-
Spectroscopy of magnetized black holes and topological stars
Authors:
Alexandru Dima,
Marco Melis,
Paolo Pani
Abstract:
We study the linear response of four dimensional magnetized black holes and regular topological stars arising from dimensional compactification of Einstein-Maxwell theory in five dimensions. We consider both radial and nonradial perturbations and study the stability of these solutions, both in the frequency and in the time domain. Due to the presence of magnetic fluxes in the background, axial (i.…
▽ More
We study the linear response of four dimensional magnetized black holes and regular topological stars arising from dimensional compactification of Einstein-Maxwell theory in five dimensions. We consider both radial and nonradial perturbations and study the stability of these solutions, both in the frequency and in the time domain. Due to the presence of magnetic fluxes in the background, axial (i.e., odd-parity) gravitational perturbations are coupled to polar (i.e., even-parity) electromagnetic perturbations (Type-I sector) whereas polar gravitational and scalar perturbations are coupled to axial electromagnetic ones (Type-II sector). We provide a comprehensive analytical and numerical study of the radial perturbations and of the Type I sector, finding no evidence of linear instabilities (besides the already known Gregory-Laflamme instability of black strings occurring only in a certain range of the parameters), even despite the fact that the effective potential for radial perturbations of topological stars is negative and divergent near the inner boundary. Ultracompact topological stars exhibit long-lived trapped modes that give rise to echoes in the time-domain response. Their prompt response is very similar to that of the corresponding black hole with comparable charge-to-mass ratio. This provides a concrete realization of ultracompact objects arising from a well-defined theory. The numerical analysis of the Type-II sector will appear in a companion paper.
△ Less
Submitted 27 June, 2024;
originally announced June 2024.
-
Gauge-invariant coefficients in perturbative quantum gravity
Authors:
Fiorenzo Bastianelli,
Roberto Bonezzi,
Marco Melis
Abstract:
Heat kernel methods are useful for studying properties of quantum gravity. We recompute here the first three heat kernel coefficients in perturbative quantum gravity with cosmological constant to ascertain which ones are correctly reported in the literature. They correspond to the counterterms needed to renormalize the one-loop effective action in four dimensions. They may be evaluated at arbitrar…
▽ More
Heat kernel methods are useful for studying properties of quantum gravity. We recompute here the first three heat kernel coefficients in perturbative quantum gravity with cosmological constant to ascertain which ones are correctly reported in the literature. They correspond to the counterterms needed to renormalize the one-loop effective action in four dimensions. They may be evaluated at arbitrary dimensions $D$, in which case they identify only a subset of the divergences appearing in the effective action for $D\geq 6$. Generically, these coefficients depend on the gauge-fixing choice adopted in quantizing the Einstein-Hilbert action. However, they become gauge-invariant once evaluated on-shell, i.e. using Einstein's field equations with cosmological constant. We identify them and use them as a benchmark for checking alternative approaches to perturbative quantum gravity. One such approach describes the graviton in first-quantization through the use of the action of the ${\cal N}=4$ spinning particle, characterized by four supersymmetries on the worldline and a set of worldline gauge invariances. This description has been used for computing the gauge-invariant coefficients as well. We verify their correctness at $D=4$, but find a mismatch at arbitrary $D$ when comparing with the benchmark fixed earlier. We interpret this result as signaling that the path integral quantization of the ${\cal N}=4$ spinning particle should be amended. We perform this task by fixing the correct counterterm that must be used in the worldline path integral quantization of the ${\cal N}=4$ spinning particle to make it consistent in arbitrary dimensions.
△ Less
Submitted 27 June, 2022;
originally announced June 2022.
-
DEIS: Dependability Engineering Innovation for Industrial CPS
Authors:
Erik Armengaud,
Georg Macher,
Alexander Massoner,
Sebastian Frager,
Rasmus Adler,
Daniel Schneider,
Simone Longo,
Massimiliano Melis,
Riccardo Groppo,
Federica Villa,
Padraig OLeary,
Kevin Bambury,
Finnegan Anita,
Marc Zeller,
Kai Hoefig,
Yiannis Papadopoulos,
Richard Hawkins,
Tim Kelly
Abstract:
The open and cooperative nature of Cyber-Physical Systems (CPS) poses new challenges in assuring dependability. The DEIS project (Dependability Engineering Innovation for automotive CPS. This project has received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No 732242, see http://www.deis-project.eu) addresses these challenges by develo**…
▽ More
The open and cooperative nature of Cyber-Physical Systems (CPS) poses new challenges in assuring dependability. The DEIS project (Dependability Engineering Innovation for automotive CPS. This project has received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No 732242, see http://www.deis-project.eu) addresses these challenges by develo** technologies that form a science of dependable system integration. In the core of these technologies lies the concept of a Digital Dependability Identity (DDI) of a component or system. DDIs are modular, composable, and executable in the field facilitating (a) efficient synthesis of component and system dependability information over the supply chain and (b) effective evaluation of this information in-the-field for safe and secure composition of highly distributed and autonomous CPS. The paper outlines the DDI concept and opportunities for application in four industrial use cases.
△ Less
Submitted 3 June, 2021;
originally announced June 2021.
-
FADER: Fast Adversarial Example Rejection
Authors:
Francesco Crecchi,
Marco Melis,
Angelo Sotgiu,
Davide Bacciu,
Battista Biggio
Abstract:
Deep neural networks are vulnerable to adversarial examples, i.e., carefully-crafted inputs that mislead classification at test time. Recent defenses have been shown to improve adversarial robustness by detecting anomalous deviations from legitimate training samples at different layer representations - a behavior normally exhibited by adversarial attacks. Despite technical differences, all aforeme…
▽ More
Deep neural networks are vulnerable to adversarial examples, i.e., carefully-crafted inputs that mislead classification at test time. Recent defenses have been shown to improve adversarial robustness by detecting anomalous deviations from legitimate training samples at different layer representations - a behavior normally exhibited by adversarial attacks. Despite technical differences, all aforementioned methods share a common backbone structure that we formalize and highlight in this contribution, as it can help in identifying promising research directions and drawbacks of existing methods. The first main contribution of this work is the review of these detection methods in the form of a unifying framework designed to accommodate both existing defenses and newer ones to come. In terms of drawbacks, the overmentioned defenses require comparing input samples against an oversized number of reference prototypes, possibly at different representation layers, dramatically worsening the test-time efficiency. Besides, such defenses are typically based on ensembling classifiers with heuristic methods, rather than optimizing the whole architecture in an end-to-end manner to better perform detection. As a second main contribution of this work, we introduce FADER, a novel technique for speeding up detection-based methods. FADER overcome the issues above by employing RBF networks as detectors: by fixing the number of required prototypes, the runtime complexity of adversarial examples detectors can be controlled. Our experiments outline up to 73x prototypes reduction compared to analyzed detectors for MNIST dataset and up to 50x for CIFAR10 dataset respectively, without sacrificing classification accuracy on both clean and adversarial data.
△ Less
Submitted 18 October, 2020;
originally announced October 2020.
-
Do Gradient-based Explanations Tell Anything About Adversarial Robustness to Android Malware?
Authors:
Marco Melis,
Michele Scalas,
Ambra Demontis,
Davide Maiorca,
Battista Biggio,
Giorgio Giacinto,
Fabio Roli
Abstract:
While machine-learning algorithms have demonstrated a strong ability in detecting Android malware, they can be evaded by sparse evasion attacks crafted by injecting a small set of fake components, e.g., permissions and system calls, without compromising intrusive functionality. Previous work has shown that, to improve robustness against such attacks, learning algorithms should avoid overemphasizin…
▽ More
While machine-learning algorithms have demonstrated a strong ability in detecting Android malware, they can be evaded by sparse evasion attacks crafted by injecting a small set of fake components, e.g., permissions and system calls, without compromising intrusive functionality. Previous work has shown that, to improve robustness against such attacks, learning algorithms should avoid overemphasizing few discriminant features, providing instead decisions that rely upon a large subset of components. In this work, we investigate whether gradient-based attribution methods, used to explain classifiers' decisions by identifying the most relevant features, can be used to help identify and select more robust algorithms. To this end, we propose to exploit two different metrics that represent the evenness of explanations, and a new compact security measure called Adversarial Robustness Metric. Our experiments conducted on two different datasets and five classification algorithms for Android malware detection show that a strong connection exists between the uniformity of explanations and adversarial robustness. In particular, we found that popular techniques like Gradient*Input and Integrated Gradients are strongly correlated to security when applied to both linear and nonlinear detectors, while more elementary explanation techniques like the simple Gradient do not provide reliable information about the robustness of such classifiers.
△ Less
Submitted 27 May, 2021; v1 submitted 4 May, 2020;
originally announced May 2020.
-
secml: A Python Library for Secure and Explainable Machine Learning
Authors:
Maura Pintor,
Luca Demetrio,
Angelo Sotgiu,
Marco Melis,
Ambra Demontis,
Battista Biggio
Abstract:
We present \texttt{secml}, an open-source Python library for secure and explainable machine learning. It implements the most popular attacks against machine learning, including test-time evasion attacks to generate adversarial examples against deep neural networks and training-time poisoning attacks against support vector machines and many other algorithms. These attacks enable evaluating the secu…
▽ More
We present \texttt{secml}, an open-source Python library for secure and explainable machine learning. It implements the most popular attacks against machine learning, including test-time evasion attacks to generate adversarial examples against deep neural networks and training-time poisoning attacks against support vector machines and many other algorithms. These attacks enable evaluating the security of learning algorithms and the corresponding defenses under both white-box and black-box threat models. To this end, \texttt{secml} provides built-in functions to compute security evaluation curves, showing how quickly classification performance decreases against increasing adversarial perturbations of the input data. \texttt{secml} also includes explainability methods to help understand why adversarial attacks succeed against a given model, by visualizing the most influential features and training prototypes contributing to each decision. It is distributed under the Apache License 2.0 and hosted at \url{https://github.com/pralab/secml}.
△ Less
Submitted 13 May, 2022; v1 submitted 20 December, 2019;
originally announced December 2019.
-
Deep Neural Rejection against Adversarial Examples
Authors:
Angelo Sotgiu,
Ambra Demontis,
Marco Melis,
Battista Biggio,
Giorgio Fumera,
Xiaoyi Feng,
Fabio Roli
Abstract:
Despite the impressive performances reported by deep neural networks in different application domains, they remain largely vulnerable to adversarial examples, i.e., input samples that are carefully perturbed to cause misclassification at test time. In this work, we propose a deep neural rejection mechanism to detect adversarial examples, based on the idea of rejecting samples that exhibit anomalou…
▽ More
Despite the impressive performances reported by deep neural networks in different application domains, they remain largely vulnerable to adversarial examples, i.e., input samples that are carefully perturbed to cause misclassification at test time. In this work, we propose a deep neural rejection mechanism to detect adversarial examples, based on the idea of rejecting samples that exhibit anomalous feature representations at different network layers. With respect to competing approaches, our method does not require generating adversarial examples at training time, and it is less computationally demanding. To properly evaluate our method, we define an adaptive white-box attack that is aware of the defense mechanism and aims to bypass it. Under this worst-case setting, we empirically show that our approach outperforms previously-proposed methods that detect adversarial examples by only analyzing the feature representation provided by the output network layer.
△ Less
Submitted 17 April, 2020; v1 submitted 1 October, 2019;
originally announced October 2019.
-
Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks
Authors:
Ambra Demontis,
Marco Melis,
Maura Pintor,
Matthew Jagielski,
Battista Biggio,
Alina Oprea,
Cristina Nita-Rotaru,
Fabio Roli
Abstract:
Transferability captures the ability of an attack against a machine-learning model to be effective against a different, potentially unknown, model. Empirical evidence for transferability has been shown in previous work, but the underlying reasons why an attack transfers or not are not yet well understood. In this paper, we present a comprehensive analysis aimed to investigate the transferability o…
▽ More
Transferability captures the ability of an attack against a machine-learning model to be effective against a different, potentially unknown, model. Empirical evidence for transferability has been shown in previous work, but the underlying reasons why an attack transfers or not are not yet well understood. In this paper, we present a comprehensive analysis aimed to investigate the transferability of both test-time evasion and training-time poisoning attacks. We provide a unifying optimization framework for evasion and poisoning attacks, and a formal definition of transferability of such attacks. We highlight two main factors contributing to attack transferability: the intrinsic adversarial vulnerability of the target model, and the complexity of the surrogate model used to optimize the attack. Based on these insights, we define three metrics that impact an attack's transferability. Interestingly, our results derived from theoretical analysis hold for both evasion and poisoning attacks, and are confirmed experimentally using a wide range of linear and non-linear classifiers and datasets.
△ Less
Submitted 13 June, 2019; v1 submitted 8 September, 2018;
originally announced September 2018.
-
Explaining Black-box Android Malware Detection
Authors:
Marco Melis,
Davide Maiorca,
Battista Biggio,
Giorgio Giacinto,
Fabio Roli
Abstract:
Machine-learning models have been recently used for detecting malicious Android applications, reporting impressive performances on benchmark datasets, even when trained only on features statically extracted from the application, such as system calls and permissions. However, recent findings have highlighted the fragility of such in-vitro evaluations with benchmark datasets, showing that very few c…
▽ More
Machine-learning models have been recently used for detecting malicious Android applications, reporting impressive performances on benchmark datasets, even when trained only on features statically extracted from the application, such as system calls and permissions. However, recent findings have highlighted the fragility of such in-vitro evaluations with benchmark datasets, showing that very few changes to the content of Android malware may suffice to evade detection. How can we thus trust that a malware detector performing well on benchmark data will continue to do so when deployed in an operating environment? To mitigate this issue, the most popular Android malware detectors use linear, explainable machine-learning models to easily identify the most influential features contributing to each decision. In this work, we generalize this approach to any black-box machine- learning model, by leveraging a gradient-based approach to identify the most influential local features. This enables using nonlinear models to potentially increase accuracy without sacrificing interpretability of decisions. Our approach also highlights the global characteristics learned by the model to discriminate between benign and malware applications. Finally, as shown by our empirical analysis on a popular Android malware detection task, it also helps identifying potential vulnerabilities of linear and nonlinear models against adversarial manipulations.
△ Less
Submitted 29 October, 2018; v1 submitted 9 March, 2018;
originally announced March 2018.
-
Super-sparse Learning in Similarity Spaces
Authors:
Ambra Demontis,
Marco Melis,
Battista Biggio,
Giorgio Fumera,
Fabio Roli
Abstract:
In several applications, input samples are more naturally represented in terms of similarities between each other, rather than in terms of feature vectors. In these settings, machine-learning algorithms can become very computationally demanding, as they may require matching the test samples against a very large set of reference prototypes. To mitigate this issue, different approaches have been dev…
▽ More
In several applications, input samples are more naturally represented in terms of similarities between each other, rather than in terms of feature vectors. In these settings, machine-learning algorithms can become very computationally demanding, as they may require matching the test samples against a very large set of reference prototypes. To mitigate this issue, different approaches have been developed to reduce the number of required reference prototypes. Current reduction approaches select a small subset of representative prototypes in the space induced by the similarity measure, and then separately train the classification function on the reduced subset. However, decoupling these two steps may not allow reducing the number of prototypes effectively without compromising accuracy. We overcome this limitation by jointly learning the classification function along with an optimal set of virtual prototypes, whose number can be either fixed a priori or optimized according to application-specific criteria. Creating a super-sparse set of virtual prototypes provides much sparser solutions, drastically reducing complexity at test time, at the expense of a slightly increased complexity during training. A much smaller set of prototypes also results in easier-to-interpret decisions. We empirically show that our approach can reduce up to ten times the complexity of Support Vector Machines, LASSO and ridge regression at test time, without almost affecting their classification accuracy.
△ Less
Submitted 17 December, 2017;
originally announced December 2017.
-
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub Humanoid
Authors:
Marco Melis,
Ambra Demontis,
Battista Biggio,
Gavin Brown,
Giorgio Fumera,
Fabio Roli
Abstract:
Deep neural networks have been widely adopted in recent years, exhibiting impressive performances in several application domains. It has however been shown that they can be fooled by adversarial examples, i.e., images altered by a barely-perceivable adversarial noise, carefully crafted to mislead classification. In this work, we aim to evaluate the extent to which robot-vision systems embodying de…
▽ More
Deep neural networks have been widely adopted in recent years, exhibiting impressive performances in several application domains. It has however been shown that they can be fooled by adversarial examples, i.e., images altered by a barely-perceivable adversarial noise, carefully crafted to mislead classification. In this work, we aim to evaluate the extent to which robot-vision systems embodying deep-learning algorithms are vulnerable to adversarial examples, and propose a computationally efficient countermeasure to mitigate this threat, based on rejecting classification of anomalous inputs. We then provide a clearer understanding of the safety properties of deep networks through an intuitive empirical analysis, showing that the map** learned by such networks essentially violates the smoothness assumption of learning algorithms. We finally discuss the main limitations of this work, including the creation of real-world adversarial examples, and sketch promising research directions.
△ Less
Submitted 23 August, 2017;
originally announced August 2017.
-
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection
Authors:
Ambra Demontis,
Marco Melis,
Battista Biggio,
Davide Maiorca,
Daniel Arp,
Konrad Rieck,
Igino Corona,
Giorgio Giacinto,
Fabio Roli
Abstract:
To cope with the increasing variability and sophistication of modern attacks, machine learning has been widely adopted as a statistically-sound tool for malware detection. However, its security against well-crafted attacks has not only been recently questioned, but it has been shown that machine learning exhibits inherent vulnerabilities that can be exploited to evade detection at test time. In ot…
▽ More
To cope with the increasing variability and sophistication of modern attacks, machine learning has been widely adopted as a statistically-sound tool for malware detection. However, its security against well-crafted attacks has not only been recently questioned, but it has been shown that machine learning exhibits inherent vulnerabilities that can be exploited to evade detection at test time. In other words, machine learning itself can be the weakest link in a security system. In this paper, we rely upon a previously-proposed attack framework to categorize potential attack scenarios against learning-based malware detection tools, by modeling attackers with different skills and capabilities. We then define and implement a set of corresponding evasion attacks to thoroughly assess the security of Drebin, an Android malware detector. The main contribution of this work is the proposal of a simple and scalable secure-learning paradigm that mitigates the impact of evasion attacks, while only slightly worsening the detection rate in the absence of attack. We finally argue that our secure-learning approach can also be readily applied to other malware detection tasks.
△ Less
Submitted 28 April, 2017;
originally announced April 2017.
-
Entanglement entropy of a simple quantum system
Authors:
Maurizio Melis
Abstract:
We propose a simple approach to the calculation of the entanglement entropy of a spherically symmetric quantum system composed of two separate regions. We consider bound states of the system described by a wave function that is scale invariant and vanishes exponentially at infinity. Our result is in accordance with the holographic bound on entropy and shows that entanglement entropy scales with th…
▽ More
We propose a simple approach to the calculation of the entanglement entropy of a spherically symmetric quantum system composed of two separate regions. We consider bound states of the system described by a wave function that is scale invariant and vanishes exponentially at infinity. Our result is in accordance with the holographic bound on entropy and shows that entanglement entropy scales with the area of the boundary.
△ Less
Submitted 8 February, 2019; v1 submitted 7 August, 2009;
originally announced August 2009.
-
Holographic entanglement entropy of the BTZ black hole
Authors:
M. Cadoni,
M. Melis
Abstract:
We investigate quantum entanglement of gravitational configurations in 3D AdS gravity using the AdS/CFT correspondence. We derive explicit formulas for the holographic entanglement entropy (EE) of the BTZ black hole, conical singularities and regularized AdS$_{3}$. The leading term in the large temperature expansion of the holographic EE of the BTZ black hole reproduces exactly its Bekenstein-Ha…
▽ More
We investigate quantum entanglement of gravitational configurations in 3D AdS gravity using the AdS/CFT correspondence. We derive explicit formulas for the holographic entanglement entropy (EE) of the BTZ black hole, conical singularities and regularized AdS$_{3}$. The leading term in the large temperature expansion of the holographic EE of the BTZ black hole reproduces exactly its Bekenstein-Hawking entropy S_BH, whereas the subleading term behaves as ln S_BH. We also show that the leading term of the holographic EE for the BTZ black hole can be obtained from the large temperature expansion of the partition function of a broad class of 2D CFTs on the torus. This result indicates that black hole EE is not a fundamental feature of the underlying theory of quantum gravity but emerges when the semiclassical notion of spacetime geometry is used to describe the black hole.
△ Less
Submitted 22 July, 2009; v1 submitted 9 July, 2009;
originally announced July 2009.
-
Microscopic entropy of black holes and AdS_2 quantum gravity
Authors:
Mariano Cadoni,
Maurizio Melis,
Paolo Pani
Abstract:
Quantum gravity (QG) on two-dimensional anti-de Sitter spacetime (AdS_2) takes always the form of a chiral conformal field theory (CFT). However, the actual content of the CFT, and in particular its central charge, depends on the background values of the dilaton and Maxwell field. We review the main features of AdS_2 QG with linear dilaton and of AdS_2 QG with constant dilaton and Maxwell field.…
▽ More
Quantum gravity (QG) on two-dimensional anti-de Sitter spacetime (AdS_2) takes always the form of a chiral conformal field theory (CFT). However, the actual content of the CFT, and in particular its central charge, depends on the background values of the dilaton and Maxwell field. We review the main features of AdS_2 QG with linear dilaton and of AdS_2 QG with constant dilaton and Maxwell field. We also show that the 3D charged Banados-Teitelboim-Zanelli black hole interpolates between these two versions of AdS_2 QG. Applications to the computation of the microscopic entropy of black holes are also discussed.
△ Less
Submitted 17 December, 2008;
originally announced December 2008.
-
Microscopic entropy of the charged BTZ black hole
Authors:
M. Cadoni,
M. Melis,
M. R. Setare
Abstract:
The charged BTZ black hole is characterized by a power-law curvature singularity generated by the electric charge of the hole. The curvature singularity produces ln r terms in the asymptotic expansion of the gravitational field and divergent contributions to the boundary terms. We show that these boundary deformations can be generated by the action of the conformal group in two dimensions and th…
▽ More
The charged BTZ black hole is characterized by a power-law curvature singularity generated by the electric charge of the hole. The curvature singularity produces ln r terms in the asymptotic expansion of the gravitational field and divergent contributions to the boundary terms. We show that these boundary deformations can be generated by the action of the conformal group in two dimensions and that an appropriate renormalization procedure allows for the definition of finite boundary charges.
In the semiclassical regime the central charge of the dual CFT turns out to be that calculated by Brown and Henneaux, whereas the charge associated with time translation is given by the renormalized black hole mass. We then show that the Cardy formula reproduces exactly the Bekenstein-Hawking entropy of the charged BTZ black hole.
△ Less
Submitted 16 October, 2007;
originally announced October 2007.
-
Black hole solutions of dimensionally reduced Einstein-Gauss-Bonnet gravity with a cosmological constant
Authors:
M. Melis,
S. Mignemi
Abstract:
We study the phase space of the spherically symmetric solutions of the system obtained from the dimensional reduction of the six-dimensional Einstein-Gauss-Bonnet action with a cosmological constant. We show that all the physical solutions have anti-de Sitter asymptotic behavior.
We study the phase space of the spherically symmetric solutions of the system obtained from the dimensional reduction of the six-dimensional Einstein-Gauss-Bonnet action with a cosmological constant. We show that all the physical solutions have anti-de Sitter asymptotic behavior.
△ Less
Submitted 29 September, 2006;
originally announced September 2006.
-
Global properties of charged dilatonic Gauss-Bonnet black holes
Authors:
M. Melis,
S. Mignemi
Abstract:
We study the phase space of the spherically symmetric solutions of Einstein-Maxwell-Gauss-Bonnet system nonminimally coupled to a scalar field and prove the existence of solutions with unusual asymptotics in addition to asymptotically flat ones. We also find new dyonic solutions of dilatonic Einstein-Maxwell theory.
We study the phase space of the spherically symmetric solutions of Einstein-Maxwell-Gauss-Bonnet system nonminimally coupled to a scalar field and prove the existence of solutions with unusual asymptotics in addition to asymptotically flat ones. We also find new dyonic solutions of dilatonic Einstein-Maxwell theory.
△ Less
Submitted 22 December, 2005;
originally announced December 2005.
-
Global properties of dilatonic Gauss-Bonnet black holes
Authors:
M. Melis,
S. Mignemi
Abstract:
We study the phase space of the spherically symmetric solutions of Einstein Gauss-Bonnet system nonminimally coupled to a scalar field and show that in four dimensions the only regular black hole solutions are asymptotically flat
We study the phase space of the spherically symmetric solutions of Einstein Gauss-Bonnet system nonminimally coupled to a scalar field and show that in four dimensions the only regular black hole solutions are asymptotically flat
△ Less
Submitted 31 March, 2005; v1 submitted 27 January, 2005;
originally announced January 2005.
-
Two-dimensional static black holes with pointlike sources
Authors:
M. Melis,
S. Mignemi
Abstract:
We study the static black hole solutions of generalized two-dimensional dilaton-gravity theories generated by pointlike mass sources, in the hypothesis that the matter is conformally coupled. We also discuss the motion of test particles. Due to conformal coupling, these follow the geodesics of a metric obtained by rescaling the canonical metric with the dilaton.
We study the static black hole solutions of generalized two-dimensional dilaton-gravity theories generated by pointlike mass sources, in the hypothesis that the matter is conformally coupled. We also discuss the motion of test particles. Due to conformal coupling, these follow the geodesics of a metric obtained by rescaling the canonical metric with the dilaton.
△ Less
Submitted 3 March, 2005; v1 submitted 29 November, 2004;
originally announced November 2004.
-
Glueball production in radiative J/psi, Upsilon decays
Authors:
M. Melis,
F. Murgia,
J. Parisi
Abstract:
Using a bound-state model of weakly bound gluons for glueballs made of two gluons and a natural generalization of the perturbative QCD formalism for exclusive hadronic processes, we present results for glueball production in radiative J/psi, Upsilon decays into several possible glueball states, including L \not= 0 ones. We perform a detailed phenomenological analysis, presenting results for the…
▽ More
Using a bound-state model of weakly bound gluons for glueballs made of two gluons and a natural generalization of the perturbative QCD formalism for exclusive hadronic processes, we present results for glueball production in radiative J/psi, Upsilon decays into several possible glueball states, including L \not= 0 ones. We perform a detailed phenomenological analysis, presenting results for the more favored experimental candidates and for decay angular distributions.
△ Less
Submitted 7 April, 2004;
originally announced April 2004.
-
Mass corrections in $J/ψ\to B\bar B$ decay and the role of distribution amplitudes
Authors:
Francesco Murgia,
Maurizio Melis
Abstract:
We consider mass correction effects on the polar angular distribution of a baryon--antibaryon pair created in the chain decay process $e^-e^+ \to J/ψ\to B\bar B$, generalizing a previous analysis of Carimalo. We show the relevance of the features of the baryon distribution amplitudes and estimate the electromagnetic corrections to the QCD results.
We consider mass correction effects on the polar angular distribution of a baryon--antibaryon pair created in the chain decay process $e^-e^+ \to J/ψ\to B\bar B$, generalizing a previous analysis of Carimalo. We show the relevance of the features of the baryon distribution amplitudes and estimate the electromagnetic corrections to the QCD results.
△ Less
Submitted 1 December, 1994;
originally announced December 1994.