Reverse engineering protocols for controlling spin dynamics

被引:20
|
作者
Zhang, Qi [1 ,2 ,3 ]
Chen, Xi [1 ]
Guery-Odelin, D. [2 ,3 ]
机构
[1] Shanghai Univ, Dept Phys, Shanghai 200444, Peoples R China
[2] Univ Toulouse, UPS, IRSAMC, Lab Collis Agregats Reactivite, F-31062 Toulouse, France
[3] CNRS, UMR 5589, F-31062 Toulouse, France
来源
SCIENTIFIC REPORTS | 2017年 / 7卷
关键词
POPULATION TRANSFER;
D O I
10.1038/s41598-017-16146-2
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
We put forward reverse engineering protocols to shape in time the components of the magnetic field to manipulate a single spin, two independent spins with different gyromagnetic factors, and two interacting spins in short amount of times. We also use these techniques to setup protocols robust against the exact knowledge of the gyromagnetic factors for the one spin problem, or to generate entangled states for two or more spins coupled by dipole-dipole interactions.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] Reverse engineering protocols for controlling spin dynamics
    Qi Zhang
    Xi Chen
    D. Guéry-Odelin
    Scientific Reports, 7
  • [2] AUTOMATED REVERSE ENGINEERING OF CAN PROTOCOLS
    Weiss, N.
    Pozzobon, E.
    Mottok, J.
    Matousek, V
    NEURAL NETWORK WORLD, 2021, 31 (04) : 279 - 295
  • [3] Inferring the Forces Controlling Metaphase Kinetochore Oscillations by Reverse Engineering System Dynamics
    Armond, Jonathan W.
    Harry, Edward F.
    McAinsh, Andrew D.
    Burroughs, Nigel J.
    PLOS COMPUTATIONAL BIOLOGY, 2015, 11 (11)
  • [4] Clustering method in protocol reverse engineering for industrial protocols
    Shim, Kyu-Seok
    Goo, Young-Hoon
    Lee, Min-Seob
    Kim, Myung-Sup
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2020, 30 (06)
  • [5] Reverse Engineering Industrial Protocols Driven By Control Fields
    Qin, Zhen
    Yang, Zeyu
    Geng, Yangyang
    Che, Xin
    Wang, Tianyi
    Zhu, Hengye
    Cheng, Peng
    Chen, Jiming
    IEEE INFOCOM 2024-IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2024, : 2408 - 2417
  • [6] Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols
    Yu, Le
    Liu, Yangyang
    Jing, Pengfei
    Luo, Xiapu
    Xue, Lei
    Zhao, Kaifa
    Zhou, Yajin
    Wang, Ting
    Gu, Guofei
    Nie, Sen
    Wu, Shi
    PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 1939 - 1956
  • [7] A reverse engineering tool for extracting protocols of networked applications
    Shevertalov, Maxim
    Mancoridis, Spiros
    14TH WORKING CONFERENCE ON REVERSE ENGINEERING, PROCEEDINGS, 2007, : 229 - 238
  • [8] A Semantics Aware Approach to Automated Reverse Engineering Unknown Protocols
    Wang, Yipeng
    Yun, Xiaochun
    Shafiq, M. Zubair
    Wang, Liyan
    Liu, Alex X.
    Zhang, Zhibin
    Yao, Danfeng
    Zhang, Yongzheng
    Guo, Li
    2012 20TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2012,
  • [9] Position-based automatic reverse engineering of network protocols
    Luo, Jian-Zhen
    Yu, Shun-Zheng
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (03) : 1070 - 1077
  • [10] Automatic Reverse Engineering of Private Flight Control Protocols of UAVs
    Ji, Ran
    Wang, Jian
    Tang, Chaojing
    Li, Ruilin
    SECURITY AND COMMUNICATION NETWORKS, 2017,