Accepted Papers
                
                  
                  
                    
                       Full Length Papers 
                      
                        
                      
                      
                        
                          - 
                            Curriculum Learning with Image Transformation and Explainable AI for Improved Network
                              Intrusion Detection
                            
                              - Sathwik Narkedimilli (Telecom Paris, Institut Polytechnique de Paris (IP Paris),
                                Département Informatique et Réseaux (INFRES), Paris, France)
- Pavan Kumar (Indian Institute of Information Technology Dharwad, Computer Science
                                and Engineering, Dharwad, India)
- Raghavendra Ramachandra (Norwegian University of Science and Technology, Gjøvik,
                                Norway)
 
- 
                              SoK: Evaluation of Methods for Privacy Preserving Edge Video Analytics
                            
                              - 
                                Arun Joseph (Indian Institute of Science, Computer Science and Automation, Bangalore,
                                India)
                              
- Vinod Ganapathy (Indian Institute of Science, Computer Science and Automation, Bangalore, India)
                              
 
- SAAT: Stealthy Adversarial Attack on IDS in Cyber Physical
                              Systems using Control Logic Induction
                            
                            
                              - 
                                Tanmoy Kanti Das (National Institute of Technology Raipur, Department of Computer
                                Applications, Raipur, India)
                              
- 
                                Rajneesh Kumar Pandey (National Institute of Technology Raipur, Department of Computer
                                Applicatins, Raipur, India)
                              
 
- Privacy-Preserving Fair Text Summarization Using Federated
                              Learning
                            
                            
                              - 
                                Aman Lachhiramka (Indian Institute of Technology (IIT) Roorkee, Roorkee, India)
                              
- Nibhrant Vaishnav (Indian Institute of Technology (IIT) Roorkee, Roorkee, India)
- Dheeraj Kumar (Indian Institute of Technology (IIT) Roorkee, Roorkee, India)
 
- Cryptanalysis of Two Outsourced Ciphertext-Policy
                              Attribute-Based Encryption Schemes
                            
                            
                              - 
                                Koshalesh Meher (NIT Warangal, Hanumakonda, India)
                              
- Y. Sreenivasa Rao (NIT Warangal, Telangana, Hanumakonda, India)
 
- NEXUS: Neuron Activation Scores Exploits for Unveiling
                              Sensitive Attributes
                            
                            
                              - 
                                Debasmita Manna (Indian Institute of Technology Patna, Patna, India)
                              
- Somanath Tripathy (Indian Institute of Technology Patna, Patna, India)
 
- MazeNet: Protecting DNN Models on Public Cloud Platforms
                              With TEEs
                            
                            
                              - 
                                Kripa Shanker (Indian Institute of Science, Bengaluru, India)
                              
- Vivek Kumar (Indian Institute of Science, Bengaluru, India)
- Aditya Kanade (Microsoft Research India, Bengaluru, India)
- Vinod Ganapathy (IISc Bangalore, Computer Science and Automation, Bangalore, India)
                              
 
- Systematic Analysis of Vulnerabilities and Defenses in
                              VPNs, Tor, and Web Browsers 
                            
                              - Neha Neha Agarwal (University of Denver, Denver, USA)
- Ethan Mackin (University of Denver, Denver, USA)
- Faiza Tazi (University of Denver, Denver, USA)
- Mayank Grover (George Mason University, Fairfax, United States)
- Rutuja More (George Mason University, Fairfax, United States)
- Sanchari Das (George Mason University, Fairfax, United States)
 
- Automation and Risk: Transformers Models Reshape Secrecy
                              Information Management
                            
                              - Wellington Fernandes Silvano (Federal University of Santa Catarina (UFSC), Araranguá,
                                Brazil)
- Maurício Konrath (Federal University of Santa Catarina (UFSC), Florianópolis, Brazil)
                              
- Lucas Mayr (Federal University of Santa Catarina (UFSC), Florianópolis, Brazil)
- Ricardo Felipe Custódio (Federal University of Santa Catarina (UFSC), Florianópolis,
                                Brazil)
 
- Adversarial Attack on CryptoEyes from INFOCOM 2021
                            
                              - Jashwanth Kadaru (IIIT Bangalore, Bengaluru, India)
- Imtiyazuddin Shaik (IIIT Bangalore, Bengaluru, India)
- Srinivas Vivek (IIIT Bangalore, Bengaluru, India)
 
- Cyber Warfare During Operation Sindoor: Malware Campaign
                              Analysis and Detection Framework
                            
                              - Prakhar Paliwal (IIT Bombay, Mumbai, India)
- Atul Kabra (IIT Bombay, Mumbai, India)
- Manjesh Kumar Hanawal (IIT Bombay, Mumbai, India)
 
- Attack Resilient Federated Learning Framework
                            
                              - Sushant Kumar (IIT Bhubaneswar, Bhubaneswar, India)
- Kasturi Routray (IIT Bhubaneswar, Bhubaneswar, India)
- Padmalochan Bera (IIT Bhubaneswar, Bhubaneswar, India)
 
- Uncovering Security Weaknesses in srsRAN withCodeQL: A
                              Static Analysis Approach forNext-Gen RAN Systems
                            
                              - Garrepelly Manideep (Amrita Vishwa Vidyapeetham, India)
- Sriram Sankaran (Amrita Vishwa Vidyapeetham, Amritapuri, Kerala, India)
- Altaf Shaik (Security in Telecommunications Department, Berlin, Germany)
 
- Dynamic Key-Constant Aggregate Encryption (DKCAE) for
                              Secure Data Sharing in Contemporary Computing
                            
                              - Inarat Hussain (Indian Institute of Information Technology Vadodara, International
                                Campus Diu, Department of Computer Science and Engineering, Diu, India)
- Devrikh Jatav (Indian Institute of Information Technology Vadodara, International
                                Campus Diu, Department of Computer Science and Engineering, Diu, India)
- Gaurav Pareek (Indian Institute of Information Technology Vadodara, International
                                Campus Diu, Department of Computer Science and Engineering, Diu, India)
- Purushothama B R (National Institute of Technology Karnataka, Surathkal,
                                Department of Information Technology, Surathkal, India)
 
- Randomness efficient algorithms for estimating average
                              gate fidelity via k-wise classical and quantum independence
                            
                              - Pranab Sen (Tata Institute of Fundamental Research, India)
- Aditya Nema (RWTH Aachen, Germany)
 
 
                     
                   
                   
                  
                  
                    
                       Short Papers	 
                      
                        
                      
                      
                        
                          - Frequency-Aware Deepfake Detection: Transformers vs. CNNs
                            
                              - Aditi Panda (Siksha O Anusandhan University, Bhubaneswar, India)
- Srijit Kundu (SRM Institute of Science and Technology, Chennai, India, Chennai, India)
- Tanusree Ghosh (Indian Institute of Engineering Science and Technology, Shibpur, India, Shibpur, India)
- Ruchira Naskar (Indian Institute of Engineering Science and Technology, Shibpur, Kolkata, India)
 
- Enhancing LAD for Financial Fraud Detection Using Genetic Prime Pattern Enumeration (GPPE) and Random Forest Feature Selection
                            
                              - Nikhil Katiyar (NIT Uttarakhand, Srinagar Uttarakhand, India)
- Sneha Chauhan (NIT Uttarakhand, Srinagar Uttarakhand, India)
- Sugata Gangopadhyay (IIT Roorkee, Roorkee, India)
- Aditi Kar Gangopadhyay (IIT Roorkee, Roorkee, India)
 
- Security and Privacy Assessment of U.S. and Non-U.S. Android E-Commerce Applications
                            
                              - Urvashi Kishnani (University of Denver, Denver, United States)
- Sanchari Das (George Mason University, Fairfax, United States)
 
- An ML-Driven Adaptive Risk-Based Access Control for the Internet of Drones (IoD)
                            
                              - Jithu Vijay V P (Digital University Kerala, Trivandrum, India)
- Sabu M Thampi (Digital University Kerala, Trivandrum, India)
- Alwin Varghese T (Digital University Kerala, Trivandrum, India)
 
- The Hidden Risks of LLM-Generated Web Application Code: A Security-Centric Evaluation of Code Generation Capabilities in Large Language Models
                            
                              - Swaroop Dora (Indian Institute of Information Technology, Allahabad, Prayagraj, India)
- Deven Lunkad (Indian Institute of Information Technology, Allahabad, Prayagraj, India)
- Naziya Aslam (Indian Institute of Information Technology, Allahabad, Prayagraj, India)
- Subramanian Venkatesan (Indian Institute of Information Technology, Allahabad, Prayagraj, India)
- Sandeep Kumar Shukla (Indian Institute of Technology Kanpur, Kanpur, India)
 
- Self Learning Digital Twin For Kubernetes Security
                            
                              - Devnath N S (Center for Cyber Security Systems & Networks, Amrita Vishwa Vidyapeetham, Amritapuri, India)
- Adarsh Sasikumar (Center for Cyber Security Systems & Networks, Amrita Vishwa Vidyapeetham, Amritapuri, India)
- Aayushman Singh (Center for Cyber Security Systems & Networks, Amrita Vishwa Vidyapeetham, Amritapuri, India)
- Sriram Sankaran (Center for Cyber Security Systems & Networks, Amrita Vishwa Vidyapeetham, Amritapuri, India)
 
- Optimizing Machine Learning Based Access Control Administration Through Data Distillation
                            
                              - Mohammad Nur Nobi (University of Texas at San Antonio, San Antonio, USA)
- Md Shohel Rana (Georgia Southern University, School of Computing, Statesboro, USA)
- Ram Krishnan (UT San Antonio, United States of America)
 
- SANVector: SBERT-APTNet Vector framework for Cyber Threat Attack Attribution using diversified CTI Logs
                            
                              - Sougata Dolai (Department of Computer Science and Engineering, IIT Patna, Bihar, India 801103, Patna, India)
- Annu Kumari (Department of Computer Science and Engineering, IIT Patna, Bihar, India 801103, Patna, India)
- Mayank Agarwal (Department of Computer Science and Engineering, IIT Patna, Bihar, India 801103, Patna, India)
 
- Adaptive MQTT Honeypots for IIoT Security Using Extended Mealy Machines
                            
                              - Saurabh chamotra (CDAC, CSTD, mohali, India)
 
- Modular Analysis of Attack Graphs for Smart Grid Security
                            
                              - Smitha Rani (Digital University Kerala, Thiruvananthapuram, India)
- Preetam Mukherjee (Digital University Kerala, Thiruvananthapuram, India)
- Mathias Ekstedt (KTH Royal Institute of Technology, Stockholm, Sweden)
 
- DoPQM: Devices Oriented Post-Quantum Cryptographic Migration Strategies for an Enterprise Network
                            
                              - Amit Bhowmick (Tata Consultancy Services)
- Divyesh Saglani (Tata Consultancy Services, Pune, India)
- Lakshmi Padmaja Maddali (Tata Consultancy Services, Hydrabad, India)
- Miss Akhila Rayala (SNU, Chennai, India)
- Meena Singh Dilip Thakur (Tata Consultancy Services, Bangalore, India)
- Rajan M A (Tata Consultancy Services, Cyber Security and Privacy Research, Bangalore, India)
 
- Security-Centric NWDAF Module for Threat Detection and Mitigation in 5G Core Networks
                            
                              - Lakshmi R. Nair (Digital University Kerala, Thiruvananthapuram, India)
- Adithya Anil (Digital University Kerala, Thiruvananthapuram, India)
- Preetam Mukherjee (Digital University Kerala, Thiruvananthapuram, India)
- Manuj Aggarwal (Ministry of Electronics and IT, Government of India, New Delhi, India)
 
- Enhancing Android Malware Detection with Federated Learning: A Privacy-Preserving Approach to Strengthen Cyber Resilience: Enhancing Android Malware Detection using FL
                            
                              - Monalisa meena (Govt. Mahila Engineering College, Ajmer, India)
- Jyoti Gajrani (Govt. Engg. College, Ajmer, Ajmer, India)
- Meenakshi Tripathi (Malaviya National Institute of Technology, Jaipur, Jaipur, India)
- Dhruv Suthar (Govt. Engg. College, Ajmer, Ajmer, India)
- Chetan Rawat (Govt. Engg. College, Ajmer, Ajmer, India)
- Sweety Singhal (Sangam University, Bhilwara, India)
 
- A Secure Federated Learning using Differential Privacy Mondrian Clustering
                            
                              - Rojalini Tripathy (IIT Bhubaneswar, Bhubaneswar, India)
- Paladri Pranitha (IIT Bhubaneswar, Bhubaneswar, India)
- B U Tejonath (IIT Bhubaneswar, Bhubaneswar, India)
- Padmalochan Bera (IIT Bhubaneswar, Bhubaneswar, India)