-
UMBRELA: UMbrela is the (Open-Source Reproduction of the) Bing RELevance Assessor
Authors:
Shivani Upadhyay,
Ronak Pradeep,
Nandan Thakur,
Nick Craswell,
Jimmy Lin
Abstract:
Copious amounts of relevance judgments are necessary for the effective training and accurate evaluation of retrieval systems. Conventionally, these judgments are made by human assessors, rendering this process expensive and laborious. A recent study by Thomas et al. from Microsoft Bing suggested that large language models (LLMs) can accurately perform the relevance assessment task and provide huma…
▽ More
Copious amounts of relevance judgments are necessary for the effective training and accurate evaluation of retrieval systems. Conventionally, these judgments are made by human assessors, rendering this process expensive and laborious. A recent study by Thomas et al. from Microsoft Bing suggested that large language models (LLMs) can accurately perform the relevance assessment task and provide human-quality judgments, but unfortunately their study did not yield any reusable software artifacts. Our work presents UMBRELA (a recursive acronym that stands for UMbrela is the Bing RELevance Assessor), an open-source toolkit that reproduces the results of Thomas et al. using OpenAI's GPT-4o model and adds more nuance to the original paper. Across Deep Learning Tracks from TREC 2019 to 2023, we find that LLM-derived relevance judgments correlate highly with rankings generated by effective multi-stage retrieval systems. Our toolkit is designed to be easily extensible and can be integrated into existing multi-stage retrieval and evaluation pipelines, offering researchers a valuable resource for studying retrieval evaluation methodologies. UMBRELA will be used in the TREC 2024 RAG Track to aid in relevance assessments, and we envision our toolkit becoming a foundation for further innovation in the field. UMBRELA is available at https://github.com/castorini/umbrela.
△ Less
Submitted 10 June, 2024;
originally announced June 2024.
-
Tensor square and isoclinic extensions of multiplicative Lie algebras
Authors:
Dev Karan Singh,
Amit Kumar,
Sumit Kumar Upadhyay,
Shiv Datt Kumar
Abstract:
In this paper, we discuss the capable and isoclinic properties of the tensor square in the context of multiplicative Lie algebras. We also developed the concept of isoclinic extensions and proved several results for multiplicative Lie algebras. Consequently, we demonstrate that covers of a multiplicative Lie algebra are mutually isoclinic.
In this paper, we discuss the capable and isoclinic properties of the tensor square in the context of multiplicative Lie algebras. We also developed the concept of isoclinic extensions and proved several results for multiplicative Lie algebras. Consequently, we demonstrate that covers of a multiplicative Lie algebra are mutually isoclinic.
△ Less
Submitted 4 June, 2024;
originally announced June 2024.
-
UniRAG: Universal Retrieval Augmentation for Multi-Modal Large Language Models
Authors:
Sahel Sharifymoghaddam,
Shivani Upadhyay,
Wenhu Chen,
Jimmy Lin
Abstract:
Recently, Multi-Modal(MM) Large Language Models(LLMs) have unlocked many complex use-cases that require MM understanding (e.g., image captioning or visual question answering) and MM generation (e.g., text-guided image generation or editing) capabilities. To further improve the output fidelity of MM-LLMs we introduce the model-agnostic UniRAG technique that adds relevant retrieved information to pr…
▽ More
Recently, Multi-Modal(MM) Large Language Models(LLMs) have unlocked many complex use-cases that require MM understanding (e.g., image captioning or visual question answering) and MM generation (e.g., text-guided image generation or editing) capabilities. To further improve the output fidelity of MM-LLMs we introduce the model-agnostic UniRAG technique that adds relevant retrieved information to prompts as few-shot examples during inference. Unlike the common belief that Retrieval Augmentation (RA) mainly improves generation or understanding of uncommon entities, our evaluation results on the MSCOCO dataset with common entities show that both proprietary models like GPT4 and Gemini-Pro and smaller open-source models like Llava, LaVIT, and Emu2 significantly enhance their generation quality when their input prompts are augmented with relevant information retrieved by MM retrievers like UniIR models.
△ Less
Submitted 16 May, 2024;
originally announced May 2024.
-
Thermal analysis of black hole in de Rham--Gabadadze--Tolley massive gravity in Barrow entropy framework
Authors:
Muhammad Yasir,
Tiecheng Xia,
Sudhaker Upadhyay
Abstract:
This study examines a recently hypothesized black hole solution in de Rham--Gabadadze--Tolley massive gravity. Firstly, we consider the negative cosmological constant as a thermodynamic pressure. We extract the thermodynamical properties such as Hawking temperature, heat capacity and Gibbs free energy using the Barrow entropy. We also obtain a new pressure associated to the perfect fluid dark matt…
▽ More
This study examines a recently hypothesized black hole solution in de Rham--Gabadadze--Tolley massive gravity. Firstly, we consider the negative cosmological constant as a thermodynamic pressure. We extract the thermodynamical properties such as Hawking temperature, heat capacity and Gibbs free energy using the Barrow entropy. We also obtain a new pressure associated to the perfect fluid dark matter and discuss the first-order van der Waals-like phase transition. This black hole's stability is investigated through specific heat and Gibbs free energy. Also, we analyze the thermodynamic curvatures behavior of black hole through geometry methods (Weinhold, Ruppeiner, Hendi-Panahiyah-Eslam-Momennia (HPEM), and geometrothermodynamics (GTD)).
△ Less
Submitted 8 May, 2024;
originally announced May 2024.
-
LLMs Can Patch Up Missing Relevance Judgments in Evaluation
Authors:
Shivani Upadhyay,
Ehsan Kamalloo,
Jimmy Lin
Abstract:
Unjudged documents or holes in information retrieval benchmarks are considered non-relevant in evaluation, yielding no gains in measuring effectiveness. However, these missing judgments may inadvertently introduce biases into the evaluation as their prevalence for a retrieval model is heavily contingent on the pooling process. Thus, filling holes becomes crucial in ensuring reliable and accurate e…
▽ More
Unjudged documents or holes in information retrieval benchmarks are considered non-relevant in evaluation, yielding no gains in measuring effectiveness. However, these missing judgments may inadvertently introduce biases into the evaluation as their prevalence for a retrieval model is heavily contingent on the pooling process. Thus, filling holes becomes crucial in ensuring reliable and accurate evaluation. Collecting human judgment for all documents is cumbersome and impractical. In this paper, we aim at leveraging large language models (LLMs) to automatically label unjudged documents. Our goal is to instruct an LLM using detailed instructions to assign fine-grained relevance judgments to holes. To this end, we systematically simulate scenarios with varying degrees of holes by randomly drop** relevant documents from the relevance judgment in TREC DL tracks. Our experiments reveal a strong correlation between our LLM-based method and ground-truth relevance judgments. Based on our simulation experiments conducted on three TREC DL datasets, in the extreme scenario of retaining only 10% of judgments, our method achieves a Kendall tau correlation of 0.87 and 0.92 on an average for Vicuña-7B and GPT-3.5 Turbo respectively.
△ Less
Submitted 7 May, 2024;
originally announced May 2024.
-
SHARE: Secure Hardware Allocation and Resource Efficiency in Quantum Systems
Authors:
Suryansh Upadhyay,
Swaroop Ghosh
Abstract:
Quantum computing (QC) is poised to revolutionize problem solving across various fields, with research suggesting that systems with over 50 qubits may achieve quantum advantage surpassing supercomputers in certain optimization tasks. As the hardware size of Noisy Intermediate Scale Quantum (NISQ) computers continues to grow, Multi tenant computing (MTC) has emerged as a viable approach to enhance…
▽ More
Quantum computing (QC) is poised to revolutionize problem solving across various fields, with research suggesting that systems with over 50 qubits may achieve quantum advantage surpassing supercomputers in certain optimization tasks. As the hardware size of Noisy Intermediate Scale Quantum (NISQ) computers continues to grow, Multi tenant computing (MTC) has emerged as a viable approach to enhance hardware utilization by allowing shared resource access across multiple quantum programs. However, MTC can also bring challenges and security concerns. This paper focuses on optimizing quantum hardware utilization in shared environments by implementing multi programming strategies that not only enhance hardware utilization but also effectively manage associated risks like crosstalk and fault injection. We propose a novel partitioning and allocation method called Community Based Dynamic Allocation Partitioning (COMDAP) and Secure COMDAP to refine and secure multi programming capabilities in quantum systems. COMDAP ensures equitable and efficient resource distribution, addresses the issues of suboptimal partitioning, and significantly improves hardware utilization. We report a 23 percent average improvement in hardware utilization rate compared to existing greedy heuristics, with rates averaging 92 percent. COMDAP introduces an average increase of approximately 0.05X in delta CX, alongside a 3.5 percent average reduction in PST across benchmarks.
△ Less
Submitted 1 May, 2024;
originally announced May 2024.
-
Non-perturbative correction to thermodynamics of conformally dressed 3D black hole
Authors:
Saheb Soroushfar,
Hoda Farahani,
Sudhaker Upadhyay
Abstract:
We extend the study of corrected thermodynamics for the 3D black holes conformally coupled to scalar field up to non-perturbative level. We calculate the exponential correction to entropy arises due to the microstate counting for quantum states on the boundary. This exponential correction in entropy attributes to the other thermodynamical quantities also. We study the stability and phase transitio…
▽ More
We extend the study of corrected thermodynamics for the 3D black holes conformally coupled to scalar field up to non-perturbative level. We calculate the exponential correction to entropy arises due to the microstate counting for quantum states on the boundary. This exponential correction in entropy attributes to the other thermodynamical quantities also. We study the stability and phase transition for this system of black hole under the influence of non-perturbative correction. We also discuss the quantum work associated with exponential corrected entropy. Finally, we justify the results from the view point of thermodynamic geometry.
△ Less
Submitted 16 April, 2024;
originally announced April 2024.
-
RouterBench: A Benchmark for Multi-LLM Routing System
Authors:
Qitian Jason Hu,
Jacob Bieker,
Xiuyu Li,
Nan Jiang,
Benjamin Keigwin,
Gaurav Ranganath,
Kurt Keutzer,
Shriyash Kaustubh Upadhyay
Abstract:
As the range of applications for Large Language Models (LLMs) continues to grow, the demand for effective serving solutions becomes increasingly critical. Despite the versatility of LLMs, no single model can optimally address all tasks and applications, particularly when balancing performance with cost. This limitation has led to the development of LLM routing systems, which combine the strengths…
▽ More
As the range of applications for Large Language Models (LLMs) continues to grow, the demand for effective serving solutions becomes increasingly critical. Despite the versatility of LLMs, no single model can optimally address all tasks and applications, particularly when balancing performance with cost. This limitation has led to the development of LLM routing systems, which combine the strengths of various models to overcome the constraints of individual LLMs. Yet, the absence of a standardized benchmark for evaluating the performance of LLM routers hinders progress in this area. To bridge this gap, we present RouterBench, a novel evaluation framework designed to systematically assess the efficacy of LLM routing systems, along with a comprehensive dataset comprising over 405k inference outcomes from representative LLMs to support the development of routing strategies. We further propose a theoretical framework for LLM routing, and deliver a comparative analysis of various routing approaches through RouterBench, highlighting their potentials and limitations within our evaluation framework. This work not only formalizes and advances the development of LLM routing systems but also sets a standard for their assessment, paving the way for more accessible and economically viable LLM deployments. The code and data are available at https://github.com/withmartian/routerbench.
△ Less
Submitted 28 March, 2024; v1 submitted 18 March, 2024;
originally announced March 2024.
-
Non-perturbative correction on the black hole geometry
Authors:
Behnam Pourhassan,
Hoda Farahani,
Farideh Kazemian,
İzzet Sakallı,
Sudhaker Upadhyay,
Dharm Veer Singh
Abstract:
In this paper, we use the holographic principle to obtain a modified metric of black holes that reproduces the exponentially corrected entropy. The exponential correction of the black hole entropy comes from non-perturbative corrections. It interprets as a quantum effect which affects black hole thermodynamics especially in the infinitesimal scales. Hence, it may affect black hole stability at the…
▽ More
In this paper, we use the holographic principle to obtain a modified metric of black holes that reproduces the exponentially corrected entropy. The exponential correction of the black hole entropy comes from non-perturbative corrections. It interprets as a quantum effect which affects black hole thermodynamics especially in the infinitesimal scales. Hence, it may affect black hole stability at the final stage. Then, we study modified thermodynamics due to the non-perturbative corrections and calculate thermodynamics quantities of several non-rotating black holes.
△ Less
Submitted 12 March, 2024;
originally announced March 2024.
-
Gemini 1.5: Unlocking multimodal understanding across millions of tokens of context
Authors:
Gemini Team,
Petko Georgiev,
Ving Ian Lei,
Ryan Burnell,
Libin Bai,
Anmol Gulati,
Garrett Tanzer,
Damien Vincent,
Zhufeng Pan,
Shibo Wang,
Soroosh Mariooryad,
Yifan Ding,
Xinyang Geng,
Fred Alcober,
Roy Frostig,
Mark Omernick,
Lexi Walker,
Cosmin Paduraru,
Christina Sorokin,
Andrea Tacchetti,
Colin Gaffney,
Samira Daruki,
Olcan Sercinoglu,
Zach Gleicher,
Juliette Love
, et al. (1092 additional authors not shown)
Abstract:
In this report, we introduce the Gemini 1.5 family of models, representing the next generation of highly compute-efficient multimodal models capable of recalling and reasoning over fine-grained information from millions of tokens of context, including multiple long documents and hours of video and audio. The family includes two new models: (1) an updated Gemini 1.5 Pro, which exceeds the February…
▽ More
In this report, we introduce the Gemini 1.5 family of models, representing the next generation of highly compute-efficient multimodal models capable of recalling and reasoning over fine-grained information from millions of tokens of context, including multiple long documents and hours of video and audio. The family includes two new models: (1) an updated Gemini 1.5 Pro, which exceeds the February version on the great majority of capabilities and benchmarks; (2) Gemini 1.5 Flash, a more lightweight variant designed for efficiency with minimal regression in quality. Gemini 1.5 models achieve near-perfect recall on long-context retrieval tasks across modalities, improve the state-of-the-art in long-document QA, long-video QA and long-context ASR, and match or surpass Gemini 1.0 Ultra's state-of-the-art performance across a broad set of benchmarks. Studying the limits of Gemini 1.5's long-context ability, we find continued improvement in next-token prediction and near-perfect retrieval (>99%) up to at least 10M tokens, a generational leap over existing models such as Claude 3.0 (200k) and GPT-4 Turbo (128k). Finally, we highlight real-world use cases, such as Gemini 1.5 collaborating with professionals on completing their tasks achieving 26 to 75% time savings across 10 different job categories, as well as surprising new capabilities of large language models at the frontier; when given a grammar manual for Kalamang, a language with fewer than 200 speakers worldwide, the model learns to translate English to Kalamang at a similar level to a person who learned from the same content.
△ Less
Submitted 14 June, 2024; v1 submitted 8 March, 2024;
originally announced March 2024.
-
Autonomous Robotic Arm Manipulation for Planetary Missions using Causal Machine Learning
Authors:
C. McDonnell,
M. Arana-Catania,
S. Upadhyay
Abstract:
Autonomous robotic arm manipulators have the potential to make planetary exploration and in-situ resource utilization missions more time efficient and productive, as the manipulator can handle the objects itself and perform goal-specific actions. We train a manipulator to autonomously study objects of which it has no prior knowledge, such as planetary rocks. This is achieved using causal machine l…
▽ More
Autonomous robotic arm manipulators have the potential to make planetary exploration and in-situ resource utilization missions more time efficient and productive, as the manipulator can handle the objects itself and perform goal-specific actions. We train a manipulator to autonomously study objects of which it has no prior knowledge, such as planetary rocks. This is achieved using causal machine learning in a simulated planetary environment. Here, the manipulator interacts with objects, and classifies them based on differing causal factors. These are parameters, such as mass or friction coefficient, that causally determine the outcomes of its interactions. Through reinforcement learning, the manipulator learns to interact in ways that reveal the underlying causal factors. We show that this method works even without any prior knowledge of the objects, or any previously-collected training data. We carry out the training in planetary exploration conditions, with realistic manipulator models.
△ Less
Submitted 1 March, 2024;
originally announced March 2024.
-
Can an LLM-Powered Socially Assistive Robot Effectively and Safely Deliver Cognitive Behavioral Therapy? A Study With University Students
Authors:
Mina J. Kian,
Mingyu Zong,
Katrin Fischer,
Abhyuday Singh,
Anna-Maria Velentza,
Pau Sang,
Shriya Upadhyay,
Anika Gupta,
Misha A. Faruki,
Wallace Browning,
Sebastien M. R. Arnold,
Bhaskar Krishnamachari,
Maja J. Mataric
Abstract:
Cognitive behavioral therapy (CBT) is a widely used therapeutic method for guiding individuals toward restructuring their thinking patterns as a means of addressing anxiety, depression, and other challenges. We developed a large language model (LLM)-powered prompt-engineered socially assistive robot (SAR) that guides participants through interactive CBT at-home exercises. We evaluated the performa…
▽ More
Cognitive behavioral therapy (CBT) is a widely used therapeutic method for guiding individuals toward restructuring their thinking patterns as a means of addressing anxiety, depression, and other challenges. We developed a large language model (LLM)-powered prompt-engineered socially assistive robot (SAR) that guides participants through interactive CBT at-home exercises. We evaluated the performance of the SAR through a 15-day study with 38 university students randomly assigned to interact daily with the robot or a chatbot (using the same LLM), or complete traditional CBT worksheets throughout the duration of the study. We measured weekly therapeutic outcomes, changes in pre-/post-session anxiety measures, and adherence to completing CBT exercises. We found that self-reported measures of general psychological distress significantly decreased over the study period in the robot and worksheet conditions but not the chatbot condition. Furthermore, the SAR enabled significant single-session improvements for more sessions than the other two conditions combined. Our findings suggest that SAR-guided LLM-powered CBT may be as effective as traditional worksheet methods in supporting therapeutic progress from the beginning to the end of the study and superior in decreasing user anxiety immediately after completing the CBT exercise.
△ Less
Submitted 27 February, 2024;
originally announced February 2024.
-
Epistral Network: Revolutionizing Media Curation and Consumption through Decentralization
Authors:
Dipankar Sarkar,
Shubham Upadhyay
Abstract:
Blockchain technology has revolutionized media consumption and distribution in the digital age, allowing creators, consumers, and regulators to participate in a decentralized, fair, and engaging media environment. Epistral, an innovative media network that leverages blockchain technology, aims to be the world's first anti-mimetic media curation and consumption network, addressing the core challeng…
▽ More
Blockchain technology has revolutionized media consumption and distribution in the digital age, allowing creators, consumers, and regulators to participate in a decentralized, fair, and engaging media environment. Epistral, an innovative media network that leverages blockchain technology, aims to be the world's first anti-mimetic media curation and consumption network, addressing the core challenges facing today's digital media landscape: unfair treatment of creators and manipulative consumer algorithms, and the complex task of effective regulation. This paper delves into the conceptualization, design, and potential impact of epistral and explores how it embodies McLuhan's and Girard's theories within the realm of blockchain technology and draws from Hayden's critique of democratic representation. The paper analyzes the challenges and opportunities presented by this new network, providing a broader discourse on the future of media consumption, distribution, and regulation.
△ Less
Submitted 10 February, 2024; v1 submitted 7 February, 2024;
originally announced February 2024.
-
Interferometric Single-Shot Parity Measurement in an InAs-Al Hybrid Device
Authors:
Morteza Aghaee,
Alejandro Alcaraz Ramirez,
Zulfi Alam,
Rizwan Ali,
Mariusz Andrzejczuk,
Andrey Antipov,
Mikhail Astafev,
Amin Barzegar,
Bela Bauer,
Jonathan Becker,
Umesh Kumar Bhaskar,
Alex Bocharov,
Srini Boddapati,
David Bohn,
Jouri Bommer,
Leo Bourdet,
Arnaud Bousquet,
Samuel Boutin,
Lucas Casparis,
Benjamin James Chapman,
Sohail Chatoor,
Anna Wulff Christensen,
Cassandra Chua,
Patrick Codd,
William Cole
, et al. (137 additional authors not shown)
Abstract:
The fusion of non-Abelian anyons or topological defects is a fundamental operation in measurement-only topological quantum computation. In topological superconductors, this operation amounts to a determination of the shared fermion parity of Majorana zero modes. As a step towards this, we implement a single-shot interferometric measurement of fermion parity in indium arsenide-aluminum heterostruct…
▽ More
The fusion of non-Abelian anyons or topological defects is a fundamental operation in measurement-only topological quantum computation. In topological superconductors, this operation amounts to a determination of the shared fermion parity of Majorana zero modes. As a step towards this, we implement a single-shot interferometric measurement of fermion parity in indium arsenide-aluminum heterostructures with a gate-defined nanowire. The interferometer is formed by tunnel-coupling the proximitized nanowire to quantum dots. The nanowire causes a state-dependent shift of these quantum dots' quantum capacitance of up to 1 fF. Our quantum capacitance measurements show flux h/2e-periodic bimodality with a signal-to-noise ratio of 1 in 3.7 $μ$s at optimal flux values. From the time traces of the quantum capacitance measurements, we extract a dwell time in the two associated states that is longer than 1 ms at in-plane magnetic fields of approximately 2 T. These results are consistent with a measurement of the fermion parity encoded in a pair of Majorana zero modes that are separated by approximately 3 $μ$m and subjected to a low rate of poisoning by non-equilibrium quasiparticles. The large capacitance shift and long poisoning time enable a parity measurement error probability of 1%.
△ Less
Submitted 2 April, 2024; v1 submitted 17 January, 2024;
originally announced January 2024.
-
Thermal fluctuations of (non)linearly charged BTZ black hole in massive gravity
Authors:
Behnam Pourhassan,
Seyed Hossein Hendi,
Sudhaker Upadhyay,
Izzet Sakalli,
Emmanuel N. Saridakis
Abstract:
We consider a charged BTZ black hole in asymptotically AdS space-time of massive gravity to study the effect of the thermal fluctuations on the black hole thermodynamics. We consider the Einstein-Born-Infeld solution and investigate critical points and stability. We also compare the results with the case of Einstein-Maxwell solutions. Besides, we find that thermal fluctuations, which appear as a l…
▽ More
We consider a charged BTZ black hole in asymptotically AdS space-time of massive gravity to study the effect of the thermal fluctuations on the black hole thermodynamics. We consider the Einstein-Born-Infeld solution and investigate critical points and stability. We also compare the results with the case of Einstein-Maxwell solutions. Besides, we find that thermal fluctuations, which appear as a logarithmic term in the entropy, affect the stability of the black hole and change the phase transition point. Moreover, we study the geometrical thermodynamics and find that the behaviour of the linear Maxwell solution is the same as the nonlinear one.
△ Less
Submitted 15 January, 2024;
originally announced January 2024.
-
The Bogomolov multiplier of a multiplicative Lie algebra
Authors:
Amit Kumar,
Renu Joshi,
Mani Shankar Pandey,
Sumit Kumar Upadhyay
Abstract:
In this paper, we develop the concept of the Bogomolov multiplier for a multiplicative Lie algebra and establish a Hopf-type formula. Consequently, we see that the Bogomolov multipliers of two isoclinic multiplicative Lie algebras are isomorphic.
In this paper, we develop the concept of the Bogomolov multiplier for a multiplicative Lie algebra and establish a Hopf-type formula. Consequently, we see that the Bogomolov multipliers of two isoclinic multiplicative Lie algebras are isomorphic.
△ Less
Submitted 13 January, 2024;
originally announced January 2024.
-
Lie nilpotency and Lie solvability of tensor product of multiplicative Lie algebras
Authors:
Deepak Pal,
Amit Kumar,
Sumit Kumar Upadhyay,
Seema Kushwaha
Abstract:
In this article, we discuss Lie nilpotency and Lie solvability of non-abelian tensor product of multiplicative Lie algebras. In particular, for giving information concerning the Lie nilpotency (or Lie solvability) of either multiplicative Lie algebras $G$ or $H,$ the non-abelian tensor product $ \frac{G\otimes H}{I}$ is Lie nilpotent (or Lie solvable), for some ideal $I$ of ${G\otimes H}$.
In this article, we discuss Lie nilpotency and Lie solvability of non-abelian tensor product of multiplicative Lie algebras. In particular, for giving information concerning the Lie nilpotency (or Lie solvability) of either multiplicative Lie algebras $G$ or $H,$ the non-abelian tensor product $ \frac{G\otimes H}{I}$ is Lie nilpotent (or Lie solvable), for some ideal $I$ of ${G\otimes H}$.
△ Less
Submitted 13 January, 2024;
originally announced January 2024.
-
Gemini: A Family of Highly Capable Multimodal Models
Authors:
Gemini Team,
Rohan Anil,
Sebastian Borgeaud,
Jean-Baptiste Alayrac,
Jiahui Yu,
Radu Soricut,
Johan Schalkwyk,
Andrew M. Dai,
Anja Hauth,
Katie Millican,
David Silver,
Melvin Johnson,
Ioannis Antonoglou,
Julian Schrittwieser,
Amelia Glaese,
Jilin Chen,
Emily Pitler,
Timothy Lillicrap,
Angeliki Lazaridou,
Orhan Firat,
James Molloy,
Michael Isard,
Paul R. Barham,
Tom Hennigan,
Benjamin Lee
, et al. (1325 additional authors not shown)
Abstract:
This report introduces a new family of multimodal models, Gemini, that exhibit remarkable capabilities across image, audio, video, and text understanding. The Gemini family consists of Ultra, Pro, and Nano sizes, suitable for applications ranging from complex reasoning tasks to on-device memory-constrained use-cases. Evaluation on a broad range of benchmarks shows that our most-capable Gemini Ultr…
▽ More
This report introduces a new family of multimodal models, Gemini, that exhibit remarkable capabilities across image, audio, video, and text understanding. The Gemini family consists of Ultra, Pro, and Nano sizes, suitable for applications ranging from complex reasoning tasks to on-device memory-constrained use-cases. Evaluation on a broad range of benchmarks shows that our most-capable Gemini Ultra model advances the state of the art in 30 of 32 of these benchmarks - notably being the first model to achieve human-expert performance on the well-studied exam benchmark MMLU, and improving the state of the art in every one of the 20 multimodal benchmarks we examined. We believe that the new capabilities of the Gemini family in cross-modal reasoning and language understanding will enable a wide variety of use cases. We discuss our approach toward post-training and deploying Gemini models responsibly to users through services including Gemini, Gemini Advanced, Google AI Studio, and Cloud Vertex AI.
△ Less
Submitted 17 June, 2024; v1 submitted 18 December, 2023;
originally announced December 2023.
-
A generalized framework for quantum state discrimination, hybrid algorithms, and the quantum change point problem
Authors:
Ankith Mohan,
Jamie Sikora,
Sarvagya Upadhyay
Abstract:
Quantum state discrimination is a central task in many quantum computing settings where one wishes to identify what quantum state they are holding. We introduce a framework that generalizes many of its variants and present a hybrid quantum-classical algorithm based on semidefinite programming to calculate the maximum reward when the states are pure and have efficient circuits. To this end, we stud…
▽ More
Quantum state discrimination is a central task in many quantum computing settings where one wishes to identify what quantum state they are holding. We introduce a framework that generalizes many of its variants and present a hybrid quantum-classical algorithm based on semidefinite programming to calculate the maximum reward when the states are pure and have efficient circuits. To this end, we study the (not necessarily linearly independent) pure state case and reduce the standard SDP problem size from $2^n L$ to $N L$ where $n$ is the number of qubits, $N$ is the number of states, and $L$ is the number of possible guesses (typically $L = N$). As an application, we give now-possible algorithms for the quantum change point identification problem which asks, given a sequence of quantum states, determine the time steps when the quantum states changed. With our reductions, we are able to solve SDPs for problem sizes of up to $220$ qubits in about $8$ hours and we also give heuristics which speed up the computations.
△ Less
Submitted 6 December, 2023;
originally announced December 2023.
-
Exact Solution of Bardeen Black Hole in Einstein-Gauss-Bonnet gravity
Authors:
Amit Kumar,
Dharm Veer Singh,
Yerlan Myrzakulov,
Gulmira Yergaliyeva,
Sudhaker Upadhyay
Abstract:
We have obtained a new exact regular black hole solution for the EGB gravity coupled with nonlinear electrodynamics in AdS space. The numerical analysis of horizon structure suggests two horizons exist: Cauchy and event. We also study the thermal properties of this black hole, which satisfy the modified first law of thermodynamics. Moreover, we analyse the local and global stability of the black h…
▽ More
We have obtained a new exact regular black hole solution for the EGB gravity coupled with nonlinear electrodynamics in AdS space. The numerical analysis of horizon structure suggests two horizons exist: Cauchy and event. We also study the thermal properties of this black hole, which satisfy the modified first law of thermodynamics. Moreover, we analyse the local and global stability of the black hole. The $P-V$ criticality and phase transition are also discussed. The critical exponents for the present model exactly match the mean field theory.
△ Less
Submitted 5 December, 2023;
originally announced December 2023.
-
Designing Hash and Encryption Engines using Quantum Computing
Authors:
Suryansh Upadhyay,
Rupshali Roy,
Swaroop Ghosh
Abstract:
Quantum computing (QC) holds the promise of revolutionizing problem-solving by exploiting quantum phenomena like superposition and entanglement. It offers exponential speed-ups across various domains, from machine learning and security to drug discovery and optimization. In parallel, quantum encryption and key distribution have garnered substantial interest, leveraging quantum engines to enhance c…
▽ More
Quantum computing (QC) holds the promise of revolutionizing problem-solving by exploiting quantum phenomena like superposition and entanglement. It offers exponential speed-ups across various domains, from machine learning and security to drug discovery and optimization. In parallel, quantum encryption and key distribution have garnered substantial interest, leveraging quantum engines to enhance cryptographic techniques. Classical cryptography faces imminent threats from quantum computing, exemplified by Shors algorithms capacity to breach established encryption schemes. However, quantum circuits and algorithms, capitalizing on superposition and entanglement, offer innovative avenues for enhancing security. In this paper we explore quantum-based hash functions and encryption to fortify data security. Quantum hash functions and encryption can have numerous potential application cases, such as password storage, digital signatures, cryptography, anti-tampering etc. The integration of quantum and classical methods demonstrates potential in securing data in the era of quantum computing.
△ Less
Submitted 26 October, 2023;
originally announced October 2023.
-
Stealthy SWAPs: Adversarial SWAP Injection in Multi-Tenant Quantum Computing
Authors:
Suryansh Upadhyay,
Swaroop Ghosh
Abstract:
Quantum computing (QC) holds tremendous promise in revolutionizing problem-solving across various domains. It has been suggested in literature that 50+ qubits are sufficient to achieve quantum advantage (i.e., to surpass supercomputers in solving certain class of optimization problems).The hardware size of existing Noisy Intermediate-Scale Quantum (NISQ) computers have been ever increasing over th…
▽ More
Quantum computing (QC) holds tremendous promise in revolutionizing problem-solving across various domains. It has been suggested in literature that 50+ qubits are sufficient to achieve quantum advantage (i.e., to surpass supercomputers in solving certain class of optimization problems).The hardware size of existing Noisy Intermediate-Scale Quantum (NISQ) computers have been ever increasing over the years. Therefore, Multi-tenant computing (MTC) has emerged as a potential solution for efficient hardware utilization, enabling shared resource access among multiple quantum programs. However, MTC can also bring new security concerns. This paper proposes one such threat for MTC in superconducting quantum hardware i.e., adversarial SWAP gate injection in victims program during compilation for MTC. We present a representative scheduler designed for optimal resource allocation. To demonstrate the impact of this attack model, we conduct a detailed case study using a sample scheduler. Exhaustive experiments on circuits with varying depths and qubits offer valuable insights into the repercussions of these attacks. We report a max of approximately 55 percent and a median increase of approximately 25 percent in SWAP overhead. As a countermeasure, we also propose a sample machine learning model for detecting any abnormal user behavior and priority adjustment.
△ Less
Submitted 26 October, 2023;
originally announced October 2023.
-
AutoMix: Automatically Mixing Language Models
Authors:
Pranjal Aggarwal,
Aman Madaan,
Ankit Anand,
Srividya Pranavi Potharaju,
Swaroop Mishra,
Pei Zhou,
Aditya Gupta,
Dheeraj Rajagopal,
Karthik Kappaganthu,
Yiming Yang,
Shyam Upadhyay,
Manaal Faruqui,
Mausam
Abstract:
Large language models (LLMs) are now available from cloud API providers in various sizes and configurations. While this diversity offers a broad spectrum of choices, effectively leveraging the options to optimize computational cost and performance remains challenging. In this work, we present Automix, an approach that strategically routes queries to larger LMs, based on the approximate correctness…
▽ More
Large language models (LLMs) are now available from cloud API providers in various sizes and configurations. While this diversity offers a broad spectrum of choices, effectively leveraging the options to optimize computational cost and performance remains challenging. In this work, we present Automix, an approach that strategically routes queries to larger LMs, based on the approximate correctness of outputs from a smaller LM. Central to Automix are two key technical contributions. First, it has a few-shot self-verification mechanism, which estimates the reliability of its own outputs without requiring extensive training. Second, given that self-verification can be noisy, it employs a POMDP based router that can effectively select an appropriately sized model, based on answer confidence. Experiments across five language models and five challenging datasets show that Automix consistently surpasses strong baselines, reducing computational cost by over 50% for comparable performance.
△ Less
Submitted 28 June, 2024; v1 submitted 19 October, 2023;
originally announced October 2023.
-
How FaR Are Large Language Models From Agents with Theory-of-Mind?
Authors:
Pei Zhou,
Aman Madaan,
Srividya Pranavi Potharaju,
Aditya Gupta,
Kevin R. McKee,
Ari Holtzman,
Jay Pujara,
Xiang Ren,
Swaroop Mishra,
Aida Nematzadeh,
Shyam Upadhyay,
Manaal Faruqui
Abstract:
"Thinking is for Doing." Humans can infer other people's mental states from observations--an ability called Theory-of-Mind (ToM)--and subsequently act pragmatically on those inferences. Existing question answering benchmarks such as ToMi ask models questions to make inferences about beliefs of characters in a story, but do not test whether models can then use these inferences to guide their action…
▽ More
"Thinking is for Doing." Humans can infer other people's mental states from observations--an ability called Theory-of-Mind (ToM)--and subsequently act pragmatically on those inferences. Existing question answering benchmarks such as ToMi ask models questions to make inferences about beliefs of characters in a story, but do not test whether models can then use these inferences to guide their actions. We propose a new evaluation paradigm for large language models (LLMs): Thinking for Doing (T4D), which requires models to connect inferences about others' mental states to actions in social scenarios. Experiments on T4D demonstrate that LLMs such as GPT-4 and PaLM 2 seemingly excel at tracking characters' beliefs in stories, but they struggle to translate this capability into strategic action. Our analysis reveals the core challenge for LLMs lies in identifying the implicit inferences about mental states without being explicitly asked about as in ToMi, that lead to choosing the correct action in T4D. To bridge this gap, we introduce a zero-shot prompting framework, Foresee and Reflect (FaR), which provides a reasoning structure that encourages LLMs to anticipate future challenges and reason about potential actions. FaR boosts GPT-4's performance from 50% to 71% on T4D, outperforming other prompting methods such as Chain-of-Thought and Self-Ask. Moreover, FaR generalizes to diverse out-of-distribution story structures and scenarios that also require ToM inferences to choose an action, consistently outperforming other methods including few-shot in-context learning.
△ Less
Submitted 4 October, 2023;
originally announced October 2023.
-
Small Black String Thermodynamics
Authors:
Jyotish Kumar,
Sudhaker Upadhyay,
Himanshu Kumar Sudhanshu
Abstract:
We consider a cylindrically symmetric solution for the field equations of Einstein-Hilbert action with a negative cosmological constant in four dimensions. The small statistical fluctuation in the equilibrium thermodynamics of the black string solution is investigated. The small black string under the influence of small statistical fluctuation also follows the first law of thermodynamics. The beha…
▽ More
We consider a cylindrically symmetric solution for the field equations of Einstein-Hilbert action with a negative cosmological constant in four dimensions. The small statistical fluctuation in the equilibrium thermodynamics of the black string solution is investigated. The small black string under the influence of small statistical fluctuation also follows the first law of thermodynamics. The behaviour of equation of states for black string changes significantly due to the fluctuation. The fluctuation causes instability to the small-sized black string only. Assuming the black string is fluid, the compressibility of the black string is inversely proportional to the fluctuation parameter.
△ Less
Submitted 22 August, 2023;
originally announced August 2023.
-
Multi-Method Self-Training: Improving Code Generation With Text, And Vice Versa
Authors:
Shriyash K. Upadhyay,
Etan J. Ginsberg
Abstract:
Large Language Models have many methods for solving the same problem. This introduces novel strengths (different methods may work well for different problems) and weaknesses (it may be difficult for users to know which method to use). In this paper, we introduce Multi-Method Self-Training (MMST), where one method is trained on the filtered outputs of another, allowing us to augment the strengths a…
▽ More
Large Language Models have many methods for solving the same problem. This introduces novel strengths (different methods may work well for different problems) and weaknesses (it may be difficult for users to know which method to use). In this paper, we introduce Multi-Method Self-Training (MMST), where one method is trained on the filtered outputs of another, allowing us to augment the strengths and ameliorate the weaknesses of each method. Using a 176B parameter model trained on both language and code, we show that MMST can 1) improve the less performant method (up to 30%) making the model easier to use, 2) improve the more performant method (up to 32.2%) making the model more performant, and 3) improve the performance of related but distinct tasks (up to 10.3%) by improving the ability of the model to generate rationales. We then conduct ablation analyses to explore why MMST works. We show that MMST generates more data than traditional self-training, but the improvement in performance is driven by the use of multiple methods. We also analyze prompt-engineering and anti-correlated performance between methods as means of making MMST more effective. We hope the evidence from our paper motivates machine learning researchers to explore ways in which advances in language models allow for new forms of training.
△ Less
Submitted 20 July, 2023;
originally announced July 2023.
-
Charged $AdS$ Black Holes in $4D$ Einstein--Gauss--Bonnet Massive Gravity
Authors:
Prosenjit Paul,
Sudhaker Upadhyay,
Dharm Veer Singh
Abstract:
We investigate Einstein--Gauss--Bonnet--Maxwell massive gravity in $4D$ AdS background and find an exact black hole solution. The horizon structure of the black holes studied. Treating the cosmological constant as pressure and Gauss-Bonnet coupling parameters, and massive gravity parameters as variables, we drive the first law of black hole thermodynamics. To study the global stability of the blac…
▽ More
We investigate Einstein--Gauss--Bonnet--Maxwell massive gravity in $4D$ AdS background and find an exact black hole solution. The horizon structure of the black holes studied. Treating the cosmological constant as pressure and Gauss-Bonnet coupling parameters, and massive gravity parameters as variables, we drive the first law of black hole thermodynamics. To study the global stability of the black holes we compute the Gibbs free energy. The local stability of the black hole is also studied through specific heat. We analyze the effects of graviton mass and Gauss-Bonnet coupling parameters on the phase transition of the black holes. Finally, the effects of graviton mass and massive gravity parameters on the Joule-Thomson expansion of the black hole are studied.
△ Less
Submitted 17 July, 2023;
originally announced July 2023.
-
A Unifying Framework for Differentially Private Sums under Continual Observation
Authors:
Monika Henzinger,
Jalaj Upadhyay,
Sarvagya Upadhyay
Abstract:
We study the problem of maintaining a differentially private decaying sum under continual observation. We give a unifying framework and an efficient algorithm for this problem for \emph{any sufficiently smooth} function. Our algorithm is the first differentially private algorithm that does not have a multiplicative error for polynomially-decaying weights. Our algorithm improves on all prior works…
▽ More
We study the problem of maintaining a differentially private decaying sum under continual observation. We give a unifying framework and an efficient algorithm for this problem for \emph{any sufficiently smooth} function. Our algorithm is the first differentially private algorithm that does not have a multiplicative error for polynomially-decaying weights. Our algorithm improves on all prior works on differentially private decaying sums under continual observation and recovers exactly the additive error for the special case of continual counting from Henzinger et al. (SODA 2023) as a corollary.
Our algorithm is a variant of the factorization mechanism whose error depends on the $γ_2$ and $γ_F$ norm of the underlying matrix. We give a constructive proof for an almost exact upper bound on the $γ_2$ and $γ_F$ norm and an almost tight lower bound on the $γ_2$ norm for a large class of lower-triangular matrices. This is the first non-trivial lower bound for lower-triangular matrices whose non-zero entries are not all the same. It includes matrices for all continual decaying sums problems, resulting in an upper bound on the additive error of any differentially private decaying sums algorithm under continual observation.
We also explore some implications of our result in discrepancy theory and operator algebra. Given the importance of the $γ_2$ norm in computer science and the extensive work in mathematics, we believe our result will have further applications.
△ Less
Submitted 18 July, 2023;
originally announced July 2023.
-
More Exact Thermodynamics of Nonlinear Charged AdS Black Holes in 4D Critical Gravity
Authors:
Prosenjit Paul,
Sudhaker Upadhyay,
Yerlan Myrzakulov,
Dharm Veer Singh,
Kairat Myrzakulov
Abstract:
In this paper, we investigate nonlinearly charged AdS black holes in four-dimensional critical gravity and study more exact black hole thermodynamics under the effect of small statistical fluctuations. We compute the correction to the thermodynamics of nonlinearly charged AdS black hole up to the leading order. We discuss the stability of black holes under the circumstances of fluctuation and find…
▽ More
In this paper, we investigate nonlinearly charged AdS black holes in four-dimensional critical gravity and study more exact black hole thermodynamics under the effect of small statistical fluctuations. We compute the correction to the thermodynamics of nonlinearly charged AdS black hole up to the leading order. We discuss the stability of black holes under the circumstances of fluctuation and find that fluctuation causes instability in the black holes. Moreover, both the isothermal and adiabatic compressibilities are also derived. Finally, we estimate the role of small fluctuations on the equation of states and study the $P-v$ diagram of nonlinearly charged AdS black hole.
△ Less
Submitted 5 July, 2023;
originally announced July 2023.
-
Electrocatalytic Performance of 2D Monolayer WSeTe Janus Transition Metal Dichalcogenide for Highly Efficient H2 Evolution Reaction
Authors:
Vikash Kumar,
Shrish Nath Upadhyay,
Dikeshwar Halba,
Srimanta Pakhira
Abstract:
Now-a-days, the development of clean and green energy sources is the prior interest of research due to increasing global energy demand and extensive usage of fossil fuels that create pollutants. Hydrogen has the highest energy density by weight among all chemical fuels. For the commercial-scale production of hydrogen, water electrolysis is the best method which in turn requires an efficient, cost-…
▽ More
Now-a-days, the development of clean and green energy sources is the prior interest of research due to increasing global energy demand and extensive usage of fossil fuels that create pollutants. Hydrogen has the highest energy density by weight among all chemical fuels. For the commercial-scale production of hydrogen, water electrolysis is the best method which in turn requires an efficient, cost-effective and earth-abundant electrocatalyst. Recent studies have shown that the 2D Janus TMDs are highly effective in the electrocatalytic activity for HER. Herein we report a 2D monolayer WSeTe Janus TMD electrocatalyst for HER. We studied the electronic properties of 2D monolayer WSeTe Janus TMD using periodic DFT calculations, and the direct electronic band gap was obtained to be 2.39 eV. After the calculations of electronic properties, we explored the HER intermediates including various transition state structures (Volmer TS, Heyrovsky TS, and Tafel TS) using a molecular cluster model of WSeTe noted as W10Se9Te12. The present calculations revealed that the 2D monolayer WSeTe Janus TMD is a potential electrocatalyst for HER. It has the lowest energy barriers for all the TSs among other TMDs, such as MoS2, Mn-MoS2, MoSSe, etc. The calculated Heyrovsky energy barrier (= 8.72 kcal.mol-1) for the Volmer-Heyrovsky mechanism is larger than the Tafel energy barrier (=3.27 kcal.mol-1) in the Volmer-Tafel mechanism. Hence our present study suggests that the formation of H2 is energetically more favorable via the Vomer-Tafel mechanism. This work helps shed light on the rational design of effective HER catalysts.
△ Less
Submitted 27 June, 2023;
originally announced June 2023.
-
Nilpotency and Capability in multiplicative Lie algebras
Authors:
Amit Kumar,
Mani Shankar Pandey,
Sumit Kumar Upadhyay
Abstract:
This paper aims to introduce the concept of nilpotency and capability in multiplicative Lie algebras. Also, we see the existence of covers of a multiplicative Lie algebra and thoroughly examine their relationships with capable and perfect multiplicative Lie algebras.
This paper aims to introduce the concept of nilpotency and capability in multiplicative Lie algebras. Also, we see the existence of covers of a multiplicative Lie algebra and thoroughly examine their relationships with capable and perfect multiplicative Lie algebras.
△ Less
Submitted 27 May, 2023;
originally announced May 2023.
-
Multiplicative Lie algebra structures on semi-direct product of groups
Authors:
Deepak Pal,
Amit Kumar,
Sumit Kumar Upadhyay,
Seema Kushwaha
Abstract:
The main aim of this paper is to determine the multiplicative lie algebra structures on the semi-direct product of an abelian group with a group under certain conditions.
The main aim of this paper is to determine the multiplicative lie algebra structures on the semi-direct product of an abelian group with a group under certain conditions.
△ Less
Submitted 19 May, 2023;
originally announced May 2023.
-
Quasinormal Modes and Phase Structure of Regular $AdS$ Einstein-Gauss-Bonnet Black Holes
Authors:
Yerlan Myrzakulov,
Kairat Myrzakulov,
Sudhaker Upadhyay,
Dharm Veer Singh
Abstract:
In this paper, we present an exact regular black hole solution in Einstein-Gauss-Bonnet coupled with nonlinear matter fields. It is a generalization of a regular Einstein-Gauss-Bonnet black hole in $5D$ $AdS$ spacetime. The causal structure of the obtained solution identifies with Boulware-Deser black hole solution, except for the curvature singularity at the center. It incorporates the Boulware-D…
▽ More
In this paper, we present an exact regular black hole solution in Einstein-Gauss-Bonnet coupled with nonlinear matter fields. It is a generalization of a regular Einstein-Gauss-Bonnet black hole in $5D$ $AdS$ spacetime. The causal structure of the obtained solution identifies with Boulware-Deser black hole solution, except for the curvature singularity at the center. It incorporates the Boulware-Deser black holes in the absence of deviation parameters. We also study the thermodynamic properties of the solution that satisfies a modified first law of thermodynamics. Furthermore, we discuss the stability of the obtained black hole solution and, in this regard, a double phase transition occurs. Within context, we find that phase transition exists at the point where the heat capacity diverges and, incidentally, the temperature attains the maximum value. We discuss the fluid nature of the black hole also exhibiting critical points. The quasinormal modes of the black hole solution and their dependencies on Gauss-Bonnet coupling and deviation parameters are also analysed in terms of null geodesics.
△ Less
Submitted 18 May, 2023;
originally announced May 2023.
-
A Primer on Security of Quantum Computing
Authors:
Swaroop Ghosh,
Suryansh Upadhyay,
Abdullah Ash Saki
Abstract:
Quantum computing is an emerging computing paradigm that can potentially transform several application areas by solving some of the intractable problems from classical domain. Similar to classical computing systems, quantum computing stack including software and hardware rely extensively on third parties many of them could be untrusted or less-trusted or unreliable. Quantum computing stack may con…
▽ More
Quantum computing is an emerging computing paradigm that can potentially transform several application areas by solving some of the intractable problems from classical domain. Similar to classical computing systems, quantum computing stack including software and hardware rely extensively on third parties many of them could be untrusted or less-trusted or unreliable. Quantum computing stack may contain sensitive Intellectual Properties (IP) that requires protection. From hardware perspective, quantum computers suffer from crosstalk that couples two programs in a multi-tenant setting to facilitate traditionally known fault injection attacks. Furthermore, third party calibration services can report incorrect error rates of qubits or mis-calibrate the qubits to degrade the computation performance for denial-of-service attacks. Quantum computers are expensive and access queue is typically long for trusted providers. Therefore, users may be enticed to explore untrusted but cheaper and readily available quantum hardware which can enable stealth of IP and tampering of quantum programs and/or computation outcomes. Recent studies have indicated the evolution of efficient but untrusted compilation services which presents risks to the IPs present in the quantum circuits. The untrusted compiler can also inject Trojans and perform tampering. Although quantum computing can involve sensitive IP and private information and can solve problems with strategic impact, its security and privacy has received inadequate attention. This paper provides comprehensive overview of the basics of quantum computing, key vulnerabilities embedded in the quantum systems and the recent attack vectors and corresponding defenses. Future research directions are also provided to build a stronger community of quantum security investigators.
△ Less
Submitted 3 May, 2023;
originally announced May 2023.
-
Obfuscating Quantum Hybrid-Classical Algorithms for Security and Privacy
Authors:
Suryansh Upadhyay,
Swaroop Ghosh
Abstract:
As the quantum computing ecosystem grows in popularity and utility it is important to identify and address the security and privacy vulnerabilities before they can be widely exploited. One major concern is the involvement of third party tools and hardware. Usage of untrusted hardware could present the risk of intellectual property (IP) theft. For example the hybrid quantum classical algorithms lik…
▽ More
As the quantum computing ecosystem grows in popularity and utility it is important to identify and address the security and privacy vulnerabilities before they can be widely exploited. One major concern is the involvement of third party tools and hardware. Usage of untrusted hardware could present the risk of intellectual property (IP) theft. For example the hybrid quantum classical algorithms like QAOA encodes the graph properties e.g. number of nodes edges and connectivity in the parameterized quantum circuit to solve a graph maxcut problem. QAOA employs a classical computer which optimizes the parameters of a parametric quantum circuit (which encodes graph structure) iteratively by executing the circuit on a quantum hardware and measuring the output. The graph properties can be readily retrieved by analyzing the QAOA circuit by the untrusted quantum hardware provider. To mitigate this risk, we propose an edge pruning obfuscation method for QAOA along with a split iteration methodology. The basic idea is to (i) create two flavors of QAOA circuit each with few distinct edges eliminated from the problem graph for obfuscation (ii) iterate the circuits alternately during optimization process to uphold the optimization quality and (iii) send the circuits to two different untrusted hardware provider so that the adversary has access to partial graph protecting the IP. We demonstrate that combining edge pruning obfuscation with split iteration on two different hardware secures the IP and increases the difficulty of reconstruction while limiting performance degradation to a maximum of 10 percent (approximately 5 percent on average) and maintaining low overhead costs (less than 0.5X for QAOA with single layer implementation).
△ Less
Submitted 3 May, 2023;
originally announced May 2023.
-
Trustworthy Computing using Untrusted Cloud-Based Quantum Hardware
Authors:
Suryansh Upadhyay,
Rasit Onur Topaloglu,
Swaroop Ghosh
Abstract:
Security and reliability are primary concerns in any computing paradigm including quantum computing. Currently users can access quantum computers through a cloud based platform where they can run their programs on a suite of quantum computers. As the quantum computing ecosystem grows in popularity and utility it is reasonable to expect that more companies including untrusted or less trusted or unr…
▽ More
Security and reliability are primary concerns in any computing paradigm including quantum computing. Currently users can access quantum computers through a cloud based platform where they can run their programs on a suite of quantum computers. As the quantum computing ecosystem grows in popularity and utility it is reasonable to expect that more companies including untrusted or less trusted or unreliable vendors will begin offering quantum computers as hardware as a service at varied price or performance points. Since computing time on quantum hardware is expensive and the access queue could be long the users will be motivated to use the cheaper and readily available but unreliable or less trusted hardware. The less trusted vendors can tamper with the results providing a suboptimal solution to the user. In this paper we model this adversarial tampering and simulate its impact on a number of pure quantum and hybrid quantum classical workloads. To guarantee trustworthy computing for a mixture of trusted and untrusted hardware we propose distributing the total number of shots equally among the various hardware options. On average we note approx 30X and approx 1.5X improvement across the pure quantum workloads and a maximum improvement of approx 5X for hybrid classical algorithm in the chosen quality metrics. We also propose an intelligent run adaptive split heuristic leveraging temporal variation in hardware quality to users advantage allowing them to identify tampered or untrustworthy hardware at runtime and allocate more number of shots to the reliable hardware which results in a maximum improvement of approx 190X and approx 9X across the pure quantum workloads and an improvement of up to approx 2.5X for hybrid classical algorithm.
△ Less
Submitted 2 May, 2023;
originally announced May 2023.
-
Continuous motion of an electrically actuated water droplet over a PDMS-coated surface
Authors:
Supriya Upadhyay,
K. Muralidhar
Abstract:
Electrically actuated continuous motion of a water droplet over PDMS-coated single active electrode is analyzed from detailed modeling and experiments. In an experiment, continuous motion of the droplet is achieved when it is located over an active electrode with a horizontal ground wire placed just above in an open EWOD configuration. Using a CCD camera, the instantaneous centroid position of the…
▽ More
Electrically actuated continuous motion of a water droplet over PDMS-coated single active electrode is analyzed from detailed modeling and experiments. In an experiment, continuous motion of the droplet is achieved when it is located over an active electrode with a horizontal ground wire placed just above in an open EWOD configuration. Using a CCD camera, the instantaneous centroid position of the droplet is determined and its velocity is inferred by numerical differentiation. The edge-detected image is also used to determine the advancing and receding contact angles of the moving drop relative to the substrate. Motion of 2, 6, and 10 microliter water droplets for voltages in the range of 170-270 VDC is examined to investigate the effect of drop volume and voltage on drop deformation and velocity. Simulations have been carried out using COMSOL Multiphysics with full coupling between the electric field and hydrodynamics. The motion of the droplet is initiated by Young-Lippmann spreading at the three-phase contact line, followed by a nonuniform electric force field distributed between the active electrode and the ground wire localized at the droplet-air interface. The solver evaluates the Maxwell's stress tensor and introduces it as a volumetric electrostatic force in the Navier-Stokes equations. The fully coupled numerical solution shows a good match with experimentally determined drop movement over a silicone oil-coated PDMS layer for which contact line friction is absent. A contact angle model with friction leads to close agreement between simulations and drop motion over a bare PDMS layer. Over both surfaces, continuous motion of the water droplet is seen to be achieved in three stages, namely, initial spreading, acceleration, and attainment of constant speed. Numerical modeling that includes electric field-fluid flow coupling is shown to yield data in conformity with experiments.
△ Less
Submitted 30 April, 2023;
originally announced May 2023.
-
Bouncing universe for deformed non-minimally coupled inflation model
Authors:
Sudhaker Upadhyay
Abstract:
In this paper, we consider a non-minimally coupled gravity model to study the bouncing universe. The holographic principle has various effects on the bouncing universe. We choose some suitable new variables and achieve the new Hamiltonian and Lagrangian which have harmonic oscillator form. The corresponding Lagrangian is deformed by non-commutative geometry. In order to have a solution for the bou…
▽ More
In this paper, we consider a non-minimally coupled gravity model to study the bouncing universe. The holographic principle has various effects on the bouncing universe. We choose some suitable new variables and achieve the new Hamiltonian and Lagrangian which have harmonic oscillator form. The corresponding Lagrangian is deformed by non-commutative geometry. In order to have a solution for the bouncing universe we specify the potential in the equation state. In that case, we draw the equation of state in terms of time and show that the equation of state crosses $-1$. Such bouncing behavior leads us to apply some conditions on $θ$ and $β$ from non-commutative geometry. Here, we can also check the system's stability due to the deformation of the non-minimally coupled gravity model. In order to examine the stability of the system we obtain the variation of pressure with respect to density energy. Also, we draw the variation of pressure with respect to energy density and show the stability condition.
△ Less
Submitted 26 April, 2023;
originally announced April 2023.
-
Describing the effect of influential spreaders on the different sectors of Indian market: a complex networks perspective
Authors:
Anwesha Sengupta,
Shashankaditya Upadhyay,
Indranil Mukherjee,
Prasanta K. Panigrahi
Abstract:
Market competition has a role which is directly or indirectly associated with influential effects of individual sectors on other sectors of the economy. The present work studies the relative position of a product in the market through the identification of influential spreaders and its corresponding effect on the other sectors of the market using complex network analysis during the pre-, in-, and…
▽ More
Market competition has a role which is directly or indirectly associated with influential effects of individual sectors on other sectors of the economy. The present work studies the relative position of a product in the market through the identification of influential spreaders and its corresponding effect on the other sectors of the market using complex network analysis during the pre-, in-, and post-crisis induced lockdown periods using daily data of NSE from December, 2019 to June, 2021. The existing approaches using different centrality measures failed to distinguish between the positive and negative influences of the different sectors in the market which act as spreaders. To obviate this problem, this paper presents an effective measure called LIEST (Local Influential Effects for Specific Target) that can examine the positive and negative influences separately with respect to any crisis period. LIEST considers the combined impact of all possible nodes which are at most three steps away from the specific targets for the networks. The essence of non-linearity in the network dynamics without considering single node effect becomes visible particularly in the proposed network.
△ Less
Submitted 17 October, 2022;
originally announced March 2023.
-
Weak Deflection Angle, Greybody Bound and Shadow for Charged Massive BTZ Black Hole
Authors:
Sudhaker Upadhyay,
Surajit Mandal,
Yerlan Myrzakulov,
Kairat Myrzakulov
Abstract:
We provide a discussion on a light ray in a charged black hole solution in massive gravity. To serve the purpose, we exploit the optical geometry of the black hole solution and find the Gaussian curvature in weak gravitational lensing. Furthermore, we discuss the deflection angle of the light ray in both plasma and non-plasma mediums using the Gauss-Bonnet theorem on the black hole. We also analyz…
▽ More
We provide a discussion on a light ray in a charged black hole solution in massive gravity. To serve the purpose, we exploit the optical geometry of the black hole solution and find the Gaussian curvature in weak gravitational lensing. Furthermore, we discuss the deflection angle of the light ray in both plasma and non-plasma mediums using the Gauss-Bonnet theorem on the black hole. We also analyze the Regge--Wheeler equation and derive rigorous bounds on the greybody factors of linearly charged massive BTZ black hole. We also study the shadow or silhouette generated by charged massive BTZ black holes. The effects of charge and cosmological constant on the radius of the shadow are also discussed.
△ Less
Submitted 3 March, 2023;
originally announced March 2023.
-
Efficient Encoders for Streaming Sequence Tagging
Authors:
Ayush Kaushal,
Aditya Gupta,
Shyam Upadhyay,
Manaal Faruqui
Abstract:
A naive application of state-of-the-art bidirectional encoders for streaming sequence tagging would require encoding each token from scratch for each new token in an incremental streaming input (like transcribed speech). The lack of re-usability of previous computation leads to a higher number of Floating Point Operations (or FLOPs) and higher number of unnecessary label flips. Increased FLOPs con…
▽ More
A naive application of state-of-the-art bidirectional encoders for streaming sequence tagging would require encoding each token from scratch for each new token in an incremental streaming input (like transcribed speech). The lack of re-usability of previous computation leads to a higher number of Floating Point Operations (or FLOPs) and higher number of unnecessary label flips. Increased FLOPs consequently lead to higher wall-clock time and increased label flip** leads to poorer streaming performance. In this work, we present a Hybrid Encoder with Adaptive Restart (HEAR) that addresses these issues while maintaining the performance of bidirectional encoders over the offline (or complete) inputs while improving performance on streaming (or incomplete) inputs. HEAR has a Hybrid unidirectional-bidirectional encoder architecture to perform sequence tagging, along with an Adaptive Restart Module (ARM) to selectively guide the restart of bidirectional portion of the encoder. Across four sequence tagging tasks, HEAR offers FLOP savings in streaming settings upto 71.1% and also outperforms bidirectional encoders for streaming predictions by upto +10% streaming exact match.
△ Less
Submitted 16 March, 2023; v1 submitted 22 January, 2023;
originally announced January 2023.
-
Exponential corrected thermodynamics of Born-Infeld BTZ black holes in massive gravity
Authors:
B. Pourhassan,
M. Dehghani,
S. Upadhyay,
I. Sakalli,
D. V. Singh
Abstract:
It is known that entropy of black hole gets correction at quantum level. Universally, these corrections are logarithmic and exponential in nature. We analyze the impacts of these quantum corrections on thermodynamics of Born-Infeld BTZ black hole in massive gravity by considering both such kinds of correction. We do comparative analysis of corrected thermodynamics with their equilibrium values. He…
▽ More
It is known that entropy of black hole gets correction at quantum level. Universally, these corrections are logarithmic and exponential in nature. We analyze the impacts of these quantum corrections on thermodynamics of Born-Infeld BTZ black hole in massive gravity by considering both such kinds of correction. We do comparative analysis of corrected thermodynamics with their equilibrium values. Here, we find that the exponential correction yields to the second point of the first order phase transition. Also, quantum correction effects significantly on the Helmholtz free energy of larger black holes. We study the equation of state for the exponential corrected black hole to obtain a leading order virial expansion.
△ Less
Submitted 25 December, 2022;
originally announced January 2023.
-
Isoclinism in multiplicative Lie algebras
Authors:
Mani Shankar Pandey,
Sumit Kumar Upadhyay
Abstract:
The purpose of this paper is to introduce the notion of isoclinism and cover in a multiplicative Lie algebra which may be helpful to describe all multiplicative Lie algebra structures on a group. Consequently, we give the existence of the stem multiplicative Lie algebra. We also give the necessary and sufficient conditions for the existence of stem cover of a multiplicative Lie algebra.
The purpose of this paper is to introduce the notion of isoclinism and cover in a multiplicative Lie algebra which may be helpful to describe all multiplicative Lie algebra structures on a group. Consequently, we give the existence of the stem multiplicative Lie algebra. We also give the necessary and sufficient conditions for the existence of stem cover of a multiplicative Lie algebra.
△ Less
Submitted 25 January, 2023; v1 submitted 21 December, 2022;
originally announced December 2022.
-
Metric Elicitation; Moving from Theory to Practice
Authors:
Safinah Ali,
Sohini Upadhyay,
Gaurush Hiranandani,
Elena L. Glassman,
Oluwasanmi Koyejo
Abstract:
Metric Elicitation (ME) is a framework for eliciting classification metrics that better align with implicit user preferences based on the task and context. The existing ME strategy so far is based on the assumption that users can most easily provide preference feedback over classifier statistics such as confusion matrices. This work examines ME, by providing a first ever implementation of the ME s…
▽ More
Metric Elicitation (ME) is a framework for eliciting classification metrics that better align with implicit user preferences based on the task and context. The existing ME strategy so far is based on the assumption that users can most easily provide preference feedback over classifier statistics such as confusion matrices. This work examines ME, by providing a first ever implementation of the ME strategy. Specifically, we create a web-based ME interface and conduct a user study that elicits users' preferred metrics in a binary classification setting. We discuss the study findings and present guidelines for future research in this direction.
△ Less
Submitted 7 December, 2022;
originally announced December 2022.
-
Quasinormal modes, shadow and thermodynamics of black holes coupled with nonlinear electrodynamics and cloud of strings
Authors:
Dharm Veer Singh,
Aradhya Shukla,
Sudhaker Upadhyay
Abstract:
We construct an exact black hole solution for the Einstein gravity coupled with the nonlinear electrodynamics (which corresponds to the Maxwell electrodynamics in the weak field limit) in the presence of a cloud of strings as the source. We study the thermodynamical properties of the black hole solutions and derive the corrected first-law of thermodynamics. The presence of a cloud of strings does…
▽ More
We construct an exact black hole solution for the Einstein gravity coupled with the nonlinear electrodynamics (which corresponds to the Maxwell electrodynamics in the weak field limit) in the presence of a cloud of strings as the source. We study the thermodynamical properties of the black hole solutions and derive the corrected first-law of thermodynamics. The presence of a cloud of strings does not affect the stability of the present black hole. However, a second-order phase transition exists for this system at a critical horizon radius. Furthermore, we study the quasinormal modes and their shadow radius. In addition, we find that, upon variation, the parameters of the theory show different aspects of the optical characteristics of the black hole solutions.
△ Less
Submitted 14 November, 2022;
originally announced November 2022.
-
CST5: Data Augmentation for Code-Switched Semantic Parsing
Authors:
Anmol Agarwal,
Jigar Gupta,
Rahul Goel,
Shyam Upadhyay,
Pankaj Joshi,
Rengarajan Aravamudhan
Abstract:
Extending semantic parsers to code-switched input has been a challenging problem, primarily due to a lack of supervised training data. In this work, we introduce CST5, a new data augmentation technique that finetunes a T5 model using a small seed set ($\approx$100 utterances) to generate code-switched utterances from English utterances. We show that CST5 generates high quality code-switched data,…
▽ More
Extending semantic parsers to code-switched input has been a challenging problem, primarily due to a lack of supervised training data. In this work, we introduce CST5, a new data augmentation technique that finetunes a T5 model using a small seed set ($\approx$100 utterances) to generate code-switched utterances from English utterances. We show that CST5 generates high quality code-switched data, both intrinsically (per human evaluation) and extrinsically by comparing baseline models which are trained without data augmentation to models which are trained with augmented data. Empirically we observe that using CST5, one can achieve the same semantic parsing performance by using up to 20x less labeled data. To aid further research in this area, we are also releasing (a) Hinglish-TOP, the largest human annotated code-switched semantic parsing dataset to date, containing 10k human annotated Hindi-English (Hinglish) code-switched utterances, and (b) Over 170K CST5 generated code-switched utterances from the TOPv2 dataset. Human evaluation shows that both the human annotated data as well as the CST5 generated data is of good quality.
△ Less
Submitted 14 November, 2022;
originally announced November 2022.
-
Architectures for Quantum Information Processing
Authors:
Suryansh Upadhyay,
Mahabubul Alam,
Swaroop Ghosh
Abstract:
Quantum computing is changing the way we think about computing. Significant strides in research and development for managing and harnessing the power of quantum systems has been made in recent years, demonstrating the potential for transformative quantum technology. Quantum phenomena like superposition, entanglement, and interference can be exploited to solve issues that are difficult for traditio…
▽ More
Quantum computing is changing the way we think about computing. Significant strides in research and development for managing and harnessing the power of quantum systems has been made in recent years, demonstrating the potential for transformative quantum technology. Quantum phenomena like superposition, entanglement, and interference can be exploited to solve issues that are difficult for traditional computers. IBM's first public access to true quantum computers through the cloud, as well as Google's demonstration of quantum supremacy, are among the accomplishments. Besides, a slew of other commercial, government, and academic projects are in the works to create next-generation hardware, a software stack to support the hardware ecosystem, and viable quantum algorithms. This chapter covers various quantum computing architectures including many hardware technologies that are being investigated. We also discuss a variety of challenges, including numerous errors/noise that plague the quantum computers. An overview of literature investigating noise-resilience approaches is also presented.
△ Less
Submitted 11 November, 2022;
originally announced November 2022.
-
Almost Tight Error Bounds on Differentially Private Continual Counting
Authors:
Monika Henzinger,
Jalaj Upadhyay,
Sarvagya Upadhyay
Abstract:
The first large-scale deployment of private federated learning uses differentially private counting in the continual release model as a subroutine (Google AI blog titled "Federated Learning with Formal Differential Privacy Guarantees"). In this case, a concrete bound on the error is very relevant to reduce the privacy parameter. The standard mechanism for continual counting is the binary mechanism…
▽ More
The first large-scale deployment of private federated learning uses differentially private counting in the continual release model as a subroutine (Google AI blog titled "Federated Learning with Formal Differential Privacy Guarantees"). In this case, a concrete bound on the error is very relevant to reduce the privacy parameter. The standard mechanism for continual counting is the binary mechanism. We present a novel mechanism and show that its mean squared error is both asymptotically optimal and a factor 10 smaller than the error of the binary mechanism. We also show that the constants in our analysis are almost tight by giving non-asymptotic lower and upper bounds that differ only in the constants of lower-order terms. Our algorithm is a matrix mechanism for the counting matrix and takes constant time per release. We also use our explicit factorization of the counting matrix to give an upper bound on the excess risk of the private learning algorithm of Denisov et al. (NeurIPS 2022). Our lower bound for any continual counting mechanism is the first tight lower bound on continual counting under approximate differential privacy. It is achieved using a new lower bound on a certain factorization norm, denoted by $γ_F(\cdot)$, in terms of the singular values of the matrix. In particular, we show that for any complex matrix, $A \in \mathbb{C}^{m \times n}$, \[ γ_F(A) \geq \frac{1}{\sqrt{m}}\|A\|_1, \] where $\|\cdot \|$ denotes the Schatten-1 norm.
We believe this technique will be useful in proving lower bounds for a larger class of linear queries. To illustrate the power of this technique, we show the first lower bound on the mean squared error for answering parity queries.
△ Less
Submitted 5 February, 2024; v1 submitted 9 November, 2022;
originally announced November 2022.
-
Corrected thermodynamics of $(2+1)D$ black hole conformally coupled to a massless scalar
Authors:
Himanshu Kumar Sudhanshu,
Sudhaker Upadhyay,
Dharm Veer Singh,
Sunil Kumar
Abstract:
We study the corrected entropy due to thermal fluctuation and their effect on the thermodynamics of a conformally dressed black hole in three dimensions. We find that the thermal fluctuation affects the entropy significantly for small black holes. Various corrected thermodynamical variables are also calculated for this black hole. We observe that thermal fluctuation on the thermodynamics of a smal…
▽ More
We study the corrected entropy due to thermal fluctuation and their effect on the thermodynamics of a conformally dressed black hole in three dimensions. We find that the thermal fluctuation affects the entropy significantly for small black holes. Various corrected thermodynamical variables are also calculated for this black hole. We observe that thermal fluctuation on the thermodynamics of a small conformal black hole has a significant effect. We also analyse the stability of black hole under the effect of thermal fluctuation. Due to thermal fluctuation, instability occurs in the system of small conformal black holes. Isothermal compressibility is also studied for this black hole which diverges for the equilibrium state of the system.
△ Less
Submitted 12 October, 2022;
originally announced October 2022.
-
Robust and Secure Hybrid Quantum-Classical Computation on Untrusted Cloud-Based Quantum Hardware
Authors:
Suryansh Upadhyay,
Swaroop Ghosh
Abstract:
Quantum computers are currently accessible through a cloud-based platform that allows users to run their programs on a suite of quantum hardware. As the quantum computing ecosystem grows in popularity and utility, it is reasonable to expect more companies, including untrustworthy or untrustworthy or unreliable vendors, to begin offering quantum computers as hardware as a service at various price o…
▽ More
Quantum computers are currently accessible through a cloud-based platform that allows users to run their programs on a suite of quantum hardware. As the quantum computing ecosystem grows in popularity and utility, it is reasonable to expect more companies, including untrustworthy or untrustworthy or unreliable vendors, to begin offering quantum computers as hardware as a service at various price or performance points. Since computing time on quantum hardware is expensive and the access queue may be long, users will be enticed to use less expensive but less reliable or trustworthy hardware. Less trusted vendors may tamper with the results and or parameters of quantum circuits, providing the user with a sub-optimal solution or incurring a cost of higher iterations. In this paper, we model and simulate adversarial tampering of input parameters and measurement outcomes on an exemplary hybrid quantum classical algorithm namely, Quantum Approximate Optimization Algorithm (QAOA). We observe a maximum performance degradation of approximately 40%. To achieve comparable performance with minimal parameter tampering, the user incurs a minimum cost of 20X higher iteration. We propose distributing the computation (iterations) equally among the various hardware options to ensure trustworthy computing for a mix of trusted and untrusted hardware. In the chosen performance metrics, we observe a maximum improvement of approximately 30%. In addition, we propose re-initialization of the parameters after a few initial iterations to fully recover the original program performance and an intelligent run adaptive split heuristic, which allows users to identify tampered/untrustworthy hardware at runtime and allocate more iterations to the reliable hardware, resulting in a maximum improvement of approximately 45%.
△ Less
Submitted 23 September, 2022;
originally announced September 2022.