Reports of the Workshops Held at the 2019 AAAI Conference on Artificial Intelligence
Total Page:16
File Type:pdf, Size:1020Kb
Workshop Reports Reports of the Workshops Held at the 2019 AAAI Conference on Artificial Intelligence Guy Barash, Mauricio Castillo-Effen, Niyati Chhaya, Peter Clark, Huáscar Espinoza, Eitan Farchi, Christopher Geib, Odd Erik Gundersen, Seán Ó hÉigeartaig, José Hernández-Orallo, Chiori Hori, Xiaowei Huang, Kokil Jaidka, Pavan Kapanipathi, Sarah Keren, Seokhwan Kim, Marc Lanctot, Danny Lange, David Martinez, Marwan Mattar, Mausam, Julian McAuley, Martin Michalowski, Reuth Mirsky, Roozbeh Mottaghi, Joseph C. Osborn, Julien Pérolat, Martin Schmid, Arash Shaban-Nejad, Onn Shehory, Biplav Srivastava, William Streilein, Kartik Talamadupula, Julian Togelius, Koichiro Yoshino, Quanshi Zhang, Imed Zitouni The workshop program of the Thirty- Affective Content Analysis and Third AAAI Conference on Artificial Intelligence (AAAI-19) was held in CL-Aff Shared Task: In Pursuit of Happiness Honolulu, Hawaii, on Sunday and The Affective Content Analysis workshop series held at the Monday, January 27 and 28, 2019. There were 16 workshops in the AAAI Conference on Artificial Intelligence is an interdis- program: Affective Content Analy- ciplinary platform intended to engage the AI and machine- sis: Modeling Affect-in-Action; Agile learning communities about open problems in affective Robotics for Industrial Automation content analysis and understanding, with a special focus Competition; Artificial Intelligence for on affect in language and text. The theme of this second Cyber Security; Artificial Intelligence workshop was modeling affect-in-action, with a shared task Safety; Dialog System Technology (CL-Aff — in pursuit of happiness) to encourage the devel- Challenge; Engineering Dependable opment of new models and approaches for modeling happy and Secure Machine Learning Systems; moments. Games and Simulations for Artifi- cial Intelligence; Health Intelligence; Knowledge Extraction from Games; Network Interpretability for Deep Learning; Plan, Activity, and Intent Recognition; Reasoning and Learn- ing for Human-Machine Dialogues; Reasoning for Complex Question Answering; Recommender Systems Meet Natural Language Processing; Reinforcement Learning in Games; and Reproducible AI. This report con- tains brief summaries of all the work- shops that were held. Copyright © 2019, Association for the Advancement of Artificial Intelligence. All rights reserved. ISSN 0738-4602 FALL 2019 67 Workshop Reports Affective computing has traditionally focused on Artificial Intelligence modeling human reactions using multimodal sen- sor data but not using text. Sentiment and emo- for Cyber Security Workshop tion analysis, on the other hand, has been applied The 2019 Artificial Intelligence for Cyber Security on text as well as multimodal data sets, but this workshop focused on research and applications of research has been limited to quantifying well-defined AI to operational problems in cybersecurity, includ- human reactions. Affect analysis, that is, tech- ing machine learning, game theory, threat mode- niques and applications that understand the expe- ling, and automated and assistive reasoning. The rience of an emotion in the context of language and workshop began with a keynote speech by Craig text, is an upcoming research space. Little has been Knoblock, executive director of USC/ISI, on building done to explore the affective facets of dynamic or knowledge graphs for cybersecurity. Knoblock began multimedia data. Furthermore, the subjective nature with a brief overview of graph analysis, including a of human affect suggests the need to measure in ways useful analysis pipeline to frame the application of that recognize multiple interpretations of human graphical techniques to complex data. He provided responses. Other challenges include standardizing several motivating examples, including recent ap- the measurement of affect to meaningfully com- plication of the techniques to the problem of fore- pare different affective models against each other, casting evolving cyber threats within an enterprise addressing the challenges in cross-media, cross-domain, environment. and cross-platform affect analysis, and identify- The initial session featured several talks on the ing consumer psychology theories and behaviors application of AI to problems in cybersecurity. The related to affect, which are amenable to computa- first paper presented results on leveraging Markov tional modeling game modeling of moving target defenses to protect The workshop program focused on the analysis against multistage cyber threats in a cloud network of emotions, sentiments, and attitudes in textual, environment. Results compared favorably with static visual, and multimodal content for applications nongraph-based techniques. The second paper pre- in psychology, language understanding, and com- sented work in leveraging game-theoretical models to puter vision. Besides original research presenta- optimize defenses for so-called watering hole attacks. tions and posters, the workshop hosted a range of Experimental analyses demonstrated the benefit of keynote speakers, whose presentations highlighted the approach. A third paper explored the application the state of the art in affective computing in a range of planning and model-based diagnosis to automate of fields. the process of cyber physical system design while Alon Halevy talked about various efforts toward taking affect analysis techniques to practice, spe- at the same time meeting security constraints. The cifically focusing on affective search. Rada Mihalcea technique’s effectiveness was evaluated on an auto- from the University of Michigan discussed the pilot model. importance of grounding emotion and affect anal- The first three workshop papers were followed by ysis in context. The study emphasized the impor- a panel discussion: Thirsty in the Age of Plenty — tance of looking beyond the language, including user A Discussion on (Lack of) Datasets for AI and preferences and environmental variables. Ellen Cyber Security. The panel participants were from Riloff from the University of Utah shared an anal- industry, government, and academia. The IMPACT ysis of affective events and reasons behind their data repository, hosted by the Department of polarity. Atanu Sinha from Adobe Research shared Homeland Security, contains a corpora of network two studies that look at affect understanding data, cyber defense data, and cyber attack data. and interpretation from a consumer psychology Two important takeaways from the panel were the perspective. The talk focused on studying facial need for a definition of success when defending expressions and their impact on offers and counter- networks and the need for more representative offers in a negotiation context. Finally, Lyle Ungar data, such as data from realistic live environments. from the University of Pennsylvania talked about It was also pointed out by the panelists that data studying empathy in social media content. He used in operational environments are different introduced the challenges in building computational from data used for advancing research. The data models for psychology-based theories and dis- for research are best when these data represent cussed novel methodologies based on the machine- evolving threats. learning model The morning session concluded with two techni- The workshop concluded with a panel discussion cal papers. The first presented work in using novel among the keynote speakers, moderated by the data masking techniques to protect a machine-learning organizers, on potential directions for future events classifier. Theoretical guarantees of the technique and the scope of interdisciplinary research. The papers were developed and evaluated on benchmark data of the workshop were published as CEUR Workshop sets. The final paper of the morning discussed the use Proceedings, Volume 2328. The workshop was cochaired of fuzzy hashes extracted from kernel embeddings to by Niyati Chhaya and Kokil Jaidka, who also wrote enable file matching, despite adversary insertion and this report. deletion operations. Results compare quite favorably 68 AI MAGAZINE Workshop Reports with stan dard hashing techniques used to recognize codified their winning approach in a series of prin- malware. ciples and a general framework that can be used The afternoon keynote presented by Una-May by others to address adversarial learning attacks in O’Reilly, professor and research scientist at MIT/ general. CSAIL, dealt with artificial adversary intelligence. The workshop was cochaired by William Streilein, O’Reilly began her keynote with a review of recent David Martinez, Jason Matterer, Una-May O’Reilly, work in generating adversarial malware examples Howie Shrobe, and Arunesh Sinha. The papers while still preserving malicious function. Capturing of the workshop were published on arXiv. This the conflicting defender goal of minimizing error report was written by William Streilein and David and the attacker goal of maximizing misclassifi- Martinez. cation, results showed enhanced robustness for machine learning algorithms trained on generated adversarial examples. O’Reilly then described work Artificial Intelligence Safety in applying principles of coevolution to under- standing and predicting behavior of cyber attackers Safety in AI should be not an option but a design and defenders. Leveraging a game theoretical rep- principle. However, there are varying levels of resentation, results were presented showing the tech- safety, diverse sets of ethical standards and values, nique can be used to anticipate