676 research outputs found
Security of a biometric identity-based encryption scheme
Biometric identity-based encryption (Bio-IBE) is a kind of fuzzy
identity-based encryption (fuzzy IBE) where a ciphertext encrypted under an
identity w' can be decrypted using a secret key corresponding to the identity w
which is close to w' as measured by some metric. Recently, Yang et al. proposed
a constant-size Bio-IBE scheme and proved that it is secure against adaptive
chosen-ciphertext attack (CCA2) in the random oracle model. Unfortunately, in
this paper, we will show that their Bio-IBE scheme is even not chosen-plaintext
secure. Specifically, user w using his secret key is able to decrypt any
ciphertext encrypted under an identity w' even though w is not close to w'.Comment: Journal version of the paper will be appearing in International
Journal of Network Securit
A Large-field J=1-0 Survey of CO and Its Isotopologues Toward the Cassiopeia A Supernova Remnant
We have conducted a large-field simultaneous survey of CO, CO,
and CO emission toward the Cassiopeia A (Cas A) supernova
remnant (SNR), which covers a sky area of . The
Cas giant molecular cloud (GMC) mainly consists of three individual clouds with
masses on the order of . The total mass derived from the
emission of the GMC is 2.1 and is
9.5 from the emission. Two regions with
broadened (67 km s) or asymmetric CO line profiles are found
in the vicinity (within a 10 region) of the Cas A SNR, indicating
possible interactions between the SNR and the GMC. Using the GAUSSCLUMPS
algorithm, 547 CO clumps are identified in the GMC, 54 of which are
supercritical (i.e. ). The mass spectrum of the molecular
clumps follows a power-law distribution with an exponent of . The
pixel-by-pixel column density of the GMC can be fitted with a log-normal
probability distribution function (N-PDF). The median column density of
molecular hydrogen in the GMC is cm and half the mass
of the GMC is contained in regions with H column density lower than
cm, which is well below the threshold of star
formation. The distribution of the YSO candidates in the region shows no
agglomeration.Comment: 24 pages, 18 figure
LDP: Language-driven Dual-Pixel Image Defocus Deblurring Network
Recovering sharp images from dual-pixel (DP) pairs with disparity-dependent
blur is a challenging task.~Existing blur map-based deblurring methods have
demonstrated promising results. In this paper, we propose, to the best of our
knowledge, the first framework to introduce the contrastive language-image
pre-training framework (CLIP) to achieve accurate blur map estimation from DP
pairs unsupervisedly. To this end, we first carefully design text prompts to
enable CLIP to understand blur-related geometric prior knowledge from the DP
pair. Then, we propose a format to input stereo DP pair to the CLIP without any
fine-tuning, where the CLIP is pre-trained on monocular images. Given the
estimated blur map, we introduce a blur-prior attention block, a blur-weighting
loss and a blur-aware loss to recover the all-in-focus image. Our method
achieves state-of-the-art performance in extensive experiments
PS-TRUST: Provably Secure Solution for Truthful Double Spectrum Auctions
Truthful spectrum auctions have been extensively studied in recent years.
Truthfulness makes bidders bid their true valuations, simplifying greatly the
analysis of auctions. However, revealing one's true valuation causes severe
privacy disclosure to the auctioneer and other bidders. To make things worse,
previous work on secure spectrum auctions does not provide adequate security.
In this paper, based on TRUST, we propose PS-TRUST, a provably secure solution
for truthful double spectrum auctions. Besides maintaining the properties of
truthfulness and special spectrum reuse of TRUST, PS-TRUST achieves provable
security against semi-honest adversaries in the sense of cryptography.
Specifically, PS-TRUST reveals nothing about the bids to anyone in the auction,
except the auction result. To the best of our knowledge, PS-TRUST is the first
provably secure solution for spectrum auctions. Furthermore, experimental
results show that the computation and communication overhead of PS-TRUST is
modest, and its practical applications are feasible.Comment: 9 pages, 4 figures, submitted to Infocom 201
Modeling Three-dimensional Invasive Solid Tumor Growth in Heterogeneous Microenvironment under Chemotherapy
A systematic understanding of the evolution and growth dynamics of invasive
solid tumors in response to different chemotherapy strategies is crucial for
the development of individually optimized oncotherapy. Here, we develop a
hybrid three-dimensional (3D) computational model that integrates
pharmacokinetic model, continuum diffusion-reaction model and discrete cell
automaton model to investigate 3D invasive solid tumor growth in heterogeneous
microenvironment under chemotherapy. Specifically, we consider the effects of
heterogeneous environment on drug diffusion, tumor growth, invasion and the
drug-tumor interaction on individual cell level. We employ the hybrid model to
investigate the evolution and growth dynamics of avascular invasive solid
tumors under different chemotherapy strategies. Our simulations reproduce the
well-established observation that constant dosing is generally more effective
in suppressing primary tumor growth than periodic dosing, due to the resulting
continuous high drug concentration. In highly heterogeneous microenvironment,
the malignancy of the tumor is significantly enhanced, leading to inefficiency
of chemotherapies. The effects of geometrically-confined microenvironment and
non-uniform drug dosing are also investigated. Our computational model, when
supplemented with sufficient clinical data, could eventually lead to the
development of efficient in silico tools for prognosis and treatment strategy
optimization.Comment: 41 pages, 8 figure
I Can Has Cheezburger? A Nonparanormal Approach to Combining Textual and Visual Information for Predicting and Generating Popular Meme Descriptions
The advent of social media has brought Inter-net memes, a unique social phenomenon, to the front stage of the Web. Embodied in the form of images with text descriptions, little do we know about the “language of memes”. In this paper, we statistically study the correla-tions among popular memes and their word-ings, and generate meme descriptions from raw images. To do this, we take a multi-modal approach—we propose a robust non-paranormal model to learn the stochastic de-pendencies among the image, the candidate descriptions, and the popular votes. In experi-ments, we show that combining text and vision helps identifying popular meme descriptions; that our nonparanormal model is able to learn dense and continuous vision features jointly with sparse and discrete text features in a prin-cipled manner, outperforming various com-petitive baselines; that our system can gener-ate meme descriptions using a simple pipeline.
Mapping the water-economic cascading risks within a multilayer network of supply chains
Trade linkages within the supply chain can be mapped onto a complex network. Disruptions in regional resource supplies (i.e., water scarcity) have the potential to generate industrial losses in remote areas due to the interconnected flow of goods and services. While numerous studies have assessed the economic and virtual water supply networks, they assumed rapid and linear transmission of industrial risks in the network, without modeling the transmission process and vulnerability between nodes. Such oversights can lead to the misestimation of risks, especially in the context of climate change. Therefore, it is urgent to construct a cascading model for the supply economic and water supply network that consider step-by-step avalanche in nodes, to help identify vulnerable sectors and mitigate economic risks.In this research, we utilize the 2017 multi-region environmental multiregional input-output (E-MRIO) table in China to construct a comprehensive multilayer network. Each province is represented as a distinct layer within this network, incorporating 42 economic sectors(nodes). These layers and nodes are interconnected through trade linkages. To simulate the cascade process, we introduce the concept of net fragility for a node, calculated as the difference between the ratio of the sum of net inflows and net outflows of a node to its own total output and the threshold. Once a node fails (i.e., net fragility less than 1) the cascade process is triggered, then we quantify the total number of collapsed adjacent nodes, i.e., avalanche size. The bigger avalanche size refers to the province-sector higher vulnerability to economic shocks. Furthermore, we use the risk probability of province-sectors suffering from water scarcity as external shocks to describe the supply network response process under different water quantity and quality constraints. By comparing with the economic impact results, we can further identify vulnerable nodes affected by the dual restraints of water scarcity and economic shocks
- …