secure

Title: Demystifying Quantum Blockchain for Healthcare. (arXiv:2210.03638v1 [cs.CR])

security

Title: Pre-trained Adversarial Perturbations. (arXiv:2210.03372v1 [cs.CV])

Title: Specialized Re-Ranking: A Novel Retrieval-Verification Framework for Cloth Changing Person Re-Identification. (arXiv:2210.03592v1 [cs.CV])

Title: Threat Repair with Optimization Modulo Theories. (arXiv:2210.03207v1 [cs.CR])

Title: Network Intrusion Detection System in a Light Bulb. (arXiv:2210.03254v1 [cs.CR])

Title: PAC Security: Automatic Privacy Measurement and Control of Data Processing. (arXiv:2210.03458v1 [cs.CR])

Title: LGTBIDS: Layer-wise Graph Theory Based Intrusion Detection System in Beyond 5G. (arXiv:2210.03518v1 [cs.CR])

privacy

Title: Synthetic Dataset Generation for Privacy-Preserving Machine Learning. (arXiv:2210.03205v1 [cs.CR])

Title: Q-LSTM Language Model -- Decentralized Quantum Multilingual Pre-Trained Language Model for Privacy Protection. (arXiv:2210.03221v1 [cs.LG])

Title: TAN without a burn: Scaling Laws of DP-SGD. (arXiv:2210.03403v1 [cs.LG])

Title: Private and Efficient Meta-Learning with Low Rank and Sparse Decomposition. (arXiv:2210.03505v1 [cs.LG])

Title: Exploring the Relationships between Privacy by Design Schemes and Privacy Laws: A Comparative Analysis. (arXiv:2210.03520v1 [cs.CR])

Title: Learnware: Small Models Do Big. (arXiv:2210.03647v1 [cs.LG])

protect

Title: Distillation-Resistant Watermarking for Model Protection in NLP. (arXiv:2210.03312v1 [cs.CL])

Title: Joint Protection Scheme for Deep Neural Network Hardware Accelerators and Models. (arXiv:2210.03249v1 [cs.CR])

defense

attack

Title: Preprocessors Matter! Realistic Decision-Based Attacks on Machine Learning Systems. (arXiv:2210.03297v1 [cs.CR])

Title: A2: Efficient Automated Attacker for Boosting Adversarial Training. (arXiv:2210.03543v1 [cs.CV])

Title: A Wolf in Sheep's Clothing: Spreading Deadly Pathogens Under the Disguise of Popular Music. (arXiv:2210.03688v1 [cs.CR])

Title: BayesImposter: Bayesian Estimation Based .bss Imposter Attack on Industrial Control Systems. (arXiv:2210.03719v1 [cs.CR])

Our work begins to fill this gap by providing a domain-specific structured way to duplicate a physical page in cloud settings in the context of industrial control systems (ICSs). Here, we show a new attack primitive - \textit{BayesImposter}, which points out that the attacker can duplicate the .bss section of the target control DLL file of cloud protocols using the \textit{Bayesian estimation} technique. Our approach results in less memory (i.e., 4 KB compared to GB) and time (i.e., 13 minutes compared to hours) compared to the brute-force approach used in recent works. We point out that ICSs can be expressed as state-space models; hence, the \textit{Bayesian estimation} is an ideal choice to be combined with memory deduplication for a successful attack in cloud settings. To demonstrate the strength of \textit{BayesImposter}, we create a real-world automation platform using a scaled-down automated high-bay warehouse and industrial-grade SIMATIC S7-1500 PLC from Siemens as a target ICS. We demonstrate that \textit{BayesImposter} can predictively inject false commands into the PLC that can cause possible equipment damage with machine failure in the target ICS. Moreover, we show that \textit{BayesImposter} is capable of adversarial control over the target ICS resulting in severe consequences, such as killing a person but making it looks like an accident. Therefore, we also provide countermeasures to prevent the attack.

Title: Empowering Graph Representation Learning with Test-Time Graph Transformation. (arXiv:2210.03561v1 [cs.LG])

robust

Title: Neural Volumetric Mesh Generator. (arXiv:2210.03158v1 [cs.CV])

Title: Dual Clustering Co-teaching with Consistent Sample Mining for Unsupervised Person Re-Identification. (arXiv:2210.03339v1 [cs.CV])

Title: Temporal Feature Alignment in Contrastive Self-Supervised Learning for Human Activity Recognition. (arXiv:2210.03382v1 [cs.CV])

Title: Adversarially Robust Prototypical Few-shot Segmentation with Neural-ODEs. (arXiv:2210.03429v1 [cs.CV])

Title: PS-ARM: An End-to-End Attention-aware Relation Mixer Network for Person Search. (arXiv:2210.03433v1 [cs.CV])

Title: Spatio-temporal Tendency Reasoning for Human Body Pose and Shape Estimation from Videos. (arXiv:2210.03659v1 [cs.CV])

Title: Robust Unsupervised Cross-Lingual Word Embedding using Domain Flow Interpolation. (arXiv:2210.03319v1 [cs.CL])

Title: UU-Tax at SemEval-2022 Task 3: Improving the generalizability of language models for taxonomy classification through data augmentation. (arXiv:2210.03378v1 [cs.CL])

Title: DABERT: Dual Attention Enhanced BERT for Semantic Matching. (arXiv:2210.03454v1 [cs.CL])

Title: NMTSloth: Understanding and Testing Efficiency Degradation of Neural Machine Translation Systems. (arXiv:2210.03696v1 [cs.CL])

Title: GBSVM: Granular-ball Support Vector Machine. (arXiv:2210.03120v1 [cs.LG])

Title: Temporal Spatial Decomposition and Fusion Network for Time Series Forecasting. (arXiv:2210.03122v1 [cs.LG])

Title: Enhancing Mixup-Based Graph Learning for Language Processing via Hybrid Pooling. (arXiv:2210.03123v1 [cs.LG])

Title: Towards Out-of-Distribution Adversarial Robustness. (arXiv:2210.03150v1 [cs.LG])

Title: InfoOT: Information Maximizing Optimal Transport. (arXiv:2210.03164v1 [cs.LG])

Title: Out-of-Distribution Generalization in Algorithmic Reasoning Through Curriculum Learning. (arXiv:2210.03275v1 [cs.LG])

Title: Koopman Neural Forecaster for Time Series with Temporal Distribution Shifts. (arXiv:2210.03675v1 [cs.LG])

Title: Demystifying Map Space Exploration for NPUs. (arXiv:2210.03731v1 [cs.LG])

biometric

steal

extraction

Title: Key Information Extraction in Purchase Documents using Deep Learning and Rule-based Corrections. (arXiv:2210.03453v1 [cs.CV])

Title: A Unified Framework for Multi-intent Spoken Language Understanding with prompting. (arXiv:2210.03337v1 [cs.CL])

Title: Event Extraction: A Survey. (arXiv:2210.03419v1 [cs.CL])

Title: Few-Shot Anaphora Resolution in Scientific Protocols via Mixtures of In-Context Experts. (arXiv:2210.03690v1 [cs.CL])

membership infer

federate

Title: Rethinking Normalization Methods in Federated Learning. (arXiv:2210.03277v1 [cs.LG])

Title: Depersonalized Federated Learning: Tackling Statistical Heterogeneity by Alternating Stochastic Gradient Descent. (arXiv:2210.03444v1 [cs.LG])

However, the raw data held by various involved participators are always non-independent-and-identically-distributed (non-i.i.d), which results in slow convergence of the FL training process.

To address this issue, we propose a new FL method that can significantly mitigate statistical heterogeneity by the depersonalized mechanism.

Particularly, we decouple the global and local objectives optimized by performing stochastic gradient descent alternately to reduce the accumulated variance on the global model (generated in local update phases) hence accelerating the FL convergence.

Then we analyze the proposed method detailedly to show the proposed method converging at a sublinear speed in the general non-convex setting.

Finally, extensive numerical results are conducted with experiments on public datasets to verify the effectiveness of our proposed method.

fair

Title: Evaluating Fairness Without Sensitive Attributes: A Framework Using Only Auxiliary Models. (arXiv:2210.03175v1 [cs.LG])

Title: TCNL: Transparent and Controllable Network Learning Via Embedding Human-Guided Concepts. (arXiv:2210.03274v1 [cs.LG])

Title: The Ethical Risks of Analyzing Crisis Events on Social Media with Machine Learning. (arXiv:2210.03352v1 [cs.LG])

interpretability

Title: Data-driven Approach to Differentiating between Depression and Dementia from Noisy Speech and Language Data. (arXiv:2210.03303v1 [cs.CL])

Title: ReAct: Synergizing Reasoning and Acting in Language Models. (arXiv:2210.03629v1 [cs.CL])

exlainability

watermark