18 th ACM Workshop on
Artificial Intelligence and Security
October 17th, 2025 - Taipei, Taiwan
co-located with the 32nd ACM Conference on Computer and Communications Security
Photo: Originally posted to Flickr Taipei Skyline 2015 (License: CC BY 2.0 )

Call for Papers

Important Dates

  • Paper submission deadline: June 20th, 2025 (all deadlines are AoE, UTC-12)
  • Reviews due: July 20th, 2025
  • Review Released and Acceptance notification: August 10th, 2025
  • Camera ready due: August 22nd, 2025
  • Workshop day: October 17th, 2025

Overview

Recent years have seen a dramatic increase in applications of Artificial Intelligence (AI), Machine Learning (ML), and data mining to security and privacy problems. The analytic tools and intelligent behavior provided by these techniques make AI and ML increasingly important for autonomous real-time analysis and decision making in domains with a wealth of data or that require quick reactions to constantly changing situations. The use of learning methods in security-sensitive domains, in which adversaries may attempt to mislead or evade intelligent machines, creates new frontiers for security research. The recent widespread adoption of “deep learning” techniques, whose security properties are difficult to reason about directly, has only added to the importance of this research. In addition, data mining and machine learning techniques create a wealth of privacy issues, due to the abundance and accessibility of data. The AISec workshop provides a venue for presenting and discussing new developments in the intersection of security and privacy with AI and ML.

Topics of Interest

Topics of interest include (but are not limited to):

Theoretical topics related to security

  • Adversarial learning
  • Security of deep learning systems
  • Robust statistics
  • Learning in games
  • Economics of security
  • Differential privacy

Security applications

  • Computer forensics
  • Spam detection
  • Phishing detection and prevention
  • Botnet detection
  • Intrusion detection and response
  • Malware identification and analysis
  • Data anonymization/de-anonymization
  • Security in social networks
  • Big data analytics for security
  • User authentication
  • Securing AI agents

Security-related AI problems

  • Distributed inference and decision making for security
  • Secure multiparty computation and cryptographic approaches
  • Model confidentiality
  • Privacy-preserving data mining
  • Adaptive side-channel attacks
  • Design and analysis of CAPTCHAs
  • AI approaches to trust and reputation
  • Vulnerability testing through intelligent probing (e.g. fuzzing)
  • Content-driven security policy management & access control
  • Anomalous behavior detection (e.g. for the purpose of fraud detection)
  • AI Misuse (e.g., Large Language Models for automated hacking, misinformation, deepfakes)
  • Safety and ethical issues of Generative AI

Submission Guidelines

We invite the following types of papers:

  • Original research papers on any topic in the intersection of AI or machine learning with security, privacy, or related areas.
  • Position and open-problem papers discussing the relationship of AI or machine learning to security or privacy. Submitted papers of this type may not substantially overlap with papers that have been published previously or that are simultaneously submitted to a journal or conference/workshop proceedings.
  • Systematization-of-knowledge papers , which should distill the AI or machine learning contributions of a previously-published series of security papers.

Papers not following the following guidelines will be desk-rejected. Submissions must be in English and properly anonymized. The papers should be at most 10 pages in double-column ACM format, excluding the bibliography and well-marked appendices, and at most 12 pages overall. Papers should be in LaTeX and striclty with the ACM format. This format is also required for the camera-ready version. Please follow the main CCS formatting instructions (except with page limits as described above). In particular, we recommend using the sigconf template, which can be downloaded from https://www.acm.org/publications/proceedings-template . The authors can specify the paper type in the submission form. Accepted papers will be published by the ACM Digital Library and/or ACM Press. Committee members are not required to read the appendices, so the paper should be intelligible without them.

Submission Site

Submission link: https://aisec25.hotcrp.com .

All accepted submissions will be presented at the workshop as posters. Accepted papers will be selected for presentation as spotlights based on their review score and novelty. Nonetheless, all accepted papers should be considered as having equal importance and will be included in the ACM workshop proceedings.

One author of each accepted paper is required to attend the workshop and present the paper for it to be included in the proceedings.

Important notice: Please note that traveling to Taiwan may require a visa. Depending on the participants' nationalities, the visa application process may need to be initiated early to avoid last-minute travel disruptions. Please, check the CCS instructions for visa at https://www.sigsac.org/ccs/CCS2025/visa/ .

For any questions, please contact one the workshop organizers at [email protected]

Committee

Workshop Chairs

Steering Committee

Program Committee

TBD

We are currently looking for reviewers. Contact [email protected] if you want to be involved.