The Structure and Dynamics of Massive High-$z$ Cosmic-Web Filaments: Three Radial Zones in Filament Cross-Sections
Authors:
Yue Samuel Lu,
Nir Mandelker,
S. Peng Oh,
Avishai Dekel,
Frank C. van den Bosch,
Volker Springel,
Daisuke Nagai,
Freeke van de Voort
Abstract:
We analyse the internal structure and dynamics of cosmic-web filaments that connect massive high-$z$ haloes. Our analysis is based on a high-resolution AREPO cosmological simulation zooming-in on a volume encompassing three ${\rm Mpc}$-scale filaments feeding three massive haloes of $\sim 10^{12}\,\text{M}_\odot$ at $z \sim 4$, embedded in a large-scale sheet. Each filament is surrounded by a cyli…
▽ More
We analyse the internal structure and dynamics of cosmic-web filaments that connect massive high-$z$ haloes. Our analysis is based on a high-resolution AREPO cosmological simulation zooming-in on a volume encompassing three ${\rm Mpc}$-scale filaments feeding three massive haloes of $\sim 10^{12}\,\text{M}_\odot$ at $z \sim 4$, embedded in a large-scale sheet. Each filament is surrounded by a cylindrical accretion shock of radius $r_{\rm shock} \sim 50 \,{\rm kpc}$. The post-shock gas is in virial equilibrium with the potential well set by an isothermal dark-matter filament. The filament line-mass is $\sim 9\times 10^8\,\text{M}_\odot\,{\rm kpc}^{-1}$, the gas fraction within $r_{\rm shock}$ is the universal baryon fraction, and the virial temperature is $\sim 7\times 10^5 {\rm K}$. In the outer ''thermal'' (T) zone, $r \geq 0.65 \, r_{\rm shock}$, inward gravity and ram-pressure forces are over-balanced by outwards thermal pressure forces, decelerating the inflowing gas expanding the shock outward. In the intermediate ''vortex'' (V) zone, $0.25 \leq r/ r_{\rm shock} \leq 0.65$, the velocity field is dominated by a quadrupolar vortex structure due to offset inflow along the sheet through the post-shock gas. The outwards force is dominated by centrifugal forces associated with these vortices, with additional contributions from global rotation and thermal pressure. The shear and turbulent forces associated with the vortices act inward. The inner ''stream'' (S) zone, $r < 0.25 \, r_{\rm shock}$, is a dense isothermal core, $T\sim 3 \times 10^4 \, {\rm K}$ and $n_{\rm H}\sim 0.01 \,{\rm cm^{-3}}$, defining the cold streams that feed galaxies. The core is formed by an isobaric cooling flow and is associated with a decrease in outwards forces, though it exhibits both inflows and outflows. [abridged]
△ Less
Submitted 20 November, 2023; v1 submitted 6 June, 2023;
originally announced June 2023.
Increasing the Cost of Model Extraction with Calibrated Proof of Work
Authors:
Adam Dziedzic,
Muhammad Ahmad Kaleem,
Yu Shen Lu,
Nicolas Papernot
Abstract:
In model extraction attacks, adversaries can steal a machine learning model exposed via a public API by repeatedly querying it and adjusting their own model based on obtained predictions. To prevent model stealing, existing defenses focus on detecting malicious queries, truncating, or distorting outputs, thus necessarily introducing a tradeoff between robustness and model utility for legitimate us…
▽ More
In model extraction attacks, adversaries can steal a machine learning model exposed via a public API by repeatedly querying it and adjusting their own model based on obtained predictions. To prevent model stealing, existing defenses focus on detecting malicious queries, truncating, or distorting outputs, thus necessarily introducing a tradeoff between robustness and model utility for legitimate users. Instead, we propose to impede model extraction by requiring users to complete a proof-of-work before they can read the model's predictions. This deters attackers by greatly increasing (even up to 100x) the computational effort needed to leverage query access for model extraction. Since we calibrate the effort required to complete the proof-of-work to each query, this only introduces a slight overhead for regular users (up to 2x). To achieve this, our calibration applies tools from differential privacy to measure the information revealed by a query. Our method requires no modification of the victim model and can be applied by machine learning practitioners to guard their publicly exposed models against being easily stolen.
△ Less
Submitted 12 December, 2022; v1 submitted 23 January, 2022;
originally announced January 2022.