Location: Room 143A, Walter E. Washington convention center
  Keynotes
		
			
			  
			Dr. William Streilein, 
			Chief Digital and Artificial Intelligence Office, Department of Defense
			Talk Title: "Accelerating AI Adoption for DoD Decision Advantage"
		
		
		
			
			  
			Tudor A. DumitraČ™ 
 
			University of Maryland, College Park
			Talk Title: "What can artificial intelligence and cyber security learn from each other"
		
  
    | Authors | 
    Paper (Accepted) | 
    
  
  
    | Nitzan Farhi, Noam Koenigstein and Yuval Shavitt | 
    Detecting Security Patches via Behavioral Data in Code Repositories | 
  
    
    | Robert Joyce, Tirth Patel, Charles Nicholas and Edward Raff | 
    AVScan2Vec: Learned Vector Representations of Antivirus Scan Data (No public link) | 
  
    
    | Ashutosh Dutta, Samrat Chatterjee, Arnab Bhattacharya and Mahantesh Halappanavar | 
    Deep Reinforcement Learning for Cyber System Defense under Dynamic Adversarial Uncertainties | 
  
    
    | Iwona Hawryluk, Henrique Hoeltgebaum, Cole Sodja, Tyler Lalicker and Joshua Neil | 
    Peer-group Behaviour Analytics of Windows Authentications Events Using Hierarchical Bayesian Modelling | 
  
    
    | Soodeh Atefi, Sakshyam Panda, Emmanouil Panaousis and Aron Laszka | 
    Principled Data-Driven Decision Support for Cyber-Forensic Investigations | 
  
    
    | Akshat Gupta, Laxman Tomar and Ridhima Garg | 
    GlyphNet: Homoglyph domains dataset and detection using attention-based Convolutional Neural Networks | 
  
    
    | Hugo Lemarchant, Liangzhi Li, Yiming Qian, Yuta Nakashima and Hajime Nagahara | 
    Inference Time Evidences of Adversarial Attacks for Forensic on Transformers | 
  
    
    |  Wong Wai Tuck, Sarah Kinsey, Ramesha Karunasena, Thanh Nguyen and Arunesh Sinha | 
    Beyond NaN: Resiliency of Optimization Layers in The Face of Infeasibility | 
  
  
    | Mahdi Ghafourian, Julian Fierrez, Luis Felipe Gomez, Ruben Vera-Rodriguez, Aythami Morales, Zohra Rezugi and Raymond Veldhuis | 
    Toward Face Biometric De-identification using Adversarial Examples | 
  
  
    | Tommaso Puccetti, Andrea Ceccarelli and Tommaso Zoppi | 
    On the Efficacy of Metrics to Describe Adversarial Attacks | 
  
  
    | Siddhant Bhambri, Purv Chauhan, Frederico Araujo, Adam Doupe and Subbarao Kambhampati | 
    Using Deception in Markov Game to Understand Adversarial Behaviors through a Capture-The-Flag Environment | 
  
    Erick Galinkin, Emmanouil Pountourakis, John Carter and Spiros Mancoridis | 
    Simulation of Attacker Defender Interaction in a Noisy Security Game |