[图书][B] Quantum information processing with finite resources: mathematical foundations

M Tomamichel - 2015 - books.google.com
This book provides the reader with the mathematical framework required to fully explore the
potential of small quantum information processing devices. As decoherence will continue to …

Strong converse for the classical capacity of entanglement-breaking and Hadamard channels via a sandwiched Rényi relative entropy

MM Wilde, A Winter, D Yang - Communications in Mathematical Physics, 2014 - Springer
A strong converse theorem for the classical capacity of a quantum channel states that the
probability of correctly decoding a classical message converges exponentially fast to zero in …

Sandwiched Rényi divergence satisfies data processing inequality

S Beigi - Journal of Mathematical Physics, 2013 - pubs.aip.org
,” preprint arXiv: 1306.3142 v1 (2013)]. This new quantum divergence has already found
applications in quantum information theory. Here we further investigate properties of this …

α-mutual information

S Verdú - 2015 Information Theory and Applications Workshop …, 2015 - ieeexplore.ieee.org
Renyi entropy and Renyi divergence evidence a long track record of usefulness in
information theory and its applications. Alfred Rényi never got around to generalizing mutual …

Rényi generalization of the accessible entanglement entropy

H Barghathi, CM Herdman, A Del Maestro - Physical Review Letters, 2018 - APS
Operationally accessible entanglement in bipartite systems of indistinguishable particles
could be reduced due to restrictions on the allowed local operations as a result of particle …

Operationally accessible entanglement of one-dimensional spinless fermions

H Barghathi, E Casiano-Diaz, A Del Maestro - Physical Review A, 2019 - APS
For indistinguishable itinerant particles subject to a superselection rule fixing their total
number, a portion of the entanglement entropy under a spatial bipartition of the ground state …

Tunable measures for information leakage and applications to privacy-utility tradeoffs

J Liao, O Kosut, L Sankar… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
We introduce a tunable measure for information leakage called maximal-leakage. This
measure quantifies the maximal gain of an adversary in inferring any (potentially random) …

Estimation efficiency under privacy constraints

S Asoodeh, M Diaz, F Alajaji… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
We investigate the problem of estimating a random variable Y under a privacy constraint
dictated by another correlated random variable X. When X and Y are discrete, we express …

α-z-Rényi relative entropies

KMR Audenaert, N Datta - Journal of Mathematical Physics, 2015 - pubs.aip.org
We consider a two-parameter family of Rényi relative entropies D α, z (ρ∥ σ) that are
quantum generalisations of the classical Rényi divergence D α (p∥ q). This family includes …

A comprehensive plane-wise review of DDoS attacks in SDN: Leveraging detection and mitigation through machine learning and deep learning

D Kalambe, D Sharma, P Kadam, S Surati - Journal of Network and …, 2024 - Elsevier
The traditional architecture of networks in Software Defined Networking (SDN) is divided into
three distinct planes to incorporate intelligence into networks. However, this structure has …