3,734 research outputs found

    Numerical and experimental simulation of damaged rock with randomly oriented cracks by shock disturbance

    Get PDF
    The aim of this study is to investigate the effect of shock-disturbed cracks on the dynamic fragmentation of granite. Considering the complex behavior of rock materials, the Walsh’s model was revisited and extended by including the stress effect required to close an initially open crack and examining the unloading process in detail. This analysis leads to closed-form expressions for loading and unloading portions of the effective Young’s modulus, as functions of the crack density, characteristic aspect ratio, and crack friction coefficient. Subsequently, the effective Young’s modulus and cutting force are simulated and the influence of cracks is studied. The analysis results with different crack density and disturbed frequency are compared in terms of effective Young’s modulus and cutting force. Finally, the tool and damaged rock model with randomly oriented cracks by shock disturbed at a different frequency was demonstrated by the test. The good agreement between the simulation results and experimental data demonstrates the validity of the simulation method

    Primer: Fast Private Transformer Inference on Encrypted Data

    Full text link
    It is increasingly important to enable privacy-preserving inference for cloud services based on Transformers. Post-quantum cryptographic techniques, e.g., fully homomorphic encryption (FHE), and multi-party computation (MPC), are popular methods to support private Transformer inference. However, existing works still suffer from prohibitively computational and communicational overhead. In this work, we present, Primer, to enable a fast and accurate Transformer over encrypted data for natural language processing tasks. In particular, Primer is constructed by a hybrid cryptographic protocol optimized for attention-based Transformer models, as well as techniques including computation merge and tokens-first ciphertext packing. Comprehensive experiments on encrypted language modeling show that Primer achieves state-of-the-art accuracy and reduces the inference latency by 90.6% ~ 97.5% over previous methods.Comment: 6 pages, 6 figures, 3 table

    TrojViT: Trojan Insertion in Vision Transformers

    Full text link
    Vision Transformers (ViTs) have demonstrated the state-of-the-art performance in various vision-related tasks. The success of ViTs motivates adversaries to perform backdoor attacks on ViTs. Although the vulnerability of traditional CNNs to backdoor attacks is well-known, backdoor attacks on ViTs are seldom-studied. Compared to CNNs capturing pixel-wise local features by convolutions, ViTs extract global context information through patches and attentions. Na\"ively transplanting CNN-specific backdoor attacks to ViTs yields only a low clean data accuracy and a low attack success rate. In this paper, we propose a stealth and practical ViT-specific backdoor attack TrojViTTrojViT. Rather than an area-wise trigger used by CNN-specific backdoor attacks, TrojViT generates a patch-wise trigger designed to build a Trojan composed of some vulnerable bits on the parameters of a ViT stored in DRAM memory through patch salience ranking and attention-target loss. TrojViT further uses minimum-tuned parameter update to reduce the bit number of the Trojan. Once the attacker inserts the Trojan into the ViT model by flipping the vulnerable bits, the ViT model still produces normal inference accuracy with benign inputs. But when the attacker embeds a trigger into an input, the ViT model is forced to classify the input to a predefined target class. We show that flipping only few vulnerable bits identified by TrojViT on a ViT model using the well-known RowHammer can transform the model into a backdoored one. We perform extensive experiments of multiple datasets on various ViT models. TrojViT can classify 99.64%99.64\% of test images to a target class by flipping 345345 bits on a ViT for ImageNet.Comment: 10 pages, 4 figures, 11 table

    Retro-BLEU: Quantifying Chemical Plausibility of Retrosynthesis Routes through Reaction Template Sequence Analysis

    Full text link
    Computer-assisted methods have emerged as valuable tools for retrosynthesis analysis. However, quantifying the plausibility of generated retrosynthesis routes remains a challenging task. We introduce Retro-BLEU, a statistical metric adapted from the well-established BLEU score in machine translation, to evaluate the plausibility of retrosynthesis routes based on reaction template sequences analysis. We demonstrate the effectiveness of Retro-BLEU by applying it to a diverse set of retrosynthesis routes generated by state-of-the-art algorithms and compare the performance with other evaluation metrics. The results show that Retro-BLEU is capable of differentiating between plausible and implausible routes. Furthermore, we provide insights into the strengths and weaknesses of Retro-BLEU, paving the way for future developments and improvements in this field
    • …
    corecore