secure

Title: Multi-block MEV. (arXiv:2303.04430v1 [cs.CR])

security

Title: Graph Neural Networks Enhanced Smart Contract Vulnerability Detection of Educational Blockchain. (arXiv:2303.04477v1 [cs.CR])

Title: Automatic verification of transparency protocols (extended version). (arXiv:2303.04500v1 [cs.CR])

With our methodology, it is possible to describe the data type quite abstractly, using ProVerif axioms, and prove the correctness of the protocol using those axioms as assumptions. Then, in separate steps, one can define one or more concrete implementations of the data type, and again use ProVerif to show that the implementations satisfy the assumptions that were coded as axioms. This helps make compositional proofs, splitting the proof burden into several manageable pieces.

To enable this methodology, we introduce new capabilities in ProVerif, by extending the class of lemmas and axioms that it can reason with. Specifically, we allow user-defined predicates, attacker predicates and message predicates to appear in lemmas and axioms. We show the soundness of the implementation of this idea with respect to the semantics.

We illustrate the methodology and features by providing the first formal verification of two transparency protocols which precisely models the Merkle tree data structure. The two protocols are transparent decryption and certificate transparency. Transparent decryption is a way of ensuring that decryption operations are visible by people who are affected by them. This can be used to support privacy: it can mean that a subject is alerted to the fact that information about them has been decrypted. Certificate transparency is an Internet security standard for monitoring and auditing the issuance of digital certificates.

Title: Keystroke Dynamics: Concepts, Techniques, and Applications. (arXiv:2303.04605v1 [cs.CR])

Title: Arion: Arithmetization-Oriented Permutation and Hashing from Generalized Triangular Dynamical Systems. (arXiv:2303.04639v1 [cs.CR])

privacy

Title: CUDA: Convolution-based Unlearnable Datasets. (arXiv:2303.04278v1 [cs.LG])

Title: Privacy-preserving and Uncertainty-aware Federated Trajectory Prediction for Connected Autonomous Vehicles. (arXiv:2303.04340v1 [cs.LG])

Title: Does Synthetic Data Generation of LLMs Help Clinical Text Mining?. (arXiv:2303.04360v1 [cs.CL])

Title: PRIMO: Private Regression in Multiple Outcomes. (arXiv:2303.04195v1 [cs.LG])

Title: adaPARL: Adaptive Privacy-Aware Reinforcement Learning for Sequential-Decision Making Human-in-the-Loop Systems. (arXiv:2303.04257v1 [cs.LG])

Title: Amplitude-Varying Perturbation for Balancing Privacy and Utility in Federated Learning. (arXiv:2303.04274v1 [cs.LG])

Title: Differential Privacy Meets Neural Network Pruning. (arXiv:2303.04612v1 [cs.LG])

Title: Considerations on the Theory of Training Models with Differential Privacy. (arXiv:2303.04676v1 [cs.LG])

protect

defense

Title: Immune Defense: A Novel Adversarial Defense Mechanism for Preventing the Generation of Adversarial Examples. (arXiv:2303.04502v1 [cs.CV])

attack

Title: Patch of Invisibility: Naturalistic Black-Box Adversarial Attacks on Object Detectors. (arXiv:2303.04238v1 [cs.CV])

Title: SALSA PICANTE: a machine learning attack on LWE with binary secrets. (arXiv:2303.04178v1 [cs.CR])

Prior work SALSA [49] demonstrated a new machine learning attack on sparse binary secrets for the LWE problem in small dimensions (up to n = 128) and low Hamming weights (up to h = 4). However, this attack assumed access to millions of LWE samples, and was not scaled to higher Hamming weights or dimensions.

Our attack, PICANTE, reduces the number of samples required to just m = 4n samples. Moreover, it can recover secrets with much larger dimensions (up to 350) and Hamming weights (roughly n/10, or h = 33 for n = 300). To achieve this, we introduce a preprocessing step which allows us to generate the training data from a linear number of samples and changes the distribution of the training data to improve transformer training. We also improve the distinguisher/secret recovery methods of SALSA and introduce a novel cross-attention recovery mechanism which allows us to read-off the secret directly from the trained models.

robust

Title: Robustness-preserving Lifelong Learning via Dataset Condensation. (arXiv:2303.04183v1 [cs.LG])

Title: A Computer Vision Enabled damage detection model with improved YOLOv5 based on Transformer Prediction Head. (arXiv:2303.04275v1 [cs.CV])

Title: Camera-Radar Perception for Autonomous Vehicles and ADAS: Concepts, Datasets and Metrics. (arXiv:2303.04302v1 [cs.CV])

Title: A Threefold Review on Deep Semantic Segmentation: Efficiency-oriented, Temporal and Depth-aware design. (arXiv:2303.04315v1 [cs.CV])

Title: SGDViT: Saliency-Guided Dynamic Vision Transformer for UAV Tracking. (arXiv:2303.04378v1 [cs.CV])

Title: A Light Weight Model for Active Speaker Detection. (arXiv:2303.04439v1 [cs.CV])

Title: DANet: Density Adaptive Convolutional Network with Interactive Attention for 3D Point Clouds. (arXiv:2303.04473v1 [cs.CV])

Title: Exploiting the Textual Potential from Vision-Language Pre-training for Text-based Person Search. (arXiv:2303.04497v1 [cs.CV])

Title: Continuity-Aware Latent Interframe Information Mining for Reliable UAV Tracking. (arXiv:2303.04525v1 [cs.CV])

Title: Robustness Evaluation in Hand Pose Estimation Models using Metamorphic Testing. (arXiv:2303.04566v1 [cs.CV])

Title: POEM: Proof of Entropy Minima. (arXiv:2303.04305v1 [cs.CR])

Title: DR-VIDAL -- Doubly Robust Variational Information-theoretic Deep Adversarial Learning for Counterfactual Prediction and Treatment Effect Estimation on Real World Data. (arXiv:2303.04201v1 [cs.LG])

Title: Soft Actor-Critic Algorithm with Truly Inequality Constraint. (arXiv:2303.04356v1 [cs.LG])

Title: A robust method for reliability updating with equality information using sequential adaptive importance sampling. (arXiv:2303.04545v1 [cs.LG])

Title: Robust Multimodal Fusion for Human Activity Recognition. (arXiv:2303.04636v1 [cs.LG])

Title: Ewald-based Long-Range Message Passing for Molecular Graphs. (arXiv:2303.04791v1 [cs.LG])

biometric

steal

Title: On the Risks of Stealing the Decoding Algorithms of Language Models. (arXiv:2303.04729v1 [cs.LG])

extraction

Title: End-to-end Face-swapping via Adaptive Latent Representation Learning. (arXiv:2303.04186v1 [cs.CV])

Title: Comparing PSDNet, pretrained networks, and traditional feature extraction for predicting the particle size distribution of granular materials from photographs. (arXiv:2303.04265v1 [cs.CV])

Title: PSDNet: Determination of Particle Size Distributions Using Synthetic Soil Images and Convolutional Neural Networks. (arXiv:2303.04269v1 [cs.CV])

Title: Corner Detection Based on Multi-directional Gabor Filters with Multi-scales. (arXiv:2303.04334v1 [cs.CV])

Title: FCN+: Global Receptive Convolution Makes FCN Great Again. (arXiv:2303.04589v1 [cs.CV])

Title: Comprehensive Event Representations using Event Knowledge Graphs and Natural Language Processing. (arXiv:2303.04794v1 [cs.CL])

Title: MEV in fixed gas price blockchains: Terra Classic as a case of study. (arXiv:2303.04242v1 [cs.CR])

membership infer

federate

Title: Federated Learning via Variational Bayesian Inference: Personalization, Sparsity and Clustering. (arXiv:2303.04345v1 [cs.LG])

fair

Title: Causal Dependence Plots for Interpretable Machine Learning. (arXiv:2303.04209v1 [cs.LG])

Title: HappyMap: A Generalized Multi-calibration Method. (arXiv:2303.04379v1 [cs.LG])

Formally, multi-calibration with respect to $\mathcal{C}$ bounds $\big|\mathbb{E}_{(x,y)\sim \mathcal{D}}[c(f(x),x)\cdot(f(x)-y)]\big|$ for all $c \in \mathcal{C}$. In this work, we view the term $(f(x)-y)$ as just one specific mapping, and explore the power of an enriched class of mappings. We propose \textit{HappyMap}, a generalization of multi-calibration, which yields a wide range of new applications, including a new fairness notion for uncertainty quantification (conformal prediction), a novel technique for conformal prediction under covariate shift, and a different approach to analyzing missing data, while also yielding a unified understanding of several existing seemingly disparate algorithmic fairness notions and target-independent learning approaches.

We give a single \textit{HappyMap} meta-algorithm that captures all these results, together with a sufficiency condition for its success.

interpretability

Title: Deep hybrid model with satellite imagery: how to combine demand modeling and computer vision for behavior analysis?. (arXiv:2303.04204v1 [cs.LG])

Title: Learning Hybrid Interpretable Models: Theory, Taxonomy, and Methods. (arXiv:2303.04437v1 [cs.LG])

explainability

Title: SemEval-2023 Task 10: Explainable Detection of Online Sexism. (arXiv:2303.04222v1 [cs.CL])

Title: "How to make them stay?" -- Diverse Counterfactual Explanations of Employee Attrition. (arXiv:2303.04579v1 [cs.LG])

watermark

diffusion

Title: TRACT: Denoising Diffusion Models with Transitive Closure Time-Distillation. (arXiv:2303.04248v1 [cs.LG])

Title: Visual ChatGPT: Talking, Drawing and Editing with Visual Foundation Models. (arXiv:2303.04671v1 [cs.CV])

Title: Video-P2P: Video Editing with Cross-attention Control. (arXiv:2303.04761v1 [cs.CV])

Title: Multilevel Diffusion: Infinite Dimensional Score-Based Diffusion Models for Image Generation. (arXiv:2303.04772v1 [cs.LG])

Title: Open-Vocabulary Panoptic Segmentation with Text-to-Image Diffusion Models. (arXiv:2303.04803v1 [cs.CV])

Title: Diffusing Gaussian Mixtures for Generating Categorical Data. (arXiv:2303.04635v1 [cs.LG])