93 research outputs found
Two-Factor Authentication Approach Based on Behavior Patterns for Defeating Puppet Attacks
Fingerprint traits are widely recognized for their unique qualities and
security benefits. Despite their extensive use, fingerprint features can be
vulnerable to puppet attacks, where attackers manipulate a reluctant but
genuine user into completing the authentication process. Defending against such
attacks is challenging due to the coexistence of a legitimate identity and an
illegitimate intent. In this paper, we propose PUPGUARD, a solution designed to
guard against puppet attacks. This method is based on user behavioral patterns,
specifically, the user needs to press the capture device twice successively
with different fingers during the authentication process. PUPGUARD leverages
both the image features of fingerprints and the timing characteristics of the
pressing intervals to establish two-factor authentication. More specifically,
after extracting image features and timing characteristics, and performing
feature selection on the image features, PUPGUARD fuses these two features into
a one-dimensional feature vector, and feeds it into a one-class classifier to
obtain the classification result. This two-factor authentication method
emphasizes dynamic behavioral patterns during the authentication process,
thereby enhancing security against puppet attacks. To assess PUPGUARD's
effectiveness, we conducted experiments on datasets collected from 31 subjects,
including image features and timing characteristics. Our experimental results
demonstrate that PUPGUARD achieves an impressive accuracy rate of 97.87% and a
remarkably low false positive rate (FPR) of 1.89%. Furthermore, we conducted
comparative experiments to validate the superiority of combining image features
and timing characteristics within PUPGUARD for enhancing resistance against
puppet attacks
Enabling Deep Learning-based Physical-layer Secret Key Generation for FDD-OFDM Systems in Multi-Environments
Deep learning-based physical-layer secret key generation (PKG) has been used
to overcome the imperfect uplink/downlink channel reciprocity in frequency
division duplexing (FDD) orthogonal frequency division multiplexing (OFDM)
systems. However, existing efforts have focused on key generation for users in
a specific environment where the training samples and test samples obey the
same distribution, which is unrealistic for real world applications. This paper
formulates the PKG problem in multiple environments as a learning-based problem
by learning the knowledge such as data and models from known environments to
generate keys quickly and efficiently in multiple new environments.
Specifically, we propose deep transfer learning (DTL) and meta-learning-based
channel feature mapping algorithms for key generation. The two algorithms use
different training methods to pre-train the model in the known environments,
and then quickly adapt and deploy the model to new environments. Simulation
results show that compared with the methods without adaptation, the DTL and
meta-learning algorithms both can improve the performance of generated keys. In
addition, the complexity analysis shows that the meta-learning algorithm can
achieve better performance than the DTL algorithm with less time, lower CPU and
GPU resources
Arm-Constrained Curriculum Learning for Loco-Manipulation of the Wheel-Legged Robot
Incorporating a robotic manipulator into a wheel-legged robot enhances its
agility and expands its potential for practical applications. However, the
presence of potential instability and uncertainties presents additional
challenges for control objectives. In this paper, we introduce an
arm-constrained curriculum learning architecture to tackle the issues
introduced by adding the manipulator. Firstly, we develop an arm-constrained
reinforcement learning algorithm to ensure safety and stability in control
performance. Additionally, to address discrepancies in reward settings between
the arm and the base, we propose a reward-aware curriculum learning method. The
policy is first trained in Isaac gym and transferred to the physical robot to
do dynamic grasping tasks, including the door-opening task, fan-twitching task
and the relay-baton-picking and following task. The results demonstrate that
our proposed approach effectively controls the arm-equipped wheel-legged robot
to master dynamic grasping skills, allowing it to chase and catch a moving
object while in motion. Please refer to our website
(https://acodedog.github.io/wheel-legged-loco-manipulation) for the code and
supplemental videos
Antimicrobial Activity and Resistance: Influencing Factors
Rational use of antibiotic is the key approach to improve the antibiotic performance and tackling of the antimicrobial resistance. The efficacy of antimicrobials are influenced by many factors: (1) bacterial status (susceptibility and resistance, tolerance, persistence, biofilm) and inoculum size; (2) antimicrobial concentrations [mutant selection window (MSW) and sub-inhibitory concentration]; (3) host factors (serum effect and impact on gut micro-biota). Additional understandings regarding the linkage between antimicrobial usages, bacterial status and host response offers us new insights and encourage the struggle for the designing of antimicrobial treatment regimens that reaching better clinical outcome and minimizing the emergence of resistance at the same time
Adaptive Surface Normal Constraint for Geometric Estimation from Monocular Images
We introduce a novel approach to learn geometries such as depth and surface
normal from images while incorporating geometric context. The difficulty of
reliably capturing geometric context in existing methods impedes their ability
to accurately enforce the consistency between the different geometric
properties, thereby leading to a bottleneck of geometric estimation quality. We
therefore propose the Adaptive Surface Normal (ASN) constraint, a simple yet
efficient method. Our approach extracts geometric context that encodes the
geometric variations present in the input image and correlates depth estimation
with geometric constraints. By dynamically determining reliable local geometry
from randomly sampled candidates, we establish a surface normal constraint,
where the validity of these candidates is evaluated using the geometric
context. Furthermore, our normal estimation leverages the geometric context to
prioritize regions that exhibit significant geometric variations, which makes
the predicted normals accurately capture intricate and detailed geometric
information. Through the integration of geometric context, our method unifies
depth and surface normal estimations within a cohesive framework, which enables
the generation of high-quality 3D geometry from images. We validate the
superiority of our approach over state-of-the-art methods through extensive
evaluations and comparisons on diverse indoor and outdoor datasets, showcasing
its efficiency and robustness.Comment: Accepted by TPAMI. arXiv admin note: substantial text overlap with
arXiv:2103.1548
Design of a Robust Radio-Frequency Fingerprint Identification Scheme for Multimode LFM Radar
International audienceRadar is an indispensable part of the Internet of Things (IoT). Specific emitter identification is essential to identify the legitimate radars and, more importantly, to reject the malicious radars. Conventional methods rely on pulse parameters that are not capable to identify the specific emitter as two radars may have the same configuration or a malicious radar can perform spoofing attacks. Radio frequency fingerprint (RFF) is the unique and intrinsic hardware characteristic of devices resulted from hardware imperfection, which can be used as the device identity. This paper proposes a robust and reliable radar identification scheme based on the RFF, taking linear frequency modulation (LFM) radar as a case study. This scheme first classifies the operation mode of the pulses, then eliminates the noise effect, and finally identifies the radar emitters based on the transient and modulation-based RFF features. Experimental results verify the effectiveness of our radar identification scheme among three real LFM radars (same model) operating at four modes, each mode with 2,000 pulses from each radar. The identification rates of the four modes are all higher than 90% when the signal-tonoise ratio (SNR) is about 5 dB. In addition, mode 3 achieves almost 100% identification accuracy even when the SNR is as low as-10 dB
- …