secure

Title: Practically Efficient Secure Computation of Rank-based Statistics Over Distributed Datasets. (arXiv:2302.08121v1 [cs.CR])

security

Title: A cloud-based deep learning system for improving crowd safety at event entrances. (arXiv:2302.08237v1 [cs.LG])

Title: AI Security Threats against Pervasive Robotic Systems: A Course for Next Generation Cybersecurity Workforce. (arXiv:2302.07953v1 [cs.CR])

Title: How Effective is Multiple-Vantage-Point Domain Control Validation?. (arXiv:2302.08000v1 [cs.CR])

Title: HE-MAN -- Homomorphically Encrypted MAchine learning with oNnx models. (arXiv:2302.08260v1 [cs.CR])

We introduce HE-MAN, an open-source two-party machine learning toolset for privacy preserving inference with ONNX models and homomorphically encrypted data. Both the model and the input data do not have to be disclosed. HE-MAN abstracts cryptographic details away from the users, thus expertise in FHE is not required for either party. HE-MAN 's security relies on its underlying FHE schemes. For now, we integrate two different homomorphic encryption schemes, namely Concrete and TenSEAL. Compared to prior work, HE-MAN supports a broad range of ML models in ONNX format out of the box without sacrificing accuracy. We evaluate the performance of our implementation on different network architectures classifying handwritten digits and performing face recognition and report accuracy and latency of the homomorphically encrypted inference. Cryptographic parameters are automatically derived by the tools. We show that the accuracy of HE-MAN is on par with models using plaintext input while inference latency is several orders of magnitude higher compared to the plaintext case.

Title: Towards a Unified Cybersecurity Testing Lab for Satellite, Aerospace, Avionics, Maritime, Drone (SAAMD) technologies and communications. (arXiv:2302.08359v1 [cs.CR])

In this paper, we introduce and motivate our "Unified Cybersecurity Testing Lab for Satellite, Aerospace, Avionics, Maritime, Drone (SAAMD)" technologies and communications, as well as some peer-reviewed results and evaluation of the targeted threat vectors. We show via referenced peer-reviewed works that the current modules of the lab were successfully used to realistically attack and analyze air-traffic control, radar, communication, and software technologies such as ADS-B, AIS, ACARS, EFB, EPIRB and COSPAS-SARSAT. We are currently developing and integrating support for additional technologies (e.g., CCSDS, FLARM), and we plan future extensions on our own as well as in collaboration with research and industry. Our "Unified Cybersecurity Testing Lab" is open for use, experimentation, and collaboration with other researchers, contributors and interested parties.

Title: Cybersecurity of COSPAS-SARSAT and EPIRB: threat and attacker models, exploits, future research. (arXiv:2302.08361v1 [cs.CR])

In this paper, we investigate the cybersecurity aspects of COSPAS-SARSAT space-/satellite-based systems. In particular, we practically and successfully implement and demonstrate the first (to our knowledge) attacks on COSPAS-SARSAT 406 MHz protocols, namely replay, spoofing, and protocol fuzzing on EPIRB protocols. We also identify a set of core research challenges preventing more effective cybersecurity research in the field and outline the main cybersecurity weaknesses and possible mitigations to increase the system's cybersecurity level.

privacy

Title: Evaluating Trade-offs in Computer Vision Between Attribute Privacy, Fairness and Utility. (arXiv:2302.07917v1 [cs.CV])

Title: Efficiency 360: Efficient Vision Transformers. (arXiv:2302.08374v1 [cs.CV])

Title: Tight Auditing of Differentially Private Machine Learning. (arXiv:2302.07956v1 [cs.LG])

This work addresses both issues. We design an improved auditing scheme that yields tight privacy estimates for natural (not adversarially crafted) datasets -- if the adversary can see all model updates during training. Prior auditing works rely on the same assumption, which is permitted under the standard differential privacy threat model. This threat model is also applicable, e.g., in federated learning settings. Moreover, our auditing scheme requires only two training runs (instead of thousands) to produce tight privacy estimates, by adapting recent advances in tight composition theorems for differential privacy. We demonstrate the utility of our improved auditing schemes by surfacing implementation bugs in private machine learning code that eluded prior auditing techniques.

Title: Multi-Task Differential Privacy Under Distribution Skew. (arXiv:2302.07975v1 [cs.LG])

We give a systematic analysis of the problem, by studying how to optimally allocate a user's privacy budget among tasks. We propose a generic algorithm, based on an adaptive reweighting of the empirical loss, and show that when there is task distribution skew, this gives a quantifiable improvement of excess empirical risk.

Experimental studies on recommendation problems that exhibit a long tail of small tasks, demonstrate that our methods significantly improve utility, achieving the state of the art on two standard benchmarks.

Title: Vector-based Efficient Data Hiding in Encrypted Images via Multi-MSB Replacement. (arXiv:2302.07992v1 [cs.CR])

Title: Balancing Privacy Protection and Interpretability in Federated Learning. (arXiv:2302.08044v1 [cs.LG])

protect

defense

attack

Title: Masking and Mixing Adversarial Training. (arXiv:2302.08066v1 [cs.CV])

Title: Introduction to Presentation Attacks in Signature Biometrics and Recent Advances. (arXiv:2302.08320v1 [cs.CV])

Title: An Experimentation Infrastructure for Quantitative Measurements of Cyber Resilience. (arXiv:2302.07941v1 [cs.CR])

Title: Correlation-Aware Neural Networks for DDoS Attack Detection In IoT Systems. (arXiv:2302.07982v1 [cs.CR])

Title: Marich: A Query-efficient Distributionally Equivalent Model Extraction Attack using Public Data. (arXiv:2302.08466v1 [cs.LG])

Title: On the Effect of Adversarial Training Against Invariance-based Adversarial Examples. (arXiv:2302.08257v1 [cs.LG])

We show that when adversarial training with invariance-based and perturbation-based adversarial examples is applied, it should be conducted simultaneously and not consecutively. This procedure can achieve relatively high robustness against both types of adversarial examples. Additionally, we find that the algorithm used for generating invariance-based adversarial examples in prior work does not correctly determine the labels and therefore we use human-determined labels.

robust

Title: Topological Neural Discrete Representation Learning `a la Kohonen. (arXiv:2302.07950v1 [cs.LG])

Title: Vision-Based Terrain Relative Navigation on High-Altitude Balloon and Sub-Orbital Rocket. (arXiv:2302.08011v1 [cs.CV])

Title: Learning Non-Local Spatial-Angular Correlation for Light Field Image Super-Resolution. (arXiv:2302.08058v1 [cs.CV])

Title: WHC: Weighted Hybrid Criterion for Filter Pruning on Convolutional Neural Networks. (arXiv:2302.08185v1 [cs.CV])

Title: Learning Thin-Plate Spline Motion and Seamless Composition for Parallax-Tolerant Unsupervised Deep Image Stitching. (arXiv:2302.08207v1 [cs.CV])

Title: Robust Human Motion Forecasting using Transformer-based Model. (arXiv:2302.08274v1 [cs.CV])

Title: Tragic and Comical Networks. Clustering Dramatic Genres According to Structural Properties. (arXiv:2302.08258v1 [cs.CL])

Title: LEALLA: Learning Lightweight Language-agnostic Sentence Embeddings with Knowledge Distillation. (arXiv:2302.08387v1 [cs.CL])

Title: Auditing large language models: a three-layered approach. (arXiv:2302.08500v1 [cs.CL])

Title: Robust Mid-Pass Filtering Graph Convolutional Networks. (arXiv:2302.08048v1 [cs.LG])

Title: Graph Adversarial Immunization for Certifiable Robustness. (arXiv:2302.08051v1 [cs.LG])

Title: A Meta-Learning Approach to Population-Based Modelling of Structures. (arXiv:2302.07980v1 [cs.LG])

Title: cGAN-Based High Dimensional IMU Sensor Data Generation for Therapeutic Activities. (arXiv:2302.07998v1 [cs.LG])

Title: A Bayesian Perspective for Determinant Minimization Based Robust Structured Matrix Factorizatio. (arXiv:2302.08416v1 [cs.LG])

Title: Hardware-aware training for large-scale and diverse deep learning inference workloads using in-memory computing-based accelerators. (arXiv:2302.08469v1 [cs.LG])

biometric

steal

extraction

Title: COVID-VTS: Fact Extraction and Verification on Short Video Platforms. (arXiv:2302.07919v1 [cs.CV])

Title: Deep Multi-stream Network for Video-based Calving Sign Detection. (arXiv:2302.08493v1 [cs.CV])

Title: A Survey on Event-based News Narrative Extraction. (arXiv:2302.08351v1 [cs.CL])

Title: A method for incremental discovery of financial event types based on anomaly detection. (arXiv:2302.08205v1 [cs.LG])

membership infer

federate

fair

Title: Individual Fairness Guarantee in Learning with Censorship. (arXiv:2302.08015v1 [cs.LG])

Title: Preventing Discriminatory Decision-making in Evolving Data Streams. (arXiv:2302.08017v1 [cs.LG])

Title: Group Fairness with Uncertainty in Sensitive Attributes. (arXiv:2302.08077v1 [cs.LG])

Title: Counterfactual Fair Opportunity: Measuring Decision Model Fairness with Counterfactual Reasoning. (arXiv:2302.08158v1 [cs.LG])

Title: Counterfactual Reasoning for Bias Evaluation and Detection in a Fairness under Unawareness setting. (arXiv:2302.08204v1 [cs.LG])

Title: Entity Aware Modelling: A Survey. (arXiv:2302.08406v1 [cs.LG])

Title: The Scope of Multicalibration: Characterizing Multicalibration via Property Elicitation. (arXiv:2302.08507v1 [cs.LG])

On the negative side, we show that for non-elicitable continuous properties there exist simple data distributions on which even the true distributional predictor is not calibrated. On the positive side, for elicitable $\Gamma$, we give simple canonical algorithms for the batch and the online adversarial setting, that learn a $\Gamma$-multicalibrated predictor. This generalizes past work on multicalibrated means and quantiles, and in fact strengthens existing online quantile multicalibration results.

To further counter-weigh our negative result, we show that if a property $\Gamma^1$ is not elicitable by itself, but is elicitable conditionally on another elicitable property $\Gamma^0$, then there is a canonical algorithm that jointly multicalibrates $\Gamma^1$ and $\Gamma^0$; this generalizes past work on mean-moment multicalibration.

Finally, as applications of our theory, we provide novel algorithmic and impossibility results for fair (multicalibrated) risk assessment.

interpretability

Title: Fuzzy Knowledge Distillation from High-Order TSK to Low-Order TSK. (arXiv:2302.08038v1 [cs.LG])

Title: Frugal day-ahead forecasting of multiple local electricity loads by aggregating adaptive models. (arXiv:2302.08192v1 [cs.LG])

Title: Knowledge-augmented Graph Machine Learning for Drug Discovery: A Survey from Precision to Interpretability. (arXiv:2302.08261v1 [cs.LG])

explainability

Title: The Inadequacy of Shapley Values for Explainability. (arXiv:2302.08160v1 [cs.LG])

watermark

diffusion

Title: Effective Data Augmentation With Diffusion Models. (arXiv:2302.07944v1 [cs.CV])

Title: PRedItOR: Text Guided Image Editing with Diffusion Prior. (arXiv:2302.07979v1 [cs.CV])

Title: MultiDiffusion: Fusing Diffusion Paths for Controlled Image Generation. (arXiv:2302.08113v1 [cs.CV])

Title: Boundary Guided Mixing Trajectory for Semantic Control with Diffusion Models. (arXiv:2302.08357v1 [cs.CV])

Title: Explicit Diffusion of Gaussian Mixture Model Based Image Priors. (arXiv:2302.08411v1 [cs.CV])

Title: T2I-Adapter: Learning Adapters to Dig out More Controllable Ability for Text-to-Image Diffusion Models. (arXiv:2302.08453v1 [cs.CV])

Title: Text-driven Visual Synthesis with Latent Diffusion Prior. (arXiv:2302.08510v1 [cs.CV])

Title: Understanding the Distillation Process from Deep Generative Models to Tractable Probabilistic Circuits. (arXiv:2302.08086v1 [cs.LG])

Title: DIFUSCO: Graph-based Diffusion Solvers for Combinatorial Optimization. (arXiv:2302.08224v1 [cs.LG])