
MLHat: The 2nd International Workshop on Deployable Machine Learning for Security Defense
15 August 2021 @ 1pm-5pm PT (Pacific Time) — Virtual Space
co-located with 26TH ACM SIGKDD Conference on Knowledge Discovery and Data Mining
News
Proceedings can be downloaded here
Agenda is now available (link)
Workshop-only registration is now available (link)
Acceptance notification is out!
Camera ready deadline is August 2, 2021 (instructions)
Talk video deadline is August 10, 2021 (instructions)
Paper submission deadline is extended to June 4, 2021
The 2nd MLHat workshop will be co-located with KDD 2021!
Keynote

Farinaz Koushanfar, UC San Diego
Farinaz Koushanfar is a professor and Henry Booker Faculty Scholar in the Electrical and Computer Engineering (ECE) department at University of California San Diego (UCSD), where she is the founding co-director of the UCSD Center for Machine Intelligence, Computing & Security (MICS).
Call for Papers
Important Dates
- Paper submission deadline:
May 20, 2021June 4, 2021 - Acceptance notification:
June 20, 2021July 2, 2021 - Talk video due: August 10, 2021
- Camera ready due: August 2, 2021
- Workshop: August 15 @ 1pm-5pm PST, 2021 ($50 workshop-only registration link)
Overview
In recent years, we have seen machine learning algorithms, particularly deep learning algorithms, revolutionizing many domains such as computer vision, speech, and natural language processing. In contrast, the impact of these new advances in machine learning is still fairly limited in the domain of security defense. While there is research progress in applying machine learning for threat forensics, malware analysis, intrusion detection, and vulnerability discovery, there are still grand challenges to be addressed before a machine learning system can be deployed and operated in practice as a critical component of cyber defense. Major challenges include but not limited to the scale of the problem (billions of known attacks), adaptability (hundreds of millions of new attacks every year), inference speed and efficiency (compute resource is constrained), adversarial attacks (highly motivated evasion and poisoning attacks), the urging demand for explainability (for threat investigation), and the need for integrating human (e.g., SOC analysts) in the loop.
This workshop aims to bring together academic researchers and industry practitioners to discuss the open challenges, potential solutions, and best practices to deploy machine learning at scale for security defense. The goal is to define new machine learning paradigms under various security application contexts and identifying exciting new future research directions. At the same time, the workshop will also have a strong industry presence to provide insights into the challenges in deploying and maintaining machine learning models, and the much needed discussion on the capabilities that the state-of-the-arts failed to provide.
Topics of Interest
Topics of interest include (but not limited to):
- Malware analysis, detection, classification, and attribution
- Vulnerability discovery using machine learning
- ML applications for cloud infrastructure and IoT security
- Network attack detection, classification, and analysis
- Spam, phishing, online scam detection
- Malicious behaviors in online social networks
- Sequence analysis for system/network events
- Anomaly detection
- Model verdict explainability in security applications
- Privacy preserving security data collection and sharing
- Robustness of machine learning models against adversarial attacks
- Concept drift detection and explanation
- Interactive machine learning for security
- Few-shot learning for security applications
- Resource constrained machine learning
- Deep and shallow learning applications
Submission Guidelines
We welcome different types of papers, including:
- Novel research papers
- Work-in-progress papers
- Visionary and position papers
- Papers that describe real-world security data sets
We ask the authors to clearly specify the paper type in the abstract, to help reviewers assess the contributions. Submissions must be in PDF and formatted according to the templates linked below. The main content of the paper should be 25-28 single-column pages of content with unlimited number of pages for appendices and references (equivalent to 7-8 pages of standard double-column ACM Sigconf Proceedings Style). Each submission will be single-blind reviewed by at least 3 PC members.
Accepted papers will be archived as full papers in Springer Communications in Computer and Information Science (CCIS) and will be presented orally during the workshop. At least one author of each accepted paper must attend the workshop to present the work in order for the paper to be archived.
Paper template: LaTex, Word, Overleaf
Submission Site
https://cmt3.research.microsoft.com/MLHat2021
Committee
Workshop Chairs
Gang Wang, UIUC, USA
Arridhana Ciptadi, TruEra, USA
Ali Ahmadzadeh, Blue Hexagon, USA
Program Committee
Binghui Wang, Duke University
Zhou Li, UC Irvine
Fabio Pierazzi, King’s College London
Gianluca Stringhini, Boston University
Ting Wang, Penn State University
Wenbo Guo, Penn State University
Alborz Rezazadeh, LG AI Research Lab
Sadia Afroz, Avast
Siddharth Bhatia, National University of Singapore