secure

security

Title: GaitMorph: Transforming Gait by Optimally Transporting Discrete Codes. (arXiv:2307.14713v1 [cs.CV])

Title: Plug and Pray: Exploiting off-the-shelf components of Multi-Modal Models. (arXiv:2307.14539v1 [cs.CR])

Title: An Asynchronous and Low-Power True Random Number Generator using STT-MTJ. (arXiv:2307.14476v1 [cs.CR])

Title: PSOFuzz: Fuzzing Processors with Particle Swarm Optimization. (arXiv:2307.14480v1 [cs.CR])

Title: Accelerating Polynomial Modular Multiplication with Crossbar-Based Compute-in-Memory. (arXiv:2307.14557v1 [cs.CR])

Title: Smart Contract Migration: Security Analysis and Recommendations from Ethereum to Arbitrum. (arXiv:2307.14773v1 [cs.CR])

Title: A LLM Assisted Exploitation of AI-Guardian. (arXiv:2307.15008v1 [cs.CR])

We write none of the code to attack this model, and instead prompt GPT-4 to implement all attack algorithms following our instructions and guidance. This process was surprisingly effective and efficient, with the language model at times producing code from ambiguous instructions faster than the author of this paper could have done. We conclude by discussing (1) the warning signs present in the evaluation that suggested to us AI-Guardian would be broken, and (2) our experience with designing attacks and performing novel research using the most recent advances in language modeling.

privacy

Title: FakeTracer: Proactively Defending Against Face-swap DeepFakes via Implanting Traces in Training. (arXiv:2307.14593v1 [cs.CV])

Title: Online Context-aware Data Release with Sequence Information Privacy. (arXiv:2307.14388v1 [cs.CR])

Title: LinkDID: A Privacy-Preserving, Sybil-Resistant and Key-Recoverable Decentralized Identity Scheme. (arXiv:2307.14679v1 [cs.CR])

Title: EdgeConvEns: Convolutional Ensemble Learning for Edge Intelligence. (arXiv:2307.14381v1 [cs.LG])

protect

Title: SEV-Step: A Single-Stepping Framework for AMD-SEV. (arXiv:2307.14757v1 [cs.CR])

Title: Don't Shoot the Messenger: Localization Prevention of Satellite Internet Users. (arXiv:2307.14879v1 [cs.CR])

To address this threat, we present AnonSat, a novel scheme to protect satellite Internet users from triangulation. AnonSat works with cheap off-the-shelf devices, leveraging long-range wireless communication to span a local network among satellite base stations. This allows rerouting users' communication to other satellite base stations, some distance away from each user, thus, preventing their localization. AnonSat is designed for easy deployment and usability, which we demonstrate with a prototype implementation. Our large-scale network simulations using real-world data sets show the effectiveness of AnonSat in various practical settings.

defense

Title: Lateral-Direction Localization Attack in High-Level Autonomous Driving: Domain-Specific Defense Opportunity via Lane Detection. (arXiv:2307.14540v1 [cs.CR])

We evaluate $LD^3$ on real-world sensor traces and find that it can achieve effective and timely detection against existing attack with 100% true positive rates and 0% false positive rates. Results also show that $LD^3$ is robust to diverse environmental conditions and is effective at steering the AD vehicle to safely stop within the current traffic lane. We implement $LD^3$ on two open-source high-level AD systems, Baidu Apollo and Autoware, and validate its defense capability in both simulation and the physical world in end-to-end driving. We further conduct adaptive attack evaluations and find that $LD^3$ is effective at bounding the deviations from reaching the attack goals in stealthy attacks and is robust to latest LD-side attack.

attack

Title: Unified Adversarial Patch for Visible-Infrared Cross-modal Attacks in the Physical World. (arXiv:2307.14682v1 [cs.CV])

Title: NSA: Naturalistic Support Artifact to Boost Network Confidence. (arXiv:2307.14917v1 [cs.CV])

Title: Universal and Transferable Adversarial Attacks on Aligned Language Models. (arXiv:2307.15043v1 [cs.CL])

Surprisingly, we find that the adversarial prompts generated by our approach are quite transferable, including to black-box, publicly released LLMs. Specifically, we train an adversarial attack suffix on multiple prompts (i.e., queries asking for many different types of objectionable content), as well as multiple models (in our case, Vicuna-7B and 13B). When doing so, the resulting attack suffix is able to induce objectionable content in the public interfaces to ChatGPT, Bard, and Claude, as well as open source LLMs such as LLaMA-2-Chat, Pythia, Falcon, and others. In total, this work significantly advances the state-of-the-art in adversarial attacks against aligned language models, raising important questions about how such systems can be prevented from producing objectionable information. Code is available at github.com/llm-attacks/llm-attacks.

Title: Dual-Space Attacks against Random-Walk-based Anomaly Detection. (arXiv:2307.14387v1 [cs.CR])

Title: Backdoor Attacks for In-Context Learning with Language Models. (arXiv:2307.14692v1 [cs.CR])

Title: FLARE: Fingerprinting Deep Reinforcement Learning Agents using Universal Adversarial Masks. (arXiv:2307.14751v1 [cs.LG])

Title: A Strategic Framework for Optimal Decisions in Football 1-vs-1 Shot-Taking Situations: An Integrated Approach of Machine Learning, Theory-Based Modeling, and Game Theory. (arXiv:2307.14732v1 [cs.LG])

Title: Network Fault-tolerant and Byzantine-resilient Social Learning via Collaborative Hierarchical Non-Bayesian Learning. (arXiv:2307.14952v1 [cs.LG])

We first propose a hierarchical robust push-sum algorithm that can achieve average consensus despite frequent packet-dropping link failures. We provide a sparse information fusion rule between the parameter server and arbitrarily selected network representatives. Then, interleaving the consensus update step with a dual averaging update with Kullback-Leibler (KL) divergence as the proximal function, we obtain a packet-dropping fault-tolerant non-Bayesian learning algorithm with provable convergence guarantees.

On external adversarial attacks, we consider Byzantine attacks in which the compromised agents can send maliciously calibrated messages to others (including both the agents and the parameter server). To avoid the curse of dimensionality of Byzantine consensus, we solve the non-Bayesian learning problem via running multiple dynamics, each of which only involves Byzantine consensus with scalar inputs. To facilitate resilient information propagation across sub-networks, we use a novel Byzantine-resilient gossiping-type rule at the parameter server.

robust

Title: MiDaS v3.1 -- A Model Zoo for Robust Monocular Relative Depth Estimation. (arXiv:2307.14460v1 [cs.CV])

Title: Robust Detection, Assocation, and Localization of Vehicle Lights: A Context-Based Cascaded CNN Approach and Evaluations. (arXiv:2307.14571v1 [cs.CV])

Title: GADER: GAit DEtection and Recognition in the Wild. (arXiv:2307.14578v1 [cs.CV])

Title: The detection and rectification for identity-switch based on unfalsified control. (arXiv:2307.14591v1 [cs.CV])

Title: Clustering based Point Cloud Representation Learning for 3D Analysis. (arXiv:2307.14605v1 [cs.CV])

Title: Gloss-free Sign Language Translation: Improving from Visual-Language Pretraining. (arXiv:2307.14768v1 [cs.CV])

Title: Comparative Evaluation of Digital and Analog Chest Radiographs to Identify Tuberculosis using Deep Learning Model. (arXiv:2307.14859v1 [cs.CV])

Title: The RoboDepth Challenge: Methods and Advancements Towards Robust Depth Estimation. (arXiv:2307.15061v1 [cs.CV])

Title: Metric-Based In-context Learning: A Case Study in Text Simplification. (arXiv:2307.14632v1 [cs.CL])

Title: Turning Whisper into Real-Time Transcription System. (arXiv:2307.14743v1 [cs.CL])

Title: Models of reference production: How do they withstand the test of time?. (arXiv:2307.14817v1 [cs.CL])

Title: Exploiting the Potential of Seq2Seq Models as Robust Few-Shot Learners. (arXiv:2307.14856v1 [cs.CL])

Title: MESED: A Multi-modal Entity Set Expansion Dataset with Fine-grained Semantic Classes and Hard Negative Entities. (arXiv:2307.14878v1 [cs.CL])

Title: Scaling TransNormer to 175 Billion Parameters. (arXiv:2307.14995v1 [cs.CL])

Title: Forecasting, capturing and activation of carbon-dioxide (CO$_2$): Integration of Time Series Analysis, Machine Learning, and Material Design. (arXiv:2307.14374v1 [cs.LG])

Title: DBGSA: A Novel Data Adaptive Bregman Clustering Algorithm. (arXiv:2307.14375v1 [cs.LG])

Title: Robust Assignment of Labels for Active Learning with Sparse and Noisy Annotations. (arXiv:2307.14380v1 [cs.LG])

Title: Prediction of wind turbines power with physics-informed neural networks and evidential uncertainty quantification. (arXiv:2307.14675v1 [cs.LG])

Title: A Self-Adaptive Penalty Method for Integrating Prior Knowledge Constraints into Neural ODEs. (arXiv:2307.14940v1 [cs.LG])

biometric

Title: Multiscale Dynamic Graph Representation for Biometric Recognition with Occlusions. (arXiv:2307.14617v1 [cs.CV])

steal

extraction

Title: Decoding the Secrets of Machine Learning in Malware Classification: A Deep Dive into Datasets, Feature Extraction, and Model Performance. (arXiv:2307.14657v1 [cs.CR])

This work sheds light on those open questions. by investigating the key factors influencing ML-based malware detection and classification. For this, we collect the largest balanced malware dataset so far with 67K samples from 670 families (100 samples each), and train state-of-the-art models for malware detection and family classification using our dataset. Our results reveal that static features perform better than dynamic features, and that combining both only provides marginal improvement over static features. We discover no correlation between packing and classification accuracy, and that missing behaviors in dynamically-extracted features highly penalize their performance. We also demonstrate how a larger number of families to classify make the classification harder, while a higher number of samples per family increases accuracy. Finally, we find that models trained on a uniform distribution of samples per family better generalize on unseen data.

Title: Rapid and Scalable Bayesian AB Testing. (arXiv:2307.14628v1 [cs.LG])

membership infer

federate

Title: Federated Model Aggregation via Self-Supervised Priors for Highly Imbalanced Medical Image Classification. (arXiv:2307.14959v1 [cs.CV])

Title: Samplable Anonymous Aggregation for Private Federated Data Analysis. (arXiv:2307.15017v1 [cs.CR])

Title: HyperFed: Hyperbolic Prototypes Exploration with Consistent Aggregation for Non-IID Data in Federated Learning. (arXiv:2307.14384v1 [cs.LG])

fair

Title: Explainable Disparity Compensation for Efficient Fair Ranking. (arXiv:2307.14366v1 [cs.LG])

Title: Bipartite Ranking Fairness through a Model Agnostic Ordering Adjustment. (arXiv:2307.14668v1 [cs.LG])

Title: Fair Machine Unlearning: Data Removal while Mitigating Disparities. (arXiv:2307.14754v1 [cs.LG])

interpretability

Title: ProtoASNet: Dynamic Prototypes for Inherently Interpretable and Uncertainty-Aware Aortic Stenosis Classification in Echocardiography. (arXiv:2307.14433v1 [cs.CV])

Title: Verifiable Feature Attributions: A Bridge between Post Hoc Explainability and Inherent Interpretability. (arXiv:2307.15007v1 [cs.LG])

Title: Learning to simulate partially known spatio-temporal dynamics with trainable difference operators. (arXiv:2307.14395v1 [cs.LG])

explainability

watermark

diffusion

Title: Spatial-Frequency U-Net for Denoising Diffusion Probabilistic Models. (arXiv:2307.14648v1 [cs.CV])

Title: LLDiffusion: Learning Degradation Representations in Diffusion Models for Low-Light Image Enhancement. (arXiv:2307.14659v1 [cs.CV])

Title: TEDi: Temporally-Entangled Diffusion for Long-Term Motion Synthesis. (arXiv:2307.15042v1 [cs.CV])

Title: Self-Contrastive Graph Diffusion Network. (arXiv:2307.14613v1 [cs.LG])

Title: Imitating Complex Trajectories: Bridging Low-Level Stability and High-Level Behavior. (arXiv:2307.14619v1 [cs.LG])

noise learning

data-free

transformer

Title: HTNet for micro-expression recognition. (arXiv:2307.14637v1 [cs.CV])

Title: Pre-training Vision Transformers with Very Limited Synthesized Images. (arXiv:2307.14710v1 [cs.CV])

Title: pCTFusion: Point Convolution-Transformer Fusion with Semantic Aware Loss for Outdoor LiDAR Point Cloud Segmentation. (arXiv:2307.14777v1 [cs.CV])

Title: IML-ViT: Image Manipulation Localization by Vision Transformer. (arXiv:2307.14863v1 [cs.CV])

Title: Self-Supervised Graph Transformer for Deepfake Detection. (arXiv:2307.15019v1 [cs.CV])

Title: A Transformer-based Approach for Arabic Offline Handwritten Text Recognition. (arXiv:2307.15045v1 [cs.CV])

Title: Speed Reading Tool Powered by Artificial Intelligence for Students with ADHD, Dyslexia, or Short Attention Span. (arXiv:2307.14544v1 [cs.CL])

Title: Improving Natural Language Inference in Arabic using Transformer Models and Linguistically Informed Pre-Training. (arXiv:2307.14666v1 [cs.CL])

Title: Improving Aspect-Based Sentiment with End-to-End Semantic Role Labeling Model. (arXiv:2307.14785v1 [cs.CL])

Title: ARC-NLP at PAN 2023: Hierarchical Long Text Classification for Trigger Detection. (arXiv:2307.14912v1 [cs.CL])

Title: ARC-NLP at PAN 2023: Transition-Focused Natural Language Inference for Writing Style Detection. (arXiv:2307.14913v1 [cs.CL])

Title: Incrementally-Computable Neural Networks: Efficient Inference for Dynamic Inputs. (arXiv:2307.14988v1 [cs.LG])

Title: HUTFormer: Hierarchical U-Net Transformer for Long-Term Traffic Forecasting. (arXiv:2307.14596v1 [cs.LG])

generative

Title: A Survey on Generative Modeling with Limited Data, Few Shots, and Zero Shot. (arXiv:2307.14397v1 [cs.CV])

Title: EqGAN: Feature Equalization Fusion for Few-shot Image Generation. (arXiv:2307.14638v1 [cs.CV])

Title: MIM-OOD: Generative Masked Image Modelling for Out-of-Distribution Detection in Medical Images. (arXiv:2307.14701v1 [cs.CV])

Title: Semantic Image Completion and Enhancement using GANs. (arXiv:2307.14748v1 [cs.CV])

Title: GET3D--: Learning GET3D from Unconstrained Image Collections. (arXiv:2307.14918v1 [cs.CV])

Title: Take-A-Photo: 3D-to-2D Generative Pre-training of Point Cloud Models. (arXiv:2307.14971v1 [cs.CV])

Title: How Good is Google Bard's Visual Understanding? An Empirical Study on Open Challenges. (arXiv:2307.15016v1 [cs.CV])

Title: Evaluating Generative Models for Graph-to-Text Generation. (arXiv:2307.14712v1 [cs.CL])

Title: Likely, Light, and Accurate Context-Free Clusters-based Trajectory Prediction. (arXiv:2307.14788v1 [cs.LG])

large language model

Title: How Can Large Language Models Help Humans in Design and Manufacturing?. (arXiv:2307.14377v1 [cs.CL])

Title: CliniDigest: A Case Study in Large Language Model Based Large-Scale Summarization of Clinical Trial Descriptions. (arXiv:2307.14522v1 [cs.CL])

Title: ArcGPT: A Large Language Model Tailored for Real-world Archival Applications. (arXiv:2307.14852v1 [cs.CL])

Title: PanGu-Coder2: Boosting Large Language Models for Code with Ranking Feedback. (arXiv:2307.14936v1 [cs.CL])

Title: SuperCLUE: A Comprehensive Chinese Large Language Model Benchmark. (arXiv:2307.15020v1 [cs.CL])

Title: Matching Patients to Clinical Trials with Large Language Models. (arXiv:2307.15051v1 [cs.CL])

Title: A Geometric Notion of Causal Probing. (arXiv:2307.15054v1 [cs.CL])

segmentation

Title: Learned Gridification for Efficient Point Cloud Processing. (arXiv:2307.14354v1 [cs.CV])

In this work, we address the scalability issue of point cloud methods by tackling its root cause: the irregularity of the data. We propose learnable gridification as the first step in a point cloud processing pipeline to transform the point cloud into a compact, regular grid. Thanks to gridification, subsequent layers can use operations defined on regular grids, e.g., Conv3D, which scale much better than native point cloud methods. We then extend gridification to point cloud to point cloud tasks, e.g., segmentation, by adding a learnable de-gridification step at the end of the point cloud processing pipeline to map the compact, regular grid back to its original point cloud form. Through theoretical and empirical analysis, we show that gridified networks scale better in terms of memory and time than networks directly applied on raw point cloud data, while being able to achieve competitive results. Our code is publicly available at https://github.com/computri/gridifier.

Title: Human-centric Scene Understanding for 3D Large-scale Scenarios. (arXiv:2307.14392v1 [cs.CV])

Title: Self-supervised Few-shot Learning for Semantic Segmentation: An Annotation-free Approach. (arXiv:2307.14446v1 [cs.CV])

Title: Technical note: ShinyAnimalCV: open-source cloud-based web application for object detection, segmentation, and three-dimensional visualization of animals using computer vision. (arXiv:2307.14487v1 [cs.CV])

Title: Patterns of Vehicle Lights: Addressing Complexities in Curation and Annotation of Camera-Based Vehicle Light Datasets and Metrics. (arXiv:2307.14521v1 [cs.CV])

Title: GenCo: An Auxiliary Generator from Contrastive Learning for Enhanced Few-Shot Learning in Remote Sensing. (arXiv:2307.14612v1 [cs.CV])

Title: High Dynamic Range Imaging via Visual Attention Modules. (arXiv:2307.14705v1 [cs.CV])

Title: vox2vec: A Framework for Self-supervised Contrastive Learning of Voxel-level Representations in Medical Images. (arXiv:2307.14725v1 [cs.CV])

Title: Towards Deeply Unified Depth-aware Panoptic Segmentation with Bi-directional Guidance Learning. (arXiv:2307.14786v1 [cs.CV])

Title: Adaptive Segmentation Network for Scene Text Detection. (arXiv:2307.15029v1 [cs.CV])

Title: To Adapt or Not to Adapt? Real-Time Adaptation for Semantic Segmentation. (arXiv:2307.15063v1 [cs.CV])