posted by organizer: olethros || 6067 views || tracked by 8 users: [display]

LSP 2014 : ICML 2014 Workshop on Learning, Security and Privacy

FacebookTwitterLinkedInGoogle

Link: https://sites.google.com/site/learnsecprivacy2014/
 
When Jun 25, 2014 - Jun 26, 2014
Where Bejing
Submission Deadline Apr 14, 2014
Notification Due Apr 30, 2014
Final Version Due May 30, 2014
Categories    machine learning   game theory   privacy   security
 

Call For Papers

ICML 2014 Workshop on Learning, Security and Privacy

Beijing, China, 25 or 26 June, 2014 (TBD)

https://sites.google.com/site/learnsecprivacy2014/

------------------------------------------------------------
Important Dates:
- Submission deadline: 14 April, 2014 (extended!)
- Notification of acceptance: 30 April, 2014
- Submissions https://www.easychair.org/conferences/?conf=lps2014
- Format: 6 pages ICML
- Submission types: (1) Open problems (2) Original research
------------------------------------------------------------

Workshop overview


Many machine learning settings give rise to security and privacy requirements which are not well-addressed by traditional learning methods. Security concerns arise in intrusion detection, malware analysis, biometric authentication, spam filtering, and other applications where data may be manipulated - either at the training stage or during the system deployment - to reduce prediction accuracy. Privacy issues are common to the analysis of personal and corporate data ubiquitous in modern Internet services. Learning methods addressing security and privacy issues face an interplay of game theory, cryptography, optimization and differential privacy.


Despite encouraging progress in recent years, many theoretical and practical challenges remain. Several emerging research areas, including stream mining, mobility data mining, and social network analysis, require new methodical approaches to ensure privacy and security. There is also an urgent need for methods that can quantify and enforce privacy and security guarantees for specific applications. The ever increasing abundance of data raises technical challenges to attain scalability of learning methods in security and privacy critical settings. These challenges can only be addressed in the interdisciplinary context, by pooling expertise from the traditionally disjoint fields of machine learning, security and privacy.


To encourage scientific dialogue and foster cross-fertilization among these three fields, the workshop invites original submissions, ranging from open problems and ongoing research to mature work, in any of the following core subjects:


- Statistical approaches for privacy preservation.
- Private decision making and mechanism design.
- Metrics and evaluation methods for privacy and security.
- Robust learning in adversarial environments.
- Learning in unknown / partially observable stochastic games.
- Distributed inference and decision making for security.
- Application-specific privacy preserving machine learning and decision theory.
- Secure multiparty computation and cryptographic approaches for machine learning.
- Cryptographic applications of machine learning and decision theory.
- Security applications: Intrusion detection and response, biometric authentication, fraud detection, spam filtering, captchas.
- Security analysis of learning algorithms
- The economics of learning, security and privacy.


Submission instructions:

Submissions should be in the ICML 2014 format, with a maximum of 6 pages (including references). Work must be original, but we also encourage submission of open problems. Accepted papers will be made available online at the workshop website. Submissions need not be anonymous. Submissions should be made through EasyChair: https://www.easychair.org/conferences/?conf=lps2014. For detailed submission instructions, please refer to the workshop website.


Organizing committee:

Christos Dimitrakakis (Chalmers University of Technology, Sweden).
Pavel Laskov (University of Tuebingen, Germany).
Daniel Lowd (University of Oregon, USA).
Benjamin Rubinstein (University of Melbourne, Australia).
Elaine Shi (University of Maryland, College Park, USA).

Program committee:

Asli Bay (EPFL, Switzerland)
Battista Biggio (University of Cagliary, Italy)
Michael Brückner (Amazon, Germany)
Mike Burmester (Florida State University, USA)
Alvaro Cardenas (University of Texas, Dallas)
Kamalika Chaudhuri (UCSD, USA)
Craig B Gentry (IBM Research, USA)
Alex Kantchelian (UC Berkeley, USA)
Aikaterini Mitrokotsa (Chalmers University, Sweden)
Blaine Nelson (University of Potsdam, Germany)
Norman Poh (University of Surrey, UK)
Konrad Rieck (University of Göttingen)
Nedim Srndic (University of Tuebingen, Germany)
Aaron Roth (University of Pennsylvania, USA)
Risto Vaarandi (NATO CCDCOE, Estonia)
Sobha Venkataraman (AT&T Research, USA)
Ting-Fang Yen (EMC, USA)

Related Resources

ICML 2024   International Conference on Machine Learning
IEEE COINS 2024   IEEE COINS 2024 - London, UK - July 29-31 - Hybrid (In-Person & Virtual)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ECAI 2024   27th European Conference on Artificial Intelligence
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
JCICE 2024   2024 International Joint Conference on Information and Communication Engineering(JCICE 2024)
S&P 2025   The 45th IEEE Symposium on Security and Privacy
ACM-Ei/Scopus-CCISS 2024   2024 International Conference on Computing, Information Science and System (CCISS 2024)
LAJC 2024   Latin-American Journal of Computing
ICDM 2024   IEEE International Conference on Data Mining