secure

Title: Differentially Private Language Models for Secure Data Sharing. (arXiv:2210.13918v1 [cs.LG])

security

Title: Machine and Deep Learning for IoT Security and Privacy: Applications, Challenges, and Future Directions. (arXiv:2210.13547v1 [cs.CR])

Title: Musings on the HashGraph Protocol: Its Security and Its Limitations. (arXiv:2210.13682v1 [cs.CR])

Title: Leveraging the Verifier's Dilemma to Double Spend in Bitcoin. (arXiv:2210.14072v1 [cs.CR])

privacy

Title: Private Online Prediction from Experts: Separations and Faster Rates. (arXiv:2210.13537v1 [cs.LG])

Title: Analyzing Privacy Leakage in Machine Learning via Multiple Hypothesis Testing: A Lesson From Fano. (arXiv:2210.13662v1 [cs.LG])

protect

defense

Title: Towards Robust Recommender Systems via Triple Cooperative Defense. (arXiv:2210.13762v1 [cs.LG])

attack

Title: Mixed Precision Quantization to Tackle Gradient Leakage Attacks in Federated Learning. (arXiv:2210.13457v1 [cs.LG])

Title: Adversarial Pretraining of Self-Supervised Deep Networks: Past, Present and Future. (arXiv:2210.13463v1 [cs.LG])

Title: Detection of Real-time DeepFakes in Video Conferencing with Active Probing and Corneal Reflection. (arXiv:2210.14153v1 [cs.CV])

Title: Model-Free Prediction of Adversarial Drop Points in 3D Point Clouds. (arXiv:2210.14164v1 [cs.CV])

Title: SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning. (arXiv:2210.13660v1 [cs.CR])

We aim to clarify such confusion in this paper. By considering the application of ML for Phishing Website Detection (PWD), we formalize the "evasion-space" in which an adversarial perturbation can be introduced to fool a ML-PWD -- demonstrating that even perturbations in the "feature-space" are useful. Then, we propose a realistic threat model describing evasion attacks against ML-PWD that are cheap to stage, and hence intrinsically more attractive for real phishers. Finally, we perform the first statistically validated assessment of state-of-the-art ML-PWD against 12 evasion attacks. Our evaluation shows (i) the true efficacy of evasion attempts that are more likely to occur; and (ii) the impact of perturbations crafted in different evasion-spaces. Our realistic evasion attempts induce a statistically significant degradation (3-10% at $p\!<$0.05), and their cheap cost makes them a subtle threat. Notably, however, some ML-PWD are immune to our most realistic attacks ($p$=0.22). Our contribution paves the way for a much needed re-assessment of adversarial attacks against ML systems for cybersecurity.

Title: Motif-Backdoor: Rethinking the Backdoor Attack on Graph Neural Networks via Motifs. (arXiv:2210.13710v1 [cs.LG])

Title: Hindering Adversarial Attacks with Implicit Neural Representations. (arXiv:2210.13982v1 [cs.LG])

Title: A White-Box Adversarial Attack Against a Digital Twin. (arXiv:2210.14018v1 [cs.CR])

robust

Title: Provably Learning Diverse Features in Multi-View Data with Midpoint Mixup. (arXiv:2210.13512v1 [cs.LG])

Title: Multi-Person 3D Pose and Shape Estimation via Inverse Kinematics and Refinement. (arXiv:2210.13529v1 [cs.CV])

Title: Video based Object 6D Pose Estimation using Transformers. (arXiv:2210.13540v1 [cs.CV])

Title: The Robustness Limits of SoTA Vision Models to Natural Variation. (arXiv:2210.13604v1 [cs.CV])

Title: GlobalFlowNet: Video Stabilization using Deep Distilled Global Motion Estimates. (arXiv:2210.13769v1 [cs.CV])

Title: Deep Boosting Robustness of DNN-based Image Watermarking via DBMark. (arXiv:2210.13801v1 [cs.CV])

Title: A Novel Approach for Dimensionality Reduction and Classification of Hyperspectral Images based on Normalized Synergy. (arXiv:2210.13901v1 [cs.CV])

Keywords: Hyperspectral images; target detection; pixel classification; dimensionality reduction; band selection; information theory; mutual information; normalized synergy

Title: Connective Reconstruction-based Novelty Detection. (arXiv:2210.13917v1 [cs.CV])

Title: Attention Based Relation Network for Facial Action Units Recognition. (arXiv:2210.13988v1 [cs.CV])

Title: A Comparative Study on Deep-Learning Methods for Dense Image Matching of Multi-angle and Multi-date Remote Sensing Stereo Images. (arXiv:2210.14031v1 [cs.CV])

Title: Adaptive Label Smoothing with Self-Knowledge in Natural Language Generation. (arXiv:2210.13459v1 [cs.LG])

Title: ExPUNations: Augmenting Puns with Keywords and Explanations. (arXiv:2210.13513v1 [cs.CL])

Title: Does Self-Rationalization Improve Robustness to Spurious Correlations?. (arXiv:2210.13575v1 [cs.CL])

Title: AugCSE: Contrastive Sentence Embedding with Diverse Augmentations. (arXiv:2210.13749v1 [cs.CL])

Title: On the Robustness of Dataset Inference. (arXiv:2210.13631v1 [cs.LG])

Title: FocusedCleaner: Sanitizing Poisoned Graphs for Robust GNN-based Node Classification. (arXiv:2210.13815v1 [cs.LG])

Title: Machine learning-based approach for online fault Diagnosis of Discrete Event System. (arXiv:2210.13466v1 [cs.LG])

Title: Sharpness-aware Minimization for Worst Case Optimization. (arXiv:2210.13533v1 [cs.LG])

Title: Embodied, Situated, and Grounded Intelligence: Implications for AI. (arXiv:2210.13589v1 [cs.AI])

Title: Aboveground carbon biomass estimate with Physics-informed deep network. (arXiv:2210.13752v1 [cs.LG])

Title: Line Graph Contrastive Learning for Link Prediction. (arXiv:2210.13795v1 [cs.LG])

Title: Multi-Fidelity Bayesian Optimization with Unreliable Information Sources. (arXiv:2210.13937v1 [cs.LG])

Title: Gradient-based Weight Density Balancing for Robust Dynamic Sparse Training. (arXiv:2210.14012v1 [cs.LG])

biometric

steal

extraction

Title: Instance Segmentation for Chinese Character Stroke Extraction, Datasets and Benchmarks. (arXiv:2210.13826v1 [cs.CV])

Title: THOR-Net: End-to-end Graformer-based Realistic Two Hands and Object Reconstruction with Self-supervision. (arXiv:2210.13853v1 [cs.CV])

Title: Better Few-Shot Relation Extraction with Label Prompt Dropout. (arXiv:2210.13733v1 [cs.CL])

Title: IELM: An Open Information Extraction Benchmark for Pre-Trained Language Models. (arXiv:2210.14128v1 [cs.CL])

Title: CrisisLTLSum: A Benchmark for Local Crisis Event Timeline Extraction and Summarization. (arXiv:2210.14190v1 [cs.CL])

membership infer

federate

Title: SUPR: A Sparse Unified Part-Based Human Representation. (arXiv:2210.13861v1 [cs.CV])

Title: Subspace Recovery from Heterogeneous Data with Non-isotropic Noise. (arXiv:2210.13497v1 [cs.LG])

Title: FedGRec: Federated Graph Recommender System with Lazy Update of Latent Embeddings. (arXiv:2210.13686v1 [cs.LG])

fair

Title: Mitigating Gender Bias in Face Recognition Using the von Mises-Fisher Mixture Model. (arXiv:2210.13664v1 [cs.CV])

Title: Energy Pricing in P2P Energy Systems Using Reinforcement Learning. (arXiv:2210.13555v1 [cs.LG])

Title: I Prefer not to Say: Operationalizing Fair and User-guided Data Minimization. (arXiv:2210.13954v1 [cs.LG])

interpretability

Title: Geo-SIC: Learning Deformable Geometric Shapes in Deep Image Classifiers. (arXiv:2210.13704v1 [cs.CV])

Title: Deconfounding Legal Judgment Prediction for European Court of Human Rights Cases Towards Better Alignment with Experts. (arXiv:2210.13836v1 [cs.CL])

Title: Revisiting Softmax for Uncertainty Approximation in Text Classification. (arXiv:2210.14037v1 [cs.LG])

Title: Towards Interpretable Summary Evaluation via Allocation of Contextual Embeddings to Reference Text Topics. (arXiv:2210.14174v1 [cs.CL])

Title: Influence Functions for Sequence Tagging Models. (arXiv:2210.14177v1 [cs.CL])

exlainability

watermark