Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3643651acmconferencesBook PagePublication PagescodaspyConference Proceedingsconference-collections
IWSPA '24: Proceedings of the 10th ACM International Workshop on Security and Privacy Analytics
ACM2024 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CODASPY '24: Fourteenth ACM Conference on Data and Application Security and Privacy Porto Portugal 21 June 2024
ISBN:
979-8-4007-0556-4
Published:
19 June 2024
Sponsors:

Bibliometrics
Skip Abstract Section
Abstract

It is our great pleasure to welcome you to the 2024 ACM International Workshop on Security and Privacy Analytics - IWSPA 2024. This year's workshop is the tenth in the series and co-hosted with the Fourteenth ACM Annual Conference on Data and Applications Security and Privacy (CODASPY 2024).

IWSPA addresses important research topics associated with the application of data analytics tools and techniques (including statistical, machine/deep learning, data mining, and natural language processing) to challenges that arise with security and privacy preservation. IWSPA provides a forum for the interaction between researchers in these areas, identifying and pursuing new topics that arise in the intersection between the fields of Artificial Intelligence and Cybersecurity.

Skip Table Of Content Section
SESSION: Keynote Talk
keynote
Modeling and Security Analysis of Attacks on Machine Learning Systems

The past several years have witnessed rapidly increasing use of machine learning (ML) systems in multiple industry sectors. Since security analysis is one of the most essential parts of the real-world ML system protection practice, there is an urgent ...

SESSION: Session 1: Privacy I
research-article
Open Access
Transformer-based Language Models and Homomorphic Encryption: An Intersection with BERT-tiny

In recent years, emerging and improved Natural Language Processing (NLP) models, such as Bidirectional Encoder Representations from Transformers (BERT), have gained significant attention due to their performance on several natural language tasks. However,...

research-article
Open Access
Legally Binding but Unfair? Towards Assessing Fairness of Privacy Policies

Privacy policies are expected to inform data subjects about their data protection rights and should explain the data controller's data management practices. Privacy policies only fulfill their purpose, if they are correctly interpreted, understood, and ...

research-article
Open Access
1-Diffractor: Efficient and Utility-Preserving Text Obfuscation Leveraging Word-Level Metric Differential Privacy

The study of privacy-preserving Natural Language Processing (NLP) has gained rising attention in recent years. One promising avenue studies the integration of Differential Privacy in NLP, which has brought about innovative methods in a variety of ...

SESSION: Session 2: Fake Audio (Tutorial)
abstract
Review of Existing Methods for Generating and Detecting Fake and Partially Fake Audio

Using deep-learning technologies, both text-to-speech (TTS) and voice conversion (VC) methods can generate fake speech effectively, making it challenging to differentiate between real and fake speech. Accordingly, researchers have employed deepfake ...

SESSION: Session 3: Attacks and Vulnerabilities
research-article
Best Paper
Best Paper
LLMs for Explainable Few-shot Deception Detection

This study investigates the effectiveness of Large Language Models (LLMs) in detecting deception using a Retrieval Augmented Generation (RAG) framework for few-shot learning in domain-agnostic settings. Our approach combines the sophisticated reasoning ...

research-article
Open Access
Evaluating Large Language Models for Real-World Vulnerability Repair in C/C++ Code

The advent of Large Language Models (LLMs) has enabled advancement in automated code generation, translation, and summarization. Despite their promise, evaluating the use of LLMs in repairing real-world code vulnerabilities remains underexplored. In this ...

research-article
Open Access
Domain Independent Deception Detection: Feature Sets, LIWC Efficacy, and Synthetic Data Challenges

Deception is increasingly prevalent in the modern world, appearing in many different forms (domains) from phishing emails to fictitious product reviews, or even false political statements. Many researchers are looking for ways to identify deception ...

SESSION: Session 4: Privacy II (Tutorial and Short Paper)
abstract
Privacy-Enhancing Technologies for AI Systems: A Tutorial

This tutorial presents privacy threats to artificially intelligent (AI) systems and proposes the use of several privacy-enhancing technologies (PETs) to address them. Such threats can affect both model owners and system users, be internal or external to ...

short-paper
Machine Learning Training on Encrypted Data with TFHE

We present an approach for outsourcing the training of machine learning (ML) models while preserving data confidentiality from malicious parties. We use fully homomorphic encryption (FHE) to build a unified training framework that works on encrypted data ...

Contributors
  • University of Houston

Recommendations

Acceptance Rates

Overall Acceptance Rate 18 of 58 submissions, 31%
YearSubmittedAcceptedRate
IWSPA '1811436%
IWSPA '1714429%
IWSPA '1620630%
IWSPA '1513431%
Overall581831%