Information Systems Security Conference
16–20 December 2025, Indore, Madhya Pradesh, India
Ushering Next Gen Cybersecurity through AI

ICISS 2025 - The 21st Annual International Information System Security Conference

Accepted Papers


Full Length Papers


  1. Curriculum Learning with Image Transformation and Explainable AI for Improved Network Intrusion Detection
    • Sathwik Narkedimilli (Telecom Paris, Institut Polytechnique de Paris (IP Paris), Département Informatique et Réseaux (INFRES), Paris, France)
    • Pavan Kumar (Indian Institute of Information Technology Dharwad, Computer Science and Engineering, Dharwad, India)
    • Raghavendra Ramachandra (Norwegian University of Science and Technology, Gjøvik, Norway)
  2. SoK: Evaluation of Methods for Privacy Preserving Edge Video Analytics
    • Arun Joseph (Indian Institute of Science, Computer Science and Automation, Bangalore, India)
    • Vinod Ganapathy (Indian Institute of Science, Computer Science and Automation, Bangalore, India)
  3. SAAT: Stealthy Adversarial Attack on IDS in Cyber Physical Systems using Control Logic Induction
    • Tanmoy Kanti Das (National Institute of Technology Raipur, Department of Computer Applications, Raipur, India)
    • Rajneesh Kumar Pandey (National Institute of Technology Raipur, Department of Computer Applicatins, Raipur, India)
  4. Privacy-Preserving Fair Text Summarization Using Federated Learning
    • Aman Lachhiramka (Indian Institute of Technology (IIT) Roorkee, Roorkee, India)
    • Nibhrant Vaishnav (Indian Institute of Technology (IIT) Roorkee, Roorkee, India)
    • Dheeraj Kumar (Indian Institute of Technology (IIT) Roorkee, Roorkee, India)
  5. Cryptanalysis of Two Outsourced Ciphertext-Policy Attribute-Based Encryption Schemes
    • Koshalesh Meher (NIT Warangal, Hanumakonda, India)
    • Y. Sreenivasa Rao (NIT Warangal, Telangana, Hanumakonda, India)
  6. NEXUS: Neuron Activation Scores Exploits for Unveiling Sensitive Attributes
    • Debasmita Manna (Indian Institute of Technology Patna, Patna, India)
    • Somanath Tripathy (Indian Institute of Technology Patna, Patna, India)
  7. MazeNet: Protecting DNN Models on Public Cloud Platforms With TEEs
    • Kripa Shanker (Indian Institute of Science, Bengaluru, India)
    • Vivek Kumar (Indian Institute of Science, Bengaluru, India)
    • Aditya Kanade (Microsoft Research India, Bengaluru, India)
    • Vinod Ganapathy (IISc Bangalore, Computer Science and Automation, Bangalore, India)
  8. Systematic Analysis of Vulnerabilities and Defenses in VPNs, Tor, and Web Browsers
    • Neha Neha Agarwal (University of Denver, Denver, USA)
    • Ethan Mackin (University of Denver, Denver, USA)
    • Faiza Tazi (University of Denver, Denver, USA)
    • Mayank Grover (George Mason University, Fairfax, United States)
    • Rutuja More (George Mason University, Fairfax, United States)
    • Sanchari Das (George Mason University, Fairfax, United States)
  9. Automation and Risk: Transformers Models Reshape Secrecy Information Management
    • Wellington Fernandes Silvano (Federal University of Santa Catarina (UFSC), Araranguá, Brazil)
    • Maurício Konrath (Federal University of Santa Catarina (UFSC), Florianópolis, Brazil)
    • Lucas Mayr (Federal University of Santa Catarina (UFSC), Florianópolis, Brazil)
    • Ricardo Felipe Custódio (Federal University of Santa Catarina (UFSC), Florianópolis, Brazil)
  10. Adversarial Attack on CryptoEyes from INFOCOM 2021
    • Jashwanth Kadaru (IIIT Bangalore, Bengaluru, India)
    • Imtiyazuddin Shaik (IIIT Bangalore, Bengaluru, India)
    • Srinivas Vivek (IIIT Bangalore, Bengaluru, India)
  11. Cyber Warfare During Operation Sindoor: Malware Campaign Analysis and Detection Framework
    • Prakhar Paliwal (IIT Bombay, Mumbai, India)
    • Atul Kabra (IIT Bombay, Mumbai, India)
    • Manjesh Kumar Hanawal (IIT Bombay, Mumbai, India)
  12. Attack Resilient Federated Learning Framework
    • Sushant Kumar (IIT Bhubaneswar, Bhubaneswar, India)
    • Kasturi Routray (IIT Bhubaneswar, Bhubaneswar, India)
    • Padmalochan Bera (IIT Bhubaneswar, Bhubaneswar, India)
  13. Uncovering Security Weaknesses in srsRAN withCodeQL: A Static Analysis Approach forNext-Gen RAN Systems
    • Garrepelly Manideep (Amrita Vishwa Vidyapeetham, India)
    • Sriram Sankaran (Amrita Vishwa Vidyapeetham, Amritapuri, Kerala, India)
    • Altaf Shaik (Security in Telecommunications Department, Berlin, Germany)
  14. Dynamic Key-Constant Aggregate Encryption (DKCAE) for Secure Data Sharing in Contemporary Computing
    • Inarat Hussain (Indian Institute of Information Technology Vadodara, International Campus Diu, Department of Computer Science and Engineering, Diu, India)
    • Devrikh Jatav (Indian Institute of Information Technology Vadodara, International Campus Diu, Department of Computer Science and Engineering, Diu, India)
    • Gaurav Pareek (Indian Institute of Information Technology Vadodara, International Campus Diu, Department of Computer Science and Engineering, Diu, India)
    • Purushothama B R (National Institute of Technology Karnataka, Surathkal, Department of Information Technology, Surathkal, India)
  15. Randomness efficient algorithms for estimating average gate fidelity via k-wise classical and quantum independence
    • Pranab Sen (Tata Institute of Fundamental Research, India)
    • Aditya Nema (RWTH Aachen, Germany)

 

Short Papers


  1. Frequency-Aware Deepfake Detection: Transformers vs. CNNs
    • Aditi Panda (Siksha O Anusandhan University, Bhubaneswar, India)
    • Srijit Kundu (SRM Institute of Science and Technology, Chennai, India, Chennai, India)
    • Tanusree Ghosh (Indian Institute of Engineering Science and Technology, Shibpur, India, Shibpur, India)
    • Ruchira Naskar (Indian Institute of Engineering Science and Technology, Shibpur, Kolkata, India)
  2. Enhancing LAD for Financial Fraud Detection Using Genetic Prime Pattern Enumeration (GPPE) and Random Forest Feature Selection
    • Nikhil Katiyar (NIT Uttarakhand, Srinagar Uttarakhand, India)
    • Sneha Chauhan (NIT Uttarakhand, Srinagar Uttarakhand, India)
    • Sugata Gangopadhyay (IIT Roorkee, Roorkee, India)
    • Aditi Kar Gangopadhyay (IIT Roorkee, Roorkee, India)
  3. Security and Privacy Assessment of U.S. and Non-U.S. Android E-Commerce Applications
    • Urvashi Kishnani (University of Denver, Denver, United States)
    • Sanchari Das (George Mason University, Fairfax, United States)
  4. An ML-Driven Adaptive Risk-Based Access Control for the Internet of Drones (IoD)
    • Jithu Vijay V P (Digital University Kerala, Trivandrum, India)
    • Sabu M Thampi (Digital University Kerala, Trivandrum, India)
    • Alwin Varghese T (Digital University Kerala, Trivandrum, India)
  5. The Hidden Risks of LLM-Generated Web Application Code: A Security-Centric Evaluation of Code Generation Capabilities in Large Language Models
    • Swaroop Dora (Indian Institute of Information Technology, Allahabad, Prayagraj, India)
    • Deven Lunkad (Indian Institute of Information Technology, Allahabad, Prayagraj, India)
    • Naziya Aslam (Indian Institute of Information Technology, Allahabad, Prayagraj, India)
    • Subramanian Venkatesan (Indian Institute of Information Technology, Allahabad, Prayagraj, India)
    • Sandeep Kumar Shukla (Indian Institute of Technology Kanpur, Kanpur, India)
  6. Self Learning Digital Twin For Kubernetes Security
    • Devnath N S (Center for Cyber Security Systems & Networks, Amrita Vishwa Vidyapeetham, Amritapuri, India)
    • Adarsh Sasikumar (Center for Cyber Security Systems & Networks, Amrita Vishwa Vidyapeetham, Amritapuri, India)
    • Aayushman Singh (Center for Cyber Security Systems & Networks, Amrita Vishwa Vidyapeetham, Amritapuri, India)
    • Sriram Sankaran (Center for Cyber Security Systems & Networks, Amrita Vishwa Vidyapeetham, Amritapuri, India)
  7. Optimizing Machine Learning Based Access Control Administration Through Data Distillation
    • Mohammad Nur Nobi (University of Texas at San Antonio, San Antonio, USA)
    • Md Shohel Rana (Georgia Southern University, School of Computing, Statesboro, USA)
    • Ram Krishnan (UT San Antonio, United States of America)
  8. SANVector: SBERT-APTNet Vector framework for Cyber Threat Attack Attribution using diversified CTI Logs
    • Sougata Dolai (Department of Computer Science and Engineering, IIT Patna, Bihar, India 801103, Patna, India)
    • Annu Kumari (Department of Computer Science and Engineering, IIT Patna, Bihar, India 801103, Patna, India)
    • Mayank Agarwal (Department of Computer Science and Engineering, IIT Patna, Bihar, India 801103, Patna, India)
  9. Adaptive MQTT Honeypots for IIoT Security Using Extended Mealy Machines
    • Saurabh chamotra (CDAC, CSTD, mohali, India)
  10. Modular Analysis of Attack Graphs for Smart Grid Security
    • Smitha Rani (Digital University Kerala, Thiruvananthapuram, India)
    • Preetam Mukherjee (Digital University Kerala, Thiruvananthapuram, India)
    • Mathias Ekstedt (KTH Royal Institute of Technology, Stockholm, Sweden)
  11. DoPQM: Devices Oriented Post-Quantum Cryptographic Migration Strategies for an Enterprise Network
    • Amit Bhowmick (Tata Consultancy Services)
    • Divyesh Saglani (Tata Consultancy Services, Pune, India)
    • Lakshmi Padmaja Maddali (Tata Consultancy Services, Hydrabad, India)
    • Miss Akhila Rayala (SNU, Chennai, India)
    • Meena Singh Dilip Thakur (Tata Consultancy Services, Bangalore, India)
    • Rajan M A (Tata Consultancy Services, Cyber Security and Privacy Research, Bangalore, India)
  12. Security-Centric NWDAF Module for Threat Detection and Mitigation in 5G Core Networks
    • Lakshmi R. Nair (Digital University Kerala, Thiruvananthapuram, India)
    • Adithya Anil (Digital University Kerala, Thiruvananthapuram, India)
    • Preetam Mukherjee (Digital University Kerala, Thiruvananthapuram, India)
    • Manuj Aggarwal (Ministry of Electronics and IT, Government of India, New Delhi, India)
  13. Enhancing Android Malware Detection with Federated Learning: A Privacy-Preserving Approach to Strengthen Cyber Resilience: Enhancing Android Malware Detection using FL
    • Monalisa meena (Govt. Mahila Engineering College, Ajmer, India)
    • Jyoti Gajrani (Govt. Engg. College, Ajmer, Ajmer, India)
    • Meenakshi Tripathi (Malaviya National Institute of Technology, Jaipur, Jaipur, India)
    • Dhruv Suthar (Govt. Engg. College, Ajmer, Ajmer, India)
    • Chetan Rawat (Govt. Engg. College, Ajmer, Ajmer, India)
    • Sweety Singhal (Sangam University, Bhilwara, India)
  14. A Secure Federated Learning using Differential Privacy Mondrian Clustering
    • Rojalini Tripathy (IIT Bhubaneswar, Bhubaneswar, India)
    • Paladri Pranitha (IIT Bhubaneswar, Bhubaneswar, India)
    • B U Tejonath (IIT Bhubaneswar, Bhubaneswar, India)
    • Padmalochan Bera (IIT Bhubaneswar, Bhubaneswar, India)