Shai Ben-David : Keynote: Fairness interpretability and reliability in machine learning applications Yuri Boykov : Entropy-based clustering and margin maximization Edith Law : Humans augmenting AI, AI augmenting humans, and designing technologies for actualizing human values Noura Liman : Keynote: Machine learning for network security Diogo Barradas : De-anonymizing Tor Onion services with flow correlation attacks Meng Xu : Prompting LLMs to find software vulnerabilities 1 / 6 Shai Ben-David : Keynote: Fairness interpretability and reliability in machine learning applications 2 / 6 Yuri Boykov : Entropy-based clustering and margin maximization 3 / 6 Edith Law : Humans augmenting AI, AI augmenting humans, and designing technologies for actualizing human values 4 / 6 Noura Liman : Keynote: Machine learning for network security 5 / 6 Diogo Barradas : De-anonymizing Tor Onion services with flow correlation attacks 6 / 6 Meng Xu : Prompting LLMs to find software vulnerabilities
Shai Ben-David : Keynote: Fairness interpretability and reliability in machine learning applications Yuri Boykov : Entropy-based clustering and margin maximization Edith Law : Humans augmenting AI, AI augmenting humans, and designing technologies for actualizing human values Noura Liman : Keynote: Machine learning for network security Diogo Barradas : De-anonymizing Tor Onion services with flow correlation attacks Meng Xu : Prompting LLMs to find software vulnerabilities 1 / 6 Shai Ben-David : Keynote: Fairness interpretability and reliability in machine learning applications 2 / 6 Yuri Boykov : Entropy-based clustering and margin maximization 3 / 6 Edith Law : Humans augmenting AI, AI augmenting humans, and designing technologies for actualizing human values 4 / 6 Noura Liman : Keynote: Machine learning for network security 5 / 6 Diogo Barradas : De-anonymizing Tor Onion services with flow correlation attacks 6 / 6 Meng Xu : Prompting LLMs to find software vulnerabilities