posted by user: zhouli_uci || 3210 views || tracked by 2 users: [display]

SiMLA 2019 : Security in Machine Learning and its Applications

FacebookTwitterLinkedInGoogle

Link: http://ssl.ie.cuhk.edu.hk/simla/
 
When Jun 5, 2019 - Jun 7, 2019
Where Bogota, Colombia
Submission Deadline Mar 30, 2019
Notification Due Apr 30, 2019
Final Version Due May 15, 2019
Categories    cyber-security   machine learning   data analysis
 

Call For Papers

Workshop Background
As the development of computing hardware, algorithms, and more importantly, availability of large volume of data, machine learning technologies have become a increasingly popular. Practical systems have been deployed in various domains, like face recognition, automatic video monitoring, and even auxiliary driving. However, the security implications of machine learning algorithms and systems are still unclear. For example, people still lack deep understanding on adversarial machine learning, one of the unique vulnerability of machine learning systems, and are unable to evaluate the robustness of those machine learning algorithms effectively. At the same time, innovations in machine learning, especially in deep learning, had also bring new tools and methodologies to solve existing problems, like spam detection, intrusion detection and response, etc.

Motivated by this situation, this workshop solicits original contributions on the security problems of machine learning algorithm and systems, including adversarial learning, algorithm robustness analysis, etc. We hope this workshop can bring researchers together to exchange ideas on edge-cutting technologies and brainstorm solutions for urgent problems derived from practical applications.

Topics
Topics of interest include, but not limited, to followings:
Adversarial Machine Learning
Robustness Analysis of Machine Learning Algorithms
Detection and Defense to Training Data set Poisonous attack
Watermarking of Machine Learning Algorithms and Systems
Attack and defense of face recognition systems
Attacks and defense of voice recognition and voice commanded systems
Attacks and defense of machine learning algorithms in program analysis
Malware identification and analysis
Spam and phishing email detection
Vulnerability analysis

Submissions Guidelines
Authors are welcome to submit their papers in following two forms:

Full papers that present relatively mature research results related to security issues of machine learning algorithms, systems, and applications. The paper could be attack, defense, security analysis, surveys, etc. The submissions for this type must follow the original LNCS format (see http://www.springeronline.com/lncs) with a page limit of 18 pages (including references) for the main part (reviewers are not required to read beyond this limit) and 25 pages in total.

Short papers that describe an on-going work and bring some new insights and inspiring ideas related to security issues of machine learning algorithms, systems, and applications. Short papers will follow the same LNCS format as full paper (http://www.springeronline.com/lncs), but with a page limit of 9 pages (including references).

A special issue for the selected papers will be published in IJIS (International Journal of Information Security) Springer.

The submissions must be anonymous, with no author names, affiliations, acknowledgment or obvious references. Once accepted, the papers will appear in the formal proceedings. Authors of accepted papers must guarantee that their paper will be presented at the conference and must make their paper available online. There will be a best paper award.

Related Resources

DSA 2025   The 12th International Conference on Dependability Systems and Their Applications
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
SPRA 2026   SPIE--2026 6th Symposium on Pattern Recognition and Applications (SPRA 2026)
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
MobiCASE 2025   16th EAI International Conference on Mobile Computing, Applications and Services
Ei/Scopus- CCRIS 2025   2025 IEEE 6th International Conference on Control, Robotics and Intelligent System (CCRIS 2025)
IEEE CNCIT 2025   2025 4th International Conference on Networks, Communications and Information Technology (CNCIT 2025)
Ei/Scopus-IPCML 2025   2025 International Conference on Image Processing, Communications and Machine Learning (IPCML 2025)
BDML--ESCI 2025   2025 8th International Conference on Big Data and Machine Learning (BDML 2025)--ESCI
ICDM 2025   The 25th IEEE International Conference on Data Mining