secure

Title: Secure synchronization of artificial neural networks used to correct errors in quantum cryptography. (arXiv:2301.11440v1 [cs.CR])

Title: Vulnerablity analysis of Azure Blockchain Workbench key management system. (arXiv:2301.11569v1 [cs.CR])

security

Title: Side Auth: Synthesizing Virtual Sensors for Authentication. (arXiv:2301.11745v1 [cs.CR])

privacy

Title: Universal Domain Adaptation for Remote Sensing Image Scene Classification. (arXiv:2301.11387v1 [cs.CV])

Title: Privacy-Preserving Methods for Outlier-Resistant Average Consensus and Shallow Ranked Vote Leader Election. (arXiv:2301.11882v1 [cs.CR])

With this motivation, we present a solution to privacy-preserving average consensus, where no process can learn the initial value of any other process. Additionally, we augment our approach to provide outlier resistance, where extreme values are not included in the average calculation. Privacy is fully preserved at every stage, including preventing any process from learning the identities of processes that hold outlier values. To our knowledge, this is the first privacy-preserving average consensus algorithm featuring outlier resistance.

In the context of leader election, each process votes for the one that it wants to be the leader. The goal is to ensure that the leader is elected in such a way that each vote remains secret and the sum of votes remain secret during the election. Only the final vote tally is available to all processes. This ensures that processes that vote early are not able to influence the votes of other processes. We augment our approach with shallow ranked voting by allowing processes to not only vote for a single process, but to designate a secondary process to vote towards in the event that their primary vote's candidate does not win the election.

Title: FedHP: Heterogeneous Federated Learning with Privacy-preserving. (arXiv:2301.11705v1 [cs.LG])

protect

Title: Khaos: The Impact of Inter-procedural Code Obfuscation on Binary Diffing Techniques. (arXiv:2301.11586v1 [cs.CR])

In this paper, we propose a new inter-procedural code obfuscation mechanism Khaos, which moves the code across functions to obfuscate the function by using compilation optimizations. Two obfuscation primitives are proposed to separate and aggregate the function, which are called fission and fusion respectively. A prototype of Khaos is implemented based on the LLVM compiler and evaluated on a large number of real-world programs including SPEC CPU 2006 & 2017, CoreUtils, JavaScript engines, etc. Experimental results show that Khaos outperforms existing code obfuscations and can significantly reduce the accuracy rates of five state-of-the-art binary diffing techniques (less than 19%) with lower runtime overhead (less than 7%).

Title: Learning to Unlearn: Instance-wise Unlearning for Pre-trained Classifiers. (arXiv:2301.11578v1 [cs.LG])

defense

Title: Nik Defense: An Artificial Intelligence Based Defense Mechanism against Selfish Mining in Bitcoin. (arXiv:2301.11463v1 [cs.CR])

Title: CAPoW: Context-Aware AI-Assisted Proof of Work based DDoS Defense. (arXiv:2301.11767v1 [cs.CR])

Title: PECAN: A Deterministic Certified Defense Against Backdoor Attacks. (arXiv:2301.11824v1 [cs.CR])

attack

Title: Attacking Important Pixels for Anchor-free Detectors. (arXiv:2301.11457v1 [cs.CV])

Title: PCV: A Point Cloud-Based Network Verifier. (arXiv:2301.11806v1 [cs.CV])

In this project, we describe a point cloud-based network verifier that successfully deals state of the art 3D classifier PointNet verifies the robustness by generating adversarial inputs. We have used extracted properties from the trained PointNet and changed certain factors for perturbation input. We calculate the impact on model accuracy versus property factor and can test PointNet network's robustness against a small collection of perturbing input states resulting from adversarial attacks like the suggested hybrid reverse signed attack. The experimental results reveal that the resilience property of PointNet is affected by our hybrid reverse signed perturbation strategy

Title: RAPTOR: Advanced Persistent Threat Detection in Industrial IoT via Attack Stage Correlation. (arXiv:2301.11524v1 [cs.CR])

Title: Targeted Attacks on Timeseries Forecasting. (arXiv:2301.11544v1 [cs.LG])

Title: Improved Differential-neural Cryptanalysis for Round-reduced Simeck32/64. (arXiv:2301.11601v1 [cs.CR])

Title: Adapting Step-size: A Unified Perspective to Analyze and Improve Gradient-based Methods for Adversarial Attacks. (arXiv:2301.11546v1 [cs.LG])

Title: Certified Invertibility in Neural Networks via Mixed-Integer Programming. (arXiv:2301.11783v1 [cs.LG])

robust

Title: Multimodal Event Transformer for Image-guided Story Ending Generation. (arXiv:2301.11357v1 [cs.CV])

Title: Rethinking 1x1 Convolutions: Can we train CNNs with Frozen Random Filters?. (arXiv:2301.11360v1 [cs.CV])

Title: Revisiting Discriminative Entropy Clustering and its relation to K-means. (arXiv:2301.11405v1 [cs.LG])

Title: Semidefinite Relaxations for Robust Multiview Triangulation. (arXiv:2301.11431v1 [cs.CV])

Title: Robust Transformer with Locality Inductive Bias and Feature Normalization. (arXiv:2301.11553v1 [cs.CV])

Title: Leveraging the Third Dimension in Contrastive Learning. (arXiv:2301.11790v1 [cs.CV])

Title: Neural-Symbolic Inference for Robust Autoregressive Graph Parsing via Compositional Uncertainty Quantification. (arXiv:2301.11459v1 [cs.CL])

Title: Probing Out-of-Distribution Robustness of Language Models with Parameter-Efficient Transfer Learning Methods. (arXiv:2301.11660v1 [cs.CL])

Title: A Robust Optimisation Perspective on Counterexample-Guided Repair of Neural Networks. (arXiv:2301.11342v1 [cs.LG])

Title: Policy Optimization with Robustness Certificates. (arXiv:2301.11374v1 [cs.LG])

Title: MG-GNN: Multigrid Graph Neural Networks for Learning Multilevel Domain Decomposition Methods. (arXiv:2301.11378v1 [cs.LG])

Title: Learning Modulo Theories. (arXiv:2301.11435v1 [cs.LG])

Title: OccRob: Efficient SMT-Based Occlusion Robustness Verification of Deep Neural Networks. (arXiv:2301.11912v1 [cs.LG])

biometric

steal

extraction

Title: Semi-Parametric Video-Grounded Text Generation. (arXiv:2301.11507v1 [cs.CV])

Title: Task formulation for Extracting Social Determinants of Health from Clinical Narratives. (arXiv:2301.11386v1 [cs.CL])

Title: Theme-driven Keyphrase Extraction from Social Media on Opioid Recovery. (arXiv:2301.11508v1 [cs.CL])

Title: Event Causality Extraction with Event Argument Correlations. (arXiv:2301.11621v1 [cs.CL])

Title: Graph Attention with Hierarchies for Multi-hop Question Answering. (arXiv:2301.11792v1 [cs.CL])

Title: Feature space exploration as an alternative for design space exploration beyond the parametric space. (arXiv:2301.11416v1 [cs.LG])

membership infer

federate

Title: Personalised Federated Learning On Heterogeneous Feature Spaces. (arXiv:2301.11447v1 [cs.LG])

fair

Title: Learning Informative Representation for Fairness-aware Multivariate Time-series Forecasting: A Group-based Perspective. (arXiv:2301.11535v1 [cs.LG])

Title: Variance, Self-Consistency, and Arbitrariness in Fair Classification. (arXiv:2301.11562v1 [cs.LG])

Title: Aleatoric and Epistemic Discrimination in Classification. (arXiv:2301.11781v1 [cs.LG])

interpretability

Title: Multi-dimensional concept discovery (MCD): A unifying framework with completeness guarantees. (arXiv:2301.11911v1 [cs.LG])

explainability

watermark

diffusion

Title: 3DShape2VecSet: A 3D Shape Representation for Neural Fields and Generative Diffusion Models. (arXiv:2301.11445v1 [cs.CV])

Title: Accelerating Guided Diffusion Sampling with Splitting Numerical Methods. (arXiv:2301.11558v1 [cs.CV])

Title: Input Perturbation Reduces Exposure Bias in Diffusion Models. (arXiv:2301.11706v1 [cs.LG])

Title: Dual Diffusion Architecture for Fisheye Image Rectification: Synthetic-to-Real Generalization. (arXiv:2301.11785v1 [cs.CV])

Title: Mo\^usai: Text-to-Music Generation with Long-Context Latent Diffusion. (arXiv:2301.11757v1 [cs.CL])

We open-source the following: - Music samples for this paper: https://bit.ly/anonymous-mousai - All music samples for all models: https://bit.ly/audio-diffusion - Codes: https://github.com/archinetai/audio-diffusion-pytorch

Title: PLay: Parametrically Conditioned Layout Generation using Latent Diffusion. (arXiv:2301.11529v1 [cs.LG])

Title: A denoting diffusion model for fluid flow prediction. (arXiv:2301.11661v1 [cs.LG])

Title: Improving deep learning precipitation nowcasting by using prior knowledge. (arXiv:2301.11707v1 [cs.LG])