Hamish Burke | 2025-03-03

#DIR


My most relevant references

Title Publication Venue Year
EMBER: An Open Dataset for Training Static PE Malware Machine Learning Models arXiv (Preprint) 2018
DeepPoison: Feature Transfer Based Stealthy Poisoning Attack arXiv (Preprint) IEEE Transactions on Circuits and Systems 2021
Lookin’ Out My Backdoor! Investigating Backdooring Attacks Against DL-driven Malware Detectors ACM Workshop on Artificial Intelligence and Security (AISec) 2023
Proving Data-Poisoning Robustness in Decision Trees ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI) 2020
STRIP: A Defence Against Trojan Attacks on Deep Neural Networks Annual Computer Security Applications Conference (ACSAC) 2019
Label Poisoning Is All You Need arXiv (Preprint) 2023
Backdoor Learning: A Survey IEEE Transactions on Neural Networks and Learning Systems (TNNLS) 2022
Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks International Symposium on Research in Attacks, Intrusions, and Defenses (RAID) 2018
Privacy and Security Issues in Deep Learning: A Survey IEEE Access 2021
Trojaning Attack on Neural Networks Network and Distributed System Security Symposium (NDSS) 2018
BATMAN: Backdoor Attacks and Threat Model Assessments in Neural Networks No clear publication venue listed N/A
Peering Inside the PE: A Tour of the Win32 Portable Executable File Format Microsoft Systems Journal 1994
BackdoorBench: A Comprehensive Benchmark of Backdoor Learning Advances in Neural Information Processing Systems (NeurIPS) 2022
Data Poisoning Attacks Against Machine Learning Algorithms Expert Systems with Applications (Elsevier) 2022
Transferable Clean-Label Poisoning Attacks on Deep Neural Nets International Conference on Machine Learning (ICML) 2019

The most relevant conferences and journals for your work seem to be:

Conferences to look into

Submission Deadline Conference Name Relevant Tags Location Link
March 23, 2025 Security in Machine Learning and its Applications (SiMLA) 2025 Machine Learning Security, Adversarial Learning, Privacy-Preserving ML Munich, Germany SiMLA 2025 CFP
March 31, 2025 IEEE International Conference on Intelligence and Security Informatics (ISI) 2025 AI Security, Threat Intelligence, Cybersecurity Hong Kong, China IEEE ISI 2025 CFP
May 11, 2025 (Abstract)
May 15, 2025 (Full Paper)
Conference on Neural Information Processing Systems (NeurIPS) 2025 Neural Information Processing, Machine Learning Vancouver, Canada NeurIPS 2025 CFP
June 2025 (Exact date TBD) USENIX Security Symposium 2025 Computer Security, Machine Learning Security San Francisco, USA USENIX Security 2025 CFP
September 27, 2025 (Abstract)
October 1, 2025 (Full Paper)
International Conference on Learning Representations (ICLR) 2025 Machine Learning, Representation Learning Location TBD ICLR 2025 CFP
January 23, 2025 (Abstract)
January 30, 2025 (Full Paper)
International Conference on Machine Learning (ICML) 2025 Machine Learning, Artificial Intelligence Vienna, Austria ICML 2025 CFP
Rolling Submissions ACM Transactions on Privacy and Security (TOPS) Cybersecurity, Privacy, ML Security Journal ACM TOPS Submission
Rolling Submissions IEEE Transactions on Information Forensics and Security (TIFS) Security, Cryptography, AI Safety Journal IEEE TIFS Submission

Possible Timeline

Deadline Venue Tier Reasoning
March 23 SiMLA 2025 Third-tier Good backup option, early feedback, higher acceptance rate
March 31 IEEE ISI 2025 Second-tier Good for applied cybersecurity, moderate selectivity
June (TBD) RAID 2025 Second-tier Solid security venue, moderate selectivity
Mid-year (TBD) AISec 2025 (likely co-located with CCS) Second-tier Highly relevant, moderate selectivity, good visibility
Mid-year (TBD) ACSAC 2025 Second-tier Practical security applications, moderate selectivity
Rolling Submission Expert Systems with Applications Second-tier journal Good for practical ML security research, moderate selectivity

Summary of Revised Recommendations