secure

security

Title: Recent Advances in the Internet of Medical Things (IoMT) Systems Security. (arXiv:2302.04439v1 [cs.CR])

Title: Imperceptible Sample-Specific Backdoor to DNN with Denoising Autoencoder. (arXiv:2302.04457v1 [cs.CR])

privacy

Title: Offsite-Tuning: Transfer Learning without Full Model. (arXiv:2302.04870v1 [cs.CL])

Title: Measuring the Privacy Leakage via Graph Reconstruction Attacks on Simplicial Neural Networks (Student Abstract). (arXiv:2302.04373v1 [cs.LG])

Title: Privacy-Preserving Representation Learning for Text-Attributed Networks with Simplicial Complexes. (arXiv:2302.04383v1 [cs.LG])

Title: Practical Privacy Preservation in a Mobile Cloud Environment. (arXiv:2302.04463v1 [cs.CR])

Title: Distributed Learning with Curious and Adversarial Machines. (arXiv:2302.04787v1 [cs.LG])

Title: Pushing the Boundaries of Private, Large-Scale Query Answering. (arXiv:2302.04833v1 [cs.CR])

The first setting is a classic setting in DP literature where all queries are known to the mechanism in advance. Within this setting, we identify challenges in the RAP mechanism's original analysis, then overcome them with an enhanced implementation and analysis. We then extend the capabilities of the RAP mechanism to be able to answer a more general and powerful class of queries (r-of-k thresholds) than previously considered. Empirically evaluating this class, we find that the mechanism is able to answer orders of magnitude larger sets of queries than prior works, and does so quickly and with high utility.

We then define a second setting motivated by real-world considerations and whose definition is inspired by work in the field of machine learning. In this new setting, a mechanism is only given partial knowledge of queries that will be posed in the future, and it is expected to answer these future-posed queries with high utility. We formally define this setting and how to measure a mechanism's utility within it. We then comprehensively empirically evaluate the RAP mechanism's utility within this new setting. From this evaluation, we find that even with weak partial knowledge of the future queries that will be posed, the mechanism is able to efficiently and effectively answer arbitrary queries posed in the future. Taken together, the results from these two settings advance the state of the art on differentially private large-scale query answering.

protect

defense

Title: Mathematical Modeling of Cyber Resilience. (arXiv:2302.04413v1 [cs.CR])

attack

Title: Exploiting Certified Defences to Attack Randomised Smoothing. (arXiv:2302.04379v1 [cs.LG])

Title: Forensic Log Based Detection For Keystroke Injection "BadUsb" Attacks. (arXiv:2302.04541v1 [cs.CR])

Title: SoK: A Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots. (arXiv:2302.04614v1 [cs.CR])

robust

Title: Contour Completion using Deep Structural Priors. (arXiv:2302.04447v1 [cs.CV])

Title: Toward Extremely Lightweight Distracted Driver Recognition With Distillation-Based Neural Architecture Search and Knowledge Transfer. (arXiv:2302.04527v1 [cs.CV])

Title: MAPS: A Noise-Robust Progressive Learning Approach for Source-Free Domain Adaptive Keypoint Detection. (arXiv:2302.04589v1 [cs.CV])

Title: Weakly Supervised Human Skin Segmentation using Guidance Attention Mechanisms. (arXiv:2302.04625v1 [cs.CV])

Title: Real-Time Visual Feedback to Guide Benchmark Creation: A Human-and-Metric-in-the-Loop Workflow. (arXiv:2302.04434v1 [cs.CL])

Title: Data Augmentation for Robust Character Detection in Fantasy Novels. (arXiv:2302.04555v1 [cs.CL])

Title: Robust Question Answering against Distribution Shifts with Test-Time Adaptation: An Empirical Study. (arXiv:2302.04618v1 [cs.CL])

Title: Continuous Learning for Android Malware Detection. (arXiv:2302.04332v1 [cs.CR])

In this paper, we propose new methods to combat the concept drift problem of Android malware classifiers. Since machine learning technique needs to be continuously deployed, we use active learning: we select new samples for analysts to label, and then add the labeled samples to the training set to retrain the classifier. Our key idea is, similarity-based uncertainty is more robust against concept drift. Therefore, we combine contrastive learning with active learning. We propose a new hierarchical contrastive learning scheme, and a new sample selection technique to continuously train the Android malware classifier. Our evaluation shows that this leads to significant improvements, compared to previously published methods for active learning. Our approach reduces the false negative rate from 16% (for the best baseline) to 10%, while maintaining the same false positive rate (0.6%). Also, our approach maintains more consistent performance across a seven-year time period than past methods.

Title: Outlier-Robust Gromov Wasserstein for Graph Data. (arXiv:2302.04610v1 [cs.LG])

Title: Learning Mixtures of Markov Chains with Quality Guarantees. (arXiv:2302.04680v1 [cs.LG])

In this work we contribute to the problem of unmixing Markov chains by highlighting and addressing two important constraints of the GKV-SVD algorithm [GKV16]: some chains in the mixture may not even be weakly connected, and secondly in practice one does not know beforehand the true number of chains. We resolve these issues in the Gupta et al. paper [GKV16]. Specifically, we propose an algebraic criterion that enables us to choose a value of L efficiently that avoids overfitting. Furthermore, we design a reconstruction algorithm that outputs the true mixture in the presence of disconnected chains and is robust to noise. We complement our theoretical results with experiments on both synthetic and real data, where we observe that our method outperforms the GKV-SVD algorithm. Finally, we empirically observe that combining an EM-algorithm with our method performs best in practice, both in terms of reconstruction error with respect to the distribution of 3-trails and the mixture of Markov Chains.

Title: Equivariant MuZero. (arXiv:2302.04798v1 [cs.LG])

Title: Hierarchical Generative Adversarial Imitation Learning with Mid-level Input Generation for Autonomous Driving on Urban Environments. (arXiv:2302.04823v1 [cs.LG])

biometric

steal

extraction

Title: Read and Reap the Rewards: Learning to Play Atari with the Help of Instruction Manuals. (arXiv:2302.04449v1 [cs.LG])

We propose the Read and Reward framework. Read and Reward speeds up RL algorithms on Atari games by reading manuals released by the Atari game developers. Our framework consists of a QA Extraction module that extracts and summarizes relevant information from the manual and a Reasoning module that evaluates object-agent interactions based on information from the manual. Auxiliary reward is then provided to a standard A2C RL agent, when interaction is detected. When assisted by our design, A2C improves on 4 games in the Atari environment with sparse rewards, and requires 1000x less training frames compared to the previous SOTA Agent 57 on Skiing, the hardest game in Atari.

Title: Global Constraints with Prompting for Zero-Shot Event Argument Classification. (arXiv:2302.04459v1 [cs.CL])

Title: Bag of Tricks for Training Data Extraction from Language Models. (arXiv:2302.04460v1 [cs.CL])

Title: Lightweight Transformers for Clinical Natural Language Processing. (arXiv:2302.04725v1 [cs.CL])

Title: Massively Multilingual Language Models for Cross Lingual Fact Extraction from Low Resource Indian Languages. (arXiv:2302.04790v1 [cs.CL])

membership infer

federate

Title: Towards Model-Agnostic Federated Learning over Networks. (arXiv:2302.04363v1 [cs.LG])

Title: Towards Fairer and More Efficient Federated Learning via Multidimensional Personalized Edge Models. (arXiv:2302.04464v1 [cs.LG])

fair

Title: Mitigating Bias in Visual Transformers via Targeted Alignment. (arXiv:2302.04358v1 [cs.CV])

Title: On Fairness and Stability: Is Estimator Variance a Friend or a Foe?. (arXiv:2302.04525v1 [cs.LG])

interpretability

explainability

watermark

diffusion

Title: Q-Diffusion: Quantizing Diffusion Models. (arXiv:2302.04304v1 [cs.CV])

Title: Adversarial Example Does Good: Preventing Painting Imitation from Diffusion Models via Adversarial Examples. (arXiv:2302.04578v1 [cs.CV])

Title: Better Diffusion Models Further Improve Adversarial Training. (arXiv:2302.04638v1 [cs.CV])

Title: Is This Loss Informative? Speeding Up Textual Inversion with Deterministic Objective Evaluation. (arXiv:2302.04841v1 [cs.CV])

Title: UniPC: A Unified Predictor-Corrector Framework for Fast Sampling of Diffusion Models. (arXiv:2302.04867v1 [cs.LG])

Title: MedDiff: Generating Electronic Health Records using Accelerated Denoising Diffusion Model. (arXiv:2302.04355v1 [cs.LG])

Title: Geometry-Complete Diffusion for 3D Molecule Generation. (arXiv:2302.04313v1 [cs.LG])

Title: Geometry of Score Based Generative Models. (arXiv:2302.04411v1 [cs.LG])

Title: Generalization in Graph Neural Networks: Improved PAC-Bayesian Bounds on Graph Diffusion. (arXiv:2302.04451v1 [cs.LG])