3,687 research outputs found
Documenting and researching the interaction between civil society and international organisations: the case of 'labour'
A distributional approach to the geometry of dislocations at the mesoscale
We develop a theory to represent dislocated single crystals at the mesoscopic
scale by considering concentrated effects, governed by the distribution theory
combined with multiple-valued kinematic fields. Our approach gives a new
understanding of the continuum theory of defects as developed by Kroener (1980)
and other authors. Fundamental 2D identities relating the incompatibility
tensor to the Frank and Burgers vectors are proved under global strain
assumptions relying on the geometric measure theory, thereby giving rise to
rigorous homogenisation from mesoscopic to macroscopic scale.Comment: article soumi
A damage-based temperature-dependent model for ductile fracture with finite strains and configurational forces
A temperature dependent model for ductile fractur
Damage-driven fracture with low-order potentials: asymptotic behavior, existence and applications
We study the -convergence of damage to fracture energy functionals in
the presence of low-order nonlinear potentials that allows us to model physical
phenomena such as fluid-driven fracturing, plastic slip, and the satisfaction
of kinematical constraints such as crack non-interpenetration. Existence
results are also addressedComment: 41 pages, 4 Figure
Phelan, Edward Joseph
Biography o Edwadrd Joseph PHELAN, British civil servant of Irish descent and fourth Director of
the International Labour Office 1941-1946 (acting) and first Director-General of the
International Labour Organization 1941-1948
Interview with Herman Van Goethem (Kazerne Dossin): 'Clearly, this museum constitues a work of collective memory'
Automated Website Fingerprinting through Deep Learning
Several studies have shown that the network traffic that is generated by a
visit to a website over Tor reveals information specific to the website through
the timing and sizes of network packets. By capturing traffic traces between
users and their Tor entry guard, a network eavesdropper can leverage this
meta-data to reveal which website Tor users are visiting. The success of such
attacks heavily depends on the particular set of traffic features that are used
to construct the fingerprint. Typically, these features are manually engineered
and, as such, any change introduced to the Tor network can render these
carefully constructed features ineffective. In this paper, we show that an
adversary can automate the feature engineering process, and thus automatically
deanonymize Tor traffic by applying our novel method based on deep learning. We
collect a dataset comprised of more than three million network traces, which is
the largest dataset of web traffic ever used for website fingerprinting, and
find that the performance achieved by our deep learning approaches is
comparable to known methods which include various research efforts spanning
over multiple years. The obtained success rate exceeds 96% for a closed world
of 100 websites and 94% for our biggest closed world of 900 classes. In our
open world evaluation, the most performant deep learning model is 2% more
accurate than the state-of-the-art attack. Furthermore, we show that the
implicit features automatically learned by our approach are far more resilient
to dynamic changes of web content over time. We conclude that the ability to
automatically construct the most relevant traffic features and perform accurate
traffic recognition makes our deep learning based approach an efficient,
flexible and robust technique for website fingerprinting.Comment: To appear in the 25th Symposium on Network and Distributed System
Security (NDSS 2018
- …
