Connectionists: CFP: AISec 2014

Christos Dimitrakakis christos.dimitrakakis at gmail.com
Sun Jun 1 15:40:12 EDT 2014


                  Call For Papers

                    AISec 2014
7th ACM Workshop on Artificial Intelligence and Security
      Held in Conjunction with ACM CCS 2014
http://www.cse.chalmers.se/~aikmitr/AISec2014.html
                 November 7, 2014
The Scottsdale Plaza Resort, Scottsdale, Arizona, USA



The relation of artificial intelligence (AI), machine learning, and data 
mining to security and privacy problems is ever-more critical, with AI 
algorithms controlling important infrastructure, such as electrical 
grids, road networks and healthcare applications. More generally, AI and 
ML are increasingly important for autonomous real-time analysis and 
decision-making in domains with a wealth of data or that require quick 
reactions to ever-changing situations. Particularly, these intelligent 
technologies offer new solutions to security problems involving Big Data 
analysis, which can be scaled through cloud-computing. Further, the use 
of learning methods in security sensitive domains creates new frontiers 
for security research, in which adversaries may attempt to mislead or 
evade intelligent machines. The 2014 ACM Workshop on Artificial 
Intelligence and Security (AISec) provides a venue for presenting and 
discussing new developments in this fusion of security/privacy with AI 
and machine learning.


We invite original research papers describing the use of AI or machine 
learning in security, privacy and related problems. We also invite 
position and open problem papers discussing the role of AI or machine 
learning in security and privacy. Submitted papers of these types may 
not substantially overlap papers that have been published previously or 
that are simultaneously submitted to a journal or conference/workshop 
proceedings. Finally we again welcome a `systematization of knowledge' 
category of papers, which should distill the AI or machine learning 
contributions of a previously published series of security papers.


Regular research, systematization of knowledge, and open/position paper 
submissions must be at most 10 pages in double-column ACM format (note: 
pages must be numbered) excluding the bibliography and well-marked 
appendices, and at most 12 pages overall. Committee members are not 
required to read the appendices, so the paper should be intelligible 
without them. Submissions need not be anonymized. We recommend the use 
of the ACM SIG Proceedings templates for submissions. The ACM format is 
the required template for the camera-ready version. Accepted papers will 
be published by the ACM Digital Library and/or ACM Press.


---------------------------------------------

Important Dates

Paper submissions due:  25 July 2014
Acceptance notification: 25 August 2014
Camera ready (FIRM DEADLINE): 9 September 2014
Workshop: 7 November 2014


---------------------------------------------

Submissions

Submissions can be made through EasyChair at:
https://www.easychair.org/conferences/?conf=aisec2014

--------------------------------------------
Topics

Topics of interest include, but are not limited to:

Theoretical topics related to security

- Adversarial Learning
- Robust Statistics
- Learning in stochastic games
- Online learning
- Differential-privacy

Security Applications
- Computer Forensics
- Spam detection
- Phishing detection & prevention
- Botnet detection
- Intrusion detection and response
- Malware identification
- Authorship Identification
- Big data analytics for security


Security-related AI problems
- Distributed inference and decision making for security
- Secure multiparty computation and cryptographic approaches
- Privacy-preserving data mining
- Adaptive side-channel attacks
- Design and analysis of CAPTCHAs
- AI approaches to trust and reputation
- Vulnerability testing through intelligent probing (e.g. fuzzing)
- Content-driven security policy management & access control
- Techniques and methods for generating training and test sets
- Anomalous behavior detection (e.g. for the purpose of fraud detection, 
authentication)

---------------------------------------------

Program Chairs

- Christos Dimitrakakis, Chalmers University of Technology, Sweden
- Katerina Mitrokotsa, Chalmers University of Technology, Sweden
- Benjamin I. P. Rubinstein,  The University of Melbourne, Australia


Program Committee: (To be updated)

- Battista Biggio, University of Cagliari, Italy
- Alex Kantchelian, UC Berkeley, CA, USA
- Kamalika Chaudhuri, University of California at San Diego, CA, USA
- Rachel Greenstadt, Drexel University, PA, USA
- Guofei Gu, Texas A&M University, TX, USA
- Daniel Lowd, University of Oregon, OR, USA
- Pratyusa Manadhata, HP Labs, USA
- Konrad Rieck, University of Goettingen, Germany
- J. Doug Tygar, UC Berkeley, CA, USA



More information about the Connectionists mailing list