148 research outputs found

    Inflating hollow nanocrystals through a repeated Kirkendall cavitation process.

    Get PDF
    The Kirkendall effect has been recently used to produce hollow nanostructures by taking advantage of the different diffusion rates of species involved in the chemical transformations of nanoscale objects. Here we demonstrate a nanoscale Kirkendall cavitation process that can transform solid palladium nanocrystals into hollow palladium nanocrystals through insertion and extraction of phosphorus. The key to success in producing monometallic hollow nanocrystals is the effective extraction of phosphorus through an oxidation reaction, which promotes the outward diffusion of phosphorus from the compound nanocrystals of palladium phosphide and consequently the inward diffusion of vacancies and their coalescence into larger voids. We further demonstrate that this Kirkendall cavitation process can be repeated a number of times to gradually inflate the hollow metal nanocrystals, producing nanoshells of increased diameters and decreased thicknesses. The resulting thin palladium nanoshells exhibit enhanced catalytic activity and high durability toward formic acid oxidation

    HeisenTrojans: They Are Not There Until They Are Triggered

    Full text link
    The hardware security community has made significant advances in detecting Hardware Trojan vulnerabilities using software fuzzing-inspired automated analysis. However, the Electronic Design Automation (EDA) code base itself remains under-examined by the same techniques. Our experiments in fuzzing EDA tools demonstrate that, indeed, they are prone to software bugs. As a consequence, this paper unveils HeisenTrojan attacks, a new hardware attack that does not generate harmful hardware, but rather, exploits software vulnerabilities in the EDA tools themselves. A key feature of HeisenTrojan attacks is that they are capable of deploying a malicious payload on the system hosting the EDA tools without triggering verification tools because HeisenTrojan attacks do not rely on superfluous or malicious hardware that would otherwise be noticeable. The aim of a HeisenTrojan attack is to execute arbitrary code on the system on which the vulnerable EDA tool is hosted, thereby establishing a permanent presence and providing a beachhead for intrusion into that system. Our analysis reveals 83% of the EDA tools analyzed have exploitable bugs. In what follows, we demonstrate an end- to-end attack and provide analysis on the existing capabilities of fuzzers to find HeisenTrojan attacks in order to emphasize their practicality and the need to secure EDA tools against them.Comment: This paper has been accepted by IEEE Asian Hardware Oriented Security and Trust Symposium (AsianHOST' 2023

    PDNPulse: Sensing PCB Anomaly with the Intrinsic Power Delivery Network

    Full text link
    The ubiquitous presence of printed circuit boards (PCBs) in modern electronic systems and embedded devices makes their integrity a top security concern. To take advantage of the economies of scale, today's PCB design and manufacturing are often performed by suppliers around the globe, exposing them to many security vulnerabilities along the segmented PCB supply chain. Moreover, the increasing complexity of the PCB designs also leaves ample room for numerous sneaky board-level attacks to be implemented throughout each stage of a PCB's lifetime, threatening many electronic devices. In this paper, we propose PDNPulse, a power delivery network (PDN) based PCB anomaly detection framework that can identify a wide spectrum of board-level malicious modifications. PDNPulse leverages the fact that the PDN's characteristics are inevitably affected by modifications to the PCB, no matter how minuscule. By detecting changes to the PDN impedance profile and using the Frechet distance-based anomaly detection algorithms, PDNPulse can robustly and successfully discern malicious modifications across the system. Using PDNPulse, we conduct extensive experiments on seven commercial-off-the-shelf PCBs, covering different design scales, different threat models, and seven different anomaly types. The results confirm that PDNPulse creates an effective security asymmetry between attack and defense

    A knowledge distillation-based multi-scale relation-prototypical network for cross-domain few-shot defect classification

    Get PDF
    Surface defect classification plays a very important role in industrial production and mechanical manufacturing. However, there are currently some challenges hindering its use. The first is the similarity of different defect samples makes classification a difficult task. Second, the lack of defect samples leads to poor accuracies when using deep learning methods. In this paper, we first design a novel backbone network, ResMSNet, which draws on the idea of multi-scale feature extraction for small discriminative regions in defect samples. Then, we introduce few-shot learning for defect classification and propose a Relation-Prototypical network (RPNet), which combines the characteristics of ProtoNet and RelationNet and provides classification by linking the prototypes distances and the nonlinear relation scores. Next, we consider a more realistic scenario where the base dataset for training the model and target defect dataset for applying the model are usually obtained from domains with large differences, called cross-domain few-shot learning. Hence, we further improve RPNet to KD-RPNet inspired by knowledge distillation methods. Through extensive comparative experiments and ablation experiments, we demonstrate that either our ResMSNet or RPNet proves its effectiveness and KD-RPNet outperforms other state-of-the-art approaches for few-shot defect classification.</p

    An Efficient Dynamic Multi-Sources To Single-Destination (DMS-SD) Algorithm In Smart City Navigation Using Adjacent Matrix

    Full text link
    Dijkstra's algorithm is one of the most popular classic path planning algorithms, achieving optimal solutions across a wide range of challenging tasks. However, it only calculates the shortest distance from one vertex to another, which is hard to directly apply to the Dynamic Multi-Sources to Single-Destination (DMS-SD) problem. This paper proposes a modified Dijkstra algorithm to address the DMS-SD problem, where the destination can be dynamically changed. Our method deploys the concept of Adjacent Matrix from Floyd's algorithm and achieves the goal with mathematical calculations. We formally show that all-pairs shortest distance information in Floyd's algorithm is not required in our algorithm. Extensive experiments verify the scalability and optimality of the proposed method.Comment: International Conference On Human-Centered Cognitive Systems (HCCS) 202

    Wearable sensor devices can automatically identify the ON-OFF status of patients with Parkinson's disease through an interpretable machine learning model

    Get PDF
    IntroductionAccurately and objectively quantifying the clinical features of Parkinson's disease (PD) is crucial for assisting in diagnosis and guiding the formulation of treatment plans. Therefore, based on the data on multi-site motor features, this study aimed to develop an interpretable machine learning (ML) model for classifying the “OFF” and “ON” status of patients with PD, as well as to explore the motor features that are most associated with changes in clinical symptoms.MethodsWe employed a support vector machine with a recursive feature elimination (SVM-RFE) algorithm to select promising motion features. Subsequently, 12 ML models were constructed based on these features, and we identified the model with the best classification performance. Then, we used the SHapley Additive exPlanations (SHAP) and the Local Interpretable Model agnostic Explanations (LIME) methods to explain the model and rank the importance of those motor features.ResultsA total of 96 patients were finally included in this study. The naive Bayes (NB) model had the highest classification performance (AUC = 0.956; sensitivity = 0.8947, 95% CI 0.6686–0.9870; accuracy = 0.8421, 95% CI 0.6875–0.9398). Based on the NB model, we analyzed the importance of eight motor features toward the classification results using the SHAP algorithm. The Gait: range of motion (RoM) Shank left (L) (degrees) [Mean] might be the most important motor feature for all classification horizons.ConclusionThe symptoms of PD could be objectively quantified. By utilizing suitable motor features to construct ML models, it became possible to intelligently identify whether patients with PD were in the “ON” or “OFF” status. The variations in these motor features were significantly correlated with improvement rates in patients' quality of life. In the future, they might act as objective digital biomarkers to elucidate the changes in symptoms observed in patients with PD and might be used to assist in the diagnosis and treatment of patients with PD

    Individual-based morphological brain network organization and its association with autistic symptoms in young children with autism spectrum disorder

    Get PDF
    Individual-based morphological brain networks built from T1-weighted magnetic resonance imaging (MRI) reflect synchronous maturation intensities between anatomical regions at the individual level. Autism spectrum disorder (ASD) is a socio-cognitive and neurodevelopmental disorder with high neuroanatomical heterogeneity, but the specific patterns of morphological networks in ASD remain largely unexplored at the individual level. In this study, individual-based morphological networks were constructed by using high-resolution structural MRI data from 40 young children with ASD (age range: 2-8 years) and 38 age-, gender-, and handedness-matched typically developing children (TDC). Measurements were recorded as threefold. Results showed that compared with TDC, young children with ASD exhibited lower values of small-worldness (i.e., sigma) of individual-level morphological brain networks, increased morphological connectivity in cortico-striatum-thalamic-cortical (CSTC) circuitry, and decreased morphological connectivity in the cortico-cortical network. In addition, morphological connectivity abnormalities can predict the severity of social communication deficits in young children with ASD, thus confirming an associational impact at the behavioral level. These findings suggest that the morphological brain network in the autistic developmental brain is inefficient in segregating and distributing information. The results also highlight the crucial role of abnormal morphological connectivity patterns in the socio-cognitive deficits of ASD and support the possible use of the aberrant developmental patterns of morphological brain networks in revealing new clinically-relevant biomarkers for ASD.China Postdoctoral Science Foundation, Grant/Award Number: 2019M660236; National Natural Science Foundation of China, Grant/Award Numbers: 61901129, 62036003, 81871432, U1808204; The Basque Foundation for Science and from Ministerio de Economia, Industria y Competitividad (Spain) and FEDER, Grant/Award Number: DPI2016-79874-R; the Fundamental Research Funds for the Central Universities, Grant/Award Numbers: 2672018ZYGX2018J079, ZYGX2019Z017; the Sichuan Science and Technology Program, Grant/Award Number: 2019YJ018
    • …
    corecore