A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated Malware Classification
2021
Annual Computer Security Applications Conference
We will present a novel approach of using side channel information to identify the kinds of threats that are targeting the device. ...
Using our approach, a malware analyst is able to obtain precise knowledge about malware type and identity, even in the presence of obfuscation techniques which may prevent static or symbolic binary analysis ...
We thank our colleague Ronan Lashermes who provided hardware and side-channel insights that greatly assisted this work. ...
doi:10.1145/3485832.3485894
fatcat:tqzl6tvwffdvxftflyzzdcyp3u
Artificial Intelligence, Machine Learning and Deep Learning in Ion Channel Bioinformatics
2021
Membranes
Focused research on ion channels and related findings over many decades accumulated huge data which may be utilized in a specialized scientific manner to fast conclude pinpointed aspects of channels. ...
In these focused research areas, the use of artificial intelligence (AI), machine learning (ML), and deep learning (DL) algorithms and associated models have been found very popular. ...
Large-scale potassium channel sequence analysis confirms the requirement of identifying the potassium channel α-subunit proteins [27] . ...
doi:10.3390/membranes11090672
pmid:34564489
fatcat:coprc5dm7bgfdmhudd55tmr7zm
Ultra-Low-Power Design and Hardware Security Using Emerging Technologies for Internet of Things
2017
Electronics
The uses of emerging technologies and lightweight encryption for correlation power analysis against side channel attack, silicon nanowire polymorphic gates, and all-spin logic devices for deception and ...
These include important encryption techniques, side channel attack/defense, logic locking/split manufacturing against reverse-engineering/counterfeiting, and camouflage layout. ...
Acknowledgments: The authors wish to thank Yu Bi for his early contribution on silicon nanowire camouflage, KATAN light-weight encryption and correlation power analysis. ...
doi:10.3390/electronics6030067
fatcat:ozssarlb2ng5pcdsupo2hljyna
Trade-off between Transcriptome Plasticity and Genome Evolution in Cephalopods
2017
Cell
Due to the large number of sites, the surrounding conservation greatly reduces the number of mutations and genomic polymorphisms in protein coding regions. ...
The genomic sequence flanking editing sites is highly conserved, suggesting that the process confers a selective advantage. ...
alike, up to ~100nt on each side of a recoding site. ...
doi:10.1016/j.cell.2017.03.025
pmid:28388405
pmcid:PMC5499236
fatcat:ok5yr2ql2fbbvlti42zw5d2jve
Deep Learning in Information Security
[article]
2018
arXiv
pre-print
Deep Learning is a sub-field of machine learning, which uses models that are composed of multiple layers. ...
Based on an analysis of our reviewed papers, we point out shortcomings of DL-methods to those requirements and discuss further research opportunities. ...
The execution traces are collected unobtrusively via a side channel by an
inexpensive electromagnetic sensor. ...
arXiv:1809.04332v1
fatcat:xfb7lgrkw5cirdl3qvmg3ssnbi
Deep learning-level melanoma detection by interpretable machine learning and imaging biomarker cues
2020
Journal of Biomedical Optics
Deep machine learning approaches to image analysis offer promise but lack the transparency to be widely adopted as stand-alone diagnostics. ...
We aimed to create a transparent machine learning technology (i.e., not deep learning) to discriminate melanomas from nevi in dermoscopy images and an interface for sensory cue integration. ...
Acknowledgments The authors would like to acknowledge Sarah Yagerman, who was involved on the initial study (Ref. ...
doi:10.1117/1.jbo.25.11.112906
pmid:33247560
pmcid:PMC7702097
fatcat:6zs6qwprvjh5dcwhnxh36pjeai
Opportunities and obstacles for deep learning in biology and medicine
2018
Journal of the Royal Society Interface
Deep learning describes a class of machine learning algorithms that are capable of combining raw inputs into layers of intermediate features. ...
We examine applications of deep learning to a variety of biomedical problems-patient classification, fundamental biological processes and treatment of patients-and discuss whether deep learning will be ...
We gratefully acknowledge Christof Angermueller, Kumardeep Chaudhary, Gö kcen Eraslan, Mikael Huss, Bharath Ramsundar and Xun Zhu for their discussion of the manuscript and reviewed papers on GitHub. ...
doi:10.1098/rsif.2017.0387
pmid:29618526
pmcid:PMC5938574
fatcat:65o4xmp53nc6zmj37srzuht6tq
DNA-graphene interactions during translocation through nanogaps
2017
PLoS ONE
We study how double-stranded DNA translocates through graphene nanogaps. Nanogaps are fabricated with a novel capillary-force induced graphene nanogap formation technique. ...
We also observe exponentially relaxing current traces. We suggest that slow relaxation of the graphene membrane following DNA translocation may be responsible. ...
We thank Cees Dekker and Greg Schneider for useful discussions and their hospitality while helping us learn their wedge-transfer technique.
Visualization: HWChP. Writing -original draft: HNP HWChP. ...
doi:10.1371/journal.pone.0171505
pmid:28158244
pmcid:PMC5291421
fatcat:afmk3tntdrejhel55334vcayiq
MBTree: Detecting Encryption RAT Communication Using Malicious Behavior Tree
[article]
2020
arXiv
pre-print
These traces are reorganized in a sophisticated manner with other available datasets for a comprehensive assessment. ...
A key challenge for cybersecurity defense is to detect the encrypted Remote Control Trojan (RAT) communication traces. ...
The experiment results have shown the effectiveness of the combination of side-channel features and machine learning models. Besides, advanced deep learning models are also adopted in this area. ...
arXiv:2006.10196v2
fatcat:dt2cix5jvzepjaczzxhgd5nm7y
Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection
2020
IEEE Access
Next, we present the bird's eye view portraying the main development trends in detection methods with a special emphasis on the machine learning techniques. ...
That is why, in this paper we first perform a detailed meta-review of the existing surveys related to malware and its detection techniques, showing an arms race between these two sides of a barricade. ...
In a recent survey [14] , the authors reviewed some new dynamic analysis techniques (function call analysis, flow tracking, volatile memory forensics, and side-channel analysis, just to mention some) ...
doi:10.1109/access.2020.3048319
fatcat:tatdk6pzczgp3aylvbxoxabuta
Toward the End-to-End Optimization of Particle Physics Instruments with Differentiable Programming: a White Paper
[article]
2022
arXiv
pre-print
pipeline and the use of deep learning techniques may allow the simultaneous optimization of all design parameters. ...
The full optimization of the design and operation of instruments whose functioning relies on the interaction of radiation with matter is a super-human task, given the large dimensionality of the space ...
Acknowledgements We wish to thank all the participants of the first MODE workshop on differentiable programming that took place in Louvain-la-Neuve (Belgium) from 6 to 8 September 2021, for the fruitful ...
arXiv:2203.13818v1
fatcat:omwufbmervgjdmksu5scwld52q
Anti-VEGF Therapy for Neovascular AMD and Polypoidal Choroidal Vasculopathy
2017
Asia-Pacific Journal of Ophthalmology
Abstract: During the past decade, drugs that inhibit the actions of vascular endothelial growth factor (VEGF) have become standard-of-care treatment for a variety of chorioretinal vascular conditions. ...
Importantly, 2 large multicenter randomized clinical trials evaluating the safety and efficacy of anti-VEGF monotherapy and combination with photodynamic therapy (PDT) have recently reported initial first-year ...
The questionnaire difficulty was rated on a qualitative scale. Patients were asked to think aloud while providing their judgments. ...
doi:10.22608/apo.2017260
pmid:28971633
fatcat:ryihmagemzayzfemrdxfdwgkw4
Toward Engineering a Secure Android Ecosystem
2016
ACM Computing Surveys
Based on our collection of knowledge, we envision a blueprint for engineering a secure, next-generation Android ecosystem. ...
We organize the most recent security research on the Android platform into two categories: the software stack and the ecosystem. ...
A general problem in the reseach of hardware-based side channels is the lack of end-to-end practical attack cases. ...
doi:10.1145/2963145
fatcat:d5vhxpdywrevvbh4as6vvt576q
Poster Session III-Wednesday
2013
Neuropsychopharmacology
Although it is a highly heritable disease, a picture of the genetics is only now emerging from large-scale studies that is nowhere near complete. ...
with the Apathy Evaluation Scale (AES), and depression with the Calgary Depression Scale for Schizophrenia (CDSS). ...
This was an informatics analysis that did not involve the new use of mice or protocol approval. Twenty-three tract-tracing cases were selected that represented projections from multiple areas. ...
doi:10.1038/npp.2013.281
fatcat:n2o3tllrsrbyxgzsfwzhl5psua
Effects of errorless learning on the acquisition of velopharyngeal movement control
2012
Journal of the Acoustical Society of America
A method for an optimal selection of frequencies in the smoothing process for the case of one reflection is presented, followed by formulations for smoothing in the more general case. ...
Language learning and the developing brain: Cross-cultural studies unravel the effects of biology and culture. ...
Noise and ASA Committee on Standards: Annoyance and Health Effects I 1aNSb1. A large scale study of the health effects of transportation noise in Hong Kong. ...
doi:10.1121/1.4708235
fatcat:7wzupz5u2nd6nc7ttvbpxwvunm
« Previous
Showing results 1 — 15 out of 800 results