secure

security

Title: SoK: Content Moderation Schemes in End-to-End Encrypted Systems. (arXiv:2208.11147v1 [cs.CR])

Title: Investigating the Requirements for Building a Blockchain Simulator for IoT Applications. (arXiv:2208.11207v1 [cs.CR])

Title: ADMoE: Anomaly Detection with Mixture-of-Experts from Noisy Labels. (arXiv:2208.11290v1 [cs.LG])

Title: "Please help share!": Security and Privacy Advice on Twitter during the 2022 Russian Invasion of Ukraine. (arXiv:2208.11581v1 [cs.CR])

We collected 8,920 tweets posted after the Russian Invasion of Ukraine and examined 1,228 in detail, including qualitatively coding 232 relevant tweets and 140 linked documents for security and privacy advice. We identified 221 unique pieces of advice which we divided into seven categories and 21 subcategories, and advice targeted at individuals or organizations. We then compared our findings to those of prior studies, finding noteworthy similarities. Our results confirm a lack of advice prioritization found by prior work, which seems especially detrimental during times of crisis. In addition, we find offers for individual support to be a valuable tool and identify misinformation as a rising threat in general and for security advice specifically.

privacy

Title: On the Design of Privacy-Aware Cameras: a Study on Deep Neural Networks. (arXiv:2208.11372v1 [cs.CV])

Title: Auditing Membership Leakages of Multi-Exit Networks. (arXiv:2208.11180v1 [cs.CR])

In this paper, we perform the first privacy analysis of multi-exit networks through the lens of membership leakages. In particular, we first leverage the existing attack methodologies to quantify the multi-exit networks' vulnerability to membership leakages. Our experimental results show that multi-exit networks are less vulnerable to membership leakages and the exit (number and depth) attached to the backbone model is highly correlated with the attack performance. Furthermore, we propose a hybrid attack that exploits the exit information to improve the performance of existing attacks. We evaluate membership leakage threat caused by our hybrid attack under three different adversarial setups, ultimately arriving at a model-free and data-free adversary. These results clearly demonstrate that our hybrid attacks are very broadly applicable, thereby the corresponding risks are much more severe than shown by existing membership inference attacks. We further present a defense mechanism called TimeGuard specifically for multi-exit networks and show that TimeGuard mitigates the newly proposed attacks perfectly.

Title: Reconstruction of the distribution of sensitive data under free-will privacy. (arXiv:2208.11268v1 [cs.CR])

Title: On Privacy Preserving Data Aggregation Protocols using BGN cryptosystem. (arXiv:2208.11304v1 [cs.CR])

Title: Solving the Kidney Exchange Problem Using Privacy-Preserving Integer Programming. (arXiv:2208.11319v1 [cs.CR])

Title: A Plural Decentralized Identity Frontier: Abstraction v. Composability Tradeoffs in Web3. (arXiv:2208.11443v1 [cs.CR])

Title: DP2-Pub: Differentially Private High-Dimensional Data Publication with Invariant Post Randomization. (arXiv:2208.11693v1 [cs.CR])

protect

defense

attack

Title: Trace and Detect Adversarial Attacks on CNNs using Feature Response Maps. (arXiv:2208.11436v1 [cs.CV])

Title: Unrestricted Black-box Adversarial Attack Using GAN with Limited Queries. (arXiv:2208.11613v1 [cs.CV])

With extensive experiments, we demonstrate that our proposed method is efficient in evaluating the robustness of classification models with limited queries in a black-box setting. First, we demonstrate that our targeted attack method is query-efficient to produce unrestricted adversarial examples for a facial identity recognition model that contains 307 identities. Then, we demonstrate that the proposed method can also successfully attack a real-world celebrity recognition service.

Title: Towards an Awareness of Time Series Anomaly Detection Models' Adversarial Vulnerability. (arXiv:2208.11264v1 [cs.LG])

Title: Attacking Neural Binary Function Detection. (arXiv:2208.11667v1 [cs.CR])

In this paper, we empirically demonstrate that the current state of the art in neural function boundary detection is vulnerable to both inadvertent and deliberate adversarial attacks. We proceed from the insight that current generation NBAs are built upon embeddings and model architectures intended to solve syntactic problems. We devise a simple, reproducible, and scalable black-box methodology for exploring the space of inadvertent attacks - instruction sequences that could be emitted by common compiler toolchains and configurations - that exploits this syntactic design focus. We then show that these inadvertent misclassifications can be exploited by an attacker, serving as the basis for a highly effective black-box adversarial example generation process. We evaluate this methodology against two state-of-the-art neural function boundary detectors: XDA and DeepDi. We conclude with an analysis of the evaluation data and recommendations for how future research might avoid succumbing to similar attacks.

Title: Toward a Reasoning and Learning Architecture for Ad Hoc Teamwork. (arXiv:2208.11556v1 [cs.AI])

robust

Title: A Study on the Impact of Data Augmentation for Training Convolutional Neural Networks in the Presence of Noisy Labels. (arXiv:2208.11176v1 [cs.CV])

Title: A new explainable DTM generation algorithm with airborne LIDAR data: grounds are smoothly connected eventually. (arXiv:2208.11243v1 [cs.CV])

Title: RZSR: Reference-based Zero-Shot Super-Resolution with Depth Guided Self-Exemplars. (arXiv:2208.11313v1 [cs.CV])

Title: Robust Motion Averaging for Multi-view Registration of Point Sets Based Maximum Correntropy Criterion. (arXiv:2208.11327v1 [cs.CV])

Title: Self-Filtering: A Noise-Aware Sample Selection for Label Noise with Confidence Penalization. (arXiv:2208.11351v1 [cs.CV])

Title: Research on Mask Wearing Detection of Natural Population Based on Improved YOLOv4. (arXiv:2208.11353v1 [cs.CV])

Title: Event-based Image Deblurring with Dynamic Motion Awareness. (arXiv:2208.11398v1 [cs.CV])

Title: Self-Supervised Endoscopic Image Key-Points Matching. (arXiv:2208.11424v1 [cs.CV])

Title: UniCon: Unidirectional Split Learning with Contrastive Loss for Visual Question Answering. (arXiv:2208.11435v1 [cs.CV])

Title: An End-to-End OCR Framework for Robust Arabic-Handwriting Recognition using a Novel Transformers-based Model and an Innovative 270 Million-Words Multi-Font Corpus of Classical Arabic with Diacritics. (arXiv:2208.11484v1 [cs.CV])

Title: Motion Robust High-Speed Light-weighted Object Detection with Event Camera. (arXiv:2208.11602v1 [cs.CV])

In our work, we design a high-speed lightweight detector called Agile Event Detector (AED) with a simple but effective data augmentation method. Also, we propose an event stream representation tensor called Temporal Active Focus (TAF), which takes full advantage of the asynchronous generation of event stream data and is robust to the motion of moving objects. It can also be constructed without much time-consuming. We further propose a module called the Bifurcated Folding Module (BFM) to extract the rich temporal information in the TAF tensor at the input layer of the AED detector. We conduct our experiments on two typical real-scene event camera object detection datasets: the complete Prophesee GEN1 Automotive Detection Dataset and the Prophesee 1 MEGAPIXEL Automotive Detection Dataset with partial annotation. Experiments show that our method is competitive in terms of accuracy, speed, and the number of parameters simultaneously. Also by classifying the objects into multiple motion levels based on the optical flow density metric, we illustrated the robustness of our method for objects with different velocities relative to the camera.

Title: Learning crop type mapping from regional label proportions in large-scale SAR and optical imagery. (arXiv:2208.11607v1 [cs.CV])

Title: AGO-Net: Association-Guided 3D Point Cloud Object Detection Network. (arXiv:2208.11658v1 [cs.CV])

Title: PSSAT: A Perturbed Semantic Structure Awareness Transferring Method for Perturbation-Robust Slot Filling. (arXiv:2208.11508v1 [cs.CL])

Title: Inter- and Intra-Series Embeddings Fusion Network for Epidemiological Forecasting. (arXiv:2208.11515v1 [cs.LG])

Title: Robustness to Unbounded Smoothness of Generalized SignSGD. (arXiv:2208.11195v1 [cs.LG])

Title: Time-to-Green predictions for fully-actuated signal control systems with supervised learning. (arXiv:2208.11344v1 [cs.LG])

biometric

steal

extraction

Title: Doc2Graph: a Task Agnostic Document Understanding Framework based on Graph Neural Networks. (arXiv:2208.11168v1 [cs.CV])

Title: Graph Neural Networks and Representation Embedding for Table Extraction in PDF Documents. (arXiv:2208.11203v1 [cs.CV])

Title: Q-Net: Query-Informed Few-Shot Medical Image Segmentation. (arXiv:2208.11451v1 [cs.CV])

Title: Tracking by weakly-supervised learning and graph optimization for whole-embryo C. elegans lineages. (arXiv:2208.11467v1 [cs.CV])

Title: ssFPN: Scale Sequence (S^2) Feature Based Feature Pyramid Network for Object Detection. (arXiv:2208.11533v1 [cs.CV])

Title: A Hierarchical Interactive Network for Joint Span-based Aspect-Sentiment Analysis. (arXiv:2208.11283v1 [cs.CL])

Title: Molecular Substructure-Aware Network for Drug-Drug Interaction Prediction. (arXiv:2208.11267v1 [cs.AI])

Title: A Review of Knowledge Graph Completion. (arXiv:2208.11652v1 [cs.AI])

membership infer

federate

Title: Achieving Fairness in Dermatological Disease Diagnosis through Automatic Weight Adjusting Federated Learning and Personalization. (arXiv:2208.11187v1 [cs.CV])

Title: Exact Penalty Method for Federated Learning. (arXiv:2208.11231v1 [cs.LG])

Title: Adaptive Resource Allocation in Quantum Key Distribution (QKD) for Federated Learning. (arXiv:2208.11270v1 [cs.CR])

Title: Federated Self-Supervised Contrastive Learning and Masked Autoencoder for Dermatological Disease Diagnosis. (arXiv:2208.11278v1 [cs.LG])

Title: Federated Learning via Decentralized Dataset Distillation in Resource-Constrained Edge Environments. (arXiv:2208.11311v1 [cs.LG])

Title: Towards Sparsified Federated Neuroimaging Models via Weight Pruning. (arXiv:2208.11669v1 [cs.LG])

Title: PromptFL: Let Federated Participants Cooperatively Learn Prompts Instead of Models -- Federated Learning in Age of Foundation Model. (arXiv:2208.11625v1 [cs.LG])

fair

Title: DeepPicarMicro: Applying TinyML to Autonomous Cyber Physical Systems. (arXiv:2208.11212v1 [cs.LG])

Title: TESTSGD: Interpretable Testing of Neural Networks Against Subtle Group Discrimination. (arXiv:2208.11321v1 [cs.LG])

Title: A novel approach for Fair Principal Component Analysis based on eigendecomposition. (arXiv:2208.11362v1 [cs.LG])

interpretability

Title: Radial Basis Function Networks for Convolutional Neural Networks to Learn Similarity Distance Metric and Improve Interpretability. (arXiv:2208.11401v1 [cs.CV])

Title: Hybrid Fusion Based Interpretable Multimodal Emotion Recognition with Insufficient Labelled Data. (arXiv:2208.11450v1 [cs.CV])

exlainability

watermark