secure

security

Title: Unsafe's Betrayal: Abusing Unsafe Rust in Binary Reverse Engineering toward Finding Memory-safety Bugs via Machine Learning. (arXiv:2211.00111v1 [cs.CR])

Title: Empowering Data Centers for Next Generation Trusted Computing. (arXiv:2211.00306v1 [cs.CR])

privacy

Title: HDNet: Hierarchical Dynamic Network for Gait Recognition using Millimeter-Wave Radar. (arXiv:2211.00312v1 [cs.CV])

Title: No-audio speaking status detection in crowded settings via visual pose-based filtering and wearable acceleration. (arXiv:2211.00549v1 [cs.CV])

Title: Amplifying Membership Exposure via Data Poisoning. (arXiv:2211.00463v1 [cs.CR])

protect

defense

attack

Title: Synthetic ID Card Image Generation for Improving Presentation Attack Detection. (arXiv:2211.00098v1 [cs.CV])

Title: Universal Perturbation Attack on Differentiable No-Reference Image- and Video-Quality Metrics. (arXiv:2211.00366v1 [cs.CV])

Title: Adversarial Policies Beat Professional-Level Go AIs. (arXiv:2211.00241v1 [cs.LG])

Title: Adversarial Training with Complementary Labels: On the Benefit of Gradually Informative Attacks. (arXiv:2211.00269v1 [cs.LG])

Title: HFN: Heterogeneous Feature Network for Multivariate Time Series Anomaly Detection. (arXiv:2211.00277v1 [cs.LG])

Title: Zero Day Threat Detection Using Metric Learning Autoencoders. (arXiv:2211.00441v1 [cs.CR])

Title: The Perils of Learning From Unlabeled Data: Backdoor Attacks on Semi-supervised Learning. (arXiv:2211.00453v1 [cs.CR])

In this paper, we show that the key feature of SSL that it can learn from (non-inspected) unlabeled data exposes SSL to strong poisoning attacks. In fact, we argue that, due to its reliance on non-inspected unlabeled data, poisoning is a much more severe problem in SSL than in conventional fully-supervised ML.

Specifically, we design a backdoor poisoning attack on SSL that can be conducted by a weak adversary with no knowledge of target SSL pipeline. This is unlike prior poisoning attacks in fully-supervised settings that assume strong adversaries with practically-unrealistic capabilities. We show that by poisoning only 0.2% of the unlabeled training data, our attack can cause misclassification of more than 80% of test inputs (when they contain the adversary's backdoor trigger). Our attacks remain effective across twenty combinations of benchmark datasets and SSL algorithms, and even circumvent the state-of-the-art defenses against backdoor attacks. Our work raises significant concerns about the practical utility of existing SSL algorithms.

robust

Title: SAGE: Saliency-Guided Mixup with Optimal Rearrangements. (arXiv:2211.00113v1 [cs.LG])

Title: Is Facial Recognition Biased at Near-Infrared Spectrum As Well?. (arXiv:2211.00129v1 [cs.CV])

Title: Improving Motion Forecasting for Autonomous Driving with the Cycle Consistency Loss. (arXiv:2211.00149v1 [cs.CV])

Title: Frequency Cam: Imaging Periodic Signals in Real-Time. (arXiv:2211.00198v1 [cs.CV])

Title: GMF: General Multimodal Fusion Framework for Correspondence Outlier Rejection. (arXiv:2211.00207v1 [cs.CV])

Title: Self-supervised Character-to-Character Distillation. (arXiv:2211.00288v1 [cs.CV])

CCD differs from prior works in that we propose a character-level pretext task to learn more fine-grained feature representations. Besides, compared with the inflexible augmentations of sequence-to-sequence models, our work satisfies character-to-character representation consistency, across various transformations (e.g., geometry and colour), to generate robust text features in the representative space. Experiments demonstrate that CCD achieves state-of-the-art performance on publicly available text recognition benchmarks.

Title: Expansion of Visual Hints for Improved Generalization in Stereo Matching. (arXiv:2211.00392v1 [cs.CV])

Title: Signing Outside the Studio: Benchmarking Background Robustness for Continuous Sign Language Recognition. (arXiv:2211.00448v1 [cs.CV])

Title: Self-Supervised Intensity-Event Stereo Matching. (arXiv:2211.00509v1 [cs.CV])

Title: Infinite-Dimensional Adaptive Boundary Observer for Inner-Domain Temperature Estimation of 3D Electrosurgical Processes using Surface Thermography Sensing. (arXiv:2211.00515v1 [cs.CV])

Title: The Enemy of My Enemy is My Friend: Exploring Inverse Adversaries for Improving Adversarial Training. (arXiv:2211.00525v1 [cs.CV])

Title: Why Is It Hate Speech? Masked Rationale Prediction for Explainable Hate Speech Detection. (arXiv:2211.00243v1 [cs.CL])

Title: FRSUM: Towards Faithful Abstractive Summarization via Enhancing Factual Robustness. (arXiv:2211.00294v1 [cs.CL])

Title: DensePure: Understanding Diffusion Models towards Adversarial Robustness. (arXiv:2211.00322v1 [cs.LG])

Title: ARDIR: Improving Robustness using Knowledge Distillation of Internal Representation. (arXiv:2211.00239v1 [cs.LG])

Title: End-to-End Optimization and Learning for Multiagent Ensembles. (arXiv:2211.00251v1 [cs.LG])

This paper addresses this challenge and proposes a unique integration of constrained optimization and learning to derive specialized consensus rules to compose accurate predictions from a pretrained ensemble. The resulting strategy, called end-to-end Multiagent ensemble Learning (e2e-MEL), learns to select appropriate predictors to combine for a particular input sample. The paper shows how to derive the ensemble learning task into a differentiable selection program which is trained end-to-end within the ensemble learning model. Results over standard benchmarks demonstrate the ability of e2e-MEL to substantially outperform conventional consensus rules in a variety of settings.

Title: Meta-Learning for Unsupervised Outlier Detection with Optimal Transport. (arXiv:2211.00372v1 [cs.LG])

Title: Automated Imbalanced Learning. (arXiv:2211.00376v1 [cs.LG])

Title: A Simple, Yet Effective Approach to Finding Biases in Code Generation. (arXiv:2211.00609v1 [cs.AI])

To investigate the effect, we propose a framework that automatically removes hints and exposes various biases that these code generation models use. We apply our framework to three coding challenges and test it across top-performing coding generation models. Our experiments reveal biases towards specific prompt structure and exploitation of keywords during code generation. Finally, we demonstrate how to use our framework as a data transformation technique, which we find a promising direction toward more robust code generation.

Title: Denoising neural networks for magnetic resonance spectroscopy. (arXiv:2211.00080v1 [cs.LG])

Title: Informed Priors for Knowledge Integration in Trajectory Prediction. (arXiv:2211.00348v1 [cs.LG])

Title: Exploring Effects of Computational Parameter Changes to Image Recognition Systems. (arXiv:2211.00471v1 [cs.LG])

Title: Optimal Complexity in Non-Convex Decentralized Learning over Time-Varying Networks. (arXiv:2211.00533v1 [cs.LG])

While numerous studies exist to clarify its theoretical limits and develop efficient algorithms, it remains unclear what the optimal complexity is for non-convex decentralized stochastic optimization over time-varying networks. The main difficulties lie in how to gauge the effectiveness when transmitting messages between two nodes via time-varying communications, and how to establish the lower bound when the network size is fixed (which is a prerequisite in stochastic optimization). This paper resolves these challenges and establish the first lower bound complexity. We also develop a new decentralized algorithm to nearly attain the lower bound, showing the tightness of the lower bound and the optimality of our algorithm.

biometric

steal

extraction

Title: A new filter for dimensionality reduction and classification of hyperspectral images using GLCM features and mutual information. (arXiv:2211.00446v1 [cs.CV])

Keywords: hyperspectral images; classification; spectral and spatial features; grey level cooccurrence matrix; GLCM; mutual information; support vector machine; SVM.

Title: Geo-Information Harvesting from Social Media Data. (arXiv:2211.00543v1 [cs.CV])

Title: Revisiting the Practical Effectiveness of Constituency Parse Extraction from Pre-trained Language Models. (arXiv:2211.00479v1 [cs.CL])

Title: Clustering-Based Approaches for Symbolic Knowledge Extraction. (arXiv:2211.00234v1 [cs.AI])

Title: Evaluation Metrics for Symbolic Knowledge Extracted from Machine Learning Black Boxes: A Discussion Paper. (arXiv:2211.00238v1 [cs.AI])

Title: Causal DAG extraction from a library of books or videos/movies. (arXiv:2211.00486v1 [cs.AI])

membership infer

federate

Title: FL Games: A Federated Learning Framework for Distribution Shifts. (arXiv:2211.00184v1 [cs.LG])

fair

Title: Improving Fairness in Image Classification via Sketching. (arXiv:2211.00168v1 [cs.CV])

interpretability

Title: Hybrid CNN -Interpreter: Interpret local and global contexts for CNN-based Models. (arXiv:2211.00185v1 [cs.LG])

Title: Interpretability in the Wild: a Circuit for Indirect Object Identification in GPT-2 small. (arXiv:2211.00593v1 [cs.LG])

Title: Disentangled (Un)Controllable Features. (arXiv:2211.00086v1 [cs.LG])

Title: What is my math transformer doing? -- Three results on interpretability and generalization. (arXiv:2211.00170v1 [cs.LG])

Title: UNFIS: A Novel Neuro-Fuzzy Inference System with Unstructured Fuzzy Rules for Classification. (arXiv:2211.00599v1 [cs.AI])

Title: Contextual Mixture of Experts: Integrating Knowledge into Predictive Modeling. (arXiv:2211.00558v1 [cs.LG])

exlainability

watermark