-
Federated Learning Privacy: Attacks, Defenses, Applications, and Policy Landscape - A Survey
Authors:
Joshua C. Zhao,
Saurabh Bagchi,
Salman Avestimehr,
Kevin S. Chan,
Somali Chaterji,
Dimitris Dimitriadis,
Jiacheng Li,
Ninghui Li,
Arash Nourian,
Holger R. Roth
Abstract:
Deep learning has shown incredible potential across a vast array of tasks and accompanying this growth has been an insatiable appetite for data. However, a large amount of data needed for enabling deep learning is stored on personal devices and recent concerns on privacy have further highlighted challenges for accessing such data. As a result, federated learning (FL) has emerged as an important pr…
▽ More
Deep learning has shown incredible potential across a vast array of tasks and accompanying this growth has been an insatiable appetite for data. However, a large amount of data needed for enabling deep learning is stored on personal devices and recent concerns on privacy have further highlighted challenges for accessing such data. As a result, federated learning (FL) has emerged as an important privacy-preserving technology enabling collaborative training of machine learning models without the need to send the raw, potentially sensitive, data to a central server. However, the fundamental premise that sending model updates to a server is privacy-preserving only holds if the updates cannot be "reverse engineered" to infer information about the private training data. It has been shown under a wide variety of settings that this premise for privacy does {\em not} hold.
In this survey paper, we provide a comprehensive literature review of the different privacy attacks and defense methods in FL. We identify the current limitations of these attacks and highlight the settings in which FL client privacy can be broken. We dissect some of the successful industry applications of FL and draw lessons for future successful adoption. We survey the emerging landscape of privacy regulation for FL. We conclude with future directions for taking FL toward the cherished goal of generating accurate models while preserving the privacy of the data from its participants.
△ Less
Submitted 6 May, 2024;
originally announced May 2024.
-
Prompt Selection and Augmentation for Few Examples Code Generation in Large Language Model and its Application in Robotics Control
Authors:
On Tai Wu,
Frodo Kin Sun Chan,
Zunhao Zhang,
Yan Nei Law,
Benny Drescher,
Edmond Shiao Bun Lai
Abstract:
Few-shot prompting and step-by-step reasoning have enhanced the capabilities of Large Language Models (LLMs) in tackling complex tasks including code generation. In this paper, we introduce a prompt selection and augmentation algorithm aimed at improving mathematical reasoning and robot arm operations. Our approach incorporates a multi-stage example augmentation scheme combined with an example sel…
▽ More
Few-shot prompting and step-by-step reasoning have enhanced the capabilities of Large Language Models (LLMs) in tackling complex tasks including code generation. In this paper, we introduce a prompt selection and augmentation algorithm aimed at improving mathematical reasoning and robot arm operations. Our approach incorporates a multi-stage example augmentation scheme combined with an example selection scheme. This algorithm improves LLM performance by selecting a set of examples that increase diversity, minimize redundancy, and increase relevance to the question. When combined with the Program-of-Thought prompting, our algorithm demonstrates an improvement in performance on the GSM8K and SVAMP benchmarks, with increases of 0.3% and 1.1% respectively. Furthermore, in simulated tabletop environments, our algorithm surpasses the Code-as-Policies approach by achieving a 3.4% increase in successful task completions and a decrease of over 70% in the number of examples used. Its ability to discard examples that contribute little to solving the problem reduces the inferencing time of an LLM-powered robotics system. This algorithm also offers important benefits for industrial process automation by streamlining the development and deployment process, reducing manual programming effort, and enhancing code reusability.
△ Less
Submitted 11 March, 2024;
originally announced March 2024.
-
ProGroTrack: Deep Learning-Assisted Tracking of Intracellular Protein Growth Dynamics
Authors:
Kai San Chan,
Huimiao Chen,
Chenyu **,
Yuxuan Tian,
Dingchang Lin
Abstract:
Accurate tracking of cellular and subcellular structures, along with their dynamics, plays a pivotal role in understanding the underlying mechanisms of biological systems. This paper presents a novel approach, ProGroTrack, that combines the You Only Look Once (YOLO) and ByteTrack algorithms within the detection-based tracking (DBT) framework to track intracellular protein nanostructures. Focusing…
▽ More
Accurate tracking of cellular and subcellular structures, along with their dynamics, plays a pivotal role in understanding the underlying mechanisms of biological systems. This paper presents a novel approach, ProGroTrack, that combines the You Only Look Once (YOLO) and ByteTrack algorithms within the detection-based tracking (DBT) framework to track intracellular protein nanostructures. Focusing on iPAK4 protein fibers as a representative case study, we conducted a comprehensive evaluation of YOLOv5 and YOLOv8 models, revealing the superior performance of YOLOv5 on our dataset. Notably, YOLOv5x achieved an impressive mAP50 of 0.839 and F-score of 0.819. To further optimize detection capabilities, we incorporated semi-supervised learning for model improvement, resulting in enhanced performances in all metrics. Subsequently, we successfully applied our approach to track the growth behavior of iPAK4 protein fibers, revealing their two distinct growth phases consistent with a previously reported kinetic model. This research showcases the promising potential of our approach, extending beyond iPAK4 fibers. It also offers a significant advancement in precise tracking of dynamic processes in live cells, and fostering new avenues for biomedical research.
△ Less
Submitted 26 May, 2023;
originally announced May 2023.
-
Federated Learning with Flexible Control
Authors:
Shiqiang Wang,
Jake Perazzone,
Mingyue Ji,
Kevin S. Chan
Abstract:
Federated learning (FL) enables distributed model training from local data collected by users. In distributed systems with constrained resources and potentially high dynamics, e.g., mobile edge networks, the efficiency of FL is an important problem. Existing works have separately considered different configurations to make FL more efficient, such as infrequent transmission of model updates, client…
▽ More
Federated learning (FL) enables distributed model training from local data collected by users. In distributed systems with constrained resources and potentially high dynamics, e.g., mobile edge networks, the efficiency of FL is an important problem. Existing works have separately considered different configurations to make FL more efficient, such as infrequent transmission of model updates, client subsampling, and compression of update vectors. However, an important open problem is how to jointly apply and tune these control knobs in a single FL algorithm, to achieve the best performance by allowing a high degree of freedom in control decisions. In this paper, we address this problem and propose FlexFL - an FL algorithm with multiple options that can be adjusted flexibly. Our FlexFL algorithm allows both arbitrary rates of local computation at clients and arbitrary amounts of communication between clients and the server, making both the computation and communication resource consumption adjustable. We prove a convergence upper bound of this algorithm. Based on this result, we further propose a stochastic optimization formulation and algorithm to determine the control decisions that (approximately) minimize the convergence bound, while conforming to constraints related to resource consumption. The advantage of our approach is also verified using experiments.
△ Less
Submitted 16 December, 2022;
originally announced December 2022.
-
Stochastic Constrained DRO with a Complexity Independent of Sample Size
Authors:
Qi Qi,
Jiameng Lyu,
Kung sik Chan,
Er Wei Bai,
Tianbao Yang
Abstract:
Distributionally Robust Optimization (DRO), as a popular method to train robust models against distribution shift between training and test sets, has received tremendous attention in recent years. In this paper, we propose and analyze stochastic algorithms that apply to both non-convex and convex losses for solving Kullback Leibler divergence constrained DRO problem. Compared with existing methods…
▽ More
Distributionally Robust Optimization (DRO), as a popular method to train robust models against distribution shift between training and test sets, has received tremendous attention in recent years. In this paper, we propose and analyze stochastic algorithms that apply to both non-convex and convex losses for solving Kullback Leibler divergence constrained DRO problem. Compared with existing methods solving this problem, our stochastic algorithms not only enjoy competitive if not better complexity independent of sample size but also just require a constant batch size at every iteration, which is more practical for broad applications. We establish a nearly optimal complexity bound for finding an $ε$ stationary solution for non-convex losses and an optimal complexity for finding an $ε$ optimal solution for convex losses. Empirical studies demonstrate the effectiveness of the proposed algorithms for solving non-convex and convex constrained DRO problems.
△ Less
Submitted 16 August, 2023; v1 submitted 11 October, 2022;
originally announced October 2022.
-
Reducing The Impact Of Adaptive Optics Lag On Optical And Quantum Communications Rates From Rapidly Moving Sources
Authors:
Kai Sum Chan,
H. F. Chau
Abstract:
Wavefront of light passing through turbulent atmosphere gets distorted. This causes signal loss in free-space optical communication as the light beam spreads and wanders at the receiving end. Frequency and/or time division multiplexing adaptive optics (AO) techniques have been used to conjugate this kind of wavefront distortion. However, if the signal beam moves relative to the atmosphere, the AO…
▽ More
Wavefront of light passing through turbulent atmosphere gets distorted. This causes signal loss in free-space optical communication as the light beam spreads and wanders at the receiving end. Frequency and/or time division multiplexing adaptive optics (AO) techniques have been used to conjugate this kind of wavefront distortion. However, if the signal beam moves relative to the atmosphere, the AO system performance degrades due to high temporal anisoplanatism. Here we solve this problem by adding a pioneer beacon that is spatially separated from the signal beam with time delay between spatially separated pulses. More importantly, our protocol works irrespective of the signal beam intensity and hence is also applicable to secret quantum communication. In particular, using semi-empirical atmospheric turbulence calculation, we show that for low earth orbit satellite-to-ground decoy state quantum key distribution with the satellite at zenith angle $< 30^\circ$, our method increases the key rate by at least $215\%$ and $40\%$ for satellite altitude $400$~km and $800$~km, respectively. Finally, we propose a modification of existing wavelength division multiplexing systems as an effective alternative solution to this problem.
△ Less
Submitted 8 April, 2023; v1 submitted 24 June, 2022;
originally announced June 2022.
-
Joint Coreset Construction and Quantization for Distributed Machine Learning
Authors:
Hanlin Lu,
Changchang Liu,
Shiqiang Wang,
Ting He,
Vijay Narayanan,
Kevin S. Chan,
Stephen Pasteris
Abstract:
Coresets are small, weighted summaries of larger datasets, aiming at providing provable error bounds for machine learning (ML) tasks while significantly reducing the communication and computation costs. To achieve a better trade-off between ML error bounds and costs, we propose the first framework to incorporate quantization techniques into the process of coreset construction. Specifically, we the…
▽ More
Coresets are small, weighted summaries of larger datasets, aiming at providing provable error bounds for machine learning (ML) tasks while significantly reducing the communication and computation costs. To achieve a better trade-off between ML error bounds and costs, we propose the first framework to incorporate quantization techniques into the process of coreset construction. Specifically, we theoretically analyze the ML error bounds caused by a combination of coreset construction and quantization. Based on that, we formulate an optimization problem to minimize the ML error under a fixed budget of communication cost. To improve the scalability for large datasets, we identify two proxies of the original objective function, for which efficient algorithms are developed. For the case of data on multiple nodes, we further design a novel algorithm to allocate the communication budget to the nodes while minimizing the overall ML error. Through extensive experiments on multiple real-world datasets, we demonstrate the effectiveness and efficiency of our proposed algorithms for a variety of ML tasks. In particular, our algorithms have achieved more than 90% data reduction with less than 10% degradation in ML performance in most cases.
△ Less
Submitted 13 April, 2022;
originally announced April 2022.
-
Communication-efficient k-Means for Edge-based Machine Learning
Authors:
Hanlin Lu,
Ting He,
Shiqiang Wang,
Changchang Liu,
Mehrdad Mahdavi,
Vijaykrishnan Narayanan,
Kevin S. Chan,
Stephen Pasteris
Abstract:
We consider the problem of computing the k-means centers for a large high-dimensional dataset in the context of edge-based machine learning, where data sources offload machine learning computation to nearby edge servers. k-Means computation is fundamental to many data analytics, and the capability of computing provably accurate k-means centers by leveraging the computation power of the edge server…
▽ More
We consider the problem of computing the k-means centers for a large high-dimensional dataset in the context of edge-based machine learning, where data sources offload machine learning computation to nearby edge servers. k-Means computation is fundamental to many data analytics, and the capability of computing provably accurate k-means centers by leveraging the computation power of the edge servers, at a low communication and computation cost to the data sources, will greatly improve the performance of these analytics. We propose to let the data sources send small summaries, generated by joint dimensionality reduction (DR), cardinality reduction (CR), and quantization (QT), to support approximate k-means computation at reduced complexity and communication cost. By analyzing the complexity, the communication cost, and the approximation error of k-means algorithms based on carefully designed composition of DR/CR/QT methods, we show that: (i) it is possible to compute near-optimal k-means centers at a near-linear complexity and a constant or logarithmic communication cost, (ii) the order of applying DR and CR significantly affects the complexity and the communication cost, and (iii) combining DR/CR methods with a properly configured quantizer can further reduce the communication cost without compromising the other performance metrics. Our theoretical analysis has been validated through experiments based on real datasets.
△ Less
Submitted 21 January, 2022; v1 submitted 8 February, 2021;
originally announced February 2021.
-
Resource Allocation in One-dimensional Distributed Service Networks with Applications
Authors:
Nitish K. Panigrahy,
Prithwish Basu,
Philippe Nain,
Don Towsley,
Ananthram Swami,
Kevin S. Chan,
Kin K. Leung
Abstract:
We consider assignment policies that allocate resources to users, where both resources and users are located on a one-dimensional line. First, we consider unidirectional assignment policies that allocate resources only to users located to their left. We propose the Move to Right (MTR) policy, which scans from left to right assigning nearest rightmost available resource to a user, and contrast it t…
▽ More
We consider assignment policies that allocate resources to users, where both resources and users are located on a one-dimensional line. First, we consider unidirectional assignment policies that allocate resources only to users located to their left. We propose the Move to Right (MTR) policy, which scans from left to right assigning nearest rightmost available resource to a user, and contrast it to the Unidirectional Gale-Shapley (UGS) matching policy. While both policies among all unidirectional policies, minimize the expected distance traveled by a request (request distance), MTR is fairer. Moreover, we show that when user and resource locations are modeled by statistical point processes, and resources are allowed to satisfy more than one user, the spatial system under unidirectional policies can be mapped into bulk service queueing systems, thus allowing the application of many queueing theory results that yield closed form expressions. As we consider a case where different resources can satisfy different numbers of users, we also generate new results for bulk service queues. We also consider bidirectional policies where there are no directional restrictions on resource allocation and develop an algorithm for computing the optimal assignment which is more efficient than known algorithms in the literature when there are more resources than users. Numerical evaluation of performance of unidirectional and bidirectional allocation schemes yields design guidelines beneficial for resource placement. \np{Finally, we present a heuristic algorithm, which leverages the optimal dynamic programming scheme for one-dimensional inputs to obtain approximate solutions to the optimal assignment problem for the two-dimensional scenario and empirically yields request distances within a constant factor of the optimal solution.
△ Less
Submitted 8 November, 2020;
originally announced November 2020.
-
You Do (Not) Belong Here: Detecting DPI Evasion Attacks with Context Learning
Authors:
Shitong Zhu,
Shasha Li,
Zhongjie Wang,
Xun Chen,
Zhiyun Qian,
Srikanth V. Krishnamurthy,
Kevin S. Chan,
Ananthram Swami
Abstract:
As Deep Packet Inspection (DPI) middleboxes become increasingly popular, a spectrum of adversarial attacks have emerged with the goal of evading such middleboxes. Many of these attacks exploit discrepancies between the middlebox network protocol implementations, and the more rigorous/complete versions implemented at end hosts. These evasion attacks largely involve subtle manipulations of packets t…
▽ More
As Deep Packet Inspection (DPI) middleboxes become increasingly popular, a spectrum of adversarial attacks have emerged with the goal of evading such middleboxes. Many of these attacks exploit discrepancies between the middlebox network protocol implementations, and the more rigorous/complete versions implemented at end hosts. These evasion attacks largely involve subtle manipulations of packets to cause different behaviours at DPI and end hosts, to cloak malicious network traffic that is otherwise detectable. With recent automated discovery, it has become prohibitively challenging to manually curate rules for detecting these manipulations. In this work, we propose CLAP, the first fully-automated, unsupervised ML solution to accurately detect and localize DPI evasion attacks. By learning what we call the packet context, which essentially captures inter-relationships across both (1) different packets in a connection; and (2) different header fields within each packet, from benign traffic traces only, CLAP can detect and pinpoint packets that violate the benign packet contexts (which are the ones that are specially crafted for evasion purposes). Our evaluations with 73 state-of-the-art DPI evasion attacks show that CLAP achieves an Area Under the Receiver Operating Characteristic Curve (AUC-ROC) of 0.963, an Equal Error Rate (EER) of only 0.061 in detection, and an accuracy of 94.6% in localization. These results suggest that CLAP can be a promising tool for thwarting DPI evasion attacks.
△ Less
Submitted 3 November, 2020;
originally announced November 2020.
-
Connecting the Dots: Detecting Adversarial Perturbations Using Context Inconsistency
Authors:
Shasha Li,
Shitong Zhu,
Sudipta Paul,
Amit Roy-Chowdhury,
Chengyu Song,
Srikanth Krishnamurthy,
Ananthram Swami,
Kevin S Chan
Abstract:
There has been a recent surge in research on adversarial perturbations that defeat Deep Neural Networks (DNNs) in machine vision; most of these perturbation-based attacks target object classifiers. Inspired by the observation that humans are able to recognize objects that appear out of place in a scene or along with other unlikely objects, we augment the DNN with a system that learns context consi…
▽ More
There has been a recent surge in research on adversarial perturbations that defeat Deep Neural Networks (DNNs) in machine vision; most of these perturbation-based attacks target object classifiers. Inspired by the observation that humans are able to recognize objects that appear out of place in a scene or along with other unlikely objects, we augment the DNN with a system that learns context consistency rules during training and checks for the violations of the same during testing. Our approach builds a set of auto-encoders, one for each object class, appropriately trained so as to output a discrepancy between the input and output if an added adversarial perturbation violates context consistency rules. Experiments on PASCAL VOC and MS COCO show that our method effectively detects various adversarial attacks and achieves high ROC-AUC (over 0.95 in most cases); this corresponds to over 20% improvement over a state-of-the-art context-agnostic method.
△ Less
Submitted 24 July, 2020; v1 submitted 19 July, 2020;
originally announced July 2020.
-
Sharing Models or Coresets: A Study based on Membership Inference Attack
Authors:
Hanlin Lu,
Changchang Liu,
Ting He,
Shiqiang Wang,
Kevin S. Chan
Abstract:
Distributed machine learning generally aims at training a global model based on distributed data without collecting all the data to a centralized location, where two different approaches have been proposed: collecting and aggregating local models (federated learning) and collecting and training over representative data summaries (coreset). While each approach preserves data privacy to some extent…
▽ More
Distributed machine learning generally aims at training a global model based on distributed data without collecting all the data to a centralized location, where two different approaches have been proposed: collecting and aggregating local models (federated learning) and collecting and training over representative data summaries (coreset). While each approach preserves data privacy to some extent thanks to not sharing the raw data, the exact extent of protection is unclear under sophisticated attacks that try to infer the raw data from the shared information. We present the first comparison between the two approaches in terms of target model accuracy, communication cost, and data privacy, where the last is measured by the accuracy of a state-of-the-art attack strategy called the membership inference attack. Our experiments quantify the accuracy-privacy-cost tradeoff of each approach, and reveal a nontrivial comparison that can be used to guide the design of model training processes.
△ Less
Submitted 6 July, 2020;
originally announced July 2020.
-
Node Immunization with Non-backtracking Eigenvalues
Authors:
Leo Torres,
Kevin S. Chan,
Hanghang Tong,
Tina Eliassi-Rad
Abstract:
The non-backtracking matrix and its eigenvalues have many applications in network science and graph mining, such as node and edge centrality, community detection, length spectrum theory, graph distance, and epidemic and percolation thresholds. Moreover, in network epidemiology, the reciprocal of the largest eigenvalue of the non-backtracking matrix is a good approximation for the epidemic threshol…
▽ More
The non-backtracking matrix and its eigenvalues have many applications in network science and graph mining, such as node and edge centrality, community detection, length spectrum theory, graph distance, and epidemic and percolation thresholds. Moreover, in network epidemiology, the reciprocal of the largest eigenvalue of the non-backtracking matrix is a good approximation for the epidemic threshold of certain network dynamics. In this work, we develop techniques that identify which nodes have the largest impact on the leading non-backtracking eigenvalue. We do so by studying the behavior of the spectrum of the non-backtracking matrix after a node is removed from the graph. From this analysis we derive two new centrality measures: X-degree and X-non-backtracking centrality. We perform extensive experimentation with targeted immunization strategies derived from these two centrality measures. Our spectral analysis and centrality measures can be broadly applied, and will be of interest to both theorists and practitioners alike.
△ Less
Submitted 27 February, 2020;
originally announced February 2020.
-
A4 : Evading Learning-based Adblockers
Authors:
Shitong Zhu,
Zhongjie Wang,
Xun Chen,
Shasha Li,
Umar Iqbal,
Zhiyun Qian,
Kevin S. Chan,
Srikanth V. Krishnamurthy,
Zubair Shafiq
Abstract:
Efforts by online ad publishers to circumvent traditional ad blockers towards regaining fiduciary benefits, have been demonstrably successful. As a result, there have recently emerged a set of adblockers that apply machine learning instead of manually curated rules and have been shown to be more robust in blocking ads on websites including social media sites such as Facebook. Among these, AdGraph…
▽ More
Efforts by online ad publishers to circumvent traditional ad blockers towards regaining fiduciary benefits, have been demonstrably successful. As a result, there have recently emerged a set of adblockers that apply machine learning instead of manually curated rules and have been shown to be more robust in blocking ads on websites including social media sites such as Facebook. Among these, AdGraph is arguably the state-of-the-art learning-based adblocker. In this paper, we develop A4, a tool that intelligently crafts adversarial samples of ads to evade AdGraph. Unlike the popular research on adversarial samples against images or videos that are considered less- to un-restricted, the samples that A4 generates preserve application semantics of the web page, or are actionable. Through several experiments we show that A4 can bypass AdGraph about 60% of the time, which surpasses the state-of-the-art attack by a significant margin of 84.3%; in addition, changes to the visual layout of the web page due to these perturbations are imperceptible. We envision the algorithmic framework proposed in A4 is also promising in improving adversarial attacks against other learning-based web applications with similar requirements.
△ Less
Submitted 29 January, 2020;
originally announced January 2020.
-
A Study on Wrist Identification for Forensic Investigation
Authors:
Wojciech Michal Matkowski,
Frodo Kin Sun Chan,
Adams Wai Kin Kong
Abstract:
Criminal and victim identification based on crime scene images is an important part of forensic investigation. Criminals usually avoid identification by covering their faces and tattoos in the evidence images, which are taken in uncontrolled environments. Existing identification methods, which make use of biometric traits, such as vein, skin mark, height, skin color, weight, race, etc., are consid…
▽ More
Criminal and victim identification based on crime scene images is an important part of forensic investigation. Criminals usually avoid identification by covering their faces and tattoos in the evidence images, which are taken in uncontrolled environments. Existing identification methods, which make use of biometric traits, such as vein, skin mark, height, skin color, weight, race, etc., are considered for solving this problem. The soft biometric traits, including skin color, gender, height, weight and race, provide useful information but not distinctive enough. Veins and skin marks are limited to high resolution images and some body sites may neither have enough skin marks nor clear veins. Terrorists and rioters tend to expose their wrists in a gesture of triumph, greeting or salute, while paedophiles usually show them when touching victims. However, wrists were neglected by the biometric community for forensic applications. In this paper, a wrist identification algorithm, which includes skin segmentation, key point localization, image to template alignment, large feature set extraction, and classification, is proposed. The proposed algorithm is evaluated on NTU-Wrist-Image-Database-v1, which consists of 3945 images from 731 different wrists, including 205 pairs of wrist images collected from the Internet, taken under uneven illuminations with different poses and resolutions. The experimental results show that wrist is a useful clue for criminal and victim identification. Keywords: biometrics, criminal and victim identification, forensics, wrist.
△ Less
Submitted 8 October, 2019;
originally announced October 2019.
-
GLEE: Geometric Laplacian Eigenmap Embedding
Authors:
Leo Torres,
Kevin S Chan,
Tina Eliassi-Rad
Abstract:
Graph embedding seeks to build a low-dimensional representation of a graph G. This low-dimensional representation is then used for various downstream tasks. One popular approach is Laplacian Eigenmaps, which constructs a graph embedding based on the spectral properties of the Laplacian matrix of G. The intuition behind it, and many other embedding techniques, is that the embedding of a graph must…
▽ More
Graph embedding seeks to build a low-dimensional representation of a graph G. This low-dimensional representation is then used for various downstream tasks. One popular approach is Laplacian Eigenmaps, which constructs a graph embedding based on the spectral properties of the Laplacian matrix of G. The intuition behind it, and many other embedding techniques, is that the embedding of a graph must respect node similarity: similar nodes must have embeddings that are close to one another. Here, we dispose of this distance-minimization assumption. Instead, we use the Laplacian matrix to find an embedding with geometric properties instead of spectral ones, by leveraging the so-called simplex geometry of G. We introduce a new approach, Geometric Laplacian Eigenmap Embedding (or GLEE for short), and demonstrate that it outperforms various other techniques (including Laplacian Eigenmaps) in the tasks of graph reconstruction and link prediction.
△ Less
Submitted 20 January, 2020; v1 submitted 23 May, 2019;
originally announced May 2019.
-
Learning and Planning in the Feature Deception Problem
Authors:
Zheyuan Ryan Shi,
Ariel D. Procaccia,
Kevin S. Chan,
Sridhar Venkatesan,
Noam Ben-Asher,
Nandi O. Leslie,
Charles Kamhoua,
Fei Fang
Abstract:
Today's high-stakes adversarial interactions feature attackers who constantly breach the ever-improving security measures. Deception mitigates the defender's loss by misleading the attacker to make suboptimal decisions. In order to formally reason about deception, we introduce the feature deception problem (FDP), a domain-independent model and present a learning and planning framework for finding…
▽ More
Today's high-stakes adversarial interactions feature attackers who constantly breach the ever-improving security measures. Deception mitigates the defender's loss by misleading the attacker to make suboptimal decisions. In order to formally reason about deception, we introduce the feature deception problem (FDP), a domain-independent model and present a learning and planning framework for finding the optimal deception strategy, taking into account the adversary's preferences which are initially unknown to the defender. We make the following contributions. (1) We show that we can uniformly learn the adversary's preferences using data from a modest number of deception strategies. (2) We propose an approximation algorithm for finding the optimal deception strategy given the learned preferences and show that the problem is NP-hard. (3) We perform extensive experiments to validate our methods and results. In addition, we provide a case study of the credit bureau network to illustrate how FDP implements deception on a real-world problem.
△ Less
Submitted 8 June, 2020; v1 submitted 12 May, 2019;
originally announced May 2019.
-
TDMR Detection System with Local Area Influence Probabilistic a Priori Detector
Authors:
**lu Shen,
Xueliang Sun,
Krishnamoorthy Sivakumar,
Benjamin J. Belzer,
Kheong Sann Chan,
Ashish James
Abstract:
We propose a three-track detection system for two dimensional magnetic recording (TDMR) in which a local area influence probabilistic (LAIP) detector works with a trellis-based Bahl-Cocke-Jelinek-Raviv (BCJR) detector to remove intersymbol interference (ISI) and intertrack interference (ITI) among coded data bits as well as media noise due to magnetic grain-bit interactions. Two minimum mean-squar…
▽ More
We propose a three-track detection system for two dimensional magnetic recording (TDMR) in which a local area influence probabilistic (LAIP) detector works with a trellis-based Bahl-Cocke-Jelinek-Raviv (BCJR) detector to remove intersymbol interference (ISI) and intertrack interference (ITI) among coded data bits as well as media noise due to magnetic grain-bit interactions. Two minimum mean-squared error (MMSE) linear equalizers with different response targets are employed before the LAIP and BCJR detectors. The LAIP detector considers local grain-bit interactions and passes coded bit log-likelihood ratios (LLRs) to the channel decoder, whose output LLRs serve as a priori information to the BCJR detector, which is followed by a second channel decoding pass. Simulation results under 1-shot decoding on a grain-flip**-probability (GFP) media model show that the proposed LAIP/BCJR detection system achieves density gains of 6.8% for center-track detection and 1.2% for three-track detection compared to a standard BCJR/1D-PDNP. The proposed system's BCJR detector bit error rates (BERs) are lower than those of a recently proposed two-track BCJR/2D-PDNP system by factors of (0.55, 0.08) for tracks 1 and 2 respectively.
△ Less
Submitted 13 April, 2019;
originally announced April 2019.
-
Robust Coreset Construction for Distributed Machine Learning
Authors:
Hanlin Lu,
Ming-Ju Li,
Ting He,
Shiqiang Wang,
Vijaykrishnan Narayanan,
Kevin S Chan
Abstract:
Coreset, which is a summary of the original dataset in the form of a small weighted set in the same sample space, provides a promising approach to enable machine learning over distributed data. Although viewed as a proxy of the original dataset, each coreset is only designed to approximate the cost function of a specific machine learning problem, and thus different coresets are often required to s…
▽ More
Coreset, which is a summary of the original dataset in the form of a small weighted set in the same sample space, provides a promising approach to enable machine learning over distributed data. Although viewed as a proxy of the original dataset, each coreset is only designed to approximate the cost function of a specific machine learning problem, and thus different coresets are often required to solve different machine learning problems, increasing the communication overhead. We resolve this dilemma by develo** robust coreset construction algorithms that can support a variety of machine learning problems. Motivated by empirical evidence that suitably-weighted k-clustering centers provide a robust coreset, we harden the observation by establishing theoretical conditions under which the coreset provides a guaranteed approximation for a broad range of machine learning problems, and develo** both centralized and distributed algorithms to generate coresets satisfying the conditions. The robustness of the proposed algorithms is verified through extensive experiments on diverse datasets with respect to both supervised and unsupervised learning problems.
△ Less
Submitted 22 June, 2020; v1 submitted 11 April, 2019;
originally announced April 2019.
-
Polarization and Fluctuations in Signed Social Networks
Authors:
Pedro Cisneros-Velarde,
Kevin S. Chan,
Francesco Bullo
Abstract:
Much recent research on social networks has focused on the modeling and analysis of how opinions evolve as a function of interpersonal relationships. It is also of great interest to model and understand the implications of friendly and antagonistic relationships. In this paper, we propose a new, simple and intuitive model that incorporates the socio-psychological phenomenon of the boomerang effect…
▽ More
Much recent research on social networks has focused on the modeling and analysis of how opinions evolve as a function of interpersonal relationships. It is also of great interest to model and understand the implications of friendly and antagonistic relationships. In this paper, we propose a new, simple and intuitive model that incorporates the socio-psychological phenomenon of the boomerang effect in opinion dynamics. We establish that, under certain conditions on the structure of the signed network that corresponds to the so-called structural balance property, the opinions in the network polarize. Compared to other models in the literature, our model displays a richer and perhaps more intuitive behavior of the opinions when the social network does not satisfy structural balance. In particular, we analyze signed networks in which the opinions show persistent fluctuations (including the case of the so-called clustering balance).
△ Less
Submitted 3 October, 2019; v1 submitted 2 February, 2019;
originally announced February 2019.
-
Resource Allocation in One-dimensional Distributed Service Networks
Authors:
Nitish K. Panigrahy,
Prithwish Basu,
Philippe Nain,
Don Towsley,
Ananthram Swami,
Kevin S. Chan,
Kin K. Leung
Abstract:
We consider assignment policies that allocate resources to users, where both resources and users are located on a one-dimensional line. First, we consider unidirectional assignment policies that allocate resources only to users located to their left. We propose the Move to Right (MTR) policy, which scans from left to right assigning nearest rightmost available resource to a user, and contrast it t…
▽ More
We consider assignment policies that allocate resources to users, where both resources and users are located on a one-dimensional line. First, we consider unidirectional assignment policies that allocate resources only to users located to their left. We propose the Move to Right (MTR) policy, which scans from left to right assigning nearest rightmost available resource to a user, and contrast it to the Unidirectional Gale-Shapley (UGS) matching policy. While both these policies are optimal among all unidirectional policies, we show that they are equivalent with respect to the expected distance traveled by a request (request distance), although MTR is fairer. Moreover, we show that when user and resource locations are modeled by statistical point processes, and resources are allowed to satisfy more than one user, the spatial system under unidirectional policies can be mapped into bulk service queuing systems, thus allowing the application of a plethora of queuing theory results that yield closed form expressions. As we consider a case where different resources can satisfy different numbers of users, we also generate new results for bulk service queues. We also consider bidirectional policies where there are no directional restrictions on resource allocation and develop an algorithm for computing the optimal assignment which is more efficient than known algorithms in the literature when there are more resources than users. Finally, numerical evaluation of performance of unidirectional and bidirectional allocation schemes yields design guidelines beneficial for resource placement.
△ Less
Submitted 11 February, 2020; v1 submitted 8 January, 2019;
originally announced January 2019.
-
Location Privacy in Mobile Edge Clouds: A Chaff-based Approach
Authors:
Ting He,
Ertugrul N. Ciftcioglu,
Shiqiang Wang,
Kevin S. Chan
Abstract:
In this paper, we consider user location privacy in mobile edge clouds (MECs). MECs are small clouds deployed at the network edge to offer cloud services close to mobile users, and many solutions have been proposed to maximize service locality by migrating services to follow their users. Co-location of a user and his service, however, implies that a cyber eavesdropper observing service migrations…
▽ More
In this paper, we consider user location privacy in mobile edge clouds (MECs). MECs are small clouds deployed at the network edge to offer cloud services close to mobile users, and many solutions have been proposed to maximize service locality by migrating services to follow their users. Co-location of a user and his service, however, implies that a cyber eavesdropper observing service migrations between MECs can localize the user up to one MEC coverage area, which can be fairly small (e.g., a femtocell). We consider using chaff services to defend against such an eavesdropper, with focus on strategies to control the chaffs. Assuming the eavesdropper performs maximum likelihood (ML) detection, we consider both heuristic strategies that mimic the user's mobility and optimized strategies designed to minimize the detection or tracking accuracy. We show that a single chaff controlled by the optimal strategy or its online variation can drive the eavesdropper's tracking accuracy to zero when the user's mobility is sufficiently random. We further propose extended strategies that utilize randomization to defend against an advanced eavesdropper aware of the strategy. The efficacy of our solutions is verified through both synthetic and trace-driven simulations.
△ Less
Submitted 10 September, 2017;
originally announced September 2017.
-
Temporal Matrix Completion with Locally Linear Latent Factors for Medical Applications
Authors:
Frodo Kin Sun Chan,
Andy J Ma,
Pong C Yuen,
Terry Cheuk-Fung Yip,
Yee-Kit Tse,
Vincent Wai-Sun Wong,
Grace Lai-Hung Wong
Abstract:
Regular medical records are useful for medical practitioners to analyze and monitor patient health status especially for those with chronic disease, but such records are usually incomplete due to unpunctuality and absence of patients. In order to resolve the missing data problem over time, tensor-based model is suggested for missing data imputation in recent papers because this approach makes use…
▽ More
Regular medical records are useful for medical practitioners to analyze and monitor patient health status especially for those with chronic disease, but such records are usually incomplete due to unpunctuality and absence of patients. In order to resolve the missing data problem over time, tensor-based model is suggested for missing data imputation in recent papers because this approach makes use of low rank tensor assumption for highly correlated data. However, when the time intervals between records are long, the data correlation is not high along temporal direction and such assumption is not valid. To address this problem, we propose to decompose a matrix with missing data into its latent factors. Then, the locally linear constraint is imposed on these factors for matrix completion in this paper. By using a publicly available dataset and two medical datasets collected from hospital, experimental results show that the proposed algorithm achieves the best performance by comparing with the existing methods.
△ Less
Submitted 31 October, 2016;
originally announced November 2016.
-
Information Cascades in Feed-based Networks of Users with Limited Attention
Authors:
Sameet Sreenivasan,
Kevin S. Chan,
Ananthram Swami,
Gyorgy Korniss,
Boleslaw Szymanski
Abstract:
We build a model of information cascades on feed-based networks, taking into account the finite attention span of users, message generation rates and message forwarding rates. Using this model, we study through simulations, the effect of the extent of user attention on the probability that the cascade becomes viral. In analogy with a branching process, we estimate the branching factor associated w…
▽ More
We build a model of information cascades on feed-based networks, taking into account the finite attention span of users, message generation rates and message forwarding rates. Using this model, we study through simulations, the effect of the extent of user attention on the probability that the cascade becomes viral. In analogy with a branching process, we estimate the branching factor associated with the cascade process for different attention spans and different forwarding probabilities, and demonstrate that beyond a certain attention span, critical forwarding probabilities exist that constitute a threshold after which cascades can become viral. The critical forwarding probabilities have an inverse relationship with the attention span. Next, we develop a semi-analytical approach for our model, that allows us determine the branching factor for given values of message generation rates, message forwarding rates and attention spans. The branching factors obtained using this analytical approach show good agreement with those obtained through simulations. Finally, we analyze an event specific dataset obtained from Twitter, and show that estimated branching factors correlate well with the cascade size distributions associated with distinct hashtags.
△ Less
Submitted 27 August, 2015;
originally announced August 2015.
-
A theory of static friction between homogeneous surfaces based on compressible elastic smooth microscopic inclines
Authors:
Freeman Chee Siong Thun,
Vee-Liem Saw,
Kin Sung Chan
Abstract:
We develop a theory of static friction by modeling the homogeneous surfaces of contact as being composed of a regular array of compressible elastic smooth microscopic inclines. Static friction is thought of as the resistance due to having to push the load over these smooth microscopic inclines that share a common inclination angle. As the normal force between the surfaces increases, the microscopi…
▽ More
We develop a theory of static friction by modeling the homogeneous surfaces of contact as being composed of a regular array of compressible elastic smooth microscopic inclines. Static friction is thought of as the resistance due to having to push the load over these smooth microscopic inclines that share a common inclination angle. As the normal force between the surfaces increases, the microscopic inclines would be compressed elastically. Consequently, the coefficient of static friction does not remain constant but becomes smaller for a larger normal force, since the load would then only need to be pushed over smaller angles. However, a larger normal force would also increase the effective compressed area between the surfaces, as such the pressure is distributed over this larger effective compressed area. The relationship between the normal force and the common angle is therefore non-linear. Overall, static friction is shown to depend on the normal force, apparent contact area, Young's modulus, and the compressed efficiency ratio (effective compressed area per apparent contact area). Experimental measurements using teflon were carried out, and the results confirm predictions of this theory.
△ Less
Submitted 11 July, 2014;
originally announced July 2014.
-
Adsorbate Electric Fields on a Cryogenic Atom Chip
Authors:
K. S. Chan,
M. Siercke,
C. Hufnagel,
R. Dumke
Abstract:
We investigate the behaviour of electric fields originating from adsorbates deposited on a cryogenic atom chip as it is cooled from room temperature to cryogenic temperature. Using Rydberg electromagnetically induced transparency we measure the field strength versus distance from a 1 mm square of YBCO patterned onto a YSZ chip substrate. We find a localized and stable dipole field at room temperat…
▽ More
We investigate the behaviour of electric fields originating from adsorbates deposited on a cryogenic atom chip as it is cooled from room temperature to cryogenic temperature. Using Rydberg electromagnetically induced transparency we measure the field strength versus distance from a 1 mm square of YBCO patterned onto a YSZ chip substrate. We find a localized and stable dipole field at room temperature and attribute it to a saturated layer of chemically adsorbed rubidium atoms on the YBCO. As the chip is cooled towards 83 K we observe a change in sign of the electric field as well as a transition from a localized to a delocalized dipole density. We relate these changes to the onset of physisorption on the chip surface when the van der Waals attraction overcomes the thermal desorption mechanisms. Our findings suggest that, through careful selection of substrate materials, it may be possible to reduce the electric fields caused by atomic adsorption on chips, opening up experiments to controlled Rydberg-surface coupling schemes.
△ Less
Submitted 3 January, 2014; v1 submitted 20 December, 2013;
originally announced December 2013.
-
Parity Declustering for Fault-Tolerant Storage Systems via $t$-designs
Authors:
Son Hoang Dau,
Yan Jia,
Chao **,
Weiya Xi,
Kheong Sann Chan
Abstract:
Parity declustering allows faster reconstruction of a disk array when some disk fails. Moreover, it guarantees uniform reconstruction workload on all surviving disks. It has been shown that parity declustering for one-failure tolerant array codes can be obtained via Balanced Incomplete Block Designs. We extend this technique for array codes that can tolerate an arbitrary number of disk failures vi…
▽ More
Parity declustering allows faster reconstruction of a disk array when some disk fails. Moreover, it guarantees uniform reconstruction workload on all surviving disks. It has been shown that parity declustering for one-failure tolerant array codes can be obtained via Balanced Incomplete Block Designs. We extend this technique for array codes that can tolerate an arbitrary number of disk failures via $t$-designs.
△ Less
Submitted 15 March, 2013; v1 submitted 27 September, 2012;
originally announced September 2012.
-
Reconfigurable self-sufficient traps for ultracold atoms based on a superconducting square
Authors:
M. Siercke,
K. S. Chan,
B. Zhang,
M. Beian,
M. J. Lim,
R. Dumke
Abstract:
We report on the trap** of ultracold atoms in the magnetic field formed entirely by persistent supercurrents induced in a thin film type-II superconducting square. The supercurrents are carried by vortices induced in the 2D structure by applying two magnetic field pulses of varying amplitude perpendicular to its surface. This results in a self-sufficient quadrupole trap that does not require any…
▽ More
We report on the trap** of ultracold atoms in the magnetic field formed entirely by persistent supercurrents induced in a thin film type-II superconducting square. The supercurrents are carried by vortices induced in the 2D structure by applying two magnetic field pulses of varying amplitude perpendicular to its surface. This results in a self-sufficient quadrupole trap that does not require any externally applied fields. We investigate the trap** parameters for different supercurrent distributions. Furthermore, to demonstrate possible applications of these types of supercurrent traps we show how a central quadrupole trap can be split into four traps by the use of a bias field.
△ Less
Submitted 13 April, 2012;
originally announced April 2012.
-
Magnetic confinement of neutral atoms based on patterned vortex distributions in superconducting disks and rings
Authors:
B. Zhang,
M. Siercke,
K. S. Chan,
M. Beian,
M. J. Lim,
R. Dumke
Abstract:
We propose and analyze neutral atom traps generated by vortices imprinted by magnetic field pulse sequences in type-II superconducting disks and rings. We compute the supercurrent distribution and magnetic field resulting from the vortices in the superconductor. Different patterns of vortices can be written by versatile loading field sequences. We discuss in detail procedures to generate quadrupol…
▽ More
We propose and analyze neutral atom traps generated by vortices imprinted by magnetic field pulse sequences in type-II superconducting disks and rings. We compute the supercurrent distribution and magnetic field resulting from the vortices in the superconductor. Different patterns of vortices can be written by versatile loading field sequences. We discuss in detail procedures to generate quadrupole traps, self-sufficient traps and ring traps based on superconducting disks and rings. The ease of creating these traps and the low current noise in supercurrent carrying structures makes our approach attractive for designing atom chip interferometers and probes.
△ Less
Submitted 14 January, 2012;
originally announced January 2012.
-
Anomalous Josephson current through a ferromagnetic trilayer junction
Authors:
Jun-Feng Liu,
K. S. Chan
Abstract:
We studied the anomalous Josephson current appearing at zero phase difference in junctions coupled with a ferromagnetic trilayer which has noncoplanar magnetizations. A $π/2$ junction with an equilibrium phase difference $π/2$ is obtained under suitable conditions. The equilibrium phase difference and the amplitude of the supercurrent are all tunable by the structure parameters. In addition to cal…
▽ More
We studied the anomalous Josephson current appearing at zero phase difference in junctions coupled with a ferromagnetic trilayer which has noncoplanar magnetizations. A $π/2$ junction with an equilibrium phase difference $π/2$ is obtained under suitable conditions. The equilibrium phase difference and the amplitude of the supercurrent are all tunable by the structure parameters. In addition to calculating the anomalous current using the Bogoliubov-de Gennes equation, we also developed a clear physical picture explaining the anomalous Josephson effect in the structure. We show that the triplet proximity correlation and the phase shift in the anomalous current-phase relation all stem from the spin precession in the first and third ferromagnet layers.
△ Less
Submitted 11 November, 2010; v1 submitted 26 October, 2010;
originally announced October 2010.
-
Programmable trap geometries with superconducting atom chips
Authors:
T. Mueller,
B. Zhang,
R. Fermani,
K. S. Chan,
M. J. Lim,
R. Dumke
Abstract:
We employ the hysteretic behavior of a superconducting thin film in the remanent state to generate different traps and flexible magnetic potentials for ultra-cold atoms. The trap geometry can be programmed by externally applied fields. This new approach for atom-optics is demonstrated by three different trap types realized on a single micro-structure: a Z-type trap, a double trap and a bias field…
▽ More
We employ the hysteretic behavior of a superconducting thin film in the remanent state to generate different traps and flexible magnetic potentials for ultra-cold atoms. The trap geometry can be programmed by externally applied fields. This new approach for atom-optics is demonstrated by three different trap types realized on a single micro-structure: a Z-type trap, a double trap and a bias field free trap. Our studies show that superconductors in the remanent state provide a new versatile platform for atom-optics and applications in ultra-cold quantum gases.
△ Less
Submitted 28 March, 2010;
originally announced March 2010.
-
Trap** of ultra-cold atoms with the magnetic field of vortices in a thin film superconducting micro-structure
Authors:
T. Müller,
B. Zhang,
R. Fermani,
K. S. Chan,
Z. W. Wang,
C. B. Zhang,
M. J. Lim,
R. Dumke
Abstract:
We store and control ultra-cold atoms in a new type of trap using magnetic fields of vortices in a high temperature superconducting micro-structure. This is the first time ultra-cold atoms have been trapped in the field of magnetic flux quanta. We generate the attractive trap** potential for the atoms by combining the magnetic field of a superconductor in the remanent state with external homog…
▽ More
We store and control ultra-cold atoms in a new type of trap using magnetic fields of vortices in a high temperature superconducting micro-structure. This is the first time ultra-cold atoms have been trapped in the field of magnetic flux quanta. We generate the attractive trap** potential for the atoms by combining the magnetic field of a superconductor in the remanent state with external homogeneous magnetic fields. We show the control of crucial atom trap characteristics such as an efficient intrinsic loading mechanism, spatial positioning of the trapped atoms and the vortex density in the superconductor. The measured trap characteristics are in good agreement with our numerical simulations.
△ Less
Submitted 13 October, 2009;
originally announced October 2009.
-
Resonant Tunneling through double-bended Graphene Nanoribbons
Authors:
Z. Z. Zhang,
Kai Chang,
K. S. Chan
Abstract:
We investigate theoretically resonant tunneling through double-bended graphene nanoribbon structures, i.e., armchair-edged graphene nanoribbons (AGNRs) in between two semi-infinite zigzag graphene nanoribbon (ZGNR) leads. Our numerical results demonstrate that the resonant tunneling can be tuned dramatically by the Fermi energy and the length and/or widths of the AGNR for both the metallic and s…
▽ More
We investigate theoretically resonant tunneling through double-bended graphene nanoribbon structures, i.e., armchair-edged graphene nanoribbons (AGNRs) in between two semi-infinite zigzag graphene nanoribbon (ZGNR) leads. Our numerical results demonstrate that the resonant tunneling can be tuned dramatically by the Fermi energy and the length and/or widths of the AGNR for both the metallic and semiconductor-like AGNRs. The structure can also be use to control the valley polarization of the tunneling currents and could be useful for potential application in valleytronics devices.
△ Less
Submitted 9 May, 2008;
originally announced May 2008.
-
Anomalous Rashba spin-orbit interaction in InAs/GaSb quantum wells
Authors:
J. Li,
Kai Chang,
G. Q. Hai,
K. S. Chan
Abstract:
We investigate theoretically the Rashba spin-orbit interaction in InAs/GaSb quantum wells(QWs). We find that the Rashba spin-splitting (RSS) depends sensitively on the thickness of the InAs layer. The RSS exhibits nonlinear behavior for narrow InAs/GaSb QWs and the oscillating feature for wide InAs/GaSb QWs. The nonlinear and oscillating behaviors arise from the weakened and enhanced interband c…
▽ More
We investigate theoretically the Rashba spin-orbit interaction in InAs/GaSb quantum wells(QWs). We find that the Rashba spin-splitting (RSS) depends sensitively on the thickness of the InAs layer. The RSS exhibits nonlinear behavior for narrow InAs/GaSb QWs and the oscillating feature for wide InAs/GaSb QWs. The nonlinear and oscillating behaviors arise from the weakened and enhanced interband coupling. The RSS also show asymmetric features respect to the direction of the external electric field.
△ Less
Submitted 30 March, 2008;
originally announced March 2008.
-
Spin-orbital coupling effect on Josephson current through a superconductor heterojunction
Authors:
Z. H. Yang,
Y. H. Yang,
J. Wang,
K. S. Chan
Abstract:
We study spin-orbital coupling effect on the Josephson current through a superconductor (SC) heterojunction, consisting of two s-wave superconductors and a two-dimensional electron gas (2DEG) layer between them. The Rashba-type (RSOC) and/or Dresselhaus-type (DSOC) of spin-orbital coupling are considered in the 2DEG region. By using the lattice Bogoliubov-de Gennes equation and the Keldysh forma…
▽ More
We study spin-orbital coupling effect on the Josephson current through a superconductor (SC) heterojunction, consisting of two s-wave superconductors and a two-dimensional electron gas (2DEG) layer between them. The Rashba-type (RSOC) and/or Dresselhaus-type (DSOC) of spin-orbital coupling are considered in the 2DEG region. By using the lattice Bogoliubov-de Gennes equation and the Keldysh formalism, we calculate the DC supercurrent flowing through the junction and find that the critical current $I_c$ exhibits a damped oscillation with both the strength of SOC and the layer length of 2DEG; especially, the strength ratio between RSOC and DSOC can also induce switching between the $0$ state and the $π$ state of the SC/2DEG/SC junction as well. This $0$-$π$ transition results from the fact that SOC in a two-dimension system can lead to a pseudo-magnetic effect on the flowing electrons like the effect of a ferromagnet, since the time reversal symmetry of the system has already been broken by two SC leads with different macroscopic phases.
△ Less
Submitted 7 January, 2008;
originally announced January 2008.
-
A Scattering method to the equilibrium spin current in a ferromagnet junction
Authors:
J. Wang,
K. S. Chan
Abstract:
We extended McMillan's Green's function method to study the equilibrium spin current (ESC) in a ferromagnet/ferromagnet (FM/FM) tunnelling junction, in which the magnetic moments in both FM electrodes are not collinear. The single-electron Green's function of the junction system is directly constructed from the elements of the scattering matrix which can be obtained by matching wavefunctions at…
▽ More
We extended McMillan's Green's function method to study the equilibrium spin current (ESC) in a ferromagnet/ferromagnet (FM/FM) tunnelling junction, in which the magnetic moments in both FM electrodes are not collinear. The single-electron Green's function of the junction system is directly constructed from the elements of the scattering matrix which can be obtained by matching wavefunctions at boundaries. The ESC is found to be determined only by the Andreev-type reflection amplitudes as in the Josephson effect. The obtained expression of ESC is an exact result and at the strong barrier limit gives the same explanation for the origin of ESC as the linear response theory, that is, ESC comes from the exchange coupling between the magnetic moments of the two FM electrodes, ${\mathbf{J}}\sim{\mathbf{h}}_{l}\times{\mathbf{h}}_{r}$. In the weak barrier region, ESC cannot form spontaneously in a noncollinear FM/FM junction when there is no tunneling barrier between the two FM electrodes.
△ Less
Submitted 17 September, 2006;
originally announced September 2006.
-
Equilibrium spin current through the tunnelling junctions
Authors:
J. Wang,
K. S. Chan
Abstract:
We study equilibrium pure spin current through tunnelling junctions at zero bias. The two leads of the junctions connected via a thin insulator barrier, can be either a ferromagnetic metal (FM) or a nonmagnetic high-mobility two-dimensional electron gas (2DEG) with Rashba spin orbital interaction (RSOI) or Dresselhaus spin orbital interaction (DSOI). As a lead of a tunnelling junction, the isotr…
▽ More
We study equilibrium pure spin current through tunnelling junctions at zero bias. The two leads of the junctions connected via a thin insulator barrier, can be either a ferromagnetic metal (FM) or a nonmagnetic high-mobility two-dimensional electron gas (2DEG) with Rashba spin orbital interaction (RSOI) or Dresselhaus spin orbital interaction (DSOI). As a lead of a tunnelling junction, the isotropic RSOI or DSOI in 2DEG can give rise to an average effective planar magnetic field orthogonal or parallel to the current direction. It is found by the linear response theory that equilibrium spin current $\vec{J}$ can flow in the following three junctions, 2DEG/2DEG, 2DEG/FM, and FM/FM junctions, as a result of the exchange coupling between the magnetic moments, $\vec{h}_{l}$ and $\vec{h}_{r}$, in the two electrodes of the junction, i.e., $\vec{J}\sim\vec{h}_{l}\times\vec{h}_{r}$. An important distinction between the FM and 2DEG with RSOI (DSOI) lead is that in a strict one-dimensional case RSOI (DSOI) cannot lead to equilibrium spin current in the junction since the two spin bands are not spin-polarized as in a FM lead where Zeeman spin splitting occurs.
△ Less
Submitted 18 December, 2005;
originally announced December 2005.
-
Trap** and hop** of bipolarons in DNA: Su-Schrieffer-Heeger model calculations
Authors:
J. H. Wei,
L. X. Wang,
K. S. Chan,
Yi**g Yan
Abstract:
With the Su-Schrieffer-Heeger model involving the effects of solvent polarization and external electric field, we show that bipolaron maybe more stable than two polarons when a dication induced into a DNA stack. Under the high electric field, the dication can move quite a long distance through the DNA by a series of hop** process, partially losing its configuration instantaneously due to the n…
▽ More
With the Su-Schrieffer-Heeger model involving the effects of solvent polarization and external electric field, we show that bipolaron maybe more stable than two polarons when a dication induced into a DNA stack. Under the high electric field, the dication can move quite a long distance through the DNA by a series of hop** process, partially losing its configuration instantaneously due to the nonadiabatic effects.
△ Less
Submitted 28 June, 2005;
originally announced June 2005.
-
Charge Transport in DNA
Authors:
J H Wei,
K S Chan
Abstract:
A model is proposed to interpret the experimental I-V curves Polyguanine-Polycytosine DNA molecules.
A model is proposed to interpret the experimental I-V curves Polyguanine-Polycytosine DNA molecules.
△ Less
Submitted 27 May, 2005; v1 submitted 21 March, 2005;
originally announced March 2005.