secure

security

Title: Exploring Depth Information for Face Manipulation Detection. (arXiv:2212.14230v1 [cs.CV])

Title: Hierarchical Forgery Classifier On Multi-modality Face Forgery Clues. (arXiv:2212.14629v1 [cs.CV])

Title: Towards Comprehensively Understanding the Run-time Security of Programmable Logic Controllers: A 3-year Empirical Study. (arXiv:2212.14296v1 [cs.CR])

Title: Security, Privacy and Challenges in Microservices Architecture and Cloud Computing- Survey. (arXiv:2212.14422v1 [cs.CR])

Title: Deep Hierarchy Quantization Compression algorithm based on Dynamic Sampling. (arXiv:2212.14760v1 [cs.LG])

privacy

Title: $\pi$QLB: A Privacy-preserving with Integrity-assuring Query Language for Blockchain. (arXiv:2212.14141v1 [cs.CR])

Title: Estimating Latent Population Flows from Aggregated Data via Inversing Multi-Marginal Optimal Transport. (arXiv:2212.14527v1 [cs.LG])

Title: Learning from Data Streams: An Overview and Update. (arXiv:2212.14720v1 [cs.LG])

protect

Title: Learning Representations for Masked Facial Recovery. (arXiv:2212.14110v1 [cs.CV])

Title: A Learning-Based Optimal Uncertainty Quantification Method and Its Application to Ballistic Impact Problems. (arXiv:2212.14709v1 [cs.LG])

defense

Title: RL and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-day Attacks in IoT. (arXiv:2212.14647v1 [cs.CR])

Title: Adversarial attacks and defenses on ML- and hardware-based IoT device fingerprinting and identification. (arXiv:2212.14677v1 [cs.CR])

attack

Title: Guidance Through Surrogate: Towards a Generic Diagnostic Attack. (arXiv:2212.14875v1 [cs.LG])

Title: Synthesis of Adversarial DDOS Attacks Using Tabular Generative Adversarial Networks. (arXiv:2212.14109v1 [cs.CR])

Title: "Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice. (arXiv:2212.14315v1 [cs.CR])

Motivated by the apparent gap between researchers and practitioners, this position paper aims to bridge the two domains. We first present three real-world case studies from which we can glean practical insights unknown or neglected in research. Next we analyze all adversarial ML papers recently published in top security conferences, highlighting positive trends and blind spots. Finally, we state positions on precise and cost-driven threat modeling, collaboration between industry and academia, and reproducible research. We believe that our positions, if adopted, will increase the real-world impact of future endeavours in adversarial ML, bringing both researchers and practitioners closer to their shared goal of improving the security of ML systems.

Title: Identification and Verification of Attack-Tree Threat Models in Connected Vehicles. (arXiv:2212.14435v1 [cs.CR])

Title: Certifying Safety in Reinforcement Learning under Adversarial Perturbation Attacks. (arXiv:2212.14115v1 [cs.LG])

robust

Title: TAToo: Vision-based Joint Tracking of Anatomy and Tool for Skull-base Surgery. (arXiv:2212.14131v1 [cs.CV])

Title: Practical Exposure Correction: Great Truths Are Always Simple. (arXiv:2212.14245v1 [cs.CV])

Title: Scale-MAE: A Scale-Aware Masked Autoencoder for Multiscale Geospatial Representation Learning. (arXiv:2212.14532v1 [cs.CV])

Title: DRG-Net: Interactive Joint Learning of Multi-lesion Segmentation and Classification for Diabetic Retinopathy Grading. (arXiv:2212.14615v1 [cs.CV])

Title: DGFont++: Robust Deformable Generative Networks for Unsupervised Font Generation. (arXiv:2212.14742v1 [cs.CV])

Title: SE(3)-Equivariant Reconstruction from Light Field. (arXiv:2212.14871v1 [cs.CV])

Title: Differentiable Search of Accurate and Robust Architectures. (arXiv:2212.14049v1 [cs.LG])

Title: Testbed for Functional Safety-Relevant Wireless Communication Based on IO-Link Wireless and 5G. (arXiv:2212.14364v1 [cs.CR])

Title: Robust Ranking Explanations. (arXiv:2212.14106v1 [cs.LG])

Title: Investigating Sindy As a Tool For Causal Discovery In Time Series Signals. (arXiv:2212.14133v1 [cs.LG])

Title: ComplAI: Theory of A Unified Framework for Multi-factor Assessment of Black-Box Supervised Machine Learning Models. (arXiv:2212.14599v1 [cs.LG])

biometric

steal

extraction

Title: A Combined Approach Toward Consistent Reconstructions of Indoor Spaces Based on 6D RGB-D Odometry and KinectFusion. (arXiv:2212.14772v1 [cs.CV])

Title: Sequence Generation with Label Augmentation for Relation Extraction. (arXiv:2212.14266v1 [cs.CL])

Title: Reviewing Labels: Label Graph Network with Top-k Prediction Set for Relation Extraction. (arXiv:2212.14270v1 [cs.CL])

membership infer

federate

Title: Proof of Swarm Based Ensemble Learning for Federated Learning Applications. (arXiv:2212.14050v1 [cs.LG])

Title: Graph Federated Learning for CIoT Devices in Smart Home Applications. (arXiv:2212.14395v1 [cs.LG])

fair

Title: Resolving Task Confusion in Dynamic Expansion Architectures for Class Incremental Learning. (arXiv:2212.14284v1 [cs.CV])

Title: Are Deep Image Embedding Clustering Methods Effective for Heterogeneous Tabular Data?. (arXiv:2212.14111v1 [cs.LG])

Title: Properties of Group Fairness Metrics for Rankings. (arXiv:2212.14351v1 [cs.LG])

Title: Cluster-level Group Representativity Fairness in $k$-means Clustering. (arXiv:2212.14467v1 [cs.LG])

interpretability

Title: Joint Engagement Classification using Video Augmentation Techniques for Multi-person Human-robot Interaction. (arXiv:2212.14128v1 [cs.CV])

Title: Maximizing Use-Case Specificity through Precision Model Tuning. (arXiv:2212.14206v1 [cs.CL])

Title: Mixture of von Mises-Fisher distribution with sparse prototypes. (arXiv:2212.14591v1 [cs.LG])

Title: Risk-Sensitive Policy with Distributional Reinforcement Learning. (arXiv:2212.14743v1 [cs.LG])

Title: On the Interpretability of Attention Networks. (arXiv:2212.14776v1 [cs.LG])

explainability

Title: Black-box language model explanation by context length probing. (arXiv:2212.14815v1 [cs.CL])

watermark

diffusion

Title: Zero-Shot Object Segmentation through Concept Distillation from Generative Image Foundation Models. (arXiv:2212.14306v1 [cs.CV])

Title: Exploring Transformer Backbones for Image Diffusion Models. (arXiv:2212.14678v1 [cs.CV])

Title: Dream3D: Zero-Shot Text-to-3D Synthesis Using 3D Shape Prior and Text-to-Image Diffusion Models. (arXiv:2212.14704v1 [cs.CV])