5,261 research outputs found

    Phenomenological discriminations of the Yukawa interactions in two-Higgs doublet models with Z2Z_2 symmetry

    Get PDF
    There are four types of two-Higgs doublet models under a discrete Z2Z_2 symmetry imposed to avoid tree-level flavour-changing neutral current, i.e. type-I, type-II, type-X and type-Y models. We investigate the possibility to discriminate the four models in the light of the flavour physics data, including Bs−BˉsB_s-\bar B_s mixing, Bs,d→μ+μ−B_{s,d} \to \mu^+ \mu^-, B→τνB\to \tau\nu and Bˉ→Xsγ\bar B \to X_s \gamma decays, the recent LHC Higgs data, the direct search for charged Higgs at LEP, and the constraints from perturbative unitarity and vacuum stability. After deriving the combined constraints on the Yukawa interaction parameters, we have shown that the correlation between the mass eigenstate rate asymmetry AΔΓA_{\Delta\Gamma} of Bs→μ+μ−B_{s} \to \mu^+ \mu^- and the ratio R=B(Bs→μ+μ−)exp/B(Bs→μ+μ−)SMR={\cal B}(B_{s} \to \mu^+ \mu^-)_{exp}/ {\cal B}(B_{s} \to \mu^+ \mu^-)_{SM} could be sensitive probe to discriminate the four models with future precise measurements of the observables in the Bs→μ+μ−B_{s} \to \mu^+ \mu^- decay at LHCb.Comment: 29 pages, 4 tables, 11 figures. v3: minor corrections included, matches published version in EPJ

    MeshAdv: Adversarial Meshes for Visual Recognition

    Full text link
    Highly expressive models such as deep neural networks (DNNs) have been widely applied to various applications. However, recent studies show that DNNs are vulnerable to adversarial examples, which are carefully crafted inputs aiming to mislead the predictions. Currently, the majority of these studies have focused on perturbation added to image pixels, while such manipulation is not physically realistic. Some works have tried to overcome this limitation by attaching printable 2D patches or painting patterns onto surfaces, but can be potentially defended because 3D shape features are intact. In this paper, we propose meshAdv to generate "adversarial 3D meshes" from objects that have rich shape features but minimal textural variation. To manipulate the shape or texture of the objects, we make use of a differentiable renderer to compute accurate shading on the shape and propagate the gradient. Extensive experiments show that the generated 3D meshes are effective in attacking both classifiers and object detectors. We evaluate the attack under different viewpoints. In addition, we design a pipeline to perform black-box attack on a photorealistic renderer with unknown rendering parameters.Comment: Published in IEEE CVPR201
    • …
    corecore