Abstract is missing.
- Session details: Keynote AddressSadia Afroz. [doi]
- Session details: AI for Detecting Software VulnerabilitiesAsaf Shabtai. [doi]
- Session details: AI for ForensicsYuval Elovici. [doi]
- Session details: AI for Detecting AttacksAsaf Shabtai. [doi]
- Session details: AI Security / Adversarial Machine LearningBattista Biggio. [doi]
- A Marauder's Map of Security and Privacy in Machine Learning: An overview of current and future research directions for making machine learning secure and privateNicolas Papernot. 1 [doi]
- All You Need is: Evading Hate Speech DetectionTommi Gröndahl, Luca Pajola, Mika Juuti, Mauro Conti, N. Asokan. 2-12 [doi]
- Towards Query Efficient Black-box Attacks: An Input-free PerspectiveYali Du, Meng Fang, Jinfeng Yi, Jun Cheng, Dacheng Tao. 13-24 [doi]
- Stochastic Substitute Training: A Gray-box Approach to Craft Adversarial Examples Against Gradient Obfuscation DefensesMohammad Hashemi, Greg Cusack, Eric Keller. 25-36 [doi]
- Adaptive Grey-Box Fuzz-Testing with Thompson SamplingSiddharth Karamcheti, Gideon Mann, David Rosenberg. 37-47 [doi]
- Toward Smarter Vulnerability Discovery Using Machine LearningGustavo Grieco, Artem Dinaburg. 48-56 [doi]
- FeatNet: Large-scale Fraud Device Detection by Network Representation Learning with Rich FeaturesChao Xu, Zhentan Feng, Yizheng Chen, Minghua Wang, Tao Wei. 57-63 [doi]
- Hunting Malicious TLS Certificates with Deep Neural NetworksIvan Torroledo, Luis David Camacho, Alejandro Correa Bahnsen. 64-73 [doi]
- Integration of Static and Dynamic Code Stylometry Analysis for Programmer De-anonymizationNingfei Wang, Shouling Ji, Ting Wang. 74-84 [doi]
- Towards Evaluating the Security of Real-World Deployed Image CAPTCHAsBinbin Zhao, Haiqin Weng, Shouling Ji, Jianhai Chen, Ting Wang, Qinming He, Reheem Beyah. 85-96 [doi]