312 research outputs found
Scanning tunneling microscopy characterization and metallic nanocontacts for atomically precise graphene nanoribbons
As a potential candidate for replacing silicon (Si) as a next-generation semiconducting material, atomically precise graphene nanoribbons (GNRs) have been predicted to show very interesting electronic properties based on their geometries and their underlying substrates. Once the ribbons are synthesized, confirmation of their geometries and investigating their electronic properties are essential for further implementation in devices.
This dissertation addresses investigations of three different solution-synthesized atomically precise GNRs by scanning tunneling microscopy (STM) and scanning tunneling spectroscopy (STS). A dry contact transfer (DCT) technique was implemented for depositing GNRs onto various semiconducting substrates. Detailed STM and STS measurements of doublewide GNRs on InAs(110) and InSb(110) confirmed their geometries and revealed a 2 eV bandgap as well as the 3-D distribution of the local density of states. Computational modeling of the ribbon´s electronic structure showed good agreement with our experimental results, indicating a weak coupling between the InAs substrate and the GNR. STM studies of two additional types of GNRs, the extended chevron GNRs and the nitrogen-doped GNRs on InAs, demonstrate how structural modifications affect the properties of the ribbons including their bandgaps and interactions with the substrate.
We also proposed a scheme of writing metallic hafnium diboride nanocontacts onto isolated GNRs using STM tip-assisted deposition for conducting transport measurements. In order to perform transport measurement in situ through sample biasing, we prefabricated an array of large metallic electrodes on Si and loaded it into the STM system. The material chosen, structural design and e-beam fabrication process are described in detail. The effect on thermal treatment to the formation of metal-silicide compounds was explored.Ope
Case-Aware Adversarial Training
The neural network (NN) becomes one of the most heated type of models in
various signal processing applications. However, NNs are extremely vulnerable
to adversarial examples (AEs). To defend AEs, adversarial training (AT) is
believed to be the most effective method while due to the intensive
computation, AT is limited to be applied in most applications. In this paper,
to resolve the problem, we design a generic and efficient AT improvement
scheme, namely case-aware adversarial training (CAT). Specifically, the
intuition stems from the fact that a very limited part of informative samples
can contribute to most of model performance. Alternatively, if only the most
informative AEs are used in AT, we can lower the computation complexity of AT
significantly as maintaining the defense effect. To achieve this, CAT achieves
two breakthroughs. First, a method to estimate the information degree of
adversarial examples is proposed for AE filtering. Second, to further enrich
the information that the NN can obtain from AEs, CAT involves a weight
estimation and class-level balancing based sampling strategy to increase the
diversity of AT at each iteration. Extensive experiments show that CAT is
faster than vanilla AT by up to 3x while achieving competitive defense effect
A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance
Internet of Things (IoT) cloud provides a practical and scalable solution to accommodate the data management in large-scale IoT systems by migrating the data storage and management tasks to cloud service providers (CSPs). However, there also exist many data security and privacy issues that must be well addressed in order to allow the wide adoption of the approach. To protect data confidentiality, attribute-based cryptosystems have been proposed to provide fine-grained access control over encrypted data in IoT cloud. Unfortunately, the existing attributed-based solutions are still insufficient in addressing some challenging security problems, especially when dealing with compromised or leaked user secret keys due to different reasons. In this paper, we present a practical attribute-based access control system for IoT cloud by introducing an efficient revocable attribute-based encryption scheme that permits the data owner to efficiently manage the credentials of data users. Our proposed system can efficiently deal with both secret key revocation for corrupted users and accidental decryption key exposure for honest users. We analyze the security of our scheme with formal proofs, and demonstrate the high performance of the proposed system via experiments
SoK: Fully Homomorphic Encryption Accelerators
Fully Homomorphic Encryption~(FHE) is a key technology enabling
privacy-preserving computing. However, the fundamental challenge of FHE is its
inefficiency, due primarily to the underlying polynomial computations with high
computation complexity and extremely time-consuming ciphertext maintenance
operations. To tackle this challenge, various FHE accelerators have recently
been proposed by both research and industrial communities. This paper takes the
first initiative to conduct a systematic study on the 14 FHE accelerators --
cuHE/cuFHE, nuFHE, HEAT, HEAX, HEXL, HEXL-FPGA, 100, F1, CraterLake,
BTS, ARK, Poseidon, FAB and TensorFHE. We first make our observations on the
evolution trajectory of these existing FHE accelerators to establish a
qualitative connection between them. Then, we perform testbed evaluations of
representative open-source FHE accelerators to provide a quantitative
comparison on them. Finally, with the insights learned from both qualitative
and quantitative studies, we discuss potential directions to inform the future
design and implementation for FHE accelerators
- …