Location: Room 143A, Walter E. Washington convention center


Dr. William Streilein,
Chief Digital and Artificial Intelligence Office, Department of Defense
Talk Title: "Accelerating AI Adoption for DoD Decision Advantage"

Tudor A. DumitraČ™
University of Maryland, College Park
Talk Title: "What can artificial intelligence and cyber security learn from each other"
Authors Paper (Accepted)
Nitzan Farhi, Noam Koenigstein and Yuval Shavitt Detecting Security Patches via Behavioral Data in Code Repositories
Robert Joyce, Tirth Patel, Charles Nicholas and Edward Raff AVScan2Vec: Learned Vector Representations of Antivirus Scan Data (No public link)
Ashutosh Dutta, Samrat Chatterjee, Arnab Bhattacharya and Mahantesh Halappanavar Deep Reinforcement Learning for Cyber System Defense under Dynamic Adversarial Uncertainties
Iwona Hawryluk, Henrique Hoeltgebaum, Cole Sodja, Tyler Lalicker and Joshua Neil Peer-group Behaviour Analytics of Windows Authentications Events Using Hierarchical Bayesian Modelling
Soodeh Atefi, Sakshyam Panda, Emmanouil Panaousis and Aron Laszka Principled Data-Driven Decision Support for Cyber-Forensic Investigations
Akshat Gupta, Laxman Tomar and Ridhima Garg GlyphNet: Homoglyph domains dataset and detection using attention-based Convolutional Neural Networks
Hugo Lemarchant, Liangzhi Li, Yiming Qian, Yuta Nakashima and Hajime Nagahara Inference Time Evidences of Adversarial Attacks for Forensic on Transformers
Wong Wai Tuck, Sarah Kinsey, Ramesha Karunasena, Thanh Nguyen and Arunesh Sinha Beyond NaN: Resiliency of Optimization Layers in The Face of Infeasibility
Mahdi Ghafourian, Julian Fierrez, Luis Felipe Gomez, Ruben Vera-Rodriguez, Aythami Morales, Zohra Rezugi and Raymond Veldhuis Toward Face Biometric De-identification using Adversarial Examples
Tommaso Puccetti, Andrea Ceccarelli and Tommaso Zoppi On the Efficacy of Metrics to Describe Adversarial Attacks
Siddhant Bhambri, Purv Chauhan, Frederico Araujo, Adam Doupe and Subbarao Kambhampati Using Deception in Markov Game to Understand Adversarial Behaviors through a Capture-The-Flag Environment
Erick Galinkin, Emmanouil Pountourakis, John Carter and Spiros Mancoridis Simulation of Attacker Defender Interaction in a Noisy Security Game