danielphan2003 / arxiv-daily-summaries

An issue a day keeps the paper overload away.
1 stars 0 forks source link

New submissions for Fri, 16 Jun 23 #65

Open github-actions[bot] opened 1 year ago

github-actions[bot] commented 1 year ago

This is an autogenerated issue. It uses the facebook/bart-large-cnn model to generate summaries for each papers appeared below.


Keyword: IoT (13 papers)

PrivaScissors: Enhance the Privacy of Collaborative Inference through the Lens of Mutual Information

:brain: Authors: Lin Duan, Jingwei Sun, Yiran Chen, Maria Gorlatova
:paw_prints: Details: arXiv:2306.07973
:ramen: tl;dr: Edge-cloud collaborative inference empowers resource-limited IoT devices to support deep learning applications without disclosing their raw data to the cloud server. Prior research has shown that collaborative inference still results in the exposure of data and predictions from edge devices. To enhance the privacy of collaborative inference, we introduce a defense strategy called PrivaScissors....
:seedling: Read more →

A Survey on Cross-Architectural IoT Malware Threat Hunting

:brain: Authors: Anandharaju Durai Raju, Ibrahim Abualhaol, Ronnie Salvador Giagone, Yang Zhou, Shengqiang Huang
:paw_prints: Details: arXiv:2306.07989
:ramen: tl;dr: In recent years, the increase in non-Windows malware threats had turned the focus of the cybersecurity community. Research works on hunting Windows PE-based malwares are maturing, whereas the developments on Linux malware threat hunting are relatively scarce. This study aims at providing a comprehensive survey on the latest developments in cross-architectural IoT malware detection and classification approaches....
:sunflower: Comments: this https URL
:seedling: Read more →

AutoML in the Age of Large Language Models: Current Challenges, Future Opportunities and Risks

:brain: Authors: Alexander Tornede, Difan Deng, Theresa Eimer, Joseph Giovanelli, Aditya Mohan, Tim Ruhkopf, Sarah Segel, Daphne Theodorakopoulos, Tanja Tornede, Henning Wachsmuth, Marius Lindauer
:paw_prints: Details: arXiv:2306.08107
:ramen: tl;dr: Natural Language Processing (NLP) and Automated Machine Learning (AutoML) have achieved remarkable results over the past years. We envision that the two fields can radically push the boundaries of each other through tight integration. By highlighting conceivable synergies, but also risks, we aim to foster further exploration at the intersection of AutoML and LLMs....
:seedling: Read more →

ChatGPT vs. Lightweight Security: First Work Implementing the NIST Cryptographic Standard ASCON

:brain: Authors: Alvaro Cintas-Canto, Jasmin Kaur, Mehran Mozaffari-Kermani, Reza Azarderakhsh
:paw_prints: Details: arXiv:2306.08178
:ramen: tl;dr: This study is the first to explore the intersection between lightweight cryptography (LWC) and advanced artificial intelligence (AI) language models. LWC, in particular the ASCON algorithm which has been selected as the LWC standard by the National Institute of Standards and Technology (NIST) in Feb. 2023, has become increasingly significant....
:seedling: Read more →

A Contemporary Survey on 6G Wireless Networks: Potentials, Recent Advances, Technical Challenges and Future Trends

:brain: Authors: Syed Agha Hassnain Mohsan, Yanlong Li
:paw_prints: Details: arXiv:2306.08265
:ramen: tl;dr: Smart services based on Internet of everything (IoE) are prophesied to reap notable attention by both academia and industry in the future. Sixth-generation (6G) technology is envisaged to overcome limitations of 5G technology. Key technological breakthroughs which include quantum communication, tactile communication, holographic communication, terahertz communication....
:seedling: Read more →

Building a Corpus for Biomedical Relation Extraction of Species Mentions

:brain: Authors: Oumaima El Khettari, Solen Quiniou, Samuel Chaffron
:paw_prints: Details: arXiv:2306.08403
:ramen: tl;dr: We present a manually annotated corpus, Species-Species Interaction, for extracting meaningful binary relations between species, in biomedical texts. The corpus leverages PubTator to annotate species in full-text articles after evaluating different Named Entity Recognition species taggers. Our first results are promising for extracting relations using BERT and its biomedical variants....
:sunflower: Comments: Accepted in BioNLP@ACL 2023
:seedling: Read more →

Deep Gaussian Markov Random Fields for Graph-Structured Dynamical Systems

:brain: Authors: Fiona Lippert, Bart Kranstauber, E. Emiel van Loon, Patrick Forré
:paw_prints: Details: arXiv:2306.08445
:ramen: tl;dr: We develop a computationally efficient approach to state estimation and learning in graph-structured state-space models with (partially) unknown dynamics and limited historical data. Under linear Gaussian assumptions, we retain a closed-form posterior, which can be sampled efficiently using the conjugate gradient method....
:seedling: Read more →

Single-board Device Individual Authentication based on Hardware Performance and Anomaly Detection for Crowdsensing Platforms

:brain: Authors: Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Gérôme Bovet, Gregorio Martínez Pérez
:paw_prints: Details: arXiv:2306.08495
:ramen: tl;dr: The proliferation of the Internet of Things (IoT) has led to the emergence of crowdsensing applications. Ensuring the authenticity and integrity of the data collected by these devices is crucial for reliable decision-making and maintaining trust in the system. Traditional authentication methods are often vulnerable to attacks or can be easily duplicated....
:seedling: Read more →

Ultra8T: A Sub-Threshold 8T SRAM with Leakage Detection

:brain: Authors: Shan Shen, Hao Xu, Yongliang Zhou, Ming Ling, Wenjian Yu
:paw_prints: Details: arXiv:2306.08936
:ramen: tl;dr: In energy-constrained scenarios such as IoT applications, the primary requirement for System-on-Chips (SoCs) is to increase battery life. When performing sub/near-threshold operations, the relatively large leakage current hinders Static Random Access Memory (SRAM) from normal read/write functionalities at the lowest possible voltage. In this work, we propose an Ultra8T SRAM to aggressively reduce VDDMIN by using a leakage detection strategy....
:sunflower: Comments: This manuscript has been submitted to TCAS-I and waiting for the decision
:seedling: Read more →

Who Let the Smart Toaster Hack the House? An Investigation into the Security Vulnerabilities of Consumer IoT Devices

:brain: Authors: Yang Li, Anna Maria Mandalari, Isabel Straw
:paw_prints: Details: arXiv:2306.09017
:ramen: tl;dr: Despite the proliferation of connected digital technologies in the home environment, there is a lack of research evaluating the security vulnerabilities and potential risks present within these systems. We perform thousands of automated experiments using 11 popular commercial IoT devices when deployed in a testbed. Our findings indicate that these devices are vulnerable to security attacks....
:sunflower: Comments: 6 pages, 1 figure, submitted to the 2nd workshop on Security and Privacy in Connected Embedded Systems (SPICES)
:seedling: Read more →

Web of Things and Trends in Agriculture: A Systematic Literature Review

:brain: Authors: Muhammad Shoaib Farooq, Shamyla Riaz, Atif Alvi
:paw_prints: Details: arXiv:2306.09079
:ramen: tl;dr: The Web of Things (WOT) became a beneficial game-changing technology within the Agriculture domain. WOT provides the support for integration, interoperability for heterogeneous devices, infrastructures, platforms, and the emergence of various other technologies. The main aim of this study is about understanding and providing a growing and existing research content, issues, and directions for the future....
:sunflower: Comments: 36 pages, 20 figures
:seedling: Read more →

STARSS23: An Audio-Visual Dataset of Spatial Recordings of Real Scenes with Spatiotemporal Annotations of Sound Events

:brain: Authors: Kazuki Shimada, Archontis Politis, Parthasaarathy Sudarsanam, Daniel Krause, Kengo Uchida, Sharath Adavanne, Aapo Hakala, Yuichiro Koyama, Naoya Takahashi, Shusuke Takahashi, Tuomas Virtanen, Yuki Mitsufuji
:paw_prints: Details: arXiv:2306.09126
:ramen: tl;dr: The direction of arrival (DOA) of sound events is generally estimated from multichannel audio data recorded in a microphone array. Sound events usually derive from visually perceptible source objects, e.g., sounds of footsteps come from the feet of a walker. This paper proposes an audio-visual sound event localization and detection (SELD) task. The data is available at https //zenodo.org/record/7880637....
:sunflower: Comments: 25 pages, 8 figures
:seedling: Read more →

Tecnicas Avanzadas de Ciberseguridad: Integracion y Evolucion de la Kill Chain en Diversos Escenarios

:brain: Authors: Juan Diego Bermudez, Josue Joel Castro, Diego Alejandro Peralta, Pablo Alejandro Guacaneme
:paw_prints: Details: arXiv:2306.09242
:ramen: tl;dr: The document provides an in-depth analysis of the main attack chain models used in cybersecurity. These include the Lockheed Martin Cyber Kill Chain framework, MITER ATT&CK framework, the Diamond model, and the IoTKC. A review of insider attacks in cloud computing shows how the combination of attack trees and kill chains can offer an effective methodology....
:sunflower: Comments: in Spanish language
:seedling: Read more →

Keyword: edge computing (2 papers)

A Novel Channel-Constrained Model for 6G Vehicular Networks with Traffic Spikes

:brain: Authors: Ke Deng, Zhiyuan He, Haohan Lin, Hao Zhang, Desheng Wang
:paw_prints: Details: arXiv:2306.08417
:ramen: tl;dr: Mobile Edge Computing (MEC) holds excellent potential in Congestion Management (CM) of 6G vehicular networks. Unfortunately, existing parallel and sequential models cannot cope with scarce computing resources and constrained channels. In this paper, we propose a channel-constrained multi-core sequential model (CCMSM)...
:seedling: Read more →

Scalable Resource Management for Dynamic MEC: An Unsupervised Link-Output Graph Neural Network Approach

:brain: Authors: Xiucheng Wang, Nan Cheng, Lianhao Fu, Wei Quan, Ruijin Sun, Yilong Hui, Tom Luan, Xuemin (Sherman) Shen
:paw_prints: Details: arXiv:2306.08938
:ramen: tl;dr: Deep learning has been successfully adopted in mobile edge computing (MEC) to optimize task offloading and resource allocation. The dynamics of edge networks raise two challenges in neural network (NN)-based optimization methods: low scalability and high training costs. To address the issue, a novel link-output GNN-based resource management approach is proposed to optimize the resource allocation in MEC....
:seedling: Read more →

Keyword: Blockchain (6 papers)

Cross Chain Bribery Contracts: Majority vs Mighty Minority

:brain: Authors: Quang Tran, Lin Chen, Lei Xu, Yang Lu, Rabimba Karanjai, Weidong Shi
:paw_prints: Details: arXiv:2306.07984
:ramen: tl;dr: Bribery is a perilous issue in the real world, especially in an economical aspect. This fraudulence is unavoidable, and more importantly, it is more difficult to trace in case smart contracts are utilized for bribing on a distributed public blockchain. An arbitrary wealthy briber can utilize cross-chain smart contracts to manipulate a consensus mechanism on a victim's blockchain....
:seedling: Read more →

Distributed Trust Through the Lens of Software Architecture

:brain: Authors: Sin Kit Lo, Yue Liu, Guangsheng Yu, Qinghua Lu, Xiwei Xu, Liming Zhu
:paw_prints: Details: arXiv:2306.08056
:ramen: tl;dr: Distributed trust is a nebulous concept that has evolved from different perspectives in recent years. This paper will survey the concept of distributed trust in multiple disciplines. It will take a system/software architecture point of view to look at trust redistribution/shift and the associated tradeoffs....
:seedling: Read more →

RETINA: Distributed and Secure Trust Management for Smart Grid Applications and Energy Trading

:brain: Authors: Vaios Boulgourasa, Thodoris Ioannidis, Ilias Politis, Christos Xenakis
:paw_prints: Details: arXiv:2306.08074
:ramen: tl;dr: The rapid adoption of smart grids demands robust security and efficiency measures. This paper presents an innovative framework, named RETINA, which provides a resilient and secure energy trading mechanism within smart grid systems. The utility and robustness of RETINA have been validated in a virtualized testbed environment with 500 nodes....
:sunflower: Comments: Under submission to Elsevier's Sustainable Energy, Grids and Networks (SEGAN)
:seedling: Read more →

Causal Feature Engineering of Price Directions of Cryptocurrencies using Dynamic Bayesian Networks

:brain: Authors: Rasoul Amirzadeh, Asef Nazari, Dhananjay Thiruvady, Mong Shan Ee
:paw_prints: Details: arXiv:2306.08157
:ramen: tl;dr: Cryptocurrencies have gained popularity across various sectors, especially in finance and investment. Despite their growing popularity, cryptocurrencies remain a high-risk investment due to their price volatility and uncertainty. The knowledge obtained from predicting the direction of cryptocurrency prices can provide valuable guidance for investors in making informed investment decisions....
:sunflower: Comments: 28 pages, 8 figures, 6 tables
:seedling: Read more →

Decentralizing Custodial Wallets with MFKDF

:brain: Authors: Vivek Nair, Dawn Song
:paw_prints: Details: arXiv:2306.08168
:ramen: tl;dr: The average cryptocurrency user today faces a difficult choice between centralized custodial wallets and self-custody solutions. In our design, private keys are not stored on any device, but are instead derived directly from a user's authentication factors. Public parameters (salts, one-time pads, etc.) needed to access the wallet can be safely stored in public view, such as on a public blockchain....
:seedling: Read more →

Shaping digital transformation for a sustainable society -- Contributions from Bits & Bäume

:brain: Authors: Patricia Jankowski, Anja Höfner, Marja Lena Hoffmann, Friederike Rohde, Rainer Rehak, Johanna Graf (Eds.)
:paw_prints: Details: arXiv:2306.09204
:ramen: tl;dr: This companion book to the "Bits & B\"aume" conference 2022 compiles the insights, work, research and opinions of more than 65 authors. The articles address different sub-areas of the intersections between digitalisation and sustainability. Offering not only transparency but also solutions, the journal presents practical approaches and concepts related to the necessary transformation....
:sunflower: Comments: 152 pages, several info graphics
:seedling: Read more →

Keyword: Federated Learning (10 papers)

Privacy Inference-Empowered Stealthy Backdoor Attack on Federated Learning under Non-IID Scenarios

:brain: Authors: Haochen Mei, Gaolei Li, Jun Wu, Longfei Zheng
:paw_prints: Details: arXiv:2306.08011
:ramen: tl;dr: Federated learning (FL) naturally faces the problem of data heterogeneity in real-world scenarios. We propose a novel privacy inference-empowered stealthy backdoor attack (PI-SBA) scheme for FL under non-IID scenarios. Extensive experiments based on MNIST, CIFAR10 and Youtube Aligned Face datasets demonstrate that the proposed PI-Sba scheme is effective in non- IID FL and stealthy against state-of-the-art defenses....
:sunflower: Comments: It can be accepted IJCNN
:seedling: Read more →

(Amplified) Banded Matrix Factorization: A unified approach to private training

:brain: Authors: Christopher A. Choquette-Choo, Arun Ganesh, Ryan McKenna, H. Brendan McMahan, Keith Rush, Abhradeep Guha Thakurta, Zheng Xu
:paw_prints: Details: arXiv:2306.08153
:ramen: tl;dr: Matrix factorization (MF) mechanisms for differential privacy (DP) have substantially improved the state-of-the-art in privacy-utility-computation tradeoffs for ML applications. In both the centralized and federated settings there remain instances where either MF cannot be easily applied, or other algorithms provide better tradeoffs. The key technique throughout is the construction of MF mechanisms with banded matrices. For cross-device federated learning (FL), this enables multiple-participations....
:sunflower: Comments: 34 pages, 13 figures
:seedling: Read more →

Differentially Private Wireless Federated Learning Using Orthogonal Sequences

:brain: Authors: Xizixiang Wei, Tianhao Wang, Ruiquan Huang, Cong Shen, Jing Yang, H. Vincent Poor
:paw_prints: Details: arXiv:2306.08280
:ramen: tl;dr: We propose a novel privacy-preserving uplink over-the-air computation (AirComp) method, termed FLORAS, for single- input single-output (S ISO) wireless federated learning (FL) systems. FLORas eliminates the requirement of channel state information at the transmitters (CSIT) by leveraging the properties of orthogonal sequences....
:sunflower: Comments: 33 pages, 5 figures, submitted to IEEE TSP
:seedling: Read more →

Provably Personalized and Robust Federated Learning

:brain: Authors: Mariel Werner, Lie He, Sai Praneeth Karimireddy, Michael Jordan, Martin Jaggi
:paw_prints: Details: arXiv:2306.08393
:ramen: tl;dr: Clustering clients with similar objectives and learning a model per cluster is an intuitive and interpretable approach to personalization in federated learning. However, doing so with provable and optimal guarantees has remained an open challenge. In this work, we formalize personalized federatedlearning as a stochastic optimization problem. We show that using a simple thresholding-based clustering algorithm and local client gradients obtains optimal convergence guarantees....
:seedling: Read more →

Fairness and Privacy-Preserving in Federated Learning: A Survey

:brain: Authors: Taki Hasan Rafi, Faiza Anan Noor, Tahmid Hussain, Dong-Kyu Chae
:paw_prints: Details: arXiv:2306.08402
:ramen: tl;dr: Federated learning (FL) as distributed machine learning has gained popularity as privacy-aware Machine Learning (ML) systems. The existing works, however, employ privacy mechanisms such as Secure Multiparty Computing (SMC), Differential Privacy (DP), etc. Which are susceptible to interference, massive computational overhead, low accuracy, etc....
:seedling: Read more →

Federated Learning-based Vehicle Trajectory Prediction against Cyberattacks

:brain: Authors: Zhe Wang, Tingkai Yan
:paw_prints: Details: arXiv:2306.08566
:ramen: tl;dr: With the development of the Internet of Vehicles (IoV), vehicle wireless communication poses serious cybersecurity challenges. Faulty information, such as fake vehicle positions and speeds sent by surrounding vehicles, could cause vehicle collisions, traffic jams, and even casualties. Therefore, achieving a cyberattack-defense scheme in the IoV system with faulty data saturation is necessary....
:seedling: Read more →

Fed-ZERO: Efficient Zero-shot Personalization with Federated Mixture of Experts

:brain: Authors: Chen Dun, Mirian Hipolito Garcia, Guoqing Zheng, Ahmed Hassan Awadallah, Robert Sim, Anastasios Kyrillidis, Dimitrios Dimitriadis
:paw_prints: Details: arXiv:2306.08586
:ramen: tl;dr: One of the goals in Federated Learning (FL) is to create personalized models. We propose a novel solution by using a Mixture-of-Experts (MoE) framework within a FL setup. Our method leverages the diversity of the clients to train specialized experts on different subsets of classes....
:sunflower: Comments: 14 Pages
:seedling: Read more →

Community Detection Attack against Collaborative Learning-based Recommender Systems

:brain: Authors: Yacine Belal, Sonia Ben Mokhtar, Mohamed Maouche, Anthony Simonet-Boulogne
:paw_prints: Details: arXiv:2306.08929
:ramen: tl;dr: Collaborative-learning based recommender systems emerged following the success of collaborative learning techniques such as Federated Learning (FL) and Gossip Learning (GL) In these systems, users participate in the training of a recommender system while keeping their history of consumed items on their devices. Recent studies have shown that collaborative learning can be vulnerable to a variety of privacy attacks....
:seedling: Read more →

An Efficient and Multi-private Key Secure Aggregation for Federated Learning

:brain: Authors: Xue Yang, Zifeng Liu, Xiaohu Tang, Rongxing Lu, Bo Liu
:paw_prints: Details: arXiv:2306.08970
:ramen: tl;dr: Secure aggregation protocols that mainly adopt either homomorphic encryption or threshold secret sharing have been widely developed for federated learning to protect the privacy of the local training data of each client. These existing protocols suffer from many shortcomings, such as the dependence on a trusted third party, the vulnerability to clients being corrupted and low efficiency....
:seedling: Read more →

Your Room is not Private: Gradient Inversion Attack for Deep Q-Learning

:brain: Authors: Miao Li, Wenhao Ding, Ding Zhao
:paw_prints: Details: arXiv:2306.09273
:ramen: tl;dr: The prominence of embodied Artificial Intelligence (AI), which empowers robots to navigate, perceive, and engage within virtual environments, has attracted significant attention. Privacy emerges as a pivotal concern within the realm of embodied AI, as the robot access substantial personal information. This paper aims to address this gap by proposing an attack on the Deep Q-Learning algorithm, utilizing gradient inversion....
:sunflower: Comments: 15 pages, 9 figures
:seedling: Read more →