Projects Betrayed by Apps Finding Haystacks within Haystacks Handling Extreme Class Imbalance and Learning from Rare Events Certifiable Security & Privacy Risk Robustness for Deep Neural Networks Enhanced Cybersecurity through Artificial Intelligence Driven Red Teaming and Blue Teaming