secure

Title: Surveillance Face Anti-spoofing. (arXiv:2301.00975v1 [cs.CV])

Title: Bringing data minimization to digital wallets at scale with general-purpose zero-knowledge proofs. (arXiv:2301.00823v1 [cs.CR])

Title: RSA+: An algorithm at least as secure as RSA. (arXiv:2301.01282v1 [cs.CR])

security

Title: SAFEMYRIDES: Application of Decentralized Control Edge-Computing to Ridesharing Monitoring Services. (arXiv:2301.00888v1 [cs.CR])

Title: Boosting Neural Networks to Decompile Optimized Binaries. (arXiv:2301.00969v1 [cs.LG])

Title: Joint Space-Time Sparsity Based Jamming Detection for Mission-Critical mMTC Networks. (arXiv:2301.01058v1 [cs.CR])

Title: Unlocking Metaverse-as-a-Service The three pillars to watch: Privacy and Security, Edge Computing, and Blockchain. (arXiv:2301.01221v1 [cs.CR])

Title: MERLIN: Multi-agent offline and transfer learning for occupant-centric energy flexible operation of grid-interactive communities using smart meter data and CityLearn. (arXiv:2301.01148v1 [cs.LG])

privacy

Title: Procedural Humans for Computer Vision. (arXiv:2301.01161v1 [cs.CV])

In this report we describe how we construct a parametric model of the face and body, including articulated hands; our rendering pipeline to generate realistic images of humans based on this body model; an approach for training DNNs to regress a dense set of landmarks covering the entire body; and a method for fitting our body model to dense landmarks predicted from multiple views.

Title: Generative appearance replay for continual unsupervised domain adaptation. (arXiv:2301.01211v1 [cs.CV])

Title: Five Common Misconceptions About Privacy-Preserving Internet of Things. (arXiv:2301.00920v1 [cs.CR])

This article refutes five common misconceptions about privacy-preserving IoT concerning data sensing and innovation, regulations, and privacy safeguards. For example, IoT users have a common misconception that no data collection is permitted in data privacy regulations. On the other hand, IoT service providers often think data privacy impedes IoT sensing and innovation. Addressing these misconceptions is essential for making progress in privacy-preserving IoT. This article refutes such common misconceptions using real-world experiments and online survey research. First, the experiments indicate that data privacy should not be perceived as an impediment in IoT but as an opportunity to increase customer retention and trust. Second, privacy-preserving IoT is not exclusively a regulatory problem but also a functional necessity that must be incorporated in the early stages of any IoT design. Third, people do not trust services that lack sufficient privacy measures. Fourth, conventional data security principles do not guarantee data privacy protection, and data privacy can be exposed even if data is securely stored. Fifth, IoT decentralization does not attain absolute privacy preservation.

Title: Recent Trends on Privacy-Preserving Technologies under Standardization at the IETF. (arXiv:2301.01124v1 [cs.CR])

Title: Unlearnable Clusters: Towards Label-agnostic Unlearnable Examples. (arXiv:2301.01217v1 [cs.CR])

Title: On the causality-preservation capabilities of generative modelling. (arXiv:2301.01109v1 [cs.LG])

protect

Title: DGNet: Distribution Guided Efficient Learning for Oil Spill Image Segmentation. (arXiv:2301.01202v1 [cs.CV])

defense

attack

Title: Look, Listen, and Attack: Backdoor Attacks Against Video Action Recognition. (arXiv:2301.00986v1 [cs.CV])

Title: Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence. (arXiv:2301.01218v1 [cs.CR])

Title: Analysis of Label-Flip Poisoning Attack on Machine Learning Based Malware Detector. (arXiv:2301.01044v1 [cs.CR])

Malware detection is arduous due to its malicious nature with the addition of metamorphic and polymorphic ability in the evolving samples. ML has proven to solve the zero-day malware detection problem, which is unresolved by traditional signature-based approaches. The poisoning of malware training data can allow the malware files to go undetected by the ML-based malware detectors, helping the attackers to fulfill their malicious goals. A feasibility analysis of the data poisoning threat in the malware detection domain is still lacking. Our work will focus on two major sections: training ML-based malware detectors and poisoning the training data using the label-poisoning approach. We will analyze the robustness of different machine learning models against data poisoning with varying volumes of poisoning data.

Title: Backdoor Attacks Against Dataset Distillation. (arXiv:2301.01197v1 [cs.CR])

Title: ExploreADV: Towards exploratory attack for Neural Networks. (arXiv:2301.01223v1 [cs.CR])

Title: Automated Black-box Testing of Mass Assignment Vulnerabilities in RESTful APIs. (arXiv:2301.01261v1 [cs.CR])

robust

Title: Efficient Robustness Assessment via Adversarial Spatial-Temporal Focus on Videos. (arXiv:2301.00896v1 [cs.CV])

Title: Benchmarking the Robustness of LiDAR Semantic Segmentation Models. (arXiv:2301.00970v1 [cs.CV])

Title: Asymmetric Co-teaching with Multi-view Consensus for Noisy Label Learning. (arXiv:2301.01143v1 [cs.CV])

Title: Cross Modal Transformer via Coordinates Encoding for 3D Object Dectection. (arXiv:2301.01283v1 [cs.CV])

Title: Robust Average-Reward Markov Decision Processes. (arXiv:2301.00858v1 [cs.LG])

Title: Temporal Difference Learning with Compressed Updates: Error-Feedback meets Reinforcement Learning. (arXiv:2301.00944v1 [cs.LG])

Title: Through-life Monitoring of Resource-constrained Systems and Fleets. (arXiv:2301.01017v1 [cs.LG])

Title: Risk-Averse MDPs under Reward Ambiguity. (arXiv:2301.01045v1 [cs.LG])

biometric

steal

extraction

Title: Uncertainty in Real-Time Semantic Segmentation on Embedded Systems. (arXiv:2301.01201v1 [cs.CV])

Title: ClusTop: An unsupervised and integrated text clustering and topic extraction framework. (arXiv:2301.00818v1 [cs.CL])

Title: PIE-QG: Paraphrased Information Extraction for Unsupervised Question Generation from Small Corpora. (arXiv:2301.01064v1 [cs.CL])

Title: NeuroExplainer: Fine-Grained Attention Decoding to Uncover Cortical Development Patterns of Preterm Infants. (arXiv:2301.00815v1 [cs.LG])

Title: A Concurrent CNN-RNN Approach for Multi-Step Wind Power Forecasting. (arXiv:2301.00819v1 [cs.LG])

Title: Tweet's popularity dynamics. (arXiv:2301.00853v1 [cs.LG])

membership infer

federate

Title: Distributed Machine Learning for UAV Swarms: Computing, Sensing, and Semantics. (arXiv:2301.00912v1 [cs.LG])

Title: Mutual Information Regularization for Vertical Federated Learning. (arXiv:2301.01142v1 [cs.LG])

fair

Title: RELIANT: Fair Knowledge Distillation for Graph Neural Networks. (arXiv:2301.01150v1 [cs.LG])

interpretability

explainability

Title: Explaining Imitation Learning through Frames. (arXiv:2301.01088v1 [cs.LG])

watermark

diffusion

Title: Speed up the inference of diffusion models via shortcut MCMC sampling. (arXiv:2301.01206v1 [cs.CV])

Title: Exploring Complex Dynamical Systems via Nonconvex Optimization. (arXiv:2301.00923v1 [cs.LG])

Title: Meta-learning generalizable dynamics from trajectories. (arXiv:2301.00957v1 [cs.LG])