secure

Title: Analysis of the new standard hash function. (arXiv:2209.11857v1 [cs.CR])

Title: Authentication and encryption for a robotic ad hoc network using identity-based cryptography. (arXiv:2209.11861v1 [cs.CR])

Title: Cooperative Resource Management in Quantum Key Distribution (QKD) Networks for Semantic Communication. (arXiv:2209.11957v1 [cs.CR])

Title: Secure Decentralized IoT Service Platform using Consortium Blockchain. (arXiv:2209.12145v1 [cs.CR])

security

Title: Reversible Data Hiding in Encrypted Text Using Paillier Cryptosystem. (arXiv:2209.11802v1 [cs.CR])

Title: "My Privacy for their Security": Employees' Privacy Perspectives and Expectations when using Enterprise Security Software. (arXiv:2209.11878v1 [cs.CR])

Title: CryptoGCN: Fast and Scalable Homomorphically Encrypted Graph Convolutional Network Inference. (arXiv:2209.11904v1 [cs.CR])

Title: Blockchain technologies in the design of Industrial Control Systems for Smart Cities. (arXiv:2209.12041v1 [cs.CR])

Title: SPRITZ-1.5C: Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks. (arXiv:2209.12195v1 [cs.CR])

In this study, we present a novel architecture based on an ensemble classifier that combines the enhanced security of 1-Class classification (known as 1C) with the high performance of conventional 2-Class classification (known as 2C) in the absence of attacks.Our architecture is referred to as the 1.5-Class (SPRITZ-1.5C) classifier and constructed using a final dense classifier, one 2C classifier (i.e., CNNs), and two parallel 1C classifiers (i.e., auto-encoders). In our experiments, we evaluated the robustness of our proposed architecture by considering eight possible adversarial attacks in various scenarios. We performed these attacks on the 2C and SPRITZ-1.5C architectures separately. The experimental results of our study showed that the Attack Success Rate (ASR) of the I-FGSM attack against a 2C classifier trained with the N-BaIoT dataset is 0.9900. In contrast, the ASR is 0.0000 for the SPRITZ-1.5C classifier.

privacy

Title: Blinder: End-to-end Privacy Protection in Sensing Systems via Personalized Federated Learning. (arXiv:2209.12046v1 [cs.LG])

Title: Privacy-Preserving Online Content Moderation: A Federated Learning Use Case. (arXiv:2209.11843v1 [cs.LG])

protect

defense

Title: Vision-based Perimeter Defense via Multiview Pose Estimation. (arXiv:2209.12136v1 [cs.CV])

attack

Title: Approximate better, Attack stronger: Adversarial Example Generation via Asymptotically Gaussian Mixture Distribution. (arXiv:2209.11964v1 [cs.LG])

Title: A Uniform Representation Learning Method for OCT-based Fingerprint Presentation Attack Detection and Reconstruction. (arXiv:2209.12208v1 [cs.CV])

Title: Trace-based cryptoanalysis of cyclotomic PLWE for the non-split case. (arXiv:2209.11962v1 [cs.CR])

robust

Title: Closing the Loop: Graph Networks to Unify Semantic Objects and Visual Features for Multi-object Scenes. (arXiv:2209.11894v1 [cs.CV])

Title: A Simple Strategy to Provable Invariance via Orbit Mapping. (arXiv:2209.11916v1 [cs.CV])

Title: Towards Bridging the Space Domain Gap for Satellite Pose Estimation using Event Sensing. (arXiv:2209.11945v1 [cs.CV])

Title: Raising the Bar on the Evaluation of Out-of-Distribution Detection. (arXiv:2209.11960v1 [cs.CV])

Title: Robust Hyperspectral Image Fusion with Simultaneous Guide Image Denoising via Constrained Convex Optimization. (arXiv:2209.11979v1 [cs.CV])

Title: Tracking and Reconstructing Hand Object Interactions from Point Cloud Sequences in the Wild. (arXiv:2209.12009v1 [cs.CV])

Title: Towards Stable Co-saliency Detection and Object Co-segmentation. (arXiv:2209.12138v1 [cs.CV])

Title: PL-EVIO: Robust Monocular Event-based Visual Inertial Odometry with Point and Line Features. (arXiv:2209.12160v1 [cs.CV])

Title: Hand Hygiene Assessment via Joint Step Segmentation and Key Action Scorer. (arXiv:2209.12221v1 [cs.CV])

Title: Multimodal Learning with Channel-Mixing and Masked Autoencoder on Facial Action Unit Detection. (arXiv:2209.12244v1 [cs.CV])

Title: Multi-dataset Training of Transformers for Robust Action Recognition. (arXiv:2209.12362v1 [cs.CV])

Title: Unsupervised Model-based Pre-training for Data-efficient Control from Pixels. (arXiv:2209.12016v1 [cs.AI])

Title: Physics-Informed Graph Neural Network for Spatial-temporal Production Forecasting. (arXiv:2209.11885v1 [cs.LG])

We propose a grid-free, physics-informed graph neural network (PI-GNN) for production forecasting. A customized graph convolution layer aggregates neighborhood information from historical data and has the flexibility to integrate domain expertise into the data-driven model. The proposed method relaxes the dependence on close-form solutions like CRM and honors the given physics-based constraints. Our proposed method is robust, with improved performance and model interpretability relative to the conventional CRM and GNN baseline without physics constraints.

Title: A Deep Learning Approach to Analyzing Continuous-Time Systems. (arXiv:2209.12128v1 [cs.LG])

Title: Solving Seismic Wave Equations on Variable Velocity Models with Fourier Neural Operator. (arXiv:2209.12340v1 [cs.LG])

biometric

steal

extraction

Title: ECO-TR: Efficient Correspondences Finding Via Coarse-to-Fine Refinement. (arXiv:2209.12213v1 [cs.CV])

Title: Application of Deep Learning in Generating Structured Radiology Reports: A Transformer-Based Technique. (arXiv:2209.12177v1 [cs.CL])

Title: Developing a Knowledge Graph Framework for Pharmacokinetic Natural Product-Drug Interactions. (arXiv:2209.11950v1 [cs.AI])

Title: Enhancing Claim Classification with Feature Extraction from Anomaly-Detection-Derived Routine and Peculiarity Profiles. (arXiv:2209.11763v1 [cs.LG])

Title: Highly Scalable Task Grouping for Deep Multi-Task Learning in Prediction of Epigenetic Events. (arXiv:2209.11892v1 [cs.LG])

Title: Deep Feature Selection Using a Novel Complementary Feature Mask. (arXiv:2209.12282v1 [cs.LG])

membership infer

federate

Title: Communication-Efficient {Federated} Learning Using Censored Heavy Ball Descent. (arXiv:2209.11944v1 [cs.LG])

Title: On the Stability Analysis of Open Federated Learning Systems. (arXiv:2209.12307v1 [cs.LG])

fair

Title: Controllable Text Generation for Open-Domain Creativity and Fairness. (arXiv:2209.12099v1 [cs.CL])

Title: Re-contextualizing Fairness in NLP: The Case of India. (arXiv:2209.12226v1 [cs.CL])

Title: Towards Auditing Unsupervised Learning Algorithms and Human Processes For Fairness. (arXiv:2209.11762v1 [cs.AI])

Title: An Efficient Algorithm for Fair Multi-Agent Multi-Armed Bandit with Low Regret. (arXiv:2209.11817v1 [cs.LG])

Title: Doubly Fair Dynamic Pricing. (arXiv:2209.11837v1 [cs.LG])

interpretability

Title: Ground then Navigate: Language-guided Navigation in Dynamic Scenes. (arXiv:2209.11972v1 [cs.CV])

Title: Emb-GAM: an Interpretable and Efficient Predictor using Pre-trained Language Models. (arXiv:2209.11799v1 [cs.AI])

Title: Toward Intention Discovery for Early Malice Detection in Bitcoin. (arXiv:2209.12001v1 [cs.LG])

First, we present asset transfer paths, which aim to describe addresses' early characteristics. Next, with a decision tree based strategy for feature selection and segmentation, we split the entire observation period into different segments and encode each as a segment vector. After clustering all these segment vectors, we get the global status vectors, essentially the basic unit to describe the whole intention. Finally, a hierarchical self-attention predictor predicts the label for the given address in real time. A survival module tells the predictor when to stop and proposes the status sequence, namely intention. %

With the type-dependent selection strategy and global status vectors, our model can be applied to detect various illicit activities with strong interpretability. The well-designed predictor and particular loss functions strengthen the model's prediction speed and interpretability one step further. Extensive experiments on three real-world datasets show that our proposed algorithm outperforms state-of-the-art methods. Besides, additional case studies justify our model can not only explain existing illicit patterns but can also find new suspicious characters.

exlainability

watermark