@article {2109, title = {Geometry of the quantum set of correlations}, journal = {Physical Review A}, volume = {97}, year = {2018}, month = {2018/02/07}, pages = {022104}, abstract = {

It is well known that correlations predicted by quantum mechanics cannot be explained by any classical (local-realistic) theory. The relative strength of quantum and classical correlations is usually studied in the context of Bell inequalities, but this tells us little about the geometry of the quantum set of correlations. In other words, we do not have good intuition about what the quantum set actually looks like. In this paper we study the geometry of the quantum set using standard tools from convex geometry. We find explicit examples of rather counter-intuitive features in the simplest non-trivial Bell scenario (two parties, two inputs and two outputs) and illustrate them using 2-dimensional slice plots. We also show that even more complex features appear in Bell scenarios with more inputs or more parties. Finally, we discuss the limitations that the geometry of the quantum set imposes on the task of self-testing.

}, doi = {10.1103/PhysRevA.97.022104}, url = {https://journals.aps.org/pra/abstract/10.1103/PhysRevA.97.022104}, author = {Koon Tong Goh and Jedrzej Kaniewski and Elie Wolfe and Tam{\'a}s V{\'e}rtesi and Xingyao Wu and Yu Cai and Yeong-Cherng Liang and Valerio Scarani} } @article {2251, title = {Multiparty quantum data hiding with enhanced security and remote deletion}, year = {2018}, pages = {5}, abstract = {

One of the applications of quantum technology is to use quantum states and measurements to communicate which offers more reliable security promises. Quantum data hiding, which gives the source party the ability of sharing data among multiple receivers and revealing it at a later time depending on his/her will, is one of the promising information sharing schemes which may address practical security issues. In this work, we propose a novel quantum data hiding protocol. By concatenating different subprotocols which apply to rather symmetric hiding scenarios, we cover a variety of more general hiding scenarios. We provide the general requirements for constructing such protocols and give explicit examples of encoding states for five parties. We also proved the security of the protocol in sense that the achievable information by unauthorized operations asymptotically goes to zero. In addition, due to the capability of the sender to manipulate his/her subsystem, the sender is able to abort the protocol remotely at any time before he/she reveals the information.

}, url = {https://arxiv.org/abs/1804.01982}, author = {Xingyao Wu and Jianxin Chen} } @article {2268, title = {QFlow lite dataset: A machine-learning approach to the charge states in quantum dot experiments}, journal = {PLOS ONE}, volume = {13}, year = {2018}, month = {2018}, pages = {e0205844}, type = {2018/10/17}, abstract = {

Over the past decade, machine learning techniques have revolutionized how research is done, from designing new materials and predicting their properties to assisting drug discovery to advancing cybersecurity. Recently, we added to this list by showing how a machine learning algorithm (a so-called learner) combined with an optimization routine can assist experimental efforts in the realm of tuning semiconductor quantum dot (QD) devices. Among other applications, semiconductor QDs are a candidate system for building quantum computers. The present-day tuning techniques for bringing the QD devices into a desirable configuration suitable for quantum computing that rely on heuristics do not scale with the increasing size of the quantum dot arrays required for even near-term quantum computing demonstrations. Establishing a reliable protocol for tuning that does not rely on the gross-scale heuristics developed by experimentalists is thus of great importance. To implement the machine learning-based approach, we constructed a dataset of simulated QD device characteristics, such as the conductance and the charge sensor response versus the applied electrostatic gate voltages. Here, we describe the methodology for generating the dataset, as well as its validation in training convolutional neural networks. We show that the learner\&$\#$39;s accuracy in recognizing the state of a device is ~96.5 \% in both current- and charge-sensor-based training. We also introduce a tool that enables other researchers to use this approach for further research: QFlow lite - a Python-based mini-software suite that uses the dataset to train neural networks to recognize the state of a device and differentiate between states in experimental data. This work gives the definitive reference for the new dataset that will help enable researchers to use it in their experiments or to develop new machine learning approaches and concepts

}, doi = {https://doi.org/10.1371/journal.pone.0205844}, url = {https://arxiv.org/abs/1809.10018}, author = {Justyna P. Zwolak and Sandesh S. Kalantre and Xingyao Wu and Stephen Ragole and J. M. Taylor} } @article {2201, title = {Exponential improvements for quantum-accessible reinforcement learning}, year = {2017}, abstract = {

Quantum computers can offer dramatic improvements over classical devices for data analysis tasks such as prediction and classification. However, less is known about the advantages that quantum computers may bring in the setting of reinforcement learning, where learning is achieved via interaction with a task environment. Here, we consider a special case of reinforcement learning, where the task environment allows quantum access. In addition, we impose certain \"naturalness\" conditions on the task environment, which rule out the kinds of oracle problems that are studied in quantum query complexity (and for which quantum speedups are well-known). Within this framework of quantum-accessible reinforcement learning environments, we demonstrate that quantum agents can achieve exponential improvements in learning efficiency, surpassing previous results that showed only quadratic improvements. A key step in the proof is to construct task environments that encode well-known oracle problems, such as Simon\&$\#$39;s problem and Recursive Fourier Sampling, while satisfying the above \"naturalness\" conditions for reinforcement learning. Our results suggest that quantum agents may perform well in certain game-playing scenarios, where the game has recursive structure, and the agent can learn by playing against itself

}, url = {https://arxiv.org/abs/1710.11160}, author = {Vedran Dunjko and Yi-Kai Liu and Xingyao Wu and J. M. Taylor} } @article {2103, title = {Machine Learning techniques for state recognition and auto-tuning in quantum dots}, year = {2017}, month = {2017/12/13}, abstract = {

Recent progress in building large-scale quantum devices for exploring quantum computing and simulation paradigms has relied upon effective tools for achieving and maintaining good experimental parameters, i.e. tuning up devices. In many cases, including in quantum-dot based architectures, the parameter space grows substantially with the number of qubits, and may become a limit to scalability. Fortunately, machine learning techniques for pattern recognition and image classification using so-called deep neural networks have shown surprising successes for computer-aided understanding of complex systems. In this work, we use deep and convolutional neural networks to characterize states and charge configurations of semiconductor quantum dot arrays when one can only measure a current-voltage characteristic of transport (here conductance) through such a device. For simplicity, we model a semiconductor nanowire connected to leads and capacitively coupled to depletion gates using the Thomas-Fermi approximation and Coulomb blockade physics. We then generate labeled training data for the neural networks, and find at least 90 \% accuracy for charge and state identification for single and double dots purely from the dependence of the nanowire\’s conductance upon gate voltages. Using these characterization networks, we can then optimize the parameter space to achieve a desired configuration of the array, a technique we call \‘auto-tuning\’. Finally, we show how such techniques can be implemented in an experimental setting by applying our approach to an experimental data set, and outline further problems in this domain, from using charge sensing data to extensions to full one and two-dimensional arrays, that can be tackled with machine learning.

}, url = {https://arxiv.org/abs/1712.04914}, author = {Sandesh S. Kalantre and Justyna P. Zwolak and Stephen Ragole and Xingyao Wu and Neil M. Zimmerman and M. D. Stewart and J. M. Taylor} } @article {2099, title = {Super-polynomial and exponential improvements for quantum-enhanced reinforcement learning}, year = {2017}, month = {2017/12/12}, abstract = {

Recent work on quantum machine learning has demonstrated that quantum computers can offer dramatic improvements over classical devices for data mining, prediction and classification. However, less is known about the advantages using quantum computers may bring in the more general setting of reinforcement learning, where learning is achieved via interaction with a task environment that provides occasional rewards. Reinforcement learning can incorporate data-analysis-oriented learning settings as special cases, but also includes more complex situations where, e.g., reinforcing feedback is delayed. In a few recent works, Grover-type amplification has been utilized to construct quantum agents that achieve up-to-quadratic improvements in learning efficiency. These encouraging results have left open the key question of whether super-polynomial improvements in learning times are possible for genuine reinforcement learning problems, that is problems that go beyond the other more restricted learning paradigms. In this work, we provide a family of such genuine reinforcement learning tasks. We construct quantum-enhanced learners which learn super-polynomially, and even exponentially faster than any classical reinforcement learning model, and we discuss the potential impact our results may have on future technologies.

}, url = {https://arxiv.org/abs/1710.11160}, author = {Vedran Dunjko and Yi-Kai Liu and Xingyao Wu and J. M. Taylor} }