61 research outputs found
Artificial Text Detection with Multiple Training Strategies
As the deep learning rapidly promote, the artificial texts created by
generative models are commonly used in news and social media. However, such
models can be abused to generate product reviews, fake news, and even fake
political content. The paper proposes a solution for the Russian Artificial
Text Detection in the Dialogue shared task 2022 (RuATD 2022) to distinguish
which model within the list is used to generate this text. We introduce the
DeBERTa pre-trained language model with multiple training strategies for this
shared task. Extensive experiments conducted on the RuATD dataset validate the
effectiveness of our proposed method. Moreover, our submission ranked second
place in the evaluation phase for RuATD 2022 (Multi-Class).Comment: Accepted by Dialogue-2022 Conference. 7 pages, 2 figures, 2 table
Open-TEE - An Open Virtual Trusted Execution Environment
Hardware-based Trusted Execution Environments (TEEs) are widely deployed in
mobile devices. Yet their use has been limited primarily to applications
developed by the device vendors. Recent standardization of TEE interfaces by
GlobalPlatform (GP) promises to partially address this problem by enabling
GP-compliant trusted applications to run on TEEs from different vendors.
Nevertheless ordinary developers wishing to develop trusted applications face
significant challenges. Access to hardware TEE interfaces are difficult to
obtain without support from vendors. Tools and software needed to develop and
debug trusted applications may be expensive or non-existent.
In this paper, we describe Open-TEE, a virtual, hardware-independent TEE
implemented in software. Open-TEE conforms to GP specifications. It allows
developers to develop and debug trusted applications with the same tools they
use for developing software in general. Once a trusted application is fully
debugged, it can be compiled for any actual hardware TEE. Through performance
measurements and a user study we demonstrate that Open-TEE is efficient and
easy to use. We have made Open- TEE freely available as open source.Comment: Author's version of article to appear in 14th IEEE International
Conference on Trust, Security and Privacy in Computing and Communications,
TrustCom 2015, Helsinki, Finland, August 20-22, 201
Responsibility-Shifting through Delegation: Evidence from China’s One-Child Policy
We provide evidence on how responsibility-shifting through delegation occurred in China’s implementation of the one-child policy. We show that trust in local governments was reduced when they were the primary enforcer of the policy (1979–1990), while trust in neighbors was reduced when civilians were incentivized to report neighbors’ violations of the policy to the authorities (1991–2015). This effect was more pronounced among parents of a firstborn daughter, who were more likely to violate the policy due to the deep-rooted son preference. This study provides the first set of field evidence on the responsibility-shifting effect of delegation
A Decentralized Dynamic PKI based on Blockchain
The central role of the certificate authority (CA) in traditional public key infrastructure (PKI) makes it fragile and prone to compromises and operational failures. Maintaining CAs and revocation lists is demanding especially in loosely-connected and large systems. Log-based PKIs have been proposed as a remedy but they do not solve the problem effectively. We provide a general model and a solution for decentralized and dynamic PKI based on a blockchain and web of trust model where the traditional CA and digital certificates are removed and instead, everything is registered on the blockchain. Registration, revocation, and update of public keys are based on a consensus mechanism between a certain number of entities that are already part of the system. Any node which is part of the system can be an auditor and initiate the revocation procedure once it finds out malicious activities. Revocation lists are no longer required as any node can efficiently verify the public keys through witnesses
A comparison of methods to harmonize cortical thickness measurements across scanners and sites
Results of neuroimaging datasets aggregated from multiple sites may be biased by site-specific profiles in participants\u27 demographic and clinical characteristics, as well as MRI acquisition protocols and scanning platforms. We compared the impact of four different harmonization methods on results obtained from analyses of cortical thickness data: (1) linear mixed-effects model (LME) that models site-specific random intercepts (LM
- …