Program

Day 1 —Nov 26, 2025

13:00 — 15:00

Preparing / Registration

15:00 — 18:30

Opening Remarks (greeting from the president of KIPS, etc.), Poster Session and Reception

Session Chair: Kouichi Sakurai (Kyushu Univ.) Chansu Han (NICT)
  1. Po-01.
    Security-Native Context Awareness Based Zero Trust Architecture for Digital Identity and Sovereignty
    Cheng-Han Shie, Yu-Tse Shih, Tzu-Jui Wu and Chun-I Fan
    National Sun Yat-sen University
  2. Po-02.
    A Three-Layer Network Content Protection Architecture based on LLM Technologies
    Pao-Cheng Ai, Sheng-Chuan Wang, Shiann-Rong Kuang, and Chun-Wei Tsai
    Department of Computer Science and Engineering, National Sun Yat-sen University
  3. Po-03.
    From Fatigue to Action: Revisiting AI-Driven SIEM for Effective Incident Response
    Tao Ban, Takeshi Takahashi, Samuel Ndichu, and Daisuke Inoue
    National Institute of Information and Communications Technology
  4. Po-04.
    AI Security Portal Facilitating Knowledge Consolidation to Promote AI Security
    Yukihide Kohama
    KDDI Research, Inc.
  5. Po-05.
    CTI Technique Extraction Aligned to MITRE ATT&CK via Ensemble LLMs
    GEON-YUN SHIN, DEPARTMENT OF SCHOOL OF COMPUTER ENGINEERING & APPLIED MATHEMATICS, HANKYONG NATIONAL UNIVERSITY MYUNG-MOOK HAN, AI/SOFTWARE DEPARTMENT, GACHON UNIVERSITY
  6. Po-06.
    A Deployable, End-to-End Framework for Explainable and Federated Phishing Detection in Low- Resource Languages
    Mwania Vincent Ngundi, Hyungju-Kim, PanKoo Kim
    CHOSUN University
  7. Po-07.
    ME-XHRL: Malware Evasion using Explainable Hierarchical Reinforcement Learning
    Hasmita Kurre Virendra Singh
    Indian Institute of Technology Bombay
  8. Po-08.
    Quantum AI-Driven Anomaly Detection for 6G Network Security
    Hoseok Kwon, I Wayan Adi Juliawan Pawana, Bonam Kim, Ilsun You
    Kookmin Univercity
  9. Po-09.
    Signal Fingerprinting Method Based on Emphasized Spectrum Data for Bluetooth Low Energy
    Hyeon Park, TaeGuen Kim
  10. Po-10.
    A Two-Stage Legal Document Automation System Combining Template Mapping and LLM-based Post- processing
    Dong Heon Yu1, Hee Chan Woo1, Yong Sang Kwak2, Dong Hahk Lee1, Sae Bom Lee1*
    1Sahmyook University
    2Noisy Inc.
  11. Po-11.
    Deposit Go : A Conversational AI for Legal Document Generation using LangChain and LangGraph
    Hee Chan Woo, Dong Heon Yu, Sae Bom Lee, Dong Hahk Lee
    Sahmyook University
  12. Po-12.
    Comparison of LLMs: Evaluating Their Abilities of Identifying the Source of Information
    Nayoung (Natalie) Kwon
    University of Michigan
  13. Po-13.
    AI and Machine Learning Approaches for Early Stroke Detection via Facial and Speech Analysis
    Howon Chung1, Heejin Yang2, Dahyeon Yoo3, Gagyeong Jeong1, Jiho Park4, Kang-Woo Lee†4,5, and Youn-Soon Shin, PhD†5
    1 Department of Statistics
    2 Department of Industrial & Systems Engineering
    3 Department of Management Information System
    4 Department of Artificial Intelligence
    5 Department of Computer Science and Engineering
  14. Po-14.
    Strain Estimation in Real Tensile Experiments Using Self-Supervised Learning-Based Digital Image Correlation (DIC)
    Hyeon-Kyeong Jeong1 and Kyung-ho Yu2, Pan-Koo Kim3*
    1 Department of Computer Engineering, Chosun University
    2 Institute of AI Convergence , Chosun University
    3* Department of AI Software, Computer Engineering Chosun University
  15. Po-15.
    CAPTION-GUIDED REFINEMENT OF IMAGE REGIONS VIA MASKED GAN TRAINING
    Joshua Nyaberi, Kyungho Yu, PanKoo Kim
    CHOSUN UNIVERSITY
  16. Po-16.
    Enhancing Time-Series Predictions through Social Feature Integration: An Empirical Study with RNN and Encoder-Decoder Models
    PanKoo Kim
    Chosun University
  17. Po-17.
    Unified Fuzzy Framework for Feature Selection and Channel-wise Rule-based Classification in Deep–Fuzzy Hybrid Model
    Tae-Wan Kim, Keun-Chang Kwak
    Department of Electronics Engineering, Interdisciplinary Program in IT-Bio Convergence System, Chosun University
  18. Po-18.
    Advanced Pioneer Algorithm: Inheritance-Based Pioneer-Inspired Optimization Algorithm
    Janghun Lee, Seongtaek Oh and Seungmin Park
    Dongseo University
  19. Po-19.
    PLC Meets RISC-V: A Trusted Execution Environment Framework for Secure Automation with Multi-Enclave Capability
    Sheng Xu, BingHui Zhang,Xiaoxin Wu, Xiaoyu Mi
    Yongjiang Laboratory, Zhejiang, China
  20. Po-20.
    FoTo: Targeted Visual Topic Modeling for Focused Analysis of Short Texts
    Sanuj Kumar, Dr. Tuan Le
    Computer Science, New Mexico State University
  21. Po-21.
    Hybrid GCN-GRU Model for Anomaly Detection in Cryptocurrency Transactions
    Gyuyeon Na (Ewha Womans University)
    Minjung Park (Kumoh National Institute of Technology)
    Hyeonjeong Cha · Soyoun Kim · Sunyoung Moon · Sua Lee · Jaeyoung Choi · Hyemin Lee (Ewha Womans University)
    Sangmi Chai (Ewha Womans University, Coretrustlink)

Day 2 — Nov 27, 2025

10:00 — 11:20

S1. LLM Evaluation & Reliability

Room A Session Chair: Jihie Kim (Dongguk Univ.)
  1. Pr-01.
    Not Just Accuracy: Consistency and Reliability as Core Factors in LLM Evaluation
    Uk Jang and Jihie Kim
    Department of Computer Science and Artificial Intelligence, Dongguk University, Seoul, South Korea
  2. Pr-03.
    MiniSketch-VQA: A Benchmark for Evaluating LLM-as-a-Judge in Sketch-based Visual Question Answering
    Jian Kim and Jihie Kim
    Department of Computer Science and Artificial Intelligence, Dongguk University
  3. Pr-05.
    The Dual-Edged Sword of Instruction Tuning: An Empirical Study on Precision Gains and Catastrophic Failures
    Dayoung Ryu and Jinhong Yang
    Inje University, Gimhae, Republic of Korea
  4. Ps-01.
    Evaluating Emoji Sequence Generation in Small Language Models
    Minjae Kim and Jihie Kim
    Department of Computer Science and AI, Dongguk University, Seoul, South Korea

S2. Prompt Safety & Grounding

Room B Session Chair: Tao Ban (NICT) Ted Taekyoung Kwon (SNU)
  1. Pr-02.
    Vague2Detect: Handling Ambiguous Prompts in Knowledge-Based Open-World Detection
    Ibrohimjon Muminov, Jihie Kim
    Department of Computer Science and AI, Dongguk University, Seoul, South Korea
  2. Pr-04.
    PRISM: Prompt Risk Scoring via Interpretable Semantic Mapping for NSFW Defense
    Jangho Choi and Jihie Kim
    Department of Computer Science and Artificial Intelligence, Dongguk University, Seoul, South Korea
  3. Pr-06.
    Strong Detection, Short Text: A Four-Class Framework for Human-AI Authorship
    Kihoon Park and Jihie Kim
    Department of Computer Science and Artificial Intelligence, Dongguk University
  4. Ps-02.
    Empowering LLM-based Malware Analysis with Synthetic Code
    Minami Someya and Akira Otsuka
    Institute of Information Security, Kanagawa, Japan
11:30 — 13:00

Lunch

13:00 — 15:20

Keynote I

Session Chair: Brent ByungHoon Kang (KAIST)
  1. "Hyperscale Bug Finding and Fixing: DAPRA AIxCC and Team Atlanta"
    Taesoo Kim, Professor,Georgia Tech


    Team Atlanta placed 1st in the DARPA AI Cyber Challenge (AIxCC), earning a $4M grand prize in the final round. In this talk, I will introduce the DARPA AIxCC competition and share our technical approaches that led to victory— specifically, how we augmented large language models (LLMs) with traditional software analysis techniques to automatically discover and repair security vulnerabilities in real-world, large-scale open-source projects.

13:50 — 14:10

Coffee Break

14:10 — 15:20

S3. Privacy in Federated / On-Device ML

Room A Session Chair: Akira Otsuka (IISEC), Tao Ban (NICT)
  1. Pr-07.
    Mitigating Label Inference Attacks in Vertical Federated Split Learning through Training Control and Gradient Disturbance
    Seiya Kawai1, Kota Yoshida2, Tsunato Nakai3, and Takeshi Fujino2
    1Graduate School of Science and Engineering, Ritsumeikan University,
    2Department of Science and Engineering, Ritsumeikan University,
    3Mitsubishi Electric Corporation, 5-1-1 Ofuna, Kamakura,
  2. Pr-09.
    Data Reconstruction Attacks against Privacy Preserving Vertical Federated Learning
    Yungi Cho1,Miseon Yuo1Hyunjun Kim1Younghan Lee2, Yunheung Paek1
    1Seoul National University
    2Sungshin Womans University
  3. Pr-11.
    ARS-FL-IDS: Accountable Anonymous Federated Learning Against Malicious Behavior
    Gyurim Kim†, Soona Lee†, Yeonhee Kim, Jeeeun Park, and Jongkil Kim‡
    Ewha Womans University, Seoul

S4. Crypto, FHE & Secure Computation

Room B Session Chair: Yang Li (UEC)
  1. Pr-08.
    An Intra-ciphertext Optimization for Efficient Multi-device Bootstrapping for HE-DNNs
    Whoi Ree Ha1, Hyungon Moon2, Yunheung Paek1
    1 Department of Electrical and Computer Engineering and Inter-university Semiconductor Research Center, Seoul National University
    2 Ulsan National Institute of Science and Technology (UNIST)
  2. Pr-10.
    Efficient Evaluation of Indicator Function with Fully Homomorphic Encryption forPrivacy-Preserving Embedding
    Junhyuk Kim, Dongwoo Kim
    Dongguk University
  3. Ps-03.
    Efficient Batch Verifications for KZG Commitments
    Syh-Yuan Tan12, Koon-Ming Chan2, Swee-Huay Heng3
    1Solv Protocol, Singapore
    2Faculty of Information Science and Technology, Multimedia University,
    3Centre for Intelligent Cloud Computing, CoE for Advanced Cloud, Faculty of Information Science and Technology, Multimedia University
  4. Ps-11.
    Hall Sensor-based Ellipse Fitting for Non-Contact Ball Joint Position Estimation
    Seungmin Lee1, Daejin Park2
    1Daegu Catholic University
    2Kyungpook National University
15:20 — 15:40

Coffee Break

15:40 — 17:00

S5. Medical & Multimodal AI

Room A Session Chair: Jonghyun Choi (SNU)
  1. Pr-12.
    Advancing Prehypertension Screening with Explainable AI and Generative Augmentation
    Hung Viet Nguyen1, Hoan-suk Choi2, Jinhong Yang3
    1Department of Digital Anti-aging Healthcare, INJE University
    2College of AI·Software Convergence, Kyungnam University
    3Department of Medical IT, INJE University
  2. Pr-14.
    Multimodal Pain Intensity Assessment from Physiological Signals: Window Segmentation with Cross-Attention and Temporal Modeling
    MD Ilias Bappi, Kyungbaek Kim
    Department of Artificial Intelligence Convergence, Chonnam National University
  3. Pr-15.
    Multi-Resolution Speckle Priors for Scale-Aware Digital Image Correlation
    Okatch Teddy Nyankieya1, Kyungho Yu2, PanKoo Kim3
    1Department of Computer Engineering, Chosun University,
    2Institute of AI Convergence, Chosun University,
    3Department of AI Software, Chosun University
  4. Pr-16.
    Enhanced Carbon Emission Prediction in IoT using Optimized Rotation-Invariant Coordinate Convolutional Neural Network for Accurate Urban Environmental Monitoring

S6. Blockchain Systems & Data Infrastructure

Room B Session Chair: Akira Otsuka (IISEC)
  1. Pr-13.
    Mitigating Data Poisoning Attack in On-Device Learning Anomaly Detectors via Peer Consensus
    Takahito Ino1, Kota Yoshida1,Hiroki Matsutani2, Takeshi Fujino1
    1Ritsumeikan University
    2Keio University
  2. Ps-04.
    Blockchain-Based Smart Contract Revocable Bidding Scheme for European Union Emissions Trading Scheme
    Chun-I Fan, Yu-Ting Lien, Yu-Tse Shih⋆, and Kai-Lun Huang
    Department of Computer Science and Engineering, National Sun Yat-sen University,
  3. Ps-05.
    Performance Bottleneck Analysis and Technical Debt in a Non-Standard Hyperledger Fabric CLI Gateway Architecture
    Sungmoon Park1, Beomseok Kim1, Seowan Kim1, Hoan-suk Choi2, Jinhong Yang1
    1Department of Healthcare IT, Inje University,
    2College of AI·Software Convergence, Kyungnam University,
  4. Ps-06.
    Blockchain-Assisted Resource Scheduling for SB-SPS in V2X Networks
    Muhammad Muneeb1, Jung-Hyun Woo1,Sung-Min Jeon1, Oudone Phengkhamlar1, Byung-Jin Song2, Kwang-Man Ko1
    1Department of Computer Engineering, Sangji University,
    2Korea Polytechnics University
  5. Ps-07.
    Service-aware Resource Management in Cloud computing for HPC workload
    A-Young Son, Hyeyoung Cho Junyoung Park, Gi-Mun Jeong
    Korea Institute of Science and Technology Information
18:00 — 21:00

Banquet

at Sanshiro

Day 3 — Nov 28, 2025

9:30 — 10:50

S7. Systems for Efficient AI & Real-Time

Room A Session Chair: Tao Ban (NICT)
  1. Pr-17.
    Calypso: A Compiler-Runtime Framework for Configurable Kernel Support in CXL-PNM
    Ju Min Lee, Hanjun Kim
    Yonsei University
  2. Pr-18.
    Grasle: Graph-level Scheduling Language and Framework for Deep Neural Network
    Jaeho Lee, Hanjun Kim
    Yonsei University
  3. Pr-20.
    Design and Implementation of a Timing Monitoring System for Real-Time Assurance based on AUTOSAR Timing Protection
    Suho Jo, Jeonghun Cho
    Kyungpook National University
  4. Ps-09.
    Accelerating ONNX Runtime Inference Through Tiling and IO-Binding based Model Design
    Hangjune Cho, Jeonghun Cho
    Kyungpook National University

S8. Applied AI for Civic & Public Safety

Room B Session Chair: Sooel Son (KAIST)
  1. Ps-08.
    Spatial-Temporal Graph Neural Networks for Non-Emergency Reports: A Case Study
    Seungwoo Kum, Seungtaek Oh, Jaewon Moon
    Korea Electronics Technology Institute
  2. Pr-19.
    Context-Aware Safety Report Classification via Large Language Models and Dynamic Knowledge Graphs
    Seungtaek Oh, Jaewon Moon, and Seungwoo Kum
    Korea Electronics Technology Institute
  3. Pr-21.
    HieraText: Unsupervised Multi-Label Hierarchical Text Classification through Adaptive Clustering
    Jaewon Moon, Seungwoo Kum, Seungtack Oh
    Information Media Research Center, Korea Electronics Technology Institute
  4. Pr-22.
    Web-Search-Integrated RAG for Resource-Constrained Environments: A Small-Model Approach
    Seowan Kim1, Beomseok Kim1, Sungmoon Park1, Hoan-suk Choi2, Jinhong Yang1
    1Department of Healthcare IT, Inje University
    2College of AI·Software Convergence, Kyungnam University
10:50 — 11:20

Coffee Break

11:20 — 12:20

S9. LLM Security & Evaluation at Scale

Room A Session Chair: Daehee Jang (Kyunghee Univ.) Hyoungshick Kim (Sungkyunkwan Univ.)
  1. Pr-23.
    The Survey of Jailbreak Attacks on Large Language Models and Defenses
    Soma Kato12, Chansu Han2, TAKESHI TAKAHASHI2, Kouichi Sakurai1
    1Kyushu University
    2National Institute of Information and Communications Technology
  2. Pr-25.
    OpenScore: An Agent-Based Framework for Automated Evaluation of AI Model Transparency
    Hyeon-Jun Han1, Jae-Sang Jang1, Kang-Won Lee1
    Sejong University
  3. Pr-27.
    BaSTion: Backdoor Style Trigger Identification Method via GANs and Style Transfer Networks
    Jieun Yun, Yeseong Jung, Jae-yun Kim, Saerom Park
    Ulsan National Institute of Science and Technology

S10. Attacks & Systems Security

Room B Session Chair: Tao Ban (NICT)
  1. Pr-24.
    H-IDE: Hardware Interleaving for Deterministic Encryption to Mitigate Ciphertext Side-Channel Attacks
    Kibong Kang1, Sungyoun Jung2, Jiwon Seo2, Yunheung Paek1
    1Department of Electrical and Computer Engineering and Inter-university Semiconductor Research Center, Seoul National University
    2Department of Cyber Security, Dankook University
  2. Pr-26.
    Model Extraction Attack Leveraging Fractal Images on Color Image Classification Tasks
    Hiroto Kawazu, Kota Yoshida, Takeshi Fujino
    Ritsumeikan University
  3. Pr-28.
    Applying AI Modeling Attacks as Assessment Tool for Analog PUF-Based Authentication Protocol Evaluation
    Mengxin Wang, Xiaoxin Wu, and Xiaoyu Mi
    Yongjiang Laboratory
12:20 — 14:00

Lunch

14:00 — 14:50

Keynote Ⅱ

Session Chair: Kouichi Sakurai (Kyushu Univ.)
  1. "Navigating the AI Revolution: Ensuring Security and Safety of Frontier AI"
    LAM Kwok Yan, Professor of Computer Science, College of Computing and Data Science, Nanyang Technological Universit, Singapore


    As artificial intelligence evolves from traditional machine learning to foundation models and agentic AI, society stands at a widening frontier of both opportunity and risk. This talk will examine how accelerating capabilities,emerging autonomy, and deepening societal integration have transformed AI safety and security from isolated technical issues into systemic and socio-economic priorities. It will discuss the expanding AI attack surface across data, models, and deployment pipelines, highlighting the risk of Gen AI being misused by cyber-attackers to cyber offences. This talk will also discuss defensive approaches in response to AI risks test and evaluation, red-teaming, interpretability, monitoring etc that form the backbone of trusted AI operations. Looking ahead, it will discuss risks due to the rise of agentic AI, autonomous systems capable of goal-directed behaviour and self-adaptation and the safety and security challenges this poses.

14:50 — 15:25

Coffee Break

15:25 — 16:15

S11. Secure AI Supply Chain & Transparency

Room A Session Chair: Daehee Jang (Kyunghee Univ.)
  1. Pr-29.
    Fine-Tuning Large Language Models for Malicious Package Detection
    DiLi1, EunsooKim2, HyoungshickKim2
    1Department of Computer Science,BeijingNormal-HongKong Baptist University
    2Department of Electrical and Computer Engineering, SungkyunkwanUniversity
  2. Pr-31.
    Automated Vulnerability Repair based on Language Agent Tree Search
    Tomonori Yoneda12, Ryotaro Nakata34 Akira Otsuka2
    1Institute of Information Security
    2LAC Co., Ltd.
    3Hitotsubashi University
    4National Institute of Technology
  3. Ps-12.
    Variables for Free: Breaking MAYO via Valid Solutions
    Yadi Zhong
    Auburn University

S12. FinTech / Crypto Analytics

Room B Session Chair: Jiwon Seo (SNU)
  1. Pr-30.
    CollaG: Secure and Efficient Collaborative Cloud-Assisted Garbled Circuits
    Dongju Lee1, Hyunyoung Oh2, Yunheung Paek1
    1Dept. of Electrical and Computer Engineering & ISRC 2Dept. of AI Software
  2. Pr-32.
    Hybrid GCN–GRU Model for Anomaly Detection in Cryptocurrency Transactions
    Gyuyeon Na1, Minjung Park2, Hyeonjeong Cha1, Soyoun Kim1, Sunyoung Moon1, Sua Lee1, Jaeyoung Choi1, Hyemin Lee1, Sangmi Chai13
    1AI and Business Analytics, Ewha Womans University
    2Department of Business Administration, Kumoh National Institute of Technology
    3Coretrustlink
16:15 — 16:45

Best Paper Awards

16:45 — 17:15

Closing Remarks

↑Page Top