5,744 results on '"Sun, Ke"'
Search Results
2. Mistral-C2F: Coarse to Fine Actor for Analytical and Reasoning Enhancement in RLHF and Effective-Merged LLMs
- Author
-
Zheng, Chen, Sun, Ke, and Zhou, Xun
- Subjects
Computer Science - Computation and Language - Abstract
Despite the advances in Large Language Models (LLMs), exemplified by models like GPT-4 and Claude, smaller-scale LLMs such as Llama and Mistral often struggle with generating in-depth and coherent dialogues. This paper presents a novel two-step Coarse-to-Fine Actor model to address the inherent limitations in conversational and analytical capabilities of small-sized LLMs. Our approach begins with the Policy-based Coarse Actor, employing a technique we term "Continuous Maximization". The Coarse Actor establishes an enhanced, knowledge-rich pool adept at aligning with human preference styles in analysis and reasoning. Through the RLHF process, it employs Continuous Maximization, a strategy that dynamically and adaptively extends the output length limit, enabling the generation of more detailed and analytical content. Subsequently, the Fine Actor refines this analytical content, addressing the generation of excessively redundant information from the Coarse Actor. We introduce a "Knowledge Residue Merger" approach, refining the content from the Coarse Actor and merging it with an existing Instruction model to improve quality, correctness, and reduce redundancies. We applied our methodology to the popular Mistral model, creating Mistral-C2F, which has demonstrated exceptional performance across 11 general language tasks and the MT-Bench Dialogue task, outperforming similar-scale models and even larger models with 13B and 30B parameters. Our model has significantly improved conversational and analytical reasoning abilities.
- Published
- 2024
3. Quantum Simulation of Spin-Boson Models with Structured Bath
- Author
-
Sun, Ke, Kang, Mingyu, Nuomin, Hanggai, Schwartz, George, Beratan, David N., Brown, Kenneth R., and Kim, Jungsang
- Subjects
Quantum Physics ,Physics - Atomic Physics - Abstract
The spin-boson model, involving spins interacting with a bath of quantum harmonic oscillators, is a widely used representation of open quantum systems. Trapped ions present a natural platform for simulating the quantum dynamics of such models, thanks to the presence of both high quality internal qubit states and the motional modes of the ions that can simulate the relevant quantum degrees of freedom. In our work, we extend the previous body of work that focused on coherent coupling of the spins and bosons to perform quantum simulations with structured dissipative baths using the motional states of trapped ions. We demonstrate the capability for adjusting the bath's temperature and continuous spectral density by adding randomness to fully programmable control parameters. Subsequently, we simulate the dynamics of various spin-boson models with noise spectral densities constructed from coupling to several dissipative harmonic oscillator modes. The experimental outcomes closely align with theoretical predictions, indicating successful simulation of open quantum systems using a trapped-ion system., Comment: 11 pages, 7 figures
- Published
- 2024
4. DiffusionFace: Towards a Comprehensive Dataset for Diffusion-Based Face Forgery Analysis
- Author
-
Chen, Zhongxi, Sun, Ke, Zhou, Ziyin, Lin, Xianming, Sun, Xiaoshuai, Cao, Liujuan, and Ji, Rongrong
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
The rapid progress in deep learning has given rise to hyper-realistic facial forgery methods, leading to concerns related to misinformation and security risks. Existing face forgery datasets have limitations in generating high-quality facial images and addressing the challenges posed by evolving generative techniques. To combat this, we present DiffusionFace, the first diffusion-based face forgery dataset, covering various forgery categories, including unconditional and Text Guide facial image generation, Img2Img, Inpaint, and Diffusion-based facial exchange algorithms. Our DiffusionFace dataset stands out with its extensive collection of 11 diffusion models and the high-quality of the generated images, providing essential metadata and a real-world internet-sourced forgery facial image dataset for evaluation. Additionally, we provide an in-depth analysis of the data and introduce practical evaluation protocols to rigorously assess discriminative models' effectiveness in detecting counterfeit facial images, aiming to enhance security in facial image authentication processes. The dataset is available for download at \url{https://github.com/Rapisurazurite/DiffFace}.
- Published
- 2024
5. Balancing Enhancement, Harmlessness, and General Capabilities: Enhancing Conversational LLMs with Direct RLHF
- Author
-
Zheng, Chen, Sun, Ke, Wu, Hang, Xi, Chenguang, and Zhou, Xun
- Subjects
Computer Science - Computation and Language - Abstract
In recent advancements in Conversational Large Language Models (LLMs), a concerning trend has emerged, showing that many new base LLMs experience a knowledge reduction in their foundational capabilities following Supervised Fine-Tuning (SFT). This process often leads to issues such as forgetting or a decrease in the base model's abilities. Moreover, fine-tuned models struggle to align with user preferences, inadvertently increasing the generation of toxic outputs when specifically prompted. To overcome these challenges, we adopted an innovative approach by completely bypassing SFT and directly implementing Harmless Reinforcement Learning from Human Feedback (RLHF). Our method not only preserves the base model's general capabilities but also significantly enhances its conversational abilities, while notably reducing the generation of toxic outputs. Our approach holds significant implications for fields that demand a nuanced understanding and generation of responses, such as customer service. We applied this methodology to Mistral, the most popular base model, thereby creating Mistral-Plus. Our validation across 11 general tasks demonstrates that Mistral-Plus outperforms similarly sized open-source base models and their corresponding instruct versions. Importantly, the conversational abilities of Mistral-Plus were significantly improved, indicating a substantial advancement over traditional SFT models in both safety and user preference alignment.
- Published
- 2024
6. SISSA: Real-time Monitoring of Hardware Functional Safety and Cybersecurity with In-vehicle SOME/IP Ethernet Traffic
- Author
-
Liu, Qi, Li, Xingyu, Sun, Ke, Li, Yufeng, and Liu, Yanchen
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Machine Learning ,Computer Science - Networking and Internet Architecture - Abstract
Scalable service-Oriented Middleware over IP (SOME/IP) is an Ethernet communication standard protocol in the Automotive Open System Architecture (AUTOSAR), promoting ECU-to-ECU communication over the IP stack. However, SOME/IP lacks a robust security architecture, making it susceptible to potential attacks. Besides, random hardware failure of ECU will disrupt SOME/IP communication. In this paper, we propose SISSA, a SOME/IP communication traffic-based approach for modeling and analyzing in-vehicle functional safety and cyber security. Specifically, SISSA models hardware failures with the Weibull distribution and addresses five potential attacks on SOME/IP communication, including Distributed Denial-of-Services, Man-in-the-Middle, and abnormal communication processes, assuming a malicious user accesses the in-vehicle network. Subsequently, SISSA designs a series of deep learning models with various backbones to extract features from SOME/IP sessions among ECUs. We adopt residual self-attention to accelerate the model's convergence and enhance detection accuracy, determining whether an ECU is under attack, facing functional failure, or operating normally. Additionally, we have created and annotated a dataset encompassing various classes, including indicators of attack, functionality, and normalcy. This contribution is noteworthy due to the scarcity of publicly accessible datasets with such characteristics.Extensive experimental results show the effectiveness and efficiency of SISSA.
- Published
- 2024
7. Tradeoffs of Diagonal Fisher Information Matrix Estimators
- Author
-
Soen, Alexander and Sun, Ke
- Subjects
Computer Science - Machine Learning ,Statistics - Machine Learning - Abstract
The Fisher information matrix characterizes the local geometry in the parameter space of neural networks. It elucidates insightful theories and useful tools to understand and optimize neural networks. Given its high computational cost, practitioners often use random estimators and evaluate only the diagonal entries. We examine two such estimators, whose accuracy and sample complexity depend on their associated variances. We derive bounds of the variances and instantiate them in regression and classification networks. We navigate trade-offs of both estimators based on analytical and numerical studies. We find that the variance quantities depend on the non-linearity with respect to different parameter groups and should not be neglected when estimating the Fisher information.
- Published
- 2024
8. ICE-GRT: Instruction Context Enhancement by Generative Reinforcement based Transformers
- Author
-
Zheng, Chen, Sun, Ke, Tang, Da, Ma, Yukun, Zhang, Yuyu, Xi, Chenguang, and Zhou, Xun
- Subjects
Computer Science - Computation and Language - Abstract
The emergence of Large Language Models (LLMs) such as ChatGPT and LLaMA encounter limitations in domain-specific tasks, with these models often lacking depth and accuracy in specialized areas, and exhibiting a decrease in general capabilities when fine-tuned, particularly analysis ability in small sized models. To address these gaps, we introduce ICE-GRT, utilizing Reinforcement Learning from Human Feedback (RLHF) grounded in Proximal Policy Optimization (PPO), demonstrating remarkable ability in in-domain scenarios without compromising general task performance. Our exploration of ICE-GRT highlights its understanding and reasoning ability to not only generate robust answers but also to provide detailed analyses of the reasons behind the answer. This capability marks a significant progression beyond the scope of Supervised Fine-Tuning models. The success of ICE-GRT is dependent on several crucial factors, including Appropriate Data, Reward Size Scaling, KL-Control, Advantage Normalization, etc. The ICE-GRT model exhibits state-of-the-art performance in domain-specific tasks and across 12 general Language tasks against equivalent size and even larger size LLMs, highlighting the effectiveness of our approach. We provide a comprehensive analysis of the ICE-GRT, underscoring the significant advancements it brings to the field of LLM.
- Published
- 2024
9. Animate Anyone: Consistent and Controllable Image-to-Video Synthesis for Character Animation
- Author
-
Hu, Li, Gao, Xin, Zhang, Peng, Sun, Ke, Zhang, Bang, and Bo, Liefeng
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Character Animation aims to generating character videos from still images through driving signals. Currently, diffusion models have become the mainstream in visual generation research, owing to their robust generative capabilities. However, challenges persist in the realm of image-to-video, especially in character animation, where temporally maintaining consistency with detailed information from character remains a formidable problem. In this paper, we leverage the power of diffusion models and propose a novel framework tailored for character animation. To preserve consistency of intricate appearance features from reference image, we design ReferenceNet to merge detail features via spatial attention. To ensure controllability and continuity, we introduce an efficient pose guider to direct character's movements and employ an effective temporal modeling approach to ensure smooth inter-frame transitions between video frames. By expanding the training data, our approach can animate arbitrary characters, yielding superior results in character animation compared to other image-to-video methods. Furthermore, we evaluate our method on benchmarks for fashion video and human dance synthesis, achieving state-of-the-art results., Comment: Page: https://humanaigc.github.io/animate-anyone/
- Published
- 2023
10. PI3K/AKT/mTOR signaling pathway: an important driver and therapeutic target in triple-negative breast cancer
- Author
-
Zhang, Huan-ping, Jiang, Rui-yuan, Zhu, Jia-yu, Sun, Ke-na, Huang, Yuan, Zhou, Huan-huan, Zheng, Ya-bing, and Wang, Xiao-jia
- Published
- 2024
- Full Text
- View/download PDF
11. Data-driven model identification and control of the quasi-zero-stiffness system
- Author
-
Jiang, Jiyuan, Tang, Jie, Sun, Ke, Chen, Huatao, Li, Yinghui, and Cao, Dengqing
- Published
- 2024
- Full Text
- View/download PDF
12. Effects of Zr and Sr on microstructure and mechanical properties of cast Al–Si–Cu–Ni–Mg alloy
- Author
-
Zhang, Ning, Feng, Yicheng, Sun, Ke, Zhao, Sicong, and Fu, Yuanke
- Published
- 2024
- Full Text
- View/download PDF
13. Seeking a quantum advantage with trapped-ion quantum simulations of condensed-phase chemical dynamics
- Author
-
Kang, Mingyu, Nuomin, Hanggai, Chowdhury, Sutirtha N., Yuly, Jonathon L., Sun, Ke, Whitlow, Jacob, Valdiviezo, Jesús, Zhang, Zhendian, Zhang, Peng, Beratan, David N., and Brown, Kenneth R.
- Published
- 2024
- Full Text
- View/download PDF
14. Magmaw: Modality-Agnostic Adversarial Attacks on Machine Learning-Based Wireless Communication Systems
- Author
-
Chang, Jung-Woo, Sun, Ke, Heydaribeni, Nasimeh, Hidano, Seira, Zhang, Xinyu, and Koushanfar, Farinaz
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Artificial Intelligence - Abstract
Machine Learning (ML) has been instrumental in enabling joint transceiver optimization by merging all physical layer blocks of the end-to-end wireless communication systems. Although there have been a number of adversarial attacks on ML-based wireless systems, the existing methods do not provide a comprehensive view including multi-modality of the source data, common physical layer components, and wireless domain constraints. This paper proposes Magmaw, the first black-box attack methodology capable of generating universal adversarial perturbations for any multimodal signal transmitted over a wireless channel. We further introduce new objectives for adversarial attacks on ML-based downstream applications. The resilience of the attack to the existing widely used defense methods of adversarial training and perturbation signal subtraction is experimentally verified. For proof-of-concept evaluation, we build a real-time wireless attack platform using a software-defined radio system. Experimental results demonstrate that Magmaw causes significant performance degradation even in the presence of the defense mechanisms. Surprisingly, Magmaw is also effective against encrypted communication channels and conventional communications.
- Published
- 2023
15. Balancing Specialized and General Skills in LLMs: The Impact of Modern Tuning and Data Strategy
- Author
-
Zhang, Zheng, Zheng, Chen, Tang, Da, Sun, Ke, Ma, Yukun, Bu, Yingtong, Zhou, Xun, and Zhao, Liang
- Subjects
Computer Science - Computation and Language ,Computer Science - Artificial Intelligence - Abstract
This paper introduces a multifaceted methodology for fine-tuning and evaluating large language models (LLMs) for specialized monetization tasks. The goal is to balance general language proficiency with domain-specific skills. The methodology has three main components: 1) Carefully blending in-domain and general-purpose data during fine-tuning to achieve an optimal balance between general and specialized capabilities; 2) Designing a comprehensive evaluation framework with 45 questions tailored to assess performance on functionally relevant dimensions like reliability, consistency, and business impact; 3) Analyzing how model size and continual training influence metrics to guide efficient resource allocation during fine-tuning. The paper details the design, data collection, analytical techniques, and results validating the proposed frameworks. It aims to provide businesses and researchers with actionable insights on effectively adapting LLMs for specialized contexts. We also intend to make public the comprehensive evaluation framework, which includes the 45 tailored questions and their respective scoring guidelines, to foster transparency and collaboration in adapting LLMs for specialized tasks.
- Published
- 2023
16. Continual Face Forgery Detection via Historical Distribution Preserving
- Author
-
Sun, Ke, Chen, Shen, Yao, Taiping, Sun, Xiaoshuai, Ding, Shouhong, and Ji, Rongrong
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Face forgery techniques have advanced rapidly and pose serious security threats. Existing face forgery detection methods try to learn generalizable features, but they still fall short of practical application. Additionally, finetuning these methods on historical training data is resource-intensive in terms of time and storage. In this paper, we focus on a novel and challenging problem: Continual Face Forgery Detection (CFFD), which aims to efficiently learn from new forgery attacks without forgetting previous ones. Specifically, we propose a Historical Distribution Preserving (HDP) framework that reserves and preserves the distributions of historical faces. To achieve this, we use universal adversarial perturbation (UAP) to simulate historical forgery distribution, and knowledge distillation to maintain the distribution variation of real faces across different models. We also construct a new benchmark for CFFD with three evaluation protocols. Our extensive experiments on the benchmarks show that our method outperforms the state-of-the-art competitors.
- Published
- 2023
17. Cloth2Tex: A Customized Cloth Texture Generation Pipeline for 3D Virtual Try-On
- Author
-
Gao, Daiheng, Chen, Xu, Zhang, Xindi, Wang, Qi, Sun, Ke, Zhang, Bang, Bo, Liefeng, and Huang, Qixing
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Fabricating and designing 3D garments has become extremely demanding with the increasing need for synthesizing realistic dressed persons for a variety of applications, e.g. 3D virtual try-on, digitalization of 2D clothes into 3D apparel, and cloth animation. It thus necessitates a simple and straightforward pipeline to obtain high-quality texture from simple input, such as 2D reference images. Since traditional warping-based texture generation methods require a significant number of control points to be manually selected for each type of garment, which can be a time-consuming and tedious process. We propose a novel method, called Cloth2Tex, which eliminates the human burden in this process. Cloth2Tex is a self-supervised method that generates texture maps with reasonable layout and structural consistency. Another key feature of Cloth2Tex is that it can be used to support high-fidelity texture inpainting. This is done by combining Cloth2Tex with a prevailing latent diffusion model. We evaluate our approach both qualitatively and quantitatively and demonstrate that Cloth2Tex can generate high-quality texture maps and achieve the best visual effects in comparison to other methods. Project page: tomguluson92.github.io/projects/cloth2tex/, Comment: 15 pages, 15 figures
- Published
- 2023
18. Metabolic Heterogeneity and Potential Immunotherapeutic Responses Revealed by Single-Cell Transcriptomics of Breast Cancer
- Author
-
Tang, Shicong, Wang, Qing, Sun, Ke, Song, Ying, Liu, Rui, Tan, Xin, Li, Huimeng, Lv, Yafeng, Yang, Fuying, Zhao, Jiawen, Li, Sijia, Bi, Pingping, Yang, Jiali, Zhu, Zhengna, Chen, Dong, Chuan, Zhirui, Luo, Xiaomao, Hu, Zaoxiu, Liu, Ying, Li, Zhenhui, Ke, Tengfei, Jiang, Dewei, Zheng, Kai, Yang, Rirong, Chen, Kai, and Guo, Rong
- Published
- 2024
- Full Text
- View/download PDF
19. Real-time detection of 20 amino acids and discrimination of pathologically relevant peptides with functionalized nanopore
- Author
-
Zhang, Ming, Tang, Chao, Wang, Zichun, Chen, Shanchuan, Zhang, Dan, Li, Kaiju, Sun, Ke, Zhao, Changjian, Wang, Yu, Xu, Mengying, Dai, Lunzhi, Lu, Guangwen, Shi, Hubing, Ren, Haiyan, Chen, Lu, and Geng, Jia
- Published
- 2024
- Full Text
- View/download PDF
20. Illuminating spin-crossover octanuclear metal-organic cages
- Author
-
Liu, Zhi-Kun, Starikova, Alyona A., Li, Yu-Xia, Sun, Ke, Yu, Meng, Yao, Zi-Shuo, and Tao, Jun
- Published
- 2024
- Full Text
- View/download PDF
21. A New Perspective in the Treatment of Ischemic Stroke: Ferroptosis
- Author
-
Zhang, Lei, Bai, Xin Yue, Sun, Ke Yao, Li, Xuan, Zhang, Zhao Qi, Liu, Yi Ding, Xiang, Yang, and Liu, Xiao Long
- Published
- 2024
- Full Text
- View/download PDF
22. Late holocene soil evolution and environment change in the southeast suburbs of Beijing, China
- Author
-
Liang, Jia, Zhao, Ye, Song, Mengjie, Li, Fangfang, Liu, Xitao, Sun, Ke, Chen, Lei, and Li, Gary
- Published
- 2024
- Full Text
- View/download PDF
23. Improve meat production and virus resistance by simultaneously editing multiple genes in livestock using Cas12iMax
- Author
-
Ren, Jilong, Hai, Tang, Chen, Yangcan, Sun, Ke, Han, Zhiqiang, Wang, Jing, Li, Chongyang, Wang, Qingwei, Wang, Leyun, Zhu, Huabing, Yu, Dawei, Li, Wei, and Zhao, Shanjiang
- Published
- 2024
- Full Text
- View/download PDF
24. Towards General Visual-Linguistic Face Forgery Detection
- Author
-
Sun, Ke, Chen, Shen, Yao, Taiping, Yang, Haozhe, Sun, Xiaoshuai, Ding, Shouhong, and Ji, Rongrong
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Deepfakes are realistic face manipulations that can pose serious threats to security, privacy, and trust. Existing methods mostly treat this task as binary classification, which uses digital labels or mask signals to train the detection model. We argue that such supervisions lack semantic information and interpretability. To address this issues, in this paper, we propose a novel paradigm named Visual-Linguistic Face Forgery Detection(VLFFD), which uses fine-grained sentence-level prompts as the annotation. Since text annotations are not available in current deepfakes datasets, VLFFD first generates the mixed forgery image with corresponding fine-grained prompts via Prompt Forgery Image Generator (PFIG). Then, the fine-grained mixed data and coarse-grained original data and is jointly trained with the Coarse-and-Fine Co-training framework (C2F), enabling the model to gain more generalization and interpretability. The experiments show the proposed method improves the existing detection models on several challenging benchmarks. Furthermore, we have integrated our method with multimodal large models, achieving noteworthy results that demonstrate the potential of our approach. This integration not only enhances the performance of our VLFFD paradigm but also underscores the versatility and adaptability of our method when combined with advanced multimodal technologies, highlighting its potential in tackling the evolving challenges of deepfake detection.
- Published
- 2023
25. The Power of Telemetry: Uncovering Software-Based Side-Channel Attacks on Apple M1/M2 Systems
- Author
-
Chawla, Nikhil, Liu, Chen, Chakraborty, Abhishek, Chervatyuk, Igor, Sun, Ke, Hamasaki, Thais Moreira, and Kawakami, Henrique
- Subjects
Computer Science - Cryptography and Security - Abstract
Power analysis is a class of side-channel attacks, where power consumption data is used to infer sensitive information and extract secrets from a system. Traditionally, such attacks required physical access to the target, as well as specialized devices to measure the power consumption with enough precision. The PLATYPUS attack has shown that on-chip power meter capabilities exposed to a software interface might form a new class of power side-channel attacks. This paper presents a software-based power side-channel attack on Apple Silicon M1/M2 platforms, exploiting the System Management Controller (SMC) and its power-related keys, which provides access to the on-chip power meters through a software interface to user space software. We observed data-dependent power consumption reporting from such keys and analyzed the correlations between the power consumption and the processed data. Our work also demonstrated how an unprivileged user mode application successfully recovers bytes from an AES encryption key from a cryptographic service supported by a kernel mode driver in macOS. Furthermore, we discuss the impact of software-based power side-channels in the industry, possible countermeasures, and the overall implications of software interfaces for modern on-chip power management systems., Comment: 6 pages, 4 figures, 5 tables
- Published
- 2023
26. Hydrophobically gated memristive nanopores for neuromorphic applications
- Author
-
Paulo, Gonçalo, Sun, Ke, di Muccio, Giovanni, Gubbiotti, Alberto, della Rocca, Blasco Morozzo, Geng, Jia, Maglia, Giovanni, Chinappi, Mauro, and Giacomello, Alberto
- Subjects
Condensed Matter - Mesoscale and Nanoscale Physics ,Condensed Matter - Soft Condensed Matter - Abstract
Brain-inspired computing has the potential to revolutionise the current von Neumann architecture, advancing machine learning applications. Signal transmission in the brain relies on voltage-gated ion channels, which exhibit the electrical behaviour of memristors, resistors with memory. State-of-the-art technologies currently employ semiconductor-based neuromorphic approaches, which have already demonstrated their efficacy in machine learning systems. However, these approaches still cannot match performance achieved by biological neurons in terms of energy efficiency and size. In this study, we utilise molecular dynamics simulations, continuum models, and electrophysiological experiments to propose and realise a bioinspired hydrophobically gated memristive nanopore. Our findings indicate that hydrophobic gating enables memory through an electrowetting mechanism, and we establish simple design rules accordingly. Through the engineering of a biological nanopore, we successfully replicate the characteristic hysteresis cycles of a memristor \tr{and construct a synaptic device capable of learning and forgetting}. This advancement offers a promising pathway for the realization of nanoscale, cost- and energy-effective, and adaptable bioinspired memristors.
- Published
- 2023
- Full Text
- View/download PDF
27. CamoDiffusion: Camouflaged Object Detection via Conditional Diffusion Models
- Author
-
Chen, Zhongxi, Sun, Ke, Lin, Xianming, and Ji, Rongrong
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Artificial Intelligence - Abstract
Camouflaged Object Detection (COD) is a challenging task in computer vision due to the high similarity between camouflaged objects and their surroundings. Existing COD methods primarily employ semantic segmentation, which suffers from overconfident incorrect predictions. In this paper, we propose a new paradigm that treats COD as a conditional mask-generation task leveraging diffusion models. Our method, dubbed CamoDiffusion, employs the denoising process of diffusion models to iteratively reduce the noise of the mask. Due to the stochastic sampling process of diffusion, our model is capable of sampling multiple possible predictions from the mask distribution, avoiding the problem of overconfident point estimation. Moreover, we develop specialized learning strategies that include an innovative ensemble approach for generating robust predictions and tailored forward diffusion methods for efficient training, specifically for the COD task. Extensive experiments on three COD datasets attest the superior performance of our model compared to existing state-of-the-art methods, particularly on the most challenging COD10K dataset, where our approach achieves 0.019 in terms of MAE.
- Published
- 2023
28. Gloss-Free End-to-End Sign Language Translation
- Author
-
Lin, Kezhou, Wang, Xiaohan, Zhu, Linchao, Sun, Ke, Zhang, Bang, and Yang, Yi
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Computation and Language - Abstract
In this paper, we tackle the problem of sign language translation (SLT) without gloss annotations. Although intermediate representation like gloss has been proven effective, gloss annotations are hard to acquire, especially in large quantities. This limits the domain coverage of translation datasets, thus handicapping real-world applications. To mitigate this problem, we design the Gloss-Free End-to-end sign language translation framework (GloFE). Our method improves the performance of SLT in the gloss-free setting by exploiting the shared underlying semantics of signs and the corresponding spoken translation. Common concepts are extracted from the text and used as a weak form of intermediate representation. The global embedding of these concepts is used as a query for cross-attention to find the corresponding information within the learned visual features. In a contrastive manner, we encourage the similarity of query results between samples containing such concepts and decrease those that do not. We obtained state-of-the-art results on large-scale datasets, including OpenASL and How2Sign. The code and model will be available at https://github.com/HenryLittle/GloFE., Comment: ACL 2023 Main Conference (Oral)
- Published
- 2023
29. Seeking a quantum advantage with trapped-ion quantum simulations of condensed-phase chemical dynamics
- Author
-
Kang, Mingyu, Nuomin, Hanggai, Chowdhury, Sutirtha N., Yuly, Jonathon L., Sun, Ke, Whitlow, Jacob, Valdiviezo, Jesús, Zhang, Zhendian, Zhang, Peng, Beratan, David N., and Brown, Kenneth R.
- Subjects
Quantum Physics - Abstract
Simulating the quantum dynamics of molecules in the condensed phase represents a longstanding challenge in chemistry. Trapped-ion quantum systems may serve as a platform for the analog-quantum simulation of chemical dynamics that is beyond the reach of current classical-digital simulation. To identify a 'quantum advantage' for these simulations, performance analysis of both analog-quantum simulation on noisy hardware and classical-digital algorithms is needed. In this Review, we make a comparison between a noisy analog trapped-ion simulator and a few choice classical-digital methods on simulating the dynamics of a model molecular Hamiltonian with linear vibronic coupling. We describe several simple Hamiltonians that are commonly used to model molecular systems, which can be simulated with existing or emerging trapped-ion hardware. These Hamiltonians may serve as stepping stones toward the use of trapped-ion simulators for systems beyond the reach of classical-digital methods. Finally, we identify dynamical regimes where classical-digital simulations seem to have the weakest performance compared to analog-quantum simulations. These regimes may provide the lowest hanging fruit to exploit potential quantum advantages., Comment: 27 pages, 6 figures. v2) Box 1 and Subsection "LVCM beyond the simple model: seeking a quantum advantage" added. v3) Fig. 1 revised
- Published
- 2023
- Full Text
- View/download PDF
30. Quantum Simulation of Polarized Light-induced Electron Transfer with A Trapped-ion Qutrit System
- Author
-
Sun, Ke, Fang, Chao, Kang, Mingyu, Zhang, Zhendian, Zhang, Peng, Beratan, David N., Brown, Kenneth R., and Kim, Jungsang
- Subjects
Quantum Physics ,Physics - Atomic Physics - Abstract
Electron transfer within and between molecules is crucial in chemistry, biochemistry, and energy science. This study describes a quantum simulation method that explores the influence of light polarization on the electron transfer between two molecules. By implementing precise and coherent control among the quantum states of trapped atomic ions, we can induce quantum dynamics that mimic the electron transfer dynamics in molecules. We use $3$-level systems (qutrits), rather than traditional two-level systems (qubits) to enhance the simulation efficiency and realize high-fidelity simulations of electron transfer dynamics. We treat the quantum interference between the electron coupling pathways from a donor with two degenerate excited states to an acceptor and analyze the transfer efficiency. We also examine the potential error sources that enter the quantum simulations. The trapped ion systems have favorable scalings with system size compared to those of classical computers, promising access to electron-transfer simulations of increasing richness., Comment: 9 pages, 6 figures
- Published
- 2023
- Full Text
- View/download PDF
31. InterFormer: Real-time Interactive Image Segmentation
- Author
-
Huang, You, Yang, Hao, Sun, Ke, Zhang, Shengchuan, Cao, Liujuan, Jiang, Guannan, and Ji, Rongrong
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Human-Computer Interaction - Abstract
Interactive image segmentation enables annotators to efficiently perform pixel-level annotation for segmentation tasks. However, the existing interactive segmentation pipeline suffers from inefficient computations of interactive models because of the following two issues. First, annotators' later click is based on models' feedback of annotators' former click. This serial interaction is unable to utilize model's parallelism capabilities. Second, in each interaction step, the model handles the invariant image along with the sparse variable clicks, resulting in a process that's highly repetitive and redundant. For efficient computations, we propose a method named InterFormer that follows a new pipeline to address these issues. InterFormer extracts and preprocesses the computationally time-consuming part i.e. image processing from the existing process. Specifically, InterFormer employs a large vision transformer (ViT) on high-performance devices to preprocess images in parallel, and then uses a lightweight module called interactive multi-head self attention (I-MSA) for interactive segmentation. Furthermore, the I-MSA module's deployment on low-power devices extends the practical application of interactive segmentation. The I-MSA module utilizes the preprocessed features to efficiently response to the annotator inputs in real-time. The experiments on several datasets demonstrate the effectiveness of InterFormer, which outperforms previous interactive segmentation models in terms of computational efficiency and segmentation quality, achieve real-time high-quality interactive segmentation on CPU-only devices. The code is available at https://github.com/YouHuang67/InterFormer., Comment: ICCV2023
- Published
- 2023
32. FineIBT: Fine-grain Control-flow Enforcement with Indirect Branch Tracking
- Author
-
Gaidis, Alexander J., Moreira, Joao, Sun, Ke, Milburn, Alyssa, Atlidakis, Vaggelis, and Kemerlis, Vasileios P.
- Subjects
Computer Science - Cryptography and Security - Abstract
We present the design, implementation, and evaluation of FineIBT: a CFI enforcement mechanism that improves the precision of hardware-assisted CFI solutions, like Intel IBT, by instrumenting program code to reduce the valid/allowed targets of indirect forward-edge transfers. We study the design of FineIBT on the x86-64 architecture, and implement and evaluate it on Linux and the LLVM toolchain. We designed FineIBT's instrumentation to be compact, incurring low runtime and memory overheads, and generic, so as to support different CFI policies. Our prototype implementation incurs negligible runtime slowdowns ($\approx$0%-1.94% in SPEC CPU2017 and $\approx$0%-1.92% in real-world applications) outperforming Clang-CFI. Lastly, we investigate the effectiveness/security and compatibility of FineIBT using the ConFIRM CFI benchmarking suite, demonstrating that our instrumentation provides complete coverage in the presence of modern software features, while supporting a wide range of CFI policies with the same, predictable performance., Comment: Accepted at RAID 2023. Errata (reported by Lucas Becker): Section 2.4.1: "in which every bit represents 8 bytes of (virtual) memory" -> "in which two bits represent 16 bytes of (virtual) memory"
- Published
- 2023
33. Mathematical Challenges in Deep Learning
- Author
-
Nia, Vahid Partovi, Zhang, Guojun, Kobyzev, Ivan, Metel, Michael R., Li, Xinlin, Sun, Ke, Hemati, Sobhan, Asgharian, Masoud, Kong, Linglong, Liu, Wulong, and Chen, Boxing
- Subjects
Computer Science - Machine Learning ,Computer Science - Artificial Intelligence ,Mathematics - Statistics Theory ,Statistics - Machine Learning - Abstract
Deep models are dominating the artificial intelligence (AI) industry since the ImageNet challenge in 2012. The size of deep models is increasing ever since, which brings new challenges to this field with applications in cell phones, personal computers, autonomous cars, and wireless base stations. Here we list a set of problems, ranging from training, inference, generalization bound, and optimization with some formalism to communicate these challenges with mathematicians, statisticians, and theoretical computer scientists. This is a subjective view of the research questions in deep learning that benefits the tech industry in long run.
- Published
- 2023
34. Transformed Distribution Matching for Missing Value Imputation
- Author
-
Zhao, He, Sun, Ke, Dezfouli, Amir, and Bonilla, Edwin
- Subjects
Computer Science - Machine Learning - Abstract
We study the problem of imputing missing values in a dataset, which has important applications in many domains. The key to missing value imputation is to capture the data distribution with incomplete samples and impute the missing values accordingly. In this paper, by leveraging the fact that any two batches of data with missing values come from the same data distribution, we propose to impute the missing values of two batches of samples by transforming them into a latent space through deep invertible functions and matching them distributionally. To learn the transformations and impute the missing values simultaneously, a simple and well-motivated algorithm is proposed. Our algorithm has fewer hyperparameters to fine-tune and generates high-quality imputations regardless of how missing values are generated. Extensive experiments over a large number of datasets and competing benchmark algorithms show that our method achieves state-of-the-art performance., Comment: ICML 2023 camera-ready version, https://openreview.net/forum?id=WBWb1FU8iz
- Published
- 2023
35. Seabed Liquefaction Around a Composite Breakwater with Dynamic Soil Resistance Under the Wave and Current Actions
- Author
-
Sun, Ke, Zhang, Bing, Gao, Yuan, di Prisco, Marco, Series Editor, Chen, Sheng-Hong, Series Editor, Vayas, Ioannis, Series Editor, Kumar Shukla, Sanjay, Series Editor, Sharma, Anuj, Series Editor, Kumar, Nagesh, Series Editor, Wang, Chien Ming, Series Editor, Cui, Zhen-Dong, Series Editor, Tajima, Yoshimitsu, editor, Aoki, Shin-ichi, editor, and Sato, Shinji, editor
- Published
- 2024
- Full Text
- View/download PDF
36. Research on High Frequency Current Measurement Method for the SiC MOSFET
- Author
-
Liang, Shuai, Liu, Yuming, Miao, Chunhui, Sun, Ke, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Zhang, Junjie James, Series Editor, Tan, Kay Chen, Series Editor, Yang, Jianwei, editor, Liu, Zhigang, editor, Diao, Lijun, editor, and An, Min, editor
- Published
- 2024
- Full Text
- View/download PDF
37. Research on the Structure Design of Body Clothing for Elderly Women
- Author
-
Xu, Tian-tian, Sun, Ke-ke, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Zhang, Junjie James, Series Editor, Tan, Kay Chen, Series Editor, Lin, Jerry Chun-Wei, editor, Shieh, Chin-Shiuh, editor, Horng, Mong-Fong, editor, and Chu, Shu-Chuan, editor
- Published
- 2024
- Full Text
- View/download PDF
38. Renal outcomes in IgA nephropathy following inactivated SARS-CoV-2 vaccination
- Author
-
Sun, Ke, Shang, Da, Hao, Chuanming, and Lai, LingYun
- Published
- 2024
- Full Text
- View/download PDF
39. Clinical phenotypes and prognosis of IgG4-related diseases accompanied by deteriorated kidney function: a retrospective study
- Author
-
Guo, Luying, Yang, Zhenzhen, Cheng, Yamei, Wang, Xingxia, Ren, Xue, Wang, Meifang, Yan, Pengpeng, Shen, Jia, Sun, Ke, Wang, Huiping, Wu, Jianyong, Chen, Jianghua, and Wang, Rending
- Published
- 2024
- Full Text
- View/download PDF
40. Special Fatigue Fracture Behavior of Nanocrystalline Metals under Hydrogen Conditions
- Author
-
Zhao, Keke, Zhang, Jiding, Sun, Ke, Liu, Wenhao, and Jiang, Xiaoyu
- Published
- 2023
- Full Text
- View/download PDF
41. Gene duplication and functional divergence of new genes contributed to the polar acclimation of Antarctic green algae
- Author
-
Zhang, Xiaowen, Han, Wentao, Fan, Xiao, Wang, Yitao, Xu, Dong, Sun, Ke, Wang, Wei, Zhang, Yan, Ma, Jian, and Ye, Naihao
- Published
- 2023
- Full Text
- View/download PDF
42. Realization of Scalable Cirac-Zoller Multi-Qubit Gates
- Author
-
Fang, Chao, Wang, Ye, Sun, Ke, and Kim, Jungsang
- Subjects
Quantum Physics - Abstract
The universality theorem in quantum computing states that any quantum computational task can be decomposed into a finite set of logic gates operating on one and two qubits. However, the process of such decomposition is generally inefficient, often leading to exponentially many gates to realize an arbitrary computational task. Practical processor designs benefit greatly from availability of multi-qubit gates that operate on more than two qubits to implement the desired circuit. In 1995, Cirac and Zoller proposed a method to realize native multi-qubit controlled-$Z$ gates in trapped ion systems, which has a stringent requirement on ground-state cooling of the motional modes utilized by the gate. An alternative approach, the M\o lmer-S\o rensen gate, is robust against residual motional excitation and has been a foundation for many high-fidelity gate demonstrations. This gate does not scale well beyond two qubits, incurring additional overhead when used to construct many target algorithms. Here, we take advantage of novel performance benefits of long ion chains to realize fully programmable and scalable high-fidelity Cirac-Zoller gates., Comment: 11 pages, 6 figures
- Published
- 2023
43. Rare top quark decays in the minimal R-symmetric supersymmetric standard model
- Author
-
Sun, Ke-Sheng, Wang, Zhi-Chuan, Yang, Xiu-Yi, and Zhang, Hai-Bin
- Subjects
High Energy Physics - Phenomenology - Abstract
The one-loop contributions to the flavor changing neutral current decays of the top quark into a light quark and a gauge boson or Higgs boson: $t\rightarrow qV,qh$, with $q$ = $u$ or $c$, $V$ = $\gamma$, $g$ or $Z$, are analyzed in this work in the framework of the minimal R-symmetric supersymmetric standard model. The numerical results show that the gluino or $\rho$-chargino dominates the predictions on BR($t\rightarrow qV,qh$), and the contributions from neutralino or $\chi$-chargino are insignificant. Taking account of the constraints on the squark mixing parameters from $\bar{B}\rightarrow X_s\gamma$ and $B^0_{d,s}\rightarrow \mu^+\mu^-$, the theoretical predictions on BR($t\rightarrow qg$) can be enhanced to be $\mathcal O(10^{-5}-10^{-6})$ and these two processes are very promising to be observed at the HL-LHC and FCC-hh. The values of BR($t\rightarrow q\gamma,qZ,qh$) are predicted to be, at least, four orders of magnitude below the present experimental bounds., Comment: 21 pages,8 figures
- Published
- 2023
44. Some Properties of the Nash Equilibrium in $2 \times 2$ Zero-Sum Games
- Author
-
Sun, Ke
- Subjects
Computer Science - Computer Science and Game Theory - Abstract
In this report, some properties of the set of Nash equilibria (NEs) of $2 \times 2$ zero-sum games are reviewed. In particular, the cardinality of the set of NEs is given in terms of the entries of the payoff matrix. Moreover, closed-form expressions for the NE strategies and the payoff at the NE (the value of the game) are provided in terms of the entries of the payoff matrix. The results presented in this report are not necessarily new knowledge, as they follow from the definition of the NE after some tedious calculations. Nevertheless this synthetic presentation is original in the literature.
- Published
- 2022
45. $2 \times 2$ Zero-Sum Games with Commitments and Noisy Observations
- Author
-
Sun, Ke, Perlaza, Samir M., and Jean-Marie, Alain
- Subjects
Computer Science - Computer Science and Game Theory ,Computer Science - Information Theory ,Computer Science - Machine Learning ,Mathematics - Statistics Theory ,Statistics - Machine Learning - Abstract
In this paper, $2\times2$ zero-sum games are studied under the following assumptions: $(1)$ One of the players (the leader) commits to choose its actions by sampling a given probability measure (strategy); $(2)$ The leader announces its action, which is observed by its opponent (the follower) through a binary channel; and $(3)$ the follower chooses its strategy based on the knowledge of the leader's strategy and the noisy observation of the leader's action. Under these conditions, the equilibrium is shown to always exist. Interestingly, even subject to noise, observing the actions of the leader is shown to be either beneficial or immaterial for the follower. More specifically, the payoff at the equilibrium of this game is upper bounded by the payoff at the Stackelberg equilibrium (SE) in pure strategies; and lower bounded by the payoff at the Nash equilibrium, which is equivalent to the SE in mixed strategies.Finally, necessary and sufficient conditions for observing the payoff at equilibrium to be equal to its lower bound are presented. Sufficient conditions for the payoff at equilibrium to be equal to its upper bound are also presented., Comment: Accepted by 2023 IEEE Int. Symp. on Information Theory (ISIT)
- Published
- 2022
46. Differential Analysis of Disability in Different Settings in China: Based on a Survey of 23 922 Older Adults
- Author
-
SUN Ke, SUN Chao, HAO Jinjuan, XU Huazhao, MA Yan, HU Huixiu
- Subjects
aged ,disability ,activity of daily living ,community health services ,nursing homes ,hospitals ,Medicine - Abstract
Background With the increasing of older adults with disability, it is urgent to understand the disability status of older adults in different settings and to improve the long-term care service model from professional institutions to communities and families. Objective To investigate the disability status of older adults in different settings (hospitals, nursing facilities, and communities) , compare and analyze the differences in the disability status of the elderly in different settings. Methods The multi-stage sampling method was used in this study from January 2022 to January 2023. At the first stage, one or two provinces were conveniently selected in East China, South China, Central China, North China, and Southwest China; at the second stage, 3 tertiary hospitals, 2 secondary hospitals, 2 community health centers, and 1 nursing facility were conveniently selected as the study sites in each province. Older adults in 27 tertiary hospitals, 18 secondary hospitals, 18 community health service centers, and 9 nursing facilities in 9 provinces and cities (Beijing, Hunan, Jiangsu, Guangdong, Fujian, Xinjiang Uygur Autonomous Region, Guizhou, Hainan, and Sichuan) were finally included as study subjects. Barthel Index (BI) was used to evaluate basic activity of daily living (BADL) . Lawton-Brody Instrumental Activity of Daily Living scale was used to evaluate instrumental activity of daily living (IADL) . The Logistic regression analysis was used to explore the association of settings with BADL disability degree, IADL disability degree and functional disability in different aspects for older adults. Results A total of 27 344 questionnaires were collected and 23 922 were valid, with a valid recovery rate of 87.5%. There were 10 318 cases (43.1%) disabled in BADL, and the top three disabled BADL functions were bed-chair transfers, ascend and descend stairs, mobility on level surfaces. The incidence of BADL disability in various places was 29.0% in communities, 74.9% in elderly care institutions, 54.0% in secondary hospitals, and 44.6% in tertiary hospitals. Besides, 19 200 (80.3%) cases were disabled in IADL and the top three disabled IADL functions were mode of transportation, housekeeping and shopping. The incidence of IADL disability in various places was 74.6% in communities, 96.4% in elderly care institutions, 83.6% in secondary hospitals, and 81.1% in tertiary hospitals. Different settings were the influencing factor for the disability degree and functional disability types (P
- Published
- 2024
- Full Text
- View/download PDF
47. Nanohertz gravitational waves from supergravity inflationary model with double-inflection-point
- Author
-
Gao, Tie-Jun, Sun, Ke-Sheng, and Yang, Xiu-Yi
- Published
- 2024
- Full Text
- View/download PDF
48. Research on High Frequency Current Measurement Method for the SiC MOSFET
- Author
-
Liang, Shuai, primary, Liu, Yuming, additional, Miao, Chunhui, additional, and Sun, Ke, additional
- Published
- 2024
- Full Text
- View/download PDF
49. Identification, Amplification and Measurement: A bridge to Gaussian Differential Privacy
- Author
-
Liu, Yi, Sun, Ke, Kong, Linglong, and Jiang, Bei
- Subjects
Computer Science - Cryptography and Security - Abstract
Gaussian differential privacy (GDP) is a single-parameter family of privacy notions that provides coherent guarantees to avoid the exposure of sensitive individual information. Despite the extra interpretability and tighter bounds under composition GDP provides, many widely used mechanisms (e.g., the Laplace mechanism) inherently provide GDP guarantees but often fail to take advantage of this new framework because their privacy guarantees were derived under a different background. In this paper, we study the asymptotic properties of privacy profiles and develop a simple criterion to identify algorithms with GDP properties. We propose an efficient method for GDP algorithms to narrow down possible values of an optimal privacy measurement, $\mu$ with an arbitrarily small and quantifiable margin of error. For non GDP algorithms, we provide a post-processing procedure that can amplify existing privacy guarantees to meet the GDP condition. As applications, we compare two single-parameter families of privacy notions, $\epsilon$-DP, and $\mu$-GDP, and show that all $\epsilon$-DP algorithms are intrinsically also GDP. Lastly, we show that the combination of our measurement process and the composition theorem of GDP is a powerful and convenient tool to handle compositions compared to the traditional standard and advanced composition theorems.
- Published
- 2022
50. Angle-robust Two-Qubit Gates in a Linear Ion Crystal
- Author
-
Jia, Zhubing, Huang, Shilin, Kang, Mingyu, Sun, Ke, Spivey, Robert F., Kim, Jungsang, and Brown, Kenneth R.
- Subjects
Quantum Physics - Abstract
In trapped-ion quantum computers, two-qubit entangling gates are generated by applying spin-dependent force which uses phonons to mediate interaction between the internal states of the ions. To maintain high-fidelity two-qubit gates under fluctuating experimental parameters, robust pulse-design methods are applied to remove the residual spin-motion entanglement in the presence of motional mode frequency drifts. Here we propose an improved pulse-design method that also guarantees the robustness of the two-qubit rotation angle against uniform mode frequency drifts by combining pulses with opposite sensitivity of the angle to mode frequency drifts. We experimentally measure the performance of the designed gates and see an improvement on both gate fidelity and gate performance under uniform mode frequency offsets., Comment: 10 pages, 11 figures
- Published
- 2022
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.