Location: Room 143A, Walter E. Washington convention center
Keynotes
Dr. William Streilein,
Chief Digital and Artificial Intelligence Office, Department of Defense
Talk Title: "Accelerating AI Adoption for DoD Decision Advantage"
Tudor A. DumitraČ™
University of Maryland, College Park
Talk Title: "What can artificial intelligence and cyber security learn from each other"
Authors |
Paper (Accepted) |
Nitzan Farhi, Noam Koenigstein and Yuval Shavitt |
Detecting Security Patches via Behavioral Data in Code Repositories |
Robert Joyce, Tirth Patel, Charles Nicholas and Edward Raff |
AVScan2Vec: Learned Vector Representations of Antivirus Scan Data (No public link) |
Ashutosh Dutta, Samrat Chatterjee, Arnab Bhattacharya and Mahantesh Halappanavar |
Deep Reinforcement Learning for Cyber System Defense under Dynamic Adversarial Uncertainties |
Iwona Hawryluk, Henrique Hoeltgebaum, Cole Sodja, Tyler Lalicker and Joshua Neil |
Peer-group Behaviour Analytics of Windows Authentications Events Using Hierarchical Bayesian Modelling |
Soodeh Atefi, Sakshyam Panda, Emmanouil Panaousis and Aron Laszka |
Principled Data-Driven Decision Support for Cyber-Forensic Investigations |
Akshat Gupta, Laxman Tomar and Ridhima Garg |
GlyphNet: Homoglyph domains dataset and detection using attention-based Convolutional Neural Networks |
Hugo Lemarchant, Liangzhi Li, Yiming Qian, Yuta Nakashima and Hajime Nagahara |
Inference Time Evidences of Adversarial Attacks for Forensic on Transformers |
Wong Wai Tuck, Sarah Kinsey, Ramesha Karunasena, Thanh Nguyen and Arunesh Sinha |
Beyond NaN: Resiliency of Optimization Layers in The Face of Infeasibility |
Mahdi Ghafourian, Julian Fierrez, Luis Felipe Gomez, Ruben Vera-Rodriguez, Aythami Morales, Zohra Rezugi and Raymond Veldhuis |
Toward Face Biometric De-identification using Adversarial Examples |
Tommaso Puccetti, Andrea Ceccarelli and Tommaso Zoppi |
On the Efficacy of Metrics to Describe Adversarial Attacks |
Siddhant Bhambri, Purv Chauhan, Frederico Araujo, Adam Doupe and Subbarao Kambhampati |
Using Deception in Markov Game to Understand Adversarial Behaviors through a Capture-The-Flag Environment |
Erick Galinkin, Emmanouil Pountourakis, John Carter and Spiros Mancoridis |
Simulation of Attacker Defender Interaction in a Noisy Security Game |