{"id":"https://openalex.org/W4244885910","doi":"https://doi.org/10.1145/2808769","title":"Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security","display_name":"Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security","publication_year":2015,"publication_date":"2015-10-06","ids":{"openalex":"https://openalex.org/W4244885910","doi":"https://doi.org/10.1145/2808769"},"language":"en","primary_location":{"id":"doi:10.1145/2808769","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2808769","pdf_url":"https://dl.acm.org/action/showFmPdf?doi=10.1145%2F2808769","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"},"type":"paratext","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/action/showFmPdf?doi=10.1145%2F2808769","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"David Fifield","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"David Fifield","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Cao Xiao","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Cao Xiao","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"; David","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"; David","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Mandell Freeman","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mandell Freeman","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":true,"cited_by_count":14,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":true,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9623000025749207,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/presentation","display_name":"Presentation (obstetrics)","score":0.7024411559104919},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6956088542938232},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5827083587646484},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.49489468336105347},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.49228087067604065},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.46119001507759094},{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.45658889412879944},{"id":"https://openalex.org/keywords/panel-discussion","display_name":"Panel discussion","score":0.4254068434238434},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3358301520347595}],"concepts":[{"id":"https://openalex.org/C2777601897","wikidata":"https://www.wikidata.org/wiki/Q3409113","display_name":"Presentation (obstetrics)","level":2,"score":0.7024411559104919},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6956088542938232},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5827083587646484},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.49489468336105347},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.49228087067604065},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.46119001507759094},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.45658889412879944},{"id":"https://openalex.org/C2781433648","wikidata":"https://www.wikidata.org/wiki/Q2100278","display_name":"Panel discussion","level":2,"score":0.4254068434238434},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3358301520347595},{"id":"https://openalex.org/C112698675","wikidata":"https://www.wikidata.org/wiki/Q37038","display_name":"Advertising","level":1,"score":0.0},{"id":"https://openalex.org/C126838900","wikidata":"https://www.wikidata.org/wiki/Q77604","display_name":"Radiology","level":1,"score":0.0},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2808769","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2808769","pdf_url":"https://dl.acm.org/action/showFmPdf?doi=10.1145%2F2808769","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"}],"best_oa_location":{"id":"doi:10.1145/2808769","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2808769","pdf_url":"https://dl.acm.org/action/showFmPdf?doi=10.1145%2F2808769","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4244885910.pdf","grobid_xml":"https://content.openalex.org/works/W4244885910.grobid-xml"},"referenced_works_count":3,"referenced_works":["https://openalex.org/W1965546748","https://openalex.org/W1978054023","https://openalex.org/W1991473804"],"related_works":["https://openalex.org/W3048732067","https://openalex.org/W4383468834","https://openalex.org/W4384648009","https://openalex.org/W4303645823","https://openalex.org/W2900159906","https://openalex.org/W4283221438","https://openalex.org/W4287828318","https://openalex.org/W2406556600","https://openalex.org/W2899811703","https://openalex.org/W2930249865"],"abstract_inverted_index":{"It":[0],"is":[1,76],"our":[2],"great":[3],"pleasure":[4],"to":[5,8,42,61,77,121,136],"welcome":[6],"you":[7],"the":[9,20,35,81,117,141,181,188],"2015":[10],"ACM":[11,143],"Workshop":[12],"Artificial":[13],"Intelligence":[14],"and":[15,34,66,89,96,145,160],"Security":[16,147],"(AISec":[17],"2015)":[18,149],"--":[19],"eighth":[21],"annual":[22],"workshop":[23,118],"addressing":[24],"technologies":[25],"that":[26],"fuse":[27],"intelligent":[28],"systems":[29],"into":[30],"computer":[31],"security":[32],"applications":[33],"implications":[36],"of":[37,83,103,125],"these":[38,131],"approaches.":[39],"The":[40,73],"papers":[41,175],"be":[43,114,138,194],"presented":[44],"in":[45,70],"this":[46],"year's":[47],"program":[48],"span":[49],"topics":[50],"ranging":[51],"from":[52,157,187],"adversarial":[53,71],"learning,":[54,87],"detecting":[55],"fake":[56],"OSN":[57],"accounts,":[58],"malware":[59],"classification":[60],"privacy":[62,88],"preserving":[63],"data":[64],"processing":[65],"game":[67],"theoretic":[68],"techniques":[69],"learning.":[72],"workshop's":[74],"aim":[75],"advance":[78],"research":[79],"at":[80,169,180],"intersection":[82],"artificial":[84],"intelligence,":[85],"machine":[86],"security.":[90],"In":[91],"particular,":[92],"AISec":[93],"gives":[94],"researchers":[95],"practitioners":[97],"working":[98,129],"within":[99],"one":[100],"or":[101],"more":[102],"those":[104],"fields":[105],"a":[106,122,164,195],"platform":[107],"for":[108,178,204],"interdisciplinary":[109],"discussion,":[110],"which":[111],"would":[112],"otherwise":[113],"lacking.":[115],"Hopefully,":[116],"will":[119,192],"lead":[120],"high":[123],"degree":[124],"cross-pollination":[126],"between":[127],"groups":[128],"across":[130],"areas.":[132],"We":[133],"are":[134],"delighted":[135],"again":[137],"co-located":[139],"with":[140],"premier":[142],"Computer":[144],"Communication":[146],"(CCS":[148],"conference.":[150],"This":[151],"year":[152],"we":[153],"had":[154],"25":[155],"submissions":[156],"Asia,":[158],"Europe":[159],"North":[161],"America.":[162],"After":[163],"rigorous":[165],"reviewing":[166],"process,":[167],"involving":[168],"2-3":[170],"referees":[171],"per":[172],"paper,":[173],"11":[174],"were":[176],"accepted":[177],"presentation":[179],"workshop,":[182],"including":[183],"presentation-only":[184],"papers.":[185],"Apart":[186],"main":[189],"program,":[190],"there":[191],"also":[193],"keynote":[196],"speech":[197],"by":[198],"Pratyusa":[199],"Manadhata":[200],"titled":[201],"\"Machine":[202],"Learning":[203],"Enterprise":[205],"Security\".":[206]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":2}],"updated_date":"2026-01-09T06:25:30.743933","created_date":"2025-10-10T00:00:00"}
