210 research outputs found
Name-signature lookup system: a security enhancement to named data networking
Named Data Networking (NDN) is a content-centric networking, where the publisher of the packet signs and encapsulates the data packet with a name-content-signature encryption to verify the authenticity and integrity of itself. This scheme can solve many of the security issues inherently compared to IP networking. NDN also support mobility since it hides the point-to-point connection details. However, an extreme attack takes place when an NDN consumer newly connects to a network. A Man-in-the-middle (MITM) malicious node can block the consumer and keep intercepting the interest packets sent out so as to fake the corresponding data packets signed with its own private key. Without knowledge and trust to the network, the NDN consumer can by no means perceive the attack and thus exposed to severe security and privacy hazard. In this paper, the N ame-Signature Lookup System (NSLS) and corresponding Name-Signature Lookup Protocol (NSLP) is introduced to verify packets with their registered genuine publisher even in an untrusted network with the help of embedded keys inside Network Interface Controller (NIC), by which attacks like MITM is eliminated. A theoretical analysis of comparing NSLS with existing security model is provided. Digest algorithm SHA-256 and signature algorithm RSA are used in the NSLP model without specific preference
Name-signature lookup system: a security enhancement to named data networking
Named Data Networking (NDN) is a content-centric networking, where the publisher of the packet signs and encapsulates the data packet with a name-content-signature encryption to verify the authenticity and integrity of itself. This scheme can solve many of the security issues inherently compared to IP networking. NDN also support mobility since it hides the point-to-point connection details. However, an extreme attack takes place when an NDN consumer newly connects to a network. A Man-in-the-middle (MITM) malicious node can block the consumer and keep intercepting the interest packets sent out so as to fake the corresponding data packets signed with its own private key. Without knowledge and trust to the network, the NDN consumer can by no means perceive the attack and thus exposed to severe security and privacy hazard. In this paper, the N ame-Signature Lookup System (NSLS) and corresponding Name-Signature Lookup Protocol (NSLP) is introduced to verify packets with their registered genuine publisher even in an untrusted network with the help of embedded keys inside Network Interface Controller (NIC), by which attacks like MITM is eliminated. A theoretical analysis of comparing NSLS with existing security model is provided. Digest algorithm SHA-256 and signature algorithm RSA are used in the NSLP model without specific preference
Research on Calculation of the IOL Tilt and Decentration Based on Surface Fitting
The tilt and decentration of intraocular lens (IOL) result in defocussing, astigmatism, and wavefront aberration after operation. The objective is to give a method to estimate the tilt and decentration of IOL more accurately. Based on AS-OCT images of twelve eyes from eight cases with subluxation lens after operation, we fitted spherical equation to the data obtained from the images of the anterior and posterior surfaces of the IOL. By the established relationship between IOL tilt (decentration) and the scanned angle, at which a piece of AS-OCT image was taken by the instrument, the IOL tilt and decentration were calculated. IOL tilt angle and decentration of each subject were given. Moreover, the horizontal and vertical tilt was also obtained. Accordingly, the possible errors of IOL tilt and decentration existed in the method employed by AS-OCT instrument. Based on 6–12 pieces of AS-OCT images at different directions, the tilt angle and decentration values were shown, respectively. The method of the surface fitting to the IOL surface can accurately analyze the IOL’s location, and six pieces of AS-OCT images at three pairs symmetrical directions are enough to get tilt angle and decentration value of IOL more precisely
TIMME: Twitter Ideology-detection via Multi-task Multi-relational Embedding
We aim at solving the problem of predicting people's ideology, or political
tendency. We estimate it by using Twitter data, and formalize it as a
classification problem. Ideology-detection has long been a challenging yet
important problem. Certain groups, such as the policy makers, rely on it to
make wise decisions. Back in the old days when labor-intensive survey-studies
were needed to collect public opinions, analyzing ordinary citizens' political
tendencies was uneasy. The rise of social medias, such as Twitter, has enabled
us to gather ordinary citizen's data easily. However, the incompleteness of the
labels and the features in social network datasets is tricky, not to mention
the enormous data size and the heterogeneousity. The data differ dramatically
from many commonly-used datasets, thus brings unique challenges. In our work,
first we built our own datasets from Twitter. Next, we proposed TIMME, a
multi-task multi-relational embedding model, that works efficiently on
sparsely-labeled heterogeneous real-world dataset. It could also handle the
incompleteness of the input features. Experimental results showed that TIMME is
overall better than the state-of-the-art models for ideology detection on
Twitter. Our findings include: links can lead to good classification outcomes
without text; conservative voice is under-represented on Twitter; follow is the
most important relation to predict ideology; retweet and mention enhance a
higher chance of like, etc. Last but not least, TIMME could be extended to
other datasets and tasks in theory.Comment: In proceedings of KDD'20, Applied Data Science Track; 9 pages, 2
supplementary page
Research progress on metabolic syndrome in related skin diseases
Metabolic syndrome is a set of clinical syndromes with dyslipidemia, hypertension, abdominal obesity and insulin resistance as the main manifestations, and is a risk factor for diabetes mellitus and cardiovascular diseases. In recent years, more and more researches on metabolic syndrome and skin diseases have been conducted. In this article, the research progress on metabolic syndrome in the pathogenesis of related skin diseases including psoriasis, acne, hidradenitis suppurativa, acanthosis nigricans, lichen planus and androgenetic alopecia was elucidated, aiming to provide new ideas for the prevention and treatment of metabolic syndrome and related skin diseases
Cell Biomechanical Modeling Based on Membrane Theory with Considering Speed Effect of Microinjection
As an effective method to deliver external materials into biological cells,
microinjection has been widely applied in the biomedical field. However, the
cognition of cell mechanical property is still inadequate, which greatly limits
the efficiency and success rate of injection. Thus, a new rate-dependent
mechanical model based on membrane theory is proposed for the first time. In
this model, an analytical equilibrium equation between the injection force and
cell deformation is established by considering the speed effect of
microinjection. Different from the traditional membrane-theory-based model, the
elastic coefficient of the constitutive material in the proposed model is
modified as a function of the injection velocity and acceleration, effectively
simulating the influence of speeds on the mechanical responses and providing a
more generalized and practical model. Using this model, other mechanical
responses at different speeds can be also accurately predicted, including the
distribution of membrane tension and stress and the deformed shape. To verify
the validity of the model, numerical simulations and experiments are carried
out. The results show that the proposed model can match the real mechanical
responses well at different injection speeds.Comment: 10 pages, 12 figures, submitted to IEEE TMech
Object Level Depth Reconstruction for Category Level 6D Object Pose Estimation From Monocular RGB Image
Recently, RGBD-based category-level 6D object pose estimation has achieved
promising improvement in performance, however, the requirement of depth
information prohibits broader applications. In order to relieve this problem,
this paper proposes a novel approach named Object Level Depth reconstruction
Network (OLD-Net) taking only RGB images as input for category-level 6D object
pose estimation. We propose to directly predict object-level depth from a
monocular RGB image by deforming the category-level shape prior into
object-level depth and the canonical NOCS representation. Two novel modules
named Normalized Global Position Hints (NGPH) and Shape-aware Decoupled Depth
Reconstruction (SDDR) module are introduced to learn high fidelity object-level
depth and delicate shape representations. At last, the 6D object pose is solved
by aligning the predicted canonical representation with the back-projected
object-level depth. Extensive experiments on the challenging CAMERA25 and
REAL275 datasets indicate that our model, though simple, achieves
state-of-the-art performance.Comment: 19 pages, 7 figures, 4 table
- …