secure

Title: Zero Trust Federation: Sharing Context under User Control toward Zero Trust in Identity Federation. (arXiv:2209.11025v1 [cs.CR])

Title: To Fix or Not to Fix: A Critical Study of Crypto-misuses in the Wild. (arXiv:2209.11103v1 [cs.CR])

security

Title: Google Coral-based edge computing person reidentification using human parsing combined with analytical method. (arXiv:2209.11024v1 [cs.CV])

Title: Deep Learning on Home Drone: Searching for the Optimal Architecture. (arXiv:2209.11064v1 [cs.CV])

Existing deep learning solutions are either much too slow for real-time computation on such IoT devices, or provide results of impractical quality. Our main challenge was to design a system that takes the best of all worlds among numerous combinations of networks, deep learning platforms/frameworks, compression techniques, and compression ratios. To this end, we provide an efficient searching algorithm that aims to find the optimal combination which results in the best tradeoff between the network running time and its accuracy/performance.

Title: Multi-Tenant Cloud FPGA: A Survey on Security. (arXiv:2209.11158v1 [cs.CR])

Title: Perceived Security of E-Learning Portal. (arXiv:2209.11196v1 [cs.CR])

Title: An Overview of Phishing Victimization: Human Factors, Training and the Role of Emotions. (arXiv:2209.11197v1 [cs.CR])

Title: A Dive into WhatsApp's End-to-End Encryption. (arXiv:2209.11198v1 [cs.CR])

privacy

Title: Privacy Attacks Against Biometric Models with Fewer Samples: Incorporating the Output of Multiple Models. (arXiv:2209.11020v1 [cs.CV])

One of the main constraints in conducting a successful model inversion attack is the amount of training data required. In this work, we focus on iris and facial biometric systems and propose a new technique that drastically reduces the amount of training data necessary. By leveraging the output of multiple models, we are able to conduct model inversion attacks with 1/10th the training set size of Ahmad and Fuller (IJCB 2020) for iris data and 1/1000th the training set size of Mai et al. (Pattern Analysis and Machine Intelligence 2019) for facial data. We denote our new attack technique as structured random with alignment loss. Our attacks are black-box, requiring no knowledge of the weights of the target neural network, only the dimension, and values of the output vector.

To show the versatility of the alignment loss, we apply our attack framework to the task of membership inference (Shokri et al., IEEE S&P 2017) on biometric data. For the iris, membership inference attack against classification networks improves from 52% to 62% accuracy.

Title: In Differential Privacy, There is Truth: On Vote Leakage in Ensemble Private Learning. (arXiv:2209.10732v1 [cs.LG])

Title: Improving Utility for Privacy-Preserving Analysis of Correlated Columns using Pufferfish Privacy. (arXiv:2209.10908v1 [cs.CR])

Title: On the Heritage of Crypto Assets -- Tales From the Crypt Protocol. (arXiv:2209.11194v1 [cs.CR])

protect

defense

attack

Title: Talking Trojan: Analyzing an Industry-Wide Disclosure. (arXiv:2209.10717v1 [cs.CR])

robust

Title: Stochastic Future Prediction in Real World Driving Scenarios. (arXiv:2209.10693v1 [cs.CV])

Title: Fair Robust Active Learning by Joint Inconsistency. (arXiv:2209.10729v1 [cs.LG])

Title: Multi-level Adversarial Spatio-temporal Learning for Footstep Pressure based FoG Detection. (arXiv:2209.10770v1 [cs.CV])

Title: IntereStyle: Encoding an Interest Region for Robust StyleGAN Inversion. (arXiv:2209.10811v1 [cs.CV])

Title: A Spatial-channel-temporal-fused Attention for Spiking Neural Networks. (arXiv:2209.10837v1 [cs.CV])

Title: DRKF: Distilled Rotated Kernel Fusion for Efficiently Boosting Rotation Invariance in Image Matching. (arXiv:2209.10907v1 [cs.CV])

Title: Poisson Flow Generative Models. (arXiv:2209.11178v1 [cs.LG])

Title: Selecting Better Samples from Pre-trained LLMs: A Case Study on Question Generation. (arXiv:2209.11000v1 [cs.CL])

Title: First-order Policy Optimization for Robust Markov Decision Process. (arXiv:2209.10579v1 [cs.LG])

Title: A Closer Look at Learned Optimization: Stability, Robustness, and Inductive Biases. (arXiv:2209.11208v1 [cs.LG])

biometric

steal

extraction

Title: FusionRCNN: LiDAR-Camera Fusion for Two-stage 3D Object Detection. (arXiv:2209.10733v1 [cs.CV])

Title: INFINITY: A Simple Yet Effective Unsupervised Framework for Graph-Text Mutual Conversion. (arXiv:2209.10754v1 [cs.CL])

Title: A novel corrective-source term approach to modeling unknown physics in aluminum extraction process. (arXiv:2209.10861v1 [cs.LG])

membership infer

federate

Title: Enhanced Decentralized Federated Learning based on Consensus in Connected Vehicles. (arXiv:2209.10722v1 [cs.LG])

Title: One-Shot Federated Learning for Model Clustering and Learning in Heterogeneous Environments. (arXiv:2209.10866v1 [cs.LG])

fair

Title: SCALES: From Fairness Principles to Constrained Decision-Making. (arXiv:2209.10860v1 [cs.LG])

interpretability

Title: Improving Attention-Based Interpretability of Text Classification Transformers. (arXiv:2209.10876v1 [cs.CL])

Title: Toy Models of Superposition. (arXiv:2209.10652v1 [cs.LG])

Title: Counterfactual Explanations Using Optimization With Constraint Learning. (arXiv:2209.10997v1 [cs.LG])

exlainability

watermark