secure

Title: Secure Quantum Computing for Healthcare Sector: A Short Analysis. (arXiv:2211.10027v1 [cs.CR])

security

Title: Scaling Native Language Identification with Transformer Adapters. (arXiv:2211.10117v1 [cs.CL])

Title: Comparative evaluation of different methods of "Homomorphic Encryption" and "Traditional Encryption" on a dataset with current problems and developments. (arXiv:2211.10028v1 [cs.CR])

Title: Intrusion Detection in Internet of Things using Convolutional Neural Networks. (arXiv:2211.10062v1 [cs.CR])

Title: Trusted Hart for Mobile RISC-V Security. (arXiv:2211.10299v1 [cs.CR])

We consider the implications of porting the mobile security stack on top of a RISC-V system on a chip, identify the gaps in the open-source Keystone framework for building custom TEEs, and propose a security architecture that, among other things, supports the GlobalPlatform TEE API specification for trusted applications. In addition to Keystone enclaves the architecture includes a Trusted Hart -- a normal core that runs a trusted operating system and is dedicated for security functions, like control of the device's keystore and the management of secure peripherals.

The proposed security architecture for RISC-V platform is verified experimentally using the HiFive Unleashed RISC-V development board.

privacy

Title: How Do Input Attributes Impact the Privacy Loss in Differential Privacy?. (arXiv:2211.10173v1 [cs.CR])

protect

Title: Users are Closer than they Appear: Protecting User Location from WiFi APs. (arXiv:2211.10014v1 [cs.CR])

defense

Title: Clustering based opcode graph generation for malware variant detection. (arXiv:2211.10048v1 [cs.CR])

attack

Title: Potential Auto-driving Threat: Universal Rain-removal Attack. (arXiv:2211.09959v1 [cs.CV])

Title: Adversarial Detection by Approximation of Ensemble Boundary. (arXiv:2211.10227v1 [cs.LG])

Title: Diagnostics for Deep Neural Networks with Automated Copy/Paste Attacks. (arXiv:2211.10024v1 [cs.LG])

Title: Adversarial Stimuli: Attacking Brain-Computer Interfaces via Perturbed Sensory Events. (arXiv:2211.10033v1 [cs.CR])

Title: Applications of Quantum Annealing in Cryptography. (arXiv:2211.10076v1 [cs.CR])

Title: Leveraging Algorithmic Fairness to Mitigate Blackbox Attribute Inference Attacks. (arXiv:2211.10209v1 [cs.LG])

Title: Integrated Space Domain Awareness and Communication System. (arXiv:2211.10260v1 [cs.CR])

robust

Title: Data-Centric Debugging: mitigating model failures via targeted data collection. (arXiv:2211.09859v1 [cs.CV])

Title: SparseVLR: A Novel Framework for Verified Locally Robust Sparse Neural Networks Search. (arXiv:2211.09945v1 [cs.CV])

Title: Just a Matter of Scale? Reevaluating Scale Equivariance in Convolutional Neural Networks. (arXiv:2211.10288v1 [cs.CV])

Title: Metadata Might Make Language Models Better. (arXiv:2211.10086v1 [cs.CL])

Title: Overview of the HASOC Subtrack at FIRE 2022: Offensive Language Identification in Marathi. (arXiv:2211.10163v1 [cs.CL])

Title: Certifying Robustness of Convolutional Neural Networks with Tight Linear Approximation. (arXiv:2211.09810v1 [cs.LG])

Title: Improving Robustness of TCM-based Robust Steganography with Variable Robustness. (arXiv:2211.10095v1 [cs.CR])

Title: Features Compression based on Counterfactual Analysis. (arXiv:2211.09894v1 [cs.LG])

Title: Robust DNN Surrogate Models with Uncertainty Quantification via Adversarial Training. (arXiv:2211.09954v1 [cs.LG])

Title: Weighted Ensemble Self-Supervised Learning. (arXiv:2211.09981v1 [cs.LG])

Title: A Tale of Two Cities: Data and Configuration Variances in Robust Deep Learning. (arXiv:2211.10012v1 [cs.LG])

Title: Mirror Sinkhorn: Fast Online Optimization on Transport Polytopes. (arXiv:2211.10420v1 [cs.LG])

We present in this work an optimization algorithm that utilizes Sinkhorn matrix scaling and mirror descent to minimize convex objectives on this domain. This algorithm can be run online and is both adaptive and robust to noise. A mathematical analysis of the convergence rate of the algorithm for minimising convex functions is provided, as well as experiments that illustrate its performance on synthetic data and real-world data.

biometric

steal

extraction

Title: TempNet: Temporal Attention Towards the Detection of Animal Behaviour in Videos. (arXiv:2211.09950v1 [cs.CV])

Title: Comparison between EM and FCM algorithms in skin tone extraction. (arXiv:2211.09979v1 [cs.CV])

Title: CRAFT: Concept Recursive Activation FacTorization for Explainability. (arXiv:2211.10154v1 [cs.CV])

Title: A Dataset for Hyper-Relational Extraction and a Cube-Filling Approach. (arXiv:2211.10018v1 [cs.CL])

membership infer

federate

Title: Private Federated Statistics in an Interactive Setting. (arXiv:2211.10082v1 [cs.CR])

fair

Title: ProtSi: Prototypical Siamese Network with Data Augmentation for Few-Shot Subjective Answer Evaluation. (arXiv:2211.09855v1 [cs.CL])

Title: BDTS: A Blockchain-based Data Trading System with Fair Exchange. (arXiv:2211.10001v1 [cs.CR])

Title: FairMILE: A Multi-Level Framework for Fair and Scalable Graph Representation Learning. (arXiv:2211.09925v1 [cs.LG])

Title: A Fair Loss Function for Network Pruning. (arXiv:2211.10285v1 [cs.LG])

interpretability

exlainability

watermark

diffusion

Title: RenderDiffusion: Image Diffusion for 3D Reconstruction, Inpainting and Generation. (arXiv:2211.09869v1 [cs.CV])

Title: Invariant Learning via Diffusion Dreamed Distribution Shifts. (arXiv:2211.10370v1 [cs.CV])

Title: A Structure-Guided Diffusion Model for Large-Hole Diverse Image Completion. (arXiv:2211.10437v1 [cs.CV])

Title: Magic3D: High-Resolution Text-to-3D Content Creation. (arXiv:2211.10440v1 [cs.CV])