161 research outputs found

    Relating Weyl and diffeomorphism anomalies on super Riemann surfaces

    Full text link
    Starting from the Wess-Zumino action associated to the super Weyl anomaly, we determine the local counterterm which allows to pass from this anomaly to the chirally split superdiffeomorphism anomaly (as defined on a compact super Riemann surface without boundary). The counterterm involves the graded extension of the Verlinde functional and the results can be applied to the study of holomorphic factorization of partition functions in superconformal field theory.Comment: (LATEX, 18 pages), MPI-Ph/92-38, LPTB 92-

    Programmable multimetallic linear nanoassemblies of ruthenium–DNA conjugates

    Get PDF
    A new ruthenium–DNA conjugates family was synthesized, made up of a ruthenium complex bound to one or two identical DNA strands of 14–58 nucleotides. The formation of controlled linear nanoassemblies containing one to seven ruthenium complexes is described

    The Efficacy of Transformer-based Adversarial Attacks in Security Domains

    Full text link
    Today, the security of many domains rely on the use of Machine Learning to detect threats, identify vulnerabilities, and safeguard systems from attacks. Recently, transformer architectures have improved the state-of-the-art performance on a wide range of tasks such as malware detection and network intrusion detection. But, before abandoning current approaches to transformers, it is crucial to understand their properties and implications on cybersecurity applications. In this paper, we evaluate the robustness of transformers to adversarial samples for system defenders (i.e., resiliency to adversarial perturbations generated on different types of architectures) and their adversarial strength for system attackers (i.e., transferability of adversarial samples generated by transformers to other target models). To that effect, we first fine-tune a set of pre-trained transformer, Convolutional Neural Network (CNN), and hybrid (an ensemble of transformer and CNN) models to solve different downstream image-based tasks. Then, we use an attack algorithm to craft 19,367 adversarial examples on each model for each task. The transferability of these adversarial examples is measured by evaluating each set on other models to determine which models offer more adversarial strength, and consequently, more robustness against these attacks. We find that the adversarial examples crafted on transformers offer the highest transferability rate (i.e., 25.7% higher than the average) onto other models. Similarly, adversarial examples crafted on other models have the lowest rate of transferability (i.e., 56.7% lower than the average) onto transformers. Our work emphasizes the importance of studying transformer architectures for attacking and defending models in security domains, and suggests using them as the primary architecture in transfer attack settings.Comment: Accepted to IEEE Military Communications Conference (MILCOM), AI for Cyber Workshop, 202

    Nutrient uptake and growth of in vitro coconut (Cocos nucifera L.) calluses

    Get PDF
    La croissance #in vitro$ de deux lignées de cals de cocotier, L1 et L7, et l'évolution de la concentration des minéraux et des sucres dans les milieux de culture sont mesurés après 0, 14, 28, 42 et 56 jours de culture. Un contrôle histologique est réalisé aux jours 0, 28 et 56. Bien que les deux lignées soient multipliées sur des teneurs en 2,4-D différentes, la croissance (Poids de Matière Sèche) des deux lignées est identique et est liée à des besoins en éléments nutritifs équivalents. L'organisation de la zone méristématique des cals des deux lignées est très différente mais n'a pas d'influence sur leur nutrition. L'absorption des ions NH4, Ca et Mg est continue pendant tout le cycle de culture. Le saccharose et l'ion SO4 sont absorbés pendant la phase de latence et au début de la phase exponentielle de croissance. L'absorption des ions H2PO4 et NO3 apparaît seulement pendant la seconde moitié de la phase exponentielle. L'équilibre ionique est maintenu par les ions K et Cl. (Résumé d'auteur

    Supersymmetric structure of the induced W gravities

    Get PDF
    We derive the supersymmetric structure present in W-gravities which has been already observed in various contexts as Yang-Mills theory, topological field theories, bosonic string and chiral W_{3}-gravity. This derivation which is made in the geometrical framework of Zucchini, necessitates the introduction of an appropriate new basis of variables which replace the canonical fields and their derivatives. This construction is used, in the W_{2}-case, to deduce from the Chern-Simons action the Wess-Zumino-Polyakov action.Comment: 17 pages, Latex. To appear in Class. Quantum. Gravit
    • …
    corecore