IMPACT SCORE JOURNAL RANKING CONFERENCE RANKING Conferences Journals Workshops Seminars SYMPOSIUMS MEETINGS BLOG LaTeX 5G Tutorial Free Tools
AI4Cyber/MLHat 2022 : AI4Cyber/MLHat: AI-enabled Cybersecurity Analytics and Deployable Defense
AI4Cyber/MLHat 2022 : AI4Cyber/MLHat: AI-enabled Cybersecurity Analytics and Deployable Defense

AI4Cyber/MLHat 2022 : AI4Cyber/MLHat: AI-enabled Cybersecurity Analytics and Deployable Defense

Washington, DC
Event Date: May 02, 2022 - May 26, 2022
Submission Deadline: May 26, 2022




Call for Papers

Call for Papers and Submission Guidelines:
The irreversible dependence on computing technology has paved the way for cybersecurity’s rapid emergence as one of modern society’s grand challenges. To combat the ever-evolving, highly-dynamic threat landscape, numerous academics and industry professionals are systematically searching through billions of log files, social media platforms (e.g., Dark Web), malware files, and other data sources to preemptively identify, mitigate, and remediate emerging threats and key threat actors. Artificial Intelligence (AI)-enabled analytics has started to play a pivotal role in sifting through large quantities of these heterogeneous cybersecurity data to execute fundamental cybersecurity tasks such as asset management, vulnerability prioritization, threat forecasting, and controls allocations. However, the volume, variety, veracity, and variety of cybersecurity data sharply contrasts with conventional data sources. Furthermore, significant challenges need to be addressed before an AI-based system can be deployed and operated in practice as a critical component of cyber defense. Major challenges include scale of the problem, adaptability, inference speed and efficiency, adversarial resilience, the urging demand for explainability, and the need for integrating human in the loop. Finally, industry and academic AI-enabled cybersecurity analytics are often siloed, which has slowed down the progress of addressing these challenges. To these ends, this workshop aims to convene academics and practitioners (from industry and government) to share, disseminate, and communicate completed research papers, work in progress, and review articles about AI-enabled cybersecurity analytics and deployable AI-based security defenses. Areas of interest include, but are not limited to:

-Web analytics (e.g., multi-lingual threat detection, key threat actor identification)
-Spam detection
-Network attack detection, classification, and analysis
-Large-scale and smart vulnerability assessment
-Real-time threat detection and categorization
-Real-time alert correlation for usable security
-Weakly supervised and continual learning for intrusion detection
-Adversarial attacks to automated cyber defense
-Automated vulnerability remediation
-Internet of Things (IoT) analysis (e.g., fingerprinting, measurements, network telescopes)
-Misinformation and disinformation
-Deep packet inspection
-Static and/or dynamic malware analysis and evasion
-Automated mapping of threats to cybersecurity risk management frameworks
-Robustifying cyber-defense with deep reinforcement learning or adversarial learning
-Automatic cybersecurity plan or report generation
-AI-enabled open-source software security
-Analyst-AI interfaces and augmented intelligence for cybersecurity
-Model verdict explainability in security applications
-Privacy preserving security data collection and sharing
-Concept drift detection and explanation
-Interactive machine learning for security
-Few-shot learning for security applications
-Resource constrained machine learning

Each manuscript must clearly articulate their data (e.g., key metadata, statistical properties, etc.), analytical procedures (e.g., representations, algorithm details, etc.), and evaluation set up and results (e.g., performance metrics, statistical tests, case studies, etc.). Providing these details will help reviewers better assess the novelty, technical quality, and potential impact. Making data, code, and processes publicly available to facilitate scientific reproducibility is not required. However, it is strongly encouraged, as it can help facilitate a culture of data/code sharing in this quickly developing discipline.

All submissions must be in PDF format and formatted according to the new Standard ACM Conference Proceedings Template. Submissions are limited to a 4-page initial submission, excluding references or supplementary materials. Upon acceptance, the authors are allowed to include an additional page (5-page total) for that camera ready version that accounts for reviewer comments. Authors should use supplementary material only for minor details that do not fit in the 4 pages, but enhance the scientific reproducibility of the work (e.g., model parameters). Since all reviews are double-blind, and author names and affiliations should NOT be listed. For accepted papers, at least one author must attend the workshop to present the work. Based on the reviews received, accepted papers will be designated as a contributed talk (four total, 15 minutes each), or as a poster. All accepted papers will be posted on the workshop website (will not appear in proceedings per ACM KDD Workshop regulations).

Key Dates
Workshop Paper Submission: May 26th, 2022
Workshop Paper Notification: June 20th, 2022
Workshop Date (tentative): August 15th, 2022

Submission Site: https://easychair.org/conferences/?conf=ai4cybermlhat


Credits and Sources

[1] AI4Cyber/MLHat 2022 : AI4Cyber/MLHat: AI-enabled Cybersecurity Analytics and Deployable Defense


Check other Conferences, Workshops, Seminars, and Events


OTHER CYBERSECURITY EVENTS

CyberHunt 2022: IEEE BigData Workshop on Cyber Threat Intelligence and Hunting
Osaka, Japan
Dec 17, 2022
FOSAD 2022: 21st Summerschool - Foundations of Security Analysis and Design
Bertinoro, Italy
Aug 29, 2022
ESORICS 2022: 27th European Symposium on Research in Computer Security (ESORICS)
Copenhagen, Denmark
Sep 26, 2022
IWCC 2022: International Workshop on Cyber Crime
Vienna, Austria
Aug 23, 2022
SmartCom 2022: The 7th International Conference on Smart Computing and Communication
New York, USA
Nov 18, 2022
SHOW ALL

OTHER DEFENSE EVENTS

Micrads 2021: Multidisciplinary International Conference of Research Applied to Defense and Security
Cartagena, Colombia
May 26, 2021
SPS 2020: 2nd IEEE International Workshop on Self-Protecting Systems
Washington, DC
Aug 17, 2020
DTS 2020: 2nd International Workshop on Defense Technology and Security
University of Cagliari, Cagliari, Italy
Jul 01, 2020
DCS 2020: SPIE Defense + Commercial Sensing 2020
Anaheim
Apr 26, 2020
19Q4 2019: REVULN 19Q4
Hong Kong
Dec 11, 2019
SHOW ALL

OTHER ARTIFICIAL INTELLIGENCE EVENTS

ACM ICMLSC 2023: ACM--2023 The 7th International Conference on Machine Learning and Soft Computing (ICMLSC 2023)
Chongqing, China
Jan 5, 2023
IPMV--Ei 2023: 2023 5th International Conference on Image Processing and Machine Vision (IPMV 2023)
Macau, China
Jan 13, 2023
SPIE ICMV 2022: SPIE--2022 The 15th International Conference on Machine Vision (ICMV 2022)
Rome, Italy
Nov 18, 2022
ICICO 2022: 5th International Conference on Intelligent Computing & Optimization 2022
Hua Hin, Thailand
Oct 27, 2022
I3CIS 2022: First International Conference on Computer Communications and Intelligent Systems
Jijel, Algeria
Nov 22, 2022
SHOW ALL

OTHER MACHINE LEARNING EVENTS

ECIR 2023: 45th European Conference on Information Retrieval
Dublin, Ireland
Apr 2, 2023
Open-SOFOS 2022: Open Data Science for Food Security
Online Event
Sep 19, 2022
ACM ICMLSC 2023: ACM--2023 The 7th International Conference on Machine Learning and Soft Computing (ICMLSC 2023)
Chongqing, China
Jan 5, 2023
IPMV 2023: 2023 5th International Conference on Image Processing and Machine Vision (IPMV 2023)
Macau, China
Jan 13, 2023
SPIE ICMV 2022: SPIE--2022 The 15th International Conference on Machine Vision (ICMV 2022)
Rome, Italy
Nov 18, 2022
SHOW ALL