2,148 research outputs found
Securing Interactive Sessions Using Mobile Device through Visual Channel and Visual Inspection
Communication channel established from a display to a device's camera is
known as visual channel, and it is helpful in securing key exchange protocol.
In this paper, we study how visual channel can be exploited by a network
terminal and mobile device to jointly verify information in an interactive
session, and how such information can be jointly presented in a user-friendly
manner, taking into account that the mobile device can only capture and display
a small region, and the user may only want to authenticate selective
regions-of-interests. Motivated by applications in Kiosk computing and
multi-factor authentication, we consider three security models: (1) the mobile
device is trusted, (2) at most one of the terminal or the mobile device is
dishonest, and (3) both the terminal and device are dishonest but they do not
collude or communicate. We give two protocols and investigate them under the
abovementioned models. We point out a form of replay attack that renders some
other straightforward implementations cumbersome to use. To enhance
user-friendliness, we propose a solution using visual cues embedded into the 2D
barcodes and incorporate the framework of "augmented reality" for easy
verifications through visual inspection. We give a proof-of-concept
implementation to show that our scheme is feasible in practice.Comment: 16 pages, 10 figure
Adaptive Attractors: A Defense Strategy against ML Adversarial Collusion Attacks
In the seller-buyer setting on machine learning models, the seller generates
different copies based on the original model and distributes them to different
buyers, such that adversarial samples generated on one buyer's copy would
likely not work on other copies. A known approach achieves this using
attractor-based rewriter which injects different attractors to different
copies. This induces different adversarial regions in different copies, making
adversarial samples generated on one copy not replicable on others. In this
paper, we focus on a scenario where multiple malicious buyers collude to
attack. We first give two formulations and conduct empirical studies to analyze
effectiveness of collusion attack under different assumptions on the attacker's
capabilities and properties of the attractors. We observe that existing
attractor-based methods do not effectively mislead the colluders in the sense
that adversarial samples found are influenced more by the original model
instead of the attractors as number of colluders increases. Based on this
observation, we propose using adaptive attractors whose weight is guided by a
U-shape curve to cover the shortfalls. Experimentation results show that when
using our approach, the attack success rate of a collusion attack converges to
around 15% even when lots of copies are applied for collusion. In contrast,
when using the existing attractor-based rewriter with fixed weight, the attack
success rate increases linearly with the number of copies used for collusion
Antibiotic prophylaxis after total joint replacements
Objectives: To review the latest evidence on antibiotic prophylaxis for patients with total joint replacements to prevent prosthesis infections. Data sources: Literature search of Medline and PubMed until June 2009. Study selection: Studies of patients with total joint replacements from around the world, studies concerning antibiotic prophylaxis, as well as chemoprophylaxis guidelines from orthopaedic associations were searched. Data extraction: Literature review, original articles, case reports, best practice guidelines. Data synthesis: With the rising incidence of patients with total joint replacements, subsequent deep infection of the implants is a rare but dreaded complication which has immense physiological, psychological, financial, and social implications. Guidelines from urologists, gastroenterologists, and dental surgeons attempt to identify high-risk patients who may be more susceptible to prosthetic joint infections. These patients are provided with prophylactic antibiotics before any invasive procedure that may cause bacterial seeding to prosthetic joints. Most orthopaedic associations around the world adopt a similar policy to provide prophylaxis to cover any anticipated chance of bacteraemia. The American Association of Orthopaedic Surgeons adopts the most cautious approach in which all patients with total joint replacements who undergo any procedure that breaches a mucosal surface receive prophylactic antibiotics. Conclusion: The guidelines from the American Association of Orthopaedic Surgeons seem to have an all-encompassing policy when it comes to providing prophylactic antibiotics. Nonetheless, physicians must still exercise their judgement and customise the treatment to each patient. The benefits of prophylactic antibiotics must be balanced against the risks of drug side-effects and the emergence of antibiotic resistance.published_or_final_versio
Relationship between Brand Perceptions and Satisfaction: Empirical Study on Skin Products in Malaysia
In the highly competitive marketplace, marketers for the skin care product are facing challenges with identifying the consumer’s brand perception and brand satisfaction. Brand satisfaction is perceived as an important issue on skin care industry. Obviously, customers are the important stakeholders in organizations and their satisfaction is a priority to the company. This study aims to investigate the relationship between brand perceptions and brand satisfaction on skin care products with four independent variables (quality, promotion, image and preference). This study employed the statistic software of SPSS version 19.0 to evaluate 200 sets of questionnaires which collected from students, undergraduates, working adults and other respondents. The findings in this study shows that the brand perceptions on quality, image and preference have positive and significant relationship with brand satisfaction on skin care products. However, the relationship between brand perception on promotion and brand satisfaction is being rejected. Thus, the marketers can focus on perception on quality, image and preference to increase customers’ brand satisfaction to capture and retain them
Improving Adversarial Transferability by Stable Diffusion
Deep neural networks (DNNs) are susceptible to adversarial examples, which
introduce imperceptible perturbations to benign samples, deceiving DNN
predictions. While some attack methods excel in the white-box setting, they
often struggle in the black-box scenario, particularly against models fortified
with defense mechanisms. Various techniques have emerged to enhance the
transferability of adversarial attacks for the black-box scenario. Among these,
input transformation-based attacks have demonstrated their effectiveness. In
this paper, we explore the potential of leveraging data generated by Stable
Diffusion to boost adversarial transferability. This approach draws inspiration
from recent research that harnessed synthetic data generated by Stable
Diffusion to enhance model generalization. In particular, previous work has
highlighted the correlation between the presence of both real and synthetic
data and improved model generalization. Building upon this insight, we
introduce a novel attack method called Stable Diffusion Attack Method (SDAM),
which incorporates samples generated by Stable Diffusion to augment input
images. Furthermore, we propose a fast variant of SDAM to reduce computational
overhead while preserving high adversarial transferability. Our extensive
experimental results demonstrate that our method outperforms state-of-the-art
baselines by a substantial margin. Moreover, our approach is compatible with
existing transfer-based attacks to further enhance adversarial transferability
Written and spoken corpus of real and fake social media postings about COVID-19
This study investigates the linguistic traits of fake news and real news.
There are two parts to this study: text data and speech data. The text data for
this study consisted of 6420 COVID-19 related tweets re-filtered from Patwa et
al. (2021). After cleaning, the dataset contained 3049 tweets, with 2161
labeled as 'real' and 888 as 'fake'. The speech data for this study was
collected from TikTok, focusing on COVID-19 related videos. Research assistants
fact-checked each video's content using credible sources and labeled them as
'Real', 'Fake', or 'Questionable', resulting in a dataset of 91 real entries
and 109 fake entries from 200 TikTok videos with a total word count of 53,710
words. The data was analysed using the Linguistic Inquiry and Word Count (LIWC)
software to detect patterns in linguistic data. The results indicate a set of
linguistic features that distinguish fake news from real news in both written
and speech data. This offers valuable insights into the role of language in
shaping trust, social media interactions, and the propagation of fake news.Comment: 9 pages, 3 table
Magnetism and its microscopic origin in iron-based high-temperature superconductors
High-temperature superconductivity in the iron-based materials emerges from,
or sometimes coexists with, their metallic or insulating parent compound
states. This is surprising since these undoped states display dramatically
different antiferromagnetic (AF) spin arrangements and Nel
temperatures. Although there is general consensus that magnetic interactions
are important for superconductivity, much is still unknown concerning the
microscopic origin of the magnetic states. In this review, progress in this
area is summarized, focusing on recent experimental and theoretical results and
discussing their microscopic implications. It is concluded that the parent
compounds are in a state that is more complex than implied by a simple Fermi
surface nesting scenario, and a dual description including both itinerant and
localized degrees of freedom is needed to properly describe these fascinating
materials.Comment: 14 pages, 4 figures, Review article, accepted for publication in
Nature Physic
Mammalian interspecies substitution of immune modulatory alleles by genome editing
We describe a fundamentally novel feat of animal genetic engineering: the precise and efficient substitution of an agronomic haplotype into a domesticated species. Zinc finger nuclease in-embryo editing of the RELA locus generated live born domestic pigs with the warthog RELA orthologue, associated with resilience to African Swine Fever. The ability to efficiently achieve interspecies allele introgression in one generation opens unprecedented opportunities for agriculture and basic research
- …