![]() |
|
|
ACM SIGSAC Membership Application
|
AISec'17 Table of Contents Chairs'
Introduction and Welcome to AISec 2016 AISec 2016 Workshop Organization
Session
1: Security Data Sets SherLock
vs Moriarty: A Smartphone Dataset for Cybersecurity Research (Page
1) Session
2: Machine Learning and Security in Practice DeepDGA:
Adversarially-Tuned Domain Generation and Detection (Page
13) Tracked
Without a Trace: Linking Sessions of Users by Unsupervised Learning
of Patterns in Their DNS Traffic (Page
23) Identifying
Encrypted Malware Traffic with Contextual Flow Data (Page
35) Causality-based
Sensemaking of Network Traffic for Android Application Security (Page
47) |
| (Return to Top) | Session
3: Foundations Secure
Kernel Machines against Evasion Attacks (Page
59) Prescience:
Probabilistic Guidance on the Retraining Conundrum for Malware Detection (Page
71) Discriminative
Models for Multi-instance Problems with Tree Structure (Page
83) |
| (Return to Top) | Session
4: Privacy True
Friends Let You Down: Benchmarking Social Graph Anonymization Schemes (Page
93) Change
of Guard: The Next Generation of Social Graph De-anonymization Attacks (Page
105) Differentially
Private Online Active Learning with Applications to Anomaly Detection (Page
117) A
Dual Perturbation Approach for Differential Private ADMM-Based Distributed
Empirical Risk Minimization (Page
129) |