secure

Title: Secure access system using signature verification over tablet PC. (arXiv:2301.04402v1 [cs.CR])

Title: Managing the Migration to Post-Quantum-Cryptography. (arXiv:2301.04491v1 [cs.CR])

security

Title: User-Centered Security in Natural Language Processing. (arXiv:2301.04230v1 [cs.CL])

Under the proposed framework, we predominantly investigate the use of adversarial attacks on language; i.e., changing a given input (generating adversarial samples) such that a given model does not function as intended. These attacks form a common thread between our user-centered security problems; they are highly relevant for privacy-preserving obfuscation methods against author profiling, and adversarial samples might also prove useful to assess the influence of lexical variation and augmentation on cyberbullying detection.

Title: ML-FEED: Machine Learning Framework for Efficient Exploit Detection (Extended version). (arXiv:2301.04314v1 [cs.CR])

Title: Order-Preserving Database Encryption with Secret Sharing. (arXiv:2301.04370v1 [cs.CR])

Title: Electric Vehicles Security and Privacy: Challenges, Solutions, and Future Needs. (arXiv:2301.04587v1 [cs.CR])

In this paper, we provide the first in-depth study of the security and privacy threats associated with the EVs ecosystem. We analyze the threats associated with both the EV and the different charging solutions. Focusing on the Cyber-Physical Systems (CPS) paradigm, we provide a detailed analysis of all the processes that an attacker might exploit to affect the security and privacy of both drivers and the infrastructure. To address the highlighted threats, we present possible solutions that might be implemented. We also provide an overview of possible future directions to guarantee the security and privacy of the EVs ecosystem. Based on our analysis, we stress the need for EV-specific cybersecurity solutions.

privacy

Title: A Multi-Modal Geographic Pre-Training Method. (arXiv:2301.04283v1 [cs.CL])

protect

Title: CageCoach: Sharing-Oriented Redaction-Capable Distributed Cryptographic File System. (arXiv:2301.04214v1 [cs.CR])

defense

attack

Title: Diffusion Models For Stronger Face Morphing Attacks. (arXiv:2301.04218v1 [cs.CV])

Title: Universal Detection of Backdoor Attacks via Density-based Clustering and Centroids Analysis. (arXiv:2301.04554v1 [cs.CV])

Title: SoK: Adversarial Machine Learning Attacks and Defences in Multi-Agent Reinforcement Learning. (arXiv:2301.04299v1 [cs.LG])

Title: Resynthesis-based Attacks Against Logic Locking. (arXiv:2301.04400v1 [cs.CR])

Title: MVAM: Multi-variant Attacks on Memory for IoT Trust Computing. (arXiv:2301.04591v1 [cs.CR])

Title: Adversarial training with informed data selection. (arXiv:2301.04472v1 [cs.LG])

robust

Title: Robust Human Identity Anonymization using Pose Estimation. (arXiv:2301.04243v1 [cs.CV])

Title: GraVIS: Grouping Augmented Views from Independent Sources for Dermatology Analysis. (arXiv:2301.04410v1 [cs.CV])

Title: How Does Traffic Environment Quantitatively Affect the Autonomous Driving Prediction?. (arXiv:2301.04414v1 [cs.CV])

Title: VS-Net: Multiscale Spatiotemporal Features for Lightweight Video Salient Document Detection. (arXiv:2301.04447v1 [cs.CV])

Title: Street-View Image Generation from a Bird's-Eye View Layout. (arXiv:2301.04634v1 [cs.CV])

Title: Counteracts: Testing Stereotypical Representation in Pre-trained Language Models. (arXiv:2301.04347v1 [cs.CL])

Title: Robust Bayesian Target Value Optimization. (arXiv:2301.04344v1 [cs.LG])

Title: A prediction and behavioural analysis of machine learning methods for modelling travel mode choice. (arXiv:2301.04404v1 [cs.LG])

biometric

steal

extraction

Title: InstaGraM: Instance-level Graph Modeling for Vectorized HD Map Learning. (arXiv:2301.04470v1 [cs.CV])

Title: Elevation Estimation-Driven Building 3D Reconstruction from Single-View Remote Sensing Imagery. (arXiv:2301.04581v1 [cs.CV])

Title: Deep Axial Hypercomplex Networks. (arXiv:2301.04626v1 [cs.CV])

Title: Multilingual Entity and Relation Extraction from Unified to Language-specific Training. (arXiv:2301.04434v1 [cs.CL])

Title: Improving And Analyzing Neural Speaker Embeddings for ASR. (arXiv:2301.04571v1 [cs.CL])

Title: tieval: An Evaluation Framework for Temporal Information Extraction Systems. (arXiv:2301.04643v1 [cs.CL])

membership infer

federate

Title: Federated Learning and Blockchain-enabled Fog-IoT Platform for Wearables in Predictive Healthcare. (arXiv:2301.04511v1 [cs.LG])

Title: Network Adaptive Federated Learning: Congestion and Lossy Compression. (arXiv:2301.04430v1 [cs.LG])

Title: Federated Learning under Heterogeneous and Correlated Client Availability. (arXiv:2301.04632v1 [cs.LG])

fair

interpretability

explainability

watermark

diffusion

Title: Speech Driven Video Editing via an Audio-Conditioned Diffusion Model. (arXiv:2301.04474v1 [cs.CV])