secure

Title: ZK-IMG: Attested Images via Zero-Knowledge Proofs to Fight Disinformation. (arXiv:2211.04775v1 [cs.CR])

To address these issues, we present zk-img, a library for attesting to image transformations while hiding the pre-transformed image. zk-img allows application developers to specify high level image transformations. Then, zk-img will transparently compile these specifications to ZK-SNARKs. To hide the input or output images, zk-img will compute the hash of the images inside the ZK-SNARK. We further propose methods of chaining image transformations securely and privately, which allows for arbitrarily many transformations. By combining these optimizations, zk-img is the first system to be able to transform HD images on commodity hardware, securely and privately.

Title: A Capability-based Distributed Authorization System to Enforce Context-aware Permission Sequences. (arXiv:2211.04980v1 [cs.CR])

A common requirement of such systems is that the user uses tokens of multiple servers in a particular order. A related requirement is the token may be used if certain environmental conditions hold. We introduce a secure capability-based system that supports "permission sequence" and "context". This allows a finite sequence of permissions to be enforced, each with their own specific context. We prove the safety property of this system for these conditions and integrate the system into OAuth 2.0 with proof-of-possession tokens. We evaluate our implementation and compare it with plain OAuth with respect to the average time for obtaining an authorization token and acquiring access to the resource.

security

Title: Building Resilience in Cybersecurity -- An Artificial Lab Approach. (arXiv:2211.04762v1 [cs.CR])

Title: DSCOT: An NFT-Based Blockchain Architecture for the Authentication of IoT-Enabled Smart Devices in Smart Cities. (arXiv:2211.04803v1 [cs.CR])

Title: Detection of Sparse Anomalies in High-Dimensional Network Telescope Signals. (arXiv:2211.04918v1 [cs.CR])

Title: Supporting AI/ML Security Workers through an Adversarial Techniques, Tools, and Common Knowledge (AI/ML ATT&CK) Framework. (arXiv:2211.05075v1 [cs.CR])

Title: Interpretable Deep Reinforcement Learning for Green Security Games with Real-Time Information. (arXiv:2211.04987v1 [cs.LG])

privacy

Title: Domain-incremental Cardiac Image Segmentation with Style-oriented Replay and Domain-sensitive Feature Whitening. (arXiv:2211.04862v1 [cs.CV])

Title: Accountable and Explainable Methods for Complex Reasoning over Text. (arXiv:2211.04946v1 [cs.LG])

In computer science, the decision-making process of ML models has been studied by developing accountability and transparency methods. Accountability methods, such as adversarial attacks and diagnostic datasets, expose vulnerabilities of ML models that could lead to malicious manipulations or systematic faults in their predictions. Transparency methods explain the rationales behind models' predictions gaining the trust of relevant stakeholders and potentially uncovering mistakes and unfairness in models' decisions. To this end, transparency methods have to meet accountability requirements as well, e.g., being robust and faithful to the underlying rationales of a model.

This thesis presents my research that expands our collective knowledge in the areas of accountability and transparency of ML models developed for complex reasoning tasks over text.

Title: Directional Privacy for Deep Learning. (arXiv:2211.04686v1 [cs.LG])

Title: Harpocrates: Privacy-Preserving and Immutable Audit Log for Sensitive Data Operations. (arXiv:2211.04741v1 [cs.CR])

In this paper, we propose Harpocrates, a new privacy-preserving and immutable audit log scheme. Harpocrates permits data store, share, and access operations to be recorded in the audit log without leaking sensitive information (e.g., data identifier, user identity), while permitting the validity of data operations to be publicly verifiable. Harpocrates makes use of blockchain techniques to achieve immutability and avoid a single point of failure, while cryptographic zero-knowledge proofs are harnessed for confidentiality and public verifiability. We analyze the security of our proposed technique and prove that it achieves non-malleability and indistinguishability. We fully implemented Harpocrates and evaluated its performance on a real blockchain system (i.e., Hyperledger Fabric) deployed on a commodity platform (i.e., Amazon EC2). Experimental results demonstrated that Harpocrates is highly scalable and achieves practical performance.

Title: Almost Tight Error Bounds on Differentially Private Continual Counting. (arXiv:2211.05006v1 [cs.LG])

We believe this technique will be useful in proving lower bounds for a larger class of linear queries. To illustrate the power of this technique, we show the first lower bound on the mean squared error for answering parity queries.

protect

Title: Composite Fixed-Length Ordered Features for Palmprint Template Protection with Diminished Performance Loss. (arXiv:2211.04884v1 [cs.CR])

defense

attack

robust

Title: Soft Augmentation for Image Classification. (arXiv:2211.04625v1 [cs.CV])

Title: MEVID: Multi-view Extended Videos with Identities for Video Person Re-Identification. (arXiv:2211.04656v1 [cs.CV])

Title: A Solution for a Fundamental Problem of 3D Inference based on 2D Representations. (arXiv:2211.04691v1 [cs.CV])

Title: Robust Point Cloud Registration Framework Based on Deep Graph Matching(TPAMI Version). (arXiv:2211.04696v1 [cs.CV])

Title: Interpretable Explainability in Facial Emotion Recognition and Gamification for Data Collection. (arXiv:2211.04769v1 [cs.CV])

Title: On the Robustness of Explanations of Deep Neural Network Models: A Survey. (arXiv:2211.04780v1 [cs.LG])

Title: Disentangling Aesthetic and Technical Effects for Video Quality Assessment of User Generated Content. (arXiv:2211.04894v1 [cs.CV])

Title: SimOn: A Simple Framework for Online Temporal Action Localization. (arXiv:2211.04905v1 [cs.CV])

Title: The Best of Both Worlds: a Framework for Combining Degradation Prediction with High Performance Super-Resolution Networks. (arXiv:2211.05018v1 [cs.CV])

Title: Toward a Neural Semantic Parsing System for EHR Question Answering. (arXiv:2211.04569v1 [cs.CL])

Title: DeepE: a deep neural network for knowledge graph embedding. (arXiv:2211.04620v1 [cs.CL])

In this paper, we propose a neural network based model, named DeepE, to address the problem, which stacks multiple building blocks to predict the tail entity based on the head entity and the relation. Each building block is an addition of a linear and a non-linear function. The stacked building blocks are equivalent to a group of learning functions with different non-linear depth. Hence, DeepE allows deep functions to learn deep features, and shallow functions to learn shallow features. Through extensive experiments, we find DeepE outperforms other state-of-the-art baseline methods. A major advantage of DeepE is the robustness. DeepE achieves a Mean Rank (MR) score that is 6%, 30%, 65% lower than the best baseline methods on FB15k-237, WN18RR and YAGO3-10. Our design makes it possible to train much deeper networks on KGE, e.g. 40 layers on FB15k-237, and without scarifying precision on simple relations.

Title: miCSE: Mutual Information Contrastive Learning for Low-shot Sentence Embeddings. (arXiv:2211.04928v1 [cs.CL])

Title: Large Language Models with Controllable Working Memory. (arXiv:2211.05110v1 [cs.CL])

Title: ARMOR: A Model-based Framework for Improving Arbitrary Baseline Policies with Offline Data. (arXiv:2211.04538v1 [cs.LG])

Title: Utilising Bayesian Networks to combine multimodal data and expert opinion for the robust prediction of depression and its symptoms. (arXiv:2211.04924v1 [cs.LG])

Title: Learning to Price Supply Chain Contracts against a Learning Retailer. (arXiv:2211.04586v1 [cs.LG])

To capture the dynamics induced by the retailer's learning policy, we first make a connection to non-stationary online learning by following the notion of variation budget. The variation budget quantifies the impact of the retailer's learning strategy on the supplier's decision-making. We then propose dynamic pricing policies for the supplier for both discrete and continuous demand. We also note that our proposed pricing policy only requires access to the support of the demand distribution, but critically, does not require the supplier to have any prior knowledge about the retailer's learning policy or the demand realizations. We examine several well-known data-driven policies for the retailer, including sample average approximation, distributionally robust optimization, and parametric approaches, and show that our pricing policies lead to sublinear regret bounds in all these cases.

At the managerial level, we answer affirmatively that there is a pricing policy with a sublinear regret bound under a wide range of retailer's learning policies, even though she faces a learning retailer and an unknown demand distribution. Our work also provides a novel perspective in data-driven operations management where the principal has to learn to react to the learning policies employed by other agents in the system.

Title: Accelerating Adversarial Perturbation by 50% with Semi-backward Propagation. (arXiv:2211.04973v1 [cs.LG])

Title: Hyper-GST: Predict Metro Passenger Flow Incorporating GraphSAGE, Hypergraph, Social-meaningful Edge Weights and Temporal Exploitation. (arXiv:2211.04988v1 [cs.LG])

biometric

steal

extraction

Title: Novel Chapter Abstractive Summarization using Spinal Tree Aware Sub-Sentential Content Selection. (arXiv:2211.04903v1 [cs.CL])

Title: DoSA : A System to Accelerate Annotations on Business Documents with Human-in-the-Loop. (arXiv:2211.04934v1 [cs.CL])

Title: Improving Performance of Automatic Keyword Extraction (AKE) Methods Using PoS-Tagging and Enhanced Semantic-Awareness. (arXiv:2211.05031v1 [cs.CL])

membership infer

federate

Title: Framework Construction of an Adversarial Federated Transfer Learning Classifier. (arXiv:2211.04734v1 [cs.LG])

Title: Knowledge Distillation for Federated Learning: a Practical Guide. (arXiv:2211.04742v1 [cs.LG])

fair

Title: Discrimination and Class Imbalance Aware Online Naive Bayes. (arXiv:2211.04812v1 [cs.LG])

interpretability

Title: Care for the Mind Amid Chronic Diseases: An Interpretable AI Approach Using IoT. (arXiv:2211.04509v1 [cs.AI])

Title: Deep Explainable Learning with Graph Based Data Assessing and Rule Reasoning. (arXiv:2211.04693v1 [cs.AI])

exlainability

watermark