secure

Title: ETHERLED: Sending Covert Morse Signals from Air-Gapped Devices via Network Card (NIC) LEDs. (arXiv:2208.09975v1 [cs.CR])

In this paper, we present a new technique named ETHERLED, allowing attackers to leak data from air-gapped networked devices such as PCs, printers, network cameras, embedded controllers, and servers. Networked devices have an integrated network interface controller (NIC) that includes status and activity indicator LEDs. We show that malware installed on the device can control the status LEDs by blinking and alternating colors, using documented methods or undocumented firmware commands. Information can be encoded via simple encoding such as Morse code and modulated over these optical signals. An attacker can intercept and decode these signals from tens to hundreds of meters away. We show an evaluation and discuss defensive and preventive countermeasures for this exfiltration attack.

Title: BRIEF but Powerful: Byzantine-Robust and Privacy-Preserving Federated Learning via Model Segmentation and Secure clustering. (arXiv:2208.10161v1 [cs.CR])

security

Title: Security Implications of Large Language Model Code Assistants: A User Study. (arXiv:2208.09727v1 [cs.CR])

Title: Sensor Security: Current Progress, Research Challenges, and Future Roadmap. (arXiv:2208.09741v1 [cs.CR])

Title: SoK: Machine Learning with Confidential Computing. (arXiv:2208.10134v1 [cs.CR])

privacy

Title: To show or not to show: Redacting sensitive text from videos of electronic displays. (arXiv:2208.10270v1 [cs.CV])

Title: Glass-Vault: A Generic Transparent Privacy-preserving Exposure Notification Analytics Platform. (arXiv:2208.09525v1 [cs.CR])

Title: The Saddle-Point Accountant for Differential Privacy. (arXiv:2208.09595v1 [cs.CR])

Title: zk-PCN: A Privacy-Preserving Payment Channel Network Using zk-SNARKs. (arXiv:2208.09716v1 [cs.CR])

Title: Privacy-Preserving Protocols for Smart Cameras and Other IoT Devices. (arXiv:2208.09776v1 [cs.CR])

Title: Inferring Sensitive Attributes from Model Explanations. (arXiv:2208.09967v1 [cs.CR])

We focus on the specific privacy risk of attribute inference attack wherein an adversary infers sensitive attributes of an input (e.g., race and sex) given its model explanations. We design the first attribute inference attack against model explanations in two threat models where model builder either (a) includes the sensitive attributes in training data and input or (b) censors the sensitive attributes by not including them in the training data and input.

We evaluate our proposed attack on four benchmark datasets and four state-of-the-art algorithms. We show that an adversary can successfully infer the value of sensitive attributes from explanations in both the threat models accurately. Moreover, the attack is successful even by exploiting only the explanations corresponding to sensitive attributes. These suggest that our attack is effective against explanations and poses a practical threat to data privacy.

On combining the model predictions (an attack surface exploited by prior attacks) with explanations, we note that the attack success does not improve. Additionally, the attack success on exploiting model explanations is better compared to exploiting only model predictions. These suggest that model explanations are a strong attack surface to exploit for an adversary.

Title: The Economics of Privacy and Utility: Investment Strategies. (arXiv:2208.10253v1 [cs.CR])

protect

Title: MockingBERT: A Method for Retroactively Adding Resilience to NLP Models. (arXiv:2208.09915v1 [cs.CL])

Title: Prediction of User Request and Complaint in Spoken Customer-Agent Conversations. (arXiv:2208.10249v1 [cs.CL])

Title: GAIROSCOPE: Injecting Data from Air-Gapped Computers to Nearby Gyroscopes. (arXiv:2208.09764v1 [cs.CR])

In this paper we present `GAIROSCOPE,' an ultrasonic covert channel that doesn't require a microphone on the receiving side. Our malware generates ultrasonic tones in the resonance frequencies of the MEMS gyroscope. These inaudible frequencies produce tiny mechanical oscillations within the smartphone's gyroscope, which can be demodulated into binary information. Notably, the gyroscope in smartphones is considered to be a 'safe' sensor that can be used legitimately from mobile apps and javascript. We introduce the adversarial attack model and present related work. We provide the relevant technical background and show the design and implementation of GAIROSCOPE. We present the evaluation results and discuss a set of countermeasures to this threat. Our experiments show that attackers can exfiltrate sensitive information from air-gapped computers to smartphones located a few meters away via Speakers-to-Gyroscope covert channel.

defense

Title: Rethinking Textual Adversarial Defense for Pre-trained Language Models. (arXiv:2208.10251v1 [cs.CL])

Title: Friendly Noise against Adversarial Noise: A Powerful Defense against Data Poisoning Attacks. (arXiv:2208.10224v1 [cs.CR])

Title: An Input-Aware Mimic Defense Theory and its Practice. (arXiv:2208.10276v1 [cs.CR])

Title: Recurrent Neural Network-based Anti-jamming Framework for Defense Against Multiple Jamming Policies. (arXiv:2208.09518v1 [cs.LG])

attack

Title: Analyzing Adversarial Robustness of Vision Transformers against Spatial and Spectral Attacks. (arXiv:2208.09602v1 [cs.CV])

Title: PointDP: Diffusion-driven Purification against Adversarial Attacks on 3D Point Cloud Recognition. (arXiv:2208.09801v1 [cs.CV])

Title: An anomaly detection approach for backdoored neural networks: face recognition as a case study. (arXiv:2208.10231v1 [cs.CV])

Title: A New Outlook on the Profitability of Rogue Mining Strategies in the Bitcoin Network. (arXiv:2208.09482v1 [cs.CR])

Title: Defensive Distillation based Adversarial Attacks Mitigation Method for Channel Estimation using Deep Learning Models in Next-Generation Wireless Networks. (arXiv:2208.10279v1 [cs.CR])

Title: MetaRF: Differentiable Random Forest for Reaction Yield Prediction with a Few Trails. (arXiv:2208.10083v1 [cs.LG])

robust

Title: Accelerating Vision Transformer Training via a Patch Sampling Schedule. (arXiv:2208.09520v1 [cs.CV])

Title: Fuse and Attend: Generalized Embedding Learning for Art and Sketches. (arXiv:2208.09698v1 [cs.CV])

Title: Artifact-Based Domain Generalization of Skin Lesion Models. (arXiv:2208.09756v1 [cs.CV])

Title: FaceOff: A Video-to-Video Face Swapping System. (arXiv:2208.09788v1 [cs.CV])

Title: A Unified Analysis of Mixed Sample Data Augmentation: A Loss Function Perspective. (arXiv:2208.09913v1 [cs.LG])

Title: A Web Application for Experimenting and Validating Remote Measurement of Vital Signs. (arXiv:2208.09916v1 [cs.AI])

Title: A semi-supervised Teacher-Student framework for surgical tool detection and localization. (arXiv:2208.09926v1 [cs.CV])

Title: Dynamic Adaptive Threshold based Learning for Noisy Annotations Robust Facial Expression Recognition. (arXiv:2208.10221v1 [cs.CV])

Title: Provably Tightest Linear Approximation for Robustness Verification of Sigmoid-like Neural Networks. (arXiv:2208.09872v1 [cs.LG])

Title: A Novel Hybrid Sampling Framework for Imbalanced Learning. (arXiv:2208.09619v1 [cs.LG])

Title: Robust Node Classification on Graphs: Jointly from Bayesian Label Transition and Topology-based Label Propagation. (arXiv:2208.09779v1 [cs.LG])

Title: Combating Noisy-Labeled and Imbalanced Data by Two Stage Bi-Dimensional Sample Selection. (arXiv:2208.09833v1 [cs.LG])

Title: NOSMOG: Learning Noise-robust and Structure-aware MLPs on Graphs. (arXiv:2208.10010v1 [cs.LG])

Title: Robust Bayesian Nonnegative Matrix Factorization with Implicit Regularizers. (arXiv:2208.10053v1 [cs.LG])

biometric

Title: Explainable Biometrics in the Age of Deep Learning. (arXiv:2208.09500v1 [cs.CV])

steal

extraction

Title: Net2Brain: A Toolbox to compare artificial vision models with human brain responses. (arXiv:2208.09677v1 [cs.CV])

Title: A diverse large-scale building dataset and a novel plug-and-play domain generalization method for building extraction. (arXiv:2208.10004v1 [cs.CV])

Title: Multilayer deep feature extraction for visual texture recognition. (arXiv:2208.10044v1 [cs.CV])

Title: Pretrained Language Encoders are Natural Tagging Frameworks for Aspect Sentiment Triplet Extraction. (arXiv:2208.09617v1 [cs.CL])

Title: Representing Knowledge by Spans: A Knowledge-Enhanced Model for Information Extraction. (arXiv:2208.09625v1 [cs.CL])

Title: gBuilder: A Scalable Knowledge Graph Construction System for Unstructured Corpus. (arXiv:2208.09705v1 [cs.CL])

Title: SemEval-2022 Task 8: Multi-lingual News Article Similarity. (arXiv:2208.09715v1 [cs.CL])

Title: Survey of NLP in Pharmacology: Methodology, Tasks, Resources, Knowledge, and Tools. (arXiv:2208.10228v1 [cs.CL])

Title: Tyche: A library for probabilistic reasoning and belief modelling in Python. (arXiv:2208.09838v1 [cs.AI])

membership infer

federate

Title: Byzantines can also Learn from History: Fall of Centered Clipping in Federated Learning. (arXiv:2208.09894v1 [cs.LG])

Title: Long-Short History of Gradients is All You Need: Detecting Malicious and Unreliable Clients in Federated Learning. (arXiv:2208.10273v1 [cs.CR])

Title: Practical Vertical Federated Learning with Unsupervised Representation Learning. (arXiv:2208.10278v1 [cs.CR])

Title: FLIS: Clustered Federated Learning via Inference Similarity for Non-IID Data Distribution. (arXiv:2208.09754v1 [cs.LG])

fair

Title: FairDisCo: Fairer AI in Dermatology via Disentanglement Contrastive Learning. (arXiv:2208.10013v1 [cs.CV])

Title: Agent-based Model of Initial Token Allocations: Evaluating Wealth Concentration in Fair Launches. (arXiv:2208.10271v1 [cs.CR])

Title: Bipartite Matchings with Group Fairness and Individual Fairness Constraints. (arXiv:2208.09951v1 [cs.AI])

Title: Socially Fair Center-based and Linear Subspace Clustering. (arXiv:2208.10095v1 [cs.LG])

interpretability

Title: A Multimodal Transformer: Fusing Clinical Notes with Structured EHR Data for Interpretable In-Hospital Mortality Prediction. (arXiv:2208.10240v1 [cs.CL])

Title: MolGraph: a Python package for the implementation of small molecular graphs and graph neural networks with TensorFlow and Keras. (arXiv:2208.09944v1 [cs.LG])

exlainability

watermark