secure

Title: DReS-FL: Dropout-Resilient Secure Federated Learning for Non-IID Clients via Secret Data Sharing. (arXiv:2210.02680v1 [cs.LG])

Title: Cyber-Resilient Privacy Preservation and Secure Billing Approach for Smart Energy Metering Devices. (arXiv:2210.02760v1 [cs.CR])

security

Title: Effective Metaheuristic Based Classifiers for Multiclass Intrusion Detection. (arXiv:2210.02678v1 [cs.CR])

Title: Microsoft Defender Will Be Defended: MemoryRanger Prevents Blinding Windows AV. (arXiv:2210.02821v1 [cs.CR])

Title: Detecting Irregular Network Activity with Adversarial Learning and Expert Feedback. (arXiv:2210.02841v1 [cs.CR])

Title: NeuDep: Neural Binary Memory Dependence Analysis. (arXiv:2210.02853v1 [cs.CR])

We present a new machine-learning-based approach to predict memory dependencies by exploiting the model's learned knowledge about how binary programs execute. Our approach features (i) a self-supervised procedure that pretrains a neural net to reason over binary code and its dynamic value flows through memory addresses, followed by (ii) supervised finetuning to infer the memory dependencies statically. To facilitate efficient learning, we develop dedicated neural architectures to encode the heterogeneous inputs (i.e., code, data values, and memory addresses from traces) with specific modules and fuse them with a composition learning strategy.

We implement our approach in NeuDep and evaluate it on 41 popular software projects compiled by 2 compilers, 4 optimizations, and 4 obfuscation passes. We demonstrate that NeuDep is more precise (1.5x) and faster (3.5x) than the current state-of-the-art. Extensive probing studies on security-critical reverse engineering tasks suggest that NeuDep understands memory access patterns, learns function signatures, and is able to match indirect calls. All these tasks either assist or benefit from inferring memory dependencies. Notably, NeuDep also outperforms the current state-of-the-art on these tasks.

Title: Model-Driven Engineering for Formal Verification and Security Testing of Authentication Protocols. (arXiv:2210.03020v1 [cs.CR])

privacy

Title: FedGraph: an Aggregation Method from Graph Perspective. (arXiv:2210.02733v1 [cs.CV])

Title: Privacy-Preserving Text Classification on BERT Embeddings with Homomorphic Encryption. (arXiv:2210.02574v1 [cs.CL])

Title: PrivacyCube: A Tangible Device for Improving Privacy Awareness in IoT. (arXiv:2210.02650v1 [cs.CR])

Title: Federated Boosted Decision Trees with Differential Privacy. (arXiv:2210.02910v1 [cs.CR])

Title: CANIFE: Crafting Canaries for Empirical Privacy Measurement in Federated Learning. (arXiv:2210.02912v1 [cs.LG])

protect

Title: Token Classification for Disambiguating Medical Abbreviations. (arXiv:2210.02487v1 [cs.CL])

defense

attack

Title: How Far Are We from Real Synonym Substitution Attacks?. (arXiv:2210.02844v1 [cs.CL])

Title: Practical Adversarial Attacks on Spatiotemporal Traffic Forecasting Models. (arXiv:2210.02447v1 [cs.LG])

Title: From Threat Reports to Continuous Threat Intelligence: A Comparison of Attack Technique Extraction Methods from Textual Artifacts. (arXiv:2210.02601v1 [cs.CR])

Title: On Optimal Learning Under Targeted Data Poisoning. (arXiv:2210.02713v1 [cs.LG])

Title: Deep Reinforcement Learning based Evasion Generative Adversarial Network for Botnet Detection. (arXiv:2210.02840v1 [cs.CR])

Title: Blockchain-based Monitoring for Poison Attack Detection in Decentralized Federated Learning. (arXiv:2210.02873v1 [cs.CR])

Title: EvilScreen Attack: Smart TV Hijacking via Multi-channel Remote Control Mimicry. (arXiv:2210.03014v1 [cs.CR])

robust

Title: On Adversarial Robustness of Deep Image Deblurring. (arXiv:2210.02502v1 [cs.CV])

Title: TartanCalib: Iterative Wide-Angle Lens Calibration using Adaptive SubPixel Refinement of AprilTags. (arXiv:2210.02511v1 [cs.CV])

Title: AOE-Net: Entities Interactions Modeling with Adaptive Attention Mechanism for Temporal Action Proposals Generation. (arXiv:2210.02578v1 [cs.CV])

Title: Dynamic Stochastic Ensemble with Adversarial Robust Lottery Ticket Subnetworks. (arXiv:2210.02618v1 [cs.CV])

Title: Domain Generalization via Contrastive Causal Learning. (arXiv:2210.02655v1 [cs.CV])

Title: CLAD: A Contrastive Learning based Approach for Background Debiasing. (arXiv:2210.02748v1 [cs.CV])

Title: Robust Double-Encoder Network for RGB-D Panoptic Segmentation. (arXiv:2210.02834v1 [cs.CV])

Title: Cross-Modality Domain Adaptation for Freespace Detection: A Simple yet Effective Baseline. (arXiv:2210.02991v1 [cs.CV])

Title: Feature-Realistic Neural Fusion for Real-Time, Open Set Scene Understanding. (arXiv:2210.03043v1 [cs.CV])

Title: Ambiguous Images With Human Judgments for Robust Visual Event Classification. (arXiv:2210.03102v1 [cs.CV])

Title: SimPer: Simple Self-Supervised Learning of Periodic Targets. (arXiv:2210.03115v1 [cs.LG])

Title: CCC-wav2vec 2.0: Clustering aided Cross Contrastive Self-supervised learning of speech representations. (arXiv:2210.02592v1 [cs.CL])

Title: Time Will Change Things: An Empirical Study on Dynamic Language Understanding in Social Media Classification. (arXiv:2210.02857v1 [cs.CL])

Title: Binding Language Models in Symbolic Languages. (arXiv:2210.02875v1 [cs.CL])

Title: Detecting Narrative Elements in Informational Text. (arXiv:2210.03028v1 [cs.CL])

Title: Retrieval of Soft Prompt Enhances Zero-Shot Task Generalization. (arXiv:2210.03029v1 [cs.CL])

Title: Toxicity in Multilingual Machine Translation at Scale. (arXiv:2210.03070v1 [cs.CL])

We use a measurement of the amount of source contribution to the translation, where a low source contribution implies hallucination, to interpret what causes toxicity. We observe that the source contribution is somewhat correlated with toxicity but that 45.6% of added toxic words have a high source contribution, suggesting that much of the added toxicity may be due to mistranslations. Combining the signal of source contribution level with a measurement of translation robustness allows us to flag 22.3% of added toxicity, suggesting that added toxicity may be related to both hallucination and the stability of translations in different contexts. Given these findings, our recommendations to reduce added toxicity are to curate training data to avoid mistranslations, mitigate hallucination and check unstable translations.

Title: A Closer Look at Robustness to L-infinity and Spatial Perturbations and their Composition. (arXiv:2210.02577v1 [cs.LG])

Title: Flow Matching for Generative Modeling. (arXiv:2210.02747v1 [cs.LG])

Title: Communication-Efficient and Drift-Robust Federated Learning via Elastic Net. (arXiv:2210.02940v1 [cs.LG])

Title: Unmasking the Lottery Ticket Hypothesis: What's Encoded in a Winning Ticket's Mask?. (arXiv:2210.03044v1 [cs.LG])

Title: Distributionally Adaptive Meta Reinforcement Learning. (arXiv:2210.03104v1 [cs.LG])

Title: TgDLF2.0: Theory-guided deep-learning for electrical load forecasting via Transformer and transfer learning. (arXiv:2210.02448v1 [cs.LG])

Title: Bi-Stride Multi-Scale Graph Neural Network for Mesh-Based Physical Simulation. (arXiv:2210.02573v1 [cs.LG])

Title: Uncertainty Estimation for Multi-view Data: The Power of Seeing the Whole Picture. (arXiv:2210.02676v1 [cs.LG])

Title: Paging with Succinct Predictions. (arXiv:2210.02775v1 [cs.LG])

We study learning-augmented paging from the new perspective of requiring the least possible amount of predicted information. More specifically, the predictions obtained alongside each page request are limited to one bit only. We consider two natural such setups: (i) discard predictions, in which the predicted bit denotes whether or not it is ``safe'' to evict this page, and (ii) phase predictions, where the bit denotes whether the current page will be requested in the next phase (for an appropriate partitioning of the input into phases). We develop algorithms for each of the two setups that satisfy all three desirable properties of learning-augmented algorithms -- that is, they are consistent, robust and smooth -- despite being limited to a one-bit prediction per request. We also present lower bounds establishing that our algorithms are essentially best possible.

Title: SynBench: Task-Agnostic Benchmarking of Pretrained Representations using Synthetic Data. (arXiv:2210.02989v1 [cs.LG])

Title: A Better Way to Decay: Proximal Gradient Training Algorithms for Neural Nets. (arXiv:2210.03069v1 [cs.LG])

biometric

Title: IJCB 2022 Mobile Behavioral Biometrics Competition (MobileB2C). (arXiv:2210.03072v1 [cs.CV])

steal

extraction

Title: U3E: Unsupervised and Erasure-based Evidence Extraction for Machine Reading Comprehension. (arXiv:2210.02621v1 [cs.CL])

Title: Look Ma, Only 400 Samples! Revisiting the Effectiveness of Automatic N-Gram Rule Generation for Spelling Normalization in Filipino. (arXiv:2210.02675v1 [cs.CL])

Title: Geodesic Graph Neural Network for Efficient Graph Representation Learning. (arXiv:2210.02636v1 [cs.LG])

membership infer

federate

Title: Federated Learning with Server Learning: Enhancing Performance for Non-IID Data. (arXiv:2210.02614v1 [cs.LG])

fair

Title: A Review of Uncertainty Calibration in Pretrained Object Detectors. (arXiv:2210.02935v1 [cs.CV])

Title: Reinforcement Learning with Large Action Spaces for Neural Machine Translation. (arXiv:2210.03053v1 [cs.CL])

Title: A Human Rights-Based Approach to Responsible AI. (arXiv:2210.02667v1 [cs.AI])

Title: Equalizing Credit Opportunity in Algorithms: Aligning Algorithmic Fairness Research with U.S. Fair Lending Regulation. (arXiv:2210.02516v1 [cs.LG])

Title: Uncovering the Structural Fairness in Graph Contrastive Learning. (arXiv:2210.03011v1 [cs.LG])

interpretability

Title: Just ClozE! A Fast and Simple Method for Evaluating the Factual Consistency in Abstractive Summarization. (arXiv:2210.02804v1 [cs.CL])

Title: Learning Disentangled Representations for Natural Language Definitions. (arXiv:2210.02898v1 [cs.CL])

Title: Explainable Verbal Deception Detection using Transformers. (arXiv:2210.03080v1 [cs.CL])

Title: Fault Diagnosis using eXplainable AI: a Transfer Learning-based Approach for Rotating Machinery exploiting Augmented Synthetic Data. (arXiv:2210.02974v1 [cs.AI])

Title: Transformers Implement First-Order Logic with Majority Quantifiers. (arXiv:2210.02671v1 [cs.LG])

Title: Continuous Diagnosis and Prognosis by Controlling the Update Process of Deep Neural Networks. (arXiv:2210.02719v1 [cs.LG])

exlainability

watermark