secure

Title: Another Round of Breaking and Making Quantum Money: How to Not Build It from Lattices, and More. (arXiv:2211.11994v1 [cs.CR])

In this work, we provide both negative and positive results for publicly verifiable quantum money.

**In the first part, we give a general theorem, showing that a certain natural class of quantum money schemes from lattices cannot be secure. We use this theorem to break the recent quantum money scheme of Khesin, Lu, and Shor.

**In the second part, we propose a framework for building quantum money and quantum lightning we call invariant money which abstracts some of the ideas of quantum money from knots by Farhi et al.(ITCS'12). In addition to formalizing this framework, we provide concrete hard computational problems loosely inspired by classical knowledge-of-exponent assumptions, whose hardness would imply the security of quantum lightning, a strengthening of quantum money where not even the bank can duplicate banknotes.

**We discuss potential instantiations of our framework, including an oracle construction using cryptographic group actions and instantiations from rerandomizable functional encryption, isogenies over elliptic curves, and knots.

Title: Modeling Resources in Permissionless Longest-chain Total-order Broadcast. (arXiv:2211.12050v1 [cs.CR])

Although many resource-based blockchain protocols are formally proven secure in the literature, the existing security proofs fail to demonstrate why particular types of resources cause the blockchain protocols to be vulnerable to distinct classes of attacks. For instance, PoS systems are more vulnerable to long-range attacks, where an adversary corrupts past processes to re-write the history, than Proof-of-Work and Proof-of-Storage systems. Proof-of-Storage-based and Proof-of-Stake-based protocols are both more susceptible to private double-spending attacks than Proof-of-Work-based protocols; in this case, an adversary mines its chain in secret without sharing its blocks with the rest of the processes until the end of the attack.

In this paper, we formally characterize the properties of resources through an abstraction called resource allocator and give a framework for understanding longest-chain consensus protocols based on different underlying resources. In addition, we use this resource allocator to demonstrate security trade-offs between various resources focusing on well-known attacks (e.g., the long-range attack and nothing-at-stake attacks).

security

Title: Analysis of the DoIP Protocol for Security Vulnerabilities. (arXiv:2211.12177v1 [cs.CR])

Title: The Security Protocol Verifier ProVerif and its Horn Clause Resolution Algorithm. (arXiv:2211.12227v1 [cs.CR])

privacy

Title: UpCycling: Semi-supervised 3D Object Detection without Sharing Raw-level Unlabeled Scenes. (arXiv:2211.11950v1 [cs.CV])

Title: GDPR Compliant Collection of Therapist-Patient-Dialogues. (arXiv:2211.12360v1 [cs.CL])

Title: Private Ad Modeling with DP-SGD. (arXiv:2211.11896v1 [cs.LG])

Title: Generalized Private Selection and Testing with High Confidence. (arXiv:2211.12063v1 [cs.CR])

protect

Title: Self-Ensemble Protection: Training Checkpoints Are Good Data Protectors. (arXiv:2211.12005v1 [cs.LG])

defense

Title: A Survey on Backdoor Attack and Defense in Natural Language Processing. (arXiv:2211.11958v1 [cs.CL])

Title: Backdoor Cleansing with Unlabeled Data. (arXiv:2211.12044v1 [cs.LG])

Title: SoK: Inference Attacks and Defenses in Human-Centered Wireless Sensing. (arXiv:2211.12087v1 [cs.CR])

In this work, we aim to bridge this gap. First, we propose a framework to systematize wireless sensing-based inference attacks. Our framework consists of three key steps: deploying a sniffing device, sniffing wireless signals, and inferring private information. Our framework can be used to guide the design of new inference attacks since different attacks can instantiate these three steps differently. Second, we propose a defense-in-depth framework to systematize defenses against such inference attacks. The prevention component of our framework aims to prevent inference attacks via obfuscating the wireless signals around a human, while the detection component aims to detect and respond to attacks. Third, based on our attack and defense frameworks, we identify gaps in the existing literature and discuss future research directions.

attack

Title: Addressing Mistake Severity in Neural Networks with Semantic Knowledge. (arXiv:2211.11880v1 [cs.LG])

robust

Title: NEVIS'22: A Stream of 100 Tasks Sampled from 30 Years of Computer Vision Research. (arXiv:2211.11747v1 [cs.LG])

Title: Teach-DETR: Better Training DETR with Teachers. (arXiv:2211.11953v1 [cs.CV])

Title: Transformation-Equivariant 3D Object Detection for Autonomous Driving. (arXiv:2211.11962v1 [cs.CV])

Title: Multimorbidity Content-Based Medical Image Retrieval Using Proxies. (arXiv:2211.12185v1 [cs.CV])

Title: Event Transformer+. A multi-purpose solution for efficient event data processing. (arXiv:2211.12222v1 [cs.CV])

Title: PointCA: Evaluating the Robustness of 3D Point Cloud Completion Models Against Adversarial Examples. (arXiv:2211.12294v1 [cs.CV])

Title: Neural Dependencies Emerging from Learning Massive Categories. (arXiv:2211.12339v1 [cs.LG])

Title: U-Flow: A U-shaped Normalizing Flow for Anomaly Detection with Unsupervised Threshold. (arXiv:2211.12353v1 [cs.CV])

Title: LiCamGait: Gait Recognition in the Wild by Using LiDAR and Camera Multi-modal Visual Sensors. (arXiv:2211.12371v1 [cs.CV])

Title: Robust AUC Optimization under the Supervision of Clean Data. (arXiv:2211.11751v1 [cs.LG])

Title: Learnable Graph Convolutional Attention Networks. (arXiv:2211.11853v1 [cs.LG])

Title: COVID-Net Assistant: A Deep Learning-Driven Virtual Assistant for COVID-19 Symptom Prediction and Recommendation. (arXiv:2211.11944v1 [cs.LG])

Title: Robustness of Physics-Informed Neural Networks to Noise in Sensor Data. (arXiv:2211.12042v1 [cs.LG])

Title: GRATIS: Deep Learning Graph Representation with Task-specific Topology and Multi-dimensional Edge Features. (arXiv:2211.12482v1 [cs.LG])

biometric

Title: PIC-Score: Probabilistic Interpretable Comparison Score for Optimal Matching Confidence in Single- and Multi-Biometric (Face) Recognition. (arXiv:2211.12483v1 [cs.CV])

steal

extraction

Title: Vision-based localization methods under GPS-denied conditions. (arXiv:2211.11988v1 [cs.CV])

Title: Deep-Learning-Based Computer Vision Approach For The Segmentation Of Ball Deliveries And Tracking In Cricket. (arXiv:2211.12009v1 [cs.CV])

Title: Adaptive Dynamic Filtering Network for Image Denoising. (arXiv:2211.12051v1 [cs.CV])

Title: Visually Grounded Commonsense Knowledge Acquisition. (arXiv:2211.12054v1 [cs.CV])

Title: FE-Fusion-VPR: Attention-based Multi-Scale Network Architecture for Visual Place Recognition by Fusing Frames and Events. (arXiv:2211.12244v1 [cs.CV])

Title: Unsupervised extraction, labelling and clustering of segments from clinical notes. (arXiv:2211.11799v1 [cs.CL])

Title: PESE: Event Structure Extraction using Pointer Network based Encoder-Decoder Architecture. (arXiv:2211.12157v1 [cs.CL])

Title: An Emotion-Aware Multi-Task Approach to Fake News and Rumour Detection using Transfer Learning. (arXiv:2211.12374v1 [cs.CL])

membership infer

federate

Title: GitFL: Adaptive Asynchronous Federated Learning using Version Control. (arXiv:2211.12049v1 [cs.LG])

fair

Title: Fairness Increases Adversarial Vulnerability. (arXiv:2211.11835v1 [cs.LG])

This paper shows the existence of a dichotomy between fairness and robustness, and analyzes when achieving fairness decreases the model robustness to adversarial samples. The reported analysis sheds light on the factors causing such contrasting behavior, suggesting that distance to the decision boundary across groups as a key explainer for this behavior. Extensive experiments on non-linear models and different architectures validate the theoretical findings in multiple vision domains. Finally, the paper proposes a simple, yet effective, solution to construct models achieving good tradeoffs between fairness and robustness.

Title: A survey on knowledge-enhanced multimodal learning. (arXiv:2211.12328v1 [cs.LG])

interpretability

Title: A Graph Regularized Point Process Model For Event Propagation Sequence. (arXiv:2211.11758v1 [cs.LG])

Title: Interpreting Neural Networks through the Polytope Lens. (arXiv:2211.12312v1 [cs.LG])

exlainability

watermark

diffusion

Title: Accelerating Diffusion Sampling with Classifier-based Feature Distillation. (arXiv:2211.12039v1 [cs.CV])

Title: Human Evaluation of Text-to-Image Models on a Multi-Task Benchmark. (arXiv:2211.12112v1 [cs.CV])

Title: DiffDreamer: Consistent Single-view Perpetual View Generation with Conditional Diffusion Models. (arXiv:2211.12131v1 [cs.CV])

Title: Diffusion Model Based Posterior Sampling for Noisy Linear Inverse Problems. (arXiv:2211.12343v1 [cs.LG])

Title: SinDiffusion: Learning a Diffusion Model from a Single Natural Image. (arXiv:2211.12445v1 [cs.CV])

Title: EDICT: Exact Diffusion Inversion via Coupled Transformations. (arXiv:2211.12446v1 [cs.CV])

Title: Person Image Synthesis via Denoising Diffusion Model. (arXiv:2211.12500v1 [cs.CV])