Session |
Article Id |
Time |
Title/authors/Institution |
Abstract |
1A-1 |
1 |
Dec. 17, 2024 09:00 ~ 10:30 |
A Time Series Approach to False Base Station Detection in Beyond 5G Networks Using LSTM I Wayan Adi Juliawan Pawana, Seog Chung Seo, Okyeon Yi, Ilsun You (Kookmin University), Philip Virgil Astillo (University of San Carlos), Linawati (Udayana University) | |
1A-2 |
2 |
Dec. 17, 2024 09:00 ~ 10:30 |
Frame-based Data Transmission for base Stations of 5G/6G networks Fang-Yie Leu, Yu-Han Chen (Computer Science Department, TungHai University), Kun-Lin Tsai (Electrical Engineering Department, Tunghai University), Susanto Susanto (National Research and Innovation Agencies, Indonesia) | |
1A-3 |
3 |
Dec. 17, 2024 09:00 ~ 10:30 |
Anomaly Detection Based on LSTM Autoencoder for DDoS Detection in Open RAN Suhyeon Lee, Hwankuk Kim (Kookmin University) | |
1A-4 |
4 |
Dec. 17, 2024 09:00 ~ 10:30 |
Intelligent Security for Private 5G Networks: Approaches to Data Collection and Processing Hoonki Lee, Jonghoon Lee, Mikyong Han, Nohsam Park, Yongyoon Shin (ETRI) | |
1B-1 |
5 |
Dec. 17, 2024 09:00 ~ 10:30 |
PROXIMA : Process Rather than Outcome, eXplainable Instruction of Multiple Ai for Cybersecurity Exercise Sung-Kyu Ahn (SysCore Lab, Sejong University), Ki-Woong Park (Sejong University) | |
1B-2 |
6 |
Dec. 17, 2024 09:00 ~ 10:30 |
PhiShield: An AI-based Personalized Anti-spam Solution at the end Node Hyunsol Mun, Jeeeun Park, Boeun Kim, Yeonhee Kim, Jongkil Kim (Ewha Womans University) | |
1B-3 |
7 |
Dec. 17, 2024 09:00 ~ 10:30 |
ARGUS: Analyzing Routes on Geolocation Unavailable Scenarios using Sensor Fusion and Deep Learning Saehee Jun, Gang Min Kim, Huy Kang Kim (School of Cybersecurity, Korea University), Byung Il Kwak (Hallym University) | |
1B-4 |
8 |
Dec. 17, 2024 09:00 ~ 10:30 |
A Comprehensive Study of Machine Learning Techniques for Malicious URL Detection in Cybersecurity Tanjim Mahmud, Md Hasan Ali, Tanvir Hasan (Rangamati Science and Technology University), Mst. Sharmin Akter (Port City International University, Chittagong), Mohammad Tarek Aziz, Mohammad Kamal Uddin (Chittagong University of Engineering & Technology), Mohammad Shahadat Hossain (University of Chittagong), Karl Andersson (Luleå University of Technology) | |
1B-5 |
9 |
Dec. 17, 2024 09:00 ~ 10:30 |
IPG : Incremental Patch Generation for Generalized Adversarial Patch Training Wonho Lee, Hyunsik Na, Junsung Kim, Daeseon Choi (Soongsil University) | |
1C-1 |
10 |
Dec. 17, 2024 09:00 ~ 10:30 |
Towards Mobile Users Location Privacy Protection: A Review on Location Simulation and Detection Technologies among Location-Based Service Applications Bing Zhang, Yiyang Shi (Zhengzhou University) Wenqi Shi, Hang He, Xiangyang Luo (Key Laboratory of Cyberspace Situation Awareness of Henan Province) | |
1C-2 |
11 |
Dec. 17, 2024 09:00 ~ 10:30 |
A Networking Scheme for FANETs Based on an Improved Smart Identifier Network (SINET) Han Zeyu, Huizhi Wang, Wang Xiaoyi (Beijing Jiaotong University), Linyuan Yao (Beijing Institute of Astronautical Systems Engineering) | |
1C-3 |
12 |
Dec. 17, 2024 09:00 ~ 10:30 |
A DDoS Attack Detection Method Based on an Ensemble of Small Models for Multi-Layer Satellite Networks Xiaojing Fan, Wangjian Zhou, Huachun Zhou (Beijing Jiaotong University) | |
1C-4 |
13 |
Dec. 17, 2024 09:00 ~ 10:30 |
A Novel Framework for Route Recommendation in Cooperative Vehicle Systems: The SHAFA Model Manipriya Sankaranarayanan (Indian Institute of Information Technology Sricity, Chittoor), Mala C (National Institute of Information Technology, Tiruchirappalli, Tamil Nadu) | |
2A-1 |
14 |
Dec. 17, 2024 10:45 ~ 12:00 |
A Study on Enhancing Reauthentication Methods Among Workloads in a ZTA Environment Wonhwi Choi, Jungsoo Park (Kangnam University) | |
2A-2 |
15 |
Dec. 17, 2024 10:45 ~ 12:00 |
A Study on Parallel Tuple Sieve Algorithm Yuntao Wang (The University of Electro-Communications), Keiichi Imai, Eiichiro Fujisaki (Japan Advanced Institute of Science and Technology) | |
2A-3 |
16 |
Dec. 17, 2024 10:45 ~ 12:00 |
A Study on Signature-Based Web API Intrusion Detection Algorithm Using Regular Expressions Youngjae Kim, I Wayan Adi Juliawan Pawana, Ilsun You, Bonam Kim (Kookmin University), Junyong Lee, Myeongcheol Kim (Penta Security Inc.) | |
2A-4 |
17 |
Dec. 17, 2024 10:45 ~ 12:00 |
Counter-Based Session Key Establishment Protocol for Efficient and Forward Security in Bluetooth BR/EDR Bae Woori, Youn Taek-Young, Jho Nam-Su (Dankook University) | |
2B-1 |
18 |
Dec. 17, 2024 10:45 ~ 12:00 |
The OWApp Benchmark: an OWASP-compliant Vulnerable Android App Dataset Bing Zhang, Yiyang Shi (Zhengzhou University) Wenqi Shi, Hang He, Xiangyang Luo (Key Laboratory of Cyberspace Situation Awareness of Henan Province) | |
2B-2 |
19 |
Dec. 17, 2024 10:45 ~ 12:00 |
Artificial Expert Support for Specification-based Misehavior Detection System Framework in Cyber Physical Systems. Han Zeyu, Huizhi Wang, Wang Xiaoyi (Beijing Jiaotong University) Linyuan Yao (Beijing Institute of Astronautical Systems Engineering) | |
2B-3 |
20 |
Dec. 17, 2024 10:45 ~ 12:00 |
An Explainable Android Malware Detection Framework Based on Graph Neural Network Xiaojing Fan, Wangjian Zhou, Huachun Zhou (Beijing Jiaotong University) | |
2B-4 |
21 |
Dec. 17, 2024 10:45 ~ 12:00 |
Proactive Threat Detection and Anomaly Analysis Framework Using Log-Based Sequence Analysis Seong-Su Yoon, Hui-Seok Yang, Joon-Seok Kim, Sang-Joon Lee (Chonnam National University) | |
2C-1 |
22 |
Dec. 17, 2024 10:45 ~ 12:00 |
Provably Secure Unidirectional Threshold PRE+ Schemes Maruthi V, Kunwar Singh (National Institute of Technology, Trichy, Tamil Nadu) | |
2C-2 |
23 |
Dec. 17, 2024 10:45 ~ 12:00 |
An Efficient Sequential Aggregate Signature Scheme with Lazy Verification Arinjita Paul (Niobium Microsystems), Sabyasachi Dutta (SRM University-AP), Kouichi Sakurai (Kyushu University), Chandrasekaran Pandurangan (Indian Institute of Science) | |
2C-3 |
24 |
Dec. 17, 2024 10:45 ~ 12:00 |
User Identification Based on sEMG and Accelerometer Sensors and Deep Learning Approaches Sakorn Mekruksavanich (University of Phayao)Anuchit Jitpattanakul (King Mongkut's University of Technology North Bangkok) | |
3A-1 |
25 |
Dec. 17, 2024 13:15 ~ 16:15 |
Securing Authentication and Authorization in Computing Continuum Mario Marín, Antonio Skarmeta Gomez (University of Murcia)Alejandro Arias, Rafael Marín (Odin Solutions SL) | |
3A-2 |
26 |
Dec. 17, 2024 13:15 ~ 16:15 |
FLARE: A blockchain strategy for hierarchical Federated Learning algorithms Marcos Gabriel Mannarino Loures, Claudio Farias (Federal University of Rio de Janeiro) | |
3A-3 |
27 |
Dec. 17, 2024 13:15 ~ 16:15 |
QoE-Driven Spot Pricing Schemes For Edge User Allocation Across the Distributed Cloud-Edge Continuum Filippou Michail, Prodromos Makris, Aristotelis Kretsis, Panagiotis Kokkinos,
, Emmanouel Varvarigos (National Technical University of Athens) | |
3B-1 |
28 |
Dec. 17, 2024 13:15 ~ 16:15 |
Efficient and Secure CSIDH using Relation Lattices Mohamed Bourefis, Atsuko Miyaji (Osaka University) | |
3B-2 |
29 |
Dec. 17, 2024 13:15 ~ 16:15 |
A Study on Evaluation Items and Indicators for Ensuring Cyber Resilience Sooyon Seo, Jaeho Hwang, Minseok Hur, Dongmin Kim, Sechan Lee, Moohong Min (Sungkyunkwan University) | |
3B-3 |
30 |
Dec. 17, 2024 13:15 ~ 16:15 |
The Amplified Boomerang Attack on ChaCha Nasratullah Ghafoori, Atsuko Miyaji (Osaka University) | |
3C-1 |
31 |
Dec. 17, 2024 13:15 ~ 16:15 |
An Enhanced Payload Image Steganography Employing Hybrid Edge Detection Technique and MSB Cover Image A F M Zainul Abadin (Pabna University of Science and Technology), Mohammad Kamrul Hasan (Universiti Kebangsaan Malaysia), Rossilawati Sulaiman (National University of Malaysia) | |
3C-2 |
32 |
Dec. 17, 2024 13:15 ~ 16:15 |
A High Security Image Steganography System Employing Multiple Edge Detectors A F M Zainul Abadin (Pabna University of Science and Technology), Rossilawati Sulaiman (National University of Malaysia), Mohammad Kamrul Hasan (Universiti Kebangsaan Malaysia) | |
3C-3 |
33 |
Dec. 17, 2024 13:15 ~ 16:15 |
A method for supporting quick scene recognition by generating average images from surveillance videos Kaoru Sugita (Fukuoka Institute of Technology) | |
4A-1 |
34 |
Dec. 17, 2024 16:30 ~ 18:00 |
Distributed AI-Based Network Intent Resolution for Reliable Security Service Orchestration Pedro Martinez-Julia, Ved P. Kafle, Hitoshi Asaeda
(National Institute of Information and Communications Technology)
, Ana Hermosilla (University of Murcia) | |
4A-2 |
35 |
Dec. 17, 2024 16:30 ~ 18:00 |
Towards a Framework and Methodology Adherent to the EU Cyber Resilience Act - Observations from CERTIFY Stefano Sebastio (Collins Aerospace)
, Sara Matheu, Antonio Skarmeta Gomez (University of Murcia)
Matteo Molé, Roberto Cascella (European Cyber Security Organization (ECSO)) | |
4A-3 |
36 |
Dec. 17, 2024 16:30 ~ 18:00 |
A privacy preserving Health Data Space approach for federated machine learning Alessandro Bassi (Eurescom GmbH)Konstantinos Koutsopoulos (Qualtek SARL) | |
4A-4 |
37 |
Dec. 17, 2024 16:30 ~ 18:00 |
Cross-Domain Telemetry Architecture: Real-Time Metrics in the Computing Continuum José Manuel Bernabé Murcia, Eduardo Cánovas Mártinez, Antonio Skarmeta Gomez
(University of Murcia), Alejandro Molina Zarca (University Center of Defense at the Spanish Air Force Academy), Stefano Braghin (IBM Research Europe – Ireland) | |
4C-1 |
38 |
Dec. 17, 2024 16:30 ~ 18:00 |
CAFL: Contrastive Learning and Self-Attention in Federated Learning Riqing Xu, Wenbin Qiu, Gang Lei (Jiangxi Normal University, Nanchang, China) | |
4C-2 |
39 |
Dec. 17, 2024 16:30 ~ 18:00 |
A Color-Based Data Poisoning Backdoor Approach for Misleading Adversarial Privacy Prediction Muhammad Rizwan, Wang Xingfu, Yi Ke, Ammar Hawbani
(University of Science and Technology of China)
, Shivanshu Shrivastava (Rajiv Gandhi Institute of Petroleum Technology)
, Pelin Angin (Middle East Technical University)
, Zhu Han (University of Houston) | |
4C-3 |
40 |
Dec. 17, 2024 16:30 ~ 18:00 |
Administration of Environment Aware Deep Learning Based Access Control Pankaj Chhetri, Ram Krishnan (University of Texas at San Antonio)
, Mohammad Nur Nobi (FedEx Dataworks) | |
4C-4 |
41 |
Dec. 17, 2024 16:30 ~ 18:00 |
NetSMoM: ML Driven Network Slicing framework for Efficient and Secure Service Delivering in 6G Network Ramraj Dangi (SCOPE, VIT Bhopal University, M.P., India), Lokesh Malviya (SCSE, VIT Bhopal University, M.P., India), Akshay Jadhav (SCSE, Manipal University Jaipur, India), Gaurav Choudhary (University of Southern Denmark, Sonderborg, Denmark), Nicola Dragoni (DTU Compute, Technical University of Denmark) | |
5A-1 |
42 |
Dec. 18, 2024 09:00 ~ 10:30 |
Evaluation of a Startup Program Identification for Efficient and Accurate IoT Security Investigations Yuta Shimamoto, Ryota Yoshimoto, Jiratchaya Phinyodom (Okayama University), Hiroyuki Uekawa, Mitsuaki Akiyama (NTT Social Informatics Laboratories), Toshihiro Yamauchi (Okayama University) | |
5A-2 |
43 |
Dec. 18, 2024 09:00 ~ 10:30 |
Detection techniques and Countermeasures against Deepfake-related Crime Soojin Oh, Cheol Hee Yoon (Korean National Police University) | |
5A-3 |
44 |
Dec. 18, 2024 09:00 ~ 10:30 |
Analysis of Deepfake Detection Models Against Deepfake Crimes Lee Sechan, Seo Sooyon, Jaeho Hwang, Hur Minseok, Kim Dongmin, Min Moohong
(Sungkyunkwan University), Kim Aram (University of Suwon) | |
5A-4 |
45 |
Dec. 18, 2024 09:00 ~ 10:30 |
Analysis and investigation of remote call service artifacts used in voice phishing: Focusing on voice phishing using CMC Minjung Yoo, Seunghyun Park, Seongmin Kim (Sungshin Women's University) | |
5A-5 |
46 |
Dec. 18, 2024 09:00 ~ 10:30 |
Zero Trust Approach to Enhance the Security of Microservices-Based DevSecOps Daemin Shin (Financial Security Institute)
, Jiyoon Kim (Gyeongsang National University), Ilsun You (Kookmin University) | |
5B-1 |
47 |
Dec. 18, 2024 09:00 ~ 10:30 |
V2G Fuzzer : Fuzzing Tool for Implementing Electric Vehicle Charger V2G Communication Yu-Bin Kim, Dong-Hyuk Shin, Ieck-Chae Euom, Jae-Jun Ha
(System Security Research Center, Chonnam National University) | |
5B-2 |
48 |
Dec. 18, 2024 09:00 ~ 10:30 |
Enhancing Security with Virtualization and Real-time Communications for Applications on Autonomous Vehicles Chih-Hao Chang, Chi-Sheng Shih, Shih-Hao Hung (National Taiwan University) | |
5B-3 |
49 |
Dec. 18, 2024 09:00 ~ 10:30 |
Blockchain-based secure vehicle data trading model for vehicle accident reconstruction Su Jin Shin, Ye Hyeon Park, Youngho Park, Kyung-Hyune Rhee, Sang Uk Shin
(Pukyong National University) | |
5B-4 |
50 |
Dec. 18, 2024 09:00 ~ 10:30 |
Automotive Crash Data Collection and Analysis: A Log-Based Case Study Jeehun Jung, Seong-Je Cho, Gyunseung Ahn (Dankook University), Kyoungwon Suh (Illinois State University) | |
5B-5 |
51 |
Dec. 18, 2024 09:00 ~ 10:30 |
A Survey of Intrusion Detection Systems for Autonomous Vehicles Current Solutions and Limitations Ulysses Lam (The University of Queensland), Jin-Hee Cho (Virginia Tech), Hyuk Lim (Korea Institute of Energy Technology), Terrence Moore, Frederica Free-Nelson (US Army Research Laboratory), Dongseong Kim (The University of Queensland) | |
6A-1 |
52 |
Dec. 18, 2024 10:45 ~ 12:00 |
Enhancing Cloud Security for IoHT: A Dual-Layer Scheme Combining Quantum Key Distribution and Post-Quantum Cryptography. Changjong Kim, Seunghwan Kim (Seoultech), Sunggon Kim (Seoul National University of Science and Technology) | |
6A-2 |
53 |
Dec. 18, 2024 10:45 ~ 12:00 |
Public Salt-based Post-Quantum PAKE Protocol Hyun Seo Kim, Ye Sol Lee, Jung Yeon Hwang (Sungshin Women's University) | |
6A-3 |
54 |
Dec. 18, 2024 10:45 ~ 12:00 |
Analysis of Backdoored (Classic) McEliece in a Multi-User Setting Dai Miura, Hyungrok Jo, Shingo Sato, Junji Shikata (Yokohama National University) | |
6A-4 |
55 |
Dec. 18, 2024 10:45 ~ 12:00 |
Reversible Face De-Identification Using Format-Preserving Encryption Heehwan Kim, Sungjune Park, Daeseon Choi (Soongsil University) | |
6B-1 |
56 |
Dec. 18, 2024 10:45 ~ 12:00 |
High-Definition Reconstruction of Wildfire-Affected Areas Using Attention SRU-GAN on Wildfire Images Jong Chan Park, Gun-Woo Kim (Gyeongsang National University) | |
6B-2 |
57 |
Dec. 18, 2024 10:45 ~ 12:00 |
Development of a Shelter Control System for Refugees Yuta Seri, Tomoyuki Ishida (Fukuoka Institute of Technology) | |
6B-3 |
58 |
Dec. 18, 2024 10:45 ~ 12:00 |
Robust and Invisible Watermarking Using Low-Frequency Domain-Based Discrete Wavelet Transform Seo-Yi Kim, Yeon-Ji Lee, Il-Gu Lee (Sungshin Women's University) | |
6B-4 |
59 |
Dec. 18, 2024 10:45 ~ 12:00 |
Software Defined Range-proof Authentication Mechanism for Untraceable Digital ID So-Eun Jeon, Yeon-Ji Lee, Il-Gu Lee (Sungshin Women's University) | |
7A-1 |
60 |
Dec. 18, 2024 15:00 ~ 16:15 |
A Scenario Language for Model-based Testing of TLS Jaehun Lee, Kyungmin Bae (POSTECH) | |
7A-2 |
61 |
Dec. 18, 2024 15:00 ~ 16:15 |
Utilizing LLM Chatbots for Formal Descriptions of Cryptographic Protocols Hideki Sakurada (NTT Communication Science Laboratories, NTT Corporation)Kouichi Sakurai (Kyushu University) | |
7A-3 |
62 |
Dec. 18, 2024 15:00 ~ 16:15 |
Toward correctness by construction for network security configuration Daniele Bringhenti, Riccardo Sisto, Fulvio Valenza (Politecnico di Torino) | |
7A-4 |
63 |
Dec. 18, 2024 15:00 ~ 16:15 |
Comprehensive Formal Verification of EAP-AKA'-FS Using ProVerif: Ensuring Robustness in Future Mobile Networks Seonghan Shin (National Institute of Advanced Industrial Science and Technology (AIST))Yongho Ko, Ilsun You (Kookmin University) | |
7B-1 |
64 |
Dec. 18, 2024 15:00 ~ 16:15 |
Machine Learning-Based Secure Transmission with Artificial Noise in MISO Communication Systems Min Jeong Kang, Jung Hoon Lee (Hankuk University of Foreign Studies)Il-Gu Lee (Sungshin Women's University) | |
7B-2 |
65 |
Dec. 18, 2024 15:00 ~ 16:15 |
Neutralizing tunneling protocols by manipulating VPN client routing tables In June Shin, Ji Yul Kim (Daegu University)Chang Hoon Kim (Daegu University) | |
7B-3 |
66 |
Dec. 18, 2024 15:00 ~ 16:15 |
Dynamic xIFS-Based Low-Latency Traffic Transmission Technique Sun-Jin Lee, Il-Gu Lee (Sungshin Women's University) | |
7B-4 |
67 |
Dec. 18, 2024 15:00 ~ 16:15 |
DFL: Differential Federated Learning for Enhancing Privacy and Efficiency of Multilink-Operation Wireless Communication Networks So-Yeon Kim, Na-Eun Park, Yu-Ran Jeon, Il-Gu Lee (Sungshin Women's University) | |
8A-1 |
68 |
Dec. 19, 2024 09:00 ~ 10:15 |
SCU-CGAN: Enhancing Fire Detection through Synthetic Fire Image Generation and Dataset Augmentation Ju-Young Kim, Ji-Hong Park (Gyeongsang National University)Gun-Woo Kim (Gyeongsang National University) | |
8A-2 |
69 |
Dec. 19, 2024 09:00 ~ 10:15 |
Clock Glitch-based Fault Attacks on Convolutional Neural Networks Seongwoo Hong, Hyoju Kang, Seungyeol Lee, Jaecheol Ha (Hoseo University) | |
8A-3 |
70 |
Dec. 19, 2024 09:00 ~ 10:15 |
Federated Random Forests for Privacy-Preserving Intrusion Detection in IoT Networks Md. Parvezur Rahman Mahin, Farhana Anwar Tisha (East West University)Effat Ara (American International University of Bangladesh)Raihan Ul Islam (Associate Professor, East West University)Karl Andersson (Lulea University of Technology)Mohammad Shahadat Hossain (University of Chittagong) | |
8A-4 |
71 |
Dec. 19, 2024 09:00 ~ 10:15 |
Fair Incentive Distribution Mechanism in Hierarchical Federated Learning Siwan Noh, Ju-Hyun Jeon, Kyung-Hyune Rhee (Pukyong National University) | |
8B-1 |
72 |
Dec. 19, 2024 09:00 ~ 10:15 |
Lightweight Object-detection Model on Edge Devices for Safety and Security Applications Yun-Wei Lin, Dong-Sheng Zhuang, Jia-Huei Shie (National Yang Ming Chiao Tung University) | |
8B-2 |
73 |
Dec. 19, 2024 09:00 ~ 10:15 |
Proposal of Early Heavy Rain Warning System by Micrometeorological and Geographical Factors with Numerous IoT Sensors Noriki Uchida, Tomoyuki Ishida (Fukuoka Institute of Technology)Hiroaki Yuze (University of Shizuoka)Yoshitaka Shibata (Iwate Prefectural University) | |
8B-3 |
74 |
Dec. 19, 2024 09:00 ~ 10:15 |
Adapting Matrix Factorization for Multivariate Time Series Imputation Minje Kim, Sang-Min Choi (Gyeongsang National University) | |
8B-4 |
75 |
Dec. 19, 2024 09:00 ~ 10:15 |
Detecting Cryptojacking Containers in Kubernetes Using eBPF Riyeong Kim, Su-Min Kim, Jeong-Eun Ryu, Soo-Min Lee, Seongmin Kim
(Sungshin Women's University) | |
8C-1 |
76 |
Dec. 19, 2024 09:00 ~ 10:15 |
Percolation-based Optimization for Enhancing SDN Structure Resilience Yizhong Hu, Jianfeng Guan, Kexian Liu (Beijing University of Posts and Telecommunications) | |
8C-2 |
77 |
Dec. 19, 2024 09:00 ~ 10:15 |
A Three-Pronged Approach to Malicious APK: Combining Snort, Wireshark, and Wazuh for Advanced Threat Management Yi Anson Lam, Siu Ming Yiu, K P Chow (The University of Hong Kong) | |
8C-3 |
78 |
Dec. 19, 2024 09:00 ~ 10:15 |
Resilient Multi-Path Aggregation Transmission Mechanism for Bandwidth Enhancement Qixuan Zhang, Yuyin Ma, Liang Wang (Beijing Jiaotong University) | |
8C-4 |
79 |
Dec. 19, 2024 09:00 ~ 10:15 |
Infiltrating the Metaverse: A Security Assessment of Multifaceted Voice Command Manipulation and Undermine Arpita Dinesh Sarang, Sang-hoon Choi, Ki-woong Park (Sejong University) | |
9A-1 |
80 |
Dec. 19, 2024 10:30 ~ 12:00 |
Bidirectional Proxy Re-Encryption based on Isogenies Jiawei Chen, Hyungrok Jo, Shingo Sato, Junji Shikata (Yokohama National University) | |
9A-2 |
81 |
Dec. 19, 2024 10:30 ~ 12:00 |
PRNG-Oriented Side-Channel Security Evaluation for TI-AES Yusaku Harada, Maki Tsukahara, Daiki Miyahara, Yang Li, Kazuo Sakiyama
(The University of Electro-Communications)Yuko Hara (Tokyo Institute of Technology) | |
9A-3 |
82 |
Dec. 19, 2024 10:30 ~ 12:00 |
A Blockchain-Based Approach for Secure Email Encryption with Variable ECC Key Lengths Selection Md. Biplob Hossain, Maya Rahayu, Yuta Kodera, Yasuyuki Nogami, Samsul Huda
(Okayama University)Md. Arshad Ali (Faculty of CSE, Hajee Mohammad Danesh Science and Technology University) | |
9A-4 |
83 |
Dec. 19, 2024 10:30 ~ 12:00 |
Analysis of Numerous Security Algorithm Performance with Data Encryption on Edge Device Sangmyung Lee, Ehan Sohn, Soeun Kim (Seoul National University of Science and Technology)Sunggon Kim (Seoul National University of Science and Technology) | |
9A-5 |
84 |
Dec. 19, 2024 10:30 ~ 12:00 |
Lightweight IoT Data Encryption using Time Parameter based Ascon Algorithm Kunlin Tsai, Ju-Wei Zhu, Deng-Yao Yao, Guo-Wei Wang, Fang-Yie Leu (TungHai University) | |
9B-1 |
85 |
Dec. 19, 2024 10:30 ~ 12:00 |
Development of Stepping-stone Intrusion Detection and its Trend Jianhua Yang (Columbus State University, GA)Yongzhong Zhang (Shanghai Open University, Shanghai)Lixin Wang (Columbus State University, Columbus, GA) | |
9B-2 |
86 |
Dec. 19, 2024 10:30 ~ 12:00 |
Multi-channel Transmission Techniques of Multiple Encryption Keys and Ciphertext for Secure Firmware-Over-The-Air Mechanism Chae-Yeon Park (Sungshin Women's University)Seo-Young Lim (Kangnam University)Sun-Jin Lee, Il-Gu Lee (Sungshin Women's University) | |
9B-3 |
87 |
Dec. 19, 2024 10:30 ~ 12:00 |
Exploring the Potential of Anomaly Detection through Prompt Engineering Sungjune Park, Daeseon Choi (Soongsil University) | |
9B-4 |
88 |
Dec. 19, 2024 10:30 ~ 12:00 |
Co-EDR: Cooperative-based Event Data Recording Technique for Efficient Firmware Fuzzing Seung-Ha Ji, Soeun Jeon (Sungshin Women's University)Dongim Han (BaekSeok University)Il-Gu Lee (Sungshin Women's University) | |
9C-1 |
89 |
Dec. 19, 2024 10:30 ~ 12:00 |
NGAP Anomaly Detection based on Signaling Sequences in 5GC Boundary Shaocong Feng, Baojiang Cui, Meiyi Jiang, Weichun He, Junsong Fu
(Beijing University of Posts and Telecommunications) | |
9C-2 |
90 |
Dec. 19, 2024 10:30 ~ 12:00 |
ADL: A Method of Attack Detection with LLM by Assigning Traffic Sequencing in 5G IoT Aoran Huang, Huachun Zhou (Beijing Jiaotong University) | |
9C-3 |
91 |
Dec. 19, 2024 10:30 ~ 12:00 |
Enhancing Security in Open RAN Networks: Leveraging Zero Trust Architecture to Address Emerging Threats Dowon Kim, Seongmin Park (Korea Internet Security and Agency)Sungmoon Kwon (Ajou University) | |
9C-4 |
92 |
Dec. 19, 2024 10:30 ~ 12:00 |
A Security Testing Framework for NAS Protocol Based on Template Modification and Signaling Fuzzing Changnan Li, Baojiang Cui, Jie Xu (Beijing University of Posts and Telecommunications) | |
9C-5 |
93 |
Dec. 19, 2024 10:30 ~ 12:00 |
5G Sentinel: High-Precision Elastic Deep Intrusion Detection System for 5G Network Shengjia Chang, Baojiang Cui, Shaocong Feng
(Beijing University of Posts and Telecommunications) | |
ISE-1 |
94 |
Dec. 19, 2024 13:30 ~ 15:30 |
RT-TTS: A Real-Time Two-Stage Framework for Emotional Text-to-Speech Synthesis Without Labeled Emotion Data Myeong Jin (Department of AI Convergence Engineering, Gyeongsang National University)Gun-Woo Kim (Gyeongsang National University) | |
ISE-2 |
95 |
Dec. 19, 2024 13:30 ~ 15:30 |
A Comprehensive Review of Digital Twin: Concepts, Applications, and Challenges Changhui Bae, Euteum Choi (Gyeongsang National University)Seongjin Lee (Gyeongsang National University) | |
ISE-3 |
96 |
Dec. 19, 2024 13:30 ~ 15:30 |
A Multi-Stage Detection with Image Upscaling for Enhancing Small Object Detection in Early Fire Detection Jisang Moon, Changhui Bae, Euteum Choi (Gyeongsang National University)Seongjin Lee (Gyeongsang National University) | |
ISE-4 |
97 |
Dec. 19, 2024 13:30 ~ 15:30 |
Network Recovery Method for UAVs through Neighbor Node Classification Dongyun Ok, Euteum Choi (Gyeongsang National University), Seongjin Lee (Gyeongsang National University) | |
ISE-5 |
98 |
Dec. 19, 2024 13:30 ~ 15:30 |
Obstacle Avoidance in Autonomous Driving Exploiting Smooth Adaptive Dynamic Window Approach Myeongjun Kim (Department of AI Convergence Engineering, Gyeongsang National University), Gun-Woo Kim (Gyeongsang National University) | |
WS1 |
99 |
Dec. 17, 2024 16:30 ~ 18:00 |
AutoBlue Sentinel: A Bluetooth Intrusion Detection System for Automotive Security Zahyun Kang, Sanghoon Jeon (Kookmin University) | |
WS2 |
100 |
Dec. 17, 2024 16:30 ~ 18:00 |
A Study on Performance Comparison and Optimization of Anomaly Detection Systems Using BERT Variants Yu-Jin So (Kunsan National University), Jong-Geun Park (Electronics and Telecommunication Research Institute)Kyuchang Kang (Kunsan National University) | |
WS3 |
101 |
Dec. 17, 2024 16:30 ~ 18:00 |
Enhancing Vehicle Smart Key Security with Blockchain Mechanisms Sebi Kim, Sanghoon Jeon (Kookmin University) | |
WS4 |
102 |
Dec. 17, 2024 16:30 ~ 18:00 |
Robust Watermark Against Model Extraction Attack Yeon-Ji Lee, Seo-Yi Kim, Il-Gu Lee (Sungshin Women's University) | |
WS5 |
103 |
Dec. 17, 2024 16:30 ~ 18:00 |
Dual Core based Hierarchical Partial Wireless Network Firmware Update Technology Na-Hyun Kim, Jin-Min Lee, Il-Gu Lee (Sungshin Women's University) | |
WS6 |
104 |
Dec. 17, 2024 16:30 ~ 18:00 |
Computational analysis of PQC migration in EAP based 5G primary authenticaton Hoseok Kwon, Bonam Kim, Seog Chung Seo, Okyeon Yi, Ilsun You (Kookmin University) | |
WS7 |
105 |
Dec. 17, 2024 16:30 ~ 18:00 |
Framework for Analyzing Heterogeneous Log Internal Artifacts for Remote Code Execution Detection Seung-Ju Han, Ieck-Chae Euom, Ka-Kyung Kim, Hye-Ji Lee (System Security Research Center) | |
WS8 |
106 |
Dec. 17, 2024 16:30 ~ 18:00 |
CiME: Hardware-Based Detection Ransomware Using Capacitor in Memory for Entropy Hyelim Jung (SysCoreLab., Sejong University, Seoul), Ki-Woong Park (Sejong University) | |
WS9 |
107 |
Dec. 17, 2024 16:30 ~ 18:00 |
One Time Password-based Peer-to-Peer Offline Authentication for Next-Generation Digital IDs Jin-Min Lee, Sun-Jin Lee, Il-Gu Lee (Sungshin Women's University) | |