Search dblp for Publications

export results for "stream:conf/aisec-ws:"

 download as .bib file

@inproceedings{DBLP:conf/aisec-ws/Annamalai24,
  author       = {Meenatchi Sundaram Muthu Selva Annamalai},
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Matthew Jagielski},
  title        = {It's Our Loss: No Privacy Amplification for Hidden State {DP-SGD}
                  With Non-Convex Loss},
  booktitle    = {Proceedings of the 2024 Workshop on Artificial Intelligence and Security,
                  AISec 2024, Salt Lake City, UT, USA, October 14-18, 2024},
  pages        = {24--30},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3689932.3694767},
  doi          = {10.1145/3689932.3694767},
  timestamp    = {Sat, 30 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aisec-ws/Annamalai24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aisec-ws/ApruzzeseFP24,
  author       = {Giovanni Apruzzese and
                  Aurore Fass and
                  Fabio Pierazzi},
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Matthew Jagielski},
  title        = {When Adversarial Perturbations meet Concept Drift: An Exploratory
                  Analysis on {ML-NIDS}},
  booktitle    = {Proceedings of the 2024 Workshop on Artificial Intelligence and Security,
                  AISec 2024, Salt Lake City, UT, USA, October 14-18, 2024},
  pages        = {149--160},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3689932.3694757},
  doi          = {10.1145/3689932.3694757},
  timestamp    = {Sat, 30 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aisec-ws/ApruzzeseFP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aisec-ws/ArefinS24,
  author       = {Sayed Erfan Arefin and
                  Abdul Serwadda},
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Matthew Jagielski},
  title        = {Music to My Ears: Turning {GPU} Sounds into Intellectual Property
                  Gold},
  booktitle    = {Proceedings of the 2024 Workshop on Artificial Intelligence and Security,
                  AISec 2024, Salt Lake City, UT, USA, October 14-18, 2024},
  pages        = {196--207},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3689932.3694771},
  doi          = {10.1145/3689932.3694771},
  timestamp    = {Sat, 30 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aisec-ws/ArefinS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aisec-ws/BungartzB0O24,
  author       = {Christian Bungartz and
                  Felix Boes and
                  Michael Meier and
                  Marc Ohm},
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Matthew Jagielski},
  title        = {Towards Robust, Explainable, and Privacy-Friendly Sybil Detection},
  booktitle    = {Proceedings of the 2024 Workshop on Artificial Intelligence and Security,
                  AISec 2024, Salt Lake City, UT, USA, October 14-18, 2024},
  pages        = {161--172},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3689932.3694759},
  doi          = {10.1145/3689932.3694759},
  timestamp    = {Sat, 30 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aisec-ws/BungartzB0O24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aisec-ws/CastagnaroCP24,
  author       = {Alberto Castagnaro and
                  Mauro Conti and
                  Luca Pajola},
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Matthew Jagielski},
  title        = {Offensive {AI:} Enhancing Directory Brute-forcing Attack with the
                  Use of Language Models},
  booktitle    = {Proceedings of the 2024 Workshop on Artificial Intelligence and Security,
                  AISec 2024, Salt Lake City, UT, USA, October 14-18, 2024},
  pages        = {184--195},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3689932.3694770},
  doi          = {10.1145/3689932.3694770},
  timestamp    = {Sat, 30 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aisec-ws/CastagnaroCP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aisec-ws/DorM24,
  author       = {Maor Biton Dor and
                  Yisroel Mirsky},
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Matthew Jagielski},
  title        = {Efficient Model Extraction via Boundary Sampling},
  booktitle    = {Proceedings of the 2024 Workshop on Artificial Intelligence and Security,
                  AISec 2024, Salt Lake City, UT, USA, October 14-18, 2024},
  pages        = {1--11},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3689932.3694756},
  doi          = {10.1145/3689932.3694756},
  timestamp    = {Sat, 30 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aisec-ws/DorM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aisec-ws/GatS24,
  author       = {Nadav Gat and
                  Mahmood Sharif},
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Matthew Jagielski},
  title        = {Harmful Bias: {A} General Label-Leakage Attack on Federated Learning
                  from Bias Gradients},
  booktitle    = {Proceedings of the 2024 Workshop on Artificial Intelligence and Security,
                  AISec 2024, Salt Lake City, UT, USA, October 14-18, 2024},
  pages        = {31--41},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3689932.3694768},
  doi          = {10.1145/3689932.3694768},
  timestamp    = {Sat, 30 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aisec-ws/GatS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aisec-ws/JinOR24,
  author       = {Jiankai Jin and
                  Olga Ohrimenko and
                  Benjamin I. P. Rubinstein},
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Matthew Jagielski},
  title        = {Getting a-Round Guarantees: Floating-Point Attacks on Certified Robustness},
  booktitle    = {Proceedings of the 2024 Workshop on Artificial Intelligence and Security,
                  AISec 2024, Salt Lake City, UT, USA, October 14-18, 2024},
  pages        = {53--64},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3689932.3694761},
  doi          = {10.1145/3689932.3694761},
  timestamp    = {Sat, 30 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aisec-ws/JinOR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aisec-ws/KumarHMO24,
  author       = {Shashwat Kumar and
                  Francis Hahn and
                  Stuart Millar and
                  Xinming Ou},
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Matthew Jagielski},
  title        = {Using {LLM} Embeddings with Similarity Search for Botnet {TLS} Certificate
                  Detection},
  booktitle    = {Proceedings of the 2024 Workshop on Artificial Intelligence and Security,
                  AISec 2024, Salt Lake City, UT, USA, October 14-18, 2024},
  pages        = {173--183},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3689932.3694766},
  doi          = {10.1145/3689932.3694766},
  timestamp    = {Sat, 30 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aisec-ws/KumarHMO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aisec-ws/ParkKOP024,
  author       = {Leo Hyun Park and
                  Jaeuk Kim and
                  Myung Gyo Oh and
                  Jaewoo Park and
                  Taekyoung Kwon},
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Matthew Jagielski},
  title        = {Adversarial Feature Alignment: Balancing Robustness and Accuracy in
                  Deep Learning via Adversarial Training},
  booktitle    = {Proceedings of the 2024 Workshop on Artificial Intelligence and Security,
                  AISec 2024, Salt Lake City, UT, USA, October 14-18, 2024},
  pages        = {101--112},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3689932.3694765},
  doi          = {10.1145/3689932.3694765},
  timestamp    = {Sat, 30 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aisec-ws/ParkKOP024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aisec-ws/PasquiniST24,
  author       = {Dario Pasquini and
                  Martin Strohmeier and
                  Carmela Troncoso},
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Matthew Jagielski},
  title        = {Neural Exec: Learning (and Learning from) Execution Triggers for Prompt
                  Injection Attacks},
  booktitle    = {Proceedings of the 2024 Workshop on Artificial Intelligence and Security,
                  AISec 2024, Salt Lake City, UT, USA, October 14-18, 2024},
  pages        = {89--100},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3689932.3694764},
  doi          = {10.1145/3689932.3694764},
  timestamp    = {Sat, 30 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aisec-ws/PasquiniST24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aisec-ws/RoaMSBS24,
  author       = {Camila Roa and
                  Maria Mahbub and
                  Sudarshan Srinivasan and
                  Edmon Begoli and
                  Amir Sadovnik},
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Matthew Jagielski},
  title        = {Semantic Stealth: Crafting Covert Adversarial Patches for Sentiment
                  Classifiers Using Large Language Models},
  booktitle    = {Proceedings of the 2024 Workshop on Artificial Intelligence and Security,
                  AISec 2024, Salt Lake City, UT, USA, October 14-18, 2024},
  pages        = {42--52},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3689932.3694758},
  doi          = {10.1145/3689932.3694758},
  timestamp    = {Sat, 30 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aisec-ws/RoaMSBS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aisec-ws/SchoofKCP24,
  author       = {Coen Schoof and
                  Stefanos Koffas and
                  Mauro Conti and
                  Stjepan Picek},
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Matthew Jagielski},
  title        = {EmoBack: Backdoor Attacks Against Speaker Identification Using Emotional
                  Prosody},
  booktitle    = {Proceedings of the 2024 Workshop on Artificial Intelligence and Security,
                  AISec 2024, Salt Lake City, UT, USA, October 14-18, 2024},
  pages        = {137--148},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3689932.3694773},
  doi          = {10.1145/3689932.3694773},
  timestamp    = {Sat, 30 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aisec-ws/SchoofKCP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aisec-ws/SwopeKDRR24,
  author       = {Ryan Swope and
                  Amol Khanna and
                  Philip Doldo and
                  Saptarshi Roy and
                  Edward Raff},
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Matthew Jagielski},
  title        = {Feature Selection from Differentially Private Correlations},
  booktitle    = {Proceedings of the 2024 Workshop on Artificial Intelligence and Security,
                  AISec 2024, Salt Lake City, UT, USA, October 14-18, 2024},
  pages        = {12--23},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3689932.3694760},
  doi          = {10.1145/3689932.3694760},
  timestamp    = {Sat, 30 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aisec-ws/SwopeKDRR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aisec-ws/TajalliKAP24,
  author       = {Behrad Tajalli and
                  Stefanos Koffas and
                  Gorka Abad and
                  Stjepan Picek},
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Matthew Jagielski},
  title        = {ELMs Under Siege: {A} Study on Backdoor Attacks on Extreme Learning
                  Machines},
  booktitle    = {Proceedings of the 2024 Workshop on Artificial Intelligence and Security,
                  AISec 2024, Salt Lake City, UT, USA, October 14-18, 2024},
  pages        = {125--136},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3689932.3694772},
  doi          = {10.1145/3689932.3694772},
  timestamp    = {Sat, 30 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aisec-ws/TajalliKAP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aisec-ws/YunWRS24,
  author       = {Zebin Yun and
                  Achi{-}Or Weingarten and
                  Eyal Ronen and
                  Mahmood Sharif},
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Matthew Jagielski},
  title        = {The Ultimate Combo: Boosting Adversarial Example Transferability by
                  Composing Data Augmentations},
  booktitle    = {Proceedings of the 2024 Workshop on Artificial Intelligence and Security,
                  AISec 2024, Salt Lake City, UT, USA, October 14-18, 2024},
  pages        = {113--124},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3689932.3694769},
  doi          = {10.1145/3689932.3694769},
  timestamp    = {Sat, 30 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aisec-ws/YunWRS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aisec-ws/ZhaoW24,
  author       = {Qi Zhao and
                  Christian Wressnegger},
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Matthew Jagielski},
  title        = {Adversarially Robust Anti-Backdoor Learning},
  booktitle    = {Proceedings of the 2024 Workshop on Artificial Intelligence and Security,
                  AISec 2024, Salt Lake City, UT, USA, October 14-18, 2024},
  pages        = {77--88},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3689932.3694763},
  doi          = {10.1145/3689932.3694763},
  timestamp    = {Sat, 30 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aisec-ws/ZhaoW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aisec-ws/ZhuMWSJCY24,
  author       = {Yuxuan Zhu and
                  Michael Mandulak and
                  Kerui Wu and
                  George M. Slota and
                  Yuseok Jeon and
                  Ka{-}Ho Chow and
                  Lei Yu},
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Matthew Jagielski},
  title        = {On the Robustness of Graph Reduction Against {GNN} Backdoor},
  booktitle    = {Proceedings of the 2024 Workshop on Artificial Intelligence and Security,
                  AISec 2024, Salt Lake City, UT, USA, October 14-18, 2024},
  pages        = {65--76},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3689932.3694762},
  doi          = {10.1145/3689932.3694762},
  timestamp    = {Mon, 02 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aisec-ws/ZhuMWSJCY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/aisec-ws/2024,
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Matthew Jagielski},
  title        = {Proceedings of the 2024 Workshop on Artificial Intelligence and Security,
                  AISec 2024, Salt Lake City, UT, USA, October 14-18, 2024},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3689932},
  doi          = {10.1145/3689932},
  isbn         = {979-8-4007-1228-9},
  timestamp    = {Mon, 25 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aisec-ws/2024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0002KF23,
  author       = {Tobias Lorenz and
                  Marta Kwiatkowska and
                  Mario Fritz},
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Florian Tram{\`{e}}r},
  title        = {Certifiers Make Neural Networks Vulnerable to Availability Attacks},
  booktitle    = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023},
  pages        = {67--78},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605764.3623917},
  doi          = {10.1145/3605764.3623917},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/0002KF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AbdelnabiGMEHF23,
  author       = {Sahar Abdelnabi and
                  Kai Greshake and
                  Shailesh Mishra and
                  Christoph Endres and
                  Thorsten Holz and
                  Mario Fritz},
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Florian Tram{\`{e}}r},
  title        = {Not What You've Signed Up For: Compromising Real-World LLM-Integrated
                  Applications with Indirect Prompt Injection},
  booktitle    = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023},
  pages        = {79--90},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605764.3623985},
  doi          = {10.1145/3605764.3623985},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AbdelnabiGMEHF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BatesMH23,
  author       = {Elizabeth Bates and
                  Vasilios Mavroudis and
                  Chris Hicks},
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Florian Tram{\`{e}}r},
  title        = {Reward Shaping for Happier Autonomous Cyber Security Agents},
  booktitle    = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023},
  pages        = {221--232},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605764.3623916},
  doi          = {10.1145/3605764.3623916},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BatesMH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BitonMLKBSPEN23,
  author       = {Dudi Biton and
                  Aditi Misra and
                  Efrat Levy and
                  Jaidip Kotak and
                  Ron Bitton and
                  Roei Schuster and
                  Nicolas Papernot and
                  Yuval Elovici and
                  Ben Nassi},
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Florian Tram{\`{e}}r},
  title        = {The Adversarial Implications of Variable-Time Inference},
  booktitle    = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023},
  pages        = {103--114},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605764.3623912},
  doi          = {10.1145/3605764.3623912},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BitonMLKBSPEN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChobolaUK23,
  author       = {Tom{\'{a}}s Chobola and
                  Dmitrii Usynin and
                  Georgios Kaissis},
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Florian Tram{\`{e}}r},
  title        = {Membership Inference Attacks Against Semantic Segmentation Models},
  booktitle    = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023},
  pages        = {43--53},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605764.3623906},
  doi          = {10.1145/3605764.3623906},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChobolaUK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChowKLCAP23,
  author       = {Theo Chow and
                  Zeliang Kan and
                  Lorenz Linhardt and
                  Lorenzo Cavallaro and
                  Daniel Arp and
                  Fabio Pierazzi},
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Florian Tram{\`{e}}r},
  title        = {Drift Forensics of Malware Classifiers},
  booktitle    = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023},
  pages        = {197--207},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605764.3623918},
  doi          = {10.1145/3605764.3623918},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChowKLCAP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CoqueretCSZ23,
  author       = {Beno{\^{\i}}t Coqueret and
                  Mathieu Carbone and
                  Olivier Sentieys and
                  Gabriel Zaid},
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Florian Tram{\`{e}}r},
  title        = {When Side-Channel Attacks Break the Black-Box Property of Embedded
                  Artificial Intelligence},
  booktitle    = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023},
  pages        = {127--138},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605764.3623903},
  doi          = {10.1145/3605764.3623903},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CoqueretCSZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DOnghiaCGCPZ23,
  author       = {Mario D'Onghia and
                  Federico Di Cesare and
                  Luigi Gallo and
                  Michele Carminati and
                  Mario Polino and
                  Stefano Zanero},
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Florian Tram{\`{e}}r},
  title        = {Lookin' Out My Backdoor! Investigating Backdooring Attacks Against
                  DL-driven Malware Detectors},
  booktitle    = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023},
  pages        = {209--220},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605764.3623919},
  doi          = {10.1145/3605764.3623919},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DOnghiaCGCPZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GibertZL23,
  author       = {Daniel Gibert and
                  Giulio Zizzo and
                  Quan Le},
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Florian Tram{\`{e}}r},
  title        = {Certified Robustness of Static Deep Learning-based Malware Detectors
                  against Patch and Append Attacks},
  booktitle    = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023},
  pages        = {173--184},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605764.3623914},
  doi          = {10.1145/3605764.3623914},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GibertZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HicksMFDHW23,
  author       = {Chris Hicks and
                  Vasilios Mavroudis and
                  Myles Foley and
                  Thomas Davies and
                  Kate Highnam and
                  Tim Watson},
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Florian Tram{\`{e}}r},
  title        = {Canaries and Whistles: Resilient Drone Communication Networks with
                  (or without) Deep Reinforcement Learning},
  booktitle    = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023},
  pages        = {91--101},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605764.3623986},
  doi          = {10.1145/3605764.3623986},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HicksMFDHW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HolzlRK23,
  author       = {Florian A. H{\"{o}}lzl and
                  Daniel Rueckert and
                  Georgios Kaissis},
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Florian Tram{\`{e}}r},
  title        = {Equivariant Differentially Private Deep Learning: Why {DP-SGD} Needs
                  Sparser Models},
  booktitle    = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023},
  pages        = {11--22},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605764.3623902},
  doi          = {10.1145/3605764.3623902},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HolzlRK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HuiFO23,
  author       = {Tian Hui and
                  Farhad Farokhi and
                  Olga Ohrimenko},
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Florian Tram{\`{e}}r},
  title        = {Information Leakage from Data Updates in Machine Learning Models},
  booktitle    = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023},
  pages        = {35--41},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605764.3623905},
  doi          = {10.1145/3605764.3623905},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HuiFO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ImgrundGHPRR23,
  author       = {Erik Imgrund and
                  Tom Ganz and
                  Martin H{\"{a}}rterich and
                  Lukas Pirch and
                  Niklas Risse and
                  Konrad Rieck},
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Florian Tram{\`{e}}r},
  title        = {Broken Promises: Measuring Confounding Effects in Learning-based Vulnerability
                  Discovery},
  booktitle    = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023},
  pages        = {149--160},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605764.3623915},
  doi          = {10.1145/3605764.3623915},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ImgrundGHPRR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JoycePNR23,
  author       = {Robert J. Joyce and
                  Tirth Patel and
                  Charles Nicholas and
                  Edward Raff},
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Florian Tram{\`{e}}r},
  title        = {AVScan2Vec: Feature Learning on Antivirus Scan Data for Production-Scale
                  Malware Corpora},
  booktitle    = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023},
  pages        = {185--196},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605764.3623907},
  doi          = {10.1145/3605764.3623907},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JoycePNR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KhannaLRT23,
  author       = {Amol Khanna and
                  Fred Lu and
                  Edward Raff and
                  Brian Testa},
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Florian Tram{\`{e}}r},
  title        = {Differentially Private Logistic Regression with Sparse Solutions},
  booktitle    = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023},
  pages        = {1--9},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605764.3623910},
  doi          = {10.1145/3605764.3623910},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KhannaLRT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KumarIM23,
  author       = {Rajesh Kumar and
                  Can Isik and
                  Chilukuri Krishna Mohan},
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Florian Tram{\`{e}}r},
  title        = {Dictionary Attack on IMU-based Gait Authentication},
  booktitle    = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023},
  pages        = {115--126},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605764.3623909},
  doi          = {10.1145/3605764.3623909},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KumarIM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LeBlondMLFZRT23,
  author       = {Tyler LeBlond and
                  Joseph Munoz and
                  Fred Lu and
                  Maya Fuchs and
                  Elliott Zaresky{-}Williams and
                  Edward Raff and
                  Brian Testa},
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Florian Tram{\`{e}}r},
  title        = {Probing the Transition to Dataset-Level Privacy in {ML} Models Using
                  an Output-Specific and Data-Resolved Privacy Profile},
  booktitle    = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023},
  pages        = {23--33},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605764.3623904},
  doi          = {10.1145/3605764.3623904},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LeBlondMLFZRT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MontaruliDPCBB23,
  author       = {Biagio Montaruli and
                  Luca Demetrio and
                  Maura Pintor and
                  Luca Compagna and
                  Davide Balzarotti and
                  Battista Biggio},
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Florian Tram{\`{e}}r},
  title        = {Raze to the Ground: Query-Efficient Adversarial {HTML} Attacks on
                  Machine-Learning Phishing Webpage Detectors},
  booktitle    = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023},
  pages        = {233--244},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605764.3623920},
  doi          = {10.1145/3605764.3623920},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MontaruliDPCBB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NasirigerdehRK23,
  author       = {Reza Nasirigerdeh and
                  Daniel Rueckert and
                  Georgios Kaissis},
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Florian Tram{\`{e}}r},
  title        = {Utility-preserving Federated Learning},
  booktitle    = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023},
  pages        = {55--65},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605764.3623908},
  doi          = {10.1145/3605764.3623908},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NasirigerdehRK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RahmanA23,
  author       = {Md Asifur Rahman and
                  Sarra M. Alqahtani},
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Florian Tram{\`{e}}r},
  title        = {Task-Agnostic Safety for Reinforcement Learning},
  booktitle    = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023},
  pages        = {139--148},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605764.3623913},
  doi          = {10.1145/3605764.3623913},
  timestamp    = {Sat, 23 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RahmanA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RichardsRM23,
  author       = {Luke E. Richards and
                  Edward Raff and
                  Cynthia Matuszek},
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Florian Tram{\`{e}}r},
  title        = {Measuring Equality in Machine Learning Security Defenses: {A} Case
                  Study in Speech Recognition},
  booktitle    = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023},
  pages        = {161--171},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605764.3623911},
  doi          = {10.1145/3605764.3623911},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RichardsRM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2023aisec,
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Florian Tram{\`{e}}r},
  title        = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605764},
  doi          = {10.1145/3605764},
  timestamp    = {Thu, 23 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2023aisec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ApplebaumDDMNNP22,
  author       = {Andy Applebaum and
                  Camron Dennler and
                  Patrick Dwyer and
                  Marina Moskowitz and
                  Harold Nguyen and
                  Nicole Nichols and
                  Nicole Park and
                  Paul Rachwalski and
                  Frank Rau and
                  Adrian Webster and
                  Melody Wolk},
  editor       = {Ambra Demontis and
                  Xinyun Chen and
                  Florian Tram{\`{e}}r},
  title        = {Bridging Automated to Autonomous Cyber Defense: Foundational Analysis
                  of Tabular Q-Learning},
  booktitle    = {Proceedings of the 15th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec 2022, Los Angeles, CA, USA, 11 November 2022},
  pages        = {149--159},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3560830.3563732},
  doi          = {10.1145/3560830.3563732},
  timestamp    = {Tue, 12 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ApplebaumDDMNNP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ContiLPX22,
  author       = {Mauro Conti and
                  Jiaxin Li and
                  Stjepan Picek and
                  Jing Xu},
  editor       = {Ambra Demontis and
                  Xinyun Chen and
                  Florian Tram{\`{e}}r},
  title        = {Label-Only Membership Inference Attack against Node-Level Graph Neural
                  Networks},
  booktitle    = {Proceedings of the 15th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec 2022, Los Angeles, CA, USA, 11 November 2022},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3560830.3563734},
  doi          = {10.1145/3560830.3563734},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ContiLPX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DasuSM22,
  author       = {Vishnu Asutosh Dasu and
                  Sumanta Sarkar and
                  Kalikinkar Mandal},
  editor       = {Ambra Demontis and
                  Xinyun Chen and
                  Florian Tram{\`{e}}r},
  title        = {{PROV-FL:} Privacy-preserving Round Optimal Verifiable Federated Learning},
  booktitle    = {Proceedings of the 15th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec 2022, Los Angeles, CA, USA, 11 November 2022},
  pages        = {33--44},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3560830.3563729},
  doi          = {10.1145/3560830.3563729},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DasuSM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Kong0C22,
  author       = {Zhifeng Kong and
                  Amrita Roy Chowdhury and
                  Kamalika Chaudhuri},
  editor       = {Ambra Demontis and
                  Xinyun Chen and
                  Florian Tram{\`{e}}r},
  title        = {Forgeability and Membership Inference Attacks},
  booktitle    = {Proceedings of the 15th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec 2022, Los Angeles, CA, USA, 11 November 2022},
  pages        = {25--31},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3560830.3563731},
  doi          = {10.1145/3560830.3563731},
  timestamp    = {Tue, 08 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Kong0C22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Li000022,
  author       = {Lin Li and
                  Chao Chen and
                  Lei Pan and
                  Jun Zhang and
                  Yang Xiang},
  editor       = {Ambra Demontis and
                  Xinyun Chen and
                  Florian Tram{\`{e}}r},
  title        = {Video is All You Need: Attacking PPG-based Biometric Authentication},
  booktitle    = {Proceedings of the 15th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec 2022, Los Angeles, CA, USA, 11 November 2022},
  pages        = {57--66},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3560830.3563722},
  doi          = {10.1145/3560830.3563722},
  timestamp    = {Tue, 14 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Li000022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Maghsoudimehrabani22,
  author       = {Mohammad Maghsoudimehrabani and
                  Amin Azmoodeh and
                  Ali Dehghantanha and
                  Behrouz Zolfaghari and
                  Gautam Srivastava},
  editor       = {Ambra Demontis and
                  Xinyun Chen and
                  Florian Tram{\`{e}}r},
  title        = {Proactive Detection of Query-based Adversarial Scenarios in {NLP}
                  Systems},
  booktitle    = {Proceedings of the 15th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec 2022, Los Angeles, CA, USA, 11 November 2022},
  pages        = {103--113},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3560830.3563727},
  doi          = {10.1145/3560830.3563727},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Maghsoudimehrabani22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MazzoneHHVE0P22,
  author       = {Federico Mazzone and
                  Leander van den Heuvel and
                  Maximilian Huber and
                  Cristian Verdecchia and
                  Maarten H. Everts and
                  Florian Hahn and
                  Andreas Peter},
  editor       = {Ambra Demontis and
                  Xinyun Chen and
                  Florian Tram{\`{e}}r},
  title        = {Repeated Knowledge Distillation with Confidence Masking to Mitigate
                  Membership Inference Attacks},
  booktitle    = {Proceedings of the 15th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec 2022, Los Angeles, CA, USA, 11 November 2022},
  pages        = {13--24},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3560830.3563721},
  doi          = {10.1145/3560830.3563721},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MazzoneHHVE0P22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MidtlidAL22,
  author       = {Kim Andr{\'{e}} Midtlid and
                  Johannes {\AA}sheim and
                  Jingyue Li},
  editor       = {Ambra Demontis and
                  Xinyun Chen and
                  Florian Tram{\`{e}}r},
  title        = {Magnitude Adversarial Spectrum Search-based Black-box Attack against
                  Image Classification},
  booktitle    = {Proceedings of the 15th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec 2022, Los Angeles, CA, USA, 11 November 2022},
  pages        = {67--77},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3560830.3563723},
  doi          = {10.1145/3560830.3563723},
  timestamp    = {Tue, 08 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MidtlidAL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MillarPKR022,
  author       = {Stuart Millar and
                  Denis Podgurskii and
                  Dan Kuykendall and
                  Jes{\'{u}}s Mart{\'{\i}}nez del Rinc{\'{o}}n and
                  Paul Miller},
  editor       = {Ambra Demontis and
                  Xinyun Chen and
                  Florian Tram{\`{e}}r},
  title        = {Optimising Vulnerability Triage in {DAST} with Deep Learning},
  booktitle    = {Proceedings of the 15th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec 2022, Los Angeles, CA, USA, 11 November 2022},
  pages        = {137--147},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3560830.3563724},
  doi          = {10.1145/3560830.3563724},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MillarPKR022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RamakrishnaD22,
  author       = {Raksha Ramakrishna and
                  Gy{\"{o}}rgy D{\'{a}}n},
  editor       = {Ambra Demontis and
                  Xinyun Chen and
                  Florian Tram{\`{e}}r},
  title        = {Inferring Class-Label Distribution in Federated Learning},
  booktitle    = {Proceedings of the 15th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec 2022, Los Angeles, CA, USA, 11 November 2022},
  pages        = {45--56},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3560830.3563725},
  doi          = {10.1145/3560830.3563725},
  timestamp    = {Tue, 08 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RamakrishnaD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SakaVK22,
  author       = {Tarini Saka and
                  Kami Vaniea and
                  Nadin K{\"{o}}kciyan},
  editor       = {Ambra Demontis and
                  Xinyun Chen and
                  Florian Tram{\`{e}}r},
  title        = {Context-Based Clustering to Mitigate Phishing Attacks},
  booktitle    = {Proceedings of the 15th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec 2022, Los Angeles, CA, USA, 11 November 2022},
  pages        = {115--126},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3560830.3563728},
  doi          = {10.1145/3560830.3563728},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SakaVK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SavaSSB22,
  author       = {Paul Andrei Sava and
                  Jan{-}Philipp Schulze and
                  Philip Sperl and
                  Konstantin B{\"{o}}ttinger},
  editor       = {Ambra Demontis and
                  Xinyun Chen and
                  Florian Tram{\`{e}}r},
  title        = {Assessing the Impact of Transformations on Physical Adversarial Attacks},
  booktitle    = {Proceedings of the 15th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec 2022, Los Angeles, CA, USA, 11 November 2022},
  pages        = {79--90},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3560830.3563733},
  doi          = {10.1145/3560830.3563733},
  timestamp    = {Tue, 08 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SavaSSB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Trizna22,
  author       = {Dmitrijs Trizna},
  editor       = {Ambra Demontis and
                  Xinyun Chen and
                  Florian Tram{\`{e}}r},
  title        = {Quo Vadis: Hybrid Machine Learning Meta-Model Based on Contextual
                  and Behavioral Malware Representations},
  booktitle    = {Proceedings of the 15th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec 2022, Los Angeles, CA, USA, 11 November 2022},
  pages        = {127--136},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3560830.3563726},
  doi          = {10.1145/3560830.3563726},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Trizna22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Wu0SMM22,
  author       = {Tong Wu and
                  Tianhao Wang and
                  Vikash Sehwag and
                  Saeed Mahloujifar and
                  Prateek Mittal},
  editor       = {Ambra Demontis and
                  Xinyun Chen and
                  Florian Tram{\`{e}}r},
  title        = {Just Rotate it: Deploying Backdoor Attacks via Rotation Transformation},
  booktitle    = {Proceedings of the 15th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec 2022, Los Angeles, CA, USA, 11 November 2022},
  pages        = {91--102},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3560830.3563730},
  doi          = {10.1145/3560830.3563730},
  timestamp    = {Tue, 08 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Wu0SMM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2022aisec,
  editor       = {Ambra Demontis and
                  Xinyun Chen and
                  Florian Tram{\`{e}}r},
  title        = {Proceedings of the 15th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec 2022, Los Angeles, CA, USA, 11 November 2022},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3560830},
  doi          = {10.1145/3560830},
  isbn         = {978-1-4503-9880-0},
  timestamp    = {Tue, 08 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2022aisec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AndresiniPPLAC21,
  author       = {Giuseppina Andresini and
                  Feargus Pendlebury and
                  Fabio Pierazzi and
                  Corrado Loglisci and
                  Annalisa Appice and
                  Lorenzo Cavallaro},
  editor       = {Nicholas Carlini and
                  Ambra Demontis and
                  Yizheng Chen},
  title        = {{INSOMNIA:} Towards Concept-Drift Robustness in Network Intrusion
                  Detection},
  booktitle    = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, Republic of Korea, 15 November
                  2021},
  pages        = {111--122},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3474369.3486864},
  doi          = {10.1145/3474369.3486864},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AndresiniPPLAC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Carlini21,
  author       = {Nicholas Carlini},
  editor       = {Nicholas Carlini and
                  Ambra Demontis and
                  Yizheng Chen},
  title        = {Session details: Session 1: Adversarial Machine Learning},
  booktitle    = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, Republic of Korea, 15 November
                  2021},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3494693},
  doi          = {10.1145/3494693},
  timestamp    = {Tue, 02 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Carlini21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Carlini21a,
  author       = {Nicholas Carlini},
  editor       = {Nicholas Carlini and
                  Ambra Demontis and
                  Yizheng Chen},
  title        = {Session details: Session 2A: Machine Learning for Cybersecurity},
  booktitle    = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, Republic of Korea, 15 November
                  2021},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3494694},
  doi          = {10.1145/3494694},
  timestamp    = {Tue, 02 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Carlini21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Chen21,
  author       = {Yizheng Chen},
  editor       = {Nicholas Carlini and
                  Ambra Demontis and
                  Yizheng Chen},
  title        = {Session details: Session 3: Privacy-Preserving Machine Learning},
  booktitle    = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, Republic of Korea, 15 November
                  2021},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3494696},
  doi          = {10.1145/3494696},
  timestamp    = {Thu, 27 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Chen21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Demontis21,
  author       = {Ambra Demontis},
  editor       = {Nicholas Carlini and
                  Ambra Demontis and
                  Yizheng Chen},
  title        = {Session details: Session 2B: Machine Learning for Cybersecurity},
  booktitle    = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, Republic of Korea, 15 November
                  2021},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3494695},
  doi          = {10.1145/3494695},
  timestamp    = {Tue, 02 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Demontis21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DeshpandeGF21,
  author       = {Chinmay Deshpande and
                  David Gens and
                  Michael Franz},
  editor       = {Nicholas Carlini and
                  Ambra Demontis and
                  Yizheng Chen},
  title        = {StackBERT: Machine Learning Assisted Static Stack Frame Size Recovery
                  on Stripped and Optimized Binaries},
  booktitle    = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, Republic of Korea, 15 November
                  2021},
  pages        = {85--95},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3474369.3486865},
  doi          = {10.1145/3474369.3486865},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DeshpandeGF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DionysiouA21,
  author       = {Antreas Dionysiou and
                  Elias Athanasopoulos},
  editor       = {Nicholas Carlini and
                  Ambra Demontis and
                  Yizheng Chen},
  title        = {Unicode Evil: Evading {NLP} Systems Using Visual Similarities of Text
                  Characters},
  booktitle    = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, Republic of Korea, 15 November
                  2021},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3474369.3486871},
  doi          = {10.1145/3474369.3486871},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DionysiouA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DreesGHJKPRS21,
  author       = {Jan Peter Drees and
                  Pritha Gupta and
                  Eyke H{\"{u}}llermeier and
                  Tibor Jager and
                  Alexander Konze and
                  Claudia Priesterjahn and
                  Arunselvan Ramaswamy and
                  Juraj Somorovsky},
  editor       = {Nicholas Carlini and
                  Ambra Demontis and
                  Yizheng Chen},
  title        = {Automated Detection of Side Channels in Cryptographic Protocols: {DROWN}
                  the ROBOTs!},
  booktitle    = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, Republic of Korea, 15 November
                  2021},
  pages        = {169--180},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3474369.3486868},
  doi          = {10.1145/3474369.3486868},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/DreesGHJKPRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GanzHWR21,
  author       = {Tom Ganz and
                  Martin H{\"{a}}rterich and
                  Alexander Warnecke and
                  Konrad Rieck},
  editor       = {Nicholas Carlini and
                  Ambra Demontis and
                  Yizheng Chen},
  title        = {Explaining Graph Neural Networks for Vulnerability Discovery},
  booktitle    = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, Republic of Korea, 15 November
                  2021},
  pages        = {145--156},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3474369.3486866},
  doi          = {10.1145/3474369.3486866},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GanzHWR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HilgefortAR21,
  author       = {Jan Malte Hilgefort and
                  Daniel Arp and
                  Konrad Rieck},
  editor       = {Nicholas Carlini and
                  Ambra Demontis and
                  Yizheng Chen},
  title        = {Spying through Virtual Backgrounds of Video Calls},
  booktitle    = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, Republic of Korea, 15 November
                  2021},
  pages        = {135--144},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3474369.3486870},
  doi          = {10.1145/3474369.3486870},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/HilgefortAR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JoyceRN21,
  author       = {Robert J. Joyce and
                  Edward Raff and
                  Charles Nicholas},
  editor       = {Nicholas Carlini and
                  Ambra Demontis and
                  Yizheng Chen},
  title        = {A Framework for Cluster and Classifier Evaluation in the Absence of
                  Reference Labels},
  booktitle    = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, Republic of Korea, 15 November
                  2021},
  pages        = {73--84},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3474369.3486867},
  doi          = {10.1145/3474369.3486867},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/JoyceRN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KanPPC21,
  author       = {Zeliang Kan and
                  Feargus Pendlebury and
                  Fabio Pierazzi and
                  Lorenzo Cavallaro},
  editor       = {Nicholas Carlini and
                  Ambra Demontis and
                  Yizheng Chen},
  title        = {Investigating Labelless Drift Adaptation for Malware Detection},
  booktitle    = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, Republic of Korea, 15 November
                  2021},
  pages        = {123--134},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3474369.3486873},
  doi          = {10.1145/3474369.3486873},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KanPPC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KujanpaaVI21,
  author       = {Kalle Kujanp{\"{a}}{\"{a}} and
                  Willie Victor and
                  Alexander Ilin},
  editor       = {Nicholas Carlini and
                  Ambra Demontis and
                  Yizheng Chen},
  title        = {Automating Privilege Escalation with Deep Reinforcement Learning},
  booktitle    = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, Republic of Korea, 15 November
                  2021},
  pages        = {157--168},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3474369.3486877},
  doi          = {10.1145/3474369.3486877},
  timestamp    = {Tue, 02 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KujanpaaVI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RahimianOF21,
  author       = {Shadi Rahimian and
                  Tribhuvanesh Orekondy and
                  Mario Fritz},
  editor       = {Nicholas Carlini and
                  Ambra Demontis and
                  Yizheng Chen},
  title        = {Differential Privacy Defenses and Sampling Attacks for Membership
                  Inference},
  booktitle    = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, Republic of Korea, 15 November
                  2021},
  pages        = {193--202},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3474369.3486876},
  doi          = {10.1145/3474369.3486876},
  timestamp    = {Tue, 02 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RahimianOF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RichardsNCFMR21,
  author       = {Luke E. Richards and
                  Andr{\'{e}} T. Nguyen and
                  Ryan Capps and
                  Steven Forsyth and
                  Cynthia Matuszek and
                  Edward Raff},
  editor       = {Nicholas Carlini and
                  Ambra Demontis and
                  Yizheng Chen},
  title        = {Adversarial Transfer Attacks With Unknown Data and Class Overlap},
  booktitle    = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, Republic of Korea, 15 November
                  2021},
  pages        = {13--24},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3474369.3486862},
  doi          = {10.1145/3474369.3486862},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/RichardsNCFMR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ShanB0Z21,
  author       = {Shawn Shan and
                  Arjun Nitin Bhagoji and
                  Haitao Zheng and
                  Ben Y. Zhao},
  editor       = {Nicholas Carlini and
                  Ambra Demontis and
                  Yizheng Chen},
  title        = {Patch-based Defenses against Web Fingerprinting Attacks},
  booktitle    = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, Republic of Korea, 15 November
                  2021},
  pages        = {97--109},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3474369.3486875},
  doi          = {10.1145/3474369.3486875},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ShanB0Z21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SitawarinCW21,
  author       = {Chawin Sitawarin and
                  Supriyo Chakraborty and
                  David A. Wagner},
  editor       = {Nicholas Carlini and
                  Ambra Demontis and
                  Yizheng Chen},
  title        = {{SAT:} Improving Adversarial Training via Curriculum-Based Loss Smoothing},
  booktitle    = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, Republic of Korea, 15 November
                  2021},
  pages        = {25--36},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3474369.3486878},
  doi          = {10.1145/3474369.3486878},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/SitawarinCW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Veldanda0TKKKDG21,
  author       = {Akshaj Kumar Veldanda and
                  Kang Liu and
                  Benjamin Tan and
                  Prashanth Krishnamurthy and
                  Farshad Khorrami and
                  Ramesh Karri and
                  Brendan Dolan{-}Gavitt and
                  Siddharth Garg},
  editor       = {Nicholas Carlini and
                  Ambra Demontis and
                  Yizheng Chen},
  title        = {NNoculation: Catching BadNets in the Wild},
  booktitle    = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, Republic of Korea, 15 November
                  2021},
  pages        = {49--60},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3474369.3486874},
  doi          = {10.1145/3474369.3486874},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Veldanda0TKKKDG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XuB00JL21,
  author       = {Runhua Xu and
                  Nathalie Baracaldo and
                  Yi Zhou and
                  Ali Anwar and
                  James Joshi and
                  Heiko Ludwig},
  editor       = {Nicholas Carlini and
                  Ambra Demontis and
                  Yizheng Chen},
  title        = {FedV: Privacy-Preserving Federated Learning over Vertically Partitioned
                  Data},
  booktitle    = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, Republic of Korea, 15 November
                  2021},
  pages        = {181--192},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3474369.3486872},
  doi          = {10.1145/3474369.3486872},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/XuB00JL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YehezkelES21,
  author       = {Aviv Yehezkel and
                  Eyal Elyashiv and
                  Or Soffer},
  editor       = {Nicholas Carlini and
                  Ambra Demontis and
                  Yizheng Chen},
  title        = {Network Anomaly Detection Using Transfer Learning Based on Auto-Encoders
                  Loss Normalization},
  booktitle    = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, Republic of Korea, 15 November
                  2021},
  pages        = {61--71},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3474369.3486869},
  doi          = {10.1145/3474369.3486869},
  timestamp    = {Tue, 02 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/YehezkelES21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangCW21,
  author       = {Zhanyuan Zhang and
                  Yizheng Chen and
                  David A. Wagner},
  editor       = {Nicholas Carlini and
                  Ambra Demontis and
                  Yizheng Chen},
  title        = {{SEAT:} Similarity Encoder by Adversarial Training for Detecting Model
                  Extraction Attack Queries},
  booktitle    = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, Republic of Korea, 15 November
                  2021},
  pages        = {37--48},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3474369.3486863},
  doi          = {10.1145/3474369.3486863},
  timestamp    = {Thu, 27 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangCW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2021aisec,
  editor       = {Nicholas Carlini and
                  Ambra Demontis and
                  Yizheng Chen},
  title        = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, Republic of Korea, 15 November
                  2021},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3474369},
  doi          = {10.1145/3474369},
  isbn         = {978-1-4503-8657-9},
  timestamp    = {Thu, 27 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/2021aisec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JuW20,
  author       = {An Ju and
                  David A. Wagner},
  editor       = {Jay Ligatti and
                  Xinming Ou},
  title        = {{E-ABS:} Extending the Analysis-By-Synthesis Robust Classification
                  Model to More Complex Image Domains},
  booktitle    = {AISec@CCS 2020: Proceedings of the 13th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, USA, 13 November 2020},
  pages        = {25--36},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3411508.3421382},
  doi          = {10.1145/3411508.3421382},
  timestamp    = {Mon, 08 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JuW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiaoCFS20,
  author       = {Chang Liao and
                  Yao Cheng and
                  Chengfang Fang and
                  Jie Shi},
  editor       = {Jay Ligatti and
                  Xinming Ou},
  title        = {Where Does the Robustness Come from?: {A} Study of the Transformation-based
                  Ensemble Defence},
  booktitle    = {AISec@CCS 2020: Proceedings of the 13th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, USA, 13 November 2020},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3411508.3421380},
  doi          = {10.1145/3411508.3421380},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiaoCFS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NovoM20,
  author       = {Carlos Novo and
                  Ricardo Morla},
  editor       = {Jay Ligatti and
                  Xinming Ou},
  title        = {Flow-based Detection and Proxy-based Evasion of Encrypted Malware
                  {C2} Traffic},
  booktitle    = {AISec@CCS 2020: Proceedings of the 13th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, USA, 13 November 2020},
  pages        = {83--91},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3411508.3421379},
  doi          = {10.1145/3411508.3421379},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NovoM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RaffZMFAFNH20,
  author       = {Edward Raff and
                  Richard Zak and
                  Gary Lopez Munoz and
                  William Fleming and
                  Hyrum S. Anderson and
                  Bobby Filar and
                  Charles Nicholas and
                  James Holt},
  editor       = {Jay Ligatti and
                  Xinming Ou},
  title        = {Automatic Yara Rule Generation Using Biclustering},
  booktitle    = {AISec@CCS 2020: Proceedings of the 13th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, USA, 13 November 2020},
  pages        = {71--82},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3411508.3421372},
  doi          = {10.1145/3411508.3421372},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/RaffZMFAFNH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RiveraTSCLO20,
  author       = {Esteban Rivera and
                  Lizzy Tengana and
                  Jesus Solano and
                  Alejandra Castelblanco and
                  Christian Lopez and
                  Mart{\'{\i}}n Ochoa},
  editor       = {Jay Ligatti and
                  Xinming Ou},
  title        = {Risk-based Authentication Based on Network Latency Profiling},
  booktitle    = {AISec@CCS 2020: Proceedings of the 13th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, USA, 13 November 2020},
  pages        = {105--115},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3411508.3421377},
  doi          = {10.1145/3411508.3421377},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RiveraTSCLO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SchloglB20,
  author       = {Alexander Schl{\"{o}}gl and
                  Rainer B{\"{o}}hme},
  editor       = {Jay Ligatti and
                  Xinming Ou},
  title        = {eNNclave: Offline Inference with Model Confidentiality},
  booktitle    = {AISec@CCS 2020: Proceedings of the 13th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, USA, 13 November 2020},
  pages        = {93--104},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3411508.3421376},
  doi          = {10.1145/3411508.3421376},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SchloglB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ShumailovZMA20,
  author       = {Ilia Shumailov and
                  Yiren Zhao and
                  Robert D. Mullins and
                  Ross J. Anderson},
  editor       = {Jay Ligatti and
                  Xinming Ou},
  title        = {Towards Certifiable Adversarial Sample Detection},
  booktitle    = {AISec@CCS 2020: Proceedings of the 13th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, USA, 13 November 2020},
  pages        = {13--24},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3411508.3421381},
  doi          = {10.1145/3411508.3421381},
  timestamp    = {Tue, 02 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ShumailovZMA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SmithJICHDRLVK20,
  author       = {Michael R. Smith and
                  Nicholas T. Johnson and
                  Joe B. Ingram and
                  Armida J. Carbajal and
                  Bridget I. Haus and
                  Eva Domschot and
                  Ramyaa and
                  Christopher C. Lamb and
                  Stephen J. Verzi and
                  W. Philip Kegelmeyer},
  editor       = {Jay Ligatti and
                  Xinming Ou},
  title        = {Mind the Gap: On Bridging the Semantic Gap between Machine Learning
                  and Malware Analysis},
  booktitle    = {AISec@CCS 2020: Proceedings of the 13th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, USA, 13 November 2020},
  pages        = {49--60},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3411508.3421373},
  doi          = {10.1145/3411508.3421373},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SmithJICHDRLVK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SolanoLRCTO20,
  author       = {Jesus Solano and
                  Christian Lopez and
                  Esteban Rivera and
                  Alejandra Castelblanco and
                  Lizzy Tengana and
                  Mart{\'{\i}}n Ochoa},
  editor       = {Jay Ligatti and
                  Xinming Ou},
  title        = {{SCRAP:} Synthetically Composed Replay Attacks vs. Adversarial Machine
                  Learning Attacks against Mouse-based Biometric Authentication},
  booktitle    = {AISec@CCS 2020: Proceedings of the 13th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, USA, 13 November 2020},
  pages        = {37--47},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3411508.3421378},
  doi          = {10.1145/3411508.3421378},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SolanoLRCTO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/VerwerNHBAO20,
  author       = {Sicco Verwer and
                  Azqa Nadeem and
                  Christian A. Hammerschmidt and
                  Laurens Bliek and
                  Abdullah Al{-}Dujaili and
                  Una{-}May O'Reilly},
  editor       = {Jay Ligatti and
                  Xinming Ou},
  title        = {The Robust Malware Detection Challenge and Greedy Random Accelerated
                  Multi-Bit Search},
  booktitle    = {AISec@CCS 2020: Proceedings of the 13th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, USA, 13 November 2020},
  pages        = {61--70},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3411508.3421374},
  doi          = {10.1145/3411508.3421374},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/VerwerNHBAO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YoshidaF20,
  author       = {Kota Yoshida and
                  Takeshi Fujino},
  editor       = {Jay Ligatti and
                  Xinming Ou},
  title        = {Disabling Backdoor and Identifying Poison Data by using Knowledge
                  Distillation in Backdoor Attacks on Deep Neural Networks},
  booktitle    = {AISec@CCS 2020: Proceedings of the 13th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, USA, 13 November 2020},
  pages        = {117--127},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3411508.3421375},
  doi          = {10.1145/3411508.3421375},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/YoshidaF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2020aisec,
  editor       = {Jay Ligatti and
                  Xinming Ou},
  title        = {AISec@CCS 2020: Proceedings of the 13th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, USA, 13 November 2020},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3411508},
  doi          = {10.1145/3411508},
  isbn         = {978-1-4503-8094-2},
  timestamp    = {Tue, 02 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2020aisec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AlperinWRTL19,
  author       = {Kenneth Alperin and
                  Allan B. Wollaber and
                  Dennis M. Ross and
                  Pierre C. Trepagnier and
                  Leslie Leonard},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  Sadia Afroz and
                  Battista Biggio and
                  Nicholas Carlini and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {Risk Prioritization by Leveraging Latent Vulnerability Features in
                  a Contested Environment},
  booktitle    = {Proceedings of the 12th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2019, London, UK, November 15, 2019},
  pages        = {49--57},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338501.3357365},
  doi          = {10.1145/3338501.3357365},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AlperinWRTL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AminGC19,
  author       = {Mohammad Ruhul Amin and
                  Pranav Garg and
                  Baris Coskun},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  Sadia Afroz and
                  Battista Biggio and
                  Nicholas Carlini and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {{CADENCE:} Conditional Anomaly Detection for Events Using Noise-Contrastive
                  Estimation},
  booktitle    = {Proceedings of the 12th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2019, London, UK, November 15, 2019},
  pages        = {71--82},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338501.3357368},
  doi          = {10.1145/3338501.3357368},
  timestamp    = {Thu, 31 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AminGC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JuutiAA19,
  author       = {Mika Juuti and
                  Buse Gul Atli and
                  N. Asokan},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  Sadia Afroz and
                  Battista Biggio and
                  Nicholas Carlini and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {Making Targeted Black-box Evasion Attacks Effective and Efficient},
  booktitle    = {Proceedings of the 12th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2019, London, UK, November 15, 2019},
  pages        = {83--94},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338501.3357366},
  doi          = {10.1145/3338501.3357366},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/JuutiAA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LambVKB19,
  author       = {Alex Lamb and
                  Vikas Verma and
                  Juho Kannala and
                  Yoshua Bengio},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  Sadia Afroz and
                  Battista Biggio and
                  Nicholas Carlini and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {Interpolated Adversarial Training: Achieving Robust Neural Networks
                  Without Sacrificing Too Much Accuracy},
  booktitle    = {Proceedings of the 12th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2019, London, UK, November 15, 2019},
  pages        = {95--103},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338501.3357369},
  doi          = {10.1145/3338501.3357369},
  timestamp    = {Sun, 10 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LambVKB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Mohammadinodooshan19,
  author       = {Alireza Mohammadinodooshan and
                  Ulf Karg{\'{e}}n and
                  Nahid Shahmehri},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  Sadia Afroz and
                  Battista Biggio and
                  Nicholas Carlini and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {Robust Detection of Obfuscated Strings in Android Apps},
  booktitle    = {Proceedings of the 12th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2019, London, UK, November 15, 2019},
  pages        = {25--35},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338501.3357373},
  doi          = {10.1145/3338501.3357373},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Mohammadinodooshan19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/OakDYTA19,
  author       = {Rajvardhan Oak and
                  Min Du and
                  David Yan and
                  Harshvardhan C. Takawale and
                  Idan Amit},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  Sadia Afroz and
                  Battista Biggio and
                  Nicholas Carlini and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {Malware Detection on Highly Imbalanced Data through Sequence Modeling},
  booktitle    = {Proceedings of the 12th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2019, London, UK, November 15, 2019},
  pages        = {37--48},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338501.3357374},
  doi          = {10.1145/3338501.3357374},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/OakDYTA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SehwagBSSCCM19,
  author       = {Vikash Sehwag and
                  Arjun Nitin Bhagoji and
                  Liwei Song and
                  Chawin Sitawarin and
                  Daniel Cullina and
                  Mung Chiang and
                  Prateek Mittal},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  Sadia Afroz and
                  Battista Biggio and
                  Nicholas Carlini and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {Analyzing the Robustness of Open-World Machine Learning},
  booktitle    = {Proceedings of the 12th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2019, London, UK, November 15, 2019},
  pages        = {105--116},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338501.3357372},
  doi          = {10.1145/3338501.3357372},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SehwagBSSCCM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ShibaharaK0AHSD19,
  author       = {Toshiki Shibahara and
                  Hirokazu Kodera and
                  Daiki Chiba and
                  Mitsuaki Akiyama and
                  Kunio Hato and
                  Ola S{\"{o}}derstr{\"{o}}m and
                  Daniel Dalek and
                  Masayuki Murata},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  Sadia Afroz and
                  Battista Biggio and
                  Nicholas Carlini and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {Cross-Vendor Knowledge Transfer for Managed Security Services with
                  Triplet Network},
  booktitle    = {Proceedings of the 12th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2019, London, UK, November 15, 2019},
  pages        = {59--69},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338501.3357367},
  doi          = {10.1145/3338501.3357367},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ShibaharaK0AHSD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TruexBASLZZ19,
  author       = {Stacey Truex and
                  Nathalie Baracaldo and
                  Ali Anwar and
                  Thomas Steinke and
                  Heiko Ludwig and
                  Rui Zhang and
                  Yi Zhou},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  Sadia Afroz and
                  Battista Biggio and
                  Nicholas Carlini and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {A Hybrid Approach to Privacy-Preserving Federated Learning},
  booktitle    = {Proceedings of the 12th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2019, London, UK, November 15, 2019},
  pages        = {1--11},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338501.3357370},
  doi          = {10.1145/3338501.3357370},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/TruexBASLZZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XuBZAL19,
  author       = {Runhua Xu and
                  Nathalie Baracaldo and
                  Yi Zhou and
                  Ali Anwar and
                  Heiko Ludwig},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  Sadia Afroz and
                  Battista Biggio and
                  Nicholas Carlini and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {HybridAlpha: An Efficient Approach for Privacy-Preserving Federated
                  Learning},
  booktitle    = {Proceedings of the 12th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2019, London, UK, November 15, 2019},
  pages        = {13--23},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338501.3357371},
  doi          = {10.1145/3338501.3357371},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/XuBZAL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2019aisec,
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  Sadia Afroz and
                  Battista Biggio and
                  Nicholas Carlini and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {Proceedings of the 12th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2019, London, UK, November 15, 2019},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338501},
  doi          = {10.1145/3338501},
  isbn         = {978-1-4503-6833-9},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2019aisec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Afroz18,
  author       = {Sadia Afroz},
  editor       = {Sadia Afroz and
                  Battista Biggio and
                  Yuval Elovici and
                  David Freeman and
                  Asaf Shabtai},
  title        = {Session details: Keynote Address},
  booktitle    = {Proceedings of the 11th {ACM} Workshop on Artificial Intelligence
                  and Security, {CCS} 2018, Toronto, ON, Canada, October 19, 2018},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3285948},
  doi          = {10.1145/3285948},
  timestamp    = {Tue, 07 Mar 2023 16:37:45 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Afroz18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Biggio18,
  author       = {Battista Biggio},
  editor       = {Sadia Afroz and
                  Battista Biggio and
                  Yuval Elovici and
                  David Freeman and
                  Asaf Shabtai},
  title        = {Session details: {AI} Security / Adversarial Machine Learning},
  booktitle    = {Proceedings of the 11th {ACM} Workshop on Artificial Intelligence
                  and Security, {CCS} 2018, Toronto, ON, Canada, October 19, 2018},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3285949},
  doi          = {10.1145/3285949},
  timestamp    = {Wed, 09 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Biggio18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DuFYCT18,
  author       = {Yali Du and
                  Meng Fang and
                  Jinfeng Yi and
                  Jun Cheng and
                  Dacheng Tao},
  editor       = {Sadia Afroz and
                  Battista Biggio and
                  Yuval Elovici and
                  David Freeman and
                  Asaf Shabtai},
  title        = {Towards Query Efficient Black-box Attacks: An Input-free Perspective},
  booktitle    = {Proceedings of the 11th {ACM} Workshop on Artificial Intelligence
                  and Security, {CCS} 2018, Toronto, ON, Canada, October 19, 2018},
  pages        = {13--24},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3270101.3270106},
  doi          = {10.1145/3270101.3270106},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DuFYCT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Elovici18,
  author       = {Yuval Elovici},
  editor       = {Sadia Afroz and
                  Battista Biggio and
                  Yuval Elovici and
                  David Freeman and
                  Asaf Shabtai},
  title        = {Session details: {AI} for Forensics},
  booktitle    = {Proceedings of the 11th {ACM} Workshop on Artificial Intelligence
                  and Security, {CCS} 2018, Toronto, ON, Canada, October 19, 2018},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3285952},
  doi          = {10.1145/3285952},
  timestamp    = {Wed, 09 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Elovici18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GriecoD18,
  author       = {Gustavo Grieco and
                  Artem Dinaburg},
  editor       = {Sadia Afroz and
                  Battista Biggio and
                  Yuval Elovici and
                  David Freeman and
                  Asaf Shabtai},
  title        = {Toward Smarter Vulnerability Discovery Using Machine Learning},
  booktitle    = {Proceedings of the 11th {ACM} Workshop on Artificial Intelligence
                  and Security, {CCS} 2018, Toronto, ON, Canada, October 19, 2018},
  pages        = {48--56},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3270101.3270107},
  doi          = {10.1145/3270101.3270107},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GriecoD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GrondahlPJCA18,
  author       = {Tommi Gr{\"{o}}ndahl and
                  Luca Pajola and
                  Mika Juuti and
                  Mauro Conti and
                  N. Asokan},
  editor       = {Sadia Afroz and
                  Battista Biggio and
                  Yuval Elovici and
                  David Freeman and
                  Asaf Shabtai},
  title        = {All You Need is: Evading Hate Speech Detection},
  booktitle    = {Proceedings of the 11th {ACM} Workshop on Artificial Intelligence
                  and Security, {CCS} 2018, Toronto, ON, Canada, October 19, 2018},
  pages        = {2--12},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3270101.3270103},
  doi          = {10.1145/3270101.3270103},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GrondahlPJCA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HashemiCK18,
  author       = {Mohammad Hashemi and
                  Greg Cusack and
                  Eric Keller},
  editor       = {Sadia Afroz and
                  Battista Biggio and
                  Yuval Elovici and
                  David Freeman and
                  Asaf Shabtai},
  title        = {Stochastic Substitute Training: {A} Gray-box Approach to Craft Adversarial
                  Examples Against Gradient Obfuscation Defenses},
  booktitle    = {Proceedings of the 11th {ACM} Workshop on Artificial Intelligence
                  and Security, {CCS} 2018, Toronto, ON, Canada, October 19, 2018},
  pages        = {25--36},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3270101.3270111},
  doi          = {10.1145/3270101.3270111},
  timestamp    = {Wed, 09 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HashemiCK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KaramchetiMR18,
  author       = {Siddharth Karamcheti and
                  Gideon Mann and
                  David S. Rosenberg},
  editor       = {Sadia Afroz and
                  Battista Biggio and
                  Yuval Elovici and
                  David Freeman and
                  Asaf Shabtai},
  title        = {Adaptive Grey-Box Fuzz-Testing with Thompson Sampling},
  booktitle    = {Proceedings of the 11th {ACM} Workshop on Artificial Intelligence
                  and Security, {CCS} 2018, Toronto, ON, Canada, October 19, 2018},
  pages        = {37--47},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3270101.3270108},
  doi          = {10.1145/3270101.3270108},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KaramchetiMR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Papernot18,
  author       = {Nicolas Papernot},
  editor       = {Sadia Afroz and
                  Battista Biggio and
                  Yuval Elovici and
                  David Freeman and
                  Asaf Shabtai},
  title        = {A Marauder's Map of Security and Privacy in Machine Learning: An overview
                  of current and future research directions for making machine learning
                  secure and private},
  booktitle    = {Proceedings of the 11th {ACM} Workshop on Artificial Intelligence
                  and Security, {CCS} 2018, Toronto, ON, Canada, October 19, 2018},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3270101.3270102},
  doi          = {10.1145/3270101.3270102},
  timestamp    = {Wed, 09 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Papernot18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Shabtai18,
  author       = {Asaf Shabtai},
  editor       = {Sadia Afroz and
                  Battista Biggio and
                  Yuval Elovici and
                  David Freeman and
                  Asaf Shabtai},
  title        = {Session details: {AI} for Detecting Software Vulnerabilities},
  booktitle    = {Proceedings of the 11th {ACM} Workshop on Artificial Intelligence
                  and Security, {CCS} 2018, Toronto, ON, Canada, October 19, 2018},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3285950},
  doi          = {10.1145/3285950},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Shabtai18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Shabtai18a,
  author       = {Asaf Shabtai},
  editor       = {Sadia Afroz and
                  Battista Biggio and
                  Yuval Elovici and
                  David Freeman and
                  Asaf Shabtai},
  title        = {Session details: {AI} for Detecting Attacks},
  booktitle    = {Proceedings of the 11th {ACM} Workshop on Artificial Intelligence
                  and Security, {CCS} 2018, Toronto, ON, Canada, October 19, 2018},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3285951},
  doi          = {10.1145/3285951},
  timestamp    = {Wed, 09 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Shabtai18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TorroledoCB18,
  author       = {Ivan Torroledo and
                  Luis David Camacho and
                  Alejandro Correa Bahnsen},
  editor       = {Sadia Afroz and
                  Battista Biggio and
                  Yuval Elovici and
                  David Freeman and
                  Asaf Shabtai},
  title        = {Hunting Malicious {TLS} Certificates with Deep Neural Networks},
  booktitle    = {Proceedings of the 11th {ACM} Workshop on Artificial Intelligence
                  and Security, {CCS} 2018, Toronto, ON, Canada, October 19, 2018},
  pages        = {64--73},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3270101.3270105},
  doi          = {10.1145/3270101.3270105},
  timestamp    = {Wed, 09 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/TorroledoCB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangJW18,
  author       = {Ningfei Wang and
                  Shouling Ji and
                  Ting Wang},
  editor       = {Sadia Afroz and
                  Battista Biggio and
                  Yuval Elovici and
                  David Freeman and
                  Asaf Shabtai},
  title        = {Integration of Static and Dynamic Code Stylometry Analysis for Programmer
                  De-anonymization},
  booktitle    = {Proceedings of the 11th {ACM} Workshop on Artificial Intelligence
                  and Security, {CCS} 2018, Toronto, ON, Canada, October 19, 2018},
  pages        = {74--84},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3270101.3270110},
  doi          = {10.1145/3270101.3270110},
  timestamp    = {Wed, 17 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/WangJW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XuFCWW18,
  author       = {Chao Xu and
                  Zhentan Feng and
                  Yizheng Chen and
                  Minghua Wang and
                  Tao Wei},
  editor       = {Sadia Afroz and
                  Battista Biggio and
                  Yuval Elovici and
                  David Freeman and
                  Asaf Shabtai},
  title        = {FeatNet: Large-scale Fraud Device Detection by Network Representation
                  Learning with Rich Features},
  booktitle    = {Proceedings of the 11th {ACM} Workshop on Artificial Intelligence
                  and Security, {CCS} 2018, Toronto, ON, Canada, October 19, 2018},
  pages        = {57--63},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3270101.3270109},
  doi          = {10.1145/3270101.3270109},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/XuFCWW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhaoWJCWHB18,
  author       = {Binbin Zhao and
                  Haiqin Weng and
                  Shouling Ji and
                  Jianhai Chen and
                  Ting Wang and
                  Qinming He and
                  Reheem Beyah},
  editor       = {Sadia Afroz and
                  Battista Biggio and
                  Yuval Elovici and
                  David Freeman and
                  Asaf Shabtai},
  title        = {Towards Evaluating the Security of Real-World Deployed Image CAPTCHAs},
  booktitle    = {Proceedings of the 11th {ACM} Workshop on Artificial Intelligence
                  and Security, {CCS} 2018, Toronto, ON, Canada, October 19, 2018},
  pages        = {85--96},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3270101.3270104},
  doi          = {10.1145/3270101.3270104},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhaoWJCWHB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2018aisec,
  editor       = {Sadia Afroz and
                  Battista Biggio and
                  Yuval Elovici and
                  David Freeman and
                  Asaf Shabtai},
  title        = {Proceedings of the 11th {ACM} Workshop on Artificial Intelligence
                  and Security, {CCS} 2018, Toronto, ON, Canada, October 19, 2018},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {http://dl.acm.org/citation.cfm?id=3270101},
  isbn         = {978-1-4503-6004-3},
  timestamp    = {Tue, 07 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2018aisec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BaracaldoCLS17,
  author       = {Nathalie Baracaldo and
                  Bryant Chen and
                  Heiko Ludwig and
                  Jaehoon Amir Safavi},
  editor       = {Bhavani Thuraisingham and
                  Battista Biggio and
                  David Mandell Freeman and
                  Brad Miller and
                  Arunesh Sinha},
  title        = {Mitigating Poisoning Attacks on Machine Learning Models: {A} Data
                  Provenance Based Approach},
  booktitle    = {Proceedings of the 10th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2017, Dallas, TX, USA, November 3, 2017},
  pages        = {103--110},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3128572.3140450},
  doi          = {10.1145/3128572.3140450},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BaracaldoCLS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BittnerSW17,
  author       = {Daniel M. Bittner and
                  Anand D. Sarwate and
                  Rebecca N. Wright},
  editor       = {Bhavani Thuraisingham and
                  Battista Biggio and
                  David Mandell Freeman and
                  Brad Miller and
                  Arunesh Sinha},
  title        = {Differentially Private Noisy Search with Applications to Anomaly Detection
                  (Abstract)},
  booktitle    = {Proceedings of the 10th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2017, Dallas, TX, USA, November 3, 2017},
  pages        = {53},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3128572.3140456},
  doi          = {10.1145/3128572.3140456},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BittnerSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Caliskan17,
  author       = {Aylin Caliskan},
  editor       = {Bhavani Thuraisingham and
                  Battista Biggio and
                  David Mandell Freeman and
                  Brad Miller and
                  Arunesh Sinha},
  title        = {Beyond Big Data: What Can We Learn from {AI} Models?: Invited Keynote},
  booktitle    = {Proceedings of the 10th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2017, Dallas, TX, USA, November 3, 2017},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3128572.3140452},
  doi          = {10.1145/3128572.3140452},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Caliskan17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Carlini017,
  author       = {Nicholas Carlini and
                  David A. Wagner},
  editor       = {Bhavani Thuraisingham and
                  Battista Biggio and
                  David Mandell Freeman and
                  Brad Miller and
                  Arunesh Sinha},
  title        = {Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection
                  Methods},
  booktitle    = {Proceedings of the 10th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2017, Dallas, TX, USA, November 3, 2017},
  pages        = {3--14},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3128572.3140444},
  doi          = {10.1145/3128572.3140444},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Carlini017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChenZSYH17,
  author       = {Pin{-}Yu Chen and
                  Huan Zhang and
                  Yash Sharma and
                  Jinfeng Yi and
                  Cho{-}Jui Hsieh},
  editor       = {Bhavani Thuraisingham and
                  Battista Biggio and
                  David Mandell Freeman and
                  Brad Miller and
                  Arunesh Sinha},
  title        = {{ZOO:} Zeroth Order Optimization Based Black-box Attacks to Deep Neural
                  Networks without Training Substitute Models},
  booktitle    = {Proceedings of the 10th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2017, Dallas, TX, USA, November 3, 2017},
  pages        = {15--26},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3128572.3140448},
  doi          = {10.1145/3128572.3140448},
  timestamp    = {Mon, 02 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChenZSYH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HalawaRBCL17,
  author       = {Hassan Halawa and
                  Matei Ripeanu and
                  Konstantin Beznosov and
                  Baris Coskun and
                  Meizhu Liu},
  editor       = {Bhavani Thuraisingham and
                  Battista Biggio and
                  David Mandell Freeman and
                  Brad Miller and
                  Arunesh Sinha},
  title        = {An Early Warning System for Suspicious Accounts},
  booktitle    = {Proceedings of the 10th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2017, Dallas, TX, USA, November 3, 2017},
  pages        = {51--52},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3128572.3140455},
  doi          = {10.1145/3128572.3140455},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HalawaRBCL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HanHSCLQP17,
  author       = {Shuchu Han and
                  Yifan Hu and
                  Steven Skiena and
                  Baris Coskun and
                  Meizhu Liu and
                  Hong Qin and
                  Jaime Perez},
  editor       = {Bhavani Thuraisingham and
                  Battista Biggio and
                  David Mandell Freeman and
                  Brad Miller and
                  Arunesh Sinha},
  title        = {Generating Look-alike Names For Security Challenges},
  booktitle    = {Proceedings of the 10th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2017, Dallas, TX, USA, November 3, 2017},
  pages        = {57--67},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3128572.3140441},
  doi          = {10.1145/3128572.3140441},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HanHSCLQP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KumarWS17,
  author       = {Ram Shankar Siva Kumar and
                  Andrew Wicker and
                  Matt Swann},
  editor       = {Bhavani Thuraisingham and
                  Battista Biggio and
                  David Mandell Freeman and
                  Brad Miller and
                  Arunesh Sinha},
  title        = {Practical Machine Learning for Cloud Intrusion Detection: Challenges
                  and the Way Forward},
  booktitle    = {Proceedings of the 10th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2017, Dallas, TX, USA, November 3, 2017},
  pages        = {81--90},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3128572.3140445},
  doi          = {10.1145/3128572.3140445},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KumarWS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiuLVO17,
  author       = {Chang Liu and
                  Bo Li and
                  Yevgeniy Vorobeychik and
                  Alina Oprea},
  editor       = {Bhavani Thuraisingham and
                  Battista Biggio and
                  David Mandell Freeman and
                  Brad Miller and
                  Arunesh Sinha},
  title        = {Robust Linear Regression Against Training Data Poisoning},
  booktitle    = {Proceedings of the 10th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2017, Dallas, TX, USA, November 3, 2017},
  pages        = {91--102},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3128572.3140447},
  doi          = {10.1145/3128572.3140447},
  timestamp    = {Mon, 22 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/LiuLVO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Munoz-GonzalezB17,
  author       = {Luis Mu{\~{n}}oz{-}Gonz{\'{a}}lez and
                  Battista Biggio and
                  Ambra Demontis and
                  Andrea Paudice and
                  Vasin Wongrassamee and
                  Emil C. Lupu and
                  Fabio Roli},
  editor       = {Bhavani Thuraisingham and
                  Battista Biggio and
                  David Mandell Freeman and
                  Brad Miller and
                  Arunesh Sinha},
  title        = {Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization},
  booktitle    = {Proceedings of the 10th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2017, Dallas, TX, USA, November 3, 2017},
  pages        = {27--38},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3128572.3140451},
  doi          = {10.1145/3128572.3140451},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Munoz-GonzalezB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RaffN17,
  author       = {Edward Raff and
                  Charles Nicholas},
  editor       = {Bhavani Thuraisingham and
                  Battista Biggio and
                  David Mandell Freeman and
                  Brad Miller and
                  Arunesh Sinha},
  title        = {Malware Classification and Class Imbalance via Stochastic Hashed {LZJD}},
  booktitle    = {Proceedings of the 10th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2017, Dallas, TX, USA, November 3, 2017},
  pages        = {111--120},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3128572.3140446},
  doi          = {10.1145/3128572.3140446},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RaffN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RaffSN17,
  author       = {Edward Raff and
                  Jared Sylvester and
                  Charles Nicholas},
  editor       = {Bhavani Thuraisingham and
                  Battista Biggio and
                  David Mandell Freeman and
                  Brad Miller and
                  Arunesh Sinha},
  title        = {Learning the {PE} Header, Malware Detection with Minimal Domain Knowledge},
  booktitle    = {Proceedings of the 10th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2017, Dallas, TX, USA, November 3, 2017},
  pages        = {121--132},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3128572.3140442},
  doi          = {10.1145/3128572.3140442},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RaffSN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SolankiKSP17,
  author       = {Saumya Solanki and
                  Gautam Krishnan and
                  Varshini Sampath and
                  Jason Polakis},
  editor       = {Bhavani Thuraisingham and
                  Battista Biggio and
                  David Mandell Freeman and
                  Brad Miller and
                  Arunesh Sinha},
  title        = {In (Cyber)Space Bots Can Hear You Speak: Breaking Audio CAPTCHAs Using
                  {OTS} Speech Recognition},
  booktitle    = {Proceedings of the 10th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2017, Dallas, TX, USA, November 3, 2017},
  pages        = {69--80},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3128572.3140443},
  doi          = {10.1145/3128572.3140443},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SolankiKSP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YakuraSNOS17,
  author       = {Hiromu Yakura and
                  Shinnosuke Shinozaki and
                  Reon Nishimura and
                  Yoshihiro Oyama and
                  Jun Sakuma},
  editor       = {Bhavani Thuraisingham and
                  Battista Biggio and
                  David Mandell Freeman and
                  Brad Miller and
                  Arunesh Sinha},
  title        = {Malware Analysis of Imaged Binary Samples by Convolutional Neural
                  Network with Attention Mechanism},
  booktitle    = {Proceedings of the 10th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2017, Dallas, TX, USA, November 3, 2017},
  pages        = {55--56},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3128572.3140457},
  doi          = {10.1145/3128572.3140457},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/YakuraSNOS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZantedeschiNR17,
  author       = {Valentina Zantedeschi and
                  Maria{-}Irina Nicolae and
                  Ambrish Rawat},
  editor       = {Bhavani Thuraisingham and
                  Battista Biggio and
                  David Mandell Freeman and
                  Brad Miller and
                  Arunesh Sinha},
  title        = {Efficient Defenses Against Adversarial Attacks},
  booktitle    = {Proceedings of the 10th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2017, Dallas, TX, USA, November 3, 2017},
  pages        = {39--49},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3128572.3140449},
  doi          = {10.1145/3128572.3140449},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZantedeschiNR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2017aisec,
  editor       = {Bhavani Thuraisingham and
                  Battista Biggio and
                  David Mandell Freeman and
                  Brad Miller and
                  Arunesh Sinha},
  title        = {Proceedings of the 10th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2017, Dallas, TX, USA, November 3, 2017},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {http://dl.acm.org/citation.cfm?id=3128572},
  isbn         = {978-1-4503-5202-4},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/2017aisec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0023YR16,
  author       = {Hao Zhang and
                  Danfeng (Daphne) Yao and
                  Naren Ramakrishnan},
  editor       = {David Mandell Freeman and
                  Aikaterini Mitrokotsa and
                  Arunesh Sinha},
  title        = {Causality-based Sensemaking of Network Traffic for Android Application
                  Security},
  booktitle    = {Proceedings of the 2016 {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2016, Vienna, Austria, October 28, 2016},
  pages        = {47--58},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2996758.2996760},
  doi          = {10.1145/2996758.2996760},
  timestamp    = {Mon, 26 Jun 2023 20:41:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/0023YR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AndersonM16,
  author       = {Blake Anderson and
                  David A. McGrew},
  editor       = {David Mandell Freeman and
                  Aikaterini Mitrokotsa and
                  Arunesh Sinha},
  title        = {Identifying Encrypted Malware Traffic with Contextual Flow Data},
  booktitle    = {Proceedings of the 2016 {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2016, Vienna, Austria, October 28, 2016},
  pages        = {35--46},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2996758.2996768},
  doi          = {10.1145/2996758.2996768},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AndersonM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AndersonWF16,
  author       = {Hyrum S. Anderson and
                  Jonathan Woodbridge and
                  Bobby Filar},
  editor       = {David Mandell Freeman and
                  Aikaterini Mitrokotsa and
                  Arunesh Sinha},
  title        = {DeepDGA: Adversarially-Tuned Domain Generation and Detection},
  booktitle    = {Proceedings of the 2016 {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2016, Vienna, Austria, October 28, 2016},
  pages        = {13--21},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2996758.2996767},
  doi          = {10.1145/2996758.2996767},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AndersonWF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DeoDSVC16,
  author       = {Amit Deo and
                  Santanu Kumar Dash and
                  Guillermo Suarez{-}Tangil and
                  Volodya Vovk and
                  Lorenzo Cavallaro},
  editor       = {David Mandell Freeman and
                  Aikaterini Mitrokotsa and
                  Arunesh Sinha},
  title        = {Prescience: Probabilistic Guidance on the Retraining Conundrum for
                  Malware Detection},
  booktitle    = {Proceedings of the 2016 {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2016, Vienna, Austria, October 28, 2016},
  pages        = {71--82},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2996758.2996769},
  doi          = {10.1145/2996758.2996769},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/DeoDSVC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GhassemiSW16,
  author       = {Mohsen Ghassemi and
                  Anand D. Sarwate and
                  Rebecca N. Wright},
  editor       = {David Mandell Freeman and
                  Aikaterini Mitrokotsa and
                  Arunesh Sinha},
  title        = {Differentially Private Online Active Learning with Applications to
                  Anomaly Detection},
  booktitle    = {Proceedings of the 2016 {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2016, Vienna, Austria, October 28, 2016},
  pages        = {117--128},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2996758.2996766},
  doi          = {10.1145/2996758.2996766},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/GhassemiSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KirchlerHLK16,
  author       = {Matthias Kirchler and
                  Dominik Herrmann and
                  Jens Lindemann and
                  Marius Kloft},
  editor       = {David Mandell Freeman and
                  Aikaterini Mitrokotsa and
                  Arunesh Sinha},
  title        = {Tracked Without a Trace: Linking Sessions of Users by Unsupervised
                  Learning of Patterns in Their {DNS} Traffic},
  booktitle    = {Proceedings of the 2016 {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2016, Vienna, Austria, October 28, 2016},
  pages        = {23--34},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2996758.2996770},
  doi          = {10.1145/2996758.2996770},
  timestamp    = {Thu, 19 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KirchlerHLK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MirskySRSE16,
  author       = {Yisroel Mirsky and
                  Asaf Shabtai and
                  Lior Rokach and
                  Bracha Shapira and
                  Yuval Elovici},
  editor       = {David Mandell Freeman and
                  Aikaterini Mitrokotsa and
                  Arunesh Sinha},
  title        = {SherLock vs Moriarty: {A} Smartphone Dataset for Cybersecurity Research},
  booktitle    = {Proceedings of the 2016 {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2016, Vienna, Austria, October 28, 2016},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2996758.2996764},
  doi          = {10.1145/2996758.2996764},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MirskySRSE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PevnyS16,
  author       = {Tom{\'{a}}s Pevn{\'{y}} and
                  Petr Somol},
  editor       = {David Mandell Freeman and
                  Aikaterini Mitrokotsa and
                  Arunesh Sinha},
  title        = {Discriminative Models for Multi-instance Problems with Tree Structure},
  booktitle    = {Proceedings of the 2016 {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2016, Vienna, Austria, October 28, 2016},
  pages        = {83--91},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2996758.2996761},
  doi          = {10.1145/2996758.2996761},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/PevnyS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RussuDBFR16,
  author       = {Paolo Russu and
                  Ambra Demontis and
                  Battista Biggio and
                  Giorgio Fumera and
                  Fabio Roli},
  editor       = {David Mandell Freeman and
                  Aikaterini Mitrokotsa and
                  Arunesh Sinha},
  title        = {Secure Kernel Machines against Evasion Attacks},
  booktitle    = {Proceedings of the 2016 {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2016, Vienna, Austria, October 28, 2016},
  pages        = {59--69},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2996758.2996771},
  doi          = {10.1145/2996758.2996771},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/RussuDBFR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Sharad16,
  author       = {Kumar Sharad},
  editor       = {David Mandell Freeman and
                  Aikaterini Mitrokotsa and
                  Arunesh Sinha},
  title        = {True Friends Let You Down: Benchmarking Social Graph Anonymization
                  Schemes},
  booktitle    = {Proceedings of the 2016 {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2016, Vienna, Austria, October 28, 2016},
  pages        = {93--104},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2996758.2996765},
  doi          = {10.1145/2996758.2996765},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Sharad16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Sharad16a,
  author       = {Kumar Sharad},
  editor       = {David Mandell Freeman and
                  Aikaterini Mitrokotsa and
                  Arunesh Sinha},
  title        = {Change of Guard: The Next Generation of Social Graph De-anonymization
                  Attacks},
  booktitle    = {Proceedings of the 2016 {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2016, Vienna, Austria, October 28, 2016},
  pages        = {105--116},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2996758.2996763},
  doi          = {10.1145/2996758.2996763},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Sharad16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangZ16,
  author       = {Tao Zhang and
                  Quanyan Zhu},
  editor       = {David Mandell Freeman and
                  Aikaterini Mitrokotsa and
                  Arunesh Sinha},
  title        = {A Dual Perturbation Approach for Differential Private ADMM-Based Distributed
                  Empirical Risk Minimization},
  booktitle    = {Proceedings of the 2016 {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2016, Vienna, Austria, October 28, 2016},
  pages        = {129--137},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2996758.2996762},
  doi          = {10.1145/2996758.2996762},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2016aisec,
  editor       = {David Mandell Freeman and
                  Aikaterini Mitrokotsa and
                  Arunesh Sinha},
  title        = {Proceedings of the 2016 {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2016, Vienna, Austria, October 28, 2016},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2996758},
  doi          = {10.1145/2996758},
  isbn         = {978-1-4503-4573-6},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/2016aisec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BerlinSS15,
  author       = {Konstantin Berlin and
                  David Slater and
                  Joshua Saxe},
  editor       = {Indrajit Ray and
                  Xiaofeng Wang and
                  Kui Ren and
                  Christos Dimitrakakis and
                  Aikaterini Mitrokotsa and
                  Arunesh Sinha},
  title        = {Malicious Behavior Detection using Windows Audit Logs},
  booktitle    = {Proceedings of the 8th {ACM} Workshop on Artificial Intelligence and
                  Security, AISec 2015, Denver, Colorado, USA, October 16, 2015},
  pages        = {35--44},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808769.2808773},
  doi          = {10.1145/2808769.2808773},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BerlinSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BoshmafRBS15,
  author       = {Yazan Boshmaf and
                  Matei Ripeanu and
                  Konstantin Beznosov and
                  Elizeu Santos{-}Neto},
  editor       = {Indrajit Ray and
                  Xiaofeng Wang and
                  Kui Ren and
                  Christos Dimitrakakis and
                  Aikaterini Mitrokotsa and
                  Arunesh Sinha},
  title        = {Thwarting Fake {OSN} Accounts by Predicting their Victims},
  booktitle    = {Proceedings of the 8th {ACM} Workshop on Artificial Intelligence and
                  Security, AISec 2015, Denver, Colorado, USA, October 16, 2015},
  pages        = {81--89},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808769.2808772},
  doi          = {10.1145/2808769.2808772},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BoshmafRBS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BoydLP15,
  author       = {Kendrick Boyd and
                  Eric Lantz and
                  David Page},
  editor       = {Indrajit Ray and
                  Xiaofeng Wang and
                  Kui Ren and
                  Christos Dimitrakakis and
                  Aikaterini Mitrokotsa and
                  Arunesh Sinha},
  title        = {Differential Privacy for Classifier Evaluation},
  booktitle    = {Proceedings of the 8th {ACM} Workshop on Artificial Intelligence and
                  Security, AISec 2015, Denver, Colorado, USA, October 16, 2015},
  pages        = {15--23},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808769.2808775},
  doi          = {10.1145/2808769.2808775},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BoydLP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BuragoL15,
  author       = {Igor Burago and
                  Daniel Lowd},
  editor       = {Indrajit Ray and
                  Xiaofeng Wang and
                  Kui Ren and
                  Christos Dimitrakakis and
                  Aikaterini Mitrokotsa and
                  Arunesh Sinha},
  title        = {Automated Attacks on Compression-Based Classifiers},
  booktitle    = {Proceedings of the 8th {ACM} Workshop on Artificial Intelligence and
                  Security, AISec 2015, Denver, Colorado, USA, October 16, 2015},
  pages        = {69--80},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808769.2808778},
  doi          = {10.1145/2808769.2808778},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BuragoL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CockDNN15,
  author       = {Martine De Cock and
                  Rafael Dowsley and
                  Anderson C. A. Nascimento and
                  Stacey C. Newman},
  editor       = {Indrajit Ray and
                  Xiaofeng Wang and
                  Kui Ren and
                  Christos Dimitrakakis and
                  Aikaterini Mitrokotsa and
                  Arunesh Sinha},
  title        = {Fast, Privacy Preserving Linear Regression over Distributed Datasets
                  based on Pre-Distributed Data},
  booktitle    = {Proceedings of the 8th {ACM} Workshop on Artificial Intelligence and
                  Security, AISec 2015, Denver, Colorado, USA, October 16, 2015},
  pages        = {3--14},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808769.2808774},
  doi          = {10.1145/2808769.2808774},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/CockDNN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FifieldGMMT15,
  author       = {David Fifield and
                  Alexandru Geana and
                  Luis MartinGarcia and
                  Mathias Morbitzer and
                  J. Doug Tygar},
  editor       = {Indrajit Ray and
                  Xiaofeng Wang and
                  Kui Ren and
                  Christos Dimitrakakis and
                  Aikaterini Mitrokotsa and
                  Arunesh Sinha},
  title        = {Remote Operating System Classification over IPv6},
  booktitle    = {Proceedings of the 8th {ACM} Workshop on Artificial Intelligence and
                  Security, AISec 2015, Denver, Colorado, USA, October 16, 2015},
  pages        = {57--67},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808769.2808777},
  doi          = {10.1145/2808769.2808777},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FifieldGMMT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KantchelianTAMS15,
  author       = {Alex Kantchelian and
                  Michael Carl Tschantz and
                  Sadia Afroz and
                  Brad Miller and
                  Vaishaal Shankar and
                  Rekha Bachwani and
                  Anthony D. Joseph and
                  J. Doug Tygar},
  editor       = {Indrajit Ray and
                  Xiaofeng Wang and
                  Kui Ren and
                  Christos Dimitrakakis and
                  Aikaterini Mitrokotsa and
                  Arunesh Sinha},
  title        = {Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor
                  Labels},
  booktitle    = {Proceedings of the 8th {ACM} Workshop on Artificial Intelligence and
                  Security, AISec 2015, Denver, Colorado, USA, October 16, 2015},
  pages        = {45--56},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808769.2808780},
  doi          = {10.1145/2808769.2808780},
  timestamp    = {Wed, 28 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KantchelianTAMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LantzBP15,
  author       = {Eric Lantz and
                  Kendrick Boyd and
                  David Page},
  editor       = {Indrajit Ray and
                  Xiaofeng Wang and
                  Kui Ren and
                  Christos Dimitrakakis and
                  Aikaterini Mitrokotsa and
                  Arunesh Sinha},
  title        = {Subsampled Exponential Mechanism: Differential Privacy in Large Output
                  Spaces},
  booktitle    = {Proceedings of the 8th {ACM} Workshop on Artificial Intelligence and
                  Security, AISec 2015, Denver, Colorado, USA, October 16, 2015},
  pages        = {25--33},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808769.2808776},
  doi          = {10.1145/2808769.2808776},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LantzBP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Manadhata15,
  author       = {Pratyusa K. Manadhata},
  editor       = {Indrajit Ray and
                  Xiaofeng Wang and
                  Kui Ren and
                  Christos Dimitrakakis and
                  Aikaterini Mitrokotsa and
                  Arunesh Sinha},
  title        = {Machine Learning for Enterprise Security},
  booktitle    = {Proceedings of the 8th {ACM} Workshop on Artificial Intelligence and
                  Security, AISec 2015, Denver, Colorado, USA, October 16, 2015},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808769.2808782},
  doi          = {10.1145/2808769.2808782},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Manadhata15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XiaoFH15,
  author       = {Cao Xiao and
                  David Mandell Freeman and
                  Theodore Hwa},
  editor       = {Indrajit Ray and
                  Xiaofeng Wang and
                  Kui Ren and
                  Christos Dimitrakakis and
                  Aikaterini Mitrokotsa and
                  Arunesh Sinha},
  title        = {Detecting Clusters of Fake Accounts in Online Social Networks},
  booktitle    = {Proceedings of the 8th {ACM} Workshop on Artificial Intelligence and
                  Security, AISec 2015, Denver, Colorado, USA, October 16, 2015},
  pages        = {91--101},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808769.2808779},
  doi          = {10.1145/2808769.2808779},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/XiaoFH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2015aisec,
  editor       = {Indrajit Ray and
                  Xiaofeng Wang and
                  Kui Ren and
                  Christos Dimitrakakis and
                  Aikaterini Mitrokotsa and
                  Arunesh Sinha},
  title        = {Proceedings of the 8th {ACM} Workshop on Artificial Intelligence and
                  Security, AISec 2015, Denver, Colorado, USA, October 16, 2015},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808769},
  doi          = {10.1145/2808769},
  isbn         = {978-1-4503-3826-4},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2015aisec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AbtB14,
  author       = {Sebastian Abt and
                  Harald Baier},
  editor       = {Christos Dimitrakakis and
                  Aikaterini Mitrokotsa and
                  Benjamin I. P. Rubinstein and
                  Gail{-}Joon Ahn},
  title        = {A Plea for Utilising Synthetic Data when Performing Machine Learning
                  Based Cyber-Security Experiments},
  booktitle    = {Proceedings of the 2014 Workshop on Artificial Intelligent and Security
                  Workshop, AISec 2014, Scottsdale, AZ, USA, November 7, 2014},
  pages        = {37--45},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2666652.2666663},
  doi          = {10.1145/2666652.2666663},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AbtB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AldaS14,
  author       = {Francesco Ald{\`{a}} and
                  Hans Ulrich Simon},
  editor       = {Christos Dimitrakakis and
                  Aikaterini Mitrokotsa and
                  Benjamin I. P. Rubinstein and
                  Gail{-}Joon Ahn},
  title        = {Randomized Response Schemes, Privacy and Usefulness},
  booktitle    = {Proceedings of the 2014 Workshop on Artificial Intelligent and Security
                  Workshop, AISec 2014, Scottsdale, AZ, USA, November 7, 2014},
  pages        = {15--26},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2666652.2666654},
  doi          = {10.1145/2666652.2666654},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AldaS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AndersonSYM14,
  author       = {Blake Anderson and
                  Curtis B. Storlie and
                  Micah Yates and
                  Aaron McPhall},
  editor       = {Christos Dimitrakakis and
                  Aikaterini Mitrokotsa and
                  Benjamin I. P. Rubinstein and
                  Gail{-}Joon Ahn},
  title        = {Automating Reverse Engineering with Machine Learning Techniques},
  booktitle    = {Proceedings of the 2014 Workshop on Artificial Intelligent and Security
                  Workshop, AISec 2014, Scottsdale, AZ, USA, November 7, 2014},
  pages        = {103--112},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2666652.2666665},
  doi          = {10.1145/2666652.2666665},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AndersonSYM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BhagavatulaDKGZ14,
  author       = {Sruti Bhagavatula and
                  Christopher W. Dunn and
                  Chris Kanich and
                  Minaxi Gupta and
                  Brian D. Ziebart},
  editor       = {Christos Dimitrakakis and
                  Aikaterini Mitrokotsa and
                  Benjamin I. P. Rubinstein and
                  Gail{-}Joon Ahn},
  title        = {Leveraging Machine Learning to Improve Unwanted Resource Filtering},
  booktitle    = {Proceedings of the 2014 Workshop on Artificial Intelligent and Security
                  Workshop, AISec 2014, Scottsdale, AZ, USA, November 7, 2014},
  pages        = {95--102},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2666652.2666662},
  doi          = {10.1145/2666652.2666662},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BhagavatulaDKGZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Biggio14,
  author       = {Battista Biggio},
  editor       = {Christos Dimitrakakis and
                  Aikaterini Mitrokotsa and
                  Benjamin I. P. Rubinstein and
                  Gail{-}Joon Ahn},
  title        = {On learning and recognition of secure patterns},
  booktitle    = {Proceedings of the 2014 Workshop on Artificial Intelligent and Security
                  Workshop, AISec 2014, Scottsdale, AZ, USA, November 7, 2014},
  pages        = {1--2},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2666652.2666653},
  doi          = {10.1145/2666652.2666653},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Biggio14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BiggioRAWCGR14,
  author       = {Battista Biggio and
                  Konrad Rieck and
                  Davide Ariu and
                  Christian Wressnegger and
                  Igino Corona and
                  Giorgio Giacinto and
                  Fabio Roli},
  editor       = {Christos Dimitrakakis and
                  Aikaterini Mitrokotsa and
                  Benjamin I. P. Rubinstein and
                  Gail{-}Joon Ahn},
  title        = {Poisoning behavioral malware clustering},
  booktitle    = {Proceedings of the 2014 Workshop on Artificial Intelligent and Security
                  Workshop, AISec 2014, Scottsdale, AZ, USA, November 7, 2014},
  pages        = {27--36},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2666652.2666666},
  doi          = {10.1145/2666652.2666666},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BiggioRAWCGR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CoronaMAG14,
  author       = {Igino Corona and
                  Davide Maiorca and
                  Davide Ariu and
                  Giorgio Giacinto},
  editor       = {Christos Dimitrakakis and
                  Aikaterini Mitrokotsa and
                  Benjamin I. P. Rubinstein and
                  Gail{-}Joon Ahn},
  title        = {Lux0R: Detection of Malicious PDF-embedded JavaScript code through
                  Discriminant Analysis of {API} References},
  booktitle    = {Proceedings of the 2014 Workshop on Artificial Intelligent and Security
                  Workshop, AISec 2014, Scottsdale, AZ, USA, November 7, 2014},
  pages        = {47--57},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2666652.2666657},
  doi          = {10.1145/2666652.2666657},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CoronaMAG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ManadhataYRH14,
  author       = {Pratyusa K. Manadhata and
                  Sandeep Yadav and
                  Prasad Rao and
                  William G. Horne},
  editor       = {Christos Dimitrakakis and
                  Aikaterini Mitrokotsa and
                  Benjamin I. P. Rubinstein and
                  Gail{-}Joon Ahn},
  title        = {Detecting Malicious Domains via Graph Inference},
  booktitle    = {Proceedings of the 2014 Workshop on Artificial Intelligent and Security
                  Workshop, AISec 2014, Scottsdale, AZ, USA, November 7, 2014},
  pages        = {59--60},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2666652.2666659},
  doi          = {10.1145/2666652.2666659},
  timestamp    = {Mon, 11 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ManadhataYRH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MillerKABDHTJT14,
  author       = {Brad Miller and
                  Alex Kantchelian and
                  Sadia Afroz and
                  Rekha Bachwani and
                  Edwin Dauber and
                  Ling Huang and
                  Michael Carl Tschantz and
                  Anthony D. Joseph and
                  J. Doug Tygar},
  editor       = {Christos Dimitrakakis and
                  Aikaterini Mitrokotsa and
                  Benjamin I. P. Rubinstein and
                  Gail{-}Joon Ahn},
  title        = {Adversarial Active Learning},
  booktitle    = {Proceedings of the 2014 Workshop on Artificial Intelligent and Security
                  Workshop, AISec 2014, Scottsdale, AZ, USA, November 7, 2014},
  pages        = {3--14},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2666652.2666656},
  doi          = {10.1145/2666652.2666656},
  timestamp    = {Tue, 12 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MillerKABDHTJT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NewellPXN14,
  author       = {Andrew Newell and
                  Rahul Potharaju and
                  Luojie Xiang and
                  Cristina Nita{-}Rotaru},
  editor       = {Christos Dimitrakakis and
                  Aikaterini Mitrokotsa and
                  Benjamin I. P. Rubinstein and
                  Gail{-}Joon Ahn},
  title        = {On the Practicality of Integrity Attacks on Document-Level Sentiment
                  Analysis},
  booktitle    = {Proceedings of the 2014 Workshop on Artificial Intelligent and Security
                  Workshop, AISec 2014, Scottsdale, AZ, USA, November 7, 2014},
  pages        = {83--93},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2666652.2666661},
  doi          = {10.1145/2666652.2666661},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NewellPXN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangT14,
  author       = {Xiao Wang and
                  Patrick Tague},
  editor       = {Christos Dimitrakakis and
                  Aikaterini Mitrokotsa and
                  Benjamin I. P. Rubinstein and
                  Gail{-}Joon Ahn},
  title        = {Non-Invasive User Tracking via Passive Sensing: Privacy Risks of Time-Series
                  Occupancy Measurement},
  booktitle    = {Proceedings of the 2014 Workshop on Artificial Intelligent and Security
                  Workshop, AISec 2014, Scottsdale, AZ, USA, November 7, 2014},
  pages        = {113--124},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2666652.2666655},
  doi          = {10.1145/2666652.2666655},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WangT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WhalenBS14,
  author       = {Sean Whalen and
                  Nathaniel Boggs and
                  Salvatore J. Stolfo},
  editor       = {Christos Dimitrakakis and
                  Aikaterini Mitrokotsa and
                  Benjamin I. P. Rubinstein and
                  Gail{-}Joon Ahn},
  title        = {Model Aggregation for Distributed Content Anomaly Detection},
  booktitle    = {Proceedings of the 2014 Workshop on Artificial Intelligent and Security
                  Workshop, AISec 2014, Scottsdale, AZ, USA, November 7, 2014},
  pages        = {61--71},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2666652.2666660},
  doi          = {10.1145/2666652.2666660},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WhalenBS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XiangWSP14,
  author       = {Junlong Xiang and
                  Magnus Westerlund and
                  Dusan Sovilj and
                  G{\"{o}}ran Pulkkis},
  editor       = {Christos Dimitrakakis and
                  Aikaterini Mitrokotsa and
                  Benjamin I. P. Rubinstein and
                  Gail{-}Joon Ahn},
  title        = {Using extreme learning machine for intrusion detection in a big data
                  environment},
  booktitle    = {Proceedings of the 2014 Workshop on Artificial Intelligent and Security
                  Workshop, AISec 2014, Scottsdale, AZ, USA, November 7, 2014},
  pages        = {73--82},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2666652.2666664},
  doi          = {10.1145/2666652.2666664},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/XiangWSP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2014aisec,
  editor       = {Christos Dimitrakakis and
                  Aikaterini Mitrokotsa and
                  Benjamin I. P. Rubinstein and
                  Gail{-}Joon Ahn},
  title        = {Proceedings of the 2014 Workshop on Artificial Intelligent and Security
                  Workshop, AISec 2014, Scottsdale, AZ, USA, November 7, 2014},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {http://dl.acm.org/citation.cfm?id=2666652},
  isbn         = {978-1-4503-3153-1},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2014aisec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BiggioPBAPR13,
  author       = {Battista Biggio and
                  Ignazio Pillai and
                  Samuel Rota Bul{\`{o}} and
                  Davide Ariu and
                  Marcello Pelillo and
                  Fabio Roli},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Blaine Nelson and
                  Christos Dimitrakakis and
                  Elaine Shi},
  title        = {Is data clustering in adversarial settings secure?},
  booktitle    = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence
                  and Security, Co-located with {CCS} 2013, Berlin, Germany, November
                  4, 2013},
  pages        = {87--98},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517312.2517321},
  doi          = {10.1145/2517312.2517321},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BiggioPBAPR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BlockiBD13,
  author       = {Jeremiah Blocki and
                  Manuel Blum and
                  Anupam Datta},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Blaine Nelson and
                  Christos Dimitrakakis and
                  Elaine Shi},
  title        = {{GOTCHA} password hackers!},
  booktitle    = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence
                  and Security, Co-located with {CCS} 2013, Berlin, Germany, November
                  4, 2013},
  pages        = {25--34},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517312.2517319},
  doi          = {10.1145/2517312.2517319},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BlockiBD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Freeman13,
  author       = {David Mandell Freeman},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Blaine Nelson and
                  Christos Dimitrakakis and
                  Elaine Shi},
  title        = {Using naive bayes to detect spammy names in social networks},
  booktitle    = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence
                  and Security, Co-located with {CCS} 2013, Berlin, Germany, November
                  4, 2013},
  pages        = {3--12},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517312.2517314},
  doi          = {10.1145/2517312.2517314},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Freeman13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GasconYAR13,
  author       = {Hugo Gascon and
                  Fabian Yamaguchi and
                  Daniel Arp and
                  Konrad Rieck},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Blaine Nelson and
                  Christos Dimitrakakis and
                  Elaine Shi},
  title        = {Structural detection of android malware using embedded call graphs},
  booktitle    = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence
                  and Security, Co-located with {CCS} 2013, Berlin, Germany, November
                  4, 2013},
  pages        = {45--54},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517312.2517315},
  doi          = {10.1145/2517312.2517315},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GasconYAR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KantchelianAHIMTGJT13,
  author       = {Alex Kantchelian and
                  Sadia Afroz and
                  Ling Huang and
                  Aylin Caliskan Islam and
                  Brad Miller and
                  Michael Carl Tschantz and
                  Rachel Greenstadt and
                  Anthony D. Joseph and
                  J. D. Tygar},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Blaine Nelson and
                  Christos Dimitrakakis and
                  Elaine Shi},
  title        = {Approaches to adversarial drift},
  booktitle    = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence
                  and Security, Co-located with {CCS} 2013, Berlin, Germany, November
                  4, 2013},
  pages        = {99--110},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517312.2517320},
  doi          = {10.1145/2517312.2517320},
  timestamp    = {Tue, 12 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KantchelianAHIMTGJT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LeontjevaGXYA13,
  author       = {Anna Leontjeva and
                  Mois{\'{e}}s Goldszmidt and
                  Yinglian Xie and
                  Fang Yu and
                  Mart{\'{\i}}n Abadi},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Blaine Nelson and
                  Christos Dimitrakakis and
                  Elaine Shi},
  title        = {Early security classification of skype users via machine learning},
  booktitle    = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence
                  and Security, Co-located with {CCS} 2013, Berlin, Germany, November
                  4, 2013},
  pages        = {35--44},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517312.2517322},
  doi          = {10.1145/2517312.2517322},
  timestamp    = {Mon, 27 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LeontjevaGXYA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MenahemEAN13,
  author       = {Eitan Menahem and
                  Yuval Elovici and
                  Nir Amar and
                  Gabi Nakibly},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Blaine Nelson and
                  Christos Dimitrakakis and
                  Elaine Shi},
  title        = {{ACTIDS:} an active strategy for detecting and localizing network
                  attacks},
  booktitle    = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence
                  and Security, Co-located with {CCS} 2013, Berlin, Germany, November
                  4, 2013},
  pages        = {55--66},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517312.2517323},
  doi          = {10.1145/2517312.2517323},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MenahemEAN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Rieck13,
  author       = {Konrad Rieck},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Blaine Nelson and
                  Christos Dimitrakakis and
                  Elaine Shi},
  title        = {Off the beaten path: machine learning for offensive security},
  booktitle    = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence
                  and Security, Co-located with {CCS} 2013, Berlin, Germany, November
                  4, 2013},
  pages        = {1--2},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517312.2517313},
  doi          = {10.1145/2517312.2517313},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Rieck13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SinhaLB13,
  author       = {Arunesh Sinha and
                  Yan Li and
                  Lujo Bauer},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Blaine Nelson and
                  Christos Dimitrakakis and
                  Elaine Shi},
  title        = {What you want is not what you get: predicting sharing policies for
                  text-based content on facebook},
  booktitle    = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence
                  and Security, Co-located with {CCS} 2013, Berlin, Germany, November
                  4, 2013},
  pages        = {13--24},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517312.2517317},
  doi          = {10.1145/2517312.2517317},
  timestamp    = {Fri, 03 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SinhaLB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/StevensL13,
  author       = {David Stevens and
                  Daniel Lowd},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Blaine Nelson and
                  Christos Dimitrakakis and
                  Elaine Shi},
  title        = {On the hardness of evading combinations of linear classifiers},
  booktitle    = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence
                  and Security, Co-located with {CCS} 2013, Berlin, Germany, November
                  4, 2013},
  pages        = {77--86},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517312.2517318},
  doi          = {10.1145/2517312.2517318},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/StevensL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WressneggerSAR13,
  author       = {Christian Wressnegger and
                  Guido Schwenk and
                  Daniel Arp and
                  Konrad Rieck},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Blaine Nelson and
                  Christos Dimitrakakis and
                  Elaine Shi},
  title        = {A close look on \emph{n}-grams in intrusion detection: anomaly detection
                  vs. classification},
  booktitle    = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence
                  and Security, Co-located with {CCS} 2013, Berlin, Germany, November
                  4, 2013},
  pages        = {67--76},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517312.2517316},
  doi          = {10.1145/2517312.2517316},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WressneggerSAR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2013aisec,
  editor       = {Ahmad{-}Reza Sadeghi and
                  Blaine Nelson and
                  Christos Dimitrakakis and
                  Elaine Shi},
  title        = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence
                  and Security, Co-located with {CCS} 2013, Berlin, Germany, November
                  4, 2013},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {http://dl.acm.org/citation.cfm?id=2517312},
  isbn         = {978-1-4503-2488-5},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2013aisec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AndersonSL12,
  author       = {Blake Anderson and
                  Curtis B. Storlie and
                  Terran Lane},
  editor       = {Ting Yu and
                  V. N. Venkatakrishan and
                  Apu Kapadia},
  title        = {Improving malware classification: bridging the static/dynamic gap},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2012, Raleigh, NC, USA, October 19, 2012},
  pages        = {3--14},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2381896.2381900},
  doi          = {10.1145/2381896.2381900},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AndersonSL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChouLC12,
  author       = {Jung{-}Wei Chou and
                  Shou{-}De Lin and
                  Chen{-}Mou Cheng},
  editor       = {Ting Yu and
                  V. N. Venkatakrishan and
                  Apu Kapadia},
  title        = {On the effectiveness of using state-of-the-art machine learning techniques
                  to launch cryptographic distinguishing attacks},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2012, Raleigh, NC, USA, October 19, 2012},
  pages        = {105--110},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2381896.2381912},
  doi          = {10.1145/2381896.2381912},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChouLC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Gu12,
  author       = {Guofei Gu},
  editor       = {Ting Yu and
                  V. N. Venkatakrishan and
                  Apu Kapadia},
  title        = {Machine learning meets social networking security: detecting and analyzing
                  malicious social networks for fun and profit},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2012, Raleigh, NC, USA, October 19, 2012},
  pages        = {1--2},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2381896.2381898},
  doi          = {10.1145/2381896.2381898},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Gu12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KantchelianMHAJT12,
  author       = {Alex Kantchelian and
                  Justin Ma and
                  Ling Huang and
                  Sadia Afroz and
                  Anthony D. Joseph and
                  J. D. Tygar},
  editor       = {Ting Yu and
                  V. N. Venkatakrishan and
                  Apu Kapadia},
  title        = {Robust detection of comment spam using entropy rate},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2012, Raleigh, NC, USA, October 19, 2012},
  pages        = {59--70},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2381896.2381907},
  doi          = {10.1145/2381896.2381907},
  timestamp    = {Tue, 12 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KantchelianMHAJT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KruegerGKR12,
  author       = {Tammo Krueger and
                  Hugo Gascon and
                  Nicole Kr{\"{a}}mer and
                  Konrad Rieck},
  editor       = {Ting Yu and
                  V. N. Venkatakrishan and
                  Apu Kapadia},
  title        = {Learning stateful models for network honeypots},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2012, Raleigh, NC, USA, October 19, 2012},
  pages        = {37--48},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2381896.2381904},
  doi          = {10.1145/2381896.2381904},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KruegerGKR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SawayaKY12,
  author       = {Yukiko Sawaya and
                  Ayumu Kubota and
                  Akira Yamada},
  editor       = {Ting Yu and
                  V. N. Venkatakrishan and
                  Apu Kapadia},
  title        = {Understanding the time-series behavioral characteristics of evolutionally
                  advanced email spammers},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2012, Raleigh, NC, USA, October 19, 2012},
  pages        = {71--80},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2381896.2381908},
  doi          = {10.1145/2381896.2381908},
  timestamp    = {Fri, 20 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SawayaKY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SchuttKBR12,
  author       = {Kristof Sch{\"{u}}tt and
                  Marius Kloft and
                  Alexander Bikadorov and
                  Konrad Rieck},
  editor       = {Ting Yu and
                  V. N. Venkatakrishan and
                  Apu Kapadia},
  title        = {Early detection of malicious behavior in JavaScript code},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2012, Raleigh, NC, USA, October 19, 2012},
  pages        = {15--24},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2381896.2381901},
  doi          = {10.1145/2381896.2381901},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SchuttKBR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SchwenkBKR12,
  author       = {Guido Schwenk and
                  Alexander Bikadorov and
                  Tammo Krueger and
                  Konrad Rieck},
  editor       = {Ting Yu and
                  V. N. Venkatakrishan and
                  Apu Kapadia},
  title        = {Autonomous learning for detection of JavaScript attacks: vision or
                  reality?},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2012, Raleigh, NC, USA, October 19, 2012},
  pages        = {93--104},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2381896.2381911},
  doi          = {10.1145/2381896.2381911},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SchwenkBKR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SinghWL12,
  author       = {Anshuman Singh and
                  Andrew Walenstein and
                  Arun Lakhotia},
  editor       = {Ting Yu and
                  V. N. Venkatakrishan and
                  Apu Kapadia},
  title        = {Tracking concept drift in malware families},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2012, Raleigh, NC, USA, October 19, 2012},
  pages        = {81--92},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2381896.2381910},
  doi          = {10.1145/2381896.2381910},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SinghWL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SymonsB12,
  author       = {Christopher T. Symons and
                  Justin M. Beaver},
  editor       = {Ting Yu and
                  V. N. Venkatakrishan and
                  Apu Kapadia},
  title        = {Nonparametric semi-supervised learning for network intrusion detection:
                  combining performance improvements with realistic in-situ training},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2012, Raleigh, NC, USA, October 19, 2012},
  pages        = {49--58},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2381896.2381905},
  doi          = {10.1145/2381896.2381905},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SymonsB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ThiS12,
  author       = {Hoi Le Thi and
                  Reihaneh Safavi{-}Naini},
  editor       = {Ting Yu and
                  V. N. Venkatakrishan and
                  Apu Kapadia},
  title        = {An information theoretic framework for web inference detection},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2012, Raleigh, NC, USA, October 19, 2012},
  pages        = {25--36},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2381896.2381902},
  doi          = {10.1145/2381896.2381902},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ThiS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2012aisec,
  editor       = {Ting Yu and
                  V. N. Venkatakrishan and
                  Apu Kapadia},
  title        = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2012, Raleigh, NC, USA, October 19, 2012},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {http://dl.acm.org/citation.cfm?id=2381896},
  isbn         = {978-1-4503-1664-4},
  timestamp    = {Tue, 12 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/2012aisec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AriuGR11,
  author       = {Davide Ariu and
                  Giorgio Giacinto and
                  Fabio Roli},
  editor       = {Yan Chen and
                  Alvaro A. C{\'{a}}rdenas and
                  Rachel Greenstadt and
                  Benjamin I. P. Rubinstein},
  title        = {Machine learning in computer forensics (and the lessons learned from
                  machine learning in computer security)},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2011, Chicago, IL, USA, October 21, 2011},
  pages        = {99--104},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046684.2046700},
  doi          = {10.1145/2046684.2046700},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AriuGR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BannurSS11,
  author       = {Sushma Nagesh Bannur and
                  Lawrence K. Saul and
                  Stefan Savage},
  editor       = {Yan Chen and
                  Alvaro A. C{\'{a}}rdenas and
                  Rachel Greenstadt and
                  Benjamin I. P. Rubinstein},
  title        = {Judging a site by its content: learning the textual, structural, and
                  visual features of malicious web pages},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2011, Chicago, IL, USA, October 21, 2011},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046684.2046686},
  doi          = {10.1145/2046684.2046686},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BannurSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Cock11,
  author       = {David A. Cock},
  editor       = {Yan Chen and
                  Alvaro A. C{\'{a}}rdenas and
                  Rachel Greenstadt and
                  Benjamin I. P. Rubinstein},
  title        = {Exploitation as an inference problem},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2011, Chicago, IL, USA, October 21, 2011},
  pages        = {105--106},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046684.2046702},
  doi          = {10.1145/2046684.2046702},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Cock11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HuangJNRT11,
  author       = {Ling Huang and
                  Anthony D. Joseph and
                  Blaine Nelson and
                  Benjamin I. P. Rubinstein and
                  J. D. Tygar},
  editor       = {Yan Chen and
                  Alvaro A. C{\'{a}}rdenas and
                  Rachel Greenstadt and
                  Benjamin I. P. Rubinstein},
  title        = {Adversarial machine learning},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2011, Chicago, IL, USA, October 21, 2011},
  pages        = {43--58},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046684.2046692},
  doi          = {10.1145/2046684.2046692},
  timestamp    = {Tue, 12 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HuangJNRT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KaranthLNVLS11,
  author       = {Sandeep Karanth and
                  Srivatsan Laxman and
                  Prasad Naldurg and
                  Ramarathnam Venkatesan and
                  John Lambert and
                  Jinwook Shin},
  editor       = {Yan Chen and
                  Alvaro A. C{\'{a}}rdenas and
                  Rachel Greenstadt and
                  Benjamin I. P. Rubinstein},
  title        = {{ZDVUE:} prioritization of javascript attacks to discover new vulnerabilities},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2011, Chicago, IL, USA, October 21, 2011},
  pages        = {31--42},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046684.2046690},
  doi          = {10.1145/2046684.2046690},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KaranthLNVLS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KimMVS11,
  author       = {Do{-}kyum Kim and
                  Marti Motoyama and
                  Geoffrey M. Voelker and
                  Lawrence K. Saul},
  editor       = {Yan Chen and
                  Alvaro A. C{\'{a}}rdenas and
                  Rachel Greenstadt and
                  Benjamin I. P. Rubinstein},
  title        = {Topic modeling of freelance job postings to monitor web service abuse},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2011, Chicago, IL, USA, October 21, 2011},
  pages        = {11--20},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046684.2046687},
  doi          = {10.1145/2046684.2046687},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KimMVS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Morel11,
  author       = {Benoit Morel},
  editor       = {Yan Chen and
                  Alvaro A. C{\'{a}}rdenas and
                  Rachel Greenstadt and
                  Benjamin I. P. Rubinstein},
  title        = {Artificial intelligence and the future of cybersecurity},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2011, Chicago, IL, USA, October 21, 2011},
  pages        = {93--98},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046684.2046699},
  doi          = {10.1145/2046684.2046699},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Morel11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NatarajYPZ11,
  author       = {Lakshmanan Nataraj and
                  Vinod Yegneswaran and
                  Phillip A. Porras and
                  Jian Zhang},
  editor       = {Yan Chen and
                  Alvaro A. C{\'{a}}rdenas and
                  Rachel Greenstadt and
                  Benjamin I. P. Rubinstein},
  title        = {A comparative assessment of malware classification using binary texture
                  analysis and dynamic analysis},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2011, Chicago, IL, USA, October 21, 2011},
  pages        = {21--30},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046684.2046689},
  doi          = {10.1145/2046684.2046689},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NatarajYPZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NelsonBL11,
  author       = {Blaine Nelson and
                  Battista Biggio and
                  Pavel Laskov},
  editor       = {Yan Chen and
                  Alvaro A. C{\'{a}}rdenas and
                  Rachel Greenstadt and
                  Benjamin I. P. Rubinstein},
  title        = {Understanding the risk factors of learning in adversarial environments},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2011, Chicago, IL, USA, October 21, 2011},
  pages        = {87--92},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046684.2046698},
  doi          = {10.1145/2046684.2046698},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NelsonBL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SarrauteRO11,
  author       = {Carlos Sarraute and
                  Gerardo Richarte and
                  Jorge Luc{\'{a}}ngeli Obes},
  editor       = {Yan Chen and
                  Alvaro A. C{\'{a}}rdenas and
                  Rachel Greenstadt and
                  Benjamin I. P. Rubinstein},
  title        = {An algorithm to find optimal attack paths in nondeterministic scenarios},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2011, Chicago, IL, USA, October 21, 2011},
  pages        = {71--80},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046684.2046695},
  doi          = {10.1145/2046684.2046695},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SarrauteRO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Shirali-ShahrezaS11,
  author       = {Sajad Shirali{-}Shahreza and
                  Mohammad Hassan Shirali{-}Shahreza},
  editor       = {Yan Chen and
                  Alvaro A. C{\'{a}}rdenas and
                  Rachel Greenstadt and
                  Benjamin I. P. Rubinstein},
  title        = {Categorizing {CAPTCHA}},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2011, Chicago, IL, USA, October 21, 2011},
  pages        = {107--108},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046684.2046703},
  doi          = {10.1145/2046684.2046703},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Shirali-ShahrezaS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Shirali-ShahrezaS11a,
  author       = {Sajad Shirali{-}Shahreza and
                  Mohammad Hassan Shirali{-}Shahreza},
  editor       = {Yan Chen and
                  Alvaro A. C{\'{a}}rdenas and
                  Rachel Greenstadt and
                  Benjamin I. P. Rubinstein},
  title        = {Accessibility of {CAPTCHA} methods},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2011, Chicago, IL, USA, October 21, 2011},
  pages        = {109--110},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046684.2046704},
  doi          = {10.1145/2046684.2046704},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Shirali-ShahrezaS11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SinghSWL11,
  author       = {Anshuman Singh and
                  Sumi Singh and
                  Andrew Walenstein and
                  Arun Lakhotia},
  editor       = {Yan Chen and
                  Alvaro A. C{\'{a}}rdenas and
                  Rachel Greenstadt and
                  Benjamin I. P. Rubinstein},
  title        = {On deployable adversarial classification models},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2011, Chicago, IL, USA, October 21, 2011},
  pages        = {113--114},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046684.2046706},
  doi          = {10.1145/2046684.2046706},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SinghSWL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Turan11,
  author       = {Meltem S{\"{o}}nmez Turan},
  editor       = {Yan Chen and
                  Alvaro A. C{\'{a}}rdenas and
                  Rachel Greenstadt and
                  Benjamin I. P. Rubinstein},
  title        = {Evolutionary construction of de bruijn sequences},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2011, Chicago, IL, USA, October 21, 2011},
  pages        = {81--86},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046684.2046696},
  doi          = {10.1145/2046684.2046696},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Turan11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangS11,
  author       = {Qifan Wang and
                  Luo Si},
  editor       = {Yan Chen and
                  Alvaro A. C{\'{a}}rdenas and
                  Rachel Greenstadt and
                  Benjamin I. P. Rubinstein},
  title        = {A robust one-class bayesian approach for masquerade detection},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2011, Chicago, IL, USA, October 21, 2011},
  pages        = {111--112},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046684.2046705},
  doi          = {10.1145/2046684.2046705},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WangS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZomlotSLOR11,
  author       = {Loai Zomlot and
                  Sathya Chandran Sundaramurthy and
                  Kui Luo and
                  Xinming Ou and
                  Siva Raj Rajagopalan},
  editor       = {Yan Chen and
                  Alvaro A. C{\'{a}}rdenas and
                  Rachel Greenstadt and
                  Benjamin I. P. Rubinstein},
  title        = {Prioritizing intrusion analysis using Dempster-Shafer theory},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2011, Chicago, IL, USA, October 21, 2011},
  pages        = {59--70},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046684.2046694},
  doi          = {10.1145/2046684.2046694},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZomlotSLOR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2011aisec,
  editor       = {Yan Chen and
                  Alvaro A. C{\'{a}}rdenas and
                  Rachel Greenstadt and
                  Benjamin I. P. Rubinstein},
  title        = {Proceedings of the 4th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2011, Chicago, IL, USA, October 21, 2011},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {http://dl.acm.org/citation.cfm?id=2046684},
  isbn         = {978-1-4503-1003-1},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2011aisec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AhmedHSF09,
  author       = {Faraz Ahmed and
                  Haider Hameed and
                  M. Zubair Shafiq and
                  Muddassar Farooq},
  editor       = {Dirk Balfanz and
                  Jessica Staddon},
  title        = {Using spatio-temporal information in {API} calls with machine learning
                  algorithms for malware detection},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2009, Chicago, Illinois, USA, November 9, 2009},
  pages        = {55--62},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1654988.1655003},
  doi          = {10.1145/1654988.1655003},
  timestamp    = {Wed, 27 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AhmedHSF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChangD09,
  author       = {Su Chang and
                  Thomas E. Daniels},
  editor       = {Dirk Balfanz and
                  Jessica Staddon},
  title        = {{P2P} botnet detection using behavior clustering {\&} statistical
                  tests},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2009, Chicago, Illinois, USA, November 9, 2009},
  pages        = {23--30},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1654988.1654996},
  doi          = {10.1145/1654988.1654996},
  timestamp    = {Wed, 11 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChangD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Danezis09,
  author       = {George Danezis},
  editor       = {Dirk Balfanz and
                  Jessica Staddon},
  title        = {Inferring privacy policies for social networking services},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2009, Chicago, Illinois, USA, November 9, 2009},
  pages        = {5--10},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1654988.1654991},
  doi          = {10.1145/1654988.1654991},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Danezis09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GornitzKRB09,
  author       = {Nico G{\"{o}}rnitz and
                  Marius Kloft and
                  Konrad Rieck and
                  Ulf Brefeld},
  editor       = {Dirk Balfanz and
                  Jessica Staddon},
  title        = {Active learning for network intrusion detection},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2009, Chicago, Illinois, USA, November 9, 2009},
  pages        = {47--54},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1654988.1655002},
  doi          = {10.1145/1654988.1655002},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GornitzKRB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GreenstadtAB09,
  author       = {Rachel Greenstadt and
                  Sadia Afroz and
                  Michael Brennan},
  editor       = {Dirk Balfanz and
                  Jessica Staddon},
  title        = {Mixed-initiative security agents},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2009, Chicago, Illinois, USA, November 9, 2009},
  pages        = {35--38},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1654988.1654999},
  doi          = {10.1145/1654988.1654999},
  timestamp    = {Wed, 28 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GreenstadtAB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Hogg09,
  author       = {Tad Hogg},
  editor       = {Dirk Balfanz and
                  Jessica Staddon},
  title        = {Security challenges for reputation mechanisms using online social
                  networks},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2009, Chicago, Illinois, USA, November 9, 2009},
  pages        = {31--34},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1654988.1654998},
  doi          = {10.1145/1654988.1654998},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Hogg09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Jakobsson09,
  author       = {Markus Jakobsson},
  editor       = {Dirk Balfanz and
                  Jessica Staddon},
  title        = {Captcha-free throttling},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2009, Chicago, Illinois, USA, November 9, 2009},
  pages        = {15--22},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1654988.1654994},
  doi          = {10.1145/1654988.1654994},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Jakobsson09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LaskovK09,
  author       = {Pavel Laskov and
                  Marius Kloft},
  editor       = {Dirk Balfanz and
                  Jessica Staddon},
  title        = {A framework for quantitative security analysis of machine learning},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2009, Chicago, Illinois, USA, November 9, 2009},
  pages        = {1--4},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1654988.1654990},
  doi          = {10.1145/1654988.1654990},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LaskovK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Staddon09,
  author       = {Jessica Staddon},
  editor       = {Dirk Balfanz and
                  Jessica Staddon},
  title        = {Finding "hidden" connections on linkedIn an argument for more pragmatic
                  social network privacy},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2009, Chicago, Illinois, USA, November 9, 2009},
  pages        = {11--14},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1654988.1654992},
  doi          = {10.1145/1654988.1654992},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Staddon09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/StavrouCLS09,
  author       = {Angelos Stavrou and
                  Gabriela F. Cretu{-}Ciocarlie and
                  Michael E. Locasto and
                  Salvatore J. Stolfo},
  editor       = {Dirk Balfanz and
                  Jessica Staddon},
  title        = {Keep your friends close: the necessity for updating an anomaly sensor
                  with legitimate environment changes},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2009, Chicago, Illinois, USA, November 9, 2009},
  pages        = {39--46},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1654988.1655000},
  doi          = {10.1145/1654988.1655000},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/StavrouCLS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2009aisec,
  editor       = {Dirk Balfanz and
                  Jessica Staddon},
  title        = {Proceedings of the 2nd {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2009, Chicago, Illinois, USA, November 9, 2009},
  publisher    = {{ACM}},
  year         = {2009},
  isbn         = {978-1-60558-781-3},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2009aisec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BarrenoBCJNRST08,
  author       = {Marco Barreno and
                  Peter L. Bartlett and
                  Fuching Jack Chi and
                  Anthony D. Joseph and
                  Blaine Nelson and
                  Benjamin I. P. Rubinstein and
                  Udam Saini and
                  J. Doug Tygar},
  editor       = {Dirk Balfanz and
                  Jessica Staddon},
  title        = {Open problems in the security of learning},
  booktitle    = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {19--26},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456377.1456382},
  doi          = {10.1145/1456377.1456382},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BarrenoBCJNRST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BerralPAGTP08,
  author       = {Josep Lluis Berral and
                  Nicol{\'{a}}s Poggi and
                  Javier Alonso and
                  Ricard Gavald{\`{a}} and
                  Jordi Torres and
                  Manish Parashar},
  editor       = {Dirk Balfanz and
                  Jessica Staddon},
  title        = {Adaptive distributed mechanism against flooding network attacks based
                  on machine learning},
  booktitle    = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {43--50},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456377.1456389},
  doi          = {10.1145/1456377.1456389},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BerralPAGTP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChatterjeeAP08,
  author       = {Krishnendu Chatterjee and
                  Luca de Alfaro and
                  Ian Pye},
  editor       = {Dirk Balfanz and
                  Jessica Staddon},
  title        = {Robust content-driven reputation},
  booktitle    = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {33--42},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456377.1456387},
  doi          = {10.1145/1456377.1456387},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChatterjeeAP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Clifton08,
  author       = {Christopher W. Clifton},
  editor       = {Dirk Balfanz and
                  Jessica Staddon},
  title        = {Opportunities for private and secure machine learning},
  booktitle    = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {31--32},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456377.1456385},
  doi          = {10.1145/1456377.1456385},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Clifton08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DaherC08,
  author       = {Waseem Daher and
                  Ran Canetti},
  editor       = {Dirk Balfanz and
                  Jessica Staddon},
  title        = {{POSH:} a generalized captcha with security applications},
  booktitle    = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456377.1456379},
  doi          = {10.1145/1456377.1456379},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DaherC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GreenstadtB08,
  author       = {Rachel Greenstadt and
                  Jacob Beal},
  editor       = {Dirk Balfanz and
                  Jessica Staddon},
  title        = {Cognitive security for personal devices},
  booktitle    = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {27--30},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456377.1456383},
  doi          = {10.1145/1456377.1456383},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GreenstadtB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KelleyDSC08,
  author       = {Patrick Gage Kelley and
                  Paul Hankes Drielsma and
                  Norman M. Sadeh and
                  Lorrie Faith Cranor},
  editor       = {Dirk Balfanz and
                  Jessica Staddon},
  title        = {User-controllable learning of security and privacy policies},
  booktitle    = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {11--18},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456377.1456380},
  doi          = {10.1145/1456377.1456380},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KelleyDSC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KloftBDGL08,
  author       = {Marius Kloft and
                  Ulf Brefeld and
                  Patrick D{\"{u}}ssel and
                  Christian Gehl and
                  Pavel Laskov},
  editor       = {Dirk Balfanz and
                  Jessica Staddon},
  title        = {Automatic feature selection for anomaly detection},
  booktitle    = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {71--76},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456377.1456395},
  doi          = {10.1145/1456377.1456395},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KloftBDGL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Landwehr08,
  author       = {Carl E. Landwehr},
  editor       = {Dirk Balfanz and
                  Jessica Staddon},
  title        = {Cyber security and artificial intelligence: from fixing the plumbing
                  to smart water},
  booktitle    = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {51--52},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456377.1456391},
  doi          = {10.1145/1456377.1456391},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Landwehr08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhouI08,
  author       = {Yan Zhou and
                  W. Meador Inge},
  editor       = {Dirk Balfanz and
                  Jessica Staddon},
  title        = {Malware detection using adaptive data compression},
  booktitle    = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {53--60},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456377.1456393},
  doi          = {10.1145/1456377.1456393},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhouI08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZurutuzaUZ08,
  author       = {Urko Zurutuza and
                  Roberto Uribeetxeberria and
                  Diego Zamboni},
  editor       = {Dirk Balfanz and
                  Jessica Staddon},
  title        = {A data mining approach for analysis of worm activity through automatic
                  signature generation},
  booktitle    = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {61--70},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456377.1456394},
  doi          = {10.1145/1456377.1456394},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZurutuzaUZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2008aisec,
  editor       = {Dirk Balfanz and
                  Jessica Staddon},
  title        = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2008, Alexandria, VA, USA, October 27, 2008},
  publisher    = {{ACM}},
  year         = {2008},
  isbn         = {978-1-60558-291-7},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2008aisec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}