Call for Papers
Important Dates
- Paper submission deadline (extended): Feb 14, 2025, 11:59 PM (AoE, UTC-12)
Feb 9, 2024
- Acceptance notification: Mar 14, 2025
- Camera-ready due: April 18, 2025
- Workshop: May 15, 2024
Overview
Deep learning and security have made remarkable
progress in the last years. On the one hand, neural
networks have been recognized as a powerful tool
for security in academia and industry. On the other
hand, security and privacy of deep learning has gained
growing attention since deep learning has become a new attack surface. The security, privacy, fairness, and interpretability of neural
networks has been called into question.
This workshop strives for bringing these two
complementary views together by (a) exploring deep
learning as a tool for security as well as (b)
investigating the security and privacy of deep learning.
Topics of Interest
DLSP seeks contributions on all aspects of deep learning and security.
Topics of interest include (but are not limited to):
Deep Learning
- Security and privacy aspects of diverse machine learning systems, including but not limited to federated learning, recommender systems, reinforcement learning, generative AI (agent, RAG, and so on), graph neural networks, foundation models
- Jailbreak, prompt injection attacks, and their defenses
- Poisoning and backdoor attacks, adversarial examples, privacy attacks, and their defenses
- Other topics such as toxicity, ethics, fairness, deepfake, copyright, machine unlearning, explainability, watermarking, AIGC detection, and so on
Computer Security
- Computer forensics
- Spam detection
- Phishing detection and prevention
- Botnet detection
- Intrusion detection and response
- Malware identification, analysis, and similarity
- Data anonymization/ de-anonymization
- Security in social networks
- Vulnerability discovery
Submission Guidelines
We accept two types of submissions:
- Track 1: Archival, full-length papers. Submissions in this track can be up to six pages (submissions less than four pages are encouraged to be sumitted to Track 2; submissions with four, five, and six pages will be treated equally regardless of length), plus additional references and appendices. Accepted papers in this track will be included in the IEEE workshop proceedings.
- Track 2: Non-Archival, extended abstract. For this track, we encourage submissions that are forward-looking and explore visionary ideas. We allow concurrent submissions for this track, but the authors are responsible for ensuring compliance with the policies of other venues. Submissions in this track can be up to three pages, plus additional references and appendices. Accepted papers in this track will NOT be included in the IEEE workshop proceedings, but will be publicly available on this workshop website.
Submissions in both tracks should be unpublished work. Papers must be formatted for US letter (not A4) size
paper. The text must be formatted in a two-column
layout, with columns no more than 9.5 in. tall and
3.5 in. wide. The text must be in Times font,
10-point or larger, with 11-point or larger line
spacing. Authors are strongly recommended to use the
latest IEEE S&P Conference proceedings templates.
Failure to adhere to the page limit and formatting
requirements are grounds for rejection without
review. Submissions must be in English and properly anonymized.
For any questions, contact the workshop organizers at dlsp2025@ieee-security.org
Best Paper/Extended Abstract Awards
One archival, full-length paper in Track 1 will be selected as the
Best Paper Award; and one extended abstract in Track 2 will be selected as the
Best Extended Abstract Award.
Presentation Form
All accepted submissions will be presented at the
workshop. Due to time constraints, accepted
papers will be selected for presentation as either
talk or poster based on their review score and
novelty. Nonetheless, all accepted papers should be
considered as having equal importance.
One author of each accepted paper is required to
attend the workshop and present the paper.
Submission Site
https://hotcrp.dlsp2025.ieee-security.org/