Skip to main content

Showing 1–24 of 24 results for author: Thornton, M

.
  1. arXiv:2404.17142  [pdf, other

    quant-ph cs.CR

    Automated Quantum Circuit Generation for Computing Inverse Hash Functions

    Authors: Elena R. Henderson, Jessie M. Henderson, William V. Oxford, Mitchell A. Thornton

    Abstract: Several cryptographic systems depend upon the computational difficulty of reversing cryptographic hash functions. Robust hash functions transform inputs to outputs in such a way that the inputs cannot be later retrieved in a reasonable amount of time even if the outputs and the function that created them are known. Consequently, hash functions can be cryptographically secure, and they are employed… ▽ More

    Submitted 25 April, 2024; originally announced April 2024.

    Comments: 12 pages, 9 figures, 1 table

  2. arXiv:2404.02440  [pdf, other

    cs.CR physics.optics

    Designing a Photonic Physically Unclonable Function Having Resilience to Machine Learning Attacks

    Authors: Elena R. Henderson, Jessie M. Henderson, Hiva Shahoei, William V. Oxford, Eric C. Larson, Duncan L. MacFarlane, Mitchell A. Thornton

    Abstract: Physically unclonable functions (PUFs) are designed to act as device 'fingerprints.' Given an input challenge, the PUF circuit should produce an unpredictable response for use in situations such as root-of-trust applications and other hardware-level cybersecurity applications. PUFs are typically subcircuits present within integrated circuits (ICs), and while conventional IC PUFs are well-understoo… ▽ More

    Submitted 2 April, 2024; originally announced April 2024.

    Comments: 14 pages, 8 figures

  3. arXiv:2403.01299  [pdf, other

    cs.CR cs.LG

    A Photonic Physically Unclonable Function's Resilience to Multiple-Valued Machine Learning Attacks

    Authors: Jessie M. Henderson, Elena R. Henderson, Clayton A. Harper, Hiva Shahoei, William V. Oxford, Eric C. Larson, Duncan L. MacFarlane, Mitchell A. Thornton

    Abstract: Physically unclonable functions (PUFs) identify integrated circuits using nonlinearly-related challenge-response pairs (CRPs). Ideally, the relationship between challenges and corresponding responses is unpredictable, even if a subset of CRPs is known. Previous work developed a photonic PUF offering improved security compared to non-optical counterparts. Here, we investigate this PUF's susceptibil… ▽ More

    Submitted 2 March, 2024; originally announced March 2024.

    Comments: 6 pages, 4 figures

  4. arXiv:2401.17380  [pdf, other

    eess.AS cs.SD

    Detecting gamma-band responses to the speech envelope for the ICASSP 2024 Auditory EEG Decoding Signal Processing Grand Challenge

    Authors: Mike Thornton, Jonas Auernheimer, Constantin Jehn, Danilo Mandic, Tobias Reichenbach

    Abstract: The 2024 ICASSP Auditory EEG Signal Processing Grand Challenge concerns the decoding of electroencephalography (EEG) measurements taken from participants who listened to speech material. This work details our solution to the match-mismatch sub-task: given a short temporal segment of EEG recordings and several candidate speech segments, the task is to classify which of the speech segments was time-… ▽ More

    Submitted 30 January, 2024; originally announced January 2024.

    Comments: Accepted for ICASSP 2024 (challenge track)

  5. arXiv:2401.05187  [pdf, other

    eess.AS

    Decoding of Selective Attention to Speech From Ear-EEG Recordings

    Authors: Mike Thornton, Danilo Mandic, Tobias Reichenbach

    Abstract: Many people with hearing loss struggle to comprehend speech in crowded auditory scenes, even when they are using hearing aids. Future hearing technologies which can identify the focus of a listener's auditory attention, and selectively amplify that sound alone, could improve the experience that this patient group has with their hearing aids. In this work, we present the results of our experiments… ▽ More

    Submitted 10 January, 2024; originally announced January 2024.

  6. arXiv:2312.09768  [pdf, other

    eess.AS cs.SD

    Decoding Envelope and Frequency-Following EEG Responses to Continuous Speech Using Deep Neural Networks

    Authors: Mike Thornton, Danilo Mandic, Tobias Reichenbach

    Abstract: The electroencephalogram (EEG) offers a non-invasive means by which a listener's auditory system may be monitored during continuous speech perception. Reliable auditory-EEG decoders could facilitate the objective diagnosis of hearing disorders, or find applications in cognitively-steered hearing aids. Previously, we developed decoders for the ICASSP Auditory EEG Signal Processing Grand Challenge (… ▽ More

    Submitted 15 December, 2023; originally announced December 2023.

  7. arXiv:2309.01028  [pdf, other

    quant-ph

    Demonstration of a Hardware-Independent Toolkit for Automated Quantum Subcircuit Synthesis

    Authors: Elena R. Henderson, Jessie M. Henderson, Aviraj Sinha, Eric C. Larson, Mitchell A. Thornton

    Abstract: The quantum computer has become contemporary reality, with the first two-qubit machine of mere decades ago transforming into cloud-accessible devices with tens, hundreds, or -- in a few cases -- even thousands of qubits. While such hardware is noisy and still relatively small, the increasing number of operable qubits raises another challenge: how to develop the now-sizeable quantum circuits execut… ▽ More

    Submitted 8 February, 2024; v1 submitted 2 September, 2023; originally announced September 2023.

    Comments: 48 pages, 23 figures, 20 tables

  8. arXiv:2304.12503  [pdf, other

    cs.CR cs.LG cs.MM

    CNN-Assisted Steganography -- Integrating Machine Learning with Established Steganographic Techniques

    Authors: Andrew Havard, Theodore Manikas, Eric C. Larson, Mitchell A. Thornton

    Abstract: We propose a method to improve steganography by increasing the resilience of stego-media to discovery through steganalysis. Our approach enhances a class of steganographic approaches through the inclusion of a steganographic assistant convolutional neural network (SA-CNN). Previous research showed success in discovering the presence of hidden information within stego-images using trained neural ne… ▽ More

    Submitted 24 April, 2023; originally announced April 2023.

    Comments: 6 pages, 6 figures

  9. arXiv:2304.03830  [pdf, other

    quant-ph

    A Programmable True Random Number Generator Using Commercial Quantum Computers

    Authors: Aviraj Sinha, Elena R. Henderson, Jessie M. Henderson, Eric C. Larson, Mitchell A. Thornton

    Abstract: Random number generators (RNG) are essential elements in many cryptographic systems. True random number generators (TRNG) rely upon sources of randomness from natural processes such as those arising from quantum mechanics phenomena. We demonstrate that a quantum computer can serve as a high-quality, weakly random source for a generalized user-defined probability mass function (PMF). Specifically,… ▽ More

    Submitted 7 April, 2023; originally announced April 2023.

    Comments: 15 pages, 7 figures, SPIE Defense + Commercial Sensing: Quantum Information Science, Sensing, and Computation XV

  10. arXiv:2304.03829  [pdf, other

    quant-ph

    Automated Quantum Oracle Synthesis with a Minimal Number of Qubits

    Authors: Jessie M. Henderson, Elena R. Henderson, Aviraj Sinha, Mitchell A. Thornton, D. Michael Miller

    Abstract: Several prominent quantum computing algorithms--including Grover's search algorithm and Shor's algorithm for finding the prime factorization of an integer--employ subcircuits termed 'oracles' that embed a specific instance of a mathematical function into a corresponding bijective function that is then realized as a quantum circuit representation. Designing oracles, and particularly, designing them… ▽ More

    Submitted 7 April, 2023; originally announced April 2023.

    Comments: 18 pages, 10 figures, SPIE Defense + Commercial Sensing: Quantum Information Science, Sensing, and Computation XV

  11. arXiv:2303.06435  [pdf, other

    eess.AS

    Relating EEG recordings to speech using envelope tracking and the speech-FFR

    Authors: Mike Thornton, Danilo Mandic, Tobias Reichenbach

    Abstract: During speech perception, a listener's electroencephalogram (EEG) reflects acoustic-level processing as well as higher-level cognitive factors such as speech comprehension and attention. However, decoding speech from EEG recordings is challenging due to the low signal-to-noise ratios of EEG signals. We report on an approach developed for the ICASSP 2023 'Auditory EEG Decoding' Signal Processing Gr… ▽ More

    Submitted 11 March, 2023; originally announced March 2023.

    Comments: 2 pages, 3 figures. Accepted for ICASSP 2023 (challenge track)

  12. arXiv:2301.11773  [pdf, other

    cs.LG

    Automatic Modulation Classification with Deep Neural Networks

    Authors: Clayton Harper, Mitchell Thornton, Eric Larson

    Abstract: Automatic modulation classification is a desired feature in many modern software-defined radios. In recent years, a number of convolutional deep learning architectures have been proposed for automatically classifying the modulation used on observed signal bursts. However, a comprehensive analysis of these differing architectures and importance of each design element has not been carried out. Thus… ▽ More

    Submitted 27 January, 2023; originally announced January 2023.

  13. arXiv:2211.09860  [pdf, other

    quant-ph cs.ET

    Automated Quantum Memory Compilation with Improved Dynamic Range

    Authors: Aviraj Sinha, Elena R. Henderson, Jessie M. Henderson, Mitchell A. Thornton

    Abstract: Emerging quantum algorithms that process data require that classical input data be represented as a quantum state. These data-processing algorithms often follow the gate model of quantum computing--which requires qubits to be initialized to a basis state, typically $\lvert 0 \rangle$--and thus often employ state generation circuits to transform the initialized basis state to a data-representation… ▽ More

    Submitted 17 November, 2022; originally announced November 2022.

    Comments: 14 pages, 9 figures, and 13 tables

  14. arXiv:2211.05134  [pdf, other

    astro-ph.HE astro-ph.GA

    SN 2022ann: A type Icn supernova from a dwarf galaxy that reveals helium in its circumstellar environment

    Authors: K. W. Davis, K. Taggart, S. Tinyanont, R. J. Foley, V. A. Villar, L. Izzo, C. R. Angus, M. J. Bustamante-Rosell, D. A. Coulter, N. Earl, D. Farias, J. Hjorth, M. E. Huber, D. O. Jones, P. L. Kelly, C. D. Kilpatrick, D. Langeroodi, H. -Y. Miao, C. M. Pellegrino, E. Ramirez-Ruiz, C. L. Ransome, S. Rest, S. N. Sharief, M. R. Siebert, G. Terreran , et al. (43 additional authors not shown)

    Abstract: We present optical and near-infrared (NIR) observations of the Type Icn supernova (SN Icn) 2022ann, the fifth member of its newly identified class of SNe. Its early optical spectra are dominated by narrow carbon and oxygen P-Cygni features with absorption velocities of 800 km/s; slower than other SNe Icn and indicative of interaction with a dense, H/He-poor circumstellar medium (CSM) that is outfl… ▽ More

    Submitted 9 November, 2022; originally announced November 2022.

    Comments: 21 pages, 13 figures, to be submitted to MNRAS

  15. arXiv:2207.08497  [pdf, ps, other

    physics.med-ph physics.bio-ph

    Ear-EEG Sensitivity Modelling for Neural and Artifact Sources

    Authors: Metin Yarici, Mike Thornton, Danilo Mandic

    Abstract: The ear-EEG has emerged as a promising candidate for wearable brain monitoring in real-world scenarios. While experimental studies have validated ear-EEG in multiple scenarios, the source-sensor relationship for a variety of neural sources has not been established. In addition, a detailed theoretical analysis of the ear-EEG sensitivity to sources of artifacts is still missing. Within the present s… ▽ More

    Submitted 18 July, 2022; originally announced July 2022.

  16. arXiv:2203.02687  [pdf

    q-bio.BM

    Capturing the geometry, function, and evolution of enzymes with 3D templates

    Authors: Ioannis G. Riziotis, Janet M. Thornton

    Abstract: Structural templates are 3D signatures representing protein functional sites, such as ligand binding cavities, metal coordination motifs or catalytic sites. Here we explore methods to generate template libraries and algorithms to query structures for conserved 3D motifs. Applications of templates are discussed, as well as some exemplar cases for examining evolutionary links in enzymes. We also int… ▽ More

    Submitted 5 March, 2022; originally announced March 2022.

    Comments: 25 pages, 4 figures

  17. Quantum steering as a resource for secure tripartite Quantum State Sharing

    Authors: Cailean Wilkinson, Matthew Thornton, Natalia Korolkova

    Abstract: Quantum State Sharing (QSS) is a protocol by which a (secret) quantum state may be securely split, shared between multiple potentially dishonest players, and reconstructed. Crucially the players are each assumed to be dishonest, and so QSS requires that only a collaborating authorised subset of players can access the original secret state; any dishonest unauthorised conspiracy cannot reconstruct i… ▽ More

    Submitted 2 June, 2023; v1 submitted 11 June, 2021; originally announced June 2021.

    Comments: 8 pages, 3 figures

    Journal ref: Phys. Rev. A 107, 062401 (2023)

  18. Integrated source of path-entangled photon pairs with efficient pump self-rejection

    Authors: P. de la Hoz, A. Sakovich, A. Mikhalychev, M. Thornton, N. Korolkova, D. Mogilevtsev

    Abstract: We present a scheme for an integrated four-wave mixing source of narrow-band path-entangled photon pairs with efficient spatial pump self-rejection. The scheme is based on correlated loss in a system of waveguides in Kerr nonlinear media. We demonstrate that this setup allows for upwards of 100dB pump rejection, without additional filtering. The effect is reached by driving the symmetric collectiv… ▽ More

    Submitted 31 May, 2021; v1 submitted 7 September, 2020; originally announced September 2020.

    Comments: 12 pages, 6 figures

    Journal ref: Nanomaterials 2020, 10(10), 1952

  19. Agile and versatile quantum communication: signatures and secrets

    Authors: Stefan Richter, Matthew Thornton, Imran Khan, Hannah Scott, Kevin Jaksch, Ulrich Vogl, Birgit Stiller, Gerd Leuchs, Christoph Marquardt, Natalia Korolkova

    Abstract: Agile cryptography allows for a resource-efficient swap of a cryptographic core in case the security of an underlying classical cryptographic algorithm becomes compromised. Conversely, versatile cryptography allows the user to switch the cryptographic task without requiring any knowledge of its inner workings. In this paper, we suggest how these related principles can be applied to the field of… ▽ More

    Submitted 19 December, 2020; v1 submitted 27 January, 2020; originally announced January 2020.

    Comments: 11+6 pages. 8 figures. Accepted to Physical Review X

    Journal ref: Phys. Rev. X 11, 011038 (2021)

  20. Design of the coherent diffusive photon gun for generating non-classical states

    Authors: Matthew Thornton, Anton Sakovich, Alexander Mikhalychev, Jesus Diaz Ferrer, Pablo de la Hoz, Natalia Korolkova, Dmitri Mogilevtsev

    Abstract: We suggest and discuss a concept of deterministic integrated source of non-classical light based on the coherent diffusive photonics, a coherent light flow in a system of dissipatively coupled waveguides. We show how this practical quantum device can be realized with a system of single-mode waveguides laser-inscribed in nonlinear glass. We describe a hierarchy of models, from the complete multi-mo… ▽ More

    Submitted 25 November, 2019; v1 submitted 3 July, 2019; originally announced July 2019.

    Comments: 11+4 pages, 10 figures. Accepted to Physical Review Applied

    Journal ref: Phys. Rev. Applied 12, 064051 (2019)

  21. Entanglement in Higher-Radix Quantum Systems

    Authors: Kaitlin Smith, Mitchell Thornton

    Abstract: Entanglement is an important phenomenon that enables quantum information processing algorithms and quantum communications protocols. Although entangled quantum states are often described in radix-2, higher-radix qudits can become entangled as well. In this work, we both introduce partial entanglement, a concept that does not exist for radix-2 quantum systems, and differentiate between partial and… ▽ More

    Submitted 2 June, 2019; originally announced June 2019.

    Comments: Accepted for publication at 2019 IEEE International Symposium on Multiple-Valued Logic (ISMVL)

  22. arXiv:1901.07334  [pdf, other

    cs.LG stat.ML

    Reducing state updates via Gaussian-gated LSTMs

    Authors: Matthew Thornton, Jithendar Anumula, Shih-Chii Liu

    Abstract: Recurrent neural networks can be difficult to train on long sequence data due to the well-known vanishing gradient problem. Some architectures incorporate methods to reduce RNN state updates, therefore allowing the network to preserve memory over long temporal intervals. To address these problems of convergence, this paper proposes a timing-gated LSTM RNN model, called the Gaussian-gated LSTM (g-L… ▽ More

    Submitted 22 January, 2019; originally announced January 2019.

  23. arXiv:1901.02406  [pdf, ps, other

    quant-ph cs.ET

    Using ZDDs in the Map** of Quantum Circuits

    Authors: Kaitlin Smith, Mathias Soeken, Bruno Schmitt, Giovanni De Micheli, Mitchell Thornton

    Abstract: A critical step in quantum compilation is the transformation of a technology-independent quantum circuit into a technology-dependent form for a targeted device. In addition to map** quantum gates into the supported gate set, it is necessary to map pseudo qubits in the technology-independent circuit into physical qubits of the technology-dependent circuit such that coupling constraints among qubi… ▽ More

    Submitted 1 May, 2020; v1 submitted 8 January, 2019; originally announced January 2019.

    Comments: In Proceedings QPL 2019, arXiv:2004.14750

    Journal ref: EPTCS 318, 2020, pp. 106-118

  24. Continuous-variable quantum digital signatures over insecure channels

    Authors: Matthew Thornton, Hannah Scott, Callum Croal, Natalia Korolkova

    Abstract: Digital signatures ensure the integrity of a classical message and the authenticity of its sender. Despite their far-reaching use in modern communication, currently used signature schemes rely on computational assumptions and will be rendered insecure by a quantum computer. We present a quantum digital signatures (QDS) scheme whose security is instead based on the impossibility of perfectly and… ▽ More

    Submitted 9 July, 2019; v1 submitted 23 December, 2018; originally announced December 2018.

    Comments: 11 pages, 8 figures. Accepted version

    Journal ref: Phys. Rev. A 99, 032341 (2019)