secure

Title: Authentication and Billing Scheme for The Electric Vehicles: EVABS. (arXiv:2207.10789v1 [cs.CR])

Title: WordSig: QR streams enabling platform-independent self-identification that's impossible to deepfake. (arXiv:2207.10806v1 [cs.CR])

Title: RSU-Based Online Intrusion Detection and Mitigation for VANET. (arXiv:2207.10812v1 [cs.CR])

Title: Secure and Lightweight Strong PUF Challenge Obfuscation with Keyed Non-linear FSR. (arXiv:2207.11181v1 [cs.CR])

security

Title: Multi-Level Fine-Tuning, Data Augmentation, and Few-Shot Learning for Specialized Cyber Threat Intelligence. (arXiv:2207.11076v1 [cs.CR])

Title: IDPS Signature Classification with a Reject Option and the Incorporation of Expert Knowledge. (arXiv:2207.10797v1 [cs.CR])

Title: Security Challenges when Space Merges with Cyberspace. (arXiv:2207.10798v1 [cs.CR])

Title: Security and Safety Aspects of AI in Industry Applications. (arXiv:2207.10809v1 [cs.CR])

Title: Supervised Contrastive ResNet and Transfer Learning for the In-vehicle Intrusion Detection System. (arXiv:2207.10814v1 [cs.CR])

Title: Mathematical Model of Strong Physically Unclonable Functions Based on Hybrid Boolean Networks. (arXiv:2207.10816v1 [cs.CR])

Title: Cryptanalysis of a system based on Twisted Dihedral Group Algebras. (arXiv:2207.10979v1 [cs.CR])

privacy

Title: Open video data sharing in developmental and behavioural science. (arXiv:2207.11020v1 [cs.CV])

Title: Few-Shot Class-Incremental Learning via Entropy-Regularized Data-Free Replay. (arXiv:2207.11213v1 [cs.CV])

Title: Improved Generalization Guarantees in Restricted Data Models. (arXiv:2207.10668v1 [cs.CR])

Title: Privacy and Transparency in Graph Machine Learning: A Unified Perspective. (arXiv:2207.10896v1 [cs.LG])

Title: ME-GAN: Learning Panoptic Electrocardio Representations for Multi-view ECG Synthesis Conditioned on Heart Diseases. (arXiv:2207.10670v1 [cs.LG])

protect

Title: Adaptive Graph-Based Feature Normalization for Facial Expression Recognition. (arXiv:2207.11123v1 [cs.CV])

Title: Two-Stage Fine-Tuning: A Novel Strategy for Learning Class-Imbalanced Data. (arXiv:2207.10858v1 [cs.CL])

Title: DJI drone IDs are not encrypted. (arXiv:2207.10795v1 [cs.CR])

defense

attack

Title: Synthetic Dataset Generation for Adversarial Machine Learning Research. (arXiv:2207.10719v1 [cs.CV])

Title: Just Rotate it: Deploying Backdoor Attacks via Rotation Transformation. (arXiv:2207.10825v1 [cs.CV])

Title: On Higher Adversarial Susceptibility of Contrastive Self-Supervised Learning. (arXiv:2207.10862v1 [cs.CV])

Title: Active Data Pattern Extraction Attacks on Generative Language Models. (arXiv:2207.10802v1 [cs.CR])

Title: NFDLM: A Lightweight Network Flow based Deep Learning Model for DDoS Attack Detection in IoT Domains. (arXiv:2207.10803v1 [cs.CR])

Title: Suppressing Poisoning Attacks on Federated Learning for Medical Imaging. (arXiv:2207.10804v1 [cs.CR])

Title: PowerFDNet: Deep Learning-Based Stealthy False Data Injection Attack Detection for AC-model Transmission Systems. (arXiv:2207.10805v1 [cs.CR])

Title: A Convolutional Attention Based Deep Network Solution for UAV Network Attack Recognition over Fading Channels and Interference. (arXiv:2207.10810v1 [cs.CR])

Title: Applying Machine Learning on RSRP-based Features for False Base Station Detection. (arXiv:2207.10999v1 [cs.CR])

Title: Silent Spring: Prototype Pollution Leads to Remote Code Execution in Node.js. (arXiv:2207.11171v1 [cs.CR])

In this paper, we set out to study the problem in a holistic way, from the detection of prototype pollution to detection of gadgets, with the ambitious goal of finding end-to-end exploits beyond DoS, in full-fledged Node.js applications. We build the first multi-staged framework that uses multi-label static taint analysis to identify prototype pollution in Node.js libraries and applications, as well as a hybrid approach to detect universal gadgets, notably, by analyzing the Node.js source code. We implement our framework on top of GitHub's static analysis framework CodeQL to find 11 universal gadgets in core Node.js APIs, leading to code execution. Furthermore, we use our methodology in a study of 15 popular Node.js applications to identify prototype pollutions and gadgets. We manually exploit RCE in two high-profile applications. Our results provide alarming evidence that prototype pollution in combination with powerful universal gadgets lead to RCE in Node.js.

robust

Title: An advanced combination of semi-supervised Normalizing Flow & Yolo (YoloNF) to detect and recognize vehicle license plates. (arXiv:2207.10777v1 [cs.CV])

Title: Uncertainty-aware Multi-modal Learning via Cross-modal Random Network Prediction. (arXiv:2207.10851v1 [cs.CV])

Title: Decoupled Adversarial Contrastive Learning for Self-supervised Adversarial Robustness. (arXiv:2207.10899v1 [cs.CV])

Title: PLD-SLAM: A Real-Time Visual SLAM Using Points and Line Segments in Dynamic Scenes. (arXiv:2207.10916v1 [cs.CV])

Title: Visible and Near Infrared Image Fusion Based on Texture Information. (arXiv:2207.10953v1 [cs.CV])

Title: Learning Human Kinematics by Modeling Temporal Correlations between Joints for Video-based Human Pose Estimation. (arXiv:2207.10971v1 [cs.CV])

Title: Taguchi based Design of Sequential Convolution Neural Network for Classification of Defective Fasteners. (arXiv:2207.10992v1 [cs.CV])

Title: Learning Generalized Non-Rigid Multimodal Biomedical Image Registration from Generic Point Set Data. (arXiv:2207.10994v1 [cs.CV])

Title: POP: Mining POtential Performance of new fashion products via webly cross-modal query expansion. (arXiv:2207.11001v1 [cs.CV])

Title: Training Certifiably Robust Neural Networks Against Semantic Perturbations. (arXiv:2207.11177v1 [cs.CV])

Title: Target Identification and Bayesian Model Averaging with Probabilistic Hierarchical Factor Probabilities. (arXiv:2207.11212v1 [cs.CV])

Title: Classification via score-based generative modelling. (arXiv:2207.11091v1 [cs.LG])

Title: Heterogeneous Ensemble Learning for Enhanced Crash Forecasts -- A Frequentest and Machine Learning based Stacking Framework. (arXiv:2207.10721v1 [cs.LG])

Title: Robust Knowledge Adaptation for Dynamic Graph Neural Networks. (arXiv:2207.10839v1 [cs.LG])

Title: Multilabel Prototype Generation for Data Reduction in k-Nearest Neighbour classification. (arXiv:2207.10947v1 [cs.LG])

biometric

Title: Smart speaker design and implementation with biometric authentication and advanced voice interaction capability. (arXiv:2207.10811v1 [cs.CR])

steal

extraction

Title: Seeing 3D Objects in a Single Image via Self-Supervised Static-Dynamic Disentanglement. (arXiv:2207.11232v1 [cs.CV])

Title: PhishSim: Aiding Phishing Website Detection with a Feature-Free Tool. (arXiv:2207.10801v1 [cs.CR])

Title: GreenDB -- A Dataset and Benchmark for Extraction of Sustainability Information of Consumer Goods. (arXiv:2207.10733v1 [cs.LG])

Title: Spatial-Temporal Feature Extraction and Evaluation Network for Citywide Traffic Condition Prediction. (arXiv:2207.11034v1 [cs.LG])

membership infer

federate

Title: Federated Semi-Supervised Domain Adaptation via Knowledge Transfer. (arXiv:2207.10727v1 [cs.LG])

Title: Federated Learning on Adaptively Weighted Nodes by Bilevel Optimization. (arXiv:2207.10751v1 [cs.LG])

fair

Title: FairGRAPE: Fairness-aware GRAdient Pruning mEthod for Face Attribute Classification. (arXiv:2207.10888v1 [cs.CV])

Title: Cryptographic and Financial Fairness. (arXiv:2207.10780v1 [cs.CR])

We formally define the notion, show several impossibility results based on game theory, and analyze the practical effects of (lack of) financial fairness if one was to run the protocols for real on Bitcoin using Bloomberg's dark pool trading.

For example, we show that the ladder protocol (CRYPTO'14), and its variants (CCS'15 and CCS'16), fail to achieve financial fairness both in theory and in practice, while the penalty protocols of Kumaresan and Bentov (CCS'14) and Baum, David and Dowsley (FC'20) are financially fair.

This version contains formal definitions, detailed security proofs, demos and experimental data in the appendix.

Title: Algorithmic Fairness in Business Analytics: Directions for Research and Practice. (arXiv:2207.10991v1 [cs.AI])

interpretability

Title: Learning to identify cracks on wind turbine blade surfaces using drone-based inspection images. (arXiv:2207.11186v1 [cs.CV])

exlainability

watermark