secure

Title: A New Approach to Post-Quantum Non-Malleability. (arXiv:2207.05861v1 [quant-ph])

We achieve our results through a new technique for constant-round non-malleable commitments which is easier to use in the post-quantum setting. The technique also yields an almost elementary proof of security for constant-round non-malleable commitments in the classical setting, which may be of independent interest.

As an application, when combined with existing work, our results yield the first constant-round post-quantum secure multiparty computation under the $\mathit{polynomial}$ hardness of quantum fully-homomorphic encryption and quantum learning with errors.

Title: Achieving Almost All Blockchain Functionalities with Polylogarithmic Storage. (arXiv:2207.05869v1 [cs.CR])

Title: E-Tenon: An Efficient Privacy-Preserving Secure Open Data Sharing Scheme for EHR System. (arXiv:2207.05890v1 [cs.CR])

Title: A blockchain-based secure storage scheme for medical information. (arXiv:2207.06102v1 [cs.CR])

Title: Secure Linear MDS Coded Matrix Inversion. (arXiv:2207.06271v1 [cs.IT])

security

Title: GaitTAKE: Gait Recognition by Temporal Attention and Keypoint-guided Embedding. (arXiv:2207.03608v2 [cs.CV] UPDATED)

Title: Enhanced Security and Privacy via Fragmented Federated Learning. (arXiv:2207.05978v1 [cs.CR])

Title: A Personalised User Authentication System based on EEG Signals. (arXiv:2207.06109v1 [cs.CR])

Title: On Post-Quantum Perfect Forward Secrecy in 6G. (arXiv:2207.06144v1 [cs.CR])

Title: Explainable Intrusion Detection Systems (X-IDS): A Survey of Current Methods, Challenges, and Opportunities. (arXiv:2207.06236v1 [cs.CR])

This survey reviews the state-of-the-art in explainable AI (XAI) for IDS, its current challenges, and discusses how these challenges span to the design of an X-IDS. In particular, we discuss black box and white box approaches comprehensively. We also present the tradeoff between these approaches in terms of their performance and ability to produce explanations. Furthermore, we propose a generic architecture that considers human-in-the-loop which can be used as a guideline when designing an X-IDS. Research recommendations are given from three critical viewpoints: the need to define explainability for IDS, the need to create explanations tailored to various stakeholders, and the need to design metrics to evaluate explanations.

Title: Developing an NLP-based Recommender System for the Ethical, Legal, and Social Implications of Synthetic Biology. (arXiv:2207.06360v1 [cs.IR])

This text proposes a different approach, asking instead is it possible to develop a well-performing recommender model based upon natural language processing (NLP) to connect synthetic biologists with information on the ELSI of their specific research? This recommender was developed as part of a larger project building a Synthetic Biology Knowledge System (SBKS) to accelerate discovery and exploration of the synthetic biology design space. Our approach aims to distill for synthetic biologists relevant ethical and social scientific information and embed it into synthetic biology research workflows.

Title: On the Opportunities and Risks of Foundation Models. (arXiv:2108.07258v3 [cs.LG] UPDATED)

Title: URANUS: Radio Frequency Tracking, Classification and Identification of Unmanned Aircraft Vehicles. (arXiv:2207.06025v1 [cs.LG])

Title: Machine Learning Assisted Approach for Security-Constrained Unit Commitment. (arXiv:2111.09824v2 [eess.SY] UPDATED)

privacy

Title: Privacy Preserving Image Registration. (arXiv:2205.10120v3 [cs.CV] UPDATED)

Title: DH-GAN: A Physics-driven Untrained Generative Adversarial Network for 3D Microscopic Imaging using Digital Holography. (arXiv:2205.12920v2 [cs.IR] UPDATED)

Title: Exploiting Social Graph Networks for Emotion Prediction. (arXiv:2207.05820v1 [cs.SI])

Title: Differentially Private Linear Bandits with Partial Distributed Feedback. (arXiv:2207.05827v1 [cs.LG])

Title: Connected Vehicles: A Privacy Analysis. (arXiv:2207.06182v1 [cs.CR])

Title: Smooth Anonymity for Sparse Binary Matrices. (arXiv:2207.06358v1 [cs.CR])

Title: Revealing the Landscape of Privacy-Enhancing Technologies in the Context of Data Markets for the IoT: A Systematic Literature Review. (arXiv:2107.11905v2 [cs.CR] UPDATED)

Title: Privacy-Preserving Aggregation in Federated Learning: A Survey. (arXiv:2203.17005v2 [cs.CR] UPDATED)

Title: (Nearly) Optimal Private Linear Regression via Adaptive Clipping. (arXiv:2207.04686v2 [cs.LG] UPDATED)

Title: How Faithful is your Synthetic Data? Sample-level Metrics for Evaluating and Auditing Generative Models. (arXiv:2102.08921v2 [cs.LG] UPDATED)

protect

Title: Trackers Bounce Back: Measuring Evasion of Partitioned Storage in the Wild. (arXiv:2203.10188v2 [cs.CR] UPDATED)

Title: Confidentiality Protection in the 2020 US Census of Population and Housing. (arXiv:2206.03524v2 [stat.AP] UPDATED)

Title: A Conceptual Framework for Using Machine Learning to Support Child Welfare Decisions. (arXiv:2207.05855v1 [cs.CY])

defense

Title: Perturbation Inactivation Based Adversarial Defense for Face Recognition. (arXiv:2207.06035v1 [cs.CV])

Title: Evaluating the Adversarial Robustness of Adaptive Test-time Defenses. (arXiv:2202.13711v2 [cs.LG] UPDATED)

Title: Exploring Adversarial Attacks and Defenses in Vision Transformers trained with DINO. (arXiv:2206.06761v3 [cs.CV] UPDATED)

Title: Towards Overcoming the Undercutting Problem. (arXiv:2007.11480v4 [cs.CR] UPDATED)

This work views undercutting and shifting among chains rationally as mining strategies of rational miners. We model profitability of undercutting strategy with block size limit present, which bounds the claimable fees in a round and gives rise to a pending (cushion) transaction set. In the proposed model, we first identify the conditions necessary to make undercutting profitable. We then present an easy-to-deploy defense against undercutting by selectively assembling transactions into the new block to invalidate the identified conditions. Under a typical setting with undercutters present, applying this avoidance technique is a Nash Equilibrium. Finally, we complement the above analytical results with experiments.

Title: Markov Decision Process For Automatic Cyber Defense. (arXiv:2207.05436v2 [cs.CR] UPDATED)

Title: Interactive Machine Learning: A State of the Art Review. (arXiv:2207.06196v1 [cs.LG])

attack

Title: Physical Backdoor Attacks to Lane Detection Systems in Autonomous Driving. (arXiv:2203.00858v2 [cs.CV] UPDATED)

In this paper, we target the lane detection system, which is an indispensable module for many autonomous driving tasks, e.g., navigation, lane switching. We design and realize the first physical backdoor attacks to such system. Our attacks are comprehensively effective against different types of lane detection algorithms. Specifically, we introduce two attack methodologies (poison-annotation and clean-annotation) to generate poisoned samples. With those samples, the trained lane detection model will be infected with the backdoor, and can be activated by common objects (e.g., traffic cones) to make wrong detections, leading the vehicle to drive off the road or onto the opposite lane. Extensive evaluations on public datasets and physical autonomous vehicles demonstrate that our backdoor attacks are effective, stealthy and robust against various defense solutions. Our codes and experimental videos can be found in https://sites.google.com/view/lane-detection-attack/lda.

Title: BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label. (arXiv:2207.00278v3 [cs.CV] UPDATED)

Title: PatchZero: Defending against Adversarial Patch Attacks by Detecting and Zeroing the Patch. (arXiv:2207.01795v2 [cs.CV] UPDATED)

Title: Susceptibility of Continual Learning Against Adversarial Attacks. (arXiv:2207.05225v2 [cs.LG] UPDATED)

Title: RelaxLoss: Defending Membership Inference Attacks without Losing Utility. (arXiv:2207.05801v1 [cs.LG])

Title: Game of Trojans: A Submodular Byzantine Approach. (arXiv:2207.05937v1 [cs.LG])

We provide an analytical characterization of adversarial capability and strategic interactions between the adversary and detection mechanism that take place in such models. We characterize adversary capability in terms of the fraction of the input dataset that can be embedded with a Trojan trigger. We show that the loss function has a submodular structure, which leads to the design of computationally efficient algorithms to determine this fraction with provable bounds on optimality. We propose a Submodular Trojan algorithm to determine the minimal fraction of samples to inject a Trojan trigger. To evade detection of the Trojaned model, we model strategic interactions between the adversary and Trojan detection mechanism as a two-player game. We show that the adversary wins the game with probability one, thus bypassing detection. We establish this by proving that output probability distributions of a Trojan model and a clean model are identical when following the Min-Max (MM) Trojan algorithm.

We perform extensive evaluations of our algorithms on MNIST, CIFAR-10, and EuroSAT datasets. The results show that (i) with Submodular Trojan algorithm, the adversary needs to embed a Trojan trigger into a very small fraction of samples to achieve high accuracy on both Trojan and clean samples, and (ii) the MM Trojan algorithm yields a trained Trojan model that evades detection with probability 1.

Title: On the Robustness of Bayesian Neural Networks to Adversarial Attacks. (arXiv:2207.06154v1 [cs.LG])

Title: A Word is Worth A Thousand Dollars: Adversarial Attack on Tweets Fools Stock Predictions. (arXiv:2205.01094v3 [cs.CR] UPDATED)

robust

Title: Robust and efficient computation of retinal fractal dimension through deep approximation. (arXiv:2207.05757v1 [q-bio.QM])

Title: A Near Sensor Edge Computing System for Point Cloud Semantic Segmentation. (arXiv:2207.05888v1 [cs.CV])

Title: Verifying Attention Robustness of Deep Neural Networks against Semantic Perturbations. (arXiv:2207.05902v1 [cs.CV])

Title: Visual Context-driven Audio Feature Enhancement for Robust End-to-End Audio-Visual Speech Recognition. (arXiv:2207.06020v1 [cs.SD])

Title: Structure PLP-SLAM: Efficient Sparse Mapping and Localization using Point, Line and Plane for Monocular, RGB-D and Stereo Cameras. (arXiv:2207.06058v1 [cs.CV])

Title: Pyramid Transformer for Traffic Sign Detection. (arXiv:2207.06067v1 [cs.CV])

Title: Robust and accurate depth estimation by fusing LiDAR and Stereo. (arXiv:2207.06139v1 [cs.CV])

Title: Adversarially-Aware Robust Object Detector. (arXiv:2207.06202v1 [cs.CV])

Title: Entry-Flipped Transformer for Inference and Prediction of Participant Behavior. (arXiv:2207.06235v1 [cs.CV])

Title: Task Agnostic Representation Consolidation: a Self-supervised based Continual Learning Approach. (arXiv:2207.06267v1 [cs.LG])

Title: 6D Camera Relocalization in Visually Ambiguous Extreme Environments. (arXiv:2207.06333v1 [cs.CV])

Title: Joint Prediction of Monocular Depth and Structure using Planar and Parallax Geometry. (arXiv:2207.06351v1 [cs.CV])

Title: Learning Interpretable Microscopic Features of Tumor by Multi-task Adversarial CNNs Improves Generalization. (arXiv:2008.01478v2 [cs.CV] UPDATED)

Title: Multi-Label Noise Robust Collaborative Learning Method for Remote Sensing Image Classification. (arXiv:2012.10715v5 [eess.IV] UPDATED)

Title: Vote from the Center: 6 DoF Pose Estimation in RGB-D Images by Radial Keypoint Voting. (arXiv:2104.02527v4 [cs.CV] UPDATED)

Title: Exploring Sequence Feature Alignment for Domain Adaptive Detection Transformers. (arXiv:2107.12636v3 [cs.CV] UPDATED)

Title: AVA-AVD: Audio-Visual Speaker Diarization in the Wild. (arXiv:2111.14448v4 [cs.CV] UPDATED)

Title: Multi-Atlas Segmentation and Spatial Alignment of the Human Embryo in First Trimester 3D Ultrasound. (arXiv:2202.06599v2 [eess.IV] UPDATED)

Title: PointInst3D: Segmenting 3D Instances by Points. (arXiv:2204.11402v2 [cs.CV] UPDATED)

Title: Object-Aware Self-supervised Multi-Label Learning. (arXiv:2205.07028v2 [cs.CV] UPDATED)

Title: RepMix: Representation Mixing for Robust Attribution of Synthesized Images. (arXiv:2207.02063v2 [cs.CV] UPDATED)

Title: Why Robust Natural Language Understanding is a Challenge. (arXiv:2206.14575v2 [cs.CL] UPDATED)

Title: Forecasting COVID-19 spreading trough an ensemble of classical and machine learning models: Spain's case study. (arXiv:2207.05753v1 [cs.LG])

Title: Exploring Adversarial Examples and Adversarial Robustness of Convolutional Neural Networks by Mutual Information. (arXiv:2207.05756v1 [cs.LG])

Title: Long Term Fairness for Minority Groups via Performative Distributionally Robust Optimization. (arXiv:2207.05777v1 [cs.LG])

Title: GriddlyJS: A Web IDE for Reinforcement Learning. (arXiv:2207.06105v1 [cs.AI])

Title: Probing the Robustness of Independent Mechanism Analysis for Representation Learning. (arXiv:2207.06137v1 [stat.ML])

Title: DiverGet: A Search-Based Software Testing Approach for Deep Neural Network Quantization Assessment. (arXiv:2207.06282v1 [cs.LG])

Title: Neural Network Robustness as a Verification Property: A Principled Case Study. (arXiv:2104.01396v2 [cs.LG] UPDATED)

Title: Robust Counterfactual Explanations on Graph Neural Networks. (arXiv:2107.04086v3 [cs.LG] UPDATED)

Title: Driving Style Recognition Using Interval Type-2 Fuzzy Inference System and Multiple Experts Decision Making. (arXiv:2110.13805v2 [cs.RO] UPDATED)

Title: Data-driven Control of Agent-based Models: an Equation/Variable-free Machine Learning Approach. (arXiv:2207.05779v1 [math.DS])

Title: Estimating Test Performance for AI Medical Devices under Distribution Shift with Conformal Prediction. (arXiv:2207.05796v1 [cs.LG])

Title: Goal-Oriented Sensitivity Analysis of Hyperparameters in Deep Learning. (arXiv:2207.06216v1 [stat.ML])

Title: Stochastic Functional Analysis and Multilevel Vector Field Anomaly Detection. (arXiv:2207.06229v1 [stat.ML])

Title: QT-Routenet: Improved GNN generalization to larger 5G networks by fine-tuning predictions from queueing theory. (arXiv:2207.06336v1 [cs.NI])

Title: Learning robust marking policies for adaptive mesh refinement. (arXiv:2207.06339v1 [math.NA])

Title: Learning Approximately Optimal Contracts. (arXiv:1811.06736v2 [cs.GT] UPDATED)

Title: Optimal Network Compression. (arXiv:2008.08733v5 [q-fin.RM] UPDATED)

Title: Electromagnetic Source Imaging via a Data-Synthesis-Based Convolutional Encoder-Decoder Network. (arXiv:2010.12876v6 [eess.IV] UPDATED)

Title: Robust Data-Driven Predictive Control using Reachability Analysis. (arXiv:2103.14110v3 [eess.SY] UPDATED)

Title: OccamNets: Mitigating Dataset Bias by Favoring Simpler Hypotheses. (arXiv:2204.02426v4 [cs.LG] UPDATED)

Title: Online Algorithms with Multiple Predictions. (arXiv:2205.03921v3 [cs.LG] UPDATED)

Title: GraphMAE: Self-Supervised Masked Graph Autoencoders. (arXiv:2205.10803v3 [cs.LG] UPDATED)

Title: Robust optimal well control using an adaptive multi-grid reinforcement learning framework. (arXiv:2207.03253v2 [cs.LG] UPDATED)

Title: Training Robust Deep Models for Time-Series Domain: Novel Algorithms and Theoretical Analysis. (arXiv:2207.04305v2 [cs.LG] UPDATED)

biometric

Title: A General Framework for Partial to Full Image Registration. (arXiv:2207.06387v1 [cs.CV])

steal

extraction

Title: Dam reservoir extraction from remote sensing imagery using tailored metric learning strategies. (arXiv:2207.05807v1 [cs.CV])

Title: REZCR: A Zero-shot Character Recognition Method via Radical Extraction. (arXiv:2207.05842v1 [cs.CV])

Title: Intra-Modal Constraint Loss For Image-Text Retrieval. (arXiv:2207.05024v2 [cs.CV] UPDATED)

Title: OSLAT: Open Set Label Attention Transformer for Medical Entity Span Extraction. (arXiv:2207.05817v1 [cs.CL])

Title: Building a Relation Extraction Baseline for Gene-Disease Associations: A Reproducibility Study. (arXiv:2207.06226v1 [cs.CL])

Title: A Transfer Learning Based Model for Text Readability Assessment in German. (arXiv:2207.06265v1 [cs.CL])

membership infer

federate

Title: FedNST: Federated Noisy Student Training for Automatic Speech Recognition. (arXiv:2206.02797v2 [eess.AS] UPDATED)

Title: FD-GATDR: A Federated-Decentralized-Learning Graph Attention Network for Doctor Recommendation Using EHR. (arXiv:2207.05750v1 [cs.IR])

Title: Federated Learning for THz Channel Estimation. (arXiv:2207.06017v1 [eess.SP])

Title: TCT: Convexifying Federated Learning using Bootstrapped Neural Tangent Kernels. (arXiv:2207.06343v1 [cs.LG])

Title: FedShuffle: Recipes for Better Use of Local Work in Federated Learning. (arXiv:2204.13169v2 [cs.LG] UPDATED)

Title: Multi-Model Federated Learning with Provable Guarantees. (arXiv:2207.04330v3 [cs.LG] UPDATED)

fair

Title: Object Detection as Probabilistic Set Prediction. (arXiv:2203.07980v3 [cs.CV] UPDATED)

Title: A Closer Look at Invariances in Self-supervised Pre-training for 3D Vision. (arXiv:2207.04997v2 [cs.CV] UPDATED)

Title: Degendering Resumes for Fair Algorithmic Resume Screening. (arXiv:2112.08910v3 [cs.CL] UPDATED)

Title: Revealing Unfair Models by Mining Interpretable Evidence. (arXiv:2207.05811v1 [cs.LG])

Title: Human-AI Collaboration in Decision-Making: Beyond Learning to Defer. (arXiv:2206.13202v2 [cs.LG] UPDATED)

Title: High Per Parameter: A Large-Scale Study of Hyperparameter Tuning for Machine Learning Algorithms. (arXiv:2207.06028v1 [cs.LG])

Title: Towards A Holistic View of Bias in Machine Learning: Bridging Algorithmic Fairness and Imbalanced Learning. (arXiv:2207.06084v1 [cs.LG])

Title: Understanding Unfairness in Fraud Detection through Model and Data Bias Interactions. (arXiv:2207.06273v1 [cs.LG])

interpretability

Title: Towards Highly Expressive Machine Learning Models of Non-Melanoma Skin Cancer. (arXiv:2207.05749v1 [cs.LG])

Title: A Novel DeBERTa-based Model for Financial Question Answering Task. (arXiv:2207.05875v1 [cs.CL])

Title: On NeuroSymbolic Solutions for PDEs. (arXiv:2207.06240v1 [cs.LG])

Title: Explainability in Deep Reinforcement Learning, a Review into Current Methods and Applications. (arXiv:2207.01911v2 [cs.LG] UPDATED)

Title: Modelling Evolutionary and Stationary User Preferences for Temporal Sets Prediction. (arXiv:2204.05490v5 [cs.LG] UPDATED)

exlainability

watermark