Accepted Papers

Regular Papers and Posters

Vague2Detect: Handling Ambiguous Prompts in Knowledge-Based Open-World Detection
Enhanced Carbon Emission Prediction in IoT using Optimized Rotation-Invariant Coordinate Convolutional Neural Network for Accurate Urban Environmental Monitoring
Not Just Accuracy: Consistency and Reliability as Core Factors in LLM Evaluation
Web-Search-Integrated RAG for Resource-Constrained Environments: A Small-Model Approach
Hybrid GCN?GRU Model for Anomaly Detection in Cryptocurrency Transactions
BaSTion: Backdoor Style Trigger Identification Method via GANs and Style Transfer Networks
Advancing Prehypertension Screening with Explainable AI and Generative Augmentation
Strong Detection, Short Text: A Four-Class Framework for Human-AI Authorship
CollaG: Secure and Efficient Collaborative Cloud-Assisted Garbled Circuits
MiniSketch-VQA: A Benchmark for Evaluating LLM-as-a-Judge in Sketch-based Visual Question Answering
The Survey of Jailbreak Attacks on Large Language Models and Defenses
Mitigating Label Inference Attacks in Vertical Federated Split Learning through Training Control and Gradient Disturbance
Model Extraction Attack Leveraging Fractal Images on Color Image Classification Tasks
Applying AI Modeling Attacks as Assessment Tool for Analog PUF-Based Authentication Protocol Evaluation
Mitigating Data Poisoning Attack in On-Device Learning Anomaly Detectors via Peer Consensus
PRISM: Prompt Risk Scoring via Interpretable Semantic Mapping for NSFW Defense
Context-Aware Safety Report Classification via Large Language Models and Dynamic Knowledge Graphs
H-IDE : Hardware Interleaving for Deterministic Encryption to Mitigate Ciphertext Side-Channel Attacks
HieraText: Unsupervised Multi-Label Hierarchical Text Classification through Adaptive Clustering
An Intra-ciphertext Optimization for Efficient Multi-device Bootstrapping for HE-DNNs
Automated Vulnerability Repair based on Language Agent Tree Search
Calypso: A Compiler-Runtime Framework for Configurable Kernel Support in CXL-PNM
Data Reconstruction Attacks against Privacy Preserving Vertical Federated Learning
Multimodal Pain Intensity Assessment from Physiological Signals: Window Segmentation with Cross-Attention and Temporal Modeling
OpenScore: An Agent-Based Framework for Automated Evaluation of AI Model Transparency
Efficient Evaluation of Indicator Function with Fully Homomorphic Encryption for Privacy-Preserving Embedding
Design and Implementation of a Timing Monitoring System for Real-Time Assurance based on AUTOSAR Timing Protection
Multi-Resolution Speckle Priors for Scale-Aware Digital Image Correlation
Grasle: Graph-level Scheduling Language and Framework for Deep Neural Network
The Dual-Edged Sword of Instruction Tuning: An Empirical Study on Precision Gains and Catastrophic Failures
ARS-FL-IDS: Accountable Anonymous Federated Learning Against Malicious Behavior
Fine-Tuning Large Language Models for Malicious Package Detection

Short Papers

Hall Sensor-based Ellipse Fitting for Non-Contact Ball Joint Position Estimation (short)
Blockchain-Based Smart Contract Revocable Bidding Scheme for European Union Emissions Trading Scheme
Efficient Batch Verifications for KZG Commitments
Performance Bottleneck Analysis and Technical Debt in a Non-Standard Hyperledger Fabric CLI Gateway Architecture
Accelerating ONNX Runtime Inference Through Tiling and IO-Binding based Model Design
Spatial-Temporal Graph Neural Networks for Non-Emergency Reports: A Case Study
Evaluating Emoji Sequence Generation in Small Language Models
Blockchain-Assisted Resource Scheduling for SB-SPS in V2X Networks (short)
Service-aware Resource Management in Cloud computing for HPC workload (short)
Empowering LLM-based Malware Analysis with Synthetic Code
Design and Implementation of KI Cloud R&D Platform for HPC Workloads
{MaquillAI: Generative AI for Personalized Makeup Tutorial (short)
Variables for Free: Breaking MAYO via Valid Solutions

Posters

Security-Native Context Awareness Based Zero Trust Architecture for Digital Identity and Sovereignty
Enhancing Time-Series Predictions through Social Feature Integration: An Empirical Study with RNN and Encoder-Decoder Models
Channel Selection and Classification through Fuzzy Feature Selection and Fuzzy Export Model
A Three-Layer Network Content Protection Architecture based on LLM Technologies
Unified Fuzzy Framework for Feature Selection and Channel-wise Rule-based Classification in Deep?Fuzzy Hybrid Models
Strain Estimation in Real Tensile Experiments Using Self-Supervised Learning-Based Digital Image Correlation (DIC)
AI Security Portal Facilitating Knowledge Consolidation to Promote AI Security
A Two-Stage Legal Document Automation System Combining Template Mapping and LLM-based Post-processing
Signal Fingerprinting Method Based on Emphasized Spectrum Data for Bluetooth Low Energy
FoTo: Targeted Visual Topic Modeling for Focused Analysis of Short Texts
CTI Technique Extraction Aligned to MITRE ATT&CK via Ensemble LLMs
Deposit Go : A Conversational AI for Legal Document Generation using LangChain and LangGraph
PLC Meets RISC-V: A Trusted Execution Environment Framework for Secure Automation with Multi-Enclave Capability
Quantum AI-Driven Anomaly Detection for 6G Network Security
CAPTION-GUIDED REFINEMENT OF IMAGE REGIONS VIA MASKED GAN TRAINING
ME-XHRL: Malware Evasion using Explainable Hierarchical Reinforcement Learning
Hybrid GCN-GRU Model for Anomaly Detection in Cryptocurrency Transactions
AI and Machine Learning Approaches for Early Stroke Detection via Facial and Speech Analysis
Comparison of LLMs: Evaluating Their Abilities of Identifying the Source of Information
A Deployable, End-to-End Framework for Explainable and Federated Phishing Detection in Low-Resource Languages
From Fatigue to Action: Revisiting AI-Driven SIEM for Effective Incident Response