DolphinAttacks (i.e., inaudible voice commands) modulate audible voices over ultrasounds to inject malicious commands silently into voice assistants and manipulate controlled systems (e.g., doors or smart speakers). E...
详细信息
DolphinAttacks (i.e., inaudible voice commands) modulate audible voices over ultrasounds to inject malicious commands silently into voice assistants and manipulate controlled systems (e.g., doors or smart speakers). Eliminating DolphinAttacks is challenging if ever possible since it requires to modify the microphone hardware. In this paper, we design EarArray, a lightweight method that can not only detect such attacks but also identify the direction of attackers without requiring any extra hardware or hardware modification. Essentially, inaudible voice commands are modulated on ultrasounds that inherently attenuate faster than the one of audible sounds. By inspecting the command sound signals via the built-in multiple microphones on smart devices, EarArray is able to estimate the attenuation rate and thus detect the attacks. We propose a model of the propagation of audible sounds and ultrasounds from the sound source to a voice assistant, e.g., a smart speaker, and illustrate the underlying principle and its feasibility. We implemented EarArray using two specially-designed microphone arrays and our experiments show that EarArray can detect inaudible voice commands with an accuracy of above 99% and recognize the direction of the attackers with an accuracy of 97.89% and can also detect the laser-based attack with an accuracy of 100%. IEEE
In this study,we systematically investigate collider constraints on effective interactions between Dark Matter(DM)particles and electroweak gauge *** consider the simplified models in which scalar or Dirac fermion DM ...
详细信息
In this study,we systematically investigate collider constraints on effective interactions between Dark Matter(DM)particles and electroweak gauge *** consider the simplified models in which scalar or Dirac fermion DM candidates couple only to electro weak gauge bosons through high dimensional effective *** the induced DM-quarks and DM-gluons operators from the Renormalization Group Evolution(RGE)running effect,we present comprehensive constraints on the effective energy scaleΛand Wilson coefficients CB(Λ),CW(Λ)from direct detection,indirect detection,and collider *** particular,we present the corresponding sensitivity from the Large Hadron Electron Collider(LHeC)and Future Circular Collider in the electronproton mode(FCC-ep)for the first time,update the mono-j and mono-γsearch limits at the Large Hadron Collider(LHC),and derive the new limits at the Circular Electron Positron Collider(CEPC).
Ship detection using synthetic aperture radar(SAR)plays an important role in marine *** existing methods are capable of quickly obtaining many candidate targets,but numerous non-ship objects may be wrongly detected in...
详细信息
Ship detection using synthetic aperture radar(SAR)plays an important role in marine *** existing methods are capable of quickly obtaining many candidate targets,but numerous non-ship objects may be wrongly detected in complex *** non-ship false alarms can be excluded by training discriminators,and the desired accuracy is obtained with enough verified ***,the reliable verification of targets in large-scene SAR images still inevitably requires manual interpretation,which is difficult and time *** address this issue,a semisupervised heterogeneous ensemble ship target discrimination method based on a tri-training scheme is proposed to take advantage of the plentiful candidate ***,various features commonly used in SAR image target discrimination are extracted,and several acknowledged classification models and their classic variants are *** discriminators are constructed by dividing these features into different groups and pairing them with each ***,the performance of all the discriminators is tested,and better discriminators are selected for implementing the semisupervised training *** strategies enhance the diversity and reliability of the discriminators,and their heterogeneous ensemble makes more correct judgments on candidate targets,which facilitates further positive *** results demonstrate that the proposed method outperforms traditional tritraining.
computer-generated aesthetic patterns arewidely used as design materials in various fields. Themost common methods use fractals or dynamicalsystems as basic tools to create various patterns. Toenhance aesthetics and c...
详细信息
computer-generated aesthetic patterns arewidely used as design materials in various fields. Themost common methods use fractals or dynamicalsystems as basic tools to create various patterns. Toenhance aesthetics and controllability, some researchershave introduced symmetric layouts along with thesetools. One popular strategy employs dynamical systemscompatible with symmetries that construct functionswith the desired symmetries. However, these aretypically confined to simple planar symmetries. Theother generates symmetrical patterns under theconstraints of tilings. Although it is slightly moreflexible, it is restricted to small ranges of tilingsand lacks textural variations. Thus, we proposed anew approach for generating aesthetic patterns bysymmetrizing quasi-regular patterns using general kuniformtilings. We adopted a unified strategy toconstruct invariant mappings for k-uniform tilings thatcan eliminate texture seams across the tiling ***, we constructed three types of symmetriesassociated with the patterns: dihedral, rotational, andreflection symmetries. The proposed method can beeasily implemented using GPU shaders and is highlyefficient and suitable for complicated tiling with regularpolygons. Experiments demonstrated the advantages of our method over state-of-the-art methods in terms offlexibility in controlling the generation of patterns withvarious parameters as well as the diversity of texturesand styles.
The design of the heuristic function in Petri-net-based A* search significantly impacts the efficiency and result quality of scheduling robotic cellular manufacturing (RCM) systems. Previous work in such designs lacks...
详细信息
Android malware poses a significant challenge for mobile platforms. To evade detection, contemporary malware variants use API substitution or obfuscation techniques to hide malicious activities and mask their shallow ...
详细信息
Endowing flexible and adaptable fiber devices with light-emitting capabilities has the potential to revolutionize the current design philosophy of intelligent,wearable interactive ***,significant challenges remain in ...
详细信息
Endowing flexible and adaptable fiber devices with light-emitting capabilities has the potential to revolutionize the current design philosophy of intelligent,wearable interactive ***,significant challenges remain in developing fiber devices when it comes to achieving uniform and customizable light effects while utilizing lightweight ***,we introduce a mass-produced,wearable,and interactive photochromic fiber that provides uniform multicolored light *** designed independent waveguides inside the fiber to maintain total internal reflection of light as it traverses the *** impact of excessive light leakage on the overall illuminance can be reduced by utilizing the saturable absorption effect of fluorescent materials to ensure light emission uniformity along the transmission *** addition,we coupled various fluorescent composite materials inside the fiber to achieve artificially controllable spectral radiation of multiple color systems in a single *** prepared fibers on mass-produced kilometer-long using the thermal drawing *** fibers can be directly integrated into daily wearable devices or clothing in various patterns and combined with other signal input components to control and display patterns as *** work provides a new perspective and inspiration to the existing field of fiber display interaction,paving the way for future human–machine integration.
It is well-known that counting formal concepts in a formal context is a challenging #P-complete problem. To determine the expected number of formal concepts in a formal context, we consider a random formal context, wh...
详细信息
The cloud computing technology has emerged,developed,and matured in recent years,consequently commercializing remote outsourcing storage *** increasing number of companies and individuals have chosen the cloud to stor...
详细信息
The cloud computing technology has emerged,developed,and matured in recent years,consequently commercializing remote outsourcing storage *** increasing number of companies and individuals have chosen the cloud to store their ***,accidents,such as cloud server downtime,cloud data loss,and accidental deletion,are serious issues for some applications that need to run around the *** some mission and business-critical applications,the continuous availability of outsourcing storage services is also necessary to protect users'outsourced data during ***,ensuring the continuous availability of data in public cloud data integrity auditing protocols leads to data privacy issues because auditors can obtain the data content of users by a sufficient number of storage ***,protecting data privacy is a burning *** addition,existing data integrity auditing schemes that rely on semi-trusted third-party auditors have several security problems,including single points of failure and performance *** deal with these issues,we propose herein a blockchain-based continuous data integrity checking protocol with zero-knowledge privacy *** realize a concrete construction by using a verifiable delay function with high efficiency and proof of retrievability,and prove the security of the proposal in a random oracle *** proposed construction supports dynamic updates for the outsourced *** also design smart contracts to ensure fairness among the parties ***,we implement the protocols,and the experimental results demonstrate the efficiency of the proposed protocol.
Accurate identification of plant diseases is critical for the sustainability and efficiency of agricultural production. Traditional image recognition models have limitations in fine-grained disease feature extraction,...
详细信息
暂无评论