posted by user: jstaddon || 8595 views || tracked by 16 users: [display]

AISec 2009 : Artificial Intelligence and Security

FacebookTwitterLinkedInGoogle


Conference Series : Security and Artificial Intelligence
 
Link: http://www.aisec.info
 
When Nov 9, 2009 - Nov 9, 2009
Where Chicago, IL
Submission Deadline Jun 19, 2009
Notification Due Aug 16, 2009
Final Version Due Aug 25, 2009
Categories    data mining   machine learning   security   privacy
 

Call For Papers

Scope

The ubiquitous nature of information and communication today is often cited as the cause of many security and privacy problems including identity and reputation management, viruses/worms and phishing/pharming. There is strong evidence, however, that this abundance of information and communication has at least as many security and privacy benefits as costs. Consider for example, the use of machine learning algorithms to detect network intrusions, crowd-based approaches to anonymous communication and the use of data mining algorithms to determine content sanitization. All of these efforts benefit from recent advances in AI, which have often been driven by increases in the amount of available data.

To fully realize the security and privacy benefits of today's ubiquitous information, the security community needs expertise in the tools and techniques for managing that information, namely, artificial intelligence technology, and the AI community needs an understanding of security and privacy problems. To facilitate an exchange of ideas between these two communities, we are holding the second workshop in "AISec" in conjunction with the 16th ACM Conference on Computer and Communications Security (CCS), the new field of security and privacy solutions that leverage AI technologies. Our full-day workshop will be a mix of technical papers and position papers with ideas for AISec's future.

Topics of interest include, but are not limited to:
Spam detection
Botnet detection
Intrusion detection
Malware identification
Insider threat detection
Privacy-preserving data mining
Inference detection and control
Design and analysis of CAPTCHAs
Phishing detection and prevention
AI approaches to trust and reputation
Incentives in security/privacy systems
Machine learning techniques for optimizing user experience
Vulnerability testing through intelligent probing (e.g. fuzzing)
Content-driven security policy management & access control
Techniques and methods for generating training and test sets
Anomalous behavior detection (e.g. for the purposes of fraud prevention, authentication)

Paper Submission

We invite original research papers describing significant results using AI techniques to address security and/or privacy problems. We also invite position papers discussing the role of AI in security and privacy. Submitted papers may not substantially overlap papers that have been published or that are simultaneously submitted to a journal or conference with proceedings.

Research submissions should be at most 12 pages excluding the bibliography and well-marked appendices using single-column, 11-point font and reasonable margins on letter-size paper, and at most 15 pages total. Committee members are not required to read the appendices, and so the paper should be intelligible without them. Position papers should be at most 6 pages long in total using the same guidelines as above. Submissions need not be anonymized.

Submissions can be made through EasyChair at the following web site: http://www.easychair.org/conferences/?conf=aisec09

Dates

Submission deadline: June 19, 2009
Author notifications: August 16, 2009
Camera ready papers due: August 25, 2008 (Firm deadline)
Workshop: November 9, 2009

Publication

Authors of accepted papers are expected to give full presentations at the workshop. Proceedings will be published by the ACM.

Program chairs:

Dirk Balfanz (Google)
Jessica Staddon (Palo Alto Research Center)
Program Committee:

Adam Barth (U. C. Berkeley)
Alvaro A. Cardenas (U. C. Berkeley)
Kamalika Chaudhuri (U. C. San Diego)
George Danezis (Microsoft)
Luca de Alfaro (U. C. Santa Cruz)
Philippe Golle (PARC)
Rachel Greenstadt (Drexel)
Virgil Griffith (Caltech)
Tad Hogg (HP Labs)
Marius Kloft (Fraunhofer)
Pavel Laskov (Fraunhofer)
Barry O'Sullivan (University College, Cork)
Lisa Purvis (Xerox)
Zulfikar Ramzan (Symantec)
Benjamin Rubinstein (U. C. Berkeley)
Sal Stolfo (Columbia University)
Paul Thompson (Dartmouth)
Shobha Venkataraman (AT&T Research)

Related Resources

IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
ICSTTE 2025   2025 3rd International Conference on SmartRail, Traffic and Transportation Engineering (ICSTTE 2025)
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
AMLDS 2025   IEEE--2025 International Conference on Advanced Machine Learning and Data Science
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CVAI 2026   2026 International Symposium on Computer Vision and Artificial Intelligence (CVAI 2026)
MAT 2024   10th International Conference of Advances in Materials Science and Engineering
JCRAI 2025   2025 5th International Joint Conference on Robotics and Artificial Intelligence