48 research outputs found

    Insecurity of detector-device-independent quantum key distribution

    Get PDF
    Detector-device-independent quantum key distribution (ddiQKD) held the promise of being robust to detector side-channels, a major security loophole in QKD implementations. In contrast to what has been claimed, however, we demonstrate that the security of ddiQKD is not based on post-selected entanglement, and we introduce various eavesdropping strategies that show that ddiQKD is in fact insecure against detector side-channel attacks as well as against other attacks that exploit device's imperfections of the receiver. Our attacks are valid even when the QKD apparatuses are built by the legitimate users of the system themselves, and thus free of malicious modifications, which is a key assumption in ddiQKD.Comment: 7 pages, 5 figures, 1 tabl

    Wave breaking for the generalized Fornberg-Whitham equation

    Full text link
    This paper aims to show that the Cauchy problem of the Burgers equation with a weakly dispersive perturbation involving the Bessel potential (generalization of the Fornberg-Whitham equation) can exhibit wave breaking for initial data with large slope. We also comment on the dispersive properties of the equation

    EdgeYOLO: An Edge-Real-Time Object Detector

    Full text link
    This paper proposes an efficient, low-complexity and anchor-free object detector based on the state-of-the-art YOLO framework, which can be implemented in real time on edge computing platforms. We develop an enhanced data augmentation method to effectively suppress overfitting during training, and design a hybrid random loss function to improve the detection accuracy of small objects. Inspired by FCOS, a lighter and more efficient decoupled head is proposed, and its inference speed can be improved with little loss of precision. Our baseline model can reach the accuracy of 50.6% AP50:95 and 69.8% AP50 in MS COCO2017 dataset, 26.4% AP50:95 and 44.8% AP50 in VisDrone2019-DET dataset, and it meets real-time requirements (FPS>=30) on edge-computing device Nvidia Jetson AGX Xavier. We also designed lighter models with less parameters for edge computing devices with lower computing power, which also show better performances. Our source code, hyper-parameters and model weights are all available at https://github.com/LSH9832/edgeyolo

    Experimental quantum key distribution with source flaws

    Full text link
    Decoy-state quantum key distribution (QKD) is a standard technique in current quantum cryptographic implementations. Unfortunately, existing experiments have two important drawbacks: the state preparation is assumed to be perfect without errors and the employed security proofs do not fully consider the finite-key effects for general attacks. These two drawbacks mean that existing experiments are not guaranteed to be secure in practice. Here, we perform an experiment that for the first time shows secure QKD with imperfect state preparations over long distances and achieves rigorous finite-key security bounds for decoy-state QKD against coherent attacks in the universally composable framework. We quantify the source flaws experimentally and demonstrate a QKD implementation that is tolerant to channel loss despite the source flaws. Our implementation considers more real-world problems than most previous experiments and our theory can be applied to general QKD systems. These features constitute a step towards secure QKD with imperfect devices.Comment: 12 pages, 4 figures, updated experiment and theor

    A Blockchain Based Certificate Revocation Scheme For Vehicular Communication Systems

    Get PDF
    Both the academy and industry believe that Intelligent Transportation System (ITS) would be achievable in one decade since modern vehicle and communication technologies advanced apace. Vehicular Communication System (VCS) introduces information technology to the ITS and aims to improve road safety and traffic efficiency. In recent year, security and privacy schemes in VCS are becoming important. However, recovery mechanisms to eliminate the negative effect of security and privacy attacks are still an important topic for research. Therefore, the certificate revocation scheme is considered as a feasible technique to prevent the system from potential attacks. The major challenge of the certificate revocation scheme is to achieve low-cost operation since the communication resources must be capable of carrying various applications apart from the security and privacy purposes. In this paper, we propose an efficient certificate revocation scheme in VCS. The Blockchain concept is introduced to simplify the network structure and distributed maintenance of the Certificate Revocation List (CRL). The proposed scheme embeds part of the certificate revocation functions within the security and privacy applications, aiming to reduce the communication overhead and shorten the processing time cost. Extensive simulations and analysis show the effectiveness and efficiency of the proposed scheme, in which the Blockchain structure costs fewer network resources and gives a more economic solution to against further cybercrime attacks

    Genetic prediction of the causal relationship between schizophrenia and tumors: a Mendelian randomized study

    Get PDF
    BackgroundPatients with schizophrenia are at a higher risk of developing cancer. However, the causal relationship between schizophrenia and different tumor types remains unclear.MethodsUsing a two-sample, two-way Mendelian randomization method, we used publicly available genome-wide association analysis (GWAS) aggregate data to study the causal relationship between schizophrenia and different cancer risk factors. These tumors included lung adenocarcinoma, lung squamous cell carcinoma, small-cell lung cancer, gastric cancer, alcohol-related hepatocellular cancer, tumors involving the lungs, breast, thyroid gland, pancreas, prostate, ovaries and cervix, endometrium, colon and colorectum, and bladder. We used the inverse variance weighting (IVW) method to determine the causal relationship between schizophrenia and different tumor risk factors. In addition, we conducted a sensitivity test to evaluate the effectiveness of the causality.ResultsAfter adjusting for heterogeneity, evidence of a causal relationship between schizophrenia and lung cancer risk was observed (odds ratio [OR]=1.001, 95% confidence interval [CI], 1.000–1.001; P=0.0155). In the sensitivity analysis, the causal effect of schizophrenia on the risk of lung cancer was consistent in both direction and degree. However, no evidence of causality or reverse causality between schizophrenia and other tumors was found.ConclusionThis study elucidated a causal relationship between the genetic predictors of schizophrenia and the risk of lung cancer, thereby providing a basis for the prevention, pathogenesis, and treatment of schizophrenia in patients with lung cancer

    Comparative study on the physicochemical properties, functional components, color and anthocyanins profile of Aronia melanocarpa juice using different sterilization methods

    Get PDF
    Investigating the influences of different sterilization methods on overall juice quality is essential for the production of high-quality juice. The effects of ultra-high temperature instantaneous sterilization (UHT), thermosonication (TS), high hydrostatic pressure sterilization (HHP), and irradiation sterilization (IS) on the physicochemical properties, functional components, and color of Aronia melanocarpa juice (AMJ) were investigated. In addition, anthocyanin target metabolomics were used to explore the influences of different sterilization methods on the AMJ anthocyanin profile. All sterilization treatments effectively ensured the microbial safety of AMJ, and the AMJ viscosity was noticeably declined after sterilization (p < 0.05). Except for HHP, the other treatments aggravated AMJ browning (p < 0.05). Both TS and HHP treatments significantly enhanced or preserved the total polyphenols, flavonoids, and anthocyanins in AMJ and retained the original juice color, whereas UHT and IS treatments were not conducive to maintaining these characteristics. TS treatment significantly increased cyanidin-3-O-galactoside (C-3-O-gal) and cyanidin-3-O-arabinoside (C-3-O-ara) contents in AMJ by 7.98% and 5.90%, while IS resulted in a significant decrease of 15.74% and 10.46% (p < 0.05). C-3-O-gal and C-3-O-ara were the major reasons for the significant upregulation and downregulation of the total monomeric anthocyanins contents (TMAC) in the AMJ after TS and IS treatment, respectively. Malvidin-3-O-glucoside (M-3-O-glu), Cyanidin-3-O-(6-O-malonyl-β-D-glucoside) and Kaempferol-3-O-rutinoside (K-3-O-rut) might be markers of differential metabolites produced by the TS, HHP, and IS treatments, respectively. Correlation analysis indicated that Cyanidin-3-O-xyloside (C-3-O-xyl), C-3-O-ara, and Pelargonidin-3-O-arabinoside (P-3-O-ara) might be the principal contributed to the antioxidant capacity of AMJ. The research results are anticipated to supply technical reference for AMJ processing

    Pharmacologic inhibition of the Menin-MLL interaction blocks progression of MLL leukemia in vivo

    Get PDF
    Chromosomal translocations affecting mixed lineage leukemia gene (MLL) result in acute leukemias resistant to therapy. The leukemogenic activity of MLL fusion proteins is dependent on their interaction with menin, providing basis for therapeutic intervention. Here we report the development of highly potent and orally bioavailable small-molecule inhibitors of the menin-MLL interaction, MI-463 and MI-503, and show their profound effects in MLL leukemia cells and substantial survival benefit in mouse models of MLL leukemia. Finally, we demonstrate the efficacy of these compounds in primary samples derived from MLL leukemia patients. Overall, we demonstrate that pharmacologic inhibition of the menin-MLL interaction represents an effective treatment for MLL leukemias in vivo and provide advanced molecular scaffold for clinical lead identification

    The 3rd Anti-UAV Workshop & Challenge: Methods and Results

    Full text link
    The 3rd Anti-UAV Workshop & Challenge aims to encourage research in developing novel and accurate methods for multi-scale object tracking. The Anti-UAV dataset used for the Anti-UAV Challenge has been publicly released. There are two main differences between this year's competition and the previous two. First, we have expanded the existing dataset, and for the first time, released a training set so that participants can focus on improving their models. Second, we set up two tracks for the first time, i.e., Anti-UAV Tracking and Anti-UAV Detection & Tracking. Around 76 participating teams from the globe competed in the 3rd Anti-UAV Challenge. In this paper, we provide a brief summary of the 3rd Anti-UAV Workshop & Challenge including brief introductions to the top three methods in each track. The submission leaderboard will be reopened for researchers that are interested in the Anti-UAV challenge. The benchmark dataset and other information can be found at: https://anti-uav.github.io/.Comment: Technical report for 3rd Anti-UAV Workshop and Challenge. arXiv admin note: text overlap with arXiv:2108.0990

    Secrets of RLHF in Large Language Models Part I: PPO

    Full text link
    Large language models (LLMs) have formulated a blueprint for the advancement of artificial general intelligence. Its primary objective is to function as a human-centric (helpful, honest, and harmless) assistant. Alignment with humans assumes paramount significance, and reinforcement learning with human feedback (RLHF) emerges as the pivotal technological paradigm underpinning this pursuit. Current technical routes usually include \textbf{reward models} to measure human preferences, \textbf{Proximal Policy Optimization} (PPO) to optimize policy model outputs, and \textbf{process supervision} to improve step-by-step reasoning capabilities. However, due to the challenges of reward design, environment interaction, and agent training, coupled with huge trial and error cost of large language models, there is a significant barrier for AI researchers to motivate the development of technical alignment and safe landing of LLMs. The stable training of RLHF has still been a puzzle. In the first report, we dissect the framework of RLHF, re-evaluate the inner workings of PPO, and explore how the parts comprising PPO algorithms impact policy agent training. We identify policy constraints being the key factor for the effective implementation of the PPO algorithm. Therefore, we explore the PPO-max, an advanced version of PPO algorithm, to efficiently improve the training stability of the policy model. Based on our main results, we perform a comprehensive analysis of RLHF abilities compared with SFT models and ChatGPT. The absence of open-source implementations has posed significant challenges to the investigation of LLMs alignment. Therefore, we are eager to release technical reports, reward models and PPO code
    corecore