Skip to main content

Showing 1–39 of 39 results for author: Wenger, E

.
  1. arXiv:2403.10328  [pdf, other

    cs.CR

    The cool and the cruel: separating hard parts of LWE secrets

    Authors: Niklas Nolte, Mohamed Malhou, Emily Wenger, Samuel Stevens, Cathy Li, François Charton, Kristin Lauter

    Abstract: Sparse binary LWE secrets are under consideration for standardization for Homomorphic Encryption and its applications to private computation. Known attacks on sparse binary LWE secrets include the sparse dual attack and the hybrid sparse dual-meet in the middle attack which requires significant memory. In this paper, we provide a new statistical attack with low memory requirement. The attack relie… ▽ More

    Submitted 15 March, 2024; originally announced March 2024.

  2. arXiv:2402.01082  [pdf, other

    cs.CR cs.LG

    Salsa Fresca: Angular Embeddings and Pre-Training for ML Attacks on Learning With Errors

    Authors: Samuel Stevens, Emily Wenger, Cathy Li, Niklas Nolte, Eshika Saxena, François Charton, Kristin Lauter

    Abstract: Learning with Errors (LWE) is a hard math problem underlying recently standardized post-quantum cryptography (PQC) systems for key exchange and digital signatures. Prior work proposed new machine learning (ML)-based attacks on LWE problems with small, sparse secrets, but these attacks require millions of LWE samples to train on and take days to recover secrets. We propose three key methods -- bett… ▽ More

    Submitted 1 February, 2024; originally announced February 2024.

    Comments: 8 pages (main text)

  3. arXiv:2306.11641  [pdf, ps, other

    cs.CR

    SALSA VERDE: a machine learning attack on Learning With Errors with sparse small secrets

    Authors: Cathy Yuanchen Li, Emily Wenger, Zeyuan Allen-Zhu, Francois Charton, Kristin Lauter

    Abstract: Learning with Errors (LWE) is a hard math problem used in post-quantum cryptography. Homomorphic Encryption (HE) schemes rely on the hardness of the LWE problem for their security, and two LWE-based cryptosystems were recently standardized by NIST for digital signatures and key exchange (KEM). Thus, it is critical to continue assessing the security of LWE and specific parameter choices. For exampl… ▽ More

    Submitted 27 October, 2023; v1 submitted 20 June, 2023; originally announced June 2023.

    Comments: 18 pages, accepted to NeurIPS 2023

  4. arXiv:2303.04178  [pdf, ps, other

    cs.CR cs.LG

    SALSA PICANTE: a machine learning attack on LWE with binary secrets

    Authors: Cathy Li, Jana Sotáková, Emily Wenger, Mohamed Malhou, Evrard Garcelon, Francois Charton, Kristin Lauter

    Abstract: Learning with Errors (LWE) is a hard math problem underpinning many proposed post-quantum cryptographic (PQC) systems. The only PQC Key Exchange Mechanism (KEM) standardized by NIST is based on module~LWE, and current publicly available PQ Homomorphic Encryption (HE) libraries are based on ring LWE. The security of LWE-based PQ cryptosystems is critical, but certain implementation choices could we… ▽ More

    Submitted 31 October, 2023; v1 submitted 7 March, 2023; originally announced March 2023.

    Comments: 15 pages, 6 figures, 17 tables; accepted to CCS 2023

  5. arXiv:2302.04222  [pdf, other

    cs.CR

    Glaze: Protecting Artists from Style Mimicry by Text-to-Image Models

    Authors: Shawn Shan, Jenna Cryan, Emily Wenger, Haitao Zheng, Rana Hanocka, Ben Y. Zhao

    Abstract: Recent text-to-image diffusion models such as MidJourney and Stable Diffusion threaten to displace many in the professional artist community. In particular, models can learn to mimic the artistic style of specific artists after "fine-tuning" on samples of their art. In this paper, we describe the design, implementation and evaluation of Glaze, a tool that enables artists to apply "style cloaks" to… ▽ More

    Submitted 3 August, 2023; v1 submitted 8 February, 2023; originally announced February 2023.

    Comments: USENIX Security 2023

  6. arXiv:2208.13893  [pdf, ps, other

    cs.CR cs.LG

    Data Isotopes for Data Provenance in DNNs

    Authors: Emily Wenger, Xiuyu Li, Ben Y. Zhao, Vitaly Shmatikov

    Abstract: Today, creators of data-hungry deep neural networks (DNNs) scour the Internet for training fodder, leaving users with little control over or knowledge of when their data is appropriated for model training. To empower users to counteract unwanted data use, we design, implement and evaluate a practical system that enables users to detect if their data was used to train an DNN model. We show how user… ▽ More

    Submitted 27 February, 2023; v1 submitted 29 August, 2022; originally announced August 2022.

    Comments: 17 pages

  7. arXiv:2207.04785  [pdf, ps, other

    cs.CR cs.LG

    SALSA: Attacking Lattice Cryptography with Transformers

    Authors: Emily Wenger, Mingjie Chen, François Charton, Kristin Lauter

    Abstract: Currently deployed public-key cryptosystems will be vulnerable to attacks by full-scale quantum computers. Consequently, "quantum resistant" cryptosystems are in high demand, and lattice-based cryptosystems, based on a hard problem known as Learning With Errors (LWE), have emerged as strong contenders for standardization. In this work, we train transformers to perform modular arithmetic and combin… ▽ More

    Submitted 21 April, 2023; v1 submitted 11 July, 2022; originally announced July 2022.

    Comments: Extended version of work published at NeurIPS 2022

  8. arXiv:2206.10673  [pdf, ps, other

    cs.CV cs.CR

    Natural Backdoor Datasets

    Authors: Emily Wenger, Roma Bhattacharjee, Arjun Nitin Bhagoji, Josephine Passananti, Emilio Andere, Haitao Zheng, Ben Y. Zhao

    Abstract: Extensive literature on backdoor poison attacks has studied attacks and defenses for backdoors using "digital trigger patterns." In contrast, "physical backdoors" use physical objects as triggers, have only recently been identified, and are qualitatively different enough to resist all defenses targeting digital trigger backdoors. Research on physical backdoors is limited by access to large dataset… ▽ More

    Submitted 21 June, 2022; originally announced June 2022.

    Comments: 18 pages

  9. Post-breach Recovery: Protection against White-box Adversarial Examples for Leaked DNN Models

    Authors: Shawn Shan, Wenxin Ding, Emily Wenger, Haitao Zheng, Ben Y. Zhao

    Abstract: Server breaches are an unfortunate reality on today's Internet. In the context of deep neural network (DNN) models, they are particularly harmful, because a leaked model gives an attacker "white-box" access to generate adversarial examples, a threat model that has no practical robust defenses. For practitioners who have invested years and millions into proprietary DNNs, e.g. medical imaging, this… ▽ More

    Submitted 16 October, 2022; v1 submitted 21 May, 2022; originally announced May 2022.

    Journal ref: 2022 ACM Conference on Computer and Communications Security (CCS)

  10. arXiv:2202.05760  [pdf, ps, other

    cs.CR cs.CV

    Assessing Privacy Risks from Feature Vector Reconstruction Attacks

    Authors: Emily Wenger, Francesca Falzon, Josephine Passananti, Haitao Zheng, Ben Y. Zhao

    Abstract: In deep neural networks for facial recognition, feature vectors are numerical representations that capture the unique features of a given face. While it is known that a version of the original face can be recovered via "feature reconstruction," we lack an understanding of the end-to-end privacy risks produced by these attacks. In this work, we address this shortcoming by develo** metrics that me… ▽ More

    Submitted 11 February, 2022; originally announced February 2022.

    Comments: 7 pages

  11. arXiv:2112.04558  [pdf, ps, other

    cs.CR cs.CV cs.LG

    SoK: Anti-Facial Recognition Technology

    Authors: Emily Wenger, Shawn Shan, Haitao Zheng, Ben Y. Zhao

    Abstract: The rapid adoption of facial recognition (FR) technology by both government and commercial entities in recent years has raised concerns about civil liberties and privacy. In response, a broad suite of so-called "anti-facial recognition" (AFR) tools has been developed to help users avoid unwanted facial recognition. The set of AFR tools proposed in the last few years is wide-ranging and rapidly evo… ▽ More

    Submitted 15 February, 2023; v1 submitted 8 December, 2021; originally announced December 2021.

    Comments: Camera-ready version for Oakland S&P 2023

  12. arXiv:2109.09598  [pdf, ps, other

    cs.CR cs.AI cs.SD eess.AS

    "Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World

    Authors: Emily Wenger, Max Bronckers, Christian Cianfarani, Jenna Cryan, Angela Sha, Haitao Zheng, Ben Y. Zhao

    Abstract: Advances in deep learning have introduced a new wave of voice synthesis tools, capable of producing audio that sounds as if spoken by a target speaker. If successful, such tools in the wrong hands will enable a range of powerful attacks against both humans and software systems (aka machines). This paper documents efforts and findings from a comprehensive experimental study on the impact of deep-le… ▽ More

    Submitted 20 September, 2021; originally announced September 2021.

    Comments: 13 pages

  13. Evidence for a soft-phonon-mode-driven Peierls-type distortion in Sc$_3$CoC$_4$

    Authors: Jan Langmann, Christof Haas, Emmanuel Wenger, Dominik Schaniel, Wolfgang Scherer, Georg Eickerling

    Abstract: We provide experimental and theoretical evidence for the realization of the Peierls-type structurally distorted state in the quasi-one-dimensional superconductor Sc$_3$CoC$_4$ by a phonon-softening mechanism. The transition from the high- to the final low-temperature phase below 80K proceeds via an extended intermediate temperature regime between 80K and 150K characterized by phonon-driven atom di… ▽ More

    Submitted 8 September, 2020; originally announced September 2020.

    Comments: 9 pages, 7 figures and supporting information

    Journal ref: Phys. Rev. B 102, 094109 (2020)

  14. arXiv:2006.14580  [pdf, ps, other

    cs.CV cs.CR cs.LG

    Backdoor Attacks Against Deep Learning Systems in the Physical World

    Authors: Emily Wenger, Josephine Passananti, Arjun Bhagoji, Yuanshun Yao, Haitao Zheng, Ben Y. Zhao

    Abstract: Backdoor attacks embed hidden malicious behaviors into deep learning models, which only activate and cause misclassifications on model inputs containing a specific trigger. Existing works on backdoor attacks and defenses, however, mostly focus on digital attacks that use digitally generated patterns as triggers. A critical question remains unanswered: can backdoor attacks succeed using physical ob… ▽ More

    Submitted 7 September, 2021; v1 submitted 25 June, 2020; originally announced June 2020.

    Comments: Accepted to the 2021 Conference on Computer Vision and Pattern Recognition (CVPR 2021); 14 pages

  15. arXiv:2006.14042  [pdf, ps, other

    cs.CR cs.CV cs.LG

    Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks

    Authors: Huiying Li, Shawn Shan, Emily Wenger, Jiayun Zhang, Haitao Zheng, Ben Y. Zhao

    Abstract: Deep learning systems are known to be vulnerable to adversarial examples. In particular, query-based black-box attacks do not require knowledge of the deep learning model, but can compute adversarial examples over the network by submitting queries and inspecting returns. Recent work largely improves the efficiency of those attacks, demonstrating their practicality on today's ML-as-a-service platfo… ▽ More

    Submitted 9 June, 2022; v1 submitted 24 June, 2020; originally announced June 2020.

  16. arXiv:2005.13689  [pdf, other

    q-bio.PE physics.soc-ph

    Stochasticity and heterogeneity in the transmission dynamics of SARS-CoV-2

    Authors: Benjamin M. Althouse, Edward A. Wenger, Joel C. Miller, Samuel V. Scarpino, Antoine Allard, Laurent Hébert-Dufresne, Hao Hu

    Abstract: SARS-CoV-2 causing COVID-19 disease has moved rapidly around the globe, infecting millions and killing hundreds of thousands. The basic reproduction number, which has been widely used and misused to characterize the transmissibility of the virus, hides the fact that transmission is stochastic, is dominated by a small number of individuals, and is driven by super-spreading events (SSEs). The distin… ▽ More

    Submitted 27 May, 2020; originally announced May 2020.

    Comments: 10 pages, 3 figures

  17. arXiv:2002.08327  [pdf, ps, other

    cs.CR cs.CV cs.LG stat.ML

    Fawkes: Protecting Privacy against Unauthorized Deep Learning Models

    Authors: Shawn Shan, Emily Wenger, Jiayun Zhang, Huiying Li, Haitao Zheng, Ben Y. Zhao

    Abstract: Today's proliferation of powerful facial recognition systems poses a real threat to personal privacy. As Clearview.ai demonstrated, anyone can canvas the Internet for data and train highly accurate facial recognition models of individuals without their knowledge. We need tools to protect ourselves from potential misuses of unauthorized facial recognition systems. Unfortunately, no practical or eff… ▽ More

    Submitted 22 June, 2020; v1 submitted 19 February, 2020; originally announced February 2020.

    Journal ref: USENIX Security Symposium 2020

  18. arXiv:1910.01226  [pdf, ps, other

    cs.CR cs.LG stat.ML

    Piracy Resistant Watermarks for Deep Neural Networks

    Authors: Huiying Li, Emily Wenger, Shawn Shan, Ben Y. Zhao, Haitao Zheng

    Abstract: As companies continue to invest heavily in larger, more accurate and more robust deep learning models, they are exploring approaches to monetize their models while protecting their intellectual property. Model licensing is promising, but requires a robust tool for owners to claim ownership of models, i.e. a watermark. Unfortunately, current designs have not been able to address piracy attacks, whe… ▽ More

    Submitted 2 December, 2020; v1 submitted 2 October, 2019; originally announced October 2019.

    Comments: 18 pages

  19. arXiv:1904.08554  [pdf, ps, other

    cs.LG cs.CR stat.ML

    Gotta Catch 'Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks

    Authors: Shawn Shan, Emily Wenger, Bolun Wang, Bo Li, Haitao Zheng, Ben Y. Zhao

    Abstract: Deep neural networks (DNN) are known to be vulnerable to adversarial attacks. Numerous efforts either try to patch weaknesses in trained models, or try to make it difficult or costly to compute adversarial examples that exploit them. In our work, we explore a new "honeypot" approach to protect DNN models. We intentionally inject trapdoors, honeypot weaknesses in the classification manifold that at… ▽ More

    Submitted 28 September, 2020; v1 submitted 17 April, 2019; originally announced April 2019.

    Journal ref: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security

  20. Malaria elimination campaigns in the Lake Kariba region of Zambia: a spatial dynamical model

    Authors: Milen Nikolov, Caitlin A. Bever, Alexander Upfill-Brown, Busiku Hamainza, John M. Miller, Philip A. Eckhoff, Edward A. Wenger, Jaline Gerardin

    Abstract: Background As more regions approach malaria elimination, understanding how different interventions interact to reduce transmission becomes critical. The Lake Kariba area of Southern Province, Zambia, is part of a multi-country elimination effort and presents a particular challenge as it is an interconnected region of variable transmission intensities. Methods In 2012-13, six rounds of mass-scree… ▽ More

    Submitted 15 March, 2016; originally announced March 2016.

  21. Participant and spectator scaling of spectator fragments in Au+Au and Cu+Cu collisions at sqrt(sNN) = 19.6 and 22.4 GeV

    Authors: B. Alver, B. B. Back, M. D. Baker, M. Ballintijn, D. S. Barton, R. R. Betts, A. A. Bickley, R. Bindel, A. Budzanowski, W. Busza, A. Carroll, Z. Chai, V. Chetluru, M. P. Decowski, E. Garcia, T. Gburek, N. George, K. Gulbrandsen, S. Gushue, C. Halliwell, J. Hamblen, I. Harnarine, G. A. Heintzelman, C. Henderson, D. J. Hofman , et al. (57 additional authors not shown)

    Abstract: Spectator fragments resulting from relativistic heavy ion collisions, consisting of single protons and neutrons along with groups of stable nuclear fragments up to Nitrogen (Z=7), are measured in PHOBOS. These fragments are observed in Au+Au (sqrt(sNN)=19.6 GeV) and Cu+Cu (22.4 GeV) collisions at high pseudorapidity ($η$). The dominant multiply-charged fragment is the tightly bound Helium ($α$), w… ▽ More

    Submitted 24 November, 2015; originally announced November 2015.

    Comments: To be submitted to PRC 17 pages, 19 figures

    Journal ref: Phys. Rev. C 94, 024903 (2016)

  22. Optimal population-level infection detection strategies for malaria control and elimination in a spatial model of malaria transmission

    Authors: Jaline Gerardin, Caitlin A. Bever, Busiku Hamainza, John M. Miller, Philip A. Eckhoff, Edward A. Wenger

    Abstract: Mass campaigns with antimalarial drugs are potentially a powerful tool for local elimination of malaria, yet current diagnostic technologies are insufficiently sensitive to identify all individuals who harbor infections. At the same time, overtreatment of uninfected individuals increases the risk of accelerating emergence of drug resistance and losing community acceptance. Local heterogeneity in t… ▽ More

    Submitted 2 September, 2015; originally announced September 2015.

  23. Mass campaigns with antimalarial drugs: a modelling comparison of artemether-lumefantrine and DHA-piperaquine with and without primaquine as tools for malaria control and elimination

    Authors: Jaline Gerardin, Philip Eckhoff, Edward A. Wenger

    Abstract: Antimalarial drugs are a powerful tool for malaria control and elimination. Artemisinin-based combination therapies (ACTs) can reduce transmission when widely distributed in a campaign setting. Modelling mass antimalarial campaigns can elucidate how to most effectively deploy drug-based interventions and quantitatively compare the effects of cure, prophylaxis, and transmission-blocking in suppress… ▽ More

    Submitted 31 March, 2015; originally announced March 2015.

    Comments: 14 pages, 5 figures

    Journal ref: Gerardin et al. BMC Infectious Diseases (2015) 15:144

  24. Characterization of the infectious reservoir of malaria with an agent-based model calibrated to age-stratified parasite densities and infectiousness

    Authors: Jaline Gerardin, Andre Lin Ouedraogo, Kevin A. McCarthy, Bocar Kouyate, Philip A. Eckhoff, Edward A. Wenger

    Abstract: Background Elimination of malaria can only be achieved through removal of all vectors or complete depletion of the infectious reservoir in humans. Mechanistic models can be built to synthesize diverse observations from the field collected under a variety of conditions and subsequently used to query the infectious reservoir in great detail. Methods The EMOD model of malaria transmission was calibra… ▽ More

    Submitted 31 March, 2015; originally announced March 2015.

    Comments: submitted to Malaria Journal on March 31, 2015

    Journal ref: Malaria Journal 2015, 14:231

  25. arXiv:1210.3603  [pdf

    cond-mat.supr-con cond-mat.mtrl-sci cond-mat.other

    Pressure Induced Superconductivity in Ba0.5Sr0.5Fe2As2

    Authors: Georgiy M. Tsoi, Walter Malone, Walter Uhoya, Jonathan E. Mitchel, Yogesh K. Vohra, Lowell E. Wenger, Athena S. Sefat, S. T . Weir

    Abstract: High-pressure electrical resistance measurements have been performed on single crystal Ba0.5Sr0.5Fe2As2 platelets to pressures of 16 GPa and temperatures down to 10 K using designer diamond anvils under quasi-hydrostatic conditions with an insulating steatite pressure medium. The resistance measurements show evidence of pressure-induced superconductivity with an onset transition temperature at ~31… ▽ More

    Submitted 12 October, 2012; originally announced October 2012.

    Journal ref: J. Phys.: Condens. Matter 24 495702 (2012)

  26. arXiv:1206.3720  [pdf, other

    q-bio.QM q-bio.PE stat.AP

    Description of the EMOD-HIV Model v0.7

    Authors: Anna Bershteyn, Daniel J. Klein, Edward Wenger, Philip A. Eckhoff

    Abstract: The expansion of tools against HIV transmission has brought increased interest in epidemiological models that can predict the impact of these interventions. The EMOD-HIV model was recently compared to eleven other independently developed mathematical models of HIV transmission to determine the extent to which they agree about the potential impact of expanded use of antiretroviral therapy in South… ▽ More

    Submitted 16 June, 2012; originally announced June 2012.

    Comments: 16 pages, 5 figures

  27. Phobos results on charged particle multiplicity and pseudorapidity distributions in Au+Au, Cu+Cu, d+Au, and p+p collisions at ultra-relativistic energies

    Authors: B. Alver, B. B. Back, M. D. Baker, M. Ballintijn, D. S. Barton, R. R. Betts, A. A. Bickley, R. Bindel, A. Budzanowski, W. Busza, A. Carroll, Z. Chai, V. Chetluru, M. P. Decowski, E. Garcıa, T. Gburek, N. George, K. Gulbrandsen, S. Gushue, C. Halliwell, J. Hamblen, G. A. Heintzelman, C. Henderson, D. J. Hofman, R. S. Hollis , et al. (54 additional authors not shown)

    Abstract: Pseudorapidity distributions of charged particles emitted in $Au+Au$, $Cu+Cu$, $d+Au$, and $p+p$ collisions over a wide energy range have been measured using the PHOBOS detector at RHIC. The centrality dependence of both the charged particle distributions and the multiplicity at midrapidity were measured. Pseudorapidity distributions of charged particles emitted with $|η|<5.4$, which account for b… ▽ More

    Submitted 8 November, 2010; originally announced November 2010.

    Comments: 25 pages, 29 figures, 8 tables

    Journal ref: Phys.Rev.C83:024913,2011

  28. arXiv:1003.5928  [pdf, other

    hep-ph hep-ex

    Convoluting jet spectra with fragmentation functions: a cross-check of the charged particle p_T spectrum

    Authors: Andre S. Yoon, Edward Wenger, Gunther Roland

    Abstract: Motivated by the excellent agreement between next-to-leading-order pQCD calculations and the inclusive jet spectra measured by CDF, we cross-check PYTHIA fragmentation functions. The convolution of the measured jet spectra with unmodified PYTHIA fragmentation functions results in reasonable agreement with the PYTHIA charged particle spectrum over the entire p_T range of interest, while there is a… ▽ More

    Submitted 30 March, 2010; originally announced March 2010.

  29. arXiv:0906.3746  [pdf, other

    nucl-ex

    Centrality Dependence of Delta-eta, Delta-phi Correlations in Heavy Ion Collisions

    Authors: Edward Wenger

    Abstract: In these proceedings, a measurement of two-particle correlations with a high transverse momentum trigger particle (pT_trig > 2.5 GeV/c) is presented for Au+Au collisions at sqrt(s_NN) = 200 GeV over the uniquely broad longitudinal acceptance of the PHOBOS detector (-4 < Delta-eta < 2). As in p+p collisions, the near-side is characterized by a peak of correlated partners at small angle relative t… ▽ More

    Submitted 19 June, 2009; originally announced June 2009.

    Comments: 4 pages, 3 figures, proceedings for the 2009 QCD session of the Moriond conference

  30. Scaling properties in bulk and p$_{\rm T}$-dependent particle production near midrapidity in relativistic heavy ion collisions

    Authors: PHOBOS Collaboration, B. Alver, B. B. Back, M. D. Baker, M. Ballintijn, D. S. Barton, R. R. Betts, R. Bindel, W. Busza, Z. Chai, V. Chetluru, E. Garcia, T. Gburek, K. Gulbrandsen, J. Hamblen, I. Harnarine, C. Henderson, D. J. Hofman, R. S. Hollis, R. Holynski, B. Holzman, A. Iordanova, J. L. Kane, P. Kulinich, C. M. Kuo , et al. (34 additional authors not shown)

    Abstract: The centrality dependence of the midrapidity charged-particle multiplicity density ($|η|$$<$1) is presented for Au+Au and Cu+Cu collisions at RHIC over a broad range of collision energies. The multiplicity measured in the Cu+Cu system is found to be similar to that measured in the Au+Au system, for an equivalent N$_{\rm part}$, with the observed factorization in energy and centrality still persi… ▽ More

    Submitted 13 August, 2008; originally announced August 2008.

    Comments: Submitted for publication in Phys. Rev. C, 5 pages, 3 figures

    Journal ref: Phys.Rev.C80:011901,2009

  31. System size, energy, centrality and pseudorapidity dependence of charged-particle density in Au+Au and Cu+Cu collisions at RHIC

    Authors: PHOBOS Collaboration, G. I. Veres, B. Alver, B. B. Back, M. D. Baker, M. Ballintijn, D. S. Barton, R. R. Betts, A. A. Bickley, R. Bindel, W. Busza, A. Carroll, Z. Chai, V. Chetluru, M. P. Decowski, E. García, T. Gburek, N. George, K. Gulbrandsen, C. Halliwell, J. Hamblen, I. Harnarine, M. Hauer, C. Henderson, D. J. Hofman , et al. (44 additional authors not shown)

    Abstract: Charged particle pseudorapidity distributions are presented from the PHOBOS experiment at RHIC, measured in Au+Au and Cu+Cu collisions at sqrt{s_NN}=19.6, 22.4, 62.4, 130 and 200 GeV, as a function of collision centrality. The presentation includes the recently analyzed Cu+Cu data at 22.4 GeV. The measurements were made by the same detector setup over a broad range in pseudorapidity, |eta|<5.4,… ▽ More

    Submitted 17 June, 2008; originally announced June 2008.

    Comments: 5 pages, 4 figures. Presented at the 20th International Conference on Nucleus-Nucleus Collisions (Quark Matter 2008), Jaipur, Rajasthan, India, 4-10 February 2008

    Journal ref: Indian J.Phys.85:1015-1019,2011

  32. Non-flow correlations and elliptic flow fluctuations in Au+Au collisions at sqrt(s_NN)=200GeV

    Authors: PHOBOS Collaboration, B. Alver, B. B. Back, M. D. Baker, M. Ballintijn, D. S. Barton, R. R. Betts, A. A. Bickley, R. Bindel, W. Busza, A. Carroll, Z. Chai, V. Chetluru, M. P. Decowski, E. Garcia, T. Gburek, N. George, K. Gulbrandsen, C. Halliwell, J. Hamblen, I. Harnarine, M. Hauer, C. Henderson, D. J. Hofman, R. S. Hollis , et al. (44 additional authors not shown)

    Abstract: We present first results on event-by-event elliptic flow fluctuations in nucleus-nucleus collisions corrected for effects of non-flow correlations where the magnitude of non-flow correlations has been independently measured in data. Over the measured range in centrality, we see large relative fluctuations of 25-50%. The results are consistent with predictions from both color glass condensate and… ▽ More

    Submitted 27 April, 2008; originally announced April 2008.

    Comments: 4 pages, 3 figures, Quark Matter 2008 Proceedings

    Journal ref: J.Phys.G35:104101,2008

  33. High p_T Triggered Delta-eta,Delta-phi Correlations over a Broad Range in Delta-eta

    Authors: Edward Wenger

    Abstract: The first measurement of pseudorapidity (Delta-eta) and azimuthal angle (Delta-phi) correlations between high transverse momentum charged hadrons (p_T > 2.5 GeV/c) and all associated particles is presented at both short- (small Delta-eta) and long-range (large Delta-eta) over a continuous pseudorapidity acceptance (-4<Delta-eta<2). In these proceedings, the various near- and away-side features o… ▽ More

    Submitted 19 May, 2008; v1 submitted 18 April, 2008; originally announced April 2008.

    Comments: 5 pages, 2 figures, presented at the 20th International Conference on Ultra-Relativistic Nucleus-Nucleus Collisions, "Quark Matter 2008", Jaipur, India, February 4-10, 2008. Full author list included and typo corrected in equation 1

    Journal ref: J.Phys.G35:104080,2008

  34. The Importance of Correlations and Fluctuations on the Initial Source Eccentricity in High-Energy Nucleus-Nucleus Collisions

    Authors: B. Alver, B. B. Back, M. D. Baker, M. Ballintijn, D. S. Barton, R. R. Betts, R. Bindel, W. Busza, V. Chetluru, E. García, T. Gburek, J. Hamblen, U. Heinz, D. J. Hofman, R. S. Hollis, A. Iordanova, W. Li, C. Loizides, S. Manly, A. C. Mignerey, R. Nouicer, A. Olszewski, C. Reed, C. Roland, G. Roland , et al. (14 additional authors not shown)

    Abstract: In this paper, we investigate various ways of defining the initial source eccentricity using the Monte Carlo Glauber (MCG) approach. In particular, we examine the participant eccentricity, which quantifies the eccentricity of the initial source shape by the major axes of the ellipse formed by the interaction points of the participating nucleons. We show that reasonable variation of the density p… ▽ More

    Submitted 23 November, 2007; originally announced November 2007.

    Comments: 18 pages, 10 figures, submitted to PRC

    Journal ref: Phys.Rev.C77:014906,2008

  35. System Size, Energy and Centrality Dependence of Pseudorapidity Distributions of Charged Particles in Relativistic Heavy Ion Collisions

    Authors: B. Alver, B. B. Back, M. D. Baker, M. Ballintijn, D. S. Barton, R. R. Betts, R. Bindel, W. Busza, Z. Chai, V. Chetluru, E. García, T. Gburek, K. Gulbrandsen, J. Hamblen, I. Harnarine, C. Henderson, D. J. Hofman, R. S. Hollis, R. Hołyński, B. Holzman, A. Iordanova, J. L. Kane, P. Kulinich, C. M. Kuo, W. Li , et al. (33 additional authors not shown)

    Abstract: We present the first measurements of the pseudorapidity distribution of primary charged particles in Cu+Cu collisions as a function of collision centrality and energy, \sqrtsnn = 22.4, 62.4 and 200 GeV, over a wide range of pseudorapidity, using the PHOBOS detector. Making a global comparison of Cu+Cu and Au+Au results, we find that the total number of produced charged particles and the rough sh… ▽ More

    Submitted 25 September, 2007; originally announced September 2007.

    Comments: Submitted to Physical Review Letters

    Journal ref: Phys.Rev.Lett.102:142301,2009

  36. Identified hadron transverse momentum spectra in Au+Au collisions at sqrt(s_(NN))=62.4 GeV

    Authors: PHOBOS Collaboration, B. B. Back, M. D. Baker, M. Ballintijn, D. S. Barton, R. R. Betts, A. A. Bickley, R. Bindel, W. Busza, A. Carroll, Z. Chai, M. P. Decowski, E. Garcia, T. Gburek, N. George, K. Gulbrandsen, C. Halliwell, J. Hamblen, M. Hauer, C. Henderson, D. J. Hofman, R. S. Hollis, R. Holynski, B. Holzman, A. Iordanova , et al. (34 additional authors not shown)

    Abstract: Transverse momentum spectra of pions, kaons, protons and antiprotons from Au+Au collisions at sqrt(s_(NN)) = 62.4 GeV have been measured by the PHOBOS experiment at the Relativistic Heavy Ion Collider at Brookhaven National Laboratory. The identification of particles relies on three different methods: low momentum particles stop** in the first detector layers; the specific energy loss (dE/dx)… ▽ More

    Submitted 30 September, 2006; originally announced October 2006.

    Comments: 15 pages, 12 figures. Submitted to Phys. Rev. C

    Journal ref: Phys.Rev.C75:024910,2007

  37. Energy and System Size Dependence of Charged Hadron Transverse Momentum Spectra from Cu+Cu and Au+Au Collisions at sqrt(s_(NN)) = 62.4 and 200 GeV

    Authors: Edward Wenger

    Abstract: The PHOBOS collaboration has measured transverse momentum distributions of charged hadrons produced in Cu+Cu collisions at sqrt(s_(NN)) = 200 and 62.4 GeV. The nuclear modification factor R_(AA)^(Npart) is calculated relative to p+p data at both collision energies as a function of collision centrality. For the same number of participating nucleons, R_(AA)^(Npart) is essentially the same in both… ▽ More

    Submitted 15 December, 2005; v1 submitted 19 November, 2005; originally announced November 2005.

    Comments: 4 pages, 2 figures, QM2005 Conference poster proceedings published in Acta Physica Hungarica A

    Journal ref: Acta Phys.Hung. A27 (2006) 271-274

  38. Suppression of charge-ordering and appearance of magnetoresistance in a spin-cluster glass manganite La0.3Ca0.7Mn0.8Cr0.2O3

    Authors: T Sudyoadsuk, R Suryanarayanan, P Winotai, L. E. Wenger

    Abstract: The magnetic properties of electron-doped manganite La0.3Ca0.7MnO3 and La0.3Ca0.7Mn0.8Cr0.2O3 polycrystalline samples prepared by sol-gel technique have been investigated between 5 and 300 K in magnetic fields ranging from 0 to 5 T. The transition at 260 K, attributed to charge ordering in La0.3Ca0.7MnO3, is completely suppressed in the Cr-substituted sample while the onset of a magnetic remanen… ▽ More

    Submitted 28 May, 2003; originally announced May 2003.

  39. Detailed investigation of the superconducting transition of niobium disks exhibiting the paramagnetic Meissner effect

    Authors: L. Pust, L. E. Wenger, M. R. Koblischka

    Abstract: The superconducting transition region in a Nb disk showing the paramagnetic Meissner effect (PME) has been investigated in detail. From the field-cooled magnetization behavior, two well-defined temperatures can be associated with the appearance of the PME: T_1 (< T_c) indicates the characteristic temperature where the paramagnetic moment first appears and a lower temperature T_p (< T_1) defines… ▽ More

    Submitted 7 July, 1998; originally announced July 1998.

    Comments: Total 4 printed pages, 4 Figures