secure

Title: Secure and Privacy-Preserving Automated End-to-End Integrated IoT-Edge-Artificial Intelligence-Blockchain Monitoring System for Diabetes Mellitus Prediction. (arXiv:2211.07643v1 [cs.LG])

Consequently, it becomes crucial to take precautionary measures to avoid/predict the occurrence of diabetes. Machine learning approaches have been proposed and evaluated in the literature for diabetes prediction. This paper proposes an IoT-edge-Artificial Intelligence (AI)-blockchain system for diabetes prediction based on risk factors. The proposed system is underpinned by the blockchain to obtain a cohesive view of the risk factors data from patients across different hospitals and to ensure security and privacy of the user data. Furthermore, we provide a comparative analysis of different medical sensors, devices, and methods to measure and collect the risk factors values in the system. Numerical experiments and comparative analysis were carried out between our proposed system, using the most accurate random forest (RF) model, and the two most used state-of-the-art machine learning approaches, Logistic Regression (LR) and Support Vector Machine (SVM), using three real-life diabetes datasets. The results show that the proposed system using RF predicts diabetes with 4.57% more accuracy on average compared to LR and SVM, with 2.87 times more execution time. Data balancing without feature selection does not show significant improvement. The performance is improved by 1.14% and 0.02% after feature selection for PIMA Indian and Sylhet datasets respectively, while it reduces by 0.89% for MIMIC III.

security

Title: A Probabilistic Proof of the nCPA to CCA Bound. (arXiv:2211.07896v1 [cs.CR])

Title: Security Closure of IC Layouts Against Hardware Trojans. (arXiv:2211.07997v1 [cs.CR])

In this work, we proactively and systematically harden the physical layouts of ICs against post-design insertion of Trojans. Toward that end, we propose a multiplexer-based logic-locking scheme that is (i) devised for layout-level Trojan prevention, (ii) resilient against state-of-the-art, oracle-less machine learning attacks, and (iii) fully integrated into a tailored, yet generic, commercial-grade design flow. Our work provides in-depth security and layout analysis on a challenging benchmark suite. We show that ours can render layouts resilient, with reasonable overheads, against Trojan insertion in general and also against second-order attacks (i.e., adversaries seeking to bypass the locking defense in an oracle-less setting).

We release our layout artifacts for independent verification [29] and we will release our methodology's source code.

Title: Detecting Malicious Domains Using Statistical Internationalized Domain Name Features in Top Level Domains. (arXiv:2211.08020v1 [cs.CR])

Title: Faster Verifiable Delay Function For Shorter Delay Parameter. (arXiv:2211.08162v1 [cs.CR])

This paper proposes a verifiable delay function that requires only two sequential squaring to verify when the delay parameter is polynomially-bounded i.e., $T\le \mathtt{poly}(\lambda)$. Thus in our VDF, the sequential effort required for verification is fixed and independent of the security parameter.

Title: Anomaly Detection in Multiplex Dynamic Networks: from Blockchain Security to Brain Disease Prediction. (arXiv:2211.08378v1 [cs.LG])

Title: Premonition Net, A Multi-Timeline Transformer Network Architecture Towards Strawberry Tabletop Yield Forecasting. (arXiv:2211.08177v1 [cs.LG])

privacy

Title: Differentially-Private Dynamic Average Consensus. (arXiv:2211.07791v1 [cs.CR])

Title: Differentially Private Sampling from Distributions. (arXiv:2211.08193v1 [cs.LG])

protect

Title: FolkScope: Intention Knowledge Graph Construction for Discovering E-commerce Commonsense. (arXiv:2211.08316v1 [cs.CL])

defense

attack

Title: MORA: Improving Ensemble Robustness Evaluation with Model-Reweighing Attack. (arXiv:2211.08008v1 [cs.LG])

Title: Backdoor Attacks for Remote Sensing Data with Wavelet Transform. (arXiv:2211.08044v1 [cs.CV])

Title: CorruptEncoder: Data Poisoning based Backdoor Attacks to Contrastive Learning. (arXiv:2211.08229v1 [cs.CR])

Title: Backdoor Attacks on Time Series: A Generative Approach. (arXiv:2211.07915v1 [cs.LG])

Title: X-Volt: Joint Tuning of Driver Strengths and Supply Voltages Against Power Side-Channel Attacks. (arXiv:2211.08046v1 [cs.CR])

For the first time, we thoroughly explore the prospects of jointly tuning driver strengths and VCCs as novel working principle for PSC-attack countermeasures. Toward this end, we take the following steps: 1) we develop a simple circuit-level scheme for tuning; 2) we implement a CAD flow for design-time evaluation of ASICs, enabling security assessment of ICs before tape-out; 3) we implement a correlation power analysis (CPA) framework for thorough and comparative security analysis; 4) we conduct an extensive experimental study of a regular AES design, implemented in ASIC as well as FPGA fabrics, under various tuning scenarios; 5) we summarize design guidelines for secure and efficient joint tuning.

In our experiments, we observe that runtime tuning is more effective than static tuning, for both ASIC and FPGA implementations. For the latter, the AES core is rendered >11.8x (i.e., at least 11.8 times) as resilient as the untuned baseline design. Layout overheads can be considered acceptable, with, e.g., around +10% critical-path delay for the most resilient tuning scenario in FPGA.

We will release source codes for our methodology, as well as artifacts from the experimental study, post peer-review.

Title: Universal Distributional Decision-based Black-box Adversarial Attack with Reinforcement Learning. (arXiv:2211.08384v1 [cs.LG])

Title: Resisting Graph Adversarial Attack via Cooperative Homophilous Augmentation. (arXiv:2211.08068v1 [cs.LG])

robust

Title: Arbitrary Style Guidance for Enhanced Diffusion-Based Text-to-Image Generation. (arXiv:2211.07751v1 [cs.CV])

Title: Robust Deep Learning for Autonomous Driving. (arXiv:2211.07772v1 [cs.CV])

Title: Interpreting Bias in the Neural Networks: A Peek Into Representational Similarity. (arXiv:2211.07774v1 [cs.LG])

In this paper, we investigate the performance and internal representational structure of convolution-based neural networks (e.g., ResNets) trained on biased data using various objective functions. We specifically study similarities in representations, using Centered Kernel Alignment (CKA), for different objective functions (probabilistic and margin-based) and offer a comprehensive analysis of the chosen ones.

According to our findings, ResNets representations obtained with Negative Log Likelihood $(\mathcal{L}_{NLL})$ and Softmax Cross-Entropy ($\mathcal{L}_{SCE}$) as loss functions are equally capable of producing better performance and fine representations on biased data. We note that without progressive representational similarities among the layers of a neural network, the performance is less likely to be robust.

Title: Cross-Reality Re-Rendering: Manipulating between Digital and Physical Realities. (arXiv:2211.08005v1 [cs.CV])

Title: Uncertainty-aware Gait Recognition via Learning from Dirichlet Distribution-based Evidence. (arXiv:2211.08007v1 [cs.CV])

Title: ShadowDiffusion: Diffusion-based Shadow Removal using Classifier-driven Attention and Structure Preservation. (arXiv:2211.08089v1 [cs.CV])

Title: SPE-Net: Boosting Point Cloud Analysis via Rotation Robustness Enhancement. (arXiv:2211.08250v1 [cs.CV])

Title: Zero-Shot Text Matching for Automated Auditing using Sentence Transformers. (arXiv:2211.07716v1 [cs.CL])

In this work, we study the efficiency of unsupervised text matching using Sentence-Bert, a transformer-based model, by applying it to the semantic similarity of financial passages. Experimental results show that this model is robust to documents from in- and out-of-domain data.

Title: Prompting Language Models for Linguistic Structure. (arXiv:2211.07830v1 [cs.CL])

Title: GLUE-X: Evaluating Natural Language Understanding Models from an Out-of-distribution Generalization Perspective. (arXiv:2211.08073v1 [cs.CL])

Title: A Universal Discriminator for Zero-Shot Generalization. (arXiv:2211.08099v1 [cs.CL])

Title: Hierarchical Pronunciation Assessment with Multi-Aspect Attention. (arXiv:2211.08102v1 [cs.CL])

Title: W-Trace: Robust and Effective Watermarking for GPS Trajectories. (arXiv:2211.08116v1 [cs.CR])

Title: Multi-Player Bandits Robust to Adversarial Collisions. (arXiv:2211.07817v1 [cs.LG])

Title: Byzantine Spectral Ranking. (arXiv:2211.07902v1 [cs.LG])

Title: Air Pollution Hotspot Detection and Source Feature Analysis using Cross-domain Urban Data. (arXiv:2211.08400v1 [cs.LG])

biometric

steal

extraction

Title: A Low-Shot Object Counting Network With Iterative Prototype Adaptation. (arXiv:2211.08217v1 [cs.CV])

Title: QueryForm: A Simple Zero-shot Form Entity Query Framework. (arXiv:2211.07730v1 [cs.LG])

Title: Generative Aspect-Based Sentiment Analysis with Contrastive Learning and Expressive Structure. (arXiv:2211.07743v1 [cs.CL])

Title: When to Use What: An In-Depth Comparative Empirical Analysis of OpenIE Systems for Downstream Applications. (arXiv:2211.08228v1 [cs.CL])

Title: Classifying text using machine learning models and determining conversation drift. (arXiv:2211.08365v1 [cs.LG])

Title: Explainer Divergence Scores (EDS): Some Post-Hoc Explanations May be Effective for Detecting Unknown Spurious Correlations. (arXiv:2211.07650v1 [cs.LG])

membership infer

federate

Title: Cross-domain Federated Adaptive Prompt Tuning for CLIP. (arXiv:2211.07864v1 [cs.LG])

Title: FedTune: A Deep Dive into Efficient Federated Fine-Tuning with Pre-trained Transformers. (arXiv:2211.08025v1 [cs.LG])

Title: Federated Learning for Healthcare Domain -- Pipeline, Applications and Challenges. (arXiv:2211.07893v1 [cs.LG])

Title: Decentralized Federated Learning: Fundamentals, State-of-the-art, Frameworks, Trends, and Challenges. (arXiv:2211.08413v1 [cs.LG])

Title: Quantifying the Impact of Label Noise on Federated Learning. (arXiv:2211.07816v1 [cs.LG])

Title: Personalized Federated Learning with Multi-branch Architecture. (arXiv:2211.07931v1 [cs.LG])

Title: Bayesian Federated Neural Matching that Completes Full Information. (arXiv:2211.08010v1 [cs.LG])

fair

Title: HMOE: Hypernetwork-based Mixture of Experts for Domain Generalization. (arXiv:2211.08253v1 [cs.LG])

interpretability

Title: Easy to Decide, Hard to Agree: Reducing Disagreements Between Saliency Methods. (arXiv:2211.08369v1 [cs.CL])

Title: An Interpretable Neuron Embedding for Static Knowledge Distillation. (arXiv:2211.07647v1 [cs.LG])

exlainability

watermark