5th IEEE International Conference on Data Science in Cyberspace (IEEE DSC 2020)
27-29 July 2020
Hong Kong, China
Call for Workshop Papers: Vulnerability Analysis and Adversarial Learning (VAAL)

Scope:

Welcome to VAAL 2020, the 3rd workshop on Vulnerability Analysis and Adversarial Learning. The workshop focuses on vulnerability analysis of information systems, especially intelligent systems. Furthermore, we follow closely how these vulnerabilities being used, i.e. attack and defense toward intelligent systems/models.

 

Traditionally, vulnerabilities come from unreasonable software design, non-standard programming and etc. Recently, advance of vulnerability analysis in intelligent systems, especially in machine learning algorithms, get more and more attention.

 

Vulnerabilities of machine learning algorithms or models are the foundation of Adversarial Learning, which is a novel research area that lies at the intersection of machine learning and computer security. It aims at gaining a deeper understanding of the security properties of current machine learning algorithms against carefully targeted attacks, and at developing suitable countermeasure for the design of more secure learning algorithm.

 

Research on vulnerability analysis and adversarial learning have got increasing research attention in recent years. And thus, we launched the third workshop on VAAL. This workshop aims to increase potential collaborations and partnerships by bring together academic researchers and industry practitioners from information system vulnerability analysis and adversarial learning with the objectives to present updated research efforts and progresses on foundational and emerging topics of VAAL, exchange new ideas and identify future research directions.

Relevance:

Vulnerability analysis is a very important aspect of ensuring the security of information systems. Adversarial learning is inseparable from vulnerability analysis of machine learning algorithms. Therefore, to improve the security of information systems, especially intelligent systems, it is meaningful to take vulnerability analysis and adversarial learning as a whole.

 

Holding the VAAL 2020 workshop in conjunction with the IEEE-DSC 2020 will give an impetus to the development of cyberspace security technologies include vulnerability detection and analysis. VAAL 2020 also expects to promote the intelligent system vulnerability analysis technologies and adversarial learning algorithms.

 

This workshop, held in conjunction with the IEEE-DSC 2020 conference, will contribute to conference by assembling active researchers in a wide range of disciplines (vulnerability analysis, machine learning, software security and adversarial learning) to share their experiences on addressing various aspects of current challenges in VAAL.

Workshop Areas:

Suggest topics in VAAL include but not limited to:
  1. Information system vulnerability analysis
  2. Vulnerability analysis theory and method
  3. Vulnerability mechanism model and pattern
  4. Machine learning for vulnerability analysis
  5. Vulnerability analysis on AI
  6. Formal theory for adversarial leaning
  7. Evaluation metrics for adversarial learning
  8. Cybersecurity Dynamics
  9. Quantitative Risk Management for Information System
  10. Adversarial Learning for Cybersecurity

Important Dates:

  • Full paper due: May 17, 2020
  • Acceptance notification: June 23, 2020
  • Camera-ready copy: July 5, 2020
  • Conference: July 27-29, 2020

Submission:

All submissions should be written in English and submitted via our submission system: https://cmt3.research.microsoft.com/VAAL2020. A paper submitted to VAAL 2020 cannot be under review for any other conference or journal during the entire period that it is considered for VAAL 2020, and must be substantially different from any previously published work. Submissions are reviewed in a single-blind manner. Please note that all submissions must strictly adhere to the IEEE templates as provided at http://www.ieee-dsc.org/2020/submission.html. The templates also act as a guideline regarding formatting. In particular, all submissions must use either the LATEX template or the MS-Word template. Please follow exactly the instructions below to ensure that your submission can ultimately be included in the proceedings.

Organization:

General Chairs:

Xiaohui Kuang, National Key Laboratory of Science and Technology on Information System Security, China
Zhi Wang, Nankai University, China

 

Workshop Co-Chairs:

Hu Li, National Key Laboratory of Science and Technology on Information System Security, China
Yuanping Nie, National Key Laboratory of Science and Technology on Information System Security, China

 

Program Committee:

Hongliang Lu, National University of Defense Technology
Ye Wang, National University of Defense Technology
Yue Yu, National University of Defense Technology
Ming Zhang, National Key Laboratory of Science and Technology on Information System Security
Zhechao Lin, National Key Laboratory of Science and Technology on Information System Security
Zhaojun Gu, Civil Aviation University of China
Jian Zhang, Nankai University
Yujun Zhang, Institute of Computing Technology, Chinese Academy of Sciences
Zheli Liu, Nankai University
Lei Zhao, Wuhan University
Chunbo Liu, Civil Aviation University of China
Meining Nie, QiAnXin Technology Research Institute
Zhi Liu, Southwest Petroleum University

Sponsors

IEEE

PolyU