-
Making Acoustic Side-Channel Attacks on Noisy Keyboards Viable with LLM-Assisted Spectrograms' "Typo" Correction
Authors:
Seyyed Ali Ayati,
Jin Hyun Park,
Yichen Cai,
Marcus Botacin
Abstract:
The large integration of microphones into devices increases the opportunities for Acoustic Side-Channel Attacks (ASCAs), as these can be used to capture keystrokes' audio signals that might reveal sensitive information. However, the current State-Of-The-Art (SOTA) models for ASCAs, including Convolutional Neural Networks (CNNs) and hybrid models, such as CoAtNet, still exhibit limited robustness u…
▽ More
The large integration of microphones into devices increases the opportunities for Acoustic Side-Channel Attacks (ASCAs), as these can be used to capture keystrokes' audio signals that might reveal sensitive information. However, the current State-Of-The-Art (SOTA) models for ASCAs, including Convolutional Neural Networks (CNNs) and hybrid models, such as CoAtNet, still exhibit limited robustness under realistic noisy conditions. Solving this problem requires either: (i) an increased model's capacity to infer contextual information from longer sequences, allowing the model to learn that an initially noisily typed word is the same as a futurely collected non-noisy word, or (ii) an approach to fix misidentified information from the contexts, as one does not type random words, but the ones that best fit the conversation context. In this paper, we demonstrate that both strategies are viable and complementary solutions for making ASCAs practical. We observed that no existing solution leverages advanced transformer architectures' power for these tasks and propose that: (i) Visual Transformers (VTs) are the candidate solutions for capturing long-term contextual information and (ii) transformer-powered Large Language Models (LLMs) are the candidate solutions to fix the ``typos'' (mispredictions) the model might make. Thus, we here present the first-of-its-kind approach that integrates VTs and LLMs for ASCAs.
We first show that VTs achieve SOTA performance in classifying keystrokes when compared to the previous CNN benchmark. Second, we demonstrate that LLMs can mitigate the impact of real-world noise. Evaluations on the natural sentences revealed that: (i) incorporating LLMs (e.g., GPT-4o) in our ASCA pipeline boosts the performance of error-correction tasks; and (ii) the comparable performance can be attained by a lightweight, fine-tuned smaller LLM (67 times smaller than GPT-4o), using...
△ Less
Submitted 15 April, 2025;
originally announced April 2025.
-
Spin-Generator Coordinate Method for Electronic Structure
Authors:
Amir Ayati,
Hugh G. A. Burton,
Patrick Bultinck,
Stijn De Baerdemacker
Abstract:
We present a new application of the Generator Coordinate Method (GCM) as an electronic structure method for strong electron correlation in molecular systems. We identify spin fluctuations as an important generator coordinate responsible for strong static electron correlation that is associated with bond-breaking processes. Spin-constrained Unrestricted HF (c-UHF) states are used to define a manifo…
▽ More
We present a new application of the Generator Coordinate Method (GCM) as an electronic structure method for strong electron correlation in molecular systems. We identify spin fluctuations as an important generator coordinate responsible for strong static electron correlation that is associated with bond-breaking processes. Spin-constrained Unrestricted HF (c-UHF) states are used to define a manifold of basis states for the Hill-Wheeler equations, which are discretized and solved as a non-orthogonal configuration interaction (NOCI) expansion. The method was tested on two-electron systems that are dominated by static and-or dynamic correlations. In a minimal basis set for H2, the resulting GCM quickly captures the ground-state full configuration interaction energy with just a few c-UHF states, whereas second-order perturbation theory on top of the GCM is needed to recover over 90% of the correlation energy in the cc-pVDZ basis set.
△ Less
Submitted 16 March, 2025;
originally announced March 2025.
-
Improving Acoustic Side-Channel Attacks on Keyboards Using Transformers and Large Language Models
Authors:
Jin Hyun Park,
Seyyed Ali Ayati,
Yichen Cai
Abstract:
The increasing prevalence of microphones in everyday devices and the growing reliance on online services have amplified the risk of acoustic side-channel attacks (ASCAs) targeting keyboards. This study explores deep learning techniques, specifically vision transformers (VTs) and large language models (LLMs), to enhance the effectiveness and applicability of such attacks. We present substantial imp…
▽ More
The increasing prevalence of microphones in everyday devices and the growing reliance on online services have amplified the risk of acoustic side-channel attacks (ASCAs) targeting keyboards. This study explores deep learning techniques, specifically vision transformers (VTs) and large language models (LLMs), to enhance the effectiveness and applicability of such attacks. We present substantial improvements over prior research, with the CoAtNet model achieving state-of-the-art performance. Our CoAtNet shows a 5.0% improvement for keystrokes recorded via smartphone (Phone) and 5.9% for those recorded via Zoom compared to previous benchmarks. We also evaluate transformer architectures and language models, with the best VT model matching CoAtNet's performance. A key advancement is the introduction of a noise mitigation method for real-world scenarios. By using LLMs for contextual understanding, we detect and correct erroneous keystrokes in noisy environments, enhancing ASCA performance. Additionally, fine-tuned lightweight language models with Low-Rank Adaptation (LoRA) deliver comparable performance to heavyweight models with 67X more parameters. This integration of VTs and LLMs improves the practical applicability of ASCA mitigation, marking the first use of these technologies to address ASCAs and error correction in real-world scenarios.
△ Less
Submitted 18 February, 2025; v1 submitted 13 February, 2025;
originally announced February 2025.
-
Spin-Symmetry Projected constrained Unrestricted Hartree-Fock
Authors:
Amir Ayati,
Hugh G. A. Burton,
Stijn De Baerdemacker
Abstract:
We introduce an electronic structure approach for spin symmetry breaking and restoration from the mean-field level. The spin-projected constrained-unrestricted Hartree-Fock (SPcUHF) method restores the broken spin symmetry inherent in spin-constrained-UHF determinants by employing a non-orthogonal Configuration Interaction (NOCI) projection method. This method includes all possible configurations…
▽ More
We introduce an electronic structure approach for spin symmetry breaking and restoration from the mean-field level. The spin-projected constrained-unrestricted Hartree-Fock (SPcUHF) method restores the broken spin symmetry inherent in spin-constrained-UHF determinants by employing a non-orthogonal Configuration Interaction (NOCI) projection method. This method includes all possible configurations in spin space compatible with a Clebsch-Gordon recoupling scheme in a NOCI calculation. The tunable one-pair-at-a-time characteristics of the symmetry-breaking process in c-UHF allow us to reduce the computational costs of full projection. SPcUHF is tested on 4-, 6-, and 8-electron systems that exhibit dominant static and/or dynamic correlations.
△ Less
Submitted 20 December, 2024;
originally announced December 2024.
-
Optimizing Location Allocation in Urban Management: A Brief Review
Authors:
Aref Ayati,
Mohammad Mahdi Hashemi,
Mohsen Saffar,
Hamid Reza Naji
Abstract:
Regarding the concepts of urban management, digital transformation, and smart cities, various issues are presented. Currently, we like to attend to location allocation problems that can be a new part of digital transformation in urban management (such as locating and placing facilities, locating and arranging centers such as aid and rescue centers, or even postal hubs, telecommunications, electron…
▽ More
Regarding the concepts of urban management, digital transformation, and smart cities, various issues are presented. Currently, we like to attend to location allocation problems that can be a new part of digital transformation in urban management (such as locating and placing facilities, locating and arranging centers such as aid and rescue centers, or even postal hubs, telecommunications, electronic equipment, and data centers, and routing in transportation optimization). These issues, which are seemingly simple but in practice complex, are important in urban environments, and the issue of accurate location allocation based on existing criteria directly impacts cost management, profit, efficiency, and citizen satisfaction. In recent years, researchers have used or presented various models and methods for location allocation problems, some of which will be mentioned in this article. Given the nature of these problems, which are optimization problems, this article will also examine existing research from an optimization perspective in summary. Finally, a brief conclusion will be made of the existing methods and their weaknesses, and suggestions will be made for continuing the path and improving scientific and practical research in this field.
△ Less
Submitted 8 December, 2024;
originally announced December 2024.
-
Risk Management of Unmanned Aerial Vehicles
Authors:
Hamid Reza Naji,
Aref Ayati
Abstract:
This paper presents an efficient risk management model for unmanned aerial vehicles or UAVs. Our proposed risk management establishes a cyclic model with a continuous and iterative structure that is very adaptable to agile methods and all IT-related resources. This model can be used in many applications, but as a case study, we have discussed it for UAVs. The increasing use of UAVs or drones in ma…
▽ More
This paper presents an efficient risk management model for unmanned aerial vehicles or UAVs. Our proposed risk management establishes a cyclic model with a continuous and iterative structure that is very adaptable to agile methods and all IT-related resources. This model can be used in many applications, but as a case study, we have discussed it for UAVs. The increasing use of UAVs or drones in many fields and the existence of different threats is the main reason to have an efficient risk management method for them. In this paper, we cover risks based on IT-driven assets to decrease the chance of losing any data, failing the equipment or the system, and missing the reputation or credit based on cyclic and iterative flow. Our current risk management model for UAVs or drones is based on qualitative measures and can cover most of IT-based risks.
△ Less
Submitted 7 November, 2023;
originally announced November 2023.
-
Spin-constrained Hartree-Fock and the generator coordinate method for the 2-site Hubbard model
Authors:
Stijn De Baerdemacker,
Amir Ayati,
Hugh G. A. Burton,
Xeno De Vriendt,
Patrick Bultinck,
Guillaume Acke
Abstract:
We present a mathematical analysis of the spin-constrained Hartree-Fock solutions (CHF) of the 2-site Hubbard model. The analysis sheds light on the spin symmetry breaking process around the Coulson-Fischer point. CHF states are useful as input states for the Generator Coordinate Method (GCM) in which CHF states can be used as a basis for multiconfigurational calculations in the Hill-Wheeler equat…
▽ More
We present a mathematical analysis of the spin-constrained Hartree-Fock solutions (CHF) of the 2-site Hubbard model. The analysis sheds light on the spin symmetry breaking process around the Coulson-Fischer point. CHF states are useful as input states for the Generator Coordinate Method (GCM) in which CHF states can be used as a basis for multiconfigurational calculations in the Hill-Wheeler equations. The spin degree of freedom provides the generator coordinate in the GCM related to static electron correlation.
△ Less
Submitted 18 January, 2023;
originally announced January 2023.
-
PIV in stratified gas-liquid flow in a horizontal pipe using water droplets as tracers in the gas-phase
Authors:
A. A. Ayati,
J. Kolaas,
A. Jensen,
G. W. Johnson
Abstract:
Simultaneous Particle Image Velocimetry (PIV) measurements of stratified turbulent air/water flow in a horizontal pipe have been performed using water droplets as tracers in the gas-phase. The use of water droplets as tracers ensures that the water surface tension remains unaffected and thus allows small-scale interfacial structures, such as capillary waves to occur naturally. Experiments have bee…
▽ More
Simultaneous Particle Image Velocimetry (PIV) measurements of stratified turbulent air/water flow in a horizontal pipe have been performed using water droplets as tracers in the gas-phase. The use of water droplets as tracers ensures that the water surface tension remains unaffected and thus allows small-scale interfacial structures, such as capillary waves to occur naturally. Experiments have been conducted in a 31 m long, 100 mm diameter PVC pipe using air and water as test fluids. For the purpose of validation of the experimental set-up and the suggested seeding technique, single-phase measurements of both air and water were compared to each other and to DNS results from literature, showing very good agreement. The two-phase measurements are presented in terms of mean- and rms-profiles. These measurements offer a qualitative demonstration of the behavior of the interfacial turbulence and its correlation with the various interfacial flow patterns. The observations made in this paper are in agreement with the conclusions drawn from the DNS study of Lakehal et al. (2003). The present results may eventually provide a better explanation to many important phenomena related to the physical characteristics of stratified two-phase flow such as scalar mixing between phases, and to challenges related to its modeling.
△ Less
Submitted 2 January, 2017;
originally announced January 2017.