-
A distillation-teleportation protocol for fault-tolerant QRAM
Authors:
Alexander M. Dalzell,
András Gilyén,
Connor T. Hann,
Sam McArdle,
Grant Salton,
Quynh T. Nguyen,
Aleksander Kubica,
Fernando G. S. L. Brandão
Abstract:
We present a protocol for fault-tolerantly implementing the logical quantum random access memory (QRAM) operation, given access to a specialized, noisy QRAM device. For coherently accessing classical memories of size $2^n$, our protocol consumes only $\mathrm{poly}(n)$ fault-tolerant quantum resources (logical gates, logical qubits, quantum error correction cycles, etc.), avoiding the need to perf…
▽ More
We present a protocol for fault-tolerantly implementing the logical quantum random access memory (QRAM) operation, given access to a specialized, noisy QRAM device. For coherently accessing classical memories of size $2^n$, our protocol consumes only $\mathrm{poly}(n)$ fault-tolerant quantum resources (logical gates, logical qubits, quantum error correction cycles, etc.), avoiding the need to perform active error correction on all $Ω(2^n)$ components of the QRAM device. This is the first rigorous conceptual demonstration that a specialized, noisy QRAM device could be useful for implementing a fault-tolerant quantum algorithm. In fact, the fidelity of the device can be as low as $1/\mathrm{poly}(n)$. The protocol queries the noisy QRAM device $\mathrm{poly}(n)$ times to prepare a sequence of $n$-qubit QRAM resource states, which are moved to a general-purpose $\mathrm{poly}(n)$-size processor to be encoded into a QEC code, distilled, and fault-tolerantly teleported into the computation. To aid this protocol, we develop a new gate-efficient streaming version of quantum purity amplification that matches the optimal sample complexity in a wide range of parameters and is therefore of independent interest.
The exponential reduction in fault-tolerant quantum resources comes at the expense of an exponential quantity of purely classical complexity: each of the $n$ iterations of the protocol requires adaptively updating the $2^n$-size classical dataset and providing the noisy QRAM device with access to the updated dataset at the next iteration. While our protocol demonstrates that QRAM is more compatible with fault-tolerant quantum computation than previously thought, the need for significant classical computational complexity exposes potentially fundamental limitations to realizing a truly $\mathrm{poly}(n)$-cost fault-tolerant QRAM.
△ Less
Submitted 26 May, 2025;
originally announced May 2025.
-
Learning quantum Gibbs states locally and efficiently
Authors:
Chi-Fang Chen,
Anurag Anshu,
Quynh T. Nguyen
Abstract:
Learning the Hamiltonian underlying a quantum many-body system in thermal equilibrium is a fundamental task in quantum learning theory and experimental sciences. To learn the Gibbs state of local Hamiltonians at any inverse temperature $β$, the state-of-the-art provable algorithms fall short of the optimal sample and computational complexity, in sharp contrast with the locality and simplicity in t…
▽ More
Learning the Hamiltonian underlying a quantum many-body system in thermal equilibrium is a fundamental task in quantum learning theory and experimental sciences. To learn the Gibbs state of local Hamiltonians at any inverse temperature $β$, the state-of-the-art provable algorithms fall short of the optimal sample and computational complexity, in sharp contrast with the locality and simplicity in the classical cases. In this work, we present a learning algorithm that learns each local term of a $n$-qubit $D$-dimensional Hamiltonian to an additive error $ε$ with sample complexity $\tilde{O}\left(\frac{e^{\mathrm{poly}(β)}}{β^2ε^2}\right)\log(n)$. The protocol uses parallelizable local quantum measurements that act within bounded regions of the lattice and near-linear-time classical post-processing. Thus, our complexity is near optimal with respect to $n,ε$ and is polynomially tight with respect to $β$. We also give a learning algorithm for Hamiltonians with bounded interaction degree with sample and time complexities of similar scaling on $n$ but worse on $β, ε$. At the heart of our algorithm is the interplay between locality, the Kubo-Martin-Schwinger condition, and the operator Fourier transform at arbitrary temperatures.
△ Less
Submitted 3 April, 2025;
originally announced April 2025.
-
TECO: Improving Multimodal Intent Recognition with Text Enhancement through Commonsense Knowledge Extraction
Authors:
Quynh-Mai Thi Nguyen,
Lan-Nhi Thi Nguyen,
Cam-Van Thi Nguyen
Abstract:
The objective of multimodal intent recognition (MIR) is to leverage various modalities-such as text, video, and audio-to detect user intentions, which is crucial for understanding human language and context in dialogue systems. Despite advances in this field, two main challenges persist: (1) effectively extracting and utilizing semantic information from robust textual features; (2) aligning and fu…
▽ More
The objective of multimodal intent recognition (MIR) is to leverage various modalities-such as text, video, and audio-to detect user intentions, which is crucial for understanding human language and context in dialogue systems. Despite advances in this field, two main challenges persist: (1) effectively extracting and utilizing semantic information from robust textual features; (2) aligning and fusing non-verbal modalities with verbal ones effectively. This paper proposes a Text Enhancement with CommOnsense Knowledge Extractor (TECO) to address these challenges. We begin by extracting relations from both generated and retrieved knowledge to enrich the contextual information in the text modality. Subsequently, we align and integrate visual and acoustic representations with these enhanced text features to form a cohesive multimodal representation. Our experimental results show substantial improvements over existing baseline methods.
△ Less
Submitted 11 December, 2024;
originally announced December 2024.
-
Enhancing Depth Image Estimation for Underwater Robots by Combining Image Processing and Machine Learning
Authors:
Quang Truong Nguyen,
Thanh Nguyen Canh,
Xiem HoangVan
Abstract:
Depth information plays a crucial role in autonomous systems for environmental perception and robot state estimation. With the rapid development of deep neural network technology, depth estimation has been extensively studied and shown potential for practical applications. However, in particularly challenging environments such as low-light and noisy underwater conditions, direct application of mac…
▽ More
Depth information plays a crucial role in autonomous systems for environmental perception and robot state estimation. With the rapid development of deep neural network technology, depth estimation has been extensively studied and shown potential for practical applications. However, in particularly challenging environments such as low-light and noisy underwater conditions, direct application of machine learning models may not yield the desired results. Therefore, in this paper, we present an approach to enhance underwater image quality to improve depth estimation effectiveness. First, underwater images are processed through methods such as color compensation, brightness equalization, and enhancement of contrast and sharpness of objects in the image. Next, we perform depth estimation using the Udepth model on the enhanced images. Finally, the results are evaluated and presented to verify the effectiveness and accuracy of the enhanced depth image quality approach for underwater robots.
△ Less
Submitted 8 November, 2024;
originally announced November 2024.
-
Quantum fault tolerance with constant-space and logarithmic-time overheads
Authors:
Quynh T. Nguyen,
Christopher A. Pattison
Abstract:
In a model of fault-tolerant quantum computation with quick and noiseless polyloglog-time auxiliary classical computation, we construct a fault tolerance protocol with constant-space and $\widetilde{O}(\log N)$-time overhead, where $\widetilde{O}(\cdot)$ hides sub-polylog factors. Our construction utilizes constant-rate quantum locally testable codes (qLTC), new fault-tolerant gadgets on qLTCs and…
▽ More
In a model of fault-tolerant quantum computation with quick and noiseless polyloglog-time auxiliary classical computation, we construct a fault tolerance protocol with constant-space and $\widetilde{O}(\log N)$-time overhead, where $\widetilde{O}(\cdot)$ hides sub-polylog factors. Our construction utilizes constant-rate quantum locally testable codes (qLTC), new fault-tolerant gadgets on qLTCs and qLDPC codes, and a new analysis framework. In particular, 1) we develop a new simple and self-contained construction of magic state distillation for qubits using qudit quantum Reed-Solomon codes with $(\log \frac{1}{\varepsilon})^γ$ spacetime overhead, where $γ\rightarrow 0$. 2) We prove that the recent family of almost-good qLTCs of Dinur-Lin-Vidick admit parallel single-shot decoders against adversarial errors of weight scaling with the code distance. 3) We develop logical state preparation and logical gate procedures with $\widetilde{O}(1)$-spacetime overhead on qLTCs. 4) To combine these ingredients, we introduce a new framework of fault tolerance analysis called the weight enumerator formalism. The framework permits easy formal composition of fault-tolerant gadgets, so we expect it to be of independent interest. Our work gives the lowest spacetime overhead to date, which, for the first time, matches that of classical fault tolerance up to sub-polylog factors. We conjecture this is optimal up to sub-polylog factors.
△ Less
Submitted 5 November, 2024;
originally announced November 2024.
-
UniqueQMA vs QMA: oracle separation and eigenstate thermalization hypothesis
Authors:
Anurag Anshu,
Jonas Haferkamp,
Yeongwoo Hwang,
Quynh T. Nguyen
Abstract:
We study the long-standing open question of the power of unique witness in quantum protocols, which asks if UniqueQMA, a variant of QMA whose accepting witness space is 1-dimensional, is equal to QMA. We show a quantum oracle separation between UniqueQMA and QMA via an extension of the Aaronson-Kuperberg's QCMA vs QMA oracle separation. In particular, we show that any UniqueQMA protocol must make…
▽ More
We study the long-standing open question of the power of unique witness in quantum protocols, which asks if UniqueQMA, a variant of QMA whose accepting witness space is 1-dimensional, is equal to QMA. We show a quantum oracle separation between UniqueQMA and QMA via an extension of the Aaronson-Kuperberg's QCMA vs QMA oracle separation. In particular, we show that any UniqueQMA protocol must make $Ω(\sqrt{D})$ queries to a subspace phase oracle of unknown dimension $\leq D$ to "find" the subspace. This presents an obstacle to relativizing techniques in resolving this question (unlike its classical analogue - the Valiant-Vazirani theorem - which is essentially a black-box reduction) and suggests the need to study the structure of the ground space of local Hamiltonians in distilling a potential unique witness. Our techniques also yield a quantum oracle separation between QXC, the class characterizing quantum approximate counting, and QMA.
Very few structural properties are known that place the complexity of local Hamiltonians in UniqueQMA. We expand this set of properties by showing that the ground energy of local Hamiltonians that satisfy the eigenstate thermalization hypothesis (ETH) can be estimated through a UniqueQMA protocol. Specifically, our protocol can be viewed as a quantum expander test in a low energy subspace of the Hamiltonian and verifies a unique entangled state in two copies of the subspace. This allows us to conclude that if UniqueQMA $\neq$ QMA, then QMA-hard Hamiltonians must violate ETH under adversarial perturbations (more accurately, under the quantum PCP conjecture if ETH only applies to extensive energy subspaces). Our results serve as evidence that chaotic local Hamiltonians, such as the SYK model, contain polynomial verifiable quantum states in their low energy regime and may be simpler than general local Hamiltonians if UniqueQMA $\neq$ QMA.
△ Less
Submitted 31 October, 2024;
originally announced October 2024.
-
Vintern-1B: An Efficient Multimodal Large Language Model for Vietnamese
Authors:
Khang T. Doan,
Bao G. Huynh,
Dung T. Hoang,
Thuc D. Pham,
Nhat H. Pham,
Quan T. M. Nguyen,
Bang Q. Vo,
Suong N. Hoang
Abstract:
In this report, we introduce Vintern-1B, a reliable 1-billion-parameters multimodal large language model (MLLM) for Vietnamese language tasks. By integrating the Qwen2-0.5B-Instruct language model with the InternViT-300M-448px visual model, Vintern-1B is optimized for a range of applications, including optical character recognition (OCR), document extraction, and general question-answering in Viet…
▽ More
In this report, we introduce Vintern-1B, a reliable 1-billion-parameters multimodal large language model (MLLM) for Vietnamese language tasks. By integrating the Qwen2-0.5B-Instruct language model with the InternViT-300M-448px visual model, Vintern-1B is optimized for a range of applications, including optical character recognition (OCR), document extraction, and general question-answering in Vietnamese context. The model is fine-tuned on an extensive dataset of over 3 million image-question-answer pairs, achieving robust performance and reliable results across multiple Vietnamese language benchmarks like OpenViVQA and ViTextVQA. Vintern-1B is small enough to fit into various on-device applications easily. Additionally, we have open-sourced several Vietnamese vision question answering (VQA) datasets for text and diagrams, created with Gemini 1.5 Flash. Our models are available at: https://huggingface.co/5CD-AI/Vintern-1B-v2.
△ Less
Submitted 23 August, 2024; v1 submitted 22 August, 2024;
originally announced August 2024.
-
Good binary quantum codes with transversal CCZ gate
Authors:
Quynh T. Nguyen
Abstract:
We give an asymptotically good family of quantum CSS codes on qubits with a transversal CCZ gate, meaning that the parallel logical CCZ on all logical qubits is performed by parallel physical CCZs on (a subset of) physical qubits. The construction is based on the observation that any classical code satisfying a multiplication property can be used to construct a quantum CSS code with transversal (q…
▽ More
We give an asymptotically good family of quantum CSS codes on qubits with a transversal CCZ gate, meaning that the parallel logical CCZ on all logical qubits is performed by parallel physical CCZs on (a subset of) physical qubits. The construction is based on the observation that any classical code satisfying a multiplication property can be used to construct a quantum CSS code with transversal (qudit) CCZ. To obtain a constant-rate and linear-distance family, we then instantiate this construction with a classical good family of algebraic-geometry codes on a non-binary, but constant-sized, alphabet. Finally, we use a technique from the arithmetic secret sharing literature to reduce the alphabet to binary. As a corollary, the constructed code family provides a magic state distillation scheme with constant space overhead.
△ Less
Submitted 13 October, 2024; v1 submitted 19 August, 2024;
originally announced August 2024.
-
EEG-SSM: Leveraging State-Space Model for Dementia Detection
Authors:
Xuan-The Tran,
Linh Le,
Quoc Toan Nguyen,
Thomas Do,
Chin-Teng Lin
Abstract:
State-space models (SSMs) have garnered attention for effectively processing long data sequences, reducing the need to segment time series into shorter intervals for model training and inference. Traditionally, SSMs capture only the temporal dynamics of time series data, omitting the equally critical spectral features. This study introduces EEG-SSM, a novel state-space model-based approach for dem…
▽ More
State-space models (SSMs) have garnered attention for effectively processing long data sequences, reducing the need to segment time series into shorter intervals for model training and inference. Traditionally, SSMs capture only the temporal dynamics of time series data, omitting the equally critical spectral features. This study introduces EEG-SSM, a novel state-space model-based approach for dementia classification using EEG data. Our model features two primary innovations: EEG-SSM temporal and EEG-SSM spectral components. The temporal component is designed to efficiently process EEG sequences of varying lengths, while the spectral component enhances the model by integrating frequency-domain information from EEG signals. The synergy of these components allows EEG-SSM to adeptly manage the complexities of multivariate EEG data, significantly improving accuracy and stability across different temporal resolutions. Demonstrating a remarkable 91.0 percent accuracy in classifying Healthy Control (HC), Frontotemporal Dementia (FTD), and Alzheimer's Disease (AD) groups, EEG-SSM outperforms existing models on the same dataset. The development of EEG-SSM represents an improvement in the use of state-space models for screening dementia, offering more precise and cost-effective tools for clinical neuroscience.
△ Less
Submitted 25 July, 2024;
originally announced July 2024.
-
The mixed Schur transform: efficient quantum circuit and applications
Authors:
Quynh T. Nguyen
Abstract:
The Schur transform, which block-diagonalizes the tensor representation $U^{\otimes n}$ of the unitary group $\mathbf{U}_d$ on $n$ qudits, is an important primitive in quantum information and theoretical physics. We give a generalization of its quantum circuit implementation due to Bacon, Chuang, and Harrow (SODA 2007) to the case of mixed tensor $U^{\otimes n} \otimes \bar{U}^{\otimes m}$, where…
▽ More
The Schur transform, which block-diagonalizes the tensor representation $U^{\otimes n}$ of the unitary group $\mathbf{U}_d$ on $n$ qudits, is an important primitive in quantum information and theoretical physics. We give a generalization of its quantum circuit implementation due to Bacon, Chuang, and Harrow (SODA 2007) to the case of mixed tensor $U^{\otimes n} \otimes \bar{U}^{\otimes m}$, where $\bar{U}$ is the dual representation. This representation is the symmetry of unitary-equivariant channels, which find various applications in quantum majority vote, multiport-based teleportation, asymmetric state cloning, black-box unitary transformations, etc. The "mixed" Schur transform contains several natural extensions of the representation theory used in the Schur transform, in which the main ingredient is a duality between the mixed tensor representations and the walled Brauer algebra. Another element is an efficient implementation of a "dual" Clebsch-Gordan transform for $\bar{U}$. The overall circuit has complexity $\widetilde{O} ((n+m)d^4)$. Finally, we show how the mixed Schur transform enables efficient implementation of unitary-equivariant channels in various settings and discuss other potential applications, including an extension of permutational quantum computing that includes partial transposes.
△ Less
Submitted 2 October, 2023;
originally announced October 2023.
-
Circuit-to-Hamiltonian from tensor networks and fault tolerance
Authors:
Anurag Anshu,
Nikolas P. Breuckmann,
Quynh T. Nguyen
Abstract:
We define a map from an arbitrary quantum circuit to a local Hamiltonian whose ground state encodes the quantum computation. All previous maps relied on the Feynman-Kitaev construction, which introduces an ancillary `clock register' to track the computational steps. Our construction, on the other hand, relies on injective tensor networks with associated parent Hamiltonians, avoiding the introducti…
▽ More
We define a map from an arbitrary quantum circuit to a local Hamiltonian whose ground state encodes the quantum computation. All previous maps relied on the Feynman-Kitaev construction, which introduces an ancillary `clock register' to track the computational steps. Our construction, on the other hand, relies on injective tensor networks with associated parent Hamiltonians, avoiding the introduction of a clock register. This comes at the cost of the ground state containing only a noisy version of the quantum computation, with independent stochastic noise. We can remedy this - making our construction robust - by using quantum fault tolerance. In addition to the stochastic noise, we show that any state with energy density exponentially small in the circuit depth encodes a noisy version of the quantum computation with adversarial noise. We also show that any `combinatorial state' with energy density polynomially small in depth encodes the quantum computation with adversarial noise. This serves as evidence that any state with energy density polynomially small in depth has a similar property. As applications, we give a new proof of the QMA-completeness of the local Hamiltonian problem (with logarithmic locality) and show that contracting injective tensor networks to additive error is BQP-hard. We also discuss the implication of our construction to the quantum PCP conjecture, combining with an observation that QMA verification can be done in logarithmic depth.
△ Less
Submitted 7 August, 2024; v1 submitted 28 September, 2023;
originally announced September 2023.
-
Improving the speed of variational quantum algorithms for quantum error correction
Authors:
Fabio Zoratti,
Giacomo De Palma,
Bobak Kiani,
Quynh T. Nguyen,
Milad Marvian,
Seth Lloyd,
Vittorio Giovannetti
Abstract:
We consider the problem of devising a suitable Quantum Error Correction (QEC) procedures for a generic quantum noise acting on a quantum circuit. In general, there is no analytic universal procedure to obtain the encoding and correction unitary gates, and the problem is even harder if the noise is unknown and has to be reconstructed. The existing procedures rely on Variational Quantum Algorithms (…
▽ More
We consider the problem of devising a suitable Quantum Error Correction (QEC) procedures for a generic quantum noise acting on a quantum circuit. In general, there is no analytic universal procedure to obtain the encoding and correction unitary gates, and the problem is even harder if the noise is unknown and has to be reconstructed. The existing procedures rely on Variational Quantum Algorithms (VQAs) and are very difficult to train since the size of the gradient of the cost function decays exponentially with the number of qubits. We address this problem using a cost function based on the Quantum Wasserstein distance of order 1 ($QW_1$). At variance with other quantum distances typically adopted in quantum information processing, $QW_1$ lacks the unitary invariance property which makes it a suitable tool to avoid to get trapped in local minima. Focusing on a simple noise model for which an exact QEC solution is known and can be used as a theoretical benchmark, we run a series of numerical tests that show how, guiding the VQA search through the $QW_1$, can indeed significantly increase both the probability of a successful training and the fidelity of the recovered state, with respect to the results one obtains when using conventional approaches.
△ Less
Submitted 25 August, 2023; v1 submitted 12 January, 2023;
originally announced January 2023.
-
Theoretical Guarantees for Permutation-Equivariant Quantum Neural Networks
Authors:
Louis Schatzki,
Martin Larocca,
Quynh T. Nguyen,
Frederic Sauvage,
M. Cerezo
Abstract:
Despite the great promise of quantum machine learning models, there are several challenges one must overcome before unlocking their full potential. For instance, models based on quantum neural networks (QNNs) can suffer from excessive local minima and barren plateaus in their training landscapes. Recently, the nascent field of geometric quantum machine learning (GQML) has emerged as a potential so…
▽ More
Despite the great promise of quantum machine learning models, there are several challenges one must overcome before unlocking their full potential. For instance, models based on quantum neural networks (QNNs) can suffer from excessive local minima and barren plateaus in their training landscapes. Recently, the nascent field of geometric quantum machine learning (GQML) has emerged as a potential solution to some of those issues. The key insight of GQML is that one should design architectures, such as equivariant QNNs, encoding the symmetries of the problem at hand. Here, we focus on problems with permutation symmetry (i.e., the group of symmetry $S_n$), and show how to build $S_n$-equivariant QNNs. We provide an analytical study of their performance, proving that they do not suffer from barren plateaus, quickly reach overparametrization, and generalize well from small amounts of data. To verify our results, we perform numerical simulations for a graph state classification task. Our work provides the first theoretical guarantees for equivariant QNNs, thus indicating the extreme power and potential of GQML.
△ Less
Submitted 13 February, 2024; v1 submitted 18 October, 2022;
originally announced October 2022.
-
Theory for Equivariant Quantum Neural Networks
Authors:
Quynh T. Nguyen,
Louis Schatzki,
Paolo Braccia,
Michael Ragone,
Patrick J. Coles,
Frederic Sauvage,
Martin Larocca,
M. Cerezo
Abstract:
Quantum neural network architectures that have little-to-no inductive biases are known to face trainability and generalization issues. Inspired by a similar problem, recent breakthroughs in machine learning address this challenge by creating models encoding the symmetries of the learning task. This is materialized through the usage of equivariant neural networks whose action commutes with that of…
▽ More
Quantum neural network architectures that have little-to-no inductive biases are known to face trainability and generalization issues. Inspired by a similar problem, recent breakthroughs in machine learning address this challenge by creating models encoding the symmetries of the learning task. This is materialized through the usage of equivariant neural networks whose action commutes with that of the symmetry. In this work, we import these ideas to the quantum realm by presenting a comprehensive theoretical framework to design equivariant quantum neural networks (EQNN) for essentially any relevant symmetry group. We develop multiple methods to construct equivariant layers for EQNNs and analyze their advantages and drawbacks. Our methods can find unitary or general equivariant quantum channels efficiently even when the symmetry group is exponentially large or continuous. As a special implementation, we show how standard quantum convolutional neural networks (QCNN) can be generalized to group-equivariant QCNNs where both the convolution and pooling layers are equivariant to the symmetry group. We then numerically demonstrate the effectiveness of a SU(2)-equivariant QCNN over symmetry-agnostic QCNN on a classification task of phases of matter in the bond-alternating Heisenberg model. Our framework can be readily applied to virtually all areas of quantum machine learning. Lastly, we discuss about how symmetry-informed models such as EQNNs provide hopes to alleviate central challenges such as barren plateaus, poor local minima, and sample complexity.
△ Less
Submitted 10 May, 2024; v1 submitted 16 October, 2022;
originally announced October 2022.
-
Representation Theory for Geometric Quantum Machine Learning
Authors:
Michael Ragone,
Paolo Braccia,
Quynh T. Nguyen,
Louis Schatzki,
Patrick J. Coles,
Frederic Sauvage,
Martin Larocca,
M. Cerezo
Abstract:
Recent advances in classical machine learning have shown that creating models with inductive biases encoding the symmetries of a problem can greatly improve performance. Importation of these ideas, combined with an existing rich body of work at the nexus of quantum theory and symmetry, has given rise to the field of Geometric Quantum Machine Learning (GQML). Following the success of its classical…
▽ More
Recent advances in classical machine learning have shown that creating models with inductive biases encoding the symmetries of a problem can greatly improve performance. Importation of these ideas, combined with an existing rich body of work at the nexus of quantum theory and symmetry, has given rise to the field of Geometric Quantum Machine Learning (GQML). Following the success of its classical counterpart, it is reasonable to expect that GQML will play a crucial role in developing problem-specific and quantum-aware models capable of achieving a computational advantage. Despite the simplicity of the main idea of GQML -- create architectures respecting the symmetries of the data -- its practical implementation requires a significant amount of knowledge of group representation theory. We present an introduction to representation theory tools from the optics of quantum learning, driven by key examples involving discrete and continuous groups. These examples are sewn together by an exposition outlining the formal capture of GQML symmetries via "label invariance under the action of a group representation", a brief (but rigorous) tour through finite and compact Lie group representation theory, a reexamination of ubiquitous tools like Haar integration and twirling, and an overview of some successful strategies for detecting symmetries.
△ Less
Submitted 7 February, 2023; v1 submitted 14 October, 2022;
originally announced October 2022.
-
Block-encoding dense and full-rank kernels using hierarchical matrices: applications in quantum numerical linear algebra
Authors:
Quynh T. Nguyen,
Bobak T. Kiani,
Seth Lloyd
Abstract:
Many quantum algorithms for numerical linear algebra assume black-box access to a block-encoding of the matrix of interest, which is a strong assumption when the matrix is not sparse. Kernel matrices, which arise from discretizing a kernel function $k(x,x')$, have a variety of applications in mathematics and engineering. They are generally dense and full-rank. Classically, the celebrated fast mult…
▽ More
Many quantum algorithms for numerical linear algebra assume black-box access to a block-encoding of the matrix of interest, which is a strong assumption when the matrix is not sparse. Kernel matrices, which arise from discretizing a kernel function $k(x,x')$, have a variety of applications in mathematics and engineering. They are generally dense and full-rank. Classically, the celebrated fast multipole method performs matrix multiplication on kernel matrices of dimension $N$ in time almost linear in $N$ by using the linear algebraic framework of hierarchical matrices. In light of this success, we propose a block-encoding scheme of the hierarchical matrix structure on a quantum computer. When applied to many physical kernel matrices, our method can improve the runtime of solving quantum linear systems of dimension $N$ to $O(κ\operatorname{polylog}(\frac{N}{\varepsilon}))$, where $κ$ and $\varepsilon$ are the condition number and error bound of the matrix operation. This runtime is near-optimal and, in terms of $N$, exponentially improves over prior quantum linear systems algorithms in the case of dense and full-rank kernel matrices. We discuss possible applications of our methodology in solving integral equations and accelerating computations in N-body problems.
△ Less
Submitted 6 December, 2022; v1 submitted 27 January, 2022;
originally announced January 2022.
-
Quantum algorithms for group convolution, cross-correlation, and equivariant transformations
Authors:
Grecia Castelazo,
Quynh T. Nguyen,
Giacomo De Palma,
Dirk Englund,
Seth Lloyd,
Bobak T. Kiani
Abstract:
Group convolutions and cross-correlations, which are equivariant to the actions of group elements, are commonly used in mathematics to analyze or take advantage of symmetries inherent in a given problem setting. Here, we provide efficient quantum algorithms for performing linear group convolutions and cross-correlations on data stored as quantum states. Runtimes for our algorithms are logarithmic…
▽ More
Group convolutions and cross-correlations, which are equivariant to the actions of group elements, are commonly used in mathematics to analyze or take advantage of symmetries inherent in a given problem setting. Here, we provide efficient quantum algorithms for performing linear group convolutions and cross-correlations on data stored as quantum states. Runtimes for our algorithms are logarithmic in the dimension of the group thus offering an exponential speedup compared to classical algorithms when input data is provided as a quantum state and linear operations are well conditioned. Motivated by the rich literature on quantum algorithms for solving algebraic problems, our theoretical framework opens a path for quantizing many algorithms in machine learning and numerical methods that employ group operations.
△ Less
Submitted 6 September, 2022; v1 submitted 23 September, 2021;
originally announced September 2021.
-
Consensus Analysis over Clustered Networks of Multi-Agent Systems under External Disturbances
Authors:
Thiem V. Pham,
Quynh T. T. Nguyen
Abstract:
This paper studies a consensus problem of multi-agent systems subjected to external disturbances over the clustered network. It considers that the agents are divided into several clusters. They are almost all the time isolated one from another, which has a directed spanning tree. The goal of agents achieves a common value. To support interaction between clusters with a minimum exchange of informat…
▽ More
This paper studies a consensus problem of multi-agent systems subjected to external disturbances over the clustered network. It considers that the agents are divided into several clusters. They are almost all the time isolated one from another, which has a directed spanning tree. The goal of agents achieves a common value. To support interaction between clusters with a minimum exchange of information, we consider that each cluster has an agent, who can exchange information to any agents outside of its cluster at some discrete instants of time. Our main contribution proposes a consensus protocol, which takes into account the continuous-time communications among agents inside the clusters and discrete-time communication information across clusters. Accordingly, the consensus and the robust $\mathcal{H}_{\infty}$ consensus over the clustered network are respectively analyzed. Thanks to results from matrix theory and algebraic graph theory, we show that the proposed control protocols can solve the problems mentioned above. Finally, a numerical example is given to show the effectiveness of the proposed theoretical results.
△ Less
Submitted 5 June, 2021;
originally announced June 2021.
-
$\mathcal{H}_2/\mathcal{H}_{-}$ Distributed Fault Detection and Isolation for Heterogeneous Multi-Agent Systems
Authors:
Thiem V. Pham,
Quynh T. T. Nguyen
Abstract:
The paper deals with the problem of distributed fault detection and isolation (FDI) for a group of heterogeneous multi-agent systems. The developed formation for the FDI is taken into account as a distributed observer design methodology, where the interaction between the agent and its neighbors is described as a vector of distributed relative output measurements. Based on two performance indexes…
▽ More
The paper deals with the problem of distributed fault detection and isolation (FDI) for a group of heterogeneous multi-agent systems. The developed formation for the FDI is taken into account as a distributed observer design methodology, where the interaction between the agent and its neighbors is described as a vector of distributed relative output measurements. Based on two performance indexes $\mathcal{H}_2$ and $\mathcal{H}_{-}$, sufficient conditions are given to ensure the residual signals robust to the disturbances and sensitive with respect to the fault signals. In addition, we show that by using our proposed approach, each agent is able to estimate both its own states and states of its nearest neighbors in the presence of disturbances and faults. Finally, numerical simulations are provided to demonstrate the effectiveness of the theoretically analyzed results.
△ Less
Submitted 5 June, 2021;
originally announced June 2021.
-
0
Authors:
Quan Thoi Minh Nguyen
Abstract:
What is the funniest number in cryptography? 0. The reason is that for all x, x*0 = 0, i.e., the equation is always satisfied no matter what x is. This article discusses crypto bugs in four BLS signatures' libraries (ethereum/py ecc, supranational/blst, herumi/bls, sigp/milagro bls) that revolve around 0. Furthermore, we develop "splitting zero" attacks to show a weakness in the proof-of-possessio…
▽ More
What is the funniest number in cryptography? 0. The reason is that for all x, x*0 = 0, i.e., the equation is always satisfied no matter what x is. This article discusses crypto bugs in four BLS signatures' libraries (ethereum/py ecc, supranational/blst, herumi/bls, sigp/milagro bls) that revolve around 0. Furthermore, we develop "splitting zero" attacks to show a weakness in the proof-of-possession aggregate signature scheme standardized in BLS RFC draft v4. Eth2 bug bounties program generously awarded $35,000 in total for the reported bugs.
△ Less
Submitted 20 April, 2021;
originally announced April 2021.
-
Fluctuation-driven, topology-stabilized order in a correlated nodal semimetal
Authors:
Nathan C. Drucker,
Thanh Nguyen,
Fei Han,
Xi Luo,
Nina Andrejevic,
Ziming Zhu,
Grigory Bednik,
Quynh T. Nguyen,
Zhantao Chen,
Linh K. Nguyen,
Travis J. Williams,
Matthew B. Stone,
Alexander I. Kolesnikov,
Songxue Chi,
Jaime Fernandez-Baca,
Tom Hogan,
Ahmet Alatas,
Alexander A. Puretzky,
David B. Geohegan,
Shengxi Huang,
Yue Yu,
Mingda Li
Abstract:
The interplay between strong electron correlation and band topology is at the forefront of condensed matter research. As a direct consequence of correlation, magnetism enriches topological phases and also has promising functional applications. However, the influence of topology on magnetism remains unclear, and the main research effort has been limited to ground state magnetic orders. Here we repo…
▽ More
The interplay between strong electron correlation and band topology is at the forefront of condensed matter research. As a direct consequence of correlation, magnetism enriches topological phases and also has promising functional applications. However, the influence of topology on magnetism remains unclear, and the main research effort has been limited to ground state magnetic orders. Here we report a novel order above the magnetic transition temperature in magnetic Weyl semimetal (WSM) CeAlGe. Such order shows a number of anomalies in electrical and thermal transport, and neutron scattering measurements. We attribute this order to the coupling of Weyl fermions and magnetic fluctuations originating from a three-dimensional Seiberg-Witten monopole, which qualitatively agrees well with the observations. Our work reveals a prominent role topology may play in tailoring electron correlation beyond ground state ordering, and offers a new avenue to investigate emergent electronic properties in magnetic topological materials.
△ Less
Submitted 19 July, 2023; v1 submitted 15 March, 2021;
originally announced March 2021.
-
Fine-Tuning BERT for Sentiment Analysis of Vietnamese Reviews
Authors:
Quoc Thai Nguyen,
Thoai Linh Nguyen,
Ngoc Hoang Luong,
Quoc Hung Ngo
Abstract:
Sentiment analysis is an important task in the field ofNature Language Processing (NLP), in which users' feedbackdata on a specific issue are evaluated and analyzed. Manydeep learning models have been proposed to tackle this task, including the recently-introduced Bidirectional Encoder Rep-resentations from Transformers (BERT) model. In this paper,we experiment with two BERT fine-tuning methods fo…
▽ More
Sentiment analysis is an important task in the field ofNature Language Processing (NLP), in which users' feedbackdata on a specific issue are evaluated and analyzed. Manydeep learning models have been proposed to tackle this task, including the recently-introduced Bidirectional Encoder Rep-resentations from Transformers (BERT) model. In this paper,we experiment with two BERT fine-tuning methods for thesentiment analysis task on datasets of Vietnamese reviews: 1) a method that uses only the [CLS] token as the input for anattached feed-forward neural network, and 2) another methodin which all BERT output vectors are used as the input forclassification. Experimental results on two datasets show thatmodels using BERT slightly outperform other models usingGloVe and FastText. Also, regarding the datasets employed inthis study, our proposed BERT fine-tuning method produces amodel with better performance than the original BERT fine-tuning method.
△ Less
Submitted 20 November, 2020;
originally announced November 2020.
-
Direct prediction of phonon density of states with Euclidean neural networks
Authors:
Zhantao Chen,
Nina Andrejevic,
Tess Smidt,
Zhiwei Ding,
Yen-Ting Chi,
Quynh T. Nguyen,
Ahmet Alatas,
Jing Kong,
Mingda Li
Abstract:
Machine learning has demonstrated great power in materials design, discovery, and property prediction. However, despite the success of machine learning in predicting discrete properties, challenges remain for continuous property prediction. The challenge is aggravated in crystalline solids due to crystallographic symmetry considerations and data scarcity. Here we demonstrate the direct prediction…
▽ More
Machine learning has demonstrated great power in materials design, discovery, and property prediction. However, despite the success of machine learning in predicting discrete properties, challenges remain for continuous property prediction. The challenge is aggravated in crystalline solids due to crystallographic symmetry considerations and data scarcity. Here we demonstrate the direct prediction of phonon density of states using only atomic species and positions as input. We apply Euclidean neural networks, which by construction are equivariant to 3D rotations, translations, and inversion and thereby capture full crystal symmetry, and achieve high-quality prediction using a small training set of $\sim 10^{3}$ examples with over 64 atom types. Our predictive model reproduces key features of experimental data and even generalizes to materials with unseen elements,and is naturally suited to efficiently predict alloy systems without additional computational cost. We demonstrate the potential of our network by predicting a broad number of high phononic specific heat capacity materials. Our work indicates an efficient approach to explore materials' phonon structure, and can further enable rapid screening for high-performance thermal storage materials and phonon-mediated superconductors.
△ Less
Submitted 2 February, 2021; v1 submitted 10 September, 2020;
originally announced September 2020.
-
A "Final" Security Bug
Authors:
Quan Thoi Minh Nguyen
Abstract:
This article discusses a fixed critical security bug in Google Tink's Ed25519 Java implementation. The bug allows remote attackers to extract the private key with only two Ed25519 signatures. The vulnerability comes from the misunderstanding of what "final" in Java programming language means. The bug was discovered during security review before Google Tink was officially released. It reinforces th…
▽ More
This article discusses a fixed critical security bug in Google Tink's Ed25519 Java implementation. The bug allows remote attackers to extract the private key with only two Ed25519 signatures. The vulnerability comes from the misunderstanding of what "final" in Java programming language means. The bug was discovered during security review before Google Tink was officially released. It reinforces the challenge in writing safe cryptographic code and the importance of the security review process even for the code written by professional cryptographers.
△ Less
Submitted 3 April, 2020;
originally announced April 2020.
-
Intuitive Understanding of Quantum Computation and Post-Quantum Cryptography
Authors:
Quan Thoi Minh Nguyen
Abstract:
Post-quantum cryptography is inevitable. National Institute of Standards and Technology (NIST) starts standardizing quantum-resistant public-key cryptography (aka post-quantum cryptography). The reason is that investment in quantum computing is blooming which poses significant threats to our currently deployed cryptographic algorithms. As a security engineer, to prepare for the apocalypse in advan…
▽ More
Post-quantum cryptography is inevitable. National Institute of Standards and Technology (NIST) starts standardizing quantum-resistant public-key cryptography (aka post-quantum cryptography). The reason is that investment in quantum computing is blooming which poses significant threats to our currently deployed cryptographic algorithms. As a security engineer, to prepare for the apocalypse in advance, I've been watching the development of quantum computers and post-quantum cryptography closely. Never mind, I simply made up an excuse to study these fascinating scientific fields. However, they are extremely hard to understand, at least to an amateur like me. This article shares with you my notes with the hope that you will have an intuitive understanding of the beautiful and mind-blowing quantum algorithms and post-quantum cryptography. Update: Multivariate signature scheme Rainbow is broken by Ward Beullens. Supersingular Isogeny Diffie-Hellman protocol (SIDH) is broken by Wouter Castryck and Thomas Decru
△ Less
Submitted 31 July, 2022; v1 submitted 17 March, 2020;
originally announced March 2020.
-
Monitoring the Multivariate Coefficient of Variation using Run Rules Type Control Charts
Authors:
P. H. Tran,
A. C. Rakitzis,
H. D. Nguyen,
Q. T. Nguyen,
K. P. Tran,
C. Heuchenne
Abstract:
In practice, there are processes where the in-control mean and standard deviation of a quality characteristic is not stable. In such cases, the coefficient of variation (CV) is a more appropriate measure for assessing process stability. In this paper, we consider the statistical design of Run Rules based control charts for monitoring the CV of multivariate data. A Markov chain approach is used to…
▽ More
In practice, there are processes where the in-control mean and standard deviation of a quality characteristic is not stable. In such cases, the coefficient of variation (CV) is a more appropriate measure for assessing process stability. In this paper, we consider the statistical design of Run Rules based control charts for monitoring the CV of multivariate data. A Markov chain approach is used to evaluate the statistical performance of the proposed charts. The computational results show that the Run Rules based charts outperform significantly the standard Shewhart control chart. Moreover, by choosing an appropriate scheme, the Run Rules based charts perform better than the Rum Sum control chart for monitoring the multivariate CV. An example in a spring manufacturing process is given to illustrate the implementation of the proposed charts.
△ Less
Submitted 19 January, 2020; v1 submitted 3 January, 2020;
originally announced January 2020.
-
Outage Probability Analysis of Amplify-and-Forward Cooperative Diversity Relay Networks
Authors:
Quoc Tuan Nguyen,
D. T. Nguyen,
Cong Lam Sinh
Abstract:
The statistical analysis of the fading End to End channel gain of the amplify and forward relaying protocol, however, is well known as extremely complex, and research work to date have only studied the asymptotic behaviour of the outage probability of the network at either very low or very high Signal Noise Ratios. Most current works circumvent the analytical complexity by first ignoring the effec…
▽ More
The statistical analysis of the fading End to End channel gain of the amplify and forward relaying protocol, however, is well known as extremely complex, and research work to date have only studied the asymptotic behaviour of the outage probability of the network at either very low or very high Signal Noise Ratios. Most current works circumvent the analytical complexity by first ignoring the effect of Additive White Gaussian noise then by using the simple approximated upper bound for the Signal Noise Ratio. The new approximated upper bound proposed in this paper, is far better bound than the previous results for the entire Signal Noise Ratio, which allows us to derive exact analytical expressions to study the effect of Additive White Gaussian noise on the network performance.
△ Less
Submitted 20 April, 2016;
originally announced April 2016.
-
Detour Planning for Fast and Reliable Failure Recovery in SDN with OpenState
Authors:
Antonio Capone,
Carmelo Cascone,
Alessandro Q. T. Nguyen,
Brunilde Sansò
Abstract:
A reliable and scalable mechanism to provide protection against a link or node failure has additional requirements in the context of SDN and OpenFlow. Not only it has to minimize the load on the controller, but it must be able to react even when the controller is unreachable. In this paper we present a protection scheme based on precomputed backup paths and inspired by MPLS crankback routing, that…
▽ More
A reliable and scalable mechanism to provide protection against a link or node failure has additional requirements in the context of SDN and OpenFlow. Not only it has to minimize the load on the controller, but it must be able to react even when the controller is unreachable. In this paper we present a protection scheme based on precomputed backup paths and inspired by MPLS crankback routing, that guarantees instantaneous recovery times and aims at zero packet-loss after failure detection, regardless of controller reachability, even when OpenFlow's "fast-failover" feature cannot be used. The proposed mechanism is based on OpenState, an OpenFlow extension that allows a programmer to specify how forwarding rules should autonomously adapt in a stateful fashion, reducing the need to rely on remote controllers. We present the scheme as well as two different formulations for the computation of backup paths.
△ Less
Submitted 1 September, 2015; v1 submitted 27 November, 2014;
originally announced November 2014.
-
Fault-Tolerance through Message-logging and Check-pointing: Disaster Recovery for CORBA-based Distributed Bank Servers
Authors:
Emil Vassev,
Que Thu Dung Nguyen,
Heng Kuang
Abstract:
This report presents results of our endeavor towards developing a failure-recovery variant of a CORBA-based bank server that provides fault tolerance features through message logging and checkpoint logging. In this group of projects, three components were developed to satisfy the requirements: 1) a message-logging protocol for the branch servers of the distributed banking system to log required…
▽ More
This report presents results of our endeavor towards developing a failure-recovery variant of a CORBA-based bank server that provides fault tolerance features through message logging and checkpoint logging. In this group of projects, three components were developed to satisfy the requirements: 1) a message-logging protocol for the branch servers of the distributed banking system to log required information; 2) a recovery module that restarts the bank server using the message log to help the restarted bank server process subsequent requests for various operations; 3) a monitor module that periodically checks whether the bank server is down and helps the recovery module restart the bank server if the latter has crashed.
△ Less
Submitted 17 November, 2009; v1 submitted 16 November, 2009;
originally announced November 2009.
-
Design and Implementation of a Distributed Middleware for Parallel Execution of Legacy Enterprise Applications
Authors:
Que Thu Dung Nguyen
Abstract:
A typical enterprise uses a local area network of computers to perform its business. During the off-working hours, the computational capacities of these networked computers are underused or unused. In order to utilize this computational capacity an application has to be recoded to exploit concurrency inherent in a computation which is clearly not possible for legacy applications without any sour…
▽ More
A typical enterprise uses a local area network of computers to perform its business. During the off-working hours, the computational capacities of these networked computers are underused or unused. In order to utilize this computational capacity an application has to be recoded to exploit concurrency inherent in a computation which is clearly not possible for legacy applications without any source code. This thesis presents the design an implementation of a distributed middleware which can automatically execute a legacy application on multiple networked computers by parallelizing it. This middleware runs multiple copies of the binary executable code in parallel on different hosts in the network. It wraps up the binary executable code of the legacy application in order to capture the kernel level data access system calls and perform them distributively over multiple computers in a safe and conflict free manner. The middleware also incorporates a dynamic scheduling technique to execute the target application in minimum time by scavenging the available CPU cycles of the hosts in the network. This dynamic scheduling also supports the CPU availability of the hosts to change over time and properly reschedule the replicas performing the computation to minimize the execution time. A prototype implementation of this middleware has been developed as a proof of concept of the design. This implementation has been evaluated with a few typical case studies and the test results confirm that the middleware works as expected.
△ Less
Submitted 20 August, 2009;
originally announced August 2009.