secret key rate capacity is overcome by the
tiwn-field quantum key distribution (QKD). However, the complex phase-locking
and phase-tracking technique requirements throttle the real-life applications
of twin-field protocol. The asynchronous measurement-device-independent (AMDI)
QKD or called mode-pairing QKD protocol [PRX Quantum 3, 020315 (2022), Nat.
Commun. 13, 3903 (2022)] can relax the technical requirements and keep the
similar performance of twin-field protocol. Here, we propose an AMDI-QKD
protocol with a nonclassical light source by changing the phase-randomized weak
coherent state to a phase-randomized coherent-state superposition (CSS) in the
signal state time window. Simulation results show that our proposed hybrid
source protocol significantly enhances the key rate of the AMDI-QKD protocol,
while exhibiting robustness to imperfect modulation of nonclassical light
sources.Comment: 9 pages, 4 figure
Finite-Key Analysis for Coherent-One-Way Quantum Key Distribution
Coherent-one-way (COW) quantum key distribution (QKD) is a significant
communication protocol that has been implemented experimentally and deployed in
practical products due to its simple equipment requirements. However, existing
security analyses of COW-QKD either provide a short transmission distance or
lack immunity against coherent attacks in the finite-key regime. In this study,
we present a tight finite-key security analysis within the universally
composable framework for a new variant of COW-QKD, which has been proven to
extend the secure transmission distance in the asymptotic case. We combine the
Quantum Leftover Hash Lemma and entropic uncertainty relation to derive the key
rate formula. When estimating statistical parameters, we use the recently
proposed Kato's inequality to ensure security against coherent attacks and
achieve a higher key rate. Our work confirms the security and feasibility of
COW-QKD for practical application and lays the foundation for further
theoretical study and experimental implementation.Comment: 12 pages, 5 figure
Advantages of Asynchronous Measurement-Device-Independent Quantum Key Distribution in Intercity Networks
The new variant of measurement-device-independent quantum key distribution
(MDI-QKD), called asynchronous MDI-QKD or mode-pairing MDI-QKD, offers similar
repeater-like rate-loss scaling but has the advantage of simple technology
implementation by exploiting an innovative post-measurement pairing technique.
We herein present an evaluation of the practical aspects of decoy-state
asynchronous MDI-QKD. To determine its effectiveness, we analyze the optimal
method of decoy-state calculation and examine the impact of asymmetrical
channels and multi-user networks. Our simulations show that, under realistic
conditions, aynchronous MDI-QKD can furnish the highest key rate with MDI
security as compared to other QKD protocols over distances ranging from 50 km
to 480 km. At fiber distances of 50 km and 100 km, the key rates attain 6.02
Mbps and 2.29 Mbps respectively, which are sufficient to facilitate real-time
one-time-pad video encryption. Our findings indicate that experimental
implementation of asynchronous MDI-QKD in intercity networks can be both
practical and efficient
One-Time Universal Hashing Quantum Digital Signatures without Perfect Keys
Quantum digital signatures (QDS), generating correlated bit strings among
three remote parties for signatures through quantum law, can guarantee
non-repudiation, authenticity, and integrity of messages. Recently, one-time
universal hashing QDS framework, exploiting the quantum asymmetric encryption
and universal hash functions, has been proposed to significantly improve the
signature rate and ensure unconditional security by directly signing the hash
value of long messages. However, similar to quantum key distribution, this
framework utilizes keys with perfect secrecy by performing privacy
amplification that introduces cumbersome matrix operations, thereby consuming
large computational resources, causing delays and increasing failure
probability. Here, we prove that, different from private communication,
imperfect quantum keys with limited information leakage can be used for digital
signatures and authentication without compromising the security while having
eight orders of magnitude improvement on signature rate for signing a megabit
message compared with conventional single-bit schemes. This study significantly
reduces the delay for data postprocessing and is compatible with any quantum
key generation protocols. In our simulation, taking two-photon twin-field key
generation protocol as an example, QDS can be practically implemented over a
fiber distance of 650 km between the signer and receiver. For the first time,
this study offers a cryptographic application of quantum keys with imperfect
secrecy and paves a way for the practical and agile implementation of digital
signatures in a future quantum network.Comment: Comments are welcome
- …