secure

Title: Blockchain-based certificate authentication system with enabling correction. (arXiv:2302.03877v1 [cs.CR])

Title: COCOAEXPO: Confidential Containers via Attested Execution Policies. (arXiv:2302.03976v1 [cs.CR])

We propose COCOAEXPO, an architecture that provides lift-and-shift deployment of unmodified containers while providing strong security protection against a powerful attacker who controls the untrusted host and hypervisor. COCOAEXPO leverages VM-level isolation to execute a container group within a unique VM-based TEE. Besides container integrity and user data confidentiality and integrity, COCOAEXPO also offers container attestation and execution integrity based on an attested execution policy. COCOAEXPO execution policies provide an inductive proof over all future states of the container group. This proof, which is established during initialization, forms a root of trust that can be used for secure operations within the container group without requiring any modifications of the containerized workflow itself (aside from the inclusion of the execution policy.)

We evaluate COCOAEXPO on AMD SEV-SNP processors by running a diverse set of workloads demonstrating that workflows exhibit 0-26% additional overhead in performance over running outside the enclave, with a mean 13% overhead on SPEC2017, while requiring no modifications to their program code. Adding execution policies introduces less than 1% additional overhead.

Title: Structural hierarchical learning for energy networks. (arXiv:2302.03978v1 [cs.LG])

security

Title: Systematically Finding Security Vulnerabilities in Black-Box Code Generation Models. (arXiv:2302.04012v1 [cs.CR])

In this work, we propose the first approach to automatically finding security vulnerabilities in black-box code generation models. To achieve this, we propose a novel black-box inversion approach based on few-shot prompting. We evaluate the effectiveness of our approach by examining code generation models in the generation of high-risk security weaknesses. We show that our approach automatically and systematically finds 1000s of security vulnerabilities in various code generation models, including the commercial black-box model GitHub Copilot.

privacy

Title: Geometric Perception based Efficient Text Recognition. (arXiv:2302.03873v1 [cs.CV])

Title: A prototype-oriented clustering for domain shift with source privacy. (arXiv:2302.03807v1 [cs.LG])

Title: DIFF2: Differential Private Optimization via Gradient Differences for Nonconvex Distributed Learning. (arXiv:2302.03884v1 [cs.LG])

Title: AVeCQ: Anonymous Verifiable Crowdsourcing with Worker Qualities. (arXiv:2302.03941v1 [cs.CR])

Title: Participatory Systems for Personalized Prediction. (arXiv:2302.03874v1 [cs.LG])

Title: InMyFace: Inertial and Mechanomyography-Based Sensor Fusion for Wearable Facial Activity Recognition. (arXiv:2302.04024v1 [cs.LG])

Title: Machine Learning for Synthetic Data Generation: a Review. (arXiv:2302.04062v1 [cs.LG])

Title: Exploratory Analysis of Federated Learning Methods with Differential Privacy on MIMIC-III. (arXiv:2302.04208v1 [cs.LG])

Methods: We present an extensive evaluation of the impact of different federation and differential privacy techniques when training models on the open-source MIMIC-III dataset. We analyze a set of parameters influencing a federated model performance, namely data distribution (homogeneous and heterogeneous), communication strategies (communication rounds vs. local training epochs), federation strategies (FedAvg vs. FedProx). Furthermore, we assess and compare two differential privacy (DP) techniques during model training: a stochastic gradient descent-based differential privacy algorithm (DP-SGD), and a sparse vector differential privacy technique (DP-SVT).

Results: Our experiments show that extreme data distributions across sites (imbalance either in the number of patients or the positive label ratios between sites) lead to a deterioration of model performance when trained using the FedAvg strategy. This issue is resolved when using FedProx with the use of appropriate hyperparameter tuning. Furthermore, the results show that both differential privacy techniques can reach model performances similar to those of models trained without DP, however at the expense of a large quantifiable privacy leakage.

Conclusions: We evaluate empirically the benefits of two federation strategies and propose optimal strategies for the choice of parameters when using differential privacy techniques.

protect

Title: GLAZE: Protecting Artists from Style Mimicry by Text-to-Image Models. (arXiv:2302.04222v1 [cs.CR])

defense

attack

Title: Training-free Lexical Backdoor Attacks on Language Models. (arXiv:2302.04116v1 [cs.CR])

Title: Short Squeeze in DeFi Lending Market: Decentralization in Jeopardy?. (arXiv:2302.04068v1 [cs.CR])

In this work, we analyze Avi Eisenberg's actions and show how he was able to artificially lower the price of CRV by selling large quantities of borrowed CRV for stablecoins on both decentralized and centralized exchanges. Despite the failure of his attack, it still led to approximately 1.6 Mio USD of irretrievable debt and, thereby, quadrupled the protocol's irretrievable debt. Furthermore, we highlight that his attack was enabled by the vast proportion of CRV available to borrow as well as AAVE's lending protocol design hindering rapid intervention. We stress Eisenberg's attack exposes a predicament of large DeFi lending protocols: limit the scope or compromise on `decentralization'.

Title: Explainable Label-flipping Attacks on Human Emotion Assessment System. (arXiv:2302.04109v1 [cs.LG])

robust

Title: 3D Neural Embedding Likelihood for Robust Sim-to-Real Transfer in Inverse Graphics. (arXiv:2302.03744v1 [cs.CV])

Title: Standing Between Past and Future: Spatio-Temporal Modeling for Multi-Camera 3D Multi-Object Tracking. (arXiv:2302.03802v1 [cs.CV])

Title: A Unified Multi-view Multi-person Tracking Framework. (arXiv:2302.03820v1 [cs.CV])

Title: Neural Congealing: Aligning Images to a Joint Semantic Atlas. (arXiv:2302.03956v1 [cs.CV])

Title: PFGM++: Unlocking the Potential of Physics-Inspired Generative Models. (arXiv:2302.04265v1 [cs.LG])

Title: Augmenting Zero-Shot Dense Retrievers with Plug-in Mixture-of-Memories. (arXiv:2302.03754v1 [cs.CL])

Title: Transformer-based Models for Long-Form Document Matching: Challenges and Empirical Analysis. (arXiv:2302.03765v1 [cs.CL])

Title: Efficient Adversarial Contrastive Learning via Robustness-Aware Coreset Selection. (arXiv:2302.03857v1 [cs.LG])

Title: Leveraging User-Triggered Supervision in Contextual Bandits. (arXiv:2302.03784v1 [cs.LG])

Title: Modified Policy Iteration for Exponential Cost Risk Sensitive MDPs. (arXiv:2302.03811v1 [cs.LG])

Title: Decentralized Riemannian Algorithm for Nonconvex Minimax Problems. (arXiv:2302.03825v1 [cs.LG])

Title: Topological Deep Learning: A Review of an Emerging Paradigm. (arXiv:2302.03836v1 [cs.LG])

Title: Predictable MDP Abstraction for Unsupervised Model-Based RL. (arXiv:2302.03921v1 [cs.LG])

Title: Fortuna: A Library for Uncertainty Quantification in Deep Learning. (arXiv:2302.04019v1 [cs.LG])

Title: WAT: Improve the Worst-class Robustness in Adversarial Training. (arXiv:2302.04025v1 [cs.LG])

Title: Probabilistic Attention based on Gaussian Processes for Deep Multiple Instance Learning. (arXiv:2302.04061v1 [cs.LG])

Title: Robustness to Spurious Correlations Improves Semantic Out-of-Distribution Detection. (arXiv:2302.04132v1 [cs.LG])

biometric

steal

extraction

Title: Multi-view Feature Extraction based on Dual Contrastive Head. (arXiv:2302.03932v1 [cs.CV])

Title: A Systematic Performance Analysis of Deep Perceptual Loss Networks Breaks Transfer Learning Conventions. (arXiv:2302.04032v1 [cs.CV])

This work aims to rectify this by systematically evaluating a host of commonly used and readily available, pretrained networks for a number of different feature extraction points on four existing use cases of deep perceptual loss. The four use cases are implementations of previous works where the selected networks and extraction points are evaluated instead of the networks and extraction points used in the original work. The experimental tasks are dimensionality reduction, image segmentation, super-resolution, and perceptual similarity. The performance on these four tasks, attributes of the networks, and extraction points are then used as a basis for an in-depth analysis. This analysis uncovers essential information regarding which architectures provide superior performance for deep perceptual loss and how to choose an appropriate extraction point for a particular task and dataset. Furthermore, the work discusses the implications of the results for deep perceptual loss and the broader field of transfer learning. The results break commonly held assumptions in transfer learning, which imply that deep perceptual loss deviates from most transfer learning settings or that these assumptions need a thorough re-evaluation.

Title: Efficient Joint Learning for Clinical Named Entity Recognition and Relation Extraction Using Fourier Networks: A Use Case in Adverse Drug Events. (arXiv:2302.04185v1 [cs.CL])

membership infer

federate

Title: Multi-site Organ Segmentation with Federated Partial Supervision and Site Adaptation. (arXiv:2302.03911v1 [cs.CV])

Title: Improving the Model Consistency of Decentralized Federated Learning. (arXiv:2302.04083v1 [cs.LG])

Title: Federated Learning as Variational Inference: A Scalable Expectation Propagation Approach. (arXiv:2302.04228v1 [cs.LG])

Title: Federated Minimax Optimization with Client Heterogeneity. (arXiv:2302.04249v1 [cs.LG])

fair

Title: Fairness in Matching under Uncertainty. (arXiv:2302.03810v1 [cs.LG])

Title: On Generalized Degree Fairness in Graph Neural Networks. (arXiv:2302.03881v1 [cs.LG])

Title: On the Richness of Calibration. (arXiv:2302.04118v1 [cs.LG])

interpretability

explainability

Title: KENGIC: KEyword-driven and N-Gram Graph based Image Captioning. (arXiv:2302.03729v1 [cs.CV])

watermark

diffusion

Title: Zero-shot Generation of Coherent Storybook from Plain Text Story using Diffusion Models. (arXiv:2302.03900v1 [cs.CV])

Title: Analyzing the Performance of Deep Encoder-Decoder Networks as Surrogates for a Diffusion Equation. (arXiv:2302.03786v1 [cs.LG])

Title: GraphGUIDE: interpretable and controllable conditional graph generation with discrete Bernoulli diffusion. (arXiv:2302.03790v1 [cs.LG])

Title: Information-Theoretic Diffusion. (arXiv:2302.03792v1 [cs.LG])