1,328 research outputs found
When Attackers Meet AI: Learning-empowered Attacks in Cooperative Spectrum Sensing
Defense strategies have been well studied to combat Byzantine attacks that
aim to disrupt cooperative spectrum sensing by sending falsified versions of
spectrum sensing data to a fusion center. However, existing studies usually
assume network or attackers as passive entities, e.g., assuming the prior
knowledge of attacks is known or fixed. In practice, attackers can actively
adopt arbitrary behaviors and avoid pre-assumed patterns or assumptions used by
defense strategies. In this paper, we revisit this security vulnerability as an
adversarial machine learning problem and propose a novel learning-empowered
attack framework named Learning-Evaluation-Beating (LEB) to mislead the fusion
center. Based on the black-box nature of the fusion center in cooperative
spectrum sensing, our new perspective is to make the adversarial use of machine
learning to construct a surrogate model of the fusion center's decision model.
We propose a generic algorithm to create malicious sensing data using this
surrogate model. Our real-world experiments show that the LEB attack is
effective to beat a wide range of existing defense strategies with an up to 82%
of success ratio. Given the gap between the proposed LEB attack and existing
defenses, we introduce a non-invasive method named as influence-limiting
defense, which can coexist with existing defenses to defend against LEB attack
or other similar attacks. We show that this defense is highly effective and
reduces the overall disruption ratio of LEB attack by up to 80%
An exploratory study of womenâs work values in the Chinese context: a grounded-theory approach
Purpose: The purpose of this paper is to investigate women managersâ work values in the Chinese sociocultural context and to explain how these work values affect their career success. This paper also explores how social and cultural factors affect Chinese womenâs work value formation process. Design/methodology/approach: Using a grounded theory approach, the authors collected and analyzed data through in-depth interviews with 12 women managers in the banking industry in northeast China. Findings: The analysis identified eight dimensions of Chinese womenâs work values and how they affect womenâs career success in the Chinese context. The authors also found that although both social and cultural factors affect womenâs work values, the effect of traditional Chinese culture is still profound. Originality/value: The study extends the literature on Chinese womenâs work values and provides a better understanding of traditional Chinese cultureâs effect on contemporary Chinese women, particularly in developing cities
How to Test the Randomness from the Wireless Channel for Security?
We revisit the traditional framework of wireless secret key generation, where
two parties leverage the wireless channel randomness to establish a secret key.
The essence in the framework is to quantify channel randomness into bit
sequences for key generation. Conducting randomness tests on such bit sequences
has been a common practice to provide the confidence to validate whether they
are random. Interestingly, despite different settings in the tests, existing
studies interpret the results the same: passing tests means that the bit
sequences are indeed random.
In this paper, we investigate how to properly test the wireless channel
randomness to ensure enough security strength and key generation efficiency. In
particular, we define an adversary model that leverages the imperfect
randomness of the wireless channel to search the generated key, and create a
guideline to set up randomness testing and privacy amplification to eliminate
security loss and achieve efficient key generation rate. We use theoretical
analysis and comprehensive experiments to reveal that common practice misuses
randomness testing and privacy amplification: (i) no security insurance of key
strength, (ii) low efficiency of key generation rate. After revision by our
guideline, security loss can be eliminated and key generation rate can be
increased significantly
Implementing universal nonadiabatic holonomic quantum gates with transmons
Geometric phases are well known to be noise-resilient in quantum
evolutions/operations. Holonomic quantum gates provide us with a robust way
towards universal quantum computation, as these quantum gates are actually
induced by nonabelian geometric phases. Here we propose and elaborate how to
efficiently implement universal nonadiabatic holonomic quantum gates on simpler
superconducting circuits, with a single transmon serving as a qubit. In our
proposal, an arbitrary single-qubit holonomic gate can be realized in a
single-loop scenario, by varying the amplitudes and phase difference of two
microwave fields resonantly coupled to a transmon, while nontrivial two-qubit
holonomic gates may be generated with a transmission-line resonator being
simultaneously coupled to the two target transmons in an effective resonant
way. Moreover, our scenario may readily be scaled up to a two-dimensional
lattice configuration, which is able to support large scalable quantum
computation, paving the way for practically implementing universal nonadiabatic
holonomic quantum computation with superconducting circuits.Comment: v3 Appendix added, v4 published version, v5 published version with
correction
- âŠ