Location: Room 116, Vancouver Convention Centre – West Building


Yevgeniy Vorobeychik
Professor, Computer Science and Engineering
Washington University in St. Louis
Talk Title: Towards Trustworthy Autonomous AI-Driven Systems

Scott Coull
Director, Data Science Research, Mandiant (part of Google cloud)
Talk Title: The Importance of Systems Thinking in Machine Learning for Cybersecurity
Authors Paper (Accepted)
Alfatemi, Ali; Rahouti, Mohamed; Amin, Mohammad Ruhul; ALJamal, Sarah; Xiong, Kaiqi ; Xin, Yufeng Advancing DDoS Attack Detection: A Synergistic Approach Using Deep Residual Neural Networks and Synthetic Oversampling
Matejek, Brian; Gehani, Ashish; Bastian, Nathaniel D; Clouse, Daniel J; Kline, Bradford J; Jha, Susmit Safeguarding Network Intrusion Detection Models from Zero-day Attacks and Concept Drift
Roth, Tom; Jauregi Unanue, Inigo; ABUADBBA, Sharif Dr. ; PICCARDI, MASSIMO A Generative Adversarial Attack for Multilingual Text Classifiers
Video passcode: n3EJyy.8
Grosse, Kathrin; Bieringer, Lukas; Besold, Tarek R; Alahi, Alexandre Towards More Practical Threat Models in Artificial Intelligence Security
Alam, Mohammad Mahmudul; Raff, Edward; Biderman, Stella R; Oates, Tim; Holt, James Holographic Global Convolutional Networks for Long-Range Prediction Tasks in Malware Detection
Meyur, Rounak; Purohit, Sumit; Webb, Braden Fortify Your Defenses: Strategic Budget Allocation to Enhance Power Grid Cybersecurity
Fayyazi, Reza; Taghdimi, Rozhina; Yang, Shanchieh Advancing TTP Analysis: Harnessing the Power of Encoder-Only and Decoder-Only Language Models with Retrieval Augmented Generation
Liu, Zefang; Shi, Jialei; Buford, John CyberBench: A Multi-Task Benchmark for Evaluating Large Language Models in Cybersecurity
Chen, Jingdi; Zhou, Hanhan; Mei, Yongsheng; Adam, Gina; Bastian, Nathaniel D; Lan, Tian Real-time Network Intrusion Detection via Decision Transformers
Joyce, Robert J; Raff, Edward; Nicholas, Charles; Holt, James MalDICT: Benchmark Datasets on Malware Behaviors, Platforms, Exploitation, and Packers
Hore, Soumyadeep; Ghadermazi, Jalal; Paudel, Diwas; Shah, Ankit; Das, Tapas; Bastian, Nathaniel D Learning to Evade: Realistic Adversarial Network Packet Generation using Deep Reinforcement Learning
Xu, Ying; Lanier, Michael C; Sarkar, Anindya; Vorobeychik, Yevgeniy Attacks on Node Attributes in Graph Neural Networks
Khorramrouz, Adel; Dutta, Sujan; Dutta, Arka; KhudaBukhsh, Ashiqur Down the Toxicity Rabbit Hole: Investigating PaLM 2 Guardrails
Tentative Schedule: