Important Dates

July 5, 2018 (Firm Deadline)

Late-Breaking Innovation Paper Submission Due

May 8, 2018(closed)

Special Session Proposal Due

May 28,23:59, 2018(closed)

Paper Submission Deadline

June 8, 2018

Authors Notification

August 8, 2018

Camera-ready & Registration



Artificial Intelligence and Security

With the advance of Internet of Things, artiļ¬cial intelligence plays more critical role in improving the resilience of society to both digital and physical threats, and in safeguarding the privacy of individuals. Artificial Intelligence (AI), and Machine Learning (ML) in particular, provide a set of useful analytic and decision-making techniques that are being leveraged by an ever-growing community of practitioners, including applications with security-sensitive elements. In the past few years, we have witnessed increasing interests and numerous significant theoretical and practical developments within AISec community. For example, numerous machine learning techniques have been applied to perform automatic detection of physical and/or cyber threats (malicious software/vulnerabilities) ; Security game theory for both physical and cyber security have been successfully used in homeland security applications and defending cyber-attacks.

This work focuses on theory and practice of artificial intelligence techniques in security. By bringing together academic researchers and industry practitioners in a single location, we would like to create a forum to discuss interesting results both theoretically and empirically related with artificial intelligence and security, The goal of this workshop aims to bring together diverse viewpoints in artificial intelligence and security in an attempt to consolidate the common ground, identify new lines of multi-disciplinary directions, sharing insights into recent results and common challenges, and showcase the application of AI in the domain of security.


Theoretical topics related to security

  • Adversarial Learning
  • Robust Statistics
  • Online Learning
  • Learning in games
  • Economics of security
  • Differential privacy

Security applications

  • Computer Forensics
  • Spam detection
  • Phishing detection and prevention
  • Botnet detection
  • Intrusion detection and response
  • Malware identification
  • Data anonymization/de-anonymization
  • User authentication
  • Big data analytics for security

Security-related AI problems

  • Distributed inference and decision making for security
  • Secure multiparty computation and cryptographic approaches
  • Privacy-preserving data mining
  • Adaptive side-channel attacks
  • Design and analysis of CAPTCHA
  • AI approaches to trust and reputation
  • Content-driven security policy management & access control
  • Vulnerability testing through intelligent probing (e.g. fuzzing)
  • Techniques and methods for generating training and test sets
  • Anomalous behavior detection

Co-located Six Conferences

  • The 4th 2018 IEEE Smart World Congress (SmartWorld 2018)
  • The 15th IEEE Int'l Conf. on Ubiquitous Intelligence and Computing (UIC 2018)
  • The 18th IEEE Int'l Conf. on Scalable Computing & Communications (ScalCom 2018)
  • The 4th IEEE Int'l Conf. on Cloud and Big Data Computing (CBDCom 2018)
  • The 4th IEEE Int'l Conf. on Internet of People (IoP 2018)
  • The 2nd IEEE Int'l Conf. on Smart City Innovations (SCI 2018)



Copyright ATC-2018. Created and Maintained by ATC-2018 Web Team.

my widget for counting
MyVisits Counter