secure

Title: An Ethereum-compatible blockchain that explicates and ensures design-level safety properties for smart contracts. (arXiv:2304.08655v1 [cs.CR])

Title: FlexiChain 2.0: NodeChain Assisting Integrated Decentralized Vault for Effective Data Authentication and Device Integrity in Complex Cyber-Physical Systems. (arXiv:2304.08713v1 [cs.CR])

security

Title: A Decentralized Authorization and Security Framework for Distributed Research Workflows. (arXiv:2304.08557v1 [cs.CR])

Title: In ChatGPT We Trust? Measuring and Characterizing the Reliability of ChatGPT. (arXiv:2304.08979v1 [cs.CR])

privacy

Title: ProGAP: Progressive Graph Neural Networks with Differential Privacy Guarantees. (arXiv:2304.08928v1 [cs.LG])

protect

Title: InversOS: Efficient Control-Flow Protection for AArch64 Applications with Privilege Inversion. (arXiv:2304.08717v1 [cs.CR])

We present InversOS, the first hardware-assisted write-protected shadow stacks for AArch64 user-space applications, utilizing commonly available features of AArch64 to achieve efficient intra-address space isolation (called Privilege Inversion) required to protect shadow stacks. Privilege Inversion adopts unconventional design choices that run protected applications in the kernel mode and mark operating system (OS) kernel memory as user-accessible; InversOS therefore uses a novel combination of OS kernel modifications, compiler transformations, and another AArch64 feature to ensure the safety of doing so and to support legacy applications. We show that InversOS is secure by design, effective against various control-flow hijacking attacks, and performant on selected benchmarks and applications (incurring overhead of 7.0% on LMBench, 7.1% on SPEC CPU 2017, and 3.0% on Nginx web server).

defense

Title: GlobalMind: Global Multi-head Interactive Self-attention Network for Hyperspectral Change Detection. (arXiv:2304.08687v1 [cs.CV])

Title: GrOVe: Ownership Verification of Graph Neural Networks using Embeddings. (arXiv:2304.08566v1 [cs.LG])

Title: Masked Language Model Based Textual Adversarial Example Detection. (arXiv:2304.08767v1 [cs.CR])

attack

Title: Stochastic Parrots Looking for Stochastic Parrots: LLMs are Easy to Fine-Tune and Hard to Detect with other LLMs. (arXiv:2304.08968v1 [cs.CL])

Unfortunately, most such tools are critically flawed. While major publications in the LLM detectability field suggested that LLMs were easy to detect with fine-tuned autoencoders, the limitations of their results are easy to overlook. Specifically, they assumed publicly available generative models without fine-tunes or non-trivial prompts. While the importance of these assumptions has been demonstrated, until now, it remained unclear how well such detection could be countered.

Here, we show that an attacker with access to such detectors' reference human texts and output not only evades detection but can fully frustrate the detector training - with a reasonable budget and all its outputs labeled as such. Achieving it required combining common "reinforcement from critic" loss function modification and AdamW optimizer, which led to surprisingly good fine-tuning generalization. Finally, we warn against the temptation to transpose the conclusions obtained in RNN-driven text GANs to LLMs due to their better representative ability.

These results have critical implications for the detection and prevention of malicious use of generative language models, and we hope they will aid the designers of generative models and detectors.

Title: Towards the Transferable Audio Adversarial Attack via Ensemble Methods. (arXiv:2304.08811v1 [cs.CR])

Title: BadVFL: Backdoor Attacks in Vertical Federated Learning. (arXiv:2304.08847v1 [cs.LG])

VFL is increasingly used in applications like financial fraud detection; nonetheless, very little work has analyzed its security. In this paper, we focus on robustness in VFL, in particular, on backdoor attacks, whereby an adversary attempts to manipulate the aggregate model during the training process to trigger misclassifications. Performing backdoor attacks in VFL is more challenging than in HFL, as the adversary i) does not have access to the labels during training and ii) cannot change the labels as she only has access to the feature embeddings. We present a first-of-its-kind clean-label backdoor attack in VFL, which consists of two phases: a label inference and a backdoor phase. We demonstrate the effectiveness of the attack on three different datasets, investigate the factors involved in its success, and discuss countermeasures to mitigate its impact.

robust

Title: RS2G: Data-Driven Scene-Graph Extraction and Embedding for Robust Autonomous Perception and Scenario Understanding. (arXiv:2304.08600v1 [cs.CV])

Title: ProPanDL: A Modular Architecture for Uncertainty-Aware Panoptic Segmentation. (arXiv:2304.08645v1 [cs.CV])

Title: Looking Through the Glass: Neural Surface Reconstruction Against High Specular Reflections. (arXiv:2304.08706v1 [cs.CV])

Title: You Only Need Two Detectors to Achieve Multi-Modal 3D Multi-Object Tracking. (arXiv:2304.08709v1 [cs.CV])

Title: TTIDA: Controllable Generative Data Augmentation via Text-to-Text and Text-to-Image Models. (arXiv:2304.08821v1 [cs.CV])

Title: SDFReg: Learning Signed Distance Functions for Point Cloud Registration. (arXiv:2304.08929v1 [cs.CV])

Title: PG-VTON: A Novel Image-Based Virtual Try-On Method via Progressive Inference Paradigm. (arXiv:2304.08956v1 [cs.CV])

Title: Visual-LiDAR Odometry and Mapping with Monocular Scale Correction and Motion Compensation. (arXiv:2304.08978v1 [cs.CV])

Title: MER 2023: Multi-label Learning, Modality Robustness, and Semi-Supervised Learning. (arXiv:2304.08981v1 [cs.CL])

Title: Robustness of Visual Explanations to Common Data Augmentation. (arXiv:2304.08984v1 [cs.CV])

Title: CDFI: Cross Domain Feature Interaction for Robust Bronchi Lumen Detection. (arXiv:2304.09115v1 [cs.CV])

Title: Variational Relational Point Completion Network for Robust 3D Classification. (arXiv:2304.09131v1 [cs.CV])

Title: Tailoring Domain Adaptation for Machine Translation Quality Estimation. (arXiv:2304.08891v1 [cs.CL])

Title: CyFormer: Accurate State-of-Health Prediction of Lithium-Ion Batteries via Cyclic Attention. (arXiv:2304.08502v1 [cs.LG])

Title: W-MAE: Pre-trained weather model with masked autoencoder for multi-variable weather forecasting. (arXiv:2304.08754v1 [cs.LG])

Title: A Domain-Region Based Evaluation of ML Performance Robustness to Covariate Shift. (arXiv:2304.08855v1 [cs.LG])

biometric

steal

extraction

Title: Deep Unrestricted Document Image Rectification. (arXiv:2304.08796v1 [cs.CV])

Title: Speaker Profiling in Multiparty Conversations. (arXiv:2304.08801v1 [cs.CL])

Title: A Biomedical Entity Extraction Pipeline for Oncology Health Records in Portuguese. (arXiv:2304.08999v1 [cs.CL])

Title: CodeKGC: Code Language Model for Generative Knowledge Graph Construction. (arXiv:2304.09048v1 [cs.CL])

membership infer

federate

Title: Crossing Roads of Federated Learning and Smart Grids: Overview, Challenges, and Perspectives. (arXiv:2304.08602v1 [cs.LG])

Title: Joint Age-based Client Selection and Resource Allocation for Communication-Efficient Federated Learning over NOMA Networks. (arXiv:2304.08996v1 [cs.LG])

fair

Title: Quantum Annealing for Single Image Super-Resolution. (arXiv:2304.08924v1 [cs.CV])

Title: Audio-Driven Talking Face Generation with Diverse yet Realistic Facial Animations. (arXiv:2304.08945v1 [cs.CV])

Title: UniMax: Fairer and more Effective Language Sampling for Large-Scale Multilingual Pretraining. (arXiv:2304.09151v1 [cs.CL])

interpretability

explainability

watermark

diffusion

Title: Avatars Grow Legs: Generating Smooth Human Motion from Sparse Tracking Inputs with Diffusion Model. (arXiv:2304.08577v1 [cs.CV])

Title: Align your Latents: High-Resolution Video Synthesis with Latent Diffusion Models. (arXiv:2304.08818v1 [cs.CV])

Title: UPGPT: Universal Diffusion Model for Person Image Generation, Editing and Pose Transfer. (arXiv:2304.08870v1 [cs.CV])

Title: Look ATME: The Discriminator Mean Entropy Needs Attention. (arXiv:2304.09024v1 [cs.CV])

Title: Two-stage Denoising Diffusion Model for Source Localization in Graph Inverse Problems. (arXiv:2304.08841v1 [cs.LG])

However, the inherent intricacy and uncertainty in information dissemination pose significant challenges, and the ill-posed nature of the source localization problem further exacerbates these challenges. Recently, deep generative models, particularly diffusion models inspired by classical non-equilibrium thermodynamics, have made significant progress. While diffusion models have proven to be powerful in solving inverse problems and producing high-quality reconstructions, applying them directly to the source localization is infeasible for two reasons. Firstly, it is impossible to calculate the posterior disseminated results on a large-scale network for iterative denoising sampling, which would incur enormous computational costs. Secondly, in the existing methods for this field, the training data itself are ill-posed (many-to-one); thus simply transferring the diffusion model would only lead to local optima.

To address these challenges, we propose a two-stage optimization framework, the source localization denoising diffusion model (SL-Diff). In the coarse stage, we devise the source proximity degrees as the supervised signals to generate coarse-grained source predictions. This aims to efficiently initialize the next stage, significantly reducing its convergence time and calibrating the convergence process. Furthermore, the introduction of cascade temporal information in this training method transforms the many-to-one mapping relationship into a one-to-one relationship, perfectly addressing the ill-posed problem. In the fine stage, we design a diffusion model for the graph inverse problem that can quantify the uncertainty in the dissemination. The proposed SL-Diff yields excellent prediction results within a reasonable sampling time at extensive experiments.