secure

Title: Weakly-Supervised Semantic Segmentation of Ships Using Thermal Imagery. (arXiv:2212.13170v1 [cs.CV])

Title: Scalable and Secure Row-Swap: Efficient and Safe Row Hammer Mitigation in Memory Systems. (arXiv:2212.12613v1 [cs.CR])

Our paper observes that RRS is neither secure nor scalable. We first propose the `Juggernaut attack pattern' that breaks RRS in under 1 day. Juggernaut exploits the fact that the mitigative action of RRS, a swap operation, can itself induce additional target row activations, defeating such a defense. Second, this paper proposes a new defense Secure Row-Swap mechanism that avoids the additional activations from swap (and unswap) operations and protects against Juggernaut. Furthermore, this paper extends Secure Row-Swap with attack detection to defend against even future attacks. While this provides better security, it also allows for securely reducing the frequency of swaps, thereby enabling Scalable and Secure Row-Swap. The Scalable and Secure Row-Swap mechanism provides years of Row Hammer protection with 3.3X lower storage overheads as compared to the RRS design. It incurs only a 0.7% slowdown as compared to a not-secure baseline for a Row Hammer threshold of 1200.

security

Title: Human Activity Recognition from Wi-Fi CSI Data Using Principal Component-Based Wavelet CNN. (arXiv:2212.13161v1 [cs.CV])

Title: Assessing the Impact of Interface Vulnerabilities in Compartmentalized Software. (arXiv:2212.12904v1 [cs.CR])

This paper provides an in-depth study of CIVs. We taxonomize these issues and show that they affect all known compartmentalization approaches. We propose ConfFuzz, an in-memory fuzzer specialized to detect CIVs at possible compartment boundaries. We apply ConfFuzz to a set of 25 popular applications and 36 possible compartment APIs, to uncover a wide data-set of 629 vulnerabilities. We systematically study these issues, and extract numerous insights on the prevalence of CIVs, their causes, impact, and the complexity to address them. We stress the critical importance of CIVs in compartmentalization approaches, demonstrating an attack to extract isolated keys in OpenSSL and uncovering a decade-old vulnerability in sudo. We show, among others, that not all interfaces are affected in the same way, that API size is uncorrelated with CIV prevalence, and that addressing interface vulnerabilities goes beyond writing simple checks. We conclude the paper with guidelines for CIV-aware compartment interface design, and appeal for more research towards systematic CIV detection and mitigation.

Title: Talking to the Overlooked: A Nationwide Telephone Survey with Four Groups Under-represented in Privacy and Security Studies. (arXiv:2212.12964v1 [cs.CR])

privacy

Title: zkFaith: Soonami's Zero-Knowledge Identity Protocol. (arXiv:2212.12785v1 [cs.CR])

In this paper, we design a privacy-preserving identity protocol called "zkFaith." A new approach to obtain a verified zero-knowledge identity unique to each individual. The protocol verifies the integrity of the documents provided by the individuals and issues a zero-knowledge-based id without revealing any information to the authenticator or verifier. The zkFaith leverages an aggregated version of the Camenisch-Lysyanskaya (CL) signature scheme to sign the user's commitment to the verified personal data. Then the users with a zero-knowledge proof system can prove that they own the required attributes of the access criterion of the requested service providers. Vector commitment and their position binding property enables us to, later on, update the commitments based on the modification of the personal data; hence update the issued zkFaith id with no requirement of initiating the protocol from scratch. We show that the design and implementation of the zkFaith with the generated proofs in real-world scenarios are scalable and comparable with the state-of-the-art schemes.

Title: Packing Privacy Budget Efficiently. (arXiv:2212.13228v1 [cs.CR])

protect

Title: Bias Mitigation Framework for Intersectional Subgroups in Neural Networks. (arXiv:2212.13014v1 [cs.LG])

defense

attack

Title: Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks. (arXiv:2212.12995v1 [cs.CV])

Title: Efficiently Hardening SGX Enclaves against Memory Access Pattern Attacks via Dynamic Program Partitioning. (arXiv:2212.12656v1 [cs.CR])

This work tackles the data scalability and performance efficiency of security hardening schemes of Intel SGX enclaves against memory-access pattern side channels. The key insight is that the size of TSX transactions in the target computation is critical, both performance- and security-wise. Unlike the existing designs, this work dynamically partitions target computations to enlarge transactions while avoiding aborts, leading to lower performance overhead and improved side-channel security. We materialize the dynamic partitioning scheme and build a C++ library to monitor and model cache utilization at runtime. We further build a data analytical system using the library and implement various external oblivious algorithms. Performance evaluation shows that our work can effectively increase transaction size and reduce the execution time by up to two orders of magnitude compared with the state-of-the-art solutions.

Title: Bernoulli honeywords. (arXiv:2212.12759v1 [cs.CR])

robust

Title: Frequency Regularization for Improving Adversarial Robustness. (arXiv:2212.12732v1 [cs.CV])

Title: A Lightweight Reconstruction Network for Surface Defect Inspection. (arXiv:2212.12878v1 [cs.CV])

Title: Human Health Indicator Prediction from Gait Video. (arXiv:2212.12948v1 [cs.CV])

Experiments demonstrate that the proposed paradigm achieves state-of-the-art results for predicting health indicators on MoVi, and that the GLANCE module is also beneficial for pose estimation on 3DPW.

Title: Improving Continuous Sign Language Recognition with Consistency Constraints and Signer Removal. (arXiv:2212.13023v1 [cs.CV])

Title: Semantic Enhanced Knowledge Graph for Large-Scale Zero-Shot Learning. (arXiv:2212.13151v1 [cs.CV])

Title: Fully Differentiable RANSAC. (arXiv:2212.13185v1 [cs.CV])

Title: A Bayesian Robust Regression Method for Corrupted Data Reconstruction. (arXiv:2212.12787v1 [cs.LG])

Title: Robust computation of optimal transport by $\beta$-potential regularization. (arXiv:2212.13251v1 [cs.LG])

biometric

Title: Artificial Pupil Dilation for Data Augmentation in Iris Semantic Segmentation. (arXiv:2212.12733v1 [cs.CV])

Title: TypeFormer: Transformers for Mobile Keystroke Biometrics. (arXiv:2212.13075v1 [cs.CV])

Title: Advancements in Biometric Technology with Artificial Intelligence. (arXiv:2212.13187v1 [cs.CR])

steal

extraction

Title: A Marker-based Neural Network System for Extracting Social Determinants of Health. (arXiv:2212.12800v1 [cs.CL])

Materials and Methods. The study uses the N2C2 Shared Task data, which was collected from two sources of clinical notes: MIMIC-III and University of Washington Harborview Medical Centers. It contains 4480 social history sections with full annotation for twelve SDoHs. In order to handle the issue of overlapping entities, we developed a novel marker-based NER model. We used it in a multi-stage pipeline to extract SDoH information from clinical notes.

Results. Our marker-based system outperformed the state-of-the-art span-based models at handling overlapping entities based on the overall Micro-F1 score performance. It also achieved state-of-the-art performance compared to the shared task methods.

Conclusion. The major finding of this study is that the multi-stage pipeline effectively extracts SDoH information from clinical notes. This approach can potentially improve the understanding and tracking of SDoHs in clinical settings. However, error propagation may be an issue, and further research is needed to improve the extraction of entities with complex semantic meanings and low-resource entities using external knowledge.

Title: Saliency-Augmented Memory Completion for Continual Learning. (arXiv:2212.13242v1 [cs.LG])

membership infer

federate

Title: LOCKS: User Differentially Private and Federated Optimal Client Sampling. (arXiv:2212.13071v1 [cs.CR])

Title: When Do Curricula Work in Federated Learning?. (arXiv:2212.12712v1 [cs.LG])

fair

Title: A Comprehensive Study of Gender Bias in Chemical Named Entity Recognition Models. (arXiv:2212.12799v1 [cs.CL])

Materials and Methods. We develop a framework to measure gender bias in chemical NER models using synthetic data and a newly annotated dataset of over 92,405 words with self-identified gender information from Reddit. We applied and evaluated state-of-the-art biomedical NER models.

Results. Our findings indicate that chemical NER models are biased. The results of the bias tests on the synthetic dataset and the real-world data multiple fairness issues. For example, for synthetic data, we find that female-related names are generally classified as chemicals, particularly in datasets containing many brand names rather than standard ones. For both datasets, we find consistent fairness issues resulting in substantial performance disparities between female- and male-related data.

Discussion. Our study highlights the issue of biases in chemical NER models. For example, we find that many systems cannot detect contraceptives (e.g., birth control).

Conclusion. Chemical NER models are biased and can be harmful to female-related groups. Therefore, practitioners should carefully consider the potential biases of these models and take steps to mitigate them.

Title: The URW-KG: a Resource for Tackling the Underrepresentation of non-Western Writers. (arXiv:2212.13104v1 [cs.CL])

Title: Stochastic Methods for AUC Optimization subject to AUC-based Fairness Constraints. (arXiv:2212.12603v1 [cs.LG])

interpretability

explainability

watermark

Title: Adaptive Blind Watermarking Using Psychovisual Image Features. (arXiv:2212.12864v1 [cs.CV])

diffusion

Title: Unsupervised Representation Learning from Pre-trained Diffusion Probabilistic Models. (arXiv:2212.12990v1 [cs.CV])

Title: Your diffusion model secretly knows the dimension of the data manifold. (arXiv:2212.12611v1 [cs.LG])