secure

security

Title: A Deep Dive into VirusTotal: Characterizing and Clustering a Massive File Feed. (arXiv:2210.15973v1 [cs.CR])

We then explore how to perform threat hunting at scale by investigating scalable approaches that can produce high purity clusters on the 235M feed samples. We investigate three clustering approaches: hierarchical agglomerative clustering (HAC), a more scalable HAC variant for TLSH digests (HAC-T), and a simple feature value grouping (FVG). Our results show that HAC-T and FVG using selected features produce high precision clusters on ground truth datasets. However, only FVG scales to the daily influx of samples in the feed. Moreover, FVG takes 15 hours to cluster the whole dataset of 235M samples. Finally, we use the produced clusters for threat hunting, namely for detecting 190K samples thought to be benign (i.e., with zero detections) that may really be malicious because they belong to 29K clusters where most samples are detected as malicious.

privacy

Title: BRATsynthetic: Text De-identification using a Markov Chain Replacement Strategy for Surrogate Personal Identifying Information. (arXiv:2210.16125v1 [cs.CR])

Materials and Methods: We implement and assess 3 different `Hiding in Plain Sight` (HIPS) strategies for PHI replacement including a standard Consistent replacement strategy, a Random replacement strategy and a novel Markov model-based strategy. We evaluate the privacy preserving benefits of these strategies on a synthetic PHI distribution and real clinical corpora from 2 different institutions using a range of false negative error rates (FNER).

Results: Using FNER ranging from 0.1% to 5% PHI leakage at the document level could be reduced from 27.1% to 0.1% (0.1% FNER) and from 94.2% to 57.7% (5% FNER) utilizing the Markov chain strategy versus the Consistent strategy on a corpus containing a diverse set of notes from the University of Alabama at Birmingham (UAB). The Markov chain substitution strategy also consistently outperformed the Consistent and Random substitution strategies in a MIMIC corpus of discharge summaries and on a range of synthetic clinical PHI distributions. Discussion: We demonstrate that a Markov chain surrogate generation strategy substantially reduces the chance of inadvertent PHI release across a range of assumed PHI FNER and release our implementation `BRATsynthetic` on Github.

Conclusion: The Markov chain replacement strategy allows for the release of larger de-identified corpora at the same risk level relative to corpora released using a consistent HIPS strategy.

protect

Title: DELFI: Deep Mixture Models for Long-term Air Quality Forecasting in the Delhi National Capital Region. (arXiv:2210.15923v1 [cs.LG])

defense

attack

Title: Improving Transferability of Adversarial Examples on Face Recognition with Beneficial Perturbation Feature Augmentation. (arXiv:2210.16117v1 [cs.CV])

Title: TAD: Transfer Learning-based Multi-Adversarial Detection of Evasion Attacks against Network Intrusion Detection Systems. (arXiv:2210.15700v1 [cs.CR])

Title: Ethereum Proof-of-Stake under Scrutiny. (arXiv:2210.16070v1 [cs.CR])

Title: Local Model Reconstruction Attacks in Federated Learning and their Uses. (arXiv:2210.16205v1 [cs.LG])

Title: On the Vulnerability of Data Points under Multiple Membership Inference Attacks and Target Models. (arXiv:2210.16258v1 [cs.CR])

This paper defines new metrics that can reflect the actual situation of data points' vulnerability and capture vulnerable data points under multiple MIAs and target models. From the analysis, MIA has an inference tendency to some data points despite a low overall inference performance. Additionally, we implement 54 MIAs, whose average attack accuracy ranges from 0.5 to 0.9, to support our analysis with our scalable and flexible platform, Membership Inference Attacks Platform (VMIAP). Furthermore, previous methods are unsuitable for finding vulnerable data points under multiple MIAs and different target models. Finally, we observe that the vulnerability is not characteristic of the data point but related to the MIA and target model.

Title: Review on Classification Techniques used in Biophysiological Stress Monitoring. (arXiv:2210.16040v1 [cs.LG])

robust

Title: BI AVAN: Brain inspired Adversarial Visual Attention Network. (arXiv:2210.15790v1 [cs.CV])

Title: FUSSL: Fuzzy Uncertain Self Supervised Learning. (arXiv:2210.15818v1 [cs.CV])

Title: Facial Action Unit Detection and Intensity Estimation from Self-supervised Representation. (arXiv:2210.15878v1 [cs.CV])

Title: Towards Data-and Knowledge-Driven Artificial Intelligence: A Survey on Neuro-Symbolic Computing. (arXiv:2210.15889v1 [cs.AI])

Title: GeoGCN: Geometric Dual-domain Graph Convolution Network for Point Cloud Denoising. (arXiv:2210.15913v1 [cs.CV])

Title: PSFormer: Point Transformer for 3D Salient Object Detection. (arXiv:2210.15933v1 [cs.CV])

Title: Matching entropy based disparity estimation from light field. (arXiv:2210.15948v1 [cs.CV])

Title: Benchmarking performance of object detection under image distortions in an uncontrolled environment. (arXiv:2210.15999v1 [cs.CV])

Title: Addressing Bias in Face Detectors using Decentralised Data collection with incentives. (arXiv:2210.16024v1 [cs.CV])

Title: Rawgment: Noise-Accounted RAW Augmentation Enables Recognition in a Wide Variety of Environments. (arXiv:2210.16046v1 [cs.CV])

Title: Localized Randomized Smoothing for Collective Robustness Certification. (arXiv:2210.16140v1 [cs.LG])

Title: Boulders Identification on Small Bodies Under Varying Illumination Conditions. (arXiv:2210.16283v1 [cs.CV])

Title: Leveraging Label Correlations in a Multi-label Setting: A Case Study in Emotion. (arXiv:2210.15842v1 [cs.CL])

Title: RoChBert: Towards Robust BERT Fine-tuning for Chinese. (arXiv:2210.15944v1 [cs.CL])

Title: BEBERT: Efficient and robust binary ensemble BERT. (arXiv:2210.15976v1 [cs.CL])

Title: Probing for targeted syntactic knowledge through grammatical error detection. (arXiv:2210.16228v1 [cs.CL])

Title: Investigating Ensemble Methods for Model Robustness Improvement of Text Classifiers. (arXiv:2210.16298v1 [cs.CL])

Title: DICTION: DynamIC robusT whIte bOx watermarkiNg scheme. (arXiv:2210.15745v1 [cs.CR])

Title: Noise Injection Node Regularization for Robust Learning. (arXiv:2210.15764v1 [cs.LG])

Title: Toward Reliable Neural Specifications. (arXiv:2210.16114v1 [cs.LG])

biometric

steal

extraction

Title: Exploring Spatial-Temporal Features for Deepfake Detection and Localization. (arXiv:2210.15872v1 [cs.CV])

Title: Comparison of Stereo Matching Algorithms for the Development of Disparity Map. (arXiv:2210.15926v1 [cs.CV])

Title: Bi-Directional Iterative Prompt-Tuning for Event Argument Extraction. (arXiv:2210.15843v1 [cs.CL])

Title: DORE: Document Ordered Relation Extraction based on Generative Framework. (arXiv:2210.16064v1 [cs.CL])

membership infer

federate

Title: FedVMR: A New Federated Learning method for Video Moment Retrieval. (arXiv:2210.15977v1 [cs.CV])

Title: Federated Learning for Chronic Obstructive Pulmonary Disease Classification with Partial Personalized Attention Mechanism. (arXiv:2210.16142v1 [cs.CV])

Title: Completely Heterogeneous Federated Learning. (arXiv:2210.15865v1 [cs.LG])

Title: Prototype-Based Layered Federated Cross-Modal Hashing. (arXiv:2210.15678v1 [cs.LG])

Title: Federated Learning with Intermediate Representation Regularization. (arXiv:2210.15827v1 [cs.LG])

Title: Efficient and Light-Weight Federated Learning via Asynchronous Distributed Dropout. (arXiv:2210.16105v1 [cs.LG])

Title: Imitation Learning-based Implicit Semantic-aware Communication Networks: Multi-layer Representation and Collaborative Reasoning. (arXiv:2210.16118v1 [cs.AI])

Title: M3FGM:a node masking and multi-granularity message passing-based federated graph model for spatial-temporal data prediction. (arXiv:2210.16193v1 [cs.LG])

Title: Federated Learning based Energy Demand Prediction with Clustered Aggregation. (arXiv:2210.15850v1 [cs.LG])

fair

Title: Fairness Certificates for Differentially Private Classification. (arXiv:2210.16242v1 [cs.LG])

Title: Mitigating Health Disparities in EHR via Deconfounder. (arXiv:2210.15901v1 [cs.LG])

interpretability

exlainability

watermark