6th Deep Learning Security
and Privacy Workshop
co-located with the 44th IEEE Symposium on Security and Privacy
May 25, 2023
Photo: Pixabay

Call for Papers

Important Dates

  • Paper and talk submission deadline: Feb 9, 2023, 11:59 PM (AoE, UTC-12) EXTENDED Feb 2, 2023, 11:59 PM (AoE, UTC-12)
  • Acceptance notification: Mar 17, 2023 NEW DATE Mar 1, 2023
  • Camera-ready due: Mar 31, 2023
  • Workshop: May 25, 2023


Deep learning and security have made remarkable progress in the last years. On the one hand, neural networks have been recognized as a promising tool for security in academia and industry. On the other hand, the security of deep learning has gained focus in research, the robustness, privacy, and interpretability of neural networks has recently been called into question.

This workshop strives for bringing these two complementary views together by (a) exploring deep learning as a tool for security as well as (b) investigating the security and privacy of deep learning.

Topics of Interest

DLS seeks contributions on all aspects of deep learning and security. Topics of interest include (but are not limited to):

Deep Learning

  • Deep learning for program embedding and similarity
  • Deep program learning
  • Modern deep NLP
  • Recurrent network architectures
  • Neural networks for graphs
  • Neural Turing machines
  • Semantic knowledge-bases
  • Generative adversarial networks
  • Relational modeling and prediction
  • Deep reinforcement learning
  • Attacks against deep learning
  • Resilient and explainable deep learning
  • Robustness, privacy, and interpretability of deep learning

Computer Security

  • Computer forensics
  • Spam detection
  • Phishing detection and prevention
  • Botnet detection
  • Intrusion detection and response
  • Malware identification, analysis, and similarity
  • Data anonymization/ de-anonymization
  • Security in social networks
  • Vulnerability discovery

Submission Guidelines

We accept two types of submissions:

  • Archival, full-length papers
  • Non-Archival, presentations for published novel work

The submitted paper can be up to six pages, plus additional references. To be considered, papers must be received by the submission deadline (see Important Dates).

Papers must be formatted for US letter (not A4) size paper. The text must be formatted in a two-column layout, with columns no more than 9.5 in. tall and 3.5 in. wide. The text must be in Times font, 10-point or larger, with 11-point or larger line spacing. Authors are strongly recommended to use the latest IEEE conference proceedings templates. Failure to adhere to the page limit and formatting requirements are grounds for rejection without review. Submissions must be in English and properly anonymized.

For any questions, contact the workshop organizers at dls2023@ieee-security.org

Presentation Form

All accepted submissions will be presented at the workshop. The archival papers will be included in the IEEE workshop proceedings. Due to time constraints, accepted papers will be selected for presentation as either talk or poster based on their review score and novelty. Nonetheless, all accepted papers should be considered as having equal importance.

One author of each accepted paper is required to attend the workshop and present the paper for it to be included in the proceedings.

Submission Site



Program Chairs

Steering Committee

Program Committee

  • Baris Coskun, Amazon
  • Chao Zhang, Tsinghua University
  • Christian Wressnegger, Karlsruhe Institute of Technology (KIT)
  • Daniel Arp, TU Berlin
  • David Evans, University of Virginia
  • Davide Maiorca, University of Cagliari
  • Erwin Quiring, International Computer Science Institute (ICSI) Berkeley
  • Fabio Pierazzi, King's College London
  • Feargus Pendlebury, Meta
  • Giovanni Apruzzese, University of Liechtenstein
  • Heng Yin, University of California, Riverside
  • Kexin Pei, Columbia University
  • Konrad Rieck, TU Braunschweig
  • Matthew Jagielski, Google
  • Min Du, Palo Alto Networks
  • Mohammadreza Ebrahimi, University of South Florida
  • Mu Zhang, University of Utah
  • Nicholas Carlini, Google
  • Philip Tully, Google
  • Pin-Yu Chen, IBM Research
  • Sagar Samtani, Indiana University
  • Samual Marchal, WithSecure
  • Sanghyun Hong, Oregon State University
  • Scott Coull, Mandiant
  • Shirin Nilizadeh, University of Texas at Arlington
  • Teodora Baluta, National University of Singapore
  • Tomas Pevny, Czech Technical University in Prague
  • Tummalapalli S Reddy, University of Texas at Arlington
  • Varun Chandrasekaran, Microsoft Research
  • Yacin Nadji, Corelight Inc
  • Yang Zhang, CISPA Helmholtz Center for Information Security
  • Yevgeniy Vorobeychik, Washington University in St. Louis
  • Yinzhi Cao, Johns Hopkins University
  • Ziqi Yang, Zhejiang University