AI Village @ DEF CON 27

Day Start Time Length (Minutes) Primary Speaker Talk Title
Friday 10:00 AM 15 AI Village Organizers Opening Remarks
Friday 10:15 AM 30 TBA Misinformation Keynote
Friday 10:45 AM 30 Siwei Lyu Seeing is deceiving: The rise of AI-synthesized fake media
Friday 11:15 AM 45 Lauren Putvin Exploratory Data Analysis: Why and How (in Python)
Friday 12:00 PM 45 Jon Hawes A 'buyers guide' to the market promise of automagic AI-enabled detection and response
Friday 1:00 PM 30 Ryan Kovar, Dave Herrald, David Veuve Network defenders in a data scientist world
Friday 1:30 PM 45 Angelo Oliveira Fighting Malware with Deep Learning
Friday 2:15 PM 30 Yisroel Mirsky Automated Injection & Removal of Medical Evidence in CT and MRI Scans
Friday 2:45 PM 45 Ethan Rudd Loss Is More! Improving Malware Detectors by Learning Additional Tasks
Friday 3:30 PM 30 Walter Scheirer Backdooring Convolutional Neural Networks via Targeted Weight Perturbations
Friday 4:00 PM 30 Roei Amit, Tal Leibovich How to get over your malicious ex(tensions) using deep learning
Friday 4:30 PM 30 Hyrum Anderson, Ryan Kovar Competitions in Infosec/ML
Friday 5:00 PM120TBDAI Unwind
Saturday 10:00 AM 45 Rand Waltzman MD: Multimedia Disinformation - Is there a Doctor in the House?!
Saturday 10:45 AM 45 Jason Mancusco Machine Learning's Privacy Problem
Saturday 11:30 AM 30 Richard Harang, Ethan Rudd A Tutorial on Hacking Facial Recognition Systems
Saturday 1:30 PM 30 Kenya Yoshimura, Takahiro Yoshimura Clairvoyance: concurrent lip-reading for the smart masses
Saturday 2:00 PM 30 Barton Rhodes Securing your kubeflow clusters
Saturday 2:30 PM 30 Laurin Weissinger AI vs. Airplanes and IT-Security: What Security Regulations Teach Us About AI Governance
Saturday 3:00 PM 30 Anna Skelton Deepfakes, Deep Trouble: Analyzing the Effects of Deepfakes on Market Manipulation
Saturday 4:00 PM 45 Samantha Cole, Danielle Citron, Rumman Chowdhury, Brit Paris Deep Fakes Panel
Saturday 5:00 PM120TBDAI Unwind
Sunday 10:00 AM 30 Jesus Solano, David Camacho Behavioral Biometrics and Context Analytics: Risk Based Authentication Re-Imagined
Sunday 10:30 AM 45 Tal Leibovich, Shimon Noam Oren From Noisy, Distorted data-sets to excellent prediction models
Sunday 11:15 AM 45 Vahid Behzadan Faults in our Pi Stars: Security Issues and Challenges in Deep Reinforcement Learning

2023

Threat Modeling LLM Applications

19 minute read

Threat Modeling LLM Applications Before we get started: Hi! My name is GTKlondike, and these are my opinions as a cybersecurity consultant. While experts fr...

Back to Top ↑

2022

AI and Hiring Tech Panel

4 minute read

AI and ML is already being used to identify job candidates, screen resumes, assess worker productivity and even help tag candidates for firing. Can the inter...

Back to Top ↑

2018

Gradient Attacks

11 minute read

Welcome to the second post in the AI Village’s adversarial machine learning series. This one will cover the greedy fast methods that are most commonly used. ...

Dimensionality and Adversarial Examples

11 minute read

Welcome to AI Village’s series on adversarial examples. This will focus on image classification attacks as they are simpler to work with and this series is m...

Back to Top ↑