Skip to main content

Showing 1–39 of 39 results for author: Chan, K S

.
  1. arXiv:2405.03636  [pdf, other

    cs.CR cs.LG

    Federated Learning Privacy: Attacks, Defenses, Applications, and Policy Landscape - A Survey

    Authors: Joshua C. Zhao, Saurabh Bagchi, Salman Avestimehr, Kevin S. Chan, Somali Chaterji, Dimitris Dimitriadis, Jiacheng Li, Ninghui Li, Arash Nourian, Holger R. Roth

    Abstract: Deep learning has shown incredible potential across a vast array of tasks and accompanying this growth has been an insatiable appetite for data. However, a large amount of data needed for enabling deep learning is stored on personal devices and recent concerns on privacy have further highlighted challenges for accessing such data. As a result, federated learning (FL) has emerged as an important pr… ▽ More

    Submitted 6 May, 2024; originally announced May 2024.

    Comments: Submitted to ACM Computing Surveys

    ACM Class: I.2; H.4; I.5

  2. arXiv:2403.12999  [pdf

    cs.RO cs.AI cs.CL cs.LG

    Prompt Selection and Augmentation for Few Examples Code Generation in Large Language Model and its Application in Robotics Control

    Authors: On Tai Wu, Frodo Kin Sun Chan, Zunhao Zhang, Yan Nei Law, Benny Drescher, Edmond Shiao Bun Lai

    Abstract: Few-shot prompting and step-by-step reasoning have enhanced the capabilities of Large Language Models (LLMs) in tackling complex tasks including code generation. In this paper, we introduce a prompt selection and augmentation algorithm aimed at improving mathematical reasoning and robot arm operations. Our approach incorporates a multi-stage example augmentation scheme combined with an example sel… ▽ More

    Submitted 11 March, 2024; originally announced March 2024.

    Comments: 17 pages, 4 figures

  3. arXiv:2305.17183  [pdf

    q-bio.QM cs.AI eess.IV

    ProGroTrack: Deep Learning-Assisted Tracking of Intracellular Protein Growth Dynamics

    Authors: Kai San Chan, Huimiao Chen, Chenyu **, Yuxuan Tian, Dingchang Lin

    Abstract: Accurate tracking of cellular and subcellular structures, along with their dynamics, plays a pivotal role in understanding the underlying mechanisms of biological systems. This paper presents a novel approach, ProGroTrack, that combines the You Only Look Once (YOLO) and ByteTrack algorithms within the detection-based tracking (DBT) framework to track intracellular protein nanostructures. Focusing… ▽ More

    Submitted 26 May, 2023; originally announced May 2023.

  4. arXiv:2212.08496  [pdf, other

    cs.LG cs.DC cs.IT math.OC

    Federated Learning with Flexible Control

    Authors: Shiqiang Wang, Jake Perazzone, Mingyue Ji, Kevin S. Chan

    Abstract: Federated learning (FL) enables distributed model training from local data collected by users. In distributed systems with constrained resources and potentially high dynamics, e.g., mobile edge networks, the efficiency of FL is an important problem. Existing works have separately considered different configurations to make FL more efficient, such as infrequent transmission of model updates, client… ▽ More

    Submitted 16 December, 2022; originally announced December 2022.

    Comments: Accepted to IEEE INFOCOM 2023

  5. arXiv:2210.05740  [pdf, other

    cs.LG cs.AI math.OC

    Stochastic Constrained DRO with a Complexity Independent of Sample Size

    Authors: Qi Qi, Jiameng Lyu, Kung sik Chan, Er Wei Bai, Tianbao Yang

    Abstract: Distributionally Robust Optimization (DRO), as a popular method to train robust models against distribution shift between training and test sets, has received tremendous attention in recent years. In this paper, we propose and analyze stochastic algorithms that apply to both non-convex and convex losses for solving Kullback Leibler divergence constrained DRO problem. Compared with existing methods… ▽ More

    Submitted 16 August, 2023; v1 submitted 11 October, 2022; originally announced October 2022.

    Comments: 37 pages, 16 figures

    Journal ref: Transactions on Machine Learning Research, 2023

  6. arXiv:2206.12173  [pdf, other

    quant-ph physics.optics

    Reducing The Impact Of Adaptive Optics Lag On Optical And Quantum Communications Rates From Rapidly Moving Sources

    Authors: Kai Sum Chan, H. F. Chau

    Abstract: Wavefront of light passing through turbulent atmosphere gets distorted. This causes signal loss in free-space optical communication as the light beam spreads and wanders at the receiving end. Frequency and/or time division multiplexing adaptive optics (AO) techniques have been used to conjugate this kind of wavefront distortion. However, if the signal beam moves relative to the atmosphere, the AO… ▽ More

    Submitted 8 April, 2023; v1 submitted 24 June, 2022; originally announced June 2022.

    Comments: title changed to better reflect what we have done, to appear in AIP Advances; 14 pages, 12 figures

  7. arXiv:2204.06652  [pdf, other

    cs.LG

    Joint Coreset Construction and Quantization for Distributed Machine Learning

    Authors: Hanlin Lu, Changchang Liu, Shiqiang Wang, Ting He, Vijay Narayanan, Kevin S. Chan, Stephen Pasteris

    Abstract: Coresets are small, weighted summaries of larger datasets, aiming at providing provable error bounds for machine learning (ML) tasks while significantly reducing the communication and computation costs. To achieve a better trade-off between ML error bounds and costs, we propose the first framework to incorporate quantization techniques into the process of coreset construction. Specifically, we the… ▽ More

    Submitted 13 April, 2022; originally announced April 2022.

  8. arXiv:2102.04282  [pdf, other

    cs.LG

    Communication-efficient k-Means for Edge-based Machine Learning

    Authors: Hanlin Lu, Ting He, Shiqiang Wang, Changchang Liu, Mehrdad Mahdavi, Vijaykrishnan Narayanan, Kevin S. Chan, Stephen Pasteris

    Abstract: We consider the problem of computing the k-means centers for a large high-dimensional dataset in the context of edge-based machine learning, where data sources offload machine learning computation to nearby edge servers. k-Means computation is fundamental to many data analytics, and the capability of computing provably accurate k-means centers by leveraging the computation power of the edge server… ▽ More

    Submitted 21 January, 2022; v1 submitted 8 February, 2021; originally announced February 2021.

  9. arXiv:2011.04893  [pdf, other

    cs.PF cs.DC

    Resource Allocation in One-dimensional Distributed Service Networks with Applications

    Authors: Nitish K. Panigrahy, Prithwish Basu, Philippe Nain, Don Towsley, Ananthram Swami, Kevin S. Chan, Kin K. Leung

    Abstract: We consider assignment policies that allocate resources to users, where both resources and users are located on a one-dimensional line. First, we consider unidirectional assignment policies that allocate resources only to users located to their left. We propose the Move to Right (MTR) policy, which scans from left to right assigning nearest rightmost available resource to a user, and contrast it t… ▽ More

    Submitted 8 November, 2020; originally announced November 2020.

    Comments: arXiv admin note: text overlap with arXiv:1901.02414

  10. You Do (Not) Belong Here: Detecting DPI Evasion Attacks with Context Learning

    Authors: Shitong Zhu, Shasha Li, Zhongjie Wang, Xun Chen, Zhiyun Qian, Srikanth V. Krishnamurthy, Kevin S. Chan, Ananthram Swami

    Abstract: As Deep Packet Inspection (DPI) middleboxes become increasingly popular, a spectrum of adversarial attacks have emerged with the goal of evading such middleboxes. Many of these attacks exploit discrepancies between the middlebox network protocol implementations, and the more rigorous/complete versions implemented at end hosts. These evasion attacks largely involve subtle manipulations of packets t… ▽ More

    Submitted 3 November, 2020; originally announced November 2020.

    Comments: 12 pages, 12 figures; accepted to ACM CoNEXT 2020

  11. arXiv:2007.09763  [pdf, other

    cs.CV cs.LG

    Connecting the Dots: Detecting Adversarial Perturbations Using Context Inconsistency

    Authors: Shasha Li, Shitong Zhu, Sudipta Paul, Amit Roy-Chowdhury, Chengyu Song, Srikanth Krishnamurthy, Ananthram Swami, Kevin S Chan

    Abstract: There has been a recent surge in research on adversarial perturbations that defeat Deep Neural Networks (DNNs) in machine vision; most of these perturbation-based attacks target object classifiers. Inspired by the observation that humans are able to recognize objects that appear out of place in a scene or along with other unlikely objects, we augment the DNN with a system that learns context consi… ▽ More

    Submitted 24 July, 2020; v1 submitted 19 July, 2020; originally announced July 2020.

    Comments: The paper is accepted by ECCV 2020

  12. arXiv:2007.02977  [pdf, other

    cs.LG stat.ML

    Sharing Models or Coresets: A Study based on Membership Inference Attack

    Authors: Hanlin Lu, Changchang Liu, Ting He, Shiqiang Wang, Kevin S. Chan

    Abstract: Distributed machine learning generally aims at training a global model based on distributed data without collecting all the data to a centralized location, where two different approaches have been proposed: collecting and aggregating local models (federated learning) and collecting and training over representative data summaries (coreset). While each approach preserves data privacy to some extent… ▽ More

    Submitted 6 July, 2020; originally announced July 2020.

  13. arXiv:2002.12309  [pdf, other

    cs.SI

    Node Immunization with Non-backtracking Eigenvalues

    Authors: Leo Torres, Kevin S. Chan, Hanghang Tong, Tina Eliassi-Rad

    Abstract: The non-backtracking matrix and its eigenvalues have many applications in network science and graph mining, such as node and edge centrality, community detection, length spectrum theory, graph distance, and epidemic and percolation thresholds. Moreover, in network epidemiology, the reciprocal of the largest eigenvalue of the non-backtracking matrix is a good approximation for the epidemic threshol… ▽ More

    Submitted 27 February, 2020; originally announced February 2020.

  14. arXiv:2001.10999  [pdf, other

    cs.CR cs.LG

    A4 : Evading Learning-based Adblockers

    Authors: Shitong Zhu, Zhongjie Wang, Xun Chen, Shasha Li, Umar Iqbal, Zhiyun Qian, Kevin S. Chan, Srikanth V. Krishnamurthy, Zubair Shafiq

    Abstract: Efforts by online ad publishers to circumvent traditional ad blockers towards regaining fiduciary benefits, have been demonstrably successful. As a result, there have recently emerged a set of adblockers that apply machine learning instead of manually curated rules and have been shown to be more robust in blocking ads on websites including social media sites such as Facebook. Among these, AdGraph… ▽ More

    Submitted 29 January, 2020; originally announced January 2020.

    Comments: 10 pages, 7 figures

  15. A Study on Wrist Identification for Forensic Investigation

    Authors: Wojciech Michal Matkowski, Frodo Kin Sun Chan, Adams Wai Kin Kong

    Abstract: Criminal and victim identification based on crime scene images is an important part of forensic investigation. Criminals usually avoid identification by covering their faces and tattoos in the evidence images, which are taken in uncontrolled environments. Existing identification methods, which make use of biometric traits, such as vein, skin mark, height, skin color, weight, race, etc., are consid… ▽ More

    Submitted 8 October, 2019; originally announced October 2019.

    Journal ref: Image and Vision Computing, vol. 88, August 2019, pp 96-112

  16. GLEE: Geometric Laplacian Eigenmap Embedding

    Authors: Leo Torres, Kevin S Chan, Tina Eliassi-Rad

    Abstract: Graph embedding seeks to build a low-dimensional representation of a graph G. This low-dimensional representation is then used for various downstream tasks. One popular approach is Laplacian Eigenmaps, which constructs a graph embedding based on the spectral properties of the Laplacian matrix of G. The intuition behind it, and many other embedding techniques, is that the embedding of a graph must… ▽ More

    Submitted 20 January, 2020; v1 submitted 23 May, 2019; originally announced May 2019.

  17. arXiv:1905.04833  [pdf, other

    cs.AI cs.CR cs.GT cs.LG

    Learning and Planning in the Feature Deception Problem

    Authors: Zheyuan Ryan Shi, Ariel D. Procaccia, Kevin S. Chan, Sridhar Venkatesan, Noam Ben-Asher, Nandi O. Leslie, Charles Kamhoua, Fei Fang

    Abstract: Today's high-stakes adversarial interactions feature attackers who constantly breach the ever-improving security measures. Deception mitigates the defender's loss by misleading the attacker to make suboptimal decisions. In order to formally reason about deception, we introduce the feature deception problem (FDP), a domain-independent model and present a learning and planning framework for finding… ▽ More

    Submitted 8 June, 2020; v1 submitted 12 May, 2019; originally announced May 2019.

  18. arXiv:1904.06599  [pdf, other

    eess.SP cs.IT

    TDMR Detection System with Local Area Influence Probabilistic a Priori Detector

    Authors: **lu Shen, Xueliang Sun, Krishnamoorthy Sivakumar, Benjamin J. Belzer, Kheong Sann Chan, Ashish James

    Abstract: We propose a three-track detection system for two dimensional magnetic recording (TDMR) in which a local area influence probabilistic (LAIP) detector works with a trellis-based Bahl-Cocke-Jelinek-Raviv (BCJR) detector to remove intersymbol interference (ISI) and intertrack interference (ITI) among coded data bits as well as media noise due to magnetic grain-bit interactions. Two minimum mean-squar… ▽ More

    Submitted 13 April, 2019; originally announced April 2019.

    Comments: Accepted to the 2019 IEEE International Conference on Communications (ICC-2019)

  19. arXiv:1904.05961  [pdf, other

    cs.LG cs.DS stat.ML

    Robust Coreset Construction for Distributed Machine Learning

    Authors: Hanlin Lu, Ming-Ju Li, Ting He, Shiqiang Wang, Vijaykrishnan Narayanan, Kevin S Chan

    Abstract: Coreset, which is a summary of the original dataset in the form of a small weighted set in the same sample space, provides a promising approach to enable machine learning over distributed data. Although viewed as a proxy of the original dataset, each coreset is only designed to approximate the cost function of a specific machine learning problem, and thus different coresets are often required to s… ▽ More

    Submitted 22 June, 2020; v1 submitted 11 April, 2019; originally announced April 2019.

  20. arXiv:1902.00658  [pdf, other

    cs.SI physics.soc-ph

    Polarization and Fluctuations in Signed Social Networks

    Authors: Pedro Cisneros-Velarde, Kevin S. Chan, Francesco Bullo

    Abstract: Much recent research on social networks has focused on the modeling and analysis of how opinions evolve as a function of interpersonal relationships. It is also of great interest to model and understand the implications of friendly and antagonistic relationships. In this paper, we propose a new, simple and intuitive model that incorporates the socio-psychological phenomenon of the boomerang effect… ▽ More

    Submitted 3 October, 2019; v1 submitted 2 February, 2019; originally announced February 2019.

    Comments: 15 pages, 9 figures

  21. arXiv:1901.02414  [pdf, other

    cs.PF

    Resource Allocation in One-dimensional Distributed Service Networks

    Authors: Nitish K. Panigrahy, Prithwish Basu, Philippe Nain, Don Towsley, Ananthram Swami, Kevin S. Chan, Kin K. Leung

    Abstract: We consider assignment policies that allocate resources to users, where both resources and users are located on a one-dimensional line. First, we consider unidirectional assignment policies that allocate resources only to users located to their left. We propose the Move to Right (MTR) policy, which scans from left to right assigning nearest rightmost available resource to a user, and contrast it t… ▽ More

    Submitted 11 February, 2020; v1 submitted 8 January, 2019; originally announced January 2019.

  22. arXiv:1709.03133  [pdf, other

    cs.DC

    Location Privacy in Mobile Edge Clouds: A Chaff-based Approach

    Authors: Ting He, Ertugrul N. Ciftcioglu, Shiqiang Wang, Kevin S. Chan

    Abstract: In this paper, we consider user location privacy in mobile edge clouds (MECs). MECs are small clouds deployed at the network edge to offer cloud services close to mobile users, and many solutions have been proposed to maximize service locality by migrating services to follow their users. Co-location of a user and his service, however, implies that a cyber eavesdropper observing service migrations… ▽ More

    Submitted 10 September, 2017; originally announced September 2017.

  23. arXiv:1611.00800  [pdf

    cs.LG cs.CV stat.ML

    Temporal Matrix Completion with Locally Linear Latent Factors for Medical Applications

    Authors: Frodo Kin Sun Chan, Andy J Ma, Pong C Yuen, Terry Cheuk-Fung Yip, Yee-Kit Tse, Vincent Wai-Sun Wong, Grace Lai-Hung Wong

    Abstract: Regular medical records are useful for medical practitioners to analyze and monitor patient health status especially for those with chronic disease, but such records are usually incomplete due to unpunctuality and absence of patients. In order to resolve the missing data problem over time, tensor-based model is suggested for missing data imputation in recent papers because this approach makes use… ▽ More

    Submitted 31 October, 2016; originally announced November 2016.

  24. arXiv:1508.06950  [pdf, ps, other

    physics.soc-ph cs.SI

    Information Cascades in Feed-based Networks of Users with Limited Attention

    Authors: Sameet Sreenivasan, Kevin S. Chan, Ananthram Swami, Gyorgy Korniss, Boleslaw Szymanski

    Abstract: We build a model of information cascades on feed-based networks, taking into account the finite attention span of users, message generation rates and message forwarding rates. Using this model, we study through simulations, the effect of the extent of user attention on the probability that the cascade becomes viral. In analogy with a branching process, we estimate the branching factor associated w… ▽ More

    Submitted 27 August, 2015; originally announced August 2015.

    Comments: 8 pages, 5 figures, For IEEE Transactions on Network Science and Engineering (submitted)

    Journal ref: IEEE Transactions on Network Science and Engineering 4, 120-128 (2017)

  25. arXiv:1407.3103  [pdf, other

    physics.class-ph cond-mat.mtrl-sci

    A theory of static friction between homogeneous surfaces based on compressible elastic smooth microscopic inclines

    Authors: Freeman Chee Siong Thun, Vee-Liem Saw, Kin Sung Chan

    Abstract: We develop a theory of static friction by modeling the homogeneous surfaces of contact as being composed of a regular array of compressible elastic smooth microscopic inclines. Static friction is thought of as the resistance due to having to push the load over these smooth microscopic inclines that share a common inclination angle. As the normal force between the surfaces increases, the microscopi… ▽ More

    Submitted 11 July, 2014; originally announced July 2014.

    Comments: 29 pages, 15 figures

  26. Adsorbate Electric Fields on a Cryogenic Atom Chip

    Authors: K. S. Chan, M. Siercke, C. Hufnagel, R. Dumke

    Abstract: We investigate the behaviour of electric fields originating from adsorbates deposited on a cryogenic atom chip as it is cooled from room temperature to cryogenic temperature. Using Rydberg electromagnetically induced transparency we measure the field strength versus distance from a 1 mm square of YBCO patterned onto a YSZ chip substrate. We find a localized and stable dipole field at room temperat… ▽ More

    Submitted 3 January, 2014; v1 submitted 20 December, 2013; originally announced December 2013.

    Comments: 5 pages, 4 figures

  27. arXiv:1209.6152  [pdf, ps, other

    cs.IT

    Parity Declustering for Fault-Tolerant Storage Systems via $t$-designs

    Authors: Son Hoang Dau, Yan Jia, Chao **, Weiya Xi, Kheong Sann Chan

    Abstract: Parity declustering allows faster reconstruction of a disk array when some disk fails. Moreover, it guarantees uniform reconstruction workload on all surviving disks. It has been shown that parity declustering for one-failure tolerant array codes can be obtained via Balanced Incomplete Block Designs. We extend this technique for array codes that can tolerate an arbitrary number of disk failures vi… ▽ More

    Submitted 15 March, 2013; v1 submitted 27 September, 2012; originally announced September 2012.

    Comments: 13 pages

  28. Reconfigurable self-sufficient traps for ultracold atoms based on a superconducting square

    Authors: M. Siercke, K. S. Chan, B. Zhang, M. Beian, M. J. Lim, R. Dumke

    Abstract: We report on the trap** of ultracold atoms in the magnetic field formed entirely by persistent supercurrents induced in a thin film type-II superconducting square. The supercurrents are carried by vortices induced in the 2D structure by applying two magnetic field pulses of varying amplitude perpendicular to its surface. This results in a self-sufficient quadrupole trap that does not require any… ▽ More

    Submitted 13 April, 2012; originally announced April 2012.

    Comments: 5 pages, 7 figures

  29. arXiv:1201.3000  [pdf, other

    physics.atom-ph cond-mat.supr-con

    Magnetic confinement of neutral atoms based on patterned vortex distributions in superconducting disks and rings

    Authors: B. Zhang, M. Siercke, K. S. Chan, M. Beian, M. J. Lim, R. Dumke

    Abstract: We propose and analyze neutral atom traps generated by vortices imprinted by magnetic field pulse sequences in type-II superconducting disks and rings. We compute the supercurrent distribution and magnetic field resulting from the vortices in the superconductor. Different patterns of vortices can be written by versatile loading field sequences. We discuss in detail procedures to generate quadrupol… ▽ More

    Submitted 14 January, 2012; originally announced January 2012.

    Comments: 7 pages, 9 figures

    Journal ref: Phys. Rev. A 85, 013404 (2012)

  30. arXiv:1010.5554  [pdf, ps, other

    cond-mat.supr-con

    Anomalous Josephson current through a ferromagnetic trilayer junction

    Authors: Jun-Feng Liu, K. S. Chan

    Abstract: We studied the anomalous Josephson current appearing at zero phase difference in junctions coupled with a ferromagnetic trilayer which has noncoplanar magnetizations. A $π/2$ junction with an equilibrium phase difference $π/2$ is obtained under suitable conditions. The equilibrium phase difference and the amplitude of the supercurrent are all tunable by the structure parameters. In addition to cal… ▽ More

    Submitted 11 November, 2010; v1 submitted 26 October, 2010; originally announced October 2010.

    Comments: 7 pages, 8 figures, accepted to PRB

    Journal ref: Phys. Rev. B 82, 184533 (2010)

  31. Programmable trap geometries with superconducting atom chips

    Authors: T. Mueller, B. Zhang, R. Fermani, K. S. Chan, M. J. Lim, R. Dumke

    Abstract: We employ the hysteretic behavior of a superconducting thin film in the remanent state to generate different traps and flexible magnetic potentials for ultra-cold atoms. The trap geometry can be programmed by externally applied fields. This new approach for atom-optics is demonstrated by three different trap types realized on a single micro-structure: a Z-type trap, a double trap and a bias field… ▽ More

    Submitted 28 March, 2010; originally announced March 2010.

  32. arXiv:0910.2332  [pdf, ps, other

    physics.atom-ph quant-ph

    Trap** of ultra-cold atoms with the magnetic field of vortices in a thin film superconducting micro-structure

    Authors: T. Müller, B. Zhang, R. Fermani, K. S. Chan, Z. W. Wang, C. B. Zhang, M. J. Lim, R. Dumke

    Abstract: We store and control ultra-cold atoms in a new type of trap using magnetic fields of vortices in a high temperature superconducting micro-structure. This is the first time ultra-cold atoms have been trapped in the field of magnetic flux quanta. We generate the attractive trap** potential for the atoms by combining the magnetic field of a superconductor in the remanent state with external homog… ▽ More

    Submitted 13 October, 2009; originally announced October 2009.

    Comments: 4pages, comments are welcome

  33. arXiv:0805.1438  [pdf, ps, other

    cond-mat.mes-hall cond-mat.mtrl-sci

    Resonant Tunneling through double-bended Graphene Nanoribbons

    Authors: Z. Z. Zhang, Kai Chang, K. S. Chan

    Abstract: We investigate theoretically resonant tunneling through double-bended graphene nanoribbon structures, i.e., armchair-edged graphene nanoribbons (AGNRs) in between two semi-infinite zigzag graphene nanoribbon (ZGNR) leads. Our numerical results demonstrate that the resonant tunneling can be tuned dramatically by the Fermi energy and the length and/or widths of the AGNR for both the metallic and s… ▽ More

    Submitted 9 May, 2008; originally announced May 2008.

    Comments: 4 pages, 4 figures

  34. arXiv:0803.4310  [pdf, ps, other

    cond-mat.mes-hall cond-mat.mtrl-sci

    Anomalous Rashba spin-orbit interaction in InAs/GaSb quantum wells

    Authors: J. Li, Kai Chang, G. Q. Hai, K. S. Chan

    Abstract: We investigate theoretically the Rashba spin-orbit interaction in InAs/GaSb quantum wells(QWs). We find that the Rashba spin-splitting (RSS) depends sensitively on the thickness of the InAs layer. The RSS exhibits nonlinear behavior for narrow InAs/GaSb QWs and the oscillating feature for wide InAs/GaSb QWs. The nonlinear and oscillating behaviors arise from the weakened and enhanced interband c… ▽ More

    Submitted 30 March, 2008; originally announced March 2008.

    Comments: 3 pages, 4 figures. Appl. Phys. Lett. (in press)

  35. arXiv:0801.1145  [pdf, ps, other

    cond-mat.supr-con

    Spin-orbital coupling effect on Josephson current through a superconductor heterojunction

    Authors: Z. H. Yang, Y. H. Yang, J. Wang, K. S. Chan

    Abstract: We study spin-orbital coupling effect on the Josephson current through a superconductor (SC) heterojunction, consisting of two s-wave superconductors and a two-dimensional electron gas (2DEG) layer between them. The Rashba-type (RSOC) and/or Dresselhaus-type (DSOC) of spin-orbital coupling are considered in the 2DEG region. By using the lattice Bogoliubov-de Gennes equation and the Keldysh forma… ▽ More

    Submitted 7 January, 2008; originally announced January 2008.

    Comments: 5 pages, 5 figures

  36. A Scattering method to the equilibrium spin current in a ferromagnet junction

    Authors: J. Wang, K. S. Chan

    Abstract: We extended McMillan's Green's function method to study the equilibrium spin current (ESC) in a ferromagnet/ferromagnet (FM/FM) tunnelling junction, in which the magnetic moments in both FM electrodes are not collinear. The single-electron Green's function of the junction system is directly constructed from the elements of the scattering matrix which can be obtained by matching wavefunctions at… ▽ More

    Submitted 17 September, 2006; originally announced September 2006.

    Comments: 6 papges and 2 figures

  37. Equilibrium spin current through the tunnelling junctions

    Authors: J. Wang, K. S. Chan

    Abstract: We study equilibrium pure spin current through tunnelling junctions at zero bias. The two leads of the junctions connected via a thin insulator barrier, can be either a ferromagnetic metal (FM) or a nonmagnetic high-mobility two-dimensional electron gas (2DEG) with Rashba spin orbital interaction (RSOI) or Dresselhaus spin orbital interaction (DSOI). As a lead of a tunnelling junction, the isotr… ▽ More

    Submitted 18 December, 2005; originally announced December 2005.

    Comments: 6 pages and 1 figure

  38. arXiv:cond-mat/0506749  [pdf

    cond-mat.soft cond-mat.mtrl-sci

    Trap** and hop** of bipolarons in DNA: Su-Schrieffer-Heeger model calculations

    Authors: J. H. Wei, L. X. Wang, K. S. Chan, Yi**g Yan

    Abstract: With the Su-Schrieffer-Heeger model involving the effects of solvent polarization and external electric field, we show that bipolaron maybe more stable than two polarons when a dication induced into a DNA stack. Under the high electric field, the dication can move quite a long distance through the DNA by a series of hop** process, partially losing its configuration instantaneously due to the n… ▽ More

    Submitted 28 June, 2005; originally announced June 2005.

    Comments: to appear in Phys. Rev. B

    Journal ref: Physical Review B 72, 064304 (2005)

  39. arXiv:cond-mat/0503518   

    cond-mat.mtrl-sci cond-mat.soft

    Charge Transport in DNA

    Authors: J H Wei, K S Chan

    Abstract: A model is proposed to interpret the experimental I-V curves Polyguanine-Polycytosine DNA molecules.

    Submitted 27 May, 2005; v1 submitted 21 March, 2005; originally announced March 2005.