Accepted Papers
Full Length Papers
-
Curriculum Learning with Image Transformation and Explainable AI for Improved Network
Intrusion Detection
- Sathwik Narkedimilli (Telecom Paris, Institut Polytechnique de Paris (IP Paris),
Département Informatique et Réseaux (INFRES), Paris, France)
- Pavan Kumar (Indian Institute of Information Technology Dharwad, Computer Science
and Engineering, Dharwad, India)
- Raghavendra Ramachandra (Norwegian University of Science and Technology, Gjøvik,
Norway)
-
SoK: Evaluation of Methods for Privacy Preserving Edge Video Analytics
-
Arun Joseph (Indian Institute of Science, Computer Science and Automation, Bangalore,
India)
- Vinod Ganapathy (Indian Institute of Science, Computer Science and Automation, Bangalore, India)
- SAAT: Stealthy Adversarial Attack on IDS in Cyber Physical
Systems using Control Logic Induction
-
Tanmoy Kanti Das (National Institute of Technology Raipur, Department of Computer
Applications, Raipur, India)
-
Rajneesh Kumar Pandey (National Institute of Technology Raipur, Department of Computer
Applicatins, Raipur, India)
- Privacy-Preserving Fair Text Summarization Using Federated
Learning
-
Aman Lachhiramka (Indian Institute of Technology (IIT) Roorkee, Roorkee, India)
- Nibhrant Vaishnav (Indian Institute of Technology (IIT) Roorkee, Roorkee, India)
- Dheeraj Kumar (Indian Institute of Technology (IIT) Roorkee, Roorkee, India)
- Cryptanalysis of Two Outsourced Ciphertext-Policy
Attribute-Based Encryption Schemes
-
Koshalesh Meher (NIT Warangal, Hanumakonda, India)
- Y. Sreenivasa Rao (NIT Warangal, Telangana, Hanumakonda, India)
- NEXUS: Neuron Activation Scores Exploits for Unveiling
Sensitive Attributes
-
Debasmita Manna (Indian Institute of Technology Patna, Patna, India)
- Somanath Tripathy (Indian Institute of Technology Patna, Patna, India)
- MazeNet: Protecting DNN Models on Public Cloud Platforms
With TEEs
-
Kripa Shanker (Indian Institute of Science, Bengaluru, India)
- Vivek Kumar (Indian Institute of Science, Bengaluru, India)
- Aditya Kanade (Microsoft Research India, Bengaluru, India)
- Vinod Ganapathy (IISc Bangalore, Computer Science and Automation, Bangalore, India)
- Systematic Analysis of Vulnerabilities and Defenses in
VPNs, Tor, and Web Browsers
- Neha Neha Agarwal (University of Denver, Denver, USA)
- Ethan Mackin (University of Denver, Denver, USA)
- Faiza Tazi (University of Denver, Denver, USA)
- Mayank Grover (George Mason University, Fairfax, United States)
- Rutuja More (George Mason University, Fairfax, United States)
- Sanchari Das (George Mason University, Fairfax, United States)
- Automation and Risk: Transformers Models Reshape Secrecy
Information Management
- Wellington Fernandes Silvano (Federal University of Santa Catarina (UFSC), Araranguá,
Brazil)
- Maurício Konrath (Federal University of Santa Catarina (UFSC), Florianópolis, Brazil)
- Lucas Mayr (Federal University of Santa Catarina (UFSC), Florianópolis, Brazil)
- Ricardo Felipe Custódio (Federal University of Santa Catarina (UFSC), Florianópolis,
Brazil)
- Adversarial Attack on CryptoEyes from INFOCOM 2021
- Jashwanth Kadaru (IIIT Bangalore, Bengaluru, India)
- Imtiyazuddin Shaik (IIIT Bangalore, Bengaluru, India)
- Srinivas Vivek (IIIT Bangalore, Bengaluru, India)
- Cyber Warfare During Operation Sindoor: Malware Campaign
Analysis and Detection Framework
- Prakhar Paliwal (IIT Bombay, Mumbai, India)
- Atul Kabra (IIT Bombay, Mumbai, India)
- Manjesh Kumar Hanawal (IIT Bombay, Mumbai, India)
- Attack Resilient Federated Learning Framework
- Sushant Kumar (IIT Bhubaneswar, Bhubaneswar, India)
- Kasturi Routray (IIT Bhubaneswar, Bhubaneswar, India)
- Padmalochan Bera (IIT Bhubaneswar, Bhubaneswar, India)
- Uncovering Security Weaknesses in srsRAN withCodeQL: A
Static Analysis Approach forNext-Gen RAN Systems
- Garrepelly Manideep (Amrita Vishwa Vidyapeetham, India)
- Sriram Sankaran (Amrita Vishwa Vidyapeetham, Amritapuri, Kerala, India)
- Altaf Shaik (Security in Telecommunications Department, Berlin, Germany)
- Dynamic Key-Constant Aggregate Encryption (DKCAE) for
Secure Data Sharing in Contemporary Computing
- Inarat Hussain (Indian Institute of Information Technology Vadodara, International
Campus Diu, Department of Computer Science and Engineering, Diu, India)
- Devrikh Jatav (Indian Institute of Information Technology Vadodara, International
Campus Diu, Department of Computer Science and Engineering, Diu, India)
- Gaurav Pareek (Indian Institute of Information Technology Vadodara, International
Campus Diu, Department of Computer Science and Engineering, Diu, India)
- Purushothama B R (National Institute of Technology Karnataka, Surathkal,
Department of Information Technology, Surathkal, India)
- Randomness efficient algorithms for estimating average
gate fidelity via k-wise classical and quantum independence
- Pranab Sen (Tata Institute of Fundamental Research, India)
- Aditya Nema (RWTH Aachen, Germany)
Short Papers
- Frequency-Aware Deepfake Detection: Transformers vs. CNNs
- Aditi Panda (Siksha O Anusandhan University, Bhubaneswar, India)
- Srijit Kundu (SRM Institute of Science and Technology, Chennai, India, Chennai, India)
- Tanusree Ghosh (Indian Institute of Engineering Science and Technology, Shibpur, India, Shibpur, India)
- Ruchira Naskar (Indian Institute of Engineering Science and Technology, Shibpur, Kolkata, India)
- Enhancing LAD for Financial Fraud Detection Using Genetic Prime Pattern Enumeration (GPPE) and Random Forest Feature Selection
- Nikhil Katiyar (NIT Uttarakhand, Srinagar Uttarakhand, India)
- Sneha Chauhan (NIT Uttarakhand, Srinagar Uttarakhand, India)
- Sugata Gangopadhyay (IIT Roorkee, Roorkee, India)
- Aditi Kar Gangopadhyay (IIT Roorkee, Roorkee, India)
- Security and Privacy Assessment of U.S. and Non-U.S. Android E-Commerce Applications
- Urvashi Kishnani (University of Denver, Denver, United States)
- Sanchari Das (George Mason University, Fairfax, United States)
- An ML-Driven Adaptive Risk-Based Access Control for the Internet of Drones (IoD)
- Jithu Vijay V P (Digital University Kerala, Trivandrum, India)
- Sabu M Thampi (Digital University Kerala, Trivandrum, India)
- Alwin Varghese T (Digital University Kerala, Trivandrum, India)
- The Hidden Risks of LLM-Generated Web Application Code: A Security-Centric Evaluation of Code Generation Capabilities in Large Language Models
- Swaroop Dora (Indian Institute of Information Technology, Allahabad, Prayagraj, India)
- Deven Lunkad (Indian Institute of Information Technology, Allahabad, Prayagraj, India)
- Naziya Aslam (Indian Institute of Information Technology, Allahabad, Prayagraj, India)
- Subramanian Venkatesan (Indian Institute of Information Technology, Allahabad, Prayagraj, India)
- Sandeep Kumar Shukla (Indian Institute of Technology Kanpur, Kanpur, India)
- Self Learning Digital Twin For Kubernetes Security
- Devnath N S (Center for Cyber Security Systems & Networks, Amrita Vishwa Vidyapeetham, Amritapuri, India)
- Adarsh Sasikumar (Center for Cyber Security Systems & Networks, Amrita Vishwa Vidyapeetham, Amritapuri, India)
- Aayushman Singh (Center for Cyber Security Systems & Networks, Amrita Vishwa Vidyapeetham, Amritapuri, India)
- Sriram Sankaran (Center for Cyber Security Systems & Networks, Amrita Vishwa Vidyapeetham, Amritapuri, India)
- Optimizing Machine Learning Based Access Control Administration Through Data Distillation
- Mohammad Nur Nobi (University of Texas at San Antonio, San Antonio, USA)
- Md Shohel Rana (Georgia Southern University, School of Computing, Statesboro, USA)
- Ram Krishnan (UT San Antonio, United States of America)
- SANVector: SBERT-APTNet Vector framework for Cyber Threat Attack Attribution using diversified CTI Logs
- Sougata Dolai (Department of Computer Science and Engineering, IIT Patna, Bihar, India 801103, Patna, India)
- Annu Kumari (Department of Computer Science and Engineering, IIT Patna, Bihar, India 801103, Patna, India)
- Mayank Agarwal (Department of Computer Science and Engineering, IIT Patna, Bihar, India 801103, Patna, India)
- Adaptive MQTT Honeypots for IIoT Security Using Extended Mealy Machines
- Saurabh chamotra (CDAC, CSTD, mohali, India)
- Modular Analysis of Attack Graphs for Smart Grid Security
- Smitha Rani (Digital University Kerala, Thiruvananthapuram, India)
- Preetam Mukherjee (Digital University Kerala, Thiruvananthapuram, India)
- Mathias Ekstedt (KTH Royal Institute of Technology, Stockholm, Sweden)
- DoPQM: Devices Oriented Post-Quantum Cryptographic Migration Strategies for an Enterprise Network
- Amit Bhowmick (Tata Consultancy Services)
- Divyesh Saglani (Tata Consultancy Services, Pune, India)
- Lakshmi Padmaja Maddali (Tata Consultancy Services, Hydrabad, India)
- Miss Akhila Rayala (SNU, Chennai, India)
- Meena Singh Dilip Thakur (Tata Consultancy Services, Bangalore, India)
- Rajan M A (Tata Consultancy Services, Cyber Security and Privacy Research, Bangalore, India)
- Security-Centric NWDAF Module for Threat Detection and Mitigation in 5G Core Networks
- Lakshmi R. Nair (Digital University Kerala, Thiruvananthapuram, India)
- Adithya Anil (Digital University Kerala, Thiruvananthapuram, India)
- Preetam Mukherjee (Digital University Kerala, Thiruvananthapuram, India)
- Manuj Aggarwal (Ministry of Electronics and IT, Government of India, New Delhi, India)
- Enhancing Android Malware Detection with Federated Learning: A Privacy-Preserving Approach to Strengthen Cyber Resilience: Enhancing Android Malware Detection using FL
- Monalisa meena (Govt. Mahila Engineering College, Ajmer, India)
- Jyoti Gajrani (Govt. Engg. College, Ajmer, Ajmer, India)
- Meenakshi Tripathi (Malaviya National Institute of Technology, Jaipur, Jaipur, India)
- Dhruv Suthar (Govt. Engg. College, Ajmer, Ajmer, India)
- Chetan Rawat (Govt. Engg. College, Ajmer, Ajmer, India)
- Sweety Singhal (Sangam University, Bhilwara, India)
- A Secure Federated Learning using Differential Privacy Mondrian Clustering
- Rojalini Tripathy (IIT Bhubaneswar, Bhubaneswar, India)
- Paladri Pranitha (IIT Bhubaneswar, Bhubaneswar, India)
- B U Tejonath (IIT Bhubaneswar, Bhubaneswar, India)
- Padmalochan Bera (IIT Bhubaneswar, Bhubaneswar, India)