Abstract is missing.
- Exploring Zero-Shot Prompting for Generating Data Format DescriptionsPrashant Anantharaman, Vishnupriya Varadharaju. 1-15 [doi]
- C2VPG: Translating Practical Context-Free Grammars into Visibly Pushdown Grammars by Order-Based TaggingXiaodong Jia 0004, Gang Tan. 16-25 [doi]
- Email Smuggling with Differential Fuzzing of MIME ParsersSeyed Behnam Andarzian, Martin Meyers, Erik Poll. 26-37 [doi]
- Towards Programming Languages Free of Injection-Based Vulnerabilities by DesignEric Alata, Pierre-François Gimenez. 38-55 [doi]
- Large Language Models for Validating Network Protocol ParsersMingwei Zheng, Danning Xie, Xiangyu Zhang. 56-64 [doi]
- Research Report: Parsing with the Logic FCOwen M. Bell, Sam M. Thompson, Dominik D. Freydenberger. 65-72 [doi]
- Research Report: AI Security is a LangSec ProblemMax von Hippel, Evan Miyazono. 73-78 [doi]
- Hi-Res: Precise Exploit Detection Using Object-Granular Memory MonitoringZiyang Yang, Saumya Solanki, Scott Rixner, Nathan Dautenhahn. 79-90 [doi]
- Research Report: Automatic Schema Inference From Unknown Protobuf MessagesJared Chandler. 91-97 [doi]
- Membership Inference Attacks on Sequence ModelsLorenzo Rossi, Michael Aerni, Jie Zhang, Florian Tramèr. 98-110 [doi]
- Enhancing Jailbreak Resistance in Large Language Models Using Model MergeSaki Hiromi, Hiroki Kinoshita, Masanori Yamada, Takayuki Miura. 111-117 [doi]
- Blind Baselines Beat Membership Inference Attacks for Foundation ModelsDebeshee Das, Jie Zhang, Florian Trantèr. 118-125 [doi]
- LAMD: Context-Driven Android Malware Detection and Classification with LLMsXingzhi Qian, Xinran Zheng, Yiling He, Shuo Yang 0011, Lorenzo Cavallaro. 126-136 [doi]
- Using LLMs to Identify Personal Data Processing in Source CodeImmanuel Kunz, Ching-yu Kao, Daniel Kowatsch, Jens Hiller, Julian Schütte, Dmitry Prokhorenkov, Konstantin Böttinger. 137-144 [doi]
- Which Instructions Matter the Most: A Saliency Analysis of Binary Function Embedding ModelsMoritz Dannehl, Samuel Valenzuela, Johannes Kinder. 145-151 [doi]
- Inference Attacks for X-Vector Speaker AnonymizationLuke A. Bauer, Wenxuan Bao, Malvika Jadhav, Vincent Bindschaedler. 152-159 [doi]
- FedTilt: Towards Multi-Level Fairness-Preserving and Robust Federated LearningBinghui Zhang, Luis Mares De La Cruz, Binghui Wang. 160-166 [doi]
- Composite Explanation-Aware AttacksMaximilian Noppel, Christian Wressnegger. 167-176 [doi]
- Impact of Data Duplication on Deep Neural Network-Based Image Classifiers: Robust vs. Standard ModelsAlireza Aghabagherloo, Aydin Abadi, Sumanta Sarkar, Vishnu Asutosh Dasu, Bart Preneel. 177-183 [doi]
- Automated IoT Fingerprinting with LLMs: Harnessing Explainable AI and Artificial Bee Colony OptimizationYaman Shrestha, Khursaid Ansari, Ahmet Aksoy. 184-190 [doi]
- A Tool for Safe and Accurate IoT Automation Rule Generation Using Large Language ModelsMd Shihabul Islam, Murat Kantarcioglu. 191-198 [doi]
- Destabilizing a Social Network Model via Intrinsic Feedback VulnerabilitiesLane H. Rogers, Emma J. Reid, Robert A. Bridges. 199-205 [doi]
- Network Hexagons Under Attack: Secure Crowdsourcing of Georeferenced DataOkemawo Obadofin, João Barros. 206-212 [doi]
- DYNAMITE: Dynamic Defense Selection for Enhancing Machine Learning-Based Intrusion Detection Against Adversarial AttacksJing Chen, Onat Güngör, Zhengli Shang, Elvin Li, Tajana Rosing. 213-219 [doi]
- Demo: A Probabilistic Model-Based Deep Reinforcement Learning Strategy to Maximize Safety Under Cyberattacks on a Connected Intersection-Bridging Stochasticity and Real-World Driving DataChen Chen, Zhixia Li, Heng Wei, Guohui Zhang, Yifan Xu. 220-222 [doi]
- Demo: A Calibrated, Open-Source Toolkit for MitM Cyberattacks Visualization, Analysis, and Traffic Optimization at Connected IntersectionsYifan Xu, Zhixia Li, Heng Wei, Guohui Zhang, Yongxin Liu, Chen Chen. 223-225 [doi]
- Demo: Disrupting In-Car mmWave Sensing Through IRS ManipulationHanqing Guo, Dong Li, Ruofeng Liu, Yao Zheng. 226-228 [doi]
- Ignoring Directionality Leads to Compromised Graph Neural Network ExplanationsChangsheng Sun, Xinke Li, Jin Song Dong. 229-235 [doi]
- Eye Movement Biometrics in Virtual Reality: A Comparison Between VR Headset and High-End Eye-Tracker Collected DatasetMehedi Hasan Raju, Oleg Komogortsev. 236-241 [doi]
- Reliable KMDF Instruction Set Generation for User Queries Based on Endogenous Generative LLMsYuer Yang, Yifeng Lin, Siu-Ming Yiu. 242-250 [doi]
- An Interactive Framework for Implementing Privacy-Preserving Federated Learning: Experiments on Large Language ModelsKasra Ahmadi, Rouzbeh Behnia, Reza Ebrahimi 0001, Mehran Mozaffari Kermani, Jeremiah Birrell, Jason Pacheco, Attila A. Yavuz. 251-259 [doi]
- A Rusty Link in the AI Supply Chain: Detecting Evil Configurations in Model RepositoriesZiqi Ding, Qian Fu, Junchen Ding, Gelei Deng, Yi Liu 0069, Yuekang Li. 260-264 [doi]
- Generating Secure Artificial Intelligence Model Source Code: A Reinforcement Learning ApproachAdhishree Kathikar, Ben Lazarine, Yang Gao, Ankit Shah, Sagar Samtani. 265-269 [doi]
- Continuous Embedding Attacks via Clipped Inputs in Jailbreaking Large Language ModelsZihao Xu, Yi Liu, Gelei Deng, Kailong Wang 0001, Yuekang Li, Ling Shi, Stjepan Picek. 270-277 [doi]
- Good News for Script Kiddies? Evaluating Large Language Models for Automated Exploit GenerationDavid Jin, Qian Fu, Yuekang Li. 278-282 [doi]
- Code Vulnerability Repair with Large Language Model Using Context-Aware Prompt TuningArshiya Khan, Guannan Liu, Xing Gao. 283-287 [doi]
- Examining the Robustness of Machine Learning-Based Phishing Website Detection: Action-Masked Reinforcement Learning for Automated Red TeamingYang Gao, Benjamin Ampel, Sagar Samtani. 288-293 [doi]
- LeoDroid: An LLM-Based Few-Shot Multi-Label Detection for Android MalwareMinhong Dong, Liyuan Liu, Qi Guo, Hongpeng Bai, Ruijie Gong, Yude Bai, Wenying He, Ze Wang, Guangquan Xu, Ji Zhang. 294-306 [doi]
- Analyzing the Spatiotemporal Dynamics and Social Influences on the Transportation Cybersecurity Industry Through a Business Visitor Flow PerspectiveYuhao Wang, Kailai Wang, Yunpeng Jack Zhang. 307-313 [doi]
- TrafficPulse: A Road-Sensor Assisted Traffic Tweet Misinformation Detection SystemJunhao Frank Ran, Yifan Wu, Delaram Pirhayatifard, João Mattos, Arlei Silva. 314-321 [doi]
- Do Adversarial Patches Generalize? Attack Transferability Study Across Real-Time Segmentation Models in Autonomous VehiclesPrashant Shekhar, Bidur Devkota, Dumindu Samaraweera, Laxima Niure Kandel, Manoj Babu. 322-328 [doi]
- Explainable Machine Learning for Cyberattack Identification from Traffic FlowsYujing Zhou, Marc L. Jacquet, Robel Dawit, Skyler Fabre, Dev Sarawat, Faheem Khan, Madison Newell, Yongxin Liu, Dahai Liu, Hongyun Chen, Jian Wang, Huihui Wang. 329-334 [doi]
- An Agent-Based Model for Evaluating Connected and Autonomous Vehicles, Collective Behaviors and Traffic System PerformanceRajkumar Konka, Rakesh M. Verma, Shun Cao, Yunpeng Zhang. 335-345 [doi]
- Exploring Traffic Simulation and Cybersecurity Strategies Using Large Language ModelsLu Gao, Yongxin Liu, Hongyun Chen, Dahai Liu, Yunpeng Zhang, Jingran Sun. 346-351 [doi]
- Hybrid Edge Intelligence for Real-Time Intrusion Detection in Advanced Traffic Management SystemsRohith Reddy Depa, Yunpeng Zhang, Dianxiang Xu. 352-354 [doi]
- In-Progress: Exploring Tire Pressure Monitoring Systems (TPMS) for Secure Key Generation for Intra-Vehicular Device AuthenticationOmar Achkar, Shahryar Raza, James McAvoy, Rushikesh Shirsat, Neil Klingensmith, Kyuin Lee. 355-357 [doi]
- In-Progress: Augmenting Explainable AI with LLMs to Enhance User Trust in Intelligent Transportation SystemsSohan Gyawali, Yili Jiang, Jiaqi Huang. 358-360 [doi]
- In-Progress: Enhancing Traffic Signal Perception for Connected and Autonomous Vehicles (CAVs) via Multi-Sensor Fusion of Camera, LiDAR, Radar, and SPaT DataA K. M. Sazzadul Alam, Xiali Hei, Yunpeng Zhang. 361-363 [doi]
- In-Progress: Reinforcement Learning for Cyberattack Defense in Autonomous Intersection Management SystemsWesley Duclos, Yujing Zhou, Jian Wang, Yongxin Liu, Huihui Wang. 364-366 [doi]
- Privacy-Preserving Mutual Authentication Protocol for Federated Learning in Intelligent Transportation SystemsRohini Poolat Parameswarath, Biplab Sikdar 0001. 367-369 [doi]
- In-Progress: Structured Pruning in the Wild: Benchmarking Practical Robustness Under Real-World CorruptionsJiamu Zhang, Shaochen Zhong, Hoang Anh Duy Le, Xia Hu 0001. 370-373 [doi]