Location: Room 121A, Pennsylvania Convention Center, Philadelphia

Keynotes

 
Nathaniel D. Bastian
Chief Scientist and Director
Office of Science & Technology - Army Cyber Institute at West Point
Talk Title: Operational AI Red Teaming: Gaps and Opportunities

 
Edward Raff
Director of Emerging AI, Booz Allen Hamilton
Talk Title: Why I hate Parsers and You Should Too
Authors Paper (Accepted)
Matthew J. Turner, Mike Carenzo, Jackie Lasky, James Morris-King, James Ross Technique Inference Engine: A Recommender Model to Support Cyber Threat Hunting
Erick Galinkin, Emmanouil Pountourakis, Spiros Mancoridis Towards Attacker Type Agnostic Cyber Defense Agents
Ali Ebrahimpour-Boroojeny, Hari Sundaram, Varun Chandrasekaran LOTOS: Layer-wise Orthogonalization for Training Robust Ensembles
Zain ul Abdeen, Ahmad Tawaha, Padmaksha Roy, Ruoxi Jia, Laura Freeman, Peter Beling, Chen-Ching Liu, Alberto Sangiovanni-Vincentelli, Ming Jin Defense against Joint Poisoning and Evasion Attacks: A Case Study of DERMS
Tommy Nguyen, Mehmet Ergezer, Christian Green AdvIRL: Reinforcement Learning-Based Adversarial Attacks on 3D NeRF Models
Christian Green, Mehmet Ergezer, Abdurrahman Zeybey Targeted View-Invariant Adversarial Perturbations for 3D Object Recognition
Elvin Li, Zhengli Shang, Onat Gungor, Tajana Rosing SAFE: Self-Supervised Anomaly Detection Framework for Intrusion Detection
Yue Sun, Rick S. Blum, Parv Venkitasubramaniam Unifying Explainable Anomaly Detection and Root Cause Analysis in Dynamical Systems
Amir Jevnisek, Vlad Rakhlin, Shai Avidan Coordinate Descent for Network Linearization
Ilan Schvartzman, Roei Sarussi, Maor Ashkenazi, Ido kringel, Yaniv Tocker, Tal Furman Shohet A New Dataset and Methodology for Malicious URL Classification
Tianhao Li, Jingyu Lu , Chuangxin Chu , Tianyu Zeng , Yujia Zheng, Mei Li, Haotian Huang, Bin Wu, Zuoxian Liu, Kai Ma, Xuejing Yuan, Xingkai Wang, Keyan Ding, Huajun Chen, Qiang Zhang SCISAFEEVAL: A Comprehensive Benchmark for Safety Alignment of Large Language Models in Scientific Tasks
Erick Galinkin, Martin Sablotny Improved Large Language Model Jailbreak Detection via Pretrained Embeddings
Pankayaraj Pathmanathan, Udari Madhushani Sehwag, Michael-Andrei Panaitescu-Liess, Furong Huang AdvBDGen: Adversarially Fortified Prompt-Specific Fuzzy Backdoor Generator Against LLM Alignment
Gary A. McCully, John Hastings, Shengjie Xu, Adam Fortier Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code
Fernando Martinez, Lesther Santana, Mohamed Rahouti Learning in Multiple Spaces: Few-Shot Network Attack Detection with Metric-Fused Prototypical Networks
Domenic Rosati, Giles Edkins, Harsh Raj, David Atanasov, Subhabrata Majumdar, Janarthanan Rajendran, Frank Rudzicz, Hassan Sajjad Mitigating Unsafe Feedback with Learning Constraints
Jared Claypoole, Steven Cheung, Ashish Gehani, Vinod Yegneswaran, Ahmad Ridley Interpreting Agent Behaviors in Reinforcement-Learning-Based Cyber-Battle Simulation Platforms
Ahtesham Bakht, Dinesh Sharma, Ankit Shah, Nathaniel D. Bastian A Reinforcement Learning and Optimization Framework for Crafting Stealthy Poisons through Image Embedding Manipulation
Chun Kai Ling, Jakub Cerny, Chin Hui Han, Christian Kroer, Garud Iyengar How Deep Is Your Defense-in-Depth? Hardening Cybersecurity Network Control Against Adaptive Attackers
Minami Someya, Akira Otsuka RevLlama: Recovering Function Names via Rationale Distillation from Large to Small Language Models
Tentative Schedule (may not render on mobile phone):