secure

security

Title: Creating awareness about security and safety on highways to mitigate wildlife-vehicle collisions by detecting and recognizing wildlife fences using deep learning and drone technology. (arXiv:2301.07174v1 [cs.CV])

Title: Representing Noisy Image Without Denoising. (arXiv:2301.07409v1 [cs.CV])

Title: A Multi-Scale Framework for Out-of-Distribution Detection in Dermoscopic Images. (arXiv:2301.07533v1 [cs.CV])

Title: How Close is ChatGPT to Human Experts? Comparison Corpus, Evaluation, and Detection. (arXiv:2301.07597v1 [cs.CL])

Title: Are Home Security Systems Reliable?. (arXiv:2301.07202v1 [cs.CR])

Title: Review, Meta-Taxonomy, and Use Cases of Cyberattack Taxonomies of Manufacturing Cybersecurity Threat Attributes and Countermeasures. (arXiv:2301.07303v1 [cs.CR])

Title: Graph-Theoretic Approach for Manufacturing Cybersecurity Risk Modeling and Assessment. (arXiv:2301.07305v1 [cs.CR])

Title: One Size Does not Fit All: Quantifying the Risk of Malicious App Encounters for Different Android User Profiles. (arXiv:2301.07346v1 [cs.CR])

In this work, we perform a large-scale quantitative analysis of the risk of encountering malware and other potentially unwanted applications (PUA) across user communities. At the core of our study is a dataset of app installation logs collected from 12M Android mobile devices. Leveraging user-installed apps, we define intuitive profiles based on users' interests (e.g., gamers and investors), and fit a subset of 5.4M devices to those profiles. Our analysis is structured in three parts. First, we perform risk analysis on the whole population to measure how the risk of malicious app encounters is affected by different factors. Next, we create different profiles to investigate whether risk differences across users may be due to their interests. Finally, we compare a per-profile approach for classifying clean and infected devices with the classical approach that considers the whole population.

We observe that features such as the diversity of the app signers and the use of alternative markets highly correlate with the risk of malicious app encounters. We also discover that some profiles such as gamers and social-media users are exposed to more than twice the risks experienced by the average users. We also show that the classification outcome has a marked accuracy improvement when using a per-profile approach to train the prediction models. Overall, our results confirm the inadequacy of one-size-fits-all protection solutions.

Title: Threats, Vulnerabilities, and Controls of Machine Learning Based Systems: A Survey and Taxonomy. (arXiv:2301.07474v1 [cs.CR])

Title: Universal Neural-Cracking-Machines: Self-Configurable Password Models from Auxiliary Data. (arXiv:2301.07628v1 [cs.CR])

privacy

Title: ACQ: Improving Generative Data-free Quantization Via Attention Correction. (arXiv:2301.07266v1 [cs.CV])

Title: Distributed LSTM-Learning from Differentially Private Label Proportions. (arXiv:2301.07101v1 [cs.LG])

Title: Continuous Trajectory Generation Based on Two-Stage GAN. (arXiv:2301.07103v1 [cs.LG])

Title: Synthcity: facilitating innovative use cases of synthetic data in different data modalities. (arXiv:2301.07573v1 [cs.LG])

protect

Title: Semi-Supervised Semantic Segmentation via Gentle Teaching Assistant. (arXiv:2301.07340v1 [cs.CV])

defense

attack

Title: Face Recognition in the age of CLIP & Billion image datasets. (arXiv:2301.07315v1 [cs.CV])

In this paper, we evaluate the performance of various CLIP models as zero-shot face recognizers. Our findings show that CLIP models perform well on face recognition tasks, but increasing the size of the CLIP model does not necessarily lead to improved accuracy. Additionally, we investigate the robustness of CLIP models against data poisoning attacks by testing their performance on poisoned data. Through this analysis, we aim to understand the potential consequences and misuse of search engines built using CLIP models, which could potentially function as unintentional face recognition engines.

Title: Label Inference Attack against Split Learning under Regression Setting. (arXiv:2301.07284v1 [cs.CR])

Title: Hide and Seek with Spectres: Efficient discovery of speculative information leaks with random testing. (arXiv:2301.07642v1 [cs.CR])

In this paper, we identify the root causes of the performance limitations in existing approaches, and propose techniques to overcome these limitations. With these techniques, we improve the testing speed over the state-of-the-art by up to two orders of magnitude.

These improvements enable us to run a testing campaign of unprecedented depth on Intel and AMD CPUs. As a highlight, we discover two types of previously unknown speculative leaks (affecting string comparison and division) that have escaped previous manual and automatic analyses.

Title: Adversarial AI in Insurance: Pervasiveness and Resilience. (arXiv:2301.07520v1 [cs.LG])

robust

Title: Improve Noise Tolerance of Robust Loss via Noise-Awareness. (arXiv:2301.07306v1 [cs.LG])

Title: Robust Knowledge Adaptation for Federated Unsupervised Person ReID. (arXiv:2301.07320v1 [cs.CV])

Title: CLIPTER: Looking at the Bigger Picture in Scene Text Recognition. (arXiv:2301.07464v1 [cs.CV])

Title: OmniObject3D: Large-Vocabulary 3D Object Dataset for Realistic Perception, Reconstruction and Generation. (arXiv:2301.07525v1 [cs.CV])

Title: Active learning for medical image segmentation with stochastic batches. (arXiv:2301.07670v1 [cs.CV])

Title: Adversarial Robust Deep Reinforcement Learning Requires Redefining Robustness. (arXiv:2301.07487v1 [cs.LG])

Title: A variational autoencoder-based nonnegative matrix factorisation model for deep dictionary learning. (arXiv:2301.07272v1 [cs.LG])

Title: A Robust Classification Framework for Byzantine-Resilient Stochastic Gradient Descent. (arXiv:2301.07498v1 [cs.LG])

biometric

steal

extraction

Title: Gated-ViGAT: Efficient Bottom-Up Event Recognition and Explanation Using a New Frame Selection Policy and Gating Mechanism. (arXiv:2301.07565v1 [cs.CV])

Title: Learning a Formality-Aware Japanese Sentence Representation. (arXiv:2301.07209v1 [cs.CL])

Title: Mortality Prediction with Adaptive Feature Importance Recalibration for Peritoneal Dialysis Patients: a deep-learning-based study on a real-world longitudinal follow-up dataset. (arXiv:2301.07107v1 [cs.LG])

membership infer

federate

Title: Private Federated Submodel Learning via Private Set Union. (arXiv:2301.07686v1 [cs.CR])

fair

interpretability

explainability

Title: TAME: Attention Mechanism Based Feature Fusion for Generating Explanation Maps of Convolutional Neural Networks. (arXiv:2301.07407v1 [cs.CV])

watermark

diffusion

Title: Image Embedding for Denoising Generative Models. (arXiv:2301.07485v1 [cs.CV])

Title: Targeted Image Reconstruction by Sampling Pre-trained Diffusion Model. (arXiv:2301.07557v1 [cs.LG])

Title: Machine learning techniques for the Schizophrenia diagnosis: A comprehensive review and future research directions. (arXiv:2301.07496v1 [cs.LG])