Home | Registration | Program | Directions |
Title: TBD |
|
Qiang Hu, Tianjin University | |
Abstract: TBD Dr. He is an Associate Professor at Tianjin University. Previously, he was a Postdoctoral Researcher at the University of Tokyo, working with Prof. Lei Ma. He received his Ph.D. degree from the University of Luxembourg, advised by Prof. Yves Le Traon, Prof. Mike Papadakis, and Prof. Maxime Cordy. Before that, he received his Master’s degree from Kyushu University, advised by Prof. Jianjun Zhao. |
![]() |
Title: TBD |
|
Yaowen Zheng, Chinese Academy of Sciences | |
Abstract: TBD bio |
![]() |
Title: TBD |
|
Imtiaz Karim, The University of Texas at Dallas | |
Abstract: . Dr. Imtiaz is an Assistant Professor in the Department of Computer Science at the University of Texas at Dallas. Previously, he was a Postdoctoral Researcher in the Department of Computer Science at Purdue University. He completed his Ph.D. from the same department in Spring 2023. He leads the System and Network Security (SysNetS) lab at UTD. His research lies in the general area of systems and network security. More specifically, his focus is on ensuring the security and privacy of wireless communication protocols (e.g., cellular networks—4G/5G, Bluetooth, VoWiFi, vehicular, WiFi, and IoT) with respect to their design and implementation. His research aims to develop tools that systematically analyze real-world systems and widely used protocols using AI (ML and NLP), formal verification, program analysis, and software testing techniques. Furthermore, with the advent of the next generation of networks (6G and beyond), his future goal is to ensure the resilience (reliability, adaptability, and security) of future network generations and to develop protocols and systems that are robust and secure by design. |
![]() |
In the past decades, cybersecurity threats have been among the most significant challenges for social development resulting in financial loss, violation of privacy, damages to infrastructures, etc. Organizations, governments, and cyber practitioners tend to leverage state-of-the-art Artificial Intelligence technologies to analyze, prevent, and protect their data and services against cyber threats and attacks. Due to the complexity and heterogeneity of security systems, cybersecurity researchers and practitioners have shown increasing interest in applying data mining methods to mitigate cyber risks in many security areas, such as malware detection and essential player identification in an underground forum. To protect the cyber world, we need more effective and efficient algorithms and tools capable of automatically and intelligently analyzing and classifying the massive amount of data in cybersecurity complex scenarios. This workshop will focus on empirical findings, methodological papers, and theoretical and conceptual insights related to data mining in the field of cybersecurity.
The workshop aims to bring together researchers from cybersecurity, data mining, and machine learning domains. We encourage a lively exchange of ideas and perceptions through the workshop, focused on cybersecurity and data mining. Topics of interest include, but are not limited to:
![]() |
![]() |
![]() |
Ali Babar University of Adelaide |
Battista Biggio University of Cagliari |
Elisa Bertino Purdue University |
![]() |
![]() |
![]() |
Hsinchun Chen University of Arizona |
Yang Liu Nanyang Technological University |
Xinming (Simon) Ou University of South Florida |
![]() |
![]() |
![]() |
Sin Gee Teo Institute for Infocomm Research |
RuiTao Feng Singapore Management University |
Reza Ebrahimi University of South Florida |
![]() |
![]() |
Rouzbeh Behnia University of South Florida |
Xiaojun Jia Nanyang Technological University |
![]() |
![]() |
![]() |
Yidong Chai Hefei University |
Huijing Zhan Singapore University of Social Sciences |
Ruofan Liu National University of Singapore |