175 research outputs found

    A Diffusion Model Based Quality Enhancement Method for HEVC Compressed Video

    Full text link
    Video post-processing methods can improve the quality of compressed videos at the decoder side. Most of the existing methods need to train corresponding models for compressed videos with different quantization parameters to improve the quality of compressed videos. However, in most cases, the quantization parameters of the decoded video are unknown. This makes existing methods have their limitations in improving video quality. To tackle this problem, this work proposes a diffusion model based post-processing method for compressed videos. The proposed method first estimates the feature vectors of the compressed video and then uses the estimated feature vectors as the prior information for the quality enhancement model to adaptively enhance the quality of compressed video with different quantization parameters. Experimental results show that the quality enhancement results of our proposed method on mixed datasets are superior to existing methods.Comment: 10 pages, conferenc

    Thermal simulation technology for solidification process of metals

    Get PDF

    Improved Factoring Attacks on Multi-Prime RSA with Small Prime Difference

    Get PDF
    In this paper, we study the security of multi-prime RSA with small prime difference and propose two improved factoring attacks. The modulus involved in this variant is the product of r distinct prime factors of the same bit-size. Zhang and Takagi (ACISP 2013) showed a Fermat-like factoring attack on multi-prime RSA. In order to improve the previous result, we gather more information about the prime factors to derive r simultaneous modular equations. The first attack is to combine all the equations and solve one multivariate equation by generic lattice approaches. Since the equation form is similar to multi-prime Phi-hiding problem, we propose the second attack by applying the optimal linearization technique. We also show that our attacks can achieve better bounds in the experiments

    Towards Strengthening Deep Learning-based Side Channel Attacks with Mixup

    Get PDF
    In recent years, various deep learning techniques have been exploited in side channel attacks, with the anticipation of obtaining more appreciable attack results. Most of them concentrate on improving network architectures or putting forward novel algorithms, assuming that there are adequate profiling traces available to train an appropriate neural network. However, in practical scenarios, profiling traces are probably insufficient, which makes the network learn deficiently and compromises attack performance. In this paper, we investigate a kind of data augmentation technique, called mixup, and first propose to exploit it in deep-learning based side channel attacks, for the purpose of expanding the profiling set and facilitating the chances of mounting a successful attack. We perform Correlation Power Analysis for generated traces and original traces, and discover that there exists consistency between them regarding leakage information. Our experiments show that mixup is truly capable of enhancing attack performance especially for insufficient profiling traces. Specifically, when the size of the training set is decreased to 30% of the original set, mixup can significantly reduce acquired attacking traces. We test three mixup parameter values and conclude that generally all of them can bring about improvements. Besides, we compare three leakage models and unexpectedly find that least significant bit model, which is less frequently used in previous works, actually surpasses prevalent identity model and hamming weight model in terms of attack results

    Enhancing the Performance of Practical Profiling Side-Channel Attacks Using Conditional Generative Adversarial Networks

    Get PDF
    Recently, many profiling side-channel attacks based on Machine Learning and Deep Learning have been proposed. Most of them focus on reducing the number of traces required for successful attacks by optimizing the modeling algorithms. In previous work, relatively sufficient traces need to be used for training a model. However, in the practical profiling phase, it is difficult or impossible to collect sufficient traces due to the constraint of various resources. In this case, the performance of profiling attacks is inefficient even if proper modeling algorithms are used. In this paper, the main problem we consider is how to conduct more efficient profiling attacks when sufficient profiling traces cannot be obtained. To deal with this problem, we first introduce the Conditional Generative Adversarial Network (CGAN) in the context of side-channel attacks. We show that CGAN can generate new traces to enlarge the size of the profiling set, which improves the performance of profiling attacks. For both unprotected and protected cryptographic algorithms, we find that CGAN can effectively learn the leakage of traces collected in their implementations. We also apply it to different modeling algorithms. In our experiments, the model constructed with the augmented profiling set can reduce the required attack traces by more than half, which means the generated traces can provide useful information as the real traces

    IGF-1R Inhibition Induces MEK Phosphorylation to Promote Survival in Colon Carcinomas

    Get PDF
    The insulin-like growth factor 1 receptor (IGF-1R) governs several signaling pathways for cell proliferation, survival, and anti-apoptosis. Thus, targeting IGF-1R appears as a reasonable rationale for tumor treatment. However, clinical studies showed that inhibition of IGF-1R has very limited efficacy due to the development of resistance to IGF-1R blockade in tumor cells. Here, we discovered that prolonged treatment of colon cancer cells with IGF-1R inhibitors (BMS-754807 and GSK1838705A) stimulates p70 KDa ribosomal protein S6 kinase 1 (p70S6K1) activation, a well-known kinase signaling for cell survival. We also found that p70S6K1 activation by IGF-1R inhibition is independent of K-Ras and PIK3CA mutations that frequently occur in colon cancer. Besides the increased p70S6K1 phosphorylation, the phosphorylation of mitogen-activated protein kinase kinase 1 and 2 (MEK1/2) was elevated in the cells treated with BMS-754807. Interestingly, the increases in MEK1/2 and p70S6K1 phosphorylation were also observed when cells were subjected to the treatment of AKT inhibitor or genetic knockdown of AKT2 but not AKT1, suggesting that AKT2 inhibition stimulates MEK1/2 phosphorylation to activate p70S6K1. Conversely, inhibition of MEK1/2 by MEK1/2 inhibitor (U0126) or knockdown of MEK1 and MEK2 by corresponding mek1 and mek2 siRNA enhanced AKT phosphorylation, indicating mutual inhibition between AKT and MEK. Furthermore, the combination of BMS-754807 and U0126 efficiently decreased the cell viability and increased cleaved caspase 3 and apoptosis in vitro and in vivo. Our data suggest that the treatment of colon tumor cells with IGF-1R inhibitors stimulates p70S6K1 activity via MEK1/2 to promote survival, providing a new strategy for colorectal cancer therapeutics
    corecore