33 research outputs found

    To have and have not: Variations on secret sharing to model user presence

    Get PDF
    We address the problem of locking and unlocking a device, such as a laptop, a phone or a security token, based on the absence or presence of the user. We detect user presence by sensing the proximity of a subset of their possessions, making the process automatic and effortless. As in previous work, a master key unlocks the device and a secret-sharing scheme allows us to reconstruct this master key in the presence of k-out-of-n items. We extend this basic scheme in various directions, e.g. by allowing items to issue a dynamically variable number of shares based on how confident they are that the user is present. The position we argue in this paper is that a multi-dimensional approach to authentication that fuses several contextual inputs, similar to that already adopted by major web sites, can also bring advantages at the local scale.This is the author accepted manuscript. The final published version is available at http://dl.acm.org/citation.cfm?id=2641705&CFID=518729474&CFTOKEN=85977065

    Analysis of yawning behaviour in spontaneous expressions of drowsy drivers

    Get PDF
    Driver fatigue is one of the main causes of road accidents. It is essential to develop a reliable driver drowsiness detection system which can alert drivers without disturbing them and is robust to environmental changes. This paper explores yawning behaviour as a sign of drowsiness in spontaneous expressions of drowsy drivers in simulated driving scenarios. We analyse a labelled dataset of videos of sleep-deprived versus alert drivers and demonstrate the correlation between hand-over-face touches, face occlusions and yawning. We propose that face touches can be used as a novel cue in automated drowsiness detection alongside yawning and eye behaviour. Moreover, we present an automatic approach to detect yawning based on extracting geometric and appearance features of both mouth and eye regions. Our approach successfully detects both hand-covered and uncovered yawns with an accuracy of 95%. Ultimately, our goal is to use these results in designing a hybrid drowsiness-detection system

    Pico without public keys

    Get PDF
    This document is the Accepted Manuscript version of the following paper: Frank Stajano, Bruce Christianson, Mark Lomas, Graeme Jenkinson, Jeunese Payne, Max Spencer, and Quentin Stafford Fraser, 'Pico without Public Keys', Security Protocols XXIII, 23rd International Workshop Cambridge, March 31- April 2, 2015, Revised Selected Papers, pp. 195-211, part of the Lecture Notes in Computer Science book series (LNCS, Vol. 9379), first online 25 November 2015, ISBN: 978-3-319-26095-2. The final publication is available at Springer via: https://link.springer.com/chapter/10.1007%2F978-3-319-26096-9_21v.Pico is a user authentication system that does not require remembering secrets. It is based on a personal handheld token that holds the user’s credentials and that is unlocked by a “personal aura” generated by digital accessories worn by the owner. The token, acting as prover, engages in a public-key-based authentication protocol with the verifier. What would happen to Pico if success of the mythical quantum computer meant secure public key primitives were no longer available, or if for other reasons such as energy consumption we preferred not to deploy them? More generally, what would happen under those circumstances to user authentication on the web, which relies heavily on public key cryptography through HTTPS/TLS? Although the symmetric-key-vs-public-key debate dates back to the 1990s, we note that the problematic aspects of public key deployment that were identified back then are still ubiquitous today. In particular, although public key cryptography is widely deployed on the web, revocation still doesn’t work. We discuss ways of providing desirable properties of public-key-based user authentication systems using symmetric-key primitives and tamperevident tokens. In particular, we present a protocol through which a compromise of the user credentials file at one website does not require users to change their credentials at that website or any other. We also note that the current prototype of Pico, when working in compatibility mode through the Pico Lens (i.e. with websites that are unaware of the Pico protocols), doesn’t actually use public key cryptography, other than that implicit in TLS. With minor tweaks we adopt this as the native mode for Pico, dropping public key cryptography and achieving much greater deployability without any noteworthy loss in security

    Enhanced traffic simulation for improved realism in driving simulators

    Get PDF
    © 2018 ACM. The ability to monitor and detect potentially dangerous behaviour in surrounding traffic is vital for the development of intelligent vehicles. However, data collection for these kinds of scenarios is difficult in real-life, and a driving simulator therefore becomes an important substitute. In this paper we present an approach to enhance driving simulators. We experiment on an open source development platform, which is used to test real-life use cases within a simulated vehicle environment. We propose replacing pre-programmed traffic dynamics with real driving data recorded from human drivers in the same environment. This enhances the engagement of the host driver in the more realistically simulated traffic scenario. Signal lights and indicator sounds are also integrated to enrich the driver's sensation. Our preliminary quantitative and qualitative evaluation shows that our enhanced traffic simulation results in an improvement to the driver's perception of the realism of the driving simulator.JL

    Stochastic Theory of Early Viral Infection: Continuous versus Burst Production of Virions

    Get PDF
    Viral production from infected cells can occur continuously or in a burst that generally kills the cell. For HIV infection, both modes of production have been suggested. Standard viral dynamic models formulated as sets of ordinary differential equations can not distinguish between these two modes of viral production, as the predicted dynamics is identical as long as infected cells produce the same total number of virions over their lifespan. Here we show that in stochastic models of viral infection the two modes of viral production yield different early term dynamics. Further, we analytically determine the probability that infections initiated with any number of virions and infected cells reach extinction, the state when both the population of virions and infected cells vanish, and show this too has different solutions for continuous and burst production. We also compute the distributions of times to establish infection as well as the distribution of times to extinction starting from both a single virion as well as from a single infected cell for both modes of virion production

    A Multi-Component Model of the Developing Retinocollicular Pathway Incorporating Axonal and Synaptic Growth

    Get PDF
    During development, neurons extend axons to different brain areas and produce stereotypical patterns of connections. The mechanisms underlying this process have been intensively studied in the visual system, where retinal neurons form retinotopic maps in the thalamus and superior colliculus. The mechanisms active in map formation include molecular guidance cues, trophic factor release, spontaneous neural activity, spike-timing dependent plasticity (STDP), synapse creation and retraction, and axon growth, branching and retraction. To investigate how these mechanisms interact, a multi-component model of the developing retinocollicular pathway was produced based on phenomenological approximations of each of these mechanisms. Core assumptions of the model were that the probabilities of axonal branching and synaptic growth are highest where the combined influences of chemoaffinity and trophic factor cues are highest, and that activity-dependent release of trophic factors acts to stabilize synapses. Based on these behaviors, model axons produced morphologically realistic growth patterns and projected to retinotopically correct locations in the colliculus. Findings of the model include that STDP, gradient detection by axonal growth cones and lateral connectivity among collicular neurons were not necessary for refinement, and that the instructive cues for axonal growth appear to be mediated first by molecular guidance and then by neural activity. Although complex, the model appears to be insensitive to variations in how the component developmental mechanisms are implemented. Activity, molecular guidance and the growth and retraction of axons and synapses are common features of neural development, and the findings of this study may have relevance beyond organization in the retinocollicular pathway

    AI is a viable alternative to high throughput screening: a 318-target study

    Get PDF
    : High throughput screening (HTS) is routinely used to identify bioactive small molecules. This requires physical compounds, which limits coverage of accessible chemical space. Computational approaches combined with vast on-demand chemical libraries can access far greater chemical space, provided that the predictive accuracy is sufficient to identify useful molecules. Through the largest and most diverse virtual HTS campaign reported to date, comprising 318 individual projects, we demonstrate that our AtomNet® convolutional neural network successfully finds novel hits across every major therapeutic area and protein class. We address historical limitations of computational screening by demonstrating success for target proteins without known binders, high-quality X-ray crystal structures, or manual cherry-picking of compounds. We show that the molecules selected by the AtomNet® model are novel drug-like scaffolds rather than minor modifications to known bioactive compounds. Our empirical results suggest that computational methods can substantially replace HTS as the first step of small-molecule drug discovery

    Elective cancer surgery in COVID-19-free surgical pathways during the SARS-CoV-2 pandemic: An international, multicenter, comparative cohort study

    Get PDF
    PURPOSE As cancer surgery restarts after the first COVID-19 wave, health care providers urgently require data to determine where elective surgery is best performed. This study aimed to determine whether COVID-19–free surgical pathways were associated with lower postoperative pulmonary complication rates compared with hospitals with no defined pathway. PATIENTS AND METHODS This international, multicenter cohort study included patients who underwent elective surgery for 10 solid cancer types without preoperative suspicion of SARS-CoV-2. Participating hospitals included patients from local emergence of SARS-CoV-2 until April 19, 2020. At the time of surgery, hospitals were defined as having a COVID-19–free surgical pathway (complete segregation of the operating theater, critical care, and inpatient ward areas) or no defined pathway (incomplete or no segregation, areas shared with patients with COVID-19). The primary outcome was 30-day postoperative pulmonary complications (pneumonia, acute respiratory distress syndrome, unexpected ventilation). RESULTS Of 9,171 patients from 447 hospitals in 55 countries, 2,481 were operated on in COVID-19–free surgical pathways. Patients who underwent surgery within COVID-19–free surgical pathways were younger with fewer comorbidities than those in hospitals with no defined pathway but with similar proportions of major surgery. After adjustment, pulmonary complication rates were lower with COVID-19–free surgical pathways (2.2% v 4.9%; adjusted odds ratio [aOR], 0.62; 95% CI, 0.44 to 0.86). This was consistent in sensitivity analyses for low-risk patients (American Society of Anesthesiologists grade 1/2), propensity score–matched models, and patients with negative SARS-CoV-2 preoperative tests. The postoperative SARS-CoV-2 infection rate was also lower in COVID-19–free surgical pathways (2.1% v 3.6%; aOR, 0.53; 95% CI, 0.36 to 0.76). CONCLUSION Within available resources, dedicated COVID-19–free surgical pathways should be established to provide safe elective cancer surgery during current and before future SARS-CoV-2 outbreaks
    corecore