secure

Title: Range-Based Set Reconciliation and Authenticated Set Representations. (arXiv:2212.13567v1 [cs.CR])

Title: ML-based Secure Low-Power Communication in Adversarial Contexts. (arXiv:2212.13689v1 [cs.CR])

Title: Green Bitcoin: Global Sound Money. (arXiv:2212.13986v1 [cs.CR])

security

Title: Users really do respond to smishing. (arXiv:2212.13312v1 [cs.CR])

Title: A Miniscule Survey on Blockchain Scalability. (arXiv:2212.13353v1 [cs.CR])

Title: Hardware Implementation of a Polar Code-based Public Key Cryptosystem. (arXiv:2212.13421v1 [cs.CR])

Title: Financial Crimes in Web3-empowered Metaverse: Taxonomy, Countermeasures, and Opportunities. (arXiv:2212.13452v1 [cs.CR])

Due to the lack of industry standards and regulatory rules, the Web3-empowered metaverse ecosystem has witnessed a variety of financial crimes, such as scams, code exploit, wash trading, money laundering, and illegal services and shops. To this end, it is especially urgent and critical to summarize and classify the financial security threats on the Web3-empowered metaverse in order to maintain the long-term healthy development of its ecology.

In this paper, we first outline the background, foundation, and applications of the Web3 metaverse. Then, we provide a comprehensive overview and taxonomy of the security risks and financial crimes that have emerged since the development of the decentralized metaverse. For each financial crime, we focus on three issues: a) existing definitions, b) relevant cases and analysis, and c) existing academic research on this type of crime. Next, from the perspective of academic research and government policy, we summarize the current anti-crime measurements and technologies in the metaverse. Finally, we discuss the opportunities and challenges in behavioral mining and the potential regulation of financial activities in the metaverse.

The overview of this paper is expected to help readers better understand the potential security threats in this emerging ecology, and to provide insights and references for financial crime fighting.

Title: Publishing Efficient On-device Models Increases Adversarial Vulnerability. (arXiv:2212.13700v1 [cs.CR])

In this paper, we study the security considerations of publishing on-device variants of large-scale models. We first show that an adversary can exploit on-device models to make attacking the large models easier. In evaluations across 19 DNNs, by exploiting the published on-device models as a transfer prior, the adversarial vulnerability of the original commercial-scale models increases by up to 100x. We then show that the vulnerability increases as the similarity between a full-scale and its efficient model increase. Based on the insights, we propose a defense, $similarity$-$unpairing$, that fine-tunes on-device models with the objective of reducing the similarity. We evaluated our defense on all the 19 DNNs and found that it reduces the transferability up to 90% and the number of queries required by a factor of 10-100x. Our results suggest that further research is needed on the security (or even privacy) threats caused by publishing those efficient siblings.

Title: One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware. (arXiv:2212.13716v1 [cs.CR])

Title: Machine Learning for Detecting Malware in PE Files. (arXiv:2212.13988v1 [cs.CR])

Title: AdvCat: Domain-Agnostic Robustness Assessment for Cybersecurity-Critical Applications with Categorical Inputs. (arXiv:2212.13989v1 [cs.CR])

Title: Metaverse Communications, Networking, Security, and Applications: Research Issues, State-of-the-Art, and Future Directions. (arXiv:2212.13993v1 [cs.CR])

privacy

Title: StyleID: Identity Disentanglement for Anonymizing Faces. (arXiv:2212.13791v1 [cs.CV])

Title: Encryption Mechanism And Resource Allocation Optimization Based On Edge Computing Environment. (arXiv:2212.13987v1 [cs.CR])

Title: Social-Aware Clustered Federated Learning with Customized Privacy Preservation. (arXiv:2212.13992v1 [cs.CR])

protect

Title: Brain Cancer Segmentation Using YOLOv5 Deep Neural Network. (arXiv:2212.13599v1 [cs.CV])

defense

attack

Title: XMAM:X-raying Models with A Matrix to Reveal Backdoor Attacks for Federated Learning. (arXiv:2212.13675v1 [cs.CR])

To tackle the threat of backdoor attacks, we propose a new aggregation method, X-raying Models with A Matrix (XMAM), to reveal the malicious local model updates submitted by the backdoor attackers. Since we observe that the output of the Softmax layer exhibits distinguishable patterns between malicious and benign updates, we focus on the Softmax layer's output in which the backdoor attackers are difficult to hide their malicious behavior. Specifically, like X-ray examinations, we investigate the local model updates by using a matrix as an input to get their Softmax layer's outputs. Then, we preclude updates whose outputs are abnormal by clustering. Without any training dataset in the server, the extensive evaluations show that our XMAM can effectively distinguish malicious local model updates from benign ones. For instance, when other methods fail to defend against the backdoor attacks at no more than 20% malicious clients, our method can tolerate 45% malicious clients in the black-box mode and about 30% in Projected Gradient Descent (PGD) mode. Besides, under adaptive attacks, the results demonstrate that XMAM can still complete the global model training task even when there are 40% malicious clients. Finally, we analyze our method's screening complexity, and the results show that XMAM is about 10-10000 times faster than the existing methods.

Title: Emerging Mobile Phone-based Social Engineering Cyberattacks in the Zambian ICT Sector. (arXiv:2212.13721v1 [cs.CR])

Title: HeATed Alert Triage (HeAT): Transferrable Learning to Extract Multistage Attack Campaigns. (arXiv:2212.13941v1 [cs.CR])

Title: Detection, Explanation and Filtering of Cyber Attacks Combining Symbolic and Sub-Symbolic Methods. (arXiv:2212.13991v1 [cs.CR])

Title: Investigation and rectification of NIDS datasets and standratized feature set derivation for network attack detection with graph neural networks. (arXiv:2212.13994v1 [cs.CR])

Title: EDoG: Adversarial Edge Detection For Graph Neural Networks. (arXiv:2212.13607v1 [cs.LG])

robust

Title: Spacecraft Pose Estimation Based on Unsupervised Domain Adaptation and on a 3D-Guided Loss Combination. (arXiv:2212.13415v1 [cs.CV])

Title: Robust Cross-vendor Mammographic Texture Models Using Augmentation-based Domain Adaptation for Long-term Breast Cancer Risk. (arXiv:2212.13439v1 [cs.CV])

Title: MVTN: Learning Multi-View Transformations for 3D Understanding. (arXiv:2212.13462v1 [cs.CV])

Title: A Clustering-guided Contrastive Fusion for Multi-view Representation Learning. (arXiv:2212.13726v1 [cs.CV])

Title: A Segmentation Method for fluorescence images without a machine learning approach. (arXiv:2212.13945v1 [cs.CV])

Title: Traceable Automatic Feature Transformation via Cascading Actor-Critic Agents. (arXiv:2212.13402v1 [cs.LG])

Title: Optimal algorithms for group distributionally robust optimization and beyond. (arXiv:2212.13669v1 [cs.LG])

biometric

Title: Periocular Biometrics: A Modality for Unconstrained Scenarios. (arXiv:2212.13792v1 [cs.CV])

steal

extraction

Title: Cross-Resolution Flow Propagation for Foveated Video Super-Resolution. (arXiv:2212.13525v1 [cs.CV])

Title: How Do Deepfakes Move? Motion Magnification for Deepfake Source Detection. (arXiv:2212.14033v1 [cs.CV])

Title: Intelligent Feature Extraction, Data Fusion and Detection of Concrete Bridge Cracks: Current Development and Challenges. (arXiv:2212.13258v1 [cs.LG])

Title: A Novel Self-Supervised Learning-Based Anomaly Node Detection Method Based on an Autoencoder in Wireless Sensor Networks. (arXiv:2212.13904v1 [cs.LG])

membership infer

federate

Title: CCFL: Computationally Customized Federated Learning. (arXiv:2212.13679v1 [cs.LG])

fair

interpretability

Title: DeepCuts: Single-Shot Interpretability based Pruning for BERT. (arXiv:2212.13392v1 [cs.CL])

Title: A Survey on Knowledge-Enhanced Pre-trained Language Models. (arXiv:2212.13428v1 [cs.CL])

Title: On the Equivalence of the Weighted Tsetlin Machine and the Perceptron. (arXiv:2212.13634v1 [cs.LG])

explainability

Title: NEEDED: Introducing Hierarchical Transformer to Eye Diseases Diagnosis. (arXiv:2212.13408v1 [cs.CL])

watermark

diffusion

Title: DiffFace: Diffusion-based Face Swapping with Facial Guidance. (arXiv:2212.13344v1 [cs.CV])

Title: Exploring Vision Transformers as Diffusion Learners. (arXiv:2212.13771v1 [cs.CV])