735 research outputs found
Detecting a set of entanglement measures in an unknown tripartite quantum state by local operations and classical communication
We propose a more general method for detecting a set of entanglement
measures, i.e. negativities, in an \emph{arbitrary} tripartite quantum state by
local operations and classical communication. To accomplish the detection task
using this method, three observers, Alice, Bob and Charlie, do not need to
perform the partial transposition maps by the structural physical
approximation; instead, they are only required to collectively measure some
functions via three local networks supplemented by a classical communication.
With these functions, they are able to determine the set of negativities
related to the tripartite quantum state.Comment: 16 pages, 2 figures, revte
Draft Genome of the Leopard Gecko, \u3cem\u3eEublepharis Macularius\u3c/em\u3e
Background
Geckos are among the most species-rich reptile groups and the sister clade to all other lizards and snakes. Geckos possess a suite of distinctive characteristics, including adhesive digits, nocturnal activity, hard, calcareous eggshells, and a lack of eyelids. However, one gecko clade, the Eublepharidae, appears to be the exception to most of these ‘rules’ and lacks adhesive toe pads, has eyelids, and lays eggs with soft, leathery eggshells. These differences make eublepharids an important component of any investigation into the underlying genomic innovations contributing to the distinctive phenotypes in ‘typical’ geckos. Findings
We report high-depth genome sequencing, assembly, and annotation for a male leopard gecko, Eublepharis macularius (Eublepharidae). Illumina sequence data were generated from seven insert libraries (ranging from 170 to 20 kb), representing a raw sequencing depth of 136X from 303 Gb of data, reduced to 84X and 187 Gb after filtering. The assembled genome of 2.02 Gb was close to the 2.23 Gb estimated by k-mer analysis. Scaffold and contig N50 sizes of 664 and 20 kb, respectively, were compble to the previously published Gekko japonicus genome. Repetitive elements accounted for 42 % of the genome. Gene annotation yielded 24,755 protein-coding genes, of which 93 % were functionally annotated. CEGMA and BUSCO assessment showed that our assembly captured 91 % (225 of 248) of the core eukaryotic genes, and 76 % of vertebrate universal single-copy orthologs. Conclusions
Assembly of the leopard gecko genome provides a valuable resource for future comptive genomic studies of geckos and other squamate reptiles
Noiseless method for checking the Peres separability criterion by local operations and classical communication
We present a method for checking Peres separability criterion in an arbitrary
bipartite quantum state within local operations and classical
communication scenario. The method does not require the prior state
reconstruction and the structural physical approximation. The main task for the
two observers, Alice and Bob, is to estimate some specific functions. After
getting these functions, they can determine the minimal eigenvalue of
, which serves as an entanglement indicator in lower
dimensions.Comment: 10 pages, 2 figure
FDINet: Protecting against DNN Model Extraction via Feature Distortion Index
Machine Learning as a Service (MLaaS) platforms have gained popularity due to
their accessibility, cost-efficiency, scalability, and rapid development
capabilities. However, recent research has highlighted the vulnerability of
cloud-based models in MLaaS to model extraction attacks. In this paper, we
introduce FDINET, a novel defense mechanism that leverages the feature
distribution of deep neural network (DNN) models. Concretely, by analyzing the
feature distribution from the adversary's queries, we reveal that the feature
distribution of these queries deviates from that of the model's training set.
Based on this key observation, we propose Feature Distortion Index (FDI), a
metric designed to quantitatively measure the feature distribution deviation of
received queries. The proposed FDINET utilizes FDI to train a binary detector
and exploits FDI similarity to identify colluding adversaries from distributed
extraction attacks. We conduct extensive experiments to evaluate FDINET against
six state-of-the-art extraction attacks on four benchmark datasets and four
popular model architectures. Empirical results demonstrate the following
findings FDINET proves to be highly effective in detecting model extraction,
achieving a 100% detection accuracy on DFME and DaST. FDINET is highly
efficient, using just 50 queries to raise an extraction alarm with an average
confidence of 96.08% for GTSRB. FDINET exhibits the capability to identify
colluding adversaries with an accuracy exceeding 91%. Additionally, it
demonstrates the ability to detect two types of adaptive attacks.Comment: 13 pages, 7 figure
Visual-Guided Mesh Repair
Mesh repair is a long-standing challenge in computer graphics and related
fields. Converting defective meshes into watertight manifold meshes can greatly
benefit downstream applications such as geometric processing, simulation,
fabrication, learning, and synthesis. In this work, we first introduce three
visual measures for visibility, orientation, and openness, based on
ray-tracing. We then present a novel mesh repair framework that incorporates
visual measures with several critical steps, i.e., open surface closing, face
reorientation, and global optimization, to effectively repair defective meshes,
including gaps, holes, self-intersections, degenerate elements, and
inconsistent orientations. Our method reduces unnecessary mesh complexity
without compromising geometric accuracy or visual quality while preserving
input attributes such as UV coordinates for rendering. We evaluate our approach
on hundreds of models randomly selected from ShapeNet and Thingi10K,
demonstrating its effectiveness and robustness compared to existing approaches
- …