secure

Title: Real-World Chaos-Based Cryptography Using Synchronised Chua Chaotic Circuits. (arXiv:2210.11299v1 [cs.CR])

Title: Towards cryptographically-authenticated in-memory data structures. (arXiv:2210.11340v1 [cs.CR])

In this paper, we show how cryptographically-authenticated data structures can be used to protect against attacks based on memory corruption, and show how they can be efficiently realized using widely available hardware-assisted cryptographic mechanisms. We present realizations of secure stacks and queues with minimal overall performance overhead (3.4%-6.4% slowdown of the OpenCV core performance tests), and provide proofs of correctness.

security

Title: A Comprehensive Survey on Edge Data Integrity Verification: Fundamentals and Future Trends. (arXiv:2210.10978v1 [cs.CR])

Title: Demystifying Hidden Sensitive Operations in Android apps. (arXiv:2210.10997v1 [cs.CR])

Title: Development of a hardware-In-the-Loop (HIL) testbed for cyber-physical security in smart buildings. (arXiv:2210.11234v1 [cs.CR])

Title: Emerging Threats in Deep Learning-Based Autonomous Driving: A Comprehensive Survey. (arXiv:2210.11237v1 [cs.CR])

Title: The State-of-the-Art in AI-Based Malware Detection Techniques: A Review. (arXiv:2210.11239v1 [cs.CR])

Title: Uncovering Fingerprinting Networks. An Analysis of In-Browser Tracking using a Behavior-based Approach. (arXiv:2210.11300v1 [cs.CR])

Title: Proof of Unlearning: Definitions and Instantiation. (arXiv:2210.11334v1 [cs.CR])

We respond to the call, by reconsidering the unlearning problem in the scenario of machine learning as a service (MLaaS), and proposing a new definition framework for Proof of Unlearning (PoUL) on algorithm level. Specifically, our PoUL definitions (i) enforce correctness properties on both the pre and post phases of unlearning, so as to prevent the state-of-the-art forging attacks; (ii) highlight proper practicality requirements of both the prover and verifier sides with minimal invasiveness to the off-the-shelf service pipeline and computational workloads. Under the definition framework, we subsequently present a trusted hardware-empowered instantiation using SGX enclave, by logically incorporating an authentication layer for tracing the data lineage with a proving layer for supporting the audit of learning. We customize authenticated data structures to support large out-of-enclave storage with simple operation logic, and meanwhile, enable proving complex unlearning logic with affordable memory footprints in the enclave. We finally validate the feasibility of the proposed instantiation with a proof-of-concept implementation and multi-dimensional performance evaluation.

privacy

Title: Content-based Graph Privacy Advisor. (arXiv:2210.11169v1 [cs.CV])

Title: How Does a Deep Learning Model Architecture Impact Its Privacy?. (arXiv:2210.11049v1 [cs.CR])

Title: Private Algorithms with Private Predictions. (arXiv:2210.11222v1 [cs.CR])

protect

Title: Thwarting Piracy: Anti-debugging Using GPU-assisted Self-healing Codes. (arXiv:2210.11047v1 [cs.CR])

defense

Title: Backdoor Attack and Defense in Federated Generative Adversarial Network-based Medical Image Synthesis. (arXiv:2210.10886v1 [cs.CV])

attack

Title: Attacking Motion Estimation with Adversarial Snow. (arXiv:2210.11242v1 [cs.CV])

Title: Similarity of Neural Architectures Based on Input Gradient Transferability. (arXiv:2210.11407v1 [cs.LG])

Title: Apple of Sodom: Hidden Backdoors in Superior Sentence Embeddings via Contrastive Learning. (arXiv:2210.11082v1 [cs.CL])

Title: Learning to Invert: Simple Adaptive Attacks for Gradient Inversion in Federated Learning. (arXiv:2210.10880v1 [cs.LG])

Title: FedRecover: Recovering from Poisoning Attacks in Federated Learning using Historical Information. (arXiv:2210.10936v1 [cs.CR])

In this work, we propose FedRecover, which can recover an accurate global model from poisoning attacks with small cost for the clients. Our key idea is that the server estimates the clients' model updates instead of asking the clients to compute and communicate them during the recovery process. In particular, the server stores the global models and clients' model updates in each round, when training the poisoned global model. During the recovery process, the server estimates a client's model update in each round using its stored historical information. Moreover, we further optimize FedRecover to recover a more accurate global model using warm-up, periodic correction, abnormality fixing, and final tuning strategies, in which the server asks the clients to compute and communicate their exact model updates. Theoretically, we show that the global model recovered by FedRecover is close to or the same as that recovered by train-from-scratch under some assumptions. Empirically, our evaluation on four datasets, three federated learning methods, as well as untargeted and targeted poisoning attacks (e.g., backdoor attacks) shows that FedRecover is both accurate and efficient.

Title: Interpretable Machine Learning for Detection and Classification of Ransomware Families Based on API Calls. (arXiv:2210.11235v1 [cs.CR])

Title: Detecting Backdoors in Deep Text Classifiers. (arXiv:2210.11264v1 [cs.CR])

robust

Title: Does Decentralized Learning with Non-IID Unlabeled Data Benefit from Self Supervision?. (arXiv:2210.10947v1 [cs.LG])

Title: Diffusion Models already have a Semantic Latent Space. (arXiv:2210.10960v1 [cs.CV])

Title: RAIS: Robust and Accurate Interactive Segmentation via Continual Learning. (arXiv:2210.10984v1 [cs.CV])

Title: Robustcaps: a transformation-robust capsule network for image classification. (arXiv:2210.11092v1 [cs.CV])

Title: Iterative collaborative routing among equivariant capsules for transformation-robust capsule networks. (arXiv:2210.11095v1 [cs.CV])

Title: Coordinates Are NOT Lonely -- Codebook Prior Helps Implicit Neural 3D Representations. (arXiv:2210.11170v1 [cs.CV])

Title: Context-driven Visual Object Recognition based on Knowledge Graphs. (arXiv:2210.11233v1 [cs.AI])

Title: TANGO: Text-driven Photorealistic and Robust 3D Stylization via Lighting Decomposition. (arXiv:2210.11277v1 [cs.CV])

Title: On Feature Learning in the Presence of Spurious Correlations. (arXiv:2210.11369v1 [cs.LG])

Title: Transformer-based Global 3D Hand Pose Estimation in Two Hands Manipulating Objects Scenarios. (arXiv:2210.11384v1 [cs.CV])

Title: VIBUS: Data-efficient 3D Scene Parsing with VIewpoint Bottleneck and Uncertainty-Spectrum Modeling. (arXiv:2210.11472v1 [cs.CV])

Title: G-Augment: Searching For The Meta-Structure Of Data Augmentation Policies For ASR. (arXiv:2210.10879v1 [cs.LG])

Title: Pre-training Language Models with Deterministic Factual Knowledge. (arXiv:2210.11165v1 [cs.CL])

Title: Evidence > Intuition: Transferability Estimation for Encoder Selection. (arXiv:2210.11255v1 [cs.CL])

Title: Deep Learning-Derived Optimal Aviation Strategies to Control Pandemics. (arXiv:2210.10888v1 [cs.LG])

Title: Safe Policy Improvement in Constrained Markov Decision Processes. (arXiv:2210.11259v1 [cs.LG])

Title: Analyzing the Robustness of Decentralized Horizontal and Vertical Federated Learning Architectures in a Non-IID Scenario. (arXiv:2210.11061v1 [cs.LG])

Title: Robust Imitation via Mirror Descent Inverse Reinforcement Learning. (arXiv:2210.11201v1 [cs.LG])

Title: Solving Reasoning Tasks with a Slot Transformer. (arXiv:2210.11394v1 [cs.LG])

Title: Learning and Retrieval from Prior Data for Skill-based Imitation Learning. (arXiv:2210.11435v1 [cs.LG])

biometric

steal

extraction

Title: DeepRING: Learning Roto-translation Invariant Representation for LiDAR based Place Recognition. (arXiv:2210.11029v1 [cs.CV])

Title: Frequency of Interest-based Noise Attenuation Method to Improve Anomaly Detection Performance. (arXiv:2210.11068v1 [cs.LG])

Title: Facial Expression Video Generation Based-On Spatio-temporal Convolutional GAN: FEV-GAN. (arXiv:2210.11182v1 [cs.CV])

Title: Knowledge Graph Enhanced Relation Extraction Datasets. (arXiv:2210.11231v1 [cs.LG])

membership infer

federate

Title: Vertical Federated Linear Contextual Bandits. (arXiv:2210.11050v1 [cs.LG])

fair

interpretability

Title: i-MAE: Are Latent Representations in Masked Autoencoders Linearly Separable?. (arXiv:2210.11470v1 [cs.CV])

Title: Black Box Model Explanations and the Human Interpretability Expectations -- An Analysis in the Context of Homicide Prediction. (arXiv:2210.10849v1 [cs.LG])

Title: Causally-guided Regularization of Graph Attention Improves Generalizability. (arXiv:2210.10946v1 [cs.LG])

Title: Uncertainty Disentanglement with Non-stationary Heteroscedastic Gaussian Processes for Active Learning. (arXiv:2210.10964v1 [cs.LG])

exlainability

watermark