503 research outputs found

    Phenomenology of SUSY with intermediate scale physics

    Full text link
    The presence of fields at an intermediate scale between the Electroweak and the Grand Unification scale modifies the evolution of the gauge couplings and consequently the running of other parameters of the Minimal Supersymmetric Standard Model, such as gauginos and scalar masses. The net effect is a modification of the low energy spectrum which affects both the collider phenomenology and the dark matter relic density.Comment: 6 pages, 12 figures, contribution to Moriond EW 2012 proceeding

    Low energy processes to distinguish among seesaw models

    Full text link
    We consider the three basic seesaw scenarios (with fermionic singlets, scalar triplets or fermionic triplets) and discuss their phenomenology, aside from neutrino masses. We use the effective field theory approach and compare the dimension-six operators characteristic of these models. We discuss the possibility of having large dimension-six operators and small dimension-five (small neutrino masses) without any fine-tuning, if the lepton number is violated at a low energy scale. Finally, we discuss some peculiarities of the phenomenology of the fermionic triplet seesaw model.Comment: 3 pages, to appear in the proceedings of IFAE08, Bologna, Ital

    Higgs-gauge unification without tadpoles

    Full text link
    In orbifold gauge theories localized tadpoles can be radiatively generated at the fixed points where U(1) subgroups are conserved. If the Standard Model Higgs fields are identified with internal components of the bulk gauge fields (Higgs-gauge unification) in the presence of these tadpoles the Higgs mass becomes sensitive to the UV cutoff and electroweak symmetry breaking is spoiled. We find the general conditions, based on symmetry arguments, for the absence/presence of localized tadpoles in models with an arbitrary number of dimensions D. We show that in the class of orbifold compactifications based on T^{D-4}/Z_N (D even, N>2) tadpoles are always allowed, while on T^{D-4}/\mathbb Z_2 (arbitrary D) with fermions in arbitrary representations of the bulk gauge group tadpoles can only appear in D=6 dimensions. We explicitly check this with one- and two-loops calculationsComment: 19 pages, 3 figures, axodraw.sty. v2: version to appear in Nucl. Phys.

    Tadpoles and Symmetries in Higgs-Gauge Unification Theories

    Full text link
    In theories with extra dimensions the Standard Model Higgs fields can be identified with internal components of bulk gauge fields (Higgs-gauge unification). The bulk gauge symmetry protects the Higgs mass from quadratic divergences, but at the fixed points localized tadpoles can be radiatively generated if U(1) subgroups are conserved, making the Higgs mass UV sensitive. We show that a global symmetry, remnant of the internal rotation group after orbifold projection, can prevent the generation of such tadpoles. In particular we consider the classes of orbifold compactifications T^d/Z_N (d even, N>2) and T^d/Z_2 (arbitrary d) and show that in the first case tadpoles are always allowed, while in the second they can appear only for d=2 (six dimensions).Comment: 10 pages, based on talks given by M.Q. at String Phenomenology 2004, University of Michigan, Ann Arbor, August 1-6, 2004 and 10th International Symposium on Particles, Strings and Cosmology (PASCOS'04 and Nath Fest), Northeastern University, Boston, August 16-22, 200

    On Security and Sparsity of Linear Classifiers for Adversarial Settings

    Full text link
    Machine-learning techniques are widely used in security-related applications, like spam and malware detection. However, in such settings, they have been shown to be vulnerable to adversarial attacks, including the deliberate manipulation of data at test time to evade detection. In this work, we focus on the vulnerability of linear classifiers to evasion attacks. This can be considered a relevant problem, as linear classifiers have been increasingly used in embedded systems and mobile devices for their low processing time and memory requirements. We exploit recent findings in robust optimization to investigate the link between regularization and security of linear classifiers, depending on the type of attack. We also analyze the relationship between the sparsity of feature weights, which is desirable for reducing processing cost, and the security of linear classifiers. We further propose a novel octagonal regularizer that allows us to achieve a proper trade-off between them. Finally, we empirically show how this regularizer can improve classifier security and sparsity in real-world application examples including spam and malware detection

    Unitarity of the Leptonic Mixing Matrix

    Get PDF
    We determine the elements of the leptonic mixing matrix, without assuming unitarity, combining data from neutrino oscillation experiments and weak decays. To that end, we first develop a formalism for studying neutrino oscillations in vacuum and matter when the leptonic mixing matrix is not unitary. To be conservative, only three light neutrino species are considered, whose propagation is generically affected by non-unitary effects. Precision improvements within future facilities are discussed as well.Comment: Standard Model radiative corrections to the invisible Z width included. Some numerical results modified at the percent level. Updated with latest bounds on the rare tau decay. Physical conculsions unchange

    General bounds on non-standard neutrino interactions

    Full text link
    We derive model-independent bounds on production and detection non-standard neutrino interactions (NSI). We find that the constraints for NSI parameters are around O(10^{-2}) to O(10^{-1}). Furthermore, we review and update the constraints on matter NSI. We conclude that the bounds on production and detection NSI are generally one order of magnitude stronger than their matter counterparts.Comment: 18 pages, revtex4, 1 axodraw figure. Minor changes, matches published versio

    Neutrino masses from higher than d=5 effective operators

    Get PDF
    We discuss the generation of small neutrino masses from effective operators higher than dimension five, which open new possibilities for low scale see-saw mechanisms. In order to forbid the radiative generation of neutrino mass by lower dimensional operators, extra fields are required, which are charged under a new symmetry. We discuss this mechanism in the framework of a two Higgs doublet model. We demonstrate that the tree level generation of neutrino mass from higher dimensional operators often leads to inverse see-saw scenarios in which small lepton number violating terms are naturally suppressed by the new physics scale. Furthermore, we systematically discuss tree level generalizations of the standard see-saw scenarios from higher dimensional operators. Finally, we point out that higher dimensional operators can also be generated at the loop level. In this case, we obtain the TeV scale as new physics scale even with order one couplings.Comment: 22 pages, 3 figures, 2 tables. Some references adde

    Security Evaluation of Support Vector Machines in Adversarial Environments

    Full text link
    Support Vector Machines (SVMs) are among the most popular classification techniques adopted in security applications like malware detection, intrusion detection, and spam filtering. However, if SVMs are to be incorporated in real-world security systems, they must be able to cope with attack patterns that can either mislead the learning algorithm (poisoning), evade detection (evasion), or gain information about their internal parameters (privacy breaches). The main contributions of this chapter are twofold. First, we introduce a formal general framework for the empirical evaluation of the security of machine-learning systems. Second, according to our framework, we demonstrate the feasibility of evasion, poisoning and privacy attacks against SVMs in real-world security problems. For each attack technique, we evaluate its impact and discuss whether (and how) it can be countered through an adversary-aware design of SVMs. Our experiments are easily reproducible thanks to open-source code that we have made available, together with all the employed datasets, on a public repository.Comment: 47 pages, 9 figures; chapter accepted into book 'Support Vector Machine Applications

    Is Feature Selection Secure against Training Data Poisoning?

    Get PDF
    Learning in adversarial settings is becoming an important task for application domains where attackers may inject malicious data into the training set to subvert normal operation of data-driven technologies. Feature selection has been widely used in machine learning for security applications to improve generalization and computational efficiency, although it is not clear whether its use may be beneficial or even counterproductive when training data are poisoned by intelligent attackers. In this work, we shed light on this issue by providing a framework to investigate the robustness of popular feature selection methods, including LASSO, ridge regression and the elastic net. Our results on malware detection show that feature selection methods can be significantly compromised under attack (we can reduce LASSO to almost random choices of feature sets by careful insertion of less than 5% poisoned training samples), highlighting the need for specific countermeasures
    corecore