-
Gradient ascend method for fully nonlinear parabolic differential equations with convex nonlinearity
Authors:
Hung Duong,
Arash Fahim
Abstract:
We introduce a generic numerical schemes for fully nonlinear parabolic PDEs on the full domain, where the nonlinearity is convex on the Hessian of the solution. The main idea behind this paper is reduction: we reduce the fully nonlinear problem to a series of simpler semilinear ones parameterized by the diffusion term and take the maximum over the solution of those problems through a novel gradien…
▽ More
We introduce a generic numerical schemes for fully nonlinear parabolic PDEs on the full domain, where the nonlinearity is convex on the Hessian of the solution. The main idea behind this paper is reduction: we reduce the fully nonlinear problem to a series of simpler semilinear ones parameterized by the diffusion term and take the maximum over the solution of those problems through a novel gradient ascend method on the diffusion coefficient that we introduced for such semilinear PDEs. The promise of this study is a step toward the proof-of-concept that for any arbitrary numerical scheme for semilinear parabolic PDEs, one can build an iterative methods based on gradient ascent to converge to the solution of a fully nonlinear problem. Therefore, investment in our effort to create more efficient semilinear PDEs leads to efficiency for fully nonlinear PDEs. We leverage the theoretical results of Soner et al. [2012] to obtain numerical schemes for fully nonlinear PDEs and to justify the convergence in our methodology. The method is tested in a numerical experiment on the fully problem of portfolio optimization under stochastic volatility model.
△ Less
Submitted 10 June, 2024;
originally announced June 2024.
-
A hybrid approach to model reduction of Generalized Langevin Dynamics
Authors:
Matteo Colangeli,
Manh Hong Duong,
Adrian Muntean
Abstract:
We consider a classical model of non-equilibrium statistical mechanics accounting for non-Markovian effects, which is referred to as the Generalized Langevin Equation in the literature. We derive reduced Markovian descriptions obtained through the neglection of inertial terms and/or heat bath variables. The adopted reduction scheme relies on the framework of the Invariant Manifold method, which al…
▽ More
We consider a classical model of non-equilibrium statistical mechanics accounting for non-Markovian effects, which is referred to as the Generalized Langevin Equation in the literature. We derive reduced Markovian descriptions obtained through the neglection of inertial terms and/or heat bath variables. The adopted reduction scheme relies on the framework of the Invariant Manifold method, which allows to retain the slow degrees of freedom from a multiscale dynamical system. Our approach is also rooted on the Fluctuation-Dissipation Theorem, which helps preserve the proper dissipative structure of the reduced dynamics. We highlight the appropriate time scalings introduced within our procedure, and also prove the commutativity of selected reduction paths.
△ Less
Submitted 25 May, 2024;
originally announced May 2024.
-
Trust AI Regulation? Discerning users are vital to build trust and effective AI regulation
Authors:
Zainab Alalawi,
Paolo Bova,
Theodor Cimpeanu,
Alessandro Di Stefano,
Manh Hong Duong,
Elias Fernandez Domingos,
The Anh Han,
Marcus Krellner,
Bianca Ogbo,
Simon T. Powers,
Filippo Zimmaro
Abstract:
There is general agreement that some form of regulation is necessary both for AI creators to be incentivised to develop trustworthy systems, and for users to actually trust those systems. But there is much debate about what form these regulations should take and how they should be implemented. Most work in this area has been qualitative, and has not been able to make formal predictions. Here, we p…
▽ More
There is general agreement that some form of regulation is necessary both for AI creators to be incentivised to develop trustworthy systems, and for users to actually trust those systems. But there is much debate about what form these regulations should take and how they should be implemented. Most work in this area has been qualitative, and has not been able to make formal predictions. Here, we propose that evolutionary game theory can be used to quantitatively model the dilemmas faced by users, AI creators, and regulators, and provide insights into the possible effects of different regulatory regimes. We show that creating trustworthy AI and user trust requires regulators to be incentivised to regulate effectively. We demonstrate the effectiveness of two mechanisms that can achieve this. The first is where governments can recognise and reward regulators that do a good job. In that case, if the AI system is not too risky for users then some level of trustworthy development and user trust evolves. We then consider an alternative solution, where users can condition their trust decision on the effectiveness of the regulators. This leads to effective regulation, and consequently the development of trustworthy AI and user trust, provided that the cost of implementing regulations is not too high. Our findings highlight the importance of considering the effect of different regulatory regimes from an evolutionary game theoretic perspective.
△ Less
Submitted 14 March, 2024;
originally announced March 2024.
-
Overlap** community detection algorithms using Modularity and the cosine
Authors:
Do Duy Hieu,
Phan Thi Ha Duong
Abstract:
The issue of network community detection has been extensively studied across many fields. Most community detection methods assume that nodes belong to only one community. However, in many cases, nodes can belong to multiple communities simultaneously.This paper presents two overlap** network community detection algorithms that build on the two-step approach, using the extended modularity and cos…
▽ More
The issue of network community detection has been extensively studied across many fields. Most community detection methods assume that nodes belong to only one community. However, in many cases, nodes can belong to multiple communities simultaneously.This paper presents two overlap** network community detection algorithms that build on the two-step approach, using the extended modularity and cosine function. The applicability of our algorithms extends to both undirected and directed graph structures. To demonstrate the feasibility and effectiveness of these algorithms, we conducted experiments using real data.
△ Less
Submitted 12 March, 2024;
originally announced March 2024.
-
Competitive Facility Location under Random Utilities and Routing Constraints
Authors:
Hoang Giang Pham,
Tien Thanh Dam,
Ngan Ha Duong,
Tien Mai,
Minh Hoang Ha
Abstract:
In this paper, we study a facility location problem within a competitive market context, where customer demand is predicted by a random utility choice model. Unlike prior research, which primarily focuses on simple constraints such as a cardinality constraint on the number of selected locations, we introduce routing constraints that necessitate the selection of locations in a manner that guarantee…
▽ More
In this paper, we study a facility location problem within a competitive market context, where customer demand is predicted by a random utility choice model. Unlike prior research, which primarily focuses on simple constraints such as a cardinality constraint on the number of selected locations, we introduce routing constraints that necessitate the selection of locations in a manner that guarantees the existence of a tour visiting all chosen locations while adhering to a specified tour length upper bound. Such routing constraints find crucial applications in various real-world scenarios. The problem at hand features a non-linear objective function, resulting from the utilization of random utilities, together with complex routing constraints, making it computationally challenging. To tackle this problem, we explore three types of valid cuts, namely, outer-approximation and submodular cuts to handle the nonlinear objective function, as well as sub-tour elimination cuts to address the complex routing constraints. These lead to the development of two exact solution methods: a nested cutting plane and nested branch-and-cut algorithms, where these valid cuts are iteratively added to a master problem through two nested loops. We also prove that our nested cutting plane method always converges to optimality after a finite number of iterations. Furthermore, we develop a local search-based metaheuristic tailored for solving large-scale instances and show its pros and cons compared to exact methods. Extensive experiments are conducted on problem instances of varying sizes, demonstrating that our approach excels in terms of solution quality and computation time when compared to other baseline approaches.
△ Less
Submitted 9 March, 2024; v1 submitted 7 March, 2024;
originally announced March 2024.
-
Cost optimisation of individual-based institutional reward incentives for promoting cooperation in finite populations
Authors:
M. H. Duong,
C. M. Durbac,
T. A. Han
Abstract:
In this paper, we study the problem of cost optimisation of individual-based institutional incentives (reward, punishment, and hybrid) for guaranteeing a certain minimal level of cooperative behaviour in a well-mixed, finite population. In this scheme, the individuals in the population interact via cooperation dilemmas (Donation Game or Public Goods Game) in which institutional reward is carried o…
▽ More
In this paper, we study the problem of cost optimisation of individual-based institutional incentives (reward, punishment, and hybrid) for guaranteeing a certain minimal level of cooperative behaviour in a well-mixed, finite population. In this scheme, the individuals in the population interact via cooperation dilemmas (Donation Game or Public Goods Game) in which institutional reward is carried out only if cooperation is not abundant enough (i.e., their number is below a threshold $1\leq t\leq N-1$, where $N$ is the population size); and similarly, institutional punishment is carried out only when defection is too abundant. We study analytically the cases $t=1$ for the reward incentive, showing that the cost function is always non-decreasing. We also derive the neutral drift and strong selection limits when the intensity of selection tends to zero and infinity, respectively. We also numerically investigate the problem for other values of $t$.
△ Less
Submitted 12 February, 2024;
originally announced February 2024.
-
Harnessing Neuron Stability to Improve DNN Verification
Authors:
Hai Duong,
Dong Xu,
ThanhVu Nguyen,
Matthew B. Dwyer
Abstract:
Deep Neural Networks (DNN) have emerged as an effective approach to tackling real-world problems. However, like human-written software, DNNs are susceptible to bugs and attacks. This has generated significant interests in develo** effective and scalable DNN verification techniques and tools. In this paper, we present VeriStable, a novel extension of recently proposed DPLL-based constraint DNN ve…
▽ More
Deep Neural Networks (DNN) have emerged as an effective approach to tackling real-world problems. However, like human-written software, DNNs are susceptible to bugs and attacks. This has generated significant interests in develo** effective and scalable DNN verification techniques and tools. In this paper, we present VeriStable, a novel extension of recently proposed DPLL-based constraint DNN verification approach. VeriStable leverages the insight that while neuron behavior may be non-linear across the entire DNN input space, at intermediate states computed during verification many neurons may be constrained to have linear behavior - these neurons are stable. Efficiently detecting stable neurons reduces combinatorial complexity without compromising the precision of abstractions. Moreover, the structure of clauses arising in DNN verification problems shares important characteristics with industrial SAT benchmarks. We adapt and incorporate multi-threading and restart optimizations targeting those characteristics to further optimize DPLL-based DNN verification. We evaluate the effectiveness of VeriStable across a range of challenging benchmarks including fully-connected feedforward networks (FNNs), convolutional neural networks (CNNs) and residual networks (ResNets) applied to the standard MNIST and CIFAR datasets. Preliminary results show that VeriStable is competitive and outperforms state-of-the-art DNN verification tools, including $α$-$β$-CROWN and MN-BaB, the first and second performers of the VNN-COMP, respectively.
△ Less
Submitted 19 January, 2024;
originally announced January 2024.
-
MELEP: A Novel Predictive Measure of Transferability in Multi-Label ECG Diagnosis
Authors:
Cuong V. Nguyen,
Hieu Minh Duong,
Cuong D. Do
Abstract:
In practical electrocardiography (ECG) interpretation, the scarcity of well-annotated data is a common challenge. Transfer learning techniques are valuable in such situations, yet the assessment of transferability has received limited attention. To tackle this issue, we introduce MELEP, which stands for Muti-label Expected Log of Empirical Predictions, a measure designed to estimate the effectiven…
▽ More
In practical electrocardiography (ECG) interpretation, the scarcity of well-annotated data is a common challenge. Transfer learning techniques are valuable in such situations, yet the assessment of transferability has received limited attention. To tackle this issue, we introduce MELEP, which stands for Muti-label Expected Log of Empirical Predictions, a measure designed to estimate the effectiveness of knowledge transfer from a pre-trained model to a downstream multi-label ECG diagnosis task. MELEP is generic, working with new target data with different label sets, and computationally efficient, requiring only a single forward pass through the pre-trained model. To the best of our knowledge, MELEP is the first transferability metric specifically designed for multi-label ECG classification problems. Our experiments show that MELEP can predict the performance of pre-trained convolutional and recurrent deep neural networks, on small and imbalanced ECG data. Specifically, we observed strong correlation coefficients (with absolute values exceeding 0.6 in most cases) between MELEP and the actual average F1 scores of the fine-tuned models. Our work highlights the potential of MELEP to expedite the selection of suitable pre-trained models for ECG diagnosis tasks, saving time and effort that would otherwise be spent on fine-tuning these models.
△ Less
Submitted 12 June, 2024; v1 submitted 27 October, 2023;
originally announced November 2023.
-
Adaptive Dynamics of Diverging Fitness Optima
Authors:
Blaine van Rensburg,
Fabian Spill,
Manh Hong Duong
Abstract:
We analyse a non-local parabolic integro-differential equation modelling the evolutionary dynamics of a phenotypically-structured population in a changing environment. Such models arise in the study of species adapting to climate change, or cancer adapting to therapy. Our results concern the long-time behaviour, in the small mutation limit, of the model. The main novelty of our work is that the ti…
▽ More
We analyse a non-local parabolic integro-differential equation modelling the evolutionary dynamics of a phenotypically-structured population in a changing environment. Such models arise in the study of species adapting to climate change, or cancer adapting to therapy. Our results concern the long-time behaviour, in the small mutation limit, of the model. The main novelty of our work is that the time- and trait-dependent per capita growth rate is characterised by having multiple (locally) optimal traits which shift at possibly different velocities. When the velocities are the same we find that the solution concentrates on a point-set which depends on the shifting speed. These points can be thought of as "lagged optima" and the fitness value at each lagged optima is the "lagged fitness". When the velocities of the optimal traits are different and each has a potentially different optimal fitness, we find that the solution in fact concentrates as a Dirac delta function on the positive lagged optimum with maximum lagged fitness. Our results imply that in populations undergoing competition in temporally changing environments, both the true optimal fitness and the required rate of adaptation for each of the diverging optimal traits contribute to the eventual dominance of one trait.
△ Less
Submitted 1 November, 2023;
originally announced November 2023.
-
RadGraph2: Modeling Disease Progression in Radiology Reports via Hierarchical Information Extraction
Authors:
Sameer Khanna,
Adam Dejl,
Kibo Yoon,
Quoc Hung Truong,
Hanh Duong,
Agustina Saenz,
Pranav Rajpurkar
Abstract:
We present RadGraph2, a novel dataset for extracting information from radiology reports that focuses on capturing changes in disease state and device placement over time. We introduce a hierarchical schema that organizes entities based on their relationships and show that using this hierarchy during training improves the performance of an information extraction model. Specifically, we propose a mo…
▽ More
We present RadGraph2, a novel dataset for extracting information from radiology reports that focuses on capturing changes in disease state and device placement over time. We introduce a hierarchical schema that organizes entities based on their relationships and show that using this hierarchy during training improves the performance of an information extraction model. Specifically, we propose a modification to the DyGIE++ framework, resulting in our model HGIE, which outperforms previous models in entity and relation extraction tasks. We demonstrate that RadGraph2 enables models to capture a wider variety of findings and perform better at relation extraction compared to those trained on the original RadGraph dataset. Our work provides the foundation for develo** automated systems that can track disease progression over time and develop information extraction models that leverage the natural hierarchy of labels in the medical domain.
△ Less
Submitted 9 August, 2023;
originally announced August 2023.
-
Convergence to equilibrium for a degenerate McKean-Vlasov Equation
Authors:
Manh Hong Duong,
Amit Einav
Abstract:
In this work we study the convergence to equilibrium for a (potentially) degenerate nonlinear and nonlocal McKean-Vlasov equation. We show that the solution to this equation is related to the solution of a linear degenerate and/or defective Fokker-Planck equation and employ recent sharp convergence results to obtain an easily computable (and many times sharp) rates of convergence to equilibrium fo…
▽ More
In this work we study the convergence to equilibrium for a (potentially) degenerate nonlinear and nonlocal McKean-Vlasov equation. We show that the solution to this equation is related to the solution of a linear degenerate and/or defective Fokker-Planck equation and employ recent sharp convergence results to obtain an easily computable (and many times sharp) rates of convergence to equilibrium for the equation in question.
△ Less
Submitted 31 July, 2023;
originally announced July 2023.
-
A DPLL(T) Framework for Verifying Deep Neural Networks
Authors:
Hai Duong,
ThanhVu Nguyen,
Matthew Dwyer
Abstract:
Deep Neural Networks (DNNs) have emerged as an effective approach to tackling real-world problems. However, like human-written software, DNNs can have bugs and can be attacked. To address this, research has explored a wide-range of algorithmic approaches to verify DNN behavior. In this work, we introduce NeuralSAT, a new verification approach that adapts the widely-used DPLL(T) algorithm used in m…
▽ More
Deep Neural Networks (DNNs) have emerged as an effective approach to tackling real-world problems. However, like human-written software, DNNs can have bugs and can be attacked. To address this, research has explored a wide-range of algorithmic approaches to verify DNN behavior. In this work, we introduce NeuralSAT, a new verification approach that adapts the widely-used DPLL(T) algorithm used in modern SMT solvers. A key feature of SMT solvers is the use of conflict clause learning and search restart to scale verification. Unlike prior DNN verification approaches, NeuralSAT combines an abstraction-based deductive theory solver with clause learning and an evaluation clearly demonstrates the benefits of the approach on a set of challenging verification benchmarks.
△ Less
Submitted 19 January, 2024; v1 submitted 17 July, 2023;
originally announced July 2023.
-
Asymptotic analysis for the generalized Langevin equation with singular potentials
Authors:
Manh Hong Duong,
Hung D. Nguyen
Abstract:
We consider a system of interacting particles governed by the generalized Langevin equation (GLE) in the presence of external confining potentials, singular repulsive forces, as well as memory kernels. Using a Mori-Zwanzig approach, we represent the system by a class of Markovian dynamics. Under a general set of conditions on the nonlinearities, we study the large-time asymptotics of the multi-par…
▽ More
We consider a system of interacting particles governed by the generalized Langevin equation (GLE) in the presence of external confining potentials, singular repulsive forces, as well as memory kernels. Using a Mori-Zwanzig approach, we represent the system by a class of Markovian dynamics. Under a general set of conditions on the nonlinearities, we study the large-time asymptotics of the multi-particle Markovian GLEs. We show that the system is always exponentially attractive toward the unique invariant Gibbs probability measure. The proof relies on a novel construction of Lyapunov functions. We then establish the validity of the small mass approximation for the solutions by an appropriate equation on any finite-time window. Important examples of singular potentials in our results include the Lennard-Jones and Coulomb functions.
△ Less
Submitted 13 March, 2024; v1 submitted 5 May, 2023;
originally announced May 2023.
-
Entropic regularisation of unbalanced optimal transportation problems
Authors:
Maciej Buze,
Manh Hong Duong
Abstract:
We develop a mathematical theory of entropic regularisation of unbalanced optimal transport problems. Focusing on static formulation and relying on the formalism developed for the unregularised case, we show that unbalanced optimal transport problems can be regularised in two qualitatively distinct ways - either on the original space or on the extended space. We derive several reformulations of th…
▽ More
We develop a mathematical theory of entropic regularisation of unbalanced optimal transport problems. Focusing on static formulation and relying on the formalism developed for the unregularised case, we show that unbalanced optimal transport problems can be regularised in two qualitatively distinct ways - either on the original space or on the extended space. We derive several reformulations of the two regularised problems and in particular introduce the idea of a regularised induced marginal perspective cost function allowing us to derive an extended space formulation of the original space regularisation. We also prove convergence to the unregularised problem in the case of the extended space regularisation and discuss on-going work on deriving a unified framework based on higher order liftings in which both regularisations can be directly compared. We also briefly touch upon how these concepts translate to the corresponding dynamic formulations and provide evidence why the extended space regularisation should be preferred. This is a preliminary version of the manuscript, to be updated in the near future.
△ Less
Submitted 3 May, 2023;
originally announced May 2023.
-
Random evolutionary games and random polynomials
Authors:
Manh Hong Duong,
The Anh Han
Abstract:
In this paper, we discover that the class of random polynomials arising from the equilibrium analysis of random asymmetric evolutionary games is \textit{exactly} the Kostlan-Shub-Smale system of random polynomials, revealing an intriguing connection between evolutionary game theory and the theory of random polynomials. Through this connection, we analytically characterize the statistics of the num…
▽ More
In this paper, we discover that the class of random polynomials arising from the equilibrium analysis of random asymmetric evolutionary games is \textit{exactly} the Kostlan-Shub-Smale system of random polynomials, revealing an intriguing connection between evolutionary game theory and the theory of random polynomials. Through this connection, we analytically characterize the statistics of the number of internal equilibria of random asymmetric evolutionary games, namely its mean value, probability distribution, central limit theorem and universality phenomena. Moreover, comparing symmetric and asymmetric random games, we establish that symmetry in the group interaction increases the expected number of internal equilibria. Our research establishes new theoretical understanding of asymmetric evolutionary games and why symmetry/asymmetry of group interactions matters.
△ Less
Submitted 26 April, 2023;
originally announced April 2023.
-
Model reduction of Brownian oscillators: quantification of errors and long-time behaviour
Authors:
M. Colangeli,
M. H. Duong,
A. Muntean
Abstract:
A procedure for model reduction of stochastic ordinary differential equations with additive noise was recently introduced in [Colangeli-Duong-Muntean, Journal of Physics A: Mathematical and Theoretical, 2022], based on the Invariant Manifold method and on the Fluctuation-Dissipation relation. A general question thus arises as to whether one can rigorously quantify the error entailed by the use of…
▽ More
A procedure for model reduction of stochastic ordinary differential equations with additive noise was recently introduced in [Colangeli-Duong-Muntean, Journal of Physics A: Mathematical and Theoretical, 2022], based on the Invariant Manifold method and on the Fluctuation-Dissipation relation. A general question thus arises as to whether one can rigorously quantify the error entailed by the use of the reduced dynamics in place of the original one. In this work we provide explicit formulae and estimates of the error in terms of the Wasserstein distance, both in the presence or in the absence of a sharp time-scale separation between the variables to be retained or eliminated from the description, as well as in the long-time behaviour.
Keywords: Model reduction, Wasserstein distance, error estimates, coupled Brownian oscillators, invariant manifold, Fluctuation-Dissipation relation.
△ Less
Submitted 1 April, 2023;
originally announced April 2023.
-
On the number of equilibria of the replicator-mutator dynamics for noisy social dilemmas
Authors:
L. Chen,
C. Deng,
M. H. Duong,
T. A. Han
Abstract:
In this paper, we consider the replicator-mutator dynamics for pairwise social dilemmas where the payoff entries are random variables. The randomness is incorporated to take into account the uncertainty, which is inevitable in practical applications and may arise from different sources such as lack of data for measuring the outcomes, noisy and rapidly changing environments, as well as unavoidable…
▽ More
In this paper, we consider the replicator-mutator dynamics for pairwise social dilemmas where the payoff entries are random variables. The randomness is incorporated to take into account the uncertainty, which is inevitable in practical applications and may arise from different sources such as lack of data for measuring the outcomes, noisy and rapidly changing environments, as well as unavoidable human estimate errors. We analytically and numerically compute the probability that the replicator-mutator dynamics has a given number of equilibria for four classes of pairwise social dilemmas (Prisoner's Dilemma, Snow-Drift Game, Stag-Hunt Game and Harmony Game). As a result, we characterise the qualitative behaviour of such probabilities as a function of the mutation rate. Our results clearly show the influence of the mutation rate and the uncertainty in the payoff matrix definition on the number of equilibria in these games. Overall, our analysis has provided novel theoretical contributions to the understanding of the impact of uncertainty on the behavioural diversity in a complex dynamical system.
△ Less
Submitted 29 March, 2023;
originally announced March 2023.
-
Cost optimisation of hybrid institutional incentives for promoting cooperation in finite populations
Authors:
M. H. Duong,
C. M. Durbac,
T. A. Han
Abstract:
In this paper, we rigorously study the problem of cost optimisation of hybrid (mixed) institutional incentives, which are a plan of actions involving the use of reward and punishment by an external decision-maker, for maximising the level (or guaranteeing at least a certain level) of cooperative behaviour in a well-mixed, finite population of self-regarding individuals who interact via cooperation…
▽ More
In this paper, we rigorously study the problem of cost optimisation of hybrid (mixed) institutional incentives, which are a plan of actions involving the use of reward and punishment by an external decision-maker, for maximising the level (or guaranteeing at least a certain level) of cooperative behaviour in a well-mixed, finite population of self-regarding individuals who interact via cooperation dilemmas (Donation Game or Public Goods Game). We show that a mixed incentive scheme can offer a more cost-efficient approach for providing incentives while ensuring the same level or standard of cooperation in the long-run. We establish the asymptotic behaviour (namely neutral drift, strong selection, and infinite-population limits). We prove the existence of a phase transition, obtaining the critical threshold of the strength of selection at which the monotonicity of the cost function changes and providing an algorithm for finding the optimal value of the individual incentive cost. Our analytical results are illustrated with numerical investigations. Overall, our analysis provides novel theoretical insights into the design of cost-efficient institutional incentive mechanisms for promoting the evolution of cooperation in stochastic systems.
△ Less
Submitted 6 October, 2023; v1 submitted 17 December, 2022;
originally announced December 2022.
-
Binary-Continuous Sum-of-ratios Optimization: Discretization, Approximations, and Convex Reformulations
Authors:
Tien Mai,
Ngan Ha Duong,
Thuy Anh Ta
Abstract:
We study a class of non-convex sum-of-ratios programs which can be used for decision-making in prominent areas such as product assortment and price optimization, facility location, and security games. Such an optimization problem involves both continuous and binary decision variables and is known to be highly non-convex and intractable to solve. We explore a discretization approach to approximate…
▽ More
We study a class of non-convex sum-of-ratios programs which can be used for decision-making in prominent areas such as product assortment and price optimization, facility location, and security games. Such an optimization problem involves both continuous and binary decision variables and is known to be highly non-convex and intractable to solve. We explore a discretization approach to approximate the optimization problem and show that the approximate program can be reformulated as mixed-integer linear or second-order cone programs, which can be conveniently handled by an off-the-shelf solver (e.g., CPLEX or GUROBI). We further establish (mild) conditions under which solutions to the approximate problem converge to optimal solutions as the number of discretization points increases. We also provide approximation abounds for solutions obtained from the approximated problem. We show how our approach applies to product assortment and price optimization, maximum covering facility location, and Bayesian Stackelberg security games and provide experimental results to evaluate the efficiency of our approach.
△ Less
Submitted 3 November, 2022;
originally announced November 2022.
-
On decompositions of non-reversible processes
Authors:
M. H. Duong,
J. Zimmer
Abstract:
Markov chains are studied in a formulation involving forces and fluxes. First, the iso-dissipation force recently introduced in the physics literature is investigated; we show that its non-uniqueness is linked to different notions of duality giving rise to dual forces. We then study Hamiltonians associated to variational formulations of Markov processes, and develop different decompositions for th…
▽ More
Markov chains are studied in a formulation involving forces and fluxes. First, the iso-dissipation force recently introduced in the physics literature is investigated; we show that its non-uniqueness is linked to different notions of duality giving rise to dual forces. We then study Hamiltonians associated to variational formulations of Markov processes, and develop different decompositions for them.
△ Less
Submitted 7 October, 2022;
originally announced October 2022.
-
A reduction scheme for coupled Brownian harmonic oscillators
Authors:
Matteo Colangeli,
Manh Hong Duong,
Adrian Muntean
Abstract:
We propose a reduction scheme for a system constituted by two coupled harmonically-bound Brownian oscillators. We reduce the description by constructing a lower dimensional model which inherits some of the basic features of the original dynamics and is written in terms of suitable transport coefficients. The proposed procedure is twofold: while the deterministic component of the dynamics is obtain…
▽ More
We propose a reduction scheme for a system constituted by two coupled harmonically-bound Brownian oscillators. We reduce the description by constructing a lower dimensional model which inherits some of the basic features of the original dynamics and is written in terms of suitable transport coefficients. The proposed procedure is twofold: while the deterministic component of the dynamics is obtained by a direct application of the invariant manifold method, the diffusion terms are determined via the Fluctuation-Dissipation Theorem. We highlight the behavior of the coefficients up to a critical value of the coupling parameter, which marks the endpoint of the interval in which a contracted description is available. The study of the weak coupling regime is addressed and the commutativity of alternative reduction paths is also discussed.
△ Less
Submitted 13 December, 2022; v1 submitted 27 September, 2022;
originally announced September 2022.
-
Rate of convergence in the Smoluchowski-Kramers approximation for mean-field stochastic differential equations
Authors:
T. C. Son,
D. Q. Le,
M. H. Duong
Abstract:
In this paper we study a second-order mean-field stochastic differential systems describing the movement of a particle under the influence of a time-dependent force, a friction, a mean-field interaction and a space and time-dependent stochastic noise. Using techniques from Malliavin calculus, we establish explicit rates of convergence in the zero-mass limit (Smoluchowski-Kramers approximation) in…
▽ More
In this paper we study a second-order mean-field stochastic differential systems describing the movement of a particle under the influence of a time-dependent force, a friction, a mean-field interaction and a space and time-dependent stochastic noise. Using techniques from Malliavin calculus, we establish explicit rates of convergence in the zero-mass limit (Smoluchowski-Kramers approximation) in the $L^p$-distances and in the total variation distance for the position process, the velocity process and a re-scaled velocity process to their corresponding limiting processes.
△ Less
Submitted 7 October, 2022; v1 submitted 24 September, 2022;
originally announced September 2022.
-
Joint Location and Cost Planning in Maximum Capture Facility Location under Multiplicative Random Utility Maximization
Authors:
Ngan Ha Duong,
Tien Thanh Dam,
Thuy Anh Ta,
Tien Mai
Abstract:
We study a joint facility location and cost planning problem in a competitive market under random utility maximization (RUM) models. The objective is to locate new facilities and make decisions on the costs (or budgets) to spend on the new facilities, aiming to maximize an expected captured customer demand, assuming that customers choose a facility among all available facilities according to a RUM…
▽ More
We study a joint facility location and cost planning problem in a competitive market under random utility maximization (RUM) models. The objective is to locate new facilities and make decisions on the costs (or budgets) to spend on the new facilities, aiming to maximize an expected captured customer demand, assuming that customers choose a facility among all available facilities according to a RUM model. We examine two RUM frameworks in the discrete choice literature, namely, the additive and multiplicative RUM. While the former has been widely used in facility location problems, we are the first to explore the latter in the context. We numerically show that the two RUM frameworks can well approximate each other in the context of the cost optimization problem. In addition, we show that, under the additive RUM framework, the resultant cost optimization problem becomes highly non-convex and may have several local optima. In contrast, the use of the multiplicative RUM brings several advantages to the competitive facility location problem. For instance, the cost optimization problem under the multiplicative RUM can be solved efficiently by a general convex optimization solver or can be reformulated as a conic quadratic program and handled by a conic solver available in some off-the-shelf solvers such as CPLEX or GUROBI. Furthermore, we consider a joint location and cost optimization problem under the multiplicative RUM and propose three approaches to solve the problem, namely, an equivalent conic reformulation, a multi-cut outer-approximation algorithm, and a local search heuristic. We provide numerical experiments based on synthetic instances of various sizes to evaluate the performances of the proposed algorithms in solving the cost optimization, and the joint location and cost optimization problems.
△ Less
Submitted 11 February, 2023; v1 submitted 15 May, 2022;
originally announced May 2022.
-
FAT: An In-Memory Accelerator with Fast Addition for Ternary Weight Neural Networks
Authors:
Shien Zhu,
Luan H. K. Duong,
Hui Chen,
Di Liu,
Weichen Liu
Abstract:
Convolutional Neural Networks (CNNs) demonstrate excellent performance in various applications but have high computational complexity. Quantization is applied to reduce the latency and storage cost of CNNs. Among the quantization methods, Binary and Ternary Weight Networks (BWNs and TWNs) have a unique advantage over 8-bit and 4-bit quantization. They replace the multiplication operations in CNNs…
▽ More
Convolutional Neural Networks (CNNs) demonstrate excellent performance in various applications but have high computational complexity. Quantization is applied to reduce the latency and storage cost of CNNs. Among the quantization methods, Binary and Ternary Weight Networks (BWNs and TWNs) have a unique advantage over 8-bit and 4-bit quantization. They replace the multiplication operations in CNNs with additions, which are favoured on In-Memory-Computing (IMC) devices. IMC acceleration for BWNs has been widely studied. However, though TWNs have higher accuracy and better sparsity than BWNs, IMC acceleration for TWNs has limited research. TWNs on existing IMC devices are inefficient because the sparsity is not well utilized, and the addition operation is not efficient.
In this paper, we propose FAT as a novel IMC accelerator for TWNs. First, we propose a Sparse Addition Control Unit, which utilizes the sparsity of TWNs to skip the null operations on zero weights. Second, we propose a fast addition scheme based on the memory Sense Amplifier to avoid the time overhead of both carry propagation and writing back the carry to memory cells. Third, we further propose a Combined-Stationary data map** to reduce the data movement of activations and weights and increase the parallelism across memory columns. Simulation results show that for addition operations at the Sense Amplifier level, FAT achieves 2.00X speedup, 1.22X power efficiency, and 1.22X area efficiency compared with a State-Of-The-Art IMC accelerator ParaPIM. FAT achieves 10.02X speedup and 12.19X energy efficiency compared with ParaPIM on networks with 80% average sparsity.
△ Less
Submitted 1 August, 2022; v1 submitted 19 January, 2022;
originally announced January 2022.
-
Non-reversible processes: GENERIC, Hypocoercivity and fluctuations
Authors:
Manh Hong Duong,
Michela Ottobre
Abstract:
We consider two approaches to study non-reversible Markov processes, namely the Hypocoercivity Theory (HT) and GENERIC (General Equations for Non-Equilibrium Reversible-Irreversible Coupling); the basic idea behind both of them is to split the process into a reversible component and a non-reversible one, and then quantify the way in which they interact. We compare such theories and provide explici…
▽ More
We consider two approaches to study non-reversible Markov processes, namely the Hypocoercivity Theory (HT) and GENERIC (General Equations for Non-Equilibrium Reversible-Irreversible Coupling); the basic idea behind both of them is to split the process into a reversible component and a non-reversible one, and then quantify the way in which they interact. We compare such theories and provide explicit formulas to pass from one formulation to the other; as a bi-product we give a simple proof of the link between reversibility of the dynamics and gradient flow structure of the associated Fokker-Planck equation. We do this both for linear Markov processes and for a class of nonlinear Markov process as well. We then characterize the structure of the Large deviation functional of generalised-reversible processes; this is a class of non-reversible processes of large relevance in applications. Finally, we show how our results apply to two classes of Markov processes, namely non-reversible diffusion processes and a class of Piecewise Deterministic Markov Processes (PDMPs), which have recently attracted the attention of the statistical sampling community. In particular, for the PDMPs we consider we prove entropy decay.
△ Less
Submitted 24 January, 2023; v1 submitted 30 October, 2021;
originally announced November 2021.
-
Reducing exit-times of diffusions with repulsive interactions
Authors:
Paul-Eric Chaudru de Raynal,
Manh Hong Duong,
Pierre Monmarché,
Milica Tomašević,
Julian Tugaut
Abstract:
In this work we prove a Kramers' type law for the low-temperature behavior of the exit-times from a metastable state for a class of self-interacting nonlinear diffusion processes. Contrary to previous works, the interaction is not assumed to be convex, which means that this result covers cases where the exit-time for the interacting process is smaller than the exit-time for the associated non-inte…
▽ More
In this work we prove a Kramers' type law for the low-temperature behavior of the exit-times from a metastable state for a class of self-interacting nonlinear diffusion processes. Contrary to previous works, the interaction is not assumed to be convex, which means that this result covers cases where the exit-time for the interacting process is smaller than the exit-time for the associated non-interacting process. The technique of the proof is based on the fact that, under an appropriate contraction condition, the interacting process is conveniently coupled with a non-interacting (linear) Markov process where the interacting law is replaced by a constant Dirac mass at the fixed point of the deterministic zero-temperature process.
△ Less
Submitted 25 October, 2021;
originally announced October 2021.
-
Groups Influence with Minimum Cost in Social Networks
Authors:
Phuong N. H. Pham,
Canh V. Pham,
Hieu V. Duong,
Thanh T. Nguyen,
My T. Thai
Abstract:
This paper studies a Group Influence with Minimum cost which aims to find a seed set with smallest cost that can influence all target groups, where each user is associated with a cost and a group is influenced if the total score of the influenced users belonging to the group is at least a certain threshold. As the group-influence function is neither submodular nor supermodular, theoretical bounds…
▽ More
This paper studies a Group Influence with Minimum cost which aims to find a seed set with smallest cost that can influence all target groups, where each user is associated with a cost and a group is influenced if the total score of the influenced users belonging to the group is at least a certain threshold. As the group-influence function is neither submodular nor supermodular, theoretical bounds on the quality of solutions returned by the well-known greedy approach may not be guaranteed. To address this challenge, we propose a bi-criteria polynomial-time approximation algorithm with high certainty. At the heart of the algorithm is a novel group reachable reverse sample concept, which helps speed up the estimation of the group influence function. Finally, extensive experiments conducted on real social networks show that our proposed algorithm outperform the state-of-the-art algorithms in terms of the objective value and the running time.
△ Less
Submitted 14 December, 2022; v1 submitted 18 September, 2021;
originally announced September 2021.
-
Broadband photon pair generation from a single lithium niobate microcube
Authors:
Ngoc My Hanh Duong,
Gregoire Saerens,
Flavia Timpu,
Maria Teresa Buscaglia,
Vincenzo Buscaglia,
Andrea Morandi,
Jolanda S. Muller,
Andreas Maeder,
Fabian Kaufmann,
Alexander Sonltsev,
Rachel Grange
Abstract:
Nonclassical light sources are highly sought after as they are an integral part of quantum communication and quantum computation devices. Typical sources rely on bulk crystals that are not compact and have limited bandwidth due to phase-matching conditions. In this work, we demonstrate the generation of photon pairs from a free-standing lithium niobate microcube at the telecommunication wavelength…
▽ More
Nonclassical light sources are highly sought after as they are an integral part of quantum communication and quantum computation devices. Typical sources rely on bulk crystals that are not compact and have limited bandwidth due to phase-matching conditions. In this work, we demonstrate the generation of photon pairs from a free-standing lithium niobate microcube at the telecommunication wavelength through the spontaneous parametric down-conversion process. The maximum photon pair generation rate obtained from a single microcube with the size of ~4 microns is ~80 Hz, resulting in an efficiency of ~1.2 GHz/Wm per unit volume, which is an order of magnitude higher than the efficiency of photon-pair generation in bulky nonlinear crystals. The microcubes are synthesized through a solvothermal method, offering the possibility for scalable devices via bottom-up assembly. Our work constitutes an important step forward in the realization of compact nonclassical light sources with broadband tunability for various applications in quantum communication, quantum computing, and quantum metrology.
△ Less
Submitted 17 September, 2021;
originally announced September 2021.
-
Accurate and robust splitting methods for the generalized Langevin equation with a positive Prony series memory kernel
Authors:
Manh Hong Duong,
Xiaocheng Shang
Abstract:
We study numerical methods for the generalized Langevin equation (GLE) with a positive Prony series memory kernel, in which case the GLE can be written in an extended variable Markovian formalism. We propose a new splitting method that is easy to implement and is able to substantially improve the accuracy and robustness of GLE simulations in a wide range of the parameters. An error analysis is per…
▽ More
We study numerical methods for the generalized Langevin equation (GLE) with a positive Prony series memory kernel, in which case the GLE can be written in an extended variable Markovian formalism. We propose a new splitting method that is easy to implement and is able to substantially improve the accuracy and robustness of GLE simulations in a wide range of the parameters. An error analysis is performed in the case of a one-dimensional harmonic oscillator, revealing that several averages are exact for the newly proposed method. Various numerical experiments in both equilibrium and nonequilibrium simulations are also conducted to compare the method with popular alternatives in interacting multi-particle systems.
△ Less
Submitted 30 May, 2022; v1 submitted 16 September, 2021;
originally announced September 2021.
-
Statistics of the number of equilibria in random social dilemma evolutionary games with mutation
Authors:
Manh Hong Duong,
The Anh Han
Abstract:
In this paper, we study analytically the statistics of the number of equilibria in pairwise social dilemma evolutionary games with mutation where a game's payoff entries are random variables. Using the replicator-mutator equations, we provide explicit formulas for the probability distributions of the number of equilibria as well as other statistical quantities. This analysis is highly relevant ass…
▽ More
In this paper, we study analytically the statistics of the number of equilibria in pairwise social dilemma evolutionary games with mutation where a game's payoff entries are random variables. Using the replicator-mutator equations, we provide explicit formulas for the probability distributions of the number of equilibria as well as other statistical quantities. This analysis is highly relevant assuming that one might know the nature of a social dilemma game at hand (e.g., cooperation vs coordination vs anti-coordination), but measuring the exact values of its payoff entries is difficult. Our delicate analysis shows clearly the influence of the mutation probability on these probability distributions, providing insights into how varying this important factor impacts the overall behavioural or biological diversity of the underlying evolutionary systems.
△ Less
Submitted 13 July, 2021;
originally announced July 2021.
-
Operator-splitting schemes for degenerate, non-local, conservative-dissipative systems
Authors:
Daniel Adams,
Manh Hong Duong,
Goncalo dos Reis
Abstract:
In this paper, we develop a natural operator-splitting variational scheme for a general class of non-local, degenerate conservative-dissipative evolutionary equations. The splitting-scheme consists of two phases: a conservative (transport) phase and a dissipative (diffusion) phase. The first phase is solved exactly using the method of characteristic and DiPerna-Lions theory while the second phase…
▽ More
In this paper, we develop a natural operator-splitting variational scheme for a general class of non-local, degenerate conservative-dissipative evolutionary equations. The splitting-scheme consists of two phases: a conservative (transport) phase and a dissipative (diffusion) phase. The first phase is solved exactly using the method of characteristic and DiPerna-Lions theory while the second phase is solved approximately using a JKO-type variational scheme that minimizes an energy functional with respect to a certain Kantorovich optimal transport cost functional. In addition, we also introduce an entropic-regularisation of the scheme. We prove the convergence of both schemes to a weak solution of the evolutionary equation. We illustrate the generality of our work by providing a number of examples, including the kinetic Fokker-Planck equation and the (regularized) Vlasov-Poisson-Fokker-Planck equation.
△ Less
Submitted 23 June, 2022; v1 submitted 24 May, 2021;
originally announced May 2021.
-
Entropic regularisation of non-gradient systems
Authors:
Daniel Adams,
Manh Hong Duong,
Goncalo dos Reis
Abstract:
The theory of Wasserstein gradient flows in the space of probability measures has made an enormous progress over the last twenty years. It constitutes a unified and powerful framework in the study of dissipative partial differential equations (PDEs) providing the means to prove well-posedness, regularity, stability and quantitative convergence to the equilibrium. The recently developed entropic re…
▽ More
The theory of Wasserstein gradient flows in the space of probability measures has made an enormous progress over the last twenty years. It constitutes a unified and powerful framework in the study of dissipative partial differential equations (PDEs) providing the means to prove well-posedness, regularity, stability and quantitative convergence to the equilibrium. The recently developed entropic regularisation technique paves the way for fast and efficient numerical methods for solving these gradient flows. However, many PDEs of interest do not have a gradient flow structure and, a priori, the theory is not applicable. In this paper, we develop a time-discrete entropy regularised variational scheme for a general class of such non-gradient PDEs. We prove the convergence of the scheme and illustrate the breadth of the proposed framework with concrete examples including the non-linear kinetic Fokker-Planck (Kramers) equation and a non-linear degenerate diffusion of Kolmogorov type. Numerical simulations are also provided.
△ Less
Submitted 14 January, 2022; v1 submitted 9 April, 2021;
originally announced April 2021.
-
Cost efficiency of institutional incentives in finite populations
Authors:
Manh Hong Duong,
The Anh Han
Abstract:
Institutions can provide incentives to increase cooperation behaviour in a population where this behaviour is infrequent. This process is costly, and it is thus important to optimize the overall spending. This problem can be mathematically formulated as a multi-objective optimization problem where one wishes to minimize the cost of providing incentives while ensuring a desired level of cooperation…
▽ More
Institutions can provide incentives to increase cooperation behaviour in a population where this behaviour is infrequent. This process is costly, and it is thus important to optimize the overall spending. This problem can be mathematically formulated as a multi-objective optimization problem where one wishes to minimize the cost of providing incentives while ensuring a desired level of cooperation within the population. In this paper, we provide a rigorous analysis for this problem. We study cooperation dilemmas in both the pairwise (the Donation game) and multi-player (the Public Goods game) settings. We prove the regularity of the (total incentive) cost function, characterize its asymptotic limits (infinite population, weak selection and large selection) and show exactly when reward or punishment is more efficient. We prove that the cost function exhibits a phase transition phenomena when the intensity of selection varies. We calculate the critical threshold in regards to the phase transition and study the optimization problem when the intensity of selection is under and above the critical value. It allows us to provide an exact calculation for the optimal cost of incentive, for a given intensity of selection. Finally, we provide numerical simulations to demonstrate the analytical results. Overall, our analysis provides for the first time a selection-dependent calculation of the optimal cost of institutional incentives (for both reward and punishment) that guarantees a minimum amount of cooperation. It is of crucial importance for real-world applications of institutional incentives since intensity of selection is specific to a given population and the underlying game payoff structure.
△ Less
Submitted 1 March, 2021;
originally announced March 2021.
-
Lattice-based Signcryption with Equality Test in Standard Model
Authors:
Huy Quoc Le,
Dung Hoang Duong,
Partha Sarathi Roy,
Willy Susilo,
Kazuhide Fukushima,
Shinsaku Kiyomoto
Abstract:
A signcryption, which is an integration of a public key encryption and a digital signature, can provide confidentiality and authenticity simultaneously. Additionally, a signcryption associated with equality test allows a third party (e.g., a cloud server) to check whether or not two ciphertexts are encrypted from the same message without knowing the message. This application plays an important rol…
▽ More
A signcryption, which is an integration of a public key encryption and a digital signature, can provide confidentiality and authenticity simultaneously. Additionally, a signcryption associated with equality test allows a third party (e.g., a cloud server) to check whether or not two ciphertexts are encrypted from the same message without knowing the message. This application plays an important role especially in computing on encrypted data. In this paper, we propose the first lattice-based signcryption scheme equipped with a solution to testing the message equality in the standard model. The proposed signcryption scheme is proven to be secure against insider attacks under the learning with errors assumption and the intractability of the short integer solution problem. As a by-product, we also show that some existing lattice-based signcryptions either is insecure or does not work correctly.
△ Less
Submitted 30 December, 2020;
originally announced December 2020.
-
Collusion-Resistant Identity-based Proxy Re-Encryption: Lattice-based Constructions in Standard Model
Authors:
Priyanka Dutta,
Willy Susilo,
Dung Hoang Duong,
Partha Sarathi Roy
Abstract:
The concept of proxy re-encryption (PRE) dates back to the work of Blaze, Bleumer, and Strauss in 1998. PRE offers delegation of decryption rights, i.e., it securely enables the re-encryption of ciphertexts from one key to another, without relying on trusted parties. PRE allows a semi-trusted third party termed as a ``proxy" to securely divert encrypted files of user A (delegator) to user B (deleg…
▽ More
The concept of proxy re-encryption (PRE) dates back to the work of Blaze, Bleumer, and Strauss in 1998. PRE offers delegation of decryption rights, i.e., it securely enables the re-encryption of ciphertexts from one key to another, without relying on trusted parties. PRE allows a semi-trusted third party termed as a ``proxy" to securely divert encrypted files of user A (delegator) to user B (delegatee) without revealing any information about the underlying files to the proxy. To eliminate the necessity of having a costly certificate verification process, Green and Ateniese introduced an identity-based PRE (IB-PRE). The potential applicability of IB-PRE sprung up a long line of intensive research from its first instantiation. Unfortunately, till today, there is no collusion-Resistant unidirectional IB-PRE secure in the standard model, which can withstand quantum attack. In this paper, we present the first concrete constructions of collusion-Resistant unidirectional IB-PRE, for both selective and adaptive identity, which are secure in standard model based on the hardness of learning with error problem.
△ Less
Submitted 16 November, 2020;
originally announced November 2020.
-
On the expected number of real roots of random polynomials arising from evolutionary game theory
Authors:
V. H. Can,
M. H. Duong,
V. H. Pham
Abstract:
In this paper, we obtain finite estimates and asymptotic formulas for the expected number of real roots of two classes of random polynomials arising from evolutionary game theory. As a consequence of our analysis, we achieve an asymptotic formula for the expected number of internal equilibria in multi-player two-strategy random evolutionary games. Our results contribute both to evolutionary game t…
▽ More
In this paper, we obtain finite estimates and asymptotic formulas for the expected number of real roots of two classes of random polynomials arising from evolutionary game theory. As a consequence of our analysis, we achieve an asymptotic formula for the expected number of internal equilibria in multi-player two-strategy random evolutionary games. Our results contribute both to evolutionary game theory and random polynomial theory.
△ Less
Submitted 27 October, 2020;
originally announced October 2020.
-
Lattice-based IBE with Equality Test Supporting Flexible Authorization in the Standard Model
Authors:
Giang L. D. Nguyen,
Willy Susilo,
Dung Hoang Duong,
Huy Quoc Le,
Fuchun Guo
Abstract:
Identity-based encryption with equality test supporting flexible authorization (IBEET-FA) allows the equality test of underlying messages of two ciphertexts while strengthens privacy protection by allowing users (identities) to control the comparison of their ciphertexts with others. IBEET by itself has a wide range of useful applicable domain such as keyword search on encrypted data, database par…
▽ More
Identity-based encryption with equality test supporting flexible authorization (IBEET-FA) allows the equality test of underlying messages of two ciphertexts while strengthens privacy protection by allowing users (identities) to control the comparison of their ciphertexts with others. IBEET by itself has a wide range of useful applicable domain such as keyword search on encrypted data, database partitioning for efficient encrypted data management, personal health record systems, and spam filtering in encrypted email systems. The flexible authorization will enhance privacy protection of IBEET. In this paper, we propose an efficient construction of IBEET-FA system based on the hardness of learning with error (LWE) problem. Our security proof holds in the standard model.
△ Less
Submitted 26 October, 2020;
originally announced October 2020.
-
Optical repum** of resonantly excited quantum emitters in hexagonal boron nitride
Authors:
Simon J. U. White,
Ngoc My Hanh Duong,
Alexander S. Solntsev,
Je-Hyung Kim,
Mehran Kianinia,
Igor Aharonovich
Abstract:
Resonant excitation of solid-state quantum emitters enables coherent control of quantum states and generation of coherent single photons, which are required for scalable quantum photonics applications. However, these systems can often decay to one or more intermediate dark states or spectrally jump, resulting in the lack of photons on resonance. Here, we present an optical co-excitation scheme whi…
▽ More
Resonant excitation of solid-state quantum emitters enables coherent control of quantum states and generation of coherent single photons, which are required for scalable quantum photonics applications. However, these systems can often decay to one or more intermediate dark states or spectrally jump, resulting in the lack of photons on resonance. Here, we present an optical co-excitation scheme which uses a weak non-resonant laser to reduce transitions to a dark state and amplify the photoluminescence from quantum emitters in hexagonal boron nitride (hBN). Utilizing a two-laser repum** scheme, we achieve optically stable resonance fluorescence of hBN emitters and an overall increase of ON time by an order of magnitude compared to only resonant excitation. Our results are important for the deployment of atom-like defects in hBN as reliable building blocks for quantum photonic applications.
△ Less
Submitted 11 September, 2020;
originally announced September 2020.
-
Lattice Blind Signatures with Forward Security
Authors:
Huy Quoc Le,
Dung Hoang Duong,
Willy Susilo,
Ha Thanh Nguyen Tran,
Viet Cuong Trinh,
Josef Pieprzyk,
Thomas Plantard
Abstract:
Blind signatures play an important role in both electronic cash and electronic voting systems. Blind signatures should be secure against various attacks (such as signature forgeries). The work puts a special attention to secret key exposure attacks, which totally break digital signatures. Signatures that resist secret key exposure attacks are called forward secure in the sense that disclosure of a…
▽ More
Blind signatures play an important role in both electronic cash and electronic voting systems. Blind signatures should be secure against various attacks (such as signature forgeries). The work puts a special attention to secret key exposure attacks, which totally break digital signatures. Signatures that resist secret key exposure attacks are called forward secure in the sense that disclosure of a current secret key does not compromise past secret keys. This means that forward-secure signatures must include a mechanism for secret-key evolution over time periods.
This paper gives a construction of the first blind signature that is forward secure. The construction is based on the SIS assumption in the lattice setting. The core techniques applied are the binary tree data structure for the time periods and the trapdoor delegation for the key-evolution mechanism.
△ Less
Submitted 14 July, 2020;
originally announced July 2020.
-
Trapdoor Delegation and HIBE from Middle-Product LWE in Standard Model
Authors:
Huy Quoc Le,
Dung Hoang Duong,
Willy Susilo,
Josef Pieprzyk
Abstract:
At CRYPTO 2017, Rosca, Sakzad, Stehle and Steinfeld introduced the Middle--Product LWE (MPLWE) assumption which is as secure as Polynomial-LWE for a large class of polynomials, making the corresponding cryptographic schemes more flexible in choosing the underlying polynomial ring in design while still kee** the equivalent efficiency. Recently at TCC 2019, Lombardi, Vaikuntanathan and Vuong intro…
▽ More
At CRYPTO 2017, Rosca, Sakzad, Stehle and Steinfeld introduced the Middle--Product LWE (MPLWE) assumption which is as secure as Polynomial-LWE for a large class of polynomials, making the corresponding cryptographic schemes more flexible in choosing the underlying polynomial ring in design while still kee** the equivalent efficiency. Recently at TCC 2019, Lombardi, Vaikuntanathan and Vuong introduced a variant of MPLWE assumption and constructed the first IBE scheme based on MPLWE. Their core technique is to construct lattice trapdoors compatible with MPLWE in the same paradigm of Gentry, Peikert and Vaikuntanathan at STOC 2008. However, their method cannot directly offer a Hierachical IBE construction. In this paper, we make a step further by proposing a novel trapdoor delegation mechanism for an extended family of polynomials from which we construct, for the first time, a Hierachical IBE scheme from MPLWE. Our Hierachy IBE scheme is provably secure in the standard model.
△ Less
Submitted 14 July, 2020;
originally announced July 2020.
-
Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption
Authors:
Willy Susilo,
Dung Hoang Duong,
Huy Quoc Le,
Josef Pieprzyk
Abstract:
Puncturable encryption (PE), proposed by Green and Miers at IEEE S&P 2015, is a kind of public key encryption that allows recipients to revoke individual messages by repeatedly updating decryption keys without communicating with senders. PE is an essential tool for constructing many interesting applications, such as asynchronous messaging systems, forward-secret zero round-trip time protocols, pub…
▽ More
Puncturable encryption (PE), proposed by Green and Miers at IEEE S&P 2015, is a kind of public key encryption that allows recipients to revoke individual messages by repeatedly updating decryption keys without communicating with senders. PE is an essential tool for constructing many interesting applications, such as asynchronous messaging systems, forward-secret zero round-trip time protocols, public-key watermarking schemes and forward-secret proxy re-encryptions. This paper revisits PEs from the observation that the puncturing property can be implemented as efficiently computable functions. From this view, we propose a generic PE construction from the fully key-homomorphic encryption, augmented with a key delegation mechanism (DFKHE) from Boneh et al. at Eurocrypt 2014. We show that our PE construction enjoys the selective security under chosen plaintext attacks (that can be converted into the adaptive security with some efficiency loss) from that of DFKHE in the standard model. Basing on the framework, we obtain the first post-quantum secure PE instantiation that is based on the learning with errors problem, selective secure under chosen plaintext attacks (CPA) in the standard model. We also discuss about the ability of modification our framework to support the unbounded number of ciphertext tags inspired from the work of Brakerski and Vaikuntanathan at CRYPTO 2016.
△ Less
Submitted 13 July, 2020;
originally announced July 2020.
-
Large few-layer hexagonal boron nitride flakes for nonlinear optics
Authors:
Nils Bernhardt,
Sejeong Kim,
Johannes E. Froch,
Simon White,
Ngoc My Hanh Duong,
Zhe He,
Bo Chen,
** Liu,
Igor Aharonovich,
Alexander S. Solntsev
Abstract:
Hexagonal boron nitride (hBN) is a layered dielectric material with a wide range of applications in optics and photonics. In this work, we demonstrate a fabrication method for few-layer hBN flakes with areas up to 5000 $\rm μm$. We show that hBN in this form can be integrated with photonic microstructures: as an example, we use a circular Bragg grating (CBG). The layer quality of the exfoliated hB…
▽ More
Hexagonal boron nitride (hBN) is a layered dielectric material with a wide range of applications in optics and photonics. In this work, we demonstrate a fabrication method for few-layer hBN flakes with areas up to 5000 $\rm μm$. We show that hBN in this form can be integrated with photonic microstructures: as an example, we use a circular Bragg grating (CBG). The layer quality of the exfoliated hBN flake on a CBG is confirmed by second-harmonic generation (SHG) microscopy. We show that the SHG signal is uniform across the hBN sample outside the CBG and is amplified in the centre of the CBG.
△ Less
Submitted 11 July, 2020; v1 submitted 3 July, 2020;
originally announced July 2020.
-
A GPM-based algorithm for solving regularized Wasserstein barycenter problems in some spaces of probability measures
Authors:
S. Kum,
M. H. Duong,
Y. Lim,
S. Yun
Abstract:
In this paper, we focus on the analysis of the regularized Wasserstein barycenter problem. We provide uniqueness and a characterization of the barycenter for two important classes of probability measures: (i) Gaussian distributions and (ii) $q$-Gaussian distributions; each regularized by a particular entropy functional. We propose an algorithm based on gradient projection method in the space of ma…
▽ More
In this paper, we focus on the analysis of the regularized Wasserstein barycenter problem. We provide uniqueness and a characterization of the barycenter for two important classes of probability measures: (i) Gaussian distributions and (ii) $q$-Gaussian distributions; each regularized by a particular entropy functional. We propose an algorithm based on gradient projection method in the space of matrices in order to compute these regularized barycenters. We also consider a general class of $\varphi$-exponential measures, for which only the non-regularized barycenter is studied. Finally, we numerically show the influence of parameters and stability of the algorithm under small perturbation of data.
△ Less
Submitted 6 August, 2022; v1 submitted 15 June, 2020;
originally announced June 2020.
-
Lattice-based Unidirectional IBPRE Secure in Standard Model
Authors:
Priyanka Dutta,
Willy Susilo,
Dung Hoang Duong,
Joonsang Baek,
Partha Sarathi Roy
Abstract:
Proxy re-encryption (PRE) securely enables the re-encryption of ciphertexts from one key to another, without relying on trusted parties, i.e., it offers delegation of decryption rights. PRE allows a semi-trusted third party termed as a "proxy" to securely divert encrypted files of user A (delegator) to user B (delegatee) without revealing any information about the underlying files to the proxy. To…
▽ More
Proxy re-encryption (PRE) securely enables the re-encryption of ciphertexts from one key to another, without relying on trusted parties, i.e., it offers delegation of decryption rights. PRE allows a semi-trusted third party termed as a "proxy" to securely divert encrypted files of user A (delegator) to user B (delegatee) without revealing any information about the underlying files to the proxy. To eliminate the necessity of having a costly certificate verification process, Green and Ateniese introduced an identity-based PRE (IB-PRE). The potential applicability of IB-PRE leads to intensive research from its first instantiation. Unfortunately, till today, there is no unidirectional IB-PRE secure in the standard model, which can withstand quantum attack. In this paper, we provide, for the first time, a concrete construction of unidirectional IB-PRE which is secure in standard model based on the hardness of learning with error problem. Our technique is to use the novel trapdoor delegation technique of Micciancio and Peikert. The way we use trapdoor delegation technique may prove useful for functionalities other than proxy re-encryption as well.
△ Less
Submitted 14 May, 2020;
originally announced May 2020.
-
Lattice-based public key encryption with equality test supporting flexible authorization in standard model
Authors:
Dung Hoang Duong,
Kazuhide Fukushima,
Shinsaku Kiyomoto,
Partha Sarathi Roy,
Arnaud Sipasseuth,
Willy Susilo
Abstract:
Public key encryption with equality test (PKEET) supports to check whether two ciphertexts encrypted under different public keys contain the same message or not. PKEET has many interesting applications such as keyword search on encrypted data, encrypted data partitioning for efficient encrypted data management, personal health record systems, spam filtering in encrypted email systems and so on. Ho…
▽ More
Public key encryption with equality test (PKEET) supports to check whether two ciphertexts encrypted under different public keys contain the same message or not. PKEET has many interesting applications such as keyword search on encrypted data, encrypted data partitioning for efficient encrypted data management, personal health record systems, spam filtering in encrypted email systems and so on. However, the PKEET scheme lacks an authorization mechanism for a user to control the comparison of its ciphertexts with others. In 2015, Ma et al. introduce the notion of PKEET with flexible authorization (PKEET-FA) which strengthens privacy protection. Since 2015, there are several follow-up works on PKEET-FA. But, all are secure in the random-oracle model. Moreover, all are vulnerable to quantum attacks. In this paper, we provide three constructions of quantum-safe PKEET-FA secure in the standard model. Proposed constructions are secure based on the hardness assumptions of integer lattices and ideal lattices. Finally, we implement the PKEET-FA scheme over ideal lattices.
△ Less
Submitted 9 May, 2020;
originally announced May 2020.
-
CCA2-secure Lattice-based Public Key Encryption with Equality Test in Standard Model
Authors:
Dung Hoang Duong,
Partha Sarathi Roy,
Willy Susilo,
Kazuhide Fukushima,
Shinsaku Kiyomoto,
Arnaud Sipasseuth
Abstract:
With the rapid growth of cloud storage and cloud computing services, many organisations and users choose to store the data on a cloud server for saving costs. However, due to security concerns, data of users would be encrypted before sending to the cloud. However, this hinders a problem of computation on encrypted data in the cloud, especially in the case of performing data matching in various med…
▽ More
With the rapid growth of cloud storage and cloud computing services, many organisations and users choose to store the data on a cloud server for saving costs. However, due to security concerns, data of users would be encrypted before sending to the cloud. However, this hinders a problem of computation on encrypted data in the cloud, especially in the case of performing data matching in various medical scenarios. Public key encryption with equality test (PKEET) is a powerful tool that allows the authorized cloud server to check whether two ciphertexts are generated by the same message. PKEET has then become a promising candidate for many practical applications like efficient data management on encrypted databases. Lee et al. (Information Sciences 2020) proposed a generic construction of PKEET schemes in the standard model and hence it is possible to yield the first instantiation of post-quantum PKEET schemes based on lattices. At ACISP 2019, Duong et al. proposed a direct construction of PKEET over integer lattices in the standard model. However, their scheme does not reach the CCA2-security. In this paper, we propose an efficient CCA2-secure PKEET scheme based on ideal lattices. In addition, we present a modification of the scheme by Duong et al. over integer lattices to attain the CCA2-security. Both schemes are proven secure in the standard model, and they enjoy the security in the upcoming quantum computer era.
△ Less
Submitted 31 January, 2021; v1 submitted 6 May, 2020;
originally announced May 2020.
-
On the problem of classifying solvable Lie algebras having small codimensional derived algebras
Authors:
Hoa Q. Duong,
Vu A. Le,
Tuan A. Nguyen,
Hai T. T. Cao,
Thieu N. Vo
Abstract:
This paper concerns the problem of classifying finite-dimensional real solvable Lie algebras whose derived algebras are of codimension 1 or 2. On the one hand, we present an effective method to classify all $(n+1)$-dimensional real solvable Lie algebras having 1-codimensional derived algebras provided that a full classification of $n$-dimensional nilpotent Lie algebras is given. On the other hand,…
▽ More
This paper concerns the problem of classifying finite-dimensional real solvable Lie algebras whose derived algebras are of codimension 1 or 2. On the one hand, we present an effective method to classify all $(n+1)$-dimensional real solvable Lie algebras having 1-codimensional derived algebras provided that a full classification of $n$-dimensional nilpotent Lie algebras is given. On the other hand, the problem of classifying all $(n+2)$-dimensional real solvable Lie algebras having 2-codimensional derived algebras is proved to be wild. In this case, we provide a method to classify a subclass of the considered Lie algebras which are extended from their derived algebras by a pair of derivations containing at least one inner derivation.
△ Less
Submitted 10 March, 2020;
originally announced March 2020.
-
Optical Thermometry with Quantum Emitters in Hexagonal Boron Nitride
Authors:
Yongliang Chen,
Thinh Ngoc Tran,
Ngoc My Hanh Duong,
Chi Li,
Milos Toth,
Carlo Bradac,
Igor Aharonovich,
Alexander Solntsev,
Toan Trong Tran
Abstract:
Nanoscale optical thermometry is a promising non-contact route for measuring local temperature with both high sensitivity and spatial resolution. In this work, we present a deterministic optical thermometry technique based on quantum emitters in nanoscale hexagonal boron-nitride. We show that these nanothermometers exhibit better performance than that of homologous, all-optical nanothermometers bo…
▽ More
Nanoscale optical thermometry is a promising non-contact route for measuring local temperature with both high sensitivity and spatial resolution. In this work, we present a deterministic optical thermometry technique based on quantum emitters in nanoscale hexagonal boron-nitride. We show that these nanothermometers exhibit better performance than that of homologous, all-optical nanothermometers both in sensitivity and range of working temperature. We demonstrate their effectiveness as nanothermometers by monitoring the local temperature at specific locations in a variety of custom-built micro-circuits. This work opens new avenues for nanoscale temperature measurements and heat flow studies in miniaturized, integrated devices.
△ Less
Submitted 8 March, 2020;
originally announced March 2020.
-
Severity Detection Tool for Patients with Infectious Disease
Authors:
Girmaw Abebe Tadesse,
Tingting Zhu,
Nhan Le Nguyen Thanh,
Nguyen Thanh Hung,
Ha Thi Hai Duong,
Truong Huu Khanh,
Pham Van Quang,
Duc Duong Tran,
LamMinh Yen,
H Rogier Van Doorn,
Nguyen Van Hao,
John Prince,
Hamza Javed,
DaniKiyasseh,
Le Van Tan,
Louise Thwaites,
David A. Clifton
Abstract:
Hand, foot and mouth disease (HFMD) and tetanus are serious infectious diseases in low and middle income countries. Tetanus in particular has a high mortality rate and its treatment is resource-demanding. Furthermore, HFMD often affects a large number of infants and young children. As a result, its treatment consumes enormous healthcare resources, especially when outbreaks occur. Autonomic nervous…
▽ More
Hand, foot and mouth disease (HFMD) and tetanus are serious infectious diseases in low and middle income countries. Tetanus in particular has a high mortality rate and its treatment is resource-demanding. Furthermore, HFMD often affects a large number of infants and young children. As a result, its treatment consumes enormous healthcare resources, especially when outbreaks occur. Autonomic nervous system dysfunction (ANSD) is the main cause of death for both HFMD and tetanus patients. However, early detection of ANSD is a difficult and challenging problem. In this paper, we aim to provide a proof-of-principle to detect the ANSD level automatically by applying machine learning techniques to physiological patient data, such as electrocardiogram (ECG) and photoplethysmogram (PPG) waveforms, which can be collected using low-cost wearable sensors. Efficient features are extracted that encode variations in the waveforms in the time and frequency domains. A support vector machine is employed to classify the ANSD levels. The proposed approach is validated on multiple datasets of HFMD and tetanus patients in Vietnam. Results show that encouraging performance is achieved in classifying ANSD levels. Moreover, the proposed features are simple, more generalisable and outperformed the standard heart rate variability (HRV) analysis. The proposed approach would facilitate both the diagnosis and treatment of infectious diseases in low and middle income countries, and thereby improve overall patient care.
△ Less
Submitted 10 December, 2019;
originally announced December 2019.
-
Cost-aware Targeted Viral Marketing: Approximation with Less Samples
Authors:
Canh V. Pham,
Hieu V. Duong,
My T. Thai
Abstract:
Cost-aware Targeted Viral Marketing (CTVM), a generalization of Influence Maximization (IM), has received a lot of attentions recently due to its commercial values. Previous approximation algorithms for this problem required a large number of samples to ensure approximate guarantee. In this paper, we propose an efficient approximation algorithm which uses fewer samples but provides the same theore…
▽ More
Cost-aware Targeted Viral Marketing (CTVM), a generalization of Influence Maximization (IM), has received a lot of attentions recently due to its commercial values. Previous approximation algorithms for this problem required a large number of samples to ensure approximate guarantee. In this paper, we propose an efficient approximation algorithm which uses fewer samples but provides the same theoretical guarantees based on generating and using important samples in its operation. Experiments on real social networks show that our proposed method outperforms the state-of-the-art algorithm which provides the same approximation ratio in terms of the number of required samples and running time.
△ Less
Submitted 8 February, 2020; v1 submitted 2 October, 2019;
originally announced October 2019.