secure

Title: A Secure and Efficient Data Deduplication Scheme with Dynamic Ownership Management in Cloud Computing. (arXiv:2208.09030v1 [cs.CR])

Title: Deep Joint Source-Channel and Encryption Coding: Secure Semantic Communications. (arXiv:2208.09245v1 [cs.CR])

security

Title: A Pragmatic Methodology for Blind Hardware Trojan Insertion in Finalized Layouts. (arXiv:2208.09235v1 [cs.CR])

Title: Usable Security for an IoT OS: Integrating the Zoo of Embedded Crypto Components Below a Common API. (arXiv:2208.09281v1 [cs.CR])

In this paper, we integrate an emerging cryptographic interface into usable system-level calls for the IoT operating system RIOT, which runs on more than 240 platforms. This interface supports ID-based key handling to access key material in protected storage without exposing it to anyone. Our design foresees hardware acceleration on all available variants; our implementation integrates diverse cryptographic hardware and software backends via the uniform interface. Our performance measurements show that the overhead of the uniform API with integrated key management is negligible compared to the individual crypto operation. Our approach enhances the usability, portability, and flexibility of cryptographic support in the IoT.

privacy

Title: Synthetic Data in Human Analysis: A Survey. (arXiv:2208.09191v1 [cs.CV])

Title: Verifiable Differential Privacy For When The Curious Become Dishonest. (arXiv:2208.09011v1 [cs.CR])

In this paper, we introduce the notion of ``verifiable differential privacy with covert security''. The purpose is to ensure both privacy of the client's data and assurance that the output is not subject to any form of adversarial manipulation. The result is that everyone is assured that the noise used for differential privacy has been generated correctly, but no one can determine what the noise was. In the event of a malicious entity attempting to pervert the protocol, their actions will be detected with a constant probability negligibly close to one. We show that such verifiable privacy is practical and can be implemented at scale.

protect

Title: A Multi-Modal Wildfire Prediction and Personalized Early-Warning System Based on a Novel Machine Learning Framework. (arXiv:2208.09079v1 [cs.LG])

Title: Wildfire Forecasting with Satellite Images and Deep Generative Model. (arXiv:2208.09411v1 [cs.CV])

defense

Title: Shadows Aren't So Dangerous After All: A Fast and Robust Defense Against Shadow-Based Adversarial Attacks. (arXiv:2208.09285v1 [cs.CV])

Title: Dispersed Pixel Perturbation-based Imperceptible Backdoor Trigger for Image Classifier Models. (arXiv:2208.09336v1 [cs.CV])

attack

Title: Real-Time Robust Video Object Detection System Against Physical-World Adversarial Attacks. (arXiv:2208.09195v1 [cs.CV])

Title: Curbing Task Interference using Representation Similarity-Guided Multi-Task Feature Sharing. (arXiv:2208.09427v1 [cs.CV])

Title: UKP-SQuARE v2 Explainability and Adversarial Attacks for Trustworthy QA. (arXiv:2208.09316v1 [cs.CL])

Title: Gender Bias and Universal Substitution Adversarial Attacks on Grammatical Error Correction Systems for Automated Assessment. (arXiv:2208.09466v1 [cs.CL])

Title: An Optimal Energy Efficient Design of Artificial Noise for Preventing Power Leakage based Side-Channel Attacks. (arXiv:2208.09140v1 [cs.CR])

robust

Title: Crafting Monocular Cues and Velocity Guidance for Self-Supervised Multi-Frame Depth Learning. (arXiv:2208.09170v1 [cs.CV])

Title: TTT-UCDR: Test-time Training for Universal Cross-Domain Retrieval. (arXiv:2208.09198v1 [cs.CV])

Title: Background Invariance Testing According to Semantic Proximity. (arXiv:2208.09286v1 [cs.CV])

Title: Self-Supervised Visual Place Recognition by Mining Temporal and Feature Neighborhoods. (arXiv:2208.09315v1 [cs.CV])

Title: Low-light Enhancement Method Based on Attention Map Net. (arXiv:2208.09330v1 [cs.CV])

Title: ModSelect: Automatic Modality Selection for Synthetic-to-Real Domain Generalization. (arXiv:2208.09414v1 [cs.CV])

Title: Effective Transfer Learning for Low-Resource Natural Language Understanding. (arXiv:2208.09180v1 [cs.CL])

Title: Causal Intervention Improves Implicit Sentiment Analysis. (arXiv:2208.09329v1 [cs.CL])

Title: SAFARI: Versatile and Efficient Evaluations for Robustness of Interpretability. (arXiv:2208.09418v1 [cs.LG])

Title: GraTO: Graph Neural Network Framework Tackling Over-smoothing with Neural Architecture Search. (arXiv:2208.09027v1 [cs.LG])

Title: DAFT: Distilling Adversarially Fine-tuned Models for Better OOD Generalization. (arXiv:2208.09139v1 [cs.LG])

Title: A Novel Plug-and-Play Approach for Adversarially Robust Generalization. (arXiv:2208.09449v1 [cs.LG])

biometric

Title: Mouse Dynamics Behavioral Biometrics: A Survey. (arXiv:2208.09061v1 [cs.CR])

steal

extraction

Title: Improved Image Classification with Token Fusion. (arXiv:2208.09183v1 [cs.CV])

Title: UniCausal: Unified Benchmark and Model for Causal Text Mining. (arXiv:2208.09163v1 [cs.CL])

Title: SimLDA: A tool for topic model evaluation. (arXiv:2208.09299v1 [cs.LG])

Title: End-to-end Clinical Event Extraction from Chinese Electronic Health Record. (arXiv:2208.09354v1 [cs.CL])

Title: Feature Selection for Fault Detection and Prediction based on Event Log Analysis. (arXiv:2208.09440v1 [cs.LG])

membership infer

federate

Title: Almost Cost-Free Communication in Federated Best Arm Identification. (arXiv:2208.09215v1 [cs.LG])

Title: Federated Learning with Noisy Labels. (arXiv:2208.09378v1 [cs.LG])

Title: Federated Select: A Primitive for Communication- and Memory-Efficient Federated Learning. (arXiv:2208.09432v1 [cs.LG])

Title: Communication Size Reduction of Federated Learning based on Neural ODE Model. (arXiv:2208.09478v1 [cs.LG])

fair

Title: Disentangled Representation with Causal Constraints for Counterfactual Fairness. (arXiv:2208.09147v1 [cs.LG])

interpretability

Title: An Unsupervised Short- and Long-Term Mask Representation for Multivariate Time Series Anomaly Detection. (arXiv:2208.09240v1 [cs.LG])

exlainability

watermark