-
Characterizing Encrypted Application Traffic through Cellular Radio Interface Protocol
Authors:
Md Ruman Islam,
Raja Hasnain Anwar,
Spyridon Mastorakis,
Muhammad Taqi Raza
Abstract:
Modern applications are end-to-end encrypted to prevent data from being read or secretly modified. 5G tech nology provides ubiquitous access to these applications without compromising the application-specific performance and latency goals. In this paper, we empirically demonstrate that 5G radio communication becomes the side channel to precisely infer the user's applications in real-time. The key…
▽ More
Modern applications are end-to-end encrypted to prevent data from being read or secretly modified. 5G tech nology provides ubiquitous access to these applications without compromising the application-specific performance and latency goals. In this paper, we empirically demonstrate that 5G radio communication becomes the side channel to precisely infer the user's applications in real-time. The key idea lies in observing the 5G physical and MAC layer interactions over time that reveal the application's behavior. The MAC layer receives the data from the application and requests the network to assign the radio resource blocks. The network assigns the radio resources as per application requirements, such as priority, Quality of Service (QoS) needs, amount of data to be transmitted, and buffer size. The adversary can passively observe the radio resources to fingerprint the applications. We empirically demonstrate this attack by considering four different categories of applications: online shop**, voice/video conferencing, video streaming, and Over-The-Top (OTT) media platforms. Finally, we have also demonstrated that an attacker can differentiate various types of applications in real-time within each category.
△ Less
Submitted 10 July, 2024;
originally announced July 2024.
-
Decision Theory-Guided Deep Reinforcement Learning for Fast Learning
Authors:
Zelin Wan,
**-Hee Cho,
Mu Zhu,
Ahmed H. Anwar,
Charles Kamhoua,
Munindar P. Singh
Abstract:
This paper introduces a novel approach, Decision Theory-guided Deep Reinforcement Learning (DT-guided DRL), to address the inherent cold start problem in DRL. By integrating decision theory principles, DT-guided DRL enhances agents' initial performance and robustness in complex environments, enabling more efficient and reliable convergence during learning. Our investigation encompasses two primary…
▽ More
This paper introduces a novel approach, Decision Theory-guided Deep Reinforcement Learning (DT-guided DRL), to address the inherent cold start problem in DRL. By integrating decision theory principles, DT-guided DRL enhances agents' initial performance and robustness in complex environments, enabling more efficient and reliable convergence during learning. Our investigation encompasses two primary problem contexts: the cart pole and maze navigation challenges. Experimental results demonstrate that the integration of decision theory not only facilitates effective initial guidance for DRL agents but also promotes a more structured and informed exploration strategy, particularly in environments characterized by large and intricate state spaces. The results of experiment demonstrate that DT-guided DRL can provide significantly higher rewards compared to regular DRL. Specifically, during the initial phase of training, the DT-guided DRL yields up to an 184% increase in accumulated reward. Moreover, even after reaching convergence, it maintains a superior performance, ending with up to 53% more reward than standard DRL in large maze problems. DT-guided DRL represents an advancement in mitigating a fundamental challenge of DRL by leveraging functions informed by human (designer) knowledge, setting a foundation for further research in this promising interdisciplinary domain.
△ Less
Submitted 8 February, 2024;
originally announced February 2024.
-
Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach
Authors:
Md Abu Sayed,
Ahmed H. Anwar,
Christopher Kiekintveld,
Charles Kamhoua
Abstract:
Honeypots play a crucial role in implementing various cyber deception techniques as they possess the capability to divert attackers away from valuable assets. Careful strategic placement of honeypots in networks should consider not only network aspects but also attackers' preferences. The allocation of honeypots in tactical networks under network mobility is of great interest. To achieve this obje…
▽ More
Honeypots play a crucial role in implementing various cyber deception techniques as they possess the capability to divert attackers away from valuable assets. Careful strategic placement of honeypots in networks should consider not only network aspects but also attackers' preferences. The allocation of honeypots in tactical networks under network mobility is of great interest. To achieve this objective, we present a game-theoretic approach that generates optimal honeypot allocation strategies within an attack/defense scenario. Our proposed approach takes into consideration the changes in network connectivity. In particular, we introduce a two-player dynamic game model that explicitly incorporates the future state evolution resulting from changes in network connectivity. The defender's objective is twofold: to maximize the likelihood of the attacker hitting a honeypot and to minimize the cost associated with deception and reconfiguration due to changes in network topology. We present an iterative algorithm to find Nash equilibrium strategies and analyze the scalability of the algorithm. Finally, we validate our approach and present numerical results based on simulations, demonstrating that our game model successfully enhances network security. Additionally, we have proposed additional enhancements to improve the scalability of the proposed approach.
△ Less
Submitted 18 September, 2023; v1 submitted 22 August, 2023;
originally announced August 2023.
-
Cyber Deception against Zero-day Attacks: A Game Theoretic Approach
Authors:
Md Abu Sayed,
Ahmed H. Anwar,
Christopher Kiekintveld,
Branislav Bosansky,
Charles Kamhoua
Abstract:
Reconnaissance activities precedent other attack steps in the cyber kill chain. Zero-day attacks exploit unknown vulnerabilities and give attackers the upper hand against conventional defenses. Honeypots have been used to deceive attackers by misrepresenting the true state of the network. Existing work on cyber deception does not model zero-day attacks. In this paper, we address the question of "H…
▽ More
Reconnaissance activities precedent other attack steps in the cyber kill chain. Zero-day attacks exploit unknown vulnerabilities and give attackers the upper hand against conventional defenses. Honeypots have been used to deceive attackers by misrepresenting the true state of the network. Existing work on cyber deception does not model zero-day attacks. In this paper, we address the question of "How to allocate honeypots over the network?" to protect its most valuable assets. To this end, we develop a two-player zero-sum game theoretic approach to study the potential reconnaissance tracks and attack paths that attackers may use. However, zero-day attacks allow attackers to avoid placed honeypots by creating new attack paths. Therefore, we introduce a sensitivity analysis to investigate the impact of different zero-day vulnerabilities on the performance of the proposed deception technique. Next, we propose several mitigating strategies to defend the network against zero-day attacks based on this analysis. Finally, our numerical results validate our findings and illustrate the effectiveness of the proposed defense approach.
△ Less
Submitted 25 July, 2023; v1 submitted 24 July, 2023;
originally announced July 2023.
-
Emotions in Requirements Engineering: A Systematic Map** Study
Authors:
Tahira Iqbal,
Hina Anwar,
Syazwanie Filzah,
Mohammad Gharib,
Kerli Moose,
Kuldar Taveter
Abstract:
The purpose of requirements engineering (RE) is to make sure that the expectations and needs of the stakeholders of a software system are met. Emotional needs can be captured as emotional requirements that represent how the end user should feel when using the system. Differently from functional and quality (non-functional) requirements, emotional requirements have received relatively less attentio…
▽ More
The purpose of requirements engineering (RE) is to make sure that the expectations and needs of the stakeholders of a software system are met. Emotional needs can be captured as emotional requirements that represent how the end user should feel when using the system. Differently from functional and quality (non-functional) requirements, emotional requirements have received relatively less attention from the RE community. This study is motivated by the need to explore and map the literature on emotional requirements. The study applies the systematic map** study technique for surveying and analyzing the available literature to identify the most relevant publications on emotional requirements. We identified 34 publications that address a wide spectrum of practices concerned with engineering emotional requirements. The identified publications were analyzed with respect to the application domains, instruments used for eliciting and artefacts used for representing emotional requirements, and the state of the practice in emotion-related requirements engineering. This analysis serves to identify research gaps and research directions in engineering emotional requirements. To the best of the knowledge by the authors, no other similar study has been conducted on emotional requirements.
△ Less
Submitted 25 May, 2023;
originally announced May 2023.
-
Vehicle and License Plate Recognition with Novel Dataset for Toll Collection
Authors:
Muhammad Usama,
Hafeez Anwar,
Abbas Anwar,
Saeed Anwar
Abstract:
We propose an automatic framework for toll collection, consisting of three steps: vehicle type recognition, license plate localization, and reading. However, each of the three steps becomes non-trivial due to image variations caused by several factors. The traditional vehicle decorations on the front cause variations among vehicles of the same type. These decorations make license plate localizatio…
▽ More
We propose an automatic framework for toll collection, consisting of three steps: vehicle type recognition, license plate localization, and reading. However, each of the three steps becomes non-trivial due to image variations caused by several factors. The traditional vehicle decorations on the front cause variations among vehicles of the same type. These decorations make license plate localization and recognition difficult due to severe background clutter and partial occlusions. Likewise, on most vehicles, specifically trucks, the position of the license plate is not consistent. Lastly, for license plate reading, the variations are induced by non-uniform font styles, sizes, and partially occluded letters and numbers. Our proposed framework takes advantage of both data availability and performance evaluation of the backbone deep learning architectures. We gather a novel dataset, \emph{Diverse Vehicle and License Plates Dataset (DVLPD)}, consisting of 10k images belonging to six vehicle types. Each image is then manually annotated for vehicle type, license plate, and its characters and digits. For each of the three tasks, we evaluate You Only Look Once (YOLO)v2, YOLOv3, YOLOv4, and FasterRCNN. For real-time implementation on a Raspberry Pi, we evaluate the lighter versions of YOLO named Tiny YOLOv3 and Tiny YOLOv4. The best Mean Average Precision ([email protected]) of 98.8% for vehicle type recognition, 98.5% for license plate detection, and 98.3% for license plate reading is achieved by YOLOv4, while its lighter version, i.e., Tiny YOLOv4 obtained a mAP of 97.1%, 97.4%, and 93.7% on vehicle type recognition, license plate detection, and license plate reading, respectively. The dataset and the training codes are available at https://github.com/usama-x930/VT-LPR
△ Less
Submitted 15 November, 2022; v1 submitted 11 February, 2022;
originally announced February 2022.
-
Comprehensive Energy Footprint Benchmarking Algorithm for Electrified Powertrains
Authors:
Hamza Anwar,
Aashrith Vishwanath,
Apurva Chunodkar,
Qadeer Ahmed
Abstract:
Autonomy and electrification in automotive control systems have made modern-day powertrains one of the most complex cyber-physical systems. This paper presents a benchmark algorithm to quantify the performance of complex automotive systems exhibiting mechanical, electrical, and thermal interactions at various time-scales. Traditionally Dynamic Programming has been used for benchmarking the perform…
▽ More
Autonomy and electrification in automotive control systems have made modern-day powertrains one of the most complex cyber-physical systems. This paper presents a benchmark algorithm to quantify the performance of complex automotive systems exhibiting mechanical, electrical, and thermal interactions at various time-scales. Traditionally Dynamic Programming has been used for benchmarking the performance, however, it fails to deliver results for system with higher number of states and control lever due to curse of dimensionality. We propose "PS3", a three-step algorithm for mixed-integer nonlinear optimal control problems with application to powertrain energy management. PS3 uses pseudo-spectral collocation theory for highly accurate modeling of dynamics. Based on the validated powertrain component models, we have addressed simultaneous optimization of electrical (SOC), vehicular (eco-driving) and thermal (after-treatment and battery temperatures) dynamics along with an integer (gear and engine on/off) control and its corresponding (dwell-time) constraints. PS3 is used to solve such large-scale powertrain problems having fast and slow dynamic states, discontinuous behaviors, non-differentiable and linearly interpolated 1-D and 2-D maps, as well as combinatorial constraints. Five case study powertrain control problems are given to benchmark the accuracy and computational effort against Dynamic Programming. Our analysis shows that this algorithm does not scale computational burden as Dynamic Programming does, and can handle highly complex interactions that occur in modern-day powertrains, without compromising nonlinear and complex plant modeling.
△ Less
Submitted 2 June, 2021;
originally announced June 2021.
-
Comprehensive Energy Footprint Benchmarking of Strong Parallel Electrified Powertrain
Authors:
Hamza Anwar,
Aashrith Vishwanath,
Apurva Chunodkar,
Qadeer Ahmed
Abstract:
This work presents comprehensive energy management and in-depth energy footprint analysis of an electrified strong parallel commercial vehicle. We use the PS3 framework, validated real-world powertrain system models, and Pareto-optimal analysis to optimize fuel consumption and harmful pollutant emissions. The approach involves dynamic optimization of 13 states and 4 control levers with complex int…
▽ More
This work presents comprehensive energy management and in-depth energy footprint analysis of an electrified strong parallel commercial vehicle. We use the PS3 framework, validated real-world powertrain system models, and Pareto-optimal analysis to optimize fuel consumption and harmful pollutant emissions. The approach involves dynamic optimization of 13 states and 4 control levers with complex interactions between multiple subsystems for a parallel hybrid electric pick-up and delivery truck. These subsystems exhibit thermal, electrical, and mechanical dynamics at different time scales, and contain kinematic and combinatorial constraints, integer- and real-valued variables, interpolated look-up tables, and data maps. A Pareto-optimal solution is found by carefully optimizing fuel and NOx emissions to understand the energy footprint of the electrified powertrain. The presented results exhibit rich analysis and complex interactions among the powertrain subsystems to unearth a 7% improvement in its fuel consumption and 29% pollutant NOx reduction when compared to solution from a coarsely modeled powertrain system.
△ Less
Submitted 24 September, 2022; v1 submitted 1 June, 2021;
originally announced June 2021.
-
Game-Theoretic and Machine Learning-based Approaches for Defensive Deception: A Survey
Authors:
Mu Zhu,
Ahmed H. Anwar,
Zelin Wan,
**-Hee Cho,
Charles Kamhoua,
Munindar P. Singh
Abstract:
Defensive deception is a promising approach for cyber defense. Via defensive deception, the defender can anticipate attacker actions; it can mislead or lure attacker, or hide real resources. Although defensive deception is increasingly popular in the research community, there has not been a systematic investigation of its key components, the underlying principles, and its tradeoffs in various prob…
▽ More
Defensive deception is a promising approach for cyber defense. Via defensive deception, the defender can anticipate attacker actions; it can mislead or lure attacker, or hide real resources. Although defensive deception is increasingly popular in the research community, there has not been a systematic investigation of its key components, the underlying principles, and its tradeoffs in various problem settings. This survey paper focuses on defensive deception research centered on game theory and machine learning, since these are prominent families of artificial intelligence approaches that are widely employed in defensive deception. This paper brings forth insights, lessons, and limitations from prior work. It closes with an outline of some research directions to tackle major gaps in current defensive deception research.
△ Less
Submitted 8 May, 2021; v1 submitted 21 January, 2021;
originally announced January 2021.
-
Foureye: Defensive Deception based on Hypergame Theory Against Advanced Persistent Threats
Authors:
Zelin Wan,
**-Hee Cho,
Mu Zhu,
Ahmed H. Anwar,
Charles Kamhoua,
Munindar P. Singh
Abstract:
Defensive deception techniques have emerged as a promising proactive defense mechanism to mislead an attacker and thereby achieve attack failure. However, most game-theoretic defensive deception approaches have assumed that players maintain consistent views under uncertainty. They do not consider players' possible, subjective beliefs formed due to asymmetric information given to them. In this work…
▽ More
Defensive deception techniques have emerged as a promising proactive defense mechanism to mislead an attacker and thereby achieve attack failure. However, most game-theoretic defensive deception approaches have assumed that players maintain consistent views under uncertainty. They do not consider players' possible, subjective beliefs formed due to asymmetric information given to them. In this work, we formulate a hypergame between an attacker and a defender where they can interpret the same game differently and accordingly choose their best strategy based on their respective beliefs. This gives a chance for defensive deception strategies to manipulate an attacker's belief, which is the key to the attacker's decision making. We consider advanced persistent threat (APT) attacks, which perform multiple attacks in the stages of the cyber kill chain where both the attacker and the defender aim to select optimal strategies based on their beliefs. Through extensive simulation experiments, we demonstrated how effectively the defender can leverage defensive deception techniques while dealing with multi-staged APT attacks in a hypergame in which the imperfect information is reflected based on perceived uncertainty, cost, and expected utilities of both attacker and defender, the system lifetime (i.e., mean time to security failure), and improved false positive rates in detecting attackers.
△ Less
Submitted 30 January, 2021; v1 submitted 8 January, 2021;
originally announced January 2021.
-
Deep Ancient Roman Republican Coin Classification via Feature Fusion and Attention
Authors:
Hafeez Anwar,
Saeed Anwar,
Sebastian Zambanini,
Fatih Porikli
Abstract:
We perform the classification of ancient Roman Republican coins via recognizing their reverse motifs where various objects, faces, scenes, animals, and buildings are minted along with legends. Most of these coins are eroded due to their age and varying degrees of preservation, thereby affecting their informative attributes for visual recognition. Changes in the positions of principal symbols on th…
▽ More
We perform the classification of ancient Roman Republican coins via recognizing their reverse motifs where various objects, faces, scenes, animals, and buildings are minted along with legends. Most of these coins are eroded due to their age and varying degrees of preservation, thereby affecting their informative attributes for visual recognition. Changes in the positions of principal symbols on the reverse motifs also cause huge variations among the coin types. Lastly, in-plane orientations, uneven illumination, and a moderate background clutter further make the classification task non-trivial and challenging.
To this end, we present a novel network model, CoinNet, that employs compact bilinear pooling, residual groups, and feature attention layers. Furthermore, we gathered the largest and most diverse image dataset of the Roman Republican coins that contains more than 18,000 images belonging to 228 different reverse motifs. On this dataset, our model achieves a classification accuracy of more than \textbf{98\%} and outperforms the conventional bag-of-visual-words based approaches and more recent state-of-the-art deep learning methods. We also provide a detailed ablation study of our network and its generalization capability. Models and Datasets available at https://github.com/saeed-anwar/CoinNet
△ Less
Submitted 24 December, 2020; v1 submitted 25 August, 2019;
originally announced August 2019.
-
Understanding and Partitioning Mobile Traffic using Internet Activity Records Data -- A Spatiotemporal Approach
Authors:
Kashif Sultan,
Hazrat Ali,
Haris Anwaar,
Kabo Poloko Nkabiti,
Adeel Ahamd,
Zhongshan Zhang
Abstract:
The internet activity records (IARs) of a mobile cellular network posses significant information which can be exploited to identify the network's efficacy and the mobile users' behavior. In this work, we extract useful information from the IAR data and identify a healthy predictability of spatio-temporal pattern within the network traffic. The information extracted is helpful for network operators…
▽ More
The internet activity records (IARs) of a mobile cellular network posses significant information which can be exploited to identify the network's efficacy and the mobile users' behavior. In this work, we extract useful information from the IAR data and identify a healthy predictability of spatio-temporal pattern within the network traffic. The information extracted is helpful for network operators to plan effective network configuration and perform management and optimization of network's resources. We report experimentation on spatiotemporal analysis of IAR data of the Telecom Italia. Based on this, we present mobile traffic partitioning scheme. Experimental results of the proposed model is helpful in modelling and partitioning of network traffic patterns.
△ Less
Submitted 30 July, 2019;
originally announced August 2019.
-
A Game-Theoretic Framework for the Virtual Machines Migration Timing Problem
Authors:
Ahmed H. Anwar,
George Atia,
Mina Guirguis
Abstract:
In a multi-tenant cloud, a number of Virtual Machines (VMs) are collocated on the same physical machine to optimize performance, power consumption and maximize profit. This, however, increases the risk of a malicious VM performing side-channel attacks and leaking sensitive information from neighboring VMs. To this end, this paper develops and analyzes a game-theoretic framework for the VM migratio…
▽ More
In a multi-tenant cloud, a number of Virtual Machines (VMs) are collocated on the same physical machine to optimize performance, power consumption and maximize profit. This, however, increases the risk of a malicious VM performing side-channel attacks and leaking sensitive information from neighboring VMs. To this end, this paper develops and analyzes a game-theoretic framework for the VM migration timing problem in which the cloud provider decides \emph{when} to migrate a VM to a different physical machine to reduce the risk of being compromised by a collocated malicious VM. The adversary decides the rate at which she launches new VMs to collocate with the victim VMs. Our formulation captures a data leakage model in which the cost incurred by the cloud provider depends on the duration of collocation with malicious VMs. It also captures costs incurred by the adversary in launching new VMs and by the defender in migrating VMs. We establish sufficient conditions for the existence of Nash equilibria for general cost functions, as well as for specific instantiations, and characterize the best response for both players. Furthermore, we extend our model to characterize its impact on the attacker's payoff when the cloud utilizes intrusion detection systems that detect side-channel attacks. Our theoretical findings are corroborated with extensive numerical results in various settings.
△ Less
Submitted 14 March, 2018;
originally announced March 2018.
-
ADMM-based Networked Stochastic Variational Inference
Authors:
Hamza Anwar,
Quanyan Zhu
Abstract:
Owing to the recent advances in "Big Data" modeling and prediction tasks, variational Bayesian estimation has gained popularity due to their ability to provide exact solutions to approximate posteriors. One key technique for approximate inference is stochastic variational inference (SVI). SVI poses variational inference as a stochastic optimization problem and solves it iteratively using noisy gra…
▽ More
Owing to the recent advances in "Big Data" modeling and prediction tasks, variational Bayesian estimation has gained popularity due to their ability to provide exact solutions to approximate posteriors. One key technique for approximate inference is stochastic variational inference (SVI). SVI poses variational inference as a stochastic optimization problem and solves it iteratively using noisy gradient estimates. It aims to handle massive data for predictive and classification tasks by applying complex Bayesian models that have observed as well as latent variables. This paper aims to decentralize it allowing parallel computation, secure learning and robustness benefits. We use Alternating Direction Method of Multipliers in a top-down setting to develop a distributed SVI algorithm such that independent learners running inference algorithms only require sharing the estimated model parameters instead of their private datasets. Our work extends the distributed SVI-ADMM algorithm that we first propose, to an ADMM-based networked SVI algorithm in which not only are the learners working distributively but they share information according to rules of a graph by which they form a network. This kind of work lies under the umbrella of `deep learning over networks' and we verify our algorithm for a topic-modeling problem for corpus of Wikipedia articles. We illustrate the results on latent Dirichlet allocation (LDA) topic model in large document classification, compare performance with the centralized algorithm, and use numerical experiments to corroborate the analytical results.
△ Less
Submitted 27 February, 2018;
originally announced February 2018.
-
Fault-tolerant quantum computation with non-deterministic entangling gates
Authors:
James M. Auger,
Hussain Anwar,
Mercedes Gimeno-Segovia,
Thomas M. Stace,
Dan E. Browne
Abstract:
Performing entangling gates between physical qubits is necessary for building a large-scale universal quantum computer, but in some physical implementations - for example, those that are based on linear optics or networks of ion traps - entangling gates can only be implemented probabilistically. In this work, we study the fault-tolerant performance of a topological cluster state scheme with local…
▽ More
Performing entangling gates between physical qubits is necessary for building a large-scale universal quantum computer, but in some physical implementations - for example, those that are based on linear optics or networks of ion traps - entangling gates can only be implemented probabilistically. In this work, we study the fault-tolerant performance of a topological cluster state scheme with local non-deterministic entanglement generation, where failed entangling gates (which correspond to bonds on the lattice representation of the cluster state) lead to a defective three-dimensional lattice with missing bonds. We present two approaches for dealing with missing bonds; the first is a non-adaptive scheme that requires no additional quantum processing, and the second is an adaptive scheme in which qubits can be measured in an alternative basis to effectively remove them from the lattice, hence eliminating their damaging effect and leading to better threshold performance. We find that a fault-tolerance threshold can still be observed with a bond-loss rate of 6.5% for the non-adaptive scheme, and a bond-loss rate as high as 14.5% for the adaptive scheme.
△ Less
Submitted 16 March, 2018; v1 submitted 18 August, 2017;
originally announced August 2017.
-
Minimax Game-Theoretic Approach to Multiscale H-infinity Optimal Filtering
Authors:
Hamza Anwar,
Quanyan Zhu
Abstract:
Sensing in complex systems requires large-scale information exchange and on-the-go communications over heterogeneous networks and integrated processing platforms. Many networked cyber-physical systems exhibit hierarchical infrastructures of information flows, which naturally leads to a multi-level tree-like information structure in which each level corresponds to a particular scale of representati…
▽ More
Sensing in complex systems requires large-scale information exchange and on-the-go communications over heterogeneous networks and integrated processing platforms. Many networked cyber-physical systems exhibit hierarchical infrastructures of information flows, which naturally leads to a multi-level tree-like information structure in which each level corresponds to a particular scale of representation. This work focuses on the multiscale fusion of data collected at multiple levels of the system. We propose a multiscale state-space model to represent multi-resolution data over the hierarchical information system and formulate a multi-stage dynamic zero-sum game to design a multi-scale $H_{\infty}$ robust filter. We present numerical experiments for one and two-dimensional signals and provide a comparative analysis of the minimax filter with the standard Kalman filter to show the improvement in signal-to-noise ratio (SNR).
△ Less
Submitted 8 August, 2017; v1 submitted 24 July, 2017;
originally announced July 2017.
-
Fault-tolerance thresholds for the surface code with fabrication errors
Authors:
James M. Auger,
Hussain Anwar,
Mercedes Gimeno-Segovia,
Thomas M. Stace,
Dan E. Browne
Abstract:
The construction of topological error correction codes requires the ability to fabricate a lattice of physical qubits embedded on a manifold with a non-trivial topology such that the quantum information is encoded in the global degrees of freedom (i.e. the topology) of the manifold. However, the manufacturing of large-scale topological devices will undoubtedly suffer from fabrication errors---perm…
▽ More
The construction of topological error correction codes requires the ability to fabricate a lattice of physical qubits embedded on a manifold with a non-trivial topology such that the quantum information is encoded in the global degrees of freedom (i.e. the topology) of the manifold. However, the manufacturing of large-scale topological devices will undoubtedly suffer from fabrication errors---permanent faulty components such as missing physical qubits or failed entangling gates---introducing permanent defects into the topology of the lattice and hence significantly reducing the distance of the code and the quality of the encoded logical qubits. In this work we investigate how fabrication errors affect the performance of topological codes, using the surface code as the testbed. A known approach to mitigate defective lattices involves the use of primitive SWAP gates in a long sequence of syndrome extraction circuits. Instead, we show that in the presence of fabrication errors the syndrome can be determined using the supercheck operator approach and the outcome of the defective gauge stabilizer generators without any additional computational overhead or the use of SWAP gates. We report numerical fault-tolerance thresholds in the presence of both qubit fabrication and gate fabrication errors using a circuit-based noise model and the minimum-weight perfect matching decoder. Our numerical analysis is most applicable to 2D chip-based technologies, but the techniques presented here can be readily extended to other topological architectures. We find that in the presence of 8% qubit fabrication errors, the surface code can still tolerate a computational error rate of up to 0.1%.
△ Less
Submitted 15 June, 2017;
originally announced June 2017.
-
Smallest disentangling state spaces for general entangled bipartite quantum states
Authors:
Hussain Anwar,
Sania Jevtic,
Oliver Rudolph,
Shashank Virmani
Abstract:
Entangled quantum states can be given a separable decomposition if we relax the restriction that the local operators be quantum states. Motivated by the construction of classical simulations and local hidden variable models, we construct `smallest' local sets of operators that achieve this. In other words, given an arbitrary bipartite quantum state we construct convex sets of local operators that…
▽ More
Entangled quantum states can be given a separable decomposition if we relax the restriction that the local operators be quantum states. Motivated by the construction of classical simulations and local hidden variable models, we construct `smallest' local sets of operators that achieve this. In other words, given an arbitrary bipartite quantum state we construct convex sets of local operators that allow for a separable decomposition, but that cannot be made smaller while continuing to do so. We then consider two further variants of the problem where the local state spaces are required to contain the local quantum states, and obtain solutions for a variety of cases including a region of pure states around the maximally entangled state. The methods involve calculating certain forms of cross norm. Two of the variants of the problem have a strong relationship to theorems on ensemble decompositions of positive operators, and our results thereby give those theorems an added interpretation. The results generalise those obtained in our previous work on this topic [New J. Phys. 17, 093047 (2015)].
△ Less
Submitted 10 November, 2015;
originally announced November 2015.
-
Qudit Colour Codes and Gauge Colour Codes in All Spatial Dimensions
Authors:
Fern H. E. Watson,
Earl T. Campbell,
Hussain Anwar,
Dan E. Browne
Abstract:
Two-level quantum systems, qubits, are not the only basis for quantum computation. Advantages exist in using qudits, d-level quantum systems, as the basic carrier of quantum information. We show that color codes, a class of topological quantum codes with remarkable transversality properties, can be generalized to the qudit paradigm. In recent developments it was found that in three spatial dimensi…
▽ More
Two-level quantum systems, qubits, are not the only basis for quantum computation. Advantages exist in using qudits, d-level quantum systems, as the basic carrier of quantum information. We show that color codes, a class of topological quantum codes with remarkable transversality properties, can be generalized to the qudit paradigm. In recent developments it was found that in three spatial dimensions a qubit color code can support a transversal non-Clifford gate, and that in higher spatial dimensions additional non-Clifford gates can be found, saturating Bravyi and König's bound [Phys. Rev. Lett. 110, 170503 (2013)]. Furthermore, by using gauge fixing techniques, an effective set of Clifford gates can be achieved, removing the need for state distillation. We show that the qudit color code can support the qudit analogues of these gates, and show that in higher spatial dimensions a color code can support a phase gate from higher levels of the Clifford hierarchy which can be proven to saturate Bravyi and König's bound in all but a finite number of special cases. The methodology used is a generalisation of Bravyi and Haah's method of triorthogonal matrices [Phys. Rev. A 86 052329 (2012)], which may be of independent interest. For completeness, we show explicitly that the qudit color codes generalize to gauge color codes, and share the many of the favorable properties of their qubit counterparts.
△ Less
Submitted 10 August, 2015; v1 submitted 30 March, 2015;
originally announced March 2015.
-
Families of pure PEPS with efficiently simulatable local hidden variable models for most measurements
Authors:
Hussain Anwar,
Sania Jevtic,
Oliver Rudolph,
Shashank Virmani
Abstract:
An important problem in quantum information theory is to understand what makes entangled quantum systems non-local or hard to simulate efficiently. In this work we consider situations in which various parties have access to a restricted set of measurements on their particles, and construct entangled quantum states that are essentially classical for those measurements. In particular, given any set…
▽ More
An important problem in quantum information theory is to understand what makes entangled quantum systems non-local or hard to simulate efficiently. In this work we consider situations in which various parties have access to a restricted set of measurements on their particles, and construct entangled quantum states that are essentially classical for those measurements. In particular, given any set of local measurements on a large enough Hilbert space whose dual strictly contains (i.e. contains an open neighborhood of) a pure state, we use the PEPS formalism and ideas from generalized probabilistic theories to construct pure multiparty entangled states that have (a) local hidden variable models, and (b) can be efficiently simulated classically. We believe that the examples we construct cannot be efficiently classically simulated using previous techniques. Without the restriction on the measurements, the states that we construct are non-local, and in some proof-of-principle cases are universal for measurement based quantum computation.
△ Less
Submitted 17 December, 2014; v1 submitted 11 December, 2014;
originally announced December 2014.
-
Smallest state spaces for which bipartite entangled quantum states are separable
Authors:
Hussain Anwar,
Sania Jevtic,
Oliver Rudolph,
Shashank Virmani
Abstract:
According to usual definitions, entangled states cannot be given a separable decomposition in terms of products of local density operators. If we relax the requirement that the local density operators be positive, then an entangled quantum state may admit a separable decomposition in terms of more general sets of single-system operators. This form of separability can be used to construct classical…
▽ More
According to usual definitions, entangled states cannot be given a separable decomposition in terms of products of local density operators. If we relax the requirement that the local density operators be positive, then an entangled quantum state may admit a separable decomposition in terms of more general sets of single-system operators. This form of separability can be used to construct classical models and simulation methods when only restricted set of measurements are available. With such motivations in mind, we ask what are the smallest such sets of local operators such that a pure bipartite entangled quantum state becomes separable? We find that in the case of maximally entangled states there are many inequivalent solutions, including for example the sets of phase point operators that arise in the study of discrete Wigner functions. We therefore provide a new way of interpreting these operators, and more generally, provide an alternative method for constructing local hidden variable models for entangled quantum states under subsets of quantum measurements.
△ Less
Submitted 14 May, 2015; v1 submitted 21 November, 2014;
originally announced November 2014.
-
A fast fault-tolerant decoder for qubit and qudit surface codes
Authors:
Fern H. E. Watson,
Hussain Anwar,
Dan E. Browne
Abstract:
The surface code is one of the most promising candidates for combating errors in large scale fault-tolerant quantum computation. A fault-tolerant decoder is a vital part of the error correction process---it is the algorithm which computes the operations needed to correct or compensate for the errors according to the measured syndrome, even when the measurement itself is error prone. Previously dec…
▽ More
The surface code is one of the most promising candidates for combating errors in large scale fault-tolerant quantum computation. A fault-tolerant decoder is a vital part of the error correction process---it is the algorithm which computes the operations needed to correct or compensate for the errors according to the measured syndrome, even when the measurement itself is error prone. Previously decoders based on minimum-weight perfect matching have been studied. However, these are not immediately generalizable from qubit to qudit codes. In this work, we develop a fault-tolerant decoder for the surface code, capable of efficient operation for qubits and qudits of any dimension, generalizing the decoder first introduced by Bravyi and Haah [Phys. Rev. Lett. 111, 200501 (2013)]. We study its performance when both the physical qudits and the syndromes measurements are subject to generalized uncorrelated bit-flip noise (and the higher dimensional equivalent). We show that, with appropriate enhancements to the decoder and a high enough qudit dimension, a threshold at an error rate of more than 8% can be achieved.
△ Less
Submitted 14 September, 2015; v1 submitted 11 November, 2014;
originally announced November 2014.
-
Interference-Based Optimal Power-Efficient Access Scheme for Cognitive Radio Networks
Authors:
Ahmed H. Anwar,
Ahmed El Shafie,
Amr Mohamed,
Tamer ElBatt,
Mohsen Guizani
Abstract:
In this paper, we propose a new optimization-based access strategy of multipacket reception (MPR) channel for multiple secondary users (SUs) accessing the primary user (PU) spectrum opportunistically. We devise an analytical model that realizes the multipacket access strategy of SUs that maximizes the throughput of individual backlogged SUs subject to queue stability of the PU. All the network rec…
▽ More
In this paper, we propose a new optimization-based access strategy of multipacket reception (MPR) channel for multiple secondary users (SUs) accessing the primary user (PU) spectrum opportunistically. We devise an analytical model that realizes the multipacket access strategy of SUs that maximizes the throughput of individual backlogged SUs subject to queue stability of the PU. All the network receiving nodes have MPR capability. We aim at maximizing the throughput of the individual SUs such that the PU's queue is maintained stable. Moreover, we are interested in providing an energy-efficient cognitive scheme. Therefore, we include energy constraints on the PU and SU average transmitted energy to the optimization problem. Each SU accesses the medium with certain probability that depends on the PU's activity, i.e., active or inactive. The numerical results show the advantage in terms of SU throughput of the proposed scheme over the conventional access scheme, where the SUs access the channel randomly with fixed power when the PU is sensed to be idle.
△ Less
Submitted 8 July, 2014; v1 submitted 3 April, 2014;
originally announced April 2014.
-
Efficient Decoders for Qudit Topological Codes
Authors:
Hussain Anwar,
Benjamin J. Brown,
Earl T. Campbell,
Dan E. Browne
Abstract:
Qudit toric codes are a natural higher-dimensional generalization of the well-studied qubit toric code. However standard methods for error correction of the qubit toric code are not applicable to them. Novel decoders are needed. In this paper we introduce two renormalization group decoders for qudit codes and analyze their error correction thresholds and efficiency. The first decoder is a generali…
▽ More
Qudit toric codes are a natural higher-dimensional generalization of the well-studied qubit toric code. However standard methods for error correction of the qubit toric code are not applicable to them. Novel decoders are needed. In this paper we introduce two renormalization group decoders for qudit codes and analyze their error correction thresholds and efficiency. The first decoder is a generalization of a "hard-decisions" decoder due to Bravyi and Haah [arXiv:1112.3252]. We modify this decoder to overcome a percolation effect which limits its threshold performance for high dimensions. The second decoder is a generalization of a "soft-decisions" decoder due to Poulin and Duclos-Cianci [Phys. Rev. Lett. 104, 050504 (2010)], with a small cell size to optimize the efficiency of implementation in the high dimensional case. In each case, we estimate thresholds for the uncorrelated bit-flip error model and provide a comparative analysis of the performance of both these approaches to error correction of qudit toric codes.
△ Less
Submitted 19 November, 2013;
originally announced November 2013.
-
A Bag of Visual Words Approach for Symbols-Based Coarse-Grained Ancient Coin Classification
Authors:
Hafeez Anwar,
Sebastian Zambanini,
Martin Kampel
Abstract:
The field of Numismatics provides the names and descriptions of the symbols minted on the ancient coins. Classification of the ancient coins aims at assigning a given coin to its issuer. Various issuers used various symbols for their coins. We propose to use these symbols for a framework that will coarsely classify the ancient coins. Bag of visual words (BoVWs) is a well established visual recogni…
▽ More
The field of Numismatics provides the names and descriptions of the symbols minted on the ancient coins. Classification of the ancient coins aims at assigning a given coin to its issuer. Various issuers used various symbols for their coins. We propose to use these symbols for a framework that will coarsely classify the ancient coins. Bag of visual words (BoVWs) is a well established visual recognition technique applied to various problems in computer vision like object and scene recognition. Improvements have been made by incorporating the spatial information to this technique. We apply the BoVWs technique to our problem and use three symbols for coarse-grained classification. We use rectangular tiling, log-polar tiling and circular tiling to incorporate spatial information to BoVWs. Experimental results show that the circular tiling proves superior to the rest of the methods for our problem.
△ Less
Submitted 23 April, 2013;
originally announced April 2013.
-
Measurement-based classical computation
Authors:
Matty J. Hoban,
Joel J. Wallman,
Hussain Anwar,
Naïri Usher,
Robert Raussendorf,
Dan E. Browne
Abstract:
Measurement-based quantum computation (MBQC) is a model of quantum computation, in which computation proceeds via adaptive single qubit measurements on a multi-qubit quantum state. It is computationally equivalent to the circuit model. Unlike the circuit model, however, its classical analog is little studied. Here we present a classical analog of MBQC whose computational complexity presents a rich…
▽ More
Measurement-based quantum computation (MBQC) is a model of quantum computation, in which computation proceeds via adaptive single qubit measurements on a multi-qubit quantum state. It is computationally equivalent to the circuit model. Unlike the circuit model, however, its classical analog is little studied. Here we present a classical analog of MBQC whose computational complexity presents a rich structure. To do so, we identify uniform families of quantum computations (refining the circuits introduced by Bremner, Jozsa and Shepherd in Proc. R. Soc. A 467, 459 (2011)) whose output is likely hard to exactly simulate (sample) classically. We demonstrate that these circuit families can be efficiently implemented in the MBQC model without adaptive measurement, and thus can be achieved in a classical analog of MBQC whose resource state is a probability distribution which has been created quantum mechanically. Such states (by definition) violate no Bell inequality, but nevertheless exhibit non-classicality when used as a computational resource - an imprint of their quantum origin.
△ Less
Submitted 13 November, 2014; v1 submitted 9 April, 2013;
originally announced April 2013.
-
Effective Capacity of Delay Constrained Cognitive Radio Links Exploiting Primary Feedback
Authors:
Ahmed H. Anwar,
Karim G. Seddik,
Tamer ElBatt,
Ahmed H. Zahran
Abstract:
In this paper, we analyze the performance of a secondary link in a cognitive radio (CR) system operating under statistical quality of service (QoS) delay constraints. In particular, we quantify analytically the performance improvement for the secondary user (SU) when applying a feedback based sensing scheme under the "SINR Interference" model. We leverage the concept of effective capacity (EC) int…
▽ More
In this paper, we analyze the performance of a secondary link in a cognitive radio (CR) system operating under statistical quality of service (QoS) delay constraints. In particular, we quantify analytically the performance improvement for the secondary user (SU) when applying a feedback based sensing scheme under the "SINR Interference" model. We leverage the concept of effective capacity (EC) introduced earlier in the literature to quantify the wireless link performance under delay constraints, in an attempt to opportunistically support real-time applications. Towards this objective, we study a two-link network, a single secondary link and a primary network abstracted to a single primary link, with and without primary feedback exploitation. We analytically prove that exploiting primary feedback at the secondary transmitter improves the EC of the secondary user and decreases the secondary user average transmitted power. Finally, we present numerical results that support our analytical results.
△ Less
Submitted 31 March, 2013;
originally announced April 2013.
-
Magic state distillation in all prime dimensions using quantum Reed-Muller codes
Authors:
Earl T. Campbell,
Hussain Anwar,
Dan E. Browne
Abstract:
We propose families of protocols for magic state distillation -- important components of fault tolerance schemes --- for systems of odd prime dimension. Our protocols utilize quantum Reed-Muller codes with transversal non-Clifford gates. We find that, in higher dimensions, small and effective codes can be used that have no direct analogue in qubit (two-dimensional) systems. We present several conc…
▽ More
We propose families of protocols for magic state distillation -- important components of fault tolerance schemes --- for systems of odd prime dimension. Our protocols utilize quantum Reed-Muller codes with transversal non-Clifford gates. We find that, in higher dimensions, small and effective codes can be used that have no direct analogue in qubit (two-dimensional) systems. We present several concrete protocols, including schemes for three-dimensional (qutrit) and five-dimensional (ququint) systems. The five-dimensional protocol is, by many measures, the best magic state distillation scheme yet discovered. It excels both in terms of error threshold with respect to depolarising noise (36.3%) and the efficiency measure know as "yield", where, for a large region of parameters, it outperforms its qubit counterpart by many orders of magnitude.
△ Less
Submitted 19 July, 2012; v1 submitted 14 May, 2012;
originally announced May 2012.
-
Qutrit Magic State Distillation
Authors:
Hussain Anwar,
Earl T. Campbell,
Dan E. Browne
Abstract:
Magic state distillation (MSD) is a purification protocol that plays a central role in fault tolerant quantum computation. Repeated iteration of the steps of a MSD protocol, generates pure single non-stabilizer states, or magic states, from multiple copies of a mixed resource state using stabilizer operations only. Thus mixed resource states promote the stabilizer operations to full universality.…
▽ More
Magic state distillation (MSD) is a purification protocol that plays a central role in fault tolerant quantum computation. Repeated iteration of the steps of a MSD protocol, generates pure single non-stabilizer states, or magic states, from multiple copies of a mixed resource state using stabilizer operations only. Thus mixed resource states promote the stabilizer operations to full universality. Magic state distillation was introduced for qubit-based quantum computation, but little has been known concerning MSD in higher dimensional qudit-based computation. Here, we describe a general approach for studying MSD in higher dimensions. We use it to investigate the features of a qutrit MSD protocol based on the 5-qutrit stabilizer code. We show that this protocol distills non-stabilizer magic states, and identify two types of states, that are attractors of this iteration map. Finally, we show how these states may be converted, via stabilizer circuits alone, into a state suitable for state injected implementation of a non-Clifford phase gate, enabling non-Clifford unitary computation.
△ Less
Submitted 8 June, 2012; v1 submitted 10 February, 2012;
originally announced February 2012.