secure

Title: An Owner-managed Indirect-Permission Social Authentication Method for Private Key Recovery. (arXiv:2209.09388v1 [cs.CR])

Title: PolyMPCNet: Towards ReLU-free Neural Architecture Search in Two-party Computation Based Private Inference. (arXiv:2209.09424v1 [cs.CR])

In this work, as the first attempt, we develop a systematic framework, PolyMPCNet, of joint overhead reduction of MPC comparison protocol and hardware acceleration, by integrating hardware latency of the cryptographic building block into the DNN loss function to achieve high energy efficiency, accuracy, and security guarantee. Instead of heuristically checking the model sensitivity after a DNN is well-trained (through deleting or dropping some non-polynomial operators), our key design principle is to em enforce exactly what is assumed in the DNN design -- training a DNN that is both hardware efficient and secure, while escaping the local minima and saddle points and maintaining high accuracy. More specifically, we propose a straight through polynomial activation initialization method for cryptographic hardware friendly trainable polynomial activation function to replace the expensive 2P-ReLU operator. We develop a cryptographic hardware scheduler and the corresponding performance model for Field Programmable Gate Arrays (FPGA) platform.

Title: A Secure Healthcare 5.0 System Based on Blockchain Technology Entangled with Federated Learning Technique. (arXiv:2209.09642v1 [cs.LG])

Title: EM-Fault It Yourself: Building a Replicable EMFI Setup for Desktop and Server Hardware. (arXiv:2209.09835v1 [cs.CR])

security

Title: Detection of Malicious Websites Using Machine Learning Techniques. (arXiv:2209.09630v1 [cs.CR])

Title: A Framework for Preserving Privacy and Cybersecurity in Brain-Computer Interfacing Applications. (arXiv:2209.09653v1 [cs.CR])

Title: Peer-group Behaviour Analytics of Windows Authentications Events Using Hierarchical Bayesian Modelling. (arXiv:2209.09769v1 [cs.CR])

Title: Toward Identification and Characterization of IoT Software Update Practices. (arXiv:2209.09855v1 [cs.CR])

privacy

Title: Non-Imaging Medical Data Synthesis for Trustworthy AI: A Comprehensive Survey. (arXiv:2209.09239v1 [cs.LG])

Title: Non-Disclosing Credential On-chaining for Blockchain-based Decentralized Applications. (arXiv:2209.09584v1 [cs.CR])

Title: De-Identification of French Unstructured Clinical Notes for Machine Learning Tasks. (arXiv:2209.09631v1 [cs.CR])

protect

defense

attack

Title: GAMA: Generative Adversarial Multi-Object Scene Attacks. (arXiv:2209.09502v1 [cs.CV])

Title: Adversarial Color Projection: A Projector-Based Physical Attack to DNNs. (arXiv:2209.09652v1 [cs.CR])

Title: Leveraging Local Patch Differences in Multi-Object Scenes for Generative Adversarial Attacks. (arXiv:2209.09883v1 [cs.CV])

Title: CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks. (arXiv:2209.09557v1 [cs.CR])

Title: Understanding Real-world Threats to Deep Learning Models in Android Apps. (arXiv:2209.09577v1 [cs.CR])

Title: Sparse Vicious Attacks on Graph Neural Networks. (arXiv:2209.09688v1 [cs.LG])

Amongst those tasks, link prediction is one of the fundamental problems for many real-world applications, such as recommender systems.

However, GNNs are not immune to adversarial attacks, i.e., carefully crafted malicious examples that are designed to fool the predictive model.

In this work, we focus on a specific, white-box attack to GNN-based link prediction models, where a malicious node aims to appear in the list of recommended nodes for a given target victim.

To achieve this goal, the attacker node may also count on the cooperation of other existing peers that it directly controls, namely on the ability to inject a number of ``vicious'' nodes in the network.

Specifically, all these malicious nodes can add new edges or remove existing ones, thereby perturbing the original graph.

Thus, we propose SAVAGE, a novel framework and a method to mount this type of link prediction attacks.

SAVAGE formulates the adversary's goal as an optimization task, striking the balance between the effectiveness of the attack and the sparsity of malicious resources required.

Extensive experiments conducted on real-world and synthetic datasets demonstrate that adversarial attacks implemented through SAVAGE indeed achieve high attack success rate yet using a small amount of vicious nodes.

Finally, despite those attacks require full knowledge of the target model, we show that they are successfully transferable to other black-box methods for link prediction.

robust

Title: Visible-Infrared Person Re-Identification Using Privileged Intermediate Information. (arXiv:2209.09348v1 [cs.CV])

Title: QuestSim: Human Motion Tracking from Sparse Sensors with Simulated Avatars. (arXiv:2209.09391v1 [cs.CV])

Title: Hierarchical Temporal Transformer for 3D Hand Pose Estimation and Action Recognition from Egocentric RGB Videos. (arXiv:2209.09484v1 [cs.CV])

Title: Towards Robust Referring Image Segmentation. (arXiv:2209.09554v1 [cs.CV])

Title: Sampling Agnostic Feature Representation for Long-Term Person Re-identification. (arXiv:2209.09574v1 [cs.CV])

Title: GANet: Goal Area Network for Motion Forecasting. (arXiv:2209.09723v1 [cs.CV])

Title: Enhancing vehicle detection accuracy in thermal infrared images using multiple GANs. (arXiv:2209.09808v1 [cs.CV])

Title: Frequency Dropout: Feature-Level Regularization via Randomized Filtering. (arXiv:2209.09844v1 [cs.CV])

In this work, we propose a simple yet effective training strategy, Frequency Dropout, to prevent convolutional neural networks from learning frequency-specific imaging features. We employ randomized filtering of feature maps during training which acts as a feature-level regularization. In this study, we consider common image processing filters such as Gaussian smoothing, Laplacian of Gaussian, and Gabor filtering. Our training strategy is model-agnostic and can be used for any computer vision task. We demonstrate the effectiveness of Frequency Dropout on a range of popular architectures and multiple tasks including image classification, domain adaptation, and semantic segmentation using both computer vision and medical imaging datasets. Our results suggest that the proposed approach does not only improve predictive accuracy but also improves robustness against domain shift.

Title: Personal Attribute Prediction from Conversations. (arXiv:2209.09619v1 [cs.CL])

Title: Register Variation Remains Stable Across 60 Languages. (arXiv:2209.09813v1 [cs.CL])

Title: Robust Online and Distributed Mean Estimation Under Adversarial Data Corruption. (arXiv:2209.09624v1 [cs.CR])

Title: Distributed Semi-supervised Fuzzy Regression with Interpolation Consistency Regularization. (arXiv:2209.09240v1 [cs.LG])

Title: Locally Constrained Representations in Reinforcement Learning. (arXiv:2209.09441v1 [cs.LG])

Title: Seq2Seq Surrogates of Epidemic Models to Facilitate Bayesian Inference. (arXiv:2209.09617v1 [cs.LG])

Title: Soft Action Priors: Towards Robust Policy Transfer. (arXiv:2209.09882v1 [cs.LG])

Title: State-driven Implicit Modeling for Sparsity and Robustness in Neural Networks. (arXiv:2209.09389v1 [cs.LG])

Title: Fairness and robustness in anti-causal prediction. (arXiv:2209.09423v1 [cs.LG])

Title: Reduction from Complementary-Label Learning to Probability Estimates. (arXiv:2209.09500v1 [cs.LG])

biometric

steal

extraction

Title: Perceptual Quality Assessment for Digital Human Heads. (arXiv:2209.09489v1 [cs.CV])

Title: View-Disentangled Transformer for Brain Lesion Detection. (arXiv:2209.09657v1 [cs.CV])

Title: Activity report analysis with automatic single or multispan answer extraction. (arXiv:2209.09316v1 [cs.CL])

Title: CofeNet: Context and Former-Label Enhanced Net for Complicated Quotation Extraction. (arXiv:2209.09432v1 [cs.CL])

Title: A Few-shot Approach to Resume Information Extraction via Prompts. (arXiv:2209.09450v1 [cs.CL])

Title: Generalizing through Forgetting -- Domain Generalization for Symptom Event Extraction in Clinical Notes. (arXiv:2209.09485v1 [cs.CL])

Title: Predictive Scale-Bridging Simulations through Active Learning. (arXiv:2209.09811v1 [cs.LG])

Title: Reviewing Embeddings for Graph Neural Networks. (arXiv:2209.09338v1 [cs.LG])

Title: Deep Convolutional Architectures for Extrapolative Forecast in Time-dependent Flow Problems. (arXiv:2209.09651v1 [cs.LG])

Title: Symbolic Regression with Fast Function Extraction and Nonlinear Least Squares Optimization. (arXiv:2209.09675v1 [cs.LG])

membership infer

federate

Title: FedToken: Tokenized Incentives for Data Contribution in Federated Learning. (arXiv:2209.09775v1 [cs.LG])

fair

Title: Training an Assassin AI for The Resistance: Avalon. (arXiv:2209.09331v1 [cs.LG])

Title: Closing the Gender Wage Gap: Adversarial Fairness in Job Recommendation. (arXiv:2209.09592v1 [cs.LG])

interpretability

Title: Interpretable Edge Enhancement and Suppression Learning for 3D Point Cloud Segmentation. (arXiv:2209.09483v1 [cs.CV])

Title: Learn to Explain: Multimodal Reasoning via Thought Chains for Science Question Answering. (arXiv:2209.09513v1 [cs.CL])

Title: Ki-Pode: Keypoint-based Implicit Pose Distribution Estimation of Rigid Objects. (arXiv:2209.09659v1 [cs.CV])

Title: An Efficient End-to-End Transformer with Progressive Tri-modal Attention for Multi-modal Emotion Recognition. (arXiv:2209.09768v1 [cs.CL])

Title: PainPoints: A Framework for Language-based Detection of Chronic Pain and Expert-Collaborative Text-Summarization. (arXiv:2209.09814v1 [cs.CL])

exlainability

watermark