secure

Title: Secure Multiparty Computation for Synthetic Data Generation from Distributed Data. (arXiv:2210.07332v1 [cs.CR])

To overcome this roadblock, we propose the first solution in which data holders only share encrypted data for differentially private synthetic data generation. Data holders send shares to servers who perform Secure Multiparty Computation (MPC) computations while the original data stays encrypted.

We instantiate this idea in an MPC protocol for the Multiplicative Weights with Exponential Mechanism (MWEM) algorithm to generate synthetic data based on real data originating from many data holders without reliance on a single point of failure.

Title: ScionFL: Secure Quantized Aggregation for Federated Learning. (arXiv:2210.07376v1 [cs.CR])

In this paper, we unite both research directions by introducing an efficient secure aggregation framework based on outsourced multi-party computation (MPC) that supports any linear quantization scheme. Specifically, we design a novel approximate version of an MPC-based secure aggregation protocol with support for multiple stochastic quantization schemes, including ones that utilize the randomized Hadamard transform and Kashin's representation. In our empirical performance evaluation, we show that with no additional overhead for clients and moderate inter-server communication, we achieve similar training accuracy as insecure schemes for standard FL benchmarks.

Beyond this, we present an efficient extension to our secure quantized aggregation framework that effectively defends against state-of-the-art untargeted poisoning attacks.

Title: A Unified Cryptoprocessor for Lattice-based Signature and Key-exchange. (arXiv:2210.07412v1 [cs.CR])

Title: An atom's worth of anonymity. (arXiv:2210.07834v1 [cs.CR])

Title: SealClub: Computer-aided Paper Document Authentication. (arXiv:2210.07884v1 [cs.CR])

security

Title: Machine Generated Text: A Comprehensive Survey of Threat Models and Detection Methods. (arXiv:2210.07321v1 [cs.CL])

Title: Learning Algorithms in Static Analysis of Web Applications. (arXiv:2210.07465v1 [cs.CR])

Title: Cargo Ecosystem Dependency-Vulnerability Knowledge Graph Construction and Vulnerability Propagation Study. (arXiv:2210.07482v1 [cs.CR])

Title: A Location-Based Global Authorization Method for Underwater Security. (arXiv:2210.07666v1 [cs.CR])

Title: G2A2: An Automated Graph Generator with Attributes and Anomalies. (arXiv:2210.07449v1 [cs.LG])

privacy

protect

Title: InFIP: An Explainable DNN Intellectual Property Protection Method based on Intrinsic Features. (arXiv:2210.07481v1 [cs.CV])

defense

Title: Expose Backdoors on the Way: A Feature-Based Efficient Defense against Textual Backdoor Attacks. (arXiv:2210.07907v1 [cs.CL])

Title: A Lightweight Moving Target Defense Framework for Multi-purpose Malware Affecting IoT Devices. (arXiv:2210.07719v1 [cs.CR])

attack

Title: Demystifying Self-supervised Trojan Attacks. (arXiv:2210.07346v1 [cs.CR])

We explore this question in the context of trojan attacks by showing that SSL is comparably vulnerable as supervised learning to trojan attacks. Specifically, we design and evaluate CTRL, an extremely simple self-supervised trojan attack. By polluting a tiny fraction of training data (less than 1%) with indistinguishable poisoning samples, CTRL causes any trigger-embedded input to be misclassified to the adversary's desired class with a high probability (over 99%) at inference. More importantly, through the lens of CTRL, we study the mechanisms underlying self-supervised trojan attacks. With both empirical and analytical evidence, we reveal that the representation invariance property of SSL, which benefits adversarial robustness, may also be the very reason making SSL highly vulnerable to trojan attacks. We further discuss the fundamental challenges to defending against self-supervised trojan attacks, pointing to promising directions for future research.

Title: When Adversarial Training Meets Vision Transformers: Recipes from Training to Architecture. (arXiv:2210.07540v1 [cs.CV])

Title: Synthesis of Proactive Sensor Placement In Probabilistic Attack Graphs. (arXiv:2210.07385v1 [cs.CR])

Title: Let's Talk Through Physics! Covert Cyber-Physical Data Exfiltration on Air-Gapped Edge Devices. (arXiv:2210.07531v1 [cs.CR])

Title: Characterizing the Influence of Graph Elements. (arXiv:2210.07441v1 [cs.LG])

robust

Title: Caption supervision enables robust learners. (arXiv:2210.07396v1 [cs.CV])

Title: Evaluating Out-of-Distribution Performance on Document Image Classifiers. (arXiv:2210.07448v1 [cs.CV])

Title: Polycentric Clustering and Structural Regularization for Source-free Unsupervised Domain Adaptation. (arXiv:2210.07463v1 [cs.CV])

Title: A Survey of Parameters Associated with the Quality of Benchmarks in NLP. (arXiv:2210.07566v1 [cs.CL])

Title: Mix and Reason: Reasoning over Semantic Topology with Data Mixing for Domain Generalization. (arXiv:2210.07571v1 [cs.CV])

Title: Deep PatchMatch MVS with Learned Patch Coplanarity, Geometric Consistency and Adaptive Pixel Sampling. (arXiv:2210.07582v1 [cs.CV])

Title: MCTNet: A Multi-Scale CNN-Transformer Network for Change Detection in Optical Remote Sensing Images. (arXiv:2210.07601v1 [cs.CV])

Title: Vision Transformer Visualization: What Neurons Tell and How Neurons Behave?. (arXiv:2210.07646v1 [cs.CV])

Title: Pretrained Transformers Do not Always Improve Robustness. (arXiv:2210.07663v1 [cs.CL])

Title: Quo Vadis: Is Trajectory Forecasting the Key Towards Long-Term Multi-Object Tracking?. (arXiv:2210.07681v1 [cs.CV])

Title: Joint Reasoning on Hybrid-knowledge sources for Task-Oriented Dialog. (arXiv:2210.07295v1 [cs.CL])

In this paper, we create a modified version of the MutliWOZ based dataset prepared by SeKnow to demonstrate how current methods have significant degradation in performance when strict assumptions about the source of information are removed. Then, in line with recent work exploiting pre-trained language models, we fine-tune a BART based model using prompts for the tasks of querying knowledge sources, as well as, for response generation, without making assumptions about the information present in each knowledge source. Through a series of experiments, we demonstrate that our model is robust to perturbations to knowledge modality (source of information), and that it can fuse information from structured as well as unstructured knowledge to generate responses.

Title: Mind the Labels: Describing Relations in Knowledge Graphs With Pretrained Models. (arXiv:2210.07373v1 [cs.CL])

Title: Early Discovery of Disappearing Entities in Microblogs. (arXiv:2210.07404v1 [cs.CL])

Title: Robust Candidate Generation for Entity Linking on Short Social Media Texts. (arXiv:2210.07472v1 [cs.CL])

Title: Can Language Representation Models Think in Bets?. (arXiv:2210.07519v1 [cs.CL])

Title: Extracting Cultural Commonsense Knowledge at Scale. (arXiv:2210.07763v1 [cs.CL])

Title: Robust Preference Learning for Storytelling via Contrastive Reinforcement Learning. (arXiv:2210.07792v1 [cs.CL])

Title: Distributed Distributionally Robust Optimization with Non-Convex Objectives. (arXiv:2210.07588v1 [cs.LG])

Title: The Invariant Ground Truth of Affect. (arXiv:2210.07630v1 [cs.AI])

Title: Object-Category Aware Reinforcement Learning. (arXiv:2210.07802v1 [cs.LG])

Title: Disentanglement of Correlated Factors via Hausdorff Factorized Support. (arXiv:2210.07347v1 [cs.LG])

Title: Efficiently Computing Local Lipschitz Constants of Neural Networks via Bound Propagation. (arXiv:2210.07394v1 [cs.LG])

Title: Distributional Reward Estimation for Effective Multi-Agent Deep Reinforcement Learning. (arXiv:2210.07636v1 [cs.LG])

biometric

steal

extraction

Title: Superpixel Perception Graph Neural Network for Intelligent Defect Detection. (arXiv:2210.07539v1 [cs.CV])

Title: Cross-Scale Context Extracted Hashing for Fine-Grained Image Binary Encoding. (arXiv:2210.07572v1 [cs.CV])

Title: Lightweight Stepless Super-Resolution of Remote Sensing Images via Saliency-Aware Dynamic Routing Strategy. (arXiv:2210.07598v1 [cs.CV])

Title: Confidence estimation of classification based on the distribution of the neural network output layer. (arXiv:2210.07745v1 [cs.CL])

Title: Automated dysgraphia detection by deep learning with SensoGrip. (arXiv:2210.07659v1 [cs.LG])

membership infer

federate

Title: Close the Gate: Detecting Backdoored Models in Federated Learning based on Client-Side Deep Layer Output Analysis. (arXiv:2210.07714v1 [cs.CR])

We propose \textit{CrowdGuard}, a model filtering defense, that mitigates backdoor attacks by leveraging the clients' data to analyze the individual models before the aggregation. To prevent data leaks, the server sends the individual models to secure enclaves, running in client-located Trusted Execution Environments. To effectively distinguish benign and poisoned models, even if the data of different clients are not independently and identically distributed (non-IID), we introduce a novel metric called \textit{HLBIM} to analyze the outputs of the DNN's hidden layers. We show that the applied significance-based detection algorithm combined can effectively detect poisoned models, even in non-IID scenarios.

Title: FedFM: Anchor-based Feature Matching for Data Heterogeneity in Federated Learning. (arXiv:2210.07615v1 [cs.LG])

Title: Federated Best Arm Identification with Heterogeneous Clients. (arXiv:2210.07780v1 [cs.LG])

fair

Title: InterFair: Debiasing with Natural Language Feedback for Fair Interpretable Predictions. (arXiv:2210.07440v1 [cs.CL])

Title: Controlling Bias Exposure for Fair Interpretable Predictions. (arXiv:2210.07455v1 [cs.CL])

Title: BERTScore is Unfair: On Social Bias in Language Model-Based Metrics for Text Generation. (arXiv:2210.07626v1 [cs.CL])

Title: Language Generation Models Can Cause Harm: So What Can We Do About It? An Actionable Survey. (arXiv:2210.07700v1 [cs.CL])

Title: A Comprehensive Study on Large-Scale Graph Training: Benchmarking and Rethinking. (arXiv:2210.07494v1 [cs.LG])

interpretability

exlainability

watermark

Title: Watermarking Pre-trained Language Models with Backdooring. (arXiv:2210.07543v1 [cs.CL])

Title: Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks. (arXiv:2210.07809v1 [cs.CR])