Date | Main | Opponent | Title |
---|
24.12.30 | Soolin Kim | - | Vulnerability Detection with Graph Simplification and Enhanced Graph Representation Learning |
25.1.7 | Sanghak Oh | Woojin Jeon | TrafficFormer: An Efficient Pre-trained Model for Traffic Data |
25.1.14 | Beomjin Jin | Chaejin Lim | A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for Evading Learning-based Windows Malware Detection in the Wild |
25.1.21 | Seonhye Park | Seyoung Jin | Casual Users and Rational Choices within Differential Privacy |
25.1.21 | Taeyoung Kim | - | VETEOS: Statically Vetting EOSIO Contracts for the "Groundhog Day" Vulnerabilities |
25.2.4 | Eunsoo Kim | Eun Jung | Breaking Security-Critical Voice Authentication |
25.2.11 | Seonghyeon Song | Taeyoung Kim | AutoDroid: LLM-powered Task Automation in Android |
25.2.18 | Seungho Kim | Heewon Baek | Gopher: High-Precision and Deep-Dive Detection of Cryptographic API Misuse in the Go Ecosystem |
25.2.25 | Bedeuro Kim | Heesung Jeong | Organic or Diffused: Can We Distinguish Human Art from AI-generated Images? |
25.3.4 | Yena Cho | Yerim Kim | Less Defined Knowledge and More True Alarms: Reference-based Phishing Detection without a Pre-defined Reference List |
25.3.11 | Heesung Jeong | Jieun Hwang | An Empirical Study to Evaluate AIGC Detectors on Code Content |
25.3.18 | Sanghak Oh | - | Packet-Level Open-World App Fingerprinting on Wireless Traffic |
25.3.25 | Sangjun Chae | - | |
25.4.1 | Eun Jung | - | |
25.4.8 | Nivedita Singh | - | |
25.4.15 | Yooshick Moon | - | |
25.4.22 | Chaejin Lim | - | |
25.4.29 | Sukyeong Bang | - | |
25.5.13 | Heewon Baek | - | |
25.5.20 | Seyoung Jin | - | |
25.5.27 | Soolin Kim | - | |
25.6.3 | Yejin Do | - | |
25.6.10 | Woojin Jeon | - | |