5,261 research outputs found
Phenomenological discriminations of the Yukawa interactions in two-Higgs doublet models with symmetry
There are four types of two-Higgs doublet models under a discrete
symmetry imposed to avoid tree-level flavour-changing neutral current, i.e.
type-I, type-II, type-X and type-Y models. We investigate the possibility to
discriminate the four models in the light of the flavour physics data,
including mixing, , and
decays, the recent LHC Higgs data, the direct search
for charged Higgs at LEP, and the constraints from perturbative unitarity and
vacuum stability. After deriving the combined constraints on the Yukawa
interaction parameters, we have shown that the correlation between the mass
eigenstate rate asymmetry of and the
ratio could be sensitive probe to discriminate the four models with
future precise measurements of the observables in the
decay at LHCb.Comment: 29 pages, 4 tables, 11 figures. v3: minor corrections included,
matches published version in EPJ
MeshAdv: Adversarial Meshes for Visual Recognition
Highly expressive models such as deep neural networks (DNNs) have been widely
applied to various applications. However, recent studies show that DNNs are
vulnerable to adversarial examples, which are carefully crafted inputs aiming
to mislead the predictions. Currently, the majority of these studies have
focused on perturbation added to image pixels, while such manipulation is not
physically realistic. Some works have tried to overcome this limitation by
attaching printable 2D patches or painting patterns onto surfaces, but can be
potentially defended because 3D shape features are intact. In this paper, we
propose meshAdv to generate "adversarial 3D meshes" from objects that have rich
shape features but minimal textural variation. To manipulate the shape or
texture of the objects, we make use of a differentiable renderer to compute
accurate shading on the shape and propagate the gradient. Extensive experiments
show that the generated 3D meshes are effective in attacking both classifiers
and object detectors. We evaluate the attack under different viewpoints. In
addition, we design a pipeline to perform black-box attack on a photorealistic
renderer with unknown rendering parameters.Comment: Published in IEEE CVPR201
- …