secure

Title: PiXi: Password Inspiration by Exploring Information. (arXiv:2304.10728v1 [cs.CR])

Title: Decentralized Inverse Transparency With Blockchain. (arXiv:2304.11033v1 [cs.CR])

To solve these issues, we present Kovacs, a decentralized data exchange and usage logging system for inverse transparency built on blockchain. Its new-usage protocol ensures non-repudiation, and therefore accountability, for inverse transparency. Its one-time pseudonym generation algorithm guarantees unlinkability and enables proof of ownership, which allows data subjects to exercise their legal rights regarding their personal data. With our implementation, we show the viability of our solution. The decentralized communication impacts performance and scalability, but exchange duration and storage size are still reasonable. More importantly, the provided information security meets high requirements. We conclude that Kovacs realizes decentralized inverse transparency through secure and GDPR-compliant use of permissionless blockchain.

security

Title: Fooling Thermal Infrared Detectors in Physical World. (arXiv:2304.10712v1 [cs.CV])

Title: Automated Mapping of CVE Vulnerability Records to MITRE CWE Weaknesses. (arXiv:2304.11130v1 [cs.CR])

Title: DeepReShape: Redesigning Neural Networks for Efficient Private Inference. (arXiv:2304.10593v1 [cs.CR])

Title: A Survey of Prevent and Detect Access Control Vulnerabilities. (arXiv:2304.10600v1 [cs.CR])

This survey targets to provide a structured overview of approaches that tackle access control vulnerabilities. It firstly discusses the unique feature of access control vulnerabilities, then studies the existing works proposed to tackle access control vulnerabilities in web applications, which span the spectrum of software development from software design and implementation, software analysis and testing, and runtime monitoring. At last we discuss the open problem in this field.

Title: Cryptanalysis of quantum permutation pad. (arXiv:2304.11081v1 [cs.CR])

Title: AI Product Security: A Primer for Developers. (arXiv:2304.11087v1 [cs.CR])

Title: Implementing and Evaluating Security in O-RAN: Interfaces, Intelligence, and Platforms. (arXiv:2304.11125v1 [cs.CR])

privacy

Title: Sparsity in neural networks can improve their privacy. (arXiv:2304.10553v1 [cs.LG])

Title: Outsourced Analysis of Encrypted Graphs in the Cloud with Privacy Protection. (arXiv:2304.10833v1 [cs.CR])

Title: Mining Privacy-Preserving Association Rules based on Parallel Processing in Cloud Computing. (arXiv:2304.10836v1 [cs.CR])

Title: Auditing and Generating Synthetic Data with Controllable Trust Trade-offs. (arXiv:2304.10819v1 [cs.LG])

protect

Title: A Plug-and-Play Defensive Perturbation for Copyright Protection of DNN-based Applications. (arXiv:2304.10679v1 [cs.CV])

Title: Matching-based Data Valuation for Generative Model. (arXiv:2304.10701v1 [cs.CV])

Title: Deep Attention Unet: A Network Model with Global Feature Perception Ability. (arXiv:2304.10829v1 [cs.CV])

Title: Deep Transfer Learning Applications in Intrusion Detection Systems: A Comprehensive Review. (arXiv:2304.10550v1 [cs.CR])

defense

Title: A Multiagent CyberBattleSim for RL Cyber Operation Agents. (arXiv:2304.11052v1 [cs.CR])

Title: Training Automated Defense Strategies Using Graph-based Cyber Attack Simulations. (arXiv:2304.11084v1 [cs.CR])

attack

Title: Launching a Robust Backdoor Attack under Capability Constrained Scenarios. (arXiv:2304.10985v1 [cs.CR])

Title: Fundamental Limitations of Alignment in Large Language Models. (arXiv:2304.11082v1 [cs.CL])

Title: Denial-of-Service or Fine-Grained Control: Towards Flexible Model Poisoning Attacks on Federated Learning. (arXiv:2304.10783v1 [cs.LG])

Title: Timing the Transient Execution: A New Side-Channel Attack on Intel CPUs. (arXiv:2304.10877v1 [cs.CR])

Title: PowerGAN: A Machine Learning Approach for Power Side-Channel Attack on Compute-in-Memory Accelerators. (arXiv:2304.11056v1 [cs.CR])

Title: An Unbiased Transformer Source Code Learning with Semantic Vulnerability Graph. (arXiv:2304.11072v1 [cs.CR])

robust

Title: Learning in Imperfect Environment: Multi-Label Classification with Long-Tailed Distribution and Partial Labels. (arXiv:2304.10539v1 [cs.LG])

Title: Multi-domain learning CNN model for microscopy image classification. (arXiv:2304.10616v1 [cs.CV])

Title: Enhancing object detection robustness: A synthetic and natural perturbation approach. (arXiv:2304.10622v1 [cs.CV])

Title: Joint Token Pruning and Squeezing Towards More Aggressive Compression of Vision Transformers. (arXiv:2304.10716v1 [cs.CV])

Title: RoCOCO: Robust Benchmark MS-COCO to Stress-test Robustness of Image-Text Matching Models. (arXiv:2304.10727v1 [cs.CV])

Title: Missing Modality Robustness in Semi-Supervised Multi-Modal Semantic Segmentation. (arXiv:2304.10756v1 [cs.CV])

Title: Automated Static Camera Calibration with Intelligent Vehicles. (arXiv:2304.10814v1 [cs.CV])

Title: IXA/Cogcomp at SemEval-2023 Task 2: Context-enriched Multilingual Named Entity Recognition using Knowledge Bases. (arXiv:2304.10637v1 [cs.CL])

Title: LEIA: Linguistic Embeddings for the Identification of Affect. (arXiv:2304.10973v1 [cs.CL])

Title: Inducing anxiety in large language models increases exploration and bias. (arXiv:2304.11111v1 [cs.CL])

Title: Smart Learning to Find Dumb Contracts. (arXiv:2304.10726v1 [cs.CR])

DLVA has three key components. Smart Contract to Vector (SC2V) uses neural networks to map arbitrary smart contract bytecode to an high-dimensional floating-point vector. Sibling Detector (SD) classifies contracts when a target contract's vector is Euclidian-close to a labeled contract's vector in a training set; although only able to judge 55.7% of the contracts in our test set, it has an average accuracy of 97.4% with a false positive rate of only 0.1%. Lastly, Core Classifier (CC) uses neural networks to infer vulnerable contracts regardless of vector distance. DLVA has an overall accuracy of 96.6% with an associated false positive rate of only 3.7%.

Title: Using Z3 for Formal Modeling and Verification of FNN Global Robustness. (arXiv:2304.10558v1 [cs.LG])

Title: B-Learner: Quasi-Oracle Bounds on Heterogeneous Causal Effects Under Hidden Confounding. (arXiv:2304.10577v1 [cs.LG])

Title: Debiasing Conditional Stochastic Optimization. (arXiv:2304.10613v1 [cs.LG])

Title: DEIR: Efficient and Robust Exploration through Discriminative-Model-Based Episodic Intrinsic Rewards. (arXiv:2304.10770v1 [cs.LG])

biometric

steal

Title: Schooling to Exploit Foolish Contracts. (arXiv:2304.10737v1 [cs.CR])

SCooLS is the first application of semi-supervised learning to smart contract vulnerability analysis, as well as the first deep learning-based vulnerability analyzer to identify specific vulnerable functions. SCooLS's performance is better than existing tools, with an accuracy level of 98.4%, an F1 score of 90.5%, and an exceptionally low false positive rate of only 0.8%. Furthermore, SCooLS is fast, analyzing a typical function in 0.05 seconds.

We leverage SCooLS's ability to identify specific vulnerable functions to build an exploit generator, which was successful in stealing Ether from 76.9% of the true positives.

extraction

Title: GeoLayoutLM: Geometric Pre-training for Visual Information Extraction. (arXiv:2304.10759v1 [cs.CV])

Title: DeformableFormer: Classification of Endoscopic Ultrasound Guided Fine Needle Biopsy in Pancreatic Diseases. (arXiv:2304.10791v1 [cs.CV])

Title: Learn to Cluster Faces with Better Subgraphs. (arXiv:2304.10831v1 [cs.CV])

Title: TC-GAT: Graph Attention Network for Temporal Causality Discovery. (arXiv:2304.10706v1 [cs.CL])

Title: Information Extraction from Documents: Question Answering vs Token Classification in real-world setups. (arXiv:2304.10994v1 [cs.CL])

Title: BERT Based Clinical Knowledge Extraction for Biomedical Knowledge Graph Construction and Analysis. (arXiv:2304.10996v1 [cs.CL])

Objective : We propose an end-to-end approach for knowledge extraction and analysis from biomedical clinical notes using the Bidirectional Encoder Representations from Transformers (BERT) model and Conditional Random Field (CRF) layer.

Methods : The approach is based on knowledge graphs, which can effectively process abstract biomedical concepts such as relationships and interactions between medical entities. Besides offering an intuitive way to visualize these concepts, KGs can solve more complex knowledge retrieval problems by simplifying them into simpler representations or by transforming the problems into representations from different perspectives. We created a biomedical Knowledge Graph using using Natural Language Processing models for named entity recognition and relation extraction. The generated biomedical knowledge graphs (KGs) are then used for question answering.

Results : The proposed framework can successfully extract relevant structured information with high accuracy (90.7% for Named-entity recognition (NER), 88% for relation extraction (RE)), according to experimental findings based on real-world 505 patient biomedical unstructured clinical notes.

Conclusions : In this paper, we propose a novel end-to-end system for the construction of a biomedical knowledge graph from clinical textual using a variation of BERT models.

Title: SkillGPT: a RESTful API service for skill extraction and standardization using a Large Language Model. (arXiv:2304.11060v1 [cs.CL])

membership infer

federate

Title: Get Rid Of Your Trail: Remotely Erasing Backdoors in Federated Learning. (arXiv:2304.10638v1 [cs.LG])

Title: Federated Learning for Predictive Maintenance and Quality Inspection in Industrial Applications. (arXiv:2304.11101v1 [cs.LG])

fair

Title: Supporting Qualitative Analysis with Large Language Models: Combining Codebook with GPT-3 for Deductive Coding. (arXiv:2304.10548v1 [cs.CL])

Title: Individual Fairness in Bayesian Neural Networks. (arXiv:2304.10828v1 [cs.LG])

Title: Automated Medical Coding on MIMIC-III and MIMIC-IV: A Critical Review and Replicability Study. (arXiv:2304.10909v1 [cs.LG])

interpretability

Title: A Revisit to the Normalized Eight-Point Algorithm and A Self-Supervised Deep Solution. (arXiv:2304.10771v1 [cs.CV])

explainability

watermark

diffusion

Title: Long-Term Photometric Consistent Novel View Synthesis with Diffusion Models. (arXiv:2304.10700v1 [cs.CV])

Title: Improved Diffusion-based Image Colorization via Piggybacked Models. (arXiv:2304.11105v1 [cs.CV])

Title: BoDiffusion: Diffusing Sparse Observations for Full-Body Human Motion Synthesis. (arXiv:2304.11118v1 [cs.CV])

Title: IDQL: Implicit Q-Learning as an Actor-Critic Method with Diffusion Policies. (arXiv:2304.10573v1 [cs.LG])