-
Deep Quantum Graph Dreaming: Deciphering Neural Network Insights into Quantum Experiments
Authors:
Tareq Jaouni,
Sören Arlt,
Carlos Ruiz-Gonzalez,
Ebrahim Karimi,
Xuemei Gu,
Mario Krenn
Abstract:
Despite their promise to facilitate new scientific discoveries, the opaqueness of neural networks presents a challenge in interpreting the logic behind their findings. Here, we use a eXplainable-AI (XAI) technique called $inception$ or $deep$ $dreaming$, which has been invented in machine learning for computer vision. We use this technique to explore what neural networks learn about quantum optics…
▽ More
Despite their promise to facilitate new scientific discoveries, the opaqueness of neural networks presents a challenge in interpreting the logic behind their findings. Here, we use a eXplainable-AI (XAI) technique called $inception$ or $deep$ $dreaming$, which has been invented in machine learning for computer vision. We use this technique to explore what neural networks learn about quantum optics experiments. Our story begins by training deep neural networks on the properties of quantum systems. Once trained, we "invert" the neural network -- effectively asking how it imagines a quantum system with a specific property, and how it would continuously modify the quantum system to change a property. We find that the network can shift the initial distribution of properties of the quantum system, and we can conceptualize the learned strategies of the neural network. Interestingly, we find that, in the first layers, the neural network identifies simple properties, while in the deeper ones, it can identify complex quantum structures and even quantum entanglement. This is in reminiscence of long-understood properties known in computer vision, which we now identify in a complex natural science task. Our approach could be useful in a more interpretable way to develop new advanced AI-based scientific discovery techniques in quantum physics.
△ Less
Submitted 4 October, 2023; v1 submitted 13 September, 2023;
originally announced September 2023.
-
Secure communication using low dimensional topological elements
Authors:
Manuel F. Ferrer-Garcia,
Avishy Carmi,
Alessio D'Errico,
Hugo Larocque,
Eliahu Cohen,
Ebrahim Karimi
Abstract:
Low-dimensional topological objects, such as knots and braids, have become prevalent in multiple areas of physics, such as fluid dynamics, optics, and quantum information processing. Such objects also now play a role in cryptography, where a framed knot can store encoded information using its braid representation for communications purposes. The greater resilience of low-dimensional topological el…
▽ More
Low-dimensional topological objects, such as knots and braids, have become prevalent in multiple areas of physics, such as fluid dynamics, optics, and quantum information processing. Such objects also now play a role in cryptography, where a framed knot can store encoded information using its braid representation for communications purposes. The greater resilience of low-dimensional topological elements under deformations allows them to be employed as a reliable framework for information exchange. Here, we introduce a challenge-response protocol as an application of this construction for authentication. We provide illustrative examples of both procedures showing how framed links and braids may help to enhance secure communication.
△ Less
Submitted 7 December, 2022;
originally announced December 2022.
-
Noisy Group Testing with Side Information
Authors:
Esmaeil Karimi,
Anoosheh Heidarzadeh,
Krishna R. Narayanan,
Alex Sprintson
Abstract:
Group testing has recently attracted significant attention from the research community due to its applications in diagnostic virology. An instance of the group testing problem includes a ground set of individuals which includes a small subset of infected individuals. The group testing procedure consists of a number of tests, such that each test indicates whether or not a given subset of individual…
▽ More
Group testing has recently attracted significant attention from the research community due to its applications in diagnostic virology. An instance of the group testing problem includes a ground set of individuals which includes a small subset of infected individuals. The group testing procedure consists of a number of tests, such that each test indicates whether or not a given subset of individuals includes one or more infected individuals. The goal of the group testing procedure is to identify the subset of infected individuals with the minimum number of tests. Motivated by practical scenarios, such as testing for viral diseases, this paper focuses on the following group testing settings: (i) the group testing procedure is noisy, i.e., the outcome of the group testing procedure can be flipped with a certain probability; (ii) there is a certain amount of side information on the distribution of the infected individuals available to the group testing algorithm. The paper makes the following contributions. First, we propose a probabilistic model, referred to as an interaction model, that captures the side information about the probability distribution of the infected individuals. Next, we present a decoding scheme, based on the belief propagation, that leverages the interaction model to improve the decoding accuracy. Our results indicate that the proposed algorithm achieves higher success probability and lower false-negative and false-positive rates when compared to the traditional belief propagation especially in the high noise regime.
△ Less
Submitted 24 February, 2022;
originally announced February 2022.
-
Average Outward Flux Skeletons for Environment Mapping and Topology Matching
Authors:
Morteza Rezanejad,
Babak Samari,
Elham Karimi,
Ioannis Rekleitis,
Gregory Dudek,
Kaleem Siddiqi
Abstract:
We consider how to directly extract a road map (also known as a topological representation) of an initially-unknown 2-dimensional environment via an online procedure that robustly computes a retraction of its boundaries. In this article, we first present the online construction of a topological map and the implementation of a control law for guiding the robot to the nearest unexplored area, first…
▽ More
We consider how to directly extract a road map (also known as a topological representation) of an initially-unknown 2-dimensional environment via an online procedure that robustly computes a retraction of its boundaries. In this article, we first present the online construction of a topological map and the implementation of a control law for guiding the robot to the nearest unexplored area, first presented in [1]. The proposed method operates by allowing the robot to localize itself on a partially constructed map, calculate a path to unexplored parts of the environment (frontiers), compute a robust terminating condition when the robot has fully explored the environment, and achieve loop closure detection. The proposed algorithm results in smooth safe paths for the robot's navigation needs. The presented approach is any time algorithm that has the advantage that it allows for the active creation of topological maps from laser scan data, as it is being acquired. We also propose a navigation strategy based on a heuristic where the robot is directed towards nodes in the topological map that open to empty space. We then extend the work in [1] by presenting a topology matching algorithm that leverages the strengths of a particular spectral correspondence method [2], to match the mapped environments generated from our topology-making algorithm. Here, we concentrated on implementing a system that could be used to match the topologies of the mapped environment by using AOF Skeletons. In topology matching between two given maps and their AOF skeletons, we first find correspondences between points on the AOF skeletons of two different environments. We then align the (2D) points of the environments themselves. We also compute a distance measure between two given environments, based on their extracted AOF skeletons and their topology, as the sum of the matching errors between corresponding points.
△ Less
Submitted 27 November, 2021;
originally announced November 2021.
-
Scheduling Improves the Performance of Belief Propagation for Noisy Group Testing
Authors:
Esmaeil Karimi,
Anoosheh Heidarzadeh,
Krishna R. Narayanan,
Alex Sprintson
Abstract:
This paper considers the noisy group testing problem where among a large population of items some are defective. The goal is to identify all defective items by testing groups of items, with the minimum possible number of tests. The focus of this work is on the practical settings with a limited number of items rather than the asymptotic regime. In the current literature, belief propagation has been…
▽ More
This paper considers the noisy group testing problem where among a large population of items some are defective. The goal is to identify all defective items by testing groups of items, with the minimum possible number of tests. The focus of this work is on the practical settings with a limited number of items rather than the asymptotic regime. In the current literature, belief propagation has been shown to be effective in recovering defective items from the test results. In this work, we adopt two variants of the belief propagation algorithm for the noisy group testing problem. These algorithms have been used successfully in the decoding of low-density parity-check codes. We perform an experimental study and using extensive simulations we show that these algorithms achieve higher success probability, lower false-negative, and false-positive rates compared to the traditional belief propagation algorithm. For instance, our results show that the proposed algorithms can reduce the false-negative rate by about $50\%$ (or more) when compared to the traditional BP algorithm, under the combinatorial model. Moreover, under the probabilistic model, this reduction in the false-negative rate increases to about $80\%$ for the tested cases.
△ Less
Submitted 19 October, 2021;
originally announced October 2021.
-
Hardware/Software Obfuscation against Timing Side-channel Attack on a GPU
Authors:
Elmira Karimi,
Yunsi Fei,
David Kaeli
Abstract:
GPUs are increasingly being used in security applications, especially for accelerating encryption/decryption. While GPUs are an attractive platform in terms of performance, the security of these devices raises a number of concerns. One vulnerability is the data-dependent timing information, which can be exploited by adversary to recover the encryption key. Memory system features are frequently exp…
▽ More
GPUs are increasingly being used in security applications, especially for accelerating encryption/decryption. While GPUs are an attractive platform in terms of performance, the security of these devices raises a number of concerns. One vulnerability is the data-dependent timing information, which can be exploited by adversary to recover the encryption key. Memory system features are frequently exploited since they create detectable timing variations. In this paper, our attack model is a coalescing attack, which leverages a critical GPU microarchitectural feature -- the coalescing unit. As multiple concurrent GPU memory requests can refer to the same cache block, the coalescing unit collapses them into a single memory transaction. The access time of an encryption kernel is dependent on the number of transactions. Correlation between a guessed key value and the associated timing samples can be exploited to recover the secret key. In this paper, a series of hardware/software countermeasures are proposed to obfuscate the memory timing side channel, making the GPU more resilient without impacting performance. Our hardware-based approach attempts to randomize the width of the coalescing unit to lower the signal-to-noise ratio. We present a hierarchical Miss Status Holding Register (MSHR) design that can merge transactions across different warps. This feature boosts performance, while, at the same time, secures the execution. We also present a software-based approach to permute the organization of critical data structures, significantly changing the coalescing behavior and introducing a high degree of randomness. Equipped with our new protections, the effort to launch a successful attack is increased up to 1433X . 178X, while also improving encryption/decryption performance up to 7%.
△ Less
Submitted 31 July, 2020;
originally announced July 2020.
-
A Combinatorial View of the Service Rates of Codes Problem, its Equivalence to Fractional Matching and its Connection with Batch Codes
Authors:
Fatemeh Kazemi,
Esmaeil Karimi,
Emina Soljanin,
Alex Sprintson
Abstract:
We propose a novel technique for constructing a graph representation of a code through which we establish a significant connection between the service rate problem and the well-known fractional matching problem. Using this connection, we show that the service capacity of a coded storage system equals the fractional matching number in the graph representation of the code, and thus is lower bounded…
▽ More
We propose a novel technique for constructing a graph representation of a code through which we establish a significant connection between the service rate problem and the well-known fractional matching problem. Using this connection, we show that the service capacity of a coded storage system equals the fractional matching number in the graph representation of the code, and thus is lower bounded and upper bounded by the matching number and the vertex cover number, respectively. This is of great interest because if the graph representation of a code is bipartite, then the derived upper and lower bounds are equal, and we obtain the capacity. Leveraging this result, we characterize the service capacity of the binary simplex code whose graph representation, as we show, is bipartite. Moreover, we show that the service rate problem can be viewed as a generalization of the multiset primitive batch codes problem.
△ Less
Submitted 24 January, 2020;
originally announced January 2020.
-
Increasing the Raw Key Rate in Energy-Time Entanglement Based Quantum Key Distribution
Authors:
Esmaeil Karimi,
Emina Soljanin,
Philip Whiting
Abstract:
A Quantum Key Distribution (QKD) protocol describes how two remote parties can establish a secret key by communicating over a quantum and a public classical channel that both can be accessed by an eavesdropper. QKD protocols using energy-time entangled photon pairs are of growing practical interest because of their potential to provide a higher secure key rate over long distances by carrying multi…
▽ More
A Quantum Key Distribution (QKD) protocol describes how two remote parties can establish a secret key by communicating over a quantum and a public classical channel that both can be accessed by an eavesdropper. QKD protocols using energy-time entangled photon pairs are of growing practical interest because of their potential to provide a higher secure key rate over long distances by carrying multiple bits per entangled photon pair. We consider a system where information can be extracted by measuring random times of a sequence of entangled photon arrivals. Our goal is to maximize the utility of each such pair. We propose a discrete time model for the photon arrival process, and establish a theoretical bound on the number of raw bits that can be generated under this model. We first analyse a well known simple binning encoding scheme, and show that it generates significantly lower information rate than what is theoretically possible. We then propose three adaptive schemes that increase the number of raw bits generated per photon, and compute and compare the information rates they offer. Moreover, the effect of public channel communication on the secret key rates of the proposed schemes is investigated.
△ Less
Submitted 24 January, 2020;
originally announced January 2020.
-
Non-adaptive Quantitative Group Testing Using Irregular Sparse Graph Codes
Authors:
Esmaeil Karimi,
Fatemeh Kazemi,
Anoosheh Heidarzadeh,
Krishna R. Narayanan,
Alex Sprintson
Abstract:
This paper considers the problem of Quantitative Group Testing (QGT) where there are some defective items among a large population of $N$ items. We consider the scenario in which each item is defective with probability $K/N$, independently from the other items. In the QGT problem, the goal is to identify all or a sufficiently large fraction of the defective items by testing groups of items, with t…
▽ More
This paper considers the problem of Quantitative Group Testing (QGT) where there are some defective items among a large population of $N$ items. We consider the scenario in which each item is defective with probability $K/N$, independently from the other items. In the QGT problem, the goal is to identify all or a sufficiently large fraction of the defective items by testing groups of items, with the minimum possible number of tests. In particular, the outcome of each test is a non-negative integer which indicates the number of defective items in the tested group. In this work, we propose a non-adaptive QGT scheme for the underlying randomized model for defective items, which utilizes sparse graph codes over irregular bipartite graphs with optimized degree profiles on the left nodes of the graph as well as binary $t$-error-correcting BCH codes. We show that in the sub-linear regime, i.e., when the ratio $K/N$ vanishes as $N$ grows unbounded, the proposed scheme with ${m=c(t,d)K(t\log (\frac{\ell N}{c(t,d)K}+1)+1)}$ tests can identify all the defective items with probability approaching $1$, where $d$ and $\ell$ are the maximum and average left degree, respectively, and $c(t,d)$ depends only on $t$ and $d$ (and does not depend on $K$ and $N$). For any $t\leq 4$, the testing and recovery algorithms of the proposed scheme have the computational complexity of $\mathcal{O}(N\log \frac{N}{K})$ and $\mathcal{O}(K\log \frac{N}{K})$, respectively. The proposed scheme outperforms two recently proposed non-adaptive QGT schemes for the sub-linear regime, including our scheme based on regular bipartite graphs and the scheme of Gebhard et al., in terms of the number of tests required to identify all defective items with high probability.
△ Less
Submitted 15 October, 2019;
originally announced October 2019.
-
Private Information Retrieval with Private Coded Side Information: The Multi-Server Case
Authors:
Fatemeh Kazemi,
Esmaeil Karimi,
Anoosheh Heidarzadeh,
Alex Sprintson
Abstract:
In this paper, we consider the multi-server setting of Private Information Retrieval with Private Coded Side Information (PIR-PCSI) problem. In this problem, there is a database of $K$ messages whose copies are replicated across $N$ servers, and there is a user who knows a random linear combination of a random subset of $M$ messages in the database as side information. The user wishes to download…
▽ More
In this paper, we consider the multi-server setting of Private Information Retrieval with Private Coded Side Information (PIR-PCSI) problem. In this problem, there is a database of $K$ messages whose copies are replicated across $N$ servers, and there is a user who knows a random linear combination of a random subset of $M$ messages in the database as side information. The user wishes to download one message from the servers, while protecting the identities of both the demand message and the messages forming the side information. We assume that the servers know the number of messages forming the user's side information in advance, whereas the indices of these messages and their coefficients in the side information are not known to any of the servers a priori.
Our goal is to characterize (or derive a lower bound on) the capacity, i.e., the maximum achievable download rate, for the following two settings. In the first setting, the set of messages forming the linear combination available to the user as side information, does not include the user's demanded message. For this setting, we show that the capacity is equal to $\left(1+{1}/{N}+\dots+{1}/{N^{K-M-1}}\right)^{-1}$. In the second setting, the demand message contributes to the linear combination available to the user as side information, i.e., the demand message is one of the messages that form the user's side information. For this setting, we show that the capacity is lower-bounded by $\left(1+{1}/{N}+\dots+{1}/{N^{K-M}}\right)^{-1}$. The proposed achievability schemes and proof techniques leverage ideas from both our recent methods proposed for the single-server PIR-PCSI problem as well as the techniques proposed by Sun and Jafar for multi-server private computation problem.
△ Less
Submitted 26 June, 2019;
originally announced June 2019.
-
Multi-Server Private Information Retrieval with Coded Side Information
Authors:
Fatemeh Kazemi,
Esmaeil Karimi,
Anoosheh Heidarzadeh,
Alex Sprintson
Abstract:
In this paper, we study the multi-server setting of the \emph{Private Information Retrieval with Coded Side Information (PIR-CSI)} problem. In this problem, there are $K$ messages replicated across $N$ servers, and there is a user who wishes to download one message from the servers without revealing any information to any server about the identity of the requested message. The user has a side info…
▽ More
In this paper, we study the multi-server setting of the \emph{Private Information Retrieval with Coded Side Information (PIR-CSI)} problem. In this problem, there are $K$ messages replicated across $N$ servers, and there is a user who wishes to download one message from the servers without revealing any information to any server about the identity of the requested message. The user has a side information which is a linear combination of a subset of $M$ messages in the database. The parameter $M$ is known to all servers in advance, whereas the indices and the coefficients of the messages in the user's side information are unknown to any server \emph{a priori}.
We focus on a class of PIR-CSI schemes, referred to as \emph{server-symmetric schemes}, in which the queries/answers to/from different servers are symmetric in structure. We define the \emph{rate} of a PIR-CSI scheme as its minimum download rate among all problem instances, and define the \emph{server-symmetric capacity} of the PIR-CSI problem as the supremum of rates over all server-symmetric PIR-CSI schemes. Our main results are as follows: (i) when the side information is not a function of the user's requested message, the capacity is given by ${(1+{1}/{N}+\dots+{1}/{N^{\left\lceil \frac{K}{M+1}\right\rceil -1}})^{-1}}$ for any ${1\leq M\leq K-1}$; and (ii) when the side information is a function of the user's requested message, the capacity is equal to $1$ for $M=2$ and $M=K$, and it is equal to ${N}/{(N+1)}$ for any ${3 \leq M \leq K-1}$. The converse proofs rely on new information-theoretic arguments, and the achievability schemes are inspired by our recently proposed scheme for single-server PIR-CSI as well as the Sun-Jafar scheme for multi-server PIR.
△ Less
Submitted 21 June, 2019;
originally announced June 2019.
-
Single-Server Single-Message Online Private Information Retrieval with Side Information
Authors:
Fatemeh Kazemi,
Esmaeil Karimi,
Anoosheh Heidarzadeh,
Alex Sprintson
Abstract:
In many practical settings, the user needs to retrieve information from a server in a periodic manner, over multiple rounds of communication. In this paper, we discuss the setting in which this information needs to be retrieved privately, such that the identity of all the information retrieved until the current round is protected. This setting can occur in practical situations in which the user ne…
▽ More
In many practical settings, the user needs to retrieve information from a server in a periodic manner, over multiple rounds of communication. In this paper, we discuss the setting in which this information needs to be retrieved privately, such that the identity of all the information retrieved until the current round is protected. This setting can occur in practical situations in which the user needs to retrieve items from the server or a periodic basis, such that the privacy needs to be guaranteed for all the items been retrieved until the current round. We refer to this setting as an \emph{online private information retrieval} as the user does not know the identities of the future items that need to be retrieved from the server.
Following the previous line of work by Kadhe \emph{et al.}~we assume that the user knows a random subset of $M$ messages in the database as a side information which are unknown to the server. Focusing on scalar-linear settings, we characterize the \emph{per-round capacity}, i.e., the maximum achievable download rate at each round, and present a coding scheme that achieves this capacity. The key idea of our scheme is to utilize the data downloaded during the current round as a side information for the subsequent rounds. We show for the setting with $K$ messages stored at the server, the per-round capacity of the scalar-linear setting is $C_1= ({M+1})/{K}$ for round $i=1$ and ${C_i= {(2^{i-1}(M+1))}/{KM}}$ for round $i\geq2$, provided that ${K}/({M+1})$ is a power of $2$.
△ Less
Submitted 25 January, 2019; v1 submitted 23 January, 2019;
originally announced January 2019.
-
Sparse Graph Codes for Non-adaptive Quantitative Group Testing
Authors:
Esmaeil Karimi,
Fatemeh Kazemi,
Anoosheh Heidarzadeh,
Krishna R. Narayanan,
Alex Sprintson
Abstract:
This paper considers the problem of Quantitative Group Testing (QGT). Consider a set of $N$ items among which $K$ items are defective. The QGT problem is to identify (all or a sufficiently large fraction of) the defective items, where the result of a test reveals the number of defective items in the tested group. In this work, we propose a non-adaptive QGT algorithm using sparse graph codes over b…
▽ More
This paper considers the problem of Quantitative Group Testing (QGT). Consider a set of $N$ items among which $K$ items are defective. The QGT problem is to identify (all or a sufficiently large fraction of) the defective items, where the result of a test reveals the number of defective items in the tested group. In this work, we propose a non-adaptive QGT algorithm using sparse graph codes over bi-regular bipartite graphs with left-degree $\ell$ and right degree $r$ and binary $t$-error-correcting BCH codes. The proposed scheme provides exact recovery with probabilistic guarantee, i.e. recovers all the defective items with high probability. In particular, we show that for the sub-linear regime where $\frac{K}{N}$ vanishes as $K,N\rightarrow\infty$, the proposed algorithm requires at most ${m=c(t)K\left(t\log_2\left(\frac{\ell N}{c(t)K}+1\right)+1\right)+1}$ tests to recover all the defective items with probability approaching one as ${K,N\rightarrow\infty}$, where $c(t)$ depends only on $t$. The results of our theoretical analysis reveal that the minimum number of required tests is achieved by $t=2$. The encoding and decoding of the proposed algorithm for any $t\leq 4$ have the computational complexity of $\mathcal{O}(K\log^2 \frac{N}{K})$ and $\mathcal{O}(K\log \frac{N}{K})$, respectively. Our simulation results also show that the proposed algorithm significantly outperforms a non-adaptive semi-quantitative group testing algorithm recently proposed by Abdalla \emph{et al.} in terms of the required number of tests for identifying all the defective items with high probability.
△ Less
Submitted 24 April, 2019; v1 submitted 22 January, 2019;
originally announced January 2019.
-
A Simple and Efficient Strategy for the Coin Weighing Problem with a Spring Scale
Authors:
Esmaeil Karimi,
Fatemeh Kazemi,
Anoosheh Heidarzadeh,
Alex Sprintson
Abstract:
This paper considers a generalized version of the coin weighing problem with a spring scale that lies at the intersection of group testing and compressed sensing problems. Given a collection of $n\geq 2$ coins of total weight $d$ (for a known integer $d$), where the weight of each coin is an unknown integer in the range of $\{0,1,\dots,k\}$ (for a known integer $k\geq 1$), the problem is to determ…
▽ More
This paper considers a generalized version of the coin weighing problem with a spring scale that lies at the intersection of group testing and compressed sensing problems. Given a collection of $n\geq 2$ coins of total weight $d$ (for a known integer $d$), where the weight of each coin is an unknown integer in the range of $\{0,1,\dots,k\}$ (for a known integer $k\geq 1$), the problem is to determine the weight of each coin by weighing subsets of coins in a spring scale. The goal is to minimize the average number of weighings over all possible weight configurations. For $d=k=1$, an adaptive bisecting weighing strategy is known to be optimal. However, even the case of $d=k=2$, which is the simplest non-trivial case of the problem, is still open. For this case, we propose and analyze a simple and effective adaptive weighing strategy. A numerical evaluation of the exact recursive formulas, derived for the analysis of the proposed strategy, shows that this strategy requires about ${1.365\log_2 n -0.5}$ weighings on average. To the best of our knowledge, this is the first non-trivial achievable upper bound on the minimum expected required number of weighings for the case of $d=k=2$. As $n$ grows unbounded, the proposed strategy, when compared to an optimal strategy within the commonly-used class of nested strategies, requires about $31.75\%$ less number of weighings on average; and in comparison with the information-theoretic lower bound, it requires at most about $8.16\%$ extra number of weighings on average.
△ Less
Submitted 8 May, 2018;
originally announced May 2018.