secure

Title: Prove You Owned Me: One Step beyond RFID Tag/Mutual Authentication. (arXiv:2210.10244v1 [cs.CR])

We propose the first formal framework for RFID tag/mutual authentication with PoP after correcting deficiencies of some existing RFID formal frameworks. We provide a generic construction to transform an RFID tag/mutual authentication protocol to one that supports PoP using a cryptographic hash function, a pseudorandom function (PRF) and a signature scheme. We prove that the constructed protocol is secure and privacy-preserving under our framework if all the building blocks possess desired security properties. Finally, we show an RFID mutual authentication protocol with PoP. Arming tag/mutual authentication protocols with PoP is an important step to strengthen RFID-enabled systems as it bridges the security gap between physical layer and data layer, and reduces the misuses of RFID-related data.

Title: Secure and Efficient Multi-Signature Schemes for Fabric: An Enterprise Blockchain Platform. (arXiv:2210.10294v1 [cs.CR])

security

Title: Performance of different machine learning methods on activity recognition and pose estimation datasets. (arXiv:2210.10247v1 [cs.CV])

Title: Online LiDAR-Camera Extrinsic Parameters Self-checking. (arXiv:2210.10537v1 [cs.CV])

Title: Why Should Adversarial Perturbations be Imperceptible? Rethink the Research Paradigm in Adversarial NLP. (arXiv:2210.10683v1 [cs.CL])

Title: An Empirical Analysis of SMS Scam Detection Systems. (arXiv:2210.10451v1 [cs.CR])

Title: Miners in the Cloud: Measuring and Analyzing Cryptocurrency Mining in Public Clouds. (arXiv:2210.10512v1 [cs.CR])

In this paper, we study the interplay between mining pools and public clouds by analyzing their communication association through passive domain name system (pDNS) traces. We observe that 24 cloud providers have some association with mining pools as observed from the pDNS query traces, where popular public cloud providers, namely Amazon and Google, have almost 48% of such an association. Moreover, we found that the cloud provider presence and cloud provider-to-mining pool association both exhibit a heavy-tailed distribution, emphasizing an intrinsic preferential attachment model with both mining pools and cloud providers. We measure the security risk and exposure of the cloud providers, as that might aid in understanding the intent of the mining: among the top two cloud providers, we found almost 35% and 30% of their associated endpoints are positively detected to be associated with malicious activities, per the virustotal.com scan. Finally, we found that the mining pools presented in our dataset are predominantly used for mining Metaverse currencies, highlighting a shift in cryptocurrency use, and demonstrating the prevalence of mining using public clouds.

privacy

Title: How to Boost Face Recognition with StyleGAN?. (arXiv:2210.10090v1 [cs.CV])

Title: Attaining Class-level Forgetting in Pretrained Model using Few Samples. (arXiv:2210.10670v1 [cs.CV])

Title: Attribution and Obfuscation of Neural Text Authorship: A Data Mining Perspective. (arXiv:2210.10488v1 [cs.CL])

Title: STAMP: Lightweight TEE-Assisted MPC for Efficient Privacy-Preserving Machine Learning. (arXiv:2210.10133v1 [cs.CR])

Title: Hope of Delivery: Extracting User Locations From Mobile Instant Messengers. (arXiv:2210.10523v1 [cs.CR])

Our results show that, after a training phase, a messenger user can distinguish different locations of the message receiver. Our analyses involving multiple rounds of measurements and evaluations show that the timing side channel persists independent of distances between receiver locations -- the attack works both for receivers in different countries as well as at small scale in one city. For instance, out of three locations within the same city, the sender can determine the correct one with more than 80% accuracy. Thus, messenger users can secretly spy on each others' whereabouts when sending instant messages. As our countermeasure evaluation shows, messenger providers could effectively disable the timing side channel by randomly delaying delivery confirmations within the range of a few seconds. For users themselves, the threat is harder to prevent since there is no option to turn off delivery confirmations.

Title: The Future of Consumer Edge-AI Computing. (arXiv:2210.10514v1 [cs.LG])

protect

defense

attack

Title: Training set cleansing of backdoor poisoning by self-supervised representation learning. (arXiv:2210.10272v1 [cs.LG])

Title: Analysis of Master Vein Attacks on Finger Vein Recognition Systems. (arXiv:2210.10667v1 [cs.CV])

Title: Fant\^omas: Evaluating Reversibility of Face Anonymizations Using a General Deep Learning Attacker. (arXiv:2210.10651v1 [cs.CR])

Title: Few-shot Transferable Robust Representation Learning via Bilevel Attacks. (arXiv:2210.10485v1 [cs.LG])

robust

Title: Parallel Inversion of Neural Radiance Fields for Robust Pose Estimation. (arXiv:2210.10108v1 [cs.CV])

Title: Intra-Source Style Augmentation for Improved Domain Generalization. (arXiv:2210.10175v1 [cs.CV])

Title: Vision-Based Lane Detection and Tracking under Different Challenging Environmental Conditions. (arXiv:2210.10233v1 [cs.CV])

Title: Discovering Limitations of Image Quality Assessments with Noised Deep Learning Image Sets. (arXiv:2210.10249v1 [cs.CV])

Title: On the Adversarial Robustness of Mixture of Experts. (arXiv:2210.10253v1 [cs.LG])

Title: LAVA: Label-efficient Visual Learning and Adaptation. (arXiv:2210.10317v1 [cs.CV])

Title: WebtoonMe: A Data-Centric Approach for Full-Body Portrait Stylization. (arXiv:2210.10335v1 [cs.CV])

Title: Segmentation-free Direct Iris Localization Networks. (arXiv:2210.10403v1 [cs.CV])

Title: p$^3$VAE: a physics-integrated generative model. Application to the semantic segmentation of optical remote sensing images. (arXiv:2210.10418v1 [cs.CV])

Title: Estimating the coverage in 3d reconstructions of the colon from colonoscopy videos. (arXiv:2210.10459v1 [cs.CV])

Title: A Robust Pedestrian Detection Approach for Autonomous Vehicles. (arXiv:2210.10489v1 [cs.CV])

Title: LaMAR: Benchmarking Localization and Mapping for Augmented Reality. (arXiv:2210.10770v1 [cs.CV])

Title: ELASTIC: Numerical Reasoning with Adaptive Symbolic Compiler. (arXiv:2210.10105v1 [cs.AI])

Title: A Data-Driven Investigation of Noise-Adaptive Utterance Generation with Linguistic Modification. (arXiv:2210.10252v1 [cs.CL])

Title: Hybrid-Regressive Neural Machine Translation. (arXiv:2210.10416v1 [cs.CL])

Title: LightEA: A Scalable, Robust, and Interpretable Entity Alignment Framework via Three-view Label Propagation. (arXiv:2210.10436v1 [cs.AI])

Title: Robustness of Demonstration-based Learning Under Limited Data Scenario. (arXiv:2210.10693v1 [cs.CL])

Title: Gaussian-Bernoulli RBMs Without Tears. (arXiv:2210.10318v1 [cs.LG])

Title: Robust Offline Reinforcement Learning with Gradient Penalty and Constraint Relaxation. (arXiv:2210.10469v1 [cs.LG])

Title: Targeted Adversarial Self-Supervised Learning. (arXiv:2210.10482v1 [cs.LG])

Title: A Segment-Wise Gaussian Process-Based Ground Segmentation With Local Smoothness Estimation. (arXiv:2210.10515v1 [cs.LG])

Title: Robust Regression with Highly Corrupted Data via Physics Informed Neural Networks. (arXiv:2210.10646v1 [cs.LG])

Title: Autoregressive Generative Modeling with Noise Conditional Maximum Likelihood Estimation. (arXiv:2210.10715v1 [cs.LG])

Title: "Why did the Model Fail?": Attributing Model Performance Changes to Distribution Shifts. (arXiv:2210.10769v1 [cs.LG])

biometric

steal

extraction

Title: Multi-view Gait Recognition based on Siamese Vision Transformer. (arXiv:2210.10421v1 [cs.CV])

Title: Soil moisture estimation from Sentinel-1 interferometric observations over arid regions. (arXiv:2210.10665v1 [cs.CV])

A case study over an arid region in California/Arizona is presented. The proposed workflow was applied in Sentinel- 1 (C-band) VV-polarized InSAR observations. The estimated SSM results were assessed with independent SSM observations from a station of the International Soil Moisture Network (ISMN) (RMSE: 0.027 $m^3/m^3$ R: 0.88) and ERA5-Land reanalysis model data (RMSE: 0.035 $m^3/m^3$ R: 0.71). The proposed methodology was able to provide accurate SSM estimations at high spatial resolution (~250 m). A discussion of the benefits and the limitations of the proposed methodology highlighted the potential of interferometric observables for SSM estimation over arid regions.

Title: Cross-Domain Aspect Extraction using Transformers Augmented with Knowledge Graphs. (arXiv:2210.10144v1 [cs.CL])

Title: BioGPT: Generative Pre-trained Transformer for Biomedical Text Generation and Mining. (arXiv:2210.10341v1 [cs.CL])

Title: CEntRE: A paragraph-level Chinese dataset for Relation Extraction among Enterprises. (arXiv:2210.10581v1 [cs.CL])

Title: Towards Realistic Low-resource Relation Extraction: A Benchmark with Empirical Baseline Study. (arXiv:2210.10678v1 [cs.CL])

Title: Schema-aware Reference as Prompt Improves Data-Efficient Relational Triple and Event Extraction. (arXiv:2210.10709v1 [cs.CL])

membership infer

Title: Canary in a Coalmine: Better Membership Inference with Ensembled Adversarial Queries. (arXiv:2210.10750v1 [cs.LG])

federate

fair

Title: Towards Procedural Fairness: Uncovering Biases in How a Toxic Language Classifier Uses Sentiment Information. (arXiv:2210.10689v1 [cs.CL])

Title: Group Fairness in Prediction-Based Decision Making: From Moral Assessment to Implementation. (arXiv:2210.10456v1 [cs.LG])

interpretability

Title: Towards Explaining Distribution Shifts. (arXiv:2210.10275v1 [cs.LG])

exlainability

watermark