| Date | Main | Opponent | Title |
|---|
| 26.1.20 | Heejun Jang | Taeyoung Kim | Augmenting Smart Contract Decompiler Output Through Fine-Grained Dependency Analysis and LLM-Facilitated Semantic Recovery |
| 26.1.27 | Joonhyoung Park | Nivedita Singh | Rescuing the Unpoisoned: Efficient Defense against Knowledge Corruption Attacks on RAGSystems |
| 26.2.3 | Bedeuro Kim | Nivedita Singh | Exploring User Security and Privacy Attitudes and Concerns Toward the Use of General-Purpose LLM Chatbots for Mental Health |
| 26.2.10 | Subin Cho | Kyungbin Ryu | StruQ: Defending Against Prompt Injection with Structured Queries |
| 26.2.24 | Ahmad Khan | Sanghak Oh | Evaluating Machine Learning-Based IoT Device Identification Models |
| 26.3.16 | Seungho Kim | Yena Cho | Concept-Aware Privacy Mechanisms for Defending Embedding Inversion Attacks |
| 26.3.23 | - | - | ACISP Review |
| 26.3.30 | Sanghak Oh | Ahmad Khan | PANDORA: Lightweight Adversarial Defense for Edge IoT using Uncertainty-Aware Metric Learning |
| 26.4.6 | Seonhye Park | Sukyeong Bang | Towards Lifecycle Unlearning Commitment Management: Measuring Sample-level Unlearning Completeness |
| 26.4.13 | Taeyoung Kim | Chaejin Lim | Oedipus: LLM-enchanced Reasoning CAPTCHA Solver |
| 26.4.20 | Seojin Park | - | |
| 26.4.27 | Sun Ki Kim | - | |
| 26.5.4 | Daeun Song | - | |
| 26.5.11 | Eunsoo Kim | - | |
| 26.5.18 | Seyoung Jin | - | |
| 26.5.25 | Nivedita Singh | - | |
| 26.6.1 | Soolin Kim | - | |
| 26.6.8 | Chaejin Lim | - | |
| 26.6.15 | Woojin Jeon | - | |
| 26.6.22 | Yena Cho | - | |
| 26.6.29 | Sukyeong Bang | - | |
| 26.7.6 | Sangjun Chae | - | |
| 26.7.13 | Jieun Hwang | - | |