2,505 research outputs found
Securing Interactive Sessions Using Mobile Device through Visual Channel and Visual Inspection
Communication channel established from a display to a device's camera is
known as visual channel, and it is helpful in securing key exchange protocol.
In this paper, we study how visual channel can be exploited by a network
terminal and mobile device to jointly verify information in an interactive
session, and how such information can be jointly presented in a user-friendly
manner, taking into account that the mobile device can only capture and display
a small region, and the user may only want to authenticate selective
regions-of-interests. Motivated by applications in Kiosk computing and
multi-factor authentication, we consider three security models: (1) the mobile
device is trusted, (2) at most one of the terminal or the mobile device is
dishonest, and (3) both the terminal and device are dishonest but they do not
collude or communicate. We give two protocols and investigate them under the
abovementioned models. We point out a form of replay attack that renders some
other straightforward implementations cumbersome to use. To enhance
user-friendliness, we propose a solution using visual cues embedded into the 2D
barcodes and incorporate the framework of "augmented reality" for easy
verifications through visual inspection. We give a proof-of-concept
implementation to show that our scheme is feasible in practice.Comment: 16 pages, 10 figure
Antibiotic prophylaxis after total joint replacements
Objectives: To review the latest evidence on antibiotic prophylaxis for patients with total joint replacements to prevent prosthesis infections. Data sources: Literature search of Medline and PubMed until June 2009. Study selection: Studies of patients with total joint replacements from around the world, studies concerning antibiotic prophylaxis, as well as chemoprophylaxis guidelines from orthopaedic associations were searched. Data extraction: Literature review, original articles, case reports, best practice guidelines. Data synthesis: With the rising incidence of patients with total joint replacements, subsequent deep infection of the implants is a rare but dreaded complication which has immense physiological, psychological, financial, and social implications. Guidelines from urologists, gastroenterologists, and dental surgeons attempt to identify high-risk patients who may be more susceptible to prosthetic joint infections. These patients are provided with prophylactic antibiotics before any invasive procedure that may cause bacterial seeding to prosthetic joints. Most orthopaedic associations around the world adopt a similar policy to provide prophylaxis to cover any anticipated chance of bacteraemia. The American Association of Orthopaedic Surgeons adopts the most cautious approach in which all patients with total joint replacements who undergo any procedure that breaches a mucosal surface receive prophylactic antibiotics. Conclusion: The guidelines from the American Association of Orthopaedic Surgeons seem to have an all-encompassing policy when it comes to providing prophylactic antibiotics. Nonetheless, physicians must still exercise their judgement and customise the treatment to each patient. The benefits of prophylactic antibiotics must be balanced against the risks of drug side-effects and the emergence of antibiotic resistance.published_or_final_versio
Magnetism and its microscopic origin in iron-based high-temperature superconductors
High-temperature superconductivity in the iron-based materials emerges from,
or sometimes coexists with, their metallic or insulating parent compound
states. This is surprising since these undoped states display dramatically
different antiferromagnetic (AF) spin arrangements and Nel
temperatures. Although there is general consensus that magnetic interactions
are important for superconductivity, much is still unknown concerning the
microscopic origin of the magnetic states. In this review, progress in this
area is summarized, focusing on recent experimental and theoretical results and
discussing their microscopic implications. It is concluded that the parent
compounds are in a state that is more complex than implied by a simple Fermi
surface nesting scenario, and a dual description including both itinerant and
localized degrees of freedom is needed to properly describe these fascinating
materials.Comment: 14 pages, 4 figures, Review article, accepted for publication in
Nature Physic
Domain Bridge: Generative model-based domain forensic for black-box models
In forensic investigations of machine learning models, techniques that
determine a model's data domain play an essential role, with prior work relying
on large-scale corpora like ImageNet to approximate the target model's domain.
Although such methods are effective in finding broad domains, they often
struggle in identifying finer-grained classes within those domains. In this
paper, we introduce an enhanced approach to determine not just the general data
domain (e.g., human face) but also its specific attributes (e.g., wearing
glasses). Our approach uses an image embedding model as the encoder and a
generative model as the decoder. Beginning with a coarse-grained description,
the decoder generates a set of images, which are then presented to the unknown
target model. Successful classifications by the model guide the encoder to
refine the description, which in turn, are used to produce a more specific set
of images in the subsequent iteration. This iterative refinement narrows down
the exact class of interest. A key strength of our approach lies in leveraging
the expansive dataset, LAION-5B, on which the generative model Stable Diffusion
is trained. This enlarges our search space beyond traditional corpora, such as
ImageNet. Empirical results showcase our method's performance in identifying
specific attributes of a model's input domain, paving the way for more detailed
forensic analyses of deep learning models
Adaptive Attractors: A Defense Strategy against ML Adversarial Collusion Attacks
In the seller-buyer setting on machine learning models, the seller generates
different copies based on the original model and distributes them to different
buyers, such that adversarial samples generated on one buyer's copy would
likely not work on other copies. A known approach achieves this using
attractor-based rewriter which injects different attractors to different
copies. This induces different adversarial regions in different copies, making
adversarial samples generated on one copy not replicable on others. In this
paper, we focus on a scenario where multiple malicious buyers collude to
attack. We first give two formulations and conduct empirical studies to analyze
effectiveness of collusion attack under different assumptions on the attacker's
capabilities and properties of the attractors. We observe that existing
attractor-based methods do not effectively mislead the colluders in the sense
that adversarial samples found are influenced more by the original model
instead of the attractors as number of colluders increases. Based on this
observation, we propose using adaptive attractors whose weight is guided by a
U-shape curve to cover the shortfalls. Experimentation results show that when
using our approach, the attack success rate of a collusion attack converges to
around 15% even when lots of copies are applied for collusion. In contrast,
when using the existing attractor-based rewriter with fixed weight, the attack
success rate increases linearly with the number of copies used for collusion
Genome wide association mapping of grain arsenic, copper, molybdenum and zinc in rice (Oryza sativa L.) grown at four international field sites
Peer reviewedPublisher PD
WNT signalling in prostate cancer
Genome sequencing and gene expression analyses of prostate tumours have highlighted the potential importance of genetic and epigenetic changes observed in WNT signalling pathway components in prostate tumours-particularly in the development of castration-resistant prostate cancer. WNT signalling is also important in the prostate tumour microenvironment, in which WNT proteins secreted by the tumour stroma promote resistance to therapy, and in prostate cancer stem or progenitor cells, in which WNT-β-catenin signals promote self-renewal or expansion. Preclinical studies have demonstrated the potential of inhibitors that target WNT receptor complexes at the cell membrane or that block the interaction of β-catenin with lymphoid enhancer-binding factor 1 and the androgen receptor, in preventing prostate cancer progression. Some WNT signalling inhibitors are in phase I trials, but they have yet to be tested in patients with prostate cancer
Search for Second-Generation Scalar Leptoquarks in Collisions at =1.96 TeV
Results on a search for pair production of second generation scalar
leptoquark in collisions at =1.96 TeV are reported. The
data analyzed were collected by the CDF detector during the 2002-2003 Tevatron
Run II and correspond to an integrated luminosity of 198 pb. Leptoquarks
(LQ) are sought through their decay into (charged) leptons and quarks, with
final state signatures represented by two muons and jets and one muon, large
transverse missing energy and jets. We observe no evidence for production
and derive 95% C.L. upper limits on the production cross sections as well
as lower limits on their mass as a function of , where is the
branching fraction for .Comment: 9 pages (3 author list) 5 figure
TRY plant trait database - enhanced coverage and open access
Plant traits-the morphological, anatomical, physiological, biochemical and phenological characteristics of plants-determine how plants respond to environmental factors, affect other trophic levels, and influence ecosystem properties and their benefits and detriments to people. Plant trait data thus represent the basis for a vast area of research spanning from evolutionary biology, community and functional ecology, to biodiversity conservation, ecosystem and landscape management, restoration, biogeography and earth system modelling. Since its foundation in 2007, the TRY database of plant traits has grown continuously. It now provides unprecedented data coverage under an open access data policy and is the main plant trait database used by the research community worldwide. Increasingly, the TRY database also supports new frontiers of trait-based plant research, including the identification of data gaps and the subsequent mobilization or measurement of new data. To support this development, in this article we evaluate the extent of the trait data compiled in TRY and analyse emerging patterns of data coverage and representativeness. Best species coverage is achieved for categorical traits-almost complete coverage for 'plant growth form'. However, most traits relevant for ecology and vegetation modelling are characterized by continuous intraspecific variation and trait-environmental relationships. These traits have to be measured on individual plants in their respective environment. Despite unprecedented data coverage, we observe a humbling lack of completeness and representativeness of these continuous traits in many aspects. We, therefore, conclude that reducing data gaps and biases in the TRY database remains a key challenge and requires a coordinated approach to data mobilization and trait measurements. This can only be achieved in collaboration with other initiatives
- …
