secure

Title: A Comparative Study of Image Disguising Methods for Confidential Outsourced Learning. (arXiv:2301.00252v1 [cs.CR])

Title: Internet of Things: Digital Footprints Carry A Device Identity. (arXiv:2301.00328v1 [cs.LG])

Title: Honeypot Implementation in a Cloud Environment. (arXiv:2301.00710v1 [cs.CR])

security

Title: Tracking Passengers and Baggage Items using Multiple Overhead Cameras at Security Checkpoints. (arXiv:2301.00190v1 [cs.CV])

Title: Deep Learning Technique for Human Parsing: A Survey and Outlook. (arXiv:2301.00394v1 [cs.CV])

Title: The Design Principle of Blockchain: An Initiative for the SoK of SoKs. (arXiv:2301.00479v1 [cs.CR])

Title: Targeted Phishing Campaigns using Large Scale Language Models. (arXiv:2301.00665v1 [cs.CL])

Title: Detecting Forged Kerberos Tickets in an Active Directory Environment. (arXiv:2301.00044v1 [cs.CR])

Title: Knowledge-Based Dataset for Training PE Malware Detection Models. (arXiv:2301.00153v1 [cs.CR])

Title: New Challenges in Reinforcement Learning: A Survey of Security and Privacy. (arXiv:2301.00188v1 [cs.LG])

Title: Deep Correlation-Aware Kernelized Autoencoders for Anomaly Detection in Cybersecurity. (arXiv:2301.00462v1 [cs.LG])

privacy

Title: Skeletal Video Anomaly Detection using Deep Learning: Survey, Challenges and Future Directions. (arXiv:2301.00114v1 [cs.CV])

Title: DensePose From WiFi. (arXiv:2301.00250v1 [cs.CV])

Title: Source-Free Unsupervised Domain Adaptation: A Survey. (arXiv:2301.00265v1 [cs.CV])

Title: Separating Computational and Statistical Differential Privacy (Under Plausible Assumptions). (arXiv:2301.00104v1 [cs.CR])

In this work, we give the first construction of a task achievable with the CDP notion but not the SDP notion. More specifically, under strong but plausible cryptographic assumptions, we construct a task for which there exists an $\varepsilon$-CDP mechanism with $\varepsilon = O(1)$ achieving $1-o(1)$ utility, but any $(\varepsilon, \delta)$-SDP mechanism, including computationally unbounded ones, that achieves a constant utility must use either a super-constant $\varepsilon$ or a non-negligible $\delta$. To prove this, we introduce a new approach for showing that a mechanism satisfies CDP: first we show that a mechanism is "private" against a certain class of decision tree adversaries, and then we use cryptographic constructions to "lift" this into privacy against computational adversaries. We believe this approach could be useful to devise further tasks separating CDP from SDP.

Title: Local Differential Privacy for Sequential Decision Making in a Changing Environment. (arXiv:2301.00561v1 [cs.LG])

Title: Training Differentially Private Graph Neural Networks with Random Walk Sampling. (arXiv:2301.00738v1 [cs.LG])

Title: Generalized PTR: User-Friendly Recipes for Data-Adaptive Algorithms with Differential Privacy. (arXiv:2301.00301v1 [cs.LG])

protect

Title: Mapping smallholder cashew plantations to inform sustainable tree crop expansion in Benin. (arXiv:2301.00363v1 [cs.CV])

Title: Detection of Groups with Biased Representation in Ranking. (arXiv:2301.00719v1 [cs.LG])

In this paper, we study the problem of detecting groups with biased representation in the top-$k$ ranked items, eliminating the need to pre-define protected groups. The number of such groups possible can be exponential, making the problem hard. We propose efficient search algorithms for two different fairness measures: global representation bounds, and proportional representation. Then we propose a method to explain the bias in the representations of groups utilizing the notion of Shapley values. We conclude with an experimental study, showing the scalability of our approach and demonstrating the usefulness of the proposed algorithms.

defense

attack

Title: Generalizable Black-Box Adversarial Attack with Meta Learning. (arXiv:2301.00364v1 [cs.LG])

Title: An Analysis of Honeypots and their Impact as a Cyber Deception Tactic. (arXiv:2301.00045v1 [cs.CR])

Title: TaxIdMA: Towards a Taxonomy for Attacks related to Identities. (arXiv:2301.00443v1 [cs.CR])

Title: An Efficient Hierarchical Kriging Modeling Method for High-dimension Multi-fidelity Problems. (arXiv:2301.00216v1 [cs.LG])

robust

Title: Robust Domain Adaptive Object Detection with Unified Multi-Granularity Alignment. (arXiv:2301.00371v1 [cs.CV])

Title: In Quest of Ground Truth: Learning Confident Models and Estimating Uncertainty in the Presence of Annotator Noise. (arXiv:2301.00524v1 [cs.CV])

We robustly estimate the predictions given only the noisy labels by adding entropy or information-based regularizer to the classifier network. We conduct our experiments on a noisy version of MNIST, CIFAR-10, and FMNIST datasets. Our empirical results demonstrate the robustness of our method as it outperforms or performs comparably to other state-of-the-art (SOTA) methods. In addition, we evaluated the proposed method on the curated dataset, where the noise type and level of various annotators depend on the input image style. We show that our approach performs well and is adept at learning annotators' confusion. Moreover, we demonstrate how our model is more confident in predicting GT than other baselines. Finally, we assess our approach for segmentation problem and showcase its effectiveness with experiments.

Title: Multi-Stage Spatio-Temporal Aggregation Transformer for Video Person Re-identification. (arXiv:2301.00531v1 [cs.CV])

Title: Knockoffs-SPR: Clean Sample Selection in Learning with Noisy Labels. (arXiv:2301.00545v1 [cs.LG])

Title: Analysing Discrete Self Supervised Speech Representation for Spoken Language Modeling. (arXiv:2301.00591v1 [cs.CL])

Title: Active Learning for Neural Machine Translation. (arXiv:2301.00688v1 [cs.CL])

Title: Self-organization Preserved Graph Structure Learning with Principle of Relevant Information. (arXiv:2301.00015v1 [cs.LG])

Title: Robust Consensus Clustering and its Applications for Advertising Forecasting. (arXiv:2301.00717v1 [cs.LG])

biometric

steal

extraction

Title: Attentional Graph Convolutional Network for Structure-aware Audio-Visual Scene Classification. (arXiv:2301.00145v1 [cs.CV])

Title: STEPs: Self-Supervised Key Step Extraction from Unlabeled Procedural Videos. (arXiv:2301.00794v1 [cs.CV])

Title: Floods Relevancy and Identification of Location from Twitter Posts using NLP Techniques. (arXiv:2301.00321v1 [cs.CL])

Title: Modified Query Expansion Through Generative Adversarial Networks for Information Extraction in E-Commerce. (arXiv:2301.00036v1 [cs.LG])

membership infer

federate

Title: Efficient On-device Training via Gradient Filtering. (arXiv:2301.00330v1 [cs.CV])

Title: An Adaptive Kernel Approach to Federated Learning of Heterogeneous Causal Effects. (arXiv:2301.00346v1 [cs.LG])

Title: FedICT: Federated Multi-task Distillation for Multi-access Edge Computing. (arXiv:2301.00389v1 [cs.LG])

Title: Federated Learning with Client-Exclusive Classes. (arXiv:2301.00489v1 [cs.LG])

fair

Title: Political representation bias in DBpedia and Wikidata as a challenge for downstream processing. (arXiv:2301.00671v1 [cs.CL])

interpretability

Title: Second Thoughts are Best: Learning to Re-Align With Human Values from Text Edits. (arXiv:2301.00355v1 [cs.CL])

Title: Tsetlin Machine Embedding: Representing Words Using Logical Expressions. (arXiv:2301.00709v1 [cs.CL])

explainability

Title: A Concept Knowledge Graph for User Next Intent Prediction at Alipay. (arXiv:2301.00503v1 [cs.CL])

Title: GANExplainer: GAN-based Graph Neural Networks Explainer. (arXiv:2301.00012v1 [cs.LG])

watermark

diffusion

Title: Diffusion Model based Semi-supervised Learning on Brain Hemorrhage Images for Efficient Midline Shift Quantification. (arXiv:2301.00409v1 [cs.CV])

Title: Diffusion Probabilistic Models for Scene-Scale 3D Categorical Data. (arXiv:2301.00527v1 [cs.CV])

Title: Muse: Text-To-Image Generation via Masked Generative Transformers. (arXiv:2301.00704v1 [cs.CV])

Title: Conditional Diffusion Based on Discrete Graph Structures for Molecular Graph Generation. (arXiv:2301.00427v1 [cs.LG])