Time | Title | Authors / Speakers |
7:30 - 8:30 | Breakfast | |
8:45 - 9 | Opening Remarks | Nikolaos Vasiloglou, Roberto Perdisci |
Session I - Chair: Nikolaos Vasiloglou | ||
9 - 9:55 |
Keynote: AI and Security: Lessons, Challenges and Future Directions | |
9:55 - 10:15 | Best paper presentation | |
10:15 - 10:45 | Break | |
Session IIa - Chair: Neil Gong | ||
10:45 - 11:45 (4x15min paper presentations) | Oral presentations | |
Session IIb - Chair: Bo Li | ||
11:45 - 12:30 (3x15min paper presentations) | Oral presentations | |
12:30 - 1:30 | Lunch | |
Session III - Chair: Roberto Perdisci | ||
1:30 - 2:25 | Keynote: Defense Against the Dark Arts: An Overview of Adversarial Example Research and Future Research Directions | |
2:30 - 3:45 | Poster presentations | |
3:20 - 3:45 | Break | |
Session IV - Chair: Yizheng Chen | ||
3:45 - 4:30 (3x15min paper presentations) | Oral presentations | |
4:30 - 5:25 | Keynote: Is "adversarial examples" an Adversarial Example? | |
5:25 - 5:40 | Closing Remarks | Nikolaos Vasiloglou, Roberto Perdisci |
NOTE: Due to a large number of submissions and accepted papers, some papers will be presented during a Poster Session while others will be presented orally. Nonetheless, all accepted papers should be considered as having equal importance.
Over the past decade, machine learning methods have found their way into a large variety of computer security applications, including accurate spam detection, scalable discovery of new malware families, identifying malware download events in vast amounts of web traffic, detecting software exploits, blocking phishing web pages, and preventing fraudulent financial transactions, just to name a few.
At the same time, machine learning methods themselves have evolved. In particular, Deep Learning methods have recently demonstrated great improvements over more “traditional” learning approaches on a number of important tasks, including image and audio classification, natural language processing, machine translation, etc. Moreover, areas such as program induction and neural abstract machines have made it possible to generate and analyze programs in depth. It is therefore natural to ask how the success of these deep learning methods may be translated to advancing the state-of-the-art in security applications.
This workshop is aimed at academic and industrial researchers interested in the application of deep learning methods to computer security problems. Some of the key research questions of interest will include the following:
Topics of interest include (but are not limited to):
The workshop invites two types of submissions: full research papers and extended abstracts. Full papers are expected to present completed work and will be published in the workshop’s IEEE proceedings. On the other hand, extended abstract submissions are intended to encourage the presentation of preliminary research ideas or case studies around challenges and solutions related to the use of deep learning systems in real-world security applications. While accepted extended abstracts will not be part of the formal IEEE proceedings, they will be preserved as an online open publication (e.g., on arxiv.org) and the authors will be free to submit an extended version of their work to other venues.
One author of each accepted paper is expected to present the submitted work at the workshop. Paper presentations will follow the traditional conference-style format with questions from the audience. More information on available speaking slots and workshop format details will be provided ahead of the workshop date.
To be considered, papers must be received by the submission deadline (see Important Dates). Submissions must be original work and may not be under submission to another venue at the time of review.
Full research papers must be no longer than six pages, plus one page for references.
Extended abstract submissions must be no longer than four pages, plus one page for references, and need to include Extended Abstract in the title or subtitle.
Submitted papers should contain the name and affiliation of all authors. Papers must be formatted for US letter (not A4) size paper. The text must be formatted in a two-column layout, with columns no more than 9.5 in. tall and 3.5 in. wide. The text must be in Times font, 10-point or larger, with 11-point or larger line spacing. Authors are strongly recommended to use the latest IEEE conference proceedings templates. Failure to adhere to the page limit and formatting requirements are grounds for rejection without review.
Papers must be in Portable Document Format (.pdf). Authors should pay special attention to unusual fonts, images, and figures that might create problems for reviewers. Submitted documents should render correctly in Adobe Reader and when printed in black and white.
Papers must be submitted at https://easychair.org/conferences/?conf=dls2018
For any questions, please contact the workshop organizers at: dlsec2018@gmail.com