secure

security

Title: UNICORN: A Unified Backdoor Trigger Inversion Framework. (arXiv:2304.02786v1 [cs.LG])

Title: On the Limits of Cross-Authentication Checks for GNSS Signals. (arXiv:2304.02977v1 [cs.CR])

In this paper, first, we formalize the models for the cross-authentication checks. Next, we describe, for each check, a spoofing attack to generate a fake signal leading the victim to a target PVT without notice. We analytically relate the degrees of the freedom of the attacker in manipulating the victim's solution to both the employed security checks and the number of open signals that can be tampered with by the attacker. We test the performance of the considered attack strategies on an experimental dataset. Lastly, we show the limits of the PVT-based GNSS cross-authentication checks, where both authenticated and non-authenticated signals are used.

Title: Smart Contract and DeFi Security: Insights from Tool Evaluations and Practitioner Surveys. (arXiv:2304.02981v1 [cs.CR])

In this paper, we aim to shed light on the effectiveness of automated security tools in identifying vulnerabilities that can lead to high-profile attacks, and their overall usage within the industry. Our comprehensive study encompasses an evaluation of five SoTA automated security tools, an analysis of 127 high-impact real-world attacks resulting in \$2.3 billion in losses, and a survey of 49 developers and auditors working in leading DeFi protocols. Our findings reveal a stark reality: the tools could have prevented a mere 8% of the attacks in our dataset, amounting to \$149 million out of the \$2.3 billion in losses. Notably, all preventable attacks were related to reentrancy vulnerabilities. Furthermore, practitioners distinguish logic-related bugs and protocol layer vulnerabilities as significant threats that are not adequately addressed by existing security tools. Our results emphasize the need to develop specialized tools catering to the distinct demands and expectations of developers and auditors. Further, our study highlights the necessity for continuous advancements in security tools to effectively tackle the ever-evolving challenges confronting the DeFi ecosystem.

Title: Hierarchical Graph Neural Network with Cross-Attention for Cross-Device User Matching. (arXiv:2304.03215v1 [cs.LG])

Title: GIF: A General Graph Unlearning Strategy via Influence Function. (arXiv:2304.02835v1 [cs.LG])

In this work, we explore the influence function tailored for graph unlearning, so as to improve the unlearning efficacy and efficiency for graph unlearning. We first present a unified problem formulation of diverse graph unlearning tasks \wrt node, edge, and feature. Then, we recognize the crux to the inability of traditional influence function for graph unlearning, and devise Graph Influence Function (GIF), a model-agnostic unlearning method that can efficiently and accurately estimate parameter changes in response to a $\epsilon$-mass perturbation in deleted data. The idea is to supplement the objective of the traditional influence function with an additional loss term of the influenced neighbors due to the structural dependency. Further deductions on the closed-form solution of parameter changes provide a better understanding of the unlearning mechanism. We conduct extensive experiments on four representative GNN models and three benchmark datasets to justify the superiority of GIF for diverse graph unlearning tasks in terms of unlearning efficacy, model utility, and unlearning efficiency. Our implementations are available at \url{https://github.com/wujcan/GIF-torch/}.

privacy

Title: Source-free Domain Adaptation Requires Penalized Diversity. (arXiv:2304.02798v1 [cs.LG])

Title: The Saudi Privacy Policy Dataset. (arXiv:2304.02757v1 [cs.CL])

Title: ChatGPT for Shaping the Future of Dentistry: The Potential of Multi-Modal Large Language Model. (arXiv:2304.03086v1 [cs.CL])

Title: FedBot: Enhancing Privacy in Chatbots with Federated Learning. (arXiv:2304.03228v1 [cs.CL])

Title: Robust, privacy-preserving, transparent, and auditable on-device blocklisting. (arXiv:2304.02810v1 [cs.CR])

Title: Protecting User Privacy in Online Settings via Supervised Learning. (arXiv:2304.02870v1 [cs.CR])

Title: Quantifying and Defending against Privacy Threats on Federated Knowledge Graph Embedding. (arXiv:2304.02932v1 [cs.CR])

Title: When approximate design for fast homomorphic computation provides differential privacy guarantees. (arXiv:2304.02959v1 [cs.CR])

protect

Title: Data AUDIT: Identifying Attribute Utility- and Detectability-Induced Bias in Task Models. (arXiv:2304.03218v1 [cs.LG])

Title: Bengali Fake Review Detection using Semi-supervised Generative Adversarial Networks. (arXiv:2304.02739v1 [cs.CL])

Title: Protected or Porous: A Comparative Analysis of Threat Detection Capability of IoT Safeguards. (arXiv:2304.03045v1 [cs.CR])

defense

attack

Title: Going Further: Flatness at the Rescue of Early Stopping for Adversarial Example Transferability. (arXiv:2304.02688v1 [cs.LG])

Title: A Certified Radius-Guided Attack Framework to Image Segmentation Models. (arXiv:2304.02693v1 [cs.CV])

Title: FACE-AUDITOR: Data Auditing in Facial Recognition Systems. (arXiv:2304.02782v1 [cs.CR])

In this paper, we formulate the auditing process as a user-level membership inference problem and propose a complete toolkit FACE-AUDITOR that can carefully choose the probing set to query the few-shot-based facial recognition model and determine whether any of a user's face images is used in training the model. We further propose to use the similarity scores between the original face images as reference information to improve the auditing performance. Extensive experiments on multiple real-world face image datasets show that FACE-AUDITOR can achieve auditing accuracy of up to $99\%$. Finally, we show that FACE-AUDITOR is robust in the presence of several perturbation mechanisms to the training images or the target models. The source code of our experiments can be found at \url{https://github.com/MinChen00/Face-Auditor}.

Title: TBDetector:Transformer-Based Detector for Advanced Persistent Threats with Provenance Graph. (arXiv:2304.02838v1 [cs.CR])

robust

Title: Real-Time Dense 3D Mapping of Underwater Environments. (arXiv:2304.02704v1 [cs.CV])

Title: Robustmix: Improving Robustness by Regularizing the Frequency Bias of Deep Nets. (arXiv:2304.02847v1 [cs.CV])

Title: Patch-aware Batch Normalization for Improving Cross-domain Robustness. (arXiv:2304.02848v1 [cs.CV])

Title: Logistic-Normal Likelihoods for Heteroscedastic Label Noise in Classification. (arXiv:2304.02849v1 [cs.LG])

Title: Learning Instance-Level Representation for Large-Scale Multi-Modal Pretraining in E-commerce. (arXiv:2304.02853v1 [cs.CV])

Title: VPFusion: Towards Robust Vertical Representation Learning for 3D Object Detection. (arXiv:2304.02867v1 [cs.CV])

Title: Benchmarking Robustness to Text-Guided Corruptions. (arXiv:2304.02963v1 [cs.CV])

Title: Exploiting the Complementarity of 2D and 3D Networks to Address Domain-Shift in 3D Semantic Segmentation. (arXiv:2304.02991v1 [cs.CV])

Title: ETPNav: Evolving Topological Planning for Vision-Language Navigation in Continuous Environments. (arXiv:2304.03047v1 [cs.CV])

Title: Improving Visual Question Answering Models through Robustness Analysis and In-Context Learning with a Chain of Basic Questions. (arXiv:2304.03147v1 [cs.CV])

Title: Instant-NVR: Instant Neural Volumetric Rendering for Human-object Interactions from Monocular RGBD Stream. (arXiv:2304.03184v1 [cs.CV])

Title: GPT detectors are biased against non-native English writers. (arXiv:2304.02819v1 [cs.CL])

Title: Evaluating the Robustness of Machine Reading Comprehension Models to Low Resource Entity Renaming. (arXiv:2304.03145v1 [cs.CL])

Title: CoT-MAE v2: Contextual Masked Auto-Encoder with Multi-view Modeling for Passage Retrieval. (arXiv:2304.03158v1 [cs.CL])

Title: Selective Data Augmentation for Robust Speech Translation. (arXiv:2304.03169v1 [cs.CL])

Title: On the Pareto Front of Multilingual Neural Machine Translation. (arXiv:2304.03216v1 [cs.CL])

Title: Robust Neural Architecture Search. (arXiv:2304.02845v1 [cs.LG])

Title: Hybrid Zonotopes Exactly Represent ReLU Neural Networks. (arXiv:2304.02755v1 [cs.LG])

Title: A review of ensemble learning and data augmentation models for class imbalanced problems: combination, implementation and evaluation. (arXiv:2304.02858v1 [cs.LG])

biometric

steal

extraction

Title: Learning Stage-wise GANs for Whistle Extraction in Time-Frequency Spectrograms. (arXiv:2304.02714v1 [cs.CV])

Title: A Fast and Lightweight Network for Low-Light Image Enhancement. (arXiv:2304.02978v1 [cs.CV])

Title: Geometric-aware Pretraining for Vision-centric 3D Object Detection. (arXiv:2304.03105v1 [cs.CV])

Title: Sejarah dan Perkembangan Teknik Natural Language Processing (NLP) Bahasa Indonesia: Tinjauan tentang sejarah, perkembangan teknologi, dan aplikasi NLP dalam bahasa Indonesia. (arXiv:2304.02746v1 [cs.CL])

Title: SpanRE: Entities and Overlapping Relations Extraction Based on Spans and Entity Attention. (arXiv:2304.02901v1 [cs.CL])

membership infer

federate

Title: IoT Federated Blockchain Learning at the Edge. (arXiv:2304.03006v1 [cs.LG])

Title: Deep Reinforcement Learning Based Vehicle Selection for Asynchronous Federated Learning Enabled Vehicular Edge Computing. (arXiv:2304.02832v1 [cs.LG])

Title: Learning Cautiously in Federated Learning with Noisy and Heterogeneous Clients. (arXiv:2304.02892v1 [cs.LG])

fair

Title: Uncurated Image-Text Datasets: Shedding Light on Demographic Bias. (arXiv:2304.02828v1 [cs.CV])

Title: Automatic ICD-10 Code Association: A Challenging Task on French Clinical Texts. (arXiv:2304.02886v1 [cs.CL])

Title: Fair Ordering via Social Choice Theory. (arXiv:2304.02730v1 [cs.CR])

We extend this definition to formalize the notion that these batches should have minimal size, thereby giving the first notion of order fairness that cannot be vacuously satisfied (by arbitrarily large batches) and that can be satisfied in the presence of faulty replicas. We then show that the Ranked Pairs aggregation method produces an ordering that satisfies our fairness definition for every choice of parameter $\gamma$ simultaneously and for any number of faulty replicas (where fairness guarantees linearly degrade as the fraction of faulty replicas increases).

We then instantiate our protocol in the streaming setting. Careful analysis of the interactions between ordering dependencies enables our protocol to simulate Ranked Pairs voting in this setting, and adjustments to ordering algorithm give a protocol that (under synchronous network assumptions) always appends a transaction to the output ordering after a bounded amount of time.

Title: Inductive Graph Unlearning. (arXiv:2304.03093v1 [cs.LG])

Title: A Transformer-Based Deep Learning Approach for Fairly Predicting Post-Liver Transplant Risk Factors. (arXiv:2304.02780v1 [cs.LG])

interpretability

Title: SLM: End-to-end Feature Selection via Sparse Learnable Masks. (arXiv:2304.03202v1 [cs.LG])

explainability

watermark

diffusion

Title: DITTO-NeRF: Diffusion-based Iterative Text To Omni-directional 3D Model. (arXiv:2304.02827v1 [cs.CV])

Title: Zero-shot Generative Model Adaptation via Image-specific Prompt Learning. (arXiv:2304.03119v1 [cs.CV])

Title: SketchFFusion: Sketch-guided image editing with diffusion model. (arXiv:2304.03174v1 [cs.CV])

Title: Face Animation with an Attribute-Guided Diffusion Model. (arXiv:2304.03199v1 [cs.CV])

Title: Inst-Inpaint: Instructing to Remove Objects with Diffusion Models. (arXiv:2304.03246v1 [cs.CV])

Title: Diffusion Models as Masked Autoencoders. (arXiv:2304.03283v1 [cs.CV])