Welcome
to the 1ˢᵗ Huawei Innovation Workshop on Artificial Intelligence for Cyber-Security.
Livestream will start in
88
88
88
88
Days
Hours
Minutes
Seconds
Note: The video on this page is a copy for playback in Mainland China. If possible, please use the original video link on this site instead.
External Links:
Full Agenda
Speakers
Networking Corner
Workshop Website
Time (CEST) | Talk |
---|---|
9:00 - 9:05 | Welcome |
9:05 - 9:10 | Opening Remarks Ma Ye (President Security and Gateway Department, Huawei) |
Session 1 | |
9:10 - 9:50 | Intriguing Properties of Adversarial ML Attacks in the Problem Space Lorenzo Cavallaro (King's College London) |
9:50 - 10:30 | Can you trust your GNN? -- Certifiable Robustness of Machine Learning Models for Graphs Stephan Günnemann (TUM Informatik) |
10:30 - 10:40 | Break |
Session 2 | |
10:40 - 11:20 | Adversarial Preprocessing: Image-Scaling Attacks in Machine Learning Konrad Rieck and Erwin Quiring (TU Braunschweig) |
11:20 - 12:00 | Phishpedia: A Hybrid Deep Learning Based Approach to Visually Identify Phishing Webpages Lin Yun (SoC, National University of Singapore) |
12:00 - 12:40 | Lunch Break |
Session 3 | |
12:40 - 13:20 | Large-Scale Modelling of TLS-based Servers in the Internet Georg Carle (Technical University of Munich) |
13:20 - 14:00 | AI-Based Cybersecurity for Autonomous Vehicles - Detecting Network Level Attacks on LiDAR Sensor Data Girish Revadigar (Trustworthiness Technology Lab, HUAWEI Singapore Research Center) |
14:00 - 14:10 | Break |
Session 4 | |
14:10 - 14:50 | Machine Learning (for) Security: Lessons Learned and Future Challenges Battista Biggio (University of Cagliari) |
14:50 - 15:30 | The Security of Machine Learning in 5G Network Infrastructures Giovanni Apruzzese (University of Liechtenstein) |
15:30 - 15:40 | Break |
Session 5 | |
15:40 - 16:00 | Fake identity detection in speech data Nicolas Müller (Fraunhofer AISEC) |
16:00 - 16:20 | Adversarial EXEmples: Functionality-preserving Optimization of Adversarial Windows Malware Luca Demetrio (University of Cagliari) |
16:20 - 16:40 | Detection of illicit cryptomining using network metadata Michele Russo (Huawei MRC, AI4Sec) |
16:40 - 17:00 | Concluding Remarks |