secure

Title: A survey of Digital Manufacturing Hardware and Software Trojans. (arXiv:2301.10336v1 [cs.CR])

In this work, we thus present a comprehensive overview of the threats posed by Trojans in Digital Manufacturing. We cover both hardware and software Trojans which may exist in products or their production and supply lines. From this, we produce a novel taxonomy for classifying and analyzing these threats, and elaborate on how different side channels (e.g. visual, thermal, acoustic, power, and magnetic) may be used to either enhance the impact of a given Trojan or utilized as part of a defensive strategy. Other defenses are also presented -- including hardware, web-, and software-related. To conclude, we discuss seven different case studies and elaborate how they fit into our taxonomy. Overall, this paper presents a detailed survey of the Trojan landscape for Digital Manufacturing: threats, defenses, and the importance of implementing secure practices.

security

Title: Is This Abstract Generated by AI? A Research for the Gap between AI-generated Scientific Text and Human-written Scientific Text. (arXiv:2301.10416v1 [cs.CL])

Title: Breaking Bad: Quantifying the Addiction of Web Elements to JavaScript. (arXiv:2301.10597v1 [cs.CR])

privacy

Title: Huff-DP: Huffman Coding based Differential Privacy Mechanism for Real-Time Data. (arXiv:2301.10395v1 [cs.CR])

protect

Title: SCANTRAP: Protecting Content Management Systems from Vulnerability Scanners with Cyber Deception and Obfuscation. (arXiv:2301.10502v1 [cs.CR])

defense

Title: BDMMT: Backdoor Sample Detection for Language Models through Model Mutation Testing. (arXiv:2301.10412v1 [cs.CL])

Title: Evaluating Deception and Moving Target Defense with Network Attack Simulation. (arXiv:2301.10629v1 [cs.CR])

attack

Title: A Data-Centric Approach for Improving Adversarial Training Through the Lens of Out-of-Distribution Detection. (arXiv:2301.10454v1 [cs.LG])

robust

Title: Learning Trustworthy Model from Noisy Labels based on Rough Set for Surface Defect Detection. (arXiv:2301.10441v1 [cs.CV])

Title: Connecting metrics for shape-texture knowledge in computer vision. (arXiv:2301.10608v1 [cs.CV])

Title: Out of Distribution Performance of State of Art Vision Model. (arXiv:2301.10750v1 [cs.CV])

Title: On the Adversarial Robustness of Camera-based 3D Object Detection. (arXiv:2301.10766v1 [cs.CV])

Title: Towards Robust Metrics for Concept Representation Evaluation. (arXiv:2301.10367v1 [cs.LG])

Title: Banker Online Mirror Descent: A Universal Approach for Delayed Online Bandit Learning. (arXiv:2301.10500v1 [cs.LG])

biometric

steal

extraction

Title: Few-Shot Learning Enables Population-Scale Analysis of Leaf Traits in Populus trichocarpa. (arXiv:2301.10351v1 [cs.CV])

Title: Local Feature Extraction from Salient Regions by Feature Map Transformation. (arXiv:2301.10413v1 [cs.CV])

membership infer

federate

Title: When to Trust Aggregated Gradients: Addressing Negative Client Sampling in Federated Learning. (arXiv:2301.10400v1 [cs.LG])

Title: Integrating Local Real Data with Global Gradient Prototypes for Classifier Re-Balancing in Federated Long-Tailed Learning. (arXiv:2301.10394v1 [cs.LG])

fair

interpretability

explainability

watermark

diffusion

Title: Score Matching via Differentiable Physics. (arXiv:2301.10250v1 [cs.LG])