| Session |
Article Id |
Time |
Title/authors/Institution |
Abstract |
1A-1 |
1 |
Dec. 16, 2025 09:00 ~ 10:30 |
TGPOA: Task and Geography Privacy-Preserving Offloading Algorithm in 6G Network Aoran Huang, Huachun Zhou (Beijing Jiaotong University) | |
1A-2 |
2 |
Dec. 16, 2025 09:00 ~ 10:30 |
Proxy-CAN: Multi-Resolution Feature Fusion for In-Vehicle Signal Regression Woong Kyo Jung, Byung-Il Kwak, Meelan Han (Korea University) | |
1A-3 |
3 |
Dec. 16, 2025 09:00 ~ 10:30 |
Error-driven Prompting Strategy to enhance Policy as Code Generation for Kubernetes Jeongeun Ryu, Jueun Son, Yumin Lee, Seoyun Kang, Seongmin Kim(Sungshin Women’s University) | |
1A-4 |
4 |
Dec. 16, 2025 09:00 ~ 10:30 |
Development and Evaluation of a Disaster Response Task Visualization SystemAimed at Supporting Decision-Making by Local Government Employees Yuta Seri, Tomoyuki Ishidan (Fukuoka Institute of Technology) | |
1A-5 |
5 |
Dec. 16, 2025 09:00 ~ 10:30 |
Federated Learning-based Intrusion Detection System for Internet of AutonomousVehicles against Poisoning Attacks Ulysses Lam, Hyunjae Kang, Dan Dongseong Kim (The University of Queensland)Jin-Hee Cho (Virginia Tech)Hyuk Lim (Korea Institute of Energy Technology)Terrence Moore, Frederica Free-Nelson (US DEVCOM Army Research Laboratory) | |
1B-1 |
6 |
Dec. 16, 2025 09:00 ~ 10:30 |
PoisoningGuard: An Agentic LLM Framework for Explainable Red-Teaming Against Poisoning Attacks Junseok Shin, Jinhyuk Jang, Daeseon Cho (Soongsil University) | |
1B-2 |
7 |
Dec. 16, 2025 09:00 ~ 10:30 |
Self-HarmLLM: Can Large Language Model Harm Itself Heehwan Kim, Sungjune Park, Daeseon Choi (Soongsil University) | |
1B-3 |
8 |
Dec. 16, 2025 09:00 ~ 10:30 |
Beyond Fixed and Dynamic Prompts: Embedded Jailbreak Templates for Advancing LLM Security Hajun Kim, Hyunsik Na, Daeseon Choi (Soongsil University) | |
1B-4 |
9 |
Dec. 16, 2025 09:00 ~ 10:30 |
On the Effectiveness of Instruction-Tuning Local LLMs for Identifying SoftwareVulnerabilities Sangryu Park, Gihyuk Ko, Homook Cho (KAIST Cyber Security Research Center) | |
1B-5 |
10 |
Dec. 16, 2025 09:00 ~ 10:30 |
Aligning AI-Driven Cyber Threat with Policy Responses: A CCI-Based Framework Su Kyeong Heo, Jungmin Kang, Dooho Choi (Korea University) | |
1C-1 |
11 |
Dec. 16, 2025 09:00 ~ 10:30 |
VoiceShield: Real-Time Speech Protection with Preserved Machine Recognizability Jeeeun Park, Soona Lee, Yeonhee Kim, Gyurim Kim, Jongkil Kim (Ewha Womans University) | |
1C-2 |
12 |
Dec. 16, 2025 09:00 ~ 10:30 |
Preliminary Visualization of Outdoor Video Content Using Principal ComponentAnalysis Kaoru Sugita (Fukuoka Institute of Technology) | |
1C-3 |
13 |
Dec. 16, 2025 09:00 ~ 10:30 |
From Cookie and Passport.js to JWT: Secure and Scalable Web Authentication Cheng-Yuan Ho, Yi-Shiuan Lin, Yi-Jhen Li, Li-Sheng Wei, Tai-Ju Yang, Meng-Syuan Tsai (National Taiwan University) | |
1C-4 |
14 |
Dec. 16, 2025 09:00 ~ 10:30 |
Analysis of a Cybersecurity Training Curriculum for Nuclear Facilities and Suggestions for Improvement Sooyon Seo, Dongmin Kim, Damin Kim, Moohong Min (Sungkyunkwan University)Jae-Jun Han, Junghyun Na, Hyun-Kyung Lee (Korea Institute of Nuclear Nonproliferation and Control)Aram Kim (Suwon University) | |
1C-5 |
15 |
Dec. 16, 2025 09:00 ~ 10:30 |
Adaptive Privacy-Preserving Framework for Network Traffic Anomaly Detection Yu-ran Jeon, Seungha Jee, Su-Kyoung Kim, Il-Gu Lee(Sungshin Women’s University) | |
2A-1 |
16 |
Dec. 16, 2025 10:45 ~ 12:00 |
3D5G-O: DDoS Detection and Defense System of 5G on O-RAN Shih-Ting Chiu, Fang-Yie Leu, Kun-Lin Tsai (Tunghai University)Heru Susanto (Universiti Teknologi Brunei) | |
2A-2 |
17 |
Dec. 16, 2025 10:45 ~ 12:00 |
Field Validation of Multiple IoT Sensors for Detecting Geographical Phenomena in an Early Warning System for Heavy Rainfall Noriki Uchida, Tomoyuki Ishida (Fukuoka Institute of Technology)Yoshitaka Shibata (Iwate Prefectural University) | |
2A-3 |
18 |
Dec. 16, 2025 10:45 ~ 12:00 |
IWOA-LightGBM: A Hybrid Optimization Approach for Sensor Data Anomaly Detection Rong Huang (The Academy of Digital China (Fujian))Qiqiang Wu, Mingwei Yang, Yanhua Liu (Fuzhou University)(Engineering Research Center of Big Data Intelligence, Ministry of Education)Baokang Zhao (National University of Defense Technology) | |
2A-4 |
19 |
Dec. 16, 2025 10:45 ~ 12:00 |
The Effect of Increased Dimensionality on Detecting Malicious IoMT Network Traffic Jayden Alonzo-Estrada, Anthony Mora, Abraham Avila, Ram Basnet (Colorado Mesa University) | |
2B-1 |
20 |
Dec. 16, 2025 10:45 ~ 12:00 |
An Efficient Revocable Attribute-based Encryption Scheme Supporting DataIntegrity Yue Zhang, Meijuan Huang (Baoji University of Arts and Sciences)Bo Yang (Shaanxi Normal University)Haijun Liu (Shaanxi Aerospace Time Navigation Equipment Co.,Ltd) | |
2B-2 |
21 |
Dec. 16, 2025 10:45 ~ 12:00 |
Deniable Kyber: A Post-Quantum Deniable KEM Scheme Shih-Ming Sun, Po-Wen Chi (National Taiwan Normal University) | |
2B-3 |
22 |
Dec. 16, 2025 10:45 ~ 12:00 |
Multi-Keyword Searchable Identity-Based Proxy Re-Encryption with Validity Period Control from Lattices Er-Shuo Zhuang, Kai-Him Lam, Ming-Feng Tsai, Wei-Cheng Hung, Chun-I Fan(National Sun Yat-sen University) | |
2B-4 |
23 |
Dec. 16, 2025 10:45 ~ 12:00 |
Multi-Authority Attribute-Based Multi-Keyword Searchable Encryption with Dynamic Membership from Lattices Er-Shuo Zhuang, Wei-Lin Lai, Xu-Zhi L, Chun-I Fan (National Sun Yat-sen University) | |
2C-1 |
24 |
Dec. 16, 2025 10:45 ~ 12:00 |
An LLM-Based Method for the Analysis of Multiple Network Behaviors Sinuo Zhang, Aoran Huang, Huachun Zhou (Beijing Jiaotong University) | |
2C-2 |
25 |
Dec. 16, 2025 10:45 ~ 12:00 |
Autoencoder-Based Multi-Classification for TCP Attack Detection in Private 5GNetwork Jinha Kim, Seung Joon Na, Hwankuk Kim (Kookmin University)Nakyung Lee (Sangmyung University) | |
2C-3 |
26 |
Dec. 16, 2025 10:45 ~ 12:00 |
Impact of Data Extraction Methods on Pseudo-Label Quality in Malicious BehaviorDetection of Encrypted Network Traffic Chaeeun Won, Yeasul Kim, Hwankuk Kim (Kookmin University) | |
2C-4 |
27 |
Dec. 16, 2025 10:45 ~ 12:00 |
A Cross-Modal Deep Learning Framework for Joint Semantic and Structural Threat Detection in Provenance Graphs Seong-Su Yoon, Hui-Seok Yang, Ieck-Chae Euom (Chonnam National University) | |
3A-1 |
28 |
Dec. 16, 2025 16:30 ~ 18:00 |
Hybrid Quantum Key Distribution and Post-Quantum Cryptography for Secure 5G-AKA Authentication with Forward Secrecy Wibby Aldryani Astuti Praditasari (Universitas Pertahanan Indonesia)Hyejin Yoon, Hyeongyeop Kim, Okyeon Yi (Kookmin University) | |
3A-2 |
29 |
Dec. 16, 2025 16:30 ~ 18:00 |
Known IV attack on PANAMA Stream Cipher using Grover’s Algorithm Rajeswari S, Kunwar Singh, Sanakaranarayanan R (National Institute of Technology) | |
3A-3 |
30 |
Dec. 16, 2025 16:30 ~ 18:00 |
Isogeny-based KEMs for TLS 1.3: A Comparative Study of CSIDH/PEGASIS and POKÉ Hyungrok Jo, Shunsuke Toyoda, Junji Shikata (Yokohama National University) | |
3A-4 |
31 |
Dec. 16, 2025 16:30 ~ 18:00 |
Quantum-Enhanced Detection Mechanisms for Mobile Network Security Antonio Baggiano, Franco Cirillo, Christian Esposito (University of Salerno) | |
3A-5 |
32 |
Dec. 16, 2025 16:30 ~ 18:00 |
Multivariate Quadratic Signatures in the NIST Process: A Survey and ComparativeAnalysis Jian Zhang (Graduate School of Hanyang University)Seong-Min Cho (Electronics and Telecommunications Research Institute (ETRI))Seung-Hyun Seo (Hanyang University ERICA) | |
3B-1 |
33 |
Dec. 16, 2025 16:30 ~ 18:00 |
Key management mechanism with non-stored and user authentication-based key recovery Su Jin Shin, Kyung-Hyune Rhee (Graduate School Pukyong National University)Siwan Noh (Dong-Eui University)Kyung-Hyune Rhee (Pukyong National University and the Industrial Science Technology Research Institute)Sang Uk Shin (Pukyong National University) | |
3B-2 |
34 |
Dec. 16, 2025 16:30 ~ 18:00 |
Lightweight Time-Indexed Secure Communication Protocol with Dual-LayerDefense for UAV Swarm Networks Kun-Lin Tsai, Guo-Wei Wang, Fang-Yie Leu, Chao-Tung Yang (TungHai University) | |
3B-3 |
35 |
Dec. 16, 2025 16:30 ~ 18:00 |
Privacy-Preserving Zero Trust Network Access Control System Using ChameleonHash Functions and Fully Homomorphic Encryption Ankita Jagadish, Hideaki Miyaji, Noriaki Kamiyama (Ritsumeikan University) | |
3B-4 |
36 |
Dec. 16, 2025 16:30 ~ 18:00 |
A Scripting Language for Security Patching in Open RAN Dong Hyeok Kim, Jinseo Lee, Min Suk Kang (KAIST) | |
3B-5 |
37 |
Dec. 16, 2025 16:30 ~ 18:00 |
An Anomaly Detection Using Multi-Modal Datasets in Industrial Control Systems Yunsung Kim, Gyeongdeok An, Jaecheol Ha (Hoseo University), Jongbae Hwang (NNSP Inc) | |
3C-1 |
38 |
Dec. 16, 2025 16:30 ~ 18:00 |
IoMT-Driven Emergency Data Access for Unidentified and Unconscious Patients in Road Accidents Leveraging Privacy-Preserving Blockchain Protocols and Cryptographic Primitives V Maruthi, Kunwar Singh (National Institute of Technology)Sk Karthika (Vellore Institute of Technology) | |
3C-2 |
39 |
Dec. 16, 2025 16:30 ~ 18:00 |
ZKR-TEE: A Zero-Knowledge Rollup Framework in Trusted ExecutionEnvironments Gianni Canavero, Gaurav Choudhary, Nicola Dragoni (Technical University of Denmark) | |
3C-3 |
40 |
Dec. 16, 2025 16:30 ~ 18:00 |
Circuit Normalization Bottlenecks in Trivial Zero-Knowledge Decision TreeEvaluation Kai-Che Shih, Tzu-Yu Fan Chiang, Wen-Chi Lai, Tzu-Chen Huang, Chen-Hao Kao, Yu-Chi Chen(National Taipei University of Technology)Wei-Chung Teng (National Taiwan University of Science and Technology) | |
3C-4 |
41 |
Dec. 16, 2025 16:30 ~ 18:00 |
HEPFS: Homomorphic Encryption-based Privacy Forwarding Scheme for Efficient Ciphertext-Domain Routing Jianbang Chen, Yizhong Hu, Jianfeng Guan (Beijing University of Posts and Telecommunications) | |
4A-1 |
42 |
Dec. 17, 2025 09:00 ~ 10:30 |
Reconstruction attack on Wi-Fi sensing obfuscation Chae-Yeon Park, So-Eun Jeon, Il-Gu Lee (Sungshin Women's University) | |
4A-2 |
43 |
Dec. 17, 2025 09:00 ~ 10:30 |
Service-level Threat Scenarios and Resilience Approaches in Private 5G Networks Seungjoon Na, Jinha Kim and Hwankuk Kim (Kookmin University) | |
4A-3 |
44 |
Dec. 17, 2025 09:00 ~ 10:30 |
Toward Agentic AI in 6G Security: Specialized Small Language Model for False Base Station Detection I Wayan Adi Juliawan Pawana, Vincent Abella, Hoseok Kwon, Bonam Kim, Ilsun You (Kookmin University) | |
4A-4 |
45 |
Dec. 17, 2025 09:00 ~ 10:30 |
Cooperative Global Detection with Dynamic Multi-Link Recovery for Jamming Resilience of Internet of Things Min-Ji Cho, So-Eun Jeon, Il-Gu Lee (Sungshin Women's University) | |
4A-5 |
46 |
Dec. 17, 2025 09:00 ~ 10:30 |
Semantic Relations Analysis of Safety and Security Requirementsin Industrial Control Systems using Natural Language Inference Joon-Seok Kim, Ka-Kyung Kim, Ieck-Chae Euom (Chonnam National University) | |
4B-1 |
47 |
Dec. 17, 2025 09:00 ~ 10:30 |
VulnRemediate AI : An Integrated Framework for Semantic Vulnerability Detectionand Generative Remediation Pranta Mazumder, Raj Mutsuddy, Adnan Mobarok, Nay Nang, Mahir Daiyan, Arbid Chakma, Tanjim Mahmud (Rangamati Science and Technology University)Rakhimjon Rajapboyevich Rakhimov (Urgench State University Urgench)Sabirov Sardor (Mamun University)Barno Matchanova (Urgench state pedagogical institute)Kuanishbay Kenesbaevich Seitnazarov (Nukus state pedagogical institute)Mohammad Shahadat Hossain (University of Chittagong)Karl Andersson (Lule˚a University of Technology) | |
4B-2 |
48 |
Dec. 17, 2025 09:00 ~ 10:30 |
Embedding Semantic Backdoors into AI-Powered Anomaly Detection Models in Industrial Control Systems Ka-Kyung Kim, Joon-Seok Kim, Ieck-Chae Euom (Chonnam National University) | |
4B-3 |
49 |
Dec. 17, 2025 09:00 ~ 10:30 |
Design and Implementation of an AI-based IDS xApp for Open RAN Hyeonsoo Yu, Suhyeon Lee, Hwankuk Kim (Kookmin University) | |
4B-4 |
50 |
Dec. 17, 2025 09:00 ~ 10:30 |
Implementing an Image-based Intruder Detection System using YOLOtalk Yun-Wei Lin, Min-Tong Lin (National Yang Ming Chiao Tung University) | |
4B-5 |
51 |
Dec. 17, 2025 09:00 ~ 10:30 |
Security Evaluation Frameworks for AI Agents: A Comparative Analysis and Future Directions Seong Bean Park, Hyun Min Song (Dankook University) | |
4C-1 |
W1 |
Dec. 17, 2025 09:00 ~ 10:30 |
Toward Quantum-Resilient eSIM Provisioning: Integrating ML-KEM and OQS-TLSinto Consumer RSP Jhury Kevin Lastre, Hoseok Kwon, Bonam Kim, Ilsun You (Kookmin University) | |
4C-2 |
W2 |
Dec. 17, 2025 09:00 ~ 10:30 |
Formal Verification of the PRINS: Secure Application Layer Protection for 5G Roaming Tae Ho Won, Bonam Kim, Ilsun You (Kookmin University) | |
4C-3 |
W3 |
Dec. 17, 2025 09:00 ~ 10:30 |
Adaptive Circuit Breaker Configuration for Transition from Istio Sidecar to Ambient Mode Jiwon Yoo, Seoyeon Kang, Kahyun Kim, Hyeyeon Hyeon, Seongmin Kim (Sungshin Women’s University) | |
4C-4 |
W4 |
Dec. 17, 2025 09:00 ~ 10:30 |
Prompt-Conditioned Scene Reconstruction based on StableDiffusion for Investigative Hypothesis Testing Jeong-Hwa Ryu, Da-Hyung Kim, Su-bin Lee, Seongmin Kim (Sungshin Women’s University) | |
4C-5 |
W5 |
Dec. 17, 2025 09:00 ~ 10:30 |
A Prefetch-based LLM System Using Response Reuse Yeonju Han, Sohyun Park, Il-Gu Lee (Sungshin Women’s University) | |
5A-1 |
52 |
Dec. 17, 2025 10:45 ~ 12:00 |
Slicing and Filtering security orchestration for cyberattacks mitigation in 5G/6G networks Diego Sánchez García, Pablo Benlloch-Caballero, Jorge Bernal Bernabe, Jose Maria Alcaraz Calero, Alejandro Molina Zarca, Antonio Fernando Skarmeta Gómez(University of Murcia) | |
5A-2 |
53 |
Dec. 17, 2025 10:45 ~ 12:00 |
Deriving Security Controls through Verification on Open-Source 5G Testbeds Toshiro Sawamoto, Mio Suzuki, Takahiro Kasama and Koji Nakao(National Institute of Information and Communications Technology (NICT))Yutaro Osako (The University of Osaka) | |
5A-3 |
54 |
Dec. 17, 2025 10:45 ~ 12:00 |
Private 5G Security Assessment Framework: Development and Validation from Testbed to Operational Network Jieon Oh, Youngjae Kim, Bonam Kim, Ilsun You (Kookmin University) | |
5A-4 |
55 |
Dec. 17, 2025 10:45 ~ 12:00 |
XDP-FlowOpt: Lightweight Flow Optimization for 5G Private Networks Yongyoon Shin, Jonghoon Lee, Mikyong Han, Hoonki Lee, Nohsam Park, Jungtae Kim, Jonggeun Park (ETRI) | |
5B-1 |
56 |
Dec. 17, 2025 10:45 ~ 12:00 |
Toward Formal Analysis of the IVXV Voting Protocol using ComputationallyComplete Symbolic Attacker Hideki Sakurada (ZEN University) | |
5B-2 |
57 |
Dec. 17, 2025 10:45 ~ 12:00 |
Symbolic Formalization of PoW Integrity in Blockchain Kengo Matsui (Chitose Institute of Scince and Technology)Shigeki Hagihara (Chitose Silicon Research Center) | |
5B-3 |
58 |
Dec. 17, 2025 10:45 ~ 12:00 |
A PBFT-Based Consensus Approach for Secure ENC Update Protocol Seungbin Lee, Soowang Lee, Jiyoon Kim (Gyeongsang National University) | |
5C-1 |
W6 |
Dec. 17, 2025 10:45 ~ 12:00 |
Information Leakage Attacks on Air-Gapped Systems UsingInaudible-Band Multi-Element Encoding Ye-Rim Jeong, Yeon-Jin Kim, Il-Gu Lee (Sungshin Women’s University) | |
5C-2 |
W7 |
Dec. 17, 2025 10:45 ~ 12:00 |
Deepfake Dataset Privacy: A Comprehensive Survey and Framework for Safer Sharing Ayoung Jeon, Yu-ran Jeon, Il-Gu Lee (Sungshin Women’s University) | |
5C-3 |
W8 |
Dec. 17, 2025 10:45 ~ 12:00 |
Energy-Efficient Deep Q-Learning Framework for Federated-Inspired CooperativeControl in Overlapping Wi-Fi Networks Jin-Min Lee, Hye-Yeon Shim, Il-Gu Lee (Sungshin Women’s University) | |
6A-1 |
59 |
Dec. 17, 2025 15:00 ~ 16:15 |
A Comparative Analysis of Cyber Attacks against Satellite Internet Seungjin Baek, Hocheol Nam, Min Suk Kang (KAIST) | |
6A-2 |
60 |
Dec. 17, 2025 15:00 ~ 16:15 |
Intelligent Orchestration Method for Cybersecurity Services in Satellite-Terrestrial Integrated Network Wangjian Zhou, Xiaojing Fan, Huachun Zhou (Beijing Jiaotong University) | |
6A-3 |
61 |
Dec. 17, 2025 15:00 ~ 16:15 |
Machine Learning-Based Power Allocation for Covert Communication in LEO-UAV Cooperative Networks Minjeong Kang, Jung Hoon Lee (Hankuk University of Foreign Studies)Il-Gu Lee (Sungshin Women’s University) | |
6A-4 |
62 |
Dec. 17, 2025 15:00 ~ 16:15 |
Secure Satellite Communication Using Shamir’s Secret Sharing-Based Frequency Hopping Technique Kim Su-Kyoung, Kim So-Yeon, Lee Il-Gu (Sungshin Women’s University) | |
6B-1 |
63 |
Dec. 17, 2025 15:00 ~ 16:15 |
UE-Guard: Formal Specification-Based Cellular Attack Detection of False Base Stations and Signal Overshadowing Vincent Abella, Ilsun You (Kookmin University)Philip Virgil Astillo (University of San Carlos)I Wayan Adi Juliawan Pawana (Udayana University) | |
6B-2 |
64 |
Dec. 17, 2025 15:00 ~ 16:15 |
A Hybrid EDHOC Protocol Seonghan Shin (National Institute of Advanced Industrial Science and Technology (AIST))Adi Panca Saputra Iskandar, Yongho Ko, Ilsun You (Kookmin University) | |
6B-3 |
65 |
Dec. 17, 2025 15:00 ~ 16:15 |
Unified Formal Verification of Security Requirements in the TLS Family Yongho Ko, Hoseok Kwon, Ilsun You (Kookmin University) | |
6B-4 |
66 |
Dec. 17, 2025 15:00 ~ 16:15 |
A Scneario Generation for Model-based Testing of TLS using Maude Strategy Jaehun Lee, Kyungmin Bae (Pohang University of Science and Technology) | |
7A-1 |
67 |
Dec. 18, 2025 9:00 ~ 10:45 |
ET-BERT with Adapter Fusion: Time-Efficient Continual Learning Framework for Encrypted Traffic Classification Minsu Kim, Daeho Choi, Younghyo Cho, Changhoon Lee, Kiwook Sohn(Seoul National University of Science and Technology)Yeog Kim (Research Center of Electrical and Information Technology)Jungsuk Song (Korea Institute of Science and Technology Information) | |
7A-2 |
68 |
Dec. 18, 2025 9:00 ~ 10:45 |
Split Credential Authentication: A Privacy-Preserving Protocol with Decoupled Authority and Issuer Roles Nuttapong Attrapadung, Goichiro Hanaoka, Keisuke Hara, Ryuya Hayashi, Takahiro Matsuda(National Institute of Advanced Industrial Science and Technology (AIST))Junichiro Hayata, Masaki Kamizono, Hiroshi Kumagai, Kenta Nomura, Tsunekazu Saito, Yuta Takata (Deloitte Tohmatsu Cyber LLC) | |
7A-3 |
69 |
Dec. 18, 2025 9:00 ~ 10:45 |
Ghost Recon: An Orchestration-based, Non-Intrusive, Persistent MultimodalAuthentication System Su-Hyeok Jang, Jin-yoon Jeong, Seo-hyun Lee, Hye-Lim Jung, Ki-Woong Park (Sejong University) | |
7A-4 |
70 |
Dec. 18, 2025 9:00 ~ 10:45 |
An Efficient Security Protocol for Bluetooth Secure Simple Pairing Based on ID-Based Signature Bae Woori, Youn Taek-Young (Dankook University) | |
7A-5 |
71 |
Dec. 18, 2025 9:00 ~ 10:45 |
Non-Recoverable Signature: Digital Signatures Torelant to Partial Disclosures Daiki Sasame, Sohto Chiku and Junji Shikata (Yokohama National University)Keisuke Hara (National Institute of Advanced Industrial Science and Technology (AIST)) | |
7A-6 |
72 |
Dec. 18, 2025 9:00 ~ 10:45 |
Education Framework of SOME/IP Security Enhancement through Game-Based Learning and Testing Tool Development Johee Park, Sung Bum Park, Dong Hoon Lee (Korea University) | |
7B-1 |
73 |
Dec. 18, 2025 9:00 ~ 10:45 |
Power-Saving IoT Anomaly Detection: Pareto Front-Optimized Dynamic Tuner Gyuha Son, Seo-Yi Kim, Il-Gu Lee (Sungshin Women’s University) | |
7B-2 |
74 |
Dec. 18, 2025 9:00 ~ 10:45 |
Real-time Channel Adaptive Guard Interval Adjustment and Secondary Data Transmission Framework Jung-Min Moon, Na-Eun Park, Il-Gu Lee (Sungshin Women’s University) | |
7B-3 |
75 |
Dec. 18, 2025 9:00 ~ 10:45 |
Protecting the Preamble: An Adaptive Scheduling Approach for Reliable Multi-Link Operation Ye-Sin Kim, Jin-Min Lee, Il-Gu Lee (Sungshin Women’s University) | |
7B-4 |
76 |
Dec. 18, 2025 9:00 ~ 10:45 |
Adversarial Attacks on Plausibility Checks in V2X Security Jungwoo Park, Kunho Park, Sanghoon Jeon (Kookmin University) | |
7B-5 |
77 |
Dec. 18, 2025 9:00 ~ 10:45 |
Design and Evaluation of a Management Target Control Mechanism in a Function for Tracing Diffusion of Classified Information on KVM Hideaki Moriyama (Ariake College)Toshihiro Yamauchi, Hideo Taniguchi (Okayama University)Masaya Sato (Okayama Prefectural University) | |
7C-1 |
S1 |
Dec. 18, 2025 9:00 ~ 10:45 |
One Passport to Govern Them All: Bringing Order to IoT Security and Compliance Sara Nieves Matheu Garcia, Antonio Skarmeta (University of Murcia) | |
7C-2 |
S2 |
Dec. 18, 2025 9:00 ~ 10:45 |
Replicating Network Topologies through the use of LLMs Ramon Sanchez-Iborra, Jorge Gallego Madrid, Antonio Skarmeta (University of Murcia)Javier Prieto, Mahmoud Abbasi (University of Salamanca) | |
7C-3 |
S3 |
Dec. 18, 2025 9:00 ~ 10:45 |
Prioritized Multi-Criteria Optimization for Efficient Cloud-Native ApplicationResource Allocation Polyzois Soumplis, Georgios Kontos, Konstantinos Christodoulopoulos, Aristotelis Kretsis, Panagiotis Kokkinos, Emmanouel Varvarigos | |
7C-4 |
S4 |
Dec. 18, 2025 9:00 ~ 10:45 |
Enhancing Privacy in Multi-Domain Network Intent Negotiation Pedro Martinez-Julia, Ved Kafle, Hitoshi Asaeda(National Institute of Information and Communications Technology)Diego Lopez (Telefonica I+D)Antonio Skarmeta (University of Murcia) | |
7C-5 |
S5 |
Dec. 18, 2025 9:00 ~ 10:45 |
Defending Minds, Not Just Machines: An Agentic Approach to Cognitive Security Roberto Gonzalez, Jaime Fúster, Michele Gucciardo, Davide Sanvito, Giuseppe Siracusano,Roberto Bifulco (NEC Labs) | |
7C-6 |
S6 |
Dec. 18, 2025 9:00 ~ 10:45 |
Lightweight Secure Federated Learning for Energy-Constrained IoT :A Case Study in Smart Irrigation Zohra Dakhia (University Federico II of Naples)Massimo Merenda (University Mediterranea of Reggio Calabria)Adrián Cánovas-Rodríguez, Aurora González-Vidal, Antonio Fernando Skarmeta-Gómez(University of Murcia)Mariateresa Russo (University Mediterranea of Reggio Calabria) | |
8A-1 |
78 |
Dec. 18, 2025 11:00 ~ 12:00 |
Invisible Watermarking with DWT-SVD for Safeguarding Copyrighted Imagesagainst Unauthorized Generative AI Training Seo-Yi Kim, Na-Eun Park, Il-Gu Lee (Sungshin Women’s University) | |
8A-2 |
79 |
Dec. 18, 2025 11:00 ~ 12:00 |
Hidden in the Noise: Noise-Embedded Watermarking for Black-Box ImageClassifiers Yeon-Ji Lee, Hye-Yeon Shim, Yeon-Woo Lee, Su-Ji Park, Il-Gu Lee(Sungshin Women’s University) | |
8A-3 |
80 |
Dec. 18, 2025 11:00 ~ 12:00 |
Cross-Artifact Comparative Analysis of Legal and Illegal Streaming Sites Su-bin Lee, Da-hyung Kim, Jeong-hwa Ryu, Seongmin Kim (Sungshin Women’s University) | |
8B-1 |
81 |
Dec. 18, 2025 11:00 ~ 12:00 |
Spatio-Temporal Adaptive Reinforcement Learning for Task Offloading in Mobile Edge Computing Boyao Qu, Mingqiang Zhu, Tianhao Peng, Boyang Shang, Yuyin Ma | |
8B-2 |
82 |
Dec. 18, 2025 11:00 ~ 12:00 |
Drain-Like Log Parsing for Distributed Systems: Efficient Template Mining on HDFS Datasets Gobinda Bhattacharjee, Joy Dey, Soumitra Biswas, Jannatul Sifat, Nusrat Neha, Sufal Chakma,Tanjim Mahmud (Rangamati Science and Technology University)Nazokat Tukhtaeva (Termez University of Economic and Service)Yuldasheva Gulora (Urgench State University)Bekzod Madaminov (Mamun University)Barno Matchanova (Urgench state pedagogical institute)Mohammad Shahadat Hossain (University of Chittagong)Karl Andersson (Lulea University of Chittagong) | |
8B-3 |
83 |
Dec. 18, 2025 11:00 ~ 12:00 |
Friendly-fire: Measurement and Analysis of the Interaction Dynamics Between Anti-Malware and PETs Carl Dickinson, Shishir Nagaraja and Mujeeb Ahmed (Newcastle University) Amin Sahebi (CAME Entrotec Ltd) | |
8C-1 |
84 |
Dec. 18, 2025 11:00 ~ 12:00 |
Binary Lifting into LLVM IR with Large Language Models Sieun Jo, Jiwon Lee, Dong Hoon Lee, Wonsuk Choi (Korea University) | |
8C-2 |
85 |
Dec. 18, 2025 11:00 ~ 12:00 |
Classification of Tor Metadata Combinations for Investigation Yiseul Choi, Junga Kim, Seongmin Kim (Sungshin Women’s University) | |
8C-3 |
86 |
Dec. 18, 2025 11:00 ~ 12:00 |
ObfSwin: Transformer-based Multi-class Obfuscation Classification for Windows Portable Executable Junhyuk Kang, Jaewoo Lee, Wonsuk Choi, Dong Hoon Lee (Korea University) | |