posted by organizer: olethros || 5161 views || tracked by 8 users: [display]

LSP 2014 : ICML 2014 Workshop on Learning, Security and Privacy


When Jun 25, 2014 - Jun 26, 2014
Where Bejing
Submission Deadline Apr 14, 2014
Notification Due Apr 30, 2014
Final Version Due May 30, 2014
Categories    machine learning   artificial intelligence   privacy   security

Call For Papers

ICML 2014 Workshop on Learning, Security and Privacy

Beijing, China, 25 or 26 June, 2014 (TBD)

Important Dates:
- Submission deadline: 14 April, 2014 (extended!)
- Notification of acceptance: 30 April, 2014
- Submissions
- Format: 6 pages ICML
- Submission types: (1) Open problems (2) Original research

Workshop overview

Many machine learning settings give rise to security and privacy requirements which are not well-addressed by traditional learning methods. Security concerns arise in intrusion detection, malware analysis, biometric authentication, spam filtering, and other applications where data may be manipulated - either at the training stage or during the system deployment - to reduce prediction accuracy. Privacy issues are common to the analysis of personal and corporate data ubiquitous in modern Internet services. Learning methods addressing security and privacy issues face an interplay of game theory, cryptography, optimization and differential privacy.

Despite encouraging progress in recent years, many theoretical and practical challenges remain. Several emerging research areas, including stream mining, mobility data mining, and social network analysis, require new methodical approaches to ensure privacy and security. There is also an urgent need for methods that can quantify and enforce privacy and security guarantees for specific applications. The ever increasing abundance of data raises technical challenges to attain scalability of learning methods in security and privacy critical settings. These challenges can only be addressed in the interdisciplinary context, by pooling expertise from the traditionally disjoint fields of machine learning, security and privacy.

To encourage scientific dialogue and foster cross-fertilization among these three fields, the workshop invites original submissions, ranging from open problems and ongoing research to mature work, in any of the following core subjects:

- Statistical approaches for privacy preservation.
- Private decision making and mechanism design.
- Metrics and evaluation methods for privacy and security.
- Robust learning in adversarial environments.
- Learning in unknown / partially observable stochastic games.
- Distributed inference and decision making for security.
- Application-specific privacy preserving machine learning and decision theory.
- Secure multiparty computation and cryptographic approaches for machine learning.
- Cryptographic applications of machine learning and decision theory.
- Security applications: Intrusion detection and response, biometric authentication, fraud detection, spam filtering, captchas.
- Security analysis of learning algorithms
- The economics of learning, security and privacy.

Submission instructions:

Submissions should be in the ICML 2014 format, with a maximum of 6 pages (including references). Work must be original, but we also encourage submission of open problems. Accepted papers will be made available online at the workshop website. Submissions need not be anonymous. Submissions should be made through EasyChair: For detailed submission instructions, please refer to the workshop website.

Organizing committee:

Christos Dimitrakakis (Chalmers University of Technology, Sweden).
Pavel Laskov (University of Tuebingen, Germany).
Daniel Lowd (University of Oregon, USA).
Benjamin Rubinstein (University of Melbourne, Australia).
Elaine Shi (University of Maryland, College Park, USA).

Program committee:

Asli Bay (EPFL, Switzerland)
Battista Biggio (University of Cagliary, Italy)
Michael Brückner (Amazon, Germany)
Mike Burmester (Florida State University, USA)
Alvaro Cardenas (University of Texas, Dallas)
Kamalika Chaudhuri (UCSD, USA)
Craig B Gentry (IBM Research, USA)
Alex Kantchelian (UC Berkeley, USA)
Aikaterini Mitrokotsa (Chalmers University, Sweden)
Blaine Nelson (University of Potsdam, Germany)
Norman Poh (University of Surrey, UK)
Konrad Rieck (University of Göttingen)
Nedim Srndic (University of Tuebingen, Germany)
Aaron Roth (University of Pennsylvania, USA)
Risto Vaarandi (NATO CCDCOE, Estonia)
Sobha Venkataraman (AT&T Research, USA)
Ting-Fang Yen (EMC, USA)

Related Resources

ICML 2018   The 35th International Conference on Machine Learning
ACML 2018   The 10th Asian Conference on Machine Learning
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
AAAI 2019   National Conference on Artificial Intelligence
IJIS-IoTSec 2018   Springer IJIS Special Issue on IoT Security and Privacy
CSITS 2018   International Workshop on Cyber Security for Intelligent Transportation Systems
WSDM 2019   WSDM 2019: The 12th ACM International Conference on Web Search and Data Mining
Symmetry-SI 2018   Symmetry and Asymmetry Applications for Internet of Things Security and Privacy
NECO 2018   7thInternational Conference of Networks and Communications
ICCSP--Ei Compendex and Scopus 2019   2019 the 3rd International Conference on Cryptography, Security and Privacy (ICCSP 2019)--Ei Compendex and Scopus