Uncovering noisy social signals: Using optimization methods from experimental physics to study social phenomena. [PDF]
Due to the ubiquitous presence of treatment heterogeneity, measurement error, and contextual confounders, numerous social phenomena are hard to study. Precise control of treatment variables and possible confounders is often key to the success of studies ...
Maurits Kaptein+2 more
doaj +1 more source
Exploiting Logic Locking for a Neural Trojan Attack on Machine Learning Accelerators [PDF]
Logic locking has been proposed to safeguard intellectual property (IP) during chip fabrication. Logic locking techniques protect hardware IP by making a subset of combinational modules in a design dependent on a secret key that is withheld from untrusted parties.
arxiv
Portable appliance security apparatus [PDF]
An apparatus for securing a small computer, or other portable appliance, against theft is described. It is comprised of a case having an open back through which the computer is installed or removed. Guide members in the form of slots are formed in a rear
Kerley, J. J.
core +1 more source
HOLL: Program Synthesis for Higher OrderLogic Locking [PDF]
Logic locking "hides" the functionality of a digital circuit to protect it from counterfeiting, piracy, and malicious design modifications. The original design is transformed into a "locked" design such that the circuit reveals its correct functionality only when it is "unlocked" with a secret sequence of bits--the key bit-string.
arxiv
Opening up public data should be an urgent priority for the government and could lead to considerable economic benefits [PDF]
There is no longer a reasonable justification for keeping publicly funded data under lock and key. With the government ostensibly committed to transparency, Chris Yiu argues that opening up public data is a must, and could have solid economic and ...
Yiu, Chris
core
From Lock Freedom to Progress Using Session Types [PDF]
Inspired by Kobayashi's type system for lock freedom, we define a behavioral type system for ensuring progress in a language of binary sessions. The key idea is to annotate actions in session types with priorities representing the urgency with which such
Padovani, Luca
core +3 more sources
Solvent fluctuations induce non-Markovian kinetics in hydrophobic pocket-ligand binding
We investigate the impact of water fluctuations on the key-lock association kinetics of a hydrophobic ligand (key) binding to a hydrophobic pocket (lock) by means of a minimalistic stochastic model system.
Dzubiella, Joachim+2 more
core +1 more source
Experimentally realizable quantum comparison of coherent states and its applications [PDF]
When comparing quantum states to each other, it is possible to obtain an unambiguous answer, indicating that the states are definitely different, already after a single measurement. In this paper we investigate comparison of coherent states, which is the
B. Schneier+11 more
core +2 more sources
Exploiting the Lock: Leveraging MiG-V's Logic Locking for Secret-Data Extraction [PDF]
The MiG-V was designed for high-security applications and is the first commercially available logic-locked RISC-V processor on the market. In this context logic locking was used to protect the RISC-V processor design during the untrusted manufacturing process by using key-driven logic gates to obfuscate the original design. Although this method defends
arxiv +1 more source
ISGylation – a key to lock the cell gates for preventing the spread of threats
Interferon stimulated gene 15 (ISG15) is an ubiquitin-like protein whose expression and conjugation to targets (ISGylation) is induced by infection, interferon (IFN)-α and -β, ischemia, DNA damage and aging.
Carolina Villarroya-Beltri+2 more
semanticscholar +1 more source