-
Notifications
You must be signed in to change notification settings - Fork 0
/
AISec2013-cfp.txt
132 lines (110 loc) · 4.99 KB
/
AISec2013-cfp.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
*** 6th ACM Workshop on Artificial Intelligence and Security ***
https://sites.google.com/site/ccsaisec2013/home
Held in Conjunction with ACM CCS 2013
November 4, 2013 -- Berlin Congress Centre, Berlin, Germany
*** Extended Deadline ***
Paper submissions due: July 29, 2013 (23:59 PDT)
Acceptance notification: August 21, 2013
Camera ready due: August 30, 2013
Workshop: November 4, 2013
*** Call for Papers ***
The potential for applying artificial intelligence (AI), machine
learning, and data mining to security and privacy problems is
ever-more lucrative. The analytic tools and intelligent behavior
provided by these techniques makes AI and learning increasingly
important for autonoumous real-time analysis and decision-making in
domains with a wealth of data or that require quick reactions to
ever-changing situations. Particularly, these intelligent
technologies offer new solutions to security problems involving Big
Data analysis, which can be scaled through cloud-computing. Further,
the use of learning methods in security-sensitive domains creates new
frontiers for security research, in which adversaries may attempt to
mislead or evade intelligent machines. The 2013 ACM Workshop on
Artificial Intelligence and Security (AISec) provides a venue for
presenting and discussing new developments in this fusion of
security/privacy with AI and machine learning.
We invite original research papers describing the use of AI or machine
learning in security, privacy and related problems. We also invite
position and open problem papers discussing the role of AI or machine
learning in security and privacy. Submitted papers of these types may
not substantially overlap papers that have been published previously
or that are simultaneously submitted to a journal or
conference/workshop proceedings. Finally we again welcome a
'systematization of knowledge' category of papers, which should
distill the AI or machine learning contributions of a previously
published series of security papers.
Regular research, systematization of knowledge, and open/position
paper submissions must be at most 10 pages in double-column ACM format
(note: pages must be numbered) excluding the bibliography and
well-marked appendices, and at most 12 pages overall. Committee
members are not required to read the appendices, so the paper should
be intelligible without them. Submissions need not be anonymized. We
recommend the use of the ACM SIG Proceedings templates for
submissions. The ACM format is the required template for the
camera-ready version. Accepted papers will be published by the ACM
Digital Library and/or ACM Press.
Submissions can be made through EasyChair at:
https://www.easychair.org/conferences/?conf=aisec2013
Topics of interest include, but are not limited to:
** Theoretical topics related to security **
* Adversarial Learning
* Robust Statistics
* Online Learning
* Learning in stochastic games
** Security applications **
* Computer Forensics
* Spam detection
* Phishing detection and prevention
* Botnet detection
* Intrusion detection and response
* Malware identification
* Authorship Identification
* Big data analytics for security
** Security-related AI problems **
* Distributed inference and decision making for security
* Secure multiparty computation and cryptographic approaches
* Privacy-preserving data mining
* Adaptive side-channel attacks
* Design and analysis of CAPTCHAs
* AI approaches to trust and reputation
* Vulnerability testing through intelligent probing (e.g. fuzzing)
* Content-driven security policy management & access control
* Techniques and methods for generating training and test sets
* Anomalous behavior detection (e.g. fraud prevention, authentication)
*** Organization ***
General Chair:
Ahmad-Reza Sadeghi, TU Darmstadt; CASED; Fraunhofer SIT; Intel ICRI-SC
Program Co-Chairs:
Blaine Nelson, University of Potsdam
Christos Dimitrakakis, EPFL
Elaine Shi, University of Maryland, College Park
Program Committee
Battista Biggio, University of Cagliari
Ulf Brefeld, Technische Universität Darmstadt
Michael Brückner, SoundCloud Inc.
Mike Burmester, Florida State University
Alvaro A. Cárdenas, University of Texas at Dallas
Mario Frank, University of California, Berkeley
Rachel Greenstadt, Drexel University
Guofei Gu, Texas A&M University
Ling Huang, Intel Labs
Anthony Joseph, University of California, Berkeley
Ari Juels, RSA Labs
Pavel Laskov, University of Tübingen
Daniel Lowd, University of Oregon
Pratyusa Manadhata, HP Labs
Aikaterini Mitrokotsa, HESSO-GE
Roberto Perdisci, University of Georgia
Vasyl Pihur, Google Inc.
Konrad Rieck, University of Göttingen
Fabio Roli, University of Cagliari
Benjamin I. P. Rubinstein, IBM Research
Robin Sommer, ICSI and LBNL
Nina Taft, Technicolor
J. D. Tygar, University of California, Berkeley
Shobha Venkataraman, AT&T Research
Ting-Fang Yen, RSA Labs
--
Prof. Dr. Konrad Rieck
Computer Security Group, University of Göttingen
http://www.sec.cs.uni-goettingen.de