Results for "Shihan Sajeed"

total 26took 0.09s
Finite-key-size effect in commercial plug-and-play QKD systemOct 21 2016We demonstrate the ability of an eavesdropper to control the sifted-key size in a commercial plug-and-play QKD system Clavis2 from ID Quantique, and its effect on security analysis. Experimentally, we could consistently force the system to generate the ... More
Invisible Trojan-horse attackApr 25 2017Jul 12 2017We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical ... More
Security loophole in free-space quantum key distribution due to spatial-mode detector-efficiency mismatchFeb 10 2015Jun 10 2015In free-space quantum key distribution (QKD), the sensitivity of the receiver's detector channels may depend differently on the spatial mode of incoming photons. Consequently, an attacker can control the spatial mode to break security. We experimentally ... More
Testing random-detector-efficiency countermeasure in a commercial system reveals a breakable unrealistic assumptionJan 05 2016Oct 18 2016In the last decade, efforts have been made to reconcile theoretical security with realistic imperfect implementations of quantum key distribution (QKD). Implementable countermeasures are proposed to patch the discovered loopholes. However, certain countermeasures ... More
Experimental quantum key distribution with source flawsAug 15 2014Apr 15 2015Decoy-state quantum key distribution (QKD) is a standard technique in current quantum cryptographic implementations. Unfortunately, existing experiments have two important drawbacks: the state preparation is assumed to be perfect without errors and the ... More
Eavesdropping and countermeasures for backflash side channel in quantum cryptographyApr 27 2018Aug 01 2018Quantum key distribution (QKD) promises information theoretic secure key as long as the device performs as assumed in the theoretical model. One of the assumptions is an absence of information leakage about individual photon detection outcomes of the ... More
A hacker's guide to attacking a free-space quantum key distribution receiver in atmospheric turbulenceFeb 04 2019The ability of an eavesdropper (Eve) to perform an intercept-resend attack on a free-space quantum key distribution (QKD) receiver by precisely controlling the incidence angle of an attack laser has been previously demonstrated. However, such an attack ... More
Eavesdropper's ability to attack a free-space quantum-key-distribution receiver in atmospheric turbulenceFeb 04 2019Jun 20 2019The ability of an eavesdropper (Eve) to perform an intercept-resend attack on a free-space quantum key distribution (QKD) receiver by precisely controlling the incidence angle of an attack laser has been previously demonstrated. However, such an attack ... More
Experimental Quantum FingerprintingMar 18 2015Quantum communication holds the promise of creating disruptive technologies that will play an essential role in future communication networks. For example, the study of quantum communication complexity has shown that quantum communication allows exponential ... More
Finite-key-size effect in commercial plug-and-play QKD systemOct 21 2016Jul 24 2017A security evaluation against the finite-key-size effect was performed for a commercial plug-and-play quantum key distribution (QKD) system. We demonstrate the ability of an eavesdropper to force the system to distill key from a smaller length of sifted-key. ... More
An optimal local model to practically emulate Bell inequalitiesFeb 08 2019We show how an adversary can emulate a Bell inequality using existing detector control methods if the Bell test is not loophole-free. For a Clauser-Horne-Shimony-Holt inequality, our model fakes a maximum violation predicted by quantum mechanics for a ... More
Insecurity of detector-device-independent quantum key distributionJul 20 2016Detector-device-independent quantum key distribution (ddiQKD) held the promise of being robust to detector side-channels, a major security loophole in QKD implementations. In contrast to what has been claimed, however, we demonstrate that the security ... More
Statistics of Lagrangian quantum turbulenceJul 17 2012We consider the dynamics of small tracer particles in turbulent quantum liquids. The complicated interaction processes of vortex filaments, the quantum constraints on vorticity and the varying influence of both the superfluid and the normal fluid on the ... More
Lagrangian quantum turbulence model based on alternating superfluid/ normal fluid stochastic dynamicsAug 09 2014Inpired by recent measurements of the velocity and acceleration statistics of Lagrangian tracer particles embedded in a turbulent quantum liquid we propose a new superstatistical model for the dynamics of tracer particles in quantum turbulence. Our model ... More
Attacks exploiting deviation of mean photon number in quantum key distribution and coin tossingDec 27 2014Mar 30 2015The security of quantum communication using a weak coherent source requires an accurate knowledge of the source's mean photon number. Finite calibration precision or an active manipulation by an attacker may cause the actual emitted photon number to deviate ... More
Creation of backdoors in quantum communications via laser damageOct 12 2015Sep 18 2016Practical quantum communication (QC) protocols are assumed to be secure provided implemented devices are properly characterized and all known side channels are closed. We show that this is not always true. We demonstrate a laser-damage attack capable ... More
Semi-supervised Text Regression with Conditional Generative Adversarial NetworksOct 02 2018Nov 11 2018Enormous online textual information provides intriguing opportunities for understandings of social and economic semantics. In this paper, we propose a novel text regression model based on a conditional generative adversarial network (GAN), with an attempt ... More
LSTM-based Flow PredictionAug 09 2019In this paper, a method of prediction on continuous time series variables from the production or flow -- an LSTM algorithm based on multivariate tuning -- is proposed. The algorithm improves the traditional LSTM algorithm and converts the time series ... More
Dual Refinement Networks for Accurate and Fast Object Detection in Real-World ScenesJul 23 2018May 07 2019Object detection has been vigorously studied for years but fast accurate detection for real-world scenes remains a very challenging problem. Overcoming drawbacks of single-stage detectors, we take aim at precisely detecting objects for static and temporal ... More
Object Tracking in Satellite Videos Based on a Multi-Frame Optical Flow TrackerApr 25 2018Object tracking is a hot topic in computer vision. Thanks to the booming of the very high resolution (VHR) remote sensing techniques, it is now possible to track targets of interests in satellite videos. However, since the targets in the satellite videos ... More
Machine Learning for Networking: Workflow, Advances and OpportunitiesSep 25 2017Nov 16 2017Recently, machine learning has been used in every possible field to leverage its amazing power. For a long time, the net-working and distributed computing system is the key infrastructure to provide efficient computational resource for machine learning. ... More
Teaching Categories to Human Learners with Visual ExplanationsFeb 20 2018We study the problem of computer-assisted teaching with explanations. Conventional approaches for machine teaching typically only provide feedback at the instance level e.g., the category or label of the instance. However, it is intuitive that clear explanations ... More
Towards Quality Advancement of Underwater Machine Vision with Generative Adversarial NetworksDec 03 2017Jan 16 2018Underwater machine vision has attracted significant attention, but its low quality has prevented it from a wide range of applications. Although many different algorithms have been developed to solve this problem, real-time adaptive methods are frequently ... More
Implications For The Origin Of GRB 051103 From LIGO ObservationsJan 21 2012Apr 17 2012We present the results of a LIGO search for gravitational waves (GWs) associated with GRB 051103, a short-duration hard-spectrum gamma-ray burst (GRB) whose electromagnetically determined sky position is coincident with the spiral galaxy M81, which is ... More
Search for Gravitational Wave Bursts from Six MagnetarsNov 17 2010Apr 15 2011Soft gamma repeaters (SGRs) and anomalous X-ray pulsars (AXPs) are thought to be magnetars: neutron stars powered by extreme magnetic fields. These rare objects are characterized by repeated and sometimes spectacular gamma-ray bursts. The burst mechanism ... More
Beating the spin-down limit on gravitational wave emission from the Vela pulsarApr 14 2011Apr 15 2011We present direct upper limits on continuous gravitational wave emission from the Vela pulsar using data from the Virgo detector's second science run. These upper limits have been obtained using three independent methods that assume the gravitational ... More