2,148 research outputs found

    Securing Interactive Sessions Using Mobile Device through Visual Channel and Visual Inspection

    Full text link
    Communication channel established from a display to a device's camera is known as visual channel, and it is helpful in securing key exchange protocol. In this paper, we study how visual channel can be exploited by a network terminal and mobile device to jointly verify information in an interactive session, and how such information can be jointly presented in a user-friendly manner, taking into account that the mobile device can only capture and display a small region, and the user may only want to authenticate selective regions-of-interests. Motivated by applications in Kiosk computing and multi-factor authentication, we consider three security models: (1) the mobile device is trusted, (2) at most one of the terminal or the mobile device is dishonest, and (3) both the terminal and device are dishonest but they do not collude or communicate. We give two protocols and investigate them under the abovementioned models. We point out a form of replay attack that renders some other straightforward implementations cumbersome to use. To enhance user-friendliness, we propose a solution using visual cues embedded into the 2D barcodes and incorporate the framework of "augmented reality" for easy verifications through visual inspection. We give a proof-of-concept implementation to show that our scheme is feasible in practice.Comment: 16 pages, 10 figure

    Adaptive Attractors: A Defense Strategy against ML Adversarial Collusion Attacks

    Full text link
    In the seller-buyer setting on machine learning models, the seller generates different copies based on the original model and distributes them to different buyers, such that adversarial samples generated on one buyer's copy would likely not work on other copies. A known approach achieves this using attractor-based rewriter which injects different attractors to different copies. This induces different adversarial regions in different copies, making adversarial samples generated on one copy not replicable on others. In this paper, we focus on a scenario where multiple malicious buyers collude to attack. We first give two formulations and conduct empirical studies to analyze effectiveness of collusion attack under different assumptions on the attacker's capabilities and properties of the attractors. We observe that existing attractor-based methods do not effectively mislead the colluders in the sense that adversarial samples found are influenced more by the original model instead of the attractors as number of colluders increases. Based on this observation, we propose using adaptive attractors whose weight is guided by a U-shape curve to cover the shortfalls. Experimentation results show that when using our approach, the attack success rate of a collusion attack converges to around 15% even when lots of copies are applied for collusion. In contrast, when using the existing attractor-based rewriter with fixed weight, the attack success rate increases linearly with the number of copies used for collusion

    Antibiotic prophylaxis after total joint replacements

    Get PDF
    Objectives: To review the latest evidence on antibiotic prophylaxis for patients with total joint replacements to prevent prosthesis infections. Data sources: Literature search of Medline and PubMed until June 2009. Study selection: Studies of patients with total joint replacements from around the world, studies concerning antibiotic prophylaxis, as well as chemoprophylaxis guidelines from orthopaedic associations were searched. Data extraction: Literature review, original articles, case reports, best practice guidelines. Data synthesis: With the rising incidence of patients with total joint replacements, subsequent deep infection of the implants is a rare but dreaded complication which has immense physiological, psychological, financial, and social implications. Guidelines from urologists, gastroenterologists, and dental surgeons attempt to identify high-risk patients who may be more susceptible to prosthetic joint infections. These patients are provided with prophylactic antibiotics before any invasive procedure that may cause bacterial seeding to prosthetic joints. Most orthopaedic associations around the world adopt a similar policy to provide prophylaxis to cover any anticipated chance of bacteraemia. The American Association of Orthopaedic Surgeons adopts the most cautious approach in which all patients with total joint replacements who undergo any procedure that breaches a mucosal surface receive prophylactic antibiotics. Conclusion: The guidelines from the American Association of Orthopaedic Surgeons seem to have an all-encompassing policy when it comes to providing prophylactic antibiotics. Nonetheless, physicians must still exercise their judgement and customise the treatment to each patient. The benefits of prophylactic antibiotics must be balanced against the risks of drug side-effects and the emergence of antibiotic resistance.published_or_final_versio

    Relationship between Brand Perceptions and Satisfaction: Empirical Study on Skin Products in Malaysia

    Get PDF
    In the highly competitive marketplace, marketers for the skin care product are facing challenges with identifying the consumer’s brand perception and brand satisfaction. Brand satisfaction is perceived as an important issue on skin care industry. Obviously, customers are the important stakeholders in organizations and their satisfaction is a priority to the company. This study aims to investigate the relationship between brand perceptions and brand satisfaction on skin care products with four independent variables (quality, promotion, image and preference). This study employed the statistic software of SPSS version 19.0 to evaluate 200 sets of questionnaires which collected from students, undergraduates, working adults and other respondents. The findings in this study shows that the brand perceptions on quality, image and preference have positive and significant relationship with brand satisfaction on skin care products. However, the relationship between brand perception on promotion and brand satisfaction is being rejected. Thus, the marketers can focus on perception on quality, image and preference to increase customers’ brand satisfaction to capture and retain them

    Improving Adversarial Transferability by Stable Diffusion

    Full text link
    Deep neural networks (DNNs) are susceptible to adversarial examples, which introduce imperceptible perturbations to benign samples, deceiving DNN predictions. While some attack methods excel in the white-box setting, they often struggle in the black-box scenario, particularly against models fortified with defense mechanisms. Various techniques have emerged to enhance the transferability of adversarial attacks for the black-box scenario. Among these, input transformation-based attacks have demonstrated their effectiveness. In this paper, we explore the potential of leveraging data generated by Stable Diffusion to boost adversarial transferability. This approach draws inspiration from recent research that harnessed synthetic data generated by Stable Diffusion to enhance model generalization. In particular, previous work has highlighted the correlation between the presence of both real and synthetic data and improved model generalization. Building upon this insight, we introduce a novel attack method called Stable Diffusion Attack Method (SDAM), which incorporates samples generated by Stable Diffusion to augment input images. Furthermore, we propose a fast variant of SDAM to reduce computational overhead while preserving high adversarial transferability. Our extensive experimental results demonstrate that our method outperforms state-of-the-art baselines by a substantial margin. Moreover, our approach is compatible with existing transfer-based attacks to further enhance adversarial transferability

    Written and spoken corpus of real and fake social media postings about COVID-19

    Full text link
    This study investigates the linguistic traits of fake news and real news. There are two parts to this study: text data and speech data. The text data for this study consisted of 6420 COVID-19 related tweets re-filtered from Patwa et al. (2021). After cleaning, the dataset contained 3049 tweets, with 2161 labeled as 'real' and 888 as 'fake'. The speech data for this study was collected from TikTok, focusing on COVID-19 related videos. Research assistants fact-checked each video's content using credible sources and labeled them as 'Real', 'Fake', or 'Questionable', resulting in a dataset of 91 real entries and 109 fake entries from 200 TikTok videos with a total word count of 53,710 words. The data was analysed using the Linguistic Inquiry and Word Count (LIWC) software to detect patterns in linguistic data. The results indicate a set of linguistic features that distinguish fake news from real news in both written and speech data. This offers valuable insights into the role of language in shaping trust, social media interactions, and the propagation of fake news.Comment: 9 pages, 3 table

    Magnetism and its microscopic origin in iron-based high-temperature superconductors

    Full text link
    High-temperature superconductivity in the iron-based materials emerges from, or sometimes coexists with, their metallic or insulating parent compound states. This is surprising since these undoped states display dramatically different antiferromagnetic (AF) spin arrangements and Neˊ\rm \acute{e}el temperatures. Although there is general consensus that magnetic interactions are important for superconductivity, much is still unknown concerning the microscopic origin of the magnetic states. In this review, progress in this area is summarized, focusing on recent experimental and theoretical results and discussing their microscopic implications. It is concluded that the parent compounds are in a state that is more complex than implied by a simple Fermi surface nesting scenario, and a dual description including both itinerant and localized degrees of freedom is needed to properly describe these fascinating materials.Comment: 14 pages, 4 figures, Review article, accepted for publication in Nature Physic

    Mammalian interspecies substitution of immune modulatory alleles by genome editing

    Get PDF
    We describe a fundamentally novel feat of animal genetic engineering: the precise and efficient substitution of an agronomic haplotype into a domesticated species. Zinc finger nuclease in-embryo editing of the RELA locus generated live born domestic pigs with the warthog RELA orthologue, associated with resilience to African Swine Fever. The ability to efficiently achieve interspecies allele introgression in one generation opens unprecedented opportunities for agriculture and basic research
    corecore