-
What is unethical about software? User perceptions in the Netherlands
Authors:
Yagil Elias,
Tom P. Humbert,
Lauren Olson,
Emitzá Guzmán
Abstract:
Software has the potential to improve lives. Yet, unethical and uninformed software practices are at the root of an increasing number of ethical concerns. Despite its pervasiveness, few research has analyzed end-users perspectives on the ethical issues of the software they use. We address this gap, and investigate end-user's ethical concerns in software through 19 semi-structured interviews with r…
▽ More
Software has the potential to improve lives. Yet, unethical and uninformed software practices are at the root of an increasing number of ethical concerns. Despite its pervasiveness, few research has analyzed end-users perspectives on the ethical issues of the software they use. We address this gap, and investigate end-user's ethical concerns in software through 19 semi-structured interviews with residents of the Netherlands. We ask a diverse group of users about their ethical concerns when using everyday software applications. We investigate the underlying reasons for their concerns and what solutions they propose to eliminate them. We find that our participants actively worry about privacy, transparency, manipulation, safety and inappropriate content; with privacy and manipulation often being at the center of their worries. Our participants demand software solutions to improve information clarity in applications and provide more control over the user experience. They further expect larger systematic changes within software practices and government regulation.
△ Less
Submitted 16 March, 2025;
originally announced March 2025.
-
Identifying, measuring, and mitigating individual unfairness for supervised learning models and application to credit risk models
Authors:
Rasoul Shahsavarifar,
Jithu Chandran,
Mario Inchiosa,
Amit Deshpande,
Mario Schlener,
Vishal Gossain,
Yara Elias,
Vinaya Murali
Abstract:
In the past few years, Artificial Intelligence (AI) has garnered attention from various industries including financial services (FS). AI has made a positive impact in financial services by enhancing productivity and improving risk management. While AI can offer efficient solutions, it has the potential to bring unintended consequences. One such consequence is the pronounced effect of AI-related un…
▽ More
In the past few years, Artificial Intelligence (AI) has garnered attention from various industries including financial services (FS). AI has made a positive impact in financial services by enhancing productivity and improving risk management. While AI can offer efficient solutions, it has the potential to bring unintended consequences. One such consequence is the pronounced effect of AI-related unfairness and attendant fairness-related harms. These fairness-related harms could involve differential treatment of individuals; for example, unfairly denying a loan to certain individuals or groups of individuals. In this paper, we focus on identifying and mitigating individual unfairness and leveraging some of the recently published techniques in this domain, especially as applicable to the credit adjudication use case. We also investigate the extent to which techniques for achieving individual fairness are effective at achieving group fairness. Our main contribution in this work is functionalizing a two-step training process which involves learning a fair similarity metric from a group sense using a small portion of the raw data and training an individually "fair" classifier using the rest of the data where the sensitive features are excluded. The key characteristic of this two-step technique is related to its flexibility, i.e., the fair metric obtained in the first step can be used with any other individual fairness algorithms in the second step. Furthermore, we developed a second metric (distinct from the fair similarity metric) to determine how fairly a model is treating similar individuals. We use this metric to compare a "fair" model against its baseline model in terms of their individual fairness value. Finally, some experimental results corresponding to the individual unfairness mitigation techniques are presented.
△ Less
Submitted 11 November, 2022;
originally announced November 2022.
-
Heights of CM cycles and derivatives of L-series
Authors:
Yara Elias,
Tian An Wong
Abstract:
We extend the work of S. Zhang and Yuan-Zhang-Zhang to obtain a Gross-Zagier formula for modular forms of even weight in terms of an arithmetic intersection pairing of CM-cycles on Kuga-Sato varieties over Shimura curves. Combined with a result of the first author and de Vera-Piquero adapting Kolyvagin's method of Euler systems to this setting, we bound the associated Selmer and Tate-Shafarevich g…
▽ More
We extend the work of S. Zhang and Yuan-Zhang-Zhang to obtain a Gross-Zagier formula for modular forms of even weight in terms of an arithmetic intersection pairing of CM-cycles on Kuga-Sato varieties over Shimura curves. Combined with a result of the first author and de Vera-Piquero adapting Kolyvagin's method of Euler systems to this setting, we bound the associated Selmer and Tate-Shafarevich groups, assuming the non-vanishing of the derivative of the L-function at the central point.
△ Less
Submitted 3 May, 2019; v1 submitted 19 August, 2017;
originally announced August 2017.
-
Non-ordinary curves with a Prym variety of low $p$-rank
Authors:
Turku Ozlum Celik,
Yara Elias,
Burcin Gunes,
Rachel Newton,
Ekin Ozman,
Rachel Pries,
Lara Thomas
Abstract:
If $π: Y \to X$ is an unramified double cover of a smooth curve of genus $g$, then the Prym variety $P_π$ is a principally polarized abelian variety of dimension $g-1$. When $X$ is defined over an algebraically closed field $k$ of characteristic $p$, it is not known in general which $p$-ranks can occur for $P_π$ under restrictions on the $p$-rank of $X$. In this paper, when $X$ is a non-hyperellip…
▽ More
If $π: Y \to X$ is an unramified double cover of a smooth curve of genus $g$, then the Prym variety $P_π$ is a principally polarized abelian variety of dimension $g-1$. When $X$ is defined over an algebraically closed field $k$ of characteristic $p$, it is not known in general which $p$-ranks can occur for $P_π$ under restrictions on the $p$-rank of $X$. In this paper, when $X$ is a non-hyperelliptic curve of genus $g=3$, we analyze the relationship between the Hasse-Witt matrices of $X$ and $P_π$. As an application, when $p \equiv 5 \bmod 6$, we prove that there exists a curve $X$ of genus $3$ and $p$-rank $f=3$ having an unramified double cover $π:Y \to X$ for which $P_π$ has $p$-rank $0$ (and is thus supersingular); for $3 \leq p \leq 19$, we verify the same for each $0 \leq f \leq 3$. Using theoretical results about $p$-rank stratifications of moduli spaces, we prove, for small $p$ and arbitrary $g \geq 3$, that there exists an unramified double cover $π: Y \to X$ such that both $X$ and $P_π$ have small $p$-rank.
△ Less
Submitted 11 August, 2017;
originally announced August 2017.
-
CM cycles on Kuga-Sato varieties over Shimura curves and Selmer groups
Authors:
Yara Elias,
Carlos de Vera-Piquero
Abstract:
Given a modular form f of even weight larger than two and an imaginary quadratic field K satisfying a relaxed Heegner hypothesis, we construct a collection of CM cycles on a Kuga-Sato variety over a suitable Shimura curve which gives rise to a system of Galois cohomology classes attached to f enjoying the compatibility properties of an Euler system. Then we use Kolyvagin's method, as adapted by Ne…
▽ More
Given a modular form f of even weight larger than two and an imaginary quadratic field K satisfying a relaxed Heegner hypothesis, we construct a collection of CM cycles on a Kuga-Sato variety over a suitable Shimura curve which gives rise to a system of Galois cohomology classes attached to f enjoying the compatibility properties of an Euler system. Then we use Kolyvagin's method, as adapted by Nekovar to higher weight modular forms, to bound the size of the relevant Selmer group associated to f and K and prove the finiteness of the (primary part) of the Shafarevich-Tate group, provided that a suitable cohomology class does not vanish.
△ Less
Submitted 30 October, 2016;
originally announced October 2016.
-
On Generalized Addition Chains
Authors:
Yara Elias,
Pierre McKenzie
Abstract:
Given integers d >= 1, and g >= 2, a g-addition chain for d is a sequence of integers a_0=1, a_1, a_2,..., a_{r-1}, a_r=d where a_i=a_{j_1}+a_{j_2}+...+a_{j_k}, with 2 =< k =< g, and 0 =< j_1 =< j_2 =< ... =< j_k =< i-1. The length of a g-addition chain is r, the number of terms following 1 in the sequence. We denote by l_g(d) the length of a shortest addition chain for d. Many results have been e…
▽ More
Given integers d >= 1, and g >= 2, a g-addition chain for d is a sequence of integers a_0=1, a_1, a_2,..., a_{r-1}, a_r=d where a_i=a_{j_1}+a_{j_2}+...+a_{j_k}, with 2 =< k =< g, and 0 =< j_1 =< j_2 =< ... =< j_k =< i-1. The length of a g-addition chain is r, the number of terms following 1 in the sequence. We denote by l_g(d) the length of a shortest addition chain for d. Many results have been established in the case g=2. Our aim is to establish the same sort of results for arbitrary fixed g. In particular, we adapt methods for constructing g-addition chains when g=2 to the case g>2 and we study the asymptotic behavior of l_g.
△ Less
Submitted 24 July, 2016;
originally announced July 2016.
-
Ring-LWE Cryptography for the Number Theorist
Authors:
Yara Elias,
Kristin E. Lauter,
Ekin Ozman,
Katherine E. Stange
Abstract:
In this paper, we survey the status of attacks on the ring and polynomial learning with errors problems (RLWE and PLWE). Recent work on the security of these problems [Eisenträger-Hallgren-Lauter, Elias-Lauter-Ozman-Stange] gives rise to interesting questions about number fields. We extend these attacks and survey related open problems in number theory, including spectral distortion of an algebrai…
▽ More
In this paper, we survey the status of attacks on the ring and polynomial learning with errors problems (RLWE and PLWE). Recent work on the security of these problems [Eisenträger-Hallgren-Lauter, Elias-Lauter-Ozman-Stange] gives rise to interesting questions about number fields. We extend these attacks and survey related open problems in number theory, including spectral distortion of an algebraic number and its relationship to Mahler measure, the monogenic property for the ring of integers of a number field, and the size of elements of small order modulo q.
△ Less
Submitted 23 September, 2015; v1 submitted 6 August, 2015;
originally announced August 2015.
-
On the Selmer group attached to a modular form and an algebraic Hecke character
Authors:
Yara Elias
Abstract:
We construct an Euler system of generalized Heegner cycles to bound the Selmer group associated to a modular form and an algebraic Hecke character. The main argument is based on Kolyvagin's machinery explained by Gross while the key object of the Euler system, the generalized Heegner cycles, were first considered by Bertolini, Darmon and Prasanna.
We construct an Euler system of generalized Heegner cycles to bound the Selmer group associated to a modular form and an algebraic Hecke character. The main argument is based on Kolyvagin's machinery explained by Gross while the key object of the Euler system, the generalized Heegner cycles, were first considered by Bertolini, Darmon and Prasanna.
△ Less
Submitted 2 October, 2016; v1 submitted 9 March, 2015;
originally announced March 2015.
-
Kolyvagin's method for Chow groups of Kuga-Sato varieties over ring class fields
Authors:
Yara Elias
Abstract:
We use an Euler system of Heegner cycles to bound the Selmer group associated to a modular form of higher even weight twisted by a ring class character. This is an extension of Nekovar's result that uses Bertolini and Darmon's refinement of Kolyvagin's ideas.
We use an Euler system of Heegner cycles to bound the Selmer group associated to a modular form of higher even weight twisted by a ring class character. This is an extension of Nekovar's result that uses Bertolini and Darmon's refinement of Kolyvagin's ideas.
△ Less
Submitted 31 May, 2015; v1 submitted 6 March, 2015;
originally announced March 2015.
-
Provably weak instances of Ring-LWE
Authors:
Yara Elias,
Kristin E. Lauter,
Ekin Ozman,
Katherine E. Stange
Abstract:
The ring and polynomial learning with errors problems (Ring-LWE and Poly-LWE) have been proposed as hard problems to form the basis for cryptosystems, and various security reductions to hard lattice problems have been presented. So far these problems have been stated for general (number) rings but have only been closely examined for cyclotomic number rings. In this paper, we state and examine the…
▽ More
The ring and polynomial learning with errors problems (Ring-LWE and Poly-LWE) have been proposed as hard problems to form the basis for cryptosystems, and various security reductions to hard lattice problems have been presented. So far these problems have been stated for general (number) rings but have only been closely examined for cyclotomic number rings. In this paper, we state and examine the Ring-LWE problem for general number rings and demonstrate provably weak instances of Ring-LWE. We construct an explicit family of number fields for which we have an efficient attack. We demonstrate the attack in both theory and practice, providing code and running times for the attack. The attack runs in time linear in q, where q is the modulus.
Our attack is based on the attack on Poly-LWE which was presented in [Eisenträger-Hallgren-Lauter]. We extend the EHL-attack to apply to a larger class of number fields, and show how it applies to attack Ring-LWE for a heuristically large class of fields. Certain Ring-LWE instances can be transformed into Poly-LWE instances without distorting the error too much, and thus provide the first weak instances of the Ring-LWE problem. We also provide additional examples of fields which are vulnerable to our attacks on Poly-LWE, including power-of-$2$ cyclotomic fields, presented using the minimal polynomial of $ζ_{2^n} \pm 1$.
△ Less
Submitted 8 August, 2015; v1 submitted 12 February, 2015;
originally announced February 2015.
-
Algorithmic Cooling in Liquid State NMR
Authors:
Yosi Atia,
Yuval Elias,
Tal Mor,
Yossi Weinstein
Abstract:
Algorithmic cooling is a method that employs thermalization to increase qubit purification level, namely it reduces the qubit-system's entropy. We utilized gradient ascent pulse engineering (GRAPE), an optimal control algorithm, to implement algorithmic cooling in liquid state nuclear magnetic resonance. Various cooling algorithms were applied onto the three qubits of $^{13}$C$_2$-trichloroethylen…
▽ More
Algorithmic cooling is a method that employs thermalization to increase qubit purification level, namely it reduces the qubit-system's entropy. We utilized gradient ascent pulse engineering (GRAPE), an optimal control algorithm, to implement algorithmic cooling in liquid state nuclear magnetic resonance. Various cooling algorithms were applied onto the three qubits of $^{13}$C$_2$-trichloroethylene, cooling the system beyond Shannon's entropy bound in several different ways. In particular, in one experiment a carbon qubit was cooled by a factor of 4.61. This work is a step towards potentially integrating tools of NMR quantum computing into in vivo magnetic resonance spectroscopy.
△ Less
Submitted 8 November, 2015; v1 submitted 17 November, 2014;
originally announced November 2014.
-
Experimental Heat-Bath Cooling of Spins
Authors:
Gilles Brassard,
Yuval Elias,
José M. Fernandez,
Haggai Gilboa,
Jonathan A. Jones,
Tal Mor,
Yossi Weinstein,
Li Xiao
Abstract:
Algorithmic cooling (AC) is a method to purify quantum systems, such as ensembles of nuclear spins, or cold atoms in an optical lattice. When applied to spins, AC produces ensembles of highly polarized spins, which enhance the signal strength in nuclear magnetic resonance (NMR). According to this cooling approach, spin-half nuclei in a constant magnetic field are considered as bits, or more precis…
▽ More
Algorithmic cooling (AC) is a method to purify quantum systems, such as ensembles of nuclear spins, or cold atoms in an optical lattice. When applied to spins, AC produces ensembles of highly polarized spins, which enhance the signal strength in nuclear magnetic resonance (NMR). According to this cooling approach, spin-half nuclei in a constant magnetic field are considered as bits, or more precisely, quantum bits, in a known probability distribution. Algorithmic steps on these bits are then translated into specially designed NMR pulse sequences using common NMR quantum computation tools. The $algorithmic$ cooling of spins is achieved by alternately combining reversible, entropy-preserving manipulations (borrowed from data compression algorithms) with $selective$ $reset$, the transfer of entropy from selected spins to the environment. In theory, applying algorithmic cooling to sufficiently large spin systems may produce polarizations far beyond the limits due to conservation of Shannon entropy.
Here, only selective reset steps are performed, hence we prefer to call this process "heat-bath" cooling, rather than algorithmic cooling. We experimentally implement here two consecutive steps of selective reset that transfer entropy from two selected spins to the environment. We performed such cooling experiments with commercially-available labeled molecules, on standard liquid-state NMR spectrometers. Our experiments yielded polarizations that $bypass$ $Shannon's$ $entropy$-$conservation$ $bound$, so that the entire spin-system was cooled. This paper was initially submitted in 2005, first to Science and then to PNAS, and includes additional results from subsequent years (e.g. for resubmission in 2007). The Postscriptum includes more details.
△ Less
Submitted 28 April, 2014;
originally announced April 2014.
-
Prospects and Limitations of Algorithmic Cooling
Authors:
Gilles Brassard,
Yuval Elias,
Tal Mor,
Yossi Weinstein
Abstract:
Heat-bath algorithmic cooling (AC) of spins is a theoretically powerful effective cooling approach, that (ideally) cools spins with low polarization exponentially better than cooling by reversible entropy manipulations alone. Here, we investigate the limitations and prospects of AC. For non-ideal and semioptimal AC, we study the impact of finite relaxation times of reset and computation spins on t…
▽ More
Heat-bath algorithmic cooling (AC) of spins is a theoretically powerful effective cooling approach, that (ideally) cools spins with low polarization exponentially better than cooling by reversible entropy manipulations alone. Here, we investigate the limitations and prospects of AC. For non-ideal and semioptimal AC, we study the impact of finite relaxation times of reset and computation spins on the achievable effective cooling. We derive, via simulations, the attainable cooling levels for given ratios of relaxation times using two semioptimal practicable algorithms. We expect this analysis to be valuable for the planning of future experiments. For ideal and optimal AC, we make use of lower bounds on the number of required reset steps, based on entropy considerations, to present important consequences of using AC as a tool for improving signal-to-noise ratio in liquid-state magnetic resonance spectroscopy. We discuss the potential use of AC for noninvasive clinical diagnosis and drug monitoring, where it may have significantly lower specific absorption rate (SAR) with respect to currently used methods.
△ Less
Submitted 27 April, 2014;
originally announced April 2014.
-
Quantum Computing Gates via Optimal Control
Authors:
Yosi Atia,
Yuval Elias,
Tal Mor,
Yossi Weinstein
Abstract:
We demonstrate the use of optimal control to design two entropy-manipulating quantum gates which are more complex than the corresponding, commonly used, gates, such as CNOT and Toffoli (CCNOT): A 2-qubit gate called PE (polarization exchange) and a 3-qubit gate called COMP (polarization compression) were designed using GRAPE, an optimal control algorithm. Both gates were designed for a three-spin…
▽ More
We demonstrate the use of optimal control to design two entropy-manipulating quantum gates which are more complex than the corresponding, commonly used, gates, such as CNOT and Toffoli (CCNOT): A 2-qubit gate called PE (polarization exchange) and a 3-qubit gate called COMP (polarization compression) were designed using GRAPE, an optimal control algorithm. Both gates were designed for a three-spin system. Our design provided efficient and robust NMR radio frequency (RF) pulses for 13C2-trichloroethylene (TCE), our chosen three-spin system. We then experimentally applied these two quantum gates onto TCE at the NMR lab. Such design of these gates and others could be relevant for near-future applications of quantum computing devices.
△ Less
Submitted 1 September, 2013; v1 submitted 21 August, 2013;
originally announced August 2013.
-
Semi-optimal Practicable Algorithmic Cooling
Authors:
Yuval Elias,
Tal Mor,
Yossi Weinstein
Abstract:
Algorithmic Cooling (AC) of spins applies entropy manipulation algorithms in open spin-systems in order to cool spins far beyond Shannon's entropy bound. AC of nuclear spins was demonstrated experimentally, and may contribute to nuclear magnetic resonance (NMR) spectroscopy. Several cooling algorithms were suggested in recent years, including practicable algorithmic cooling (PAC) and exhaustive AC…
▽ More
Algorithmic Cooling (AC) of spins applies entropy manipulation algorithms in open spin-systems in order to cool spins far beyond Shannon's entropy bound. AC of nuclear spins was demonstrated experimentally, and may contribute to nuclear magnetic resonance (NMR) spectroscopy. Several cooling algorithms were suggested in recent years, including practicable algorithmic cooling (PAC) and exhaustive AC. Practicable algorithms have simple implementations, yet their level of cooling is far from optimal; Exhaustive algorithms, on the other hand, cool much better, and some even reach (asymptotically) an optimal level of cooling, but they are not practicable. We introduce here semi-optimal practicable AC (SOPAC), wherein few cycles (typically 2-6) are performed at each recursive level. Two classes of SOPAC algorithms are proposed and analyzed. Both attain cooling levels significantly better than PAC, and are much more efficient than the exhaustive algorithms. The new algorithms are shown to bridge the gap between PAC and exhaustive AC. In addition, we calculated the number of spins required by SOPAC in order to purify qubits for quantum computation. As few as 12 and 7 spins are required (in an ideal scenario) to yield a mildly pure spin (60% polarized) from initial polarizations of 1% and 10%, respectively. In the latter case, about five more spins are sufficient to produce a highly pure spin (99.99% polarized), which could be relevant for fault-tolerant quantum computing.
△ Less
Submitted 26 October, 2011;
originally announced October 2011.
-
Heat-Bath Cooling of Spins in Two Amino Acids
Authors:
Yuval Elias,
Haggai Gilboa,
Tal Mor,
Yossi Weinstein
Abstract:
Heat-bath cooling is a component of practicable algorithmic cooling of spins, an approach which might be useful for in vivo 13C spectroscopy, in particular for prolonged metabolic processes where substrates that are hyperpolarized ex-vivo are not effective. We applied heat-bath cooling to 1,2-13C2-amino acids, using the alpha protons to shift entropy from selected carbons to the environment. For g…
▽ More
Heat-bath cooling is a component of practicable algorithmic cooling of spins, an approach which might be useful for in vivo 13C spectroscopy, in particular for prolonged metabolic processes where substrates that are hyperpolarized ex-vivo are not effective. We applied heat-bath cooling to 1,2-13C2-amino acids, using the alpha protons to shift entropy from selected carbons to the environment. For glutamate and glycine, both carbons were cooled by about 2.5-fold, and in other experiments the polarization of C1 nearly doubled while all other spins had equilibrium polarization, indicating reduction in total entropy. The effect of adding Magnevist, a gadolinium contrast agent, on heat-bath cooling of glutamate was investigated.
△ Less
Submitted 26 October, 2011; v1 submitted 25 August, 2011;
originally announced August 2011.
-
Optimal Algorithmic Cooling of Spins
Authors:
Yuval Elias,
José M. Fernandez,
Tal Mor,
Yossi Weinstein
Abstract:
Algorithmic Cooling (AC) of Spins is potentially the first near-future application of quantum computing devices. Straightforward quantum algorithms combined with novel entropy manipulations can result in a method to improve the identification of molecules. We introduce here several new exhaustive cooling algorithms, such as the Tribonacci and k-bonacci algorithms. In particular, we present the `…
▽ More
Algorithmic Cooling (AC) of Spins is potentially the first near-future application of quantum computing devices. Straightforward quantum algorithms combined with novel entropy manipulations can result in a method to improve the identification of molecules. We introduce here several new exhaustive cooling algorithms, such as the Tribonacci and k-bonacci algorithms. In particular, we present the ``all-bonacci'' algorithm, which appears to reach the maximal degree of cooling obtainable by the optimal AC approach.
△ Less
Submitted 19 November, 2007;
originally announced November 2007.
-
Experimental Heat-Bath Cooling of Spins
Authors:
Gilles Brassard,
Yuval Elias,
Jose M. Fernandez,
Haggai Gilboa,
Jonathan A. Jones,
Tal Mor,
Yossi Weinstein,
Li Xiao
Abstract:
Algorithmic cooling is a novel technique to generate ensembles of highly polarized spins, which could significantly improve the signal strength in Nuclear Magnetic Resonance (NMR) spectroscopy. It combines reversible (entropy-preserving) manipulations and irreversible controlled interactions with the environment, using simple quantum computing techniques to increase spin polarization far beyond…
▽ More
Algorithmic cooling is a novel technique to generate ensembles of highly polarized spins, which could significantly improve the signal strength in Nuclear Magnetic Resonance (NMR) spectroscopy. It combines reversible (entropy-preserving) manipulations and irreversible controlled interactions with the environment, using simple quantum computing techniques to increase spin polarization far beyond the Shannon entropy-conservation bound. Notably, thermalization is beneficially employed as an integral part of the cooling scheme, contrary to its ordinary destructive implications. We report the first cooling experiments bypassing Shannon's entropy-conservation bound, performed on a standard liquid-state NMR spectrometer. We believe that this experimental success could pave the way for the first near-future application of quantum computing devices.
△ Less
Submitted 16 November, 2005;
originally announced November 2005.