7th Deep Learning Security
and Privacy Workshop
co-located with the 45th IEEE Symposium on Security and Privacy
May 23, 2024
Photo: Pixabay

Call for Papers

Important Dates

  • Paper submission deadline (extended): Feb 9, 2024, 11:59 PM (AoE, UTC-12) Feb 2, 2024, 11:59 PM (AoE, UTC-12)
  • Acceptance notification: Mar 4, 2024
  • Camera-ready due: Mar 14, 2024
  • Workshop: May 23, 2024


Deep learning and security have made remarkable progress in the last years. On the one hand, neural networks have been recognized as a powerful tool for security in academia and industry. On the other hand, security and privacy of deep learning has gained growing attention since deep learning has become a new attack surface. The security, privacy, fairness, and interpretability of neural networks has been called into question.

This workshop strives for bringing these two complementary views together by (a) exploring deep learning as a tool for security as well as (b) investigating the security and privacy of deep learning.

Topics of Interest

DLSP seeks contributions on all aspects of deep learning and security. Topics of interest include (but are not limited to):

Deep Learning

  • Generative AI
  • Foundation models
  • Federated learning
  • Recurrent network architectures
  • Graph neural networks
  • Neural Turing machines
  • Semantic knowledge-bases
  • Generative adversarial networks
  • Causal inference
  • Deep reinforcement learning
  • Recommender systems
  • Poisong attacks to deep learning and defenses
  • Adversarial examples to deep learning and defenses
  • Privacy attacks to deep learning and defenses
  • Explainable deep learning

Computer Security

  • Computer forensics
  • Spam detection
  • Phishing detection and prevention
  • Botnet detection
  • Intrusion detection and response
  • Malware identification, analysis, and similarity
  • Data anonymization/ de-anonymization
  • Security in social networks
  • Vulnerability discovery

Submission Guidelines

We accept two types of submissions:

  • Track 1: Archival, full-length papers. Submissions in this track can be up to six pages, plus additional references. Accepted papers in this track will be included in the IEEE workshop proceedings.
  • Track 2: Non-Archival, extended abstract. For this track, we encourage submissions that are forward-looking and explore visionary ideas. We allow concurrent submissions for this track, but the authors are responsible for ensuring compliance with the policies of other venues. Submissions in this track can be up to three pages, plus additional references. Accepted papers in this track will NOT be included in the IEEE workshop proceedings, but will be publicly available on this workshop website.

Submissions in both tracks should be unpublished work. Papers must be formatted for US letter (not A4) size paper. The text must be formatted in a two-column layout, with columns no more than 9.5 in. tall and 3.5 in. wide. The text must be in Times font, 10-point or larger, with 11-point or larger line spacing. Authors are strongly recommended to use the latest IEEE S&P Conference proceedings templates. Failure to adhere to the page limit and formatting requirements are grounds for rejection without review. Submissions must be in English and properly anonymized.

For any questions, contact the workshop organizers at dlsp2024@ieee-security.org

Best Paper/Extended Abstract Awards

One archival, full-length paper in Track 1 will be selected as the Best Paper Award; and one extended abstract in Track 2 will be selected as the Best Extended Abstract Award. The recipient of the Best Paper Award will be granted a prize of $1,500, while the Best Extended Abstract Award will be granted a prize of $1,000. These prizes are generously sponsored by Ant Group.

Presentation Form

All accepted submissions will be presented at the workshop. Due to time constraints, accepted papers will be selected for presentation as either talk or poster based on their review score and novelty. Nonetheless, all accepted papers should be considered as having equal importance.

One author of each accepted paper is required to attend the workshop and present the paper.

Submission Site



Program Chairs

Steering Committee

Program Committee

  • Sanghyun Hong, Oregon State University
  • Mu Zhang, University of Utah
  • Jinyuan Jia, The Pennsylvania State University
  • Minghong Fang, Duke University
  • Ziqi Yang, Zhejiang University
  • Binghui Wang, Illinois Institute of Technology
  • Edward Raff, Booz Allen Hamilton
  • Yupei Liu, Duke University
  • Min Du, Palo Alto Networks
  • Giovanni Apruzzese, University of Liechtenstein
  • Yang Zhang, CISPA Helmholtz Center for Information Security
  • Chao Zhang, Tsinghua University
  • Sagar Samtani, Indiana University, Bloomington
  • Yacin Nadji, Corelight, Inc.
  • Erwin Quiring, Ruhr University Bochum, ICSI Berkeley
  • Phil Tully, Google
  • Mohammadreza (Reza) Ebrahimi, University of South Florida
  • Kexin Pei, The University of Chicago and Columbia University
  • Pavel Laskov, University of Liechtenstein
  • Scott Coull, Google
  • Tomas Pevny, Czech Technical University in Prague
  • Fnu Suya, University of Maryland College Park
  • Phil Tully, Google
  • Konrad Rieck, TU Berlin
  • Christian Wressnegger, Karlsruhe Institute of Technology (KIT)
  • Fabio Pierazzi, King's College London
  • Davide Maiorca, University of Cagliari, Italy
  • Samuel Marchal, VTT and Aalto University
  • Tummalapalli Reddy, QlikTech
  • Jason Xue, CSIRO’s Data61
  • Yanjiao Chen, Zhejiang University
  • Ming Li, University of Arizona
  • Qi Li, Tsinghua University
  • Peng Gao, Virginia Tech
  • Yuan Hong, University of Connecticut
  • Nirnimesh Ghose, University of Nebraska-Lincoln
  • Shiqing Ma, UMass Amherst
  • Koray Karabina, National Research Council of Canada
  • Ting Wang, Stony Brook University
  • Bimal Viswanath, Virginia Tech
  • Mathias Humbert, University of Lausanne
  • Alexandra Dmitrienko, University of Wuerzburg