Entanglement witnessing with untrusted detectors
- URL: http://arxiv.org/abs/2301.13680v1
- Date: Tue, 31 Jan 2023 14:54:07 GMT
- Title: Entanglement witnessing with untrusted detectors
- Authors: Giuseppe Viola, Nikolai Miklin, Mariami Gachechiladze, Marcin
Paw{\l}owski
- Abstract summary: We consider the problem of entanglement detection in the presence of faulty, potentially malicious detectors.
A common - and, as of yet, the only - approach to this problem is to perform a Bell test in order to identify nonlocality of the measured entangled state.
We propose an alternative approach to this problem, which is resilient to the detection loophole and is based on the standard tool of entanglement witness.
- Score: 0.37985299825122515
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: We consider the problem of entanglement detection in the presence of faulty,
potentially malicious detectors. A common - and, as of yet, the only - approach
to this problem is to perform a Bell test in order to identify nonlocality of
the measured entangled state. However, there are two significant drawbacks in
this approach: the requirement to exceed a critical, and often high, detection
efficiency, and much lower noise tolerance. In this paper, we propose an
alternative approach to this problem, which is resilient to the detection
loophole and is based on the standard tool of entanglement witness. We discuss
how the two main techniques to detection losses, namely the discard and
assignment strategies, apply to entanglement witnessing. We demonstrate using
the example of a two-qubit Bell state that the critical detection efficiency
can be significantly reduced compared to the Bell test approach.
Related papers
- Adversarially Robust Industrial Anomaly Detection Through Diffusion Model [23.97654469255749]
We propose a simple yet effective adversarially robust anomaly detection method, textitAdvRAD, that allows the diffusion model to act both as an anomaly detector and adversarial purifier.
Our proposed method exhibits outstanding (certified) adversarial robustness while also maintaining equally strong anomaly detection performance on par with the state-of-the-art methods on industrial anomaly detection benchmark datasets.
arXiv Detail & Related papers (2024-08-09T03:25:19Z) - Verification of entangled states under noisy measurements [3.8094794637714027]
Entanglement plays an indispensable role in numerous quantum information and quantum computation tasks.
In recent years, quantum state verification has received increasing attention, yet the challenge of addressing noise effects in implementing this approach remains unsolved.
We provide a systematic assessment of the performance of quantum state verification protocols in the presence of measurement noise.
arXiv Detail & Related papers (2024-06-03T15:59:02Z) - On Pixel-level Performance Assessment in Anomaly Detection [87.7131059062292]
Anomaly detection methods have demonstrated remarkable success across various applications.
However, assessing their performance, particularly at the pixel-level, presents a complex challenge.
In this paper, we dissect the intricacies of this challenge, underscored by visual evidence and statistical analysis.
arXiv Detail & Related papers (2023-10-25T08:02:27Z) - Separability criterion using one observable for special states: Entanglement detection via quantum quench [0.0]
We establish the class of states where measuring connected correlations in just $textitone$ basis is sufficient.
We discuss the possibility of one observable entanglement detection in a variety of systems, including those without conserved charges.
arXiv Detail & Related papers (2023-07-07T17:37:11Z) - Perspective Aware Road Obstacle Detection [104.57322421897769]
We show that road obstacle detection techniques ignore the fact that, in practice, the apparent size of the obstacles decreases as their distance to the vehicle increases.
We leverage this by computing a scale map encoding the apparent size of a hypothetical object at every image location.
We then leverage this perspective map to generate training data by injecting onto the road synthetic objects whose size corresponds to the perspective foreshortening.
arXiv Detail & Related papers (2022-10-04T17:48:42Z) - MEAD: A Multi-Armed Approach for Evaluation of Adversarial Examples
Detectors [24.296350262025552]
We propose a novel framework, called MEAD, for evaluating detectors based on several attack strategies.
Among them, we make use of three new objectives to generate attacks.
The proposed performance metric is based on the worst-case scenario.
arXiv Detail & Related papers (2022-06-30T17:05:45Z) - Reference-based Defect Detection Network [57.89399576743665]
The first issue is the texture shift which means a trained defect detector model will be easily affected by unseen texture.
The second issue is partial visual confusion which indicates that a partial defect box is visually similar with a complete box.
We propose a Reference-based Defect Detection Network (RDDN) to tackle these two problems.
arXiv Detail & Related papers (2021-08-10T05:44:23Z) - Partial Wasserstein and Maximum Mean Discrepancy distances for bridging
the gap between outlier detection and drift detection [0.0]
An important aspect of monitoring is to check whether the inputs have strayed from the distribution they were validated for.
We bridge the gap between outlier detection and drift detection through comparing a given number of inputs to an automatically chosen part of the reference distribution.
arXiv Detail & Related papers (2021-06-09T18:49:55Z) - No Need to Know Physics: Resilience of Process-based Model-free Anomaly
Detection for Industrial Control Systems [95.54151664013011]
We present a novel framework to generate adversarial spoofing signals that violate physical properties of the system.
We analyze four anomaly detectors published at top security conferences.
arXiv Detail & Related papers (2020-12-07T11:02:44Z) - Efficient and robust certification of genuine multipartite entanglement
in noisy quantum error correction circuits [58.720142291102135]
We introduce a conditional witnessing technique to certify genuine multipartite entanglement (GME)
We prove that the detection of entanglement in a linear number of bipartitions by a number of measurements scales linearly, suffices to certify GME.
We apply our method to the noisy readout of stabilizer operators of the distance-three topological color code and its flag-based fault-tolerant version.
arXiv Detail & Related papers (2020-10-06T18:00:07Z) - Claim Check-Worthiness Detection as Positive Unlabelled Learning [53.24606510691877]
Claim check-worthiness detection is a critical component of fact checking systems.
We illuminate a central challenge in claim check-worthiness detection underlying all of these tasks.
Our best performing method is a unified approach which automatically corrects for this using a variant of positive unlabelled learning.
arXiv Detail & Related papers (2020-03-05T16:06:07Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.