Last 7 days
![]() Nguyen, Kha Hung ![]() ![]() ![]() in International ITG 26th Workshop on Smart Antennas (WSA), Braunschweig, Germany, 27 Feb - 03 Mar 2023. (2023) Detailed reference viewed: 27 (0 UL)![]() Mejri, Nesryne ![]() ![]() ![]() in IEEE International Conference on Acoustics, Speech and Signal Processing. Proceedings (2023) This paper introduces a novel framework for unsupervised type-agnostic deepfake detection called UNTAG. Existing methods are generally trained in a supervised manner at the classification level, focusing ... [more ▼] This paper introduces a novel framework for unsupervised type-agnostic deepfake detection called UNTAG. Existing methods are generally trained in a supervised manner at the classification level, focusing on detecting at most two types of forgeries; thus, limiting their generalization capability across different deepfake types. To handle that, we reformulate the deepfake detection problem as a one-class classification supported by a self-supervision mechanism. Our intuition is that by estimating the distribution of real data in a discriminative feature space, deepfakes can be detected as outliers regardless of their type. UNTAG involves two sequential steps. First, deep representations are learned based on a self-supervised pretext task focusing on manipulated regions. Second, a one-class classifier fitted on authentic image embeddings is used to detect deepfakes. The results reported on several datasets show the effectiveness of UNTAG and the relevance of the proposed new paradigm. The code is publicly available. [less ▲] Detailed reference viewed: 60 (7 UL)![]() Dalle Lucca Tosi, Mauro ![]() ![]() E-print/Working paper (2023) Detailed reference viewed: 27 (5 UL)![]() Ratti, Luca ![]() in Nicod, Cécile; Miranda Boto, José Maria; Brameshuber, Elisabeth (Eds.) et al Négociation collective et plateformes numériques (2023) Detailed reference viewed: 46 (0 UL)![]() Carr, Constance ![]() ![]() Presentation (2023) Detailed reference viewed: 44 (2 UL)![]() ; Hirschmann, Mirko ![]() in Journal of Business Venturing Insights (2023), e00376 Research and public interest on economic inequality have grown over the last years. Family firms and the concentration of wealth and power in the hands of a few wealthy entrepreneurial families have been ... [more ▼] Research and public interest on economic inequality have grown over the last years. Family firms and the concentration of wealth and power in the hands of a few wealthy entrepreneurial families have been discussed as both a cause and a consequence of economic inequality. Yet, so far, we lack knowledge about the relationship between economic inequality and the prevalence of family firms in an economy. Our study investigates how the share of family-controlled public firms correlates with various measures of income and wealth inequality. The results show that a higher share of public family-controlled firms leads to more income inequality in a country. This effect is particularly pronounced for the middle of the income distribution as opposed to the top quantiles. Redistribution only mitigates this effect to some extent, as the effect is significant for market income and disposable income. We also find that a higher share of family-controlled firms contributes to an increase in wealth inequality. Our results are of economic relevance as, for instance, a one standard deviation change in the share of family-controlled firms leads to an increase of around 1.3–1.5 percentage points in the Gini coefficients for market income, disposable income, and wealth. [less ▲] Detailed reference viewed: 30 (0 UL)![]() Chen, Li ![]() ![]() in International Journal of Solids and Structures (2023), 269 Steel wire ropes are used for numerous industrial applications such as ships, elevators, cranes and bridges. A wire rope consists of numerous thin, steel wires and its geometrical construction can be ... [more ▼] Steel wire ropes are used for numerous industrial applications such as ships, elevators, cranes and bridges. A wire rope consists of numerous thin, steel wires and its geometrical construction can be explained in two steps. First, several wires are wrapped together in a helical shape called a strand. Second, several strands are wrapped together in a helical shape to form the final wire rope. In most cases, each strand is compacted before they are wrapped together to form the final wire rope. Compaction generally reduces contact stresses and thereby, extends ropes’ service life. Not many models have been proposed to predict the compaction process and its influence on the strand’s mechanical behavior during service. This contribution proposes a computationally efficient approach that consists of two elastoplastic mechanical models. The first model, describing the compaction process, is of a 2D plane strain nature and is therefore fast. Subsequently, the 2D geometry and plastic variables predicted by the compaction model are used to generate the initial geometry and initial plastic state of a 3D model, that is subsequently used to describe the strand’s mechanical behavior during service (we limit ourselves to tension). The results of the approach, with and without the mapping of the plastic variables, are compared to experimental measurements and the results without compaction. This is investigated for two real world strands. [less ▲] Detailed reference viewed: 69 (0 UL)![]() ; ; et al in Journal for immunotherapy of cancer (2023), 11(3), BACKGROUND: Loss of Ambra1 (autophagy and beclin 1 regulator 1), a multifunctional scaffold protein, promotes the formation of nevi and contributes to several phases of melanoma development. The ... [more ▼] BACKGROUND: Loss of Ambra1 (autophagy and beclin 1 regulator 1), a multifunctional scaffold protein, promotes the formation of nevi and contributes to several phases of melanoma development. The suppressive functions of Ambra1 in melanoma are mediated by negative regulation of cell proliferation and invasion; however, evidence suggests that loss of Ambra1 may also affect the melanoma microenvironment. Here, we investigate the possible impact of Ambra1 on antitumor immunity and response to immunotherapy. METHODS: This study was performed using an Ambra1-depleted Braf(V600E) /Pten(-/) (-) genetically engineered mouse (GEM) model of melanoma, as well as GEM-derived allografts of Braf(V600E) /Pten(-/) (-) and Braf(V600E) /Pten(-/) (-)/Cdkn2a(-/) (-) tumors with Ambra1 knockdown. The effects of Ambra1 loss on the tumor immune microenvironment (TIME) were analyzed using NanoString technology, multiplex immunohistochemistry, and flow cytometry. Transcriptome and CIBERSORT digital cytometry analyses of murine melanoma samples and human melanoma patients (The Cancer Genome Atlas) were applied to determine the immune cell populations in null or low-expressing AMBRA1 melanoma. The contribution of Ambra1 on T-cell migration was evaluated using a cytokine array and flow cytometry. Tumor growth kinetics and overall survival analysis in Braf(V600E) /Pten(-/) (-)/Cdkn2a(-/) (-) mice with Ambra1 knockdown were evaluated prior to and after administration of a programmed cell death protein-1 (PD-1) inhibitor. RESULTS: Loss of Ambra1 was associated with altered expression of a wide range of cytokines and chemokines as well as decreased infiltration of tumors by regulatory T cells, a subpopulation of T cells with potent immune-suppressive properties. These changes in TIME composition were associated with the autophagic function of Ambra1. In the Braf(V600E) /Pten(-/) (-)/Cdkn2a(-/) (-) model inherently resistant to immune checkpoint blockade, knockdown of Ambra1 led to accelerated tumor growth and reduced overall survival, but at the same time conferred sensitivity to anti-PD-1 treatment. CONCLUSIONS: This study shows that loss of Ambra1 affects the TIME and the antitumor immune response in melanoma, highlighting new functions of Ambra1 in the regulation of melanoma biology. [less ▲] Detailed reference viewed: 46 (1 UL)![]() Darlik, Fateme ![]() ![]() in Results in Engineering (2023), 17 The motion of particles in the moving grate combustion chamber is used as the case study. These problems are categorized as particle-fluid problems. They are typically solved using Lagrangian-Eulerian ... [more ▼] The motion of particles in the moving grate combustion chamber is used as the case study. These problems are categorized as particle-fluid problems. They are typically solved using Lagrangian-Eulerian methods, one of which is the coupling between the discrete element method (DEM, which is applied to the particles phase) and the computational fluid dynamics method (CFD, which is applied to the fluid phase). The current study's objective is to avoid coupling and instead, focusing on using the CFD method only. There are dense piles of particles moving on the grates in the biomass combustion chamber. We assumed the dense particles' behaviors similar to the fluid, and then, applied the fluid governing equations to the particles phase. The virtual fields of the velocities, pressure and density are specified for the particles' phase. Afterward, the physics-informed neural network (PINN) is used to reconstruct particles' fields and additionally to investigate the capability of the predicted fields to satisfy the fluid governing equations. This model has the benefit of reconstructing the particles' fields without the need for boundaries and initial conditions. The precision of the model is assessed by comparing the test data set with the exact data obtained from the eXtended discrete element method (XDEM is an in-house software). It is demonstrated that the trained neural network delivered high accuracy and is capable of predicting all outputs with an error value of less than 2 percent. Additionally, to choose the optimum architecture for the neural network, the effect of the number of hidden layers and neurons is studied. [less ▲] Detailed reference viewed: 40 (2 UL)![]() ; Ligeti, Katalin ![]() ![]() Book published by Eleven (2023) Detailed reference viewed: 52 (0 UL)![]() Temperoni, Alessandro ![]() ![]() ![]() in Proceedings of the 6th Joint International Conference on Data Science Management of Data (10th ACM IKDD CODS and 28th COMAD) (2023) Detailed reference viewed: 36 (8 UL)![]() Högenauer, Anna-Lena ![]() in Christiansen, Thomas; Griglio, Elena; Lupo, Nicola (Eds.) The Routledge Hanbook of Parliamentary Administrations (2023) Detailed reference viewed: 19 (0 UL)![]() Högenauer, Anna-Lena ![]() in Christiansen, Thomas; Griglio, Elena; Lupo, Nicola (Eds.) The Routledge Hanbook of Parliamentary Administrations (2023) Detailed reference viewed: 15 (0 UL)![]() ; Tosza, Stanislaw ![]() in Luchtman, Michiel; Ligeti, Katalin; Tosza, Stanislaw (Eds.) Of swords and shields: due process and crime control in times of globalization - Liber amicorum prof. dr. J.A.E. Vervaele (2023) Detailed reference viewed: 50 (1 UL)![]() ; ; et al in IEEE Transactions on Vehicular Technology (2023) The Controller Area Network (CAN) dominates in-vehicle networking systems in modern vehicles. CAN was designed with low-latency and reliability as key features. Authenticity of a CAN frame was not ... [more ▼] The Controller Area Network (CAN) dominates in-vehicle networking systems in modern vehicles. CAN was designed with low-latency and reliability as key features. Authenticity of a CAN frame was not considered in the design, thus, most in-vehicle network nodes inherently trust received messages as coming from a legitimate source. As a result, it is trivial to program (or hack) a network node to spoof traffic. Authentication is challenging for CAN and related protocols, such as SAE J1939, due to limited frame sizes and high bus utilization. Adding a message authentication code (MAC) as a separate message can unduly stress the real-time delivery of safety-critical messages. Although this stressor is well-known, the impact of authentication protocols on real-time message delivery in CAN has not yet been thoroughly examined. In this paper, we provide the first comprehensive analysis of realtime schedulability analysis applied to authentication schemes for CAN, CAN Flexible Data-rate (CAN FD), and CAN extra long payload (CAN XL). We formulate the response time analysis for addition of MACs and periodic transmission of MACs, and we examine their impact on two case studies and through evaluation with randomized schedulability experiments over a wide range of message sets. [less ▲] Detailed reference viewed: 54 (0 UL)![]() ![]() ; ; et al Scientific Conference (2023) Ensuring the data integrity of messages transmitted over the Controller Area Network (CAN) bus and other vehicular networks is achieved through the implementation of cryptographic authentication protocols ... [more ▼] Ensuring the data integrity of messages transmitted over the Controller Area Network (CAN) bus and other vehicular networks is achieved through the implementation of cryptographic authentication protocols. However, these protocols raise concerns about a significant increase in response time due to the restrictions on CAN frame size and bandwidth. This paper presents a comprehensive analysis of the impact on response time of CAN and CAN Flexible Data-rate (CAN FD) messages with the implementation of cryptographic message authentication codes (MACs) and the periodic transmission of these codes. Our evaluation is based on a randomized schedulability experiment to provide insights into the overhead incurred by adding authentication to the frame payloads. [less ▲] Detailed reference viewed: 70 (0 UL)![]() ; Aleksic, Gabrijela ![]() in Human Arenas (2023) Homophobic stigmas and the discrimination of homosexual people are still worrying in today’s society. The current study seeks to investigate kindergarten children’s attitudes towards homosexuality and how ... [more ▼] Homophobic stigmas and the discrimination of homosexual people are still worrying in today’s society. The current study seeks to investigate kindergarten children’s attitudes towards homosexuality and how they are influenced by their peer-groups and authorities. It does so by means of a puppet theatre presentation including ‘Kasperl’ and ‘Seppel’ puppets as the main protagonists in a German puppet theatre. The audience consisted of six German kindergarten children aged 4–6 years, randomly selected by the kindergarten director. A participant observation has been conducted with the first researcher as the presenter of the puppet show. The results of the recorded puppet theatre showed that several intragroup processes including the social identity theory with regard to group membership could be observed within the puppet theatre. Groups have been formed and children of the same ingroup showed equal attitudes towards homosexuality. However, the researcher’s influence as an authority figure could have as well impacted their attitudes through positive reinforcement. The present study contributed to the gap in research regarding kindergarten children’s attitudes towards homosexuality. To have a better overview of the results, future studies should include additional variables like kindergarten’s cultural and geographical differences. [less ▲] Detailed reference viewed: 42 (0 UL)![]() Bigi, Federico ![]() ![]() Scientific Conference (2023) Detailed reference viewed: 23 (1 UL)![]() Pineda Jaramillo, Juan Diego ![]() ![]() in Transportation Research. Part C, Emerging Technologies (2023), 147 Detailed reference viewed: 24 (2 UL)![]() ; Mueller, Johannes ![]() in Proceedings of ACM SAC Conference (SAC'23) (2023) Electronic voting (e-voting) is regularly used in many countries and organizations for legally binding elections. In order to conduct such elections securely, numerous e-voting systems have been proposed ... [more ▼] Electronic voting (e-voting) is regularly used in many countries and organizations for legally binding elections. In order to conduct such elections securely, numerous e-voting systems have been proposed over the last few decades. Notably, some of these systems were designed to provide coercion-resistance. This property protects against potential adversaries trying to swing an election by coercing voters. Despite the multitude of existing coercion-resistant e-voting systems, to date, only few of them can handle large-scale Internet elections efficiently. One of these systems, VoteAgain (USENIX Security 2020), was originally claimed secure under similar trust assumptions to state-of-the-art e-voting systems without coercion-resistance. In this work, we review VoteAgain's security properties. We discover that, unlike originally claimed, VoteAgain is no more secure than a trivial voting system with a completely trusted election authority. In order to mitigate this issue, we propose a variant of VoteAgain which effectively mitigates trust on the election authorities and, at the same time, preserves VoteAgain's usability and efficiency. Altogether, our findings bring the state of science one step closer to the goal of scalable coercion-resistant e-voting being secure under reasonable trust assumptions. [less ▲] Detailed reference viewed: 26 (2 UL) |
||