新兴技术
查看 最近的 文章
显示 2025年07月22日, 星期二 新的列表
- [1] arXiv:2507.14713 [中文pdf, pdf, html, 其他]
-
标题: 通过同态加密的隐私保护无人机导航以避免碰撞标题: Privacy-Preserving Drone Navigation Through Homomorphic Encryption for Collision Avoidance期刊参考: 10.1109/LCN60385.2024.10639770主题: 新兴技术 (cs.ET)
随着无人机越来越多地在社区内递送包裹,碰撞问题引起了关注。 一种解决方案是在特定邮编范围内共享飞行路径,但这会通过揭示配送路线而损害商业隐私。 例如,这可能会泄露哪些商店将包裹发送到特定地址。 为了避免暴露路径信息,我们提出使用基于同态加密的比较来计算路径交叉点。 这使得无人机能够在不透露路径和目的地细节的情况下识别潜在碰撞,从而调整高度以避免坠毁。 我们在资源有限的虚拟机上实现了并测试了我们的方法,以模拟无人机的计算能力。 我们的结果表明,与基于混淆电路的方法相比,我们的方法速度显著更快,并且需要更少的网络通信。 我们还对该方法针对潜在攻击提供了安全分析。
As drones increasingly deliver packages in neighborhoods, concerns about collisions arise. One solution is to share flight paths within a specific zip code, but this compromises business privacy by revealing delivery routes. For example, it could disclose which stores send packages to certain addresses. To avoid exposing path information, we propose using homomorphic encryption-based comparison to compute path intersections. This allows drones to identify potential collisions without revealing path and destination details, allowing them to adjust altitude to avoid crashes. We implemented and tested our approach on resource-limited virtual machines to mimic the computational power of drones. Our results demonstrate that our method is significantly faster and requires less network communication compared to a garbled circuit-based approach. We also provide a security analysis of the approach against potential attacks.
- [2] arXiv:2507.15146 [中文pdf, pdf, html, 其他]
-
标题: 基于边缘的便携式电子健康记录系统在远程健康应用中的贫血筛查设计标题: Design of an Edge-based Portable EHR System for Anemia Screening in Remote Health ApplicationsSebastian A. Cruz Romero, Misael J. Mercado Hernandez, Samir Y. Ali Rivera, Jorge A. Santiago Fernandez, Wilfredo E. Lugo Beauchamp评论: 被IEEE全球人道主义技术会议2025接受主题: 新兴技术 (cs.ET) ; 人工智能 (cs.AI) ; 计算机视觉与模式识别 (cs.CV) ; 计算机与社会 (cs.CY) ; 机器学习 (cs.LG) ; 软件工程 (cs.SE)
医疗系统在远程、资源有限环境中的设计面临持续的挑战,这是由于互操作性差、缺乏离线支持以及对昂贵基础设施的依赖。 许多现有的数字健康解决方案忽视了这些限制,从而限制了其在服务不足地区的前线卫生工作者中的有效性。 本文提出了一种便携式、边缘计算支持的电子健康记录平台,该平台优化了离线优先操作、安全的患者数据管理和模块化诊断集成。 运行在小型嵌入式设备上,它提供AES-256加密的本地存储,并可选地与云同步以实现互操作性。 作为用例,我们集成了一个非侵入性贫血筛查模块,利用指甲苍白分析。 该模型在250个患者案例(27%的贫血患病率)上进行训练,数据经过KDE平衡处理,随机森林模型在测试中达到了1.969 g/dL的RMSE和1.490 g/dL的MAE。 基于严重程度的模型达到了79.2%的灵敏度。 为了优化性能,基于YOLOv8n的指甲床检测器被量化为INT8,将推理延迟从46.96 ms减少到21.50 ms,同时保持mAP@0.5在0.995。 该系统强调低成本部署、模块化和数据隐私合规性(HIPAA/GDPR),解决了在断开连接环境中数字健康采用的关键障碍。 我们的工作展示了一种可扩展的方法,以增强便携式健康信息系统,并支持服务不足地区的前线医疗保健。
The design of medical systems for remote, resource-limited environments faces persistent challenges due to poor interoperability, lack of offline support, and dependency on costly infrastructure. Many existing digital health solutions neglect these constraints, limiting their effectiveness for frontline health workers in underserved regions. This paper presents a portable, edge-enabled Electronic Health Record platform optimized for offline-first operation, secure patient data management, and modular diagnostic integration. Running on small-form factor embedded devices, it provides AES-256 encrypted local storage with optional cloud synchronization for interoperability. As a use case, we integrated a non-invasive anemia screening module leveraging fingernail pallor analysis. Trained on 250 patient cases (27\% anemia prevalence) with KDE-balanced data, the Random Forest model achieved a test RMSE of 1.969 g/dL and MAE of 1.490 g/dL. A severity-based model reached 79.2\% sensitivity. To optimize performance, a YOLOv8n-based nail bed detector was quantized to INT8, reducing inference latency from 46.96 ms to 21.50 ms while maintaining mAP@0.5 at 0.995. The system emphasizes low-cost deployment, modularity, and data privacy compliance (HIPAA/GDPR), addressing critical barriers to digital health adoption in disconnected settings. Our work demonstrates a scalable approach to enhance portable health information systems and support frontline healthcare in underserved regions.
- [3] arXiv:2507.15483 [中文pdf, pdf, html, 其他]
-
标题: 通过跨域空间网络和动态编排推进月球通信标题: Advancing Lunar Communication through Inter-domain Space Networks and Dynamic Orchestration主题: 新兴技术 (cs.ET) ; 数值分析 (math.NA)
重新兴起的月球探索时代以从临时访问向持续的国际和商业存在战略转变为特点,从而产生了对强大且持续可用的通信基础设施前所未有的需求。 传统的直接对地通信架构依赖于有限且超负荷的深空网络,这些网络还受到辐射环境和某些地月领域区域可见性不足的进一步挑战。 我们通过提出向跨域空间网络合作的基础性转变来解决这些问题,引入基于近地网络的架构。 它们可以直接为月面用户服务,或通过地月中继站形成一个弹性且多层的通信骨干。 首先,我们建立了一个统一的链路分析框架,包括经常被忽视的环境因素,如月球的可变光照,以提供高保真度的性能评估。 其次,我们根据中断风险评估架构的可靠性,这对于量化通信链路的操作鲁棒性至关重要。 最后,为了管理架构的固有动态性,我们提出了一种跨域空间数字孪生$-$,这是一个动态决策引擎,能够进行实时分析,自主选择最佳通信路径,在确保高而稳定的可靠性的同时优化功耗。 总体而言,我们的论文提供了一个全面的架构和概念管理体系,强调了月球通信的必要性,以支持在月球上建立永久的人类和经济立足点。
The reawakened era of lunar exploration is defined by a strategic shift from temporary visits to a sustained international and commercial presence, resulting in an unprecedented demand for a robust and continuously available communication infrastructure. The conventional direct-to-Earth communication architecture relies on limited and oversubscribed deep space networks, which are further challenged by the radiative environment and insufficient visibility in certain areas of the cislunar domain. We address these issues by proposing a foundational move toward inter-domain space network cooperation by introducing architectures based on near space networks. They can directly service lunar surface users or, via cislunar relays, by forming a resilient and multi-layered communication backbone. First, we establish a unified link analysis framework incorporating frequently disregarded environmental factors, such as the Moon's variable illumination, to provide a high-fidelity performance evaluation. Second, we assess architectures' reliability based on the outage risk, essential for quantifying the operational robustness of communication links. Finally, to manage the inherent dynamism of architectures, we propose an inter-domain space digital twin$-$a dynamic decision-making engine that performs real-time analysis to autonomously select the best communication path, ensuring high and stable reliability while simultaneously optimizing power consumption. Overall, our paper provides a holistic architectural and conceptual management framework, emphasizing the necessity of lunar communications to support a permanent human and economic foothold on the Moon.
新提交 (展示 3 之 3 条目 )
- [4] arXiv:2507.14209 (交叉列表自 cs.NI) [中文pdf, pdf, html, 其他]
-
标题: 白皮书:面向以人为本和可持续的6G服务——fortiss研究视角标题: White paper: Towards Human-centric and Sustainable 6G Services -- the fortiss Research Perspective主题: 网络与互联网架构 (cs.NI) ; 新兴技术 (cs.ET)
作为软件密集型系统领域的领先研究机构,fortiss正在积极塑造第六代移动通信(6G)的愿景。 我们的使命是确保6G技术超越技术进步,并与社会需求保持一致。 fortiss在全球6G倡议中发挥着关键作用,包括对标准化机构和协作研究与开发项目的贡献。 我们专注于软件定义、人工智能支持和可持续的通信服务,优先考虑人类价值和长期影响。 6G将通过认知智能、去中心化编排和以可持续性为导向的架构重新定义数字连接。 随着对超可靠低延迟通信(URLLC)和个性化数字服务的期望不断提高,6G必须超越前几代技术。 它将依赖于原生人工智能网络、边缘云资源编排和节能数据框架,确保技术和社会的相关性。 本白皮书介绍了fortiss关于以人为本、可持续和人工智能整合的6G网络的愿景。 它概述了语义通信、绿色编排和分布式人工智能等关键研究领域,所有这些都与社会和技术挑战相关联。 本白皮书面向研究人员、行业专家、政策制定者和开发者。 它阐述了fortiss在6G方面的战略方向和贡献,强调负责任的创新和跨学科合作,以实现有意义的2030年愿景。
As a leading research institute in software-intensive systems, fortiss is actively shaping the vision of Sixth Generation Mobile Communication (6G). Our mission is to ensure that 6G technologies go beyond technical advancements and are aligned with societal needs. fortiss plays a key role in 6G initiatives worldwide, including contributions to standardization bodies and collaborative Research and Development programs. We focus on software-defined, AI-enabled, and sustainable communication services that prioritize human values and long-term impact. 6G will redefine digital connectivity through cognitive intelligence, decentralized orchestration, and sustainability-oriented architectures. As expectations rise for ultra-reliable low-latency communication (URLLC) and personalized digital services, 6G must outperform prior generations. It will rely on AI-native networking, Edge-Cloud resource orchestration, and energy-aware data frameworks, ensuring both technical performance and societal relevance. This white paper presents the fortiss vision for a human-centric, sustainable, and AI-integrated 6G network. It outlines key research domains such as semantic communication, green orchestration, and distributed AI, all linked to societal and technological challenges. The white paper is aimed at researchers, industry experts, policymakers, and developers. It articulates the strategic direction and contributions of fortiss to 6G, emphasizing responsible innovation and interdisciplinary collaboration toward a meaningful 2030 vision.
- [5] arXiv:2507.14333 (交叉列表自 physics.optics) [中文pdf, pdf, html, 其他]
-
标题: 逆向设计的点积引擎标题: Inverse-Designed Dot Product Engine评论: 48页,18图主题: 光学 (physics.optics) ; 新兴技术 (cs.ET)
这项工作提出了一种逆向设计的光学腔体,可以将来自两个光源的光定向,使得如果这些光源代表范围[-1,1]内的任何数字,并通过光源发出的功率编码幅度,通过切换光源电流的方向编码符号,则在两个输出端口产生的光电流与这两个数字的乘积成比例。 假设两个光源分别编码x和y,这两个数为$\in$ [-1,1]。 乘法被简化为形式$(x+y)^2 - (x-y)^2 = 4xy \propto xy$。 数字的加法和减法操作分别由建设性和破坏性干涉支持。 这项工作表明,用提出的光学腔体替换Lightening Transformer中的DDOT点积引擎来计算点积,可以使光子核心占用的面积减少88%,使激光器的功耗降低约23.43%,并在训练DeiT模型时将能耗降低0.88%。 这些腔体可以生成形式为$1.057 xy + 0.249$的光电流,其中$R^2=0.88,$,从而显示出目标乘积$xy$与腔体对编码$x$和$y$的刺激的输出之间的直接正比关系。
The work presents an inverse-designed optical cavity that can direct light from two sources such that if the sources were to represent any number in the range [-1,1] with magnitude encoded through the power emitted by the source and sign by switching the direction of source current, the photocurrent generated at the two output ports is proportional to the product of the two numbers. Let us say that the two sources encode x and y, which are two numbers $\in$ [-1,1]. Multiplication is reduced to the form $(x+y)^2 - (x-y)^2 = 4xy \propto xy$. The addition and subtraction operations of the numbers are supported by constructive and destructive interference, respectively. The work shows that replacing the DDOT dot product engine of the Lightening Transformer with the optical cavity proposed to calculate the dot product can lead to a reduction in the area occupied by the photonic core by 88 \%, can reduce the power consumption by lasers by around 23.43 \%, and bring down energy consumption while training DeiT models by 0.88 \%. The cavities can generate photocurrents of the form $1.057 xy + 0.249$ with $R^2=0.88,$ thus showing a relationship of direct proportionality between the target product $xy$ and the output of the cavity in response to stimuli encoding $x$ and $y$.
- [6] arXiv:2507.14822 (交叉列表自 cs.CR) [中文pdf, pdf, html, 其他]
-
标题: 量子天盾:恶劣天气中低空无线网络的量子密钥分发与后量子认证标题: Quantum Skyshield: Quantum Key Distribution and Post-Quantum Authentication for Low-Altitude Wireless Networks in Adverse Skies主题: 密码学与安全 (cs.CR) ; 新兴技术 (cs.ET) ; 量子物理 (quant-ph)
近年来,低空无线网络(LAWNs)已成为支持低空经济的关键骨干,特别是随着无人机(UAVs)和高空平台(HAPs)的密集化。 为了满足不断增长的数据需求,一些LAWN部署采用了自由空间光(FSO)链路,其提供卓越的带宽和光束方向性。 然而,在没有强大安全措施的情况下,传统射频信道和FSO光束仍然容易受到拦截和欺骗,尤其是FSO可能受到湍流、对准误差和天气相关的衰减影响。 为了解决量子时代这些挑战,提出了一种称为Quantum Skyshield的量子安全架构,以实现基站收发台(BTS)和LAWN之间的可靠通信。 所提出的方案将BB84量子密钥分发(QKD)与后量子认证机制相结合。 仿真结果证实,当量子比特误码率(QBER)保持在11%的阈值以下时,可以可靠地生成128位对称密钥。 使用Lamport一次性签名和基于哈希的消息认证码(HMAC)来强制认证,以确保消息的完整性。 一种受Grover启发的威胁检测机制在单次迭代中能够以高达89%的概率识别异常,从而实现实时信任评估。 最后,还识别并讨论了未来的研究挑战,以指导该领域进一步的发展。
Recently, low-altitude wireless networks (LAWNs) have emerged as a critical backbone for supporting the low-altitude economy, particularly with the densification of unmanned aerial vehicles (UAVs) and high-altitude platforms (HAPs). To meet growing data demands, some LAWN deployments incorporate free-space optical (FSO) links, which offer exceptional bandwidth and beam directivity. However, without strong security measures in place, both conventional radio frequency channels and FSO beams remain vulnerable to interception and spoofing and FSO in particular can suffer from turbulence, misalignment, and weather-related attenuation. To address these challenges in the quantum era, a quantum-secure architecture called Quantum Skyshield is proposed to enable reliable communication between the base transceiver station (BTS) and LAWN. The proposed design integrates BB84 quantum key distribution (QKD) with post-quantum authentication mechanisms. Simulation results confirm the reliable generation of a 128-bit symmetric key when the quantum bit error rate (QBER) remains below the threshold of 11%. Authentication is enforced using Lamport one-time signatures and hash-based message authentication codes (HMAC) to ensure message integrity. A Grover-inspired threat detection mechanism identifies anomalies with up to 89% probability in a single iteration, enabling real-time trust evaluation. Lastly, future research challenges have also been identified and discussed to guide further development in this area.
- [7] arXiv:2507.14985 (交叉列表自 cs.CR) [中文pdf, pdf, html, 其他]
-
标题: 元宇宙安全与隐私研究:系统综述标题: Metaverse Security and Privacy Research: A Systematic Review评论: 论文已被 Computers & Security Journal 接受发表主题: 密码学与安全 (cs.CR) ; 新兴技术 (cs.ET) ; 人机交互 (cs.HC) ; 软件工程 (cs.SE)
元宇宙技术的快速发展,包括虚拟世界、增强现实和生活记录,已加速了它们在各个领域的应用。 这种增长由于社会技术复杂性、普遍的连接性和沉浸式环境中的广泛用户数据收集,使用户面临重大的新安全和隐私挑战。 我们对2013年至2024年间发表的文献进行了系统综述,提供了过去十年中研究界如何应对元宇宙相关安全和隐私问题的全面分析。 我们按方法对研究进行分类,考察了安全和隐私属性、沉浸式组件以及评估策略。 我们的研究发现,过去五年研究活动显著增加,强调实用和以用户为中心的方法,并主要使用基准测试、人类实验和定性方法。 身份验证和不可观测性是最常研究的属性。 然而,在政策合规性、可访问性、互操作性和后端基础设施安全等领域仍存在关键差距。 我们强调元宇宙的技术复杂性和人为因素,并呼吁采用综合的跨学科方法来保障包容和可信的沉浸式环境。
The rapid growth of metaverse technologies, including virtual worlds, augmented reality, and lifelogging, has accelerated their adoption across diverse domains. This rise exposes users to significant new security and privacy challenges due to sociotechnical complexity, pervasive connectivity, and extensive user data collection in immersive environments. We present a systematic review of the literature published between 2013 and 2024, offering a comprehensive analysis of how the research community has addressed metaverse-related security and privacy issues over the past decade. We organize the studies by method, examined the security and privacy properties, immersive components, and evaluation strategies. Our investigation reveals a sharp increase in research activity in the last five years, a strong focus on practical and user-centered approaches, and a predominant use of benchmarking, human experimentation, and qualitative methods. Authentication and unobservability are the most frequently studied properties. However, critical gaps remain in areas such as policy compliance, accessibility, interoperability, and back-end infrastructure security. We emphasize the intertwined technical complexity and human factors of the metaverse and call for integrated, interdisciplinary approaches to securing inclusive and trustworthy immersive environments.
- [8] arXiv:2507.15063 (交叉列表自 quant-ph) [中文pdf, pdf, html, 其他]
-
标题: 量子退火在机器学习中的应用:特征选择、实例选择和聚类标题: Quantum Annealing for Machine Learning: Applications in Feature Selection, Instance Selection, and Clustering主题: 量子物理 (quant-ph) ; 新兴技术 (cs.ET) ; 机器学习 (cs.LG)
本文探讨了量子退火(QA)和经典模拟退火(SA)在机器学习中的一系列组合优化问题中的应用,即特征选择、实例选择和聚类。 我们将每个任务表述为无约束二次二进制优化(QUBO)问题,并实现量子和经典求解器以比较它们的有效性。 对于特征选择,我们提出了几种平衡特征重要性和冗余性的QUBO配置,表明量子退火(QA)产生的解决方案在计算上更高效。 在实例选择中,我们提出了几种新颖的实例级重要性度量启发式方法,扩展了现有方法。 对于聚类,我们嵌入了一个从经典到量子的流程,使用经典聚类随后进行基于QUBO的中心点精炼,并展示了在聚类紧密性和检索指标上的持续改进。 我们的结果表明,即使在当前量子硬件的限制下,QA也可以成为离散机器学习优化的有竞争力且高效的工具。
This paper explores the applications of quantum annealing (QA) and classical simulated annealing (SA) to a suite of combinatorial optimization problems in machine learning, namely feature selection, instance selection, and clustering. We formulate each task as a Quadratic Unconstrained Binary Optimization (QUBO) problem and implement both quantum and classical solvers to compare their effectiveness. For feature selection, we propose several QUBO configurations that balance feature importance and redundancy, showing that quantum annealing (QA) produces solutions that are computationally more efficient. In instance selection, we propose a few novel heuristics for instance-level importance measures that extend existing methods. For clustering, we embed a classical-to-quantum pipeline, using classical clustering followed by QUBO-based medoid refinement, and demonstrate consistent improvements in cluster compactness and retrieval metrics. Our results suggest that QA can be a competitive and efficient tool for discrete machine learning optimization, even within the constraints of current quantum hardware.
- [9] arXiv:2507.15351 (交叉列表自 cs.AI) [中文pdf, pdf, html, 其他]
-
标题: 一步足够:基于一步策略优化的多智能体强化学习在共享出行平台订单调度中的应用标题: One Step is Enough: Multi-Agent Reinforcement Learning based on One-Step Policy Optimization for Order Dispatch on Ride-Sharing Platforms主题: 人工智能 (cs.AI) ; 新兴技术 (cs.ET) ; 多智能体系统 (cs.MA)
按需拼车平台面临的基本挑战是动态地将具有不同起点和终点的乘客进行打包,并实时地将他们与车辆匹配,这一切都在巨大的不确定性下进行。 最近,多智能体强化学习(MARL)已成为解决这一问题的有前途的方案,利用去中心化学习来应对叫车市场中大量智能体导致的维度灾难问题以及由此产生的广阔状态和动作空间。 然而,传统的基于MARL的拼车方法严重依赖于Q值或V值的准确估计,在大规模、高度不确定的环境中变得有问题。 具体来说,这些方法大多数采用独立范式,加剧了这一问题,因为每个智能体将其他智能体视为环境的一部分,导致训练不稳定和价值函数的显著估计偏差。 为了解决这些挑战,我们提出了两种新颖的替代方法,绕过价值函数的估计。 首先,我们将GRPO适应于拼车,用群体平均奖励替换PPO基准,以消除批评者估计误差并减少训练偏差。 其次,受GRPO充分利用群体奖励信息的启发,我们为拼车平台定制了PPO框架,并表明在同质车队下,仅使用单步奖励就可以训练最优策略——我们称之为单步策略优化(OSPO)。 在现实世界的曼哈顿叫车数据集上的实验表明,GRPO和OSPO在大多数场景中都表现出优越的性能,使用简单的MLP网络高效优化接客时间和已服务订单数量。
On-demand ride-sharing platforms face the fundamental challenge of dynamically bundling passengers with diverse origins and destinations and matching them with vehicles in real time, all under significant uncertainty. Recently, MARL has emerged as a promising solution for this problem, leveraging decentralized learning to address the curse of dimensionality caused by the large number of agents in the ride-hailing market and the resulting expansive state and action spaces. However, conventional MARL-based ride-sharing approaches heavily rely on the accurate estimation of Q-values or V-values, which becomes problematic in large-scale, highly uncertain environments. Specifically, most of these approaches adopt an independent paradigm, exacerbating this issue, as each agent treats others as part of the environment, leading to unstable training and substantial estimation bias in value functions. To address these challenges, we propose two novel alternative methods that bypass value function estimation. First, we adapt GRPO to ride-sharing, replacing the PPO baseline with the group average reward to eliminate critic estimation errors and reduce training bias. Second, inspired by GRPO's full utilization of group reward information, we customize the PPO framework for ride-sharing platforms and show that, under a homogeneous fleet, the optimal policy can be trained using only one-step rewards - a method we term One-Step Policy Optimization (OSPO). Experiments on a real-world Manhattan ride-hailing dataset demonstrate that both GRPO and OSPO achieve superior performance across most scenarios, efficiently optimizing pickup times and the number of served orders using simple MLP networks.
- [10] arXiv:2507.15676 (交叉列表自 cs.AI) [中文pdf, pdf, 其他]
-
标题: 代理人工智能在复杂系统中的自主异常管理标题: Agentic AI for autonomous anomaly management in complex systems主题: 人工智能 (cs.AI) ; 新兴技术 (cs.ET)
本文探讨了代理人工智能在复杂系统中自主检测和响应异常的潜力,强调了其改变传统依赖人类的异常管理方法的能力。
This paper explores the potential of agentic AI in autonomously detecting and responding to anomalies within complex systems, emphasizing its ability to transform traditional, human-dependent anomaly management methods.
- [11] arXiv:2507.15797 (交叉列表自 quant-ph) [中文pdf, pdf, html, 其他]
-
标题: 通过递归Oracle扩展的确定性量子搜索标题: Deterministic Quantum Search via Recursive Oracle Expansion评论: 11页,3图。数据和代码可应要求提供主题: 量子物理 (quant-ph) ; 新兴技术 (cs.ET)
我们引入了一种新的确定性量子搜索算法,它为传统的概率搜索方法提供了一个实际的替代方案。 我们的方案消除了量子搜索的固有不确定性,而无需依赖任意相位旋转,这是其他确定性方法的一个关键限制。 该算法通过递归扩展基本预言机,使其将与目标具有相同前两位的所有状态标记出来,涵盖恰好四分之一的搜索空间。 这使得可以逐步减少叠加,直到能够确定地测量目标状态。 该算法以查询复杂度为$O(N^{\log_2(3)/2}) \approx O(N^{0.7925})$实现确定性成功,介于格罗弗的$O(\sqrt{N})$缩放和经典$O(N)$之间。 我们的方法仅依赖于两量子比特最近邻扩散算子,完全避免了全局扩散。 我们证明,尽管查询复杂度增加,但对于至少18个量子比特的搜索空间,这种设计将扩散所需的两量子比特门总数减少了数量级,而在量子比特连接有限的硬件上优势更大。 该方案的固有确定性、对简单最近邻低深度操作的依赖以及可扩展的递归结构,使其非常适合硬件实现。 此外,我们表明该算法自然支持部分数据库搜索,能够在不进行完整搜索的情况下确定性地识别选定的目标位,进一步拓宽其适用性。
We introduce a novel deterministic quantum search algorithm that provides a practical alternative to conventional probabilistic search approaches. Our scheme eliminates the inherent uncertainty of quantum search without relying on arbitrary phase rotations, a key limitation of other deterministic methods. The algorithm achieves certainty by recursively expanding the base oracle so that it marks all states prefixed by the same two bits as the target, encompassing exactly one-quarter of the search space. This enables a step-by-step reduction of the superposition until the target state can be measured with certainty. The algorithm achieves deterministic success with a query complexity of $O(N^{\log_2(3)/2}) \approx O(N^{0.7925})$, falling between Grover's $O(\sqrt{N})$ scaling and the classical $O(N)$. Our approach relies exclusively on two-qubit nearest-neighbour diffusion operators, avoiding global diffusion entirely. We show that, despite the increased query complexity, this design reduces the total number of two-qubit gates required for diffusion by more than an order of magnitude for search spaces up to at least 18 qubits, with even greater advantages on hardware with limited qubit connectivity. The scheme's inherent determinism, reliance on simple nearest-neighbour, low-depth operations, and scalable recursive structure make it well-suited for hardware implementation. Additionally, we show that the algorithm naturally supports partial database search, enabling deterministic identification of selected target bits without requiring a full search, further broadening its applicability.
交叉提交 (展示 8 之 8 条目 )
- [12] arXiv:2408.09171 (替换) [中文pdf, pdf, 其他]
-
标题: 化学计算机和化学计算——一种通用的化学化合物合成机器标题: Chemputer and Chemputation -- A Universal Chemical Compound Synthesis Machine评论: 25页,7图,51参考文献主题: 新兴技术 (cs.ET) ; 化学物理 (physics.chem-ph)
化学计算将合成重新定义为在通用可重新配置的硬件图上对反应代码进行可编程执行。 在这里,我们证明了一个配备有限但可扩展的试剂、催化剂和工艺条件集的化学计算机,以及一个将反应图映射到硬件的化学编译器,是通用的:只要实时错误校正保持每一步的保真度高于分子组装指数设定的阈值,它就可以在有限时间内生成任何稳定且可分离的分子,并且以可分析检测的量生成。 该证明是通过将该平台视为化学合成图灵机(CSTM)来构建的。 CSTM形式化提供了(i)一个八元组状态定义,统一了试剂、工艺变量(包括催化剂)和磁带操作;(ii)通用化学计算原理;以及(iii)一种动态错误校正例程,确保容错执行。 将此框架与组装理论联系起来,通过要求实际可合成性来加强分子的定义,而错误校正成为通用性的先决条件。 我们针对在跨越单步到多步路线的模块化化学计算机设备上执行的>100 \c{hi}DL程序验证了这一抽象。 将每个程序映射到CSTM显示,单元操作的累积数量随着合成深度线性增长。 综上所述,这些结果将化学合成提升到一般计算的地位:用\c{hi}DL编写的算法被编译为硬件,在闭环校正下执行,并产生可验证的分子输出。 通过这种方式对化学进行形式化,化学计算机提供了一条共享、可执行的化学代码路径,互操作的硬件生态系统,最终实现可搜索、可证明的化学空间图谱。
Chemputation reframes synthesis as the programmable execution of reaction code on a universally re-configurable hardware graph. Here we prove that a chemputer equipped with a finite, but extensible, set of reagents, catalysts and process conditions, together with a chempiler that maps reaction graphs onto hardware, is universal: it can generate any stable, isolable molecule in finite time and in analytically detectable quantity, provided real-time error correction keeps the per-step fidelity above the threshold set by the molecule's assembly index. The proof is constructed by casting the platform as a Chemical Synthesis Turing Machine (CSTM). The CSTM formalism supplies (i) an eight-tuple state definition that unifies reagents, process variables (including catalysts) and tape operations; (ii) the Universal Chemputation Principle; and (iii) a dynamic-error-correction routine ensuring fault tolerant execution. Linking this framework to assembly theory strengthens the definition of a molecule by demanding practical synthesizability and error correction becomes a prerequisite for universality. We validate the abstraction against >100 \c{hi}DL programs executed on a modular chemputer rigs spanning single step to multi-step routes. Mapping each procedure onto CSTM shows that the cumulative number of unit operations grows linearly with synthetic depth. Together, these results elevate chemical synthesis to the status of a general computation: algorithms written in \c{hi}DL are compiled to hardware, executed with closed-loop correction, and produce verifiable molecular outputs. By formalising chemistry in this way, the chemputer offers a path to shareable, executable chemical code, interoperable hardware ecosystems, and ultimately a searchable, provable atlas of chemical space.
- [13] arXiv:2504.07623 (替换) [中文pdf, pdf, html, 其他]
-
标题: 车队协同行驶路径优化框架标题: Joint Travel Route Optimization Framework for Platooning主题: 新兴技术 (cs.ET) ; 机器人技术 (cs.RO) ; 系统与控制 (eess.SY)
编队代表一种先进的驾驶技术,旨在帮助驾驶员在不同长度的交通车队中行驶,提高道路安全性,减少驾驶员疲劳,并提高燃油效率。 先进的自动驾驶辅助系统促进了这一创新。 编队的最新进展强调了由车辆通信技术支持的集中式和分布式架构中的协作机制。 本研究引入了一个协作路线规划优化框架,旨在通过系统层面的集中编队形成策略促进编队的采用。 这种方法被设想为从个体(自我)驾驶到完全协作驾驶的过渡阶段。 此外,这项研究制定了与燃油消耗、驾驶员疲劳和行程时间相关的旅行成本指标,并考虑了连续驾驶时间的监管限制。 这些成本指标的性能已在网络图框架内使用Dijkstra算法和A*最短路径算法进行了评估。 结果表明,与单独的路线规划相比,所提出的架构在长途旅行中平均成本提高了14%。
Platooning represents an advanced driving technology designed to assist drivers in traffic convoys of varying lengths, enhancing road safety, reducing driver fatigue, and improving fuel efficiency. Sophisticated automated driving assistance systems have facilitated this innovation. Recent advancements in platooning emphasize cooperative mechanisms within both centralized and decentralized architectures enabled by vehicular communication technologies. This study introduces a cooperative route planning optimization framework aimed at promoting the adoption of platooning through a centralized platoon formation strategy at the system level. This approach is envisioned as a transitional phase from individual (ego) driving to fully collaborative driving. Additionally, this research formulates and incorporates travel cost metrics related to fuel consumption, driver fatigue, and travel time, considering regulatory constraints on consecutive driving durations. The performance of these cost metrics has been evaluated using Dijkstra's and A* shortest path algorithms within a network graph framework. The results indicate that the proposed architecture achieves an average cost improvement of 14 % compared to individual route planning for long road trips.
- [14] arXiv:2507.00444 (替换) [中文pdf, pdf, html, 其他]
-
标题: DiffCkt:一种基于扩散模型的混合神经网络框架,用于模拟电路的自动晶体管级生成标题: DiffCkt: A Diffusion Model-Based Hybrid Neural Network Framework for Automatic Transistor-Level Generation of Analog Circuits评论: V1: 被ICCAD2025接受;V2: 2025.7.19 **** 修正了算法5中的公式错误并补充了相关材料。增加了与模拟电路扩散相关的参考文献。修复了表III的引用错误。修正了作者所属机构的错误。优化了版面。 ****主题: 新兴技术 (cs.ET)
模拟电路设计包括布局前阶段和布局阶段。 其中,布局前阶段直接决定最终电路性能,但严重依赖有经验的工程师根据特定应用场景进行手动设计。 为了克服这些挑战并自动化模拟电路布局前设计阶段,我们引入了DiffCkt:一种基于扩散模型的混合神经网络框架,用于模拟电路的自动晶体管级生成,可以直接生成针对特定性能要求的电路结构和器件参数。 为了更准确地量化由DiffCkt生成的电路的效率,我们引入了电路生成效率指数(CGEI),该指数由单个生成电路的优值(FOM)和消耗的时间共同决定。 与相关研究相比,DiffCkt的CGEI提高了$2.21 \sim 8365\times$倍,达到了最先进(SOTA)水平。 总之,这项工作表明扩散模型具有学习和生成模拟电路结构和器件参数的显著能力,为自动化模拟电路布局前设计提供了一种革命性方法。 电路数据集将开源,其预览版可在https://github.com/CjLiu-NJU/DiffCkt获取。
Analog circuit design consists of the pre-layout and layout phases. Among them, the pre-layout phase directly decides the final circuit performance, but heavily depends on experienced engineers to do manual design according to specific application scenarios. To overcome these challenges and automate the analog circuit pre-layout design phase, we introduce DiffCkt: a diffusion model-based hybrid neural network framework for the automatic transistor-level generation of analog circuits, which can directly generate corresponding circuit structures and device parameters tailored to specific performance requirements. To more accurately quantify the efficiency of circuits generated by DiffCkt, we introduce the Circuit Generation Efficiency Index (CGEI), which is determined by both the figure of merit (FOM) of a single generated circuit and the time consumed. Compared with relative research, DiffCkt has improved CGEI by a factor of $2.21 \sim 8365\times$, reaching a state-of-the-art (SOTA) level. In conclusion, this work shows that the diffusion model has the remarkable ability to learn and generate analog circuit structures and device parameters, providing a revolutionary method for automating the pre-layout design of analog circuits. The circuit dataset will be open source, its preview version is available at https://github.com/CjLiu-NJU/DiffCkt.
- [15] arXiv:2507.06156 (替换) [中文pdf, pdf, html, 其他]
-
标题: 对沼泽中的对冲基金:分析区块链桥梁中的模式、脆弱性和防御措施标题: Hedge Funds on a Swamp: Analyzing Patterns, Vulnerabilities, and Defense Measures in Blockchain Bridges主题: 新兴技术 (cs.ET) ; 密码学与安全 (cs.CR)
区块链桥梁已成为不同区块链网络之间实现互操作性的关键基础设施,每月的桥梁交易量超过240亿美元。然而,它们日益增长的采用率伴随着安全漏洞的不成比例上升,使其成为Web3中最大的财务损失来源。为了使跨链生态系统具有鲁棒性和可持续性,必须理解和解决这些漏洞。在本研究中,我们提出了区块链桥梁设计和安全性的综合系统化分析。我们定义了三个桥梁安全优先事项,形式化了13个著名桥梁的架构结构,并识别了基于现实世界区块链攻击的23种攻击向量。利用这一基础,我们评估了43种典型的攻击场景,并引入了一个分层威胁模型,以捕捉源链、离链和目标链组件中的安全故障。我们的静态代码和交易网络层面的分析揭示了重复的设计缺陷,尤其是在访问控制、验证者信任假设和验证逻辑方面,并根据交易级痕迹识别了对手行为的关键模式。为了支持未来的发展,我们提出了一个桥梁架构设计的决策框架,以及分层验证和熔断机制等防御机制。这项工作为评估桥梁安全性提供了数据驱动的基础,并为标准化弹性跨链基础设施奠定了基础。
Blockchain bridges have become essential infrastructure for enabling interoperability across different blockchain networks, with more than $24B monthly bridge transaction volume. However, their growing adoption has been accompanied by a disproportionate rise in security breaches, making them the single largest source of financial loss in Web3. For cross-chain ecosystems to be robust and sustainable, it is essential to understand and address these vulnerabilities. In this study, we present a comprehensive systematization of blockchain bridge design and security. We define three bridge security priors, formalize the architectural structure of 13 prominent bridges, and identify 23 attack vectors grounded in real-world blockchain exploits. Using this foundation, we evaluate 43 representative attack scenarios and introduce a layered threat model that captures security failures across source chain, off-chain, and destination chain components. Our analysis at the static code and transaction network levels reveals recurring design flaws, particularly in access control, validator trust assumptions, and verification logic, and identifies key patterns in adversarial behavior based on transaction-level traces. To support future development, we propose a decision framework for bridge architecture design, along with defense mechanisms such as layered validation and circuit breakers. This work provides a data-driven foundation for evaluating bridge security and lays the groundwork for standardizing resilient cross-chain infrastructure.
- [16] arXiv:2506.12540 (替换) [中文pdf, pdf, 其他]
-
标题: 监管下一代可植入脑机接口:伦理开发和实施的建议标题: Regulating Next-Generation Implantable Brain-Computer Interfaces: Recommendations for Ethical Development and ImplementationRenee Sirbu, Jessica Morley, Tyler Schroder, Raghavendra Pradyumna Pothukuchi, Muhammed Ugur, Abhishek Bhattacharjee, Luciano Floridi评论: 35页,3表,2附录主题: 人机交互 (cs.HC) ; 计算机与社会 (cs.CY) ; 新兴技术 (cs.ET)
脑机接口为多种神经生理和神经精神疾病提供了重要的治疗机会,或许在不久的将来能够增强健康大脑的认知和决策能力。 然而,目前为植入式医疗设备设计的监管框架不足以应对下一代联网脑机接口所带来的独特伦理、法律和社会风险。 在本文中,我们提出了九项建议,以支持开发者在设计脑机接口时的参考;同时提出了九项建议,以支持政策制定者在应用脑机接口时的参考,这些建议源于植入式医疗设备(IMDs)的监管历史以及人工智能伦理的原则。 我们首先概述了植入式医疗设备的历史发展以及塑造其监管的重要里程碑。 接下来,我们总结了植入式医疗设备与新兴植入式脑机接口之间的相似之处,并确定了现有针对它们的监管规定。 然后,我们通过两个新兴前沿脑机接口系统——HALO和SCALO计算机系统的案例研究,突出当代芯片架构所带来的下一代脑机接口在设计和应用方面的独特特征,这些特征需要重新评估监管方法。 我们识别了这些脑机接口的关键伦理考量,包括对自主性、身份和心智隐私的独特理解。 基于这些见解,我们提出了脑机接口伦理监管的潜在途径,强调跨学科合作和主动减轻潜在危害的重要性。 目标是支持新型脑机接口负责任的设计和应用,确保其安全和伦理地融入医疗实践。
Brain-computer interfaces offer significant therapeutic opportunities for a variety of neurophysiological and neuropsychiatric disorders and may perhaps one day lead to augmenting the cognition and decision-making of the healthy brain. However, existing regulatory frameworks designed for implantable medical devices are inadequate to address the unique ethical, legal, and social risks associated with next-generation networked brain-computer interfaces. In this article, we make nine recommendations to support developers in the design of BCIs and nine recommendations to support policymakers in the application of BCIs, drawing insights from the regulatory history of IMDs and principles from AI ethics. We begin by outlining the historical development of IMDs and the regulatory milestones that have shaped their oversight. Next, we summarize similarities between IMDs and emerging implantable BCIs, identifying existing provisions for their regulation. We then use two case studies of emerging cutting-edge BCIs, the HALO and SCALO computer systems, to highlight distinctive features in the design and application of next-generation BCIs arising from contemporary chip architectures, which necessitate reevaluating regulatory approaches. We identify critical ethical considerations for these BCIs, including unique conceptions of autonomy, identity, and mental privacy. Based on these insights, we suggest potential avenues for the ethical regulation of BCIs, emphasizing the importance of interdisciplinary collaboration and proactive mitigation of potential harms. The goal is to support the responsible design and application of new BCIs, ensuring their safe and ethical integration into medical practice.
- [17] arXiv:2507.00286 (替换) [中文pdf, pdf, html, 其他]
-
标题: “以前,我问妈妈,现在我问ChatGPT”:使用生成式AI进行视觉隐私管理以帮助盲人和低视力人群标题: "Before, I Asked My Mom, Now I Ask ChatGPT": Visual Privacy Management with Generative AI for Blind and Low-Vision PeopleTanusree Sharma, Yu-Yun Tseng, Lotus Zhang, Ayae Ide, Kelly Avery Mack, Leah Findlater, Danna Gurari, Yang Wang主题: 人机交互 (cs.HC) ; 人工智能 (cs.AI) ; 新兴技术 (cs.ET)
盲人和低视力(BLV)个体使用生成式人工智能(GenAI)工具来解释和管理日常生活中的视觉内容。 尽管此类工具可以增强视觉内容的可访问性,从而提高用户的独立性,但它们也带来了围绕视觉隐私的复杂挑战。 在本文中,我们通过与21名参与者的访谈研究,调查了盲人和低视力个体的当前实践和未来设计偏好。 我们的研究结果揭示了GenAI的多种当前实践,这些实践在隐私、效率和情感自主性之间取得平衡,用户在六个关键场景中考虑了隐私风险,例如自我呈现、室内/室外空间隐私、社交分享以及处理专业内容。 我们的研究结果揭示了设计偏好,包括设备端处理、零保留保证、敏感内容删除、隐私意识外观指示器以及多模态触觉镜像交互方法。 我们最后提出了可行的设计建议,通过GenAI支持以用户为中心的视觉隐私,扩展隐私的概念和对他人的数据负责任的处理方式。
Blind and low vision (BLV) individuals use Generative AI (GenAI) tools to interpret and manage visual content in their daily lives. While such tools can enhance the accessibility of visual content and so enable greater user independence, they also introduce complex challenges around visual privacy. In this paper, we investigate the current practices and future design preferences of blind and low vision individuals through an interview study with 21 participants. Our findings reveal a range of current practices with GenAI that balance privacy, efficiency, and emotional agency, with users accounting for privacy risks across six key scenarios, such as self-presentation, indoor/outdoor spatial privacy, social sharing, and handling professional content. Our findings reveal design preferences, including on-device processing, zero-retention guarantees, sensitive content redaction, privacy-aware appearance indicators, and multimodal tactile mirrored interaction methods. We conclude with actionable design recommendations to support user-centered visual privacy through GenAI, expanding the notion of privacy and responsible handling of others data.