164 research outputs found
Error analysis for filtered back projection reconstructions in Besov spaces
Filtered back projection (FBP) methods are the most widely used
reconstruction algorithms in computerized tomography (CT). The ill-posedness of
this inverse problem allows only an approximate reconstruction for given noisy
data. Studying the resulting reconstruction error has been a most active field
of research in the 1990s and has recently been revived in terms of optimal
filter design and estimating the FBP approximation errors in general Sobolev
spaces.
However, the choice of Sobolev spaces is suboptimal for characterizing
typical CT reconstructions. A widely used model are sums of characteristic
functions, which are better modelled in terms of Besov spaces
. In particular
with is a preferred
model in image analysis for describing natural images.
In case of noisy Radon data the total FBP reconstruction error
splits into an
approximation error and a data error, where serves as regularization
parameter. In this paper, we study the approximation error of FBP
reconstructions for target functions with positive and . We prove that the -norm
of the inherent FBP approximation error can be bounded above by
\begin{equation*} \|f - f_L\|_{\mathrm{L}^p(\mathbb{R}^2)} \leq c_{\alpha,q,W}
\, L^{-\alpha} \, |f|_{\mathrm{B}^{\alpha,p}_q(\mathbb{R}^2)} \end{equation*}
under suitable assumptions on the utilized low-pass filter's window function
. This then extends by classical methods to estimates for the total
reconstruction error.Comment: 32 pages, 8 figure
Best Practices for Notification Studies for Security and Privacy Issues on the Internet
Researchers help operators of vulnerable and non-compliant internet services
by individually notifying them about security and privacy issues uncovered in
their research. To improve efficiency and effectiveness of such efforts,
dedicated notification studies are imperative. As of today, there is no
comprehensive documentation of pitfalls and best practices for conducting such
notification studies, which limits validity of results and impedes
reproducibility. Drawing on our experience with such studies and guidance from
related work, we present a set of guidelines and practical recommendations,
including initial data collection, sending of notifications, interacting with
the recipients, and publishing the results. We note that future studies can
especially benefit from extensive planning and automation of crucial processes,
i.e., activities that take place well before the first notifications are sent.Comment: Accepted to the 3rd International Workshop on Information Security
Methodology and Replication Studies (IWSMR '21), colocated with ARES '2
On the Difficulties of Incentivizing Online Privacy through Transparency: A Qualitative Survey of the German Health Insurance Market
Today, online privacy is the domain of regulatory measures and privacy-enhancing technologies. Transparency in the form of external and public assessments has been proposed for improving privacy and security because it exposes otherwise hidden deficiencies. Previous work has studied privacy attitudes and behavior of consumers. However, little is known on how organizations react to measures that employ public ânaming and shamingâ as an incentive for improvement. We performed the first study on this aspect by conducting a qualitative survey with 152 German health insurers. We scanned their websites with PrivacyScore.org to generate a public ranking and confronted the insurers with the results. We obtained a response rate of 27%. Responses ranged from positive feedback to legal threats. Only 12% of the sites â mostly on-responders â improved during our study. Our results show that insurers struggle due to unawareness, reluctance, and incapability, and demonstrate the general difficulties of transparency-based approaches
Integration of Standardized and Non-Standardized Product Data
Abstract: Smart products adapt to environments, process contexts, users and other products. Standardized product data such as BMECat, eCl@ss, and EPC global formats are designed to support the exploitation of product data and therefore contribute to more efficient supply chains. Non-standardized product data mainly target soft benefits which targets the exploration of product dat
Chlamydia pneumoniae infection acts as an endothelial stressor with the potential to initiate the earliest heat shock protein 60-dependent inflammatory stage of atherosclerosis
We identified increased expression and redistribution of the intracellular protein 60-kDa human heat shock protein (hHSP60) (HSPD1) to the cell surface in human endothelial cells subjected to classical atherosclerosis risk factors and subsequent immunologic cross-reactivity against this highly conserved molecule, as key events occurring early in the process of atherosclerosis. The present study aimed at investigating the role of infectious pathogens as stress factors for vascular endothelial cells and, as such, contributors to early atherosclerotic lesion formation. Using primary donor-matched arterial and venous human endothelial cells, we show that infection with Chlamydia pneumoniae leads to marked upregulation and surface expression of hHSP60 and adhesion molecules. Moreover, we provide evidence for an increased susceptibility of arterial endothelial cells for redistribution of hHSP60 to the cellular membrane in response to C. pneumoniae infection as compared to autologous venous endothelial cells. We also show that oxidative stress has a central role to play in endothelial cell activation in response to chlamydial infection. These data provide evidence for a role of C. pneumoniae as a potent primary endothelial stressor for arterial endothelial cells leading to enrichment of hHSP60 on the cellular membrane and, as such, a potential initiator of atherosclerosi
My(o) Armband Leaks Passwords: An EMG and IMU Based Keylogging Side-Channel Attack
Wearables that constantly collect various sensor data of their users increase the chances for inferences of unintentional and sensitive information such as passwords typed on a physical keyboard. We take a thorough look at the potential of using electromyographic (EMG) data, a sensor modality which is new to the market but has lately gained attention in the context of wearables for augmented reality (AR), for a keylogging side-channel attack. Our approach is based on neural networks for a between-subject attack in a realistic scenario using the Myo Armband to collect the sensor data. In our approach, the EMG data has proven to be the most prominent source of information compared to the accelerometer and gyroscope, increasing the keystroke detection performance. For our end-to-end approach on raw data, we report a mean balanced accuracy of about 76 % for the keystroke detection and a mean top-3 key accuracy of about 32 % on 52 classes for the key identification on passwords of varying strengths. We have created an extensive dataset including more than 310 000 keystrokes recorded from 37 volunteers, which is available as open access along with the source code used to create the given results
Zero-Interaction Security-Towards Sound Experimental Validation
Reproducibility and realistic datasets are crucial for advancing research. Unfortunately, they are often neglected as valid scientific contributions in many young disciplines, with computer science being no exception. In this article, we show the challenges encountered when reproducing the work of others, collecting realistic data in the wild, and ensuring that our own work is reproducible in turn. The presented findings are based on our study investigating the limits of zero-interaction security (ZIS)- a novel concept, leveraging sensor data collected by Internet of Things (IoT) devices to pair or authenticate devices. In particular, we share our experiences in reproducing five state-of-the-art ZIS schemes, collecting a comprehensive dataset of sensor data from the real world, evaluating these schemes on the collected data, and releasing the data, code, and documentation to facilitate reproducibility of our results
- âŠ