secure

Title: A systematic literature review of cyberwarfare and state-sponsored hacking teams. (arXiv:2212.05166v1 [cs.CR])

Title: Specular: Towards Trust-minimized Blockchain Execution Scalability with EVM-native Fraud Proofs. (arXiv:2212.05219v1 [cs.CR])

Title: Cryptanalysis and designing chaos-based irreversible and parallel key expansion module over Galois field. (arXiv:2212.05462v1 [cs.CR])

security

Title: HOTCOLD Block: Fooling Thermal Infrared Detectors with a Novel Wearable Design. (arXiv:2212.05709v1 [cs.CV])

Title: A Systematic Literature Review on Smart Contracts Security. (arXiv:2212.05099v1 [cs.CR])

Title: Reconfigurable Intelligent Surfaces: The New Frontier of Next G Security. (arXiv:2212.05101v1 [cs.CR])

Title: SoK: MEV Countermeasures: Theory and Practice. (arXiv:2212.05111v1 [cs.CR])

Title: A systematic literature review on cyber threat hunting. (arXiv:2212.05310v1 [cs.CR])

Title: A systematic literature review on insider threats. (arXiv:2212.05347v1 [cs.CR])

Title: Understanding Concurrency Vulnerabilities in Linux Kernel. (arXiv:2212.05438v1 [cs.CR])

Title: Generic Tagging for RISC-V Binaries. (arXiv:2212.05614v1 [cs.CR])

We evaluate COGENT on a subset of programs from the SPEC CPU2017 benchmark suite and report the binary size increase to be 29.3% and 18.27% for the lowest and highest tag coverage levels respectively. Additionally, we executed tagged programs on COTS RISC-V unmodified hardware and found the execution time overhead (with respect to backward compatibility) to be 13.4% and 5.72% for the lowest and highest coverage levels respectively. Finally, using a case study, we present possible use case scenarios where COGENT can be applied.

privacy

Title: Graph Analysis in Decentralized Online Social Networks with Fine-Grained Privacy Protection. (arXiv:2212.05253v1 [cs.CR])

Title: ezDPS: An Efficient and Zero-Knowledge Machine Learning Inference Pipeline. (arXiv:2212.05428v1 [cs.CR])

Title: Generalizing DP-SGD with Shuffling and Batching Clipping. (arXiv:2212.05796v1 [cs.LG])

Our DP analysis follows the $f$-DP approach and introduces a new proof technique which allows us to also analyse group privacy. In particular, for $E$ epochs work and groups of size $g$, we show a $\sqrt{g E}$ DP dependency for batch clipping with shuffling. This is much better than the previously anticipated linear dependency in $g$ and is much better than the previously expected square root dependency on the total number of rounds within $E$ epochs which is generally much more than $\sqrt{E}$.

protect

Title: Detecting Code Injections in Noisy Environments Through EM Signal Analysis and SVD Denoising. (arXiv:2212.05643v1 [cs.CR])

defense

Title: General Adversarial Defense Against Black-box Attacks via Pixel Level and Feature Level Distribution Alignments. (arXiv:2212.05387v1 [cs.CV])

Title: DISCO: Adversarial Defense with Local Implicit Functions. (arXiv:2212.05630v1 [cs.CV])

Title: Fighting Malicious Media Data: A Survey on Tampering Detection and Deepfake Detection. (arXiv:2212.05667v1 [cs.CV])

Title: REAP: A Large-Scale Realistic Adversarial Patch Benchmark. (arXiv:2212.05680v1 [cs.CV])

attack

Title: Carpet-bombing patch: attacking a deep network without usual requirements. (arXiv:2212.05827v1 [cs.CV])

Title: Formal Model-Driven Analysis of Resilience of GossipSub to Attacks from Misbehaving Peers. (arXiv:2212.05197v1 [cs.CR])

In this work we take a foundational approach to understanding the resilience of GossipSub to attacks from misbehaving peers. We build the first formal model of GossipSub, using the ACL2s theorem prover. Our model is officially endorsed by GossipSub developers. It can simulate GossipSub networks of arbitrary size and topology, with arbitrarily configured peers, and can be used to prove and disprove theorems about the protocol. We formalize fundamental security properties stating that the score function is fair, penalizes bad behavior and rewards good behavior. We prove that the score function is always fair, but can be configured in ways that either penalize good behavior or ignore bad behavior. Using our model, we run GossipSub with the specific configurations for two popular real-world applications: the FileCoin and Eth2.0 blockchains. We show that all properties hold for FileCoin. However, given any Eth2.0 network (of any topology and size) with any number of potentially misbehaving peers, we can synthesize attacks where these peers are able to continuously misbehave by never forwarding topic messages, while maintaining positive scores so that they are never pruned from the network by GossipSub.

Title: Efficient and Generic Algorithms for Quantitative Attack Tree Analysis. (arXiv:2212.05358v1 [cs.CR])

Title: Mitigating Adversarial Gray-Box Attacks Against Phishing Detectors. (arXiv:2212.05380v1 [cs.CR])

Title: Targeted Adversarial Attacks on Deep Reinforcement Learning Policies via Model Checking. (arXiv:2212.05337v1 [cs.LG])

robust

Title: Progressive Multi-view Human Mesh Recovery with Self-Supervision. (arXiv:2212.05223v1 [cs.CV])

Title: Position Embedding Needs an Independent Layer Normalization. (arXiv:2212.05262v1 [cs.CV])

Title: An approach to robust ICP initialization. (arXiv:2212.05332v1 [cs.CV])

Title: Vision Transformer with Attentive Pooling for Robust Facial Expression Recognition. (arXiv:2212.05463v1 [cs.CV])

Title: Recurrent Vision Transformers for Object Detection with Event Cameras. (arXiv:2212.05598v1 [cs.CV])

Title: Evolutionary Multitasking with Solution Space Cutting for Point Cloud Registration. (arXiv:2212.05679v1 [cs.CV])

Title: CircleNet: Reciprocating Feature Adaptation for Robust Pedestrian Detection. (arXiv:2212.05691v1 [cs.CV])

Title: BeautyREC: Robust, Efficient, and Content-preserving Makeup Transfer. (arXiv:2212.05855v1 [cs.CV])

Title: Diff-Font: Diffusion Model for Robust One-Shot Font Generation. (arXiv:2212.05895v1 [cs.CV])

Title: Multi-view Graph Convolutional Networks with Differentiable Node Selection. (arXiv:2212.05124v1 [cs.LG])

Title: Effects of Spectral Normalization in Multi-agent Reinforcement Learning. (arXiv:2212.05331v1 [cs.LG])

Title: Corruption-tolerant Algorithms for Generalized Linear Models. (arXiv:2212.05430v1 [cs.LG])

Title: Estimator: An Effective and Scalable Framework for Transportation Mode Classification over Trajectories. (arXiv:2212.05502v1 [cs.LG])

Title: Optimal Planning of Hybrid Energy Storage Systems using Curtailed Renewable Energy through Deep Reinforcement Learning. (arXiv:2212.05662v1 [cs.LG])

Title: On Generalization and Regularization via Wasserstein Distributionally Robust Optimization. (arXiv:2212.05716v1 [cs.LG])

Title: Evaluating Model-free Reinforcement Learning toward Safety-critical Tasks. (arXiv:2212.05727v1 [cs.LG])

Title: Robust Recurrent Neural Network to Identify Ship Motion in Open Water with Performance Guarantees -- Technical Report. (arXiv:2212.05781v1 [cs.LG])

biometric

Title: Finger-NestNet: Interpretable Fingerphoto Verification on Smartphone using Deep Nested Residual Network. (arXiv:2212.05884v1 [cs.CV])

steal

extraction

Title: Scale-Semantic Joint Decoupling Network for Image-text Retrieval in Remote Sensing. (arXiv:2212.05752v1 [cs.CV])

Title: Structured information extraction from complex scientific text with fine-tuned large language models. (arXiv:2212.05238v1 [cs.CL])

Title: MORTY: Structured Summarization for Targeted Information Extraction from Scholarly Articles. (arXiv:2212.05429v1 [cs.CL])

Title: Ensembling Transformers for Cross-domain Automatic Term Extraction. (arXiv:2212.05696v1 [cs.CL])

Title: State-Regularized Recurrent Neural Networks to Extract Automata and Explain Predictions. (arXiv:2212.05178v1 [cs.LG])

Title: A Hybrid Brain-Computer Interface Using Motor Imagery and SSVEP Based on Convolutional Neural Network. (arXiv:2212.05289v1 [cs.LG])

membership infer

federate

Title: Collaborating Heterogeneous Natural Language Processing Tasks via Federated Learning. (arXiv:2212.05789v1 [cs.CL])

Title: Client Selection for Federated Bayesian Learning. (arXiv:2212.05492v1 [cs.LG])

Title: ResFed: Communication Efficient Federated Learning by Transmitting Deep Compressed Residuals. (arXiv:2212.05602v1 [cs.LG])

fair

interpretability

Title: Information-Theoretic Text Hallucination Reduction for Video-grounded Dialogue. (arXiv:2212.05765v1 [cs.CL])

Title: Multi-Dimensional Self Attention based Approach for Remaining Useful Life Estimation. (arXiv:2212.05772v1 [cs.LG])

explainability

watermark

diffusion

Title: MAGVIT: Masked Generative Video Transformer. (arXiv:2212.05199v1 [cs.CV])

Title: How to Backdoor Diffusion Models?. (arXiv:2212.05400v1 [cs.CV])

Title: DiffAlign : Few-shot learning using diffusion based synthesis and alignment. (arXiv:2212.05404v1 [cs.CV])

Title: Human Mobility Modeling During the COVID-19 Pandemic via Deep Graph Diffusion Infomax. (arXiv:2212.05707v1 [cs.LG])

Title: GT-CausIn: a novel causal-based insight for traffic prediction. (arXiv:2212.05782v1 [cs.LG])