secure

Title: TrustToken, a Trusted SoC solution for Non-Trusted Intellectual Property (IP)s. (arXiv:2209.12987v1 [cs.CR])

\textbf{TrustToken} only allows trusted communication between the non-trusted third-party IP and the rest of the SoC world by providing essential security features, i.e., secure, isolated execution, and trusted user interaction. The proposed design achieves this by interconnecting the third-party IP interface to \textbf{TrustToken} Controller and checking IP authorization(Token) signals \texttt{`correctness'} at run-time. \textbf{TrustToken} architecture shows a very low overhead resource utilization LUT (618, 1.16 \%), FF (44, 0.04 \%), and BUFG (2 , 6.25\%) in implementation. The experiment results show that TrustToken can provide a secure, low-cost, and trusted solution for non-trusted SoC IPs.

Title: MTTBA- A Key Contributor for Sustainable Energy Consumption Time and Space Utility for Highly Secured Crypto Transactions in Blockchain Technology. (arXiv:2209.13431v1 [cs.CR])

security

Title: A Bibliometrics Analysis on 28 years of Authentication and Threat Model Area. (arXiv:2209.12985v1 [cs.CR])

Title: Device Tracking via Linux's New TCP Source Port Selection Algorithm (Extended Version). (arXiv:2209.12993v1 [cs.CR])

We implemented this technique and then tested it using tracking servers in two different locations and with Linux devices on various networks. We also tested it on an Android device that we patched to introduce the new port selection algorithm. The tracking technique works in real-life conditions, and we report detailed findings about it, including its dwell time, scalability, and success rate in different network types. We worked with the Linux kernel team to mitigate the exploit, resulting in a security patch introduced in May 2022 to the Linux kernel, and we provide recommendations for better securing the port selection algorithm in the paper.

Title: A Benchmark Comparison of Python Malware Detection Approaches. (arXiv:2209.13288v1 [cs.CR])

We find that repository administrators have exacting technical demands for such malware detection tools. Specifically, they consider a false positive rate of even 0.01% to be unacceptably high, given the large number of package releases that might trigger false alerts. Measured tools have false positive rates between 15% and 97%; increasing thresholds for detection rules to reduce this rate renders the true positive rate useless. In some cases, these checks emitted alerts more often for benign packages than malicious ones. However, we also find a successful socio-technical malware detection system: external security researchers also perform repository malware scans and report the results to repository administrators. These parties face different incentives and constraints on their time and tooling. We conclude with recommendations for improving detection capabilities and strengthening the collaboration between security researchers and software repository administrators.

Title: Artificial Intelligence for Cybersecurity: Threats, Attacks and Mitigation. (arXiv:2209.13454v1 [cs.CR])

privacy

Title: Sauron U-Net: Simple automated redundancy elimination in medical image segmentation via filter pruning. (arXiv:2209.13590v1 [cs.CV])

Title: Preprint: Privacy-preserving IoT Data Sharing Scheme. (arXiv:2209.13073v1 [cs.CR])

protect

Title: Totems: Physical Objects for Verifying Visual Integrity. (arXiv:2209.13032v1 [cs.CV])

defense

attack

Title: FG-UAP: Feature-Gathering Universal Adversarial Perturbation. (arXiv:2209.13113v1 [cs.CV])

We evaluate the effectiveness our proposed algorithm on abundant experiments, including untargeted and targeted universal attacks, attacks under limited dataset, and transfer-based black-box attacks among different architectures including Vision Transformers, which are believed to be more robust. Furthermore, we investigate FG-UAP in the view of NC by analyzing the labels and extracted features of adversarial examples, finding that collapse phenomenon becomes stronger after the model is corrupted. The code will be released when the paper is accepted.

Title: Suppress with a Patch: Revisiting Universal Adversarial Patch Attacks against Object Detection. (arXiv:2209.13353v1 [cs.CV])

Title: Watch What You Pretrain For: Targeted, Transferable Adversarial Examples on Self-Supervised Speech Recognition models. (arXiv:2209.13523v1 [cs.LG])

robust

Title: NEURAL MARIONETTE: A Transformer-based Multi-action Human Motion Synthesis System. (arXiv:2209.13204v1 [cs.CV])

Title: Frame Interpolation for Dynamic Scenes with Implicit Flow Encoding. (arXiv:2209.13284v1 [cs.CV])

Title: Stacking Ensemble Learning in Deep Domain Adaptation for Ophthalmic Image Classification. (arXiv:2209.13420v1 [cs.CV])

Title: StyleSwap: Style-Based Generator Empowers Robust Face Swapping. (arXiv:2209.13514v1 [cs.CV])

Title: On the Impact of Speech Recognition Errors in Passage Retrieval for Spoken Question Answering. (arXiv:2209.12944v1 [cs.CL])

Title: DAMO-NLP at NLPCC-2022 Task 2: Knowledge Enhanced Robust NER for Speech Entity Linking. (arXiv:2209.13187v1 [cs.CL])

Title: EditEval: An Instruction-Based Benchmark for Text Improvements. (arXiv:2209.13331v1 [cs.CL])

Title: Collaborative Decision Making Using Action Suggestions. (arXiv:2209.13160v1 [cs.AI])

Title: Reinforcement Learning for Cognitive Delay/Disruption Tolerant Network Node Management in an LEO-based Satellite Constellation. (arXiv:2209.13237v1 [cs.AI])

Title: Identifying and Extracting Football Features from Real-World Media Sources using Only Synthetic Training Data. (arXiv:2209.13254v1 [cs.AI])

Title: Phy-Taylor: Physics-Model-Based Deep Neural Networks. (arXiv:2209.13511v1 [cs.LG])

biometric

Title: FaRO 2: an Open Source, Configurable Smart City Framework for Real-Time Distributed Vision and Biometric Systems. (arXiv:2209.12962v1 [cs.CV])

steal

extraction

Title: EEG-based Image Feature Extraction for Visual Classification using Deep Learning. (arXiv:2209.13090v1 [cs.CV])

Title: Spatio-Temporal Relation Learning for Video Anomaly Detection. (arXiv:2209.13116v1 [cs.CV])

Title: A Survey on Graph Neural Networks and Graph Transformers in Computer Vision: A Task-Oriented Perspective. (arXiv:2209.13232v1 [cs.CV])

Title: EgoSpeed-Net: Forecasting Speed-Control in Driver Behavior from Egocentric Video Data. (arXiv:2209.13459v1 [cs.CV])

Title: Dense-TNT: Efficient Vehicle Type Classification Neural Network Using Satellite Imagery. (arXiv:2209.13500v1 [cs.CV])

Title: A general-purpose material property data extraction pipeline from large polymer corpora using Natural Language Processing. (arXiv:2209.13136v1 [cs.CL])

Title: Information Extraction and Human-Robot Dialogue towards Real-life Tasks: A Baseline Study with the MobileCS Dataset. (arXiv:2209.13464v1 [cs.CL])

membership infer

federate

Title: FedStack: Personalized activity monitoring using stacked federated learning. (arXiv:2209.13080v1 [cs.LG])

Title: Semi-Synchronous Personalized Federated Learning over Mobile Edge Networks. (arXiv:2209.13115v1 [cs.LG])

fair

Title: Habitat classification from satellite observations with sparse annotations. (arXiv:2209.12995v1 [cs.CV])

We address these problems by proposing a method for habitat classification and mapping, and apply this method to classify the entire northern Finnish Lapland area into Natura2000 classes. The method is characterized by using finely-grained, sparse, single-pixel annotations collected from the field, combined with large amounts of unannotated data to produce segmentation maps. Supervised, unsupervised and semi-supervised methods are compared, and the benefits of transfer learning from a larger out-of-domain dataset are demonstrated. We propose a \ac{CNN} biased towards center pixel classification ensembled with a random forest classifier, that produces higher quality classifications than the models themselves alone. We show that cropping augmentations, test-time augmentation and semi-supervised learning can help classification even further.

Title: A Survey of Fairness in Medical Image Analysis: Concepts, Algorithms, Evaluations, and Challenges. (arXiv:2209.13177v1 [cs.CV])

Title: OBBStacking: An Ensemble Method for Remote Sensing Object Detection. (arXiv:2209.13369v1 [cs.CV])

Title: Learning When to Advise Human Decision Makers. (arXiv:2209.13578v1 [cs.AI])

Title: Explainable Global Fairness Verification of Tree-Based Classifiers. (arXiv:2209.13179v1 [cs.LG])

interpretability

Title: Explainable Graph Pyramid Autoformer for Long-Term Traffic Forecasting. (arXiv:2209.13123v1 [cs.LG])

exlainability

watermark