Year Year arrow
arrow-active-down-0
Publisher Publisher arrow
arrow-active-down-1
Journal
1
Journal arrow
arrow-active-down-2
Institution Institution arrow
arrow-active-down-3
Institution Country Institution Country arrow
arrow-active-down-4
Publication Type Publication Type arrow
arrow-active-down-5
Field Of Study Field Of Study arrow
arrow-active-down-6
Topics Topics arrow
arrow-active-down-7
Open Access Open Access arrow
arrow-active-down-8
Language Language arrow
arrow-active-down-9
Filter Icon Filter 1
Year Year arrow
arrow-active-down-0
Publisher Publisher arrow
arrow-active-down-1
Journal
1
Journal arrow
arrow-active-down-2
Institution Institution arrow
arrow-active-down-3
Institution Country Institution Country arrow
arrow-active-down-4
Publication Type Publication Type arrow
arrow-active-down-5
Field Of Study Field Of Study arrow
arrow-active-down-6
Topics Topics arrow
arrow-active-down-7
Open Access Open Access arrow
arrow-active-down-8
Language Language arrow
arrow-active-down-9
Filter Icon Filter 1
Export
Sort by: Relevance
Controlled Double-Direction Cyclic Quantum Communication of Arbitrary Two-Particle States

With the rapid development of quantum communication technologies, controlled double-direction cyclic (CDDC) quantum communication has become an important research direction. However, how to choose an appropriate quantum state as a channel to achieve double-direction cyclic (DDC) quantum communication for multi-particle entangled states remains an unresolved challenge. This study aims to address this issue by constructing a suitable quantum channel and investigating the DDC quantum communication of two-particle states. Initially, we create a 25-particle entangled state using Hadamard and controlled-NOT (CNOT) gates, and provide its corresponding quantum circuit implementation. Based on this entangled state as a quantum channel, we propose two new four-party CDDC schemes, applied to quantum teleportation (QT) and remote state preparation (RSP), respectively. In both schemes, each communicating party can synchronously transmit two different arbitrary two-particle states to the other parties under supervisory control, achieving controlled quantum cyclic communication in both clockwise and counterclockwise directions. Additionally, the presented two schemes of four-party CDDC quantum communication are extended to situations where n>3 communicating parties. In each proposed scheme, we provide universal analytical formulas for the local operations of the sender, supervisor, and receiver, demonstrating that the success probability of each scheme can reach 100%. These schemes only require specific two-particle projective measurements, single-particle von Neumann measurements, and Pauli gate operations, all of which can be implemented with current technologies. We have also evaluated the inherent efficiency, security, and control capabilities of the proposed schemes. In comparison to earlier methods, the results demonstrate that our schemes perform exceptionally well. This study provides a theoretical foundation for bidirectional controlled quantum communication of multi-particle states, aiming to enhance security and capacity while meeting the diverse needs of future network scenarios.

Read full abstract
Open Access Icon Open AccessJust Published Icon Just Published
Cognitive Activity of an Individual Under Conditions of Information Influence of Different Modalities: Model and Experimental Research

The objective of this study is to develop a mathematical model capable of correctly displaying the dynamics of an individual’s cognitive activity under conditions of external information influence of different modalities. The adequacy of the model is verified by comparing the results of numerical analysis and experimental data. The mathematical basis of such a model is the apparatus of self-oscillating quantum mechanics. To describe algorithms for the processes of transmission, processing, and generation of information, the theory of information images/representations is used. Methods. This article provides a brief description of the proposed theory. The cognitive activity of an individual is represented mathematically as a one-dimensional potential hole with finite walls of different sizes. The internal potential barrier in this model can model the boundary between consciousness and subconsciousness. The authors developed a parameterization of the systems under study taking into account the proposed theory. Next, a mathematical model was developed based on the apparatus of self-oscillatory quantum mechanics. The authors formulated an equation that describes the function of the state of an information image in the process of human cognitive activity. Computer modeling of various variations of information impact was carried out. The authors also conducted a specially designed experiment. Conclusions. The authors have identified characteristic patterns of such processes and shown the oscillating nature of changes in the state function of information images and the appearance of characteristic threshold effects. A comparison of the obtained model and experimental data showed the adequacy of the developed tool (the coincidence of the general dynamics and characteristic patterns was shown).

Read full abstract
Open Access Icon Open AccessJust Published Icon Just Published
Multilevel Context Learning with Large Language Models for Text-Attributed Graphs on Social Networks

There are complex graph structures and rich textual information on social networks. Text provides important information for various tasks, while graph structures offer multilevel context for the semantics of the text. Contemporary researchers tend to represent these kinds of data by text-attributed graphs (TAGs). Most TAG-based representation learning methods focus on designing frameworks that convey graph structures to large language models (LLMs) to generate semantic embeddings for downstream graph neural networks (GNNs). However, these methods only provide text attributes for nodes, which fails to capture the multilevel context and leads to the loss of valuable information. To tackle this issue, we introduce the Multilevel Context Learner (MCL) model, which leverages multilevel context on social networks to enhance LLMs’ semantic embedding capabilities. We model the social network as a multilevel context textual-edge graph (MC-TEG), effectively capturing both graph structure and semantic relationships. Our MCL model leverages the reasoning capabilities of LLMs to generate semantic embeddings by integrating these multilevel contexts. The tailored bidirectional dynamic graph attention layers are introduced to further distinguish the weight information. Experimental evaluations on six real social network datasets show that the MCL model consistently outperforms all baseline models. Specifically, the MCL model achieves prediction accuracies of 77.98%, 77.63%, 74.61%, 76.40%, 72.89%, and 73.40%, with absolute improvements of 9.04%, 9.19%, 11.05%, 7.24%, 6.11%, and 9.87% over the next best models. These results demonstrate the effectiveness of the proposed MCL model.

Read full abstract
Open Access Icon Open AccessJust Published Icon Just Published
AGASI: A Generative Adversarial Network-Based Approach to Strengthening Adversarial Image Steganography

Steganography has been widely used in the field of image privacy protection. However, with the advancement of steganalysis techniques, deep learning-based models are now capable of accurately detecting modifications in stego-images, posing a significant threat to traditional steganography. To address this, we propose AGASI, a GAN-based approach for strengthening adversarial image steganography. This method employs an encoder as the generator in conjunction with a discriminator to form a generative adversarial network (GAN), thereby enhancing the robustness of stego-images against steganalysis tools. Additionally, the GAN framework reduces the gap between the original secret image and the extracted image, while the decoder effectively extracts the secret image from the stego-image, achieving the goal of image privacy protection. Experimental results demonstrate that the AGASI method not only ensures high-quality secret images but also effectively reduces the accuracy of neural network classifiers, inducing misclassifications and significantly increasing the embedding capacity of the steganography system. For instance, under PGD attack, the adversarial stego-images generated by the GAN, at higher disturbance levels, successfully maintain the quality of the secret image while achieving an 84.73% misclassification rate in neural network detection. Compared to images with the same visual quality, our method increased the misclassification rate by 23.31%.

Read full abstract
Open Access Icon Open AccessJust Published Icon Just Published
A Reinforcement Learning-Based Generative Approach for Event Temporal Relation Extraction

Event temporal relation extraction is a crucial task in natural language processing, aimed at recognizing the temporal relations between event triggers in a text. Despite extensive efforts in this area, the existing methods face two main issues. Firstly, the previous models for event temporal relation extraction mainly rely on a classification framework, which fails to output the crucial contextual words necessary for predicting the temporal relations between two event triggers. Secondly, the prior research that formulated natural language processing tasks as text generation problems usually trained the generative models by maximum likelihood estimation. However, this approach encounters potential difficulties when the optimization objective is misaligned with the task performance metrics. To resolve these limitations, we introduce a reinforcement learning-based generative framework for event temporal relation extraction. Specifically, to output the important contextual words from the input sentence for temporal relation identification, we introduce dependency path generation as an auxiliary task to complement event temporal relation extraction. This task is solved alongside temporal relation prediction to enhance model performance. To achieve this, we reformulate the event temporal relation extraction task as a text generation problem, aiming to generate both event temporal relation labels and dependency path words based on the input sentence. To bridge the gap between the optimization objective and task performance metrics, we employ the REINFORCE algorithm to optimize our generative model, designing a novel reward function to simultaneously capture the accuracy of temporal prediction and the quality of generation. Lastly, to mitigate the high variance issue encountered when using the REINFORCE algorithm in multi-task generative model training, we propose a baseline policy gradient algorithm to improve the stability and efficiency of the training process. Experimental results on two widely used datasets, MATRES and TB-DENSE, show that our approach exhibits competitive performance.

Read full abstract
Open Access Icon Open AccessJust Published Icon Just Published