secure

Title: Contract-Backed Digital Cash. (arXiv:2211.14442v1 [cs.CR])

A didactic objective is separating money characteristics from technology aspects such as specific blockchain and distributed ledger systems to help disentangle discussions of digital money design from implementation techniques.

We finally discuss the power and role of programmable (contract-backed) digital money in case studies: tokenization of invoice debt using smart contracts on Ethereum, with stablecoins serving as digital money; smart contracts for disbursing payments transparently and reliably in accordance with social legislation; and a Danish e-krone for crowdfunding public and private community projets.

These contributions are made in independent chapters by participants of the Working Group on Digital Cash at Copenhagen FinTech in 2018 and 2019, which have not been published before.

Collectively, the contributions illustrate the design space and potential of digital money when powered by smart digital contracts that effectively eliminate both counterparty risk (somebody does not pay or does not deliver) and settlement risk (a trade fails and needs to be aborted) orders of magnitude faster than in current financial practice.

security

Title: Deep Fake Detection, Deterrence and Response: Challenges and Opportunities. (arXiv:2211.14667v1 [cs.CR])

Title: Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders. (arXiv:2211.14790v1 [cs.CR])

privacy

Title: Utility Assessment of Synthetic Data Generation Methods. (arXiv:2211.14428v1 [cs.LG])

protect

defense

Title: Game Theoretic Mixed Experts for Combinational Adversarial Machine Learning. (arXiv:2211.14669v1 [cs.LG])

attack

Title: Traditional Classification Neural Networks are Good Generators: They are Competitive with DDPMs and GANs. (arXiv:2211.14794v1 [cs.CV])

Proving that classifiers have learned the data distribution and are ready for image generation has far-reaching implications, for classifiers are much easier to train than generative models like DDPMs and GANs. We don't even need to train classification models because tons of public ones are available for download. Also, this holds great potential for the interpretability and robustness of classifiers.

Title: BadPrompt: Backdoor Attacks on Continuous Prompts. (arXiv:2211.14719v1 [cs.CL])

Title: Don't Watch Me: A Spatio-Temporal Trojan Attack on Deep-Reinforcement-Learning-Augment Autonomous Driving. (arXiv:2211.14440v1 [cs.CR])

Title: SCAPHY: Detecting Modern ICS Attacks by Correlating Behaviors in SCADA and PHYsical. (arXiv:2211.14642v1 [cs.CR])

robust

Title: Deep Learning Training Procedure Augmentations. (arXiv:2211.14395v1 [cs.CV])

$\bullet$ Perfect Ordering Approximation; a generalized model agnostic curriculum learning approach. The results show the effectiveness of the technique for improving training time as well as offer some new insight into the training process of deep networks.

$\bullet$ Cascading Sum Augmentation; an extension of mixup capable of utilizing more data points for linear interpolation by leveraging a smoother optimization landscape. This can be used for computer vision tasks in order to improve both prediction performance as well as improve passive model robustness.

Title: Residual Pattern Learning for Pixel-wise Out-of-Distribution Detection in Semantic Segmentation. (arXiv:2211.14512v1 [cs.CV])

Title: Rethinking Alignment and Uniformity in Unsupervised Image Semantic Segmentation. (arXiv:2211.14513v1 [cs.CV])

Title: Robust One-shot Segmentation of Brain Tissues via Image-aligned Style Transformation. (arXiv:2211.14521v1 [cs.CV])

Title: Where to Pay Attention in Sparse Training for Feature Selection?. (arXiv:2211.14627v1 [cs.LG])

Title: A Knowledge-based Learning Framework for Self-supervised Pre-training Towards Enhanced Recognition of Medical Images. (arXiv:2211.14715v1 [cs.CV])

Title: Attribution-based XAI Methods in Computer Vision: A Review. (arXiv:2211.14736v1 [cs.CV])

Title: Conditioning Covert Geo-Location (CGL) Detection on Semantic Class Information. (arXiv:2211.14750v1 [cs.CV])

Title: c-TPE: Generalizing Tree-structured Parzen Estimator with Inequality Constraints for Continuous and Categorical Hyperparameter Optimization. (arXiv:2211.14411v1 [cs.LG])

Title: Supervised Contrastive Prototype Learning: Augmentation Free Robust Neural Network. (arXiv:2211.14424v1 [cs.LG])

Title: Spatio-Temporal Meta-Graph Learning for Traffic Forecasting. (arXiv:2211.14701v1 [cs.LG])

Title: Latent SHAP: Toward Practical Human-Interpretable Explanations. (arXiv:2211.14797v1 [cs.LG])

biometric

steal

Title: Hacky Racers: Exploiting Instruction-Level Parallelism to Generate Stealthy Fine-Grained Timers. (arXiv:2211.14647v1 [cs.CR])

We develop Hacky Racers, a new type of timing gadget that uses instruction-level parallelism, another key feature of out-of-order execution, to measure arbitrary fine-grained timing differences, even in the presence of highly restricted JavaScript sandbox environments. While such environments try to mitigate timing side channels by reducing timer precision and removing language features such as \textit{SharedArrayBuffer} that can be used to indirectly generate timers via thread-level parallelism, no such restrictions can be designed to limit Hacky Racers. We also design versions of Hacky Racers that require no misspeculation whatsoever, demonstrating that transient execution is not the only threat to security from modern microarchitectural performance optimization.

We use Hacky Racers to construct novel \textit{backwards-in-time} Spectre gadgets, which break many hardware countermeasures in the literature by leaking secrets before misspeculation is discovered. We also use them to generate the first known last-level cache eviction set generator in JavaScript that does not require \textit{SharedArrayBuffer} support.

extraction

Title: Chart-RCNN: Efficient Line Chart Data Extraction from Camera Images. (arXiv:2211.14362v1 [cs.CV])

Title: Sketch2FullStack: Generating Skeleton Code of Full Stack Website and Application from Sketch using Deep Learning and Computer Vision. (arXiv:2211.14607v1 [cs.CV])

Title: Unsupervised Wildfire Change Detection based on Contrastive Learning. (arXiv:2211.14654v1 [cs.CV])

Title: MNER-QG: An End-to-End MRC framework for Multimodal Named Entity Recognition with Query Grounding. (arXiv:2211.14739v1 [cs.CV])

Title: Towards Better Document-level Relation Extraction via Iterative Inference. (arXiv:2211.14470v1 [cs.CL])

Title: PCRED: Zero-shot Relation Triplet Extraction with Potential Candidate Relation Selection and Entity Boundary Detection. (arXiv:2211.14477v1 [cs.CL])

Title: Unsupervised User-Based Insider Threat Detection Using Bayesian Gaussian Mixture Models. (arXiv:2211.14437v1 [cs.CR])

membership infer

federate

Title: MDA: Availability-Aware Federated Learning Client Selection. (arXiv:2211.14391v1 [cs.LG])

Title: FedSysID: A Federated Approach to Sample-Efficient System Identification. (arXiv:2211.14393v1 [cs.LG])

fair

Title: Meta Architecure for Point Cloud Analysis. (arXiv:2211.14462v1 [cs.CV])

Title: The Impact of Racial Distribution in Training Data on Face Recognition Bias: A Closer Look. (arXiv:2211.14498v1 [cs.CV])

Title: A Moral- and Event- Centric Inspection of Gender Bias in Fairy Tales at A Large Scale. (arXiv:2211.14358v1 [cs.CL])

Title: The distribution of syntactic dependency distances. (arXiv:2211.14620v1 [cs.CL])

Title: Interpreting Unfairness in Graph Neural Networks via Training Node Attribution. (arXiv:2211.14383v1 [cs.LG])

interpretability

Title: Towards Better Input Masking for Convolutional Neural Networks. (arXiv:2211.14646v1 [cs.CV])

Title: PatchGT: Transformer over Non-trainable Clusters for Learning Graph Representations. (arXiv:2211.14425v1 [cs.LG])

Title: Ensemble Multi-Quantile: Adaptively Flexible Distribution Prediction for Uncertainty Quantification. (arXiv:2211.14545v1 [cs.LG])

Title: Mixture of Decision Trees for Interpretable Machine Learning. (arXiv:2211.14617v1 [cs.LG])

Our work is accompanied by a Python implementation, which uses an interpretable gating function, a fast learning algorithm, and a direct interface to fine-tuned interpretable visualization methods. The experiments confirm that the implementation works and, more importantly, show the superiority of our approach compared to single decision trees and random forests of similar complexity.

explainability

watermark

diffusion

Title: Randomized Conditional Flow Matching for Video Prediction. (arXiv:2211.14575v1 [cs.CV])

Title: A Physics-informed Diffusion Model for High-fidelity Flow Field Reconstruction. (arXiv:2211.14680v1 [cs.LG])