Skip to main content

Showing 1–10 of 10 results for author: Loncaric, M

.
  1. arXiv:2310.13810  [pdf

    cs.LG

    A Better Match for Drivers and Riders: Reinforcement Learning at Lyft

    Authors: Xabi Azagirre, Akshay Balwally, Guillaume Candeli, Nicholas Chamandy, Benjamin Han, Alona King, Hyungjun Lee, Martin Loncaric, Sebastien Martin, Vijay Narasiman, Zhiwei, Qin, Baptiste Richard, Sara Smoot, Sean Taylor, Garrett van Ryzin, Di Wu, Fei Yu, Alex Zamoshchin

    Abstract: To better match drivers to riders in our ridesharing application, we revised Lyft's core matching algorithm. We use a novel online reinforcement learning approach that estimates the future earnings of drivers in real time and use this information to find more efficient matches. This change was the first documented implementation of a ridesharing matching algorithm that can learn and improve in rea… ▽ More

    Submitted 13 November, 2023; v1 submitted 20 October, 2023; originally announced October 2023.

  2. Entanglement distribution quantum networking within deployed telecommunications fibre-optic infrastructure

    Authors: Marcus J Clark, Obada Alia, Rui Wang, Sima Bahrani, Matej Peranic, Djeylan Aktas, George T Kanellos, Martin Loncaric, Zeljko Samec, Anton Radman, Mario Stipcevic, Reza Nejabati, Dimitra Simeonidou, John G Rarity, Siddarth K Joshi

    Abstract: Quantum networks have been shown to connect users with full-mesh topologies without trusted nodes. We present advancements on our scalable polarisation entanglement-based quantum network testbed, which has the ability to perform protocols beyond simple quantum key distribution. Our approach utilises wavelength multiplexing, which is ideal for quantum networks across local metropolitan areas due to… ▽ More

    Submitted 10 February, 2023; v1 submitted 16 November, 2022; originally announced November 2022.

    Comments: 8 pages, 4 figures, 2 tables, SPIE Photonex 2022 conference proceedings

    Journal ref: Proc. SPIE 12335, Quantum Technology: Driving Commercialisation of an Enabling Science III, 123350E (11 January 2023)

  3. Polarization compensation methods for quantum communication networks

    Authors: Matej Peranic, Marcus Clark, Rui Wang, Sima Bahrani, Obada Alia, Soren Wengerowsky, Anton Radman, Martin Loncaric, Mario Stipcevic, John Rarity, Reza Nejabati, Siddarth K Joshi

    Abstract: The information-theoretic unconditional security offered by quantum key distribution has spurred the development of larger quantum communication networks. However, as these networks grow so does the strong need to reduce complexity and overheads. Polarization based entanglement distribution networks are a promising approach due to their scalability and lack of trusted nodes. Nevertheless, they are… ▽ More

    Submitted 30 November, 2023; v1 submitted 29 August, 2022; originally announced August 2022.

    Journal ref: EPJ Quantum Technol. 10, 30 (2023)

  4. Deploying an inter-European quantum network

    Authors: Domenico Ribezzo, Mujtaba Zahidy, Ilaria Vagniluca, Nicola Biagi, Saverio Francesconi, Tommaso Occhipinti, Leif K. Oxenløwe, Martin Lončarić, Ivan Cvitić, Mario Stipčević, Žiga Pušavec, Rainer Kaltenbaek, Anton Ramšak, Francesco Cesa, Giorgio Giorgetti, Francesco Scazza, Angelo Bassi, Paolo De Natale, Francesco Saverio Cataliotti, Massimo Inguscio, Davide Bacco, Alessandro Zavatta

    Abstract: Around forty years have passed since the first pioneering works have introduced the possibility of using quantum physics to strongly enhance communications safety. Nowadays Quantum Cryptography, and in particular, Quantum Key Distribution (QKD) exited the physics laboratories to become commercial technologies that increasingly trigger the attention of States, military forces, banks, and private co… ▽ More

    Submitted 21 March, 2022; originally announced March 2022.

    Comments: 8 pages, 3 figures

    Journal ref: Adv Quantum Technol. 2023, 6, 2200061

  5. Unconditionally secure digital signatures implemented in an 8-user quantum network

    Authors: Yoann Pelet, Ittoop Vergheese Puthoor, Natarajan Venkatachalam, Sören Wengerowsky, Martin Lončarić, Sebastian Philipp Neumann, Bo Liu, Željko Samec, Mario Stipčević, Rupert Ursin, Erika Andersson, John G. Rarity, Djeylan Aktas, Siddarth Koduru Joshi

    Abstract: The ability to know and verifiably demonstrate the origins of messages can often be as important as encrypting the message itself. Here we present an experimental demonstration of an unconditionally secure digital signature (USS) protocol implemented for the first time, to the best of our knowledge, on a fully connected quantum network without trusted nodes. Our USS protocol is secure against forg… ▽ More

    Submitted 10 February, 2022; v1 submitted 9 February, 2022; originally announced February 2022.

    Comments: Preprint, 9 pages, 7 figures, 1 table

  6. Scalable authentication and optimal flooding in a quantum network

    Authors: Naomi R. Solomons, Alasdair I. Fletcher, Djeylan Aktas, Natarajan Venkatachalam, Sören Wengerowsky, Martin Lončarić, Sebastian P. Neumann, Bo Liu, Željko Samec, Mario Stipčević, Rupert Ursin, Stefano Pirandola, John G. Rarity, Siddarth Koduru Joshi

    Abstract: The global interest in quantum networks stems from the security guaranteed by the laws of physics. Deploying quantum networks means facing the challenges of scaling up the physical hardware and, more importantly, of scaling up all other network layers and optimally utilising network resources. Here we consider two related protocols, their experimental demonstrations on an 8-user quantum network te… ▽ More

    Submitted 21 June, 2023; v1 submitted 28 January, 2021; originally announced January 2021.

    Comments: New version includes changes suggested by referees, and a modification to an incorrect calculation. Fig. 6 has been updated correspondingly. With thanks to Rui Wang for spotting the mistake, and the referees for detailed feedback

    Journal ref: PRX Quantum 3, 020311 (2022)

  7. arXiv:2011.09480  [pdf, other

    quant-ph cs.CR cs.ET

    Experimental implementation of secure anonymous protocols on an eight-user quantum network

    Authors: Zixin Huang, Siddarth Koduru Joshi, Djeylan Aktas, Cosmo Lupo, Armanda O. Quintavalle, Natarajan Venkatachalam, Sören Wengerowsky, Martin Lončarić, Sebastian Philipp Neumann, Bo Liu, Željko Samec, Laurent Kling, Mario Stipčević, Rupert Ursin, John G. Rarity

    Abstract: Anonymity in networked communication is vital for many privacy-preserving tasks. Secure key distribution alone is insufficient for high-security communications, often knowing who transmits a message to whom and when must also be kept hidden from an adversary. Here we experimentally demonstrate 5 information-theoretically secure anonymity protocols on an 8 user city-wide quantum network using polar… ▽ More

    Submitted 18 November, 2020; originally announced November 2020.

    Comments: 11 pages, 4 figures, 1 table, experimental work. ZH and SKJ contributed equally to this work and are joint first authors

  8. A trusted-node-free eight-user metropolitan quantum communication network

    Authors: Siddarth Koduru Joshi, Djeylan Aktas, Sören Wengerowsky, Martin Lončarić, Sebastian Philipp Neumann, Bo Liu, Thomas Scheidl, Guillermo Currás-Lorenzo, Željko Samec, Laurent Kling, Alex Qiu, Mohsen Razavi, Mario Stipčević, John G. Rarity, Rupert Ursin

    Abstract: Quantum communication is rapidly gaining popularity due to its high security and technological maturity. However, most implementations are limited to just two communicating parties (users). Quantum communication networks aim to connect a multitude of users. Here we present a fully connected quantum communication network on a city wide scale without active switching or trusted nodes. We demonstrate… ▽ More

    Submitted 11 September, 2020; v1 submitted 18 July, 2019; originally announced July 2019.

    Comments: 16 pages, 9 figures, 3 tables. Corrected typos, updated references

    Journal ref: Science Advances 6, no. 36 (2020): eaba0959

  9. arXiv:1810.01008  [pdf, other

    cs.LG cs.CV stat.ML

    Learning Hash Codes via Hamming Distance Targets

    Authors: Martin Loncaric, Bowei Liu, Ryan Weber

    Abstract: We present a powerful new loss function and training scheme for learning binary hash codes with any differentiable model and similarity function. Our loss function improves over prior methods by using log likelihood loss on top of an accurate approximation for the probability that two inputs fall within a Hamming distance target. Our novel training scheme obtains a good estimate of the true gradie… ▽ More

    Submitted 1 October, 2018; originally announced October 2018.

    Comments: 8 pages, overhaul of our previous submission Convolutional Hashing for Automated Scene Matching

  10. arXiv:1802.03101  [pdf, other

    cs.CV cs.IR stat.ML

    Convolutional Hashing for Automated Scene Matching

    Authors: Martin Loncaric, Bowei Liu, Ryan Weber

    Abstract: We present a powerful new loss function and training scheme for learning binary hash functions. In particular, we demonstrate our method by creating for the first time a neural network that outperforms state-of-the-art Haar wavelets and color layout descriptors at the task of automated scene matching. By accurately relating distance on the manifold of network outputs to distance in Hamming space,… ▽ More

    Submitted 8 February, 2018; originally announced February 2018.

    Comments: 9 pages, 4 figures, 4 tables

    MSC Class: 68T45