Call For Papers

Conference Websitehttps://www.camlis.org/

*Submit via Microsoft CMT

https://cmt3.research.microsoft.com/CAMLIS2024

*Please note that all presentations are required to be in-person. CAMLIS will be offering student scholarships again this year. CAMLIS 2024 Student Scholarship

VenueSands Capital Management, 1000 Wilson Boulevard, 30th Floor, Arlington, VA 22209

Important Dates:

CFP Opens: Thursday, April 11, 2024

CFP Closes: Sunday, June 30, 2024 

Accepted/Rejected Notifications: Friday, August 2, 2024 

Submission info:

The Conference on Applied Machine Learning in Information Security (CAMLIS) is a venue that gathers researchers and practitioners to discuss applied and fundamental research on machine learning in information security. CAMLIS 2024 will be located at the Offices of Sands Capital Management in Arlington, VA.

We invite two types of submissions: 1) a full-length paper or 2) an extended abstract submission. Both submission types will be considered for a talk or a poster depending on the author’s selection. This year, full length papers will undergo an additional round of selection for conference proceedings (i.e., acceptance for presentation and selection for proceedings will be two distinct processes).  Submissions should focus on the direct application or adaptation of statistics, machine learning, deep learning, data analytics, and/or data science to infosec relevant areas including: 

  • Insider threat detection

  • Network and endpoint forensics

  • Governance, compliance and exfiltration detection

  • Detection of script-based and malware-less attacks

  • Automated malware detection, classification, and/or evasion

  • Vulnerability assessment

  • Open-source software security

  • Dark web analytics

  • Cyber threat intelligence applications

  • Cybersecurity risk management

  • The security of machine learning models as an additional attack surface

  • Political disinformation and computational propaganda

  • Adversarial attack generation to enhance robustness of cyber-defenses

  • Zero-trust security

  • AI risk management

  • Phishing detection, classification, and/or evasion

  • Security of ML

  • Binary Analysis

  • Cloud Security

We encourage submissions that include analytic or predictive themes:

  • Statistical analysis on large and small datasets

  • Unique considerations of base-rate fallacy for data science in information security

  • Infosec data sources and exploratory data analysis

  • Unique approaches to dataset visualization

  • Adversarial machine learning and ML Red Teaming in the context of infosec

  • Original or cross-domain deep learning architectures applied to information security data

  • Natural language processing, image analysis, signal analysis

  • Reinforcement learning for automating security tasks

  • Multi-agent solutions

  • Unsupervised and semi-supervised approaches

  • Explainable ML for Infosec

  • Multi-view, multi-task, and multi-source learning

  • Uncertainty Estimation and Risk Measurement

  • Knowledge distillation and transfer learning paradigms

  • Graph embedding (node, edge, graph-level)

  • Large Language Models (LLMs) applications for InfoSec + Security vulnerabilities of LLMs


We invite both original submissions and presentations submitted very recently at other venues (since January 2024) for conference talks and posters.

To be eligible for conference proceedings, which will be indexable by major academic search engines (e.g., Google Scholar), submitted papers must contain sufficiently novel material (i.e., not a direct copy from other conference submissions) to avoid conflicts of interest. 

 

We invite two types of submissions to CAMLIS 2024:

  1. Full length Papers: 

Submitted papers should be formatted in accordance with 2-column IEEE Conference templates and submitted as PDF documents, between 6 and 12 pages not including references and supplemental material. The presentation of the content should be concise and precise to help reviewers judge papers on their methodological novelty and contributions to a particular application of security. Each paper will undergo a double-blind review and will be considered for presentation as a talk or poster.Papers will also be considered for proceedings, though this selection process is independent of presentation selection. To be eligible for proceedings, papers must contain sufficiently novel contributions from prior/contemporaneous published work to avoid conflicts of interest with other conferences. Manuscripts priorly published as whitepapers not submitted to other conference venues,  solely to arXiv are fine without additional material. 

2. Extended Abstracts:

Authors are also welcome to submit a two-page extended abstract that would be considered for inclusion in the program as a talk or poster. The abstract should summarize the problem addressed, the solution presented, a high-level overview of the content of the proposed talk, including key results and takeaways. Extended abstracts are expected to adhere to the following formatting requirements.

    •  Formatted in accordance with 2-column IEEE Conference templates and submitted as PDF documents,

    • No more than 2 pages of text excluding images and references. No more than 3 pages with images and references. Images should be included after the main text for length clarity, as length will be enforced for review standardization.

Irrespective of submission type, reviews will be carried out in a double-blind manner to ensure maximum fairness. This means that reviewers should not know the identities of the authors and authors should not know identities of reviewers. Consequently, submitted manuscripts, whether abstracts or full length papers should include no identification of the authors within the documents.. 

Irrespective of submission type, the data, representations, model settings, evaluation set up, and performance metrics should all be clearly described in the submissions.

Accepted talks will be presented as talks of 20 minutes in length with up to 5 minutes of discussion period after each talk. Talks will also be recorded and made publicly available after the conference. The poster session will be held live and in person during the CAMLIS event. 

While not required, once accepted (i.e., after the double-blind review process), authors are encouraged to provide code, data, and documentation from their research in a publically accessible forma or repository (e.g., GitHub). This will help to facilitate scientific reproducibility of impactful research within our community and help to generate innovative research in a timelier and streamlined manner.

We encourage participation from academics working in information security, government research labs, national laboratories, and FFRDCs, and information security data scientists in industry.

This year, we are not directly soliciting demos, but we are willing to consider including them as part of accepted talks or posters on an individual basis. If you're interested in exploring this possibility further, please feel free to reach out for more information.

Poster Guidelines:

You will be provided with an easel and 36" x 48" board to fix your poster to. Portrait/tall orientation is recommended, no tri-folds.

Questions:

If you have any questions please reach out to Program@camlis.org.