secure

Title: Privacy Preserving Ultra-Short-term Wind Power Prediction Based on Secure Multi Party Computation. (arXiv:2301.13513v1 [cs.CR])

security

Title: A Survey on Digital Twins: Architecture, Enabling Technologies, Security and Privacy, and Future Prospects. (arXiv:2301.13350v1 [cs.CR])

Title: MOAT: Towards Safe BPF Kernel Extension. (arXiv:2301.13421v1 [cs.CR])

Title: Machine Learning and Port Scans: A Systematic Review. (arXiv:2301.13581v1 [cs.CR])

Title: HoRStify: Sound Security Analysis of Smart Contracts. (arXiv:2301.13769v1 [cs.CR])

privacy

Title: GaitSADA: Self-Aligned Domain Adaptation for mmWave Gait Recognition. (arXiv:2301.13384v1 [cs.CV])

Title: Contrast and Clustering: Learning Neighborhood Pair Representation for Source-free Domain Adaptation. (arXiv:2301.13428v1 [cs.CV])

Title: The Fair Value of Data Under Heterogeneous Privacy Constraints. (arXiv:2301.13336v1 [cs.LG])

Title: Tight Data Access Bounds for Private Top-$k$ Selection. (arXiv:2301.13347v1 [cs.CR])

Title: Privacy-Preserving Online Sharing Charging Pile Scheme with Different Needs Matching. (arXiv:2301.13511v1 [cs.CR])

Title: Differentially Private Kernel Inducing Points (DP-KIP) for Privacy-preserving Data Distillation. (arXiv:2301.13389v1 [cs.LG])

Title: A Bayesian Generative Adversarial Network (GAN) to Generate Synthetic Time-Series Data, Application in Combined Sewer Flow Prediction. (arXiv:2301.13733v1 [cs.LG])

protect

defense

Title: Image Shortcut Squeezing: Countering Perturbative Availability Poisons with Compression. (arXiv:2301.13838v1 [cs.CR])

Title: Are Defenses for Graph Neural Networks Robust?. (arXiv:2301.13694v1 [cs.LG])

attack

Title: Inference Time Evidences of Adversarial Attacks for Forensic on Transformers. (arXiv:2301.13356v1 [cs.CV])

Title: Adversarial Training of Self-supervised Monocular Depth Estimation against Physical-World Attacks. (arXiv:2301.13487v1 [cs.CV])

Title: Salient Conditional Diffusion for Defending Against Backdoor Attacks. (arXiv:2301.13862v1 [cs.LG])

Title: DRAINCLoG: Detecting Rogue Accounts with Illegally-obtained NFTs using Classifiers Learned on Graphs. (arXiv:2301.13577v1 [cs.CR])

In this paper, we present the first study on trading behavior of NFT drainers and present the first dedicated NFT drainer detection system. We extract data of 83M NFT transactions from the Ethereum blockchain and collect 742 drainer accounts from five sources. We find drainers have significantly different transaction context and social context compared to regular users. With the insights gained from our analysis, we design an automatic drainer detection system, DRAINCLoG, that uses graph neural networks to capture the complex relationships in the NFT ecosystem. Our model effectively captures NFT transaction contexts and social contexts using an NFT-User graph and a User graph, respectively. Evaluated on real-world NFT transaction data, we prove the model's effectiveness and robustness.

Title: Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow Interaction Graph Analysis. (arXiv:2301.13686v1 [cs.CR])

Title: EC-CFI: Control-Flow Integrity via Code Encryption Counteracting Fault Attacks. (arXiv:2301.13760v1 [cs.CR])

In this paper, we present EC-CFI, a software-based cryptographically enforced CFI scheme with no detection latency utilizing hardware features of recent Intel platforms. Our EC-CFI prototype is designed to prevent an adversary from escaping the program's call graph using faults by encrypting each function with a different key before execution. At runtime, the instrumented program dynamically derives the decryption key, ensuring that the code only can be successfully decrypted when the program follows the intended call graph. To enable this level of protection on Intel commodity systems, we introduce extended page table (EPT) aliasing allowing us to achieve function-granular encryption by combing Intel's TME-MK and virtualization technology. We open-source our custom LLVM-based toolchain automatically protecting arbitrary programs with EC-CFI. Furthermore, we evaluate our EPT aliasing approach with the SPEC CPU2017 and Embench-IoT benchmarks and discuss and evaluate potential TME-MK hardware changes minimizing runtime overheads.

Title: Affinity Uncertainty-based Hard Negative Mining in Graph Contrastive Learning. (arXiv:2301.13340v1 [cs.LG])

robust

Title: DAFD: Domain Adaptation via Feature Disentanglement for Image Classification. (arXiv:2301.13337v1 [cs.CV])

Title: Few-Shot Object Detection via Variational Feature Aggregation. (arXiv:2301.13411v1 [cs.CV])

Title: Fourier Sensitivity and Regularization of Computer Vision Models. (arXiv:2301.13514v1 [cs.CV])

Title: A Survey and Benchmark of Automatic Surface Reconstruction from Point Clouds. (arXiv:2301.13656v1 [cs.CV])

Title: ZhichunRoad at Amazon KDD Cup 2022: MultiTask Pre-Training for E-Commerce Product Search. (arXiv:2301.13455v1 [cs.CL])

Title: TopoBERT: Plug and Play Toponym Recognition Module Harnessing Fine-tuned BERT. (arXiv:2301.13631v1 [cs.CL])

Title: Dynamic Scheduled Sampling with Imitation Loss for Neural Text Generation. (arXiv:2301.13753v1 [cs.CL])

Title: Near Optimal Private and Robust Linear Regression. (arXiv:2301.13273v1 [cs.LG])

Title: Probabilistic Neural Data Fusion for Learning from an Arbitrary Number of Multi-fidelity Data Sets. (arXiv:2301.13271v1 [cs.LG])

Title: Incorporating Recurrent Reinforcement Learning into Model Predictive Control for Adaptive Control in Autonomous Driving. (arXiv:2301.13313v1 [cs.LG])

Title: A Framework for Adapting Offline Algorithms to Solve Combinatorial Multi-Armed Bandit Problems with Bandit Feedback. (arXiv:2301.13326v1 [cs.LG])

To demonstrate the utility of the proposed framework, the proposed framework is applied to multiple problems in submodular maximization, adapting approximation algorithms for cardinality and for knapsack constraints. The new CMAB algorithms for knapsack constraints outperform a full-bandit method developed for the adversarial setting in experiments with real-world data.

Title: Optimal Transport Perturbations for Safe Reinforcement Learning with Robustness Guarantees. (arXiv:2301.13375v1 [cs.LG])

Title: Sequential Strategic Screening. (arXiv:2301.13397v1 [cs.LG])

We show that sequential screening pipelines exhibit new and surprising behavior where individuals can exploit the sequential ordering of the tests to zig-zag between classifiers without having to simultaneously satisfy all of them. We demonstrate an individual can obtain a positive outcome using a limited manipulation budget even when far from the intersection of the positive regions of every classifier. Finally, we consider a learner whose goal is to design a sequential screening process that is robust to such manipulations, and provide a construction for the learner that optimizes a natural objective.

Title: Learning Against Distributional Uncertainty: On the Trade-off Between Robustness and Specificity. (arXiv:2301.13565v1 [cs.LG])

Title: Policy Gradient for s-Rectangular Robust Markov Decision Processes. (arXiv:2301.13589v1 [cs.LG])

Title: An Efficient Solution to s-Rectangular Robust Markov Decision Processes. (arXiv:2301.13642v1 [cs.LG])

Title: Enhancing Hyper-To-Real Space Projections Through Euclidean Norm Meta-Heuristic Optimization. (arXiv:2301.13671v1 [cs.LG])

Title: Toward Efficient Gradient-Based Value Estimation. (arXiv:2301.13757v1 [cs.LG])

Title: Interpreting Robustness Proofs of Deep Neural Networks. (arXiv:2301.13845v1 [cs.LG])

biometric

steal

extraction

Title: [Work in progress] Scalable, out-of-the box segmentation of individual particles from mineral samples acquired with micro CT. (arXiv:2301.13319v1 [cs.CV])

Title: Anomaly Segmentation for High-Resolution Remote Sensing Images Based on Pixel Descriptors. (arXiv:2301.13422v1 [cs.CV])

Title: Lidar Upsampling with Sliced Wasserstein Distance. (arXiv:2301.13558v1 [cs.CV])

Title: Sifer: Overcoming simplicity bias in deep networks using a feature sieve. (arXiv:2301.13293v1 [cs.LG])

membership infer

federate

fair

Title: Fairness-aware Vision Transformer via Debiased Self-Attention. (arXiv:2301.13803v1 [cs.CV])

Title: Do Multi-Document Summarization Models Synthesize?. (arXiv:2301.13844v1 [cs.CL])

In this paper we ask: To what extent do modern multi-document summarization models implicitly perform this type of synthesis? To assess this we perform a suite of experiments that probe the degree to which conditional generation models trained for summarization using standard methods yield outputs that appropriately synthesize inputs. We find that existing models do partially perform synthesis, but do so imperfectly. In particular, they are over-sensitive to changes in input ordering and under-sensitive to changes in input compositions (e.g., the ratio of positive to negative movie reviews). We propose a simple, general method for improving model synthesis capabilities by generating an explicitly diverse set of candidate outputs, and then selecting from these the string best aligned with the expected aggregate measure for the inputs, or \emph{abstaining} when the model produces no good candidate. This approach improves model synthesis performance. We hope highlighting the need for synthesis (in some summarization settings), motivates further research into multi-document summarization methods and learning objectives that explicitly account for the need to synthesize.

Title: Fairness and Accuracy under Domain Generalization. (arXiv:2301.13323v1 [cs.LG])

Title: Superhuman Fairness. (arXiv:2301.13420v1 [cs.LG])

Title: Retiring $\Delta$DP: New Distribution-Level Metrics for Demographic Parity. (arXiv:2301.13443v1 [cs.LG])

interpretability

Title: Few-Shot Image-to-Semantics Translation for Policy Transfer in Reinforcement Learning. (arXiv:2301.13343v1 [cs.LG])

explainability

Title: ChatGPT or Human? Detect and Explain. Explaining Decisions of Machine Learning Model for Detecting Short ChatGPT-generated Text. (arXiv:2301.13852v1 [cs.CL])

watermark

diffusion

Title: Zero3D: Semantic-Driven Multi-Category 3D Shape Generation. (arXiv:2301.13591v1 [cs.CV])

Title: Learning Data Representations with Joint Diffusion Models. (arXiv:2301.13622v1 [cs.LG])

Title: DisDiff: Unsupervised Disentanglement of Diffusion Probabilistic Models. (arXiv:2301.13721v1 [cs.CV])

Title: Zero-shot-Learning Cross-Modality Data Translation Through Mutual Information Guided Stochastic Diffusion. (arXiv:2301.13743v1 [cs.CV])

Title: Attend-and-Excite: Attention-Based Semantic Guidance for Text-to-Image Diffusion Models. (arXiv:2301.13826v1 [cs.CV])

Title: Optimizing DDPM Sampling with Shortcut Fine-Tuning. (arXiv:2301.13362v1 [cs.LG])

Title: DiffSTG: Probabilistic Spatio-Temporal Graph Forecasting with Denoising Diffusion Models. (arXiv:2301.13629v1 [cs.LG])

Title: Transport with Support: Data-Conditional Diffusion Bridges. (arXiv:2301.13636v1 [cs.LG])