secure

security

Title: Image augmentation improves few-shot classification performance in plant disease recognition. (arXiv:2208.12613v1 [cs.CV])

Title: Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns. (arXiv:2208.12449v1 [cs.CR])

Title: Automated False Positive Filtering for esNetwork Alerts. (arXiv:2208.12729v1 [cs.CR])

privacy

Title: Selective manipulation of disentangled representations for privacy-aware facial image processing. (arXiv:2208.12632v1 [cs.CV])

Title: Enabling Weakly-Supervised Temporal Action Localization from On-Device Learning of the Video Stream. (arXiv:2208.12673v1 [cs.CV])

Title: Reduce Communication Costs and Preserve Privacy: Prompt Tuning Method in Federated Learning. (arXiv:2208.12268v1 [cs.LG])

Title: COOKIEGRAPH: Measuring and Countering First-Party Tracking Cookies. (arXiv:2208.12370v1 [cs.CR])

We propose CookieGraph, a machine learning approach that can accurately and robustly detect first-party tracking cookies. CookieGraph detects first-party tracking cookies with 91.06% accuracy, outperforming the state-of-the-art CookieBlock approach by 10.28%. We show that CookieGraph is fully robust against cookie name manipulation while CookieBlock's accuracy drops by 15.68%. We also show that CookieGraph does not cause any major breakage while CookieBlock causes major breakage on 8% of the websites with SSO logins. Our deployment of CookieGraph shows that first-party tracking cookies are used on 93.43% of the 10K websites. We also find that the most prevalent first-party tracking cookies are set by major advertising entities such as Google as well as many specialized entities such as Criteo.

Title: Privacy with Good Taste: A Case Study in Quantifying Privacy Risks in Genetic Scores. (arXiv:2208.12497v1 [cs.CR])

Title: I still know it's you! On Challenges in Anonymizing Source Code. (arXiv:2208.12553v1 [cs.CR])

In this paper, we tackle this problem and develop a framework for reasoning about code anonymization. We prove that the task of generating a $k$-anonymous program -- a program that cannot be attributed to one of $k$ authors -- is not computable and thus a dead end for research. As a remedy, we introduce a relaxed concept called $k$-uncertainty, which enables us to measure the protection of developers. Based on this concept, we empirically study candidate techniques for anonymization, such as code normalization, coding style imitation, and code obfuscation. We find that none of the techniques provides sufficient protection when the attacker is aware of the anonymization. While we introduce an approach for removing remaining clues from the code, the main result of our work is negative: Anonymization of source code is a hard and open problem.

Title: Epistemic Parity: Reproducibility as an Evaluation Metric for Differential Privacy. (arXiv:2208.12700v1 [cs.CR])

We instantiate our methodology over a benchmark of recent peer-reviewed papers that analyze public datasets in the ICPSR social science repository. We reproduce visualizations (qualitative results) and statistical measures (quantitative results) from each paper. We then generate differentially private synthetic datasets using state-of-the-art mechanisms and assess whether the conclusions stated in the paper hold. We find that, across reasonable epsilon values, epistemic parity only partially holds for each synthesizer we evaluated. Therefore, we advocate for both improving existing synthesizers and creating new data release mechanisms that offer strong guarantees for epistemic parity while achieving risk-aware, best effort protection from privacy attacks.

Title: Federated and Privacy-Preserving Learning of Accounting Data in Financial Statement Audits. (arXiv:2208.12708v1 [cs.LG])

Title: Another Use of SMOTE for Interpretable Data Collaboration Analysis. (arXiv:2208.12458v1 [cs.LG])

protect

defense

attack

robust

Title: Learning Continuous Implicit Representation for Near-Periodic Patterns. (arXiv:2208.12278v1 [cs.CV])

Title: Arbitrary Shape Text Detection via Segmentation with Probability Maps. (arXiv:2208.12419v1 [cs.CV])

Title: Robust Prototypical Few-Shot Organ Segmentation with Regularized Neural-ODEs. (arXiv:2208.12428v1 [cs.CV])

Title: GHN-Q: Parameter Prediction for Unseen Quantized Convolutional Architectures via Graph Hypernetworks. (arXiv:2208.12489v1 [cs.LG])

Title: Deformation equivariant cross-modality image synthesis with paired non-aligned training data. (arXiv:2208.12491v1 [cs.CV])

Title: Cross-Lingual Cross-Modal Retrieval with Noise-Robust Learning. (arXiv:2208.12526v1 [cs.CV])

Title: MORI-RAN: Multi-view Robust Representation Learning via Hybrid Contrastive Fusion. (arXiv:2208.12545v1 [cs.CV])

Title: Stain-Robust Mitotic Figure Detection for MIDOG 2022 Challenge. (arXiv:2208.12587v1 [cs.CV])

Title: Take One Gram of Neural Features, Get Enhanced Group Robustness. (arXiv:2208.12625v1 [cs.LG])

Title: Towards Robust Drone Vision in the Wild. (arXiv:2208.12655v1 [cs.CV])

Title: Multi tasks RetinaNet for mitosis detection. (arXiv:2208.12657v1 [cs.CV])

Title: Multi-Scale Architectures Matter: On the Adversarial Robustness of Flow-based Lossless Compression. (arXiv:2208.12716v1 [cs.CV])

Title: T-Person-GAN: Text-to-Person Image Generation with Identity-Consistency and Manifold Mix-Up. (arXiv:2208.12752v1 [cs.CV])

Title: Leveraging Synthetic Data to Learn Video Stabilization Under Adverse Conditions. (arXiv:2208.12763v1 [cs.CV])

Title: Effectiveness of Mining Audio and Text Pairs from Public Data for Improving ASR Systems for Low-Resource Languages. (arXiv:2208.12666v1 [cs.CL])

Title: Deep Hypergraph Structure Learning. (arXiv:2208.12547v1 [cs.LG])

Title: Towards Higher-order Topological Consistency for Unsupervised Network Alignment. (arXiv:2208.12463v1 [cs.LG])

Title: Lower Difficulty and Better Robustness: A Bregman Divergence Perspective for Adversarial Training. (arXiv:2208.12511v1 [cs.LG])

biometric

steal

extraction

Title: GRASP: Guiding model with RelAtional Semantics using Prompt. (arXiv:2208.12494v1 [cs.CL])

Title: SNAP: Efficient Extraction of Private Properties with Poisoning. (arXiv:2208.12348v1 [cs.LG])

In this paper, we consider the setting of property inference attacks in which the attacker can poison a subset of the training dataset and query the trained target model. Motivated by our theoretical analysis of model confidences under poisoning, we design an efficient property inference attack, SNAP, which obtains higher attack success and requires lower amounts of poisoning than the state-of-the-art poisoning-based property inference attack by Mahloujifar et al. For example, on the Census dataset, SNAP achieves 34% higher success rate than Mahloujifar et al. while being 56.5x faster. We also extend our attack to determine if a certain property is present at all in training, and estimate the exact proportion of a property of interest efficiently. We evaluate our attack on several properties of varying proportions from four datasets, and demonstrate SNAP's generality and effectiveness.

Title: Learning and Compositionality: a Unification Attempt via Connectionist Probabilistic Programming. (arXiv:2208.12789v1 [cs.AI])

membership infer

federate

Title: DPAUC: Differentially Private AUC Computation in Federated Learning. (arXiv:2208.12294v1 [cs.LG])

fair

Title: Automatic detection of faults in race walking from a smartphone camera: a comparison of an Olympic medalist and university athletes. (arXiv:2208.12646v1 [cs.CV])

Title: Comparing Apples to Oranges: Learning Similarity Functions for Data Produced by Different Distributions. (arXiv:2208.12731v1 [cs.LG])

Title: Socially Fair Reinforcement Learning. (arXiv:2208.12584v1 [cs.LG])

Title: LUCID: Exposing Algorithmic Bias through Inverse Design. (arXiv:2208.12786v1 [cs.LG])

interpretability

exlainability

watermark