684 research outputs found

    Crystal structure and electronic structure of quaternary semiconductors Cu2_2ZnTiSe4_4 and Cu2_2ZnTiS4_4 for solar cell absorber

    Full text link
    We design two new I2-II-IV-VI4 quaternary semiconductors Cu2_2ZnTiSe4_4 and Cu2_2ZnTiS4_4, and systematically study the crystal and electronic structure by employing first-principles electronic structure calculations. Among the considered crystal structures, it is confirmed that the band gaps of Cu2_2ZnTiSe4_4 and Cu2_2ZnTiS4_4 originate from the full occupied Cu 3dd valence band and unoccupied Ti 3dd conducting band, and kesterite structure should be the ground state. Furthermore, our calculations indicate that Cu2_2ZnTiSe4_4 and Cu2_2ZnTiS4_4 have comparable band gaps with Cu2_2ZnTSe4_4 and Cu2_2ZnTS4_4, but almost twice larger absorption coefficient α(ω)\alpha(\omega). Thus, the materials are expected to be candidate materials for solar cell absorber.Comment: 4 pages, 4 figure

    Structure Evaluation of AES-like Ciphers against Mixture Differential Cryptanalysis

    Get PDF
    In ASIACRYPT 2017, Rønjom et al. analyzed AES with yoyo attack. Inspired by their 4-round AES distinguisher, Grassi proposed the mixture differential cryptanalysis as well as a key recovery attack on 5-round AES, which was shown to be better than the classical square attack in computation complexity. After that, Bardeh et al. combined the exchange attack with the 4-round mixture differential distinguisher of AES, leading to the first secret-key chosen plaintext distinguisher for 6-round AES. Unlike the attack on 5-round AES, the result of 6-round key-recovery attack on AES has extremely large complexity, which implies the weakness of mixture difference to a certain extent. Our work aims at evaluating the security of AES-like ciphers against mixture differential cryptanalysis. We propose a new structure called a boomerang struncture and illustrate that a differential distinguisher of a boomerang struncture just corresponds to a mixture differential distinguisher for AES-like ciphers. Based on the boomerang structure, it is shown that the mixture differential cryptanalysis is not suitable to be applied to AES-like ciphers with high round number. In specific, we associate the primitive index with our framework built on the boomerang structure and give the upper bound for the length of mixture differentials with probability 1 on AES-like ciphers. It can be directly deduced from our framework that there is no mixture differential distinguisher for 6-round AES

    Improved Distinguisher Search Techniques Based on Parity Sets

    Get PDF
    Division property is a distinguishing property against block ciphers proposed by Todo at EUROCRYPT 2015. To give a new approach to division property, Christina et al. proposed a new notion called the parity set at CRYPTO 2016. Using parity sets, they successfully took further properties of S-boxes and linear layers into account and found improved distinguishers against PRESENT. However, the time and memory complexities to compute parity sets are expensive. In this paper, we introduce the idea of meet-in-the-middle to the integral distinguisher search along with a variety of techniques to reduce computation complexity. As a result, we obtain a new distinguisher against 9-round PRESENT which has 22 balanced bits

    SAME: Sample Reconstruction against Model Extraction Attacks

    Full text link
    While deep learning models have shown significant performance across various domains, their deployment needs extensive resources and advanced computing infrastructure. As a solution, Machine Learning as a Service (MLaaS) has emerged, lowering the barriers for users to release or productize their deep learning models. However, previous studies have highlighted potential privacy and security concerns associated with MLaaS, and one primary threat is model extraction attacks. To address this, there are many defense solutions but they suffer from unrealistic assumptions and generalization issues, making them less practical for reliable protection. Driven by these limitations, we introduce a novel defense mechanism, SAME, based on the concept of sample reconstruction. This strategy imposes minimal prerequisites on the defender's capabilities, eliminating the need for auxiliary Out-of-Distribution (OOD) datasets, user query history, white-box model access, and additional intervention during model training. It is compatible with existing active defense methods. Our extensive experiments corroborate the superior efficacy of SAME over state-of-the-art solutions. Our code is available at https://github.com/xythink/SAME.Comment: Accepted by AAAI 202

    Control of astrocyte progenitor specification, migration and maturation by Nkx6.1 homeodomain transcription factor.

    Get PDF
    Although astrocytes are the most abundant cell type in the central nervous system (CNS), little is known about their molecular specification and differentiation. It has previously been reported that transcription factor Nkx6.1 is expressed in neuroepithelial cells that give rise to astrocyte precursors in the ventral spinal cord. In the present study, we systematically investigated the function of Nkx6.1 in astrocyte development using both conventional and conditional Nkx6.1 mutant mice. At early postnatal stages, Nkx6.1 was expressed in a subpopulation of astrocytes in the ventral spinal cord. In the conventional Nkx6.1KO spinal cord, the initial specification of astrocyte progenitors was affected by the mutation, and subsequent migration and differentiation were disrupted in newborn mice. In addition, the development of VA2 subtype astrocytes was also inhibited in the white matter. Further studies with Nkx6.1 conditional mutants revealed significantly delayed differentiation and disorganized arrangement of fibrous astrocytes in the ventral white matter. Together, our studies indicate that Nkx6.1 plays a vital role in astrocyte specification and differentiation in the ventral spinal cord

    Recipient Outcomes after ABO-Incompatible Liver Transplantation: A Systematic Review and Meta-Analysis

    Get PDF
    BACKGROUND: ABO-incompatible live transplantation (ILT) is not occasionally performed due to a relative high risk of graft failure. Knowledge of both graft and patient survival rate after ILT is essential for donor selection and therapeutic strategy. We systematically reviewed studies containing outcomes after ILT compared to that after ABO-compatible liver transplantation (CLT). METHODOLOGY/PRINCIPAL FINDINGS: We carried out a comprehensive search strategy on MEDLINE (1966-July 2010), EMBASE (1980-July 2010), Biosis Preview (1969-July 2010), Science Citation Index (1981-July 2010), Cochrane Database of Systematic Reviews (Cochrane Library, issue 7, 2010) and the National Institute of Health (July 2010). Two reviewers independently assessed the quality of each study and abstracted outcome data. Fourteen eligible studies were included which came from various medical centers all over the world. Meta-analysis results showed that no significantly statistical difference was found in pediatric graft survival rate, pediatric and adult patient survival rate between ILT and CLT group. In adult subgroup, the graft survival rate after ILT was significantly lower than that after CLT. The value of totally pooled OR was 0.64 (0.55, 0.74), 0.92 (0.62, 1.38) for graft survival rate and patient survival rate respectively. The whole complication incidence (including acute rejection and biliary complication) after ILT was higher than that after CLT, as the value of totally pooled OR was 3.02 (1.33, 6.85). Similarly, in acute rejection subgroup, the value of OR was 2.02 (1.01, 4.02). However, it was 4.08 (0.90, 18.51) in biliary complication subgroup. CONCLUSIONS/SIGNIFICANCE: In our view, pediatric ILT has not been a contraindication anymore due to a similar graft and patient survival rate between ILT and CLT group. Though adult graft survival rate is not so satisfactory, ILT is undoubtedly life-saving under exigent condition. Most studies included in our analysis are observational researches. Larger scale of researches and Randomized-Control Studies are still needed

    LSTM Learning with Bayesian and Gaussian Processing for Anomaly Detection in Industrial IoT

    Get PDF
    The data generated by millions of sensors in Industrial Internet of Things (IIoT) is extremely dynamic, heterogeneous, and large scale. It poses great challenges on the real-time analysis and decision making for anomaly detection in IIoT. In this paper, we propose a LSTM-Gauss-NBayes method, which is a synergy of the long short-term memory neural network (LSTM-NN) and the Gaussian Bayes model for outlier detection in IIoT. In a nutshell, the LSTM-NN builds model on normal time series. It detects outliers by utilising the predictive error for the Gaussian Naive Bayes model. Our method exploits advantages of both LSTM and Gaussian Naive Bayes models, which not only has strong prediction capability of LSTM for future time point data, but also achieves an excellent classification performance of Gaussian Naive Bayes model through the predictive error. Empirical studies demonstrate our solution outperforms the best-known competitors, which is a preferable choice for detecting anomalies
    • …
    corecore