posted by organizer: olethros || 6733 views || tracked by 8 users: [display]

LSP 2014 : ICML 2014 Workshop on Learning, Security and Privacy

FacebookTwitterLinkedInGoogle

Link: https://sites.google.com/site/learnsecprivacy2014/
 
When Jun 25, 2014 - Jun 26, 2014
Where Bejing
Submission Deadline Apr 14, 2014
Notification Due Apr 30, 2014
Final Version Due May 30, 2014
Categories    machine learning   artificial intelligence   privacy   security
 

Call For Papers

ICML 2014 Workshop on Learning, Security and Privacy

Beijing, China, 25 or 26 June, 2014 (TBD)

https://sites.google.com/site/learnsecprivacy2014/

------------------------------------------------------------
Important Dates:
- Submission deadline: 14 April, 2014 (extended!)
- Notification of acceptance: 30 April, 2014
- Submissions https://www.easychair.org/conferences/?conf=lps2014
- Format: 6 pages ICML
- Submission types: (1) Open problems (2) Original research
------------------------------------------------------------

Workshop overview


Many machine learning settings give rise to security and privacy requirements which are not well-addressed by traditional learning methods. Security concerns arise in intrusion detection, malware analysis, biometric authentication, spam filtering, and other applications where data may be manipulated - either at the training stage or during the system deployment - to reduce prediction accuracy. Privacy issues are common to the analysis of personal and corporate data ubiquitous in modern Internet services. Learning methods addressing security and privacy issues face an interplay of game theory, cryptography, optimization and differential privacy.


Despite encouraging progress in recent years, many theoretical and practical challenges remain. Several emerging research areas, including stream mining, mobility data mining, and social network analysis, require new methodical approaches to ensure privacy and security. There is also an urgent need for methods that can quantify and enforce privacy and security guarantees for specific applications. The ever increasing abundance of data raises technical challenges to attain scalability of learning methods in security and privacy critical settings. These challenges can only be addressed in the interdisciplinary context, by pooling expertise from the traditionally disjoint fields of machine learning, security and privacy.


To encourage scientific dialogue and foster cross-fertilization among these three fields, the workshop invites original submissions, ranging from open problems and ongoing research to mature work, in any of the following core subjects:


- Statistical approaches for privacy preservation.
- Private decision making and mechanism design.
- Metrics and evaluation methods for privacy and security.
- Robust learning in adversarial environments.
- Learning in unknown / partially observable stochastic games.
- Distributed inference and decision making for security.
- Application-specific privacy preserving machine learning and decision theory.
- Secure multiparty computation and cryptographic approaches for machine learning.
- Cryptographic applications of machine learning and decision theory.
- Security applications: Intrusion detection and response, biometric authentication, fraud detection, spam filtering, captchas.
- Security analysis of learning algorithms
- The economics of learning, security and privacy.


Submission instructions:

Submissions should be in the ICML 2014 format, with a maximum of 6 pages (including references). Work must be original, but we also encourage submission of open problems. Accepted papers will be made available online at the workshop website. Submissions need not be anonymous. Submissions should be made through EasyChair: https://www.easychair.org/conferences/?conf=lps2014. For detailed submission instructions, please refer to the workshop website.


Organizing committee:

Christos Dimitrakakis (Chalmers University of Technology, Sweden).
Pavel Laskov (University of Tuebingen, Germany).
Daniel Lowd (University of Oregon, USA).
Benjamin Rubinstein (University of Melbourne, Australia).
Elaine Shi (University of Maryland, College Park, USA).

Program committee:

Asli Bay (EPFL, Switzerland)
Battista Biggio (University of Cagliary, Italy)
Michael Brückner (Amazon, Germany)
Mike Burmester (Florida State University, USA)
Alvaro Cardenas (University of Texas, Dallas)
Kamalika Chaudhuri (UCSD, USA)
Craig B Gentry (IBM Research, USA)
Alex Kantchelian (UC Berkeley, USA)
Aikaterini Mitrokotsa (Chalmers University, Sweden)
Blaine Nelson (University of Potsdam, Germany)
Norman Poh (University of Surrey, UK)
Konrad Rieck (University of Göttingen)
Nedim Srndic (University of Tuebingen, Germany)
Aaron Roth (University of Pennsylvania, USA)
Risto Vaarandi (NATO CCDCOE, Estonia)
Sobha Venkataraman (AT&T Research, USA)
Ting-Fang Yen (EMC, USA)

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
AMLDS 2025   IEEE--2025 International Conference on Advanced Machine Learning and Data Science
No Hat 2025   No Hat - COMPUTER SECURITY CONFERENCE
Ei/Scopus-IPCML 2025   2025 International Conference on Image Processing, Communications and Machine Learning (IPCML 2025)
CSRF 2025   The Second International Conference on Sustainable and Regenerative Farming
DSA 2025   The 12th International Conference on Dependability Systems and Their Applications
MLMI 2025   2025 The 8th International Conference on Machine Learning and Machine Intelligence (MLMI 2025)
ICML 2025   International Conference on Machine Learning
ELT 2025   Call for Special Issue: Innovations in Language Education: Bridging Theory and Practice in LSP, ESP, and ELT
IEEE- CCRIS 2025   2025 IEEE 6th International Conference on Control, Robotics and Intelligent System (CCRIS 2025)