Skip to main content

Currently Skimming:

Appendix A: Workshop Agenda
Pages 73-74

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 73...
... A Workshop Agenda MARCH 12-13, 2019 Day One WORKSHOP INTRODUCTION AND CONTEXT Welcome Fred Chang, Workshop Chair, Southern Methodist University Remarks from Workshop Sponsor Vinh Nguyen, National Security Agency (Representative of the Sponsor) Current and Emerging AI Capabilities and Research Subbarao Kambhampati, Arizona State University ARTIFICIAL INTELLIGENCE AND CYBERSECURITY OPERATIONS Currently Deployed AI/ML Tools for Cyber Defense Operations Moderator: John Manferdelli, Northeastern University Sven Krasser, CrowdStrike Alex Kantchelian, Google Dave Baggett, INKY Adversarial AI for Cybersecurity: R&D and Emerging Areas Moderator: Wenke Lee, Georgia Institute of Technology David Martinez, MIT Lincoln Laboratory Yevgeniy Vorobeychik, Washington University Una-May O'Reilly, Massachusetts Institute of Technology 73
From page 74...
... 74 IMPLICATIONS OF ARTIFICIAL INTELLIGENCE FOR CYBERSECURITY Security Risks of AI-Enabled Systems Moderator: Phil Venables, Goldman Sachs Nicolas Papernot, Google Brain Zico Kolter, Carnegie Mellon University Bo Li, University of Illinois, Urbana-Champaign Plenary Discussion on the Utility and Potential of AI/ML for Cybersecurity Day Two UNDERSTANDING OFFENSIVE OR MALICIOUS APPLICATIONS OF AI Welcome Fred Chang, Workshop Chair The Use of AI/ML in Cyberattacks Moderator: Kathleen Fisher, Tufts University David Brumley, Carnegie Mellon University and ForAllSecure Tyler Moore, University of Tulsa Wyatt Hoffman, Carnegie Endowment for International Peace Security Implications of Deep Fakes and Synthetic Media Moderator: Subbarao Kambhampati, Arizona State University Delip Rao, AI Foundation Jay Stokes, Microsoft Research WRAP-UP DISCUSSION: IDENTIFYING KEY LESSONS AND OPEN QUESTIONS Please note: Affiliations are for identification purposes only; unless noted, speakers are speaking for themselves and not necessarily for any institutions with which they may be affiliated.

Key Terms



This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.