Zum Hauptinhalt springen

Showing 1–20 of 20 results for author: Yung, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.09442  [pdf, other

    cs.CR

    Correcting Subverted Random Oracles

    Authors: Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou, Jiadong Zhu

    Abstract: The random oracle methodology has proven to be a powerful tool for designing and reasoning about cryptographic schemes. In this paper, we focus on the basic problem of correcting faulty or adversarially corrupted random oracles, so that they can be confidently applied for such cryptographic purposes. We prove that a simple construction can transform a "subverted" random oracle which disagrees wi… ▽ More

    Submitted 15 April, 2024; originally announced April 2024.

  2. arXiv:2404.05106  [pdf, other

    cs.CR

    Stop Stealing My Data: Sanitizing Stego Channels in 3D Printing Design Files

    Authors: Aleksandr Dolgavin, Mark Yampolskiy, Moti Yung

    Abstract: The increased adoption of additive manufacturing (AM) and the acceptance of AM outsourcing created an ecosystem in which the sending and receiving of digital designs by different actors became normal. It has recently been shown that the STL design files -- most commonly used in AM -- contain steganographic channels. Such channels can allow additional data to be embedded within the STL files withou… ▽ More

    Submitted 7 April, 2024; originally announced April 2024.

    Comments: CODASPY'24

  3. arXiv:2402.01791  [pdf, other

    quant-ph cs.AI cs.ET cs.LG

    Variational Quantum Circuits Enhanced Generative Adversarial Network

    Authors: Runqiu Shu, Xusheng Xu, Man-Hong Yung, Wei Cui

    Abstract: Generative adversarial network (GAN) is one of the widely-adopted machine-learning frameworks for a wide range of applications such as generating high-quality images, video, and audio contents. However, training a GAN could become computationally expensive for large neural networks. In this work, we propose a hybrid quantum-classical architecture for improving GAN (denoted as QC-GAN). The performa… ▽ More

    Submitted 1 February, 2024; originally announced February 2024.

  4. arXiv:2401.12999  [pdf, other

    physics.chem-ph cs.AI cs.LG

    Quantum-Inspired Machine Learning for Molecular Docking

    Authors: Runqiu Shu, Bowen Liu, Zhaoping Xiong, Xiaopeng Cui, Yunting Li, Wei Cui, Man-Hong Yung, Nan Qiao

    Abstract: Molecular docking is an important tool for structure-based drug design, accelerating the efficiency of drug development. Complex and dynamic binding processes between proteins and small molecules require searching and sampling over a wide spatial range. Traditional docking by searching for possible binding sites and conformations is computationally complex and results poorly under blind docking. Q… ▽ More

    Submitted 21 February, 2024; v1 submitted 22 January, 2024; originally announced January 2024.

  5. arXiv:2305.20043  [pdf, ps, other

    cs.LG stat.ML

    Deception by Omission: Using Adversarial Missingness to Poison Causal Structure Learning

    Authors: Deniz Koyuncu, Alex Gittens, Bülent Yener, Moti Yung

    Abstract: Inference of causal structures from observational data is a key component of causal machine learning; in practice, this data may be incompletely observed. Prior work has demonstrated that adversarial perturbations of completely observed training data may be used to force the learning of inaccurate causal structural models (SCMs). However, when the data can be audited for correctness (e.g., it is c… ▽ More

    Submitted 31 May, 2023; originally announced May 2023.

  6. Privacy Guarantees of BLE Contact Tracing: A Case Study on COVIDWISE

    Authors: Salman Ahmed, Ya Xiao, Taejoong, Chung, Carol Fung, Moti Yung, Danfeng, Yao

    Abstract: Google and Apple jointly introduced a digital contact tracing technology and an API called "exposure notification," to help health organizations and governments with contact tracing. The technology and its interplay with security and privacy constraints require investigation. In this study, we examine and analyze the security, privacy, and reliability of the technology with actual and typical scen… ▽ More

    Submitted 16 December, 2021; v1 submitted 16 November, 2021; originally announced November 2021.

    Comments: \{copyright} 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works

    Journal ref: IEEE Computer 2021

  7. BAR: Blockwise Adaptive Recoding for Batched Network Coding

    Authors: Hoover H. F. Yin, Shenghao Yang, Qiaoqiao Zhou, Lily M. L. Yung, Ka Hei Ng

    Abstract: Multi-hop networks become popular network topologies in various emerging Internet of things applications. Batched network coding (BNC) is a solution to reliable communications in such networks with packet loss. By grouping packets into small batches and restricting recoding to the packets belonging to the same batch, BNC has a much smaller computational and storage requirements at the intermediate… ▽ More

    Submitted 17 May, 2021; originally announced May 2021.

    Comments: submitted for journal publication

  8. arXiv:2005.03447  [pdf, other

    cs.LG stat.ME stat.ML

    Feature Selection Methods for Uplift Modeling and Heterogeneous Treatment Effect

    Authors: Zhenyu Zhao, Yumin Zhang, Totte Harinen, Mike Yung

    Abstract: Uplift modeling is a causal learning technique that estimates subgroup-level treatment effects. It is commonly used in industry and elsewhere for tasks such as targeting ads. In a typical setting, uplift models can take thousands of features as inputs, which is costly and results in problems such as overfitting and poor model interpretability. Consequently, there is a need to select a subset of th… ▽ More

    Submitted 8 July, 2022; v1 submitted 4 May, 2020; originally announced May 2020.

  9. arXiv:2002.11631  [pdf, other

    cs.CY cs.LG stat.CO stat.ML

    CausalML: Python Package for Causal Machine Learning

    Authors: Huigang Chen, Totte Harinen, Jeong-Yoon Lee, Mike Yung, Zhenyu Zhao

    Abstract: CausalML is a Python implementation of algorithms related to causal inference and machine learning. Algorithms combining causal inference and machine learning have been a trending topic in recent years. This package tries to bridge the gap between theoretical work on methodology and practical applications by making a collection of methods in this field available in Python. This paper introduces th… ▽ More

    Submitted 2 March, 2020; v1 submitted 25 February, 2020; originally announced February 2020.

  10. arXiv:1906.00324  [pdf, other

    quant-ph cs.CC

    Ubiquitous Complexity of Entanglement Spectra

    Authors: Bin Cheng, Man-Hong Yung

    Abstract: In recent years, the entanglement spectra of quantum states have been identified to be highly valuable for improving our understanding on many problems in quantum physics, such as classification of topological phases, symmetry-breaking phases, and eigenstate thermalization, etc. However, it remains a major challenge to fully characterize the entanglement spectrum of a given quantum state. An outst… ▽ More

    Submitted 1 June, 2019; originally announced June 2019.

    Comments: Comments welcome

  11. arXiv:1904.02165  [pdf, other

    physics.optics cs.LG

    Low-Depth Optical Neural Networks

    Authors: Xiao-Ming Zhang, Man-Hong Yung

    Abstract: Optical neural network (ONN) is emerging as an attractive proposal for machine-learning applications, enabling high-speed computation with low-energy consumption. However, there are several challenges in applying ONN for industrial applications, including the realization of activation functions and maintaining stability. In particular, the stability of ONNs decrease with the circuit depth, limitin… ▽ More

    Submitted 18 May, 2019; v1 submitted 3 April, 2019; originally announced April 2019.

    Comments: 16 pages, 6 figures

  12. arXiv:1902.00869  [pdf, ps, other

    quant-ph cs.LG

    Quantum Speedup in Adaptive Boosting of Binary Classification

    Authors: Ximing Wang, Yuechi Ma, Min-Hsiu Hsieh, Manhong Yung

    Abstract: In classical machine learning, a set of weak classifiers can be adaptively combined to form a strong classifier for improving the overall performance, a technique called adaptive boosting (or AdaBoost). However, constructing the strong classifier for a large data set is typically resource consuming. Here we propose a quantum extension of AdaBoost, demonstrating a quantum algorithm that can output… ▽ More

    Submitted 3 February, 2019; originally announced February 2019.

  13. arXiv:1807.04369  [pdf, other

    cs.CR cs.LG stat.ML

    Differentially-Private "Draw and Discard" Machine Learning

    Authors: Vasyl Pihur, Aleksandra Korolova, Frederick Liu, Subhash Sankuratripati, Moti Yung, Dachuan Huang, Ruogu Zeng

    Abstract: In this work, we propose a novel framework for privacy-preserving client-distributed machine learning. It is motivated by the desire to achieve differential privacy guarantees in the local model of privacy in a way that satisfies all systems constraints using asynchronous client-server communication and provides attractive model learning properties. We call it "Draw and Discard" because it relies… ▽ More

    Submitted 10 October, 2018; v1 submitted 11 July, 2018; originally announced July 2018.

  14. arXiv:1807.02608  [pdf

    cs.LG cs.CV stat.ML

    Synthetic Sampling for Multi-Class Malignancy Prediction

    Authors: Matthew Yung, Eli T. Brown, Alexander Rasin, Jacob D. Furst, Daniela S. Raicu

    Abstract: We explore several oversampling techniques for an imbalanced multi-label classification problem, a setting often encountered when developing models for Computer-Aided Diagnosis (CADx) systems. While most CADx systems aim to optimize classifiers for overall accuracy without considering the relative distribution of each class, we look into using synthetic sampling to increase per-class performance w… ▽ More

    Submitted 6 July, 2018; originally announced July 2018.

    Comments: 5 pages, 3 figures, 4 Tables, KDD MLMH'18 Workshop

  15. arXiv:1705.00813  [pdf, other

    quant-ph cs.LG

    Transforming Bell's Inequalities into State Classifiers with Machine Learning

    Authors: Yue-Chi Ma, Man-Hong Yung

    Abstract: Quantum information science has profoundly changed the ways we understand, store, and process information. A major challenge in this field is to look for an efficient means for classifying quantum state. For instance, one may want to determine if a given quantum state is entangled or not. However, the process of a complete characterization of quantum states, known as quantum state tomography, is a… ▽ More

    Submitted 2 May, 2017; originally announced May 2017.

  16. arXiv:1612.01652  [pdf, other

    quant-ph cs.CC

    Experimental Study of Forrelation in Nuclear Spins

    Authors: Hang Li, Xun Gao, Tao Xin, Man-Hong Yung, Guilu Long

    Abstract: Correlation functions are often employed to quantify the relationships among interdependent variables or sets of data. Recently, a new class of correlation functions, called Forrelation, has been introduced by Aaronson and Ambainis for studying the query complexity of quantum devices. It was found that there exists a quantum query algorithm solving 2-fold Forrelation problems with an exponential q… ▽ More

    Submitted 5 December, 2016; originally announced December 2016.

    Comments: 11 pages, 6 figures

  17. Sequential Aggregate Signatures with Short Public Keys without Random Oracles

    Authors: Kwangsu Lee, Dong Hoon Lee, Moti Yung

    Abstract: The notion of aggregate signature has been motivated by applications and it enables any user to compress different signatures signed by different signers on different messages into a short signature. Sequential aggregate signature, in turn, is a special kind of aggregate signature that only allows a signer to add his signature into an aggregate signature in sequential order. This latter scheme has… ▽ More

    Submitted 24 February, 2015; originally announced February 2015.

    Comments: 39 pages in Theoret. Comput. Sci. (2015)

  18. arXiv:1310.1428  [pdf, other

    quant-ph cs.CC physics.chem-ph

    Computational complexity of time-dependent density functional theory

    Authors: J. D. Whitfield, M. -H. Yung, D. G. Tempel, S. Boixo, A. Aspuru-Guzik

    Abstract: Time-dependent density functional theory (TDDFT) is rapidly emerging as a premier method for solving dynamical many-body problems in physics and chemistry. The mathematical foundations of TDDFT are established through the formal existence of a fictitious non-interacting system (known as the Kohn-Sham system), which can reproduce the one-electron reduced probability density of the actual system. We… ▽ More

    Submitted 21 August, 2014; v1 submitted 4 October, 2013; originally announced October 2013.

    Journal ref: New J. Phys. 16 (2014) 083035

  19. arXiv:0910.3282  [pdf, ps, other

    cs.CC

    Adaptive Concurrent Non-Malleability with Bare Public-Keys

    Authors: Andrew C. Yao, Moti Yung, Yunlei Zhao

    Abstract: Concurrent non-malleability (CNM) is central for cryptographic protocols running concurrently in environments such as the Internet. In this work, we formulate CNM in the bare public-key (BPK) model, and show that round-efficient concurrent non-malleable cryptography with full adaptive input selection can be established, in general, with bare public-keys (where, in particular, no trusted assumpti… ▽ More

    Submitted 17 October, 2009; originally announced October 2009.

    Comments: 41 pages

  20. arXiv:0908.2476  [pdf, ps, other

    cs.CC

    Concurrent Knowledge-Extraction in the Public-Key Model

    Authors: Andrew C. Yao, Moti Yung, Yunlei Zhao

    Abstract: Knowledge extraction is a fundamental notion, modelling machine possession of values (witnesses) in a computational complexity sense. The notion provides an essential tool for cryptographic protocol design and analysis, enabling one to argue about the internal state of protocol players without ever looking at this supposedly secret state. However, when transactions are concurrent (e.g., over the… ▽ More

    Submitted 17 August, 2009; originally announced August 2009.

    Comments: 38 pages, 4 figures