secure

Title: Ancilia: Scalable Intelligent Video Surveillance for the Artificial Intelligence of Things. (arXiv:2301.03561v1 [cs.CV])

Title: A Lightweight Blockchain and Fog-enabled Secure Remote Patient Monitoring System. (arXiv:2301.03551v1 [cs.CR])

security

Title: DRL-GAN: A Hybrid Approach for Binary and Multiclass Network Intrusion Detection. (arXiv:2301.03368v1 [cs.CR])

privacy

Title: STPrivacy: Spatio-Temporal Tubelet Sparsification and Anonymization for Privacy-preserving Action Recognition. (arXiv:2301.03046v1 [cs.CV])

Title: Negative Results of Fusing Code and Documentation for Learning to Accurately Identify Sensitive Source and Sink Methods An Application to the Android Framework for Data Leak Detection. (arXiv:2301.03207v1 [cs.CR])

Researchers have proposed sophisticated approaches to track sensitive data within mobile apps, all of which rely on specific lists of sensitive source and sink API methods. The data flow analysis results greatly depend on these lists' quality. Previous approaches either used incomplete hand-written lists that quickly became outdated or relied on machine learning. The latter, however, leads to numerous false positives, as we show.

This paper introduces CoDoC, a tool that aims to revive the machine-learning approach to precisely identify privacy-related source and sink API methods. In contrast to previous approaches, CoDoC uses deep learning techniques and combines the source code with the documentation of API methods. Firstly, we propose novel definitions that clarify the concepts of sensitive source and sink methods. Secondly, based on these definitions, we build a new ground truth of Android methods representing sensitive source, sink, and neither (i.e., no source or sink) methods that will be used to train our classifier.

We evaluate CoDoC and show that, on our validation dataset, it achieves a precision, recall, and F1 score of 91% in 10-fold cross-validation, outperforming the state-of-the-art SuSi when used on the same dataset. However, similarly to existing tools, we show that in the wild, i.e., with unseen data, CoDoC performs poorly and generates many false positive results. Our findings, together with time-tested results of previous approaches, suggest that machine-learning models for abstract concepts such as privacy fail in practice despite good lab results.

Title: k-Means SubClustering: A Differentially Private Algorithm with Improved Clustering Quality. (arXiv:2301.02896v1 [cs.LG])

protect

Title: SFP: Providing System Call Flow Protection against Software and Fault Attacks. (arXiv:2301.02915v1 [cs.CR])

In this work, we present SFP, a mechanism to protect the execution of system calls against software and fault attacks providing integrity to user-kernel transitions. SFP provides system call flow integrity by a two-step linking approach, which links the system call and its origin to the state of control-flow integrity. A second linking step within the kernel ensures that the right system call is executed in the kernel. Combining both linking steps ensures that only the correct system call is executed at the right location in the program and cannot be skipped. Furthermore, SFP provides dynamic CFI instrumentation and a new CFI checking policy at the edge of the kernel to verify the control-flow state of user programs before entering the kernel. We integrated SFP into FIPAC, a CFI protection scheme exploiting ARM pointer authentication. Our prototype is based on a custom LLVM-based toolchain with an instrumented runtime library combined with a custom Linux kernel to protect system calls. The evaluation of micro- and macrobenchmarks based on SPEC 2017 show an average runtime overhead of 1.9 % and 20.6 %, which is only an increase of 1.8 % over plain control-flow protection. This small impact on the performance shows the efficiency of SFP for protecting all system calls and providing integrity for the user-kernel transitions.

defense

Title: Deepfake CAPTCHA: A Method for Preventing Fake Calls. (arXiv:2301.03064v1 [cs.CR])

In this paper, we propose D-CAPTCHA: an active defense against real-time deepfakes. The approach is to force the adversary into the spotlight by challenging the deepfake model to generate content which exceeds its capabilities. By doing so, passive detection becomes easier since the content will be distorted. In contrast to existing CAPTCHAs, we challenge the AI's ability to create content as opposed to its ability to classify content. In this work we focus on real-time audio deepfakes and present preliminary results on video.

In our evaluation we found that D-CAPTCHA outperforms state-of-the-art audio deepfake detectors with an accuracy of 91-100% depending on the challenge (compared to 71% without challenges). We also performed a study on 41 volunteers to understand how threatening current real-time deepfake attacks are. We found that the majority of the volunteers could not tell the difference between real and fake audio.

Title: In Defense of Structural Symbolic Representation for Video Event-Relation Prediction. (arXiv:2301.03410v1 [cs.CV])

However, the state-of-the-art video event-relation prediction system shows the necessity of using continuous feature vectors from input videos; existing methods based solely on SSR inputs fail completely, event when given oracle event types and argument roles. In this paper, we conduct an extensive empirical analysis to answer the following questions: 1) why SSR-based method failed; 2) how to understand the evaluation setting of video event relation prediction properly; 3) how to uncover the potential of SSR-based methods. We first identify the failure of previous SSR-based video event prediction models to be caused by sub-optimal training settings. Surprisingly, we find that a simple SSR-based model with tuned hyperparameters can actually yield a 20\% absolute improvement in macro-accuracy over the state-of-the-art model. Then through qualitative and quantitative analysis, we show how evaluation that takes only video as inputs is currently unfeasible, and the reliance on oracle event information to obtain an accurate evaluation. Based on these findings, we propose to further contextualize the SSR-based model to an Event-Sequence Model and equip it with more factual knowledge through a simple yet effective way of reformulating external visual commonsense knowledge bases into an event-relation prediction pretraining dataset. The resultant new state-of-the-art model eventually establishes a 25\% Macro-accuracy performance boost.

attack

Title: RobArch: Designing Robust Architectures against Adversarial Attacks. (arXiv:2301.03110v1 [cs.CV])

Title: A Continent-Wide Assessment of Cyber Vulnerability Across Africa. (arXiv:2301.03008v1 [cs.CR])

Title: Facial Misrecognition Systems: Simple Weight Manipulations Force DNNs to Err Only on Specific Persons. (arXiv:2301.03118v1 [cs.CR])

We have experimentally verified the attacks on a FaceNet-based facial recognition system, which achieves SOTA accuracy on the standard LFW dataset of $99.35\%$. When we tried to individually anonymize ten celebrities, the network failed to recognize two of their images as being the same person in $96.97\%$ to $98.29\%$ of the time. When we tried to confuse between the extremely different looking Morgan Freeman and Scarlett Johansson, for example, their images were declared to be the same person in $91.51 \%$ of the time. For each type of backdoor, we sequentially installed multiple backdoors with minimal effect on the performance of each one (for example, anonymizing all ten celebrities on the same model reduced the success rate for each celebrity by no more than $0.91\%$). In all of our experiments, the benign accuracy of the network on other persons was degraded by no more than $0.48\%$ (and in most cases, it remained above $99.30\%$).

Title: Efficient Attack Detection in IoT Devices using Feature Engineering-Less Machine Learning. (arXiv:2301.03532v1 [cs.CR])

robust

Title: Multiclass Semantic Segmentation to Identify Anatomical Sub-Regions of Brain and Measure Neuronal Health in Parkinson's Disease. (arXiv:2301.02925v1 [cs.CV])

Title: DeepMatcher: A Deep Transformer-based Network for Robust and Accurate Local Feature Matching. (arXiv:2301.02993v1 [cs.CV])

Title: Equivalence of Two Expressions of Principal Line. (arXiv:2301.03039v1 [cs.CV])

Title: Learning the Relation between Similarity Loss and Clustering Loss in Self-Supervised Learning. (arXiv:2301.03041v1 [cs.CV])

Title: Cursive Caption Text Detection in Videos. (arXiv:2301.03164v1 [cs.CV])

Title: Few-shot Semantic Segmentation with Support-induced Graph Convolutional Network. (arXiv:2301.03194v1 [cs.CV])

Title: HyRSM++: Hybrid Relation Guided Temporal Set Matching for Few-shot Action Recognition. (arXiv:2301.03330v1 [cs.CV])

Title: REaaS: Enabling Adversarially Robust Downstream Classifiers via Robust Encoder as a Service. (arXiv:2301.02905v1 [cs.CR])

What APIs should the cloud service provide, such that a client can use any certification method to certify the robustness of its downstream classifier against adversarial examples while minimizing the number of queries to the APIs? How can a service provider pre-train an encoder such that clients can build more certifiably robust downstream classifiers? We aim to answer the two questions in this work. For the first question, we show that the cloud service only needs to provide two APIs, which we carefully design, to enable a client to certify the robustness of its downstream classifier with a minimal number of queries to the APIs. For the second question, we show that an encoder pre-trained using a spectral-norm regularization term enables clients to build more robust downstream classifiers.

Title: Reducing Over-smoothing in Graph Neural Networks Using Relational Embeddings. (arXiv:2301.02924v1 [cs.LG])

Title: AI Maintenance: A Robustness Perspective. (arXiv:2301.03052v1 [cs.LG])

Title: BQ-NCO: Bisimulation Quotienting for Generalizable Neural Combinatorial Optimization. (arXiv:2301.03313v1 [cs.LG])

Title: Topologically Regularized Data Embeddings. (arXiv:2301.03338v1 [cs.LG])

biometric

Title: Advancing 3D finger knuckle recognition via deep feature learning. (arXiv:2301.02934v1 [cs.CV])

Title: Seamless Multimodal Biometrics for Continuous Personalised Wellbeing Monitoring. (arXiv:2301.03045v1 [cs.CV])

steal

extraction

Title: Lightweight Salient Object Detection in Optical Remote Sensing Images via Semantic Matching and Edge Alignment. (arXiv:2301.02778v1 [cs.CV])

Title: CGI-Stereo: Accurate and Real-Time Stereo Matching via Context and Geometry Interaction. (arXiv:2301.02789v1 [cs.CV])

Title: HRTransNet: HRFormer-Driven Two-Modality Salient Object Detection. (arXiv:2301.03036v1 [cs.CV])

Title: Instance Segmentation Based Graph Extraction for Handwritten Circuit Diagram Images. (arXiv:2301.03155v1 [cs.CV])

Title: Structure-Informed Shadow Removal Networks. (arXiv:2301.03182v1 [cs.CV])

Title: A Specific Task-oriented Semantic Image Communication System for substation patrol inspection. (arXiv:2301.03331v1 [cs.CV])

Title: Removing Non-Stationary Knowledge From Pre-Trained Language Models for Entity-Level Sentiment Classification in Finance. (arXiv:2301.03136v1 [cs.CL])

Title: Active Learning for Abstractive Text Summarization. (arXiv:2301.03252v1 [cs.CL])

Title: Universal Information Extraction as Unified Semantic Matching. (arXiv:2301.03282v1 [cs.CL])

Title: Modeling Label Semantics Improves Activity Recognition. (arXiv:2301.03462v1 [cs.LG])

membership infer

federate

Title: Why Batch Normalization Damage Federated Learning on Non-IID Data?. (arXiv:2301.02982v1 [cs.LG])

Title: AnycostFL: Efficient On-Demand Federated Learning over Heterogeneous Edge Devices. (arXiv:2301.03062v1 [cs.LG])

fair

Title: Fair Multi-Exit Framework for Facial Attribute Classification. (arXiv:2301.02989v1 [cs.CV])

Title: A review of clustering models in educational data science towards fairness-aware learning. (arXiv:2301.03421v1 [cs.LG])

interpretability

Title: Grokking modular arithmetic. (arXiv:2301.02679v1 [cs.LG])

explainability

Title: AI2: The next leap toward native language based and explainable machine learning framework. (arXiv:2301.03391v1 [cs.LG])

Title: Explaining Graph Neural Networks via Non-parametric Subgraph Matching. (arXiv:2301.02780v1 [cs.LG])

Title: XDQN: Inherently Interpretable DQN through Mimicking. (arXiv:2301.03043v1 [cs.LG])

watermark

diffusion

Title: Diffused Heads: Diffusion Models Beat GANs on Talking-Face Generation. (arXiv:2301.03396v1 [cs.CV])

Title: Generative Time Series Forecasting with Diffusion, Denoise, and Disentanglement. (arXiv:2301.03028v1 [cs.LG])