Call for Submissions ●

We are inviting submissions for AMLUCS to be considered to present or submit a poster, and we encourage participation from all fields and backgrounds, on the following themes:

  • AI/ML Innovations & Applications in Cyber Defence
  • Enhancing Cyber Resilience through Human-Machine Teaming
  • Leveraging Foundation Models & GPAI for Cyber Defence
  • AI-Powered Computer Vision for Enhanced Cyber Resilience
  • Responsible, Ethical, Trustworthy & Fair AI/ML

To attend the event, applicants need to also be registered in order to be eligible to present/poster and this can be done up until the closing date.

Submission Process ●

The submission process is as follows:

1) We request abstracts for the presentation and/or poster ideas to be submitted to the amlucs@fnc.co.uk email - the closing date for the call for submissions is ***UPDATED 8th September at 17:00 UPDATED*** The abstract should be 500 words maximum per submission, and you are able to submit both to present and to poster. Abstracts should provide an introduction to your research, the research aims, benefits and findings to date. We would also like to hear what has been your favourite aspect of the work, and why.

2) The abstracts will be reviewed by our technical committee and down selected for the event, at which point successful applicants will be notified.

3) Successful applicants will be requested to submit a full submission of their presentation and/or poster. The technical panel will review submissions, provide feedback on updates if required and provide approval once complete.

4) Please be aware that if the research you're submitting was MOD funded, it will be required to follow the Permission to Publish (P2P) route to allow you to present and/or poster. The AMLUCS team will assist you in stepping through this.

5) Please note all selected submissions for the event need to have been fully approved by the 27th of September, with P2P completed, should this be applicable.

 

Additional information on the themes and presentation/poster format can be found at the bottom of this page.

Submission Guidance ●

Presentations

  • All presentations will be conducted in-person during the event and should be 30 minutes long, with 20 minutes to present and 10 minutes for Q&A.
  • The presentation should provide an introduction to your research, the research aims, the benefits and the findings to date with application, if applicable.
  • Submissions should centre on a theme identified below, and slides will be made available after the conference to attendees.

Posters

Posters will be displayed throughout the conference space, with time dedicated in the agenda for attendees to view them.

The following criteria is suggested for posters:

  •      Problem (Situation, Complication and Question)
  •      Approach (Answer to the Problem)
  •      Benefits (if possible, quantified) and Outcomes (including Key Achievements)
  •      Exploitation Routes and Opportunities
  •      Impact of Work (e.g. growth of Cyber / AI Skills, internal investment , recruitment, etc.)

The use of diagrams and images is encouraged, and those selected are requested to print their own poster on size A0 paper, with a suggested text size of 18. The poster can be portrait or landscape.

Submission Themes ●

We are inviting submissions against the following themes, but the topics are open for consideration.

 

1. AI/ML Innovations & Applications in Cyber Defence

Including, but not limited to:

  • AI/ML uses in threat detection and intelligence: intrusion detection, anomalous behaviour detection, malware/network forensics or analysis, quantum-resistant algorithms, bio-enhanced innovations, digital footprints, etc.
  • Deep learning/quantum ML applications for predictive analytics in cyber threat landscapes, or bio-inspired algorithms for self-adaptive cyber defence
  • AI-enhanced simulation environments for training and real-time adaptation of cyber defensive strategies

 

2. Enhancing Cyber Resilience through Human-Machine Teaming

Including, but not limited to:

  • Enhancing human-AI collaboration to empower decision-making and dynamic reconfiguration of cyber defence mechanisms or autonomous systems
  • Enhancing and/or measuring system explainability, user trust and confidence in AI security applications or other assistive technologies in cyber defence, such as trust calibration mechanisms
  • Development of AI/ML systems that can synergistically adapt to human-led strategic changes in cyber defence protocols and procedures

 

3. Leveraging Foundation Models & GPAI for Cyber Defence

Including, but not limited to:

  • Scaling foundation models or leveraging quantum computing to handle large-scale, complex cyber defence challenges, e.g. adversarial machine learning protection.
  • Cross-domain adaptation of GPAI/ML models for seamless integration into cyber defensive infrastructures.
  • Mitigation of model drift in AI systems, self-healing networks or infrastructures to keep up with and maintain robustness against dynamic and ever-changing cyber defence threats.

 

4. AI-Powered Computer Vision for Enhanced Cyber Resilience

Including, but not limited to:

  • Multi-modal and cross-platform visual security: deepfake or procedurally generated image detection/prevention, visual data privacy and anonymisation, real-time surveillance analysis, forensic imaging, defence intelligence applications, etc.
  • AI/ML-driven techniques for detecting anomalies in visual data streams, or conversion of non-visual data into a visual format for automated parsing and pattern detection, to enable real-time or early threat detection.
  • AI-enhanced adaptive visual recognition applications, such as ensuring variations in light levels, environmental factors, or image quality do not impact accuracy or consistency of analysis of cyber defence data.
    ​​​​​

5. Responsible, Ethical, Trustworthy & Fair AI/ML

Including, but not limited to:

  • Applications and designs for AI/ML models which account for fairness, accountability and/or bias mitigation in cyber defence.
  • Considerations of ethical and societal implications of AI in cyber defence applications, such as base-rate fallacy impacts on predictions.
  • Detection and mitigation of AI-enabled attacks, and limitations/risks in current AI/ML applications, ensuring responsible and trustworthy use of autonomous or intelligent technologies.

AMLUCS Logos ●

Please use these logos for inclusion on submissions.

Contact Us

For general questions and enquiries, please contact us at amlucs@fnc.co.uk