-
Towards quantum-enabled cell-centric therapeutics
Authors:
Saugata Basu,
Jannis Born,
Aritra Bose,
Sara Capponi,
Dimitra Chalkia,
Timothy A Chan,
Hakan Doga,
Frederik F. Flother,
Gad Getz,
Mark Goldsmith,
Tanvi Gujarati,
Aldo Guzman-Saenz,
Dimitrios Iliopoulos,
Gavin O. Jones,
Stefan Knecht,
Dhiraj Madan,
Sabrina Maniscalco,
Nicola Mariella,
Joseph A. Morrone,
Khadijeh Najafi,
Pushpak Pati,
Daniel Platt,
Maria Anna Rapsomaniki,
Anupama Ray,
Kahn Rhrissorrakrai
, et al. (8 additional authors not shown)
Abstract:
In recent years, there has been tremendous progress in the development of quantum computing hardware, algorithms and services leading to the expectation that in the near future quantum computers will be capable of performing simulations for natural science applications, operations research, and machine learning at scales mostly inaccessible to classical computers. Whereas the impact of quantum com…
▽ More
In recent years, there has been tremendous progress in the development of quantum computing hardware, algorithms and services leading to the expectation that in the near future quantum computers will be capable of performing simulations for natural science applications, operations research, and machine learning at scales mostly inaccessible to classical computers. Whereas the impact of quantum computing has already started to be recognized in fields such as cryptanalysis, natural science simulations, and optimization among others, very little is known about the full potential of quantum computing simulations and machine learning in the realm of healthcare and life science (HCLS). Herein, we discuss the transformational changes we expect from the use of quantum computation for HCLS research, more specifically in the field of cell-centric therapeutics. Moreover, we identify and elaborate open problems in cell engineering, tissue modeling, perturbation modeling, and bio-topology while discussing candidate quantum algorithms for research on these topics and their potential advantages over classical computational approaches.
△ Less
Submitted 1 August, 2023; v1 submitted 11 July, 2023;
originally announced July 2023.
-
Darwin inside the machines: Malware evolution and the consequences for computer security
Authors:
D. Iliopoulos,
C. Adami,
P. Szor
Abstract:
Recent advances in anti-malware technologies have steered the security industry away from maintaining vast signature databases and into newer defence technologies such as behaviour blocking, application whitelisting and others. Most would agree that the reasoning behind this is to keep up with the arms race established between malware writers and the security community almost three decades ago. St…
▽ More
Recent advances in anti-malware technologies have steered the security industry away from maintaining vast signature databases and into newer defence technologies such as behaviour blocking, application whitelisting and others. Most would agree that the reasoning behind this is to keep up with the arms race established between malware writers and the security community almost three decades ago. Still, malware writers have not as yet created new paradigms. Indeed, malicious code development is still largely limited to code pattern changes utilizing polymorphic and metamorphic engines, as well as executable packer and wrapper technologies. Each new malware instance retains the exact same core functionality as its ancestor and only alters the way it looks. What if, instead, malware were able to change its function or behaviour autonomously? What if, in the absence of human intervention, computer viruses resembled biological viruses in their ability to adapt to new defence technologies as soon as they came into effect? In this paper, we will provide the theoretical proof behind malware implementation that closely models Darwinian evolution.
△ Less
Submitted 10 November, 2011;
originally announced November 2011.
-
Critical dynamics in the evolution of stochastic strategies for the iterated Prisoner's Dilemma
Authors:
Dimitris Iliopoulos,
Arend Hintze,
Christoph Adami
Abstract:
The observed cooperation on the level of genes, cells, tissues, and individuals has been the object of intense study by evolutionary biologists, mainly because cooperation often flourishes in biological systems in apparent contradiction to the selfish goal of survival inherent in Darwinian evolution. In order to resolve this paradox, evolutionary game theory has focused on the Prisoner's Dilemma…
▽ More
The observed cooperation on the level of genes, cells, tissues, and individuals has been the object of intense study by evolutionary biologists, mainly because cooperation often flourishes in biological systems in apparent contradiction to the selfish goal of survival inherent in Darwinian evolution. In order to resolve this paradox, evolutionary game theory has focused on the Prisoner's Dilemma (PD), which incorporates the essence of this conflict. Here, we encode strategies for the iterated Prisoner's Dilemma (IPD) in terms of conditional probabilities that represent the response of decision pathways given previous plays. We find that if these stochastic strategies are encoded as genes that undergo Darwinian evolution, the environmental conditions that the strategies are adapting to determine the fixed point of the evolutionary trajectory, which could be either cooperation or defection. A transition between cooperative and defective attractors occurs as a function of different parameters such a mutation rate, replacement rate, and memory, all of which affect a player's ability to predict an opponent's behavior.
△ Less
Submitted 7 September, 2010; v1 submitted 12 April, 2010;
originally announced April 2010.