4,123 research outputs found

    Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems

    Full text link
    Voice Processing Systems (VPSes), now widely deployed, have been made significantly more accurate through the application of recent advances in machine learning. However, adversarial machine learning has similarly advanced and has been used to demonstrate that VPSes are vulnerable to the injection of hidden commands - audio obscured by noise that is correctly recognized by a VPS but not by human beings. Such attacks, though, are often highly dependent on white-box knowledge of a specific machine learning model and limited to specific microphones and speakers, making their use across different acoustic hardware platforms (and thus their practicality) limited. In this paper, we break these dependencies and make hidden command attacks more practical through model-agnostic (blackbox) attacks, which exploit knowledge of the signal processing algorithms commonly used by VPSes to generate the data fed into machine learning systems. Specifically, we exploit the fact that multiple source audio samples have similar feature vectors when transformed by acoustic feature extraction algorithms (e.g., FFTs). We develop four classes of perturbations that create unintelligible audio and test them against 12 machine learning models, including 7 proprietary models (e.g., Google Speech API, Bing Speech API, IBM Speech API, Azure Speaker API, etc), and demonstrate successful attacks against all targets. Moreover, we successfully use our maliciously generated audio samples in multiple hardware configurations, demonstrating effectiveness across both models and real systems. In so doing, we demonstrate that domain-specific knowledge of audio signal processing represents a practical means of generating successful hidden voice command attacks

    The Role of Privacy Risk in IT Acceptance: An Empirical Study

    Get PDF

    Improved methods for magnetic purification of malaria parasites and haemozoin

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Malaria parasites generate free haem upon catabolism of host haemoglobin during their intraerythrocytic growth cycle. In order to minimize oxidative toxicity of the ferric iron, the free haem molecules are polymerized into the biomineral beta-haematin (commonly referred to as haemozoin). Haemozoin crystals are paramagnetic, and this property can be exploited for the purification of late stage parasites as they contain larger haemozoin crystals than early stage parasites and uninfected cells. Commercially available magnets that were originally developed for the purpose of antibody-mediated cell purification are widely used for this purpose. As these methods are not necessarily optimized for parasite purification, the relationship between magnetic field strength and the quantity and quality of yield during parasite purification was explored.</p> <p>Methods</p> <p>Inexpensive rare-earth neodymium magnets with commercially available disposable columns were employed to explore the relationship between magnetic field strength and recovery of free haemozoin and infected erythrocytes (iRBCs).</p> <p>Results</p> <p>Yields of free haemozoin increased nearly linearly with increasing magnetic field strength to the strongest fields tested (8,500 Gauss). Stronger magnetic fields also improved the recovery of iRBCs with no detrimental effects on parasite viability. An in-house constructed magnetic stand, built for $75 in materials, produced superior results when compared with much more expensive commercial products.</p> <p>Conclusions</p> <p>Existing protocols for the magnetic purification of free haemozoin and iRBCs result in sub-optimal yields. Inexpensive high-strength neodymium magnets offer a better option, resulting in higher yields with no detrimental effects on parasite viability.</p

    Is Retention Enough? Learning and Satisfaction of First-Generation College Seniors

    Get PDF
    Progress has been made in retaining and graduating traditional-age first-generation college students at four-year institutions. First-generation students, however, often experience college differently because of external factors, which can negatively influence their learning experience and overall satisfaction. This study explored learning and satisfaction measures of seniors at a small private university in the Midwest. Using Astin’s I-E-O model (1970), the following variables were considered: precollege student characteristics (input); academic engagement, co-curricular activities, campus relationships (environment); and satisfaction, learning (outcome). The sample consisted of seniors participating in NSSE and/or ETS MAPP (n=342). Findings confirmed that first-generation students typically worked more for pay, commuted, and had greater financial need. Results of the analysis of learning and satisfaction however, indicated no difference between the two groups (

    Using the Framingham Risk Score to Evaluate Immigrant Effect on Cardiovascular Disease Risk in Mexican Americans

    Get PDF
    Background—This study uses the Framingham Risk Score (FRS) for 10-year cardiovascular disease (CVD) to evaluate differences between Mexican American immigrants and the U.S.-born population. Methods and Results—Data from the Cameron County Hispanic Cohort (N=1,559). Average total risk scores were generated by age group for each gender. Regression analysis was conducted adjusting for covariates and interaction effects. Both women and men in the CCHC sample who were long-term immigrant residents (mean FRS scores women 4.2 with p\u3c.001 vs. men 4.0 with p\u3c.001) or born in the U.S. (mean FRS scores women 4.6 with p\u3c.001 vs. men 3.3 with p\u3c.001) had significantly higher risk scores than immigrants who had only been in this country for less than 10 years. The interaction model indicates that differences between immigrant and native-born Mexican Americans are most greatly felt at lowest levels of socioeconomic status for men in the CCHC. Conclusions—This study suggests that in terms of immigrant advantage in CVD risk, on whom, where, and how the comparisons are being made have important implications for the degree of difference observed

    Affiliative Behavior, Ultrasonic Communication and Social Reward Are Influenced by Genetic Variation in Adolescent Mice

    Get PDF
    Social approach is crucial for establishing relationships among individuals. In rodents, social approach has been studied primarily within the context of behavioral phenomena related to sexual reproduction, such as mating, territory defense and parental care. However, many forms of social interaction occur before the onset of reproductive maturity, which suggests that some processes underlying social approach among juvenile animals are probably distinct from those in adults. We conducted a longitudinal study of social investigation (SI) in mice from two inbred strains to assess the extent to which genetic factors influence the motivation for young mice to approach one another. Early-adolescent C57BL/6J (B6) mice, tested 4–6 days after weaning, investigated former cage mates to a greater degree than BALB/cJ (BALB) mice, irrespective of the sex composition within an interacting pair. This strain difference was not due to variation in maternal care, the phenotypic characteristics of stimulus mice or sensitivity to the length of isolation prior to testing, nor was it attributable to a general difference in appetitive motivation. Ultrasonic vocalization (USV) production was positively correlated with the SI responses of mice from both strains. Interestingly, several USV characteristics segregated with the genetic background of young mice, including a higher average frequency and shorter duration for the USVs emitted by B6 mice. An assessment of conditioned place preference responses indicated that there was a strain-dependent difference in the rewarding nature of social contact. As adolescent mice aged, SI responses gradually became less sensitive to genetic background and more responsive to the particular sex of individuals within an interacting pair. We have thus identified a specific, genetic influence on the motivation of early-adolescent mice to approach one another. Consistent with classical theories of motivation, which propose a functional relationship between behavioral approach and reward, our findings indicate that reward is a proximal mechanism through which genetic factors affect social motivation during early adolescence

    maxdLoad2 and maxdBrowse: standards-compliant tools for microarray experimental annotation, data management and dissemination

    Get PDF
    BACKGROUND: maxdLoad2 is a relational database schema and Java(® )application for microarray experimental annotation and storage. It is compliant with all standards for microarray meta-data capture; including the specification of what data should be recorded, extensive use of standard ontologies and support for data exchange formats. The output from maxdLoad2 is of a form acceptable for submission to the ArrayExpress microarray repository at the European Bioinformatics Institute. maxdBrowse is a PHP web-application that makes contents of maxdLoad2 databases accessible via web-browser, the command-line and web-service environments. It thus acts as both a dissemination and data-mining tool. RESULTS: maxdLoad2 presents an easy-to-use interface to an underlying relational database and provides a full complement of facilities for browsing, searching and editing. There is a tree-based visualization of data connectivity and the ability to explore the links between any pair of data elements, irrespective of how many intermediate links lie between them. Its principle novel features are: • the flexibility of the meta-data that can be captured, • the tools provided for importing data from spreadsheets and other tabular representations, • the tools provided for the automatic creation of structured documents, • the ability to browse and access the data via web and web-services interfaces. Within maxdLoad2 it is very straightforward to customise the meta-data that is being captured or change the definitions of the meta-data. These meta-data definitions are stored within the database itself allowing client software to connect properly to a modified database without having to be specially configured. The meta-data definitions (configuration file) can also be centralized allowing changes made in response to revisions of standards or terminologies to be propagated to clients without user intervention. maxdBrowse is hosted on a web-server and presents multiple interfaces to the contents of maxd databases. maxdBrowse emulates many of the browse and search features available in the maxdLoad2 application via a web-browser. This allows users who are not familiar with maxdLoad2 to browse and export microarray data from the database for their own analysis. The same browse and search features are also available via command-line and SOAP server interfaces. This both enables scripting of data export for use embedded in data repositories and analysis environments, and allows access to the maxd databases via web-service architectures. CONCLUSION: maxdLoad2 and maxdBrowse are portable and compatible with all common operating systems and major database servers. They provide a powerful, flexible package for annotation of microarray experiments and a convenient dissemination environment. They are available for download and open sourced under the Artistic License
    • …
    corecore