default search action
Seth Lloyd
Person information
- affiliation: Massachusetts Institute of Technology, Mechanical Engineering, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j20]Eric R. Anschütz, Andreas Bauer, Bobak Toussi Kiani, Seth Lloyd:
Efficient classical algorithms for simulating symmetric quantum systems. Quantum 7: 1189 (2023) - [i26]Samuel Bosch, Bobak Toussi Kiani, Rui Yang, Adrian Lupascu, Seth Lloyd:
Neural Networks for Programming Quantum Annealers. CoRR abs/2308.06807 (2023) - 2022
- [j19]Quynh T. Nguyen, Bobak T. Kiani, Seth Lloyd:
Block-encoding dense and full-rank kernels using hierarchical matrices: applications in quantum numerical linear algebra. Quantum 6: 876 (2022) - [c9]Bobak Toussi Kiani, Randall Balestriero, Yann LeCun, Seth Lloyd:
projUNN: efficient method for training deep networks with unitary matrices. NeurIPS 2022 - [i25]Quynh The Nguyen, Bobak Toussi Kiani, Seth Lloyd:
Quantum algorithm for dense kernel matrices using hierarchical splitting. CoRR abs/2201.11329 (2022) - [i24]Bobak Toussi Kiani, Randall Balestriero, Yann LeCun, Seth Lloyd:
projUNN: efficient method for training deep networks with unitary matrices. CoRR abs/2203.05483 (2022) - [i23]Lu Li, Kaifeng Bu, Dax Enshan Koh, Arthur Jaffe, Seth Lloyd:
Wasserstein Complexity of Quantum Circuits. CoRR abs/2208.06306 (2022) - [i22]Bobak Toussi Kiani, Randall Balestriero, Yubei Chen, Seth Lloyd, Yann LeCun:
Joint Embedding Self-Supervised Learning in the Kernel Regime. CoRR abs/2209.14884 (2022) - [i21]Salvatore F. E. Oliviero, Lorenzo Leone, Seth Lloyd, Alioscia Hamma:
Black Hole complexity, unscrambling, and stabilizer thermal machines. CoRR abs/2212.11337 (2022) - 2021
- [j18]Giacomo De Palma, Milad Marvian, Dario Trevisan, Seth Lloyd:
The Quantum Wasserstein Distance of Order 1. IEEE Trans. Inf. Theory 67(10): 6627-6643 (2021) - [c8]Giacomo De Palma, Bobak Toussi Kiani, Seth Lloyd:
Adversarial Robustness Guarantees for Random Deep Neural Networks. ICML 2021: 2522-2534 - [i20]Bobak Toussi Kiani, Giacomo De Palma, Milad Marvian, Zi-Wen Liu, Seth Lloyd:
Quantum Earth Mover's Distance: A New Approach to Learning Quantum Data. CoRR abs/2101.03037 (2021) - [i19]Alexander Zlokapa, Hartmut Neven, Seth Lloyd:
A quantum algorithm for training wide and deep classical neural networks. CoRR abs/2107.09200 (2021) - [i18]Grecia Castelazo, Quynh The Nguyen, Giacomo De Palma, Dirk R. Englund, Seth Lloyd, Bobak Toussi Kiani:
Quantum algorithms for group convolution, cross-correlation, and equivariant transformations. CoRR abs/2109.11330 (2021) - 2020
- [j17]Juan Miguel Arrazola, Alain Delgado, Bhaskar Roy Bardhan, Seth Lloyd:
Quantum-inspired algorithms in practice. Quantum 4: 307 (2020) - [c7]Nai-Hui Chia, András Gilyén, Han-Hsuan Lin, Seth Lloyd, Ewin Tang, Chunhao Wang:
Quantum-Inspired Algorithms for Solving Low-Rank Linear Equation Systems with Logarithmic Dependence on the Dimension. ISAAC 2020: 47:1-47:17 - [i17]Bobak Toussi Kiani, Seth Lloyd, Reevu Maity:
Learning Unitaries by Gradient Descent. CoRR abs/2001.11897 (2020) - [i16]Giacomo De Palma, Bobak Toussi Kiani, Seth Lloyd:
Adversarial robustness guarantees for random deep neural networks. CoRR abs/2004.05923 (2020) - [i15]András Gilyén, Seth Lloyd, Iman Marvian, Yihui Quek, Mark M. Wilde:
Quantum algorithm for Petz recovery channels and pretty good measurements. CoRR abs/2006.16924 (2020) - [i14]Giacomo De Palma, Milad Marvian, Dario Trevisan, Seth Lloyd:
The quantum Wasserstein distance of order 1. CoRR abs/2009.04469 (2020) - [i13]Bobak Toussi Kiani, Giacomo De Palma, Dirk R. Englund, William M. Kaminsky, Milad Marvian, Seth Lloyd:
Quantum advantage for differential equation analysis. CoRR abs/2010.15776 (2020)
2010 – 2019
- 2019
- [j16]Seth Lloyd, Peter W. Shor, Kevin Thompson:
Polylog-LDPC Capacity Achieving Codes for the Noisy Quantum Erasure Channel. IEEE Trans. Inf. Theory 65(11): 7584-7595 (2019) - [c6]Giacomo De Palma, Bobak Toussi Kiani, Seth Lloyd:
Random deep neural networks are biased towards simple functions. NeurIPS 2019: 1962-1974 - [i12]Juan Miguel Arrazola, Alain Delgado, Bhaskar Roy Bardhan, Seth Lloyd:
Quantum-inspired algorithms in practice. CoRR abs/1905.10415 (2019) - [i11]Tom Conte, Erik DeBenedictis, Natesh Ganesh, Todd Hylton, John Paul Strachan, R. Stanley Williams, Alexander A. Alemi, Lee Altenberg, Gavin E. Crooks, James P. Crutchfield, Lídia del Rio, Josh Deutsch, Michael Robert DeWeese, Khari Douglas, Massimiliano Esposito, Michael P. Frank, Robert Fry, Peter Harsha, Mark D. Hill, Christopher T. Kello, Jeff Krichmar, Suhas Kumar, Shih-Chii Liu, Seth Lloyd, Matteo Marsili, Ilya Nemenman, Alex Nugent, Norman H. Packard, Dana Randall, Peter Sadowski, Narayana Santhanam, Robert Shaw, Adam Z. Stieg, Elan Stopnitzky, Christof Teuscher, Chris Watkins, David H. Wolpert, J. Joshua Yang, Yan Yufik:
Thermodynamic Computing. CoRR abs/1911.01968 (2019) - 2018
- [i10]Nathan Killoran, Thomas R. Bromley, Juan Miguel Arrazola, Maria Schuld, Nicolás Quesada, Seth Lloyd:
Continuous-variable quantum neural networks. CoRR abs/1806.06871 (2018) - [i9]András Gilyén, Seth Lloyd, Ewin Tang:
Quantum-inspired low-rank stochastic regression with logarithmic dependence on the dimension. CoRR abs/1811.04909 (2018) - [i8]Giacomo De Palma, Bobak Toussi Kiani, Seth Lloyd:
Deep neural networks are biased towards simple functions. CoRR abs/1812.10156 (2018) - 2017
- [j15]Jacob D. Biamonte, Peter Wittek, Nicola Pancotti, Patrick Rebentrost, Nathan Wiebe, Seth Lloyd:
Quantum machine learning. Nat. 549(7671): 195-202 (2017) - [p1]Seth Lloyd:
Uncomputability and Physical Law. The Incomputable 2017: 95-104 - 2016
- [j14]Seth Lloyd, Olaf Dreyer:
The universal path integral. Quantum Inf. Process. 15(2): 959-967 (2016) - [j13]Cosmo Lupo, Mark M. Wilde, Seth Lloyd:
Quantum Data Hiding in the Presence of Noise. IEEE Trans. Inf. Theory 62(6): 3745-3756 (2016) - [i7]Mark M. Wilde, Marco Tomamichel, Seth Lloyd, Mario Berta:
Gaussian hypothesis testing and quantum illumination. CoRR abs/1608.06991 (2016) - 2015
- [i6]Seth Lloyd:
Any non-affine one-to-one binary gate suffices for computation. CoRR abs/1504.03376 (2015) - [i5]Cosmo Lupo, Mark M. Wilde, Seth Lloyd:
Quantum data hiding in the presence of noise. CoRR abs/1507.06038 (2015) - 2013
- [i4]Patrick Rebentrost, Masoud Mohseni, Seth Lloyd:
Quantum support vector machine for big feature and big data classification. CoRR abs/1307.0471 (2013) - [i3]Saikat Guha, Patrick M. Hayden, Hari Krovi, Seth Lloyd, Cosmo Lupo, Jeffrey H. Shapiro, Masahiro Takeoka, Mark M. Wilde:
Quantum enigma machines and the locking capacity of a quantum channel. CoRR abs/1307.5368 (2013) - [i2]Seth Lloyd:
A Turing test for free will. CoRR abs/1310.3225 (2013) - 2012
- [c5]Mark M. Wilde, Saikat Guha, Si-Hui Tan, Seth Lloyd:
Explicit capacity-achieving receivers for optical communication and quantum reading. ISIT 2012: 551-555 - 2010
- [j12]Vittorio Giovannetti, Seth Lloyd, Lorenzo Maccone:
Quantum private queries: security analysis. IEEE Trans. Inf. Theory 56(7): 3465-3477 (2010)
2000 – 2009
- 2009
- [c4]Stefano Pirandola, Samuel L. Braunstein, Seth Lloyd:
On the Security and Degradability of Gaussian Channels. TCQ 2009: 47-55 - [r1]Seth Lloyd:
Quantum Information Processing. Encyclopedia of Complexity and Systems Science 2009: 7361-7399 - 2008
- [j11]Michal Horodecki, Seth Lloyd, Andreas J. Winter:
Quantum Coding Theorem from Privacy and Distinguishability. Open Syst. Inf. Dyn. 15(1): 47-70 (2008) - [j10]Dorit Aharonov, Wim van Dam, Julia Kempe, Zeph Landau, Seth Lloyd, Oded Regev:
Adiabatic Quantum Computation Is Equivalent to Standard Quantum Computation. SIAM Rev. 50(4): 755-787 (2008) - 2007
- [j9]Dorit Aharonov, Wim van Dam, Julia Kempe, Zeph Landau, Seth Lloyd, Oded Regev:
Adiabatic Quantum Computation is Equivalent to Standard Quantum Computation. SIAM J. Comput. 37(1): 166-194 (2007) - 2006
- [i1]Stefano Pirandola, Stefano Mancini, Seth Lloyd, Samuel L. Braunstein:
Continuous Variable Quantum Cryptography using Two-Way Quantum Communication. CoRR abs/quant-ph/0611167 (2006) - 2004
- [j8]Seth Lloyd, Jeffrey H. Shapiro, Franco N. C. Wong, Prem Kumar, Selim M. Shahriar, Horace P. Yuen:
Infrastructure for the quantum internet. Comput. Commun. Rev. 34(5): 9-20 (2004) - [j7]Vittorio Giovannetti, Saikat Guha, Seth Lloyd, Lorenzo Maccone, Jeffrey H. Shapiro, Brent J. Yen, Horace P. Yuen:
Classical capacity of free-space optical communication. Quantum Inf. Comput. 4(6): 489-499 (2004) - [j6]Henryk Gutmann, Frank K. Wilhelm, William M. Kaminsky, Seth Lloyd:
Bang-Bang Refocusing of a Qubit Exposed to Telegraph Noise. Quantum Inf. Process. 3(1-5): 247-272 (2004) - [c3]Dorit Aharonov, Wim van Dam, Julia Kempe, Zeph Landau, Seth Lloyd, Oded Regev:
Adiabatic Quantum Computation is Equivalent to Standard Quantum Computation. FOCS 2004: 42-51 - [c2]Vittorio Giovannetti, Saikat Guha, Seth Lloyd, Lorenzo Maccone, Jeffrey H. Shapiro, Brent J. Yen, Horace P. Yuen:
Information capacity of bosonic channels. ISIT 2004: 324 - 2002
- [j5]Seth Lloyd:
Quantum Computation with Abelian Anyons. Quantum Inf. Process. 1(1-2): 13-18 (2002) - [j4]Yaakov S. Weinstein, Joseph Emerson, Seth Lloyd, David G. Cory:
Fidelity Decay Saturation Level for Initial Eigenstates. Quantum Inf. Process. 1(6): 439-448 (2002)
1990 – 1999
- 1999
- [j3]Seth Lloyd:
Complexity: Plain and simple. Complex. 4(4): 72 (1999) - 1998
- [c1]Daniel S. Abrams, Seth Lloyd:
Computational Complexity and Physical Law. QCQC 1998: 167-173 - 1997
- [j2]Seth Lloyd:
Universe as quantum computer. Complex. 3(1): 32-35 (1997) - 1996
- [j1]Murray Gell-Mann, Seth Lloyd:
Information measures, effective complexity, and total information. Complex. 2(1): 44-52 (1996)
Coauthor Index
aka: Bobak Toussi Kiani
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint