312 research outputs found

    Scanning tunneling microscopy characterization and metallic nanocontacts for atomically precise graphene nanoribbons

    Get PDF
    As a potential candidate for replacing silicon (Si) as a next-generation semiconducting material, atomically precise graphene nanoribbons (GNRs) have been predicted to show very interesting electronic properties based on their geometries and their underlying substrates. Once the ribbons are synthesized, confirmation of their geometries and investigating their electronic properties are essential for further implementation in devices. This dissertation addresses investigations of three different solution-synthesized atomically precise GNRs by scanning tunneling microscopy (STM) and scanning tunneling spectroscopy (STS). A dry contact transfer (DCT) technique was implemented for depositing GNRs onto various semiconducting substrates. Detailed STM and STS measurements of doublewide GNRs on InAs(110) and InSb(110) confirmed their geometries and revealed a 2 eV bandgap as well as the 3-D distribution of the local density of states. Computational modeling of the ribbon´s electronic structure showed good agreement with our experimental results, indicating a weak coupling between the InAs substrate and the GNR. STM studies of two additional types of GNRs, the extended chevron GNRs and the nitrogen-doped GNRs on InAs, demonstrate how structural modifications affect the properties of the ribbons including their bandgaps and interactions with the substrate. We also proposed a scheme of writing metallic hafnium diboride nanocontacts onto isolated GNRs using STM tip-assisted deposition for conducting transport measurements. In order to perform transport measurement in situ through sample biasing, we prefabricated an array of large metallic electrodes on Si and loaded it into the STM system. The material chosen, structural design and e-beam fabrication process are described in detail. The effect on thermal treatment to the formation of metal-silicide compounds was explored.Ope

    Case-Aware Adversarial Training

    Full text link
    The neural network (NN) becomes one of the most heated type of models in various signal processing applications. However, NNs are extremely vulnerable to adversarial examples (AEs). To defend AEs, adversarial training (AT) is believed to be the most effective method while due to the intensive computation, AT is limited to be applied in most applications. In this paper, to resolve the problem, we design a generic and efficient AT improvement scheme, namely case-aware adversarial training (CAT). Specifically, the intuition stems from the fact that a very limited part of informative samples can contribute to most of model performance. Alternatively, if only the most informative AEs are used in AT, we can lower the computation complexity of AT significantly as maintaining the defense effect. To achieve this, CAT achieves two breakthroughs. First, a method to estimate the information degree of adversarial examples is proposed for AE filtering. Second, to further enrich the information that the NN can obtain from AEs, CAT involves a weight estimation and class-level balancing based sampling strategy to increase the diversity of AT at each iteration. Extensive experiments show that CAT is faster than vanilla AT by up to 3x while achieving competitive defense effect

    A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance

    Get PDF
    Internet of Things (IoT) cloud provides a practical and scalable solution to accommodate the data management in large-scale IoT systems by migrating the data storage and management tasks to cloud service providers (CSPs). However, there also exist many data security and privacy issues that must be well addressed in order to allow the wide adoption of the approach. To protect data confidentiality, attribute-based cryptosystems have been proposed to provide fine-grained access control over encrypted data in IoT cloud. Unfortunately, the existing attributed-based solutions are still insufficient in addressing some challenging security problems, especially when dealing with compromised or leaked user secret keys due to different reasons. In this paper, we present a practical attribute-based access control system for IoT cloud by introducing an efficient revocable attribute-based encryption scheme that permits the data owner to efficiently manage the credentials of data users. Our proposed system can efficiently deal with both secret key revocation for corrupted users and accidental decryption key exposure for honest users. We analyze the security of our scheme with formal proofs, and demonstrate the high performance of the proposed system via experiments

    SoK: Fully Homomorphic Encryption Accelerators

    Full text link
    Fully Homomorphic Encryption~(FHE) is a key technology enabling privacy-preserving computing. However, the fundamental challenge of FHE is its inefficiency, due primarily to the underlying polynomial computations with high computation complexity and extremely time-consuming ciphertext maintenance operations. To tackle this challenge, various FHE accelerators have recently been proposed by both research and industrial communities. This paper takes the first initiative to conduct a systematic study on the 14 FHE accelerators -- cuHE/cuFHE, nuFHE, HEAT, HEAX, HEXL, HEXL-FPGA, 100×\times, F1, CraterLake, BTS, ARK, Poseidon, FAB and TensorFHE. We first make our observations on the evolution trajectory of these existing FHE accelerators to establish a qualitative connection between them. Then, we perform testbed evaluations of representative open-source FHE accelerators to provide a quantitative comparison on them. Finally, with the insights learned from both qualitative and quantitative studies, we discuss potential directions to inform the future design and implementation for FHE accelerators
    • …
    corecore