<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<style type="text/css" style="display:none;"> P {margin-top:0;margin-bottom:0;} </style>
</head>
<body dir="ltr">
<div dir="ltr">
<div class="x_elementToProof elementToProof" style="font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
Dear colleagues,<br>
</div>
<div class="x_elementToProof elementToProof" style="font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
<div class="elementToProof ContentPasted1"><br>
</div>
<div class="elementToProof ContentPasted1 ContentPasted2">We cordially invite you to submit research work focused on the application of AI in addressing challenges within the realm of Cyber Security to the Workshop on
<b class="x_ContentPasted0 ContentPasted0">Artificial Intelligence for Cyber Security (AICS)</b> at the upcoming AAAI-24 conference in Vancouver, BC, Canada. Kindly refer to the details provided below.<br>
</div>
<div>Thank you.</div>
<div class="elementToProof"><br>
</div>
<div>Sincerely,</div>
<div>Ankit <br>
</div>
</div>
<div class="x_elementToProof elementToProof" style="font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
<br>
</div>
<div class="x_elementToProof x_ContentPasted0" style="font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
<div align="center" style="text-align:center">The AAAI-24 Workshop on<br class="x_ContentPasted0">
</div>
<div align="center" style="text-align:center"><b class="x_ContentPasted0">Artificial Intelligence for Cyber Security (AICS)</b></div>
<div><br class="x_ContentPasted0">
</div>
<div class="x_ContentPasted0">The workshop will focus on the application of artificial intelligence to problems in cyber security. While AI and ML have shown astounding ability to automatically analyze and classify large amounts of data in complex scenarios,
the techniques are not still widely adopted in real world security settings, especially in cyber systems. The workshop will address technologies and their applications in security, such as machine learning, game theory, natural language processing, knowledge
representation, automated and assistive reasoning and human machine interactions.<br class="x_ContentPasted0">
</div>
<div class="x_ContentPasted0"><br class="x_ContentPasted0">
This year the workshop emphasis will be on applications of generative AI, including LLMs, to cybersecurity problems as well as adversarial attacks on such models.<br class="x_ContentPasted0">
<br class="x_ContentPasted0">
In general, AI techniques are still not widely adopted in many real-world cyber security situations. There are many reasons for this including practical constraints (power, memory, etc.), lack of formal guarantees within a practical real-world model, and lack
of meaningful explanations. Moreover, in the face of improved automated systems security (better hardware security, better cryptographic solutions), cyber criminals have amplified their efforts with social attacks such as phishing attacks and spreading misinformation,
some of which are now easier to construct using LLMs and other generative AI techniques. These large-scale attacks are cheap and only need to succeed for a tiny fraction of all attempts to be effective. These lead to a complex cybersecurity battlefield in
which actors that do not adopt the latest advances in security or AI can suffer huge losses. We invite work at the intersection of AI (all AI topics in AAAI) and cybersecurity that help improve the understanding of this complex space.</div>
<div><br class="x_ContentPasted0">
</div>
<div class="x_ContentPasted0">Submission: </div>
<div><a href="https://cmt3.research.microsoft.com/AICS2024/" data-auth="NotApplicable" shash="chvmjOxFPfh2PeEAA9VNcZxyY8BpmebOPvWbLcJvC0km6QFwhT3z1kRBQYLgR7oFjz6hdel3bsJvi7aMBP6l1ryYU79ydtggYtvaFPFgK+zDqF3M0Yjs3NPs9o0LNNRotmrNp58SRCG/GMH3Q5TJD4kjHvumcWabqtB1DF6lnJw=" title="Original URL: https://cmt3.research.microsoft.com/AICS2024/. Click or tap if you trust this link." data-linkindex="1" id="OWAc3bfe075-4282-14f8-aa1d-37886605e51a" class="x_OWAAutoLink x_ContentPasted0">https://cmt3.research.microsoft.com/AICS2024/</a></div>
<div class="x_ContentPasted0 elementToProof">Format:<br class="x_ContentPasted0">
Full-length papers (min of 6 pages, up to overall 8 pages in AAAI format)<br class="x_ContentPasted0">
<br class="x_ContentPasted0">
Submissions are not anonymized. Please submit PDF via the link above by November 30, 2023, AOE.<br class="x_ContentPasted0">
A fast-track for AAAI main conference unloved papers has a later deadline of December 10, 2023, AOE.<br class="x_ContentPasted0">
<br class="x_ContentPasted0">
Topics of interest include, but are not limited to:<br class="x_ContentPasted0">
- Machine learning (including RL) approaches to make cyber systems secure and resilient<br class="x_ContentPasted0">
-- Natural language processing techniques<br class="x_ContentPasted0">
-- Anomaly/Threat detection techniques<br class="x_ContentPasted0">
-- Big Data noise reduction techniques<br class="x_ContentPasted0">
-- Adversarial learning<br class="x_ContentPasted0">
-- Deception in Learning<br class="x_ContentPasted0">
-- Human behavioral modeling, being robust to human errors<br class="x_ContentPasted0">
- Formal reasoning, with focus on human behavior element, in cyber systems<br class="x_ContentPasted0">
- Game Theoretic reasoning in cyber security<br class="x_ContentPasted0">
- Adversarial robust AI metrics<br class="x_ContentPasted0">
- Multi-agent interaction/agent-based modeling in cyber systems<br class="x_ContentPasted0">
- Modeling and simulation of cyber systems and system components<br class="x_ContentPasted0">
- Decision making under uncertainty in cyber systems<br class="x_ContentPasted0">
- Automation of data labeling and ML techniques that learn to learn in security<br class="x_ContentPasted0">
- Quantitative human behavior models with application to cyber security<br class="x_ContentPasted0">
- Operational and commercial applications of AI in security<br class="x_ContentPasted0">
- Explanations of security decisions and vulnerability of explanation techniques<br class="x_ContentPasted0">
- The use of foundation models, e.g., LLM, in cybersecurity.</div>
<div><br class="x_ContentPasted0">
</div>
<div class="x_ContentPasted0">Organizers:<br class="x_ContentPasted0">
James Holt, Laboratory for Physical Sciences, USA<br class="x_ContentPasted0">
Edward Raff, Booz Allen Hamilton, USA<br class="x_ContentPasted0">
Ahmad Ridley, National Security Agency, USA<br class="x_ContentPasted0">
Dennis M. Ross, MIT Lincoln Laboratory, MA, USA<br class="x_ContentPasted0">
Ankit Shah, University of South Florida, USA<br class="x_ContentPasted0">
Arunesh Sinha, Rutgers University, USA<br class="x_ContentPasted0">
Diane P. Staheli, MIT Lincoln Laboratory, MA, USA<br class="x_ContentPasted0">
Allan Wollaber, MIT Lincoln Laboratory, USA<br class="x_ContentPasted0">
</div>
</div>
<div class="x_elementToProof" style="font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
<br>
</div>
<div class="x_elementToProof" style="font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
<div style="font-size:12pt"><span></span>
<div>
<div class="x_ContentPasted0"><span style="background-color: white;"><span>
<p style="margin-top: 0px; margin-bottom: 0px;margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; font-size:11pt; font-family:Calibri,sans-serif; margin:0">
<span class="x_ContentPasted1" style="font-size:12pt">=== </span></p>
</span></span></div>
<div><span style="background-color: white;"><span>
<div>
<p style="margin-top: 0px; margin-bottom: 0px;margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; font-size:11pt; font-family:Calibri,sans-serif; margin:0">
<span class="x_ContentPasted1" style="font-size:12pt">Ankit Shah, Ph.D. <br class="x_ContentPasted1">
</span></p>
<p style="margin-top: 0px; margin-bottom: 0px;margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; font-size:11pt; font-family:Calibri,sans-serif; margin:0">
<span style="font-size:12pt"></span><span data-markjs="true" class="x_ContentPasted1" style="font-size:12pt">Assistant</span><span class="x_ContentPasted1" style="font-size:12pt">
</span><span data-markjs="true" class="x_ContentPasted1" style="font-size:12pt">Professor</span><span class="x_ContentPasted1" style="font-size:12pt">,</span></p>
</div>
<div>
<p style="margin-top: 0px; margin-bottom: 0px;margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; font-size:11pt; font-family:Calibri,sans-serif; margin:0">
<span class="x_ContentPasted1" style="font-size:12pt">Industrial and Management Systems Engineering </span></p>
</div>
<div>
<p style="margin-top: 0px; margin-bottom: 0px;margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; font-size:11pt; font-family:Calibri,sans-serif; margin:0">
<span class="x_ContentPasted1" style="font-size:12pt">University of South Florida
</span></p>
</div>
<div>
<p style="margin-top: 0px; margin-bottom: 0px;margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; margin-top:0px; margin-bottom:0px; font-size:11pt; font-family:Calibri,sans-serif; margin:0">
<span class="x_ContentPasted1" style="font-size:12pt">Tampa, FL<br class="x_ContentPasted1">
</span></p>
</div>
</span></span></div>
</div>
<div><span><span style="background-color: white;"><span><span><span class="x_ContentPasted1">===</span></span></span></span></span><br class="x_ContentPasted1">
</div>
</div>
</div>
</div>
</body>
</html>