161 research outputs found
Relating Weyl and diffeomorphism anomalies on super Riemann surfaces
Starting from the Wess-Zumino action associated to the super Weyl anomaly, we
determine the local counterterm which allows to pass from this anomaly to the
chirally split superdiffeomorphism anomaly (as defined on a compact super
Riemann surface without boundary). The counterterm involves the graded
extension of the Verlinde functional and the results can be applied to the
study of holomorphic factorization of partition functions in superconformal
field theory.Comment: (LATEX, 18 pages), MPI-Ph/92-38, LPTB 92-
Programmable multimetallic linear nanoassemblies of ruthenium–DNA conjugates
A new ruthenium–DNA conjugates family was synthesized, made up of a ruthenium complex bound to one or two identical DNA strands of 14–58 nucleotides. The formation of controlled linear nanoassemblies containing one to seven ruthenium complexes is described
The Efficacy of Transformer-based Adversarial Attacks in Security Domains
Today, the security of many domains rely on the use of Machine Learning to
detect threats, identify vulnerabilities, and safeguard systems from attacks.
Recently, transformer architectures have improved the state-of-the-art
performance on a wide range of tasks such as malware detection and network
intrusion detection. But, before abandoning current approaches to transformers,
it is crucial to understand their properties and implications on cybersecurity
applications. In this paper, we evaluate the robustness of transformers to
adversarial samples for system defenders (i.e., resiliency to adversarial
perturbations generated on different types of architectures) and their
adversarial strength for system attackers (i.e., transferability of adversarial
samples generated by transformers to other target models). To that effect, we
first fine-tune a set of pre-trained transformer, Convolutional Neural Network
(CNN), and hybrid (an ensemble of transformer and CNN) models to solve
different downstream image-based tasks. Then, we use an attack algorithm to
craft 19,367 adversarial examples on each model for each task. The
transferability of these adversarial examples is measured by evaluating each
set on other models to determine which models offer more adversarial strength,
and consequently, more robustness against these attacks. We find that the
adversarial examples crafted on transformers offer the highest transferability
rate (i.e., 25.7% higher than the average) onto other models. Similarly,
adversarial examples crafted on other models have the lowest rate of
transferability (i.e., 56.7% lower than the average) onto transformers. Our
work emphasizes the importance of studying transformer architectures for
attacking and defending models in security domains, and suggests using them as
the primary architecture in transfer attack settings.Comment: Accepted to IEEE Military Communications Conference (MILCOM), AI for
Cyber Workshop, 202
La nécrose du phloème du tronc de l'hévéa en Côte d'Ivoire : 1. Symptomatologie et caractéristiques biochimiques
Nutrient uptake and growth of in vitro coconut (Cocos nucifera L.) calluses
La croissance #in vitro$ de deux lignées de cals de cocotier, L1 et L7, et l'évolution de la concentration des minéraux et des sucres dans les milieux de culture sont mesurés après 0, 14, 28, 42 et 56 jours de culture. Un contrôle histologique est réalisé aux jours 0, 28 et 56. Bien que les deux lignées soient multipliées sur des teneurs en 2,4-D différentes, la croissance (Poids de Matière Sèche) des deux lignées est identique et est liée à des besoins en éléments nutritifs équivalents. L'organisation de la zone méristématique des cals des deux lignées est très différente mais n'a pas d'influence sur leur nutrition. L'absorption des ions NH4, Ca et Mg est continue pendant tout le cycle de culture. Le saccharose et l'ion SO4 sont absorbés pendant la phase de latence et au début de la phase exponentielle de croissance. L'absorption des ions H2PO4 et NO3 apparaît seulement pendant la seconde moitié de la phase exponentielle. L'équilibre ionique est maintenu par les ions K et Cl. (Résumé d'auteur
Free amino acid composition of coconut (Cocos nucifera L.) calli under somatic embryogenesis induction conditions
Supersymmetric structure of the induced W gravities
We derive the supersymmetric structure present in W-gravities which has been
already observed in various contexts as Yang-Mills theory, topological field
theories, bosonic string and chiral W_{3}-gravity. This derivation which is
made in the geometrical framework of Zucchini, necessitates the introduction of
an appropriate new basis of variables which replace the canonical fields and
their derivatives. This construction is used, in the W_{2}-case, to deduce from
the Chern-Simons action the Wess-Zumino-Polyakov action.Comment: 17 pages, Latex. To appear in Class. Quantum. Gravit
- …