secure

Title: Cluster Based Secure Multi-Party Computation in Federated Learning for Histopathology Images. (arXiv:2208.10919v1 [cs.CR])

security

Title: Toward Better Target Representation for Source-Free and Black-Box Domain Adaptation. (arXiv:2208.10531v1 [cs.CV])

Title: An Evolutionary Approach for Creating of Diverse Classifier Ensembles. (arXiv:2208.10996v1 [cs.CV])

Title: Explaining Bias in Deep Face Recognition via Image Characteristics. (arXiv:2208.11099v1 [cs.CV])

Title: SoK: Explainable Machine Learning for Computer Security Applications. (arXiv:2208.10605v1 [cs.CR])

Title: AppGNN: Approximation-Aware Functional Reverse Engineering using Graph Neural Networks. (arXiv:2208.10868v1 [cs.CR])

In this work, we are the first to demonstrate that applying Approximate Computing (AxC) principles to circuits significantly improves the resiliency against RE. This is attributed to the increased complexity in the underlying pattern-matching process. The resiliency remains effective even for Graph Neural Networks (GNNs) that are presently one of the most powerful state-of-the-art techniques in functional RE. Using AxC, we demonstrate a substantial reduction in GNN average classification accuracy-- from 98% to a mere 53%. To surmount the challenges introduced by AxC in RE, we propose the highly promising AppGNN platform, which enables GNNs (still being trained on exact circuits) to: (i) perform accurate classifications, and (ii) reverse engineer the circuit functionality, notwithstanding the applied approximation technique. AppGNN accomplishes this by implementing a novel graph-based node sampling approach that mimics generic approximation methodologies, requiring zero knowledge of the targeted approximation type.

We perform an extensive evaluation and show that, using our method, we can improve the classification accuracy from 53% to 81% when classifying approximate adder circuits that have been generated using evolutionary algorithms, which our method is oblivious of.

Title: Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System. (arXiv:2208.11062v1 [cs.CR])

privacy

Title: Split-U-Net: Preventing Data Leakage in Split Learning for Collaborative Multi-Modal Brain Tumor Segmentation. (arXiv:2208.10553v1 [cs.CV])

Title: Hierarchical Perceptual Noise Injection for Social Media Fingerprint Privacy Protection. (arXiv:2208.10688v1 [cs.CV])

Title: Joint Privacy Enhancement and Quantization in Federated Learning. (arXiv:2208.10888v1 [cs.LG])

Title: Evaluating Machine Unlearning via Epistemic Uncertainty. (arXiv:2208.10836v1 [cs.LG])

protect

Title: Optimal Bootstrapping of PoW Blockchains. (arXiv:2208.10618v1 [cs.CR])

In this paper, we propose Advocate, a new bootstrapping methodology, which achieves two main results: (a) optimal liveness and low latency under a super-majority adversary for the Nakamoto longest chain protocol and (b) immediate black-box generalization to a variety of parallel-chain based scaling architectures, including OHIE and Prism. We demonstrate via a full-stack implementation the robustness of Advocate under a 90% adversarial majority.

Title: Decentralized Collaborative Learning with Probabilistic Data Protection. (arXiv:2208.10674v1 [cs.LG])

defense

Title: Adversarial Vulnerability of Temporal Feature Networks for Object Detection. (arXiv:2208.10773v1 [cs.CV])

attack

Title: State Of The Art In Open-Set Iris Presentation Attack Detection. (arXiv:2208.10564v1 [cs.CV])

Title: RIBAC: Towards Robust and Imperceptible Backdoor Attack against Compact DNN. (arXiv:2208.10608v1 [cs.CR])

Title: A Comprehensive Study of Real-Time Object Detection Networks Across Multiple Domains: A Survey. (arXiv:2208.10895v1 [cs.CV])

Title: DepthFake: a depth-based strategy for detecting Deepfake videos. (arXiv:2208.11074v1 [cs.CV])

Title: Getting Bored of Cyberwar: Exploring the Role of the Cybercrime Underground in the Russia-Ukraine Conflict. (arXiv:2208.10629v1 [cs.CR])

Title: Machine Learning-Enabled Cyber Attack Prediction and Mitigation for EV Charging Stations. (arXiv:2208.10644v1 [cs.CR])

Title: Transferability Ranking of Adversarial Examples. (arXiv:2208.10878v1 [cs.LG])

In the domain of transferability, researchers have proposed ways to make attacks more transferable and to make models more robust to transferred examples. However, to the best of our knowledge, there are no works which propose a means for ranking the transferability of an adversarial example in the perspective of a blackbox attacker. This is an important task because an attacker is likely to use only a select set of examples, and therefore will want to select the samples which are most likely to transfer.

In this paper we suggest a method for ranking the transferability of adversarial examples without access to the victim's model. To accomplish this, we define and estimate the expected transferability of a sample given limited information about the victim. We also explore practical scenarios: where the adversary can select the best sample to attack and where the adversary must use a specific sample but can choose different perturbations. Through our experiments, we found that our ranking method can increase an attacker's success rate by up to 80% compared to the baseline (random selection without ranking).

Title: Different Spectral Representations in Optimized Artificial Neural Networks and Brains. (arXiv:2208.10576v1 [cs.LG])

robust

Title: Learning Visibility for Robust Dense Human Body Estimation. (arXiv:2208.10652v1 [cs.CV])

Title: A First Look at Dataset Bias in License Plate Recognition. (arXiv:2208.10657v1 [cs.CV])

Title: Unsupervised Fish Trajectory Tracking and Segmentation. (arXiv:2208.10662v1 [cs.CV])

Title: Learning from Noisy Labels with Coarse-to-Fine Sample Credibility Modeling. (arXiv:2208.10683v1 [cs.CV])

Title: Bag of Tricks for Out-of-Distribution Generalization. (arXiv:2208.10722v1 [cs.CV])

Title: In-Air Imaging Sonar Sensor Network with Real-Time Processing Using GPUs. (arXiv:2208.10839v1 [cs.CV])

Title: Robust DNN Watermarking via Fixed Embedding Weights with Optimized Distribution. (arXiv:2208.10973v1 [cs.CV])

Title: Quality Matters: Embracing Quality Clues for Robust 3D Multi-Object Tracking. (arXiv:2208.10976v1 [cs.CV])

Title: Evaluating Out-of-Distribution Detectors Through Adversarial Generation of Outliers. (arXiv:2208.10940v1 [cs.CR])

biometric

steal

extraction

Title: Transductive Decoupled Variational Inference for Few-Shot Classification. (arXiv:2208.10559v1 [cs.CV])

Title: A Constrained Deformable Convolutional Network for Efficient Single Image Dynamic Scene Blind Deblurring with Spatially-Variant Motion Blur Kernels Estimation. (arXiv:2208.10711v1 [cs.CV])

Title: Multi-Modal Representation Learning with SAT for Commodity Verification. (arXiv:2208.11064v1 [cs.LG])

membership infer

federate

Title: A Review of Federated Learning in Energy Systems. (arXiv:2208.10941v1 [cs.CR])

Title: FedMCSA: Personalized Federated Learning via Model Components Self-Attention. (arXiv:2208.10731v1 [cs.LG])

Title: Application of federated learning techniques for arrhythmia classification using 12-lead ECG signals. (arXiv:2208.10993v1 [cs.LG])

fair

Title: Evaluation of group fairness measures in student performance prediction problems. (arXiv:2208.10625v1 [cs.LG])

interpretability

Title: GenTUS: Simulating User Behaviour and Language in Task-oriented Dialogues with Generative Transformers. (arXiv:2208.10817v1 [cs.CL])

Title: Global Concept-Based Interpretability for Graph Neural Networks via Neuron Analysis. (arXiv:2208.10609v1 [cs.LG])

Title: Application of Causal Inference to Analytical Customer Relationship Management in Banking and Insurance. (arXiv:2208.10916v1 [cs.LG])

Title: Regularized impurity reduction: Accurate decision trees with complexity guarantees. (arXiv:2208.10949v1 [cs.LG])

exlainability

watermark