Location: Room 121A, Pennsylvania Convention Center, Philadelphia
Keynotes
Nathaniel D. Bastian
Chief Scientist and Director
Office of Science & Technology - Army Cyber Institute at West Point
Talk Title: Operational AI Red Teaming: Gaps and Opportunities
Edward Raff
Director of Emerging AI, Booz Allen Hamilton
Talk Title: Why I hate Parsers and You Should Too
Authors |
Paper (Accepted) |
Matthew J. Turner, Mike Carenzo, Jackie Lasky, James Morris-King, James Ross |
Technique Inference Engine: A Recommender Model to Support Cyber Threat Hunting |
Erick Galinkin, Emmanouil Pountourakis, Spiros Mancoridis |
Towards Attacker Type Agnostic Cyber Defense Agents |
Ali Ebrahimpour-Boroojeny, Hari Sundaram, Varun Chandrasekaran |
LOTOS: Layer-wise Orthogonalization for Training Robust Ensembles |
Zain ul Abdeen, Ahmad Tawaha, Padmaksha Roy, Ruoxi Jia, Laura Freeman, Peter Beling, Chen-Ching Liu, Alberto Sangiovanni-Vincentelli, Ming Jin |
Defense against Joint Poisoning and Evasion Attacks: A Case Study of DERMS |
Tommy Nguyen, Mehmet Ergezer, Christian Green |
AdvIRL: Reinforcement Learning-Based Adversarial Attacks on 3D NeRF Models |
Christian Green, Mehmet Ergezer, Abdurrahman Zeybey |
Targeted View-Invariant Adversarial Perturbations for 3D Object Recognition |
Elvin Li, Zhengli Shang, Onat Gungor, Tajana Rosing |
SAFE: Self-Supervised Anomaly Detection Framework for Intrusion Detection |
Yue Sun, Rick S. Blum, Parv Venkitasubramaniam |
Unifying Explainable Anomaly Detection and Root Cause Analysis in Dynamical Systems |
Amir Jevnisek, Vlad Rakhlin, Shai Avidan |
Coordinate Descent for Network Linearization |
Ilan Schvartzman, Roei Sarussi, Maor Ashkenazi, Ido kringel, Yaniv Tocker, Tal Furman Shohet |
A New Dataset and Methodology for Malicious URL Classification |
Tianhao Li, Jingyu Lu , Chuangxin Chu , Tianyu Zeng , Yujia Zheng, Mei Li, Haotian Huang, Bin Wu, Zuoxian Liu, Kai Ma, Xuejing Yuan, Xingkai Wang, Keyan Ding, Huajun Chen, Qiang Zhang |
SCISAFEEVAL: A Comprehensive Benchmark for Safety Alignment of Large Language Models in Scientific Tasks |
Erick Galinkin, Martin Sablotny |
Improved Large Language Model Jailbreak Detection via Pretrained Embeddings |
Pankayaraj Pathmanathan, Udari Madhushani Sehwag, Michael-Andrei Panaitescu-Liess, Furong Huang |
AdvBDGen: Adversarially Fortified Prompt-Specific Fuzzy Backdoor Generator Against LLM Alignment |
Gary A. McCully, John Hastings, Shengjie Xu, Adam Fortier |
Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code |
Fernando Martinez, Lesther Santana, Mohamed Rahouti |
Learning in Multiple Spaces: Few-Shot Network Attack Detection with Metric-Fused Prototypical Networks |
Domenic Rosati, Giles Edkins, Harsh Raj, David Atanasov, Subhabrata Majumdar, Janarthanan Rajendran, Frank Rudzicz, Hassan Sajjad |
Mitigating Unsafe Feedback with Learning Constraints |
Jared Claypoole, Steven Cheung, Ashish Gehani, Vinod Yegneswaran, Ahmad Ridley |
Interpreting Agent Behaviors in Reinforcement-Learning-Based Cyber-Battle Simulation Platforms |
Ahtesham Bakht, Dinesh Sharma, Ankit Shah, Nathaniel D. Bastian |
A Reinforcement Learning and Optimization Framework for Crafting Stealthy Poisons through Image Embedding Manipulation |
Chun Kai Ling, Jakub Cerny, Chin Hui Han, Christian Kroer, Garud Iyengar |
How Deep Is Your Defense-in-Depth? Hardening Cybersecurity Network Control Against Adaptive Attackers |
Minami Someya, Akira Otsuka |
RevLlama: Recovering Function Names via Rationale Distillation from Large to Small Language Models |