Distributed secure quantum machine learning (DSQML) enables a classical client with little quantum technology to delegate a remote quantum machine learning to the quantum server with the privacy data preserved. More...Distributed secure quantum machine learning (DSQML) enables a classical client with little quantum technology to delegate a remote quantum machine learning to the quantum server with the privacy data preserved. Moreover, DSQML can be extended to a more general case that the client does not have enough data, and resorts both the remote quantum server and remote databases to perform the secure machi~ learning. Here we propose a DSQML protocol that the client can classify two-dimensional vectors to dif- ferent clusters, resorting to a remote small-scale photon quantum computation processor. The protocol is secure without leaking any relevant information to the Eve. Any eavesdropper who attempts to intercept and disturb the learning process can be noticed. In principle, this protocol can be used to classify high dimensional vectors and may provide a new viewpoint and application for future "big data".展开更多
With the explosive increase in mobile apps, more and more threats migrate from traditional PC client to mobile device. Compared with traditional Win+Intel alliance in PC, Android+ARM alliance dominates in Mobile Int...With the explosive increase in mobile apps, more and more threats migrate from traditional PC client to mobile device. Compared with traditional Win+Intel alliance in PC, Android+ARM alliance dominates in Mobile Internet, the apps replace the PC client software as the major target of malicious usage. In this paper, to improve the security status of current mobile apps, we propose a methodology to evaluate mobile apps based on cloud computing platform and data mining. We also present a prototype system named MobSafe to identify the mobile app's virulence or benignancy. Compared with traditional method, such as permission pattern based method, MobSafe combines the dynamic and static analysis methods to comprehensively evaluate an Android app. In the implementation, we adopt Android Security Evaluation Framework (ASEF) and Static Android Analysis Framework (SAAF), the two representative dynamic and static analysis methods, to evaluate the Android apps and estimate the total time needed to evaluate all the apps stored in one mobile app market. Based on the real trace from a commercial mobile app market called AppChina, we can collect the statistics of the number of active Android apps, the average number apps installed in one Android device, and the expanding ratio of mobile apps. As mobile app market serves as the main line of defence against mobile malwares, our evaluation results show that it is practical to use cloud computing platform and data mining to verify all stored apps routinely to filter out malware apps from mobile app markets. As the future work, MobSafe can extensively use machine learning to conduct automotive forensic analysis of mobile apps based on the generated multifaceted data in this stage.展开更多
In my recent visit to Britain, I was greatly impressed by the currententhusiasm for computer-assisted language learning displayed by the languageteachers and practioners there. The production and implementation of CAL...In my recent visit to Britain, I was greatly impressed by the currententhusiasm for computer-assisted language learning displayed by the languageteachers and practioners there. The production and implementation of CALLcourseware has almost become the order of the day in many British展开更多
Quantum machine learning has made remarkable progress in many important tasks.However,the gate complexity of the initial state preparation is seldom considered in lots of quantum machine learning algorithms,making the...Quantum machine learning has made remarkable progress in many important tasks.However,the gate complexity of the initial state preparation is seldom considered in lots of quantum machine learning algorithms,making them non-end-to-end.Herein,we propose a quantum algorithm for the node embedding problem that maps a node graph's topological structure to embedding vectors.The resulting quantum embedding state can be used as an input for other quantum machine learning algorithms.With O(log(N))qubits to store the information of N nodes,our algorithm will not lose quantum advantage for the subsequent quantum information processing.Moreover,owing to the use of a parameterized quantum circuit with O(poly(log(N)))depth,the resulting state can serve as an efficient quantum database.In addition,we explored the measurement complexity of the quantum node embedding algorithm,which is the main issue in training parameters,and extended the algorithm to capture high-order neighborhood information between nodes.Finally,we experimentally demonstrated our algorithm on an nuclear magnetic resonance quantum processor to solve a graph model.展开更多
基金supported by the National Natural Science Foundation of China(11474168 and 61401222)the Natural Science Foundation of Jiangsu Province(BK20151502)+1 种基金the Qing Lan Project in Jiangsu Provincea Project Funded by the Priority Academic Program Development of Jiangsu Higher Education Institutions
文摘Distributed secure quantum machine learning (DSQML) enables a classical client with little quantum technology to delegate a remote quantum machine learning to the quantum server with the privacy data preserved. Moreover, DSQML can be extended to a more general case that the client does not have enough data, and resorts both the remote quantum server and remote databases to perform the secure machi~ learning. Here we propose a DSQML protocol that the client can classify two-dimensional vectors to dif- ferent clusters, resorting to a remote small-scale photon quantum computation processor. The protocol is secure without leaking any relevant information to the Eve. Any eavesdropper who attempts to intercept and disturb the learning process can be noticed. In principle, this protocol can be used to classify high dimensional vectors and may provide a new viewpoint and application for future "big data".
基金the National Key Basic Research and Development (973) Program of China (Nos. 2012CB315801 and 2011CB302805)the National Natural Science Foundation of China (Nos. 61161140320 and 61233016)Intel Research Council with the title of Security Vulnerability Analysis based on Cloud Platform with Intel IA Architecture
文摘With the explosive increase in mobile apps, more and more threats migrate from traditional PC client to mobile device. Compared with traditional Win+Intel alliance in PC, Android+ARM alliance dominates in Mobile Internet, the apps replace the PC client software as the major target of malicious usage. In this paper, to improve the security status of current mobile apps, we propose a methodology to evaluate mobile apps based on cloud computing platform and data mining. We also present a prototype system named MobSafe to identify the mobile app's virulence or benignancy. Compared with traditional method, such as permission pattern based method, MobSafe combines the dynamic and static analysis methods to comprehensively evaluate an Android app. In the implementation, we adopt Android Security Evaluation Framework (ASEF) and Static Android Analysis Framework (SAAF), the two representative dynamic and static analysis methods, to evaluate the Android apps and estimate the total time needed to evaluate all the apps stored in one mobile app market. Based on the real trace from a commercial mobile app market called AppChina, we can collect the statistics of the number of active Android apps, the average number apps installed in one Android device, and the expanding ratio of mobile apps. As mobile app market serves as the main line of defence against mobile malwares, our evaluation results show that it is practical to use cloud computing platform and data mining to verify all stored apps routinely to filter out malware apps from mobile app markets. As the future work, MobSafe can extensively use machine learning to conduct automotive forensic analysis of mobile apps based on the generated multifaceted data in this stage.
文摘In my recent visit to Britain, I was greatly impressed by the currententhusiasm for computer-assisted language learning displayed by the languageteachers and practioners there. The production and implementation of CALLcourseware has almost become the order of the day in many British
基金the National Natural Science Foundation of China(11974205 and 11774197)the National Key Research and Development Program of China(2017YFA0303700)+1 种基金the Key Research and Development Program of Guangdong Province(2018B030325002)the Beijing Nova Program(20230484345).
文摘Quantum machine learning has made remarkable progress in many important tasks.However,the gate complexity of the initial state preparation is seldom considered in lots of quantum machine learning algorithms,making them non-end-to-end.Herein,we propose a quantum algorithm for the node embedding problem that maps a node graph's topological structure to embedding vectors.The resulting quantum embedding state can be used as an input for other quantum machine learning algorithms.With O(log(N))qubits to store the information of N nodes,our algorithm will not lose quantum advantage for the subsequent quantum information processing.Moreover,owing to the use of a parameterized quantum circuit with O(poly(log(N)))depth,the resulting state can serve as an efficient quantum database.In addition,we explored the measurement complexity of the quantum node embedding algorithm,which is the main issue in training parameters,and extended the algorithm to capture high-order neighborhood information between nodes.Finally,we experimentally demonstrated our algorithm on an nuclear magnetic resonance quantum processor to solve a graph model.