secure

Title: Proof of Backhaul: Trustfree Measurement of Broadband Bandwidth. (arXiv:2210.11546v1 [cs.CR])

Title: TrustBoost: Boosting Trust among Interoperable Blockchains. (arXiv:2210.11571v1 [cs.CR])

Title: SCL: A Secure Concurrency Layer For Paranoid Stateful Lambdas. (arXiv:2210.11703v1 [cs.CR])

As described, our Secure Concurrency Layer (SCL), provides eventually-consistent semantics over written values using untrusted and unordered multicast. All SCL communication is encrypted, unforgeable, and private. For durability, updates are recorded in replicated DataCapsules, which are append-only cryptographically-hardened blockchain with confidentiality, integrity, and provenance guarantees. Values for inactive keys are stored in a log-structured merge-tree (LSM) in the same DataCapsule. SCL features a variety of communication optimizations, such as an efficient message passing framework that reduces the latency up to 44x from the Intel SGX SDK, and an actor-based cryptographic processing architecture that batches cryptographic operations and increases throughput by 81x.

security

Title: GaitMAST: Motion-Aware Spatio-Temporal Feature Learning Network for Cross-View Gait Recognition. (arXiv:2210.11817v1 [cs.CV])

Title: Trust-as-a-Service: A reputation-enabled trust framework for 5G networks. (arXiv:2210.11501v1 [cs.CR])

Title: A Security and Trust Framework for Decentralized 5G Marketplaces. (arXiv:2210.11517v1 [cs.CR])

Title: A critical review of cyber-physical security for building automation systems. (arXiv:2210.11726v1 [cs.CR])

Title: $A^2RID$ -- Anonymous Direct Authentication and Remote Identification of Commercial Drones. (arXiv:2210.11743v1 [cs.CR])

Title: BC-IoDT: Blockchain-based Framework for Authentication in Internet of Drone Things. (arXiv:2210.11745v1 [cs.CR])

Title: An Empirical Study on Real Bug Fixes in Smart Contracts Projects. (arXiv:2210.11990v1 [cs.CR])

Title: Do Content Management Systems Impact the Security of Free Content Websites? A Correlation Analysis. (arXiv:2210.12083v1 [cs.CR])

Title: Global Counterfactual Explainer for Graph Neural Networks. (arXiv:2210.11695v1 [cs.LG])

privacy

Title: Boomerang: Local sampling on image manifolds using diffusion models. (arXiv:2210.12100v1 [cs.CV])

Title: Unsupervised Text Deidentification. (arXiv:2210.11528v1 [cs.CL])

Title: Audio-to-Intent Using Acoustic-Textual Subword Representations from End-to-End ASR. (arXiv:2210.12134v1 [cs.CL])

Title: TAP: Transparent and Privacy-Preserving Data Services. (arXiv:2210.11702v1 [cs.CR])

To this end, we first identify the limitations of existing approaches that use authenticated data structures. We find that they fall into two categories: 1) those that hide each user's data from other users, but have a limited range of verifiable operations (e.g., CONIKS, Merkle2, and Proofs of Liabilities), and 2) those that support a wide range of verifiable operations, but make all data publicly visible (e.g., IntegriDB and FalconDB). We then present TAP to address the above limitations. The key component of TAP is a novel tree data structure that supports efficient result verification, and relies on independent audits that use zero-knowledge range proofs to show that the tree is constructed correctly without revealing user data. TAP supports a broad range of verifiable operations, including quantiles and sample standard deviations. We conduct a comprehensive evaluation of TAP, and compare it against two state-of-the-art baselines, namely IntegriDB and Merkle2, showing that the system is practical at scale.

Title: Extracted BERT Model Leaks More Information than You Think!. (arXiv:2210.11735v1 [cs.CR])

Title: The privacy issue of counterfactual explanations: explanation linkage attacks. (arXiv:2210.12051v1 [cs.LG])

Title: Efficient Dataset Distillation Using Random Feature Approximation. (arXiv:2210.12067v1 [cs.LG])

Title: A Survey on Graph Counterfactual Explanations: Definitions, Methods, Evaluation. (arXiv:2210.12089v1 [cs.LG])

In this survey, we analyse the existing Graph Counterfactual Explanation methods, by providing the reader with an organisation of the literature according to a uniform formal notation for definitions, datasets, and metrics, thus, simplifying potential comparisons w.r.t to the method advantages and disadvantages. We discussed seven methods and sixteen synthetic and real datasets providing details on the possible generation strategies. We highlight the most common evaluation strategies and formalise nine of the metrics used in the literature. We first introduce the evaluation framework GRETEL and how it is possible to extend and use it while providing a further dimension of comparison encompassing reproducibility aspects. Finally, we provide a discussion on how counterfactual explanation interplays with privacy and fairness, before delving into open challenges and future works.

Title: Privacy-Preserved Neural Graph Similarity Learning. (arXiv:2210.11730v1 [cs.LG])

protect

Title: Transferring learned patterns from ground-based field imagery to predict UAV-based imagery for crop and weed semantic segmentation in precision crop farming. (arXiv:2210.11545v1 [cs.CV])

defense

Title: Distilling the Undistillable: Learning from a Nasty Teacher. (arXiv:2210.11728v1 [cs.CV])

Title: Self-Supervised Pretraining on Satellite Imagery: a Case Study on Label-Efficient Vehicle Detection. (arXiv:2210.11815v1 [cs.CV])

Title: Evolution of Neural Tangent Kernels under Benign and Adversarial Training. (arXiv:2210.12030v1 [cs.LG])

attack

Title: Deep Learning for Diagonal Earlobe Crease Detection. (arXiv:2210.11582v1 [cs.CV])

Title: Identifying Human Strategies for Generating Word-Level Adversarial Examples. (arXiv:2210.11598v1 [cs.CL])

Title: New data poison attacks on machine learning classifiers for mobile exfiltration. (arXiv:2210.11592v1 [cs.CR])

Title: RollBack: A New Time-Agnostic Replay Attack Against the Automotive Remote Keyless Entry Systems. (arXiv:2210.11923v1 [cs.CR])

Title: Virtual Triggering: a Technique to Segment Cryptographic Processes in Side Channel Traces. (arXiv:2210.12059v1 [cs.CR])

Title: Modelling Control Arguments via Cooperation Logic in Unforeseen Scenarios. (arXiv:2210.12114v1 [cs.AI])

robust

Title: ConfMix: Unsupervised Domain Adaptation for Object Detection via Confidence-based Mixing. (arXiv:2210.11539v1 [cs.CV])

Title: H4VDM: H.264 Video Device Matching. (arXiv:2210.11549v1 [cs.CV])

Title: Slippage-robust Gaze Tracking for Near-eye Display. (arXiv:2210.11637v1 [cs.CV])

Title: Context-Enhanced Stereo Transformer. (arXiv:2210.11719v1 [cs.CV])

Title: Generative Range Imaging for Learning Scene Priors of 3D LiDAR Data. (arXiv:2210.11750v1 [cs.CV])

Title: Diffusion Visual Counterfactual Explanations. (arXiv:2210.11841v1 [cs.CV])

Title: Balanced Adversarial Training: Balancing Tradeoffs between Fickleness and Obstinacy in NLP Models. (arXiv:2210.11498v1 [cs.CL])

Title: Finding Dataset Shortcuts with Grammar Induction. (arXiv:2210.11560v1 [cs.CL])

Title: Multitasking Models are Robust to Structural Failure: A Neural Model for Bilingual Cognitive Reserve. (arXiv:2210.11618v1 [cs.LG])

Title: Robustifying Sentiment Classification by Maximally Exploiting Few Counterfactuals. (arXiv:2210.11805v1 [cs.CL])

Title: Spectral Probing. (arXiv:2210.11860v1 [cs.CL])

Title: Optimizing text representations to capture (dis)similarity between political parties. (arXiv:2210.11989v1 [cs.CL])

Title: A Causal Framework to Quantify the Robustness of Mathematical Reasoning with Language Models. (arXiv:2210.12023v1 [cs.CL])

Title: Multimodal Neural Network For Demand Forecasting. (arXiv:2210.11502v1 [cs.LG])

Title: Stochastic Adaptive Activation Function. (arXiv:2210.11672v1 [cs.LG])

Title: Fuzzy Granular-Ball Computing Framework and Its Implementation in SVM. (arXiv:2210.11675v1 [cs.LG])

Title: Learning Robust Dynamics through Variational Sparse Gating. (arXiv:2210.11698v1 [cs.LG])

Title: Explainability in autonomous pedagogically structured scenarios. (arXiv:2210.12140v1 [cs.AI])

Title: Learning Sample Reweighting for Accuracy and Adversarial Robustness. (arXiv:2210.11513v1 [cs.LG])

Title: LOT: Layer-wise Orthogonal Training on Improving l2 Certified Robustness. (arXiv:2210.11620v1 [cs.LG])

Title: Equivariant Networks for Zero-Shot Coordination. (arXiv:2210.12124v1 [cs.LG])

biometric

Title: Automatic Cattle Identification using YOLOv5 and Mosaic Augmentation: A Comparative Analysis. (arXiv:2210.11939v1 [cs.CV])

steal

extraction

Title: Improving the Anomaly Detection in GPR Images by Fine-Tuning CNNs with Synthetic Data. (arXiv:2210.11833v1 [cs.CV])

Title: Improving Semi-supervised End-to-end Automatic Speech Recognition using CycleGAN and Inter-domain Losses. (arXiv:2210.11642v1 [cs.CL])

Title: Multi-View Reasoning: Consistent Contrastive Learning for Math Word Problem. (arXiv:2210.11694v1 [cs.CL])

Title: Detecting Unintended Social Bias in Toxic Language Datasets. (arXiv:2210.11762v1 [cs.CL])

Title: Rescue Implicit and Long-tail Cases: Nearest Neighbor Relation Extraction. (arXiv:2210.11800v1 [cs.CL])

membership infer

federate

fair

Title: Boosting vision transformers for image retrieval. (arXiv:2210.11909v1 [cs.CV])

Title: JRDB-Pose: A Large-scale Dataset for Multi-Person Pose Estimation and Tracking. (arXiv:2210.11940v1 [cs.CV])

Title: Towards Human-centered Explainable AI: User Studies for Model Explanations. (arXiv:2210.11584v1 [cs.AI])

interpretability

Title: Decoding a Neural Retriever's Latent Space for Query Suggestion. (arXiv:2210.12084v1 [cs.CL])

exlainability

watermark