437 research outputs found

    Forgery-Resistant Touch-based Authentication on Mobile Devices

    Full text link
    Mobile devices store a diverse set of private user data and have gradually become a hub to control users' other personal Internet-of-Things devices. Access control on mobile devices is therefore highly important. The widely accepted solution is to protect access by asking for a password. However, password authentication is tedious, e.g., a user needs to input a password every time she wants to use the device. Moreover, existing biometrics such as face, fingerprint, and touch behaviors are vulnerable to forgery attacks. We propose a new touch-based biometric authentication system that is passive and secure against forgery attacks. In our touch-based authentication, a user's touch behaviors are a function of some random "secret". The user can subconsciously know the secret while touching the device's screen. However, an attacker cannot know the secret at the time of attack, which makes it challenging to perform forgery attacks even if the attacker has already obtained the user's touch behaviors. We evaluate our touch-based authentication system by collecting data from 25 subjects. Results are promising: the random secrets do not influence user experience and, for targeted forgery attacks, our system achieves 0.18 smaller Equal Error Rates (EERs) than previous touch-based authentication.Comment: Accepted for publication by ASIACCS'1

    Structural brain abnormalities in postural tachycardia syndrome: A VBM-DARTEL study

    Get PDF
    Postural tachycardia syndrome (PoTS), a form of dysautonomia, is characterized by orthostatic intolerance, and is frequently accompanied by a range of symptoms including palpitations, lightheadedness, clouding of thought, blurred vision, fatigue, anxiety, and depression. Although the estimated prevalence of PoTS is approximately 5–10 times as common as the better-known condition orthostatic hypotension, the neural substrates of the syndrome are poorly characterized. In the present study, we used magnetic resonance imaging (MRI) with voxel-based morphometry (VBM) applying the diffeomorphic anatomical registration through exponentiated lie algebra (DARTEL) procedure to examine variation in regional brain structure associated with PoTS. We recruited 11 patients with established PoTS and 23 age-matched normal controls. Group comparison of gray matter volume revealed diminished gray matter volume within the left anterior insula, right middle frontal gyrus and right cingulate gyrus in the PoTS group. We also observed lower white matter volume beneath the precentral gyrus and paracentral lobule, right pre- and post-central gyrus, paracentral lobule and superior frontal gyrus in PoTS patients. Subsequent ROI analyses revealed significant negative correlations between left insula volume and trait anxiety and depression scores. Together, these findings of structural differences, particularly within insular and cingulate components of the salience network, suggest a link between dysregulated physiological reactions arising from compromised central autonomic control (and interoceptive representation) and increased vulnerability to psychiatric symptoms in PoTS patients

    New Generation of Instrumented Ranges: Enabling Automated Performance Analysis

    Get PDF
    Military training conducted on physical ranges that match a unit’s future operational environment provides an invaluable experience. Today, to conduct a training exercise while ensuring a unit’s performance is closely observed, evaluated, and reported on in an After Action Review, the unit requires a number of instructors to accompany the different elements. Training organized on ranges for urban warfighting brings an additional level of complexity—the high level of occlusion typical for these environments multiplies the number of evaluators needed. While the units have great need for such training opportunities, they may not have the necessary human resources to conduct them successfully. In this paper we report on our US Navy/ONR-sponsored project aimed at a new generation of instrumented ranges, and the early results we have achieved. We suggest a radically different concept: instead of recording multiple video streams that need to be reviewed and evaluated by a number of instructors, our system will focus on capturing dynamic individual warfighter pose data and performing automated performance evaluation. We will use an in situ network of automatically-controlled pan-tilt-zoom video cameras and personal position and orientation sensing devices. Our system will record video, reconstruct dynamic 3D individual poses, analyze, recognize events, evaluate performances, generate reports, provide real-time free exploration of recorded data, and even allow the user to generate ‘what-if’ scenarios that were never recorded. The most direct benefit for an individual unit will be the ability to conduct training with fewer human resources, while having a more quantitative account of their performance (dispersion across the terrain, ‘weapon flagging’ incidents, number of patrols conducted). The instructors will have immediate feedback on some elements of the unit’s performance. Having data sets for multiple units will enable historical trend analysis, thus providing new insights and benefits for the entire service.Office of Naval Researc

    Recent progress in translational research on neurovascular and neurodegenerative disorders

    Get PDF
    The already established and widely used intravenous application of recombinant tissue plasminogen activator as a re-opening strategy for acute vessel occlusion in ischemic stroke was recently added by mechanical thrombectomy, representing a fundamental progress in evidence-based medicine to improve the patient’s outcome. This has been paralleled by a swift increase in our understanding of pathomechanisms underlying many neurovascular diseases and most prevalent forms of dementia. Taken together, these current advances offer the potential to overcome almost two decades of marginally successful translational research on stroke and dementia, thereby spurring the entire field of translational neuroscience. Moreover, they may also pave the way for the renaissance of classical neuroprotective paradigms. This review reports and summarizes some of the most interesting and promising recent achievements in neurovascular and dementia research. It highlights sessions from the 9th International Symposium on Neuroprotection and Neurorepair that have been discussed from April 19th to 22nd in Leipzig, Germany. To acknowledge the emerging culture of interdisciplinary collaboration and research, special emphasis is given on translational stories ranging from fundamental research on neurode- and -regeneration to late stage translational or early stage clinical investigations

    Link Stealing Attacks Against Inductive Graph Neural Networks

    Get PDF
    A graph neural network (GNN) is a type of neural network that is specifically designed to process graph-structured data. Typically, GNNs can be implemented in two settings, including the transductive setting and the inductive setting. In the transductive setting, the trained model can only predict the labels of nodes that were observed at the training time. In the inductive setting, the trained model can be generalized to new nodes/graphs. Due to its flexibility, the inductive setting is the most popular GNN setting at the moment. Previous work has shown that transductive GNNs are vulnerable to a series of privacy attacks. However, a comprehensive privacy analysis of inductive GNN models is still missing. This paper fills the gap by conducting a systematic privacy analysis of inductive GNNs through the lens of link stealing attacks. We propose two types of link stealing attacks, i.e., posterior-only attacks and combined attacks. We define threat models of the posterior-only attacks with respect to node topology and the combined attacks by considering combinations of posteriors, node attributes, and graph features. Extensive evaluation on six real-world datasets demonstrates that inductive GNNs leak rich information that enables link stealing attacks with advantageous properties. Even attacks with no knowledge about graph structures can be effective. We also show that our attacks are robust to different node similarities and different graph features. As a counterpart, we investigate two possible defenses and discover they are ineffective against our attacks, which calls for more effective defenses

    How many human proteoforms are there?

    Get PDF
    Despite decades of accumulated knowledge about proteins and their post-translational modifications (PTMs), numerous questions remain regarding their molecular composition and biological function. One of the most fundamental queries is the extent to which the combinations of DNA-, RNA- and PTM-level variations explode the complexity of the human proteome. Here, we outline what we know from current databases and measurement strategies including mass spectrometry-based proteomics. In doing so, we examine prevailing notions about the number of modifications displayed on human proteins and how they combine to generate the protein diversity underlying health and disease. We frame central issues regarding determination of protein-level variation and PTMs, including some paradoxes present in the field today. We use this framework to assess existing data and to ask the question, "How many distinct primary structures of proteins (proteoforms) are created from the 20,300 human genes?" We also explore prospects for improving measurements to better regularize protein-level biology and efficiently associate PTMs to function and phenotype

    Detectable Clonal Mosaicism from Birth to Old Age and its Relationship to Cancer

    Get PDF
    Clonal mosaicism for large chromosomal anomalies (duplications, deletions and uniparental disomy) was detected using SNP microarray data from over 50,000 subjects recruited for genome-wide association studies. This detection method requires a relatively high frequency of cells (>5–10%) with the same abnormal karyotype (presumably of clonal origin) in the presence of normal cells. The frequency of detectable clonal mosaicism in peripheral blood is low (<0.5%) from birth until 50 years of age, after which it rises rapidly to 2–3% in the elderly. Many of the mosaic anomalies are characteristic of those found in hematological cancers and identify common deleted regions that pinpoint the locations of genes previously associated with hematological cancers. Although only 3% of subjects with detectable clonal mosaicism had any record of hematological cancer prior to DNA sampling, those without a prior diagnosis have an estimated 10-fold higher risk of a subsequent hematological cancer (95% confidence interval = 6–18)

    Discovery of ST1 centers in natural diamond

    Full text link
    The ST1 center is a point defect in diamond with bright fluorescence and a mechanism for optical spin initialization and readout. The center has impressive potential for applications in diamond quantum computing as a quantum bus to a register of nuclear spins. This is because it has an exceptionally high readout contrast and, unlike the well-known nitrogen-vacancy center, it does not have a ground state electronic spin that decoheres the nuclear spins. However, its chemical structure is unknown and there are large gaps in our understanding of its properties. We present the discovery of ST1 centers in natural diamond. Our experiments identify interesting power dependence of the center's optical dynamics and reveal new electronic structure. We also present a theory of its electron-phonon interactions, which we combine with previous experiments, to shortlist likely candidates for its chemical structure

    Balancing California's Grid Without Batteries

    Get PDF
    International audienceDemand dispatch refers to a collection of distributed control techniques to obtain grid services from flexible loads. A carefully designed control architecture can enable a collection of loads to behave in aggregate as a large virtual storage device. Grid-level ancillary services can be provided with minimal communication, while guaranteeing quality of service to the consumer. This work expands on prior work in several directions: • A natural notion of energy capacity is proposed for the special case of thermostatically controlled loads (TCLs). It is shown that this quantity is closely approximated by thermal energy capacity, which is a component of the "leaky battery model" introduced in prior work. • Simulation experiments in a distributed control setting show that these energy limits, and accompanying power capacity limits, are reliable indicators of online capacity, even for a heterogeneous population of loads. • A feedforward/feedback control scheme is proposed for a large collection of heterogeneous loads. At the local level, control loops are used to create cooperative responses from each load in a given class of homogeneous loads. This simplifies control of the aggregate based on two pieces of information: aggregate power consumption from each class of loads and the state of charge surrogate that is a part of the leaky battery model. This information is required at a slow timescale (say, 5 minute sampling). • The paper concludes with economic implications. In particular, given that dispatchable loads are a form of virtual storage and not virtual generation, it is not surprising that the use of real time or time-of-use pricing has been problematic
    corecore