secure

Title: From Social Engineering to Quantum Threats: Safeguarding User Wallets with FailSafe. (arXiv:2304.03387v1 [cs.CR])

Title: Code-based Cryptography: Lecture Notes. (arXiv:2304.03541v1 [cs.CR])

security

privacy

Title: Clutter Detection and Removal in 3D Scenes with View-Consistent Inpainting. (arXiv:2304.03763v1 [cs.CV])

Title: Does Prompt-Tuning Language Model Ensure Privacy?. (arXiv:2304.03472v1 [cs.CR])

Title: Adjustable Privacy using Autoencoder-based Learning Structure. (arXiv:2304.03538v1 [cs.LG])

Title: AI Model Disgorgement: Methods and Choices. (arXiv:2304.03545v1 [cs.LG])

Title: A lightweight Encryption Method For Privacy-Preserving in Process Mining. (arXiv:2304.03579v1 [cs.CR])

Title: Beyond Privacy: Navigating the Opportunities and Challenges of Synthetic Data. (arXiv:2304.03722v1 [cs.LG])

Title: Replicability and stability in learning. (arXiv:2304.03757v1 [cs.LG])

Impagliazzo et al. showed how to boost any replicable algorithm so that it produces the same output with probability arbitrarily close to 1. In contrast, we demonstrate that for numerous learning tasks, global stability can only be accomplished weakly, where the same output is produced only with probability bounded away from 1. To overcome this limitation, we introduce the concept of list replicability, which is equivalent to global stability. Moreover, we prove that list replicability can be boosted so that it is achieved with probability arbitrarily close to 1. We also describe basic relations between standard learning-theoretic complexity measures and list replicable numbers. Our results in addition imply that, besides trivial cases, replicable algorithms (in the sense of Impagliazzo et al.) must be randomized.

The proof of the impossibility result is based on a topological fixed-point theorem. For every algorithm, we are able to locate a "hard input distribution" by applying the Poincar\'e-Miranda theorem in a related topological setting. The equivalence between global stability and list replicability is algorithmic.

protect

defense

Title: Exploration of Quantum Computer Power Side-Channels. (arXiv:2304.03315v1 [cs.CR])

attack

Title: Multispectral Imaging for Differential Face Morphing Attack Detection: A Preliminary Study. (arXiv:2304.03510v1 [cs.CV])

Title: Reliable Learning for Test-time Attacks and Distribution Shift. (arXiv:2304.03370v1 [cs.LG])

Title: EZClone: Improving DNN Model Extraction Attack via Shape Distillation from GPU Execution Profiles. (arXiv:2304.03388v1 [cs.LG])

Title: A Comprehensive Survey of Upgradeable Smart Contract Patterns. (arXiv:2304.03405v1 [cs.CR])

Title: FedDiSC: A Computation-efficient Federated Learning Framework for Power Systems Disturbance and Cyber Attack Discrimination. (arXiv:2304.03640v1 [cs.CR])

Title: SCART: Simulation of Cyber Attacks for Real-Time. (arXiv:2304.03657v1 [cs.CR])

robust

Title: Training-Free Layout Control with Cross-Attention Guidance. (arXiv:2304.03373v1 [cs.CV])

Title: Exposing and Mitigating Spurious Correlations for Cross-Modal Retrieval. (arXiv:2304.03391v1 [cs.CV])

Title: RoSteALS: Robust Steganography using Autoencoder Latent Space. (arXiv:2304.03400v1 [cs.CV])

Title: Rethinking Evaluation Protocols of Visual Representations Learned via Self-supervised Learning. (arXiv:2304.03456v1 [cs.CV])

Title: Devil's on the Edges: Selective Quad Attention for Scene Graph Generation. (arXiv:2304.03495v1 [cs.CV])

Title: Hierarchical Disentanglement-Alignment Network for Robust SAR Vehicle Recognition. (arXiv:2304.03550v1 [cs.CV])

Title: On the Evaluations of ChatGPT and Emotion-enhanced Prompting for Mental Health Analysis. (arXiv:2304.03347v1 [cs.CL])

Title: Deep Learning for Opinion Mining and Topic Classification of Course Reviews. (arXiv:2304.03394v1 [cs.CL])

Title: Cleansing Jewel: A Neural Spelling Correction Model Built On Google OCR-ed Tibetan Manuscripts. (arXiv:2304.03427v1 [cs.CL])

Title: Evaluating the Logical Reasoning Ability of ChatGPT and GPT-4. (arXiv:2304.03439v1 [cs.CL])

Title: Robust Decision-Focused Learning for Reward Transfer. (arXiv:2304.03365v1 [cs.LG])

Title: Optimizing Neural Networks through Activation Function Discovery and Automatic Weight Initialization. (arXiv:2304.03374v1 [cs.LG])

Title: Interpretable statistical representations of neural population dynamics and geometry. (arXiv:2304.03376v1 [cs.LG])

Title: Domain Generalization In Robust Invariant Representation. (arXiv:2304.03431v1 [cs.LG])

biometric

steal

extraction

Title: Language-aware Multiple Datasets Detection Pretraining for DETRs. (arXiv:2304.03580v1 [cs.CV])

Title: ALIKED: A Lighter Keypoint and Descriptor Extraction Network via Deformable Transformation. (arXiv:2304.03608v1 [cs.CV])

Title: Language Models are Causal Knowledge Extractors for Zero-shot Video Question Answering. (arXiv:2304.03754v1 [cs.CL])

Title: Feature Mining for Encrypted Malicious Traffic Detection with Deep Learning and Other Machine Learning Algorithms. (arXiv:2304.03691v1 [cs.CR])

membership infer

federate

Title: Asynchronous Federated Continual Learning. (arXiv:2304.03626v1 [cs.LG])

fair

Title: Interpretable Unified Language Checking. (arXiv:2304.03728v1 [cs.CL])

Title: Fairness through Aleatoric Uncertainty. (arXiv:2304.03646v1 [cs.LG])

Title: Assessing Perceived Fairness from Machine Learning Developer's Perspective. (arXiv:2304.03745v1 [cs.LG])

interpretability

explainability

watermark

diffusion

Title: Towards Coherent Image Inpainting Using Denoising Diffusion Implicit Models. (arXiv:2304.03322v1 [cs.CV])

Title: Compressed Regression over Adaptive Networks. (arXiv:2304.03638v1 [cs.LG])