default search action
Search dblp for Publications
export results for "stream:conf/aisec-ws:"
@inproceedings{DBLP:conf/aisec-ws/Annamalai24, author = {Meenatchi Sundaram Muthu Selva Annamalai}, editor = {Maura Pintor and Xinyun Chen and Matthew Jagielski}, title = {It's Our Loss: No Privacy Amplification for Hidden State {DP-SGD} With Non-Convex Loss}, booktitle = {Proceedings of the 2024 Workshop on Artificial Intelligence and Security, AISec 2024, Salt Lake City, UT, USA, October 14-18, 2024}, pages = {24--30}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3689932.3694767}, doi = {10.1145/3689932.3694767}, timestamp = {Sat, 30 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aisec-ws/Annamalai24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aisec-ws/ApruzzeseFP24, author = {Giovanni Apruzzese and Aurore Fass and Fabio Pierazzi}, editor = {Maura Pintor and Xinyun Chen and Matthew Jagielski}, title = {When Adversarial Perturbations meet Concept Drift: An Exploratory Analysis on {ML-NIDS}}, booktitle = {Proceedings of the 2024 Workshop on Artificial Intelligence and Security, AISec 2024, Salt Lake City, UT, USA, October 14-18, 2024}, pages = {149--160}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3689932.3694757}, doi = {10.1145/3689932.3694757}, timestamp = {Sat, 30 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aisec-ws/ApruzzeseFP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aisec-ws/ArefinS24, author = {Sayed Erfan Arefin and Abdul Serwadda}, editor = {Maura Pintor and Xinyun Chen and Matthew Jagielski}, title = {Music to My Ears: Turning {GPU} Sounds into Intellectual Property Gold}, booktitle = {Proceedings of the 2024 Workshop on Artificial Intelligence and Security, AISec 2024, Salt Lake City, UT, USA, October 14-18, 2024}, pages = {196--207}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3689932.3694771}, doi = {10.1145/3689932.3694771}, timestamp = {Sat, 30 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aisec-ws/ArefinS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aisec-ws/BungartzB0O24, author = {Christian Bungartz and Felix Boes and Michael Meier and Marc Ohm}, editor = {Maura Pintor and Xinyun Chen and Matthew Jagielski}, title = {Towards Robust, Explainable, and Privacy-Friendly Sybil Detection}, booktitle = {Proceedings of the 2024 Workshop on Artificial Intelligence and Security, AISec 2024, Salt Lake City, UT, USA, October 14-18, 2024}, pages = {161--172}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3689932.3694759}, doi = {10.1145/3689932.3694759}, timestamp = {Sat, 30 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aisec-ws/BungartzB0O24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aisec-ws/CastagnaroCP24, author = {Alberto Castagnaro and Mauro Conti and Luca Pajola}, editor = {Maura Pintor and Xinyun Chen and Matthew Jagielski}, title = {Offensive {AI:} Enhancing Directory Brute-forcing Attack with the Use of Language Models}, booktitle = {Proceedings of the 2024 Workshop on Artificial Intelligence and Security, AISec 2024, Salt Lake City, UT, USA, October 14-18, 2024}, pages = {184--195}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3689932.3694770}, doi = {10.1145/3689932.3694770}, timestamp = {Sat, 30 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aisec-ws/CastagnaroCP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aisec-ws/DorM24, author = {Maor Biton Dor and Yisroel Mirsky}, editor = {Maura Pintor and Xinyun Chen and Matthew Jagielski}, title = {Efficient Model Extraction via Boundary Sampling}, booktitle = {Proceedings of the 2024 Workshop on Artificial Intelligence and Security, AISec 2024, Salt Lake City, UT, USA, October 14-18, 2024}, pages = {1--11}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3689932.3694756}, doi = {10.1145/3689932.3694756}, timestamp = {Sat, 30 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aisec-ws/DorM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aisec-ws/GatS24, author = {Nadav Gat and Mahmood Sharif}, editor = {Maura Pintor and Xinyun Chen and Matthew Jagielski}, title = {Harmful Bias: {A} General Label-Leakage Attack on Federated Learning from Bias Gradients}, booktitle = {Proceedings of the 2024 Workshop on Artificial Intelligence and Security, AISec 2024, Salt Lake City, UT, USA, October 14-18, 2024}, pages = {31--41}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3689932.3694768}, doi = {10.1145/3689932.3694768}, timestamp = {Sat, 30 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aisec-ws/GatS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aisec-ws/JinOR24, author = {Jiankai Jin and Olga Ohrimenko and Benjamin I. P. Rubinstein}, editor = {Maura Pintor and Xinyun Chen and Matthew Jagielski}, title = {Getting a-Round Guarantees: Floating-Point Attacks on Certified Robustness}, booktitle = {Proceedings of the 2024 Workshop on Artificial Intelligence and Security, AISec 2024, Salt Lake City, UT, USA, October 14-18, 2024}, pages = {53--64}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3689932.3694761}, doi = {10.1145/3689932.3694761}, timestamp = {Sat, 30 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aisec-ws/JinOR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aisec-ws/KumarHMO24, author = {Shashwat Kumar and Francis Hahn and Stuart Millar and Xinming Ou}, editor = {Maura Pintor and Xinyun Chen and Matthew Jagielski}, title = {Using {LLM} Embeddings with Similarity Search for Botnet {TLS} Certificate Detection}, booktitle = {Proceedings of the 2024 Workshop on Artificial Intelligence and Security, AISec 2024, Salt Lake City, UT, USA, October 14-18, 2024}, pages = {173--183}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3689932.3694766}, doi = {10.1145/3689932.3694766}, timestamp = {Sat, 30 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aisec-ws/KumarHMO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aisec-ws/ParkKOP024, author = {Leo Hyun Park and Jaeuk Kim and Myung Gyo Oh and Jaewoo Park and Taekyoung Kwon}, editor = {Maura Pintor and Xinyun Chen and Matthew Jagielski}, title = {Adversarial Feature Alignment: Balancing Robustness and Accuracy in Deep Learning via Adversarial Training}, booktitle = {Proceedings of the 2024 Workshop on Artificial Intelligence and Security, AISec 2024, Salt Lake City, UT, USA, October 14-18, 2024}, pages = {101--112}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3689932.3694765}, doi = {10.1145/3689932.3694765}, timestamp = {Sat, 30 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aisec-ws/ParkKOP024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aisec-ws/PasquiniST24, author = {Dario Pasquini and Martin Strohmeier and Carmela Troncoso}, editor = {Maura Pintor and Xinyun Chen and Matthew Jagielski}, title = {Neural Exec: Learning (and Learning from) Execution Triggers for Prompt Injection Attacks}, booktitle = {Proceedings of the 2024 Workshop on Artificial Intelligence and Security, AISec 2024, Salt Lake City, UT, USA, October 14-18, 2024}, pages = {89--100}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3689932.3694764}, doi = {10.1145/3689932.3694764}, timestamp = {Sat, 30 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aisec-ws/PasquiniST24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aisec-ws/RoaMSBS24, author = {Camila Roa and Maria Mahbub and Sudarshan Srinivasan and Edmon Begoli and Amir Sadovnik}, editor = {Maura Pintor and Xinyun Chen and Matthew Jagielski}, title = {Semantic Stealth: Crafting Covert Adversarial Patches for Sentiment Classifiers Using Large Language Models}, booktitle = {Proceedings of the 2024 Workshop on Artificial Intelligence and Security, AISec 2024, Salt Lake City, UT, USA, October 14-18, 2024}, pages = {42--52}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3689932.3694758}, doi = {10.1145/3689932.3694758}, timestamp = {Sat, 30 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aisec-ws/RoaMSBS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aisec-ws/SchoofKCP24, author = {Coen Schoof and Stefanos Koffas and Mauro Conti and Stjepan Picek}, editor = {Maura Pintor and Xinyun Chen and Matthew Jagielski}, title = {EmoBack: Backdoor Attacks Against Speaker Identification Using Emotional Prosody}, booktitle = {Proceedings of the 2024 Workshop on Artificial Intelligence and Security, AISec 2024, Salt Lake City, UT, USA, October 14-18, 2024}, pages = {137--148}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3689932.3694773}, doi = {10.1145/3689932.3694773}, timestamp = {Sat, 30 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aisec-ws/SchoofKCP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aisec-ws/SwopeKDRR24, author = {Ryan Swope and Amol Khanna and Philip Doldo and Saptarshi Roy and Edward Raff}, editor = {Maura Pintor and Xinyun Chen and Matthew Jagielski}, title = {Feature Selection from Differentially Private Correlations}, booktitle = {Proceedings of the 2024 Workshop on Artificial Intelligence and Security, AISec 2024, Salt Lake City, UT, USA, October 14-18, 2024}, pages = {12--23}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3689932.3694760}, doi = {10.1145/3689932.3694760}, timestamp = {Sat, 30 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aisec-ws/SwopeKDRR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aisec-ws/TajalliKAP24, author = {Behrad Tajalli and Stefanos Koffas and Gorka Abad and Stjepan Picek}, editor = {Maura Pintor and Xinyun Chen and Matthew Jagielski}, title = {ELMs Under Siege: {A} Study on Backdoor Attacks on Extreme Learning Machines}, booktitle = {Proceedings of the 2024 Workshop on Artificial Intelligence and Security, AISec 2024, Salt Lake City, UT, USA, October 14-18, 2024}, pages = {125--136}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3689932.3694772}, doi = {10.1145/3689932.3694772}, timestamp = {Sat, 30 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aisec-ws/TajalliKAP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aisec-ws/YunWRS24, author = {Zebin Yun and Achi{-}Or Weingarten and Eyal Ronen and Mahmood Sharif}, editor = {Maura Pintor and Xinyun Chen and Matthew Jagielski}, title = {The Ultimate Combo: Boosting Adversarial Example Transferability by Composing Data Augmentations}, booktitle = {Proceedings of the 2024 Workshop on Artificial Intelligence and Security, AISec 2024, Salt Lake City, UT, USA, October 14-18, 2024}, pages = {113--124}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3689932.3694769}, doi = {10.1145/3689932.3694769}, timestamp = {Sat, 30 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aisec-ws/YunWRS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aisec-ws/ZhaoW24, author = {Qi Zhao and Christian Wressnegger}, editor = {Maura Pintor and Xinyun Chen and Matthew Jagielski}, title = {Adversarially Robust Anti-Backdoor Learning}, booktitle = {Proceedings of the 2024 Workshop on Artificial Intelligence and Security, AISec 2024, Salt Lake City, UT, USA, October 14-18, 2024}, pages = {77--88}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3689932.3694763}, doi = {10.1145/3689932.3694763}, timestamp = {Sat, 30 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aisec-ws/ZhaoW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aisec-ws/ZhuMWSJCY24, author = {Yuxuan Zhu and Michael Mandulak and Kerui Wu and George M. Slota and Yuseok Jeon and Ka{-}Ho Chow and Lei Yu}, editor = {Maura Pintor and Xinyun Chen and Matthew Jagielski}, title = {On the Robustness of Graph Reduction Against {GNN} Backdoor}, booktitle = {Proceedings of the 2024 Workshop on Artificial Intelligence and Security, AISec 2024, Salt Lake City, UT, USA, October 14-18, 2024}, pages = {65--76}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3689932.3694762}, doi = {10.1145/3689932.3694762}, timestamp = {Mon, 02 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aisec-ws/ZhuMWSJCY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/aisec-ws/2024, editor = {Maura Pintor and Xinyun Chen and Matthew Jagielski}, title = {Proceedings of the 2024 Workshop on Artificial Intelligence and Security, AISec 2024, Salt Lake City, UT, USA, October 14-18, 2024}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3689932}, doi = {10.1145/3689932}, isbn = {979-8-4007-1228-9}, timestamp = {Mon, 25 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aisec-ws/2024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0002KF23, author = {Tobias Lorenz and Marta Kwiatkowska and Mario Fritz}, editor = {Maura Pintor and Xinyun Chen and Florian Tram{\`{e}}r}, title = {Certifiers Make Neural Networks Vulnerable to Availability Attacks}, booktitle = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023}, pages = {67--78}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605764.3623917}, doi = {10.1145/3605764.3623917}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/0002KF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AbdelnabiGMEHF23, author = {Sahar Abdelnabi and Kai Greshake and Shailesh Mishra and Christoph Endres and Thorsten Holz and Mario Fritz}, editor = {Maura Pintor and Xinyun Chen and Florian Tram{\`{e}}r}, title = {Not What You've Signed Up For: Compromising Real-World LLM-Integrated Applications with Indirect Prompt Injection}, booktitle = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023}, pages = {79--90}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605764.3623985}, doi = {10.1145/3605764.3623985}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AbdelnabiGMEHF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BatesMH23, author = {Elizabeth Bates and Vasilios Mavroudis and Chris Hicks}, editor = {Maura Pintor and Xinyun Chen and Florian Tram{\`{e}}r}, title = {Reward Shaping for Happier Autonomous Cyber Security Agents}, booktitle = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023}, pages = {221--232}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605764.3623916}, doi = {10.1145/3605764.3623916}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BatesMH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BitonMLKBSPEN23, author = {Dudi Biton and Aditi Misra and Efrat Levy and Jaidip Kotak and Ron Bitton and Roei Schuster and Nicolas Papernot and Yuval Elovici and Ben Nassi}, editor = {Maura Pintor and Xinyun Chen and Florian Tram{\`{e}}r}, title = {The Adversarial Implications of Variable-Time Inference}, booktitle = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023}, pages = {103--114}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605764.3623912}, doi = {10.1145/3605764.3623912}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BitonMLKBSPEN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChobolaUK23, author = {Tom{\'{a}}s Chobola and Dmitrii Usynin and Georgios Kaissis}, editor = {Maura Pintor and Xinyun Chen and Florian Tram{\`{e}}r}, title = {Membership Inference Attacks Against Semantic Segmentation Models}, booktitle = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023}, pages = {43--53}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605764.3623906}, doi = {10.1145/3605764.3623906}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChobolaUK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChowKLCAP23, author = {Theo Chow and Zeliang Kan and Lorenz Linhardt and Lorenzo Cavallaro and Daniel Arp and Fabio Pierazzi}, editor = {Maura Pintor and Xinyun Chen and Florian Tram{\`{e}}r}, title = {Drift Forensics of Malware Classifiers}, booktitle = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023}, pages = {197--207}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605764.3623918}, doi = {10.1145/3605764.3623918}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChowKLCAP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CoqueretCSZ23, author = {Beno{\^{\i}}t Coqueret and Mathieu Carbone and Olivier Sentieys and Gabriel Zaid}, editor = {Maura Pintor and Xinyun Chen and Florian Tram{\`{e}}r}, title = {When Side-Channel Attacks Break the Black-Box Property of Embedded Artificial Intelligence}, booktitle = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023}, pages = {127--138}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605764.3623903}, doi = {10.1145/3605764.3623903}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CoqueretCSZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DOnghiaCGCPZ23, author = {Mario D'Onghia and Federico Di Cesare and Luigi Gallo and Michele Carminati and Mario Polino and Stefano Zanero}, editor = {Maura Pintor and Xinyun Chen and Florian Tram{\`{e}}r}, title = {Lookin' Out My Backdoor! Investigating Backdooring Attacks Against DL-driven Malware Detectors}, booktitle = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023}, pages = {209--220}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605764.3623919}, doi = {10.1145/3605764.3623919}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DOnghiaCGCPZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GibertZL23, author = {Daniel Gibert and Giulio Zizzo and Quan Le}, editor = {Maura Pintor and Xinyun Chen and Florian Tram{\`{e}}r}, title = {Certified Robustness of Static Deep Learning-based Malware Detectors against Patch and Append Attacks}, booktitle = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023}, pages = {173--184}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605764.3623914}, doi = {10.1145/3605764.3623914}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GibertZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HicksMFDHW23, author = {Chris Hicks and Vasilios Mavroudis and Myles Foley and Thomas Davies and Kate Highnam and Tim Watson}, editor = {Maura Pintor and Xinyun Chen and Florian Tram{\`{e}}r}, title = {Canaries and Whistles: Resilient Drone Communication Networks with (or without) Deep Reinforcement Learning}, booktitle = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023}, pages = {91--101}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605764.3623986}, doi = {10.1145/3605764.3623986}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HicksMFDHW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HolzlRK23, author = {Florian A. H{\"{o}}lzl and Daniel Rueckert and Georgios Kaissis}, editor = {Maura Pintor and Xinyun Chen and Florian Tram{\`{e}}r}, title = {Equivariant Differentially Private Deep Learning: Why {DP-SGD} Needs Sparser Models}, booktitle = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023}, pages = {11--22}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605764.3623902}, doi = {10.1145/3605764.3623902}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HolzlRK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HuiFO23, author = {Tian Hui and Farhad Farokhi and Olga Ohrimenko}, editor = {Maura Pintor and Xinyun Chen and Florian Tram{\`{e}}r}, title = {Information Leakage from Data Updates in Machine Learning Models}, booktitle = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023}, pages = {35--41}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605764.3623905}, doi = {10.1145/3605764.3623905}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HuiFO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ImgrundGHPRR23, author = {Erik Imgrund and Tom Ganz and Martin H{\"{a}}rterich and Lukas Pirch and Niklas Risse and Konrad Rieck}, editor = {Maura Pintor and Xinyun Chen and Florian Tram{\`{e}}r}, title = {Broken Promises: Measuring Confounding Effects in Learning-based Vulnerability Discovery}, booktitle = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023}, pages = {149--160}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605764.3623915}, doi = {10.1145/3605764.3623915}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ImgrundGHPRR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JoycePNR23, author = {Robert J. Joyce and Tirth Patel and Charles Nicholas and Edward Raff}, editor = {Maura Pintor and Xinyun Chen and Florian Tram{\`{e}}r}, title = {AVScan2Vec: Feature Learning on Antivirus Scan Data for Production-Scale Malware Corpora}, booktitle = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023}, pages = {185--196}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605764.3623907}, doi = {10.1145/3605764.3623907}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JoycePNR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KhannaLRT23, author = {Amol Khanna and Fred Lu and Edward Raff and Brian Testa}, editor = {Maura Pintor and Xinyun Chen and Florian Tram{\`{e}}r}, title = {Differentially Private Logistic Regression with Sparse Solutions}, booktitle = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023}, pages = {1--9}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605764.3623910}, doi = {10.1145/3605764.3623910}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KhannaLRT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KumarIM23, author = {Rajesh Kumar and Can Isik and Chilukuri Krishna Mohan}, editor = {Maura Pintor and Xinyun Chen and Florian Tram{\`{e}}r}, title = {Dictionary Attack on IMU-based Gait Authentication}, booktitle = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023}, pages = {115--126}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605764.3623909}, doi = {10.1145/3605764.3623909}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KumarIM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LeBlondMLFZRT23, author = {Tyler LeBlond and Joseph Munoz and Fred Lu and Maya Fuchs and Elliott Zaresky{-}Williams and Edward Raff and Brian Testa}, editor = {Maura Pintor and Xinyun Chen and Florian Tram{\`{e}}r}, title = {Probing the Transition to Dataset-Level Privacy in {ML} Models Using an Output-Specific and Data-Resolved Privacy Profile}, booktitle = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023}, pages = {23--33}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605764.3623904}, doi = {10.1145/3605764.3623904}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LeBlondMLFZRT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MontaruliDPCBB23, author = {Biagio Montaruli and Luca Demetrio and Maura Pintor and Luca Compagna and Davide Balzarotti and Battista Biggio}, editor = {Maura Pintor and Xinyun Chen and Florian Tram{\`{e}}r}, title = {Raze to the Ground: Query-Efficient Adversarial {HTML} Attacks on Machine-Learning Phishing Webpage Detectors}, booktitle = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023}, pages = {233--244}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605764.3623920}, doi = {10.1145/3605764.3623920}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MontaruliDPCBB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NasirigerdehRK23, author = {Reza Nasirigerdeh and Daniel Rueckert and Georgios Kaissis}, editor = {Maura Pintor and Xinyun Chen and Florian Tram{\`{e}}r}, title = {Utility-preserving Federated Learning}, booktitle = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023}, pages = {55--65}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605764.3623908}, doi = {10.1145/3605764.3623908}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NasirigerdehRK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RahmanA23, author = {Md Asifur Rahman and Sarra M. Alqahtani}, editor = {Maura Pintor and Xinyun Chen and Florian Tram{\`{e}}r}, title = {Task-Agnostic Safety for Reinforcement Learning}, booktitle = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023}, pages = {139--148}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605764.3623913}, doi = {10.1145/3605764.3623913}, timestamp = {Sat, 23 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RahmanA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RichardsRM23, author = {Luke E. Richards and Edward Raff and Cynthia Matuszek}, editor = {Maura Pintor and Xinyun Chen and Florian Tram{\`{e}}r}, title = {Measuring Equality in Machine Learning Security Defenses: {A} Case Study in Speech Recognition}, booktitle = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023}, pages = {161--171}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605764.3623911}, doi = {10.1145/3605764.3623911}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RichardsRM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2023aisec, editor = {Maura Pintor and Xinyun Chen and Florian Tram{\`{e}}r}, title = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605764}, doi = {10.1145/3605764}, timestamp = {Thu, 23 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2023aisec.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ApplebaumDDMNNP22, author = {Andy Applebaum and Camron Dennler and Patrick Dwyer and Marina Moskowitz and Harold Nguyen and Nicole Nichols and Nicole Park and Paul Rachwalski and Frank Rau and Adrian Webster and Melody Wolk}, editor = {Ambra Demontis and Xinyun Chen and Florian Tram{\`{e}}r}, title = {Bridging Automated to Autonomous Cyber Defense: Foundational Analysis of Tabular Q-Learning}, booktitle = {Proceedings of the 15th {ACM} Workshop on Artificial Intelligence and Security, AISec 2022, Los Angeles, CA, USA, 11 November 2022}, pages = {149--159}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3560830.3563732}, doi = {10.1145/3560830.3563732}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ApplebaumDDMNNP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ContiLPX22, author = {Mauro Conti and Jiaxin Li and Stjepan Picek and Jing Xu}, editor = {Ambra Demontis and Xinyun Chen and Florian Tram{\`{e}}r}, title = {Label-Only Membership Inference Attack against Node-Level Graph Neural Networks}, booktitle = {Proceedings of the 15th {ACM} Workshop on Artificial Intelligence and Security, AISec 2022, Los Angeles, CA, USA, 11 November 2022}, pages = {1--12}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3560830.3563734}, doi = {10.1145/3560830.3563734}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ContiLPX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DasuSM22, author = {Vishnu Asutosh Dasu and Sumanta Sarkar and Kalikinkar Mandal}, editor = {Ambra Demontis and Xinyun Chen and Florian Tram{\`{e}}r}, title = {{PROV-FL:} Privacy-preserving Round Optimal Verifiable Federated Learning}, booktitle = {Proceedings of the 15th {ACM} Workshop on Artificial Intelligence and Security, AISec 2022, Los Angeles, CA, USA, 11 November 2022}, pages = {33--44}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3560830.3563729}, doi = {10.1145/3560830.3563729}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DasuSM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Kong0C22, author = {Zhifeng Kong and Amrita Roy Chowdhury and Kamalika Chaudhuri}, editor = {Ambra Demontis and Xinyun Chen and Florian Tram{\`{e}}r}, title = {Forgeability and Membership Inference Attacks}, booktitle = {Proceedings of the 15th {ACM} Workshop on Artificial Intelligence and Security, AISec 2022, Los Angeles, CA, USA, 11 November 2022}, pages = {25--31}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3560830.3563731}, doi = {10.1145/3560830.3563731}, timestamp = {Tue, 08 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Kong0C22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Li000022, author = {Lin Li and Chao Chen and Lei Pan and Jun Zhang and Yang Xiang}, editor = {Ambra Demontis and Xinyun Chen and Florian Tram{\`{e}}r}, title = {Video is All You Need: Attacking PPG-based Biometric Authentication}, booktitle = {Proceedings of the 15th {ACM} Workshop on Artificial Intelligence and Security, AISec 2022, Los Angeles, CA, USA, 11 November 2022}, pages = {57--66}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3560830.3563722}, doi = {10.1145/3560830.3563722}, timestamp = {Tue, 14 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Li000022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Maghsoudimehrabani22, author = {Mohammad Maghsoudimehrabani and Amin Azmoodeh and Ali Dehghantanha and Behrouz Zolfaghari and Gautam Srivastava}, editor = {Ambra Demontis and Xinyun Chen and Florian Tram{\`{e}}r}, title = {Proactive Detection of Query-based Adversarial Scenarios in {NLP} Systems}, booktitle = {Proceedings of the 15th {ACM} Workshop on Artificial Intelligence and Security, AISec 2022, Los Angeles, CA, USA, 11 November 2022}, pages = {103--113}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3560830.3563727}, doi = {10.1145/3560830.3563727}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Maghsoudimehrabani22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MazzoneHHVE0P22, author = {Federico Mazzone and Leander van den Heuvel and Maximilian Huber and Cristian Verdecchia and Maarten H. Everts and Florian Hahn and Andreas Peter}, editor = {Ambra Demontis and Xinyun Chen and Florian Tram{\`{e}}r}, title = {Repeated Knowledge Distillation with Confidence Masking to Mitigate Membership Inference Attacks}, booktitle = {Proceedings of the 15th {ACM} Workshop on Artificial Intelligence and Security, AISec 2022, Los Angeles, CA, USA, 11 November 2022}, pages = {13--24}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3560830.3563721}, doi = {10.1145/3560830.3563721}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MazzoneHHVE0P22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MidtlidAL22, author = {Kim Andr{\'{e}} Midtlid and Johannes {\AA}sheim and Jingyue Li}, editor = {Ambra Demontis and Xinyun Chen and Florian Tram{\`{e}}r}, title = {Magnitude Adversarial Spectrum Search-based Black-box Attack against Image Classification}, booktitle = {Proceedings of the 15th {ACM} Workshop on Artificial Intelligence and Security, AISec 2022, Los Angeles, CA, USA, 11 November 2022}, pages = {67--77}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3560830.3563723}, doi = {10.1145/3560830.3563723}, timestamp = {Tue, 08 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MidtlidAL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MillarPKR022, author = {Stuart Millar and Denis Podgurskii and Dan Kuykendall and Jes{\'{u}}s Mart{\'{\i}}nez del Rinc{\'{o}}n and Paul Miller}, editor = {Ambra Demontis and Xinyun Chen and Florian Tram{\`{e}}r}, title = {Optimising Vulnerability Triage in {DAST} with Deep Learning}, booktitle = {Proceedings of the 15th {ACM} Workshop on Artificial Intelligence and Security, AISec 2022, Los Angeles, CA, USA, 11 November 2022}, pages = {137--147}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3560830.3563724}, doi = {10.1145/3560830.3563724}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MillarPKR022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RamakrishnaD22, author = {Raksha Ramakrishna and Gy{\"{o}}rgy D{\'{a}}n}, editor = {Ambra Demontis and Xinyun Chen and Florian Tram{\`{e}}r}, title = {Inferring Class-Label Distribution in Federated Learning}, booktitle = {Proceedings of the 15th {ACM} Workshop on Artificial Intelligence and Security, AISec 2022, Los Angeles, CA, USA, 11 November 2022}, pages = {45--56}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3560830.3563725}, doi = {10.1145/3560830.3563725}, timestamp = {Tue, 08 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RamakrishnaD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SakaVK22, author = {Tarini Saka and Kami Vaniea and Nadin K{\"{o}}kciyan}, editor = {Ambra Demontis and Xinyun Chen and Florian Tram{\`{e}}r}, title = {Context-Based Clustering to Mitigate Phishing Attacks}, booktitle = {Proceedings of the 15th {ACM} Workshop on Artificial Intelligence and Security, AISec 2022, Los Angeles, CA, USA, 11 November 2022}, pages = {115--126}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3560830.3563728}, doi = {10.1145/3560830.3563728}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SakaVK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SavaSSB22, author = {Paul Andrei Sava and Jan{-}Philipp Schulze and Philip Sperl and Konstantin B{\"{o}}ttinger}, editor = {Ambra Demontis and Xinyun Chen and Florian Tram{\`{e}}r}, title = {Assessing the Impact of Transformations on Physical Adversarial Attacks}, booktitle = {Proceedings of the 15th {ACM} Workshop on Artificial Intelligence and Security, AISec 2022, Los Angeles, CA, USA, 11 November 2022}, pages = {79--90}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3560830.3563733}, doi = {10.1145/3560830.3563733}, timestamp = {Tue, 08 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SavaSSB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Trizna22, author = {Dmitrijs Trizna}, editor = {Ambra Demontis and Xinyun Chen and Florian Tram{\`{e}}r}, title = {Quo Vadis: Hybrid Machine Learning Meta-Model Based on Contextual and Behavioral Malware Representations}, booktitle = {Proceedings of the 15th {ACM} Workshop on Artificial Intelligence and Security, AISec 2022, Los Angeles, CA, USA, 11 November 2022}, pages = {127--136}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3560830.3563726}, doi = {10.1145/3560830.3563726}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Trizna22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Wu0SMM22, author = {Tong Wu and Tianhao Wang and Vikash Sehwag and Saeed Mahloujifar and Prateek Mittal}, editor = {Ambra Demontis and Xinyun Chen and Florian Tram{\`{e}}r}, title = {Just Rotate it: Deploying Backdoor Attacks via Rotation Transformation}, booktitle = {Proceedings of the 15th {ACM} Workshop on Artificial Intelligence and Security, AISec 2022, Los Angeles, CA, USA, 11 November 2022}, pages = {91--102}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3560830.3563730}, doi = {10.1145/3560830.3563730}, timestamp = {Tue, 08 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Wu0SMM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2022aisec, editor = {Ambra Demontis and Xinyun Chen and Florian Tram{\`{e}}r}, title = {Proceedings of the 15th {ACM} Workshop on Artificial Intelligence and Security, AISec 2022, Los Angeles, CA, USA, 11 November 2022}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3560830}, doi = {10.1145/3560830}, isbn = {978-1-4503-9880-0}, timestamp = {Tue, 08 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2022aisec.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AndresiniPPLAC21, author = {Giuseppina Andresini and Feargus Pendlebury and Fabio Pierazzi and Corrado Loglisci and Annalisa Appice and Lorenzo Cavallaro}, editor = {Nicholas Carlini and Ambra Demontis and Yizheng Chen}, title = {{INSOMNIA:} Towards Concept-Drift Robustness in Network Intrusion Detection}, booktitle = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, Republic of Korea, 15 November 2021}, pages = {111--122}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3474369.3486864}, doi = {10.1145/3474369.3486864}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AndresiniPPLAC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Carlini21, author = {Nicholas Carlini}, editor = {Nicholas Carlini and Ambra Demontis and Yizheng Chen}, title = {Session details: Session 1: Adversarial Machine Learning}, booktitle = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, Republic of Korea, 15 November 2021}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3494693}, doi = {10.1145/3494693}, timestamp = {Tue, 02 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Carlini21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Carlini21a, author = {Nicholas Carlini}, editor = {Nicholas Carlini and Ambra Demontis and Yizheng Chen}, title = {Session details: Session 2A: Machine Learning for Cybersecurity}, booktitle = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, Republic of Korea, 15 November 2021}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3494694}, doi = {10.1145/3494694}, timestamp = {Tue, 02 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Carlini21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Chen21, author = {Yizheng Chen}, editor = {Nicholas Carlini and Ambra Demontis and Yizheng Chen}, title = {Session details: Session 3: Privacy-Preserving Machine Learning}, booktitle = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, Republic of Korea, 15 November 2021}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3494696}, doi = {10.1145/3494696}, timestamp = {Thu, 27 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Chen21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Demontis21, author = {Ambra Demontis}, editor = {Nicholas Carlini and Ambra Demontis and Yizheng Chen}, title = {Session details: Session 2B: Machine Learning for Cybersecurity}, booktitle = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, Republic of Korea, 15 November 2021}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3494695}, doi = {10.1145/3494695}, timestamp = {Tue, 02 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Demontis21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DeshpandeGF21, author = {Chinmay Deshpande and David Gens and Michael Franz}, editor = {Nicholas Carlini and Ambra Demontis and Yizheng Chen}, title = {StackBERT: Machine Learning Assisted Static Stack Frame Size Recovery on Stripped and Optimized Binaries}, booktitle = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, Republic of Korea, 15 November 2021}, pages = {85--95}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3474369.3486865}, doi = {10.1145/3474369.3486865}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DeshpandeGF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DionysiouA21, author = {Antreas Dionysiou and Elias Athanasopoulos}, editor = {Nicholas Carlini and Ambra Demontis and Yizheng Chen}, title = {Unicode Evil: Evading {NLP} Systems Using Visual Similarities of Text Characters}, booktitle = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, Republic of Korea, 15 November 2021}, pages = {1--12}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3474369.3486871}, doi = {10.1145/3474369.3486871}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DionysiouA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DreesGHJKPRS21, author = {Jan Peter Drees and Pritha Gupta and Eyke H{\"{u}}llermeier and Tibor Jager and Alexander Konze and Claudia Priesterjahn and Arunselvan Ramaswamy and Juraj Somorovsky}, editor = {Nicholas Carlini and Ambra Demontis and Yizheng Chen}, title = {Automated Detection of Side Channels in Cryptographic Protocols: {DROWN} the ROBOTs!}, booktitle = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, Republic of Korea, 15 November 2021}, pages = {169--180}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3474369.3486868}, doi = {10.1145/3474369.3486868}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DreesGHJKPRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GanzHWR21, author = {Tom Ganz and Martin H{\"{a}}rterich and Alexander Warnecke and Konrad Rieck}, editor = {Nicholas Carlini and Ambra Demontis and Yizheng Chen}, title = {Explaining Graph Neural Networks for Vulnerability Discovery}, booktitle = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, Republic of Korea, 15 November 2021}, pages = {145--156}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3474369.3486866}, doi = {10.1145/3474369.3486866}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GanzHWR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HilgefortAR21, author = {Jan Malte Hilgefort and Daniel Arp and Konrad Rieck}, editor = {Nicholas Carlini and Ambra Demontis and Yizheng Chen}, title = {Spying through Virtual Backgrounds of Video Calls}, booktitle = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, Republic of Korea, 15 November 2021}, pages = {135--144}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3474369.3486870}, doi = {10.1145/3474369.3486870}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HilgefortAR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JoyceRN21, author = {Robert J. Joyce and Edward Raff and Charles Nicholas}, editor = {Nicholas Carlini and Ambra Demontis and Yizheng Chen}, title = {A Framework for Cluster and Classifier Evaluation in the Absence of Reference Labels}, booktitle = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, Republic of Korea, 15 November 2021}, pages = {73--84}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3474369.3486867}, doi = {10.1145/3474369.3486867}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/JoyceRN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KanPPC21, author = {Zeliang Kan and Feargus Pendlebury and Fabio Pierazzi and Lorenzo Cavallaro}, editor = {Nicholas Carlini and Ambra Demontis and Yizheng Chen}, title = {Investigating Labelless Drift Adaptation for Malware Detection}, booktitle = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, Republic of Korea, 15 November 2021}, pages = {123--134}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3474369.3486873}, doi = {10.1145/3474369.3486873}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KanPPC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KujanpaaVI21, author = {Kalle Kujanp{\"{a}}{\"{a}} and Willie Victor and Alexander Ilin}, editor = {Nicholas Carlini and Ambra Demontis and Yizheng Chen}, title = {Automating Privilege Escalation with Deep Reinforcement Learning}, booktitle = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, Republic of Korea, 15 November 2021}, pages = {157--168}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3474369.3486877}, doi = {10.1145/3474369.3486877}, timestamp = {Tue, 02 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KujanpaaVI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RahimianOF21, author = {Shadi Rahimian and Tribhuvanesh Orekondy and Mario Fritz}, editor = {Nicholas Carlini and Ambra Demontis and Yizheng Chen}, title = {Differential Privacy Defenses and Sampling Attacks for Membership Inference}, booktitle = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, Republic of Korea, 15 November 2021}, pages = {193--202}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3474369.3486876}, doi = {10.1145/3474369.3486876}, timestamp = {Tue, 02 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RahimianOF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RichardsNCFMR21, author = {Luke E. Richards and Andr{\'{e}} T. Nguyen and Ryan Capps and Steven Forsyth and Cynthia Matuszek and Edward Raff}, editor = {Nicholas Carlini and Ambra Demontis and Yizheng Chen}, title = {Adversarial Transfer Attacks With Unknown Data and Class Overlap}, booktitle = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, Republic of Korea, 15 November 2021}, pages = {13--24}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3474369.3486862}, doi = {10.1145/3474369.3486862}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/RichardsNCFMR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShanB0Z21, author = {Shawn Shan and Arjun Nitin Bhagoji and Haitao Zheng and Ben Y. Zhao}, editor = {Nicholas Carlini and Ambra Demontis and Yizheng Chen}, title = {Patch-based Defenses against Web Fingerprinting Attacks}, booktitle = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, Republic of Korea, 15 November 2021}, pages = {97--109}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3474369.3486875}, doi = {10.1145/3474369.3486875}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ShanB0Z21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SitawarinCW21, author = {Chawin Sitawarin and Supriyo Chakraborty and David A. Wagner}, editor = {Nicholas Carlini and Ambra Demontis and Yizheng Chen}, title = {{SAT:} Improving Adversarial Training via Curriculum-Based Loss Smoothing}, booktitle = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, Republic of Korea, 15 November 2021}, pages = {25--36}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3474369.3486878}, doi = {10.1145/3474369.3486878}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/SitawarinCW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Veldanda0TKKKDG21, author = {Akshaj Kumar Veldanda and Kang Liu and Benjamin Tan and Prashanth Krishnamurthy and Farshad Khorrami and Ramesh Karri and Brendan Dolan{-}Gavitt and Siddharth Garg}, editor = {Nicholas Carlini and Ambra Demontis and Yizheng Chen}, title = {NNoculation: Catching BadNets in the Wild}, booktitle = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, Republic of Korea, 15 November 2021}, pages = {49--60}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3474369.3486874}, doi = {10.1145/3474369.3486874}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Veldanda0TKKKDG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuB00JL21, author = {Runhua Xu and Nathalie Baracaldo and Yi Zhou and Ali Anwar and James Joshi and Heiko Ludwig}, editor = {Nicholas Carlini and Ambra Demontis and Yizheng Chen}, title = {FedV: Privacy-Preserving Federated Learning over Vertically Partitioned Data}, booktitle = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, Republic of Korea, 15 November 2021}, pages = {181--192}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3474369.3486872}, doi = {10.1145/3474369.3486872}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XuB00JL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YehezkelES21, author = {Aviv Yehezkel and Eyal Elyashiv and Or Soffer}, editor = {Nicholas Carlini and Ambra Demontis and Yizheng Chen}, title = {Network Anomaly Detection Using Transfer Learning Based on Auto-Encoders Loss Normalization}, booktitle = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, Republic of Korea, 15 November 2021}, pages = {61--71}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3474369.3486869}, doi = {10.1145/3474369.3486869}, timestamp = {Tue, 02 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YehezkelES21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangCW21, author = {Zhanyuan Zhang and Yizheng Chen and David A. Wagner}, editor = {Nicholas Carlini and Ambra Demontis and Yizheng Chen}, title = {{SEAT:} Similarity Encoder by Adversarial Training for Detecting Model Extraction Attack Queries}, booktitle = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, Republic of Korea, 15 November 2021}, pages = {37--48}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3474369.3486863}, doi = {10.1145/3474369.3486863}, timestamp = {Thu, 27 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZhangCW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2021aisec, editor = {Nicholas Carlini and Ambra Demontis and Yizheng Chen}, title = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, Republic of Korea, 15 November 2021}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3474369}, doi = {10.1145/3474369}, isbn = {978-1-4503-8657-9}, timestamp = {Thu, 27 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/2021aisec.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JuW20, author = {An Ju and David A. Wagner}, editor = {Jay Ligatti and Xinming Ou}, title = {{E-ABS:} Extending the Analysis-By-Synthesis Robust Classification Model to More Complex Image Domains}, booktitle = {AISec@CCS 2020: Proceedings of the 13th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, USA, 13 November 2020}, pages = {25--36}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3411508.3421382}, doi = {10.1145/3411508.3421382}, timestamp = {Mon, 08 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JuW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiaoCFS20, author = {Chang Liao and Yao Cheng and Chengfang Fang and Jie Shi}, editor = {Jay Ligatti and Xinming Ou}, title = {Where Does the Robustness Come from?: {A} Study of the Transformation-based Ensemble Defence}, booktitle = {AISec@CCS 2020: Proceedings of the 13th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, USA, 13 November 2020}, pages = {1--12}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3411508.3421380}, doi = {10.1145/3411508.3421380}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiaoCFS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NovoM20, author = {Carlos Novo and Ricardo Morla}, editor = {Jay Ligatti and Xinming Ou}, title = {Flow-based Detection and Proxy-based Evasion of Encrypted Malware {C2} Traffic}, booktitle = {AISec@CCS 2020: Proceedings of the 13th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, USA, 13 November 2020}, pages = {83--91}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3411508.3421379}, doi = {10.1145/3411508.3421379}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NovoM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RaffZMFAFNH20, author = {Edward Raff and Richard Zak and Gary Lopez Munoz and William Fleming and Hyrum S. Anderson and Bobby Filar and Charles Nicholas and James Holt}, editor = {Jay Ligatti and Xinming Ou}, title = {Automatic Yara Rule Generation Using Biclustering}, booktitle = {AISec@CCS 2020: Proceedings of the 13th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, USA, 13 November 2020}, pages = {71--82}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3411508.3421372}, doi = {10.1145/3411508.3421372}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/RaffZMFAFNH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RiveraTSCLO20, author = {Esteban Rivera and Lizzy Tengana and Jesus Solano and Alejandra Castelblanco and Christian Lopez and Mart{\'{\i}}n Ochoa}, editor = {Jay Ligatti and Xinming Ou}, title = {Risk-based Authentication Based on Network Latency Profiling}, booktitle = {AISec@CCS 2020: Proceedings of the 13th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, USA, 13 November 2020}, pages = {105--115}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3411508.3421377}, doi = {10.1145/3411508.3421377}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RiveraTSCLO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SchloglB20, author = {Alexander Schl{\"{o}}gl and Rainer B{\"{o}}hme}, editor = {Jay Ligatti and Xinming Ou}, title = {eNNclave: Offline Inference with Model Confidentiality}, booktitle = {AISec@CCS 2020: Proceedings of the 13th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, USA, 13 November 2020}, pages = {93--104}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3411508.3421376}, doi = {10.1145/3411508.3421376}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SchloglB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShumailovZMA20, author = {Ilia Shumailov and Yiren Zhao and Robert D. Mullins and Ross J. Anderson}, editor = {Jay Ligatti and Xinming Ou}, title = {Towards Certifiable Adversarial Sample Detection}, booktitle = {AISec@CCS 2020: Proceedings of the 13th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, USA, 13 November 2020}, pages = {13--24}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3411508.3421381}, doi = {10.1145/3411508.3421381}, timestamp = {Tue, 02 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ShumailovZMA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SmithJICHDRLVK20, author = {Michael R. Smith and Nicholas T. Johnson and Joe B. Ingram and Armida J. Carbajal and Bridget I. Haus and Eva Domschot and Ramyaa and Christopher C. Lamb and Stephen J. Verzi and W. Philip Kegelmeyer}, editor = {Jay Ligatti and Xinming Ou}, title = {Mind the Gap: On Bridging the Semantic Gap between Machine Learning and Malware Analysis}, booktitle = {AISec@CCS 2020: Proceedings of the 13th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, USA, 13 November 2020}, pages = {49--60}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3411508.3421373}, doi = {10.1145/3411508.3421373}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SmithJICHDRLVK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SolanoLRCTO20, author = {Jesus Solano and Christian Lopez and Esteban Rivera and Alejandra Castelblanco and Lizzy Tengana and Mart{\'{\i}}n Ochoa}, editor = {Jay Ligatti and Xinming Ou}, title = {{SCRAP:} Synthetically Composed Replay Attacks vs. Adversarial Machine Learning Attacks against Mouse-based Biometric Authentication}, booktitle = {AISec@CCS 2020: Proceedings of the 13th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, USA, 13 November 2020}, pages = {37--47}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3411508.3421378}, doi = {10.1145/3411508.3421378}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SolanoLRCTO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/VerwerNHBAO20, author = {Sicco Verwer and Azqa Nadeem and Christian A. Hammerschmidt and Laurens Bliek and Abdullah Al{-}Dujaili and Una{-}May O'Reilly}, editor = {Jay Ligatti and Xinming Ou}, title = {The Robust Malware Detection Challenge and Greedy Random Accelerated Multi-Bit Search}, booktitle = {AISec@CCS 2020: Proceedings of the 13th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, USA, 13 November 2020}, pages = {61--70}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3411508.3421374}, doi = {10.1145/3411508.3421374}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/VerwerNHBAO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YoshidaF20, author = {Kota Yoshida and Takeshi Fujino}, editor = {Jay Ligatti and Xinming Ou}, title = {Disabling Backdoor and Identifying Poison Data by using Knowledge Distillation in Backdoor Attacks on Deep Neural Networks}, booktitle = {AISec@CCS 2020: Proceedings of the 13th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, USA, 13 November 2020}, pages = {117--127}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3411508.3421375}, doi = {10.1145/3411508.3421375}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YoshidaF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2020aisec, editor = {Jay Ligatti and Xinming Ou}, title = {AISec@CCS 2020: Proceedings of the 13th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, USA, 13 November 2020}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3411508}, doi = {10.1145/3411508}, isbn = {978-1-4503-8094-2}, timestamp = {Tue, 02 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2020aisec.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AlperinWRTL19, author = {Kenneth Alperin and Allan B. Wollaber and Dennis M. Ross and Pierre C. Trepagnier and Leslie Leonard}, editor = {Lorenzo Cavallaro and Johannes Kinder and Sadia Afroz and Battista Biggio and Nicholas Carlini and Yuval Elovici and Asaf Shabtai}, title = {Risk Prioritization by Leveraging Latent Vulnerability Features in a Contested Environment}, booktitle = {Proceedings of the 12th {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2019, London, UK, November 15, 2019}, pages = {49--57}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338501.3357365}, doi = {10.1145/3338501.3357365}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AlperinWRTL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AminGC19, author = {Mohammad Ruhul Amin and Pranav Garg and Baris Coskun}, editor = {Lorenzo Cavallaro and Johannes Kinder and Sadia Afroz and Battista Biggio and Nicholas Carlini and Yuval Elovici and Asaf Shabtai}, title = {{CADENCE:} Conditional Anomaly Detection for Events Using Noise-Contrastive Estimation}, booktitle = {Proceedings of the 12th {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2019, London, UK, November 15, 2019}, pages = {71--82}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338501.3357368}, doi = {10.1145/3338501.3357368}, timestamp = {Thu, 31 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AminGC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JuutiAA19, author = {Mika Juuti and Buse Gul Atli and N. Asokan}, editor = {Lorenzo Cavallaro and Johannes Kinder and Sadia Afroz and Battista Biggio and Nicholas Carlini and Yuval Elovici and Asaf Shabtai}, title = {Making Targeted Black-box Evasion Attacks Effective and Efficient}, booktitle = {Proceedings of the 12th {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2019, London, UK, November 15, 2019}, pages = {83--94}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338501.3357366}, doi = {10.1145/3338501.3357366}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/JuutiAA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LambVKB19, author = {Alex Lamb and Vikas Verma and Juho Kannala and Yoshua Bengio}, editor = {Lorenzo Cavallaro and Johannes Kinder and Sadia Afroz and Battista Biggio and Nicholas Carlini and Yuval Elovici and Asaf Shabtai}, title = {Interpolated Adversarial Training: Achieving Robust Neural Networks Without Sacrificing Too Much Accuracy}, booktitle = {Proceedings of the 12th {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2019, London, UK, November 15, 2019}, pages = {95--103}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338501.3357369}, doi = {10.1145/3338501.3357369}, timestamp = {Sun, 10 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LambVKB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Mohammadinodooshan19, author = {Alireza Mohammadinodooshan and Ulf Karg{\'{e}}n and Nahid Shahmehri}, editor = {Lorenzo Cavallaro and Johannes Kinder and Sadia Afroz and Battista Biggio and Nicholas Carlini and Yuval Elovici and Asaf Shabtai}, title = {Robust Detection of Obfuscated Strings in Android Apps}, booktitle = {Proceedings of the 12th {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2019, London, UK, November 15, 2019}, pages = {25--35}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338501.3357373}, doi = {10.1145/3338501.3357373}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Mohammadinodooshan19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/OakDYTA19, author = {Rajvardhan Oak and Min Du and David Yan and Harshvardhan C. Takawale and Idan Amit}, editor = {Lorenzo Cavallaro and Johannes Kinder and Sadia Afroz and Battista Biggio and Nicholas Carlini and Yuval Elovici and Asaf Shabtai}, title = {Malware Detection on Highly Imbalanced Data through Sequence Modeling}, booktitle = {Proceedings of the 12th {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2019, London, UK, November 15, 2019}, pages = {37--48}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338501.3357374}, doi = {10.1145/3338501.3357374}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/OakDYTA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SehwagBSSCCM19, author = {Vikash Sehwag and Arjun Nitin Bhagoji and Liwei Song and Chawin Sitawarin and Daniel Cullina and Mung Chiang and Prateek Mittal}, editor = {Lorenzo Cavallaro and Johannes Kinder and Sadia Afroz and Battista Biggio and Nicholas Carlini and Yuval Elovici and Asaf Shabtai}, title = {Analyzing the Robustness of Open-World Machine Learning}, booktitle = {Proceedings of the 12th {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2019, London, UK, November 15, 2019}, pages = {105--116}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338501.3357372}, doi = {10.1145/3338501.3357372}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SehwagBSSCCM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShibaharaK0AHSD19, author = {Toshiki Shibahara and Hirokazu Kodera and Daiki Chiba and Mitsuaki Akiyama and Kunio Hato and Ola S{\"{o}}derstr{\"{o}}m and Daniel Dalek and Masayuki Murata}, editor = {Lorenzo Cavallaro and Johannes Kinder and Sadia Afroz and Battista Biggio and Nicholas Carlini and Yuval Elovici and Asaf Shabtai}, title = {Cross-Vendor Knowledge Transfer for Managed Security Services with Triplet Network}, booktitle = {Proceedings of the 12th {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2019, London, UK, November 15, 2019}, pages = {59--69}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338501.3357367}, doi = {10.1145/3338501.3357367}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ShibaharaK0AHSD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TruexBASLZZ19, author = {Stacey Truex and Nathalie Baracaldo and Ali Anwar and Thomas Steinke and Heiko Ludwig and Rui Zhang and Yi Zhou}, editor = {Lorenzo Cavallaro and Johannes Kinder and Sadia Afroz and Battista Biggio and Nicholas Carlini and Yuval Elovici and Asaf Shabtai}, title = {A Hybrid Approach to Privacy-Preserving Federated Learning}, booktitle = {Proceedings of the 12th {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2019, London, UK, November 15, 2019}, pages = {1--11}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338501.3357370}, doi = {10.1145/3338501.3357370}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/TruexBASLZZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuBZAL19, author = {Runhua Xu and Nathalie Baracaldo and Yi Zhou and Ali Anwar and Heiko Ludwig}, editor = {Lorenzo Cavallaro and Johannes Kinder and Sadia Afroz and Battista Biggio and Nicholas Carlini and Yuval Elovici and Asaf Shabtai}, title = {HybridAlpha: An Efficient Approach for Privacy-Preserving Federated Learning}, booktitle = {Proceedings of the 12th {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2019, London, UK, November 15, 2019}, pages = {13--23}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338501.3357371}, doi = {10.1145/3338501.3357371}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XuBZAL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2019aisec, editor = {Lorenzo Cavallaro and Johannes Kinder and Sadia Afroz and Battista Biggio and Nicholas Carlini and Yuval Elovici and Asaf Shabtai}, title = {Proceedings of the 12th {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2019, London, UK, November 15, 2019}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338501}, doi = {10.1145/3338501}, isbn = {978-1-4503-6833-9}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2019aisec.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Afroz18, author = {Sadia Afroz}, editor = {Sadia Afroz and Battista Biggio and Yuval Elovici and David Freeman and Asaf Shabtai}, title = {Session details: Keynote Address}, booktitle = {Proceedings of the 11th {ACM} Workshop on Artificial Intelligence and Security, {CCS} 2018, Toronto, ON, Canada, October 19, 2018}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3285948}, doi = {10.1145/3285948}, timestamp = {Tue, 07 Mar 2023 16:37:45 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Afroz18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Biggio18, author = {Battista Biggio}, editor = {Sadia Afroz and Battista Biggio and Yuval Elovici and David Freeman and Asaf Shabtai}, title = {Session details: {AI} Security / Adversarial Machine Learning}, booktitle = {Proceedings of the 11th {ACM} Workshop on Artificial Intelligence and Security, {CCS} 2018, Toronto, ON, Canada, October 19, 2018}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3285949}, doi = {10.1145/3285949}, timestamp = {Wed, 09 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Biggio18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DuFYCT18, author = {Yali Du and Meng Fang and Jinfeng Yi and Jun Cheng and Dacheng Tao}, editor = {Sadia Afroz and Battista Biggio and Yuval Elovici and David Freeman and Asaf Shabtai}, title = {Towards Query Efficient Black-box Attacks: An Input-free Perspective}, booktitle = {Proceedings of the 11th {ACM} Workshop on Artificial Intelligence and Security, {CCS} 2018, Toronto, ON, Canada, October 19, 2018}, pages = {13--24}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3270101.3270106}, doi = {10.1145/3270101.3270106}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DuFYCT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Elovici18, author = {Yuval Elovici}, editor = {Sadia Afroz and Battista Biggio and Yuval Elovici and David Freeman and Asaf Shabtai}, title = {Session details: {AI} for Forensics}, booktitle = {Proceedings of the 11th {ACM} Workshop on Artificial Intelligence and Security, {CCS} 2018, Toronto, ON, Canada, October 19, 2018}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3285952}, doi = {10.1145/3285952}, timestamp = {Wed, 09 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Elovici18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GriecoD18, author = {Gustavo Grieco and Artem Dinaburg}, editor = {Sadia Afroz and Battista Biggio and Yuval Elovici and David Freeman and Asaf Shabtai}, title = {Toward Smarter Vulnerability Discovery Using Machine Learning}, booktitle = {Proceedings of the 11th {ACM} Workshop on Artificial Intelligence and Security, {CCS} 2018, Toronto, ON, Canada, October 19, 2018}, pages = {48--56}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3270101.3270107}, doi = {10.1145/3270101.3270107}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GriecoD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GrondahlPJCA18, author = {Tommi Gr{\"{o}}ndahl and Luca Pajola and Mika Juuti and Mauro Conti and N. Asokan}, editor = {Sadia Afroz and Battista Biggio and Yuval Elovici and David Freeman and Asaf Shabtai}, title = {All You Need is: Evading Hate Speech Detection}, booktitle = {Proceedings of the 11th {ACM} Workshop on Artificial Intelligence and Security, {CCS} 2018, Toronto, ON, Canada, October 19, 2018}, pages = {2--12}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3270101.3270103}, doi = {10.1145/3270101.3270103}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GrondahlPJCA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HashemiCK18, author = {Mohammad Hashemi and Greg Cusack and Eric Keller}, editor = {Sadia Afroz and Battista Biggio and Yuval Elovici and David Freeman and Asaf Shabtai}, title = {Stochastic Substitute Training: {A} Gray-box Approach to Craft Adversarial Examples Against Gradient Obfuscation Defenses}, booktitle = {Proceedings of the 11th {ACM} Workshop on Artificial Intelligence and Security, {CCS} 2018, Toronto, ON, Canada, October 19, 2018}, pages = {25--36}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3270101.3270111}, doi = {10.1145/3270101.3270111}, timestamp = {Wed, 09 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HashemiCK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KaramchetiMR18, author = {Siddharth Karamcheti and Gideon Mann and David S. Rosenberg}, editor = {Sadia Afroz and Battista Biggio and Yuval Elovici and David Freeman and Asaf Shabtai}, title = {Adaptive Grey-Box Fuzz-Testing with Thompson Sampling}, booktitle = {Proceedings of the 11th {ACM} Workshop on Artificial Intelligence and Security, {CCS} 2018, Toronto, ON, Canada, October 19, 2018}, pages = {37--47}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3270101.3270108}, doi = {10.1145/3270101.3270108}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KaramchetiMR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Papernot18, author = {Nicolas Papernot}, editor = {Sadia Afroz and Battista Biggio and Yuval Elovici and David Freeman and Asaf Shabtai}, title = {A Marauder's Map of Security and Privacy in Machine Learning: An overview of current and future research directions for making machine learning secure and private}, booktitle = {Proceedings of the 11th {ACM} Workshop on Artificial Intelligence and Security, {CCS} 2018, Toronto, ON, Canada, October 19, 2018}, pages = {1}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3270101.3270102}, doi = {10.1145/3270101.3270102}, timestamp = {Wed, 09 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Papernot18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Shabtai18, author = {Asaf Shabtai}, editor = {Sadia Afroz and Battista Biggio and Yuval Elovici and David Freeman and Asaf Shabtai}, title = {Session details: {AI} for Detecting Software Vulnerabilities}, booktitle = {Proceedings of the 11th {ACM} Workshop on Artificial Intelligence and Security, {CCS} 2018, Toronto, ON, Canada, October 19, 2018}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3285950}, doi = {10.1145/3285950}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Shabtai18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Shabtai18a, author = {Asaf Shabtai}, editor = {Sadia Afroz and Battista Biggio and Yuval Elovici and David Freeman and Asaf Shabtai}, title = {Session details: {AI} for Detecting Attacks}, booktitle = {Proceedings of the 11th {ACM} Workshop on Artificial Intelligence and Security, {CCS} 2018, Toronto, ON, Canada, October 19, 2018}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3285951}, doi = {10.1145/3285951}, timestamp = {Wed, 09 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Shabtai18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TorroledoCB18, author = {Ivan Torroledo and Luis David Camacho and Alejandro Correa Bahnsen}, editor = {Sadia Afroz and Battista Biggio and Yuval Elovici and David Freeman and Asaf Shabtai}, title = {Hunting Malicious {TLS} Certificates with Deep Neural Networks}, booktitle = {Proceedings of the 11th {ACM} Workshop on Artificial Intelligence and Security, {CCS} 2018, Toronto, ON, Canada, October 19, 2018}, pages = {64--73}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3270101.3270105}, doi = {10.1145/3270101.3270105}, timestamp = {Wed, 09 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/TorroledoCB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangJW18, author = {Ningfei Wang and Shouling Ji and Ting Wang}, editor = {Sadia Afroz and Battista Biggio and Yuval Elovici and David Freeman and Asaf Shabtai}, title = {Integration of Static and Dynamic Code Stylometry Analysis for Programmer De-anonymization}, booktitle = {Proceedings of the 11th {ACM} Workshop on Artificial Intelligence and Security, {CCS} 2018, Toronto, ON, Canada, October 19, 2018}, pages = {74--84}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3270101.3270110}, doi = {10.1145/3270101.3270110}, timestamp = {Wed, 17 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/WangJW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuFCWW18, author = {Chao Xu and Zhentan Feng and Yizheng Chen and Minghua Wang and Tao Wei}, editor = {Sadia Afroz and Battista Biggio and Yuval Elovici and David Freeman and Asaf Shabtai}, title = {FeatNet: Large-scale Fraud Device Detection by Network Representation Learning with Rich Features}, booktitle = {Proceedings of the 11th {ACM} Workshop on Artificial Intelligence and Security, {CCS} 2018, Toronto, ON, Canada, October 19, 2018}, pages = {57--63}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3270101.3270109}, doi = {10.1145/3270101.3270109}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XuFCWW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhaoWJCWHB18, author = {Binbin Zhao and Haiqin Weng and Shouling Ji and Jianhai Chen and Ting Wang and Qinming He and Reheem Beyah}, editor = {Sadia Afroz and Battista Biggio and Yuval Elovici and David Freeman and Asaf Shabtai}, title = {Towards Evaluating the Security of Real-World Deployed Image CAPTCHAs}, booktitle = {Proceedings of the 11th {ACM} Workshop on Artificial Intelligence and Security, {CCS} 2018, Toronto, ON, Canada, October 19, 2018}, pages = {85--96}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3270101.3270104}, doi = {10.1145/3270101.3270104}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZhaoWJCWHB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2018aisec, editor = {Sadia Afroz and Battista Biggio and Yuval Elovici and David Freeman and Asaf Shabtai}, title = {Proceedings of the 11th {ACM} Workshop on Artificial Intelligence and Security, {CCS} 2018, Toronto, ON, Canada, October 19, 2018}, publisher = {{ACM}}, year = {2018}, url = {http://dl.acm.org/citation.cfm?id=3270101}, isbn = {978-1-4503-6004-3}, timestamp = {Tue, 07 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2018aisec.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BaracaldoCLS17, author = {Nathalie Baracaldo and Bryant Chen and Heiko Ludwig and Jaehoon Amir Safavi}, editor = {Bhavani Thuraisingham and Battista Biggio and David Mandell Freeman and Brad Miller and Arunesh Sinha}, title = {Mitigating Poisoning Attacks on Machine Learning Models: {A} Data Provenance Based Approach}, booktitle = {Proceedings of the 10th {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2017, Dallas, TX, USA, November 3, 2017}, pages = {103--110}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3128572.3140450}, doi = {10.1145/3128572.3140450}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BaracaldoCLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BittnerSW17, author = {Daniel M. Bittner and Anand D. Sarwate and Rebecca N. Wright}, editor = {Bhavani Thuraisingham and Battista Biggio and David Mandell Freeman and Brad Miller and Arunesh Sinha}, title = {Differentially Private Noisy Search with Applications to Anomaly Detection (Abstract)}, booktitle = {Proceedings of the 10th {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2017, Dallas, TX, USA, November 3, 2017}, pages = {53}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3128572.3140456}, doi = {10.1145/3128572.3140456}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BittnerSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Caliskan17, author = {Aylin Caliskan}, editor = {Bhavani Thuraisingham and Battista Biggio and David Mandell Freeman and Brad Miller and Arunesh Sinha}, title = {Beyond Big Data: What Can We Learn from {AI} Models?: Invited Keynote}, booktitle = {Proceedings of the 10th {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2017, Dallas, TX, USA, November 3, 2017}, pages = {1}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3128572.3140452}, doi = {10.1145/3128572.3140452}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Caliskan17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Carlini017, author = {Nicholas Carlini and David A. Wagner}, editor = {Bhavani Thuraisingham and Battista Biggio and David Mandell Freeman and Brad Miller and Arunesh Sinha}, title = {Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods}, booktitle = {Proceedings of the 10th {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2017, Dallas, TX, USA, November 3, 2017}, pages = {3--14}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3128572.3140444}, doi = {10.1145/3128572.3140444}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Carlini017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChenZSYH17, author = {Pin{-}Yu Chen and Huan Zhang and Yash Sharma and Jinfeng Yi and Cho{-}Jui Hsieh}, editor = {Bhavani Thuraisingham and Battista Biggio and David Mandell Freeman and Brad Miller and Arunesh Sinha}, title = {{ZOO:} Zeroth Order Optimization Based Black-box Attacks to Deep Neural Networks without Training Substitute Models}, booktitle = {Proceedings of the 10th {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2017, Dallas, TX, USA, November 3, 2017}, pages = {15--26}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3128572.3140448}, doi = {10.1145/3128572.3140448}, timestamp = {Mon, 02 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChenZSYH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HalawaRBCL17, author = {Hassan Halawa and Matei Ripeanu and Konstantin Beznosov and Baris Coskun and Meizhu Liu}, editor = {Bhavani Thuraisingham and Battista Biggio and David Mandell Freeman and Brad Miller and Arunesh Sinha}, title = {An Early Warning System for Suspicious Accounts}, booktitle = {Proceedings of the 10th {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2017, Dallas, TX, USA, November 3, 2017}, pages = {51--52}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3128572.3140455}, doi = {10.1145/3128572.3140455}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HalawaRBCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HanHSCLQP17, author = {Shuchu Han and Yifan Hu and Steven Skiena and Baris Coskun and Meizhu Liu and Hong Qin and Jaime Perez}, editor = {Bhavani Thuraisingham and Battista Biggio and David Mandell Freeman and Brad Miller and Arunesh Sinha}, title = {Generating Look-alike Names For Security Challenges}, booktitle = {Proceedings of the 10th {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2017, Dallas, TX, USA, November 3, 2017}, pages = {57--67}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3128572.3140441}, doi = {10.1145/3128572.3140441}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HanHSCLQP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KumarWS17, author = {Ram Shankar Siva Kumar and Andrew Wicker and Matt Swann}, editor = {Bhavani Thuraisingham and Battista Biggio and David Mandell Freeman and Brad Miller and Arunesh Sinha}, title = {Practical Machine Learning for Cloud Intrusion Detection: Challenges and the Way Forward}, booktitle = {Proceedings of the 10th {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2017, Dallas, TX, USA, November 3, 2017}, pages = {81--90}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3128572.3140445}, doi = {10.1145/3128572.3140445}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KumarWS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuLVO17, author = {Chang Liu and Bo Li and Yevgeniy Vorobeychik and Alina Oprea}, editor = {Bhavani Thuraisingham and Battista Biggio and David Mandell Freeman and Brad Miller and Arunesh Sinha}, title = {Robust Linear Regression Against Training Data Poisoning}, booktitle = {Proceedings of the 10th {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2017, Dallas, TX, USA, November 3, 2017}, pages = {91--102}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3128572.3140447}, doi = {10.1145/3128572.3140447}, timestamp = {Mon, 22 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LiuLVO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Munoz-GonzalezB17, author = {Luis Mu{\~{n}}oz{-}Gonz{\'{a}}lez and Battista Biggio and Ambra Demontis and Andrea Paudice and Vasin Wongrassamee and Emil C. Lupu and Fabio Roli}, editor = {Bhavani Thuraisingham and Battista Biggio and David Mandell Freeman and Brad Miller and Arunesh Sinha}, title = {Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization}, booktitle = {Proceedings of the 10th {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2017, Dallas, TX, USA, November 3, 2017}, pages = {27--38}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3128572.3140451}, doi = {10.1145/3128572.3140451}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Munoz-GonzalezB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RaffN17, author = {Edward Raff and Charles Nicholas}, editor = {Bhavani Thuraisingham and Battista Biggio and David Mandell Freeman and Brad Miller and Arunesh Sinha}, title = {Malware Classification and Class Imbalance via Stochastic Hashed {LZJD}}, booktitle = {Proceedings of the 10th {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2017, Dallas, TX, USA, November 3, 2017}, pages = {111--120}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3128572.3140446}, doi = {10.1145/3128572.3140446}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RaffN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RaffSN17, author = {Edward Raff and Jared Sylvester and Charles Nicholas}, editor = {Bhavani Thuraisingham and Battista Biggio and David Mandell Freeman and Brad Miller and Arunesh Sinha}, title = {Learning the {PE} Header, Malware Detection with Minimal Domain Knowledge}, booktitle = {Proceedings of the 10th {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2017, Dallas, TX, USA, November 3, 2017}, pages = {121--132}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3128572.3140442}, doi = {10.1145/3128572.3140442}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RaffSN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SolankiKSP17, author = {Saumya Solanki and Gautam Krishnan and Varshini Sampath and Jason Polakis}, editor = {Bhavani Thuraisingham and Battista Biggio and David Mandell Freeman and Brad Miller and Arunesh Sinha}, title = {In (Cyber)Space Bots Can Hear You Speak: Breaking Audio CAPTCHAs Using {OTS} Speech Recognition}, booktitle = {Proceedings of the 10th {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2017, Dallas, TX, USA, November 3, 2017}, pages = {69--80}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3128572.3140443}, doi = {10.1145/3128572.3140443}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SolankiKSP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YakuraSNOS17, author = {Hiromu Yakura and Shinnosuke Shinozaki and Reon Nishimura and Yoshihiro Oyama and Jun Sakuma}, editor = {Bhavani Thuraisingham and Battista Biggio and David Mandell Freeman and Brad Miller and Arunesh Sinha}, title = {Malware Analysis of Imaged Binary Samples by Convolutional Neural Network with Attention Mechanism}, booktitle = {Proceedings of the 10th {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2017, Dallas, TX, USA, November 3, 2017}, pages = {55--56}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3128572.3140457}, doi = {10.1145/3128572.3140457}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YakuraSNOS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZantedeschiNR17, author = {Valentina Zantedeschi and Maria{-}Irina Nicolae and Ambrish Rawat}, editor = {Bhavani Thuraisingham and Battista Biggio and David Mandell Freeman and Brad Miller and Arunesh Sinha}, title = {Efficient Defenses Against Adversarial Attacks}, booktitle = {Proceedings of the 10th {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2017, Dallas, TX, USA, November 3, 2017}, pages = {39--49}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3128572.3140449}, doi = {10.1145/3128572.3140449}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZantedeschiNR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2017aisec, editor = {Bhavani Thuraisingham and Battista Biggio and David Mandell Freeman and Brad Miller and Arunesh Sinha}, title = {Proceedings of the 10th {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2017, Dallas, TX, USA, November 3, 2017}, publisher = {{ACM}}, year = {2017}, url = {http://dl.acm.org/citation.cfm?id=3128572}, isbn = {978-1-4503-5202-4}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/2017aisec.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0023YR16, author = {Hao Zhang and Danfeng (Daphne) Yao and Naren Ramakrishnan}, editor = {David Mandell Freeman and Aikaterini Mitrokotsa and Arunesh Sinha}, title = {Causality-based Sensemaking of Network Traffic for Android Application Security}, booktitle = {Proceedings of the 2016 {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2016, Vienna, Austria, October 28, 2016}, pages = {47--58}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996758.2996760}, doi = {10.1145/2996758.2996760}, timestamp = {Mon, 26 Jun 2023 20:41:47 +0200}, biburl = {https://dblp.org/rec/conf/ccs/0023YR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AndersonM16, author = {Blake Anderson and David A. McGrew}, editor = {David Mandell Freeman and Aikaterini Mitrokotsa and Arunesh Sinha}, title = {Identifying Encrypted Malware Traffic with Contextual Flow Data}, booktitle = {Proceedings of the 2016 {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2016, Vienna, Austria, October 28, 2016}, pages = {35--46}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996758.2996768}, doi = {10.1145/2996758.2996768}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AndersonM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AndersonWF16, author = {Hyrum S. Anderson and Jonathan Woodbridge and Bobby Filar}, editor = {David Mandell Freeman and Aikaterini Mitrokotsa and Arunesh Sinha}, title = {DeepDGA: Adversarially-Tuned Domain Generation and Detection}, booktitle = {Proceedings of the 2016 {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2016, Vienna, Austria, October 28, 2016}, pages = {13--21}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996758.2996767}, doi = {10.1145/2996758.2996767}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AndersonWF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DeoDSVC16, author = {Amit Deo and Santanu Kumar Dash and Guillermo Suarez{-}Tangil and Volodya Vovk and Lorenzo Cavallaro}, editor = {David Mandell Freeman and Aikaterini Mitrokotsa and Arunesh Sinha}, title = {Prescience: Probabilistic Guidance on the Retraining Conundrum for Malware Detection}, booktitle = {Proceedings of the 2016 {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2016, Vienna, Austria, October 28, 2016}, pages = {71--82}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996758.2996769}, doi = {10.1145/2996758.2996769}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DeoDSVC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GhassemiSW16, author = {Mohsen Ghassemi and Anand D. Sarwate and Rebecca N. Wright}, editor = {David Mandell Freeman and Aikaterini Mitrokotsa and Arunesh Sinha}, title = {Differentially Private Online Active Learning with Applications to Anomaly Detection}, booktitle = {Proceedings of the 2016 {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2016, Vienna, Austria, October 28, 2016}, pages = {117--128}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996758.2996766}, doi = {10.1145/2996758.2996766}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GhassemiSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KirchlerHLK16, author = {Matthias Kirchler and Dominik Herrmann and Jens Lindemann and Marius Kloft}, editor = {David Mandell Freeman and Aikaterini Mitrokotsa and Arunesh Sinha}, title = {Tracked Without a Trace: Linking Sessions of Users by Unsupervised Learning of Patterns in Their {DNS} Traffic}, booktitle = {Proceedings of the 2016 {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2016, Vienna, Austria, October 28, 2016}, pages = {23--34}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996758.2996770}, doi = {10.1145/2996758.2996770}, timestamp = {Thu, 19 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KirchlerHLK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MirskySRSE16, author = {Yisroel Mirsky and Asaf Shabtai and Lior Rokach and Bracha Shapira and Yuval Elovici}, editor = {David Mandell Freeman and Aikaterini Mitrokotsa and Arunesh Sinha}, title = {SherLock vs Moriarty: {A} Smartphone Dataset for Cybersecurity Research}, booktitle = {Proceedings of the 2016 {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2016, Vienna, Austria, October 28, 2016}, pages = {1--12}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996758.2996764}, doi = {10.1145/2996758.2996764}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MirskySRSE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PevnyS16, author = {Tom{\'{a}}s Pevn{\'{y}} and Petr Somol}, editor = {David Mandell Freeman and Aikaterini Mitrokotsa and Arunesh Sinha}, title = {Discriminative Models for Multi-instance Problems with Tree Structure}, booktitle = {Proceedings of the 2016 {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2016, Vienna, Austria, October 28, 2016}, pages = {83--91}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996758.2996761}, doi = {10.1145/2996758.2996761}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/PevnyS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RussuDBFR16, author = {Paolo Russu and Ambra Demontis and Battista Biggio and Giorgio Fumera and Fabio Roli}, editor = {David Mandell Freeman and Aikaterini Mitrokotsa and Arunesh Sinha}, title = {Secure Kernel Machines against Evasion Attacks}, booktitle = {Proceedings of the 2016 {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2016, Vienna, Austria, October 28, 2016}, pages = {59--69}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996758.2996771}, doi = {10.1145/2996758.2996771}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/RussuDBFR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Sharad16, author = {Kumar Sharad}, editor = {David Mandell Freeman and Aikaterini Mitrokotsa and Arunesh Sinha}, title = {True Friends Let You Down: Benchmarking Social Graph Anonymization Schemes}, booktitle = {Proceedings of the 2016 {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2016, Vienna, Austria, October 28, 2016}, pages = {93--104}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996758.2996765}, doi = {10.1145/2996758.2996765}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Sharad16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Sharad16a, author = {Kumar Sharad}, editor = {David Mandell Freeman and Aikaterini Mitrokotsa and Arunesh Sinha}, title = {Change of Guard: The Next Generation of Social Graph De-anonymization Attacks}, booktitle = {Proceedings of the 2016 {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2016, Vienna, Austria, October 28, 2016}, pages = {105--116}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996758.2996763}, doi = {10.1145/2996758.2996763}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Sharad16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangZ16, author = {Tao Zhang and Quanyan Zhu}, editor = {David Mandell Freeman and Aikaterini Mitrokotsa and Arunesh Sinha}, title = {A Dual Perturbation Approach for Differential Private ADMM-Based Distributed Empirical Risk Minimization}, booktitle = {Proceedings of the 2016 {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2016, Vienna, Austria, October 28, 2016}, pages = {129--137}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996758.2996762}, doi = {10.1145/2996758.2996762}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2016aisec, editor = {David Mandell Freeman and Aikaterini Mitrokotsa and Arunesh Sinha}, title = {Proceedings of the 2016 {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2016, Vienna, Austria, October 28, 2016}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996758}, doi = {10.1145/2996758}, isbn = {978-1-4503-4573-6}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/2016aisec.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BerlinSS15, author = {Konstantin Berlin and David Slater and Joshua Saxe}, editor = {Indrajit Ray and Xiaofeng Wang and Kui Ren and Christos Dimitrakakis and Aikaterini Mitrokotsa and Arunesh Sinha}, title = {Malicious Behavior Detection using Windows Audit Logs}, booktitle = {Proceedings of the 8th {ACM} Workshop on Artificial Intelligence and Security, AISec 2015, Denver, Colorado, USA, October 16, 2015}, pages = {35--44}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808769.2808773}, doi = {10.1145/2808769.2808773}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BerlinSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BoshmafRBS15, author = {Yazan Boshmaf and Matei Ripeanu and Konstantin Beznosov and Elizeu Santos{-}Neto}, editor = {Indrajit Ray and Xiaofeng Wang and Kui Ren and Christos Dimitrakakis and Aikaterini Mitrokotsa and Arunesh Sinha}, title = {Thwarting Fake {OSN} Accounts by Predicting their Victims}, booktitle = {Proceedings of the 8th {ACM} Workshop on Artificial Intelligence and Security, AISec 2015, Denver, Colorado, USA, October 16, 2015}, pages = {81--89}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808769.2808772}, doi = {10.1145/2808769.2808772}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BoshmafRBS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BoydLP15, author = {Kendrick Boyd and Eric Lantz and David Page}, editor = {Indrajit Ray and Xiaofeng Wang and Kui Ren and Christos Dimitrakakis and Aikaterini Mitrokotsa and Arunesh Sinha}, title = {Differential Privacy for Classifier Evaluation}, booktitle = {Proceedings of the 8th {ACM} Workshop on Artificial Intelligence and Security, AISec 2015, Denver, Colorado, USA, October 16, 2015}, pages = {15--23}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808769.2808775}, doi = {10.1145/2808769.2808775}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BoydLP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BuragoL15, author = {Igor Burago and Daniel Lowd}, editor = {Indrajit Ray and Xiaofeng Wang and Kui Ren and Christos Dimitrakakis and Aikaterini Mitrokotsa and Arunesh Sinha}, title = {Automated Attacks on Compression-Based Classifiers}, booktitle = {Proceedings of the 8th {ACM} Workshop on Artificial Intelligence and Security, AISec 2015, Denver, Colorado, USA, October 16, 2015}, pages = {69--80}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808769.2808778}, doi = {10.1145/2808769.2808778}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BuragoL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CockDNN15, author = {Martine De Cock and Rafael Dowsley and Anderson C. A. Nascimento and Stacey C. Newman}, editor = {Indrajit Ray and Xiaofeng Wang and Kui Ren and Christos Dimitrakakis and Aikaterini Mitrokotsa and Arunesh Sinha}, title = {Fast, Privacy Preserving Linear Regression over Distributed Datasets based on Pre-Distributed Data}, booktitle = {Proceedings of the 8th {ACM} Workshop on Artificial Intelligence and Security, AISec 2015, Denver, Colorado, USA, October 16, 2015}, pages = {3--14}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808769.2808774}, doi = {10.1145/2808769.2808774}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/CockDNN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FifieldGMMT15, author = {David Fifield and Alexandru Geana and Luis MartinGarcia and Mathias Morbitzer and J. Doug Tygar}, editor = {Indrajit Ray and Xiaofeng Wang and Kui Ren and Christos Dimitrakakis and Aikaterini Mitrokotsa and Arunesh Sinha}, title = {Remote Operating System Classification over IPv6}, booktitle = {Proceedings of the 8th {ACM} Workshop on Artificial Intelligence and Security, AISec 2015, Denver, Colorado, USA, October 16, 2015}, pages = {57--67}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808769.2808777}, doi = {10.1145/2808769.2808777}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FifieldGMMT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KantchelianTAMS15, author = {Alex Kantchelian and Michael Carl Tschantz and Sadia Afroz and Brad Miller and Vaishaal Shankar and Rekha Bachwani and Anthony D. Joseph and J. Doug Tygar}, editor = {Indrajit Ray and Xiaofeng Wang and Kui Ren and Christos Dimitrakakis and Aikaterini Mitrokotsa and Arunesh Sinha}, title = {Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels}, booktitle = {Proceedings of the 8th {ACM} Workshop on Artificial Intelligence and Security, AISec 2015, Denver, Colorado, USA, October 16, 2015}, pages = {45--56}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808769.2808780}, doi = {10.1145/2808769.2808780}, timestamp = {Wed, 28 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KantchelianTAMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LantzBP15, author = {Eric Lantz and Kendrick Boyd and David Page}, editor = {Indrajit Ray and Xiaofeng Wang and Kui Ren and Christos Dimitrakakis and Aikaterini Mitrokotsa and Arunesh Sinha}, title = {Subsampled Exponential Mechanism: Differential Privacy in Large Output Spaces}, booktitle = {Proceedings of the 8th {ACM} Workshop on Artificial Intelligence and Security, AISec 2015, Denver, Colorado, USA, October 16, 2015}, pages = {25--33}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808769.2808776}, doi = {10.1145/2808769.2808776}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LantzBP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Manadhata15, author = {Pratyusa K. Manadhata}, editor = {Indrajit Ray and Xiaofeng Wang and Kui Ren and Christos Dimitrakakis and Aikaterini Mitrokotsa and Arunesh Sinha}, title = {Machine Learning for Enterprise Security}, booktitle = {Proceedings of the 8th {ACM} Workshop on Artificial Intelligence and Security, AISec 2015, Denver, Colorado, USA, October 16, 2015}, pages = {1}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808769.2808782}, doi = {10.1145/2808769.2808782}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Manadhata15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XiaoFH15, author = {Cao Xiao and David Mandell Freeman and Theodore Hwa}, editor = {Indrajit Ray and Xiaofeng Wang and Kui Ren and Christos Dimitrakakis and Aikaterini Mitrokotsa and Arunesh Sinha}, title = {Detecting Clusters of Fake Accounts in Online Social Networks}, booktitle = {Proceedings of the 8th {ACM} Workshop on Artificial Intelligence and Security, AISec 2015, Denver, Colorado, USA, October 16, 2015}, pages = {91--101}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808769.2808779}, doi = {10.1145/2808769.2808779}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XiaoFH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2015aisec, editor = {Indrajit Ray and Xiaofeng Wang and Kui Ren and Christos Dimitrakakis and Aikaterini Mitrokotsa and Arunesh Sinha}, title = {Proceedings of the 8th {ACM} Workshop on Artificial Intelligence and Security, AISec 2015, Denver, Colorado, USA, October 16, 2015}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808769}, doi = {10.1145/2808769}, isbn = {978-1-4503-3826-4}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2015aisec.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AbtB14, author = {Sebastian Abt and Harald Baier}, editor = {Christos Dimitrakakis and Aikaterini Mitrokotsa and Benjamin I. P. Rubinstein and Gail{-}Joon Ahn}, title = {A Plea for Utilising Synthetic Data when Performing Machine Learning Based Cyber-Security Experiments}, booktitle = {Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, AISec 2014, Scottsdale, AZ, USA, November 7, 2014}, pages = {37--45}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2666652.2666663}, doi = {10.1145/2666652.2666663}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AbtB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AldaS14, author = {Francesco Ald{\`{a}} and Hans Ulrich Simon}, editor = {Christos Dimitrakakis and Aikaterini Mitrokotsa and Benjamin I. P. Rubinstein and Gail{-}Joon Ahn}, title = {Randomized Response Schemes, Privacy and Usefulness}, booktitle = {Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, AISec 2014, Scottsdale, AZ, USA, November 7, 2014}, pages = {15--26}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2666652.2666654}, doi = {10.1145/2666652.2666654}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AldaS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AndersonSYM14, author = {Blake Anderson and Curtis B. Storlie and Micah Yates and Aaron McPhall}, editor = {Christos Dimitrakakis and Aikaterini Mitrokotsa and Benjamin I. P. Rubinstein and Gail{-}Joon Ahn}, title = {Automating Reverse Engineering with Machine Learning Techniques}, booktitle = {Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, AISec 2014, Scottsdale, AZ, USA, November 7, 2014}, pages = {103--112}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2666652.2666665}, doi = {10.1145/2666652.2666665}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AndersonSYM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BhagavatulaDKGZ14, author = {Sruti Bhagavatula and Christopher W. Dunn and Chris Kanich and Minaxi Gupta and Brian D. Ziebart}, editor = {Christos Dimitrakakis and Aikaterini Mitrokotsa and Benjamin I. P. Rubinstein and Gail{-}Joon Ahn}, title = {Leveraging Machine Learning to Improve Unwanted Resource Filtering}, booktitle = {Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, AISec 2014, Scottsdale, AZ, USA, November 7, 2014}, pages = {95--102}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2666652.2666662}, doi = {10.1145/2666652.2666662}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BhagavatulaDKGZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Biggio14, author = {Battista Biggio}, editor = {Christos Dimitrakakis and Aikaterini Mitrokotsa and Benjamin I. P. Rubinstein and Gail{-}Joon Ahn}, title = {On learning and recognition of secure patterns}, booktitle = {Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, AISec 2014, Scottsdale, AZ, USA, November 7, 2014}, pages = {1--2}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2666652.2666653}, doi = {10.1145/2666652.2666653}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Biggio14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BiggioRAWCGR14, author = {Battista Biggio and Konrad Rieck and Davide Ariu and Christian Wressnegger and Igino Corona and Giorgio Giacinto and Fabio Roli}, editor = {Christos Dimitrakakis and Aikaterini Mitrokotsa and Benjamin I. P. Rubinstein and Gail{-}Joon Ahn}, title = {Poisoning behavioral malware clustering}, booktitle = {Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, AISec 2014, Scottsdale, AZ, USA, November 7, 2014}, pages = {27--36}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2666652.2666666}, doi = {10.1145/2666652.2666666}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BiggioRAWCGR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CoronaMAG14, author = {Igino Corona and Davide Maiorca and Davide Ariu and Giorgio Giacinto}, editor = {Christos Dimitrakakis and Aikaterini Mitrokotsa and Benjamin I. P. Rubinstein and Gail{-}Joon Ahn}, title = {Lux0R: Detection of Malicious PDF-embedded JavaScript code through Discriminant Analysis of {API} References}, booktitle = {Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, AISec 2014, Scottsdale, AZ, USA, November 7, 2014}, pages = {47--57}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2666652.2666657}, doi = {10.1145/2666652.2666657}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CoronaMAG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ManadhataYRH14, author = {Pratyusa K. Manadhata and Sandeep Yadav and Prasad Rao and William G. Horne}, editor = {Christos Dimitrakakis and Aikaterini Mitrokotsa and Benjamin I. P. Rubinstein and Gail{-}Joon Ahn}, title = {Detecting Malicious Domains via Graph Inference}, booktitle = {Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, AISec 2014, Scottsdale, AZ, USA, November 7, 2014}, pages = {59--60}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2666652.2666659}, doi = {10.1145/2666652.2666659}, timestamp = {Mon, 11 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ManadhataYRH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MillerKABDHTJT14, author = {Brad Miller and Alex Kantchelian and Sadia Afroz and Rekha Bachwani and Edwin Dauber and Ling Huang and Michael Carl Tschantz and Anthony D. Joseph and J. Doug Tygar}, editor = {Christos Dimitrakakis and Aikaterini Mitrokotsa and Benjamin I. P. Rubinstein and Gail{-}Joon Ahn}, title = {Adversarial Active Learning}, booktitle = {Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, AISec 2014, Scottsdale, AZ, USA, November 7, 2014}, pages = {3--14}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2666652.2666656}, doi = {10.1145/2666652.2666656}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MillerKABDHTJT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NewellPXN14, author = {Andrew Newell and Rahul Potharaju and Luojie Xiang and Cristina Nita{-}Rotaru}, editor = {Christos Dimitrakakis and Aikaterini Mitrokotsa and Benjamin I. P. Rubinstein and Gail{-}Joon Ahn}, title = {On the Practicality of Integrity Attacks on Document-Level Sentiment Analysis}, booktitle = {Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, AISec 2014, Scottsdale, AZ, USA, November 7, 2014}, pages = {83--93}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2666652.2666661}, doi = {10.1145/2666652.2666661}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NewellPXN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangT14, author = {Xiao Wang and Patrick Tague}, editor = {Christos Dimitrakakis and Aikaterini Mitrokotsa and Benjamin I. P. Rubinstein and Gail{-}Joon Ahn}, title = {Non-Invasive User Tracking via Passive Sensing: Privacy Risks of Time-Series Occupancy Measurement}, booktitle = {Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, AISec 2014, Scottsdale, AZ, USA, November 7, 2014}, pages = {113--124}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2666652.2666655}, doi = {10.1145/2666652.2666655}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WangT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WhalenBS14, author = {Sean Whalen and Nathaniel Boggs and Salvatore J. Stolfo}, editor = {Christos Dimitrakakis and Aikaterini Mitrokotsa and Benjamin I. P. Rubinstein and Gail{-}Joon Ahn}, title = {Model Aggregation for Distributed Content Anomaly Detection}, booktitle = {Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, AISec 2014, Scottsdale, AZ, USA, November 7, 2014}, pages = {61--71}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2666652.2666660}, doi = {10.1145/2666652.2666660}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WhalenBS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XiangWSP14, author = {Junlong Xiang and Magnus Westerlund and Dusan Sovilj and G{\"{o}}ran Pulkkis}, editor = {Christos Dimitrakakis and Aikaterini Mitrokotsa and Benjamin I. P. Rubinstein and Gail{-}Joon Ahn}, title = {Using extreme learning machine for intrusion detection in a big data environment}, booktitle = {Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, AISec 2014, Scottsdale, AZ, USA, November 7, 2014}, pages = {73--82}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2666652.2666664}, doi = {10.1145/2666652.2666664}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XiangWSP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2014aisec, editor = {Christos Dimitrakakis and Aikaterini Mitrokotsa and Benjamin I. P. Rubinstein and Gail{-}Joon Ahn}, title = {Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, AISec 2014, Scottsdale, AZ, USA, November 7, 2014}, publisher = {{ACM}}, year = {2014}, url = {http://dl.acm.org/citation.cfm?id=2666652}, isbn = {978-1-4503-3153-1}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2014aisec.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BiggioPBAPR13, author = {Battista Biggio and Ignazio Pillai and Samuel Rota Bul{\`{o}} and Davide Ariu and Marcello Pelillo and Fabio Roli}, editor = {Ahmad{-}Reza Sadeghi and Blaine Nelson and Christos Dimitrakakis and Elaine Shi}, title = {Is data clustering in adversarial settings secure?}, booktitle = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence and Security, Co-located with {CCS} 2013, Berlin, Germany, November 4, 2013}, pages = {87--98}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517312.2517321}, doi = {10.1145/2517312.2517321}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BiggioPBAPR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BlockiBD13, author = {Jeremiah Blocki and Manuel Blum and Anupam Datta}, editor = {Ahmad{-}Reza Sadeghi and Blaine Nelson and Christos Dimitrakakis and Elaine Shi}, title = {{GOTCHA} password hackers!}, booktitle = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence and Security, Co-located with {CCS} 2013, Berlin, Germany, November 4, 2013}, pages = {25--34}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517312.2517319}, doi = {10.1145/2517312.2517319}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BlockiBD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Freeman13, author = {David Mandell Freeman}, editor = {Ahmad{-}Reza Sadeghi and Blaine Nelson and Christos Dimitrakakis and Elaine Shi}, title = {Using naive bayes to detect spammy names in social networks}, booktitle = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence and Security, Co-located with {CCS} 2013, Berlin, Germany, November 4, 2013}, pages = {3--12}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517312.2517314}, doi = {10.1145/2517312.2517314}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Freeman13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GasconYAR13, author = {Hugo Gascon and Fabian Yamaguchi and Daniel Arp and Konrad Rieck}, editor = {Ahmad{-}Reza Sadeghi and Blaine Nelson and Christos Dimitrakakis and Elaine Shi}, title = {Structural detection of android malware using embedded call graphs}, booktitle = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence and Security, Co-located with {CCS} 2013, Berlin, Germany, November 4, 2013}, pages = {45--54}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517312.2517315}, doi = {10.1145/2517312.2517315}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GasconYAR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KantchelianAHIMTGJT13, author = {Alex Kantchelian and Sadia Afroz and Ling Huang and Aylin Caliskan Islam and Brad Miller and Michael Carl Tschantz and Rachel Greenstadt and Anthony D. Joseph and J. D. Tygar}, editor = {Ahmad{-}Reza Sadeghi and Blaine Nelson and Christos Dimitrakakis and Elaine Shi}, title = {Approaches to adversarial drift}, booktitle = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence and Security, Co-located with {CCS} 2013, Berlin, Germany, November 4, 2013}, pages = {99--110}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517312.2517320}, doi = {10.1145/2517312.2517320}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KantchelianAHIMTGJT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LeontjevaGXYA13, author = {Anna Leontjeva and Mois{\'{e}}s Goldszmidt and Yinglian Xie and Fang Yu and Mart{\'{\i}}n Abadi}, editor = {Ahmad{-}Reza Sadeghi and Blaine Nelson and Christos Dimitrakakis and Elaine Shi}, title = {Early security classification of skype users via machine learning}, booktitle = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence and Security, Co-located with {CCS} 2013, Berlin, Germany, November 4, 2013}, pages = {35--44}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517312.2517322}, doi = {10.1145/2517312.2517322}, timestamp = {Mon, 27 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LeontjevaGXYA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MenahemEAN13, author = {Eitan Menahem and Yuval Elovici and Nir Amar and Gabi Nakibly}, editor = {Ahmad{-}Reza Sadeghi and Blaine Nelson and Christos Dimitrakakis and Elaine Shi}, title = {{ACTIDS:} an active strategy for detecting and localizing network attacks}, booktitle = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence and Security, Co-located with {CCS} 2013, Berlin, Germany, November 4, 2013}, pages = {55--66}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517312.2517323}, doi = {10.1145/2517312.2517323}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MenahemEAN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Rieck13, author = {Konrad Rieck}, editor = {Ahmad{-}Reza Sadeghi and Blaine Nelson and Christos Dimitrakakis and Elaine Shi}, title = {Off the beaten path: machine learning for offensive security}, booktitle = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence and Security, Co-located with {CCS} 2013, Berlin, Germany, November 4, 2013}, pages = {1--2}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517312.2517313}, doi = {10.1145/2517312.2517313}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Rieck13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SinhaLB13, author = {Arunesh Sinha and Yan Li and Lujo Bauer}, editor = {Ahmad{-}Reza Sadeghi and Blaine Nelson and Christos Dimitrakakis and Elaine Shi}, title = {What you want is not what you get: predicting sharing policies for text-based content on facebook}, booktitle = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence and Security, Co-located with {CCS} 2013, Berlin, Germany, November 4, 2013}, pages = {13--24}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517312.2517317}, doi = {10.1145/2517312.2517317}, timestamp = {Fri, 03 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SinhaLB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/StevensL13, author = {David Stevens and Daniel Lowd}, editor = {Ahmad{-}Reza Sadeghi and Blaine Nelson and Christos Dimitrakakis and Elaine Shi}, title = {On the hardness of evading combinations of linear classifiers}, booktitle = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence and Security, Co-located with {CCS} 2013, Berlin, Germany, November 4, 2013}, pages = {77--86}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517312.2517318}, doi = {10.1145/2517312.2517318}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/StevensL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WressneggerSAR13, author = {Christian Wressnegger and Guido Schwenk and Daniel Arp and Konrad Rieck}, editor = {Ahmad{-}Reza Sadeghi and Blaine Nelson and Christos Dimitrakakis and Elaine Shi}, title = {A close look on \emph{n}-grams in intrusion detection: anomaly detection vs. classification}, booktitle = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence and Security, Co-located with {CCS} 2013, Berlin, Germany, November 4, 2013}, pages = {67--76}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517312.2517316}, doi = {10.1145/2517312.2517316}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WressneggerSAR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2013aisec, editor = {Ahmad{-}Reza Sadeghi and Blaine Nelson and Christos Dimitrakakis and Elaine Shi}, title = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence and Security, Co-located with {CCS} 2013, Berlin, Germany, November 4, 2013}, publisher = {{ACM}}, year = {2013}, url = {http://dl.acm.org/citation.cfm?id=2517312}, isbn = {978-1-4503-2488-5}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2013aisec.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AndersonSL12, author = {Blake Anderson and Curtis B. Storlie and Terran Lane}, editor = {Ting Yu and V. N. Venkatakrishan and Apu Kapadia}, title = {Improving malware classification: bridging the static/dynamic gap}, booktitle = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012}, pages = {3--14}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2381896.2381900}, doi = {10.1145/2381896.2381900}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AndersonSL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChouLC12, author = {Jung{-}Wei Chou and Shou{-}De Lin and Chen{-}Mou Cheng}, editor = {Ting Yu and V. N. Venkatakrishan and Apu Kapadia}, title = {On the effectiveness of using state-of-the-art machine learning techniques to launch cryptographic distinguishing attacks}, booktitle = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012}, pages = {105--110}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2381896.2381912}, doi = {10.1145/2381896.2381912}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChouLC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Gu12, author = {Guofei Gu}, editor = {Ting Yu and V. N. Venkatakrishan and Apu Kapadia}, title = {Machine learning meets social networking security: detecting and analyzing malicious social networks for fun and profit}, booktitle = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012}, pages = {1--2}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2381896.2381898}, doi = {10.1145/2381896.2381898}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Gu12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KantchelianMHAJT12, author = {Alex Kantchelian and Justin Ma and Ling Huang and Sadia Afroz and Anthony D. Joseph and J. D. Tygar}, editor = {Ting Yu and V. N. Venkatakrishan and Apu Kapadia}, title = {Robust detection of comment spam using entropy rate}, booktitle = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012}, pages = {59--70}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2381896.2381907}, doi = {10.1145/2381896.2381907}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KantchelianMHAJT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KruegerGKR12, author = {Tammo Krueger and Hugo Gascon and Nicole Kr{\"{a}}mer and Konrad Rieck}, editor = {Ting Yu and V. N. Venkatakrishan and Apu Kapadia}, title = {Learning stateful models for network honeypots}, booktitle = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012}, pages = {37--48}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2381896.2381904}, doi = {10.1145/2381896.2381904}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KruegerGKR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SawayaKY12, author = {Yukiko Sawaya and Ayumu Kubota and Akira Yamada}, editor = {Ting Yu and V. N. Venkatakrishan and Apu Kapadia}, title = {Understanding the time-series behavioral characteristics of evolutionally advanced email spammers}, booktitle = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012}, pages = {71--80}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2381896.2381908}, doi = {10.1145/2381896.2381908}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SawayaKY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SchuttKBR12, author = {Kristof Sch{\"{u}}tt and Marius Kloft and Alexander Bikadorov and Konrad Rieck}, editor = {Ting Yu and V. N. Venkatakrishan and Apu Kapadia}, title = {Early detection of malicious behavior in JavaScript code}, booktitle = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012}, pages = {15--24}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2381896.2381901}, doi = {10.1145/2381896.2381901}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SchuttKBR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SchwenkBKR12, author = {Guido Schwenk and Alexander Bikadorov and Tammo Krueger and Konrad Rieck}, editor = {Ting Yu and V. N. Venkatakrishan and Apu Kapadia}, title = {Autonomous learning for detection of JavaScript attacks: vision or reality?}, booktitle = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012}, pages = {93--104}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2381896.2381911}, doi = {10.1145/2381896.2381911}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SchwenkBKR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SinghWL12, author = {Anshuman Singh and Andrew Walenstein and Arun Lakhotia}, editor = {Ting Yu and V. N. Venkatakrishan and Apu Kapadia}, title = {Tracking concept drift in malware families}, booktitle = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012}, pages = {81--92}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2381896.2381910}, doi = {10.1145/2381896.2381910}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SinghWL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SymonsB12, author = {Christopher T. Symons and Justin M. Beaver}, editor = {Ting Yu and V. N. Venkatakrishan and Apu Kapadia}, title = {Nonparametric semi-supervised learning for network intrusion detection: combining performance improvements with realistic in-situ training}, booktitle = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012}, pages = {49--58}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2381896.2381905}, doi = {10.1145/2381896.2381905}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SymonsB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ThiS12, author = {Hoi Le Thi and Reihaneh Safavi{-}Naini}, editor = {Ting Yu and V. N. Venkatakrishan and Apu Kapadia}, title = {An information theoretic framework for web inference detection}, booktitle = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012}, pages = {25--36}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2381896.2381902}, doi = {10.1145/2381896.2381902}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ThiS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2012aisec, editor = {Ting Yu and V. N. Venkatakrishan and Apu Kapadia}, title = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012}, publisher = {{ACM}}, year = {2012}, url = {http://dl.acm.org/citation.cfm?id=2381896}, isbn = {978-1-4503-1664-4}, timestamp = {Tue, 12 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/2012aisec.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AriuGR11, author = {Davide Ariu and Giorgio Giacinto and Fabio Roli}, editor = {Yan Chen and Alvaro A. C{\'{a}}rdenas and Rachel Greenstadt and Benjamin I. P. Rubinstein}, title = {Machine learning in computer forensics (and the lessons learned from machine learning in computer security)}, booktitle = {Proceedings of the 4th {ACM} Workshop on Security and Artificial Intelligence, AISec 2011, Chicago, IL, USA, October 21, 2011}, pages = {99--104}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046684.2046700}, doi = {10.1145/2046684.2046700}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AriuGR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BannurSS11, author = {Sushma Nagesh Bannur and Lawrence K. Saul and Stefan Savage}, editor = {Yan Chen and Alvaro A. C{\'{a}}rdenas and Rachel Greenstadt and Benjamin I. P. Rubinstein}, title = {Judging a site by its content: learning the textual, structural, and visual features of malicious web pages}, booktitle = {Proceedings of the 4th {ACM} Workshop on Security and Artificial Intelligence, AISec 2011, Chicago, IL, USA, October 21, 2011}, pages = {1--10}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046684.2046686}, doi = {10.1145/2046684.2046686}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BannurSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Cock11, author = {David A. Cock}, editor = {Yan Chen and Alvaro A. C{\'{a}}rdenas and Rachel Greenstadt and Benjamin I. P. Rubinstein}, title = {Exploitation as an inference problem}, booktitle = {Proceedings of the 4th {ACM} Workshop on Security and Artificial Intelligence, AISec 2011, Chicago, IL, USA, October 21, 2011}, pages = {105--106}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046684.2046702}, doi = {10.1145/2046684.2046702}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Cock11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HuangJNRT11, author = {Ling Huang and Anthony D. Joseph and Blaine Nelson and Benjamin I. P. Rubinstein and J. D. Tygar}, editor = {Yan Chen and Alvaro A. C{\'{a}}rdenas and Rachel Greenstadt and Benjamin I. P. Rubinstein}, title = {Adversarial machine learning}, booktitle = {Proceedings of the 4th {ACM} Workshop on Security and Artificial Intelligence, AISec 2011, Chicago, IL, USA, October 21, 2011}, pages = {43--58}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046684.2046692}, doi = {10.1145/2046684.2046692}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HuangJNRT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KaranthLNVLS11, author = {Sandeep Karanth and Srivatsan Laxman and Prasad Naldurg and Ramarathnam Venkatesan and John Lambert and Jinwook Shin}, editor = {Yan Chen and Alvaro A. C{\'{a}}rdenas and Rachel Greenstadt and Benjamin I. P. Rubinstein}, title = {{ZDVUE:} prioritization of javascript attacks to discover new vulnerabilities}, booktitle = {Proceedings of the 4th {ACM} Workshop on Security and Artificial Intelligence, AISec 2011, Chicago, IL, USA, October 21, 2011}, pages = {31--42}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046684.2046690}, doi = {10.1145/2046684.2046690}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KaranthLNVLS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KimMVS11, author = {Do{-}kyum Kim and Marti Motoyama and Geoffrey M. Voelker and Lawrence K. Saul}, editor = {Yan Chen and Alvaro A. C{\'{a}}rdenas and Rachel Greenstadt and Benjamin I. P. Rubinstein}, title = {Topic modeling of freelance job postings to monitor web service abuse}, booktitle = {Proceedings of the 4th {ACM} Workshop on Security and Artificial Intelligence, AISec 2011, Chicago, IL, USA, October 21, 2011}, pages = {11--20}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046684.2046687}, doi = {10.1145/2046684.2046687}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KimMVS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Morel11, author = {Benoit Morel}, editor = {Yan Chen and Alvaro A. C{\'{a}}rdenas and Rachel Greenstadt and Benjamin I. P. Rubinstein}, title = {Artificial intelligence and the future of cybersecurity}, booktitle = {Proceedings of the 4th {ACM} Workshop on Security and Artificial Intelligence, AISec 2011, Chicago, IL, USA, October 21, 2011}, pages = {93--98}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046684.2046699}, doi = {10.1145/2046684.2046699}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Morel11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NatarajYPZ11, author = {Lakshmanan Nataraj and Vinod Yegneswaran and Phillip A. Porras and Jian Zhang}, editor = {Yan Chen and Alvaro A. C{\'{a}}rdenas and Rachel Greenstadt and Benjamin I. P. Rubinstein}, title = {A comparative assessment of malware classification using binary texture analysis and dynamic analysis}, booktitle = {Proceedings of the 4th {ACM} Workshop on Security and Artificial Intelligence, AISec 2011, Chicago, IL, USA, October 21, 2011}, pages = {21--30}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046684.2046689}, doi = {10.1145/2046684.2046689}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NatarajYPZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NelsonBL11, author = {Blaine Nelson and Battista Biggio and Pavel Laskov}, editor = {Yan Chen and Alvaro A. C{\'{a}}rdenas and Rachel Greenstadt and Benjamin I. P. Rubinstein}, title = {Understanding the risk factors of learning in adversarial environments}, booktitle = {Proceedings of the 4th {ACM} Workshop on Security and Artificial Intelligence, AISec 2011, Chicago, IL, USA, October 21, 2011}, pages = {87--92}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046684.2046698}, doi = {10.1145/2046684.2046698}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NelsonBL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SarrauteRO11, author = {Carlos Sarraute and Gerardo Richarte and Jorge Luc{\'{a}}ngeli Obes}, editor = {Yan Chen and Alvaro A. C{\'{a}}rdenas and Rachel Greenstadt and Benjamin I. P. Rubinstein}, title = {An algorithm to find optimal attack paths in nondeterministic scenarios}, booktitle = {Proceedings of the 4th {ACM} Workshop on Security and Artificial Intelligence, AISec 2011, Chicago, IL, USA, October 21, 2011}, pages = {71--80}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046684.2046695}, doi = {10.1145/2046684.2046695}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SarrauteRO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Shirali-ShahrezaS11, author = {Sajad Shirali{-}Shahreza and Mohammad Hassan Shirali{-}Shahreza}, editor = {Yan Chen and Alvaro A. C{\'{a}}rdenas and Rachel Greenstadt and Benjamin I. P. Rubinstein}, title = {Categorizing {CAPTCHA}}, booktitle = {Proceedings of the 4th {ACM} Workshop on Security and Artificial Intelligence, AISec 2011, Chicago, IL, USA, October 21, 2011}, pages = {107--108}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046684.2046703}, doi = {10.1145/2046684.2046703}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Shirali-ShahrezaS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Shirali-ShahrezaS11a, author = {Sajad Shirali{-}Shahreza and Mohammad Hassan Shirali{-}Shahreza}, editor = {Yan Chen and Alvaro A. C{\'{a}}rdenas and Rachel Greenstadt and Benjamin I. P. Rubinstein}, title = {Accessibility of {CAPTCHA} methods}, booktitle = {Proceedings of the 4th {ACM} Workshop on Security and Artificial Intelligence, AISec 2011, Chicago, IL, USA, October 21, 2011}, pages = {109--110}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046684.2046704}, doi = {10.1145/2046684.2046704}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Shirali-ShahrezaS11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SinghSWL11, author = {Anshuman Singh and Sumi Singh and Andrew Walenstein and Arun Lakhotia}, editor = {Yan Chen and Alvaro A. C{\'{a}}rdenas and Rachel Greenstadt and Benjamin I. P. Rubinstein}, title = {On deployable adversarial classification models}, booktitle = {Proceedings of the 4th {ACM} Workshop on Security and Artificial Intelligence, AISec 2011, Chicago, IL, USA, October 21, 2011}, pages = {113--114}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046684.2046706}, doi = {10.1145/2046684.2046706}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SinghSWL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Turan11, author = {Meltem S{\"{o}}nmez Turan}, editor = {Yan Chen and Alvaro A. C{\'{a}}rdenas and Rachel Greenstadt and Benjamin I. P. Rubinstein}, title = {Evolutionary construction of de bruijn sequences}, booktitle = {Proceedings of the 4th {ACM} Workshop on Security and Artificial Intelligence, AISec 2011, Chicago, IL, USA, October 21, 2011}, pages = {81--86}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046684.2046696}, doi = {10.1145/2046684.2046696}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Turan11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangS11, author = {Qifan Wang and Luo Si}, editor = {Yan Chen and Alvaro A. C{\'{a}}rdenas and Rachel Greenstadt and Benjamin I. P. Rubinstein}, title = {A robust one-class bayesian approach for masquerade detection}, booktitle = {Proceedings of the 4th {ACM} Workshop on Security and Artificial Intelligence, AISec 2011, Chicago, IL, USA, October 21, 2011}, pages = {111--112}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046684.2046705}, doi = {10.1145/2046684.2046705}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WangS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZomlotSLOR11, author = {Loai Zomlot and Sathya Chandran Sundaramurthy and Kui Luo and Xinming Ou and Siva Raj Rajagopalan}, editor = {Yan Chen and Alvaro A. C{\'{a}}rdenas and Rachel Greenstadt and Benjamin I. P. Rubinstein}, title = {Prioritizing intrusion analysis using Dempster-Shafer theory}, booktitle = {Proceedings of the 4th {ACM} Workshop on Security and Artificial Intelligence, AISec 2011, Chicago, IL, USA, October 21, 2011}, pages = {59--70}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046684.2046694}, doi = {10.1145/2046684.2046694}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZomlotSLOR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2011aisec, editor = {Yan Chen and Alvaro A. C{\'{a}}rdenas and Rachel Greenstadt and Benjamin I. P. Rubinstein}, title = {Proceedings of the 4th {ACM} Workshop on Security and Artificial Intelligence, AISec 2011, Chicago, IL, USA, October 21, 2011}, publisher = {{ACM}}, year = {2011}, url = {http://dl.acm.org/citation.cfm?id=2046684}, isbn = {978-1-4503-1003-1}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2011aisec.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AhmedHSF09, author = {Faraz Ahmed and Haider Hameed and M. Zubair Shafiq and Muddassar Farooq}, editor = {Dirk Balfanz and Jessica Staddon}, title = {Using spatio-temporal information in {API} calls with machine learning algorithms for malware detection}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Security and Artificial Intelligence, AISec 2009, Chicago, Illinois, USA, November 9, 2009}, pages = {55--62}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1654988.1655003}, doi = {10.1145/1654988.1655003}, timestamp = {Wed, 27 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AhmedHSF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChangD09, author = {Su Chang and Thomas E. Daniels}, editor = {Dirk Balfanz and Jessica Staddon}, title = {{P2P} botnet detection using behavior clustering {\&} statistical tests}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Security and Artificial Intelligence, AISec 2009, Chicago, Illinois, USA, November 9, 2009}, pages = {23--30}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1654988.1654996}, doi = {10.1145/1654988.1654996}, timestamp = {Wed, 11 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChangD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Danezis09, author = {George Danezis}, editor = {Dirk Balfanz and Jessica Staddon}, title = {Inferring privacy policies for social networking services}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Security and Artificial Intelligence, AISec 2009, Chicago, Illinois, USA, November 9, 2009}, pages = {5--10}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1654988.1654991}, doi = {10.1145/1654988.1654991}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Danezis09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GornitzKRB09, author = {Nico G{\"{o}}rnitz and Marius Kloft and Konrad Rieck and Ulf Brefeld}, editor = {Dirk Balfanz and Jessica Staddon}, title = {Active learning for network intrusion detection}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Security and Artificial Intelligence, AISec 2009, Chicago, Illinois, USA, November 9, 2009}, pages = {47--54}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1654988.1655002}, doi = {10.1145/1654988.1655002}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GornitzKRB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GreenstadtAB09, author = {Rachel Greenstadt and Sadia Afroz and Michael Brennan}, editor = {Dirk Balfanz and Jessica Staddon}, title = {Mixed-initiative security agents}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Security and Artificial Intelligence, AISec 2009, Chicago, Illinois, USA, November 9, 2009}, pages = {35--38}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1654988.1654999}, doi = {10.1145/1654988.1654999}, timestamp = {Wed, 28 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GreenstadtAB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Hogg09, author = {Tad Hogg}, editor = {Dirk Balfanz and Jessica Staddon}, title = {Security challenges for reputation mechanisms using online social networks}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Security and Artificial Intelligence, AISec 2009, Chicago, Illinois, USA, November 9, 2009}, pages = {31--34}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1654988.1654998}, doi = {10.1145/1654988.1654998}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Hogg09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Jakobsson09, author = {Markus Jakobsson}, editor = {Dirk Balfanz and Jessica Staddon}, title = {Captcha-free throttling}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Security and Artificial Intelligence, AISec 2009, Chicago, Illinois, USA, November 9, 2009}, pages = {15--22}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1654988.1654994}, doi = {10.1145/1654988.1654994}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Jakobsson09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LaskovK09, author = {Pavel Laskov and Marius Kloft}, editor = {Dirk Balfanz and Jessica Staddon}, title = {A framework for quantitative security analysis of machine learning}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Security and Artificial Intelligence, AISec 2009, Chicago, Illinois, USA, November 9, 2009}, pages = {1--4}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1654988.1654990}, doi = {10.1145/1654988.1654990}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LaskovK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Staddon09, author = {Jessica Staddon}, editor = {Dirk Balfanz and Jessica Staddon}, title = {Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Security and Artificial Intelligence, AISec 2009, Chicago, Illinois, USA, November 9, 2009}, pages = {11--14}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1654988.1654992}, doi = {10.1145/1654988.1654992}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Staddon09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/StavrouCLS09, author = {Angelos Stavrou and Gabriela F. Cretu{-}Ciocarlie and Michael E. Locasto and Salvatore J. Stolfo}, editor = {Dirk Balfanz and Jessica Staddon}, title = {Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Security and Artificial Intelligence, AISec 2009, Chicago, Illinois, USA, November 9, 2009}, pages = {39--46}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1654988.1655000}, doi = {10.1145/1654988.1655000}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/StavrouCLS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2009aisec, editor = {Dirk Balfanz and Jessica Staddon}, title = {Proceedings of the 2nd {ACM} Workshop on Security and Artificial Intelligence, AISec 2009, Chicago, Illinois, USA, November 9, 2009}, publisher = {{ACM}}, year = {2009}, isbn = {978-1-60558-781-3}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2009aisec.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BarrenoBCJNRST08, author = {Marco Barreno and Peter L. Bartlett and Fuching Jack Chi and Anthony D. Joseph and Blaine Nelson and Benjamin I. P. Rubinstein and Udam Saini and J. Doug Tygar}, editor = {Dirk Balfanz and Jessica Staddon}, title = {Open problems in the security of learning}, booktitle = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008}, pages = {19--26}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456377.1456382}, doi = {10.1145/1456377.1456382}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BarrenoBCJNRST08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BerralPAGTP08, author = {Josep Lluis Berral and Nicol{\'{a}}s Poggi and Javier Alonso and Ricard Gavald{\`{a}} and Jordi Torres and Manish Parashar}, editor = {Dirk Balfanz and Jessica Staddon}, title = {Adaptive distributed mechanism against flooding network attacks based on machine learning}, booktitle = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008}, pages = {43--50}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456377.1456389}, doi = {10.1145/1456377.1456389}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BerralPAGTP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChatterjeeAP08, author = {Krishnendu Chatterjee and Luca de Alfaro and Ian Pye}, editor = {Dirk Balfanz and Jessica Staddon}, title = {Robust content-driven reputation}, booktitle = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008}, pages = {33--42}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456377.1456387}, doi = {10.1145/1456377.1456387}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChatterjeeAP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Clifton08, author = {Christopher W. Clifton}, editor = {Dirk Balfanz and Jessica Staddon}, title = {Opportunities for private and secure machine learning}, booktitle = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008}, pages = {31--32}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456377.1456385}, doi = {10.1145/1456377.1456385}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Clifton08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DaherC08, author = {Waseem Daher and Ran Canetti}, editor = {Dirk Balfanz and Jessica Staddon}, title = {{POSH:} a generalized captcha with security applications}, booktitle = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008}, pages = {1--10}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456377.1456379}, doi = {10.1145/1456377.1456379}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DaherC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GreenstadtB08, author = {Rachel Greenstadt and Jacob Beal}, editor = {Dirk Balfanz and Jessica Staddon}, title = {Cognitive security for personal devices}, booktitle = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008}, pages = {27--30}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456377.1456383}, doi = {10.1145/1456377.1456383}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GreenstadtB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KelleyDSC08, author = {Patrick Gage Kelley and Paul Hankes Drielsma and Norman M. Sadeh and Lorrie Faith Cranor}, editor = {Dirk Balfanz and Jessica Staddon}, title = {User-controllable learning of security and privacy policies}, booktitle = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008}, pages = {11--18}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456377.1456380}, doi = {10.1145/1456377.1456380}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KelleyDSC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KloftBDGL08, author = {Marius Kloft and Ulf Brefeld and Patrick D{\"{u}}ssel and Christian Gehl and Pavel Laskov}, editor = {Dirk Balfanz and Jessica Staddon}, title = {Automatic feature selection for anomaly detection}, booktitle = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008}, pages = {71--76}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456377.1456395}, doi = {10.1145/1456377.1456395}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KloftBDGL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Landwehr08, author = {Carl E. Landwehr}, editor = {Dirk Balfanz and Jessica Staddon}, title = {Cyber security and artificial intelligence: from fixing the plumbing to smart water}, booktitle = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008}, pages = {51--52}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456377.1456391}, doi = {10.1145/1456377.1456391}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Landwehr08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhouI08, author = {Yan Zhou and W. Meador Inge}, editor = {Dirk Balfanz and Jessica Staddon}, title = {Malware detection using adaptive data compression}, booktitle = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008}, pages = {53--60}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456377.1456393}, doi = {10.1145/1456377.1456393}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhouI08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZurutuzaUZ08, author = {Urko Zurutuza and Roberto Uribeetxeberria and Diego Zamboni}, editor = {Dirk Balfanz and Jessica Staddon}, title = {A data mining approach for analysis of worm activity through automatic signature generation}, booktitle = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008}, pages = {61--70}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456377.1456394}, doi = {10.1145/1456377.1456394}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZurutuzaUZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2008aisec, editor = {Dirk Balfanz and Jessica Staddon}, title = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008}, publisher = {{ACM}}, year = {2008}, isbn = {978-1-60558-291-7}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2008aisec.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.