2,505 research outputs found

    Securing Interactive Sessions Using Mobile Device through Visual Channel and Visual Inspection

    Full text link
    Communication channel established from a display to a device's camera is known as visual channel, and it is helpful in securing key exchange protocol. In this paper, we study how visual channel can be exploited by a network terminal and mobile device to jointly verify information in an interactive session, and how such information can be jointly presented in a user-friendly manner, taking into account that the mobile device can only capture and display a small region, and the user may only want to authenticate selective regions-of-interests. Motivated by applications in Kiosk computing and multi-factor authentication, we consider three security models: (1) the mobile device is trusted, (2) at most one of the terminal or the mobile device is dishonest, and (3) both the terminal and device are dishonest but they do not collude or communicate. We give two protocols and investigate them under the abovementioned models. We point out a form of replay attack that renders some other straightforward implementations cumbersome to use. To enhance user-friendliness, we propose a solution using visual cues embedded into the 2D barcodes and incorporate the framework of "augmented reality" for easy verifications through visual inspection. We give a proof-of-concept implementation to show that our scheme is feasible in practice.Comment: 16 pages, 10 figure

    Antibiotic prophylaxis after total joint replacements

    Get PDF
    Objectives: To review the latest evidence on antibiotic prophylaxis for patients with total joint replacements to prevent prosthesis infections. Data sources: Literature search of Medline and PubMed until June 2009. Study selection: Studies of patients with total joint replacements from around the world, studies concerning antibiotic prophylaxis, as well as chemoprophylaxis guidelines from orthopaedic associations were searched. Data extraction: Literature review, original articles, case reports, best practice guidelines. Data synthesis: With the rising incidence of patients with total joint replacements, subsequent deep infection of the implants is a rare but dreaded complication which has immense physiological, psychological, financial, and social implications. Guidelines from urologists, gastroenterologists, and dental surgeons attempt to identify high-risk patients who may be more susceptible to prosthetic joint infections. These patients are provided with prophylactic antibiotics before any invasive procedure that may cause bacterial seeding to prosthetic joints. Most orthopaedic associations around the world adopt a similar policy to provide prophylaxis to cover any anticipated chance of bacteraemia. The American Association of Orthopaedic Surgeons adopts the most cautious approach in which all patients with total joint replacements who undergo any procedure that breaches a mucosal surface receive prophylactic antibiotics. Conclusion: The guidelines from the American Association of Orthopaedic Surgeons seem to have an all-encompassing policy when it comes to providing prophylactic antibiotics. Nonetheless, physicians must still exercise their judgement and customise the treatment to each patient. The benefits of prophylactic antibiotics must be balanced against the risks of drug side-effects and the emergence of antibiotic resistance.published_or_final_versio

    Magnetism and its microscopic origin in iron-based high-temperature superconductors

    Full text link
    High-temperature superconductivity in the iron-based materials emerges from, or sometimes coexists with, their metallic or insulating parent compound states. This is surprising since these undoped states display dramatically different antiferromagnetic (AF) spin arrangements and Neˊ\rm \acute{e}el temperatures. Although there is general consensus that magnetic interactions are important for superconductivity, much is still unknown concerning the microscopic origin of the magnetic states. In this review, progress in this area is summarized, focusing on recent experimental and theoretical results and discussing their microscopic implications. It is concluded that the parent compounds are in a state that is more complex than implied by a simple Fermi surface nesting scenario, and a dual description including both itinerant and localized degrees of freedom is needed to properly describe these fascinating materials.Comment: 14 pages, 4 figures, Review article, accepted for publication in Nature Physic

    Domain Bridge: Generative model-based domain forensic for black-box models

    Full text link
    In forensic investigations of machine learning models, techniques that determine a model's data domain play an essential role, with prior work relying on large-scale corpora like ImageNet to approximate the target model's domain. Although such methods are effective in finding broad domains, they often struggle in identifying finer-grained classes within those domains. In this paper, we introduce an enhanced approach to determine not just the general data domain (e.g., human face) but also its specific attributes (e.g., wearing glasses). Our approach uses an image embedding model as the encoder and a generative model as the decoder. Beginning with a coarse-grained description, the decoder generates a set of images, which are then presented to the unknown target model. Successful classifications by the model guide the encoder to refine the description, which in turn, are used to produce a more specific set of images in the subsequent iteration. This iterative refinement narrows down the exact class of interest. A key strength of our approach lies in leveraging the expansive dataset, LAION-5B, on which the generative model Stable Diffusion is trained. This enlarges our search space beyond traditional corpora, such as ImageNet. Empirical results showcase our method's performance in identifying specific attributes of a model's input domain, paving the way for more detailed forensic analyses of deep learning models

    Adaptive Attractors: A Defense Strategy against ML Adversarial Collusion Attacks

    Full text link
    In the seller-buyer setting on machine learning models, the seller generates different copies based on the original model and distributes them to different buyers, such that adversarial samples generated on one buyer's copy would likely not work on other copies. A known approach achieves this using attractor-based rewriter which injects different attractors to different copies. This induces different adversarial regions in different copies, making adversarial samples generated on one copy not replicable on others. In this paper, we focus on a scenario where multiple malicious buyers collude to attack. We first give two formulations and conduct empirical studies to analyze effectiveness of collusion attack under different assumptions on the attacker's capabilities and properties of the attractors. We observe that existing attractor-based methods do not effectively mislead the colluders in the sense that adversarial samples found are influenced more by the original model instead of the attractors as number of colluders increases. Based on this observation, we propose using adaptive attractors whose weight is guided by a U-shape curve to cover the shortfalls. Experimentation results show that when using our approach, the attack success rate of a collusion attack converges to around 15% even when lots of copies are applied for collusion. In contrast, when using the existing attractor-based rewriter with fixed weight, the attack success rate increases linearly with the number of copies used for collusion

    WNT signalling in prostate cancer

    Get PDF
    Genome sequencing and gene expression analyses of prostate tumours have highlighted the potential importance of genetic and epigenetic changes observed in WNT signalling pathway components in prostate tumours-particularly in the development of castration-resistant prostate cancer. WNT signalling is also important in the prostate tumour microenvironment, in which WNT proteins secreted by the tumour stroma promote resistance to therapy, and in prostate cancer stem or progenitor cells, in which WNT-β-catenin signals promote self-renewal or expansion. Preclinical studies have demonstrated the potential of inhibitors that target WNT receptor complexes at the cell membrane or that block the interaction of β-catenin with lymphoid enhancer-binding factor 1 and the androgen receptor, in preventing prostate cancer progression. Some WNT signalling inhibitors are in phase I trials, but they have yet to be tested in patients with prostate cancer

    Search for Second-Generation Scalar Leptoquarks in ppˉ\bm{p \bar{p}} Collisions at s\sqrt{s}=1.96 TeV

    Get PDF
    Results on a search for pair production of second generation scalar leptoquark in ppˉp \bar{p} collisions at s\sqrt{s}=1.96 TeV are reported. The data analyzed were collected by the CDF detector during the 2002-2003 Tevatron Run II and correspond to an integrated luminosity of 198 pb1^{-1}. Leptoquarks (LQ) are sought through their decay into (charged) leptons and quarks, with final state signatures represented by two muons and jets and one muon, large transverse missing energy and jets. We observe no evidence for LQLQ production and derive 95% C.L. upper limits on the LQLQ production cross sections as well as lower limits on their mass as a function of β\beta, where β\beta is the branching fraction for LQμqLQ \to \mu q.Comment: 9 pages (3 author list) 5 figure

    TRY plant trait database - enhanced coverage and open access

    Get PDF
    Plant traits-the morphological, anatomical, physiological, biochemical and phenological characteristics of plants-determine how plants respond to environmental factors, affect other trophic levels, and influence ecosystem properties and their benefits and detriments to people. Plant trait data thus represent the basis for a vast area of research spanning from evolutionary biology, community and functional ecology, to biodiversity conservation, ecosystem and landscape management, restoration, biogeography and earth system modelling. Since its foundation in 2007, the TRY database of plant traits has grown continuously. It now provides unprecedented data coverage under an open access data policy and is the main plant trait database used by the research community worldwide. Increasingly, the TRY database also supports new frontiers of trait-based plant research, including the identification of data gaps and the subsequent mobilization or measurement of new data. To support this development, in this article we evaluate the extent of the trait data compiled in TRY and analyse emerging patterns of data coverage and representativeness. Best species coverage is achieved for categorical traits-almost complete coverage for 'plant growth form'. However, most traits relevant for ecology and vegetation modelling are characterized by continuous intraspecific variation and trait-environmental relationships. These traits have to be measured on individual plants in their respective environment. Despite unprecedented data coverage, we observe a humbling lack of completeness and representativeness of these continuous traits in many aspects. We, therefore, conclude that reducing data gaps and biases in the TRY database remains a key challenge and requires a coordinated approach to data mobilization and trait measurements. This can only be achieved in collaboration with other initiatives
    corecore