| Date | Main | Opponent | Title |
|---|
| 25.10.28 | Seungho Kim | Soolin Kim | SEMCODER: Training Code Language Models with Comprehensive Semantics Reasoning |
| 25.11.4 | Eun Jung | Eunsoo Kim | Make a Feint to the East While Attacking in the West: Blinding LLM-Based Code Auditors with Flashboom Attacks |
| 25.11.11 | Sanghak Oh | Bedeuro Kim | FOADA: Toward Robust Open-World Mobile App Fingerprinting |
| 25.11.18 | Seonhye Park | Kyungbin Ryu | Learn What You Want to Unlearn: Unlearning Inversion Attacks against Machine Unlearning |
| 25.11.25 | Taeyoung Kim | Woojin Jeon | Are CAPTCHAs Still Bot-hard? Generalized Visual CAPTCHA Solving with Agentic Vision Language Model |
| 25.12.2 | Sangjun Chae | Yoo Seungwoo | Retrieve, Refine, or Both? Using Task-Specific Guidelines for Secure Python Code Generation |
| 25.12.9 | Seyoung Jin | Daeun Song | Holmes-VAU: Towards Long-term Video Anomaly Understanding at Any Granularity |
| 25.12.23 | Eunsoo Kim | Seungho Kim | VoiceWukong: Benchmarking Deepfake Voice Detection |
| 25.12.30 | Nivedita Singh | - | Johnny Can't Revoke Consent Either: Measuring Compliance of Consent Revocation on the Web |
| 26.1.6 | Chaejin Lim | - | Byte by Byte: Unmasking Browser Fingerprinting at the Function Level Using V8 Bytecode Transformers |
| 26.1.13 | Woojin Jeon | Sanghak Oh | MotionDecipher: General Video-assisted Passcode Inference In Virtual Reality |
| 26.1.20 | Heejun Jang | - | |
| 26.1.27 | Joonhyoung Park | - | |
| 26.2.3 | Bedeuro Kim | - | |
| 26.2.10 | Subin Cho | - | |
| 26.2.24 | Ahmad Khan | - | |
| 26.3.3 | Eunsoo Kim | - | |
| 26.3.10 | Sanghak Oh | - | |
| 26.3.17 | Seonhye Park | - | |
| 26.3.24 | Taeyoung Kim | - | |
| 26.3.31 | Seojin Park | - | |
| 26.4.7 | Seonki Kim | - | |
| 26.4.14 | Daeun Song | - | |