secure

Title: Controlling Large Language Models to Generate Secure and Vulnerable Code. (arXiv:2302.05319v1 [cs.CR])

To address this limitation, this work formulates a new problem called controlled code generation, which allows users to input a boolean property into an LM to control if the LM generates secure or vulnerable code. We propose svGen, an effective and lightweight learning approach for solving controlled code generation. svGen leverages property-specific continuous vectors to steer program generation toward the given property, without altering the weights of the LM. svGen's training optimizes those continuous vectors by carefully applying specialized loss terms on different regions of code.

Our extensive evaluation shows that svGen achieves strong control capability across various software vulnerabilities and LMs of different parameter sizes. For example, on 9 dangerous vulnerabilities, a state-of-the-art CodeGen LM with 2.7B parameters generates secure programs with a 57% chance. When we use svGen to control the LM to generate secure (resp., vulnerable) programs, the chance is significantly increased to 82% (resp., decreased to 35%).

security

Title: PETIoT: PEnetration Testing the Internet of Things. (arXiv:2302.04900v1 [cs.CR])

Title: Fee-Redistribution Smart Contracts for Transaction-Fee-Based Regime of Blockchains with the Longest Chain Rule. (arXiv:2302.04910v1 [cs.CR])

To mitigate these issues, we propose a solution that splits transaction fees from a mined block into two parts - (1) an instant reward for the miner of a block and (2) a deposit sent to one or more fee-redistribution smart contracts ($\mathcal{FRSC}$s) that are part of the consensus protocol. At the same time, these redistribution smart contracts reward the miner of a block with a certain fraction of the accumulated funds of the incoming fees over a predefined time. This setting enables us to achieve several interesting properties that are beneficial for the incentive stability and security of the protocol.

With our solution, the fraction of Default-Compliant miners who strictly do not execute undercutting attacks is lowered from the state-of-the-art result of 66% to 30%.

Title: An Assessment Methodology and Instrument for Cybersecurity: The Ireland Use Case. (arXiv:2302.05166v1 [cs.CR])

privacy

Title: Key Design Choices for Double-Transfer in Source-Free Unsupervised Domain Adaptation. (arXiv:2302.05379v1 [cs.LG])

Title: On Achieving Privacy-Preserving State-of-the-Art Edge Intelligence. (arXiv:2302.05323v1 [cs.CR])

Title: Building cross-language corpora for human understanding of privacy policies. (arXiv:2302.05355v1 [cs.CR])

protect

defense

Title: Piecewise Linear and Stochastic Models for the Analysis of Cyber Resilience. (arXiv:2302.04982v1 [cs.CR])

attack

Title: Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples. (arXiv:2302.05086v1 [cs.LG])

Title: Step by Step Loss Goes Very Far: Multi-Step Quantization for Adversarial Text Attacks. (arXiv:2302.05120v1 [cs.CL])

Title: Cyber-Resilience Approaches for Cyber-Physical Systems. (arXiv:2302.05402v1 [cs.CR])

robust

Title: Hyperparameter Search Is All You Need For Training-Agnostic Backdoor Robustness. (arXiv:2302.04977v1 [cs.CR])

In this paper, we take a pragmatic, developer-centric view and show how practitioners can answer two actionable questions: (1) how robust is my model to backdoor poisoning attacks?, and (2) how can I make it more robust without changing the training pipeline? We focus on the size of the compromised subset of the training data as a universal metric. We propose an easy-to-learn primitive sub-task to estimate this metric, thus providing a baseline on backdoor poisoning. Next, we show how to leverage hyperparameter search - a tool that ML developers already extensively use - to balance the model's accuracy and robustness to poisoning, without changes to the training pipeline.

We demonstrate how to use our metric to estimate the robustness of models to backdoor attacks. We then design, implement, and evaluate a multi-stage hyperparameter search method we call Mithridates that strengthens robustness by 3-5x with only a slight impact on the model's accuracy. We show that the hyperparameters found by our method increase robustness against multiple types of backdoor attacks and extend our method to AutoML and federated learning.

Title: Predicting Out-of-Distribution Error with Confidence Optimal Transport. (arXiv:2302.05018v1 [cs.LG])

Title: Long-Tailed Partial Label Learning via Dynamic Rebalancing. (arXiv:2302.05080v1 [cs.LG])

Title: CCDN: Checkerboard Corner Detection Network for Robust Camera Calibration. (arXiv:2302.05097v1 [cs.CV])

Title: Exploiting Neighborhood Structural Features for Change Detection. (arXiv:2302.05114v1 [cs.CV])

Title: TTN: A Domain-Shift Aware Batch Normalization in Test-Time Adaptation. (arXiv:2302.05155v1 [cs.CV])

Title: Dual Memory Units with Uncertainty Regulation for Weakly Supervised Video Anomaly Detection. (arXiv:2302.05160v1 [cs.CV])

Title: MoreauGrad: Sparse and Robust Interpretation of Neural Networks via Moreau Envelope. (arXiv:2302.05294v1 [cs.CV])

Title: Scaling Vision Transformers to 22 Billion Parameters. (arXiv:2302.05442v1 [cs.CV])

Title: PATCorrect: Non-autoregressive Phoneme-augmented Transformer for ASR Error Correction. (arXiv:2302.05040v1 [cs.CL])

Title: Debiasing Recommendation by Learning Identifiable Latent Confounders. (arXiv:2302.05052v1 [cs.LG])

Confounding bias arises due to the presence of unmeasured variables (e.g., the socio-economic status of a user) that can affect both a user's exposure and feedback. Existing methods either (1) make untenable assumptions about these unmeasured variables or (2) directly infer latent confounders from users' exposure. However, they cannot guarantee the identification of counterfactual feedback, which can lead to biased predictions. In this work, we propose a novel method, i.e., identifiable deconfounder (iDCF), which leverages a set of proxy variables (e.g., observed user features) to resolve the aforementioned non-identification issue. The proposed iDCF is a general deconfounded recommendation framework that applies proximal causal inference to infer the unmeasured confounders and identify the counterfactual feedback with theoretical guarantees. Extensive experiments on various real-world and synthetic datasets verify the proposed method's effectiveness and robustness.

Title: Monte Carlo Neural Operator for Learning PDEs via Probabilistic Representation. (arXiv:2302.05104v1 [cs.LG])

Title: Beyond In-Domain Scenarios: Robust Density-Aware Calibration. (arXiv:2302.05118v1 [cs.LG])

Title: Discovering Sparse Hysteresis Models for Piezoelectric Materials: A Data-Driven Study and Perspectives into Modelling Magnetic Hysteresis. (arXiv:2302.05313v1 [cs.LG])

Title: Towards Minimax Optimality of Model-based Robust Reinforcement Learning. (arXiv:2302.05372v1 [cs.LG])

Title: A Practical Mixed Precision Algorithm for Post-Training Quantization. (arXiv:2302.05397v1 [cs.LG])

Title: Project and Probe: Sample-Efficient Domain Adaptation by Interpolating Orthogonal Features. (arXiv:2302.05441v1 [cs.LG])

biometric

steal

extraction

Title: Fast Learnings of Coupled Nonnegative Tensor Decomposition Using Optimal Gradient and Low-rank Approximation. (arXiv:2302.05119v1 [cs.LG])

Title: Deep Learning Based Object Tracking in Walking Droplet and Granular Intruder Experiments. (arXiv:2302.05425v1 [cs.CV])

Title: Event Temporal Relation Extraction with Bayesian Translational Model. (arXiv:2302.04985v1 [cs.CL])

Title: GCI: A (G)raph (C)oncept (I)nterpretation Framework. (arXiv:2302.04899v1 [cs.LG])

membership infer

federate

Title: Communication-Efficient Federated Hypergradient Computation via Aggregated Iterative Differentiation. (arXiv:2302.04969v1 [cs.LG])

Title: Federated Domain Adaptation via Gradient Projection. (arXiv:2302.05049v1 [cs.LG])

Title: XFL: A High Performace, Lightweighted Federated Learning Framework. (arXiv:2302.05076v1 [cs.LG])

Title: Achieving Linear Speedup in Non-IID Federated Bilevel Learning. (arXiv:2302.05412v1 [cs.LG])

fair

Title: AutoNMT: A Framework to Streamline the Research of Seq2Seq Models. (arXiv:2302.04981v1 [cs.CL])

Title: DRGCN: Dynamic Evolving Initial Residual for Deep Graph Convolutional Networks. (arXiv:2302.05083v1 [cs.LG])

interpretability

Title: Gaussian Process-Gated Hierarchical Mixtures of Experts. (arXiv:2302.04947v1 [cs.LG])

Title: ShapeWordNet: An Interpretable Shapelet Neural Network for Physiological Signal Classification. (arXiv:2302.05021v1 [cs.LG])

explainability

Title: Conceptual Views on Tree Ensemble Classifiers. (arXiv:2302.05270v1 [cs.LG])

watermark

diffusion

Title: Removing Structured Noise with Diffusion Models. (arXiv:2302.05290v1 [cs.LG])