90 research outputs found

    Uniformly resolvable decompositions of KvIK_v-I into 55-stars

    Full text link
    We consider the existence problem of uniformly resolvable decompositions of KvK_v into subgraphs such that each resolution class contains only blocks isomorphic to the same graph. We give a complete solution for the case in which one resolution class is K2K_2 and the rest are K1,5K_{1,5}.Comment: 30 pages, 2 figure

    From giant gravitons to black holes

    Get PDF
    We study AdS5_5 black holes from a recently suggested giant graviton expansion formula for the index of U(N)U(N) maximal super-Yang-Mills theory. We compute the large NN entropy at fixed charges and giant graviton numbers nIn_I by a saddle point analysis, and further maximize it in nIn_I. This agrees with the dual black hole entropy in the small black hole limit. To get black holes at general sizes, one should note that various giant graviton indices cancel because gauge theory does not suffer from a Hagedorn-like pathology by an infinite baryonic tower. With one assumption on the mechanism of this cancellation, we account for the dual black hole entropy at general sizes. We interpret our results as analytic continuations of the large NN free energies of SCFTs, and based on it compute the entropies of AdS4,7_{4,7} black holes from M5, M2 giant gravitons.Comment: 27 pages, 4 figure

    SplitSecond: Flexible privilege separation of Android apps

    Get PDF

    On return oriented programming threats in Android runtime

    Get PDF

    Attacking logo-based phishing website detectors with adversarial perturbations

    Full text link
    Recent times have witnessed the rise of anti-phishing schemes powered by deep learning (DL). In particular, logo-based phishing detectors rely on DL models from Computer Vision to identify logos of well-known brands on webpages, to detect malicious webpages that imitate a given brand. For instance, Siamese networks have demonstrated notable performance for these tasks, enabling the corresponding anti-phishing solutions to detect even "zero-day" phishing webpages. In this work, we take the next step of studying the robustness of logo-based phishing detectors against adversarial ML attacks. We propose a novel attack exploiting generative adversarial perturbations to craft "adversarial logos" that evade phishing detectors. We evaluate our attacks through: (i) experiments on datasets containing real logos, to evaluate the robustness of state-of-the-art phishing detectors; and (ii) user studies to gauge whether our adversarial logos can deceive human eyes. The results show that our proposed attack is capable of crafting perturbed logos subtle enough to evade various DL models-achieving an evasion rate of up to 95%. Moreover, users are not able to spot significant differences between generated adversarial logos and original ones.Comment: To appear in ESORICS 202

    MGOS: A library for molecular geometry and its operating system

    Get PDF
    The geometry of atomic arrangement underpins the structural understanding of molecules in many fields. However, no general framework of mathematical/computational theory for the geometry of atomic arrangement exists. Here we present "Molecular Geometry (MG)'' as a theoretical framework accompanied by "MG Operating System (MGOS)'' which consists of callable functions implementing the MG theory. MG allows researchers to model complicated molecular structure problems in terms of elementary yet standard notions of volume, area, etc. and MGOS frees them from the hard and tedious task of developing/implementing geometric algorithms so that they can focus more on their primary research issues. MG facilitates simpler modeling of molecular structure problems; MGOS functions can be conveniently embedded in application programs for the efficient and accurate solution of geometric queries involving atomic arrangements. The use of MGOS in problems involving spherical entities is akin to the use of math libraries in general purpose programming languages in science and engineering. (C) 2019 The Author(s). Published by Elsevier B.V

    Machine Learning in Additive Manufacturing: A Review

    Get PDF
    In this review article, the latest applications of machine learning (ML) in the additive manufacturing (AM) field are reviewed. These applications, such as parameter optimization and anomaly detection, are classified into different types of ML tasks, including regression, classification, and clustering. The performance of various ML algorithms in these types of AM tasks are compared and evaluated. Finally, several future research directions are suggested

    Magnetic wallpaper Dirac fermions and topological magnetic Dirac insulators

    Full text link
    Topological crystalline insulators (TCIs) can host anomalous surface states which inherits the characteristics of crystalline symmetry that protects the bulk topology. Especially, the diversity of magnetic crystalline symmetries indicates the potential for novel magnetic TCIs with distinct surface characteristics. Here, we propose a topological magnetic Dirac insulator (TMDI), whose two-dimensional surface hosts fourfold-degenerate Dirac fermions protected by either the pc4mmp'_c4mm or p4gmp4'g'm magnetic wallpaper group. The bulk topology of TMDIs is protected by diagonal mirror symmetries, which give chiral dispersion of surface Dirac fermions and mirror-protected hinge modes. We propose candidate materials for TMDIs including Nd4_4Te8_8Cl4_4O20_{20} and DyB4_4 based on first-principles calculations, and construct a general scheme for searching TMDIs using the space group of paramagnetic parent states. Our theoretical discovery of TMDIs will facilitate future research on magnetic TCIs and illustrate a distinct way to achieve anomalous surface states in magnetic crystals.Comment: 10+36 pages, 4+23 figures, published versio

    Design of exceptionally strong and conductive Cu alloys beyond the conventional speculation via the interfacial energy-controlled dispersion of gamma-Al2O3 nanoparticles

    Get PDF
    The development of Cu-based alloys with high-mechanical properties (strength, ductility) and electrical conductivity plays a key role over a wide range of industrial applications. Successful design of the materials, however, has been rare due to the improvement of mutually exclusive properties as conventionally speculated. In this paper, we demonstrate that these contradictory material properties can be improved simultaneously if the interfacial energies of heterogeneous interfaces are carefully controlled. We uniformly disperse γ-Al2O3 nanoparticles over Cu matrix, and then we controlled atomic level morphology of the interface γ-Al2O3 //Cu by adding Ti solutes. It is shown that the Ti dramatically drives the interfacial phase transformation from very irregular to homogeneous spherical morphologies resulting in substantial enhancement of the mechanical property of Cu matrix. Furthermore, the Ti removes impurities (O and Al) in the Cu matrix by forming oxides leading to recovery of the electrical conductivity of pure Cu. We validate experimental results using TEM and EDX combined with first-principles density functional theory (DFT) calculations, which all consistently poise that our materials are suitable for industrial applications.1
    corecore