posted by system || 2259 views || tracked by 11 users: [display]

LAADM 2010 : Workshop on Link Analysis for Adversarial Data Mining

FacebookTwitterLinkedInGoogle

Link: http://date.cecsresearch.org/workshop.htm
 
When Apr 29, 2010 - May 1, 2010
Where Columbus, Ohio, USA
Submission Deadline Jan 2, 2010
Notification Due Feb 1, 2010
Final Version Due Feb 14, 2010
Categories    data mining
 

Call For Papers

April 29 -- May 1, 2010
Columbus, Ohio
The Columbus, A Renaissance Hotel
at the SIAM International Conference on Data Mining.


Important Dates

Submission deadline: January 2
Notification of acceptance: February 1
Camera ready copy due to Antonio Badia: February 14


Workshop Co-chairs:

David Skillicorn
School of Computing
Queen’s University
Kingston Canada
skill at cs.queensu.ca

Antonio Badia
Department of Computer Engineering and Computer Science
University of Louisville
Louisville
abadia at louisville.edu


2009 Program Committee:
The Program Committee is still being formed; accepted so far:

Jafar Adibi, PricewaterhouseCoopers.
Daniel Barbarà, George Mason University.
Hans Chalupsky, ISI.
John Gersh, John Hopkins University.
Lise Getoor, University of Maryland.
Mark Goldberg, RPI.
Mark Maybury, MITRE.
Antonio Sanfilippo, PNNL.
Simeon Simoff, University of Technology, Sydney.
Bülent Yener, RPI.
Daniel Zeng, University of Arizona.

Submission Information
Submit by email to abadia at louisville dot edu please. It would be helpful if you could name your attached file in a way that includes the name of one of the authors. Both full papers (6-9 pages) and short papers (3-4 pages) will be considered.

See the Submissions page of the main conference web page for details of format (do not submit to the main conference site).

Besides academia, we encourage submissions from research centers, industry, and government organizations.

Scope
This workshop is the sixth workshop on this topic at the SIAM International Data Mining Conference. The workshop name has changed from "Workshop on Link Analysis, Counterterrorism and Security" to emphasize a widening of the topic. The workshop attracts a mixture of academics; security, law-enforcement and counterterrorism practitioners, and data analysts from several industries.

An Adversarial setting is one where the subject of analysis (the "adversary") is actively engaged in trying to remove, disguise or otherwise alter traces of activity. Thus, the data given is not a passive collection of facts, but it may have been actively manipulated. Furthermore, an intelligent adversary may change behavior over time, in an attempt to further confuse the analyst. This poses new challenges to all data mining activities, but in particular to link analysis, since in this area the correctness and completeness of data play an important role. Traditional link analysis algorithms are not developed to cope with the challenges of an adversarial setting. Note that such setting is frequent in real-life applications of data mining; they include (cyber)security, law enforcement, counterterrorism, fraud detection, phising, spam filtering, junk email detection, and threat detection. Thus, advances in adversarial link analysis is a relatively new area that has wide applicability.

The workshop provides a venue in which to present early work in relevant areas. An online proceedings will be created, and hardcopy proceedings will be available to conference attendees (and through SIAM afterwards). However, authors may retain copyright.

Industrial organizations with products that are suitable for analyzing large datasets in an Adversarial setting may also wish to participate, either directly in the workshop or in an industrial track in the main conference.


Topics of Interest:

Link analysis
Graph mining
Relational data mining
Social Network Analysis
Dynamic network analysis
Web mining applied to (cyber)security, law enforcement, counterterrorism, fraud detection, phising, spam filtering, junk email detection, threat detection
Text mining applied to security, law enforcement, counterterrorism, counterterrorism, fraud detection, phishing, spam filtering, junk email detection, threat detection
Visualization of link structures
Performance evaluation measures for Adversarial settings
Innovative applications related to link analysis
Privacy issues
Papers on any of these issues, and related topics, are welcome provided that their primary focus is one of the topics of interest.


Workshop Format:
This will be a full-day workshop. It will consist of an invited talk, a series of presentation from accepted papers, and a panel discussion. The panel will be organized around the workshop topics and guided by the content of the presented papers.

The workshop is part of the SIAM International Data Mining Conference, which takes place from April 29-May 1, 2010 in Columbus, Ohio. At least one author from each accepted paper is expected to register and attend the workshop to present their work.

Related Resources

BFNDMA 2020   Big Food and Nutrition Data Management and Analysis
ICDM 2020   20th IEEE International Conference on Data Mining
CISDM 2020   2020 2nd Euro-Asia Conference on Information System and Data Mining (CISDM 2020)
AVC 2020   Advances in Vision Computing: An International Journal
WSDM 2021   14th ACM Conference on Web Search and Data Mining
IDA 2020   The 18th International Symposium on Intelligent Data Analysis (IDA 2020)
CCBD--Ei & Scopus 2021   2021 The 8th International Conference on Cloud Computing and Big Data (CCBD 2021)--Ei Compendex & Scopus
ACM-Scopus-PRIS 2020   2020 International Conference on Pattern Recognition and Intelligent Systems(PRIS 2020)
EAIADS 2020   Empowering Artificial Intelligence in Data Science
COMIT 2020   4th International Conference on Computer Science and Information Technology