secure

Title: Light Weight Cryptographic Address Generation Using System State Entropy Gathering for IPv6 Based MANETs. (arXiv:2303.17914v1 [cs.CR])

Title: MARTSIA: Enabling Data Confidentiality for Blockchain-based Process Execution. (arXiv:2303.17977v1 [cs.CR])

Title: Towards A Sustainable and Ethical Supply Chain Management: The Potential of IoT Solutions. (arXiv:2303.18135v1 [cs.CR])

security

Title: Benchmarking FedAvg and FedCurv for Image Classification Tasks. (arXiv:2303.17942v1 [cs.LG])

Title: AdvCheck: Characterizing Adversarial Examples via Local Gradient Checking. (arXiv:2303.18131v1 [cs.CR])

Title: A Comparative Analysis on Volatility and Scalability Properties of Blockchain Compression Protocols. (arXiv:2303.17643v1 [cs.CR])

Title: Pentimento: Data Remanence in Cloud FPGAs. (arXiv:2303.17881v1 [cs.CR])

This technique allows an attacker to ascertain previously safe information on cloud FPGAs, even after it is no longer explicitly present. Notably, it can allow an attacker who knows a non-secret "skeleton" (the physical structure, but not the contents) of the victim's design to (1) extract proprietary details from an encrypted FPGA design image available on the AWS marketplace and (2) recover data loaded at runtime by a previous user of a cloud FPGA using a known design. Our experiments show that BTI degradation (burn-in) and recovery are measurable and constitute a security threat to commercial cloud FPGAs.

Title: Machine learning for discovering laws of nature. (arXiv:2303.17607v1 [cs.LG])

privacy

Title: SOSR: Source-Free Image Super-Resolution with Wavelet Augmentation Transformer. (arXiv:2303.17783v1 [cs.CV])

Title: Automatic Detection of Out-of-body Frames in Surgical Videos for Privacy Protection Using Self-supervised Learning and Minimal Labels. (arXiv:2303.18106v1 [cs.CV])

Title: A CI-based Auditing Framework for Data Collection Practices. (arXiv:2303.17740v1 [cs.CR])

Title: On R\'{e}nyi Differential Privacy in Statistics-Based Synthetic Data Generation. (arXiv:2303.17849v1 [cs.CR])

Title: Differentially Private Stream Processing at Scale. (arXiv:2303.18086v1 [cs.CR])

Towards designing DP-SQLP we make both algorithmic and systemic advances, namely, we (i) design a novel DP key selection algorithm that can operate on an unbounded set of possible keys, and can scale to one billion keys that users have contributed, (ii) design a preemptive execution scheme for DP key selection that avoids enumerating all the keys at each triggering time, and (iii) use algorithmic techniques from DP continual observation to release a continual DP histogram of user contributions to different keys over the stream length. We empirically demonstrate the efficacy by obtaining at least $16\times$ reduction in error over meaningful baselines we consider.

Title: PADME-SoSci: A Platform for Analytics and Distributed Machine Learning for the Social Sciences. (arXiv:2303.18200v1 [cs.CR])

protect

Title: A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks. (arXiv:2303.18132v1 [cs.CR])

Title: BERT4ETH: A Pre-trained Transformer for Ethereum Fraud Detection. (arXiv:2303.18138v1 [cs.CR])

Title: Robust and IP-Protecting Vertical Federated Learning against Unexpected Quitting of Parties. (arXiv:2303.18178v1 [cs.CR])

defense

attack

Title: Fooling Polarization-based Vision using Locally Controllable Polarizing Projection. (arXiv:2303.17890v1 [cs.CV])

Title: The Blockchain Imitation Game. (arXiv:2303.17877v1 [cs.CR])

Shedding light on such "copy-paste" malpractice, this paper introduces the Blockchain Imitation Game and proposes a generalized imitation attack methodology called Ape. Leveraging dynamic program analysis techniques, Ape supports the automatic synthesis of adversarial smart contracts. Over a timeframe of one year (1st of August, 2021 to 31st of July, 2022), Ape could have yielded 148.96M USD in profit on Ethereum, and 42.70M USD on BNB Smart Chain (BSC).

Not only as a malicious attack, we further show the potential of transaction and contract imitation as a defensive strategy. Within one year, we find that Ape could have successfully imitated 13 and 22 known Decentralized Finance (DeFi) attacks on Ethereum and BSC, respectively. Our findings suggest that blockchain validators can imitate attacks in real-time to prevent intrusions in DeFi.

Title: Machine-learned Adversarial Attacks against Fault Prediction Systems in Smart Electrical Grids. (arXiv:2303.18136v1 [cs.CR])

robust

Title: Establishing baselines and introducing TernaryMixOE for fine-grained out-of-distribution detection. (arXiv:2303.17658v1 [cs.CV])

Title: Learning Garment DensePose for Robust Warping in Virtual Try-On. (arXiv:2303.17688v1 [cs.CV])

Title: Generating Adversarial Samples in Mini-Batches May Be Detrimental To Adversarial Robustness. (arXiv:2303.17720v1 [cs.LG])

Title: Shepherding Slots to Objects: Towards Stable and Robust Object-Centric Learning. (arXiv:2303.17842v1 [cs.CV])

Title: WSense: A Robust Feature Learning Module for Lightweight Human Activity Recognition. (arXiv:2303.17845v1 [cs.CV])

Title: MapFormer: Boosting Change Detection by Using Pre-change Information. (arXiv:2303.17859v1 [cs.CV])

Title: STFAR: Improving Object Detection Robustness at Test-Time by Self-Training with Feature Alignment Regularization. (arXiv:2303.17937v1 [cs.CV])

Title: RDMNet: Reliable Dense Matching Based Point Cloud Registration for Autonomous Driving. (arXiv:2303.18084v1 [cs.CV])

Title: Markerless 3D human pose tracking through multiple cameras and AI: Enabling high accuracy, robustness, and real-time performance. (arXiv:2303.18119v1 [cs.CV])

Title: Towards Nonlinear-Motion-Aware and Occlusion-Robust Rolling Shutter Correction. (arXiv:2303.18125v1 [cs.CV])

Title: Diff-ID: An Explainable Identity Difference Quantification Framework for DeepFake Detection. (arXiv:2303.18174v1 [cs.CV])

Title: DIME-FM: DIstilling Multimodal and Efficient Foundation Models. (arXiv:2303.18232v1 [cs.CV])

Title: Exploiting Multilingualism in Low-resource Neural Machine Translation via Adversarial Learning. (arXiv:2303.18011v1 [cs.CL])

Title: Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency. (arXiv:2303.18191v1 [cs.CR])

Title: Towards Adversarially Robust Continual Learning. (arXiv:2303.17764v1 [cs.LG])

Title: Conflict-Averse Gradient Optimization of Ensembles for Effective Offline Model-Based Optimization. (arXiv:2303.17934v1 [cs.LG])

In this work, we explore alternate approaches for combining gradient information from the ensemble that are robust to distribution shift without compromising optimality of the produced designs. More specifically, we explore two functions, formulated as convex optimization problems, for combining gradient information: multiple gradient descent algorithm (MGDA) and conflict-averse gradient descent (CAGrad). We evaluate these algorithms on a diverse set of five computational design tasks. We compare performance of ensemble MBO with MGDA and ensemble MBO with CAGrad with three naive baseline algorithms: (a) standard single-model MBO, (b) ensemble MBO with mean gradient, and (c) ensemble MBO with minimum gradient.

Our results suggest that MGDA and CAGrad strike a desirable balance between conservatism and optimality and can help robustify data-driven offline MBO without compromising optimality of designs.

Title: Deep neural operator for learning transient response of interpenetrating phase composites subject to dynamic loading. (arXiv:2303.18055v1 [cs.LG])

Title: Analysis and Comparison of Two-Level KFAC Methods for Training Deep Neural Networks. (arXiv:2303.18083v1 [cs.LG])

biometric

steal

extraction

Title: Knowledge Distillation for Feature Extraction in Underwater VSLAM. (arXiv:2303.17981v1 [cs.CV])

Title: Task Oriented Conversational Modelling With Subjective Knowledge. (arXiv:2303.17695v1 [cs.CL])

Title: Evaluation of GPT and BERT-based models on identifying protein-protein interactions in biomedical text. (arXiv:2303.17728v1 [cs.CL])

Title: JobHam-place with smart recommend job options and candidate filtering options. (arXiv:2303.17930v1 [cs.CL])

Title: Dataset and Baseline System for Multi-lingual Extraction and Normalization of Temporal and Numerical Expressions. (arXiv:2303.18103v1 [cs.CL])

membership infer

federate

Title: Federated Learning for Metaverse: A Survey. (arXiv:2303.17987v1 [cs.CR])

Title: Accelerating Wireless Federated Learning via Nesterov's Momentum and Distributed Principle Component Analysis. (arXiv:2303.17885v1 [cs.LG])

fair

Title: FairGen: Towards Fair Graph Generation. (arXiv:2303.17743v1 [cs.LG])

Title: WebQAmGaze: A Multilingual Webcam Eye-Tracking-While-Reading Dataset. (arXiv:2303.17876v1 [cs.CL])

Title: Mitigating Source Bias for Fairer Weak Supervision. (arXiv:2303.17713v1 [cs.LG])

interpretability

Title: Pay Attention: Accuracy Versus Interpretability Trade-off in Fine-tuned Diffusion Models. (arXiv:2303.17908v1 [cs.CV])

Title: Learning with Explicit Shape Priors for Medical Image Segmentation. (arXiv:2303.17967v1 [cs.CV])

explainability

watermark

diffusion

Title: CrossLoc3D: Aerial-Ground Cross-Source 3D Place Recognition. (arXiv:2303.17778v1 [cs.CV])

Title: GlyphDraw: Learning to Draw Chinese Characters in Image Synthesis Models Coherently. (arXiv:2303.17870v1 [cs.CV])

Title: 3D-aware Image Generation using 2D Diffusion Models. (arXiv:2303.17905v1 [cs.CV])

Title: IC-FPS: Instance-Centroid Faster Point Sampling Module for 3D Point-base Object Detection. (arXiv:2303.17921v1 [cs.CV])

Title: Diffusion Action Segmentation. (arXiv:2303.17959v1 [cs.CV])

Title: One-shot Unsupervised Domain Adaptation with Personalized Diffusion Models. (arXiv:2303.18080v1 [cs.CV])

Title: A Closer Look at Parameter-Efficient Tuning in Diffusion Models. (arXiv:2303.18181v1 [cs.CV])

Title: $\infty$-Diff: Infinite Resolution Diffusion with Subsampled Mollified States. (arXiv:2303.18242v1 [cs.LG])

Title: HD-GCN:A Hybrid Diffusion Graph Convolutional Network. (arXiv:2303.17966v1 [cs.LG])