secure

Title: Cross-chain between a Parent Chain and Multiple Side Chains. (arXiv:2208.05125v1 [cs.CR])

Title: RFID authentication protocol based on a novel EPC Gen2 PRNG. (arXiv:2208.05345v1 [cs.CR])

security

Title: Measuring the Availability and Response Times of Public Encrypted DNS Resolvers. (arXiv:2208.04999v1 [cs.CR])

Title: Collaborative Feature Maps of Networks and Hosts for AI-driven Intrusion Detection. (arXiv:2208.05085v1 [cs.CR])

Title: Machine Learning with DBOS. (arXiv:2208.05101v1 [cs.CR])

Title: Using query frequencies in tree-based revocation for certificateless authentication in VANETs. (arXiv:2208.05343v1 [cs.CR])

Title: Analysis of lightweight cryptographic solutions for authentication in IoT. (arXiv:2208.05346v1 [cs.CR])

privacy

Title: EXTERN: Leveraging Endo-Temporal Regularization for Black-box Video Domain Adaptation. (arXiv:2208.05187v1 [cs.CV])

Title: Understanding User Awareness and Behaviors Concerning Encrypted DNS Settings. (arXiv:2208.04991v1 [cs.CR])

Title: Privacy-Aware Adversarial Network in Human Mobility Prediction. (arXiv:2208.05009v1 [cs.LG])

protect

Title: TokenPatronus: A Decentralized NFT Anti-theft Mechanism. (arXiv:2208.05168v1 [cs.CR])

defense

Title: Reducing Exploitability with Population Based Training. (arXiv:2208.05083v1 [cs.LG])

attack

Title: Benchmarking Joint Face Spoofing and Forgery Detection with Visual and Physiological Cues. (arXiv:2208.05401v1 [cs.CV])

Title: PerD: Perturbation Sensitivity-based Neural Trojan Detection Framework on NLP Applications. (arXiv:2208.04943v1 [cs.LG])

Title: Attention Hijacking in Trojan Transformers. (arXiv:2208.04946v1 [cs.LG])

Title: Adversarial Machine Learning-Based Anticipation of Threats Against Vehicle-to-Microgrid Services. (arXiv:2208.05073v1 [cs.CR])

Title: Prior Knowledge based Advanced Persistent Threats Detection for IoT in a Realistic Benchmark. (arXiv:2208.05089v1 [cs.CR])

Title: Explaining Machine Learning DGA Detectors from DNS Traffic Data. (arXiv:2208.05285v1 [cs.CR])

Title: Pikachu: Securing PoS Blockchains from Long-Range Attacks by Checkpointing into Bitcoin PoW using Taproot. (arXiv:2208.05408v1 [cs.CR])

Title: Block Double-Submission Attack: Block Withholding Can Be Self-Destructive. (arXiv:2208.05425v1 [cs.CR])

Title: Revisiting Algebraic Attacks on MinRank and on the Rank Decoding Problem. (arXiv:2208.05471v1 [cs.CR])

However, we prove here that the analysis performed in \cite{BBCGPSTV20} for one of these attacks which consists in mixing the MaxMinors modeling with the Support-Minors modeling to solve RD is too optimistic and leads to underestimate the overall complexity. This is done by exhibiting linear dependencies between these equations and by considering an $\fqm$ version of these modelings which turns out to be instrumental for getting a better understanding of both systems. Moreover, by working over $\Fqm$ rather than over $\ff{q}$, we are able to drastically reduce the number of variables in the system and we (i) still keep enough algebraic equations to be able to solve the system, (ii) are able to analyze rigorously the complexity of our approach. This new approach may improve the older MaxMinors approach on RD from \cite{BBBGNRT20,BBCGPSTV20} for certain parameters. We also introduce a new hybrid approach on the Support-Minors system whose impact is much more general since it applies to any MinRank problem. This technique improves significantly the complexity of the Support-Minors approach for small to moderate field sizes.

robust

Title: Visual Heart Rate Estimation from RGB Facial Video using Spectral Reflectance. (arXiv:2208.04947v1 [cs.CV])

Title: Human Activity Recognition Using Cascaded Dual Attention CNN and Bi-Directional GRU Framework. (arXiv:2208.05034v1 [cs.CV])

Title: A Detection Method of Temporally Operated Videos Using Robust Hashing. (arXiv:2208.05198v1 [cs.CV])

Title: Language Supervised Training for Skeleton-based Action Recognition. (arXiv:2208.05318v1 [cs.CV])

Title: Robust Reinforcement Learning using Offline Data. (arXiv:2208.05129v1 [cs.LG])

Title: Adaptive Resources Allocation CUSUM for Binomial Count Data Monitoring with Application to COVID-19 Hotspot Detection. (arXiv:2208.05045v1 [cs.LG])

Title: Robust Continual Test-time Adaptation: Instance-aware BN and Prediction-balanced Memory. (arXiv:2208.05117v1 [cs.LG])

Title: Machine Learning-based EEG Applications and Markets. (arXiv:2208.05144v1 [cs.LG])

biometric

steal

extraction

Title: MD-Net: Multi-Detector for Local Feature Extraction. (arXiv:2208.05350v1 [cs.CV])

membership infer

federate

Title: Fast Heterogeneous Federated Learning with Hybrid Client Selection. (arXiv:2208.05135v1 [cs.LG])

Title: FedOBD: Opportunistic Block Dropout for Efficiently Training Large-scale Neural Networks through Federated Learning. (arXiv:2208.05174v1 [cs.LG])

fair

Title: How Effective is Byte Pair Encoding for Out-Of-Vocabulary Words in Neural Machine Translation?. (arXiv:2208.05225v1 [cs.CL])

Title: D-BIAS: A Causality-Based Human-in-the-Loop System for Tackling Algorithmic Bias. (arXiv:2208.05126v1 [cs.LG])

interpretability

Title: Explainable prediction of Qcodes for NOTAMs using column generation. (arXiv:2208.04955v1 [cs.LG])

Title: TSInterpret: A unified framework for time series interpretability. (arXiv:2208.05280v1 [cs.LG])

exlainability

watermark