-
The cool and the cruel: separating hard parts of LWE secrets
Authors:
Niklas Nolte,
Mohamed Malhou,
Emily Wenger,
Samuel Stevens,
Cathy Li,
François Charton,
Kristin Lauter
Abstract:
Sparse binary LWE secrets are under consideration for standardization for Homomorphic Encryption and its applications to private computation. Known attacks on sparse binary LWE secrets include the sparse dual attack and the hybrid sparse dual-meet in the middle attack which requires significant memory. In this paper, we provide a new statistical attack with low memory requirement. The attack relie…
▽ More
Sparse binary LWE secrets are under consideration for standardization for Homomorphic Encryption and its applications to private computation. Known attacks on sparse binary LWE secrets include the sparse dual attack and the hybrid sparse dual-meet in the middle attack which requires significant memory. In this paper, we provide a new statistical attack with low memory requirement. The attack relies on some initial lattice reduction. The key observation is that, after lattice reduction is applied to the rows of a q-ary-like embedded random matrix $\mathbf A$, the entries with high variance are concentrated in the early columns of the extracted matrix. This allows us to separate out the "hard part" of the LWE secret. We can first solve the sub-problem of finding the "cruel" bits of the secret in the early columns, and then find the remaining "cool" bits in linear time. We use statistical techniques to distinguish distributions to identify both the cruel and the cool bits of the secret. We provide concrete attack timings for recovering secrets in dimensions $n=256$, $512$, and $768$. For the lattice reduction stage, we leverage recent improvements in lattice reduction (e.g. flatter) applied in parallel. We also apply our new attack in the RLWE setting for $2$-power cyclotomic rings, showing that these RLWE instances are much more vulnerable to this attack than LWE.
△ Less
Submitted 15 March, 2024;
originally announced March 2024.
-
Salsa Fresca: Angular Embeddings and Pre-Training for ML Attacks on Learning With Errors
Authors:
Samuel Stevens,
Emily Wenger,
Cathy Li,
Niklas Nolte,
Eshika Saxena,
François Charton,
Kristin Lauter
Abstract:
Learning with Errors (LWE) is a hard math problem underlying recently standardized post-quantum cryptography (PQC) systems for key exchange and digital signatures. Prior work proposed new machine learning (ML)-based attacks on LWE problems with small, sparse secrets, but these attacks require millions of LWE samples to train on and take days to recover secrets. We propose three key methods -- bett…
▽ More
Learning with Errors (LWE) is a hard math problem underlying recently standardized post-quantum cryptography (PQC) systems for key exchange and digital signatures. Prior work proposed new machine learning (ML)-based attacks on LWE problems with small, sparse secrets, but these attacks require millions of LWE samples to train on and take days to recover secrets. We propose three key methods -- better preprocessing, angular embeddings and model pre-training -- to improve these attacks, speeding up preprocessing by $25\times$ and improving model sample efficiency by $10\times$. We demonstrate for the first time that pre-training improves and reduces the cost of ML attacks on LWE. Our architecture improvements enable scaling to larger-dimension LWE problems: this work is the first instance of ML attacks recovering sparse binary secrets in dimension $n=1024$, the smallest dimension used in practice for homomorphic encryption applications of LWE where sparse binary secrets are proposed.
△ Less
Submitted 1 February, 2024;
originally announced February 2024.
-
SALSA VERDE: a machine learning attack on Learning With Errors with sparse small secrets
Authors:
Cathy Yuanchen Li,
Emily Wenger,
Zeyuan Allen-Zhu,
Francois Charton,
Kristin Lauter
Abstract:
Learning with Errors (LWE) is a hard math problem used in post-quantum cryptography. Homomorphic Encryption (HE) schemes rely on the hardness of the LWE problem for their security, and two LWE-based cryptosystems were recently standardized by NIST for digital signatures and key exchange (KEM). Thus, it is critical to continue assessing the security of LWE and specific parameter choices. For exampl…
▽ More
Learning with Errors (LWE) is a hard math problem used in post-quantum cryptography. Homomorphic Encryption (HE) schemes rely on the hardness of the LWE problem for their security, and two LWE-based cryptosystems were recently standardized by NIST for digital signatures and key exchange (KEM). Thus, it is critical to continue assessing the security of LWE and specific parameter choices. For example, HE uses secrets with small entries, and the HE community has considered standardizing small sparse secrets to improve efficiency and functionality. However, prior work, SALSA and PICANTE, showed that ML attacks can recover sparse binary secrets. Building on these, we propose VERDE, an improved ML attack that can recover sparse binary, ternary, and narrow Gaussian secrets. Using improved preprocessing and secret recovery techniques, VERDE can attack LWE with larger dimensions ($n=512$) and smaller moduli ($\log_2 q=12$ for $n=256$), using less time and power. We propose novel architectures for scaling. Finally, we develop a theory that explains the success of ML LWE attacks.
△ Less
Submitted 27 October, 2023; v1 submitted 20 June, 2023;
originally announced June 2023.
-
SALSA PICANTE: a machine learning attack on LWE with binary secrets
Authors:
Cathy Li,
Jana Sotáková,
Emily Wenger,
Mohamed Malhou,
Evrard Garcelon,
Francois Charton,
Kristin Lauter
Abstract:
Learning with Errors (LWE) is a hard math problem underpinning many proposed post-quantum cryptographic (PQC) systems. The only PQC Key Exchange Mechanism (KEM) standardized by NIST is based on module~LWE, and current publicly available PQ Homomorphic Encryption (HE) libraries are based on ring LWE. The security of LWE-based PQ cryptosystems is critical, but certain implementation choices could we…
▽ More
Learning with Errors (LWE) is a hard math problem underpinning many proposed post-quantum cryptographic (PQC) systems. The only PQC Key Exchange Mechanism (KEM) standardized by NIST is based on module~LWE, and current publicly available PQ Homomorphic Encryption (HE) libraries are based on ring LWE. The security of LWE-based PQ cryptosystems is critical, but certain implementation choices could weaken them. One such choice is sparse binary secrets, desirable for PQ HE schemes for efficiency reasons. Prior work, SALSA, demonstrated a machine learning-based attack on LWE with sparse binary secrets in small dimensions ($n \le 128$) and low Hamming weights ($h \le 4$). However, this attack assumes access to millions of eavesdropped LWE samples and fails at higher Hamming weights or dimensions.
We present PICANTE, an enhanced machine learning attack on LWE with sparse binary secrets, which recovers secrets in much larger dimensions (up to $n=350$) and with larger Hamming weights (roughly $n/10$, and up to $h=60$ for $n=350$). We achieve this dramatic improvement via a novel preprocessing step, which allows us to generate training data from a linear number of eavesdropped LWE samples ($4n$) and changes the distribution of the data to improve transformer training. We also improve the secret recovery methods of SALSA and introduce a novel cross-attention recovery mechanism allowing us to read off the secret directly from the trained models. While PICANTE does not threaten NIST's proposed LWE standards, it demonstrates significant improvement over SALSA and could scale further, highlighting the need for future investigation into machine learning attacks on LWE with sparse binary secrets.
△ Less
Submitted 31 October, 2023; v1 submitted 7 March, 2023;
originally announced March 2023.
-
Glaze: Protecting Artists from Style Mimicry by Text-to-Image Models
Authors:
Shawn Shan,
Jenna Cryan,
Emily Wenger,
Haitao Zheng,
Rana Hanocka,
Ben Y. Zhao
Abstract:
Recent text-to-image diffusion models such as MidJourney and Stable Diffusion threaten to displace many in the professional artist community. In particular, models can learn to mimic the artistic style of specific artists after "fine-tuning" on samples of their art. In this paper, we describe the design, implementation and evaluation of Glaze, a tool that enables artists to apply "style cloaks" to…
▽ More
Recent text-to-image diffusion models such as MidJourney and Stable Diffusion threaten to displace many in the professional artist community. In particular, models can learn to mimic the artistic style of specific artists after "fine-tuning" on samples of their art. In this paper, we describe the design, implementation and evaluation of Glaze, a tool that enables artists to apply "style cloaks" to their art before sharing online. These cloaks apply barely perceptible perturbations to images, and when used as training data, mislead generative models that try to mimic a specific artist. In coordination with the professional artist community, we deploy user studies to more than 1000 artists, assessing their views of AI art, as well as the efficacy of our tool, its usability and tolerability of perturbations, and robustness across different scenarios and against adaptive countermeasures. Both surveyed artists and empirical CLIP-based scores show that even at low perturbation levels (p=0.05), Glaze is highly successful at disrupting mimicry under normal conditions (>92%) and against adaptive countermeasures (>85%).
△ Less
Submitted 3 August, 2023; v1 submitted 8 February, 2023;
originally announced February 2023.
-
Data Isotopes for Data Provenance in DNNs
Authors:
Emily Wenger,
Xiuyu Li,
Ben Y. Zhao,
Vitaly Shmatikov
Abstract:
Today, creators of data-hungry deep neural networks (DNNs) scour the Internet for training fodder, leaving users with little control over or knowledge of when their data is appropriated for model training. To empower users to counteract unwanted data use, we design, implement and evaluate a practical system that enables users to detect if their data was used to train an DNN model. We show how user…
▽ More
Today, creators of data-hungry deep neural networks (DNNs) scour the Internet for training fodder, leaving users with little control over or knowledge of when their data is appropriated for model training. To empower users to counteract unwanted data use, we design, implement and evaluate a practical system that enables users to detect if their data was used to train an DNN model. We show how users can create special data points we call isotopes, which introduce "spurious features" into DNNs during training. With only query access to a trained model and no knowledge of the model training process, or control of the data labels, a user can apply statistical hypothesis testing to detect if a model has learned the spurious features associated with their isotopes by training on the user's data. This effectively turns DNNs' vulnerability to memorization and spurious correlations into a tool for data provenance. Our results confirm efficacy in multiple settings, detecting and distinguishing between hundreds of isotopes with high accuracy. We further show that our system works on public ML-as-a-service platforms and larger models such as ImageNet, can use physical objects instead of digital marks, and remains generally robust against several adaptive countermeasures.
△ Less
Submitted 27 February, 2023; v1 submitted 29 August, 2022;
originally announced August 2022.
-
SALSA: Attacking Lattice Cryptography with Transformers
Authors:
Emily Wenger,
Mingjie Chen,
François Charton,
Kristin Lauter
Abstract:
Currently deployed public-key cryptosystems will be vulnerable to attacks by full-scale quantum computers. Consequently, "quantum resistant" cryptosystems are in high demand, and lattice-based cryptosystems, based on a hard problem known as Learning With Errors (LWE), have emerged as strong contenders for standardization. In this work, we train transformers to perform modular arithmetic and combin…
▽ More
Currently deployed public-key cryptosystems will be vulnerable to attacks by full-scale quantum computers. Consequently, "quantum resistant" cryptosystems are in high demand, and lattice-based cryptosystems, based on a hard problem known as Learning With Errors (LWE), have emerged as strong contenders for standardization. In this work, we train transformers to perform modular arithmetic and combine half-trained models with statistical cryptanalysis techniques to propose SALSA: a machine learning attack on LWE-based cryptographic schemes. SALSA can fully recover secrets for small-to-mid size LWE instances with sparse binary secrets, and may scale to attack real-world LWE-based cryptosystems.
△ Less
Submitted 21 April, 2023; v1 submitted 11 July, 2022;
originally announced July 2022.
-
Natural Backdoor Datasets
Authors:
Emily Wenger,
Roma Bhattacharjee,
Arjun Nitin Bhagoji,
Josephine Passananti,
Emilio Andere,
Haitao Zheng,
Ben Y. Zhao
Abstract:
Extensive literature on backdoor poison attacks has studied attacks and defenses for backdoors using "digital trigger patterns." In contrast, "physical backdoors" use physical objects as triggers, have only recently been identified, and are qualitatively different enough to resist all defenses targeting digital trigger backdoors. Research on physical backdoors is limited by access to large dataset…
▽ More
Extensive literature on backdoor poison attacks has studied attacks and defenses for backdoors using "digital trigger patterns." In contrast, "physical backdoors" use physical objects as triggers, have only recently been identified, and are qualitatively different enough to resist all defenses targeting digital trigger backdoors. Research on physical backdoors is limited by access to large datasets containing real images of physical objects co-located with targets of classification. Building these datasets is time- and labor-intensive. This works seeks to address the challenge of accessibility for research on physical backdoor attacks. We hypothesize that there may be naturally occurring physically co-located objects already present in popular datasets such as ImageNet. Once identified, a careful relabeling of these data can transform them into training samples for physical backdoor attacks. We propose a method to scalably identify these subsets of potential triggers in existing datasets, along with the specific classes they can poison. We call these naturally occurring trigger-class subsets natural backdoor datasets. Our techniques successfully identify natural backdoors in widely-available datasets, and produce models behaviorally equivalent to those trained on manually curated datasets. We release our code to allow the research community to create their own datasets for research on physical backdoor attacks.
△ Less
Submitted 21 June, 2022;
originally announced June 2022.
-
Post-breach Recovery: Protection against White-box Adversarial Examples for Leaked DNN Models
Authors:
Shawn Shan,
Wenxin Ding,
Emily Wenger,
Haitao Zheng,
Ben Y. Zhao
Abstract:
Server breaches are an unfortunate reality on today's Internet. In the context of deep neural network (DNN) models, they are particularly harmful, because a leaked model gives an attacker "white-box" access to generate adversarial examples, a threat model that has no practical robust defenses. For practitioners who have invested years and millions into proprietary DNNs, e.g. medical imaging, this…
▽ More
Server breaches are an unfortunate reality on today's Internet. In the context of deep neural network (DNN) models, they are particularly harmful, because a leaked model gives an attacker "white-box" access to generate adversarial examples, a threat model that has no practical robust defenses. For practitioners who have invested years and millions into proprietary DNNs, e.g. medical imaging, this seems like an inevitable disaster looming on the horizon.
In this paper, we consider the problem of post-breach recovery for DNN models. We propose Neo, a new system that creates new versions of leaked models, alongside an inference time filter that detects and removes adversarial examples generated on previously leaked models. The classification surfaces of different model versions are slightly offset (by introducing hidden distributions), and Neo detects the overfitting of attacks to the leaked model used in its generation. We show that across a variety of tasks and attack methods, Neo is able to filter out attacks from leaked models with very high accuracy, and provides strong protection (7--10 recoveries) against attackers who repeatedly breach the server. Neo performs well against a variety of strong adaptive attacks, drop** slightly in # of breaches recoverable, and demonstrates potential as a complement to DNN defenses in the wild.
△ Less
Submitted 16 October, 2022; v1 submitted 21 May, 2022;
originally announced May 2022.
-
Assessing Privacy Risks from Feature Vector Reconstruction Attacks
Authors:
Emily Wenger,
Francesca Falzon,
Josephine Passananti,
Haitao Zheng,
Ben Y. Zhao
Abstract:
In deep neural networks for facial recognition, feature vectors are numerical representations that capture the unique features of a given face. While it is known that a version of the original face can be recovered via "feature reconstruction," we lack an understanding of the end-to-end privacy risks produced by these attacks. In this work, we address this shortcoming by develo** metrics that me…
▽ More
In deep neural networks for facial recognition, feature vectors are numerical representations that capture the unique features of a given face. While it is known that a version of the original face can be recovered via "feature reconstruction," we lack an understanding of the end-to-end privacy risks produced by these attacks. In this work, we address this shortcoming by develo** metrics that meaningfully capture the threat of reconstructed face images. Using end-to-end experiments and user studies, we show that reconstructed face images enable re-identification by both commercial facial recognition systems and humans, at a rate that is at worst, a factor of four times higher than randomized baselines. Our results confirm that feature vectors should be recognized as Personal Identifiable Information (PII) in order to protect user privacy.
△ Less
Submitted 11 February, 2022;
originally announced February 2022.
-
SoK: Anti-Facial Recognition Technology
Authors:
Emily Wenger,
Shawn Shan,
Haitao Zheng,
Ben Y. Zhao
Abstract:
The rapid adoption of facial recognition (FR) technology by both government and commercial entities in recent years has raised concerns about civil liberties and privacy. In response, a broad suite of so-called "anti-facial recognition" (AFR) tools has been developed to help users avoid unwanted facial recognition. The set of AFR tools proposed in the last few years is wide-ranging and rapidly evo…
▽ More
The rapid adoption of facial recognition (FR) technology by both government and commercial entities in recent years has raised concerns about civil liberties and privacy. In response, a broad suite of so-called "anti-facial recognition" (AFR) tools has been developed to help users avoid unwanted facial recognition. The set of AFR tools proposed in the last few years is wide-ranging and rapidly evolving, necessitating a step back to consider the broader design space of AFR systems and long-term challenges. This paper aims to fill that gap and provides the first comprehensive analysis of the AFR research landscape. Using the operational stages of FR systems as a starting point, we create a systematic framework for analyzing the benefits and tradeoffs of different AFR approaches. We then consider both technical and social challenges facing AFR tools and propose directions for future research in this field.
△ Less
Submitted 15 February, 2023; v1 submitted 8 December, 2021;
originally announced December 2021.
-
"Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World
Authors:
Emily Wenger,
Max Bronckers,
Christian Cianfarani,
Jenna Cryan,
Angela Sha,
Haitao Zheng,
Ben Y. Zhao
Abstract:
Advances in deep learning have introduced a new wave of voice synthesis tools, capable of producing audio that sounds as if spoken by a target speaker. If successful, such tools in the wrong hands will enable a range of powerful attacks against both humans and software systems (aka machines). This paper documents efforts and findings from a comprehensive experimental study on the impact of deep-le…
▽ More
Advances in deep learning have introduced a new wave of voice synthesis tools, capable of producing audio that sounds as if spoken by a target speaker. If successful, such tools in the wrong hands will enable a range of powerful attacks against both humans and software systems (aka machines). This paper documents efforts and findings from a comprehensive experimental study on the impact of deep-learning based speech synthesis attacks on both human listeners and machines such as speaker recognition and voice-signin systems. We find that both humans and machines can be reliably fooled by synthetic speech and that existing defenses against synthesized speech fall short. These findings highlight the need to raise awareness and develop new protections against synthetic speech for both humans and machines.
△ Less
Submitted 20 September, 2021;
originally announced September 2021.
-
Evidence for a soft-phonon-mode-driven Peierls-type distortion in Sc$_3$CoC$_4$
Authors:
Jan Langmann,
Christof Haas,
Emmanuel Wenger,
Dominik Schaniel,
Wolfgang Scherer,
Georg Eickerling
Abstract:
We provide experimental and theoretical evidence for the realization of the Peierls-type structurally distorted state in the quasi-one-dimensional superconductor Sc$_3$CoC$_4$ by a phonon-softening mechanism. The transition from the high- to the final low-temperature phase below 80K proceeds via an extended intermediate temperature regime between 80K and 150K characterized by phonon-driven atom di…
▽ More
We provide experimental and theoretical evidence for the realization of the Peierls-type structurally distorted state in the quasi-one-dimensional superconductor Sc$_3$CoC$_4$ by a phonon-softening mechanism. The transition from the high- to the final low-temperature phase below 80K proceeds via an extended intermediate temperature regime between 80K and 150K characterized by phonon-driven atom displacements. In support of the low-dimensional character of the title compound we find a highly anisotropic correlation-length of these dynamic distortions.
△ Less
Submitted 8 September, 2020;
originally announced September 2020.
-
Backdoor Attacks Against Deep Learning Systems in the Physical World
Authors:
Emily Wenger,
Josephine Passananti,
Arjun Bhagoji,
Yuanshun Yao,
Haitao Zheng,
Ben Y. Zhao
Abstract:
Backdoor attacks embed hidden malicious behaviors into deep learning models, which only activate and cause misclassifications on model inputs containing a specific trigger. Existing works on backdoor attacks and defenses, however, mostly focus on digital attacks that use digitally generated patterns as triggers. A critical question remains unanswered: can backdoor attacks succeed using physical ob…
▽ More
Backdoor attacks embed hidden malicious behaviors into deep learning models, which only activate and cause misclassifications on model inputs containing a specific trigger. Existing works on backdoor attacks and defenses, however, mostly focus on digital attacks that use digitally generated patterns as triggers. A critical question remains unanswered: can backdoor attacks succeed using physical objects as triggers, thus making them a credible threat against deep learning systems in the real world? We conduct a detailed empirical study to explore this question for facial recognition, a critical deep learning task. Using seven physical objects as triggers, we collect a custom dataset of 3205 images of ten volunteers and use it to study the feasibility of physical backdoor attacks under a variety of real-world conditions. Our study reveals two key findings. First, physical backdoor attacks can be highly successful if they are carefully configured to overcome the constraints imposed by physical objects. In particular, the placement of successful triggers is largely constrained by the target model's dependence on key facial features. Second, four of today's state-of-the-art defenses against (digital) backdoors are ineffective against physical backdoors, because the use of physical objects breaks core assumptions used to construct these defenses. Our study confirms that (physical) backdoor attacks are not a hypothetical phenomenon but rather pose a serious real-world threat to critical classification tasks. We need new and more robust defenses against backdoors in the physical world.
△ Less
Submitted 7 September, 2021; v1 submitted 25 June, 2020;
originally announced June 2020.
-
Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks
Authors:
Huiying Li,
Shawn Shan,
Emily Wenger,
Jiayun Zhang,
Haitao Zheng,
Ben Y. Zhao
Abstract:
Deep learning systems are known to be vulnerable to adversarial examples. In particular, query-based black-box attacks do not require knowledge of the deep learning model, but can compute adversarial examples over the network by submitting queries and inspecting returns. Recent work largely improves the efficiency of those attacks, demonstrating their practicality on today's ML-as-a-service platfo…
▽ More
Deep learning systems are known to be vulnerable to adversarial examples. In particular, query-based black-box attacks do not require knowledge of the deep learning model, but can compute adversarial examples over the network by submitting queries and inspecting returns. Recent work largely improves the efficiency of those attacks, demonstrating their practicality on today's ML-as-a-service platforms.
We propose Blacklight, a new defense against query-based black-box adversarial attacks. The fundamental insight driving our design is that, to compute adversarial examples, these attacks perform iterative optimization over the network, producing image queries highly similar in the input space. Blacklight detects query-based black-box attacks by detecting highly similar queries, using an efficient similarity engine operating on probabilistic content fingerprints. We evaluate Blacklight against eight state-of-the-art attacks, across a variety of models and image classification tasks. Blacklight identifies them all, often after only a handful of queries. By rejecting all detected queries, Blacklight prevents any attack to complete, even when attackers persist to submit queries after account ban or query rejection. Blacklight is also robust against several powerful countermeasures, including an optimal black-box attack that approximates white-box attacks in efficiency. Finally, we illustrate how Blacklight generalizes to other domains like text classification.
△ Less
Submitted 9 June, 2022; v1 submitted 24 June, 2020;
originally announced June 2020.
-
Stochasticity and heterogeneity in the transmission dynamics of SARS-CoV-2
Authors:
Benjamin M. Althouse,
Edward A. Wenger,
Joel C. Miller,
Samuel V. Scarpino,
Antoine Allard,
Laurent Hébert-Dufresne,
Hao Hu
Abstract:
SARS-CoV-2 causing COVID-19 disease has moved rapidly around the globe, infecting millions and killing hundreds of thousands. The basic reproduction number, which has been widely used and misused to characterize the transmissibility of the virus, hides the fact that transmission is stochastic, is dominated by a small number of individuals, and is driven by super-spreading events (SSEs). The distin…
▽ More
SARS-CoV-2 causing COVID-19 disease has moved rapidly around the globe, infecting millions and killing hundreds of thousands. The basic reproduction number, which has been widely used and misused to characterize the transmissibility of the virus, hides the fact that transmission is stochastic, is dominated by a small number of individuals, and is driven by super-spreading events (SSEs). The distinct transmission features, such as high stochasticity under low prevalence, and the central role played by SSEs on transmission dynamics, should not be overlooked. Many explosive SSEs have occurred in indoor settings stoking the pandemic and sha** its spread, such as long-term care facilities, prisons, meat-packing plants, fish factories, cruise ships, family gatherings, parties and night clubs. These SSEs demonstrate the urgent need to understand routes of transmission, while posing an opportunity that outbreak can be effectively contained with targeted interventions to eliminate SSEs. Here, we describe the potential types of SSEs, how they influence transmission, and give recommendations for control of SARS-CoV-2.
△ Less
Submitted 27 May, 2020;
originally announced May 2020.
-
Fawkes: Protecting Privacy against Unauthorized Deep Learning Models
Authors:
Shawn Shan,
Emily Wenger,
Jiayun Zhang,
Huiying Li,
Haitao Zheng,
Ben Y. Zhao
Abstract:
Today's proliferation of powerful facial recognition systems poses a real threat to personal privacy. As Clearview.ai demonstrated, anyone can canvas the Internet for data and train highly accurate facial recognition models of individuals without their knowledge. We need tools to protect ourselves from potential misuses of unauthorized facial recognition systems. Unfortunately, no practical or eff…
▽ More
Today's proliferation of powerful facial recognition systems poses a real threat to personal privacy. As Clearview.ai demonstrated, anyone can canvas the Internet for data and train highly accurate facial recognition models of individuals without their knowledge. We need tools to protect ourselves from potential misuses of unauthorized facial recognition systems. Unfortunately, no practical or effective solutions exist.
In this paper, we propose Fawkes, a system that helps individuals inoculate their images against unauthorized facial recognition models. Fawkes achieves this by hel** users add imperceptible pixel-level changes (we call them "cloaks") to their own photos before releasing them. When used to train facial recognition models, these "cloaked" images produce functional models that consistently cause normal images of the user to be misidentified. We experimentally demonstrate that Fawkes provides 95+% protection against user recognition regardless of how trackers train their models. Even when clean, uncloaked images are "leaked" to the tracker and used for training, Fawkes can still maintain an 80+% protection success rate. We achieve 100% success in experiments against today's state-of-the-art facial recognition services. Finally, we show that Fawkes is robust against a variety of countermeasures that try to detect or disrupt image cloaks.
△ Less
Submitted 22 June, 2020; v1 submitted 19 February, 2020;
originally announced February 2020.
-
Piracy Resistant Watermarks for Deep Neural Networks
Authors:
Huiying Li,
Emily Wenger,
Shawn Shan,
Ben Y. Zhao,
Haitao Zheng
Abstract:
As companies continue to invest heavily in larger, more accurate and more robust deep learning models, they are exploring approaches to monetize their models while protecting their intellectual property. Model licensing is promising, but requires a robust tool for owners to claim ownership of models, i.e. a watermark. Unfortunately, current designs have not been able to address piracy attacks, whe…
▽ More
As companies continue to invest heavily in larger, more accurate and more robust deep learning models, they are exploring approaches to monetize their models while protecting their intellectual property. Model licensing is promising, but requires a robust tool for owners to claim ownership of models, i.e. a watermark. Unfortunately, current designs have not been able to address piracy attacks, where third parties falsely claim model ownership by embedding their own "pirate watermarks" into an already-watermarked model. We observe that resistance to piracy attacks is fundamentally at odds with the current use of incremental training to embed watermarks into models. In this work, we propose null embedding, a new way to build piracy-resistant watermarks into DNNs that can only take place at a model's initial training. A null embedding takes a bit string (watermark value) as input, and builds strong dependencies between the model's normal classification accuracy and the watermark. As a result, attackers cannot remove an embedded watermark via tuning or incremental training, and cannot add new pirate watermarks to already watermarked models. We empirically show that our proposed watermarks achieve piracy resistance and other watermark properties, over a wide range of tasks and models. Finally, we explore a number of adaptive counter-measures, and show our watermark remains robust against a variety of model modifications, including model fine-tuning, compression, and existing methods to detect/remove backdoors. Our watermarked models are also amenable to transfer learning without losing their watermark properties.
△ Less
Submitted 2 December, 2020; v1 submitted 2 October, 2019;
originally announced October 2019.
-
Gotta Catch 'Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks
Authors:
Shawn Shan,
Emily Wenger,
Bolun Wang,
Bo Li,
Haitao Zheng,
Ben Y. Zhao
Abstract:
Deep neural networks (DNN) are known to be vulnerable to adversarial attacks. Numerous efforts either try to patch weaknesses in trained models, or try to make it difficult or costly to compute adversarial examples that exploit them. In our work, we explore a new "honeypot" approach to protect DNN models. We intentionally inject trapdoors, honeypot weaknesses in the classification manifold that at…
▽ More
Deep neural networks (DNN) are known to be vulnerable to adversarial attacks. Numerous efforts either try to patch weaknesses in trained models, or try to make it difficult or costly to compute adversarial examples that exploit them. In our work, we explore a new "honeypot" approach to protect DNN models. We intentionally inject trapdoors, honeypot weaknesses in the classification manifold that attract attackers searching for adversarial examples. Attackers' optimization algorithms gravitate towards trapdoors, leading them to produce attacks similar to trapdoors in the feature space. Our defense then identifies attacks by comparing neuron activation signatures of inputs to those of trapdoors. In this paper, we introduce trapdoors and describe an implementation of a trapdoor-enabled defense. First, we analytically prove that trapdoors shape the computation of adversarial attacks so that attack inputs will have feature representations very similar to those of trapdoors. Second, we experimentally show that trapdoor-protected models can detect, with high accuracy, adversarial examples generated by state-of-the-art attacks (PGD, optimization-based CW, Elastic Net, BPDA), with negligible impact on normal classification. These results generalize across classification domains, including image, facial, and traffic-sign recognition. We also present significant results measuring trapdoors' robustness against customized adaptive attacks (countermeasures).
△ Less
Submitted 28 September, 2020; v1 submitted 17 April, 2019;
originally announced April 2019.
-
Malaria elimination campaigns in the Lake Kariba region of Zambia: a spatial dynamical model
Authors:
Milen Nikolov,
Caitlin A. Bever,
Alexander Upfill-Brown,
Busiku Hamainza,
John M. Miller,
Philip A. Eckhoff,
Edward A. Wenger,
Jaline Gerardin
Abstract:
Background As more regions approach malaria elimination, understanding how different interventions interact to reduce transmission becomes critical. The Lake Kariba area of Southern Province, Zambia, is part of a multi-country elimination effort and presents a particular challenge as it is an interconnected region of variable transmission intensities.
Methods In 2012-13, six rounds of mass-scree…
▽ More
Background As more regions approach malaria elimination, understanding how different interventions interact to reduce transmission becomes critical. The Lake Kariba area of Southern Province, Zambia, is part of a multi-country elimination effort and presents a particular challenge as it is an interconnected region of variable transmission intensities.
Methods In 2012-13, six rounds of mass-screen-and-treat drug campaigns were carried out in the Lake Kariba region. A spatial dynamical model of malaria transmission in the Lake Kariba area, with transmission and climate modeled at the village scale, was calibrated to the 2012-13 prevalence survey data, with case management rates, insecticide-treated net usage, and drug campaign coverage informed by surveillance. The model was used to simulate the effect of various interventions implemented in 2014-22 on reducing regional transmission, achieving elimination by 2022, and maintaining elimination through 2028.
Findings The model captured the spatio-temporal trends of decline and rebound in malaria prevalence in 2012-13 at the village scale. Simulations predicted that elimination required repeated mass drug administrations coupled with simultaneous increase in net usage. Drug campaigns targeted only at high-burden areas were as successful as campaigns covering the entire region.
Interpretation Elimination in the Lake Kariba region is possible through coordinating mass drug campaigns with high-coverage vector control. Targeting regional hotspots is a viable alternative to global campaigns when human migration within an interconnected area is responsible for maintaining transmission in low-burden areas.
△ Less
Submitted 15 March, 2016;
originally announced March 2016.
-
Participant and spectator scaling of spectator fragments in Au+Au and Cu+Cu collisions at sqrt(sNN) = 19.6 and 22.4 GeV
Authors:
B. Alver,
B. B. Back,
M. D. Baker,
M. Ballintijn,
D. S. Barton,
R. R. Betts,
A. A. Bickley,
R. Bindel,
A. Budzanowski,
W. Busza,
A. Carroll,
Z. Chai,
V. Chetluru,
M. P. Decowski,
E. Garcia,
T. Gburek,
N. George,
K. Gulbrandsen,
S. Gushue,
C. Halliwell,
J. Hamblen,
I. Harnarine,
G. A. Heintzelman,
C. Henderson,
D. J. Hofman
, et al. (57 additional authors not shown)
Abstract:
Spectator fragments resulting from relativistic heavy ion collisions, consisting of single protons and neutrons along with groups of stable nuclear fragments up to Nitrogen (Z=7), are measured in PHOBOS. These fragments are observed in Au+Au (sqrt(sNN)=19.6 GeV) and Cu+Cu (22.4 GeV) collisions at high pseudorapidity ($η$). The dominant multiply-charged fragment is the tightly bound Helium ($α$), w…
▽ More
Spectator fragments resulting from relativistic heavy ion collisions, consisting of single protons and neutrons along with groups of stable nuclear fragments up to Nitrogen (Z=7), are measured in PHOBOS. These fragments are observed in Au+Au (sqrt(sNN)=19.6 GeV) and Cu+Cu (22.4 GeV) collisions at high pseudorapidity ($η$). The dominant multiply-charged fragment is the tightly bound Helium ($α$), with Lithium, Beryllium, and Boron all clearly seen as a function of collision centrality and pseudorapidity. We observe that in Cu+Cu collisions, it becomes much more favorable for the $α$ fragments to be released than Lithium. The yields of fragments approximately scale with the number of spectator nucleons, independent of the colliding ion. The shapes of the pseudorapidity distributions of fragments indicate that the average deflection of the fragments away from the beam direction increases for more central collisions. A detailed comparison of the shapes for $α$ and Lithium fragments indicates that the centrality dependence of the deflections favors a scaling with the number of participants in the collision.
△ Less
Submitted 24 November, 2015;
originally announced November 2015.
-
Optimal population-level infection detection strategies for malaria control and elimination in a spatial model of malaria transmission
Authors:
Jaline Gerardin,
Caitlin A. Bever,
Busiku Hamainza,
John M. Miller,
Philip A. Eckhoff,
Edward A. Wenger
Abstract:
Mass campaigns with antimalarial drugs are potentially a powerful tool for local elimination of malaria, yet current diagnostic technologies are insufficiently sensitive to identify all individuals who harbor infections. At the same time, overtreatment of uninfected individuals increases the risk of accelerating emergence of drug resistance and losing community acceptance. Local heterogeneity in t…
▽ More
Mass campaigns with antimalarial drugs are potentially a powerful tool for local elimination of malaria, yet current diagnostic technologies are insufficiently sensitive to identify all individuals who harbor infections. At the same time, overtreatment of uninfected individuals increases the risk of accelerating emergence of drug resistance and losing community acceptance. Local heterogeneity in transmission intensity may allow campaign strategies that respond to index cases to successfully target subpatent infections while simultaneously limiting overtreatment. While selective targeting of hotspots of transmission has been proposed as a strategy for malaria control, such targeting has not been tested in the context of malaria elimination. Using household locations, demographics, and prevalence data from a survey of four health facility catchment areas in southern Zambia and an agent-based model of malaria transmission and immunity acquisition, a transmission intensity was fit to each household based on neighborhood age-dependent malaria prevalence. A set of individual infection trajectories was constructed for every household in each catchment area, accounting for heterogeneous exposure and immunity. Various campaign strategies (mass drug administration, mass screen and treat, focal mass drug administration, snowball reactive case detection, pooled sampling, and a hypothetical serological diagnostic) were simulated and evaluated for performance at finding infections, minimizing overtreatment, reducing clinical case counts, and interrupting transmission. For malaria control, presumptive treatment leads to substantial overtreatment without additional morbidity reduction under all but the highest transmission conditions. Selective targeting of hotspots with drug campaigns is an ineffective tool for elimination due to limited sensitivity of available field diagnostics.
△ Less
Submitted 2 September, 2015;
originally announced September 2015.
-
Mass campaigns with antimalarial drugs: a modelling comparison of artemether-lumefantrine and DHA-piperaquine with and without primaquine as tools for malaria control and elimination
Authors:
Jaline Gerardin,
Philip Eckhoff,
Edward A. Wenger
Abstract:
Antimalarial drugs are a powerful tool for malaria control and elimination. Artemisinin-based combination therapies (ACTs) can reduce transmission when widely distributed in a campaign setting. Modelling mass antimalarial campaigns can elucidate how to most effectively deploy drug-based interventions and quantitatively compare the effects of cure, prophylaxis, and transmission-blocking in suppress…
▽ More
Antimalarial drugs are a powerful tool for malaria control and elimination. Artemisinin-based combination therapies (ACTs) can reduce transmission when widely distributed in a campaign setting. Modelling mass antimalarial campaigns can elucidate how to most effectively deploy drug-based interventions and quantitatively compare the effects of cure, prophylaxis, and transmission-blocking in suppressing parasite prevalence. A previously established agent-based model that includes innate and adaptive immunity was used to simulate malaria infections and transmission. Pharmacokinetics of artemether, lumefantrine, dihydroartemisinin, piperaquine, and primaquine were modelled with a double-exponential distribution-elimination model including weight-dependent parameters and age-dependent dosing. Drug killing of asexual parasites and gametocytes was calibrated to clinical data. Mass distribution of ACTs and primaquine was simulated with seasonal mosquito dynamics at a range of transmission intensities. A single mass campaign with antimalarial drugs is insufficient to permanently reduce malaria prevalence when transmission is high. Current diagnostics are insufficiently sensitive to accurately identify asymptomatic infections, and mass-screen-and-treat campaigns are much less efficacious than mass drug administrations. Improving campaign coverage leads to decreased prevalence one month after the end of the campaign, while increasing compliance lengthens the duration of protection against reinfection. Use of a long-lasting prophylactic as part of a mass drug administration regimen confers the most benefit under conditions of high transmission and moderately high coverage. Addition of primaquine can reduce prevalence but exerts its largest effect when coupled with a long-lasting prophylactic.
△ Less
Submitted 31 March, 2015;
originally announced March 2015.
-
Characterization of the infectious reservoir of malaria with an agent-based model calibrated to age-stratified parasite densities and infectiousness
Authors:
Jaline Gerardin,
Andre Lin Ouedraogo,
Kevin A. McCarthy,
Bocar Kouyate,
Philip A. Eckhoff,
Edward A. Wenger
Abstract:
Background Elimination of malaria can only be achieved through removal of all vectors or complete depletion of the infectious reservoir in humans. Mechanistic models can be built to synthesize diverse observations from the field collected under a variety of conditions and subsequently used to query the infectious reservoir in great detail. Methods The EMOD model of malaria transmission was calibra…
▽ More
Background Elimination of malaria can only be achieved through removal of all vectors or complete depletion of the infectious reservoir in humans. Mechanistic models can be built to synthesize diverse observations from the field collected under a variety of conditions and subsequently used to query the infectious reservoir in great detail. Methods The EMOD model of malaria transmission was calibrated to prevalence, incidence, asexual parasite density, gametocyte density, infection duration, and infectiousness data from 9 study sites. The infectious reservoir was characterized by diagnostic detection limit and age group over a range of transmission intensities with and without case management and vector control. Mass screen-and-treat drug campaigns were tested for likelihood of achieving elimination. Results The composition of the infectious reservoir by diagnostic threshold is similar over a range of transmission intensities, and higher intensity settings are biased toward infections in children. Recent ramp-ups in case management and use of insecticide-treated bednets reduce the infectious reservoir and shift the composition toward submicroscopic infections. Mass campaigns with antimalarial drugs are highly effective at interrupting transmission if deployed shortly after ITN campaigns. Conclusions Low density infections comprise a substantial portion of the infectious reservoir. Proper timing of vector control, seasonal variation in transmission intensity, and mass drug campaigns allows lingering population immunity to help drive a region toward elimination.
△ Less
Submitted 31 March, 2015;
originally announced March 2015.
-
Pressure Induced Superconductivity in Ba0.5Sr0.5Fe2As2
Authors:
Georgiy M. Tsoi,
Walter Malone,
Walter Uhoya,
Jonathan E. Mitchel,
Yogesh K. Vohra,
Lowell E. Wenger,
Athena S. Sefat,
S. T . Weir
Abstract:
High-pressure electrical resistance measurements have been performed on single crystal Ba0.5Sr0.5Fe2As2 platelets to pressures of 16 GPa and temperatures down to 10 K using designer diamond anvils under quasi-hydrostatic conditions with an insulating steatite pressure medium. The resistance measurements show evidence of pressure-induced superconductivity with an onset transition temperature at ~31…
▽ More
High-pressure electrical resistance measurements have been performed on single crystal Ba0.5Sr0.5Fe2As2 platelets to pressures of 16 GPa and temperatures down to 10 K using designer diamond anvils under quasi-hydrostatic conditions with an insulating steatite pressure medium. The resistance measurements show evidence of pressure-induced superconductivity with an onset transition temperature at ~31 K and zero resistance at ~22 K for a pressure of 3.3 GPa. The transition temperature decreases gradually with increasing in pressure before completely disappearing for pressures above 12 GPa. The present results provide experimental evidence that a solid solution of two 122-type materials, e.g., Ba1-x.SrxFe2As2 (0 < x <1), can also exhibit superconductivity under high pressure
△ Less
Submitted 12 October, 2012;
originally announced October 2012.
-
Description of the EMOD-HIV Model v0.7
Authors:
Anna Bershteyn,
Daniel J. Klein,
Edward Wenger,
Philip A. Eckhoff
Abstract:
The expansion of tools against HIV transmission has brought increased interest in epidemiological models that can predict the impact of these interventions. The EMOD-HIV model was recently compared to eleven other independently developed mathematical models of HIV transmission to determine the extent to which they agree about the potential impact of expanded use of antiretroviral therapy in South…
▽ More
The expansion of tools against HIV transmission has brought increased interest in epidemiological models that can predict the impact of these interventions. The EMOD-HIV model was recently compared to eleven other independently developed mathematical models of HIV transmission to determine the extent to which they agree about the potential impact of expanded use of antiretroviral therapy in South Africa. Here we describe in detail the modeling methodology used to produce the results in this comparison, which we term EMOD-HIV v0.7. We include a discussion of the structure and a full list of model parameters. We also discuss the architecture of the model, and its potential utility in comparing structural assumptions within a single modeling framework.
△ Less
Submitted 16 June, 2012;
originally announced June 2012.
-
Phobos results on charged particle multiplicity and pseudorapidity distributions in Au+Au, Cu+Cu, d+Au, and p+p collisions at ultra-relativistic energies
Authors:
B. Alver,
B. B. Back,
M. D. Baker,
M. Ballintijn,
D. S. Barton,
R. R. Betts,
A. A. Bickley,
R. Bindel,
A. Budzanowski,
W. Busza,
A. Carroll,
Z. Chai,
V. Chetluru,
M. P. Decowski,
E. Garcıa,
T. Gburek,
N. George,
K. Gulbrandsen,
S. Gushue,
C. Halliwell,
J. Hamblen,
G. A. Heintzelman,
C. Henderson,
D. J. Hofman,
R. S. Hollis
, et al. (54 additional authors not shown)
Abstract:
Pseudorapidity distributions of charged particles emitted in $Au+Au$, $Cu+Cu$, $d+Au$, and $p+p$ collisions over a wide energy range have been measured using the PHOBOS detector at RHIC. The centrality dependence of both the charged particle distributions and the multiplicity at midrapidity were measured. Pseudorapidity distributions of charged particles emitted with $|η|<5.4$, which account for b…
▽ More
Pseudorapidity distributions of charged particles emitted in $Au+Au$, $Cu+Cu$, $d+Au$, and $p+p$ collisions over a wide energy range have been measured using the PHOBOS detector at RHIC. The centrality dependence of both the charged particle distributions and the multiplicity at midrapidity were measured. Pseudorapidity distributions of charged particles emitted with $|η|<5.4$, which account for between 95% and 99% of the total charged-particle emission associated with collision participants, are presented for different collision centralities. Both the midrapidity density, $dN_{ch}/dη$, and the total charged-particle multiplicity, $N_{ch}$, are found to factorize into a product of independent functions of collision energy, $\sqrt{s_{_{NN}}}$, and centrality given in terms of the number of nucleons participating in the collision, $N_{part}$. The total charged particle multiplicity, observed in these experiments and those at lower energies, assumes a linear dependence of $(\ln s_{_{NN}})^2$ over the full range of collision energy of $\sqrt{s_{_{NN}}}$=2.7-200 GeV.
△ Less
Submitted 8 November, 2010;
originally announced November 2010.
-
Convoluting jet spectra with fragmentation functions: a cross-check of the charged particle p_T spectrum
Authors:
Andre S. Yoon,
Edward Wenger,
Gunther Roland
Abstract:
Motivated by the excellent agreement between next-to-leading-order pQCD calculations and the inclusive jet spectra measured by CDF, we cross-check PYTHIA fragmentation functions. The convolution of the measured jet spectra with unmodified PYTHIA fragmentation functions results in reasonable agreement with the PYTHIA charged particle spectrum over the entire p_T range of interest, while there is a…
▽ More
Motivated by the excellent agreement between next-to-leading-order pQCD calculations and the inclusive jet spectra measured by CDF, we cross-check PYTHIA fragmentation functions. The convolution of the measured jet spectra with unmodified PYTHIA fragmentation functions results in reasonable agreement with the PYTHIA charged particle spectrum over the entire p_T range of interest, while there is a sizable disagreement with the measured charged particle spectrum above p_T=30 GeV/c. In an attempt to understand the source of this discrepancy, we introduce a number of increasingly different toy-model fragmentation functions for the convolution. However, even the most extreme fragmentation functions result in an underestimate of the high-p_T CDF spectrum, which remains irreconcilable with the measured jet spectra.
△ Less
Submitted 30 March, 2010;
originally announced March 2010.
-
Centrality Dependence of Delta-eta, Delta-phi Correlations in Heavy Ion Collisions
Authors:
Edward Wenger
Abstract:
In these proceedings, a measurement of two-particle correlations with a high transverse momentum trigger particle (pT_trig > 2.5 GeV/c) is presented for Au+Au collisions at sqrt(s_NN) = 200 GeV over the uniquely broad longitudinal acceptance of the PHOBOS detector (-4 < Delta-eta < 2). As in p+p collisions, the near-side is characterized by a peak of correlated partners at small angle relative t…
▽ More
In these proceedings, a measurement of two-particle correlations with a high transverse momentum trigger particle (pT_trig > 2.5 GeV/c) is presented for Au+Au collisions at sqrt(s_NN) = 200 GeV over the uniquely broad longitudinal acceptance of the PHOBOS detector (-4 < Delta-eta < 2). As in p+p collisions, the near-side is characterized by a peak of correlated partners at small angle relative to the trigger. However, in central Au+Au collisions an additional correlation extended in Delta-eta and known as the 'ridge' is found to reach at least |Delta-eta| = 4. The ridge yield is largely independent of Delta-eta over the measured range, and it decreases towards more peripheral collisions. For the chosen pT_trig cut of 2.5 GeV/c, the ridge yield is consistent with zero for events with less than roughly 100 participating nucleons.
△ Less
Submitted 19 June, 2009;
originally announced June 2009.
-
Scaling properties in bulk and p$_{\rm T}$-dependent particle production near midrapidity in relativistic heavy ion collisions
Authors:
PHOBOS Collaboration,
B. Alver,
B. B. Back,
M. D. Baker,
M. Ballintijn,
D. S. Barton,
R. R. Betts,
R. Bindel,
W. Busza,
Z. Chai,
V. Chetluru,
E. Garcia,
T. Gburek,
K. Gulbrandsen,
J. Hamblen,
I. Harnarine,
C. Henderson,
D. J. Hofman,
R. S. Hollis,
R. Holynski,
B. Holzman,
A. Iordanova,
J. L. Kane,
P. Kulinich,
C. M. Kuo
, et al. (34 additional authors not shown)
Abstract:
The centrality dependence of the midrapidity charged-particle multiplicity density ($|η|$$<$1) is presented for Au+Au and Cu+Cu collisions at RHIC over a broad range of collision energies. The multiplicity measured in the Cu+Cu system is found to be similar to that measured in the Au+Au system, for an equivalent N$_{\rm part}$, with the observed factorization in energy and centrality still persi…
▽ More
The centrality dependence of the midrapidity charged-particle multiplicity density ($|η|$$<$1) is presented for Au+Au and Cu+Cu collisions at RHIC over a broad range of collision energies. The multiplicity measured in the Cu+Cu system is found to be similar to that measured in the Au+Au system, for an equivalent N$_{\rm part}$, with the observed factorization in energy and centrality still persistent in the smaller Cu+Cu system. The extent of the similarities observed for bulk particle production is tested by a comparative analysis of the inclusive transverse momentum distributions for Au+Au and Cu+Cu collisions near midrapidity. It is found that, within the uncertainties of the data, the ratio of yields between the various energies for both Au+Au and Cu+Cu systems are similar and constant with centrality, both in the bulk yields as well as a function of p$_{\rm T}$, up to at least 4 GeV/$c$. The effects of multiple nucleon collisions that strongly increase with centrality and energy appear to only play a minor role in bulk and intermediate transverse momentum particle production.
△ Less
Submitted 13 August, 2008;
originally announced August 2008.
-
System size, energy, centrality and pseudorapidity dependence of charged-particle density in Au+Au and Cu+Cu collisions at RHIC
Authors:
PHOBOS Collaboration,
G. I. Veres,
B. Alver,
B. B. Back,
M. D. Baker,
M. Ballintijn,
D. S. Barton,
R. R. Betts,
A. A. Bickley,
R. Bindel,
W. Busza,
A. Carroll,
Z. Chai,
V. Chetluru,
M. P. Decowski,
E. García,
T. Gburek,
N. George,
K. Gulbrandsen,
C. Halliwell,
J. Hamblen,
I. Harnarine,
M. Hauer,
C. Henderson,
D. J. Hofman
, et al. (44 additional authors not shown)
Abstract:
Charged particle pseudorapidity distributions are presented from the PHOBOS experiment at RHIC, measured in Au+Au and Cu+Cu collisions at sqrt{s_NN}=19.6, 22.4, 62.4, 130 and 200 GeV, as a function of collision centrality. The presentation includes the recently analyzed Cu+Cu data at 22.4 GeV. The measurements were made by the same detector setup over a broad range in pseudorapidity, |eta|<5.4,…
▽ More
Charged particle pseudorapidity distributions are presented from the PHOBOS experiment at RHIC, measured in Au+Au and Cu+Cu collisions at sqrt{s_NN}=19.6, 22.4, 62.4, 130 and 200 GeV, as a function of collision centrality. The presentation includes the recently analyzed Cu+Cu data at 22.4 GeV. The measurements were made by the same detector setup over a broad range in pseudorapidity, |eta|<5.4, allowing for a reliable systematic study of particle production as a function of energy, centrality and system size. Comparing Cu+Cu and Au+Au results, we find that the total number of produced charged particles and the overall shape (height and width) of the pseudorapidity distributions are determined by the number of nucleon participants, N_part. Detailed comparisons reveal that the matching of the shape of the Cu+Cu and Au+Au pseudorapidity distributions over the full range of eta is better for the same N_part/2A value than for the same N_part value, where A denotes the mass number. In other words, it is the geometry of the nuclear overlap zone, rather than just the number of nucleon participants that drives the detailed shape of the pseudorapidity distribution and its centrality dependence.
△ Less
Submitted 17 June, 2008;
originally announced June 2008.
-
Non-flow correlations and elliptic flow fluctuations in Au+Au collisions at sqrt(s_NN)=200GeV
Authors:
PHOBOS Collaboration,
B. Alver,
B. B. Back,
M. D. Baker,
M. Ballintijn,
D. S. Barton,
R. R. Betts,
A. A. Bickley,
R. Bindel,
W. Busza,
A. Carroll,
Z. Chai,
V. Chetluru,
M. P. Decowski,
E. Garcia,
T. Gburek,
N. George,
K. Gulbrandsen,
C. Halliwell,
J. Hamblen,
I. Harnarine,
M. Hauer,
C. Henderson,
D. J. Hofman,
R. S. Hollis
, et al. (44 additional authors not shown)
Abstract:
We present first results on event-by-event elliptic flow fluctuations in nucleus-nucleus collisions corrected for effects of non-flow correlations where the magnitude of non-flow correlations has been independently measured in data. Over the measured range in centrality, we see large relative fluctuations of 25-50%. The results are consistent with predictions from both color glass condensate and…
▽ More
We present first results on event-by-event elliptic flow fluctuations in nucleus-nucleus collisions corrected for effects of non-flow correlations where the magnitude of non-flow correlations has been independently measured in data. Over the measured range in centrality, we see large relative fluctuations of 25-50%. The results are consistent with predictions from both color glass condensate and Glauber type initial condition calculations of the event-by-event participant eccentricity fluctuations.
△ Less
Submitted 27 April, 2008;
originally announced April 2008.
-
High p_T Triggered Delta-eta,Delta-phi Correlations over a Broad Range in Delta-eta
Authors:
Edward Wenger
Abstract:
The first measurement of pseudorapidity (Delta-eta) and azimuthal angle (Delta-phi) correlations between high transverse momentum charged hadrons (p_T > 2.5 GeV/c) and all associated particles is presented at both short- (small Delta-eta) and long-range (large Delta-eta) over a continuous pseudorapidity acceptance (-4<Delta-eta<2). In these proceedings, the various near- and away-side features o…
▽ More
The first measurement of pseudorapidity (Delta-eta) and azimuthal angle (Delta-phi) correlations between high transverse momentum charged hadrons (p_T > 2.5 GeV/c) and all associated particles is presented at both short- (small Delta-eta) and long-range (large Delta-eta) over a continuous pseudorapidity acceptance (-4<Delta-eta<2). In these proceedings, the various near- and away-side features of the correlation structure are discussed as a function of centrality in Au+Au collisions measured by PHOBOS at sqrt(s_NN)=200 GeV. In particular, this measurement allows a much more complete determination of the longitudinal extent of the ridge structure, first observed by the STAR collaboration over a limited eta range. In central collisions the ridge persists to at least Delta-eta=4, diminishing in magnitude as collisions become more peripheral until it disappears around Npart=80.
△ Less
Submitted 19 May, 2008; v1 submitted 18 April, 2008;
originally announced April 2008.
-
The Importance of Correlations and Fluctuations on the Initial Source Eccentricity in High-Energy Nucleus-Nucleus Collisions
Authors:
B. Alver,
B. B. Back,
M. D. Baker,
M. Ballintijn,
D. S. Barton,
R. R. Betts,
R. Bindel,
W. Busza,
V. Chetluru,
E. García,
T. Gburek,
J. Hamblen,
U. Heinz,
D. J. Hofman,
R. S. Hollis,
A. Iordanova,
W. Li,
C. Loizides,
S. Manly,
A. C. Mignerey,
R. Nouicer,
A. Olszewski,
C. Reed,
C. Roland,
G. Roland
, et al. (14 additional authors not shown)
Abstract:
In this paper, we investigate various ways of defining the initial source eccentricity using the Monte Carlo Glauber (MCG) approach. In particular, we examine the participant eccentricity, which quantifies the eccentricity of the initial source shape by the major axes of the ellipse formed by the interaction points of the participating nucleons. We show that reasonable variation of the density p…
▽ More
In this paper, we investigate various ways of defining the initial source eccentricity using the Monte Carlo Glauber (MCG) approach. In particular, we examine the participant eccentricity, which quantifies the eccentricity of the initial source shape by the major axes of the ellipse formed by the interaction points of the participating nucleons. We show that reasonable variation of the density parameters in the Glauber calculation, as well as variations in how matter production is modeled, do not significantly modify the already established behavior of the participant eccentricity as a function of collision centrality. Focusing on event-by-event fluctuations and correlations of the distributions of participating nucleons we demonstrate that, depending on the achieved event-plane resolution, fluctuations in the elliptic flow magnitude $v_2$ lead to most measurements being sensitive to the root-mean-square, rather than the mean of the $v_2$ distribution. Neglecting correlations among participants, we derive analytical expressions for the participant eccentricity cumulants as a function of the number of participating nucleons, $\Npart$,kee** non-negligible contributions up to $\ordof{1/\Npart^3}$. We find that the derived expressions yield the same results as obtained from mixed-event MCG calculations which remove the correlations stemming from the nuclear collision process. Most importantly, we conclude from the comparison with MCG calculations that the fourth order participant eccentricity cumulant does not approach the spatial anisotropy obtained assuming a smooth nuclear matter distribution. In particular, for the Cu+Cu system, these quantities deviate from each other by almost a factor of two over a wide range in centrality.
△ Less
Submitted 23 November, 2007;
originally announced November 2007.
-
System Size, Energy and Centrality Dependence of Pseudorapidity Distributions of Charged Particles in Relativistic Heavy Ion Collisions
Authors:
B. Alver,
B. B. Back,
M. D. Baker,
M. Ballintijn,
D. S. Barton,
R. R. Betts,
R. Bindel,
W. Busza,
Z. Chai,
V. Chetluru,
E. García,
T. Gburek,
K. Gulbrandsen,
J. Hamblen,
I. Harnarine,
C. Henderson,
D. J. Hofman,
R. S. Hollis,
R. Hołyński,
B. Holzman,
A. Iordanova,
J. L. Kane,
P. Kulinich,
C. M. Kuo,
W. Li
, et al. (33 additional authors not shown)
Abstract:
We present the first measurements of the pseudorapidity distribution of primary charged particles in Cu+Cu collisions as a function of collision centrality and energy, \sqrtsnn = 22.4, 62.4 and 200 GeV, over a wide range of pseudorapidity, using the PHOBOS detector. Making a global comparison of Cu+Cu and Au+Au results, we find that the total number of produced charged particles and the rough sh…
▽ More
We present the first measurements of the pseudorapidity distribution of primary charged particles in Cu+Cu collisions as a function of collision centrality and energy, \sqrtsnn = 22.4, 62.4 and 200 GeV, over a wide range of pseudorapidity, using the PHOBOS detector. Making a global comparison of Cu+Cu and Au+Au results, we find that the total number of produced charged particles and the rough shape (height and width) of the pseudorapidity distributions are determined by the number of nucleon participants. More detailed studies reveal that a more precise matching of the shape of the Cu+Cu and Au+Au pseudorapidity distributions over the full range of pseudorapidity occurs for the same Npart/2A value rather than the same Npart value. In other words, it is the collision geometry rather than just the number of nucleon participants that drives the detailed shape of the pseudorapidity distribution and its centrality dependence at RHIC energies.
△ Less
Submitted 25 September, 2007;
originally announced September 2007.
-
Identified hadron transverse momentum spectra in Au+Au collisions at sqrt(s_(NN))=62.4 GeV
Authors:
PHOBOS Collaboration,
B. B. Back,
M. D. Baker,
M. Ballintijn,
D. S. Barton,
R. R. Betts,
A. A. Bickley,
R. Bindel,
W. Busza,
A. Carroll,
Z. Chai,
M. P. Decowski,
E. Garcia,
T. Gburek,
N. George,
K. Gulbrandsen,
C. Halliwell,
J. Hamblen,
M. Hauer,
C. Henderson,
D. J. Hofman,
R. S. Hollis,
R. Holynski,
B. Holzman,
A. Iordanova
, et al. (34 additional authors not shown)
Abstract:
Transverse momentum spectra of pions, kaons, protons and antiprotons from Au+Au collisions at sqrt(s_(NN)) = 62.4 GeV have been measured by the PHOBOS experiment at the Relativistic Heavy Ion Collider at Brookhaven National Laboratory. The identification of particles relies on three different methods: low momentum particles stop** in the first detector layers; the specific energy loss (dE/dx)…
▽ More
Transverse momentum spectra of pions, kaons, protons and antiprotons from Au+Au collisions at sqrt(s_(NN)) = 62.4 GeV have been measured by the PHOBOS experiment at the Relativistic Heavy Ion Collider at Brookhaven National Laboratory. The identification of particles relies on three different methods: low momentum particles stop** in the first detector layers; the specific energy loss (dE/dx) in the silicon Spectrometer, and Time-of-Flight measurement. These methods cover the transverse momentum ranges 0.03-0.2, 0.2-1.0 and 0.5-3.0 GeV/c, respectively. Baryons are found to have substantially harder transverse momentum spectra than mesons. The pT region in which the proton to pion ratio reaches unity in central Au+Au collisions at sqrt(s_(NN)) = 62.4 GeV fits into a smooth trend as a function of collision energy. At low transverse momenta, the spectra exhibit a significant deviation from transverse mass scaling, and when the observed particle yields at very low pT are compared to extrapolations from higher pT, no significant excess is found. By comparing our results to Au+Au collisions at sqrt(s_(NN)) = 200 GeV, we conclude that the net proton yield at midrapidity is proportional to the number of participant nucleons in the collision.
△ Less
Submitted 30 September, 2006;
originally announced October 2006.
-
Energy and System Size Dependence of Charged Hadron Transverse Momentum Spectra from Cu+Cu and Au+Au Collisions at sqrt(s_(NN)) = 62.4 and 200 GeV
Authors:
Edward Wenger
Abstract:
The PHOBOS collaboration has measured transverse momentum distributions of charged hadrons produced in Cu+Cu collisions at sqrt(s_(NN)) = 200 and 62.4 GeV. The nuclear modification factor R_(AA)^(Npart) is calculated relative to p+p data at both collision energies as a function of collision centrality. For the same number of participating nucleons, R_(AA)^(Npart) is essentially the same in both…
▽ More
The PHOBOS collaboration has measured transverse momentum distributions of charged hadrons produced in Cu+Cu collisions at sqrt(s_(NN)) = 200 and 62.4 GeV. The nuclear modification factor R_(AA)^(Npart) is calculated relative to p+p data at both collision energies as a function of collision centrality. For the same number of participating nucleons, R_(AA)^(Npart) is essentially the same in both systems over the full range of p_(T) that is measured. In addition, we observe that within experimental uncertainties, the ratio of 200 GeV to 62.4 GeV Cu+Cu yields has only a moderate centrality dependence and is consistent with the value previously measured in Au+Au collisions for a broad range of p_(T).
△ Less
Submitted 15 December, 2005; v1 submitted 19 November, 2005;
originally announced November 2005.
-
Suppression of charge-ordering and appearance of magnetoresistance in a spin-cluster glass manganite La0.3Ca0.7Mn0.8Cr0.2O3
Authors:
T Sudyoadsuk,
R Suryanarayanan,
P Winotai,
L. E. Wenger
Abstract:
The magnetic properties of electron-doped manganite La0.3Ca0.7MnO3 and La0.3Ca0.7Mn0.8Cr0.2O3 polycrystalline samples prepared by sol-gel technique have been investigated between 5 and 300 K in magnetic fields ranging from 0 to 5 T. The transition at 260 K, attributed to charge ordering in La0.3Ca0.7MnO3, is completely suppressed in the Cr-substituted sample while the onset of a magnetic remanen…
▽ More
The magnetic properties of electron-doped manganite La0.3Ca0.7MnO3 and La0.3Ca0.7Mn0.8Cr0.2O3 polycrystalline samples prepared by sol-gel technique have been investigated between 5 and 300 K in magnetic fields ranging from 0 to 5 T. The transition at 260 K, attributed to charge ordering in La0.3Ca0.7MnO3, is completely suppressed in the Cr-substituted sample while the onset of a magnetic remanence followed by the appearance of a magnetic irreversibility at lower temperatures is observed in both samples. These features indicate that ferromagnetic clusters coexist with either an antiferromagnetic phase for La0.3Ca0.7MnO3 or a spin-cluster glass phase for La0.3Ca0.7Mn0.8Cr0.2O3 at the lowest temperatures. The exponential temperature dependence of the resistivity for the Cr-substituted sample is consistent with the small polaron hop** model for 120 K < T < 300 K, while the data are better described by Mott's hop** mechanism for T < 120 K. Whereas the parent compound La0.3Ca0.7MnO3 is known to show no magnetoresistance, a large negative magnetoresistance is observed in the La0.3Ca0.7Mn0.8Cr0.2O3 sample below 120 K. The appearance of the CMR is attributed to spin dependent hop** between spin clusters and/or between ferromagnetic domains.
△ Less
Submitted 28 May, 2003;
originally announced May 2003.
-
Detailed investigation of the superconducting transition of niobium disks exhibiting the paramagnetic Meissner effect
Authors:
L. Pust,
L. E. Wenger,
M. R. Koblischka
Abstract:
The superconducting transition region in a Nb disk showing the paramagnetic Meissner effect (PME) has been investigated in detail. From the field-cooled magnetization behavior, two well-defined temperatures can be associated with the appearance of the PME: T_1 (< T_c) indicates the characteristic temperature where the paramagnetic moment first appears and a lower temperature T_p (< T_1) defines…
▽ More
The superconducting transition region in a Nb disk showing the paramagnetic Meissner effect (PME) has been investigated in detail. From the field-cooled magnetization behavior, two well-defined temperatures can be associated with the appearance of the PME: T_1 (< T_c) indicates the characteristic temperature where the paramagnetic moment first appears and a lower temperature T_p (< T_1) defines the temperature where the positive moment no longer increases. During the subsequent warming, the paramagnetic moment begins to decrease at T_p and then vanishes at T_1 with the magnitude of the magnetization change between these two temperatures being nearly the same as that during cooling. This indicates that the nature of the PME is reversible and not associated with flux motion. Furthermore, the appearance of this paramagnetic moment is even observable in fields as large as 0.2 T even though the magnetization does not remain positive to the lowest temperatures. Magnetic hysteresis loops in the temperature range between T_1 and T_p also exhibit a distinct shape that is different from the archetypal shape of a bulk type-II superconductor. These behaviors are discussed in terms of the so-called 'giant vortex state'.
△ Less
Submitted 7 July, 1998;
originally announced July 1998.