-
Future proofing network encryption technology (and securing critical infrastructure data) with continuous-variable quantum key distribution
Authors:
Nitin Jain,
Hou-Man Chin,
Dev Null,
Adnan A. E. Hajomer,
Henrik Larfort,
Naja Lautrup Nysom,
Erik Bidstrup,
Ulrik L. Andersen,
Tobias Gehring
Abstract:
We demonstrate the establishment of quantum-secure data transfer links at two locations in Denmark: on the campus of Technical University of Denmark (DTU) in Lyngby and between two power grid nodes owned and operated by Energinet in Odense. Four different channels were investigated, one being a purely underground fiber and the other three being combinations of underground fibers and optical ground…
▽ More
We demonstrate the establishment of quantum-secure data transfer links at two locations in Denmark: on the campus of Technical University of Denmark (DTU) in Lyngby and between two power grid nodes owned and operated by Energinet in Odense. Four different channels were investigated, one being a purely underground fiber and the other three being combinations of underground fibers and optical ground wires (OPGWs). Coherent `quantum' states at 1550 nm, prepared and measured using a semi-autonomous continuous-variable quantum key distribution (CVQKD) prototype, were multiplexed in wavelength with `classical' 100G encrypted data traffic from a pair of commercial layer-2 network encryption devices operating at around 1300 nm. At DTU, we estimate average secret key rates in the asymptotic limit of $1.12$ Mbps (channel loss of 5.5 dB at 1550 nm) while at Energinet, the figures corresponding to the three channels (with losses of 4.1, 6.7, and 8.9 dB) are $2.05$, $0.90$, and $0.23$ Mbps, respectively. The demonstration showcases that QKD can serve as an additional layer to protect sensitive network traffic propagating on insecure channels.
△ Less
Submitted 29 February, 2024;
originally announced February 2024.
-
I Am Not Them: Fluid Identities and Persistent Out-group Bias in Large Language Models
Authors:
Wenchao Dong,
Assem Zhunis,
Hyojin Chin,
Jiyoung Han,
Meeyoung Cha
Abstract:
We explored cultural biases-individualism vs. collectivism-in ChatGPT across three Western languages (i.e., English, German, and French) and three Eastern languages (i.e., Chinese, Japanese, and Korean). When ChatGPT adopted an individualistic persona in Western languages, its collectivism scores (i.e., out-group values) exhibited a more negative trend, surpassing their positive orientation toward…
▽ More
We explored cultural biases-individualism vs. collectivism-in ChatGPT across three Western languages (i.e., English, German, and French) and three Eastern languages (i.e., Chinese, Japanese, and Korean). When ChatGPT adopted an individualistic persona in Western languages, its collectivism scores (i.e., out-group values) exhibited a more negative trend, surpassing their positive orientation towards individualism (i.e., in-group values). Conversely, when a collectivistic persona was assigned to ChatGPT in Eastern languages, a similar pattern emerged with more negative responses toward individualism (i.e., out-group values) as compared to collectivism (i.e., in-group values). The results indicate that when imbued with a particular social identity, ChatGPT discerns in-group and out-group, embracing in-group values while eschewing out-group values. Notably, the negativity towards the out-group, from which prejudices and discrimination arise, exceeded the positivity towards the in-group. The experiment was replicated in the political domain, and the results remained consistent. Furthermore, this replication unveiled an intrinsic Democratic bias in Large Language Models (LLMs), aligning with earlier findings and providing integral insights into mitigating such bias through prompt engineering. Extensive robustness checks were performed using varying hyperparameter and persona setup methods, with or without social identity labels, across other popular language models.
△ Less
Submitted 15 February, 2024;
originally announced February 2024.
-
Cybersecurity in Motion: A Survey of Challenges and Requirements for Future Test Facilities of CAVs
Authors:
Ioannis Mavromatis,
Theodoros Spyridopoulos,
Pietro Carnelli,
Woon Hau Chin,
Ahmed Khalil,
Jennifer Chakravarty,
Lucia Cipolina Kun,
Robert J. Piechocki,
Colin Robbins,
Daniel Cunnington,
Leigh Chase,
Lamogha Chiazor,
Chris Preston,
Rahul,
Aftab Khan
Abstract:
The way we travel is changing rapidly, and Cooperative Intelligent Transportation Systems (C-ITSs) are at the forefront of this evolution. However, the adoption of C-ITSs introduces new risks and challenges, making cybersecurity a top priority for ensuring safety and reliability. Building on this premise, this paper presents an envisaged Cybersecurity Centre of Excellence (CSCE) designed to bolste…
▽ More
The way we travel is changing rapidly, and Cooperative Intelligent Transportation Systems (C-ITSs) are at the forefront of this evolution. However, the adoption of C-ITSs introduces new risks and challenges, making cybersecurity a top priority for ensuring safety and reliability. Building on this premise, this paper presents an envisaged Cybersecurity Centre of Excellence (CSCE) designed to bolster research, testing, and evaluation of the cybersecurity of C-ITSs. We explore the design, functionality, and challenges of CSCE's testing facilities, outlining the technological, security, and societal requirements. Through a thorough survey and analysis, we assess the effectiveness of these systems in detecting and mitigating potential threats, highlighting their flexibility to adapt to future C-ITSs. Finally, we identify current unresolved challenges in various C-ITS domains, with the aim of motivating further research into the cybersecurity of C-ITSs.
△ Less
Submitted 22 December, 2023;
originally announced December 2023.
-
Safe and Efficient Trajectory Optimization for Autonomous Vehicles using B-spline with Incremental Path Flattening
Authors:
Jongseo Choi,
Hyuntai Chin,
Hyunwoo Park,
Daehyeok Kwon,
Sanghyun Lee,
Doosan Baek
Abstract:
B-spline-based trajectory optimization is widely used for robot navigation due to its computational efficiency and convex-hull property (ensures dynamic feasibility), especially as quadrotors, which have circular body shapes (enable efficient movement) and freedom to move each axis (enables convex-hull property utilization). However, using the B-spline curve for trajectory optimization is challeng…
▽ More
B-spline-based trajectory optimization is widely used for robot navigation due to its computational efficiency and convex-hull property (ensures dynamic feasibility), especially as quadrotors, which have circular body shapes (enable efficient movement) and freedom to move each axis (enables convex-hull property utilization). However, using the B-spline curve for trajectory optimization is challenging for autonomous vehicles (AVs) because of their vehicle kinodynamics (rectangular body shapes and constraints to move each axis). In this study, we propose a novel trajectory optimization approach for AVs to circumvent this difficulty using an incremental path flattening (IPF), a disc type swept volume (SV) estimation method, and kinodynamic feasibility constraints. IPF is a new method that can find a collision-free path for AVs by flattening path and reducing SV using iteratively increasing curvature penalty around vehicle collision points. Additionally, we develop a disc type SV estimation method to reduce SV over-approximation and enable AVs to pass through a narrow corridor efficiently. Furthermore, a clamped B-spline curvature constraint, which simplifies a B-spline curvature constraint, is added to dynamical feasibility constraints (e.g., velocity and acceleration) for obtaining the kinodynamic feasibility constraints. Our experimental results demonstrate that our method outperforms state-of-the-art baselines in various simulated environments. We also conducted a real-world experiment using an AV, and our results validate the simulated tracking performance of the proposed approach.
△ Less
Submitted 29 November, 2023; v1 submitted 6 November, 2023;
originally announced November 2023.
-
Occlusion-aware Risk Assessment and Driving Strategy for Autonomous Vehicles Using Simplified Reachability Quantification
Authors:
Hyunwoo Park,
Jongseo Choi,
Hyuntai Chin,
Sang-Hyun Lee,
Doosan Baek
Abstract:
One of the unresolved challenges for autonomous vehicles is safe navigation among occluded pedestrians and vehicles. Previous approaches included generating phantom vehicles and assessing their risk, but they often made the ego vehicle overly conservative or could not conduct a real-time risk assessment in heavily occluded situations. We propose an efficient occlusion-aware risk assessment method…
▽ More
One of the unresolved challenges for autonomous vehicles is safe navigation among occluded pedestrians and vehicles. Previous approaches included generating phantom vehicles and assessing their risk, but they often made the ego vehicle overly conservative or could not conduct a real-time risk assessment in heavily occluded situations. We propose an efficient occlusion-aware risk assessment method using simplified reachability quantification that quantifies the reachability of phantom agents with a simple distribution model on phantom agents' state. Furthermore, we propose a driving strategy for safe and efficient navigation in occluded areas that sets the speed limit of an autonomous vehicle using the risk of phantom agents. Simulations were conducted to evaluate the performance of the proposed method in various occlusion scenarios involving other vehicles and obstacles. Compared with the baseline case of no occlusion-aware risk assessment, the proposed method increased the traversal time of an intersection by 1.48 times but decreased the average collision rate and discomfort score by up to 6.14 times and 5.03 times, respectively. The proposed method has shown the state-of-the-art level of time efficiency with constant time complexity and computational time less than 5 ms.
△ Less
Submitted 29 October, 2023; v1 submitted 12 June, 2023;
originally announced June 2023.
-
Long-distance continuous-variable quantum key distribution over 100 km fiber with local local oscillator
Authors:
Adnan A. E. Hajomer,
Ivan Derkach,
Nitin Jain,
Hou-Man Chin,
Ulrik L. Andersen,
Tobias Gehring
Abstract:
Quantum key distribution (QKD) enables two remote parties to share encryption keys with security based on the laws of physics. Continuous variable (CV) QKD with coherent states and coherent detection integrates well with existing telecommunication networks. However, thus far, long-distance CV-QKD has only been demonstrated using a highly complex scheme where the local oscillator is transmitted, op…
▽ More
Quantum key distribution (QKD) enables two remote parties to share encryption keys with security based on the laws of physics. Continuous variable (CV) QKD with coherent states and coherent detection integrates well with existing telecommunication networks. However, thus far, long-distance CV-QKD has only been demonstrated using a highly complex scheme where the local oscillator is transmitted, opening security loopholes for eavesdroppers and limiting its potential applications. Here, we report a long-distance CV-QKD experiment with a locally generated local oscillator over a 100 km fiber channel with a total loss of 15.4 dB. This record-breaking distance is achieved by controlling the phase-noise-induced excess noise through a machine-learning framework for carrier recovery and optimizing the modulation variance. We implement the full CV-QKD protocol and demonstrate the generation of keys secure against collective attacks in the finite-size regime. Our results mark a significant milestone for realizing CV quantum access networks with a high loss budget, and pave the way for large-scale deployment of secure QKD.
△ Less
Submitted 16 May, 2023; v1 submitted 14 May, 2023;
originally announced May 2023.
-
Machine learning based joint polarization and phase compensation for CV-QKD
Authors:
Hou-Man Chin,
Adnan E. Hajomer,
Nitin Jain,
Ulrik L. Andersen,
Tobias Gehring
Abstract:
We investigated a machine learning method for joint estimation of polarization and phase for use in a Gaussian modulated CV-QKD system, over an 18 hour period measured on a installed fiber with 5.5 dB attenuation.
We investigated a machine learning method for joint estimation of polarization and phase for use in a Gaussian modulated CV-QKD system, over an 18 hour period measured on a installed fiber with 5.5 dB attenuation.
△ Less
Submitted 11 November, 2022;
originally announced November 2022.
-
Continuous-Variable Quantum Key Distribution Over 60 km Optical Fiber With Real Local Oscillator
Authors:
Adnan A. E. Hajomer,
Hossein Mani,
Nitin Jain,
Hou-Man Chin,
Ulrik L. Andersen,
Tobias Gehring
Abstract:
We report the first continuous-variable quantum key distribution experiment that enables the generation of secure key over a 60 km fiber channel with locally generated local oscillator. This is achieved by controlling the excess noise using machine learning for phase noise compensation while operating the system at a low modulation variance
We report the first continuous-variable quantum key distribution experiment that enables the generation of secure key over a 60 km fiber channel with locally generated local oscillator. This is achieved by controlling the excess noise using machine learning for phase noise compensation while operating the system at a low modulation variance
△ Less
Submitted 30 May, 2022;
originally announced May 2022.
-
Modulation leakage-free continuous-variable quantum key distribution
Authors:
Adnan A. E. Hajomer,
Nitin Jain,
Hossein Mani,
Hou-Man Chin,
Ulirk L. Andersen,
Tobias Gehrin
Abstract:
Distributing cryptographic keys over public channels in a way that can provide information-theoretic security is the holy grail for secure communication. This can be achieved by exploiting quantum mechanical principles in so-called quantum key distribution (QKD). Continuous-variable (CV) QKD based on coherent states, in particular, is an attractive scheme for secure communication since it requires…
▽ More
Distributing cryptographic keys over public channels in a way that can provide information-theoretic security is the holy grail for secure communication. This can be achieved by exploiting quantum mechanical principles in so-called quantum key distribution (QKD). Continuous-variable (CV) QKD based on coherent states, in particular, is an attractive scheme for secure communication since it requires only standard telecommunication technology that can operate at room temperature. However, a recently discovered side-channel created in the process of state preparation leads to a leakage of information about the transmitted quantum state, opening a security loophole for eavesdroppers to compromise the security of the CVQKD system. Here, we present a CVQKD system without this modulation leakage vulnerability. Our implementation is based on a baseband modulation approach, and uses an in-phase and quadrature (IQ) modulator for state preparation and radio frequency heterodyne detection together with carefully designed digital signal processing for state measurement. We consider practical aspects in the implementation and demonstrate the generation of a composable secret key secure against collective attacks. This work is a step towards protecting CVQKD systems against practical imperfections of physical devices and operational limitations without performance degradation.
△ Less
Submitted 15 May, 2022;
originally announced May 2022.
-
Ultrafast disinfection of SARS-CoV-2 viruses
Authors:
Yang Xu,
Alex Wing Hong Chin,
Haosong Zhong,
Connie Kong Wai Lee,
Yi Chen,
Timothy Yee Him Chan,
Zhiyong Fan,
Molong Duan,
Leo Lit Man Poon,
Mitch Guijun Li
Abstract:
The wide use of surgical masks has been proven effective for mitigating the spread of respiration diseases, such as COVID-19, alongside social distance control, vaccines, and other efforts. With the newly reported variants, such as Delta and Omicron, a higher spread rate had been found compared to the initial strains. People might get infected even by inhaling fewer loading of viruses. More freque…
▽ More
The wide use of surgical masks has been proven effective for mitigating the spread of respiration diseases, such as COVID-19, alongside social distance control, vaccines, and other efforts. With the newly reported variants, such as Delta and Omicron, a higher spread rate had been found compared to the initial strains. People might get infected even by inhaling fewer loading of viruses. More frequent sterilization of surgical masks is needed to protect the wearers. However, it is challenging to sterilize the commodity surgical masks with a fast and effective method. Herein, we reported the sterilization of the SARS-CoV-2 viruses within an ultra-short time, while retaining the mask performance. Silver thin film is coated on commercial polyimide film by physical vapor deposition and patterned by laser scribing to form a Joule heating electrode. Another layer of the gold thin film was coated onto the opposite side of the device to promote the uniformity of the Joule heating through nano-heat transfer regulation. As a result, the surgical mask can be heated to inactivation temperature within a short time and with high uniformity. By Joule-heating the surgical mask with the temperature at 90 °C for 3 minutes, the inactivation of the SARS-CoV-2 showed an efficacy of 99.89%. Normal commodity surgical masks can be sterilized faster, more frequently, and efficiently against SARS-CoV-2 viruses and the new invariants.
△ Less
Submitted 17 April, 2022;
originally announced April 2022.
-
Effect of external magnetic field and dust grains on the properties of Ion Acoustic Waves
Authors:
K. Deka,
R. Paul,
G. Sharma,
N. Das,
S. Adhikari,
R. Moulick,
S. S. Kausik,
B. K. Saikia,
O. H. Chin,
C. S. Wong
Abstract:
An experimental study to investigate the effect of an external magnetic field on the propagation of ion-acoustic waves (IAWs) has been carried out in hydrogen plasma containing two-temperature electrons and dust grains. A low-pressure hot cathode discharge method is opted for plasma production. The desired two electron groups with distinct temperatures are achieved by inserting two magnetic cages…
▽ More
An experimental study to investigate the effect of an external magnetic field on the propagation of ion-acoustic waves (IAWs) has been carried out in hydrogen plasma containing two-temperature electrons and dust grains. A low-pressure hot cathode discharge method is opted for plasma production. The desired two electron groups with distinct temperatures are achieved by inserting two magnetic cages with a cusp-shaped magnetic field of different surface field strengths in the same chamber. The dust grains are dropped into the plasma with the help of a dust dropper, which gain negative charges by interacting with the plasma. The IAWs are excited with the help of a mesh-grid inserted into the plasma. A planar Langmuir probe is used as a detector to detect the IAWs. The time of flight technique has been applied to measure the phase velocity of the IAWs. The results suggest that in the presence of a magnetic field, the phase velocity of IAWs increases, whereas introducing the dust particles leads to the lower phase velocity. The magnetic field is believed to have a significant effect on the wave damping. This study will aid in utilising IAWs as a diagnostic tool to estimate plasma parameters in the presence of an external magnetic field. Moreover, the study might be useful for estimating the relative ion concentrations in a two positive ion species plasma, as well as the relative concentration of the negative ions in the presence of an external magnetic field.
△ Less
Submitted 31 March, 2022;
originally announced March 2022.
-
Digital synchronization for continuous-variable quantum key distribution
Authors:
Hou-Man Chin,
Nitin Jain,
Ulrik L. Andersen,
Tobias Gehring
Abstract:
Continuous variable quantum key distribution (CV-QKD) is a promising emerging technology for the distribution of secure keys for symmetric encryption. It can be readily implemented using commercial off-the-shelf optical telecommunications components. A key requirement of the CV-QKD receiver is the ability to measure the quantum states at the correct time instance and rate using the correct orthogo…
▽ More
Continuous variable quantum key distribution (CV-QKD) is a promising emerging technology for the distribution of secure keys for symmetric encryption. It can be readily implemented using commercial off-the-shelf optical telecommunications components. A key requirement of the CV-QKD receiver is the ability to measure the quantum states at the correct time instance and rate using the correct orthogonal observables, referred to as synchronization. We propose a digital synchronization procedure for a modern CV-QKD system with locally generated local oscillator for coherent reception. Our proposed method is modulation format independent allowing it to be used in a variety of CV-QKD systems. We experimentally investigate its performance with a Gaussian modulated CV-QKD system operating over a 10-20 km span of standard single mode fibre. Since the procedure does not require hardware modifications it paves the way for cost-effective QKD solutions that can adapt rapidly to changing environmental conditions.
△ Less
Submitted 17 March, 2022; v1 submitted 16 March, 2022;
originally announced March 2022.
-
Distributed Dimension Reduction for Distributed Massive MIMO C-RAN with Finite Fronthaul Capacity
Authors:
Fred Wiffen,
Woon Hau Chin,
Angela Doufexi
Abstract:
The use of a large excess of service antennas brings a variety of performance benefits to distributed MIMO C-RAN, but the corresponding high fronthaul data loads can be problematic in practical systems with limited fronthaul capacity. In this work we propose the use of lossy dimension reduction, applied locally at each remote radio head (RRH), to reduce this fronthaul traffic. We first consider th…
▽ More
The use of a large excess of service antennas brings a variety of performance benefits to distributed MIMO C-RAN, but the corresponding high fronthaul data loads can be problematic in practical systems with limited fronthaul capacity. In this work we propose the use of lossy dimension reduction, applied locally at each remote radio head (RRH), to reduce this fronthaul traffic. We first consider the uplink, and the case where each RRH applies a linear dimension reduction filter to its multi-antenna received signal vector. It is shown that under a joint mutual information criteria, the optimal dimension reduction filters are given by a variant of the conditional Karhunen-Loeve transform, with a stationary point found using block co-ordinate ascent. These filters are then modified such that each RRH can calculate its own dimension reduction filter in a decentralised manner, using knowledge only of its own instantaneous channel and network slow fading coefficients. We then show that in TDD systems these dimension reduction filters can be re-used as part of a two-stage reduced dimension downlink precoding scheme. Analysis and numerical results demonstrate that the proposed approach can significantly reduce both uplink and downlink fronthaul traffic whilst incurring very little loss in MIMO performance.
△ Less
Submitted 28 January, 2022;
originally announced January 2022.
-
Practical continuous-variable quantum key distribution with composable security
Authors:
Nitin Jain,
Hou-Man Chin,
Hossein Mani,
Cosmo Lupo,
Dino Solar Nikolic,
Arne Kordts,
Stefano Pirandola,
Thomas Brochmann Pedersen,
Matthias Kolb,
Bernhard Ömer,
Christoph Pacher,
Tobias Gehring,
Ulrik L. Andersen
Abstract:
A quantum key distribution (QKD) system must fulfill the requirement of universal composability to ensure that any cryptographic application (using the QKD system) is also secure. Furthermore, the theoretical proof responsible for security analysis and key generation should cater to the number $N$ of the distributed quantum states being finite in practice. Continuous-variable (CV) QKD based on coh…
▽ More
A quantum key distribution (QKD) system must fulfill the requirement of universal composability to ensure that any cryptographic application (using the QKD system) is also secure. Furthermore, the theoretical proof responsible for security analysis and key generation should cater to the number $N$ of the distributed quantum states being finite in practice. Continuous-variable (CV) QKD based on coherent states, despite being a suitable candidate for integration in the telecom infrastructure, has so far been unable to demonstrate composability as existing proofs require a rather large $N$ for successful key generation. Here we report the first Gaussian-modulated coherent state CVQKD system that is able to overcome these challenges and can generate composable keys secure against collective attacks with $N \lesssim 3.5\times10^8$ coherent states. With this advance, possible due to novel improvements to the security proof and a fast, yet low-noise and highly stable system operation, CVQKD implementations take a significant step towards their discrete-variable counterparts in practicality, performance, and security.
△ Less
Submitted 18 October, 2021;
originally announced October 2021.
-
A High-Performance Adaptive Quantization Approach for Edge CNN Applications
Authors:
Hsu-Hsun Chin,
Ren-Song Tsay,
Hsin-I Wu
Abstract:
Recent convolutional neural network (CNN) development continues to advance the state-of-the-art model accuracy for various applications. However, the enhanced accuracy comes at the cost of substantial memory bandwidth and storage requirements and demanding computational resources. Although in the past the quantization methods have effectively reduced the deployment cost for edge devices, it suffer…
▽ More
Recent convolutional neural network (CNN) development continues to advance the state-of-the-art model accuracy for various applications. However, the enhanced accuracy comes at the cost of substantial memory bandwidth and storage requirements and demanding computational resources. Although in the past the quantization methods have effectively reduced the deployment cost for edge devices, it suffers from significant information loss when processing the biased activations of contemporary CNNs. In this paper, we hence introduce an adaptive high-performance quantization method to resolve the issue of biased activation by dynamically adjusting the scaling and shifting factors based on the task loss. Our proposed method has been extensively evaluated on image classification models (ResNet-18/34/50, MobileNet-V2, EfficientNet-B0) with ImageNet dataset, object detection model (YOLO-V4) with COCO dataset, and language models with PTB dataset. The results show that our 4-bit integer (INT4) quantization models achieve better accuracy than the state-of-the-art 4-bit models, and in some cases, even surpass the golden full-precision models. The final designs have been successfully deployed onto extremely resource-constrained edge devices for many practical applications.
△ Less
Submitted 18 July, 2021;
originally announced July 2021.
-
Modulation leakage vulnerability in continuous-variable quantum key distribution
Authors:
Nitin Jain,
Ivan Derkach,
Hou-Man Chin,
Radim Filip,
Ulrik L. Andersen,
Vladyslav C. Usenko,
Tobias Gehring
Abstract:
Flaws in the process of modulation, or encoding of key bits in the quadratures of the electromagnetic light field, can make continuous-variable quantum key distribution systems susceptible to leakage of secret information. Here, we report such a modulation leakage vulnerability in a system that uses an optical in-phase and quadrature modulator to implement a single sideband encoding scheme. The le…
▽ More
Flaws in the process of modulation, or encoding of key bits in the quadratures of the electromagnetic light field, can make continuous-variable quantum key distribution systems susceptible to leakage of secret information. Here, we report such a modulation leakage vulnerability in a system that uses an optical in-phase and quadrature modulator to implement a single sideband encoding scheme. The leakage arises from the limited suppression of a quantum-information-carrying sideband during modulation. Based on the results from a proof-of-concept experiment, we theoretically analyse the impact of this vulnerability. Our results indicate that the leakage reduces the range over which a positive secret key can be obtained, and can even lead to a security breach if not properly taken into account. We also study the effectiveness of additional trusted noise as a countermeasure to this vulnerability.
△ Less
Submitted 26 March, 2021;
originally announced March 2021.
-
A Very Compact Embedded CNN Processor Design Based on Logarithmic Computing
Authors:
Tsung-Ying Lu,
Hsu-Hsun Chin,
Hsin-I Wu,
Ren-Song Tsay
Abstract:
In this paper, we propose a very compact embedded CNN processor design based on a modified logarithmic computing method using very low bit-width representation. Our high-quality CNN processor can easily fit into edge devices. For Yolov2, our processing circuit takes only 0.15 mm2 using TSMC 40 nm cell library. The key idea is to constrain the activation and weight values of all layers uniformly to…
▽ More
In this paper, we propose a very compact embedded CNN processor design based on a modified logarithmic computing method using very low bit-width representation. Our high-quality CNN processor can easily fit into edge devices. For Yolov2, our processing circuit takes only 0.15 mm2 using TSMC 40 nm cell library. The key idea is to constrain the activation and weight values of all layers uniformly to be within the range [-1, 1] and produce low bit-width logarithmic representation. With the uniform representations, we devise a unified, reusable CNN computing kernel and significantly reduce computing resources. The proposed approach has been extensively evaluated on many popular image classification CNN models (AlexNet, VGG16, and ResNet-18/34) and object detection models (Yolov2). The hardware-implemented results show that our design consumes only minimal computing and storage resources, yet attains very high accuracy. The design is thoroughly verified on FPGAs, and the SoC integration is underway with promising results. With extremely efficient resource and energy usage, our design is excellent for edge computing purposes.
△ Less
Submitted 13 October, 2020;
originally announced October 2020.
-
MF-based Dimension Reduction Signal Compression for Fronthaul-Constrained Distributed MIMO C-RAN
Authors:
Fred Wiffen,
Mohammud Z. Bocus,
Angela Doufexi,
Woon Hau Chin
Abstract:
In this work we propose a fronthaul compression scheme for distributed MIMO systems with multi-antenna receivers, in which, prior to signal quantisation, dimension reduction is performed at each receiver by matched filtering the received signal with a subset of the local user channel vectors. By choosing these matched filter vectors based on global channel information, a high proportion of the pot…
▽ More
In this work we propose a fronthaul compression scheme for distributed MIMO systems with multi-antenna receivers, in which, prior to signal quantisation, dimension reduction is performed at each receiver by matched filtering the received signal with a subset of the local user channel vectors. By choosing these matched filter vectors based on global channel information, a high proportion of the potential capacity may be captured by a small number of signal components, which can then be compressed efficiently using local signal compression. We outline a greedy algorithm for selecting the matched filtering vectors for each receiver, and a local transform coding approach for quantising them, giving expressions for the resulting system sum and user capacities. We then show that the scheme is easily modified to account for imperfect CSI at the receivers. Numerical results show that with a low signal dimension the scheme is able to operate very close to the cut-set bound in the fronthaul-limited regime, and demonstrates significant improvements in rate-capacity trade-off versus local compression at all operating points, particularly at high SNR.
△ Less
Submitted 26 May, 2020;
originally announced May 2020.
-
Dimension Reduction-based Signal Compression for Uplink Distributed MIMO C-RAN with Limited Fronthaul Capacity
Authors:
Fred Wiffen,
Mohammud Z. Bocus,
Woon Hau Chin,
Angela Doufexi,
Mark Beach
Abstract:
This paper proposes a dimension reduction-based signal compression scheme for uplink distributed MIMO cloud radio access networks (C-RAN) with an overall excess of receive antennas, in which users are jointly served by distributed multi-antenna receivers connected to a central processor via individual finite-capacity fronthaul links. We first show that, under quantization noise-limited operation,…
▽ More
This paper proposes a dimension reduction-based signal compression scheme for uplink distributed MIMO cloud radio access networks (C-RAN) with an overall excess of receive antennas, in which users are jointly served by distributed multi-antenna receivers connected to a central processor via individual finite-capacity fronthaul links. We first show that, under quantization noise-limited operation, applying linear dimension reduction at each receiver before compressing locally with a uniform quantization noise level results in a sum capacity that scales approximately linearly with fronthaul capacity, and can come within a fixed gap of the cut-set bound. The dimension reduction filters that maximize joint mutual information are then shown to be truncated forms of the conditional Karhunen-Loeve transform, with a block coordinate ascent algorithm for finding a stationary point given. Analysis and numerical results indicate that the signal dimension can be reduced without significant loss of information, particularly at high signal-to-noise ratio, preserving the benefits of using excess antennas. The method is then adapted for the case of imperfect channel state information at the receivers. The scheme significantly outperforms conventional local signal compression at all fronthaul rates, and with complexity linear in network size represents a scalable solution for distributed MIMO C-RAN systems.
△ Less
Submitted 26 May, 2020;
originally announced May 2020.
-
Phase Compensation for Continuous Variable Quantum Key Distribution
Authors:
Hou-Man Chin,
Darko Zibar,
Nitin Jain,
Tobias Gehring,
Ulrik L. Andersen
Abstract:
The tracking and compensation of phase noise is critical to reducing excess noise for continuous variable quantum key distribution schemes. This work demonstrates the effectiveness of unscented Kalman filter for phase noise compensation.
The tracking and compensation of phase noise is critical to reducing excess noise for continuous variable quantum key distribution schemes. This work demonstrates the effectiveness of unscented Kalman filter for phase noise compensation.
△ Less
Submitted 17 May, 2020;
originally announced May 2020.
-
Machine learning aided carrier recovery in continuous-variable quantum key distribution
Authors:
Hou-Man Chin,
Nitin Jain,
Darko Zibar,
Ulrik L. Andersen,
Tobias Gehring
Abstract:
The secret key rate of a continuous-variable quantum key distribution (CV-QKD) system is limited by excess noise. A key issue typical to all modern CV-QKD systems implemented with a reference or pilot signal and an independent local oscillator is controlling the excess noise generated from the frequency and phase noise accrued by the transmitter and receiver. Therefore accurate phase estimation an…
▽ More
The secret key rate of a continuous-variable quantum key distribution (CV-QKD) system is limited by excess noise. A key issue typical to all modern CV-QKD systems implemented with a reference or pilot signal and an independent local oscillator is controlling the excess noise generated from the frequency and phase noise accrued by the transmitter and receiver. Therefore accurate phase estimation and compensation, so-called carrier recovery, is a critical subsystem of CV-QKD. Here, we explore the implementation of a machine learning framework based on Bayesian inference, namely an unscented Kalman filter (UKF), for estimation of phase noise and compare it to a standard reference method. Experimental results obtained over a 20 km fibre-optic link indicate that the UKF can ensure very low excess noise even at low pilot powers. The measurements exhibited low variance and high stability in excess noise over a wide range of pilot signal to noise ratios. This may enable CV-QKD systems with low implementation complexity which can seamlessly work on diverse transmission lines.
△ Less
Submitted 21 February, 2020;
originally announced February 2020.
-
A Scale Invariant Flatness Measure for Deep Network Minima
Authors:
Akshay Rangamani,
Nam H. Nguyen,
Abhishek Kumar,
Dzung Phan,
Sang H. Chin,
Trac D. Tran
Abstract:
It has been empirically observed that the flatness of minima obtained from training deep networks seems to correlate with better generalization. However, for deep networks with positively homogeneous activations, most measures of sharpness/flatness are not invariant to rescaling of the network parameters, corresponding to the same function. This means that the measure of flatness/sharpness can be…
▽ More
It has been empirically observed that the flatness of minima obtained from training deep networks seems to correlate with better generalization. However, for deep networks with positively homogeneous activations, most measures of sharpness/flatness are not invariant to rescaling of the network parameters, corresponding to the same function. This means that the measure of flatness/sharpness can be made as small or as large as possible through rescaling, rendering the quantitative measures meaningless. In this paper we show that for deep networks with positively homogenous activations, these rescalings constitute equivalence relations, and that these equivalence relations induce a quotient manifold structure in the parameter space. Using this manifold structure and an appropriate metric, we propose a Hessian-based measure for flatness that is invariant to rescaling. We use this new measure to confirm the proposition that Large-Batch SGD minima are indeed sharper than Small-Batch SGD minima.
△ Less
Submitted 6 February, 2019;
originally announced February 2019.
-
An Empirical Evaluation of Sketched SVD and its Application to Leverage Score Ordering
Authors:
Hui Han Chin,
Paul Pu Liang
Abstract:
The power of randomized algorithms in numerical methods have led to fast solutions which use the Singular Value Decomposition (SVD) as a core routine. However, given the large data size of modern and the modest runtime of SVD, most practical algorithms would require some form of approximation, such as sketching, when running SVD. While these approximation methods satisfy many theoretical guarantee…
▽ More
The power of randomized algorithms in numerical methods have led to fast solutions which use the Singular Value Decomposition (SVD) as a core routine. However, given the large data size of modern and the modest runtime of SVD, most practical algorithms would require some form of approximation, such as sketching, when running SVD. While these approximation methods satisfy many theoretical guarantees, we provide the first algorithmic implementations for sketch-and-solve SVD problems on real-world, large-scale datasets. We provide a comprehensive empirical evaluation of these algorithms and provide guidelines on how to ensure accurate deployment to real-world data. As an application of sketched SVD, we present Sketched Leverage Score Ordering, a technique for determining the ordering of data in the training of neural networks. Our technique is based on the distributed computation of leverage scores using random projections. These computed leverage scores provide a flexible and efficient method to determine the optimal ordering of training data without manual intervention or annotations. We present empirical results on an extensive set of experiments across image classification, language sentiment analysis, and multi-modal sentiment analysis. Our method is faster compared to standard randomized projection algorithms and shows improvements in convergence and results.
△ Less
Submitted 19 December, 2018;
originally announced December 2018.
-
Effect of filter shape on excess noise performance in continuous variable quantum key distribution with Gaussian modulation
Authors:
Hou-Man Chin,
Nitin Jain,
Darko Zibar,
Tobias Gehring,
Ulrik L. Andersen
Abstract:
An attractive implementation for quantum cryptography is the continuous variable variation, as it relies on standard telecommunication components. Modulating the quantum signal using a Gaussian format is attractive since it has been proven to be secure. This work investigates the effect of the roll-off of a root raised cosine pulse shaping and matched filter on the excess noise performance of a Ga…
▽ More
An attractive implementation for quantum cryptography is the continuous variable variation, as it relies on standard telecommunication components. Modulating the quantum signal using a Gaussian format is attractive since it has been proven to be secure. This work investigates the effect of the roll-off of a root raised cosine pulse shaping and matched filter on the excess noise performance of a Gaussian modulated quantum key distribution system in a simulated back to back configuration. Contrary to intuition, it is found that the roll-off parameter does not significantly impact the performance of the system.
△ Less
Submitted 14 August, 2018;
originally announced August 2018.
-
Temporal connectivity in finite networks with non-uniform measures
Authors:
Pete Pratt,
Carl P. Dettmann,
Woon Hau Chin
Abstract:
Soft Random Geometric Graphs (SRGGs) have been widely applied to various models including those of wireless sensor, communication, social and neural networks. SRGGs are constructed by randomly placing nodes in some space and making pairwise links probabilistically using a connection function that is system specific and usually decays with distance. In this paper we focus on the application of SRGG…
▽ More
Soft Random Geometric Graphs (SRGGs) have been widely applied to various models including those of wireless sensor, communication, social and neural networks. SRGGs are constructed by randomly placing nodes in some space and making pairwise links probabilistically using a connection function that is system specific and usually decays with distance. In this paper we focus on the application of SRGGs to wireless communication networks where information is relayed in a multi hop fashion, although the analysis is more general and can be applied elsewhere by using different distributions of nodes and/or connection functions. We adopt a general non-uniform density which can model the stationary distribution of different mobility models, with the interesting case being when the density goes to zero along the boundaries. The global connectivity properties of these non-uniform networks are likely to be determined by highly isolated nodes, where isolation can be caused by the spatial distribution or the local geometry (boundaries). We extend the analysis to temporal-spatial networks where we fix the underlying non-uniform distribution of points and the dynamics are caused by the temporal variations in the link set, and explore the probability a node near the corner is isolated at time $T$. This work allows for insight into how non-uniformity (caused by mobility) and boundaries impact the connectivity features of temporal-spatial networks. We provide a simple method for approximating these probabilities for a range of different connection functions and verify them against simulations. Boundary nodes are numerically shown to dominate the connectivity properties of these finite networks with non-uniform measure.
△ Less
Submitted 27 July, 2018;
originally announced July 2018.
-
Emerging Technologies and Research Challenges for 5G Wireless Networks
Authors:
Woon Hau Chin,
Zhong Fan,
Russell J. Haines
Abstract:
As the take-up of Long Term Evolution (LTE)/4G cellular accelerates, there is increasing interest in technologies that will define the next generation (5G) telecommunication standard. This paper identifies several emerging technologies which will change and define the future generations of telecommunication standards. Some of these technologies are already making their way into standards such as 3…
▽ More
As the take-up of Long Term Evolution (LTE)/4G cellular accelerates, there is increasing interest in technologies that will define the next generation (5G) telecommunication standard. This paper identifies several emerging technologies which will change and define the future generations of telecommunication standards. Some of these technologies are already making their way into standards such as 3GPP LTE, while others are still in development. Additionally, we will look at some of the research problems that these new technologies pose.
△ Less
Submitted 26 February, 2014;
originally announced February 2014.
-
Stochastic Simulation of Bayesian Belief Networks
Authors:
Homer L. Chin,
Gregory F. Cooper
Abstract:
This paper examines Bayesian belief network inference using simulation as a method for computing the posterior probabilities of network variables. Specifically, it examines the use of a method described by Henrion, called logic sampling, and a method described by Pearl, called stochastic simulation. We first review the conditions under which logic sampling is computationally infeasible. Such cases…
▽ More
This paper examines Bayesian belief network inference using simulation as a method for computing the posterior probabilities of network variables. Specifically, it examines the use of a method described by Henrion, called logic sampling, and a method described by Pearl, called stochastic simulation. We first review the conditions under which logic sampling is computationally infeasible. Such cases motivated the development of the Pearl's stochastic simulation algorithm. We have found that this stochastic simulation algorithm, when applied to certain networks, leads to much slower than expected convergence to the true posterior probabilities. This behavior is a result of the tendency for local areas in the network to become fixed through many simulation cycles. The time required to obtain significant convergence can be made arbitrarily long by strengthening the probabilistic dependency between nodes. We propose the use of several forms of graph modification, such as graph pruning, arc reversal, and node reduction, in order to convert some networks into formats that are computationally more efficient for simulation.
△ Less
Submitted 27 March, 2013;
originally announced April 2013.
-
Performance Analysis of Two-Step Bi-Directional Relaying with Multiple Antennas
Authors:
Mahshad Eslamifar,
Woon Hau Chin,
Chau Yuen,
Yong Liang Guan
Abstract:
In this paper we study decode-and-forward multi-antenna relay systems that achieve bi-directional communication in two time slots. We investigate different downlink broadcast schemes which employ binary or analog network coding at the relay. We also analyze and compare their performances in terms of diversity order and symbol error probability. It is shown that if exact downlink channel state info…
▽ More
In this paper we study decode-and-forward multi-antenna relay systems that achieve bi-directional communication in two time slots. We investigate different downlink broadcast schemes which employ binary or analog network coding at the relay. We also analyze and compare their performances in terms of diversity order and symbol error probability. It is shown that if exact downlink channel state information is available at the relay, using analog network coding in the form of multi-antenna maximal-ratio transmit beamforming to precode the information vectors at the relay gives the best performance. Then, we propose a Max-Min antenna selection with binary network coding scheme that can approach this performance with only partial channel state information.
△ Less
Submitted 9 October, 2012;
originally announced October 2012.
-
Smart Grid Communications: Overview of Research Challenges, Solutions, and Standardization Activities
Authors:
Zhong Fan,
Parag Kulkarni,
Sedat Gormus,
Costas Efthymiou,
Georgios Kalogridis,
Mahesh Sooriyabandara,
Ziming Zhu,
Sangarapillai Lambotharan,
Woon Hau Chin
Abstract:
Optimization of energy consumption in future intelligent energy networks (or Smart Grids) will be based on grid-integrated near-real-time communications between various grid elements in generation, transmission, distribution and loads. This paper discusses some of the challenges and opportunities of communications research in the areas of smart grid and smart metering. In particular, we focus on s…
▽ More
Optimization of energy consumption in future intelligent energy networks (or Smart Grids) will be based on grid-integrated near-real-time communications between various grid elements in generation, transmission, distribution and loads. This paper discusses some of the challenges and opportunities of communications research in the areas of smart grid and smart metering. In particular, we focus on some of the key communications challenges for realizing interoperable and future-proof smart grid/metering networks, smart grid security and privacy, and how some of the existing networking technologies can be applied to energy management. Finally, we also discuss the coordinated standardization efforts in Europe to harmonize communications standards and protocols.
△ Less
Submitted 15 December, 2011;
originally announced December 2011.
-
Runtime Guarantees for Regression Problems
Authors:
Hui Han Chin,
Aleksander Madry,
Gary Miller,
Richard Peng
Abstract:
We study theoretical runtime guarantees for a class of optimization problems that occur in a wide variety of inference problems. these problems are motivated by the lasso framework and have applications in machine learning and computer vision.
Our work shows a close connection between these problems and core questions in algorithmic graph theory. While this connection demonstrates the difficulti…
▽ More
We study theoretical runtime guarantees for a class of optimization problems that occur in a wide variety of inference problems. these problems are motivated by the lasso framework and have applications in machine learning and computer vision.
Our work shows a close connection between these problems and core questions in algorithmic graph theory. While this connection demonstrates the difficulties of obtaining runtime guarantees, it also suggests an approach of using techniques originally developed for graph algorithms.
We then show that most of these problems can be formulated as a grouped least squares problem, and give efficient algorithms for this formulation. Our algorithms rely on routines for solving quadratic minimization problems, which in turn are equivalent to solving linear systems. Finally we present some experimental results on applying our approximation algorithm to image processing problems.
△ Less
Submitted 7 September, 2012; v1 submitted 6 October, 2011;
originally announced October 2011.
-
Bi-Directional Multi-Antenna Relay Communications with Wireless Network Coding
Authors:
Chau Yuen,
Woon Hau Chin,
Yong Liang Guan,
Wenhua Chen,
Taoyi Tee
Abstract:
In this paper, we consider a two-way or bidirectional communications system with a relay equipped with multiple antennas. We show that when the downlink channel state information is not known at the relay, the benefit of having additional antennas at the relay can only be obtained by using decode and forward (DF) but not amplify and forward (AF). The gain becomes significant when we employ trans…
▽ More
In this paper, we consider a two-way or bidirectional communications system with a relay equipped with multiple antennas. We show that when the downlink channel state information is not known at the relay, the benefit of having additional antennas at the relay can only be obtained by using decode and forward (DF) but not amplify and forward (AF). The gain becomes significant when we employ transmit diversity together with wireless network coding. We also demonstrate how the performance of such system can be improved by performing antenna selection at the relay. Our results show that if downlink channel state information is known at the relay, network coding may not provide additional gain than simple antenna selection scheme.
△ Less
Submitted 23 June, 2008;
originally announced June 2008.
-
Four-node Relay Network with Bi-directional Traffic Employing Wireless Network Coding with Pre-cancellation
Authors:
Su Kiang Kuek,
Chau Yuen,
Woon Hau Chin
Abstract:
Network coding has the potential to improve the overall throughput of a network by combining different streams of data and forwarding them. In wireless networks, the wireless channel provide an excellent medium for physical layer network coding as signals from different transmitters are combined automatically by the wireless channel. In such scenarios, it would be interesting to investigate prot…
▽ More
Network coding has the potential to improve the overall throughput of a network by combining different streams of data and forwarding them. In wireless networks, the wireless channel provide an excellent medium for physical layer network coding as signals from different transmitters are combined automatically by the wireless channel. In such scenarios, it would be interesting to investigate protocols and algorithms which can optimally relay information. In this paper, we look at a four-node two-way or bidirectional relay network, and propose a relay protocol which can relay information efficiently in this network.
△ Less
Submitted 23 June, 2008;
originally announced June 2008.
-
Terahertz magneto-spectroscopy of transient plasmas in semiconductors
Authors:
M. A. Zudov,
A. P. Mitchell,
A. H. Chin,
J. Kono
Abstract:
Using synchronized near-infrared (NIR) and terahertz (THz) lasers, we have performed picosecond time-resolved THz spectroscopy of transient carriers in semiconductors. Specifically, we measured the temporal evolution of THz transmission and reflectivity after NIR excitation. We systematically investigated transient carrier relaxation in GaAs and InSb with varying NIR intensities and magnetic fie…
▽ More
Using synchronized near-infrared (NIR) and terahertz (THz) lasers, we have performed picosecond time-resolved THz spectroscopy of transient carriers in semiconductors. Specifically, we measured the temporal evolution of THz transmission and reflectivity after NIR excitation. We systematically investigated transient carrier relaxation in GaAs and InSb with varying NIR intensities and magnetic fields. Using this information, we were able to determine the evolution of the THz absorption to study the dynamics of photocreated carriers. We developed a theory based on a Drude conductivity with time-dependent density and density-dependent scattering lifetime, which successfully reproduced the observed plasma dynamics. Detailed comparison between experimental and theoretical results revealed a linear dependence of the scattering frequency on density, which suggests that electron-electron scattering is the dominant scattering mechanism for determining the scattering time. In InSb, plasma dynamics was dramatically modified by the application of a magnetic field, showing rich magneto-reflection spectra, while GaAs did not show any significant magnetic field dependence. We attribute this to the small effective masses of the carriers in InSb compared to GaAs, which made the plasma, cyclotron, and photon energies all comparable in the density, magnetic field, and wavelength ranges of the current study.
△ Less
Submitted 2 September, 2002;
originally announced September 2002.
-
High Power Testing Results of the X-Band Mixed-Mode RF Windows for Linear Colliders
Authors:
S. Tokumoto,
Y. H. Chin,
H. Mizuno,
K. Ohya,
S. Yamaguchi,
KEK,
Tsukuba,
Japan S. Kazakov,
BINP,
Protvino,
Moscow,
Russia R. Loewen,
R. Fowkes,
A. Menegat,
A. Vlieks,
SLAC,
Stanford,
CA,
USA
Abstract:
In this paper, we summarize the high power testing results of the X-band mixed-mode RF windows at KEK and SLAC for linear colliders. The main feature of these windows is that the combination of modes on the surface of the ceramic significantly decreases the electric and magnetic fields in the junction between the ceramic and the metal. So far two types of high power windows (with the diameter of…
▽ More
In this paper, we summarize the high power testing results of the X-band mixed-mode RF windows at KEK and SLAC for linear colliders. The main feature of these windows is that the combination of modes on the surface of the ceramic significantly decreases the electric and magnetic fields in the junction between the ceramic and the metal. So far two types of high power windows (with the diameter of 53 mm and 64 mm) have been fabricated. A high power model of the smaller type window was fabricated and tested in a resonant ring at KEK. A maximum circulating power of 81 MW with 300 ns duration or 66 MW with 700 ns duration was achieved. Light emission was observed for a power level of over 10 MW. Later, both windows were shipped to SLAC for even higher power testing using combined power from two klystrons. The first window (53 mm diameter) achieved a transmitted power of 80 MW with 1.5 microsec duration at 30 Hz repetition. It was not destroyed during the testing. The testing of the second window was carried out next to the small type and achieved 62 MW with 1.5 maicrosec duration with 10 Hz repetition. The final results of both windows are presented in this report.
△ Less
Submitted 19 August, 2000;
originally announced August 2000.
-
Coupling Impedances and Heating due to Slots in the KEK B-factory
Authors:
Sergey S. Kurennoy,
Yong Ho Chin
Abstract:
The longitudinal and transverse coupling impedances produced by the long slots in the Low Energy Ring of KEK B-factory are calculated. The power dissipated inside the vacuum chamber due to the fields scattered by the slots is evaluated using results for the real part of the coupling impedance. Estimates are made for the power flow through the slots to the pumping chamber.
The longitudinal and transverse coupling impedances produced by the long slots in the Low Energy Ring of KEK B-factory are calculated. The power dissipated inside the vacuum chamber due to the fields scattered by the slots is evaluated using results for the real part of the coupling impedance. Estimates are made for the power flow through the slots to the pumping chamber.
△ Less
Submitted 21 February, 1995;
originally announced February 1995.