126 Matching Annotations
  1. Jul 2023
    1. A second, complementary, approach relies on post-hoc machine learning and forensic anal-ysis to passively identify statistical and physical artifacts left behind by media manipulation.For example, learning-based forensic analysis techniques use machine learning to automati-cally detect manipulated visual and auditory content (see e.g. [94]). However, these learning-based approaches have been shown to be vulnerable to adversarial attacks [95] and contextshift [96]. Artifact-based techniques exploit low-level pixel artifacts introduced during synthe-sis. But these techniques are vulnerable to counter-measures like recompression or additivenoise. Other approaches involve biometric features of an individual (e.g., the unique motionproduced by the ears in synchrony with speech [97]) or behavioral mannerisms [98]). Biomet-ric and behavioral approaches are robust to compression changes and do not rely on assump-tions about the moment of media capture, but they do not scale well. However, they may bevulnerable to future generative-AI systems that may adapt and synthesize individual biometricsignals.

      Examples of methods for detecting machine generated visual media

  2. Jun 2023
  3. Mar 2023
    1. Google has had the ability to harden SafetyNet checks using hardware-backed key attestation for several years now. The fact that they refrained to do so for 3 years has allowed users to enjoy root and Magisk Modules without sacrificing the ability to use banking apps. However, it seems that Magisk's ability to effectively hide the bootloader unlock status is soon coming to an end. It's a change that we've expected for years, but we're sad to see it finally go into effect.
  4. Nov 2022
  5. Aug 2022
  6. Jun 2022
    1. What is color for?" And instead of telling you, I'll just show you. What you see here is a jungle scene, 00:02:08 and you see the surfaces according to the amount of light that those surfaces reflect. Now, can any of you see the predator that's about to jump out at you? And if you haven't seen it yet, you're dead, right? (Laughter) Can anyone see it? Anyone? No? Now let's see the surfaces according to the quality of light that they reflect. And now you see it. So, color enables us to see 00:02:32 the similarities and differences between surfaces, according to the full spectrum of light that they reflect. But what you've just done is in many respects mathematically impossible. Why? Because, as Berkeley tells us, we have no direct access to our physical world, other than through our senses. And the light that falls onto our eyes is determined by multiple things in the world, not only the color of objects, 00:02:56 but also the color of their illumination, and the color of the space between us and those objects. You vary any one of those parameters, and you'll change the color of the light that falls onto your eye. This is a huge problem, because it means that the same image could have an infinite number of possible real-world sources

      BEing journey 2 pattern detection

  7. Mar 2022
  8. Feb 2022
  9. Jan 2022
  10. Dec 2021
  11. Nov 2021
  12. Oct 2021
    1. FAKE NEWS DETECTION IN PRACTICE

      The article showed the scientific processes that can be used in analyzing information and how they applied it in fact-checking. Technology makes fact-checking easier and faster but humans are still the most accurate. That is why studying information science is important because of its relevance to the society.

  13. May 2021
  14. Apr 2021
  15. Mar 2021
    1. López, J. A. M., Arregui-Garcĺa, B., Bentkowski, P., Bioglio, L., Pinotti, F., Boëlle, P.-Y., Barrat, A., Colizza, V., & Poletto, C. (2020). Anatomy of digital contact tracing: Role of age, transmission setting, adoption and case detection. MedRxiv, 2020.07.22.20158352. https://doi.org/10.1101/2020.07.22.20158352

  16. Feb 2021
    1. But I’m afraid it’s perfectly possible to ship one version of your code to GitHub and a different version to npm.
    2. The point is, just because you don’t see it, doesn’t mean it’s not happening. It’s been more than two years and as far as I know, no one has ever noticed one of my requests. Maybe it’s been in your site this whole time
    3. Also the URL looks a lot like the 300 other requests to ad networks your site makes.
    4. I’d notice the network requests going out!Where would you notice them? My code won’t send anything when the DevTools are open (yes even if un-docked).I call this the Heisenberg Manoeuvre: by trying to observe the behaviour of my code, you change the behaviour of my code.
  17. Jan 2021
    1. If you manage to make Svelte aware of what needs to be tracked, chances are that the resulting code will be more performant than if you roll your own with events or whatever. In part because it will use Svelte's runtime code that is already present in your app, in part because Svelte produces seriously optimized change tracking code, that would be hard to hand code all while keeping it human friendly. And in part because your change tracking targets will be more narrow.
  18. Dec 2020
    1. This creates an options object with a getter function for the passive property; the getter sets a flag, passiveSupported, to true if it gets called. That means that if the browser checks the value of the passive property on the options object, passiveSupported will be set to true; otherwise, it will remain false. We then call addEventListener() to set up a fake event handler, specifying those options, so that the options will be checked if the browser recognizes an object as the third parameter.
  19. Nov 2020
    1. Svelte's advantage here is that it indicates the need for an update at the place where the associated data is updated, instead of at each place the data is used. Then each template expression of reactive statement is able to check very quickly if it needs to rerender or not.
    2. But you can still run into strange race conditions where the browser displays stale data depending on if some other unrelated code has caused a digest update to run after the buggy code or not.
    1. The advantage of ngOnChanges() is that we get all the changes at once if the component has several @Input()s. However, if we have a single @Input() a setter is probably the better approach.
  20. Oct 2020
    1. Identify your user agents When deploying software that makes requests to other sites, you should set a custom User-Agent header to identify the software and provide a means to contact its maintainers. Many of the automated requests we receive have generic user-agent headers such as Java/1.6.0 or Python-urllib/2.1 which provide no information on the actual software responsible for making the requests.
    1. Perhaps we should detect URLSearchParams objects differently (using duck typing detection instead of instanceof window.URLSearchParams, for example) but the solution isn't adding a specific polyfill to Axios (as it'd increase the bundle size and still won't work with other polyfills).
    1. Sometimes we can’t implement a solution that’s fully spec-compliant, and in those cases using a polyfill might be the wrong answer. A polyfill would translate into telling the rest of the codebase that it’s okay to use the feature, that it’ll work just like in modern browsers, but it might not in edge cases.
  21. Sep 2020
    1. LOD was defined as <x>bi + ksbi, where <x>bi equals the mean of the no-template controls, sbi is s.d. of no-template controls and k = 2.479 (99% confidence interval)

      ddPCR

  22. Aug 2020
  23. Jul 2020
    1. LoD = LoB + 1.645(SD low concentration sample)

      LoD is the lowest analyte concentration likely to be reliably distinguished from the LoB and at which detection is feasible. LoD is determined by utilising both the measured LoB and test replicates of a sample known to contain a low concentration of analyte.

      LoB is the highest apparent analyte concentration expected to be found when replicates of a blank sample containing no analyte are tested.

      LoB = meanblank + 1.645(SDblank)

    1. Zhong, H., Wang, Y., Shi, Z., Zhang, L., Ren, H., He, W., Zhang, Z., Zhu, A., Zhao, J., Xiao, F., Yang, F., Liang, T., Ye, F., Zhong, B., Ruan, S., Gan, M., Zhu, J., Li, F., Li, F., … Zhao, J. (2020). Characterization of Microbial Co-infections in the Respiratory Tract of hospitalized COVID-19 patients. MedRxiv, 2020.07.02.20143032. https://doi.org/10.1101/2020.07.02.20143032

    1. Davis, J. T., Chinazzi, M., Perra, N., Mu, K., Piontti, A. P. y, Ajelli, M., Dean, N. E., Gioannini, C., Litvinova, M., Merler, S., Rossi, L., Sun, K., Xiong, X., Halloran, M. E., Longini, I. M., Viboud, C., & Vespignani, A. (2020). Estimating the establishment of local transmission and the cryptic phase of the COVID-19 pandemic in the USA. MedRxiv, 2020.07.06.20140285. https://doi.org/10.1101/2020.07.06.20140285

  24. Jun 2020
  25. May 2020
    1. Chu, H. Y., Englund, J. A., Starita, L. M., Famulare, M., Brandstetter, E., Nickerson, D. A., Rieder, M. J., Adler, A., Lacombe, K., Kim, A. E., Graham, C., Logue, J., Wolf, C. R., Heimonen, J., McCulloch, D. J., Han, P. D., Sibley, T. R., Lee, J., Ilcisin, M., … Bedford, T. (2020). Early Detection of Covid-19 through a Citywide Pandemic Surveillance Platform. New England Journal of Medicine, NEJMc2008646. https://doi.org/10.1056/NEJMc2008646

  26. Apr 2020
    1. Adams, E. R., Anand, R., Andersson, M. I., Auckland, K., Baillie, J. K., Barnes, E., Bell, J., Berry, T., Bibi, S., Carroll, M., Chinnakannan, S., Clutterbuck, E., Cornall, R. J., Crook, D. W., Silva, T. D., Dejnirattisai, W., Dingle, K. E., Dold, C., Eyre, D. W., … Sanchez, V. (2020). Evaluation of antibody testing for SARS-Cov-2 using ELISA and lateral flow immunoassays. MedRxiv, 2020.04.15.20066407. https://doi.org/10.1101/2020.04.15.20066407