32 research outputs found

    Transfer Learning for Motor Imagery Based Brain-Computer Interfaces: A Complete Pipeline

    Full text link
    Transfer learning (TL) has been widely used in motor imagery (MI) based brain-computer interfaces (BCIs) to reduce the calibration effort for a new subject, and demonstrated promising performance. While a closed-loop MI-based BCI system, after electroencephalogram (EEG) signal acquisition and temporal filtering, includes spatial filtering, feature engineering, and classification blocks before sending out the control signal to an external device, previous approaches only considered TL in one or two such components. This paper proposes that TL could be considered in all three components (spatial filtering, feature engineering, and classification) of MI-based BCIs. Furthermore, it is also very important to specifically add a data alignment component before spatial filtering to make the data from different subjects more consistent, and hence to facilitate subsequential TL. Offline calibration experiments on two MI datasets verified our proposal. Especially, integrating data alignment and sophisticated TL approaches can significantly improve the classification performance, and hence greatly reduces the calibration effort

    CryptoEval: Evaluating the Risk of Cryptographic Misuses in Android Apps with Data-Flow Analysis

    Full text link
    The misunderstanding and incorrect configurations of cryptographic primitives have exposed severe security vulnerabilities to attackers. Due to the pervasiveness and diversity of cryptographic misuses, a comprehensive and accurate understanding of how cryptographic misuses can undermine the security of an Android app is critical to the subsequent mitigation strategies but also challenging. Although various approaches have been proposed to detect cryptographic misuses in Android apps, seldom studies have focused on estimating the security risks introduced by cryptographic misuses. To address this problem, we present an extensible framework for deciding the threat level of cryptographic misuses in Android apps. Firstly, we propose a unified specification for representing cryptographic misuses to make our framework extensible and develop adapters to unify the detection results of the state-of-the-art cryptographic misuse detectors, resulting in an adapter-based detection toolchain for a more comprehensive list of cryptographic misuses. Secondly, we employ a misuse-originating data-flow analysis to connect each cryptographic misuse to a set of data-flow sinks in an app, based on which we propose a quantitative data-flow-driven metric for assessing the overall risk of the app introduced by cryptographic misuses. To make the per-app assessment more useful in the app vetting at the app-store level, we apply unsupervised learning to predict and classify the top risky threats, to guide more efficient subsequent mitigations. In the experiments on an instantiated implementation of the framework, we evaluate the accuracy of our detection and the effect of data-flow-driven risk assessment of our framework. Our empirical study on over 40,000 apps as well as the analysis of popular apps reveals important security observations on the real threats of cryptographic misuses in Android apps

    EEG-based brain-computer interfaces are vulnerable to backdoor attacks

    Get PDF
    Research and development of electroencephalogram (EEG) based brain-computer interfaces (BCIs) have advanced rapidly, partly due to deeper understanding of the brain and wide adoption of sophisticated machine learning approaches for decoding the EEG signals. However, recent studies have shown that machine learning algorithms are vulnerable to adversarial attacks. This paper proposes to use narrow period pulse for poisoning attack of EEG-based BCIs, which makes adversarial attacks much easier to implement. One can create dangerous backdoors in the machine learning model by injecting poisoning samples into the training set. Test samples with the backdoor key will then be classified into the target class specified by the attacker. What most distinguishes our approach from previous ones is that the backdoor key does not need to be synchronized with the EEG trials, making it very easy to implement. The effectiveness and robustness of the backdoor attack approach is demonstrated, highlighting a critical security concern for EEG-based BCIs and calling for urgent attention to address it

    The Prevalence of Immunologic Injury in Renal Allograft Recipients with De Novo Proteinuria

    Get PDF
    Post-transplant proteinuria is a common complication after renal transplantation; it is associated with reduced graft and recipient survival. However, the prevalence of histological causes has been reported with considerable variation. A clinico-pathological re-evaluation of post-transplant proteinuria is necessary, especially after dismissal of the term “chronic allograft nephropathy,” which had been considered to be an important cause of proteinuria. Moreover, urinary protein can promote interstitial inflammation in native kidney, whether this occurs in renal allograft remains unknown. Factors that affect the graft outcome in patients with proteinuria also remain unclear. Here we collected 98 cases of renal allograft recipients who developed proteinuria after transplant, histological features were characterized using Banff scoring system. Cox proportional hazard regression models were used for graft survival predictors. We found that transplant glomerulopathy was the leading (40.8%) cause of post-transplant proteinuria. Immunological causes, including transplant glomerulopathy, acute rejection, and chronic rejection accounted for the majority of all pathological causes of proteinuria. Nevertheless, almost all patients that developed proteinuria had immunological lesions in the graft, especially for interstitial inflammation. Intraglomerular C3 deposition was unexpectedly correlated with the severity of proteinuria. Moreover, the severity of interstitial inflammation was an independent risk factor for graft loss, while high level of hemoglobin was a protective factor for graft survival. This study revealed a predominance of immunological parameters in renal allografts with post-transplant proteinuria. These parameters not only correlate with the severity of proteinuria, but also with the outcome of the graft

    Numerical simulation of bubble dynamics in an elastic vessel

    No full text
    The nonlinear evolution of a gas bubble in the middle of an elastic vessel is investigated numerically. The fluids inside and outside the vessel are assumed to be incompressible and potential. A boundary element method (BEM) is adopted to solve the Laplace equation for the velocity potential. The gas inside the bubble is described by the Boyle Law. The fluid outside the vessel is assumed to contain the elasticity. The dynamic boundary condition on the vessel interface i is obtained from the derived Bernoulli Equation. This numerical model is validated through the comparisons with both the analytic solution of Rayleigh-Plesset equation and spark bubble experiment. The bubble dynamic behavior with different elastic parameters and vessel inner radius is further discussed

    DeepCatra: Learning flow‐ and graph‐based behaviours for Android malware detection

    No full text
    Abstract As Android malware grows and evolves, deep learning has been introduced into malware detection, resulting in great effectiveness. Recent work is considering hybrid models and multi‐view learning. However, they use only simple features, limiting the accuracy of these approaches in practice. This study proposes DeepCatra, a multi‐view learning approach for Android malware detection, whose model consists of a bidirectional LSTM (BiLSTM) and a graph neural network (GNN) as subnets. The two subnets rely on features extracted from statically computed call traces leading to critical APIs derived from public vulnerabilities. For each Android app, DeepCatra first constructs its call graph and computes call traces reaching critical APIs. Then, temporal opcode features used by the BiLSTM subnet are extracted from the call traces, while flow graph features used by the GNN subnet are constructed from all call traces and inter‐component communications. We evaluate the effectiveness of DeepCatra by comparing it with several state‐of‐the‐art detection approaches. Experimental results on over 18,000 real‐world apps and prevalent malware show that DeepCatra achieves considerable improvement, for example, 2.7%–14.6% on the F1 measure, which demonstrates the feasibility of DeepCatra in practice

    DeepCatra: Learning Flow- and Graph-based Behaviors for Android Malware Detection

    Full text link
    As Android malware is growing and evolving, deep learning has been introduced into malware detection, resulting in great effectiveness. Recent work is considering hybrid models and multi-view learning. However, they use only simple features, limiting the accuracy of these approaches in practice. In this paper, we propose DeepCatra, a multi-view learning approach for Android malware detection, whose model consists of a bidirectional LSTM (BiLSTM) and a graph neural network (GNN) as subnets. The two subnets rely on features extracted from statically computed call traces leading to critical APIs derived from public vulnerabilities. For each Android app, DeepCatra first constructs its call graph and computes call traces reaching critical APIs. Then, temporal opcode features used by the BiLSTM subnet are extracted from the call traces, while flow graph features used by the GNN subnet are constructed from all the call traces and inter-component communications. We evaluate the effectiveness of DeepCatra by comparing it with several state-of-the-art detection approaches. Experimental results on over 18,000 real-world apps and prevalent malware show that DeepCatra achieves considerable improvement, e.g., 2.7% to 14.6% on F1-measure, which demonstrates the feasibility of DeepCatra in practice.Comment: IET Information Security (to appear

    Study on Interaction of Aromatic Substances and Correlation between Electroencephalogram Correlates of Odor Perception in Light Flavor Baijiu

    No full text
    Light-flavor Baijiu (LFB) is widely cherished for its flavor. This study identified the thresholds of 14 aroma compounds in a 52% ethanol-water matrix and conducted a comprehensive analysis of the interactions among key aroma compounds in LFB using the Feller additive model and odor activity values approach. Among them, the interactions of beta-damascenone with ester and alcohol compounds were primarily promotive, while the interaction with acid compounds was predominantly masking. Furthermore, for the first time, the electroencephalogram (EEG) technology was used to characterize the interactions between aroma compounds. The results showed that the brain activity in the alpha frequency band demonstrated heightened olfactory sensitivity. The EEG could not only display the additive effect of odor intensity but also reflect the differences in aroma similarity between different odors. This study demonstrated that the EEG can serve as an effective tool for olfactory assessment
    corecore