1st Keynote Speaker
Prof. Bhavani Thuraisingham
The University of Texas at Dallas, USA
Title: SecAI: Integrating Cyber Security and Artificial Intelligence
Abstract: Artificial Intelligence (AI) emerged as a field of study in Computer Science in the late 1950s. Researchers were interested in designing and developing systems that could behave like humans. This interest resulted in substantial developments in areas such as expert systems, machine learning, planning systems, reasoning systems and robotics. However, it is only recently that these AI systems are being used in practical applications in various fields such as medicine, finance, marketing, defense, and manufacturing. The main reason behind the success of these AI systems is due to the developments in data science and high-performance computing. For example, it is now possible collect, store, manipulate, analyze and retain massive amounts of data and therefore the AI systems are now able to learn patterns from this data and make useful predictions. While AI has been evolving as a field during the past sixty years, the developments in computing systems and data management systems have resulted in serious security and privacy considerations. Various regulations are being proposed to handle big data so that the privacy of the individuals is not violated. For example, even if personally identifiable information is removed from the data, when data is combined with other data, an individual can be identified. Furthermore, the computing systems are being attacked by malware resulting in disastrous consequences. In order words, as progress is being made with technology, the security of these technologies is in serious question due to the malicious attacks. Over the decade, AI and Security are being integrated. For example, machine learning techniques are being applied to solve security problems such as malware analysis, intrusion detection and insider threat detection. However, there is also a major concern that the machine learning techniques themselves could be attacked. Therefore, the machine leading techniques are being adapted to handle adversarial attacks. This area is known as adversarial machine learning. Furthermore, while collecting massive amounts of data causes security and privacy concerns, big data analytics applications in cyber security is exploding. For example, an organization can outsource activities such as identity management, intrusion detection and malware analysis to the cloud. While AI techniques are being applied to solve cyber security problems, the AI systems have to be protected. For example, how can the machine learning systems be protected from the attacks? What are the threats to the planning systems? How can expert system carry out their functions in the midst of malware attacks? What are the appropriate access control models for AI systems? How can we develop appropriate security policies for AI systems? These are questions that researchers are beginning to provide answers to. To assess the developments on the integration of AI and Security over the past decade and to determine future directions, the presentation will focus on two major questions: (i) how can the developments in AI techniques be used to solve security problems and (ii) how can we ensure that the AI systems are secure and (iii) what are the security and privacy considerations for AI systems. Second, it will describe the application of AI including machine learning for cyber security applications such as insider threat detection. Third, it will discuss the trends in areas such as adversarial machine learning that take into consideration the attacker’s behavior in developing machine learning techniques. Fourth, it will discuss some emerging trends in carrying out trustworthy AI so that the AI techniques can be secured against malicious attacks. Fifth, it will focus on the privacy threats due to the collection of massive amounts of data and potential solutions. Finally, it will discuss the next steps.
Bio: Dr. Bhavani Thuraisingham is the Founders Chaired Professor of Computer Science and the Executive Director of the Cyber Security Research and Education Institute at the University of Texas at Dallas. She is also a visiting Senior Research Fellow at Kings College, University of London and a Fellow of the ACM, IEEE, the AAAS, the NAI and the BCS. She has received several awards including the IEEE CS 1997 Technical Achievement Award, ACM SIGSAC 2010 Outstanding Contributions Award, and the ACM SACMAT 10 Year Test of Time Awards for 2018 and2019. She co-chaired the Women in Cyber Security Conference (WiCyS) in 2016 and delivered the featured address at the 2018 Women in Data Science (WiDS) at Stanford University and has chaired several conferences for ACM and IEEE. Her 39 years career included industry (Honeywell), federal laboratory (MITRE), US government (NSF) and US Academia. Her work has resulted in 130+ journal articles, 300+ conference papers, 140+ keynote and featured addresses, six US patents, fifteen books as well as technology transfer of the research to commercial and operational systems. She received her PhD from the University of Wales, Swansea, UK, and the prestigious earned higher doctorate (D. Eng) from the University of Bristol, UK.
2nd Keynote Speaker
Prof. Meikang Qiu
Columbia University, USA
Title: Artificial Intelligence and Cyber Security
Abstract: This talk will first illustrate AI: machines mimic “cognitive” functions of human minds, such as “learning” and “problem solving”. Then the AI techniques will be applied to enhance cyber security of various systems. For example, there are two main issues in current V2X (Vehicle-to-Everything) communication system. First: Security and privacy protection needs to be seriously enhanced. Second: latency is especially important in V2X. In this talk, we will discuss about reinforcement learning and deep learning for protecting the security of V2X system while reducing the latency. Examples and experimental results will be given to show how to provide AI-enhanced security schemes
Bio: Meikang Qiu received the BE and ME degrees from Shanghai Jiao Tong University and received Ph.D. degree of Computer Science from University of Texas at Dallas. He is an adjunct professor at Columbia University. He is an IEEE Senior member and ACM Senior member. He is the Chair of IEEE Smart Computing Technical Committee. His research interests include Cyber Security, Big Data Analysis, Cloud Computing, Smarting Computing, Intelligent Data, Embedded systems, etc. A lot of novel results have been produced and most of them have already been reported to research community through high-quality journal and conference papers. He has published 20+ books, 500+ peer-reviewed journal and conference papers (including 240+ journal articles, 260+ conference papers, 70+ IEEE/ACM Transactions papers). His paper published in IEEE Transactions on Computers about privacy protection for smart phones has been selected as a Highly Cited Paper in 2017 to 2019. His paper about embedded system security published in Journal of Computer and System Science (Elsevier) have been recognized as Highly Cited Papers in both 2016 to 2019. His paper about data allocation for hybrid memory has been published in IEEE Transactions on Computers has been selected as hot paper (1 in 1000 papers) in 2017. His paper on Tele-health system has won IEEE Systems Journal 2018 Best Paper Award. He also won ACM Transactions on Design Automation of Electrical Systems (TODAES) 2011 Best Paper Award. He has won another 10+ Conference Best Paper Awards in recent years. He is/was an Associate Editor of 10+ international journals, including IEEE Transactions on Computers and IEEE Transactions on Cloud Computing. He has served as leading guest editor for IEEE Transactions on Dependable and Secure Computing (TDSC), special issue on Social Network Security. He is the General Chair/Program Chair of a dozen of IEEE/ACM international conferences, such as IEEE TrustCom, IEEE BigDataSecurity, IEEE CSCloud, and IEEE HPCC. He has won Navy Summer Faculty Award in 2012 and Air Force Summer Faculty Award in 2009. His research is supported by US government such as NSF, NSA, Air Force, Navy and companies such as GE, Nokia, TCL, and Cavium.