CONF-CDS 2025

Symposium Title

The Security of Neural Networks and Applications

Date

September 25th, 2025 (UTC-5)

Organizer

ITM Department, Illinois Institute of Technology, USA

Keywords

  • Neural Network Security
  • Adversarial Attacks
  • Data Poisoning
  • Privacy-Preserving AI
  • AI Model Integrity
  • Cybersecurity in Machine Learning
  • Secure AI Development
  • Threat Detection in AI
  • Deep Learning Vulnerabilities
  • Trustworthy AI Systems

Chair

Dr. Marwan Omar

Associate Professor in Illinois Institute of Technology

Personal Bio

Dr. Omar's Academic career has consistently focused on applied, industry-relevant cyber security, Data Analytics, machine learning, application of AI to cyber security and digital forensics research and education that delivers real-world results. He brings a unique combination of industry experience as well as teaching experience gained from teaching across different cultures and parts of the world. He has an established self-supporting program in machine learning application to cyber security. He has established a respectable research record in AI and cyber security exemplified in the dozens of published papers and book chapters that have gained recognition among researchers and practitioners (more than 272 Google scholar citations thus far). He is actively involved in graduate as well as undergraduate machine learning education including curriculum development and assessment.

Dr. Omar has recently published two books with Springer on Machine Learning and Cyber Security and has also published research with IEEE conference on Sematic Computing. Additionally, Dr. Omar holds numerous industry certifications including Comptia Sec+, ISACA CDPSE, EC-Council Certified Ethical Hacker, and SANS Advanced Smartphone Forensics Analyst.

Dr. Omar has been very active and productive in both academia as well as the industry and he is currently serving as an associate professor of cyber security at Illinois Institute of Technology.

Symposium Description

Background

Neural networks have become a cornerstone of modern artificial intelligence (AI), powering applications across diverse fields such as healthcare, finance, autonomous systems, and cybersecurity. These models, inspired by the structure of the human brain, have demonstrated remarkable capabilities in pattern recognition, natural language processing, and decision-making. However, as neural networks continue to evolve and integrate into critical infrastructure, their security vulnerabilities pose significant risks. Adversarial attacks, data poisoning, and model inversion techniques highlight the growing threats faced by neural networks. Attackers can manipulate input data to deceive models, extract sensitive information, or corrupt learning processes. Additionally, the black-box nature of many deep learning models creates challenges in detecting and mitigating security risks. As AI-driven applications become more pervasive, ensuring the integrity, confidentiality, and availability of neural networks is paramount.

Goal/Rationale

This symposium will explore the core security challenges associated with neural networks, including adversarial robustness, secure training methodologies, and privacy-preserving AI techniques. Participants will gain insights into emerging threats, real-world attack scenarios, and best practices for safeguarding AI systems. By addressing these challenges, researchers and practitioners can work towards building more resilient and trustworthy neural network applications. This session is designed for professionals, researchers, and students interested in AI security and its practical implications.

Scope and Information for Participants

This symposium on The Security of Neural Networks and Applications provides a comprehensive exploration of the vulnerabilities, threats, and defenses associated with AI-driven systems. As neural networks continue to be integrated into critical applications—ranging from healthcare and finance to autonomous systems and cybersecurity—understanding their security risks is essential.

Scope of the Symposium

Participants will gain insights into:

  • Adversarial Attacks & Defenses: Understanding how neural networks can be manipulated and how to mitigate such threats.
  • Data Poisoning & Privacy Risks: Examining how compromised datasets can degrade model integrity and expose sensitive information.
  • Secure AI Development: Best practices for building robust, privacy-preserving, and resilient neural networks.
  • Real-World Case Studies: Analyzing security incidents in AI applications and learning from practical examples.

Information for Participants

Who Should Attend? This symposium is designed for AI practitioners, cybersecurity professionals, researchers, and students interested in securing neural networks.

Format: The session will include expert talks, interactive discussions, and hands-on demonstrations of security threats and defense techniques.

Prerequisites: While no deep technical background is required, familiarity with machine learning concepts will be beneficial.

By the end of the symposium, participants will have a practical understanding of AI security risks and strategies to enhance the trustworthiness of neural network applications.

Submission

Prospective authors are kindly invited to submit full papers that include title, abstract, keywords, introduction, conclusion, and references. It is unnecessary to submit an abstract in advance. The deadline for general submission is September 18, 2025.

Each paper should be no less than 4 pages. One regular registration can cover a paper of 6 pages, and additional pages will be charged. Please format your paper well according to the conference template before submission.

Please prepare your manuscript using Microsoft Word or LaTeX/Tex and submit your full paper via email to sympo_chicago@confcds.org, attaching both a PDF file and an editable format.

Symposium Date

September 25, 2025

Submission & Payment

Type Regular Submission
Paper Submission September 18, 2025
Review Process 2 weeks
Revise & Acceptance 2 weeks
Registration & Payment 2 weeks

Fees

Items Amount(VAT Included)
Registration and Publishing Fee(6 pages included) $500
Additional Page $40/extra page

Publication

Accepted papers of this symposium will be published in conference proceedings, and will be submitted to EI Compendex, Conference Proceedings Citation Index (CPCI), Crossref, Portico, Inspec, Google Scholar, CNKI, and other databases for indexing. The situation may be affected by factors among databases like processing time, workflow, policy, etc.

This symposium is organized by CONF-CDS 2025 and will independently proceed the submission and publication process.

Venue


Illinois Institute of Technology, 10 W 35th St, Chicago, IL 60616

VISA:


U.S. Visas (state.gov)

In order to ensure the information is correct and up to date, there may be changes which we are not aware of. And different countries have different rules for the visa application. It is always a good idea to check the latest regulations in your country. This page just gives some general information of the visa application.

US Visa Information

The B-1/B-2 visitor visa is for people traveling to the United States temporarily for business (B-1) or for pleasure or medical treatment (B-2). Generally, the B-1 visa is for travelers consulting with business associates; attending scientific, educational, professional, or business conventions/conferences; settling an estate; or negotiating contracts. The B-2 visa is for travel that is recreational in nature, including tourism; visits with friends or relatives; medical treatment; and activities of a fraternal, social, or service nature. Often, the B-1 and B-2 visas are combined and issued as one visa: the B-1/B-2.

Application Items

If you apply for a business/tourist visa, you must pay your $160 application fee and submit the following:

  • A Nonimmigrant Visa Electronic Application (DS-160) Form. Visit the DS-160 web page for more information about the DS-160.
  • A passport valid for travel to the United States with a validity date at least six months beyond your intended period of stay in the United States (unless country-specific agreements provide exemptions). If more than one person is included in your passport, each person desiring a visa must submit an application.
  • One (1) 2 x 2 inches (51 x 51 mm) photograph taken within the last six months.
  • If a visa is issued, there may be an additional visa issuance reciprocity fee, depending on your nationality.

In addition to these items, you must present an interview appointment letter confirming that you booked an appointment through this service. You may also bring whatever supporting documents you believe support the information provided to the consular officer.

Supporting Documents

  • Invitation letter from business or school.
  • Detailed CV or resume including a list of publications.
  • Complete itinerary, including all meetings, conferences, and visits; include names, addresses, and telephone numbers of your hosts.
  • For other materials, please refer to the U.S. Embassy or Consulate website.

NOTICE:

Should your application be denied, the organizing committee cannot change the decision of visa officer, nor will CONF-CDS engage in discussion or correspondence with the visa application center on behalf of the applicant. The registration fee CANNOT be refunded when the VISA application of individual being denied.