Author | Title |
---|---|
Sikhar Patranabis | Post-Quantum Multi-Client Conjunctive Searchable Symmetric Encryption from Isogenies |
Fabrianne Effendi and Anupam Chattopadhyay | Privacy-Preserving Graph-Based Machine Learning with Fully Homomorphic Encryption for Collaborative Anti-Money Laundering |
Tarun Yadav and Manoj Kumar | ML based Improved Differential Distinguisher with High Accuracy: Application to GIFT-128 and ASCON |
Sameera K M, Abhinav M, Amal P. P., Abhiram T Babu, Abishek Raj K, Amal Tomichen, Anaina P, Vinod P, Rafidha Rehiman K. A. and Mauro Conti | DLShield: A Defense Approach against Dirty Label Attacks in Heterogeneous Federated Learning |
Jonna Likith Sai, Souptik Majumder, Rohit Verma and Priyanka Bagade | Spatiotemporal Intrusion Detection Systems for IoT Networks |
Upasana Mandal, Rupali Kalundia, Nimish Mishra, Shubhi Shukla, Sarani Bhattacharya and Debdeep Mukhopadhyay | "There's always another counter": Detecting Micro-architectural Attacks in a Probabilistically Interleaved Malicious/Benign Setting |
Rupesh Raj Karn and Ozgur Sinanoglu | Benchmarking Backdoor Attacks on Graph Convolution Neural Networks: A Comprehensive Analysis of Poisoning Techniques |
Subhadeep Banik and Francesco Regazzoni | Faster and more Energy-Efficient Equation Solvers over GF(2) |
Author | Title |
---|---|
Yi Hao Puah, Anh Tu Ngo, Nandish Chattopadhyay and Anupam Chattopadhyay | BlockDoor: Blocking Backdoor Based Watermarks in Deep Neural Networks |
Reeshav Chowdhury, Aman Kumar, Vaibhav Mohite and Ayantika Chatterjee | Transferability of Evasion Attacks Against FHE Encrypted Inference |
Madhurima Das and Bodhisatwa Mazumdar | Security Analysis of ASCON Cipher under Persistent Faults |
Harshit Tyagi and Divyashikha Sethia | P-MASFEP: security-enhanced PUF-based Mutual Authentication & Session key establishment using Fuzzy Extractor & PKI |
Issa Baddour, Dip Sankar Banerjee and Somitra Kumar Sanadhya | SideLink: Exposing NVLink to Covert- and Side-Channel Attacks |
Ashish Vishwakarma, Umesh Kashyap and Sk Subidh Ali | Adversarial Malware Detection |
Author | Title |
---|---|
Navajit Singh Baban, Prithwish Basu Roy, Pauline John, Azhar Zam, Sukanta Bhattacharjee, Rafael Song, Ramesh Karri and Krishnendu Chakrabarty | Attacks and Countermeasures for Digital Microfluidic Biochips |
Saltanat Firdous, Asutosh Brahma, Arjun Menon and Chester Rebeiro | CoPrIME: Complete Process Isolation using Memory Encryption |
Samyuktha M, Pallavi Borkar and Chester Rebeiro | High Speed High Assurance implementations of Mutivariate Quadratic based Signatures |
Rohith George Ninan and Kala S | FPGA-Based Acceleration of Homomorphic Convolution with Plaintext Kernels |
Author | Title |
---|---|
David Johnston | Online Testing Entropy and Entropy Tests with a Two State Markov Model |
Title |
---|
FlashFuzz: A Format-Aware Fuzzing Framework for COTS Devices |
OMR : A comprehensive platform and suite of tools for malware research and analysis |
Faults in Neural Network Models |