secure

Title: Earn While You Reveal: Private Set Intersection that Rewards Participants. (arXiv:2301.03889v1 [cs.CR])

Title: IronForge: An Open, Secure, Fair, Decentralized Federated Learning. (arXiv:2301.04006v1 [cs.LG])

security

Title: Network Message Field Type Classification and Recognition for Unknown Binary Protocols. (arXiv:2301.03584v1 [cs.CR])

Title: Refining Network Message Segmentation with Principal Component Analysis. (arXiv:2301.03585v1 [cs.CR])

Title: Fast, Cheap and Good: Lightweight Methods Are Undervalued. (arXiv:2301.03593v1 [cs.CR])

Title: Quantifying User Password Exposure to Third-Party CDNs. (arXiv:2301.03690v1 [cs.CR])

Title: Chatbots in a Honeypot World. (arXiv:2301.03771v1 [cs.CR])

Title: A Practical Runtime Security Policy Transformation Framework for Software Defined Networks. (arXiv:2301.03790v1 [cs.CR])

Title: BLE Protocol in IoT Devices and Smart Wearable Devices: Security and Privacy Threats. (arXiv:2301.03852v1 [cs.CR])

Title: Balanced Datasets for IoT IDS. (arXiv:2301.04008v1 [cs.CR])

privacy

Title: A Privacy Preserving Method with a Random Orthogonal Matrix for ConvMixer Models. (arXiv:2301.03843v1 [cs.CV])

Title: Privacy-Preserving Record Linkage for Cardinality Counting. (arXiv:2301.04000v1 [cs.CR])

Title: Improving unlinkability in C-ITS: a methodology for optimal obfuscation. (arXiv:2301.04130v1 [cs.CR])

protect

defense

Title: On the Susceptibility and Robustness of Time Series Models through Adversarial Attack and Defense. (arXiv:2301.03703v1 [cs.LG])

Title: SoK: Hardware Defenses Against Speculative Execution Attacks. (arXiv:2301.03724v1 [cs.CR])

This paper presents a systematization of the hardware defenses against speculative execution attacks that have been proposed. We show that speculative execution attacks consist of 6 critical attack steps. We propose defense strategies, each of which prevents a critical attack step from happening, thus preventing the attack from succeeding. We then summarize 20 hardware defenses and overhead-reducing features that have been proposed. We show that each defense proposed can be classified under one of our defense strategies, which also explains why it can thwart the attack from succeeding. We discuss the scope of the defenses, their performance overhead, and the security-performance trade-offs that can be made.

attack

Title: AdvBiom: Adversarial Attacks on Biometric Matchers. (arXiv:2301.03966v1 [cs.CV])

Title: RingAuth: Wearable Authentication using a Smart Ring. (arXiv:2301.03594v1 [cs.CR])

Title: White-box Inference Attacks against Centralized Machine Learning and Federated Learning. (arXiv:2301.03595v1 [cs.CR])

Title: Membership Inference Attacks Against Latent Factor Model. (arXiv:2301.03596v1 [cs.CR])

Title: Over-The-Air Adversarial Attacks on Deep Learning Wi-Fi Fingerprinting. (arXiv:2301.03760v1 [cs.CR])

Title: Deep learning approach for interruption attacks detection in LEO satellite networks. (arXiv:2301.03998v1 [cs.CR])

robust

Title: Look Beyond Bias with Entropic Adversarial Data Augmentation. (arXiv:2301.03844v1 [cs.LG])

Title: ROBUSfT: Robust Real-Time Shape-from-Template, a C++ Library. (arXiv:2301.04037v1 [cs.CV])

Title: Benchmarking Robustness in Neural Radiance Fields. (arXiv:2301.04075v1 [cs.CV])

We find that NeRF-based models are significantly degraded in the presence of corruption, and are more sensitive to a different set of corruptions than image recognition models. Furthermore, we analyze the robustness of the feature encoder in generalizable methods, which synthesize images using neural features extracted via convolutional neural networks or transformers, and find that it only contributes marginally to robustness. Finally, we reveal that standard data augmentation techniques, which can significantly improve the robustness of recognition models, do not help the robustness of NeRF-based models. We hope that our findings will attract more researchers to study the robustness of NeRF-based approaches and help to improve their performance in the real world.

Title: Language Models sounds the Death Knell of Knowledge Graphs. (arXiv:2301.03980v1 [cs.CL])

Title: On adversarial robustness and the use of Wasserstein ascent-descent dynamics to enforce it. (arXiv:2301.03662v1 [cs.LG])

Title: On the Robustness of AlphaFold: A COVID-19 Case Study. (arXiv:2301.04093v1 [cs.LG])

biometric

steal

extraction

membership infer

federate

Title: Is Federated Learning a Practical PET Yet?. (arXiv:2301.04017v1 [cs.CR])

Title: Federated Learning for Energy Constrained IoT devices: A systematic mapping study. (arXiv:2301.03720v1 [cs.LG])

fair

Title: Sequential Fair Resource Allocation under a Markov Decision Process Framework. (arXiv:2301.03758v1 [cs.LG])

interpretability

Title: Learning Support and Trivial Prototypes for Interpretable Image Classification. (arXiv:2301.04011v1 [cs.CV])

Title: Differentiable modeling to unify machine learning and physical models and advance Geosciences. (arXiv:2301.04027v1 [cs.LG])

explainability

watermark

diffusion

Title: DiffTalk: Crafting Diffusion Models for Generalized Talking Head Synthesis. (arXiv:2301.03786v1 [cs.CV])

Title: Modiff: Action-Conditioned 3D Motion Generation with Denoising Diffusion Probabilistic Models. (arXiv:2301.03949v1 [cs.CV])