posted by organizer: olethros || 4586 views || tracked by 8 users: [display]

LSP 2014 : ICML 2014 Workshop on Learning, Security and Privacy


When Jun 25, 2014 - Jun 26, 2014
Where Bejing
Submission Deadline Apr 14, 2014
Notification Due Apr 30, 2014
Final Version Due May 30, 2014
Categories    machine learning   artificial intelligence   privacy   security

Call For Papers

ICML 2014 Workshop on Learning, Security and Privacy

Beijing, China, 25 or 26 June, 2014 (TBD)

Important Dates:
- Submission deadline: 14 April, 2014 (extended!)
- Notification of acceptance: 30 April, 2014
- Submissions
- Format: 6 pages ICML
- Submission types: (1) Open problems (2) Original research

Workshop overview

Many machine learning settings give rise to security and privacy requirements which are not well-addressed by traditional learning methods. Security concerns arise in intrusion detection, malware analysis, biometric authentication, spam filtering, and other applications where data may be manipulated - either at the training stage or during the system deployment - to reduce prediction accuracy. Privacy issues are common to the analysis of personal and corporate data ubiquitous in modern Internet services. Learning methods addressing security and privacy issues face an interplay of game theory, cryptography, optimization and differential privacy.

Despite encouraging progress in recent years, many theoretical and practical challenges remain. Several emerging research areas, including stream mining, mobility data mining, and social network analysis, require new methodical approaches to ensure privacy and security. There is also an urgent need for methods that can quantify and enforce privacy and security guarantees for specific applications. The ever increasing abundance of data raises technical challenges to attain scalability of learning methods in security and privacy critical settings. These challenges can only be addressed in the interdisciplinary context, by pooling expertise from the traditionally disjoint fields of machine learning, security and privacy.

To encourage scientific dialogue and foster cross-fertilization among these three fields, the workshop invites original submissions, ranging from open problems and ongoing research to mature work, in any of the following core subjects:

- Statistical approaches for privacy preservation.
- Private decision making and mechanism design.
- Metrics and evaluation methods for privacy and security.
- Robust learning in adversarial environments.
- Learning in unknown / partially observable stochastic games.
- Distributed inference and decision making for security.
- Application-specific privacy preserving machine learning and decision theory.
- Secure multiparty computation and cryptographic approaches for machine learning.
- Cryptographic applications of machine learning and decision theory.
- Security applications: Intrusion detection and response, biometric authentication, fraud detection, spam filtering, captchas.
- Security analysis of learning algorithms
- The economics of learning, security and privacy.

Submission instructions:

Submissions should be in the ICML 2014 format, with a maximum of 6 pages (including references). Work must be original, but we also encourage submission of open problems. Accepted papers will be made available online at the workshop website. Submissions need not be anonymous. Submissions should be made through EasyChair: For detailed submission instructions, please refer to the workshop website.

Organizing committee:

Christos Dimitrakakis (Chalmers University of Technology, Sweden).
Pavel Laskov (University of Tuebingen, Germany).
Daniel Lowd (University of Oregon, USA).
Benjamin Rubinstein (University of Melbourne, Australia).
Elaine Shi (University of Maryland, College Park, USA).

Program committee:

Asli Bay (EPFL, Switzerland)
Battista Biggio (University of Cagliary, Italy)
Michael Brückner (Amazon, Germany)
Mike Burmester (Florida State University, USA)
Alvaro Cardenas (University of Texas, Dallas)
Kamalika Chaudhuri (UCSD, USA)
Craig B Gentry (IBM Research, USA)
Alex Kantchelian (UC Berkeley, USA)
Aikaterini Mitrokotsa (Chalmers University, Sweden)
Blaine Nelson (University of Potsdam, Germany)
Norman Poh (University of Surrey, UK)
Konrad Rieck (University of Göttingen)
Nedim Srndic (University of Tuebingen, Germany)
Aaron Roth (University of Pennsylvania, USA)
Risto Vaarandi (NATO CCDCOE, Estonia)
Sobha Venkataraman (AT&T Research, USA)
Ting-Fang Yen (EMC, USA)

Related Resources

IJCAI 2017   International Joint Conference on Artificial Intelligence
ICML 2016   33rd International Conference on Machine Learning (ICML-2016)
ICML 2017   34th International Conference on Machine Learning
MLDM 2017   Machine Learning and Data Mining in Pattern Recognition
PAKDD 2017   The 21st Pacific-Asia Conference on Knowledge Discovery and Data Mining
IJCNN 2017   International Joint Conference on Neural Networks
IJISS 2016   International Journal of Information Security Science (IJISS)
DSAA 2017   The 4th IEEE International Conference on Data Science and Advanced Analytics 2017
SMGSSP 2017   Smart Micro-Grid Systems Security and Privacy
IROS 2017   IEEE/RSJ International Conference on Intelligent Robots and Systems