PROGRAM
Days: Thursday, August 29th Friday, August 30th
Thursday, August 29th
View this program: with abstractssession overviewtalk overview
10:30-12:10 Session 2A: Security Track
Location: Colombo Theatre A
10:30 | DevilDiffusion: Embedding Hidden Noise Backdoors into Diffusion Models (abstract) |
10:50 | PrivBench: A Benchmark Capturing Privilege Escalation Vulnerabilities in Android (ONLINE TALK) (abstract) PRESENTER: Mohammed-El-Amin Tebib |
11:10 | Efficient Data Security Using Predictions of File Availability on the Web (abstract) |
11:30 | CompFreeze : Combining Compacters and Layer Freezing for Enhanced Pre-Trained Language Model (ONLINE TALK (abstract) |
11:50 | Extending ISO 15118-20 EV Charging: Preventing Downgrade Attacks and Enabling New Security Capabilities (abstract) |
10:30-11:50 Session 2B: Privacy Track
Location: Session Room LG01
10:30 | Malicious Unlearning in Ensemble Models (abstract) |
10:50 | Quantifying Privacy in Cooperative Awareness Services Through Trajectory Reconstruction (abstract) PRESENTER: Atthapan Daramas |
11:10 | $Pk$-Anonymization Meets Differential Privacy (abstract) PRESENTER: Masaya Kobayashi |
11:30 | Visualizing Differential Privacy: Assessing Infographics’ Impact on Layperson Data-sharing Decisions and Comprehension (abstract) PRESENTER: Mst Mahamuda Sarkar Mithila |
14:50-16:30 Session 4A: Security Track
Location: Colombo Theatre A
14:50 | Enhancing Network Intrusion Detection Systems: A Review of Feature Selection Algorithms for Streaming Data Processing (abstract) |
15:10 | A Comprehensive Study on Multi-Task Learning for Domain Generation Algorithm (DGA) Detection (abstract) PRESENTER: Arthur Drichel |
15:30 | Post-Quantum Authentication and Integrity in 3-Layer IoT Architectures (abstract) PRESENTER: Juliet Samandari |
15:50 | Mobile Login Bridge: Subverting 2FA and Passwordless Authentication via Android Debug Bridge. (ONLINE TALK) (abstract) |
16:10 | An Efficient Method for Accelerating Kyber and Dilithium Post-Quantum Cryptography (abstract) PRESENTER: Duc-Thuan Dam |
14:50-15:50 Session 4B: Privacy track
Location: Session Room LG01
14:50 | Effectiveness of Privacy-Preserving Algorithms for Large Language Models: A Benchmark Analysis (abstract) |
15:10 | “I was diagnosed with...": sensitivity detection and rephrasing of Amazon reviews with ChatGPT (ONLINE TALK) (abstract) PRESENTER: Costanza Alfieri |
15:30 | Group Signatures with Designated Traceability over Openers' Attributes from Symmetric-Key Primitives (abstract) PRESENTER: Hiroaki Anada |
15:50-16:20 Session 5: Trust Track
Location: Session Room LG01
15:50 | Stake-Driven Rewards and Log-Based Free Rider Detection in Federated Learning (ONLINE TALK) (abstract) PRESENTER: Huong Nguyen |
Friday, August 30th
View this program: with abstractssession overviewtalk overview
09:00-10:00 Session 6A: Privacy Track
Location: Session Room LG02
09:00 | Synthetic Trajectory Generation Through Convolutional Neural Networks (abstract) |
09:20 | PEL: Privacy Embedded Learning in Smart Healthcare Systems (ONLINE TALK) (abstract) |
09:40 | Efficient Integration of Exchange Chains in Privacy-Preserving Kidney Exchange (abstract) PRESENTER: Malte Breuer |
09:00-10:00 Session 6B: Security Track
Location: Session Room LG01
09:00 | DEFD: Dual-Entity Fuzzy Deduplication for Untrusted Environments (abstract) |
09:20 | Model-Based Security Analysis of Interconnected Subsystems: A Methodology for Security Compatibility Evaluation (abstract) |
09:40 | can-fp: An attack-aware analysis of false alarms in automotive intrusion detection models (abstract) |
10:20-11:20 Session 7A: Emerging Technologies and Trends Track
Location: Session Room LG02
10:20 | MIKA: A Minimalist Approach to Hybrid Key Exchange (abstract) |
10:40 | Proactive Audio Authentication using Speaker Identity Watermarking (ONLINE TALK) (abstract) PRESENTER: Qi Li |
11:00 | Towards SAR Automatic Target Recognition Multi- Category SAR Image Classification Based on Light Weight Vision Transformer. (ONLINE TALK) (abstract) |
10:20-11:40 Session 7B: Security Track
Location: Session Room LG01
10:20 | DID Link: Authentication in TLS with Decentralized Identifiers and Verifiable Credentials (abstract) |
10:40 | Hardware Implementation of a Hybrid Dynamic Gold Code-Based Countermeasure Against Side-Channel Attacks (abstract) PRESENTER: Thai-Ha Tran |
11:00 | Poisoning and Evasion: Deep Learning-Based NIDS under Adversarial Attacks (abstract) |
11:20 | Disease Detector: A Disease Inference Attack Using Brainwave Signals Associated with Body Postures (ONLINE TALK) (abstract) |