Date | Main | Opponent | Title |
---|
25.3.25 | Sanghak Oh | - | Packet-Level Open-World App Fingerprinting on Wireless Traffic |
25.4.1 | Sangjun Chae | - | PromSec: Prompt Optimization for Secure Generation of Functional Source Code with Large Language Models(LLMs) |
25.4.8 | Eun Jung | Taeyoung Kim | AACEGEN: Attention Guided Adversarial Code Example Generation for Deep Code Models |
25.4.15 | Nivedita Singh | - | Automated Large-Scale Analysis of Cookie Notice Compliance |
25.4.22 | - | - | CHI presentation practice |
25.4.29 | Yooshick Moon | Woojoo Kim | HOLEPUNCH: Fast, Secure File Deletion with Crash Consistency |
25.5.13 | Heewon Baek | Woojin Jeon | Show Me Your Code! Kill Code Poisoning: A Lightweight Method Based on Code Naturalness |
25.5.20 | Sukyeong Bang | Seungho Kim | SELFCHECKGPT: Zero-Resource Black-Box Hallucination Detection for Generative Large Language Models |
25.6.10 | Seyoung Jin | Yooshick Moon | Sherlock: Towards Multi-scene Video Abnormal Event Extraction and Localization via a Global-local Spatial-sensitive LLM |
25.6.24 | Chaejin Lim | - | |
25.7.1 | Soolin Kim | - | |
25.7.18 | Yejin Do | - | |
25.7.25 | Woojin Jeon | - | |