secure

security

Title: Reversible Data hiding in Encrypted Domain with Public Key Embedding Mechanism. (arXiv:2208.14510v1 [cs.CR])

Title: A Survey of Security and Privacy Issues in V2X Communication Systems. (arXiv:2208.14674v1 [cs.CR])

Title: Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research. (arXiv:2208.14937v1 [cs.CR])

Title: Microwalk-CI: Practical Side-Channel Analysis for JavaScript Applications. (arXiv:2208.14942v1 [cs.CR])

In this work, we introduce Microwalk-CI, a novel side-channel analysis framework for easy integration into a JavaScript development workflow. First, we extend existing dynamic approaches with a new analysis algorithm, that allows efficient localization and quantification of leakages, making it suitable for use in practical development. We then present a technique for generating execution traces from JavaScript applications, which can be further analyzed with our and other algorithms originally designed for binary analysis. Finally, we discuss how Microwalk-CI can be integrated into a continuous integration (CI) pipeline for efficient and ongoing monitoring. We evaluate our analysis framework by conducting a thorough evaluation of several popular JavaScript cryptographic libraries, and uncover a number of critical leakages.

Title: Deep-Learning-Based Device Fingerprinting for Increased LoRa-IoT Security: Sensitivity to Network Deployment Changes. (arXiv:2208.14964v1 [cs.LG])

privacy

Title: EViT: Privacy-Preserving Image Retrieval via Encrypted Vision Transformer in Cloud Computing. (arXiv:2208.14657v1 [cs.CV])

Title: Application of Data Encryption in Chinese Named Entity Recognition. (arXiv:2208.14627v1 [cs.CR])

Title: PBAG: A Privacy-Preserving Blockchain-based Authentication Protocol with Global-updated Commitment in IoV. (arXiv:2208.14616v1 [cs.CR])

Title: Dynamic Global Sensitivity for Differentially Private Contextual Bandits. (arXiv:2208.14555v1 [cs.LG])

protect

defense

attack

Title: Membership Inference Attacks by Exploiting Loss Trajectory. (arXiv:2208.14933v1 [cs.CR])

Title: Zero-day DDoS Attack Detection. (arXiv:2208.14971v1 [cs.CR])

robust

Title: Augraphy: A Data Augmentation Library for Document Images. (arXiv:2208.14558v1 [cs.CV])

Title: SIM-Trans: Structure Information Modeling Transformer for Fine-grained Visual Categorization. (arXiv:2208.14607v1 [cs.CV])

Title: Temporal Flow Mask Attention for Open-Set Long-Tailed Recognition of Wild Animals in Camera-Trap Images. (arXiv:2208.14625v1 [cs.CV])

Title: 3DLG-Detector: 3D Object Detection via Simultaneous Local-Global Feature Learning. (arXiv:2208.14796v1 [cs.CV])

Title: MultiCoNER: A Large-scale Multilingual dataset for Complex Named Entity Recognition. (arXiv:2208.14536v1 [cs.CL])

Title: To Adapt or to Fine-tune: A Case Study on Abstractive Summarization. (arXiv:2208.14559v1 [cs.CL])

Title: Formalising the Robustness of Counterfactual Explanations for Neural Networks. (arXiv:2208.14878v1 [cs.LG])

Title: Cell-Free Latent Go-Explore. (arXiv:2208.14928v1 [cs.LG])

Title: ARMA Cell: A Modular and Effective Approach for Neural Autoregressive Modeling. (arXiv:2208.14919v1 [cs.LG])

biometric

steal

extraction

Title: Dual Representation Learning for One-Step Clustering of Multi-View Data. (arXiv:2208.14450v1 [cs.LG])

membership infer

federate

Title: Reducing Impacts of System Heterogeneity in Federated Learning using Weight Update Magnitudes. (arXiv:2208.14808v1 [cs.LG])

Title: Federated Online Clustering of Bandits. (arXiv:2208.14865v1 [cs.LG])

fair

Title: A Fair Experimental Comparison of Neural Network Architectures for Latent Representations of Multi-Omics for Drug Response Prediction. (arXiv:2208.14822v1 [cs.LG])

interpretability

exlainability

watermark