BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
DTSTART:20240310T030000
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:CDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20241103T010000
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:CST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20240328T212342Z
UID:40B7E78C-D8F3-4017-9C5F-5C0B998AC9D6
DTSTART;TZID=America/Chicago:20240314T120000
DTEND;TZID=America/Chicago:20240314T130000
DESCRIPTION:Recent research has revealed that machine learning models are v
 ulnerable to adversarial attacks which seek to manipulate the model to ind
 uce undesired behavior or extract sensitive information. Such vulnerabilit
 ies are particularly concerning for the use of these methods in aerospace 
 and defense applications where safety and security are paramount. This res
 earch evaluates an approach that combines several attack detection methods
  in tandem to produce an intrusion detection system (IDS) that ensures sec
 urity at each stage of the model’s lifecycle. The performance of the pip
 elined detection approach is compared to the performance of each individua
 l detector with the hypothesis that the Combined IDS will result in improv
 ed security. The goal of this research is to move toward a practice for se
 cure AI development and operation.\n\nCo-sponsored by: WIE\n\nSpeaker(s): 
 Garrett\, \n\nBldg: 51\, 1100 Martin Goland Ave\, San Antonio\, Texas\, Un
 ited States\, 78238
LOCATION:Bldg: 51\, 1100 Martin Goland Ave\, San Antonio\, Texas\, United S
 tates\, 78238
ORGANIZER:sriram.nagaraj@swri.org
SEQUENCE:6
SUMMARY:Secure Development of Machine Learning Against Poisoning Attacks 
URL;VALUE=URI:https://events.vtools.ieee.org/m/409446
X-ALT-DESC:Description: &lt;br /&gt;&lt;p&gt;&lt;span class=&quot;NormalTextRun SCXW52503456 BC
 X9&quot;&gt;Recent research has revealed that machine learning &lt;/span&gt;&lt;span class=
 &quot;NormalTextRun SCXW52503456 BCX9&quot;&gt;models&lt;/span&gt;&lt;span class=&quot;NormalTextRun 
 SCXW52503456 BCX9&quot;&gt; are vulnerable to adversarial attacks which &lt;/span&gt;&lt;sp
 an class=&quot;NormalTextRun SCXW52503456 BCX9&quot;&gt;seek&lt;/span&gt;&lt;span class=&quot;NormalT
 extRun SCXW52503456 BCX9&quot;&gt; to manipulate the model to induce undesired beh
 avior or extract sensitive information. Such vulnerabilities are particula
 rly concerning for the use of these &lt;/span&gt;&lt;span class=&quot;NormalTextRun SCXW
 52503456 BCX9&quot;&gt;methods&lt;/span&gt;&lt;span class=&quot;NormalTextRun SCXW52503456 BCX9&quot;
 &gt; in &lt;/span&gt;&lt;span class=&quot;NormalTextRun SCXW52503456 BCX9&quot;&gt;aerospace and &lt;/
 span&gt;&lt;span class=&quot;NormalTextRun SCXW52503456 BCX9&quot;&gt;defense applications wh
 ere safety and security are paramount. &lt;/span&gt;&lt;span class=&quot;NormalTextRun S
 CXW52503456 BCX9&quot;&gt;This research evaluates an approach &lt;/span&gt;&lt;span class=&quot;
 NormalTextRun SCXW52503456 BCX9&quot;&gt;that&lt;/span&gt; &lt;span class=&quot;NormalTextRun SC
 XW52503456 BCX9&quot;&gt;combin&lt;/span&gt;&lt;span class=&quot;NormalTextRun SCXW52503456 BCX9
 &quot;&gt;e&lt;/span&gt;&lt;span class=&quot;NormalTextRun SCXW52503456 BCX9&quot;&gt;s&lt;/span&gt;&lt;span clas
 s=&quot;NormalTextRun SCXW52503456 BCX9&quot;&gt; several&lt;/span&gt;&lt;span class=&quot;NormalText
 Run SCXW52503456 BCX9&quot;&gt; attack&lt;/span&gt;&lt;span class=&quot;NormalTextRun SCXW525034
 56 BCX9&quot;&gt; detection methods in tandem to produce a&lt;/span&gt;&lt;span class=&quot;Norm
 alTextRun SCXW52503456 BCX9&quot;&gt;n &lt;/span&gt;&lt;span class=&quot;NormalTextRun SCXW52503
 456 BCX9&quot;&gt;intrusion detection system (IDS) that ensures security at each s
 tage of the model&amp;rsquo\;s lifecycle. The performance of the pipelined det
 ection approach is compared to the performance of each individual detector
  with the hypothesis that the Combined IDS will result in improved securit
 y.&lt;/span&gt; &lt;span class=&quot;NormalTextRun SCXW52503456 BCX9&quot;&gt;T&lt;/span&gt;&lt;span clas
 s=&quot;NormalTextRun SCXW52503456 BCX9&quot;&gt;he goal of this research is to move to
 ward a practice for secure AI development and operation.&lt;/span&gt;&lt;/p&gt;
END:VEVENT
END:VCALENDAR

