secure

security

Title: AccelAT: A Framework for Accelerating the Adversarial Training of Deep Neural Networks through Accuracy Gradient. (arXiv:2210.06888v1 [cs.LG])

This paper aims at accelerating the adversarial training to enable fast development of robust DNN models against adversarial attacks. The general method for improving the training performance is the hyperparameters fine-tuning, where the learning rate is one of the most crucial hyperparameters. By modifying its shape (the value over time) and value during the training, we can obtain a model robust to adversarial attacks faster than standard training.

First, we conduct experiments on two different datasets (CIFAR10, CIFAR100), exploring various techniques. Then, this analysis is leveraged to develop a novel fast training methodology, AccelAT, which automatically adjusts the learning rate for different epochs based on the accuracy gradient. The experiments show comparable results with the related works, and in several experiments, the adversarial training of DNNs using our AccelAT framework is conducted up to 2 times faster than the existing techniques. Thus, our findings boost the speed of adversarial training in an era in which security and performance are fundamental optimization objectives in DNN-based applications.

Title: Blockchain for Unmanned Underwater Drones: Research Issues, Challenges, Trends and Future Directions. (arXiv:2210.06540v1 [cs.CR])

Title: BLADERUNNER: Rapid Countermeasure for Synthetic (AI-Generated) StyleGAN Faces. (arXiv:2210.06587v1 [cs.CR])

Title: Forensic-Ready Risk Management Concepts. (arXiv:2210.06840v1 [cs.CR])

Title: POSE: Practical Off-chain Smart Contract Execution. (arXiv:2210.07110v1 [cs.CR])

In this paper, we present POSE -- a practical off-chain protocol for smart contracts that addresses the aforementioned shortcomings of existing solutions. POSE leverages a pool of Trusted Execution Environments (TEEs) to execute the computation efficiently and to swiftly recover from accidental or malicious failures. We show that POSE provides strong security guarantees even if a large subset of parties is corrupted. We evaluate our proof-of-concept implementation with respect to its efficiency and effectiveness.

privacy

Title: Mitigating Unintended Memorization in Language Models via Alternating Teaching. (arXiv:2210.06772v1 [cs.CL])

Title: A Tagging Solution to Discover IoT Devices in Apartments. (arXiv:2210.06676v1 [cs.CR])

Title: PUPoW: A framework for designing blockchains with practically-useful-proof-of-work & vanitycoin. (arXiv:2210.06738v1 [cs.CR])

We also propose a way to use PUPOW for solving TOR vanity URL generation and bitcoin vanity address generation problems. We call this PUPoW blockchain solving vanity address generation problems as VanityCoin. Both problems require generating public keys from private keys such that resultant addresses are of interest. Such key pairs are found only by a brute-force search. However, there are privacy concerns that miners would know the private keys of the puzzlers. We resolve this by splitting the private keys, and the miners would know only one part of it. In summary, we are proposing how PoW can be made practically helpful, and we believe such an approach is needed for PoW blockchains to survive.

Title: PoliGraph: Automated Privacy Policy Analysis using Knowledge Graphs. (arXiv:2210.06746v1 [cs.CR])

Title: Federated Learning for Tabular Data: Exploring Potential Risk to Privacy. (arXiv:2210.06856v1 [cs.CR])

Title: Personalized Federated Hypernetworks for Privacy Preservation in Multi-Task Reinforcement Learning. (arXiv:2210.06820v1 [cs.LG])

protect

Title: The Inventory is Dark and Full of Misinformation: Understanding the Abuse of Ad Inventory Pooling in the Ad-Tech Supply Chain. (arXiv:2210.06654v1 [cs.CR])

Title: SoK: How `Not' to Architect Your Next-Generation TEE Malware?. (arXiv:2210.06792v1 [cs.CR])

defense

Title: How to Sift Out a Clean Data Subset in the Presence of Data Poisoning?. (arXiv:2210.06516v1 [cs.CR])

This paper starts by examining the impact of poisoned samples on defenses when they are mistakenly mixed into the base set. We analyze five defenses and find that their performance deteriorates dramatically with less than 1% poisoned points in the base set. These findings suggest that sifting out a base set with high precision is key to these defenses' performance. Motivated by these observations, we study how precise existing automated tools and human inspection are at identifying clean data in the presence of data poisoning. Unfortunately, neither effort achieves the precision needed. Worse yet, many of the outcomes are worse than random selection.

In addition to uncovering the challenge, we propose a practical countermeasure, Meta-Sift. Our method is based on the insight that existing attacks' poisoned samples shifts from clean data distributions. Hence, training on the clean portion of a dataset and testing on the corrupted portion will result in high prediction loss. Leveraging the insight, we formulate a bilevel optimization to identify clean data and further introduce a suite of techniques to improve efficiency and precision. Our evaluation shows that Meta-Sift can sift a clean base set with 100% precision under a wide range of poisoning attacks. The selected base set is large enough to give rise to successful defenses.

attack

Title: Adversarial Attack Against Image-Based Localization Neural Networks. (arXiv:2210.06589v1 [cs.CV])

Title: A Stream Learning Approach for Real-Time Identification of False Data Injection Attacks in Cyber-Physical Power Systems. (arXiv:2210.06729v1 [cs.LG])

Title: Adv-Attribute: Inconspicuous and Transferable Adversarial Attack on Face Recognition. (arXiv:2210.06871v1 [cs.CV])

Title: Understanding Impacts of Task Similarity on Backdoor Attack and Detection. (arXiv:2210.06509v1 [cs.CR])

Title: Feature Reconstruction Attacks and Countermeasures of DNN training in Vertical Federated Learning. (arXiv:2210.06771v1 [cs.LG])

This paper makes the first attempt to study the feature security problem of DNN training in VFL. We consider a DNN model partitioned between active and passive parties, where the latter only holds a subset of the input layer and exhibits some categorical features of binary values. Using a reduction from the Exact Cover problem, we prove that reconstructing those binary features is NP-hard. Through analysis, we demonstrate that, unless the feature dimension is exceedingly large, it remains feasible, both theoretically and practically, to launch a reconstruction attack with an efficient search-based algorithm that prevails over current feature protection techniques. To address this problem, we develop a novel feature protection scheme against the reconstruction attack that effectively misleads the search to some pre-specified random values. With an extensive set of experiments, we show that our protection scheme sustains the feature reconstruction attack in various VFL applications at no expense of accuracy loss.

Title: Observed Adversaries in Deep Reinforcement Learning. (arXiv:2210.06787v1 [cs.LG])

robust

Title: Robust Action Segmentation from Timestamp Supervision. (arXiv:2210.06501v1 [cs.CV])

Title: Fairness via Adversarial Attribute Neighbourhood Robust Learning. (arXiv:2210.06630v1 [cs.LG])

Title: Application-Driven AI Paradigm for Hand-Held Action Detection. (arXiv:2210.06682v1 [cs.CV])

Title: COLLIDER: A Robust Training Framework for Backdoor Data. (arXiv:2210.06704v1 [cs.LG])

Title: H2RBox: Horizonal Box Annotation is All You Need for Oriented Object Detection. (arXiv:2210.06742v1 [cs.CV])

Title: Large-Scale Open-Set Classification Protocols for ImageNet. (arXiv:2210.06789v1 [cs.CV])

Title: Hierarchical and Progressive Image Matting. (arXiv:2210.06906v1 [cs.CV])

Title: Wider and Higher: Intensive Integration and Global Foreground Perception for Image Matting. (arXiv:2210.06919v1 [cs.CV])

Title: SageMix: Saliency-Guided Mixup for Point Clouds. (arXiv:2210.06944v1 [cs.CV])

Title: Denoising Masked AutoEncoders are Certifiable Robust Vision Learners. (arXiv:2210.06983v1 [cs.CV])

Title: Learning with Style: Continual Semantic Segmentation Across Tasks and Domains. (arXiv:2210.07016v1 [cs.CV])

Title: On the Evaluation of the Plausibility and Faithfulness of Sentiment Analysis Explanations. (arXiv:2210.06916v1 [cs.CL])

Title: Incorporating Context into Subword Vocabularies. (arXiv:2210.07095v1 [cs.CL])

Title: A Multi-dimensional Evaluation of Tokenizer-free Multilingual Pretrained Models. (arXiv:2210.07111v1 [cs.CL])

Title: FASTER-CE: Fast, Sparse, Transparent, and Robust Counterfactual Explanations. (arXiv:2210.06578v1 [cs.LG])

Title: Outlier-Robust Group Inference via Gradient Space Clustering. (arXiv:2210.06759v1 [cs.LG])

Title: Improving Out-of-Distribution Generalization by Adversarial Training with Structured Priors. (arXiv:2210.06807v1 [cs.LG])

Title: GA-SAM: Gradient-Strength based Adaptive Sharpness-Aware Minimization for Improved Generalization. (arXiv:2210.06895v1 [cs.LG])

Title: Delta-Closure Structure for Studying Data Distribution. (arXiv:2210.06926v1 [cs.LG])

biometric

Title: Generalized Inter-class Loss for Gait Recognition. (arXiv:2210.06779v1 [cs.CV])

Title: Behavioral graph fraud detection in E-commerce. (arXiv:2210.06968v1 [cs.LG])

steal

extraction

Title: Dimensionality of datasets in object detection networks. (arXiv:2210.07049v1 [cs.CV])

Title: Developing a general-purpose clinical language inference model from a large corpus of clinical notes. (arXiv:2210.06566v1 [cs.CL])

Title: Iterative Document-level Information Extraction via Imitation Learning. (arXiv:2210.06600v1 [cs.CL])

Title: Instruction Tuning for Few-Shot Aspect-Based Sentiment Analysis. (arXiv:2210.06629v1 [cs.CL])

Title: An Empirical Study on Finding Spans. (arXiv:2210.06824v1 [cs.CL])

Title: Ensemble Creation via Anchored Regularization for Unsupervised Aspect Extraction. (arXiv:2210.06829v1 [cs.CL])

membership infer

federate

Title: Anomaly Detection via Federated Learning. (arXiv:2210.06614v1 [cs.LG])

Title: Dim-Krum: Backdoor-Resistant Federated Learning for NLP with Dimension-wise Krum-Based Aggregation. (arXiv:2210.06894v1 [cs.LG])

Title: Find Your Friends: Personalized Federated Learning with the Right Collaborators. (arXiv:2210.06597v1 [cs.LG])

fair

Title: Equi-Tuning: Group Equivariant Fine-Tuning of Pretrained Models. (arXiv:2210.06475v1 [cs.LG])

Title: Benchmarking Long-tail Generalization with Likelihood Splits. (arXiv:2210.06799v1 [cs.CL])

Title: Rethinking Annotation: Can Language Learners Contribute?. (arXiv:2210.06828v1 [cs.CL])

Title: Compute-Efficient Deep Learning: Algorithmic Trends and Opportunities. (arXiv:2210.06640v1 [cs.LG])

Title: Walk a Mile in Their Shoes: a New Fairness Criterion for Machine Learning. (arXiv:2210.06680v1 [cs.LG])

Title: Equal Improvability: A New Fairness Notion Considering the Long-term Impact. (arXiv:2210.06732v1 [cs.LG])

interpretability

Title: That's the Wrong Lung! Evaluating and Improving the Interpretability of Unsupervised Multimodal Encoders for Medical Data. (arXiv:2210.06565v1 [cs.LG])

Title: NoMorelization: Building Normalizer-Free Models from a Sample's Perspective. (arXiv:2210.06932v1 [cs.LG])

Title: On the Explainability of Natural Language Processing Deep Models. (arXiv:2210.06929v1 [cs.CL])

Lately, methods have been developed to address the aforementioned challenges and present satisfactory explanations on Natural Language Processing (NLP) models. However, such methods are yet to be studied in a comprehensive framework where common challenges are properly stated and rigorous evaluation practices and metrics are proposed. Motivated to democratize ExAI methods in the NLP field, we present in this work a survey that studies model-agnostic as well as model-specific explainability methods on NLP models. Such methods can either develop inherently interpretable NLP models or operate on pre-trained models in a post-hoc manner. We make this distinction and we further decompose the methods into three categories according to what they explain: (1) word embeddings (input-level), (2) inner workings of NLP models (processing-level) and (3) models' decisions (output-level). We also detail the different evaluation approaches interpretability methods in the NLP field. Finally, we present a case-study on the well-known neural machine translation in an appendix and we propose promising future research directions for ExAI in the NLP field.

Title: Interpreting Neural Policies with Disentangled Tree Representations. (arXiv:2210.06650v1 [cs.LG])

Title: Global Explainability of GNNs via Logic Combination of Learned Concepts. (arXiv:2210.07147v1 [cs.LG])

exlainability

watermark