Hamish Burke | 2025-03-03
My most relevant references
Title | Publication Venue | Year |
---|---|---|
EMBER: An Open Dataset for Training Static PE Malware Machine Learning Models | arXiv (Preprint) | 2018 |
DeepPoison: Feature Transfer Based Stealthy Poisoning Attack | arXiv (Preprint) IEEE Transactions on Circuits and Systems | 2021 |
Lookin’ Out My Backdoor! Investigating Backdooring Attacks Against DL-driven Malware Detectors | ACM Workshop on Artificial Intelligence and Security (AISec) | 2023 |
Proving Data-Poisoning Robustness in Decision Trees | ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI) | 2020 |
STRIP: A Defence Against Trojan Attacks on Deep Neural Networks | Annual Computer Security Applications Conference (ACSAC) | 2019 |
Label Poisoning Is All You Need | arXiv (Preprint) | 2023 |
Backdoor Learning: A Survey | IEEE Transactions on Neural Networks and Learning Systems (TNNLS) | 2022 |
Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks | International Symposium on Research in Attacks, Intrusions, and Defenses (RAID) | 2018 |
Privacy and Security Issues in Deep Learning: A Survey | IEEE Access | 2021 |
Trojaning Attack on Neural Networks | Network and Distributed System Security Symposium (NDSS) | 2018 |
BATMAN: Backdoor Attacks and Threat Model Assessments in Neural Networks | No clear publication venue listed | N/A |
Peering Inside the PE: A Tour of the Win32 Portable Executable File Format | Microsoft Systems Journal | 1994 |
BackdoorBench: A Comprehensive Benchmark of Backdoor Learning | Advances in Neural Information Processing Systems (NeurIPS) | 2022 |
Data Poisoning Attacks Against Machine Learning Algorithms | Expert Systems with Applications (Elsevier) | 2022 |
Transferable Clean-Label Poisoning Attacks on Deep Neural Nets | International Conference on Machine Learning (ICML) | 2019 |
The most relevant conferences and journals for your work seem to be:
- Security and AI/ML Conferences: AISec, ACSAC, RAID, NDSS
- ML & AI Conferences: ICML, NeurIPS, PLDI
- Security/AI Journals: IEEE TNNLS, IEEE Access, Expert Systems with Applications
Conferences to look into
Submission Deadline | Conference Name | Relevant Tags | Location | Link |
---|---|---|---|---|
March 23, 2025 | Security in Machine Learning and its Applications (SiMLA) 2025 | Machine Learning Security, Adversarial Learning, Privacy-Preserving ML | Munich, Germany | SiMLA 2025 CFP |
March 31, 2025 | IEEE International Conference on Intelligence and Security Informatics (ISI) 2025 | AI Security, Threat Intelligence, Cybersecurity | Hong Kong, China | IEEE ISI 2025 CFP |
May 11, 2025 (Abstract) May 15, 2025 (Full Paper) |
Conference on Neural Information Processing Systems (NeurIPS) 2025 | Neural Information Processing, Machine Learning | Vancouver, Canada | NeurIPS 2025 CFP |
June 2025 (Exact date TBD) | USENIX Security Symposium 2025 | Computer Security, Machine Learning Security | San Francisco, USA | USENIX Security 2025 CFP |
September 27, 2025 (Abstract) October 1, 2025 (Full Paper) |
International Conference on Learning Representations (ICLR) 2025 | Machine Learning, Representation Learning | Location TBD | ICLR 2025 CFP |
January 23, 2025 (Abstract) January 30, 2025 (Full Paper) |
International Conference on Machine Learning (ICML) 2025 | Machine Learning, Artificial Intelligence | Vienna, Austria | ICML 2025 CFP |
Rolling Submissions | ACM Transactions on Privacy and Security (TOPS) | Cybersecurity, Privacy, ML Security | Journal | ACM TOPS Submission |
Rolling Submissions | IEEE Transactions on Information Forensics and Security (TIFS) | Security, Cryptography, AI Safety | Journal | IEEE TIFS Submission |
Possible Timeline
Deadline | Venue | Tier | Reasoning |
---|---|---|---|
March 23 | SiMLA 2025 | Third-tier | Good backup option, early feedback, higher acceptance rate |
March 31 | IEEE ISI 2025 | Second-tier | Good for applied cybersecurity, moderate selectivity |
June (TBD) | RAID 2025 | Second-tier | Solid security venue, moderate selectivity |
Mid-year (TBD) | AISec 2025 (likely co-located with CCS) | Second-tier | Highly relevant, moderate selectivity, good visibility |
Mid-year (TBD) | ACSAC 2025 | Second-tier | Practical security applications, moderate selectivity |
Rolling Submission | Expert Systems with Applications | Second-tier journal | Good for practical ML security research, moderate selectivity |
Summary of Revised Recommendations
- Primary Targets (Second-tier): AISec, ACSAC, RAID, IEEE ISI, ESORICS, IEEE EuroS&P
- Backup Targets (Third-tier): SiMLA, specialised workshops
- Journal Options: Expert Systems with Applications, IEEE Access
- Strengthening Your Paper: Clearly articulate contributions, thorough evaluations, practical relevance, early feedback