posted by organizer: olethros || 5090 views || tracked by 8 users: [display]

LSP 2014 : ICML 2014 Workshop on Learning, Security and Privacy


When Jun 25, 2014 - Jun 26, 2014
Where Bejing
Submission Deadline Apr 14, 2014
Notification Due Apr 30, 2014
Final Version Due May 30, 2014
Categories    machine learning   artificial intelligence   privacy   security

Call For Papers

ICML 2014 Workshop on Learning, Security and Privacy

Beijing, China, 25 or 26 June, 2014 (TBD)

Important Dates:
- Submission deadline: 14 April, 2014 (extended!)
- Notification of acceptance: 30 April, 2014
- Submissions
- Format: 6 pages ICML
- Submission types: (1) Open problems (2) Original research

Workshop overview

Many machine learning settings give rise to security and privacy requirements which are not well-addressed by traditional learning methods. Security concerns arise in intrusion detection, malware analysis, biometric authentication, spam filtering, and other applications where data may be manipulated - either at the training stage or during the system deployment - to reduce prediction accuracy. Privacy issues are common to the analysis of personal and corporate data ubiquitous in modern Internet services. Learning methods addressing security and privacy issues face an interplay of game theory, cryptography, optimization and differential privacy.

Despite encouraging progress in recent years, many theoretical and practical challenges remain. Several emerging research areas, including stream mining, mobility data mining, and social network analysis, require new methodical approaches to ensure privacy and security. There is also an urgent need for methods that can quantify and enforce privacy and security guarantees for specific applications. The ever increasing abundance of data raises technical challenges to attain scalability of learning methods in security and privacy critical settings. These challenges can only be addressed in the interdisciplinary context, by pooling expertise from the traditionally disjoint fields of machine learning, security and privacy.

To encourage scientific dialogue and foster cross-fertilization among these three fields, the workshop invites original submissions, ranging from open problems and ongoing research to mature work, in any of the following core subjects:

- Statistical approaches for privacy preservation.
- Private decision making and mechanism design.
- Metrics and evaluation methods for privacy and security.
- Robust learning in adversarial environments.
- Learning in unknown / partially observable stochastic games.
- Distributed inference and decision making for security.
- Application-specific privacy preserving machine learning and decision theory.
- Secure multiparty computation and cryptographic approaches for machine learning.
- Cryptographic applications of machine learning and decision theory.
- Security applications: Intrusion detection and response, biometric authentication, fraud detection, spam filtering, captchas.
- Security analysis of learning algorithms
- The economics of learning, security and privacy.

Submission instructions:

Submissions should be in the ICML 2014 format, with a maximum of 6 pages (including references). Work must be original, but we also encourage submission of open problems. Accepted papers will be made available online at the workshop website. Submissions need not be anonymous. Submissions should be made through EasyChair: For detailed submission instructions, please refer to the workshop website.

Organizing committee:

Christos Dimitrakakis (Chalmers University of Technology, Sweden).
Pavel Laskov (University of Tuebingen, Germany).
Daniel Lowd (University of Oregon, USA).
Benjamin Rubinstein (University of Melbourne, Australia).
Elaine Shi (University of Maryland, College Park, USA).

Program committee:

Asli Bay (EPFL, Switzerland)
Battista Biggio (University of Cagliary, Italy)
Michael Brückner (Amazon, Germany)
Mike Burmester (Florida State University, USA)
Alvaro Cardenas (University of Texas, Dallas)
Kamalika Chaudhuri (UCSD, USA)
Craig B Gentry (IBM Research, USA)
Alex Kantchelian (UC Berkeley, USA)
Aikaterini Mitrokotsa (Chalmers University, Sweden)
Blaine Nelson (University of Potsdam, Germany)
Norman Poh (University of Surrey, UK)
Konrad Rieck (University of Göttingen)
Nedim Srndic (University of Tuebingen, Germany)
Aaron Roth (University of Pennsylvania, USA)
Risto Vaarandi (NATO CCDCOE, Estonia)
Sobha Venkataraman (AT&T Research, USA)
Ting-Fang Yen (EMC, USA)

Related Resources

ICML 2018   The 35th International Conference on Machine Learning
ACML 2018   The 10th Asian Conference on Machine Learning
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
ICDM 2018   IEEE International Conference on Data Mining
CloudCom 2018   The 10th IEEE International Conference on Cloud Computing Technology and Science
ACII 2018   Advanced Computational Intelligence: An International Journal
DISP 2018   Special Issue on Data Intelligence in Security and Privacy, Journal of Information Security and Applications
ICANN 2018   27th International Conference on Artificial Neural Networks
IJIS-IoTSec 2018   Springer IJIS Special Issue on IoT Security and Privacy
PST 2018   The Sixteen International Conference on Privacy, Security and Trust (PST)