-
Quantum dynamics in frustrated Ising fullerenes
Authors:
Alejandro Lopez-Bezanilla,
William Bernoudy,
Kelly Boothby,
Jack Raymond,
Alberto Nocera,
Andrew D. King
Abstract:
The complex energy landscapes exhibited by frustrated magnetic systems undergoing quantum fluctuations are a challenge to accurately simulate, and thus of great interest for testing diverse qubit platforms in the field of quantum simulation. This study experimentally demonstrates quantum fluctuations lifting the degenerate ground-state manifold of classical magnetic configurations in fullerene Isi…
▽ More
The complex energy landscapes exhibited by frustrated magnetic systems undergoing quantum fluctuations are a challenge to accurately simulate, and thus of great interest for testing diverse qubit platforms in the field of quantum simulation. This study experimentally demonstrates quantum fluctuations lifting the degenerate ground-state manifold of classical magnetic configurations in fullerene Ising models with resonating dimers. The interplay between degeneracy and quantum fluctuations makes these boundary-free models a suitable benchmark for quantum simulators. Indeed, we observe significant performance improvement across generations of superconducting quantum annealers, showing the potential of highly symmetric, frustrated systems for assessing the precision of quantum-simulation technologies.
△ Less
Submitted 13 May, 2025;
originally announced May 2025.
-
Security through the Eyes of AI: How Visualization is Shaping Malware Detection
Authors:
Matteo Brosolo,
Asmitha K. A.,
Rafidha Rehiman K. A.,
Muhammed Shafi K. P.,
Serena Nicolazzo,
Antonino Nocera,
Vinod P
Abstract:
Malware, a persistent cybersecurity threat, increasingly targets interconnected digital systems such as desktop, mobile, and IoT platforms through sophisticated attack vectors. By exploiting these vulnerabilities, attackers compromise the integrity and resilience of modern digital ecosystems. To address this risk, security experts actively employ Machine Learning or Deep Learning-based strategies,…
▽ More
Malware, a persistent cybersecurity threat, increasingly targets interconnected digital systems such as desktop, mobile, and IoT platforms through sophisticated attack vectors. By exploiting these vulnerabilities, attackers compromise the integrity and resilience of modern digital ecosystems. To address this risk, security experts actively employ Machine Learning or Deep Learning-based strategies, integrating static, dynamic, or hybrid approaches to categorize malware instances. Despite their advantages, these methods have inherent drawbacks and malware variants persistently evolve with increased sophistication, necessitating advancements in detection strategies. Visualization-based techniques are emerging as scalable and interpretable solutions for detecting and understanding malicious behaviors across diverse platforms including desktop, mobile, IoT, and distributed systems as well as through analysis of network packet capture files. In this comprehensive survey of more than 100 high-quality research articles, we evaluate existing visualization-based approaches applied to malware detection and classification. As a first contribution, we propose a new all-encompassing framework to study the landscape of visualization-based malware detection techniques. Within this framework, we systematically analyze state-of-the-art approaches across the critical stages of the malware detection pipeline. By analyzing not only the single techniques but also how they are combined to produce the final solution, we shed light on the main challenges in visualization-based approaches and provide insights into the advancements and potential future directions in this critical field.
△ Less
Submitted 13 May, 2025; v1 submitted 12 May, 2025;
originally announced May 2025.
-
XBreaking: Explainable Artificial Intelligence for Jailbreaking LLMs
Authors:
Marco Arazzi,
Vignesh Kumar Kembu,
Antonino Nocera,
Vinod P
Abstract:
Large Language Models are fundamental actors in the modern IT landscape dominated by AI solutions. However, security threats associated with them might prevent their reliable adoption in critical application scenarios such as government organizations and medical institutions. For this reason, commercial LLMs typically undergo a sophisticated censoring mechanism to eliminate any harmful output they…
▽ More
Large Language Models are fundamental actors in the modern IT landscape dominated by AI solutions. However, security threats associated with them might prevent their reliable adoption in critical application scenarios such as government organizations and medical institutions. For this reason, commercial LLMs typically undergo a sophisticated censoring mechanism to eliminate any harmful output they could possibly produce. In response to this, LLM Jailbreaking is a significant threat to such protections, and many previous approaches have already demonstrated its effectiveness across diverse domains. Existing jailbreak proposals mostly adopt a generate-and-test strategy to craft malicious input. To improve the comprehension of censoring mechanisms and design a targeted jailbreak attack, we propose an Explainable-AI solution that comparatively analyzes the behavior of censored and uncensored models to derive unique exploitable alignment patterns. Then, we propose XBreaking, a novel jailbreak attack that exploits these unique patterns to break the security constraints of LLMs by targeted noise injection. Our thorough experimental campaign returns important insights about the censoring mechanisms and demonstrates the effectiveness and performance of our attack.
△ Less
Submitted 30 April, 2025;
originally announced April 2025.
-
Spectral signatures of residual electron pairing in the extended-Hubbard-Su-Schrieffer-Heeger model
Authors:
Debshikha Banerjee,
Alberto Nocera,
George A. Sawatzky,
Mona Berciu,
Steven Johnston
Abstract:
We study the electron addition spectrum of the one-dimensional extended Hubbard-Su-Schrieffer-Heeger (HSSH) model in the dilute limit using the density matrix renormalization group method. In addition to the expected renormalization to the band structure, we find that the electron-phonon (e-ph) interaction produces an anomalous spectral feature when electrons are added in the singlet channel but w…
▽ More
We study the electron addition spectrum of the one-dimensional extended Hubbard-Su-Schrieffer-Heeger (HSSH) model in the dilute limit using the density matrix renormalization group method. In addition to the expected renormalization to the band structure, we find that the electron-phonon (e-ph) interaction produces an anomalous spectral feature when electrons are added in the singlet channel but which is absent in the triplet channel. By comparing these results with those obtained from perturbation theory in the antiadiabatic limit, we demonstrate that this anomalous feature is a remnant of the strong electron-electron interaction mediated by the SSH coupling previously derived in the two-particle limit. By studying the evolution of this feature as a function of doping, we track the fate of this attraction to higher carrier concentrations and provide predictions for the spectral features to help guide future searches for strong e-ph mediated pairing.
△ Less
Submitted 11 April, 2025;
originally announced April 2025.
-
Comment on: "Dynamics of disordered quantum systems with two- and three-dimensional tensor networks" arXiv:2503.05693
Authors:
Andrew D. King,
Alberto Nocera,
Marek M. Rams,
Jacek Dziarmaga,
Jack Raymond,
Nitin Kaushal,
Anders W. Sandvik,
Gonzalo Alvarez,
Juan Carrasquilla,
Marcel Franz,
Mohammad H. Amin
Abstract:
In a recent preprint [1] (arXiv:2503.05693), Tindall et al. presented impressive classical simulations of quantum dynamics using tensor networks. Their methods represent a significant improvement in the classical state of the art, and in some cases show lower errors than recent simulations of quantum dynamics using a quantum annealer [2] (King et al., Science, eado6285, 2025). However, of the simu…
▽ More
In a recent preprint [1] (arXiv:2503.05693), Tindall et al. presented impressive classical simulations of quantum dynamics using tensor networks. Their methods represent a significant improvement in the classical state of the art, and in some cases show lower errors than recent simulations of quantum dynamics using a quantum annealer [2] (King et al., Science, eado6285, 2025). However, of the simulations in Ref. [2], Ref. [1] did not attempt the most complex lattice geometry, nor reproduce the largest simulations in 3D lattices, nor simulate the longest simulation times, nor simulate the low-precision ensembles in which correlations grow the fastest, nor produce the full-state and fourth-order observables produced by Ref. [2]. Thus this work should not be misinterpreted as having overturned the claim of Ref. [2]: the demonstration of quantum simulations beyond the reach of classical methods. Rather, these classical advances narrow the parameter space in which beyond-classical computation has been demonstrated. In the near future these classical methods can be combined with quantum simulations to help sharpen the boundary between classical and quantum simulability.
△ Less
Submitted 25 March, 2025;
originally announced April 2025.
-
How Secure is Forgetting? Linking Machine Unlearning to Machine Learning Attacks
Authors:
Muhammed Shafi K. P.,
Serena Nicolazzo,
Antonino Nocera,
Vinod P
Abstract:
As Machine Learning (ML) evolves, the complexity and sophistication of security threats against this paradigm continue to grow as well, threatening data privacy and model integrity. In response, Machine Unlearning (MU) is a recent technology that aims to remove the influence of specific data from a trained model, enabling compliance with privacy regulations and user requests. This can be done for…
▽ More
As Machine Learning (ML) evolves, the complexity and sophistication of security threats against this paradigm continue to grow as well, threatening data privacy and model integrity. In response, Machine Unlearning (MU) is a recent technology that aims to remove the influence of specific data from a trained model, enabling compliance with privacy regulations and user requests. This can be done for privacy compliance (e.g., GDPR's right to be forgotten) or model refinement. However, the intersection between classical threats in ML and MU remains largely unexplored. In this Systematization of Knowledge (SoK), we provide a structured analysis of security threats in ML and their implications for MU. We analyze four major attack classes, namely, Backdoor Attacks, Membership Inference Attacks (MIA), Adversarial Attacks, and Inversion Attacks, we investigate their impact on MU and propose a novel classification based on how they are usually used in this context. Finally, we identify open challenges, including ethical considerations, and explore promising future research directions, paving the way for future research in secure and privacy-preserving Machine Unlearning.
△ Less
Submitted 26 March, 2025;
originally announced March 2025.
-
DroidTTP: Mapping Android Applications with TTP for Cyber Threat Intelligence
Authors:
Dincy R Arikkat,
Vinod P.,
Rafidha Rehiman K. A.,
Serena Nicolazzo,
Marco Arazzi,
Antonino Nocera,
Mauro Conti
Abstract:
The widespread adoption of Android devices for sensitive operations like banking and communication has made them prime targets for cyber threats, particularly Advanced Persistent Threats (APT) and sophisticated malware attacks. Traditional malware detection methods rely on binary classification, failing to provide insights into adversarial Tactics, Techniques, and Procedures (TTPs). Understanding…
▽ More
The widespread adoption of Android devices for sensitive operations like banking and communication has made them prime targets for cyber threats, particularly Advanced Persistent Threats (APT) and sophisticated malware attacks. Traditional malware detection methods rely on binary classification, failing to provide insights into adversarial Tactics, Techniques, and Procedures (TTPs). Understanding malware behavior is crucial for enhancing cybersecurity defenses. To address this gap, we introduce DroidTTP, a framework mapping Android malware behaviors to TTPs based on the MITRE ATT&CK framework. Our curated dataset explicitly links MITRE TTPs to Android applications. We developed an automated solution leveraging the Problem Transformation Approach (PTA) and Large Language Models (LLMs) to map applications to both Tactics and Techniques. Additionally, we employed Retrieval-Augmented Generation (RAG) with prompt engineering and LLM fine-tuning for TTP predictions. Our structured pipeline includes dataset creation, hyperparameter tuning, data augmentation, feature selection, model development, and SHAP-based model interpretability. Among LLMs, Llama achieved the highest performance in Tactic classification with a Jaccard Similarity of 0.9583 and Hamming Loss of 0.0182, and in Technique classification with a Jaccard Similarity of 0.9348 and Hamming Loss of 0.0127. However, the Label Powerset XGBoost model outperformed LLMs, achieving a Jaccard Similarity of 0.9893 for Tactic classification and 0.9753 for Technique classification, with a Hamming Loss of 0.0054 and 0.0050, respectively. While XGBoost showed superior performance, the narrow margin highlights the potential of LLM-based approaches in TTP classification.
△ Less
Submitted 20 March, 2025;
originally announced March 2025.
-
Tensor networks for quantum computing
Authors:
Aleksandr Berezutskii,
Minzhao Liu,
Atithi Acharya,
Roman Ellerbrock,
Johnnie Gray,
Reza Haghshenas,
Zichang He,
Abid Khan,
Viacheslav Kuzmin,
Dmitry Lyakh,
Danylo Lykov,
Salvatore Mandrà,
Christopher Mansell,
Alexey Melnikov,
Artem Melnikov,
Vladimir Mironov,
Dmitry Morozov,
Florian Neukart,
Alberto Nocera,
Michael A. Perlin,
Michael Perelshtein,
Matthew Steinberg,
Ruslan Shaydulin,
Benjamin Villalonga,
Markus Pflitsch
, et al. (3 additional authors not shown)
Abstract:
In the rapidly evolving field of quantum computing, tensor networks serve as an important tool due to their multifaceted utility. In this paper, we review the diverse applications of tensor networks and show that they are an important instrument for quantum computing. Specifically, we summarize the application of tensor networks in various domains of quantum computing, including simulation of quan…
▽ More
In the rapidly evolving field of quantum computing, tensor networks serve as an important tool due to their multifaceted utility. In this paper, we review the diverse applications of tensor networks and show that they are an important instrument for quantum computing. Specifically, we summarize the application of tensor networks in various domains of quantum computing, including simulation of quantum computation, quantum circuit synthesis, quantum error correction and mitigation, and quantum machine learning. Finally, we provide an outlook on the opportunities and the challenges of the tensor-network techniques.
△ Less
Submitted 10 May, 2025; v1 submitted 11 March, 2025;
originally announced March 2025.
-
Privacy Preserving and Robust Aggregation for Cross-Silo Federated Learning in Non-IID Settings
Authors:
Marco Arazzi,
Mert Cihangiroglu,
Antonino Nocera
Abstract:
Federated Averaging remains the most widely used aggregation strategy in federated learning due to its simplicity and scalability. However, its performance degrades significantly in non-IID data settings, where client distributions are highly imbalanced or skewed. Additionally, it relies on clients transmitting metadata, specifically the number of training samples, which introduces privacy risks a…
▽ More
Federated Averaging remains the most widely used aggregation strategy in federated learning due to its simplicity and scalability. However, its performance degrades significantly in non-IID data settings, where client distributions are highly imbalanced or skewed. Additionally, it relies on clients transmitting metadata, specifically the number of training samples, which introduces privacy risks and may conflict with regulatory frameworks like the European GDPR. In this paper, we propose a novel aggregation strategy that addresses these challenges by introducing class-aware gradient masking. Unlike traditional approaches, our method relies solely on gradient updates, eliminating the need for any additional client metadata, thereby enhancing privacy protection. Furthermore, our approach validates and dynamically weights client contributions based on class-specific importance, ensuring robustness against non-IID distributions, convergence prevention, and backdoor attacks. Extensive experiments on benchmark datasets demonstrate that our method not only outperforms FedAvg and other widely accepted aggregation strategies in non-IID settings but also preserves model integrity in adversarial scenarios. Our results establish the effectiveness of gradient masking as a practical and secure solution for federated learning.
△ Less
Submitted 6 March, 2025;
originally announced March 2025.
-
Secure Federated Data Distillation
Authors:
Marco Arazzi,
Mert Cihangiroglu,
Serena Nicolazzo,
Antonino Nocera
Abstract:
Dataset Distillation (DD) is a powerful technique for reducing large datasets into compact, representative synthetic datasets, accelerating Machine Learning training. However, traditional DD methods operate in a centralized manner, which poses significant privacy threats and reduces its applicability. To mitigate these risks, we propose a Secure Federated Data Distillation (SFDD) framework to dece…
▽ More
Dataset Distillation (DD) is a powerful technique for reducing large datasets into compact, representative synthetic datasets, accelerating Machine Learning training. However, traditional DD methods operate in a centralized manner, which poses significant privacy threats and reduces its applicability. To mitigate these risks, we propose a Secure Federated Data Distillation (SFDD) framework to decentralize the distillation process while preserving privacy. Unlike existing Federated Distillation techniques that focus on training global models with distilled knowledge, our approach aims to produce a distilled dataset without exposing local contributions. We leverage the gradient-matching-based distillation method, adapting it for a distributed setting where clients contribute to the distillation process without sharing raw data. The central aggregator iteratively refines a synthetic dataset by integrating client-side updates while ensuring data confidentiality. To make our approach resilient to inference attacks perpetrated by the server that could exploit gradient updates to reconstruct private data, we create an optimized Local Differential Privacy approach, called LDPO-RLD. Furthermore, we assess the framework's resilience against malicious clients executing backdoor attacks (such as Doorping) and demonstrate robustness under the assumption of a sufficient number of participating clients. Our experimental results demonstrate the effectiveness of SFDD and that the proposed defense concretely mitigates the identified vulnerabilities, with minimal impact on the performance of the distilled dataset. By addressing the interplay between privacy and federation in dataset distillation, this work advances the field of privacy-preserving Machine Learning making our SFDD framework a viable solution for sensitive data-sharing applications.
△ Less
Submitted 6 March, 2025; v1 submitted 19 February, 2025;
originally announced February 2025.
-
Augmented Knowledge Graph Querying leveraging LLMs
Authors:
Marco Arazzi,
Davide Ligari,
Serena Nicolazzo,
Antonino Nocera
Abstract:
Adopting Knowledge Graphs (KGs) as a structured, semantic-oriented, data representation model has significantly improved data integration, reasoning, and querying capabilities across different domains. This is especially true in modern scenarios such as Industry 5.0, in which the integration of data produced by humans, smart devices, and production processes plays a crucial role. However, the mana…
▽ More
Adopting Knowledge Graphs (KGs) as a structured, semantic-oriented, data representation model has significantly improved data integration, reasoning, and querying capabilities across different domains. This is especially true in modern scenarios such as Industry 5.0, in which the integration of data produced by humans, smart devices, and production processes plays a crucial role. However, the management, retrieval, and visualization of data from a KG using formal query languages can be difficult for non-expert users due to their technical complexity, thus limiting their usage inside industrial environments. For this reason, we introduce SparqLLM, a framework that utilizes a Retrieval-Augmented Generation (RAG) solution, to enhance the querying of Knowledge Graphs (KGs). SparqLLM executes the Extract, Transform, and Load (ETL) pipeline to construct KGs from raw data. It also features a natural language interface powered by Large Language Models (LLMs) to enable automatic SPARQL query generation. By integrating template-based methods as retrieved-context for the LLM, SparqLLM enhances query reliability and reduces semantic errors, ensuring more accurate and efficient KG interactions. Moreover, to improve usability, the system incorporates a dynamic visualization dashboard that adapts to the structure of the retrieved data, presenting the query results in an intuitive format. Rigorous experimental evaluations demonstrate that SparqLLM achieves high query accuracy, improved robustness, and user-friendly interaction with KGs, establishing it as a scalable solution to access semantic data.
△ Less
Submitted 3 February, 2025;
originally announced February 2025.
-
Identifying and quantifying Su-Schrieffer-Heeger-like interactions with RIXS
Authors:
Debshikha Banerjee,
Jinu Thomas,
Alberto Nocera,
Steven Johnston
Abstract:
Su-Schrieffer-Heeger (SSH)-like electron-phonon (e-ph) interactions can drive the formation of light (bi)polarons and several novel states of matter. It is, therefore, prudent to develop experimental protocols for identifying such couplings in real materials and quantifying their strength. Here, we investigate how resonant inelastic x-ray scattering (RIXS) probes e-ph interactions in the one-dimen…
▽ More
Su-Schrieffer-Heeger (SSH)-like electron-phonon (e-ph) interactions can drive the formation of light (bi)polarons and several novel states of matter. It is, therefore, prudent to develop experimental protocols for identifying such couplings in real materials and quantifying their strength. Here, we investigate how resonant inelastic x-ray scattering (RIXS) probes e-ph interactions in the one-dimensional half-filled Hubbard-SSH model with onsite phonons. Using the density matrix renormalization group method, we compute the full RIXS response and find that the lattice excitations generated during the scattering process inevitably couple to the system's charge and magnetic sectors, resulting in combined multi-particle excitations that cannot be easily disentangled from one another. While this aspect complicates the interpretation of RIXS experiments, we outline how it can be leveraged to identify and quantify SSH-like interactions in quantum materials.
△ Less
Submitted 20 December, 2024;
originally announced December 2024.
-
Theory of electron-phonon interactions in extended correlated systems probed by resonant inelastic x-ray scattering
Authors:
Jinu Thomas,
Debshikha Banerjee,
Alberto Nocera,
Steven Johnston
Abstract:
An emerging application of resonant inelastic x-ray scattering (RIXS) is the study of lattice excitations and electron-phonon ($e$-ph) interactions in quantum materials. Despite the growing importance of this area of research, the community lacks a complete understanding of how the RIXS process excites the lattice and how these excitations encode information about the $e$-ph interactions. Here, we…
▽ More
An emerging application of resonant inelastic x-ray scattering (RIXS) is the study of lattice excitations and electron-phonon ($e$-ph) interactions in quantum materials. Despite the growing importance of this area of research, the community lacks a complete understanding of how the RIXS process excites the lattice and how these excitations encode information about the $e$-ph interactions. Here, we present a detailed study of the RIXS spectra of the Hubbard-Holstein model defined on extended one-dimensional lattices. Using the density matrix renormalization group (DMRG) method, we compute the RIXS response while treating the electron mobility, many-body interactions, and core-hole interactions on an equal footing. The predicted spectra exhibit notable differences from those obtained using the commonly adopted Lang-Firsov models, with important implications for analyzing past and future experiments. Our results provide a deeper understanding of how RIXS probes $e$-ph interactions and set the stage for a more realistic analysis of future experiments.
△ Less
Submitted 17 December, 2024;
originally announced December 2024.
-
Subject Data Auditing via Source Inference Attack in Cross-Silo Federated Learning
Authors:
Jiaxin Li,
Marco Arazzi,
Antonino Nocera,
Mauro Conti
Abstract:
Source Inference Attack (SIA) in Federated Learning (FL) aims to identify which client used a target data point for local model training. It allows the central server to audit clients' data usage. In cross-silo FL, a client (silo) collects data from multiple subjects (e.g., individuals, writers, or devices), posing a risk of subject information leakage. Subject Membership Inference Attack (SMIA) t…
▽ More
Source Inference Attack (SIA) in Federated Learning (FL) aims to identify which client used a target data point for local model training. It allows the central server to audit clients' data usage. In cross-silo FL, a client (silo) collects data from multiple subjects (e.g., individuals, writers, or devices), posing a risk of subject information leakage. Subject Membership Inference Attack (SMIA) targets this scenario and attempts to infer whether any client utilizes data points from a target subject in cross-silo FL. However, existing results on SMIA are limited and based on strong assumptions on the attack scenario. Therefore, we propose a Subject-Level Source Inference Attack (SLSIA) by removing critical constraints that only one client can use a target data point in SIA and imprecise detection of clients utilizing target subject data in SMIA. The attacker, positioned on the server side, controls a target data source and aims to detect all clients using data points from the target subject. Our strategy leverages a binary attack classifier to predict whether the embeddings returned by a local model on test data from the target subject include unique patterns that indicate a client trains the model with data from that subject. To achieve this, the attacker locally pre-trains models using data derived from the target subject and then leverages them to build a training set for the binary attack classifier. Our SLSIA significantly outperforms previous methods on three datasets. Specifically, SLSIA achieves a maximum average accuracy of 0.88 over 50 target subjects. Analyzing embedding distribution and input feature distance shows that datasets with sparse subjects are more susceptible to our attack. Finally, we propose to defend our SLSIA using item-level and subject-level differential privacy mechanisms.
△ Less
Submitted 28 September, 2024;
originally announced September 2024.
-
Signature of preformed pairs in angle-resolved photoemission spectroscopy
Authors:
Klemen Kovač,
Alberto Nocera,
Andrea Damascelli,
Janez Bonča,
Mona Berciu
Abstract:
We use density matrix renormalization group (DMRG) and variational exact diagonalization (VED) to calculate the single-electron removal spectral weight for the Hubbard-Holstein model at low electron densities. Tuning the strength of the electron-phonon coupling and of the Hubbard repulsion allows us to contrast the results for a liquid of polarons versus a liquid of bipolarons. The former shows sp…
▽ More
We use density matrix renormalization group (DMRG) and variational exact diagonalization (VED) to calculate the single-electron removal spectral weight for the Hubbard-Holstein model at low electron densities. Tuning the strength of the electron-phonon coupling and of the Hubbard repulsion allows us to contrast the results for a liquid of polarons versus a liquid of bipolarons. The former shows spectral weight up to the Fermi energy, as expected for a metal. The latter has a gap in its spectral weight, set by the bipolaron binding energy, although this is also a (strongly correlated) metal. This difference suggests that angle-resolved photoemission spectroscopy could be used to identify liquids of pre-formed pairs. Furthermore, we show that the one-dimensional liquid of incoherent bipolarons is well approximated by a "Bose sea" of bosons that are hard-core in momentum space, occupying the momenta inside the Fermi sea but otherwise non-interacting. This new proposal for a strongly-correlated many-body wavefunction opens the way for studying various other properties of incoherent (non-superconducting) liquids of pre-formed pairs in any dimension.
△ Less
Submitted 5 March, 2025; v1 submitted 22 September, 2024;
originally announced September 2024.
-
Frustrated S = 1/2 Chains in One-Dimensional Correlated Metal Ti4MnBi2
Authors:
X. Y. Li,
A. Nocera,
K. Foyevtsova,
G. A. Sawatzky,
M. Oudah,
N. Murai,
M. Kofu,
M. Matsuura,
H. Tamatsukuri,
M. C. Aronson
Abstract:
Electronic correlations lead to heavy quasiparticles in three-dimensional (3D) metals, and their collapse can destabilize magnetic moments. It is an open question whether there is an analogous instability in one-dimensional (1D) systems, unanswered due to the lack of metallic spin chain materials. We report neutron scattering measurements and Density Matrix Renormalization Group calculations estab…
▽ More
Electronic correlations lead to heavy quasiparticles in three-dimensional (3D) metals, and their collapse can destabilize magnetic moments. It is an open question whether there is an analogous instability in one-dimensional (1D) systems, unanswered due to the lack of metallic spin chain materials. We report neutron scattering measurements and Density Matrix Renormalization Group calculations establishing spinons in the correlated metal Ti4MnBi2, confirming that its magnetism is 1D. Ti4MnBi2 is inherently frustrated, forming near a quantum critical point (QCP) separating different temperature T = 0 phases of the J1-J2 XXZ model. 1D magnetism dominates to the lowest T, and is barely affected by weak interchain coupling. Ti4MnBi2 is the first metallic spin chain where 3D conduction electrons become strongly correlated due to their coupling to 1D magnetic moments.
△ Less
Submitted 8 January, 2025; v1 submitted 4 September, 2024;
originally announced September 2024.
-
Left-left-right-right magnetic order in spin-1/2 Kitaev-Heisenberg chain
Authors:
Wang Yang,
Chao Xu,
Alberto Nocera,
Ian Affleck
Abstract:
In this work, we perform a combination of analytical and numerical studies on the phase diagram of the spin-1/2 Kitaev-Heisenberg chain in the region of negative Kitaev and positive Heisenberg couplings. Apart from the antiferromagnetic phase, we find a magnetically ordered phase with left-left-right-right order and a gapless phase with central charge value $c=1$, resolving the existing contradict…
▽ More
In this work, we perform a combination of analytical and numerical studies on the phase diagram of the spin-1/2 Kitaev-Heisenberg chain in the region of negative Kitaev and positive Heisenberg couplings. Apart from the antiferromagnetic phase, we find a magnetically ordered phase with left-left-right-right order and a gapless phase with central charge value $c=1$, resolving the existing contradictory results in literature regarding this parameter region. In particular, the origin of the left-left-right-right phase is clarified based on a perturbative Luttinger liquid analysis. Using a coupled-chain method, we further show that the one-dimensional (1D) left-left-right-right order is able to give a quasi-1D explanation for the 2D stripy order of the same model on the honeycomb lattice.
△ Less
Submitted 15 August, 2024;
originally announced August 2024.
-
SeCTIS: A Framework to Secure CTI Sharing
Authors:
Dincy R. Arikkat,
Mert Cihangiroglu,
Mauro Conti,
Rafidha Rehiman K. A.,
Serena Nicolazzo,
Antonino Nocera,
Vinod P
Abstract:
The rise of IT-dependent operations in modern organizations has heightened their vulnerability to cyberattacks. As a growing number of organizations include smart, interconnected devices in their systems to automate their processes, the attack surface becomes much bigger, and the complexity and frequency of attacks pose a significant threat. Consequently, organizations have been compelled to seek…
▽ More
The rise of IT-dependent operations in modern organizations has heightened their vulnerability to cyberattacks. As a growing number of organizations include smart, interconnected devices in their systems to automate their processes, the attack surface becomes much bigger, and the complexity and frequency of attacks pose a significant threat. Consequently, organizations have been compelled to seek innovative approaches to mitigate the menaces inherent in their infrastructure. In response, considerable research efforts have been directed towards creating effective solutions for sharing Cyber Threat Intelligence (CTI). Current information-sharing methods lack privacy safeguards, leaving organizations vulnerable to leaks of both proprietary and confidential data. To tackle this problem, we designed a novel framework called SeCTIS (Secure Cyber Threat Intelligence Sharing), integrating Swarm Learning and Blockchain technologies to enable businesses to collaborate, preserving the privacy of their CTI data. Moreover, our approach provides a way to assess the data and model quality, and the trustworthiness of all the participants leveraging some validators through Zero Knowledge Proofs. An extensive experimental campaign demonstrates our framework's correctness and performance, and the detailed attack model discusses its robustness against attacks in the context of data and model quality.
△ Less
Submitted 20 June, 2024;
originally announced June 2024.
-
Service Level Agreements and Security SLA: A Comprehensive Survey
Authors:
Serena Nicolazzo,
Antonino Nocera,
Witold Pedrycz
Abstract:
A Service Level Agreement (SLA) is a formal contract between a service provider and a consumer, representing a crucial instrument to define, manage, and maintain relationships between these two parties. The SLA's ability to define the Quality of Service (QoS) expectations, standards, and accountability helps to deliver high-quality services and increase client confidence in disparate application d…
▽ More
A Service Level Agreement (SLA) is a formal contract between a service provider and a consumer, representing a crucial instrument to define, manage, and maintain relationships between these two parties. The SLA's ability to define the Quality of Service (QoS) expectations, standards, and accountability helps to deliver high-quality services and increase client confidence in disparate application domains, such as Cloud computing and the Internet of Things. An open research direction in this context is related to the possible integration of new metrics to address the security and privacy aspects of services, thus providing protection of sensitive information, mitigating risks, and building trust. This survey paper identifies state of the art covering concepts, approaches, and open problems of SLA management with a distinctive and original focus on the recent development of Security SLA (SecSLA). It contributes by carrying out a comprehensive review and covering the gap between the analyses proposed in existing surveys and the most recent literature on this topic, spanning from 2017 to 2023. Moreover, it proposes a novel classification criterium to organize the analysis based on SLA life cycle phases. This original point of view can help both academics and industrial practitioners to understand and properly locate existing contributions in the advancement of the different aspects of SLA technology. The present work highlights the importance of the covered topics and the need for new research improvements to tackle present and demanding challenges.
△ Less
Submitted 31 January, 2024;
originally announced May 2024.
-
Let's Focus: Focused Backdoor Attack against Federated Transfer Learning
Authors:
Marco Arazzi,
Stefanos Koffas,
Antonino Nocera,
Stjepan Picek
Abstract:
Federated Transfer Learning (FTL) is the most general variation of Federated Learning. According to this distributed paradigm, a feature learning pre-step is commonly carried out by only one party, typically the server, on publicly shared data. After that, the Federated Learning phase takes place to train a classifier collaboratively using the learned feature extractor. Each involved client contri…
▽ More
Federated Transfer Learning (FTL) is the most general variation of Federated Learning. According to this distributed paradigm, a feature learning pre-step is commonly carried out by only one party, typically the server, on publicly shared data. After that, the Federated Learning phase takes place to train a classifier collaboratively using the learned feature extractor. Each involved client contributes by locally training only the classification layers on a private training set. The peculiarity of an FTL scenario makes it hard to understand whether poisoning attacks can be developed to craft an effective backdoor. State-of-the-art attack strategies assume the possibility of shifting the model attention toward relevant features introduced by a forged trigger injected in the input data by some untrusted clients. Of course, this is not feasible in FTL, as the learned features are fixed once the server performs the pre-training step. Consequently, in this paper, we investigate this intriguing Federated Learning scenario to identify and exploit a vulnerability obtained by combining eXplainable AI (XAI) and dataset distillation. In particular, the proposed attack can be carried out by one of the clients during the Federated Learning phase of FTL by identifying the optimal local for the trigger through XAI and encapsulating compressed information of the backdoor class. Due to its behavior, we refer to our approach as a focused backdoor approach (FB-FTL for short) and test its performance by explicitly referencing an image classification scenario. With an average 80% attack success rate, obtained results show the effectiveness of our attack also against existing defenses for Federated Learning.
△ Less
Submitted 30 April, 2024;
originally announced April 2024.
-
KDk: A Defense Mechanism Against Label Inference Attacks in Vertical Federated Learning
Authors:
Marco Arazzi,
Serena Nicolazzo,
Antonino Nocera
Abstract:
Vertical Federated Learning (VFL) is a category of Federated Learning in which models are trained collaboratively among parties with vertically partitioned data. Typically, in a VFL scenario, the labels of the samples are kept private from all the parties except for the aggregating server, that is the label owner. Nevertheless, recent works discovered that by exploiting gradient information return…
▽ More
Vertical Federated Learning (VFL) is a category of Federated Learning in which models are trained collaboratively among parties with vertically partitioned data. Typically, in a VFL scenario, the labels of the samples are kept private from all the parties except for the aggregating server, that is the label owner. Nevertheless, recent works discovered that by exploiting gradient information returned by the server to bottom models, with the knowledge of only a small set of auxiliary labels on a very limited subset of training data points, an adversary can infer the private labels. These attacks are known as label inference attacks in VFL. In our work, we propose a novel framework called KDk, that combines Knowledge Distillation and k-anonymity to provide a defense mechanism against potential label inference attacks in a VFL scenario. Through an exhaustive experimental campaign we demonstrate that by applying our approach, the performance of the analyzed label inference attacks decreases consistently, even by more than 60%, maintaining the accuracy of the whole VFL almost unaltered.
△ Less
Submitted 18 April, 2024;
originally announced April 2024.
-
A Deep Reinforcement Learning Approach for Security-Aware Service Acquisition in IoT
Authors:
Marco Arazzi,
Serena Nicolazzo,
Antonino Nocera
Abstract:
The novel Internet of Things (IoT) paradigm is composed of a growing number of heterogeneous smart objects and services that are transforming architectures and applications, increasing systems' complexity, and the need for reliability and autonomy. In this context, both smart objects and services are often provided by third parties which do not give full transparency regarding the security and pri…
▽ More
The novel Internet of Things (IoT) paradigm is composed of a growing number of heterogeneous smart objects and services that are transforming architectures and applications, increasing systems' complexity, and the need for reliability and autonomy. In this context, both smart objects and services are often provided by third parties which do not give full transparency regarding the security and privacy of the features offered. Although machine-based Service Level Agreements (SLA) have been recently leveraged to establish and share policies in Cloud-based scenarios, and also in the IoT context, the issue of making end users aware of the overall system security levels and the fulfillment of their privacy requirements through the provision of the requested service remains a challenging task. To tackle this problem, we propose a complete framework that defines suitable levels of privacy and security requirements in the acquisition of services in IoT, according to the user needs. Through the use of a Reinforcement Learning based solution, a user agent, inside the environment, is trained to choose the best smart objects granting access to the target services. Moreover, the solution is designed to guarantee deadline requirements and user security and privacy needs. Finally, to evaluate the correctness and the performance of the proposed approach we illustrate an extensive experimental analysis.
△ Less
Submitted 4 April, 2024;
originally announced April 2024.
-
Computational supremacy in quantum simulation
Authors:
Andrew D. King,
Alberto Nocera,
Marek M. Rams,
Jacek Dziarmaga,
Roeland Wiersema,
William Bernoudy,
Jack Raymond,
Nitin Kaushal,
Niclas Heinsdorf,
Richard Harris,
Kelly Boothby,
Fabio Altomare,
Andrew J. Berkley,
Martin Boschnak,
Kevin Chern,
Holly Christiani,
Samantha Cibere,
Jake Connor,
Martin H. Dehn,
Rahul Deshpande,
Sara Ejtemaee,
Pau Farré,
Kelsey Hamer,
Emile Hoskinson,
Shuiyuan Huang
, et al. (37 additional authors not shown)
Abstract:
Quantum computers hold the promise of solving certain problems that lie beyond the reach of conventional computers. Establishing this capability, especially for impactful and meaningful problems, remains a central challenge. One such problem is the simulation of nonequilibrium dynamics of a magnetic spin system quenched through a quantum phase transition. State-of-the-art classical simulations dem…
▽ More
Quantum computers hold the promise of solving certain problems that lie beyond the reach of conventional computers. Establishing this capability, especially for impactful and meaningful problems, remains a central challenge. One such problem is the simulation of nonequilibrium dynamics of a magnetic spin system quenched through a quantum phase transition. State-of-the-art classical simulations demand resources that grow exponentially with system size. Here we show that superconducting quantum annealing processors can rapidly generate samples in close agreement with solutions of the Schrödinger equation. We demonstrate area-law scaling of entanglement in the model quench in two-, three- and infinite-dimensional spin glasses, supporting the observed stretched-exponential scaling of effort for classical approaches. We assess approximate methods based on tensor networks and neural networks and conclude that no known approach can achieve the same accuracy as the quantum annealer within a reasonable timeframe. Thus quantum annealers can answer questions of practical importance that classical computers cannot.
△ Less
Submitted 1 March, 2024;
originally announced March 2024.
-
Quantum Quench Dynamics of Geometrically Frustrated Ising Models
Authors:
Ammar Ali,
Hanjing Xu,
William Bernoudy,
Alberto Nocera,
Andrew D. King,
Arnab Banerjee
Abstract:
Geometric frustration in two-dimensional Ising models allows for a wealth of exotic universal behavior, both Ising and non-Ising, in the presence of quantum fluctuations. In particular, the triangular antiferromagnet and Villain model in a transverse field can be understood through distinct XY pseudospins, but have qualitatively similar phase diagrams including a quantum phase transition in the (2…
▽ More
Geometric frustration in two-dimensional Ising models allows for a wealth of exotic universal behavior, both Ising and non-Ising, in the presence of quantum fluctuations. In particular, the triangular antiferromagnet and Villain model in a transverse field can be understood through distinct XY pseudospins, but have qualitatively similar phase diagrams including a quantum phase transition in the (2+1)-dimensional XY universality class. While the quantum dynamics of modestly-sized systems can be simulated classically using tensor-based methods, these methods become infeasible for larger lattices. Here we perform both classical and quantum simulations of these dynamics, where our quantum simulator is a superconducting quantum annealer. Our observations on the triangular lattice suggest that the dominant quench dynamics are not described by the quantum Kibble-Zurek scaling of the quantum phase transition, but rather a faster coarsening dynamics in an effective two-dimensional XY model in the ordered phase. Similarly, on the Villain model, the scaling exponent does not match the Kibble-Zurek expectation. These results demonstrate the ability of quantum annealers to simulate coherent quantum dynamics and scale beyond the reach of classical approaches.
△ Less
Submitted 29 February, 2024;
originally announced March 2024.
-
The SemIoE Ontology: A Semantic Model Solution for an IoE-based Industry
Authors:
Marco Arazzi,
Antonino Nocera,
Emanuele Storti
Abstract:
Recently, the Industry 5.0 is gaining attention as a novel paradigm, defining the next concrete steps toward more and more intelligent, green-aware and user-centric digital systems. In an era in which smart devices typically adopted in the industry domain are more and more sophisticated and autonomous, the Internet of Things and its evolution, known as the Internet of Everything (IoE, for short),…
▽ More
Recently, the Industry 5.0 is gaining attention as a novel paradigm, defining the next concrete steps toward more and more intelligent, green-aware and user-centric digital systems. In an era in which smart devices typically adopted in the industry domain are more and more sophisticated and autonomous, the Internet of Things and its evolution, known as the Internet of Everything (IoE, for short), involving also people, robots, processes and data in the network, represent the main driver to allow industries to put the experiences and needs of human beings at the center of their ecosystems. However, due to the extreme heterogeneity of the involved entities, their intrinsic need and capability to cooperate, and the aim to adapt to a dynamic user-centric context, special attention is required for the integration and processing of the data produced by such an IoE. This is the objective of the present paper, in which we propose a novel semantic model that formalizes the fundamental actors, elements and information of an IoE, along with their relationships. In our design, we focus on state-of-the-art design principles, in particular reuse, and abstraction, to build ``SemIoE'', a lightweight ontology inheriting and extending concepts from well-known and consolidated reference ontologies. The defined semantic layer represents a core data model that can be extended to embrace any modern industrial scenario. It represents the base of an IoE Knowledge Graph, on top of which, as an additional contribution, we analyze and define some essential services for an IoE-based industry.
△ Less
Submitted 12 January, 2024;
originally announced January 2024.
-
Privacy-Preserving in Blockchain-based Federated Learning Systems
Authors:
Sameera K. M.,
Serena Nicolazzo,
Marco Arazzi,
Antonino Nocera,
Rafidha Rehiman K. A.,
Vinod P,
Mauro Conti
Abstract:
Federated Learning (FL) has recently arisen as a revolutionary approach to collaborative training Machine Learning models. According to this novel framework, multiple participants train a global model collaboratively, coordinating with a central aggregator without sharing their local data. As FL gains popularity in diverse domains, security, and privacy concerns arise due to the distributed nature…
▽ More
Federated Learning (FL) has recently arisen as a revolutionary approach to collaborative training Machine Learning models. According to this novel framework, multiple participants train a global model collaboratively, coordinating with a central aggregator without sharing their local data. As FL gains popularity in diverse domains, security, and privacy concerns arise due to the distributed nature of this solution. Therefore, integrating this strategy with Blockchain technology has been consolidated as a preferred choice to ensure the privacy and security of participants.
This paper explores the research efforts carried out by the scientific community to define privacy solutions in scenarios adopting Blockchain-Enabled FL. It comprehensively summarizes the background related to FL and Blockchain, evaluates existing architectures for their integration, and the primary attacks and possible countermeasures to guarantee privacy in this setting. Finally, it reviews the main application scenarios where Blockchain-Enabled FL approaches have been proficiently applied. This survey can help academia and industry practitioners understand which theories and techniques exist to improve the performance of FL through Blockchain to preserve privacy and which are the main challenges and future directions in this novel and still under-explored context. We believe this work provides a novel contribution respect to the previous surveys and is a valuable tool to explore the current landscape, understand perspectives, and pave the way for advancements or improvements in this amalgamation of Blockchain and Federated Learning.
△ Less
Submitted 7 January, 2024;
originally announced January 2024.
-
NLP-Based Techniques for Cyber Threat Intelligence
Authors:
Marco Arazzi,
Dincy R. Arikkat,
Serena Nicolazzo,
Antonino Nocera,
Rafidha Rehiman K. A.,
Vinod P.,
Mauro Conti
Abstract:
In the digital era, threat actors employ sophisticated techniques for which, often, digital traces in the form of textual data are available. Cyber Threat Intelligence~(CTI) is related to all the solutions inherent to data collection, processing, and analysis useful to understand a threat actor's targets and attack behavior. Currently, CTI is assuming an always more crucial role in identifying and…
▽ More
In the digital era, threat actors employ sophisticated techniques for which, often, digital traces in the form of textual data are available. Cyber Threat Intelligence~(CTI) is related to all the solutions inherent to data collection, processing, and analysis useful to understand a threat actor's targets and attack behavior. Currently, CTI is assuming an always more crucial role in identifying and mitigating threats and enabling proactive defense strategies. In this context, NLP, an artificial intelligence branch, has emerged as a powerful tool for enhancing threat intelligence capabilities. This survey paper provides a comprehensive overview of NLP-based techniques applied in the context of threat intelligence. It begins by describing the foundational definitions and principles of CTI as a major tool for safeguarding digital assets. It then undertakes a thorough examination of NLP-based techniques for CTI data crawling from Web sources, CTI data analysis, Relation Extraction from cybersecurity data, CTI sharing and collaboration, and security threats of CTI. Finally, the challenges and limitations of NLP in threat intelligence are exhaustively examined, including data quality issues and ethical considerations. This survey draws a complete framework and serves as a valuable resource for security professionals and researchers seeking to understand the state-of-the-art NLP-based threat intelligence techniques and their potential impact on cybersecurity.
△ Less
Submitted 15 November, 2023;
originally announced November 2023.
-
Quantum error mitigation in quantum annealing
Authors:
Mohammad H. Amin,
Andrew D. King,
Jack Raymond,
Richard Harris,
William Bernoudy,
Andrew J. Berkley,
Kelly Boothby,
Anatoly Smirnov,
Fabio Altomare,
Michael Babcock,
Catia Baron,
Jake Connor,
Martin Dehn,
Colin Enderud,
Emile Hoskinson,
Shuiyuan Huang,
Mark W. Johnson,
Eric Ladizinsky,
Trevor Lanting,
Allison J. R. MacDonald,
Gaelen Marsden,
Reza Molavi,
Travis Oh,
Gabriel Poulin-Lamarre,
Hugh Ramp
, et al. (10 additional authors not shown)
Abstract:
Quantum Error Mitigation (QEM) presents a promising near-term approach to reduce error when estimating expectation values in quantum computing. Here, we introduce QEM techniques tailored for quantum annealing, using Zero-Noise Extrapolation (ZNE). We implement ZNE through zero-temperature extrapolation as well as energy-time rescaling. We conduct experimental investigations into the quantum critic…
▽ More
Quantum Error Mitigation (QEM) presents a promising near-term approach to reduce error when estimating expectation values in quantum computing. Here, we introduce QEM techniques tailored for quantum annealing, using Zero-Noise Extrapolation (ZNE). We implement ZNE through zero-temperature extrapolation as well as energy-time rescaling. We conduct experimental investigations into the quantum critical dynamics of a transverse-field Ising spin chain, demonstrating the successful mitigation of thermal noise through both of these techniques. Moreover, we show that energy-time rescaling effectively mitigates control errors in the coherent regime where the effect of thermal noise is minimal. Our ZNE results agree with exact calculations of the coherent evolution over a range of annealing times that exceeds the coherent annealing range by almost an order of magnitude.
△ Less
Submitted 2 November, 2023;
originally announced November 2023.
-
Causal effects of the Fed's large-scale asset purchases on firms' capital structure
Authors:
Andrea Nocera,
M. Hashem Pesaran
Abstract:
We investigate the short- and long-term impacts of the Federal Reserve's large-scale asset purchases (LSAPs) on non-financial firms' capital structure using a threshold panel ARDL model. To isolate the effects of LSAPs from other macroeconomic conditions, we interact firm- and industry-specific indicators of debt capacity with measures of LSAPs. We find that LSAPs facilitated firms' access to exte…
▽ More
We investigate the short- and long-term impacts of the Federal Reserve's large-scale asset purchases (LSAPs) on non-financial firms' capital structure using a threshold panel ARDL model. To isolate the effects of LSAPs from other macroeconomic conditions, we interact firm- and industry-specific indicators of debt capacity with measures of LSAPs. We find that LSAPs facilitated firms' access to external financing, with both Treasury and MBS purchases having positive effects. Our model also allows us to estimate the time profile of the effects of LSAPs on firm leverage providing robust evidence that they are long-lasting. These effects have a half-life of 4-5 quarters and a mean lag length of about six quarters. Nevertheless, the magnitudes are small, suggesting that LSAPs have contributed only marginally to the rise in U.S. corporate debt ratios of the past decade.
△ Less
Submitted 28 October, 2023;
originally announced October 2023.
-
A Novel IoT Trust Model Leveraging Fully Distributed Behavioral Fingerprinting and Secure Delegation
Authors:
Marco Arazzi,
Serena Nicolazzo,
Antonino Nocera
Abstract:
With the number of connected smart devices expected to constantly grow in the next years, Internet of Things (IoT) solutions are experimenting a booming demand to make data collection and processing easier. The ability of IoT appliances to provide pervasive and better support to everyday tasks, in most cases transparently to humans, is also achieved through the high degree of autonomy of such devi…
▽ More
With the number of connected smart devices expected to constantly grow in the next years, Internet of Things (IoT) solutions are experimenting a booming demand to make data collection and processing easier. The ability of IoT appliances to provide pervasive and better support to everyday tasks, in most cases transparently to humans, is also achieved through the high degree of autonomy of such devices. However, the higher the number of new capabilities and services provided in an autonomous way, the wider the attack surface that exposes users to data hacking and lost. In this scenario, many critical challenges arise also because IoT devices have heterogeneous computational capabilities (i.e., in the same network there might be simple sensors/actuators as well as more complex and smart nodes). In this paper, we try to provide a contribution in this setting, tackling the non-trivial issues of equipping smart things with a strategy to evaluate, also through their neighbors, the trustworthiness of an object in the network before interacting with it. To do so, we design a novel and fully distributed trust model exploiting devices' behavioral fingerprints, a distributed consensus mechanism and the Blockchain technology. Beyond the detailed description of our framework, we also illustrate the security model associated with it and the tests carried out to evaluate its correctness and performance.
△ Less
Submitted 2 October, 2023;
originally announced October 2023.
-
Label Inference Attacks against Node-level Vertical Federated GNNs
Authors:
Marco Arazzi,
Mauro Conti,
Stefanos Koffas,
Marina Krcek,
Antonino Nocera,
Stjepan Picek,
Jing Xu
Abstract:
Federated learning enables collaborative training of machine learning models by keeping the raw data of the involved workers private. Three of its main objectives are to improve the models' privacy, security, and scalability. Vertical Federated Learning (VFL) offers an efficient cross-silo setting where a few parties collaboratively train a model without sharing the same features. In such a scenar…
▽ More
Federated learning enables collaborative training of machine learning models by keeping the raw data of the involved workers private. Three of its main objectives are to improve the models' privacy, security, and scalability. Vertical Federated Learning (VFL) offers an efficient cross-silo setting where a few parties collaboratively train a model without sharing the same features. In such a scenario, classification labels are commonly considered sensitive information held exclusively by one (active) party, while other (passive) parties use only their local information. Recent works have uncovered important flaws of VFL, leading to possible label inference attacks under the assumption that the attacker has some, even limited, background knowledge on the relation between labels and data. In this work, we are the first (to the best of our knowledge) to investigate label inference attacks on VFL using a zero-background knowledge strategy. To formulate our proposal, we focus on Graph Neural Networks (GNNs) as a target model for the underlying VFL. In particular, we refer to node classification tasks, which are widely studied, and GNNs have shown promising results. Our proposed attack, BlindSage, provides impressive results in the experiments, achieving nearly 100% accuracy in most cases. Even when the attacker has no information about the used architecture or the number of classes, the accuracy remains above 90% in most instances. Finally, we observe that well-known defenses cannot mitigate our attack without affecting the model's performance on the main classification task.
△ Less
Submitted 18 April, 2024; v1 submitted 4 August, 2023;
originally announced August 2023.
-
Predicting Tweet Engagement with Graph Neural Networks
Authors:
Marco Arazzi,
Marco Cotogni,
Antonino Nocera,
Luca Virgili
Abstract:
Social Networks represent one of the most important online sources to share content across a world-scale audience. In this context, predicting whether a post will have any impact in terms of engagement is of crucial importance to drive the profitable exploitation of these media. In the literature, several studies address this issue by leveraging direct features of the posts, typically related to t…
▽ More
Social Networks represent one of the most important online sources to share content across a world-scale audience. In this context, predicting whether a post will have any impact in terms of engagement is of crucial importance to drive the profitable exploitation of these media. In the literature, several studies address this issue by leveraging direct features of the posts, typically related to the textual content and the user publishing it. In this paper, we argue that the rise of engagement is also related to another key component, which is the semantic connection among posts published by users in social media. Hence, we propose TweetGage, a Graph Neural Network solution to predict the user engagement based on a novel graph-based model that represents the relationships among posts. To validate our proposal, we focus on the Twitter platform and perform a thorough experimental campaign providing evidence of its quality.
△ Less
Submitted 17 May, 2023;
originally announced May 2023.
-
Turning Privacy-preserving Mechanisms against Federated Learning
Authors:
Marco Arazzi,
Mauro Conti,
Antonino Nocera,
Stjepan Picek
Abstract:
Recently, researchers have successfully employed Graph Neural Networks (GNNs) to build enhanced recommender systems due to their capability to learn patterns from the interaction between involved entities. In addition, previous studies have investigated federated learning as the main solution to enable a native privacy-preserving mechanism for the construction of global GNN models without collecti…
▽ More
Recently, researchers have successfully employed Graph Neural Networks (GNNs) to build enhanced recommender systems due to their capability to learn patterns from the interaction between involved entities. In addition, previous studies have investigated federated learning as the main solution to enable a native privacy-preserving mechanism for the construction of global GNN models without collecting sensitive data into a single computation unit. Still, privacy issues may arise as the analysis of local model updates produced by the federated clients can return information related to sensitive local data. For this reason, experts proposed solutions that combine federated learning with Differential Privacy strategies and community-driven approaches, which involve combining data from neighbor clients to make the individual local updates less dependent on local sensitive data. In this paper, we identify a crucial security flaw in such a configuration, and we design an attack capable of deceiving state-of-the-art defenses for federated learning. The proposed attack includes two operating modes, the first one focusing on convergence inhibition (Adversarial Mode), and the second one aiming at building a deceptive rating injection on the global federated model (Backdoor Mode). The experimental results show the effectiveness of our attack in both its modes, returning on average 60% performance detriment in all the tests on Adversarial Mode and fully effective backdoors in 93% of cases for the tests performed on Backdoor Mode.
△ Less
Submitted 9 May, 2023;
originally announced May 2023.
-
Auger spectroscopy beyond the ultra-short core-hole relaxation time approximation
Authors:
Alberto Nocera,
Adrian Feiguin
Abstract:
We present a time-dependent computational approach to study Auger electron spectroscopy (AES) beyond the ultra-short core-hole relaxation time approximation and, as a test case, we apply it to the paradigmatic example of a one-dimensional Mott insulator represented by a half-filled Hubbard chain. The Auger spectrum is usually calculated by assuming that, after the creation of a core-hole, the syst…
▽ More
We present a time-dependent computational approach to study Auger electron spectroscopy (AES) beyond the ultra-short core-hole relaxation time approximation and, as a test case, we apply it to the paradigmatic example of a one-dimensional Mott insulator represented by a half-filled Hubbard chain. The Auger spectrum is usually calculated by assuming that, after the creation of a core-hole, the system thermalizes almost instantaneously. This leads to a relatively simple analytical expression that uses the ground-state with a core-hole as a reference state and ignores all the transient dynamics related to the screening of the core-hole. In this picture, the response of the system can be associated to the pair spectral function. On the other hand, in our numerical calculations, the core hole is created by a light pulse, allowing one to study the transient dynamics of the system in terms of the pulse duration and in the non-perturbative regime. Time-dependent density matrix renormalization group calculations reveal that the relaxation process involves the creation of a polarization cloud of doublon excitations that have an effect similar to photo-doping. As a consequence, there is a leak of spectral weight to higher energies into what otherwise would be the Mott gap. For longer pulses, these excited states, mostly comprised of doublons, can dominate the spectrum. By changing the duration of the light-pulse, the entire screening process can be resolved in time.
△ Less
Submitted 28 April, 2023;
originally announced April 2023.
-
Transition to the Haldane phase driven by electron-electron correlations
Authors:
A. Jażdżewska,
M. Mierzejewski,
M. Środa,
A. Nocera,
G. Alvarez,
E. Dagotto,
J. Herbrych
Abstract:
One of the most famous quantum systems with topological properties, the spin $\mathcal{S}=1$ antiferromagnetic Heisenberg chain, is well-known to display exotic $\mathcal{S}=1/2$ edge states. However, this spin model has not been analyzed from the more general perspective of strongly correlated systems varying the electron-electron interaction strength. Here, we report the investigation of the eme…
▽ More
One of the most famous quantum systems with topological properties, the spin $\mathcal{S}=1$ antiferromagnetic Heisenberg chain, is well-known to display exotic $\mathcal{S}=1/2$ edge states. However, this spin model has not been analyzed from the more general perspective of strongly correlated systems varying the electron-electron interaction strength. Here, we report the investigation of the emergence of the Haldane edge in a system of interacting electrons -- the two-orbital Hubbard model -- with increasing repulsion strength $U$ and Hund interaction $J_\mathrm{H}$. We show that interactions not only form the magnetic moments but also form a topologically nontrivial fermionic many-body ground-state with zero-energy edge states. Specifically, upon increasing the strength of the Hubbard repulsion and Hund exchange, we identify a sharp transition point separating topologically trivial and nontrivial ground-states. Surprisingly, such a behaviour appears already at rather small values of the interaction, in a regime where the magnetic moments are barely developed.
△ Less
Submitted 22 December, 2023; v1 submitted 21 April, 2023;
originally announced April 2023.
-
Ground state and spectral properties of the doped one-dimensional optical Hubbard-Su-Schrieffer-Heeger model
Authors:
Debshikha Banerjee,
Jinu Thomas,
Alberto Nocera,
Steven Johnston
Abstract:
We present a density matrix renormalization group (DMRG) study of the doped one-dimensional (1D) Hubbard-Su-Schrieffer-Hegger (Hubbard-SSH) model, where the atomic displacements linearly modulate the nearest-neighbor hopping integrals. Focusing on an optical variant of the model in the strongly correlated limit relevant for cuprate spin chains, we examine how the SSH interaction modifies the model…
▽ More
We present a density matrix renormalization group (DMRG) study of the doped one-dimensional (1D) Hubbard-Su-Schrieffer-Hegger (Hubbard-SSH) model, where the atomic displacements linearly modulate the nearest-neighbor hopping integrals. Focusing on an optical variant of the model in the strongly correlated limit relevant for cuprate spin chains, we examine how the SSH interaction modifies the model's ground and excited state properties. The SSH coupling weakly renormalizes the model's single- and two-particle response functions for electron-phonon ($e$-ph) coupling strengths below a parameter-dependent critical value $g_\mathrm{c}$. For larger $e$-ph coupling, the sign of the effective hopping integrals changes for a subset of orbitals, which drives a lattice dimerization distinct from the standard nesting-driven picture in 1D. The spectral weight of the one- and two-particle dynamical response functions are dramatically rearranged across this transition, with significant changes in the ground state correlations. We argue that this dimerization results from the breakdown of the linear approximation for the $e$-ph coupling and thus signals a fundamental limitation of the linear SSH interaction. Our results have consequences for our understanding of how SSH-like interactions can enter the physics of strongly correlated quantum materials, including the recently synthesized doped cuprate spin chains.
△ Less
Submitted 17 March, 2023;
originally announced March 2023.
-
Electron addition spectral functions of low-density polaron liquids
Authors:
Alberto Nocera,
Mona Berciu
Abstract:
Spectral functions are important quantities that contain a wealth of information about the quasiparticles of a system, and that can also be measured experimentally. For systems with electron-phonon coupling, good approximations for the spectral function are available only in the Migdal limit (at Fermi energies much larger than the typical phonon frequency, $E_F\gg Ω$, requiring a large carrier con…
▽ More
Spectral functions are important quantities that contain a wealth of information about the quasiparticles of a system, and that can also be measured experimentally. For systems with electron-phonon coupling, good approximations for the spectral function are available only in the Migdal limit (at Fermi energies much larger than the typical phonon frequency, $E_F\gg Ω$, requiring a large carrier concentration $x$) and in the single polaron limit (at $x=0$). Here we show that the region with $x\ll 1$ ($E_F <Ω$) can also be reliably investigated with the Momentum Average (MA) variational approximation, which essentially describes the formation of a polaron above an inert Fermi sea. Specifically, we show that for the one-dimensional spinless Holstein model, the MA spectral functions compare favorably with those calculated using variationally exact density matrix renormalization group simulations (DMRG) evaluated directly in frequency-space, so long as $x<0.1$ and the adiabaticity ratio $Ω/t>0.5$. Unlike in the Migdal limit, here 'polaronic physics' emerges already at moderate couplings. The relevance of these results for a spinful low-$x$ metal is also discussed.
△ Less
Submitted 31 March, 2023; v1 submitted 8 March, 2023;
originally announced March 2023.
-
Nonsymmorphic spin-space cubic groups and SU(2)$_1$ conformal invariance in one-dimensional spin-1/2 models
Authors:
Wang Yang,
Alberto Nocera,
Chao Xu,
Ian Affleck
Abstract:
Recently, extended gapless phases with emergent SU(2)$_1$ conformal invariance occupying finite regions in the phase diagrams have been found in one-dimensional spin-1/2 models with nonsymmorphic $O_h$ symmetry groups. In this work, we investigate the question of whether the conditions for emergent SU(2)$_1$ invariance can be loosened. We find that besides the nonsymmorphic $O_h$ group, the other…
▽ More
Recently, extended gapless phases with emergent SU(2)$_1$ conformal invariance occupying finite regions in the phase diagrams have been found in one-dimensional spin-1/2 models with nonsymmorphic $O_h$ symmetry groups. In this work, we investigate the question of whether the conditions for emergent SU(2)$_1$ invariance can be loosened. We find that besides the nonsymmorphic $O_h$ group, the other four smaller nonsymmorphic cubic groups including $O$, $T_h$, $T_d$ and $T$ can also give rise to emergent SU(2)$_1$ invariance. Minimal spin-1/2 models having these nonsymmorphic cubic groups as symmetry groups are constructed, and numerical evidences for the emergent SU(2)$_1$ invariance are provided. Our work is useful for understanding gapless phases in one-dimensional spin systems with nonsymmorphic symmetries.
△ Less
Submitted 3 October, 2024; v1 submitted 23 August, 2022;
originally announced August 2022.
-
Qubit-oscillator relationships in the open quantum Rabi model: the role of dissipation
Authors:
G. Di Bello,
L. M. Cangemi,
V. Cataudella,
G. De Filippis,
A. Nocera,
C. A. Perroni
Abstract:
Using a dissipative quantum Rabi model, we study the dynamics of a slow qubit coupled to a fast quantum harmonic oscillator interacting with a bosonic bath from weak to strong and ultra-strong coupling regimes. Solving the quantum Heisenberg equations of motion, perturbative in the internal coupling between qubit and oscillator, we derive functional relationships directly linking the qubit coordin…
▽ More
Using a dissipative quantum Rabi model, we study the dynamics of a slow qubit coupled to a fast quantum harmonic oscillator interacting with a bosonic bath from weak to strong and ultra-strong coupling regimes. Solving the quantum Heisenberg equations of motion, perturbative in the internal coupling between qubit and oscillator, we derive functional relationships directly linking the qubit coordinates in the Bloch sphere to oscillator observables. We then perform accurate time-dependent Matrix Product State simulations, and compare our results both with the analytical solutions of the Heisenberg equations of motion, and with numerical solutions of a Lindblad master equation, perturbative in the external coupling between oscillator and environment. Indeed, we show that, up to the strong coupling regime, the qubit state accurately fulfills the derived functional relationships. We analyse in detail the case of a qubit starting with generic coordinates on the Bloch sphere of which we evaluate the three components of the Bloch vector through the averages of oscillator observables. Interestingly, a weak to intermediate oscillator coupling to the bath is able to simplify the Bloch vector evaluation since qubit-oscillator relationships are more immediate. Moreover, by monitoring the qubit fidelity with respect to free limit, we find the parameter regime where the combined effect of internal and external couplings is able to hinder the reliable evaluation of the qubit Bloch vector. Finally, in the ultra-strong coupling regime, non-Markovian effects become robust and the dynamics of qubit and oscillator are inextricably entangled making the qubit Bloch vector evaluation difficult.
△ Less
Submitted 23 January, 2023; v1 submitted 1 August, 2022;
originally announced August 2022.
-
Counter-rotating spiral, zigzag, and 120$^\circ$ orders from coupled-chain analysis of Kitaev-Gamma-Heisenberg model, and relations to honeycomb iridates
Authors:
Wang Yang,
Alberto Nocera,
Chao Xu,
Hae-Young Kee,
Ian Affleck
Abstract:
We study the nearest neighboring spin-1/2 Kitaev-Heisenberg-Gamma ($KJΓ$) model on the honeycomb lattice in the parameter region of ferromagnetic (FM) Kitaev and antiferromagnetic (AFM) Heisenberg couplings relevant for honeycomb iridates, using a coupled-chain analysis. Starting from the gapless Luttinger liquid phase of a decoupled $KJΓ$ chain, the inter-chain interactions in the two-dimensional…
▽ More
We study the nearest neighboring spin-1/2 Kitaev-Heisenberg-Gamma ($KJΓ$) model on the honeycomb lattice in the parameter region of ferromagnetic (FM) Kitaev and antiferromagnetic (AFM) Heisenberg couplings relevant for honeycomb iridates, using a coupled-chain analysis. Starting from the gapless Luttinger liquid phase of a decoupled $KJΓ$ chain, the inter-chain interactions in the two-dimensional model is treated within a self-consistent mean field approach based on the Luttinger liquid theory. In the FM Gamma region, our analysis recovers the reported 120$^\circ$ magnetic order, previously obtained by classical analysis and exact diagonalization method. On the other hand, new physics is revealed in the AFM Gamma region, where three magnetic orders are found, including 120$^\circ$, commensurate counter-rotating spiral, and zigzag orders. Interestingly, the two first order phase transition lines separating these three magnetic orders merge at a single point at $K = -2 Γ$ and $J=0$, which is predicted to be a quantum critical point. The current theory captures the experimentally observed counter-rotating spiral order in $α$-Li$_22$IrO$_3$ and the zigzag order in Na$_2$IrO$_3$, thereby indicating that the spin-1/2 $KJΓ$ model may serve as a minimal model for honeycomb iridates. Limitations of the mean field theory presented in this work and the $J \rightarrow 0$ regime are also discussed.
△ Less
Submitted 5 July, 2022;
originally announced July 2022.
-
Signatures of Dissipation Driven Quantum Phase Transition in Rabi Model
Authors:
G. De Filippis,
A. de Candia,
G. Di Bello,
C. A. Perroni,
L. M. Cangemi,
A. Nocera,
M. Sassetti,
R. Fazio,
V. Cataudella
Abstract:
By using worldline Monte Carlo technique, matrix product state and a variational approach à la Feynman, we investigate the equilibrium properties and relaxation features of the dissipative quantum Rabi model, where a two level system is coupled to a linear harmonic oscillator embedded in a viscous fluid. We show that, in the Ohmic regime, a Beretzinski-Kosterlitz-Thouless quantum phase transition…
▽ More
By using worldline Monte Carlo technique, matrix product state and a variational approach à la Feynman, we investigate the equilibrium properties and relaxation features of the dissipative quantum Rabi model, where a two level system is coupled to a linear harmonic oscillator embedded in a viscous fluid. We show that, in the Ohmic regime, a Beretzinski-Kosterlitz-Thouless quantum phase transition occurs by varying the coupling strength between the two level system and the oscillator. This is a non perturbative result, occurring even for extremely low dissipation magnitude. By using state-of-the-art theoretical methods, we unveil the features of the relaxation towards the thermodynamic equilibrium, pointing out the signatures of quantum phase transition both in the time and frequency domains. We prove that, for low and moderate values of the dissipation, the quantum phase transition occurs in the deep strong coupling regime. We propose to realize this model by coupling a flux qubit and a damped LC oscillator.
△ Less
Submitted 16 April, 2023; v1 submitted 23 May, 2022;
originally announced May 2022.
-
Emergent SU(2)$_1$ conformal symmetry in the spin-1/2 Kitaev-Gamma chain with a Dzyaloshinskii-Moriya interaction
Authors:
Wang Yang,
Alberto Nocera,
Chao Xu,
Arnab Adhikary,
Ian Affleck
Abstract:
We study the one-dimensional spin-1/2 Kitaev-Gamma model with a bond-dependent Dzyaloshinskii-Moriya (DM) interaction, which can be induced by an electric field applied in the third direction where the first and second directions refer to the two bond directions in the model. By a combination of field theory and symmetry analysis, an extended gapless phase with an emergent SU(2)$_1$ conformal symm…
▽ More
We study the one-dimensional spin-1/2 Kitaev-Gamma model with a bond-dependent Dzyaloshinskii-Moriya (DM) interaction, which can be induced by an electric field applied in the third direction where the first and second directions refer to the two bond directions in the model. By a combination of field theory and symmetry analysis, an extended gapless phase with an emergent SU(2)$_1$ conformal symmetry is found in the phase diagram of the spin-1/2 Kitaev-Gamma-DM chain. The analytic predictions are in good agreements with numerical results obtained from density matrix renormalization group simulations.
△ Less
Submitted 13 May, 2025; v1 submitted 28 April, 2022;
originally announced April 2022.
-
Origin of nonsymmorphic bosonization formulas in generalized antiferromagnetic Kitaev spin-$\frac{1}{2}$ chains from a renormalization-group perspective
Authors:
Wang Yang,
Chao Xu,
Alberto Nocera,
Ian Affleck
Abstract:
Recently, in the Luttinger liquid phase of the one-dimensional generalized antiferromagnetic Kitaev spin-1/2 model, it has been found that the abelian bosonization formulas of the local spin operators only respect the exact discrete nonsymmorphic symmetry group of the model, not the emergent U(1) symmetry. In this work, we perform a renormalization group (RG) study to provide explanations for the…
▽ More
Recently, in the Luttinger liquid phase of the one-dimensional generalized antiferromagnetic Kitaev spin-1/2 model, it has been found that the abelian bosonization formulas of the local spin operators only respect the exact discrete nonsymmorphic symmetry group of the model, not the emergent U(1) symmetry. In this work, we perform a renormalization group (RG) study to provide explanations for the origin of the U(1) breaking terms in the bosonization formulas. We find that the lack of U(1) symmetry originates from the wavefunction renormalization effects in the spin operators along the RG flow induced by the U(1) breaking interactions in the microscopic Hamiltonian. In addition, the RG analysis can give predictions to the signs and order of magnitudes of the coefficients in the bosonization formulas. Our work is helpful to understand the rich nonsymmorphic physics in one-dimensional Kitaev spin models.
△ Less
Submitted 22 August, 2022; v1 submitted 11 April, 2022;
originally announced April 2022.
-
Root-N Krylov-space correction-vectors for spectral functions with the density matrix renormalization group
Authors:
Alberto Nocera,
Gonzalo Alvarez
Abstract:
We propose a method to compute spectral functions of generic Hamiltonians using the density matrix renormalization group (DMRG) algorithm directly in the frequency domain, based on a modified Krylov space decomposition to compute the correction-vectors. Our approach entails the calculation of the root-N (N=2 is the standard square root) of the Hamiltonian propagator using Krylov space decompositio…
▽ More
We propose a method to compute spectral functions of generic Hamiltonians using the density matrix renormalization group (DMRG) algorithm directly in the frequency domain, based on a modified Krylov space decomposition to compute the correction-vectors. Our approach entails the calculation of the root-N (N=2 is the standard square root) of the Hamiltonian propagator using Krylov space decomposition, and repeating this procedure N times to obtain the actual correction-vector. We show that our method greatly alleviates the burden of keeping a large bond dimension at large target frequencies, a problem found with conventional correction-vector DMRG, while achieving better computational performance at large N. We apply our method to spin and charge spectral functions of t-J and Hubbard models in the challenging two-leg ladder geometry, and provide evidence that the root-N approach reaches a much improved resolution compared to conventional correction-vector.
△ Less
Submitted 6 April, 2022;
originally announced April 2022.
-
Nonsymmorphic bosonization in one-dimensional generalized Kitaev spin-1/2 models
Authors:
Wang Yang,
Chao Xu,
Shenglong Xu,
Alberto Nocera,
Ian Affleck
Abstract:
In this work, we perform a detailed study on the consequences of nonsymmorphic symmetries in the Luttinger phase of the one-dimensional spin-1/2 Kitaev-Heisenberg-Gamma model with an antiferromagnetic Kitaev interaction. Nonsymmorphic bosonization formulas for the spin operators are proposed, containing ten non-universal coefficients which are determined by our density matrix renormalization group…
▽ More
In this work, we perform a detailed study on the consequences of nonsymmorphic symmetries in the Luttinger phase of the one-dimensional spin-1/2 Kitaev-Heisenberg-Gamma model with an antiferromagnetic Kitaev interaction. Nonsymmorphic bosonization formulas for the spin operators are proposed, containing ten non-universal coefficients which are determined by our density matrix renormalization group simulations to a high degree of accuracy. Using the nonsymmorphic bosonization formulas, different Fourier components and decay powers in the correlation functions are disentangled, the response to weak magnetic fields is analyzed, and the zigzag magnetic order in two dimensions is recovered from a system of weakly coupled chains. We also find a line of critical points with an emergent SU(2)$_1$ conformal symmetry located on the boundary of the Luttinger liquid phase, where a nonabelian version of nonsymmorphic bosonization should be applied.
△ Less
Submitted 24 January, 2024; v1 submitted 23 February, 2022;
originally announced February 2022.
-
Crossover of the high-energy spin fluctuations from collective triplons to localized magnetic excitations in doped Sr14-xCaxCu24O41 cuprate ladders
Authors:
Y. Tseng,
J. Thomas,
W. Zhang,
E. Paris,
P. Puphal,
R. Bag,
G. Deng,
T. C. Asmara,
V. N. Strocov,
S. Singh,
E. Pomjakushina,
U. Kumar,
A. Nocera,
H. M. Rønnow,
S. Johnston,
T. Schmitt
Abstract:
We studied the magnetic excitations in the quasi-one-dimensional (q-1D) ladder subsystem of Sr_(14-x) Ca_x Cu_24 O_41(SCCO) using Cu L_3-edge resonant inelastic X-ray scattering (RIXS). By comparing momentum-resolved RIXS spectra with (x=12.2) and without (x=0) high Ca content, we track the evolution of the magnetic excitations from collective two-triplon (2T) excitations (x=0) to weakly-dispersiv…
▽ More
We studied the magnetic excitations in the quasi-one-dimensional (q-1D) ladder subsystem of Sr_(14-x) Ca_x Cu_24 O_41(SCCO) using Cu L_3-edge resonant inelastic X-ray scattering (RIXS). By comparing momentum-resolved RIXS spectra with (x=12.2) and without (x=0) high Ca content, we track the evolution of the magnetic excitations from collective two-triplon (2T) excitations (x=0) to weakly-dispersive gapped modes at an energy of 280 meV (x=12.2). Density matrix renormalization group (DMRG) calculations of the RIXS response in the doped ladders suggest that the flat magnetic dispersion and damped excitation profile observed at x=12.2 originates from enhanced hole localization. This interpretation is supported by polarization-dependent RIXS measurements, where we disentangle the spin-conserving ΔS=0 scattering from the predominant ΔS=1 spin-flip signal in the RIXS spectra. The results show that the low-energy weight in the ΔS=0 channel is depleted when Sr is replaced by Ca, consistent with a reduced carrier mobility. Our results demonstrate that off-ladder impurities can affect both the low-energy magnetic excitations and superconducting correlations in the CuO_4 plaquettes. Finally, our study characterizes the magnetic and charge fluctuations in the phase from which superconductivity emerges in SCCO at elevated pressures.
△ Less
Submitted 13 January, 2022;
originally announced January 2022.
-
Symmetry analysis of bond-alternating Kitaev spin chains and ladders
Authors:
Wang Yang,
Alberto Nocera,
Paul Herringer,
Robert Raussendorf,
Ian Affleck
Abstract:
In this work, we analyze the nonsymmorphic symmetry group structures for a variety of generalized Kitaev spin chains and ladders with bond alternations, including Kitaev-Gamma chain, Kitaev-Heisenberg-Gamma chain, beyond nearest neighbor interactions, and two-leg spin ladders. The symmetry analysis is applied to determine the symmetry breaking patterns of several magnetically ordered phases in the…
▽ More
In this work, we analyze the nonsymmorphic symmetry group structures for a variety of generalized Kitaev spin chains and ladders with bond alternations, including Kitaev-Gamma chain, Kitaev-Heisenberg-Gamma chain, beyond nearest neighbor interactions, and two-leg spin ladders. The symmetry analysis is applied to determine the symmetry breaking patterns of several magnetically ordered phases in the bond-alternating Kitaev-Gamma spin chains, as well as the dimerization order parameters for spontaneous dimerizations. Our work is useful in understanding the magnetic phases in related models and may provide guidance for the symmetry classifications of mean field solutions in further investigations.
△ Less
Submitted 25 March, 2022; v1 submitted 9 January, 2022;
originally announced January 2022.
-
Quadrupolar magnetic excitations in an isotropic spin-1 antiferromagnet
Authors:
A. Nag,
A. Nocera,
S. Agrestini,
M. Garcia-Fernandez,
A. C. Walters,
Sang-Wook Cheong,
S. Johnston,
Ke-Jin Zhou
Abstract:
The microscopic origins of emergent behaviours in condensed matter systems are encoded in their excitations. In ordinary magnetic materials, single spin-flips give rise to collective dipolar magnetic excitations called magnons. Likewise, multiple spin-flips can give rise to multipolar magnetic excitations in magnetic materials with spin $\mathbf{S} \boldsymbol{\ge} \mathbf{1}$. Unfortunately, sinc…
▽ More
The microscopic origins of emergent behaviours in condensed matter systems are encoded in their excitations. In ordinary magnetic materials, single spin-flips give rise to collective dipolar magnetic excitations called magnons. Likewise, multiple spin-flips can give rise to multipolar magnetic excitations in magnetic materials with spin $\mathbf{S} \boldsymbol{\ge} \mathbf{1}$. Unfortunately, since most experimental probes are governed by dipolar selection rules, collective multipolar excitations have generally remained elusive. For instance, only dipolar magnetic excitations have been observed in isotropic $\mathbf{S}\boldsymbol{=}\mathbf{1}$ Haldane spin systems. Here, we unveil a hidden quadrupolar constituent of the spin dynamics in antiferromagnetic $\mathbf{S}\boldsymbol{=}\mathbf{1}$ Haldane chain material Y$_\mathbf{2}$BaNiO$_\mathbf{5}$ using Ni $\mathbf{L_3}$-edge resonant inelastic x-ray scattering. Our results demonstrate that pure quadrupolar magnetic excitations can be probed without direct interactions with dipolar excitations or anisotropic perturbations. Originating from on-site double spin-flip processes, the quadrupolar magnetic excitations in Y$_\mathbf{2}$BaNiO$_\mathbf{5}$ show a remarkable dual nature of collective dispersion. While one component propagates as non-interacting entities, the other behaves as a bound quadrupolar magnetic wave. This result highlights the rich and largely unexplored physics of higher-order magnetic excitations.
△ Less
Submitted 5 November, 2021;
originally announced November 2021.
-
Particle-hole asymmetry in the dynamical spin and charge structure factors of the corner-shared one-dimensional cuprates
Authors:
Shaozhi Li,
Alberto Nocera,
Umesh Kumar,
Steven Johnston
Abstract:
The collective spin and charge excitations of doped cuprates and their relationship to superconductivity are not yet fully understood, particularly in the case of the charge excitations. Here, we study the doping-dependent dynamical spin and charge structure factors of single and multi-orbital models for the one-dimensional corner shared spin-chain cuprates using several numerically exact methods.…
▽ More
The collective spin and charge excitations of doped cuprates and their relationship to superconductivity are not yet fully understood, particularly in the case of the charge excitations. Here, we study the doping-dependent dynamical spin and charge structure factors of single and multi-orbital models for the one-dimensional corner shared spin-chain cuprates using several numerically exact methods. We find that the singleband Hubbard model can describe the spin and charge excitations of the $pd$-model in the low-energy region, including the particle-hole asymmetry in the spin response. However, our results also reveal that the weight of the interorbital spin excitations between Cu and O orbitals is comparable to the weight of the spin excitations between two Cu orbitals. This finding elucidates the microscopic nature of the spin excitations in the 1D cuprates and sheds light on the spin properties of other oxides. Importantly, we find a particle-hole asymmetry in the orbital-resolved charge excitations, which cannot be described by the singleband Hubbard model and is relevant to resonant inelastic x-ray scattering experiments. Our results imply that the explicit inclusion of the oxygen degrees of freedom may be required to understand experimental observations.
△ Less
Submitted 7 June, 2021;
originally announced June 2021.
-
Quantum Phase Transition of Many Interacting Spins Coupled to a Bosonic Bath: static and dynamical properties
Authors:
G. De Filippis,
A. de Candia,
A. S. Mishchenko,
L. M. Cangemi,
A. Nocera,
P. A. Mishchenko,
M. Sassetti,
R. Fazio,
N. Nagaosa,
V. Cataudella
Abstract:
By using worldline and diagrammatic quantum Monte Carlo techniques, matrix product state and a variational approach à la Feynman, we investigate the equilibrium properties and relaxation features of a quantum system of $N$ spins antiferromagnetically interacting with each other, with strength $J$, and coupled to a common bath of bosonic oscillators, with strength $α$. We show that, in the Ohmic re…
▽ More
By using worldline and diagrammatic quantum Monte Carlo techniques, matrix product state and a variational approach à la Feynman, we investigate the equilibrium properties and relaxation features of a quantum system of $N$ spins antiferromagnetically interacting with each other, with strength $J$, and coupled to a common bath of bosonic oscillators, with strength $α$. We show that, in the Ohmic regime, a Beretzinski-Thouless-Kosterlitz quantum phase transition occurs. While for $J=0$ the critical value of $α$ decreases asymptotically with $1/N$ by increasing $N$, for nonvanishing $J$ it turns out to be practically independent on $N$, allowing to identify a finite range of values of $α$ where spin phase coherence is preserved also for large $N$. Then, by using matrix product state simulations, and the Mori formalism and the variational approach à la Feynman jointly, we unveil the features of the relaxation, that, in particular, exhibits a non monotonic dependence on the temperature reminiscent of the Kondo effect. For the observed quantum phase transition we also establish a criterion analogous to that of the metal-insulator transition in solids.
△ Less
Submitted 30 March, 2021;
originally announced March 2021.