4,851 research outputs found

    Manipulating dc currents with bilayer bulk natural materials

    Full text link
    The principle of transformation optics has been applied to various wave phenomena (e.g., optics, electromagnetics, acoustics and thermodynamics). Recently, metamaterial devices manipulating dc currents have received increasing attention which usually adopted the analogue of transformation optics using complicated resistor networks to mimic the inhomogeneous and anisotropic conductivities. We propose a distinct and general principle of manipulating dc currents by directly solving electric conduction equations, which only needs to utilize two layers of bulk natural materials. We experimentally demonstrate dc bilayer cloak and fan-shaped concentrator, derived from the generalized account for cloaking sensor. The proposed schemes have been validated as exact devices and this opens a facile way towards complete spatial control of dc currents. The proposed schemes may have vast potentials in various applications not only in dc, but also in other fields of manipulating magnetic field, thermal heat, elastic mechanics, and matter waves

    Enhancing the Performance of Practical Profiling Side-Channel Attacks Using Conditional Generative Adversarial Networks

    Get PDF
    Recently, many profiling side-channel attacks based on Machine Learning and Deep Learning have been proposed. Most of them focus on reducing the number of traces required for successful attacks by optimizing the modeling algorithms. In previous work, relatively sufficient traces need to be used for training a model. However, in the practical profiling phase, it is difficult or impossible to collect sufficient traces due to the constraint of various resources. In this case, the performance of profiling attacks is inefficient even if proper modeling algorithms are used. In this paper, the main problem we consider is how to conduct more efficient profiling attacks when sufficient profiling traces cannot be obtained. To deal with this problem, we first introduce the Conditional Generative Adversarial Network (CGAN) in the context of side-channel attacks. We show that CGAN can generate new traces to enlarge the size of the profiling set, which improves the performance of profiling attacks. For both unprotected and protected cryptographic algorithms, we find that CGAN can effectively learn the leakage of traces collected in their implementations. We also apply it to different modeling algorithms. In our experiments, the model constructed with the augmented profiling set can reduce the required attack traces by more than half, which means the generated traces can provide useful information as the real traces

    GPX3 (Glutathione peroxidase 3)

    Get PDF
    Review on GPX3, with data on DNA, on the protein encoded, and where the gene is implicated
    • …
    corecore