13,316 research outputs found
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub Humanoid
Deep neural networks have been widely adopted in recent years, exhibiting
impressive performances in several application domains. It has however been
shown that they can be fooled by adversarial examples, i.e., images altered by
a barely-perceivable adversarial noise, carefully crafted to mislead
classification. In this work, we aim to evaluate the extent to which
robot-vision systems embodying deep-learning algorithms are vulnerable to
adversarial examples, and propose a computationally efficient countermeasure to
mitigate this threat, based on rejecting classification of anomalous inputs. We
then provide a clearer understanding of the safety properties of deep networks
through an intuitive empirical analysis, showing that the mapping learned by
such networks essentially violates the smoothness assumption of learning
algorithms. We finally discuss the main limitations of this work, including the
creation of real-world adversarial examples, and sketch promising research
directions.Comment: Accepted for publication at the ICCV 2017 Workshop on Vision in
Practice on Autonomous Robots (ViPAR
Consensus-based approach to peer-to-peer electricity markets with product differentiation
With the sustained deployment of distributed generation capacities and the
more proactive role of consumers, power systems and their operation are
drifting away from a conventional top-down hierarchical structure. Electricity
market structures, however, have not yet embraced that evolution. Respecting
the high-dimensional, distributed and dynamic nature of modern power systems
would translate to designing peer-to-peer markets or, at least, to using such
an underlying decentralized structure to enable a bottom-up approach to future
electricity markets. A peer-to-peer market structure based on a Multi-Bilateral
Economic Dispatch (MBED) formulation is introduced, allowing for
multi-bilateral trading with product differentiation, for instance based on
consumer preferences. A Relaxed Consensus+Innovation (RCI) approach is
described to solve the MBED in fully decentralized manner. A set of realistic
case studies and their analysis allow us showing that such peer-to-peer market
structures can effectively yield market outcomes that are different from
centralized market structures and optimal in terms of respecting consumers
preferences while maximizing social welfare. Additionally, the RCI solving
approach allows for a fully decentralized market clearing which converges with
a negligible optimality gap, with a limited amount of information being shared.Comment: Accepted for publication in IEEE Transactions on Power System
Emotional Prosody Measurement (EPM): A voice-based evaluation method for psychological therapy effectiveness
The voice embodies three sources of information: speech, the identity, and the emotional state of the speaker (i.e., emotional prosody). The latter feature is resembled by the variability of the F0 (also named fundamental frequency of pitch) (SD F0). To extract this feature, Emotional Prosody Measurement (EPM) was developed, which consists of 1) speech recording, 2) removal of speckle noise, 3) a Fourier Transform to extract the F0-signal, and 4) the determination of SD F0. After a pilot study in which six participants mimicked emotions by their voice, the core experiment was conducted to see whether EPM is successful. Twenty-five patients suffering from a panic disorder with agoraphobia participated. Two methods (storytelling and reliving) were used to trigger anxiety and were compared with comparable but more relaxed conditions. This resulted in a unique database of speech samples that was used to compare the EPM with the Subjective Unit of Distress to validate it as measure for anxiety/stress. The experimental manipulation of anxiety proved to be successful and EPM proved to be a successful evaluation method for psychological therapy effectiveness
A privacy-preserving data storage and service framework based on deep learning and blockchain for construction workers' wearable IoT sensors
Classifying brain signals collected by wearable Internet of Things (IoT)
sensors, especially brain-computer interfaces (BCIs), is one of the
fastest-growing areas of research. However, research has mostly ignored the
secure storage and privacy protection issues of collected personal
neurophysiological data. Therefore, in this article, we try to bridge this gap
and propose a secure privacy-preserving protocol for implementing BCI
applications. We first transformed brain signals into images and used
generative adversarial network to generate synthetic signals to protect data
privacy. Subsequently, we applied the paradigm of transfer learning for signal
classification. The proposed method was evaluated by a case study and results
indicate that real electroencephalogram data augmented with artificially
generated samples provide superior classification performance. In addition, we
proposed a blockchain-based scheme and developed a prototype on Ethereum, which
aims to make storing, querying and sharing personal neurophysiological data and
analysis reports secure and privacy-aware. The rights of three main transaction
bodies - construction workers, BCI service providers and project managers - are
described and the advantages of the proposed system are discussed. We believe
this paper provides a well-rounded solution to safeguard private data against
cyber-attacks, level the playing field for BCI application developers, and to
the end improve professional well-being in the industry
Mathematical models for chemotaxis and their applications in self-organisation phenomena
Chemotaxis is a fundamental guidance mechanism of cells and organisms,
responsible for attracting microbes to food, embryonic cells into developing
tissues, immune cells to infection sites, animals towards potential mates, and
mathematicians into biology. The Patlak-Keller-Segel (PKS) system forms part of
the bedrock of mathematical biology, a go-to-choice for modellers and analysts
alike. For the former it is simple yet recapitulates numerous phenomena; the
latter are attracted to these rich dynamics. Here I review the adoption of PKS
systems when explaining self-organisation processes. I consider their
foundation, returning to the initial efforts of Patlak and Keller and Segel,
and briefly describe their patterning properties. Applications of PKS systems
are considered in their diverse areas, including microbiology, development,
immunology, cancer, ecology and crime. In each case a historical perspective is
provided on the evidence for chemotactic behaviour, followed by a review of
modelling efforts; a compendium of the models is included as an Appendix.
Finally, a half-serious/half-tongue-in-cheek model is developed to explain how
cliques form in academia. Assumptions in which scholars alter their research
line according to available problems leads to clustering of academics and the
formation of "hot" research topics.Comment: 35 pages, 8 figures, Submitted to Journal of Theoretical Biolog
Ternary Syndrome Decoding with Large Weight
The Syndrome Decoding problem is at the core of many code-based
cryptosystems. In this paper, we study ternary Syndrome Decoding in large
weight. This problem has been introduced in the Wave signature scheme but has
never been thoroughly studied. We perform an algorithmic study of this problem
which results in an update of the Wave parameters. On a more fundamental level,
we show that ternary Syndrome Decoding with large weight is a really harder
problem than the binary Syndrome Decoding problem, which could have several
applications for the design of code-based cryptosystems
Sophisticated security verification on routing repaired balanced cell-based dual-rail logic against side channel analysis
Conventional dual-rail precharge logic suffers from difficult implementations of dual-rail structure for obtaining strict compensation between the counterpart rails. As a light-weight and high-speed dual-rail style, balanced cell-based dual-rail logic (BCDL) uses synchronised compound gates with global precharge signal to provide high resistance against differential power or electromagnetic analyses. BCDL can be realised from generic field programmable gate array (FPGA) design flows with constraints. However, routings still exist as concerns because of the deficient flexibility on routing control, which unfavourably results in bias between complementary nets in security-sensitive parts. In this article, based on a routing repair technique, novel verifications towards routing effect are presented. An 8 bit simplified advanced encryption processing (AES)-co-processor is executed that is constructed on block random access memory (RAM)-based BCDL in Xilinx Virtex-5 FPGAs. Since imbalanced routing are major defects in BCDL, the authors can rule out other influences and fairly quantify the security variants. A series of asymptotic correlation electromagnetic (EM) analyses are launched towards a group of circuits with consecutive routing schemes to be able to verify routing impact on side channel analyses. After repairing the non-identical routings, Mutual information analyses are executed to further validate the concrete security increase obtained from identical routing pairs in BCDL
Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices
Contains fulltext :
187230.pdf (preprint version ) (Open Access
- …