[AISWorld] [Submission Deadline 06/15/24] HICSS-58: Collaborative AI, LLMs, & Cybersecurity - Cybersecurity in the Age of Artificial Intelligence, AI for Cybersecurity, and Cybersecurity for AI

Hongyi Zhu hongyi.zhu at utsa.edu
Tue Jun 11 02:39:16 EDT 2024


HICSS-58 Mini-Track Call for Papers
Collaborative AI, LLMs, & Cybersecurity - Cybersecurity in the Age of Artificial Intelligence, AI for Cybersecurity, and Cybersecurity for AI

Track:   Collaboration Systems and Technologies<https://hicss.hawaii.edu/tracks-58/collaboration-systems-and-technologies/#cybersecurity-in-the-age-of-artificial-intelligence-ai-for-cybersecurity-and-cybersecurity-for-ai-minitrack>

***Submission Deadline: June 15th, 2024 ***

Submission Link: https://hicss-submissions.org/submissions/new
Conference Site: https://hicss.hawaii.edu/
Mini-Track Site: http://www.azsecure-hicss.org/home.html


Topics and research areas can include, but are not limited to:
+ Novel applications of Artificial Intelligence, Machine Learning, LLMs, and Deep Learning in Cybersecurity as they pertain to multi-user/multi-organizational collaborative domains and/or systems.
+ Adversarial AI Applications in Cybersecurity that collaboratively span organizations or apply to collaborative systems (i.e., malware, phishing, LLMs, or any applicable threat/identification domain).
+ Protecting AI that is used collaboratively (i.e., LLMs, shared data sets, shared models, shared applications) or spans collaborative domains from cybersecurity threats (i.e., adversarial examples, trojans, model inversion).
+ Using AI to protect AI in any appropriate wide-reaching setting.
+ Novel Collaboration approaches to leveraging and protecting AI in the cybersecurity domain.
+ Sharing/disseminating tools, techniques, and applications of AI in Cybersecurity and Cybersecurity for AI that apply to the overarching theme of this mini-track.

Examples:
+ Modern LLM's: Results Integrity, Prompt Security, Prompt Attach Detection, Result Error Detection, Dangerous Output Detection, Hallucination Detection, Prompt Jailbreaking.
+ Cybersecurity Domain Data Analytics: Leveraging AI to analyze any of the myriad datasets in the cybersecurity domain such as log files, network traffic, data at rest, etc., for legitimate cybersecurity purposes.
+ Vulnerability Assessment: Scanning Code for Vulnerabilities using AI / LLMS; Tracking and identifying / labeling code, containers, or repositories based on their vulnerabilities and/or vulnerability persistence over time and forks.
+ Secure Coding: Securing existing code or automatically generating new secure code either from scratch or by generating secure code clones.
+ Remediation: Effectively and efficiently identifying appropriate remediations for detected vulnerabilities from the large amounts of existing data.
+ Model Security for AI and LLM Models: Identifying models that have been perturbed, perturbing models to create model perturbation detection technologies, detecting the effect of model perturbations, identifying bias in models, identifying errors in models, removing perturbations from models.
+ Security for AI and LLM Datasets: Insuring distributed dataset integrity, detecting perturbations in datasets, identifying the effects of dataset perturbations, removing perturbations from datasets.
+ Attack Detection: Analyzing real-time data streams to identify immediate attacks as they occur.

Name, affiliation, and contact information of Mini-Track Chairs:
Hsinchun Chen
UA Regents' Professor of MIS
Management Information Systems
University of Arizona
hsinchun at email.arizona.edu<mailto:hsinchun at email.arizona.edu>

Mark Patton (Primary Contact)
Lecturer Management Information Systems
University of Arizona
mpatton at email.arizon.edu<mailto:mpatton at email.arizon.edu>

Sagar Samtani
Assistant Professor and Weimer Faculty Fellow
Department of Operations and Decision Technologies
Indiana University
ssamtani at iu.edu<mailto:ssamtani at iu.edu>

Hongyi Zhu
Assistant Professor
Department of Information Systems and Cyber Security
Alvarez College of Business
University of Texas at San Antonio
hongyi.zhu at utsa.edu<mailto:hongyi.zhu at utsa.edu>

Hongyi Zhu
Assistant Professor
The University of Texas at San Antonio
Carlos Alvarez College of Business
hongyi.zhu at utsa.edu<mailto:hongyi.zhu at utsa.edu>
NPB 3.138E02
One UTSA Circle,
San Antonio, TX 78249-3209
(210) 458-8030

[Creating Bold Futures]<https://bold.utsa.edu/>

-------------- next part --------------
A non-text attachment was scrubbed...
Name: image001.png
Type: image/png
Size: 5373 bytes
Desc: image001.png
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20240611/95bfdea9/attachment.png>


More information about the AISWorld mailing list