{"id":"https://openalex.org/W2536486318","doi":"https://doi.org/10.1145/2976749.2990479","title":"9th International Workshop on Artificial Intelligence and Security","display_name":"9th International Workshop on Artificial Intelligence and Security","publication_year":2016,"publication_date":"2016-10-24","ids":{"openalex":"https://openalex.org/W2536486318","doi":"https://doi.org/10.1145/2976749.2990479","mag":"2536486318"},"language":"en","primary_location":{"id":"doi:10.1145/2976749.2990479","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2976749.2990479","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006608692","display_name":"David Freeman","orcid":"https://orcid.org/0000-0002-1346-5259"},"institutions":[{"id":"https://openalex.org/I1316064682","display_name":"LinkedIn (United States)","ror":"https://ror.org/02fyxhe35","country_code":"US","type":"company","lineage":["https://openalex.org/I1290206253","https://openalex.org/I1316064682"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"David Mandell Freeman","raw_affiliation_strings":["LinkedIn Corporation, Mountain View, CA, USA"],"affiliations":[{"raw_affiliation_string":"LinkedIn Corporation, Mountain View, CA, USA","institution_ids":["https://openalex.org/I1316064682"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035190728","display_name":"Aikaterini Mitrokotsa","orcid":"https://orcid.org/0000-0002-7073-0258"},"institutions":[{"id":"https://openalex.org/I66862912","display_name":"Chalmers University of Technology","ror":"https://ror.org/040wg7k59","country_code":"SE","type":"education","lineage":["https://openalex.org/I66862912"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Katerina Mitrokotsa","raw_affiliation_strings":["Chalmers University of Technology, Gothenburg, Sweden"],"affiliations":[{"raw_affiliation_string":"Chalmers University of Technology, Gothenburg, Sweden","institution_ids":["https://openalex.org/I66862912"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074575821","display_name":"Arunesh Sinha","orcid":"https://orcid.org/0000-0002-3594-3848"},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan\u2013Ann Arbor","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Arunesh Sinha","raw_affiliation_strings":["University of Michigan, Ann Arbor, MI, USA"],"affiliations":[{"raw_affiliation_string":"University of Michigan, Ann Arbor, MI, USA","institution_ids":["https://openalex.org/I27837315"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5006608692"],"corresponding_institution_ids":["https://openalex.org/I1316064682"],"apc_list":null,"apc_paid":null,"fwci":0.2895,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.64348856,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1881","last_page":"1881"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9693999886512756,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9527999758720398,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7152612209320068},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.6982731819152832},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.5683147311210632},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.49118539690971375},{"id":"https://openalex.org/keywords/situation-awareness","display_name":"Situation awareness","score":0.4807322025299072},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4760189652442932},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.44703546166419983},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3237028121948242},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.32125288248062134},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.15155312418937683}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7152612209320068},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.6982731819152832},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.5683147311210632},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.49118539690971375},{"id":"https://openalex.org/C145804949","wikidata":"https://www.wikidata.org/wiki/Q478123","display_name":"Situation awareness","level":2,"score":0.4807322025299072},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4760189652442932},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.44703546166419983},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3237028121948242},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.32125288248062134},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.15155312418937683},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/2976749.2990479","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2976749.2990479","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:research.chalmers.se:248391","is_oa":false,"landing_page_url":"https://research.chalmers.se/en/publication/248391","pdf_url":null,"source":{"id":"https://openalex.org/S4306402469","display_name":"Chalmers Research (Chalmers University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I66862912","host_organization_name":"Chalmers University of Technology","host_organization_lineage":["https://openalex.org/I66862912"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6700000166893005}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4390608645","https://openalex.org/W4247566972","https://openalex.org/W4394895745","https://openalex.org/W2960264696","https://openalex.org/W3090563135","https://openalex.org/W2497432351","https://openalex.org/W4206777497","https://openalex.org/W2910064364","https://openalex.org/W4200136508","https://openalex.org/W2499527417"],"abstract_inverted_index":{"Artificial":[0],"Intelligence":[1],"(AI)":[2],"and":[3,13,44,125,177,191,203,208],"Machine":[4],"Learning":[5],"(ML)":[6],"provide":[7],"a":[8,127,183],"set":[9],"of":[10,24,86,130,148,158],"useful":[11],"analytic":[12],"decision-making":[14],"techniques":[15,40,48],"that":[16],"are":[17,67,91,166,205],"being":[18],"leveraged":[19],"by":[20],"an":[21,156],"ever-growing":[22],"community":[23,55,76],"practitioners,":[25],"including":[26],"many":[27,119],"whose":[28],"applications":[29],"have":[30,117],"security-sensitive":[31],"elements.":[32],"However,":[33],"while":[34],"security":[35,63,192],"researchers":[36,46],"often":[37],"utilize":[38],"such":[39],"to":[41,59,212],"address":[42,213],"problems":[43,110,216],"AI/ML":[45,65],"develop":[47],"for":[49,122,144,169,217],"Big":[50,195,214],"Data":[51,215],"analytics":[52],"applications,":[53],"neither":[54],"devotes":[56],"much":[57],"attention":[58],"the":[60,74,79,84,141,161],"other.":[61],"Within":[62],"research,":[64],"components":[66],"usually":[68],"regarded":[69],"as":[70,133],"black-box":[71],"solvers.":[72],"Conversely,":[73],"learning":[75,163,210],"seldom":[77],"considers":[78],"security/privacy":[80],"implications":[81],"entailed":[82],"in":[83,114,186],"application":[85],"their":[87,218],"algorithms":[88],"when":[89],"they":[90],"designing":[92],"them.":[93],"While":[94],"these":[95,104],"two":[96,105],"communities":[97,124],"generally":[98],"focus":[99],"on":[100],"different":[101],"directions,":[102],"where":[103],"fields":[106],"do":[107],"meet,":[108],"interesting":[109],"appear.":[111],"Researchers":[112],"working":[113],"this":[115,145,170],"intersection":[116],"raised":[118],"novel":[120],"questions":[121],"both":[123],"created":[126],"new":[128],"branch":[129],"research":[131],"known":[132],"secure":[134],"learning.":[135],"The":[136],"AISec":[137],"workshop":[138],"has":[139,154],"become":[140],"primary":[142],"venue":[143],"unique":[146],"fusion":[147],"research.":[149],"In":[150],"recent":[151],"years,":[152],"there":[153],"been":[155],"increase":[157],"activity":[159],"within":[160],"AISec/secure":[162],"community.":[164],"There":[165],"several":[167],"reasons":[168],"surge.":[171],"Firstly,":[172],"machine":[173],"learning,":[174],"data":[175],"mining,":[176],"other":[178],"artificial":[179],"intelligence":[180,193],"technologies":[181,211],"play":[182],"key":[184],"role":[185],"extracting":[187],"knowledge,":[188],"situational":[189],"awareness,":[190],"from":[194],"Data.":[196],"Secondly,":[197],"companies":[198],"like":[199],"Google,":[200],"Facebook,":[201],"Amazon,":[202],"Splunk":[204],"increasingly":[206],"exploring":[207],"deploying":[209],"customers.":[219]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
