Witness based nonlinear detection of quantum entanglement
- URL: http://arxiv.org/abs/2502.02868v1
- Date: Wed, 05 Feb 2025 03:55:06 GMT
- Title: Witness based nonlinear detection of quantum entanglement
- Authors: Yiding Wang, Tinggui Zhang, Xiaofen Huang, Shao-Ming Fei,
- Abstract summary: We show that when the nonlinear entanglement detection strategy fails to detect the entanglement of an entangled state with two copies, it may succeed with three or more copies.
Our strategy can also be applied to detect multipartite entanglement by using the witnesses for bipartite systems, as well as to entanglement concentrations.
- Score: 0.3499870393443269
- License:
- Abstract: We present a nonlinear entanglement detection strategy which detects entanglement that the linear detection strategy fails. We show that when the nonlinear entanglement detection strategy fails to detect the entanglement of an entangled state with two copies, it may succeed with three or more copies. Based on our strategy, a witness combined with a suitable quanutm mechanical observable may detect the entanglement that can not be detected by the witness alone. Moreover, our strategy can also be applied to detect multipartite entanglement by using the witnesses for bipartite systems, as well as to entanglement concentrations.
Related papers
- Using linear and nonlinear entanglement witnesses to generate and detect bound entangled states on an IBM quantum processor [0.0]
We investigate bound entanglement in three-qubit mixed states diagonal in the Greenberger-Horne-Zeilinger basis.
Entanglement in these states is detected using entanglement witnesses and the analysis focuses on states exhibiting positive partial transpose (PPT)
We propose a general quantum circuit for generating a three-qubit GHZ diagonal mixed state using a six-qubit pure state on the IBM quantum processor.
arXiv Detail & Related papers (2024-08-14T18:41:38Z) - Generating and Reweighting Dense Contrastive Patterns for Unsupervised
Anomaly Detection [59.34318192698142]
We introduce a prior-less anomaly generation paradigm and develop an innovative unsupervised anomaly detection framework named GRAD.
PatchDiff effectively expose various types of anomaly patterns.
experiments on both MVTec AD and MVTec LOCO datasets also support the aforementioned observation.
arXiv Detail & Related papers (2023-12-26T07:08:06Z) - Entanglement detection with trace polynomials [3.626013617212667]
We provide a systematic method for nonlinear entanglement detection based on trace inequalities.
In particular, this allows to employ multi-partite witnesses for the detection of bipartite states and vice versa.
arXiv Detail & Related papers (2023-03-14T10:06:34Z) - Entanglement witnessing with untrusted detectors [0.37985299825122515]
We consider the problem of entanglement detection in the presence of faulty, potentially malicious detectors.
A common - and, as of yet, the only - approach to this problem is to perform a Bell test in order to identify nonlocality of the measured entangled state.
We propose an alternative approach to this problem, which is resilient to the detection loophole and is based on the standard tool of entanglement witness.
arXiv Detail & Related papers (2023-01-31T14:54:07Z) - Online-compatible Unsupervised Non-resonant Anomaly Detection [0.4297070083645048]
We propose the first complete strategy for unsupervised detection of non-resonant anomalies.
Our technique is built out of two simultaneously-trained autoencoders that are forced to be decorrelated from each other.
This method can be deployed offline for non-resonant anomaly detection and is also the first complete online-compatible anomaly detection strategy.
arXiv Detail & Related papers (2021-11-11T19:01:09Z) - Surveillance Evasion Through Bayesian Reinforcement Learning [78.79938727251594]
We consider a 2D continuous path planning problem with a completely unknown intensity of random termination.
Those Observers' surveillance intensity is a priori unknown and has to be learned through repetitive path planning.
arXiv Detail & Related papers (2021-09-30T02:29:21Z) - Exact solutions of interacting dissipative systems via weak symmetries [77.34726150561087]
We analytically diagonalize the Liouvillian of a class Markovian dissipative systems with arbitrary strong interactions or nonlinearity.
This enables an exact description of the full dynamics and dissipative spectrum.
Our method is applicable to a variety of other systems, and could provide a powerful new tool for the study of complex driven-dissipative quantum systems.
arXiv Detail & Related papers (2021-09-27T17:45:42Z) - Machine-Learning-Derived Entanglement Witnesses [55.76279816849472]
We show a correspondence between linear support vector machines (SVMs) and entanglement witnesses.
We use this correspondence to generate entanglement witnesses for bipartite and tripartite qubit (and qudit) target entangled states.
arXiv Detail & Related papers (2021-07-05T22:28:02Z) - No Need to Know Physics: Resilience of Process-based Model-free Anomaly
Detection for Industrial Control Systems [95.54151664013011]
We present a novel framework to generate adversarial spoofing signals that violate physical properties of the system.
We analyze four anomaly detectors published at top security conferences.
arXiv Detail & Related papers (2020-12-07T11:02:44Z) - Learning to Separate Clusters of Adversarial Representations for Robust
Adversarial Detection [50.03939695025513]
We propose a new probabilistic adversarial detector motivated by a recently introduced non-robust feature.
In this paper, we consider the non-robust features as a common property of adversarial examples, and we deduce it is possible to find a cluster in representation space corresponding to the property.
This idea leads us to probability estimate distribution of adversarial representations in a separate cluster, and leverage the distribution for a likelihood based adversarial detector.
arXiv Detail & Related papers (2020-12-07T07:21:18Z) - Machine Learning Applications in Misuse and Anomaly Detection [0.0]
Machine learning and data mining algorithms play important roles in designing intrusion detection systems.
Based on their approaches toward the detection of attacks in a network, intrusion detection systems can be broadly categorized into two types.
In the misuse detection systems, an attack in a system is detected whenever the sequence of activities in the network matches with a known attack signature.
In the anomaly detection approach, on the other hand, anomalous states in a system are identified based on a significant difference in the state transitions of the system from its normal states.
arXiv Detail & Related papers (2020-09-10T19:52:00Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.