secure

Title: Fine-mixing: Mitigating Backdoors in Fine-tuned Language Models. (arXiv:2210.09545v1 [cs.CL])

Title: CAN-BERT do it? Controller Area Network Intrusion Detection System based on BERT Language Model. (arXiv:2210.09439v1 [cs.LG])

Title: NFGen: Automatic Non-linear Function Evaluation Code Generator for General-purpose MPC Platforms. (arXiv:2210.09802v1 [cs.CR])

Title: Automatic Detection of Fake Key Attacks in Secure Messaging. (arXiv:2210.09940v1 [cs.CR])

security

Title: Making Split Learning Resilient to Label Leakage by Potential Energy Loss. (arXiv:2210.09617v1 [cs.CR])

Title: Probabilistic Forecasting Methods for System-Level Electricity Load Forecasting. (arXiv:2210.09399v1 [cs.LG])

privacy

Title: DPIS: An Enhanced Mechanism for Differentially Private SGD with Importance Sampling. (arXiv:2210.09634v1 [cs.CR])

Motivated by this, we propose DPIS, a novel mechanism for differentially private SGD training that can be used as a drop-in replacement of the core optimizer of DP-SGD, with consistent and significant accuracy gains over the latter. The main idea is to employ importance sampling (IS) in each SGD iteration for mini-batch selection, which reduces both sampling variance and the amount of random noise injected to the gradients that is required to satisfy DP. Integrating IS into the complex mathematical machinery of DP-SGD is highly non-trivial. DPIS addresses the challenge through novel mechanism designs, fine-grained privacy analysis, efficiency enhancements, and an adaptive gradient clipping optimization. Extensive experiments on four benchmark datasets, namely MNIST, FMNIST, CIFAR-10 and IMDb, demonstrate the superior effectiveness of DPIS over existing solutions for deep learning with differential privacy.

Title: MaSS: Multi-attribute Selective Suppression. (arXiv:2210.09904v1 [cs.LG])

Aiming for a sophisticated mechanism which gives data owners fine-grained control while retaining the maximal degree of data utility, we propose Multi-attribute Selective Suppression, or MaSS, a general framework for performing precisely targeted data surgery to simultaneously suppress any selected set of attributes while preserving the rest for downstream machine learning tasks. MaSS learns a data modifier through adversarial games between two sets of networks, where one is aimed at suppressing selected attributes, and the other ensures the retention of the rest of the attributes via general contrastive loss as well as explicit classification metrics. We carried out an extensive evaluation of our proposed method using multiple datasets from different domains including facial images, voice audio, and video clips, and obtained promising results in MaSS' generalizability and capability of suppressing targeted attributes without negatively affecting the data's usability in other downstream ML tasks.

Title: Methods To Ensure Privacy Regarding Medical Data -- Including an examination of the differential privacy algorithm RAPPOR and its implementation in "Cryptool 2". (arXiv:2210.09963v1 [cs.CR])

Title: Review Learning: Alleviating Catastrophic Forgetting with Generative Replay without Generator. (arXiv:2210.09394v1 [cs.AI])

protect

Title: Object Recognition in Different Lighting Conditions at Various Angles by Deep Learning Method. (arXiv:2210.09618v1 [cs.CV])

Title: Reconstruction Attack on Differential Private Trajectory Protection Mechanisms. (arXiv:2210.09375v1 [cs.CR])

Title: Controllable Fake Document Infilling for Cyber Deception. (arXiv:2210.09917v1 [cs.AI])

Title: Artificial intelligence and renegotiation of commercial lease contracts affected by pandemic-related contingencies from Covid-19. The project A.I.A.Co. (arXiv:2210.09515v1 [cs.AI])

defense

Title: Scaling Adversarial Training to Large Perturbation Bounds. (arXiv:2210.09852v1 [cs.LG])

Title: Deepfake Text Detection: Limitations and Opportunities. (arXiv:2210.09421v1 [cs.CR])

attack

Title: Probabilistic Categorical Adversarial Attack & Adversarial Training. (arXiv:2210.09364v1 [cs.LG])

Title: Towards Generating Adversarial Examples on Mixed-type Data. (arXiv:2210.09405v1 [cs.LG])

Title: You Can't See Me: Physical Removal Attacks on LiDAR-based Autonomous Vehicles Driving Frameworks. (arXiv:2210.09482v1 [cs.CR])

Title: Towards Fair Classification against Poisoning Attacks. (arXiv:2210.09503v1 [cs.LG])

robust

Title: Anisotropic Multi-Scale Graph Convolutional Network for Dense Shape Correspondence. (arXiv:2210.09466v1 [cs.CV])

Title: Deep Data Augmentation for Weed Recognition Enhancement: A Diffusion Probabilistic Model and Transfer Learning Based Approach. (arXiv:2210.09509v1 [cs.CV])

Title: Using Language to Extend to Unseen Domains. (arXiv:2210.09520v1 [cs.CV])

Title: Improving Adversarial Robustness by Contrastive Guided Diffusion Process. (arXiv:2210.09643v1 [cs.LG])

Title: WaGI : Wavelet-based GAN Inversion for Preserving High-frequency Image Details. (arXiv:2210.09655v1 [cs.CV])

Title: Hierarchical Normalization for Robust Monocular Depth Estimation. (arXiv:2210.09670v1 [cs.CV])

Title: Inception-Based Crowd Counting -- Being Fast while Remaining Accurate. (arXiv:2210.09796v1 [cs.CV])

Title: Analyzing the Robustness of PECNet. (arXiv:2210.09846v1 [cs.AI])

Title: SA-DNet: A on-demand semantic object registration network adapting to non-rigid deformation. (arXiv:2210.09900v1 [cs.CV])

Title: Perceptual Grouping in Vision-Language Models. (arXiv:2210.09996v1 [cs.CV])

Title: ULN: Towards Underspecified Vision-and-Language Navigation. (arXiv:2210.10020v1 [cs.CV])

Title: Unsupervised Inference of Data-Driven Discourse Structures using a Tree Auto-Encoder. (arXiv:2210.09559v1 [cs.CL])

Title: Towards Domain-Independent Supervised Discourse Parsing Through Gradient Boosting. (arXiv:2210.09565v1 [cs.CL])

Title: Tencent's Multilingual Machine Translation System for WMT22 Large-Scale African Languages. (arXiv:2210.09644v1 [cs.CL])

Title: ROSE: Robust Selective Fine-tuning for Pre-trained Language Models. (arXiv:2210.09658v1 [cs.CL])

Title: A Simple and Effective Method to Improve Zero-Shot Cross-Lingual Transfer Learning. (arXiv:2210.09934v1 [cs.CL])

Title: The Tail Wagging the Dog: Dataset Construction Biases of Social Bias Benchmarks. (arXiv:2210.10040v1 [cs.CL])

Title: Hidden State Variability of Pretrained Language Models Can Guide Computation Reduction for Transfer Learning. (arXiv:2210.10041v1 [cs.CL])

We propose to select layers based on the variability of their hidden states given a task-specific corpus. We say a layer is already ``well-specialized'' in a task if the within-class variability of its hidden states is low relative to the between-class variability. Our variability metric is cheap to compute and doesn't need any training or hyperparameter tuning. It is robust to data imbalance and data scarcity. Extensive experiments on the GLUE benchmark demonstrate that selecting layers based on our metric can yield significantly stronger performance than using the same number of top layers and often match the performance of fine-tuning or adapter-tuning the entire language model.

Title: Not All Poisons are Created Equal: Robust Training against Data Poisoning. (arXiv:2210.09671v1 [cs.LG])

In this work, we propose an efficient defense mechanism that significantly reduces the success rate of various data poisoning attacks, and provides theoretical guarantees for the performance of the model. Targeted attacks work by adding bounded perturbations to a randomly selected subset of training data to match the targets' gradient or representation. We show that: (i) under bounded perturbations, only a number of poisons can be optimized to have a gradient that is close enough to that of the target and make the attack successful; (ii) such effective poisons move away from their original class and get isolated in the gradient space; (iii) dropping examples in low-density gradient regions during training can successfully eliminate the effective poisons, and guarantees similar training dynamics to that of training on full data. Our extensive experiments show that our method significantly decreases the success rate of state-of-the-art targeted attacks, including Gradient Matching and Bullseye Polytope, and easily scales to large datasets.

Title: Robust Imitation of a Few Demonstrations with a Backwards Model. (arXiv:2210.09337v1 [cs.LG])

Title: Vision Paper: Causal Inference for Interpretable and Robust Machine Learning in Mobility Analysis. (arXiv:2210.10010v1 [cs.LG])

Title: Tight Analysis of Extra-gradient and Optimistic Gradient Methods For Nonconvex Minimax Problems. (arXiv:2210.09382v1 [cs.LG])

Title: An enhanced method of initial cluster center selection for K-means algorithm. (arXiv:2210.09507v1 [cs.LG])

biometric

Title: BIOWISH: Biometric Recognition using Wearable Inertial Sensors detecting Heart Activity. (arXiv:2210.09843v1 [cs.CV])

steal

extraction

Title: Transfer learning with weak labels from radiology reports: application to glioma change detection. (arXiv:2210.09698v1 [cs.CV])

Title: A Dashboard to Analysis and Synthesis of Dimensionality Reduction Methods in Remote Sensing. (arXiv:2210.09743v1 [cs.CV])

Title: Compact multi-scale periocular recognition using SAFE features. (arXiv:2210.09778v1 [cs.CV])

Title: CrossRE: A Cross-Domain Dataset for Relation Extraction. (arXiv:2210.09345v1 [cs.CL])

Title: EventGraph at CASE 2021 Task 1: A General Graph-based Approach to Protest Event Extraction. (arXiv:2210.09770v1 [cs.CL])

membership infer

federate

Title: FedForgery: Generalized Face Forgery Detection with Residual Federated Learning. (arXiv:2210.09563v1 [cs.CV])

Title: FLECS-CGD: A Federated Learning Second-Order Framework via Compression and Sketching with Compressed Gradient Differences. (arXiv:2210.09626v1 [cs.LG])

fair

Title: On the Importance of Architectures and Hyperparameters for Fairness in Face Recognition. (arXiv:2210.09943v1 [cs.CV])

Title: Contextual bandits with concave rewards, and an application to fair ranking. (arXiv:2210.09957v1 [cs.LG])

interpretability

Title: TFAD: A Decomposition Time Series Anomaly Detection Architecture with Time-Frequency Analysis. (arXiv:2210.09693v1 [cs.LG])

Title: AMPNet: Attention as Message Passing for Graph Neural Networks. (arXiv:2210.09475v1 [cs.LG])

exlainability

watermark