-
Roadmap for Photonics with 2D Materials
Authors:
F. Javier García de Abajo,
D. N. Basov,
Frank H. L. Koppens,
Lorenzo Orsini,
Matteo Ceccanti,
Sebastián Castilla,
Lorenzo Cavicchi,
Marco Polini,
P. A. D. Gonçalves,
A. T. Costa,
N. M. R. Peres,
N. Asger Mortensen,
Sathwik Bharadwaj,
Zubin Jacob,
P. J. Schuck,
A. N. Pasupathy,
Milan Delor,
M. K. Liu,
Aitor Mugarza,
Pablo Merino,
Marc G. Cuxart,
Emigdio Chávez-Angel,
Martin Svec,
Luiz H. G. Tizei,
Florian Dirnberger
, et al. (123 additional authors not shown)
Abstract:
Triggered by the development of exfoliation and the identification of a wide range of extraordinary physical properties in self-standing films consisting of one or few atomic layers, two-dimensional (2D) materials such as graphene, transition metal dichalcogenides (TMDs), and other van der Waals (vdW) crystals currently constitute a wide research field protruding in multiple directions in combinat…
▽ More
Triggered by the development of exfoliation and the identification of a wide range of extraordinary physical properties in self-standing films consisting of one or few atomic layers, two-dimensional (2D) materials such as graphene, transition metal dichalcogenides (TMDs), and other van der Waals (vdW) crystals currently constitute a wide research field protruding in multiple directions in combination with layer stacking and twisting, nanofabrication, surface-science methods, and integration into nanostructured environments. Photonics encompasses a multidisciplinary collection of those directions, where 2D materials contribute with polaritons of unique characteristics such as strong spatial confinement, large optical-field enhancement, long lifetimes, high sensitivity to external stimuli (e.g., electric and magnetic fields, heating, and strain), a broad spectral range from the far infrared to the ultraviolet, and hybridization with spin and momentum textures of electronic band structures. The explosion of photonics with 2D materials as a vibrant research area is producing breakthroughs, including the discovery and design of new materials and metasurfaces with unprecedented properties as well as applications in integrated photonics, light emission, optical sensing, and exciting prospects for applications in quantum information, and nanoscale thermal transport. This Roadmap summarizes the state of the art in the field, identifies challenges and opportunities, and discusses future goals and how to meet them through a wide collection of topical sections prepared by leading practitioners.
△ Less
Submitted 14 April, 2025; v1 submitted 6 April, 2025;
originally announced April 2025.
-
Evaluating Compact LLMs for Zero-Shot Iberian Language Tasks on End-User Devices
Authors:
Luís Couto Seller,
Íñigo Sanz Torres,
Adrián Vogel-Fernández,
Carlos González Carballo,
Pedro Miguel Sánchez Sánchez,
Adrián Carruana Martín,
Enrique de Miguel Ambite
Abstract:
Large Language Models have significantly advanced natural language processing, achieving remarkable performance in tasks such as language generation, translation, and reasoning. However, their substantial computational requirements restrict deployment to high-end systems, limiting accessibility on consumer-grade devices. This challenge is especially pronounced for under-resourced languages like th…
▽ More
Large Language Models have significantly advanced natural language processing, achieving remarkable performance in tasks such as language generation, translation, and reasoning. However, their substantial computational requirements restrict deployment to high-end systems, limiting accessibility on consumer-grade devices. This challenge is especially pronounced for under-resourced languages like those spoken in the Iberian Peninsula, where relatively limited linguistic resources and benchmarks hinder effective evaluation. This work presents a comprehensive evaluation of compact state-of-the-art LLMs across several essential NLP tasks tailored for Iberian languages. The results reveal that while some models consistently excel in certain tasks, significant performance gaps remain, particularly for languages such as Basque. These findings highlight the need for further research on balancing model compactness with robust multilingual performance
△ Less
Submitted 28 May, 2025; v1 submitted 4 April, 2025;
originally announced April 2025.
-
Roadmap on Nonlocality in Photonic Materials and Metamaterials
Authors:
Francesco Monticone,
N. Asger Mortensen,
Antonio I. Fernández-Domínguez,
Yu Luo,
Xuezhi Zheng,
Christos Tserkezis,
Jacob B. Khurgin,
Tigran V. Shahbazyan,
André J. Chaves,
Nuno M. R. Peres,
Gino Wegner,
Kurt Busch,
Huatian Hu,
Fabio Della Sala,
Pu Zhang,
Cristian Ciracì,
Javier Aizpurua,
Antton Babaze,
Andrei G. Borisov,
Xue-Wen Chen,
Thomas Christensen,
Wei Yan,
Yi Yang,
Ulrich Hohenester,
Lorenz Huber
, et al. (41 additional authors not shown)
Abstract:
Photonic technologies continue to drive the quest for new optical materials with unprecedented responses. A major frontier in this field is the exploration of nonlocal (spatially dispersive) materials, going beyond the local, wavevector-independent assumption traditionally made in optical material modeling. On one end, the growing interest in plasmonic, polaritonic and quantum materials has reveal…
▽ More
Photonic technologies continue to drive the quest for new optical materials with unprecedented responses. A major frontier in this field is the exploration of nonlocal (spatially dispersive) materials, going beyond the local, wavevector-independent assumption traditionally made in optical material modeling. On one end, the growing interest in plasmonic, polaritonic and quantum materials has revealed naturally occurring nonlocalities, emphasizing the need for more accurate models to predict and design their optical responses. This has major implications also for topological, nonreciprocal, and time-varying systems based on these material platforms. Beyond natural materials, artificially structured materials--metamaterials and metasurfaces--can provide even stronger and engineered nonlocal effects, emerging from long-range interactions or multipolar effects. This is a rapidly expanding area in the field of photonic metamaterials, with open frontiers yet to be explored. In the case of metasurfaces, in particular, nonlocality engineering has become a powerful tool for designing strongly wavevector-dependent responses, enabling enhanced wavefront control, spatial compression, multifunctional devices, and wave-based computing. Furthermore, nonlocality and related concepts play a critical role in defining the ultimate limits of what is possible in optics, photonics, and wave physics. This Roadmap aims to survey the most exciting developments in nonlocal photonic materials, highlight new opportunities and open challenges, and chart new pathways that will drive this emerging field forward--toward new scientific discoveries and technological advancements.
△ Less
Submitted 28 March, 2025; v1 submitted 1 March, 2025;
originally announced March 2025.
-
KPIs 2024 Challenge: Advancing Glomerular Segmentation from Patch- to Slide-Level
Authors:
Ruining Deng,
Tianyuan Yao,
Yucheng Tang,
Junlin Guo,
Siqi Lu,
Juming Xiong,
Lining Yu,
Quan Huu Cap,
Pengzhou Cai,
Libin Lan,
Ze Zhao,
Adrian Galdran,
Amit Kumar,
Gunjan Deotale,
Dev Kumar Das,
Inyoung Paik,
Joonho Lee,
Geongyu Lee,
Yujia Chen,
Wangkai Li,
Zhaoyang Li,
Xuege Hou,
Zeyuan Wu,
Shengjin Wang,
Maximilian Fischer
, et al. (22 additional authors not shown)
Abstract:
Chronic kidney disease (CKD) is a major global health issue, affecting over 10% of the population and causing significant mortality. While kidney biopsy remains the gold standard for CKD diagnosis and treatment, the lack of comprehensive benchmarks for kidney pathology segmentation hinders progress in the field. To address this, we organized the Kidney Pathology Image Segmentation (KPIs) Challenge…
▽ More
Chronic kidney disease (CKD) is a major global health issue, affecting over 10% of the population and causing significant mortality. While kidney biopsy remains the gold standard for CKD diagnosis and treatment, the lack of comprehensive benchmarks for kidney pathology segmentation hinders progress in the field. To address this, we organized the Kidney Pathology Image Segmentation (KPIs) Challenge, introducing a dataset that incorporates preclinical rodent models of CKD with over 10,000 annotated glomeruli from 60+ Periodic Acid Schiff (PAS)-stained whole slide images. The challenge includes two tasks, patch-level segmentation and whole slide image segmentation and detection, evaluated using the Dice Similarity Coefficient (DSC) and F1-score. By encouraging innovative segmentation methods that adapt to diverse CKD models and tissue conditions, the KPIs Challenge aims to advance kidney pathology analysis, establish new benchmarks, and enable precise, large-scale quantification for disease research and diagnosis.
△ Less
Submitted 11 February, 2025;
originally announced February 2025.
-
S-VOTE: Similarity-based Voting for Client Selection in Decentralized Federated Learning
Authors:
Pedro Miguel Sánchez Sánchez,
Enrique Tomás Martínez Beltrán,
Chao Feng,
Gérôme Bovet,
Gregorio Martínez Pérez,
Alberto Huertas Celdrán
Abstract:
Decentralized Federated Learning (DFL) enables collaborative, privacy-preserving model training without relying on a central server. This decentralized approach reduces bottlenecks and eliminates single points of failure, enhancing scalability and resilience. However, DFL also introduces challenges such as suboptimal models with non-IID data distributions, increased communication overhead, and res…
▽ More
Decentralized Federated Learning (DFL) enables collaborative, privacy-preserving model training without relying on a central server. This decentralized approach reduces bottlenecks and eliminates single points of failure, enhancing scalability and resilience. However, DFL also introduces challenges such as suboptimal models with non-IID data distributions, increased communication overhead, and resource usage. Thus, this work proposes S-VOTE, a voting-based client selection mechanism that optimizes resource usage and enhances model performance in federations with non-IID data conditions. S-VOTE considers an adaptive strategy for spontaneous local training that addresses participation imbalance, allowing underutilized clients to contribute without significantly increasing resource costs. Extensive experiments on benchmark datasets demonstrate the S-VOTE effectiveness. More in detail, it achieves lower communication costs by up to 21%, 4-6% faster convergence, and improves local performance by 9-17% compared to baseline methods in some configurations, all while achieving a 14-24% energy consumption reduction. These results highlight the potential of S-VOTE to address DFL challenges in heterogeneous environments.
△ Less
Submitted 31 January, 2025;
originally announced January 2025.
-
Nonflat bands and chiral symmetry in magic-angle twisted bilayer graphene
Authors:
Miguel Sánchez Sánchez,
José González,
Tobias Stauber
Abstract:
In this work, we study an interacting tight-binding model of magic-angle twisted bilayer graphene (MATBG), with a twist angle of $1.05^\circ$. We derive effective theories based on a mean-field normal state at charge neutrality, thereby including the renormalizations coming from integrating out high-energy modes. In these theories, the flat bands display a sizable increase of the bandwidth, sugges…
▽ More
In this work, we study an interacting tight-binding model of magic-angle twisted bilayer graphene (MATBG), with a twist angle of $1.05^\circ$. We derive effective theories based on a mean-field normal state at charge neutrality, thereby including the renormalizations coming from integrating out high-energy modes. In these theories, the flat bands display a sizable increase of the bandwidth, suggesting the renormalization of the magic angle. Additionally, the corresponding wavefunctions flow towards the limit of perfect particle-hole symmetry and sublattice polarization (the 'chiral' limit). We further represent the flat bands in the 'vortex Chern' basis and discuss the implications on the dynamics, regarding the 'flat' and 'chiral' symmetries of MATBG, as manifested in the symmetry-broken states at neutrality.
△ Less
Submitted 26 May, 2025; v1 submitted 15 January, 2025;
originally announced January 2025.
-
ProFe: Communication-Efficient Decentralized Federated Learning via Distillation and Prototypes
Authors:
Pedro Miguel Sánchez Sánchez,
Enrique Tomás Martínez Beltrán,
Miguel Fernández Llamas,
Gérôme Bovet,
Gregorio Martínez Pérez,
Alberto Huertas Celdrán
Abstract:
Decentralized Federated Learning (DFL) trains models in a collaborative and privacy-preserving manner while removing model centralization risks and improving communication bottlenecks. However, DFL faces challenges in efficient communication management and model aggregation within decentralized environments, especially with heterogeneous data distributions. Thus, this paper introduces ProFe, a nov…
▽ More
Decentralized Federated Learning (DFL) trains models in a collaborative and privacy-preserving manner while removing model centralization risks and improving communication bottlenecks. However, DFL faces challenges in efficient communication management and model aggregation within decentralized environments, especially with heterogeneous data distributions. Thus, this paper introduces ProFe, a novel communication optimization algorithm for DFL that combines knowledge distillation, prototype learning, and quantization techniques. ProFe utilizes knowledge from large local models to train smaller ones for aggregation, incorporates prototypes to better learn unseen classes, and applies quantization to reduce data transmitted during communication rounds. The performance of ProFe has been validated and compared to the literature by using benchmark datasets like MNIST, CIFAR10, and CIFAR100. Results showed that the proposed algorithm reduces communication costs by up to ~40-50% while maintaining or improving model performance. In addition, it adds ~20% training time due to increased complexity, generating a trade-off.
△ Less
Submitted 15 December, 2024;
originally announced December 2024.
-
Transfer Learning in Pre-Trained Large Language Models for Malware Detection Based on System Calls
Authors:
Pedro Miguel Sánchez Sánchez,
Alberto Huertas Celdrán,
Gérôme Bovet,
Gregorio Martínez Pérez
Abstract:
In the current cybersecurity landscape, protecting military devices such as communication and battlefield management systems against sophisticated cyber attacks is crucial. Malware exploits vulnerabilities through stealth methods, often evading traditional detection mechanisms such as software signatures. The application of ML/DL in vulnerability detection has been extensively explored in the lite…
▽ More
In the current cybersecurity landscape, protecting military devices such as communication and battlefield management systems against sophisticated cyber attacks is crucial. Malware exploits vulnerabilities through stealth methods, often evading traditional detection mechanisms such as software signatures. The application of ML/DL in vulnerability detection has been extensively explored in the literature. However, current ML/DL vulnerability detection methods struggle with understanding the context and intent behind complex attacks. Integrating large language models (LLMs) with system call analysis offers a promising approach to enhance malware detection. This work presents a novel framework leveraging LLMs to classify malware based on system call data. The framework uses transfer learning to adapt pre-trained LLMs for malware detection. By retraining LLMs on a dataset of benign and malicious system calls, the models are refined to detect signs of malware activity. Experiments with a dataset of over 1TB of system calls demonstrate that models with larger context sizes, such as BigBird and Longformer, achieve superior accuracy and F1-Score of approximately 0.86. The results highlight the importance of context size in improving detection rates and underscore the trade-offs between computational complexity and performance. This approach shows significant potential for real-time detection in high-stakes environments, offering a robust solution to evolving cyber threats.
△ Less
Submitted 15 May, 2024;
originally announced May 2024.
-
Confronting the Lippmann-Schwinger equation and the $N/D$ method for coupled-wave separable potentials
Authors:
M. S. Sánchez,
J. A. Oller,
D. R. Entem
Abstract:
We study a family of separable potentials with and without added contact interactions by solving the associated Lippmann-Schwinger equation with two coupled partial waves. The matching of the resulting amplitude matrix with the effective-range expansion is studied in detail. When a counterterm is included in the potential we also carefully discuss its renormalization. Next, we use the matrix…
▽ More
We study a family of separable potentials with and without added contact interactions by solving the associated Lippmann-Schwinger equation with two coupled partial waves. The matching of the resulting amplitude matrix with the effective-range expansion is studied in detail. When a counterterm is included in the potential we also carefully discuss its renormalization. Next, we use the matrix $N/D$ method and study whether the amplitude matrices from the potentials considered admit an $N/D$ representation in matrix form. As a novel result we show that it is typically not possible to find such matrix representation for the coupled partial-wave case. However, a separate $N/D$ representation for each coupled partial wave, a valid option known in the literature, is explicitly implemented and numerically solved in cases where the matrix $N/D$ method is unavailable.
△ Less
Submitted 8 March, 2024;
originally announced March 2024.
-
Nematic versus Kekulé phases in twisted bilayer graphene under hydrostatic pressure
Authors:
Miguel Sánchez Sánchez,
Israel Díaz,
José González,
Tobias Stauber
Abstract:
We address the precise determination of the phase diagram of magic angle twisted bilayer graphene under hydrostatic pressure within a self-consistent Hartree-Fock method in real space, including all the remote bands of the system. We further present a novel algorithm that maps the full real-space density matrix to a $4\times4$ density matrix based on a $SU(4)$ symmetry of sublattice and valley deg…
▽ More
We address the precise determination of the phase diagram of magic angle twisted bilayer graphene under hydrostatic pressure within a self-consistent Hartree-Fock method in real space, including all the remote bands of the system. We further present a novel algorithm that maps the full real-space density matrix to a $4\times4$ density matrix based on a $SU(4)$ symmetry of sublattice and valley degrees of freedom. We find a quantum critical point between a nematic and a Kekulé phase, and show also that our microscopic approach displays a strong particle-hole asymmetry in the weak coupling regime. We arrive then at the prediction that the superconductivity should be Ising-like in the hole-doped nematic regime, with spin-valley locking, and spin-triplet in the electron-doped regime.
△ Less
Submitted 15 November, 2024; v1 submitted 5 March, 2024;
originally announced March 2024.
-
Correlated phases and topological phase transition in twisted bilayer graphene at one quantum of magnetic flux
Authors:
Miguel Sánchez Sánchez,
Tobias Stauber
Abstract:
When the perpendicular magnetic flux per unit cell in a crystal is equal to the quantum of magnetic flux, $Φ_0=h/e$, we enter the 'Hofstadter regime'. The large unit cell of moiré materials like magic-angle twisted bilayer graphene (MATBG) allows the experimental study of this regime at feasible values of the field around $20$ to $30$ T. In this work, we report numerical analysis of a tight-bindin…
▽ More
When the perpendicular magnetic flux per unit cell in a crystal is equal to the quantum of magnetic flux, $Φ_0=h/e$, we enter the 'Hofstadter regime'. The large unit cell of moiré materials like magic-angle twisted bilayer graphene (MATBG) allows the experimental study of this regime at feasible values of the field around $20$ to $30$ T. In this work, we report numerical analysis of a tight-binding model for MATBG at one quantum of external magnetic flux, including the long-range Coulomb and on-site Hubbard interaction. We study the correlated states for dopings of $-2,0$ and $2$ electrons per unit cell at the mean-field level. We find competing insulators with Chern numbers $2$ and $0$ at positive doping, the stability of which is determined by the dielectric screening, which opens up the possibility of observing a topological phase transition in this system.
△ Less
Submitted 30 May, 2024; v1 submitted 28 January, 2024;
originally announced February 2024.
-
Assessing the Sustainability and Trustworthiness of Federated Learning Models
Authors:
Chao Feng,
Alberto Huertas Celdran,
Pedro Miguel Sanchez Sanchez,
Lynn Zumtaugwald,
Gerome Bovet,
Burkhard Stiller
Abstract:
Artificial intelligence is widely used in various sectors and significantly impacts decision-making processes. Novel AI paradigms, such as Federated Learning (FL), focus on training AI models collaboratively while preserving data privacy. In such a context, the European Commission's AI-HLEG group has highlighted the importance of sustainable AI for trustworthy AI. While existing literature offers…
▽ More
Artificial intelligence is widely used in various sectors and significantly impacts decision-making processes. Novel AI paradigms, such as Federated Learning (FL), focus on training AI models collaboratively while preserving data privacy. In such a context, the European Commission's AI-HLEG group has highlighted the importance of sustainable AI for trustworthy AI. While existing literature offers several solutions for assessing the trustworthiness of FL models, a significant gap exists in considering sustainability associated with FL. Thus, this work introduces the sustainability pillar to the trustworthy FL taxonomy, making this work the first to address all AI-HLEG requirements. The sustainability pillar assesses the FL system's environmental impact, incorporating notions and metrics for hardware efficiency, federation complexity, and energy grid carbon intensity. An algorithm is developed to evaluate the trustworthiness of FL models, incorporating sustainability considerations. Extensive evaluations with the FederatedScope framework and various scenarios demonstrate the effectiveness of the proposed solution.
△ Less
Submitted 11 February, 2025; v1 submitted 31 October, 2023;
originally announced October 2023.
-
Sentinel: An Aggregation Function to Secure Decentralized Federated Learning
Authors:
Chao Feng,
Alberto Huertas Celdrán,
Janosch Baltensperger,
Enrique Tomás Martínez Beltrán,
Pedro Miguel Sánchez Sánchez,
Gérôme Bovet,
Burkhard Stiller
Abstract:
Decentralized Federated Learning (DFL) emerges as an innovative paradigm to train collaborative models, addressing the single point of failure limitation. However, the security and trustworthiness of FL and DFL are compromised by poisoning attacks, negatively impacting its performance. Existing defense mechanisms have been designed for centralized FL and they do not adequately exploit the particul…
▽ More
Decentralized Federated Learning (DFL) emerges as an innovative paradigm to train collaborative models, addressing the single point of failure limitation. However, the security and trustworthiness of FL and DFL are compromised by poisoning attacks, negatively impacting its performance. Existing defense mechanisms have been designed for centralized FL and they do not adequately exploit the particularities of DFL. Thus, this work introduces Sentinel, a defense strategy to counteract poisoning attacks in DFL. Sentinel leverages the accessibility of local data and defines a three-step aggregation protocol consisting of similarity filtering, bootstrap validation, and normalization to safeguard against malicious model updates. Sentinel has been evaluated with diverse datasets and data distributions. Besides, various poisoning attack types and threat levels have been verified. The results improve the state-of-the-art performance against both untargeted and targeted poisoning attacks when data follows an IID (Independent and Identically Distributed) configuration. Besides, under non-IID configuration, it is analyzed how performance degrades both for Sentinel and other state-of-the-art robust aggregation methods.
△ Less
Submitted 4 September, 2024; v1 submitted 12 October, 2023;
originally announced October 2023.
-
CyberForce: A Federated Reinforcement Learning Framework for Malware Mitigation
Authors:
Chao Feng,
Alberto Huertas Celdran,
Pedro Miguel Sanchez Sanchez,
Jan Kreischer,
Jan von der Assen,
Gerome Bovet,
Gregorio Martinez Perez,
Burkhard Stiller
Abstract:
Recent research has shown that the integration of Reinforcement Learning (RL) with Moving Target Defense (MTD) can enhance cybersecurity in Internet-of-Things (IoT) devices. Nevertheless, the practicality of existing work is hindered by data privacy concerns associated with centralized data processing in RL, and the unsatisfactory time needed to learn right MTD techniques that are effective agains…
▽ More
Recent research has shown that the integration of Reinforcement Learning (RL) with Moving Target Defense (MTD) can enhance cybersecurity in Internet-of-Things (IoT) devices. Nevertheless, the practicality of existing work is hindered by data privacy concerns associated with centralized data processing in RL, and the unsatisfactory time needed to learn right MTD techniques that are effective against a rising number of heterogeneous zero-day attacks. Thus, this work presents CyberForce, a framework that combines Federated and Reinforcement Learning (FRL) to collaboratively and privately learn suitable MTD techniques for mitigating zero-day attacks. CyberForce integrates device fingerprinting and anomaly detection to reward or penalize MTD mechanisms chosen by an FRL-based agent. The framework has been deployed and evaluated in a scenario consisting of ten physical devices of a real IoT platform affected by heterogeneous malware samples. A pool of experiments has demonstrated that CyberForce learns the MTD technique mitigating each attack faster than existing RL-based centralized approaches. In addition, when various devices are exposed to different attacks, CyberForce benefits from knowledge transfer, leading to enhanced performance and reduced learning time in comparison to recent works. Finally, different aggregation algorithms used during the agent learning process provide CyberForce with notable robustness to malicious attacks.
△ Less
Submitted 30 September, 2024; v1 submitted 11 August, 2023;
originally announced August 2023.
-
TemporalFED: Detecting Cyberattacks in Industrial Time-Series Data Using Decentralized Federated Learning
Authors:
Ángel Luis Perales Gómez,
Enrique Tomás Martínez Beltrán,
Pedro Miguel Sánchez Sánchez,
Alberto Huertas Celdrán
Abstract:
Industry 4.0 has brought numerous advantages, such as increasing productivity through automation. However, it also presents major cybersecurity issues such as cyberattacks affecting industrial processes. Federated Learning (FL) combined with time-series analysis is a promising cyberattack detection mechanism proposed in the literature. However, the fact of having a single point of failure and netw…
▽ More
Industry 4.0 has brought numerous advantages, such as increasing productivity through automation. However, it also presents major cybersecurity issues such as cyberattacks affecting industrial processes. Federated Learning (FL) combined with time-series analysis is a promising cyberattack detection mechanism proposed in the literature. However, the fact of having a single point of failure and network bottleneck are critical challenges that need to be tackled. Thus, this article explores the benefits of the Decentralized Federated Learning (DFL) in terms of cyberattack detection and resource consumption. The work presents TemporalFED, a software module for detecting anomalies in industrial environments using FL paradigms and time series. TemporalFED incorporates three components: Time Series Conversion, Feature Engineering, and Time Series Stationary Conversion. To evaluate TemporalFED, it was deployed on Fedstellar, a DFL framework. Then, a pool of experiments measured the detection performance and resource consumption in a chemical gas industrial environment with different time-series configurations, FL paradigms, and topologies. The results showcase the superiority of the configuration utilizing DFL and Semi-Decentralized Federated Learning (SDFL) paradigms, along with a fully connected topology, which achieved the best performance in anomaly detection. Regarding resource consumption, the configuration without feature engineering employed less bandwidth, CPU, and RAM than other configurations.
△ Less
Submitted 7 August, 2023;
originally announced August 2023.
-
The correlated insulators of magic angle twisted bilayer graphene at zero and one quantum of magnetic flux: a tight-binding study
Authors:
Miguel Sánchez Sánchez,
Tobias Stauber
Abstract:
Magic angle twisted bilayer graphene (MATBG) has become one of the prominent topics in Condensed Matter during the last few years, however, fully atomistic studies of the interacting physics are missing. In this work, we study the correlated insulator states of MATBG in the setting of a tight-binding model, under a perpendicular magnetic field of $0$ and $26.5$ T, corresponding to zero and one qua…
▽ More
Magic angle twisted bilayer graphene (MATBG) has become one of the prominent topics in Condensed Matter during the last few years, however, fully atomistic studies of the interacting physics are missing. In this work, we study the correlated insulator states of MATBG in the setting of a tight-binding model, under a perpendicular magnetic field of $0$ and $26.5$ T, corresponding to zero and one quantum of magnetic flux per unit cell. At zero field and for dopings of two holes ($ν=-2$) or two electrons ($ν=+2$) per unit cell, the Kramers intervalley coherent (KIVC) order is the ground state at the Hartree-Fock level, although it is stabilized by a different mechanism to that in continuum model. At charge neutrality, the spin polarized state is competitive with the KIVC due to the on-site Hubbard energy. We obtain a strongly electron-hole asymmetric phase diagram with robust insulators for electron filling and metals for negative filling. In the presence of magnetic flux, we predict an insulator with Chern number $-2$ for $ν=-2$, a spin polarized state at charge neutrality and competing insulators with Chern numbers $+2$ and $0$ at $ν=+2$. The stability of the $ν=+2$ insulators is determined by the screening environment, allowing for the possibility of observing a topological phase transition.
△ Less
Submitted 8 August, 2023; v1 submitted 3 August, 2023;
originally announced August 2023.
-
Mitigating Communications Threats in Decentralized Federated Learning through Moving Target Defense
Authors:
Enrique Tomás Martínez Beltrán,
Pedro Miguel Sánchez Sánchez,
Sergio López Bernal,
Gérôme Bovet,
Manuel Gil Pérez,
Gregorio Martínez Pérez,
Alberto Huertas Celdrán
Abstract:
The rise of Decentralized Federated Learning (DFL) has enabled the training of machine learning models across federated participants, fostering decentralized model aggregation and reducing dependence on a server. However, this approach introduces unique communication security challenges that have yet to be thoroughly addressed in the literature. These challenges primarily originate from the decent…
▽ More
The rise of Decentralized Federated Learning (DFL) has enabled the training of machine learning models across federated participants, fostering decentralized model aggregation and reducing dependence on a server. However, this approach introduces unique communication security challenges that have yet to be thoroughly addressed in the literature. These challenges primarily originate from the decentralized nature of the aggregation process, the varied roles and responsibilities of the participants, and the absence of a central authority to oversee and mitigate threats. Addressing these challenges, this paper first delineates a comprehensive threat model focused on DFL communications. In response to these identified risks, this work introduces a security module to counter communication-based attacks for DFL platforms. The module combines security techniques such as symmetric and asymmetric encryption with Moving Target Defense (MTD) techniques, including random neighbor selection and IP/port switching. The security module is implemented in a DFL platform, Fedstellar, allowing the deployment and monitoring of the federation. A DFL scenario with physical and virtual deployments have been executed, encompassing three security configurations: (i) a baseline without security, (ii) an encrypted configuration, and (iii) a configuration integrating both encryption and MTD techniques. The effectiveness of the security module is validated through experiments with the MNIST dataset and eclipse attacks. The results showed an average F1 score of 95%, with the most secure configuration resulting in CPU usage peaking at 68% (+-9%) in virtual deployments and network traffic reaching 480.8 MB (+-18 MB), effectively mitigating risks associated with eavesdropping or eclipse attacks.
△ Less
Submitted 9 December, 2023; v1 submitted 21 July, 2023;
originally announced July 2023.
-
RansomAI: AI-powered Ransomware for Stealthy Encryption
Authors:
Jan von der Assen,
Alberto Huertas Celdrán,
Janik Luechinger,
Pedro Miguel Sánchez Sánchez,
Gérôme Bovet,
Gregorio Martínez Pérez,
Burkhard Stiller
Abstract:
Cybersecurity solutions have shown promising performance when detecting ransomware samples that use fixed algorithms and encryption rates. However, due to the current explosion of Artificial Intelligence (AI), sooner than later, ransomware (and malware in general) will incorporate AI techniques to intelligently and dynamically adapt its encryption behavior to be undetected. It might result in inef…
▽ More
Cybersecurity solutions have shown promising performance when detecting ransomware samples that use fixed algorithms and encryption rates. However, due to the current explosion of Artificial Intelligence (AI), sooner than later, ransomware (and malware in general) will incorporate AI techniques to intelligently and dynamically adapt its encryption behavior to be undetected. It might result in ineffective and obsolete cybersecurity solutions, but the literature lacks AI-powered ransomware to verify it. Thus, this work proposes RansomAI, a Reinforcement Learning-based framework that can be integrated into existing ransomware samples to adapt their encryption behavior and stay stealthy while encrypting files. RansomAI presents an agent that learns the best encryption algorithm, rate, and duration that minimizes its detection (using a reward mechanism and a fingerprinting intelligent detection system) while maximizing its damage function. The proposed framework was validated in a ransomware, Ransomware-PoC, that infected a Raspberry Pi 4, acting as a crowdsensor. A pool of experiments with Deep Q-Learning and Isolation Forest (deployed on the agent and detection system, respectively) has demonstrated that RansomAI evades the detection of Ransomware-PoC affecting the Raspberry Pi 4 in a few minutes with >90% accuracy.
△ Less
Submitted 27 June, 2023;
originally announced June 2023.
-
Fedstellar: A Platform for Decentralized Federated Learning
Authors:
Enrique Tomás Martínez Beltrán,
Ángel Luis Perales Gómez,
Chao Feng,
Pedro Miguel Sánchez Sánchez,
Sergio López Bernal,
Gérôme Bovet,
Manuel Gil Pérez,
Gregorio Martínez Pérez,
Alberto Huertas Celdrán
Abstract:
In 2016, Google proposed Federated Learning (FL) as a novel paradigm to train Machine Learning (ML) models across the participants of a federation while preserving data privacy. Since its birth, Centralized FL (CFL) has been the most used approach, where a central entity aggregates participants' models to create a global one. However, CFL presents limitations such as communication bottlenecks, sin…
▽ More
In 2016, Google proposed Federated Learning (FL) as a novel paradigm to train Machine Learning (ML) models across the participants of a federation while preserving data privacy. Since its birth, Centralized FL (CFL) has been the most used approach, where a central entity aggregates participants' models to create a global one. However, CFL presents limitations such as communication bottlenecks, single point of failure, and reliance on a central server. Decentralized Federated Learning (DFL) addresses these issues by enabling decentralized model aggregation and minimizing dependency on a central entity. Despite these advances, current platforms training DFL models struggle with key issues such as managing heterogeneous federation network topologies. To overcome these challenges, this paper presents Fedstellar, a platform extended from p2pfl library and designed to train FL models in a decentralized, semi-decentralized, and centralized fashion across diverse federations of physical or virtualized devices. The Fedstellar implementation encompasses a web application with an interactive graphical interface, a controller for deploying federations of nodes using physical or virtual devices, and a core deployed on each device which provides the logic needed to train, aggregate, and communicate in the network. The effectiveness of the platform has been demonstrated in two scenarios: a physical deployment involving single-board devices such as Raspberry Pis for detecting cyberattacks, and a virtualized deployment comparing various FL approaches in a controlled environment using MNIST and CIFAR-10 datasets. In both scenarios, Fedstellar demonstrated consistent performance and adaptability, achieving F1 scores of 91%, 98%, and 91.2% using DFL for detecting cyberattacks and classifying MNIST and CIFAR-10, respectively, reducing training time by 32% compared to centralized approaches.
△ Less
Submitted 8 April, 2024; v1 submitted 16 June, 2023;
originally announced June 2023.
-
Single-board Device Individual Authentication based on Hardware Performance and Autoencoder Transformer Models
Authors:
Pedro Miguel Sánchez Sánchez,
Alberto Huertas Celdrán,
Gérôme Bovet,
Gregorio Martínez Pérez
Abstract:
The proliferation of the Internet of Things (IoT) has led to the emergence of crowdsensing applications, where a multitude of interconnected devices collaboratively collect and analyze data. Ensuring the authenticity and integrity of the data collected by these devices is crucial for reliable decision-making and maintaining trust in the system. Traditional authentication methods are often vulnerab…
▽ More
The proliferation of the Internet of Things (IoT) has led to the emergence of crowdsensing applications, where a multitude of interconnected devices collaboratively collect and analyze data. Ensuring the authenticity and integrity of the data collected by these devices is crucial for reliable decision-making and maintaining trust in the system. Traditional authentication methods are often vulnerable to attacks or can be easily duplicated, posing challenges to securing crowdsensing applications. Besides, current solutions leveraging device behavior are mostly focused on device identification, which is a simpler task than authentication. To address these issues, an individual IoT device authentication framework based on hardware behavior fingerprinting and Transformer autoencoders is proposed in this work. This solution leverages the inherent imperfections and variations in IoT device hardware to differentiate between devices with identical specifications. By monitoring and analyzing the behavior of key hardware components, such as the CPU, GPU, RAM, and Storage on devices, unique fingerprints for each device are created. The performance samples are considered as time series data and used to train outlier detection transformer models, one per device and aiming to model its normal data distribution. Then, the framework is validated within a spectrum crowdsensing system leveraging Raspberry Pi devices. After a pool of experiments, the model from each device is able to individually authenticate it between the 45 devices employed for validation. An average True Positive Rate (TPR) of 0.74+-0.13 and an average maximum False Positive Rate (FPR) of 0.06+-0.09 demonstrate the effectiveness of this approach in enhancing authentication, security, and trust in crowdsensing applications.
△ Less
Submitted 11 November, 2023; v1 submitted 14 June, 2023;
originally announced June 2023.
-
FederatedTrust: A Solution for Trustworthy Federated Learning
Authors:
Pedro Miguel Sánchez Sánchez,
Alberto Huertas Celdrán,
Ning Xie,
Gérôme Bovet,
Gregorio Martínez Pérez,
Burkhard Stiller
Abstract:
The rapid expansion of the Internet of Things (IoT) and Edge Computing has presented challenges for centralized Machine and Deep Learning (ML/DL) methods due to the presence of distributed data silos that hold sensitive information. To address concerns regarding data privacy, collaborative and privacy-preserving ML/DL techniques like Federated Learning (FL) have emerged. However, ensuring data pri…
▽ More
The rapid expansion of the Internet of Things (IoT) and Edge Computing has presented challenges for centralized Machine and Deep Learning (ML/DL) methods due to the presence of distributed data silos that hold sensitive information. To address concerns regarding data privacy, collaborative and privacy-preserving ML/DL techniques like Federated Learning (FL) have emerged. However, ensuring data privacy and performance alone is insufficient since there is a growing need to establish trust in model predictions. Existing literature has proposed various approaches on trustworthy ML/DL (excluding data privacy), identifying robustness, fairness, explainability, and accountability as important pillars. Nevertheless, further research is required to identify trustworthiness pillars and evaluation metrics specifically relevant to FL models, as well as to develop solutions that can compute the trustworthiness level of FL models. This work examines the existing requirements for evaluating trustworthiness in FL and introduces a comprehensive taxonomy consisting of six pillars (privacy, robustness, fairness, explainability, accountability, and federation), along with over 30 metrics for computing the trustworthiness of FL models. Subsequently, an algorithm named FederatedTrust is designed based on the pillars and metrics identified in the taxonomy to compute the trustworthiness score of FL models. A prototype of FederatedTrust is implemented and integrated into the learning process of FederatedScope, a well-established FL framework. Finally, five experiments are conducted using different configurations of FederatedScope to demonstrate the utility of FederatedTrust in computing the trustworthiness of FL models. Three experiments employ the FEMNIST dataset, and two utilize the N-BaIoT dataset considering a real-world IoT security use case.
△ Less
Submitted 6 July, 2023; v1 submitted 20 February, 2023;
originally announced February 2023.
-
Adversarial attacks and defenses on ML- and hardware-based IoT device fingerprinting and identification
Authors:
Pedro Miguel Sánchez Sánchez,
Alberto Huertas Celdrán,
Gérôme Bovet,
Gregorio Martínez Pérez
Abstract:
In the last years, the number of IoT devices deployed has suffered an undoubted explosion, reaching the scale of billions. However, some new cybersecurity issues have appeared together with this development. Some of these issues are the deployment of unauthorized devices, malicious code modification, malware deployment, or vulnerability exploitation. This fact has motivated the requirement for new…
▽ More
In the last years, the number of IoT devices deployed has suffered an undoubted explosion, reaching the scale of billions. However, some new cybersecurity issues have appeared together with this development. Some of these issues are the deployment of unauthorized devices, malicious code modification, malware deployment, or vulnerability exploitation. This fact has motivated the requirement for new device identification mechanisms based on behavior monitoring. Besides, these solutions have recently leveraged Machine and Deep Learning techniques due to the advances in this field and the increase in processing capabilities. In contrast, attackers do not stay stalled and have developed adversarial attacks focused on context modification and ML/DL evaluation evasion applied to IoT device identification solutions. This work explores the performance of hardware behavior-based individual device identification, how it is affected by possible context- and ML/DL-focused attacks, and how its resilience can be improved using defense techniques. In this sense, it proposes an LSTM-CNN architecture based on hardware performance behavior for individual device identification. Then, previous techniques have been compared with the proposed architecture using a hardware performance dataset collected from 45 Raspberry Pi devices running identical software. The LSTM-CNN improves previous solutions achieving a +0.96 average F1-Score and 0.8 minimum TPR for all devices. Afterward, context- and ML/DL-focused adversarial attacks were applied against the previous model to test its robustness. A temperature-based context attack was not able to disrupt the identification. However, some ML/DL state-of-the-art evasion attacks were successful. Finally, adversarial training and model distillation defense techniques are selected to improve the model resilience to evasion attacks, without degrading its performance.
△ Less
Submitted 30 December, 2022;
originally announced December 2022.
-
RL and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-day Attacks in IoT
Authors:
Alberto Huertas Celdrán,
Pedro Miguel Sánchez Sánchez,
Jan von der Assen,
Timo Schenk,
Gérôme Bovet,
Gregorio Martínez Pérez,
Burkhard Stiller
Abstract:
Cybercriminals are moving towards zero-day attacks affecting resource-constrained devices such as single-board computers (SBC). Assuming that perfect security is unrealistic, Moving Target Defense (MTD) is a promising approach to mitigate attacks by dynamically altering target attack surfaces. Still, selecting suitable MTD techniques for zero-day attacks is an open challenge. Reinforcement Learnin…
▽ More
Cybercriminals are moving towards zero-day attacks affecting resource-constrained devices such as single-board computers (SBC). Assuming that perfect security is unrealistic, Moving Target Defense (MTD) is a promising approach to mitigate attacks by dynamically altering target attack surfaces. Still, selecting suitable MTD techniques for zero-day attacks is an open challenge. Reinforcement Learning (RL) could be an effective approach to optimize the MTD selection through trial and error, but the literature fails when i) evaluating the performance of RL and MTD solutions in real-world scenarios, ii) studying whether behavioral fingerprinting is suitable for representing SBC's states, and iii) calculating the consumption of resources in SBC. To improve these limitations, the work at hand proposes an online RL-based framework to learn the correct MTD mechanisms mitigating heterogeneous zero-day attacks in SBC. The framework considers behavioral fingerprinting to represent SBCs' states and RL to learn MTD techniques that mitigate each malicious state. It has been deployed on a real IoT crowdsensing scenario with a Raspberry Pi acting as a spectrum sensor. More in detail, the Raspberry Pi has been infected with different samples of command and control malware, rootkits, and ransomware to later select between four existing MTD techniques. A set of experiments demonstrated the suitability of the framework to learn proper MTD techniques mitigating all attacks (except a harmfulness rootkit) while consuming <1 MB of storage and utilizing <55% CPU and <80% RAM.
△ Less
Submitted 30 December, 2022;
originally announced December 2022.
-
Rethinking the $P_c(4457)^+$ as the $P_ψ^{Δ^+}(4457)$ isoquartet $\bar{D}^* Σ_c$ molecule
Authors:
Fang-Zheng Peng,
Mao-Jun Yan,
Mario Sánchez Sánchez,
Manuel Pavon Valderrama
Abstract:
The nature of the $P_{c}(4312)$, $P_c(4440)$ and $P_c(4457)$ pentaquarks is a fascinating theoretical question. Within the molecular picture their more usual interpretation is that of $I=\tfrac{1}{2}$ $\bar{D} Σ_c$ and $\bar{D}^* Σ_c$ bound states. Here we argue in favor of interpreting the $P_c(4457)$ pentaquark as a $I=\tfrac{3}{2}$ $\bar{D}^* Σ_c$ bound state (with spin $J=\tfrac{1}{2}$) instea…
▽ More
The nature of the $P_{c}(4312)$, $P_c(4440)$ and $P_c(4457)$ pentaquarks is a fascinating theoretical question. Within the molecular picture their more usual interpretation is that of $I=\tfrac{1}{2}$ $\bar{D} Σ_c$ and $\bar{D}^* Σ_c$ bound states. Here we argue in favor of interpreting the $P_c(4457)$ pentaquark as a $I=\tfrac{3}{2}$ $\bar{D}^* Σ_c$ bound state (with spin $J=\tfrac{1}{2}$) instead. Owing to isospin symmetry breaking effects, with this identification the partial decay width of the $P_c(4457)^+$ into $J/ψp$ will be of the same order of magnitude as the $P_{c}(4312)^+$ and $P_c(4440)^+$, in contrast with the considerably larger partial decay width in the $I=\tfrac{1}{2}$ scenario. In turn, this leads to a different hidden-charm molecular pentaquark spectrum, in which there are only four or five $P_ψ^N$ bound states instead of the usual seven, which might explain why the predicted $J=\tfrac{1}{2}$ and $\tfrac{3}{2}$ ($I=\tfrac{1}{2}$) $\bar{D}^* Σ_c^*$ molecular partners of the $P_c(4312)$ and $P_c(4440)$ have not been observed.
△ Less
Submitted 19 October, 2024; v1 submitted 16 November, 2022;
originally announced November 2022.
-
Decentralized Federated Learning: Fundamentals, State of the Art, Frameworks, Trends, and Challenges
Authors:
Enrique Tomás Martínez Beltrán,
Mario Quiles Pérez,
Pedro Miguel Sánchez Sánchez,
Sergio López Bernal,
Gérôme Bovet,
Manuel Gil Pérez,
Gregorio Martínez Pérez,
Alberto Huertas Celdrán
Abstract:
In recent years, Federated Learning (FL) has gained relevance in training collaborative models without sharing sensitive data. Since its birth, Centralized FL (CFL) has been the most common approach in the literature, where a central entity creates a global model. However, a centralized approach leads to increased latency due to bottlenecks, heightened vulnerability to system failures, and trustwo…
▽ More
In recent years, Federated Learning (FL) has gained relevance in training collaborative models without sharing sensitive data. Since its birth, Centralized FL (CFL) has been the most common approach in the literature, where a central entity creates a global model. However, a centralized approach leads to increased latency due to bottlenecks, heightened vulnerability to system failures, and trustworthiness concerns affecting the entity responsible for the global model creation. Decentralized Federated Learning (DFL) emerged to address these concerns by promoting decentralized model aggregation and minimizing reliance on centralized architectures. However, despite the work done in DFL, the literature has not (i) studied the main aspects differentiating DFL and CFL; (ii) analyzed DFL frameworks to create and evaluate new solutions; and (iii) reviewed application scenarios using DFL. Thus, this article identifies and analyzes the main fundamentals of DFL in terms of federation architectures, topologies, communication mechanisms, security approaches, and key performance indicators. Additionally, the paper at hand explores existing mechanisms to optimize critical DFL fundamentals. Then, the most relevant features of the current DFL frameworks are reviewed and compared. After that, it analyzes the most used DFL application scenarios, identifying solutions based on the fundamentals and frameworks previously defined. Finally, the evolution of existing DFL solutions is studied to provide a list of trends, lessons learned, and open challenges.
△ Less
Submitted 13 September, 2023; v1 submitted 15 November, 2022;
originally announced November 2022.
-
Molecular $P_ψ$ pentaquarks from light-meson exchange saturation
Authors:
Zi-Ying Yang,
Fang-Zheng Peng,
Mao-Jun Yan,
Mario Sánchez Sánchez,
Manuel Pavon Valderrama
Abstract:
Theoretical predictions for the spectrum of heavy meson-baryon bound states are a fundamental tool for disentangling the nature of the different pentaquark states that have been observed in experimental facilities. Here we explore this spectrum in a phenomenological model that describes the heavy meson-baryon interaction in terms of a contact-range interaction, where the coupling strength is satur…
▽ More
Theoretical predictions for the spectrum of heavy meson-baryon bound states are a fundamental tool for disentangling the nature of the different pentaquark states that have been observed in experimental facilities. Here we explore this spectrum in a phenomenological model that describes the heavy meson-baryon interaction in terms of a contact-range interaction, where the coupling strength is saturated by the exchange of light scalar and vector mesons, i.e. $σ$, $ρ$ and $ω$ exchanges. Saturation determines the couplings modulo an unknown proportionality constant that can be calibrated from a molecular candidate. If we use the $P_ψ^N(4312)$ as input, we predict a series of molecular pentaquarks including the $P_ψ^N(4440)$ and $P_ψ^N(4457)$, the recent $P_{ψs}^Λ(4338)$ and the $P_{ψs}^Λ(4459)$.
△ Less
Submitted 16 January, 2025; v1 submitted 15 November, 2022;
originally announced November 2022.
-
Trust-as-a-Service: A reputation-enabled trust framework for 5G networks
Authors:
José María Jorquera Valero,
Pedro Miguel Sánchez Sánchez,
Manuel Gil Pérez,
Alberto Huertas Celdrán,
Gregorio Martínez Pérez
Abstract:
Trust, security, and privacy are three of the major pillars to assemble the fifth generation network and beyond. Despite such pillars are principally interconnected, they arise a multitude of challenges to be addressed separately. 5G ought to offer flexible and pervasive computing capabilities across multiple domains according to user demands and assuring trustworthy network providers. Distributed…
▽ More
Trust, security, and privacy are three of the major pillars to assemble the fifth generation network and beyond. Despite such pillars are principally interconnected, they arise a multitude of challenges to be addressed separately. 5G ought to offer flexible and pervasive computing capabilities across multiple domains according to user demands and assuring trustworthy network providers. Distributed marketplaces expect to boost the trading of heterogeneous resources so as to enable the establishment of pervasive service chains between cross-domains. Nevertheless, the need for reliable parties as ``marketplace operators'' plays a pivotal role to achieving a trustworthy ecosystem. One of the principal blockages in managing foreseeable networks is the need of adapting previous trust models to accomplish the new network and business requirements. In this regard, this article is centered on trust management of 5G multi-party networks. The design of a reputation-based trust framework is proposed as a Trust-as-a-Service (TaaS) solution for any distributed multi-stakeholder environment where zero trust and zero-touch principles should be met. Besides, a literature review is also conducted to recognize the network and business requirements currently envisaged. Finally, the validation of the proposed trust framework is performed in a real research environment, the 5GBarcelona testbed, leveraging 12% of a 2.1GHz CPU with 20 cores and 2% of the 30GiB memory. In this regard, these outcomes reveal the feasibility of the TaaS solution in the context of determining reliable network operators.
△ Less
Submitted 20 October, 2022;
originally announced October 2022.
-
Analyzing the Robustness of Decentralized Horizontal and Vertical Federated Learning Architectures in a Non-IID Scenario
Authors:
Pedro Miguel Sánchez Sánchez,
Alberto Huertas Celdrán,
Enrique Tomás Martínez Beltrán,
Daniel Demeter,
Gérôme Bovet,
Gregorio Martínez Pérez,
Burkhard Stiller
Abstract:
Federated learning (FL) allows participants to collaboratively train machine and deep learning models while protecting data privacy. However, the FL paradigm still presents drawbacks affecting its trustworthiness since malicious participants could launch adversarial attacks against the training process. Related work has studied the robustness of horizontal FL scenarios under different attacks. How…
▽ More
Federated learning (FL) allows participants to collaboratively train machine and deep learning models while protecting data privacy. However, the FL paradigm still presents drawbacks affecting its trustworthiness since malicious participants could launch adversarial attacks against the training process. Related work has studied the robustness of horizontal FL scenarios under different attacks. However, there is a lack of work evaluating the robustness of decentralized vertical FL and comparing it with horizontal FL architectures affected by adversarial attacks. Thus, this work proposes three decentralized FL architectures, one for horizontal and two for vertical scenarios, namely HoriChain, VertiChain, and VertiComb. These architectures present different neural networks and training protocols suitable for horizontal and vertical scenarios. Then, a decentralized, privacy-preserving, and federated use case with non-IID data to classify handwritten digits is deployed to evaluate the performance of the three architectures. Finally, a set of experiments computes and compares the robustness of the proposed architectures when they are affected by different data poisoning based on image watermarks and gradient poisoning adversarial attacks. The experiments show that even though particular configurations of both attacks can destroy the classification performance of the architectures, HoriChain is the most robust one.
△ Less
Submitted 20 October, 2022;
originally announced October 2022.
-
A Lightweight Moving Target Defense Framework for Multi-purpose Malware Affecting IoT Devices
Authors:
Jan von der Assen,
Alberto Huertas Celdrán,
Pedro Miguel Sánchez Sánchez,
Jordan Cedeño,
Gérôme Bovet,
Gregorio Martínez Pérez,
Burkhard Stiller
Abstract:
Malware affecting Internet of Things (IoT) devices is rapidly growing due to the relevance of this paradigm in real-world scenarios. Specialized literature has also detected a trend towards multi-purpose malware able to execute different malicious actions such as remote control, data leakage, encryption, or code hiding, among others. Protecting IoT devices against this kind of malware is challengi…
▽ More
Malware affecting Internet of Things (IoT) devices is rapidly growing due to the relevance of this paradigm in real-world scenarios. Specialized literature has also detected a trend towards multi-purpose malware able to execute different malicious actions such as remote control, data leakage, encryption, or code hiding, among others. Protecting IoT devices against this kind of malware is challenging due to their well-known vulnerabilities and limitation in terms of CPU, memory, and storage. To improve it, the moving target defense (MTD) paradigm was proposed a decade ago and has shown promising results, but there is a lack of IoT MTD solutions dealing with multi-purpose malware. Thus, this work proposes four MTD mechanisms changing IoT devices' network, data, and runtime environment to mitigate multi-purpose malware. Furthermore, it presents a lightweight and IoT-oriented MTD framework to decide what, when, and how the MTD mechanisms are deployed. Finally, the efficiency and effectiveness of the framework and MTD mechanisms are evaluated in a real-world scenario with one IoT spectrum sensor affected by multi-purpose malware.
△ Less
Submitted 14 October, 2022;
originally announced October 2022.
-
The $P_{ψs}^Λ(4338)$ pentaquark and its partners in the molecular picture
Authors:
Mao-Jun Yan,
Fang-Zheng Peng,
Mario Sánchez Sánchez,
Manuel Pavon Valderrama
Abstract:
The LHCb collaboration has detected a new hidden-charm pentaquark with the quantum numbers of a $Λ$ baryon: the $P_{ψs}^Λ(4338)$. This pentaquark will be interpreted as a $\bar{D}_s Λ_c$-$\bar{D} Ξ_c$ resonance within a contact-range theory. Here we briefly comment on the relation of the new $P_{ψs}^Λ(4338)$ with the $P^Λ_{ψs}(4459)$. We find that the $P_{ψs}^Λ(4338)$ and $P_{ψs}^Λ(4459)$ both acc…
▽ More
The LHCb collaboration has detected a new hidden-charm pentaquark with the quantum numbers of a $Λ$ baryon: the $P_{ψs}^Λ(4338)$. This pentaquark will be interpreted as a $\bar{D}_s Λ_c$-$\bar{D} Ξ_c$ resonance within a contact-range theory. Here we briefly comment on the relation of the new $P_{ψs}^Λ(4338)$ with the $P^Λ_{ψs}(4459)$. We find that the $P_{ψs}^Λ(4338)$ and $P_{ψs}^Λ(4459)$ both accept a common description in terms of the same parameters, which predicts the existence of a few additional $P_ψ^N$, $P_{ψs}^Λ$, $P_{ψs}^Σ$ and $P_{ψs s}^Ξ$ molecular pentaquarks composed of a charmed antimeson and an antitriplet charmed baryon. The most robust of these predicted pentaquarks is a $P_{ψs}^Λ$ with a mass in the $(4235-4255)\,{\rm MeV}$ range, while other two interesting ones are a $P_ψ^{N}(4150)$ and a $P_ψ^Σ(4335)$, the latter basically at the same mass as the $P_ψ^Λ(4338)$, with which it might mix owing to isospin symmetry breaking effects.
△ Less
Submitted 19 October, 2024; v1 submitted 22 July, 2022;
originally announced July 2022.
-
Light- and heavy-quark symmetries and the $Y(4230)$, $Y(4360)$, $Y(4500)$, $Y(4620)$ and $X(4630)$ resonances
Authors:
Fang-Zheng Peng,
Mao-Jun Yan,
Mario Sánchez Sánchez,
Manuel Pavon Valderrama
Abstract:
The heavy hadron spectrum is constrained by symmetries, of which two of the most important ones are heavy-quark spin and SU(3)-flavor symmetries. Here we argue that in the molecular picture the $Y(4230)$ (or $Y(4260)$), the $Y(4360)$ and the recently discovered $Y(4500)$ and $Y(4620)$ vector-like resonances are linked by these two symmetries. By formulating a contact-range effective field theory f…
▽ More
The heavy hadron spectrum is constrained by symmetries, of which two of the most important ones are heavy-quark spin and SU(3)-flavor symmetries. Here we argue that in the molecular picture the $Y(4230)$ (or $Y(4260)$), the $Y(4360)$ and the recently discovered $Y(4500)$ and $Y(4620)$ vector-like resonances are linked by these two symmetries. By formulating a contact-range effective field theory for the $D \bar{D}_1$ and $D_s \bar{D}_{s1}$ family of S- and P-wave charmed meson-antimeson systems, we find that if the $Y(4230)$ were to be a pure $D \bar{D}_1$ molecular state, there would be a $D^* \bar{D}_1$ partner with a mass similar to the $Y(4360)$, a $D_s \bar{D}_{s1}$ partner with a mass close to the $Y(4500)$ and three $J=1,2$ $D_s^* \bar{D}_{s1}$ and $J=3$ $D_s^* \bar{D}_{s2}^{*}$ bound states with a mass in the vicinity of $4630\,{\rm MeV}$, of which the first one ($J=1$) might correspond with the $Y(4620)$. The previous predictions can in turn be improved by modifying the assumptions we have used to build the effective field theory. In particular, if we consider the closeness of the $D^* \bar{D}_1$-$D^* \bar{D}_2^*$ and $D_s^* \bar{D}_{s1}$-$D_s^* \bar{D}_{s2}^*$ thresholds and include the related coupled channel dynamics, we predict a $J=2$ positive C-parity state with a mass around $4650\,{\rm MeV}$. This hidden-strange and hidden-charm state might in turn be identified with the $X(4630)$ that has been discovered past year by the LHCb in the $J/ψφ$ invariant mass distribution.
△ Less
Submitted 5 January, 2023; v1 submitted 26 May, 2022;
originally announced May 2022.
-
LwHBench: A low-level hardware component benchmark and dataset for Single Board Computers
Authors:
Pedro Miguel Sánchez Sánchez,
José María Jorquera Valero,
Alberto Huertas Celdrán,
Gérôme Bovet,
Manuel Gil Pérez,
Gregorio Martínez Pérez
Abstract:
In today's computing environment, where Artificial Intelligence (AI) and data processing are moving toward the Internet of Things (IoT) and Edge computing paradigms, benchmarking resource-constrained devices is a critical task to evaluate their suitability and performance. Between the employed devices, Single-Board Computers arise as multi-purpose and affordable systems. The literature has explore…
▽ More
In today's computing environment, where Artificial Intelligence (AI) and data processing are moving toward the Internet of Things (IoT) and Edge computing paradigms, benchmarking resource-constrained devices is a critical task to evaluate their suitability and performance. Between the employed devices, Single-Board Computers arise as multi-purpose and affordable systems. The literature has explored Single-Board Computers performance when running high-level benchmarks specialized in particular application scenarios, such as AI or medical applications. However, lower-level benchmarking applications and datasets are needed to enable new Edge-based AI solutions for network, system and service management based on device and component performance, such as individual device identification. Thus, this paper presents LwHBench, a low-level hardware benchmarking application for Single-Board Computers that measures the performance of CPU, GPU, Memory and Storage taking into account the component constraints in these types of devices. LwHBench has been implemented for Raspberry Pi devices and run for 100 days on a set of 45 devices to generate an extensive dataset that allows the usage of AI techniques in scenarios where performance data can help in the device management process. Besides, to demonstrate the inter-scenario capability of the dataset, a series of AI-enabled use cases about device identification and context impact on performance are presented as exploration of the published data. Finally, the benchmark application has been adapted and applied to an agriculture-focused scenario where three RockPro64 devices are present.
△ Less
Submitted 24 October, 2022; v1 submitted 18 April, 2022;
originally announced April 2022.
-
Studying the Robustness of Anti-adversarial Federated Learning Models Detecting Cyberattacks in IoT Spectrum Sensors
Authors:
Pedro Miguel Sánchez Sánchez,
Alberto Huertas Celdrán,
Timo Schenk,
Adrian Lars Benjamin Iten,
Gérôme Bovet,
Gregorio Martínez Pérez,
Burkhard Stiller
Abstract:
Device fingerprinting combined with Machine and Deep Learning (ML/DL) report promising performance when detecting cyberattacks targeting data managed by resource-constrained spectrum sensors. However, the amount of data needed to train models and the privacy concerns of such scenarios limit the applicability of centralized ML/DL-based approaches. Federated learning (FL) addresses these limitations…
▽ More
Device fingerprinting combined with Machine and Deep Learning (ML/DL) report promising performance when detecting cyberattacks targeting data managed by resource-constrained spectrum sensors. However, the amount of data needed to train models and the privacy concerns of such scenarios limit the applicability of centralized ML/DL-based approaches. Federated learning (FL) addresses these limitations by creating federated and privacy-preserving models. However, FL is vulnerable to malicious participants, and the impact of adversarial attacks on federated models detecting spectrum sensing data falsification (SSDF) attacks on spectrum sensors has not been studied. To address this challenge, the first contribution of this work is the creation of a novel dataset suitable for FL and modeling the behavior (usage of CPU, memory, or file system, among others) of resource-constrained spectrum sensors affected by different SSDF attacks. The second contribution is a pool of experiments analyzing and comparing the robustness of federated models according to i) three families of spectrum sensors, ii) eight SSDF attacks, iii) four scenarios dealing with unsupervised (anomaly detection) and supervised (binary classification) federated models, iv) up to 33% of malicious participants implementing data and model poisoning attacks, and v) four aggregation functions acting as anti-adversarial mechanisms to increase the models robustness.
△ Less
Submitted 31 January, 2022;
originally announced February 2022.
-
CyberSpec: Intelligent Behavioral Fingerprinting to Detect Attacks on Crowdsensing Spectrum Sensors
Authors:
Alberto Huertas Celdrán,
Pedro Miguel Sánchez Sánchez,
Gérôme Bovet,
Gregorio Martínez Pérez,
Burkhard Stiller
Abstract:
Integrated sensing and communication (ISAC) is a novel paradigm using crowdsensing spectrum sensors to help with the management of spectrum scarcity. However, well-known vulnerabilities of resource-constrained spectrum sensors and the possibility of being manipulated by users with physical access complicate their protection against spectrum sensing data falsification (SSDF) attacks. Most recent li…
▽ More
Integrated sensing and communication (ISAC) is a novel paradigm using crowdsensing spectrum sensors to help with the management of spectrum scarcity. However, well-known vulnerabilities of resource-constrained spectrum sensors and the possibility of being manipulated by users with physical access complicate their protection against spectrum sensing data falsification (SSDF) attacks. Most recent literature suggests using behavioral fingerprinting and Machine/Deep Learning (ML/DL) for improving similar cybersecurity issues. Nevertheless, the applicability of these techniques in resource-constrained devices, the impact of attacks affecting spectrum data integrity, and the performance and scalability of models suitable for heterogeneous sensors types are still open challenges. To improve limitations, this work presents seven SSDF attacks affecting spectrum sensors and introduces CyberSpec, an ML/DL-oriented framework using device behavioral fingerprinting to detect anomalies produced by SSDF attacks affecting resource-constrained spectrum sensors. CyberSpec has been implemented and validated in ElectroSense, a real crowdsensing RF monitoring platform where several configurations of the proposed SSDF attacks have been executed in different sensors. A pool of experiments with different unsupervised ML/DL-based models has demonstrated the suitability of CyberSpec detecting the previous attacks within an acceptable timeframe.
△ Less
Submitted 14 January, 2022;
originally announced January 2022.
-
Robust Federated Learning for execution time-based device model identification under label-flipping attack
Authors:
Pedro Miguel Sánchez Sánchez,
Alberto Huertas Celdrán,
José Rafael Buendía Rubio,
Gérôme Bovet,
Gregorio Martínez Pérez
Abstract:
The computing device deployment explosion experienced in recent years, motivated by the advances of technologies such as Internet-of-Things (IoT) and 5G, has led to a global scenario with increasing cybersecurity risks and threats. Among them, device spoofing and impersonation cyberattacks stand out due to their impact and, usually, low complexity required to be launched. To solve this issue, seve…
▽ More
The computing device deployment explosion experienced in recent years, motivated by the advances of technologies such as Internet-of-Things (IoT) and 5G, has led to a global scenario with increasing cybersecurity risks and threats. Among them, device spoofing and impersonation cyberattacks stand out due to their impact and, usually, low complexity required to be launched. To solve this issue, several solutions have emerged to identify device models and types based on the combination of behavioral fingerprinting and Machine/Deep Learning (ML/DL) techniques. However, these solutions are not appropriated for scenarios where data privacy and protection is a must, as they require data centralization for processing. In this context, newer approaches such as Federated Learning (FL) have not been fully explored yet, especially when malicious clients are present in the scenario setup. The present work analyzes and compares the device model identification performance of a centralized DL model with an FL one while using execution time-based events. For experimental purposes, a dataset containing execution-time features of 55 Raspberry Pis belonging to four different models has been collected and published. Using this dataset, the proposed solution achieved 0.9999 accuracy in both setups, centralized and federated, showing no performance decrease while preserving data privacy. Later, the impact of a label-flipping attack during the federated model training is evaluated, using several aggregation mechanisms as countermeasure. Zeno and coordinate-wise median aggregation show the best performance, although their performance greatly degrades when the percentage of fully malicious clients (all training samples poisoned) grows over 50%.
△ Less
Submitted 29 November, 2021;
originally announced November 2021.
-
Interpretations of the new LHCb $P_c(4337)^+$ pentaquark state
Authors:
Mao-Jun Yan,
Fang-Zheng Peng,
Mario Sánchez Sánchez,
Manuel Pavon Valderrama
Abstract:
Recently the LHCb collaboration has observed a new pentaquark state, the $P_c(4337)^+$. Owing to its proximity to the $χ_{c0}(1S) p$, $\bar{D}^* Λ_c$, $\bar{D} Σ_c$ and $\bar{D} Σ_c^*$ thresholds, this new pentaquark might very well be a meson-baryon bound state. However its spin and parity have not been determined yet and none of the previous possibilities can be ruled out. We briefly explore a f…
▽ More
Recently the LHCb collaboration has observed a new pentaquark state, the $P_c(4337)^+$. Owing to its proximity to the $χ_{c0}(1S) p$, $\bar{D}^* Λ_c$, $\bar{D} Σ_c$ and $\bar{D} Σ_c^*$ thresholds, this new pentaquark might very well be a meson-baryon bound state. However its spin and parity have not been determined yet and none of the previous possibilities can be ruled out. We briefly explore a few of these options and the consequences they entail in the present manuscript: (i) the $P_c(4337)^+$ might be a $χ_{c0}(1S) p$ bound state, (ii) the $P_c(4312)^+$ and $P_c(4337)^+$ might be $\bar{D}^* Λ_c$ and $\bar{D} Σ_c$ states close to threshold, respectively, where the Breit-Wigner mass might not correspond to the location of the poles, (iii) the locations of the $P_c(4312)^+$ and $P_c(4337)^+$ might be explained in terms of the $\bar{D}^* Λ_c$-$\bar{D} Σ_c$ and $\bar{D}^* Λ_c$-$\bar{D} Σ_c^*$ coupled channel dynamics. This last option, though not the most probable explanation, is still potentially compatible with the double peak solution of the $P_{cs}(4459)^0$ and with what we know of the $P_c(4312)^+$. As a byproduct of the previous explorations, we conjecture the existence of a series of anticharmed meson - antitriplet charmed baryon bound states and calculate their masses.
△ Less
Submitted 4 July, 2022; v1 submitted 11 August, 2021;
originally announced August 2021.
-
Collective magnetic excitations in AA- and AB-stacked graphene bilayers
Authors:
M. Sánchez Sánchez,
G. Gómez-Santos,
T. Stauber
Abstract:
We discuss novel transverse plasmon-polaritons that are hosted by AA- and AB-stacked bilayer graphene due to perfect nesting. They are composed of oscillating counterflow currents in between the layers, giving a clear interpretation for these collective modes as magnetic excitations carrying magnetic moment parallel to the planes. For AA-stacked bilayer graphene, these modes can reach zero frequen…
▽ More
We discuss novel transverse plasmon-polaritons that are hosted by AA- and AB-stacked bilayer graphene due to perfect nesting. They are composed of oscillating counterflow currents in between the layers, giving a clear interpretation for these collective modes as magnetic excitations carrying magnetic moment parallel to the planes. For AA-stacked bilayer graphene, these modes can reach zero frequency at the neutrality point and we thus predict a symmetry broken ground-state leading to in-plane orbital ferromagnetism. Even though it could be hard to detect them in real solid-state devices, these novel magnetic plasmons should be observable in artificial set-ups such as optical lattices. Also, our results might be relevant for magic angle twisted bilayer graphene samples as their electronic properties are mostly determined by confined AA-stacked regions.
△ Less
Submitted 11 December, 2021; v1 submitted 24 July, 2021;
originally announced July 2021.
-
A methodology to identify identical single-board computers based on hardware behavior fingerprinting
Authors:
Pedro Miguel Sánchez Sánchez,
José María Jorquera Valero,
Alberto Huertas Celdrán,
Gérôme Bovet,
Manuel Gil Pérez,
Gregorio Martínez Pérez
Abstract:
The connectivity and resource-constrained nature of single-board devices open the door to cybersecurity concerns affecting Internet of Things (IoT) scenarios. One of the most important issues is the presence of unauthorized IoT devices that want to impersonate legitimate ones by using identical hardware and software specifications. This situation can provoke sensitive information leakages, data po…
▽ More
The connectivity and resource-constrained nature of single-board devices open the door to cybersecurity concerns affecting Internet of Things (IoT) scenarios. One of the most important issues is the presence of unauthorized IoT devices that want to impersonate legitimate ones by using identical hardware and software specifications. This situation can provoke sensitive information leakages, data poisoning, or privilege escalation in IoT scenarios. Combining behavioral fingerprinting and Machine/Deep Learning (ML/DL) techniques is a promising approach to identify these malicious spoofing devices by detecting minor performance differences generated by imperfections in manufacturing. However, existing solutions are not suitable for single-board devices since they do not consider their hardware and software limitations, underestimate critical aspects such as fingerprint stability or context changes, and do not explore the potential of ML/DL techniques. To improve it, this work first identifies the essential properties for single-board device identification: uniqueness, stability, diversity, scalability, efficiency, robustness, and security. Then, a novel methodology relies on behavioral fingerprinting to identify identical single-board devices and meet the previous properties. The methodology leverages the different built-in components of the system and ML/DL techniques, comparing the device internal behavior with each other to detect manufacturing variations. The methodology validation has been performed in a real environment composed of 15 identical Raspberry Pi 4 B and 10 Raspberry Pi 3 B+ devices, obtaining a 91.9% average TPR and identifying all devices by setting a 50% threshold in the evaluation process. Finally, a discussion compares the proposed solution with related work, highlighting the fingerprint properties not met, and provides important lessons learned and limitations.
△ Less
Submitted 22 June, 2022; v1 submitted 15 June, 2021;
originally announced June 2021.
-
Federated Learning for Malware Detection in IoT Devices
Authors:
Valerian Rey,
Pedro Miguel Sánchez Sánchez,
Alberto Huertas Celdrán,
Gérôme Bovet,
Martin Jaggi
Abstract:
This work investigates the possibilities enabled by federated learning concerning IoT malware detection and studies security issues inherent to this new learning paradigm. In this context, a framework that uses federated learning to detect malware affecting IoT devices is presented. N-BaIoT, a dataset modeling network traffic of several real IoT devices while affected by malware, has been used to…
▽ More
This work investigates the possibilities enabled by federated learning concerning IoT malware detection and studies security issues inherent to this new learning paradigm. In this context, a framework that uses federated learning to detect malware affecting IoT devices is presented. N-BaIoT, a dataset modeling network traffic of several real IoT devices while affected by malware, has been used to evaluate the proposed framework. Both supervised and unsupervised federated models (multi-layer perceptron and autoencoder) able to detect malware affecting seen and unseen IoT devices of N-BaIoT have been trained and evaluated. Furthermore, their performance has been compared to two traditional approaches. The first one lets each participant locally train a model using only its own data, while the second consists of making the participants share their data with a central entity in charge of training a global model. This comparison has shown that the use of more diverse and large data, as done in the federated and centralized methods, has a considerable positive impact on the model performance. Besides, the federated models, while preserving the participant's privacy, show similar results as the centralized ones. As an additional contribution and to measure the robustness of the federated approach, an adversarial setup with several malicious participants poisoning the federated model has been considered. The baseline model aggregation averaging step used in most federated learning algorithms appears highly vulnerable to different attacks, even with a single adversary. The performance of other model aggregation functions acting as countermeasures is thus evaluated under the same attack scenarios. These functions provide a significant improvement against malicious participants, but more efforts are still needed to make federated approaches robust.
△ Less
Submitted 19 November, 2021; v1 submitted 15 April, 2021;
originally announced April 2021.
-
Cutoff effects in Hartree-Fock calculations at leading order of chiral effective field theory
Authors:
M. Sánchez Sánchez,
Dao Duy Duc,
L. Bonneau
Abstract:
We explore the effects on nuclear bulk properties of using regularization cutoffs larger than the nucleon mass within the chiral effective field theory with a power counting that ensures order-by-order renormalization in the two-nucleon system. To do so we calculate ground-state properties of the $^{16}$O nucleus in the Hartree--Fock approach in a basis made up of plane waves confined in a cube. W…
▽ More
We explore the effects on nuclear bulk properties of using regularization cutoffs larger than the nucleon mass within the chiral effective field theory with a power counting that ensures order-by-order renormalization in the two-nucleon system. To do so we calculate ground-state properties of the $^{16}$O nucleus in the Hartree--Fock approach in a basis made up of plane waves confined in a cube. We find that regularization cutoff effects manifest themselves in two distinct ways: a strong sensitivity to the the counter-terms in attractive singular partial waves (related to the sign of the corresponding low-energy constant) and to the correction for spurious deeply bound states (for high enough cutoffs). In fact the latter happens to deprive the Hartree--Fock approximation of yielding bound solutions in nuclei. We conclude that, when using a leading-order chiral potential in the Nogga--Timmermans--van Kolck's power counting (with a regularization cutoff higher than the nucleon mass), one cannot produce a selfconsistent mean field free of spurious bound-state effects that can serve as a reference state for beyond-mean-field methods. For high regularization cutoffs which yield an attractive $^3S_1$ contact potential, one can at best incorporate in the mean-field solution a partial correction for spurious bound states. Then the remaining correction has to be added to the residual interaction in a treatment beyond the Hartree--Fock approximation. In fact a ``full'' correction in the $^3D_2$ channel, with energy shifts of the order of or somewhat larger than those recommended in Phys. Rev. C 103, 054304 (2021), is possible.
△ Less
Submitted 16 April, 2023; v1 submitted 12 April, 2021;
originally announced April 2021.
-
Axial meson exchange and the $Z_c(3900)$ and $Z_{cs}(3985)$ resonances as heavy hadron molecules
Authors:
Mao-Jun Yan,
Fang-Zheng Peng,
Mario Sánchez Sánchez,
Manuel Pavon Valderrama
Abstract:
Early speculations about the existence of heavy hadron molecules were grounded on the idea that light-meson exchanges forces could lead to binding. In analogy to the deuteron, the light-mesons usually considered include the pion, sigma, rho and omega, but not the axial meson $a_1(1260)$. Though it has been argued in the past that the coupling of the axial meson to the nucleons is indeed strong, it…
▽ More
Early speculations about the existence of heavy hadron molecules were grounded on the idea that light-meson exchanges forces could lead to binding. In analogy to the deuteron, the light-mesons usually considered include the pion, sigma, rho and omega, but not the axial meson $a_1(1260)$. Though it has been argued in the past that the coupling of the axial meson to the nucleons is indeed strong, its mass is considerably heavier than that of the vector mesons and thus its exchange ends up being suppressed. Yet, this is not necessarily the case in heavy hadrons molecules: we find that even though the contribution to binding from the axial meson is modest, it cannot be neglected in the isovector sector where vector meson exchange cancels out. This might provide a natural binding mechanism for molecular candidates such as the $Z_c(3900)$, $Z_c(4020)$ or the more recently observed $Z_{cs}(3985)$. However the $Z_{cs}(3985)$ is more dependent on a mixture of different factors, which (besides axial meson exchange) include $η$ exchange and the nature of scalar meson exchange. Together they point towards the existence of two $Z_{cs}(3985)$-like resonances instead of one, while the observations about the role of scalar meson exchange in the $Z_{cs}(3985)$ might be relevant for the $P_{cs}(4459)$. Finally, the combination of axial meson exchange and flavor symmetry breaking effects indicates that the isovector $J^{PC} = 0^{++}$ $D^*\bar{D}^*$ and the strange $J^P = 2^{+}$ $D^*\bar{D}_s^*$ molecules are the most attractive configurations and thus the most likely molecular partners of the $Z_c(3900)$, $Z_c(4020)$ and $Z_{cs}(3985)$.
△ Less
Submitted 21 December, 2021; v1 submitted 25 February, 2021;
originally announced February 2021.
-
Heavy-hadron molecular spectrum from light-meson exchange saturation
Authors:
Fang-Zheng Peng,
Mario Sánchez Sánchez,
Mao-Jun Yan,
Manuel Pavon Valderrama
Abstract:
If known, the spectrum of heavy-hadron molecules will be a key tool to disentangle the nature of the exotic states that are being discovered in experiments. Here we argue that the general features of the molecular spectrum can be deduced from the idea that the short-range interaction between the heavy hadrons is effectively described by scalar and vector meson exchange, i.e. the $σ$, $ω$ and $ρ$ m…
▽ More
If known, the spectrum of heavy-hadron molecules will be a key tool to disentangle the nature of the exotic states that are being discovered in experiments. Here we argue that the general features of the molecular spectrum can be deduced from the idea that the short-range interaction between the heavy hadrons is effectively described by scalar and vector meson exchange, i.e. the $σ$, $ω$ and $ρ$ mesons. By means of a contact-range theory where the couplings are saturated by the aforementioned light mesons we are indeed able to postdict the $X(3872)$ (as a $D^* \bar{D}$ molecule) from the three $P_c(4312)$, $P_c(4440)$ and $P_c(4457)$ pentaquarks (as $\bar{D}Σ_c$ and $\bar{D}^* Σ_c$ molecules). We predict a $J^{PC} = 1^{--}$ $D \bar{D}_1$ molecule at $4240-4260\,{\rm MeV}$ which might support the hypothesis that the $Y(4260)$ is at least partly molecular. The extension of these ideas to the light baryons requires minor modifications, after which we recover approximate SU(4)-Wigner symmetry in the two-nucleon system and approximately reproduce the masses of the deuteron and the virtual state.
△ Less
Submitted 28 February, 2022; v1 submitted 18 January, 2021;
originally announced January 2021.
-
The $P_{cs}(4459)$ pentaquark from a combined effective field theory and phenomenological perspective
Authors:
Fang-Zheng Peng,
Mao-Jun Yan,
Mario Sánchez Sánchez,
Manuel Pavon Valderrama
Abstract:
The observation of the $P_{cs}(4459)$ by the LHCb collaboration adds a new member to the set of known hidden-charm pentaquarks, which includes the $P_c(4312)$, $P_c(4440)$ and $P_c(4457)$. The $P_{cs}(4459)$ is expected to have the light-quark content of a $Λ$ baryon ($I=0$, $S=-1$), but its spin is unknown. Its closeness to the $\bar{D}^* Ξ_c$ threshold -- $4478\,{\rm MeV}$ in the isospin-symmetr…
▽ More
The observation of the $P_{cs}(4459)$ by the LHCb collaboration adds a new member to the set of known hidden-charm pentaquarks, which includes the $P_c(4312)$, $P_c(4440)$ and $P_c(4457)$. The $P_{cs}(4459)$ is expected to have the light-quark content of a $Λ$ baryon ($I=0$, $S=-1$), but its spin is unknown. Its closeness to the $\bar{D}^* Ξ_c$ threshold -- $4478\,{\rm MeV}$ in the isospin-symmetric limit -- suggests the molecular hypothesis as a plausible explanation for the $P_{cs}(4459)$. While in the absence of coupled-channel dynamics heavy-quark spin symmetry predicts the two spin-states of the $\bar{D}^* Ξ_c$ to be degenerate, power counting arguments indicate that the coupling with the nearby $\bar{D} Ξ_c'$ and $\bar{D} Ξ_c^*$ channels might be a leading order effect. This generates a hyperfine splitting in which the $J=\tfrac{3}{2}$ $\bar{D}^* Ξ_c$ pentaquark will be lighter than the $J=\tfrac{1}{2}$ configuration, which we estimate to be of the order of $5-15\,{\rm MeV}$. We also point out an accidental symmetry between the $P_{cs}(4459)$ and $P_c(4440/4457)$ potentials. Finally, we argue that the spectroscopy and the $J/ψΛ$ decays of the $P_{cs}(4459)$ might suggest a marginal preference for $J = \tfrac{3}{2}$ over $J = \tfrac{1}{2}$.
△ Less
Submitted 4 August, 2021; v1 submitted 3 November, 2020;
originally announced November 2020.
-
A Survey on Device Behavior Fingerprinting: Data Sources, Techniques, Application Scenarios, and Datasets
Authors:
Pedro Miguel Sánchez Sánchez,
Jose María Jorquera Valero,
Alberto Huertas Celdrán,
Gérôme Bovet,
Manuel Gil Pérez,
Gregorio Martínez Pérez
Abstract:
In the current network-based computing world, where the number of interconnected devices grows exponentially, their diversity, malfunctions, and cybersecurity threats are increasing at the same rate. To guarantee the correct functioning and performance of novel environments such as Smart Cities, Industry 4.0, or crowdsensing, it is crucial to identify the capabilities of their devices (e.g., senso…
▽ More
In the current network-based computing world, where the number of interconnected devices grows exponentially, their diversity, malfunctions, and cybersecurity threats are increasing at the same rate. To guarantee the correct functioning and performance of novel environments such as Smart Cities, Industry 4.0, or crowdsensing, it is crucial to identify the capabilities of their devices (e.g., sensors, actuators) and detect potential misbehavior that may arise due to cyberattacks, system faults, or misconfigurations. With this goal in mind, a promising research field emerged focusing on creating and managing fingerprints that model the behavior of both the device actions and its components. The article at hand studies the recent growth of the device behavior fingerprinting field in terms of application scenarios, behavioral sources, and processing and evaluation techniques. First, it performs a comprehensive review of the device types, behavioral data, and processing and evaluation techniques used by the most recent and representative research works dealing with two major scenarios: device identification and device misbehavior detection. After that, each work is deeply analyzed and compared, emphasizing its characteristics, advantages, and limitations. This article also provides researchers with a review of the most relevant characteristics of existing datasets as most of the novel processing techniques are based on machine learning and deep learning. Finally, it studies the evolution of these two scenarios in recent years, providing lessons learned, current trends, and future research challenges to guide new solutions in the area.
△ Less
Submitted 3 March, 2021; v1 submitted 7 August, 2020;
originally announced August 2020.
-
Peaks within peaks and the possible two-peak structure of the Pc(4457): the effective field theory perspective
Authors:
Fang-Zheng Peng,
Jun-Xu Lu,
Mario Sánchez Sánchez,
Mao-Jun Yan,
Manuel Pavon Valderrama
Abstract:
The LHCb pentaquarks -- the $P_c(4312)$, $P_c(4440)$ and $P_c(4457)$ -- have been theorized to be $Σ_c \bar{D}$ and $Σ_c \bar{D}^*$ S-wave molecules. Here we explore the possibility that two of these pentaquarks -- the $P_c(4440)$ and $P_c(4457)$ -- contain in addition a $Λ_c(2595) \bar{D}$ component in P-wave. We will analyze the effects of this extra channel within two effective field theories:…
▽ More
The LHCb pentaquarks -- the $P_c(4312)$, $P_c(4440)$ and $P_c(4457)$ -- have been theorized to be $Σ_c \bar{D}$ and $Σ_c \bar{D}^*$ S-wave molecules. Here we explore the possibility that two of these pentaquarks -- the $P_c(4440)$ and $P_c(4457)$ -- contain in addition a $Λ_c(2595) \bar{D}$ component in P-wave. We will analyze the effects of this extra channel within two effective field theories: the first one will be a standard contact-range effective field theory and the second one will include the non-diagonal pion dynamics connecting the $Σ_c \bar{D}^*$ and $Λ_c(2595) \bar{D}$ channels, which happens to be unusually long-ranged. The impact of the coupled-channel dynamics between the $Σ_c \bar{D}^*$ and $Λ_c(2595) \bar{D}$ components is modest at best for the $P_c(4440)$ and $P_c(4457)$, which will remain to be predominantly $Σ_c \bar{D}^*$ molecules. However, if the quantum numbers of the $P_c(4457)$ are $J^P = \frac{1}{2}^-$, the coupled-channel dynamics is likely to induce the binding of a $Λ_c(2595) \bar{D}$ S-wave molecule (coupled to $Σ_c \bar{D}^*$ in P-wave) with $J^P = \frac{1}{2}^+$ and a mass similar to the $P_c(4457)$. If this is the case, the $P_c(4457)$ could actually be a double peak containing two different pentaquark states.
△ Less
Submitted 22 January, 2021; v1 submitted 2 July, 2020;
originally announced July 2020.
-
AuthCODE: A Privacy-preserving and Multi-device Continuous Authentication Architecture based on Machine and Deep Learning
Authors:
Pedro Miguel Sánchez Sánchez,
Alberto Huertas Celdrán,
Lorenzo Fernández Maimó,
Gregorio Martínez Pérez
Abstract:
The authentication field is evolving towards mechanisms able to keep users continuously authenticated without the necessity of remembering or possessing authentication credentials. While existing continuous authentication systems have demonstrated their suitability for single-device scenarios, the Internet of Things and next generation of mobile networks (5G) are enabling novel multi-device scenar…
▽ More
The authentication field is evolving towards mechanisms able to keep users continuously authenticated without the necessity of remembering or possessing authentication credentials. While existing continuous authentication systems have demonstrated their suitability for single-device scenarios, the Internet of Things and next generation of mobile networks (5G) are enabling novel multi-device scenarios -- such as Smart Offices -- where continuous authentication is still an open challenge. The paper at hand, proposes an AI-based, privacy-preserving and multi-device continuous authentication architecture called AuthCODE. A realistic Smart Office scenario with several users, interacting with their mobile devices and personal computer, has been used to create a set of single- and multi-device behavioural datasets and validate AuthCODE. A pool of experiments with machine and deep learning classifiers measured the impact of time in authentication accuracy and improved the results of single-device approaches by considering multi-device behaviour profiles. The f1-score average reached for XGBoost on multi-device profiles based on 1-minute windows was 99.33%, while the best performance achieved for single devices was lower than 97.39%. The inclusion of temporal information in the form of vector sequences classified by a Long-Short Term Memory Network, allowed the identification of additional complex behaviour patterns associated to each user, resulting in an average f1-score of 99.02% on identification of long-term behaviours.
△ Less
Submitted 30 November, 2020; v1 submitted 16 April, 2020;
originally announced April 2020.
-
Heavy-hadron molecules from light-meson-exchange saturation
Authors:
Fang-Zheng Peng,
Ming-Zhu Liu,
Mario Sánchez Sánchez,
Manuel Pavon Valderrama
Abstract:
In the effective field theory framework the interaction between two heavy hadrons can be decomposed into a long- and a short-range piece. The long-range piece corresponds to the one-pion-exchange potential and is relatively well-known. The short-range piece is given by a series of contact-range interactions with unknown couplings, which substitute the less well-known short-range dynamics. While th…
▽ More
In the effective field theory framework the interaction between two heavy hadrons can be decomposed into a long- and a short-range piece. The long-range piece corresponds to the one-pion-exchange potential and is relatively well-known. The short-range piece is given by a series of contact-range interactions with unknown couplings, which substitute the less well-known short-range dynamics. While the general structure of the short-range potential between heavy hadrons is heavily constrained from heavy-quark symmetry, the couplings are still free parameters. Here we argue that the relative strength and the sign of these couplings can be estimated from the hypothesis that they are saturated by the exchange of light mesons, in particular the vector mesons $ρ$ and $ω$, i.e. from resonance saturation. However, we propose a novel saturation procedure that effectively removes form-factor artifacts. From this we can determine in which spin and isospin configurations the low-energy constants are most attractive for specific two-heavy-hadron systems. In general the molecular states with lower isospins and higher spins will be more attractive and thus more probable candidates to form heavy-hadron molecules. This pattern is compatible with the interpretation of the $X(3872)$ and $P_c(4312/4440/4457)$ as molecular states, but it is not applicable to states with maximum isospin like the $Z_c(3900/4020)$.
△ Less
Submitted 14 December, 2020; v1 submitted 12 April, 2020;
originally announced April 2020.
-
Improved description of light nuclei through chiral effective field theory at leading order
Authors:
M. Sanchez Sanchez,
N. A. Smirnova,
A. M. Shirokov,
P. Maris,
J. P. Vary
Abstract:
We propose an arrangement of the most commonly invoked version of the two-nucleon chiral potential such that the low-lying amplitude zero of the 1S0 partial wave is captured at leading order of the effective expansion. Adopting other partial waves from the LENPIC interaction, we show how this modification yields an improved description of ground-state energies and point-proton radii of three test…
▽ More
We propose an arrangement of the most commonly invoked version of the two-nucleon chiral potential such that the low-lying amplitude zero of the 1S0 partial wave is captured at leading order of the effective expansion. Adopting other partial waves from the LENPIC interaction, we show how this modification yields an improved description of ground-state energies and point-proton radii of three test nuclei.
△ Less
Submitted 2 March, 2020; v1 submitted 27 February, 2020;
originally announced February 2020.
-
Model independent determination of the spins of the $P_{c}$(4440) and $P_{c}$(4457) from the spectroscopy of the triply charmed dibaryons
Authors:
Ya-Wen Pan,
Ming-Zhu Liu,
Fang-Zheng Peng,
Mario Sánchez Sánchez,
Li-Sheng Geng,
Manuel Pavon Valderrama
Abstract:
The LHCb collaboration has recently observed three narrow pentaquark states --- the $P_c(4312)$, $P_c(4440)$, and $P_c(4457)$ ---that are located close to the $\bar{D} Σ_c$ and $\bar{D}^* Σ_c$ thresholds. Among the so-far proposed theoretical interpretations for these pentaquarks, the molecular hypothesis seems to be the preferred one. Nevertheless, in the molecular picture the spins of the…
▽ More
The LHCb collaboration has recently observed three narrow pentaquark states --- the $P_c(4312)$, $P_c(4440)$, and $P_c(4457)$ ---that are located close to the $\bar{D} Σ_c$ and $\bar{D}^* Σ_c$ thresholds. Among the so-far proposed theoretical interpretations for these pentaquarks, the molecular hypothesis seems to be the preferred one. Nevertheless, in the molecular picture the spins of the $P_c(4440)$ and $P_c(4457)$ have not been unambiguously determined yet. In this letter we point out that heavy antiquark-diquark symmetry induces a model-independent relation between the spin-splitting in the masses of the $P_c(4440)$ and $P_c(4457)$ $\bar{D}^* Σ_c$ pentaquarks and the corresponding splitting for the $0^+$ and $1^+$ $Ξ_{cc} Σ_c$ triply charmed dibaryons. This is particularly relevant owing to a recent lattice QCD prediction of the $1^+$ triply charmed dibaryon, which suggests that a calculation of the mass of its $0^+$ partner might be within reach. This in turn would reveal the spins of the $P_c(4440)$ and $P_c(4457)$ pentaquarks, providing a highly nontrivial test of heavy-quark symmetry and the molecular nature of the pentaquarks. Furthermore, the molecular interpretation of the hidden-charm pentaquarks implies the existence of a total of ten triply charmed dibaryons as $Ξ_{cc}^{(*)} Σ_c^{(*)}$ molecules, which, if confirmed in the lattice, will largely expand our understanding of the non-perturbative strong interaction in the heavy-quark sector.
△ Less
Submitted 25 July, 2019;
originally announced July 2019.
-
Spin-parities of the $P_c(4440)$ and $P_c(4457)$ in the One-Boson-Exchange Model
Authors:
Ming-Zhu Liu,
Tian-Wei Wu,
Mario Sánchez Sánchez,
Manuel Pavon Valderrama,
Li-Sheng Geng,
Ju-Jun Xie
Abstract:
The LHCb collaboration has recently observed three pentaquark peaks, the $P_c(4312)$, $P_c(4440)$ and $P_c(4457)$. They are very close to a pair of heavy baryon-meson thresholds, with the $P_c(4312)$ located $8.9\,{\rm MeV}$ below the $\bar{D} Σ_c$ threshold, and the $P_c(4440)$ and $P_c(4457)$ located $21.8$ and $4.8\,{\rm MeV}$ below the $\bar{D}^* Σ_c$ one. The spin-parities of these three stat…
▽ More
The LHCb collaboration has recently observed three pentaquark peaks, the $P_c(4312)$, $P_c(4440)$ and $P_c(4457)$. They are very close to a pair of heavy baryon-meson thresholds, with the $P_c(4312)$ located $8.9\,{\rm MeV}$ below the $\bar{D} Σ_c$ threshold, and the $P_c(4440)$ and $P_c(4457)$ located $21.8$ and $4.8\,{\rm MeV}$ below the $\bar{D}^* Σ_c$ one. The spin-parities of these three states have not been measured yet. In this work we assume that the $P_c(4312)$ is a $J^P = \tfrac{1}{2}^{-}$ $\bar{D} Σ_c$ bound state, while the $P_c(4440)$ and $P_c(4457)$ are $\bar{D}^* Σ_c$ bound states of unknown spin-parity, where we notice that the consistent description of the three pentaquarks in the one-boson-exchange model can indeed determine the spin and parities of the later, i.e. of the two $\bar{D}^* Σ_c$ molecular candidates. For this determination we revisit first the one-boson-exchange model, which in its original formulation contains a short-range delta-like contribution in the spin-spin component of the potential. We argue that it is better to remove these delta-like contributions because, in this way, the one-boson-exchange potential will comply with the naive expectation that the form factors should not have a significant impact in the long-range part of the potential (in particular the one-pion-exchange part). Once this is done, we find that it is possible to consistently describe the three pentaquarks, to the point that the $P_c(4440)$ and $P_c(4457)$ can be predicted from the $P_c(4312)$ within a couple of MeV with respect to their experimental location. In addition the so-constructed one-boson-exchange model predicts the preferred quantum numbers of the $P_c(4440)$ and $P_c(4457)$ molecular pentaquarks to be $\tfrac{3}{2}^-$ and $\tfrac{1}{2}^-$, respectively.
△ Less
Submitted 4 March, 2021; v1 submitted 13 July, 2019;
originally announced July 2019.