Contributed Papers
Learning Security Strategies through Game Play and Optimal Stopping, Kim Hammar (KTH Royal Institute of Technology)*; Rolf Stadler (KTH Royal Institute of Technology)
Adversarial Cheap Talk, Christopher Lu (University of Oxford)*; Timon Willi (University of Oxford); Alistair HP Letcher (None); Jakob Foerster (University of Oxford)
Detecting Anomalies in Encrypted EV Charging Control Protocol Using a Hybrid LSTM Autoencoder-OCSVM Model, Thomas E Carroll (Pacific Northwest National Laboratory)*; Kristine Arthur-Durett (Pacific Northwest National Laboratory); Grace McNally (Pacific Northwest National Laboratory)
CyberEnt: Extracting Domain Specific Entities from Cybersecurity Text, Casey Hanks (UMBC)*; Michael Maiden (UMBC); Priyanka Ranade (UMBC); Tim Finin (UMBC); Anupam Joshi (UMBC)
Developing Optimal Causal Cyber-Defence Agents via Cyber Security Simulation, Alex Andrew (DSTL); Sam Spillard (Alan Turing Institute); Joshua Collyer (DSTL); Neil Dhir (Alan Turing Institute)*
Poster/Spotlight Presentations
A High Fidelity Cybersecurity Dataset for Attack Modeling, Craig Laprade (The George Washington University); Benjamin Bowman (The George Washington University); H. Howie Huang (The George Washington University)*
Low-Loss Subspace Compression for Clean Gains against Multi-Agent Backdoor Attacks, Siddhartha Datta (University of Oxford)*; Nigel Shadbolt (University of Oxford)
Robustness Evaluation of Deep Unsupervised Learning Algorithms for Intrusion Detection Systems, DJeff Kanda Nkashama (Université de Sherbrooke)*; Arian Soltani (University of Sherbrooke); Jean-Charles Verdier (University of Sherbrooke); Marc Frappier (University of Sherbrooke); Pierre Martin Tardif (Université de Sherbrooke); Froduald Kabanza (Université de Sherbrooke)
Fixed Points in Cyber Space: Rethinking Optimal Evasion Attacks in the Age of AI-NIDS, Christian A Schroeder de Witt (University of Oxford)*; Yongchao Huang (University of Oxford); Philip Torr (University of Oxford); Martin Strohmeier (Armasuisse Science + Technology)
ACD-G: Enhancing Autonomous Cyber Defence Agent Generalisation Through Graph Embedded Network Representation, Josh Collyer (Defence Science and Technology Laboratory (DSTL))*
Hypergraph Topological Features for Autoencoder-Based Intrusion Detection for Cybersecurity Data, William Kay (Pacific Northwest National Laboratory)*; Sinan Aksoy (Pacific Northwest National Laboratory); Molly Baird (Pacific Northwest National Laboratory); Daniel Best (Pacific Northwest National Laboratory); Helen K Jenne (Pacific Northwest National Laboratory); Cliff Joslyn (Pacific Northwest National Laboratory); Christopher Potvin (Pacific Northwest National Laboratory); Gregory Henselman-Petrusek (Pacific Northwest National Laboratory); Garret Seppala (Pacific Northwest National Laboratory); Stephen Young (Pacific Northwest National Laboratory); Emilie Purvine (Pacific Northwest National Laboratory)
Exploiting and Defending Against the Approximate Linearity of Apple’s NeuralHash, Kevin Meng (Massachusetts Institute of Technology)*; Jagdeep S Bhatia (MIT)
Reducing Exploitability with Population Based Training, Pavel Czempin (University of California, Berkeley)*; Adam Gleave (University of California, Berkeley)
Using Machine Learning to Infer Plausible and Undetected Cyber Threat, Vulnerability and Mitigation Relationships, Erik Hemberg (CSAIL)*; Ashwin Srinivasan (CSAIL); Nick Rutar (Peraton Labs); Una-May O'Reilly (MIT)
An Artificial Intelligence-Enabled Framework for Optimizing the Dynamic Cyber Vulnerability Management Process, Soumyadeep Hore (University of South Florida); Ankit Shah (University of South Florida)*; Nathaniel D Bastian (United States Military Academy)