1. Principles of Quantum Communication Theory: A Modern Approach
Sumeet Khatri, Mark M. Wilde
- retweets: 1242, favorites: 174 (11/12/2020 09:14:17)
- links: abs | pdf
- quant-ph | cond-mat.stat-mech | cs.IT | hep-th | math-ph
This is a preliminary version of a book in progress on the theory of quantum communication. We adopt an information-theoretic perspective throughout and give a comprehensive account of fundamental results in quantum communication theory from the past decade (and earlier), with an emphasis on the modern one-shot-to-asymptotic approach that underlies much of today’s state-of-the-art research in this field. In Part I, we cover mathematical preliminaries and provide a detailed study of quantum mechanics from an information-theoretic perspective. We also provide an extensive and thorough review of the quantum entropy zoo, and we devote an entire chapter to the study of entanglement measures. Equipped with these essential tools, in Part II we study classical communication (with and without entanglement assistance), entanglement distillation, quantum communication, secret key distillation, and private communication. In Part III, we cover the latest developments in feedback-assisted communication tasks, such as quantum and classical feedback-assisted communication, LOCC-assisted quantum communication, and secret key agreement.
I'm very pleased to announce a preliminary version of a new textbook on quantum information theory. Done in collaboration with @markwilde and available here:https://t.co/xQqTyb4kaF
— Sumeet Khatri (@SumeetKhatri6) November 11, 2020
We've been working on this project for the past three years and are open to any feedback!
2. An Attack on InstaHide: Is Private Learning Possible with Instance Encoding?
Nicholas Carlini, Samuel Deng, Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Shuang Song, Abhradeep Thakurta, Florian Tramer
A learning algorithm is private if the produced model does not reveal (too much) about its training set. InstaHide [Huang, Song, Li, Arora, ICML’20] is a recent proposal that claims to preserve privacy by an encoding mechanism that modifies the inputs before being processed by the normal learner. We present a reconstruction attack on InstaHide that is able to use the encoded images to recover visually recognizable versions of the original images. Our attack is effective and efficient, and empirically breaks InstaHide on CIFAR-10, CIFAR-100, and the recently released InstaHide Challenge. We further formalize various privacy notions of learning through instance encoding and investigate the possibility of achieving these notions. We prove barriers against achieving (indistinguishability based notions of) privacy through any learning protocol that uses instance encoding.
This is a very nice and complete break of InstaHide by some of my Google colleagues and others: https://t.co/k2vvGNxtVd
— Thomas Steinke (@shortstein) November 11, 2020
TL;DR: This scheme does not work, as the "encrypted" images can be largely recovered. ☹️
1/5 pic.twitter.com/6bXdRIeK3t
3. Deep Reinforcement Learning for Navigation in AAA Video Games
Eloi Alonso, Maxim Peter, David Goumard, Joshua Romoff
In video games, non-player characters (NPCs) are used to enhance the players’ experience in a variety of ways, e.g., as enemies, allies, or innocent bystanders. A crucial component of NPCs is navigation, which allows them to move from one point to another on the map. The most popular approach for NPC navigation in the video game industry is to use a navigation mesh (NavMesh), which is a graph representation of the map, with nodes and edges indicating traversable areas. Unfortunately, complex navigation abilities that extend the character’s capacity for movement, e.g., grappling hooks, jetpacks, teleportation, or double-jumps, increases the complexity of the NavMesh, making it intractable in many practical scenarios. Game designers are thus constrained to only add abilities that can be handled by a NavMesh if they want to have NPC navigation. As an alternative, we propose to use Deep Reinforcement Learning (Deep RL) to learn how to navigate 3D maps using any navigation ability. We test our approach on complex 3D environments in the Unity game engine that are notably an order of magnitude larger than maps typically used in the Deep RL literature. One of these maps is directly modeled after a Ubisoft AAA game. We find that our approach performs surprisingly well, achieving at least success rate on all tested scenarios. A video of our results is available at https://youtu.be/WFIf9Wwlq8M.
Deep Reinforcement Learning for Navigation in AAA Video Games
— AK (@ak92501) November 11, 2020
pdf: https://t.co/sUY0w5cBPj
abs: https://t.co/FxFXnberya pic.twitter.com/Fhc0YAteWv
4. Satellite Constellation Internet Affordability and Need
Meredith L. Rawls, Heidi B. Thiemann, Victor Chemin, Lucianne Walkowicz, Mike W. Peel, Yan G. Grange
- retweets: 274, favorites: 40 (11/12/2020 09:14:18)
- links: abs | pdf
- physics.pop-ph | astro-ph.IM | cs.CY
Large satellite constellations in low-Earth orbit seek to be the infrastructure for global broadband Internet and other telecommunication needs. We briefly review the impacts of satellite constellations on astronomy and show that the Internet service offered by these satellites will primarily target populations where it is unaffordable, not needed, or both. The harm done by tens to hundreds of thousands of low-Earth orbit satellites to astronomy, stargazers worldwide, and the environment is not acceptable.
It's taken a while but our paper on satellite constellation internet, affordability, and astronomy is now on arXiv! 🛰️
— Heidi Thiemann (@heidi_teaman) November 11, 2020
Check it out here: https://t.co/2aMeO3mOR8
Thanks again to my lovely co-authors @merrdiff @chmn_victor @RocketToLulu @mike_peel @yggrnge ✨ https://t.co/9CuQabJ77r
5. Decentralized Structural-RNN for Robot Crowd Navigation with Deep Reinforcement Learning
Shuijing Liu, Peixin Chang, Weihang Liang, Neeloy Chakraborty, Katherine Driggs-Campbell
Safe and efficient navigation through human crowds is an essential capability for mobile robots. Previous work on robot crowd navigation assumes that the dynamics of all agents are known and well-defined. In addition, the performance of previous methods deteriorates in partially observable environments and environments with dense crowds. To tackle these problems, we propose decentralized structural-Recurrent Neural Network (DS-RNN), a novel network that reasons about spatial and temporal relationships for robot decision making in crowd navigation. We train our network with model-free deep reinforcement learning without any expert supervision. We demonstrate that our model outperforms previous methods and successfully transfer the policy learned in the simulator to a real-world TurtleBot 2i.
Decentralized Structural-RNN for Robot Crowd Navigation with Deep Reinforcement Learning. #AI #DeepLearning #DataScience #BigData #Analytics #IoT #Python #RStats #JavaScript #ReactJS #Serverless #Linux #Programming #MachineLearning #ReinforcementLearninghttps://t.co/8yF42y2AQA pic.twitter.com/A2QIVk6cs5
— Marcus Borba (@marcusborba) November 11, 2020
6. Adversarial Semantic Collisions
Congzheng Song, Alexander M. Rush, Vitaly Shmatikov
We study semantic collisions: texts that are semantically unrelated but judged as similar by NLP models. We develop gradient-based approaches for generating semantic collisions and demonstrate that state-of-the-art models for many tasks which rely on analyzing the meaning and similarity of texts— including paraphrase identification, document retrieval, response suggestion, and extractive summarization— are vulnerable to semantic collisions. For example, given a target query, inserting a crafted collision into an irrelevant document can shift its retrieval rank from 1000 to top 3. We show how to generate semantic collisions that evade perplexity-based filtering and discuss other potential mitigations. Our code is available at https://github.com/csong27/collision-bert.
Adversarial Semantic Collisions (https://t.co/sl1SgKCdoy, w/ Congzheng Song)
— Sasha Rush (@srush_nlp) November 11, 2020
Explores threats to semantic similarity models (retrieval, summary, chat, ...) by an adversary trying to sneak in malicious secret messages. 👿
Code: https://t.co/S3F7hcydAO pic.twitter.com/9NzlnNUwxi