Regular Paper |
||
Paper ID | Author Details | Title of the work |
---|---|---|
|
Khandakar Ashrafi Akbar, Yigong Wang, Islam Md Shihabul, Anoop Singhal, Latifur Khan, Bhavani Thuraisingham | Identifying Tactics of Advanced Persistent Threats with Limited Attack Traces |
|
Krishnaraj Bhat | A Verifiable Lossless Multiple Secret Images Sharing Scheme |
|
Tejpal Kumar, Gaurav Somani | Origin information assisted hybrid analysis to detect APT malware |
|
Sandeep Romana, Anil Bandgar, Mohit Kumar, Mahesh Uttam Patil, Lakshmi Eswari P R | Raising MIPS binaries to LLVM IR |
|
Shivani Arya, Saurabh Chamotra | Multi layer detection framework for spear-phishing attacks |
|
Renjith G, Aji S | Vulnerability Analysis and Detection using Graph Neural Networks for Android Operating System |
|
Vishwas Patil, RK Shyamasundar | A Practical Protocol for Asset Management |
|
Debapriyay Mukhopadhyay | Improvement Over Montgomery Modular Multiplication |
|
Pranav Verma, Anish Mathuria, Sourish Dasgupta | Faster Private Rating Update via Integer-based Homomorphic Encryption |
Short Paper |
||
|
Amane Takeshige, Haruhisa Kosuge, Hidema Tanaka | Experimental Verification of Estimated Block Size of BKZ Algorithm against LWE |
|
Sina Mahdipour Saravani, Indrajit Ray, Indrakshi Ray | Automated Identification of Social Media Bots using Deep fake Text Detection |
Work-in-Progress Paper |
||
|
Shaurya Sood, Manash Saikia, Neminath Hubballi | WiP: Slow Rate HTTP Attack Detection with Behavioral Parameters |
|
Habeeb Syed, Imtiyazuddin Shaik, Nitesh Emmadi, Harika Narumanchi, Meena Dilip Thakur, RAJAN M A | WiP: Privacy Enabled Biometric Authentication Based on Proof of Decryption Techniques |
|
Imtiyazuddin Shaik, Raj Chaudhari, RAJAN M A, Jayavardhana Gubbi, Balamuralidhar P, Sachin Lodha | WiP: QoS based Recommendation system for efficient private inference of CNN using FHE |
|
Afshin Amighi, Mortaza Shoae Bargh, Ahmad Omar | WiP: A Distributed Approach for SDC Technologies |