-
Concept-Guided LLM Agents for Human-AI Safety Codesign
Authors:
Florian Geissler,
Karsten Roscher,
Mario Trapp
Abstract:
Generative AI is increasingly important in software engineering, including safety engineering, where its use ensures that software does not cause harm to people. This also leads to high quality requirements for generative AI. Therefore, the simplistic use of Large Language Models (LLMs) alone will not meet these quality demands. It is crucial to develop more advanced and sophisticated approaches t…
▽ More
Generative AI is increasingly important in software engineering, including safety engineering, where its use ensures that software does not cause harm to people. This also leads to high quality requirements for generative AI. Therefore, the simplistic use of Large Language Models (LLMs) alone will not meet these quality demands. It is crucial to develop more advanced and sophisticated approaches that can effectively address the complexities and safety concerns of software systems. Ultimately, humans must understand and take responsibility for the suggestions provided by generative AI to ensure system safety. To this end, we present an efficient, hybrid strategy to leverage LLMs for safety analysis and Human-AI codesign. In particular, we develop a customized LLM agent that uses elements of prompt engineering, heuristic reasoning, and retrieval-augmented generation to solve tasks associated with predefined safety concepts, in interaction with a system model graph. The reasoning is guided by a cascade of micro-decisions that help preserve structured information. We further suggest a graph verbalization which acts as an intermediate representation of the system model to facilitate LLM-graph interactions. Selected pairs of prompts and responses relevant for safety analytics illustrate our method for the use case of a simplified automated driving system.
△ Less
Submitted 3 April, 2024;
originally announced April 2024.
-
A Low-cost Strategic Monitoring Approach for Scalable and Interpretable Error Detection in Deep Neural Networks
Authors:
Florian Geissler,
Syed Qutub,
Michael Paulitsch,
Karthik Pattabiraman
Abstract:
We present a highly compact run-time monitoring approach for deep computer vision networks that extracts selected knowledge from only a few (down to merely two) hidden layers, yet can efficiently detect silent data corruption originating from both hardware memory and input faults. Building on the insight that critical faults typically manifest as peak or bulk shifts in the activation distribution…
▽ More
We present a highly compact run-time monitoring approach for deep computer vision networks that extracts selected knowledge from only a few (down to merely two) hidden layers, yet can efficiently detect silent data corruption originating from both hardware memory and input faults. Building on the insight that critical faults typically manifest as peak or bulk shifts in the activation distribution of the affected network layers, we use strategically placed quantile markers to make accurate estimates about the anomaly of the current inference as a whole. Importantly, the detector component itself is kept algorithmically transparent to render the categorization of regular and abnormal behavior interpretable to a human. Our technique achieves up to ~96% precision and ~98% recall of detection. Compared to state-of-the-art anomaly detection techniques, this approach requires minimal compute overhead (as little as 0.3% with respect to non-supervised inference time) and contributes to the explainability of the model.
△ Less
Submitted 31 October, 2023;
originally announced October 2023.
-
Large-Scale Application of Fault Injection into PyTorch Models -- an Extension to PyTorchFI for Validation Efficiency
Authors:
Ralf Graafe,
Qutub Syed Sha,
Florian Geissler,
Michael Paulitsch
Abstract:
Transient or permanent faults in hardware can render the output of Neural Networks (NN) incorrect without user-specific traces of the error, i.e. silent data errors (SDE). On the other hand, modern NNs also possess an inherent redundancy that can tolerate specific faults. To establish a safety case, it is necessary to distinguish and quantify both types of corruptions. To study the effects of hard…
▽ More
Transient or permanent faults in hardware can render the output of Neural Networks (NN) incorrect without user-specific traces of the error, i.e. silent data errors (SDE). On the other hand, modern NNs also possess an inherent redundancy that can tolerate specific faults. To establish a safety case, it is necessary to distinguish and quantify both types of corruptions. To study the effects of hardware (HW) faults on software (SW) in general and NN models in particular, several fault injection (FI) methods have been established in recent years. Current FI methods focus on the methodology of injecting faults but often fall short of accounting for large-scale FI tests, where many fault locations based on a particular fault model need to be analyzed in a short time. Results need to be concise, repeatable, and comparable. To address these requirements and enable fault injection as the default component in a machine learning development cycle, we introduce a novel fault injection framework called PyTorchALFI (Application Level Fault Injection for PyTorch) based on PyTorchFI. PyTorchALFI provides an efficient way to define randomly generated and reusable sets of faults to inject into PyTorch models, defines complex test scenarios, enhances data sets, and generates test KPIs while tightly coupling fault-free, faulty, and modified NN. In this paper, we provide details about the definition of test scenarios, software architecture, and several examples of how to use the new framework to apply iterative changes in fault location and number, compare different model modifications, and analyze test results.
△ Less
Submitted 30 October, 2023;
originally announced October 2023.
-
BEA: Revisiting anchor-based object detection DNN using Budding Ensemble Architecture
Authors:
Syed Sha Qutub,
Neslihan Kose,
Rafael Rosales,
Michael Paulitsch,
Korbinian Hagn,
Florian Geissler,
Yang Peng,
Gereon Hinz,
Alois Knoll
Abstract:
This paper introduces the Budding Ensemble Architecture (BEA), a novel reduced ensemble architecture for anchor-based object detection models. Object detection models are crucial in vision-based tasks, particularly in autonomous systems. They should provide precise bounding box detections while also calibrating their predicted confidence scores, leading to higher-quality uncertainty estimates. How…
▽ More
This paper introduces the Budding Ensemble Architecture (BEA), a novel reduced ensemble architecture for anchor-based object detection models. Object detection models are crucial in vision-based tasks, particularly in autonomous systems. They should provide precise bounding box detections while also calibrating their predicted confidence scores, leading to higher-quality uncertainty estimates. However, current models may make erroneous decisions due to false positives receiving high scores or true positives being discarded due to low scores. BEA aims to address these issues. The proposed loss functions in BEA improve the confidence score calibration and lower the uncertainty error, which results in a better distinction of true and false positives and, eventually, higher accuracy of the object detection models. Both Base-YOLOv3 and SSD models were enhanced using the BEA method and its proposed loss functions. The BEA on Base-YOLOv3 trained on the KITTI dataset results in a 6% and 3.7% increase in mAP and AP50, respectively. Utilizing a well-balanced uncertainty estimation threshold to discard samples in real-time even leads to a 9.6% higher AP50 than its base model. This is attributed to a 40% increase in the area under the AP50-based retention curve used to measure the quality of calibration of confidence scores. Furthermore, BEA-YOLOV3 trained on KITTI provides superior out-of-distribution detection on Citypersons, BDD100K, and COCO datasets compared to the ensembles and vanilla models of YOLOv3 and Gaussian-YOLOv3.
△ Less
Submitted 10 November, 2023; v1 submitted 14 September, 2023;
originally announced September 2023.
-
Hardware faults that matter: Understanding and Estimating the safety impact of hardware faults on object detection DNNs
Authors:
Syed Qutub,
Florian Geissler,
Yang Peng,
Ralf Grafe,
Michael Paulitsch,
Gereon Hinz,
Alois Knoll
Abstract:
Object detection neural network models need to perform reliably in highly dynamic and safety-critical environments like automated driving or robotics. Therefore, it is paramount to verify the robustness of the detection under unexpected hardware faults like soft errors that can impact a systems perception module. Standard metrics based on average precision produce model vulnerability estimates at…
▽ More
Object detection neural network models need to perform reliably in highly dynamic and safety-critical environments like automated driving or robotics. Therefore, it is paramount to verify the robustness of the detection under unexpected hardware faults like soft errors that can impact a systems perception module. Standard metrics based on average precision produce model vulnerability estimates at the object level rather than at an image level. As we show in this paper, this does not provide an intuitive or representative indicator of the safety-related impact of silent data corruption caused by bit flips in the underlying memory but can lead to an over- or underestimation of typical fault-induced hazards. With an eye towards safety-related real-time applications, we propose a new metric IVMOD (Image-wise Vulnerability Metric for Object Detection) to quantify vulnerability based on an incorrect image-wise object detection due to false positive (FPs) or false negative (FNs) objects, combined with a severity analysis. The evaluation of several representative object detection models shows that even a single bit flip can lead to a severe silent data corruption event with potentially critical safety implications, with e.g., up to (much greater than) 100 FPs generated, or up to approx. 90% of true positives (TPs) are lost in an image. Furthermore, with a single stuck-at-1 fault, an entire sequence of images can be affected, causing temporally persistent ghost detections that can be mistaken for actual objects (covering up to approx. 83% of the image). Furthermore, actual objects in the scene are continuously missed (up to approx. 64% of TPs are lost). Our work establishes a detailed understanding of the safety-related vulnerability of such critical workloads against hardware faults.
△ Less
Submitted 7 September, 2022;
originally announced September 2022.
-
Cooperative RADAR Sensors for the Digital Test Field A9 (KoRA9): Algorithmic Recap and Lessons Learned
Authors:
Sören Kohnert,
Julian Stähler,
Reinhard Stolle,
Florian Geissler
Abstract:
Infrastructure sensing systems in combination with Infrastructure-to-Vehicle communication can be used to enhance sensor data obtained from the perspective of a vehicle, only. This paper presents a system consisting of a radar sensor network installed at the side of the street, together with an Edge Processing Unit to fuse the data of different sensors. Measurements taken by the demonstrator are s…
▽ More
Infrastructure sensing systems in combination with Infrastructure-to-Vehicle communication can be used to enhance sensor data obtained from the perspective of a vehicle, only. This paper presents a system consisting of a radar sensor network installed at the side of the street, together with an Edge Processing Unit to fuse the data of different sensors. Measurements taken by the demonstrator are shown, the system architecture is discussed, and some lessons learned are presented.
△ Less
Submitted 4 January, 2022;
originally announced January 2022.
-
Fault-Tolerant Perception for Automated Driving A Lightweight Monitoring Approach
Authors:
Cornelius Buerkle,
Florian Geissler,
Michael Paulitsch,
Kay-Ulrich Scholl
Abstract:
While the most visible part of the safety verification process of automated vehicles concerns the planning and control system, it is often overlooked that safety of the latter crucially depends on the fault-tolerance of the preceding environment perception. Modern perception systems feature complex and often machine-learning-based components with various failure modes that can jeopardize the overa…
▽ More
While the most visible part of the safety verification process of automated vehicles concerns the planning and control system, it is often overlooked that safety of the latter crucially depends on the fault-tolerance of the preceding environment perception. Modern perception systems feature complex and often machine-learning-based components with various failure modes that can jeopardize the overall safety. At the same time, a verification by for example redundant execution is not always feasible due to resource constraints. In this paper, we address the need for feasible and efficient perception monitors and propose a lightweight approach that helps to protect the integrity of the perception system while kee** the additional compute overhead minimal. In contrast to existing solutions, the monitor is realized by a well-balanced combination of sensor checks -- here using LiDAR information -- and plausibility checks on the object motion history. It is designed to detect relevant errors in the distance and velocity of objects in the environment of the automated vehicle. In conjunction with an appropriate planning system, such a monitor can help to make safe automated driving feasible.
△ Less
Submitted 24 November, 2021;
originally announced November 2021.
-
Towards a Safety Case for Hardware Fault Tolerance in Convolutional Neural Networks Using Activation Range Supervision
Authors:
Florian Geissler,
Syed Qutub,
Sayanta Roychowdhury,
Ali Asgari,
Yang Peng,
Akash Dhamasia,
Ralf Graefe,
Karthik Pattabiraman,
Michael Paulitsch
Abstract:
Convolutional neural networks (CNNs) have become an established part of numerous safety-critical computer vision applications, including human robot interactions and automated driving. Real-world implementations will need to guarantee their robustness against hardware soft errors corrupting the underlying platform memory. Based on the previously observed efficacy of activation clip** techniques,…
▽ More
Convolutional neural networks (CNNs) have become an established part of numerous safety-critical computer vision applications, including human robot interactions and automated driving. Real-world implementations will need to guarantee their robustness against hardware soft errors corrupting the underlying platform memory. Based on the previously observed efficacy of activation clip** techniques, we build a prototypical safety case for classifier CNNs by demonstrating that range supervision represents a highly reliable fault detector and mitigator with respect to relevant bit flips, adopting an eight-exponent floating point data representation. We further explore novel, non-uniform range restriction methods that effectively suppress the probability of silent data corruptions and uncorrectable errors. As a safety-relevant end-to-end use case, we showcase the benefit of our approach in a vehicle classification scenario, using ResNet-50 and the traffic camera data set MIOVision. The quantitative evidence provided in this work can be leveraged to inspire further and possibly more complex CNN safety arguments.
△ Less
Submitted 16 August, 2021;
originally announced August 2021.
-
A Plausibility-based Fault Detection Method for High-level Fusion Perception Systems
Authors:
Florian Geissler,
Alex Unnervik,
Michael Paulitsch
Abstract:
Trustworthy environment perception is the fundamental basis for the safe deployment of automated agents such as self-driving vehicles or intelligent robots. The problem remains that such trust is notoriously difficult to guarantee in the presence of systematic faults, e.g. non-traceable errors caused by machine learning functions. One way to tackle this issue without making rather specific assumpt…
▽ More
Trustworthy environment perception is the fundamental basis for the safe deployment of automated agents such as self-driving vehicles or intelligent robots. The problem remains that such trust is notoriously difficult to guarantee in the presence of systematic faults, e.g. non-traceable errors caused by machine learning functions. One way to tackle this issue without making rather specific assumptions about the perception process is plausibility checking. Similar to the reasoning of human intuition, the final outcome of a complex black-box procedure is verified against given expectations of an object's behavior. In this article, we apply and evaluate collaborative, sensor-generic plausibility checking as a mean to detect empirical perception faults from their statistical fingerprints. Our real use case is next-generation automated driving that uses a roadside sensor infrastructure for perception augmentation, represented here by test scenarios at a German highway and a city intersection. The plausibilization analysis is integrated naturally in the object fusion process, and helps to diagnose known and possibly yet unknown faults in distributed sensing systems.
△ Less
Submitted 30 September, 2020;
originally announced September 2020.
-
Optimized sensor placement for dependable roadside infrastructures
Authors:
Florian Geissler,
Ralf Graefe
Abstract:
We present a multi-stage optimization method for efficient sensor deployment in traffic surveillance scenarios. Based on a genetic optimization scheme, our algorithm places an optimal number of roadside sensors to obtain full road coverage in the presence of obstacles and dynamic occlusions. The efficiency of the procedure is demonstrated for selected, realistic road sections. Our analysis helps t…
▽ More
We present a multi-stage optimization method for efficient sensor deployment in traffic surveillance scenarios. Based on a genetic optimization scheme, our algorithm places an optimal number of roadside sensors to obtain full road coverage in the presence of obstacles and dynamic occlusions. The efficiency of the procedure is demonstrated for selected, realistic road sections. Our analysis helps to leverage the economic feasibility of distributed infrastructure sensor networks with high perception quality.
△ Less
Submitted 10 October, 2019;
originally announced October 2019.
-
Designing a Roadside Sensor Infrastructure to Support Automated Driving
Authors:
Florian Geissler,
Sören Kohnert,
Reinhard Stolle
Abstract:
Automation of complex traffic scenarios is expected to rely on input from a roadside infrastructure to complement the vehicles' environment perception. We here explore design requirements for a prototypical setup of virtual vision or RADAR sensors along one roadside. Explicitly, we analyze the road coverage and the probability of vehicle occlusions, with the objective of evaluating the completenes…
▽ More
Automation of complex traffic scenarios is expected to rely on input from a roadside infrastructure to complement the vehicles' environment perception. We here explore design requirements for a prototypical setup of virtual vision or RADAR sensors along one roadside. Explicitly, we analyze the road coverage and the probability of vehicle occlusions, with the objective of evaluating the completeness of information that is captured by the sensor field. Simulation case studies are performed based on real traffic data acquired at the German Autobahn 9 near Munich. Our findings indicate how the sensor network should be designed in terms of sensor range, orientation and opening angle, in order to enable effective traffic detection. The achieved degree of completeness suggests that such a setup could be used to support automated vehicles to a substantial extent.
△ Less
Submitted 15 February, 2019;
originally announced February 2019.
-
A Roadmap Towards Resilient Internet of Things for Cyber-Physical Systems
Authors:
Denise Ratasich,
Faiq Khalid,
Florian Geissler,
Radu Grosu,
Muhammad Shafique,
Ezio Bartocci
Abstract:
The Internet of Things (IoT) is a ubiquitous system connecting many different devices - the things - which can be accessed from the distance. The cyber-physical systems (CPS) monitor and control the things from the distance. As a result, the concepts of dependability and security get deeply intertwined. The increasing level of dynamicity, heterogeneity, and complexity adds to the system's vulnerab…
▽ More
The Internet of Things (IoT) is a ubiquitous system connecting many different devices - the things - which can be accessed from the distance. The cyber-physical systems (CPS) monitor and control the things from the distance. As a result, the concepts of dependability and security get deeply intertwined. The increasing level of dynamicity, heterogeneity, and complexity adds to the system's vulnerability, and challenges its ability to react to faults. This paper summarizes state-of-the-art of existing work on anomaly detection, fault-tolerance and self-healing, and adds a number of other methods applicable to achieve resilience in an IoT. We particularly focus on non-intrusive methods ensuring data integrity in the network. Furthermore, this paper presents the main challenges in building a resilient IoT for CPS which is crucial in the era of smart CPS with enhanced connectivity (an excellent example of such a system is connected autonomous vehicles). It further summarizes our solutions, work-in-progress and future work to this topic to enable "Trustworthy IoT for CPS". Finally, this framework is illustrated on a selected use case: A smart sensor infrastructure in the transport domain.
△ Less
Submitted 6 November, 2018; v1 submitted 16 October, 2018;
originally announced October 2018.
-
Backscattering in a helical liquid induced by Rashba spin-orbit coupling and electron interactions: locality, symmetry, and cutoff aspects
Authors:
Maxim Kharitonov,
Florian Geissler,
Björn Trauzettel
Abstract:
The combination of the time-reversal-symmetric single-particle backscattering field (commonly known as Rashba spin-orbit coupling) and non-backscattering electron interactions is generally expected to produce inelastic backscattering in 1D helical electron liquids at the edge of 2D topological insulators, as theoretically predicted in a number of works. An opposite conclusion of absent backscatter…
▽ More
The combination of the time-reversal-symmetric single-particle backscattering field (commonly known as Rashba spin-orbit coupling) and non-backscattering electron interactions is generally expected to produce inelastic backscattering in 1D helical electron liquids at the edge of 2D topological insulators, as theoretically predicted in a number of works. An opposite conclusion of absent backscattering was reached in a recent work [H.-Y. Xie et al., Phys. Rev. Lett. 116, 086603 (2016)] for the "local" model of the backscattering field and interactions. Motivated to resolve this potential controversy, in the present work, we study backscattering effects employing fermionic perturbation theory and considering quite general forms of the backscattering field and electron interactions. We discover that backscattering effects are crucially sensitive to the locality properties of the backscattering field and electron interactions, to the symmetry of the latter, as well as to the presence or absence of the cutoff of the electron spectrum. We find that backscattering is indeed absent under the following assumptions: (i) local backscattering field; (ii.a) local or (ii.b) SU(2)-symmetric interactions; (iii) absent cutoff of the edge-state spectrum. However, violation of any of these conditions leads to backscattering. This also reconciles with the results based on the bosonization technique. We calculate the associated backscattering current, establish its low-bias scaling behavior, and predict a crossover between two different scaling regimes. The main implication of our findings is that backscattering of some magnitude is inevitable in a real system, although could be quite suppressed for nearly local backscattering field and interactions.
△ Less
Submitted 27 June, 2017;
originally announced June 2017.
-
When intuition fails in assessing conditional risks: the example of the frog riddle
Authors:
Daniel Hetterich,
Florian Geissler
Abstract:
Recently, the educational initiative TED-Ed has published a popular brain teaser coined the 'frog riddle', which illustrates non-intuitive implications of conditional probabilities. In its intended form, the frog riddle is a reformulation of the classic boy-girl paradox. However, the authors alter the narrative of the riddle in a form, that subtly changes the way information is conveyed. The prese…
▽ More
Recently, the educational initiative TED-Ed has published a popular brain teaser coined the 'frog riddle', which illustrates non-intuitive implications of conditional probabilities. In its intended form, the frog riddle is a reformulation of the classic boy-girl paradox. However, the authors alter the narrative of the riddle in a form, that subtly changes the way information is conveyed. The presented solution, unfortunately, does not take this point into full account, and as a consequence, lacks consistency in the sense that different parts of the problem are treated on unequal footing. We here review, how the mechanism of receiving information matters, and why this is exactly the reason that such kind of problems challenge intuitive thinking. Subsequently, we present a generalized solution, that accounts for the above difficulties, and preserves full logical consistency. Eventually, the relation to the boy-girl paradox is discussed.
△ Less
Submitted 2 May, 2017;
originally announced May 2017.
-
Magnetic moments in a helical edge can make weak correlations seem strong
Authors:
Jukka I. Väyrynen,
Florian Geissler,
Leonid I. Glazman
Abstract:
We study the effect of localized magnetic moments on the conductance of a helical edge. Interaction with a local moment is an effective backscattering mechanism for the edge electrons. We evaluate the resulting differential conductance as a function of temperature $T$ and applied bias $V$ for any value of $V/T$. Backscattering off magnetic moments, combined with the weak repulsion between the edge…
▽ More
We study the effect of localized magnetic moments on the conductance of a helical edge. Interaction with a local moment is an effective backscattering mechanism for the edge electrons. We evaluate the resulting differential conductance as a function of temperature $T$ and applied bias $V$ for any value of $V/T$. Backscattering off magnetic moments, combined with the weak repulsion between the edge electrons results in a power-law temperature and voltage dependence of the conductance; the corresponding small positive exponent is indicative of insulating behavior. Local moments may naturally appear due to charge disorder in a narrow-gap semiconductor. Our results provide an alternative interpretation of the recent experiment by Li et al. \cite{Li15} where a power-law suppression of the conductance was attributed to strong electron repulsion within the edge, with the value of Luttinger liquid parameter $K$ fine-tuned close to $1/4$.
△ Less
Submitted 20 December, 2016; v1 submitted 25 February, 2016;
originally announced February 2016.
-
Evidence for broken Galilean invariance at the quantum spin Hall edge
Authors:
Florian Geissler,
François Crépin,
Björn Trauzettel
Abstract:
We study transport properties of the helical edge channels of a quantum spin Hall (QSH) insulator, in the presence of electron-electron interactions and weak, local Rashba spin-orbit coupling. The combination of the two allows for inelastic backscattering that does not break time-reversal symmetry (TRS), resulting in interaction-dependent power law corrections to the conductance. Here, we use a no…
▽ More
We study transport properties of the helical edge channels of a quantum spin Hall (QSH) insulator, in the presence of electron-electron interactions and weak, local Rashba spin-orbit coupling. The combination of the two allows for inelastic backscattering that does not break time-reversal symmetry (TRS), resulting in interaction-dependent power law corrections to the conductance. Here, we use a non-equilibrium Keldysh formalism to describe the situation of a long, one-dimensional edge channel coupled to external reservoirs, where the applied bias is the leading energy scale. By calculating explicitly the corrections to the conductance up to fourth order of the impurity strength, we analyse correlated single- and two-particle backscattering processes on a microscopic level. Interestingly, we show that the modeling of the leads together with the breaking of Galilean invariance has important consequences on the transport properties. Such breaking occurs, because the Galilean invariance of the bulk spectrum transforms into an emergent Lorentz invariance of the edge spectrum. With this broken Galilean invariance at the QSH edge, we find a contribution to single particle backscattering with a very low power scaling, while in the presence of Galilean invariance the leading contribution would be due to correlated two-particle backscattering only. This difference is further reflected in different values of the Fano factor of the shot noise, an experimentally observable quantity. The described behaviour is specific to the Rashba scatterer, and does not occur in the case of backscattering off a time-reversal breaking, magnetic impurity.
△ Less
Submitted 13 January, 2016; v1 submitted 23 July, 2015;
originally announced July 2015.
-
Random Rashba spin-orbit coupling at the quantum spin Hall edge
Authors:
Florian Geissler,
Francois Crépin,
Björn Trauzettel
Abstract:
We study a one-dimensional helical system with random Rashba spin-orbit coupling. Using renor- malization group methods, we derive a consistent set of flow equations governing the important con- trol parameters of the backscattering process. Thereby, we prove the existence of disorder-induced two-particle backscattering that can even be non-local in space. This analysis allows us to derive the sca…
▽ More
We study a one-dimensional helical system with random Rashba spin-orbit coupling. Using renor- malization group methods, we derive a consistent set of flow equations governing the important con- trol parameters of the backscattering process. Thereby, we prove the existence of disorder-induced two-particle backscattering that can even be non-local in space. This analysis allows us to derive the scaling form of the conductance at low temperatures. We find that two-particle backscattering due to random spin-orbit coupling differs from the one off a single Rashba impurity by both the scaling of the conductance with the temperature and the relevance of the backscattering operators.
△ Less
Submitted 9 July, 2014; v1 submitted 5 March, 2014;
originally announced March 2014.
-
Group theoretical and topological analysis of the quantum spin Hall effect in silicene
Authors:
Florian Geissler,
Jan Carl Budich,
Björn Trauzettel
Abstract:
Silicene consists of a monolayer of silicon atoms in a buckled honeycomb structure. It was recently discovered that the symmetry of such a system allows for interesting Rashba spin-orbit effects. A perpendicular electric field is able to couple to the sublattice pseudospin, making it possible to electrically tune and close the band gap. Therefore, external electric fields may generate a topologica…
▽ More
Silicene consists of a monolayer of silicon atoms in a buckled honeycomb structure. It was recently discovered that the symmetry of such a system allows for interesting Rashba spin-orbit effects. A perpendicular electric field is able to couple to the sublattice pseudospin, making it possible to electrically tune and close the band gap. Therefore, external electric fields may generate a topological phase transition from a topological insulator to a normal insulator (or semimetal) and vice versa. The contribution of the present article to the study of silicene is twofold: First, we perform a group theoretical analysis to systematically construct the Hamiltonian in the vicinity of the $K$ points of the Brillouin zone and discover a new, but symmetry allowed term. Subsequently, we identify a tight binding model that corresponds to the group theoretically derived Hamiltonian near the $K$ points. Second, we start from this tight binding model to analyze the topological phase diagram of silicene by an explicit calculation of the $Z_2$ topological invariant of the band structure. To this end, we calculate the $Z_2$ topological invariant of the honeycomb lattice in a manifestly gauge invariant way which allows us to include $S_z$ symmetry breaking terms -- like Rashba spin orbit interaction -- into the topological analysis. Interestingly, we find that the interplay of two Rashba terms can generate a non-trivial quantum spin Hall phase in silicene. This is in sharp contrast to the more extensively studied honeycomb system graphene where Rashba spin orbit interaction is known to compete with the quantum spin Hall effect in a potentially detrimental way.
△ Less
Submitted 2 September, 2013; v1 submitted 3 May, 2013;
originally announced May 2013.
-
Synchronization of unidirectional time delay chaotic networks and the greatest common divisor
Authors:
I. Kanter,
M. Zigzag,
A. Englert,
F. Geissler,
W. Kinzel
Abstract:
We present the interplay between synchronization of unidirectional coupled chaotic nodes with heterogeneous delays and the greatest common divisor (GCD) of loops composing the oriented graph. In the weak chaos region and for GCD=1 the network is in chaotic zero-lag synchronization, whereas for GCD=m>1 synchronization of m-sublattices emerges. Complete synchronization can be achieved when all chaot…
▽ More
We present the interplay between synchronization of unidirectional coupled chaotic nodes with heterogeneous delays and the greatest common divisor (GCD) of loops composing the oriented graph. In the weak chaos region and for GCD=1 the network is in chaotic zero-lag synchronization, whereas for GCD=m>1 synchronization of m-sublattices emerges. Complete synchronization can be achieved when all chaotic nodes are influenced by an identical set of delays and in particular for the limiting case of homogeneous delays. Results are supported by simulations of chaotic systems, self-consistent and mixing arguments, as well as analytical solutions of Bernoulli maps.
△ Less
Submitted 28 March, 2011; v1 submitted 5 December, 2010;
originally announced December 2010.