


default search action
46th SP 2025: San Francisco, CA, USA - Workshops
- Marina Blanton, William Enck, Cristina Nita-Rotaru:
2025 IEEE Security and Privacy, SP 2025 - Workshops, San Francisco, CA, USA, May 15, 2025. IEEE 2025, ISBN 979-8-3315-6643-2 - Prashant Anantharaman, Vishnupriya Varadharaju:
Exploring Zero-Shot Prompting for Generating Data Format Descriptions. 1-15 - Xiaodong Jia, Gang Tan:
C2VPG: Translating Practical Context-Free Grammars into Visibly Pushdown Grammars by Order-Based Tagging. 16-25 - Seyed Behnam Andarzian, Martin Meyers, Erik Poll:
Email Smuggling with Differential Fuzzing of MIME Parsers. 26-37 - Eric Alata, Pierre-François Gimenez:
Towards Programming Languages Free of Injection-Based Vulnerabilities by Design. 38-55 - Mingwei Zheng, Danning Xie, Xiangyu Zhang:
Large Language Models for Validating Network Protocol Parsers. 56-64 - Owen M. Bell, Sam M. Thompson, Dominik D. Freydenberger:
Research Report: Parsing with the Logic FC. 65-72 - Max von Hippel, Evan Miyazono:
Research Report: AI Security is a LangSec Problem. 73-78 - Ziyang Yang, Saumya Solanki, Scott Rixner, Nathan Dautenhahn:
Hi-Res: Precise Exploit Detection Using Object-Granular Memory Monitoring. 79-90 - Jared Chandler:
Research Report: Automatic Schema Inference From Unknown Protobuf Messages. 91-97 - Lorenzo Rossi, Michael Aerni, Jie Zhang, Florian Tramèr:
Membership Inference Attacks on Sequence Models. 98-110 - Saki Hiromi, Hiroki Kinoshita, Masanori Yamada, Takayuki Miura:
Enhancing Jailbreak Resistance in Large Language Models Using Model Merge. 111-117 - Debeshee Das, Jie Zhang, Florian Trantèr:
Blind Baselines Beat Membership Inference Attacks for Foundation Models. 118-125 - Xingzhi Qian, Xinran Zheng, Yiling He, Shuo Yang, Lorenzo Cavallaro:
LAMD: Context-Driven Android Malware Detection and Classification with LLMs. 126-136 - Immanuel Kunz, Ching-Yu Kao, Daniel Kowatsch, Jens Hiller, Julian Schütte, Dmitry Prokhorenkov, Konstantin Böttinger:
Using LLMs to Identify Personal Data Processing in Source Code. 137-144 - Moritz Dannehl, Samuel Valenzuela, Johannes Kinder:
Which Instructions Matter the Most: A Saliency Analysis of Binary Function Embedding Models. 145-151 - Luke A. Bauer, Wenxuan Bao, Malvika Jadhav
, Vincent Bindschaedler:
Inference Attacks for X-Vector Speaker Anonymization. 152-159 - Binghui Zhang, Luis Mares De La Cruz, Binghui Wang:
FedTilt: Towards Multi-Level Fairness-Preserving and Robust Federated Learning. 160-166 - Maximilian Noppel, Christian Wressnegger:
Composite Explanation-Aware Attacks. 167-176 - Alireza Aghabagherloo, Aydin Abadi, Sumanta Sarkar, Vishnu Asutosh Dasu, Bart Preneel:
Impact of Data Duplication on Deep Neural Network-Based Image Classifiers: Robust vs. Standard Models. 177-183 - Yaman Shrestha, Khursaid Ansari, Ahmet Aksoy:
Automated IoT Fingerprinting with LLMs: Harnessing Explainable AI and Artificial Bee Colony Optimization. 184-190 - Md Shihabul Islam, Murat Kantarcioglu:
A Tool for Safe and Accurate IoT Automation Rule Generation Using Large Language Models. 191-198 - Lane H. Rogers, Emma J. Reid, Robert A. Bridges:
Destabilizing a Social Network Model via Intrinsic Feedback Vulnerabilities. 199-205 - Okemawo Obadofin, João Barros:
Network Hexagons Under Attack: Secure Crowdsourcing of Georeferenced Data. 206-212 - Jing Chen, Onat Güngör, Zhengli Shang, Elvin Li, Tajana Rosing:
DYNAMITE: Dynamic Defense Selection for Enhancing Machine Learning-Based Intrusion Detection Against Adversarial Attacks. 213-219 - Chen Chen, Zhixia Li, Heng Wei, Guohui Zhang, Yifan Xu:
Demo: A Probabilistic Model-Based Deep Reinforcement Learning Strategy to Maximize Safety Under Cyberattacks on a Connected Intersection-Bridging Stochasticity and Real-World Driving Data. 220-222 - Yifan Xu, Zhixia Li, Heng Wei, Guohui Zhang, Yongxin Liu, Chen Chen:
Demo: A Calibrated, Open-Source Toolkit for MitM Cyberattacks Visualization, Analysis, and Traffic Optimization at Connected Intersections. 223-225 - Hanqing Guo, Dong Li, Ruofeng Liu, Yao Zheng
:
Demo: Disrupting In-Car mmWave Sensing Through IRS Manipulation. 226-228 - Changsheng Sun, Xinke Li, Jin Song Dong:
Ignoring Directionality Leads to Compromised Graph Neural Network Explanations. 229-235 - Mehedi Hasan Raju, Oleg Komogortsev:
Eye Movement Biometrics in Virtual Reality: A Comparison Between VR Headset and High-End Eye-Tracker Collected Dataset. 236-241 - Yuer Yang
, Yifeng Lin
, Siu-Ming Yiu:
Reliable KMDF Instruction Set Generation for User Queries Based on Endogenous Generative LLMs. 242-250 - Kasra Ahmadi, Rouzbeh Behnia, Reza Ebrahimi, Mehran Mozaffari Kermani, Jeremiah Birrell, Jason Pacheco, Attila A. Yavuz:
An Interactive Framework for Implementing Privacy-Preserving Federated Learning: Experiments on Large Language Models. 251-259 - Ziqi Ding, Qian Fu, Junchen Ding, Gelei Deng, Yi Liu, Yuekang Li:
A Rusty Link in the AI Supply Chain: Detecting Evil Configurations in Model Repositories. 260-264 - Adhishree Kathikar, Ben Lazarine, Yang Gao, Ankit Shah, Sagar Samtani:
Generating Secure Artificial Intelligence Model Source Code: A Reinforcement Learning Approach. 265-269 - Zihao Xu, Yi Liu, Gelei Deng, Kailong Wang, Yuekang Li, Ling Shi, Stjepan Picek:
Continuous Embedding Attacks via Clipped Inputs in Jailbreaking Large Language Models. 270-277 - David Jin, Qian Fu, Yuekang Li:
Good News for Script Kiddies? Evaluating Large Language Models for Automated Exploit Generation. 278-282 - Arshiya Khan, Guannan Liu, Xing Gao:
Code Vulnerability Repair with Large Language Model Using Context-Aware Prompt Tuning. 283-287 - Yang Gao, Benjamin Ampel, Sagar Samtani:
Examining the Robustness of Machine Learning-Based Phishing Website Detection: Action-Masked Reinforcement Learning for Automated Red Teaming. 288-293 - Minhong Dong, Liyuan Liu, Qi Guo, Hongpeng Bai, Ruijie Gong, Yude Bai, Wenying He, Ze Wang, Guangquan Xu, Ji Zhang:
LeoDroid: An LLM-Based Few-Shot Multi-Label Detection for Android Malware. 294-306 - Yuhao Wang, Kailai Wang, Yunpeng Jack Zhang:
Analyzing the Spatiotemporal Dynamics and Social Influences on the Transportation Cybersecurity Industry Through a Business Visitor Flow Perspective. 307-313 - Junhao Frank Ran, Yifan Wu, Delaram Pirhayatifard, João Mattos, Arlei Silva:
TrafficPulse: A Road-Sensor Assisted Traffic Tweet Misinformation Detection System. 314-321 - Prashant Shekhar, Bidur Devkota, Dumindu Samaraweera, Laxima Niure Kandel, Manoj Babu:
Do Adversarial Patches Generalize? Attack Transferability Study Across Real-Time Segmentation Models in Autonomous Vehicles. 322-328 - Yujing Zhou, Marc L. Jacquet, Robel Dawit, Skyler Fabre, Dev Sarawat, Faheem Khan, Madison Newell, Yongxin Liu, Dahai Liu, Hongyun Chen, Jian Wang, Huihui Wang:
Explainable Machine Learning for Cyberattack Identification from Traffic Flows. 329-334 - Rajkumar Konka, Rakesh M. Verma
, Shun Cao, Yunpeng Zhang:
An Agent-Based Model for Evaluating Connected and Autonomous Vehicles, Collective Behaviors and Traffic System Performance. 335-345 - Lu Gao, Yongxin Liu, Hongyun Chen, Dahai Liu, Yunpeng Zhang, Jingran Sun:
Exploring Traffic Simulation and Cybersecurity Strategies Using Large Language Models. 346-351 - Rohith Reddy Depa, Yunpeng Zhang, Dianxiang Xu:
Hybrid Edge Intelligence for Real-Time Intrusion Detection in Advanced Traffic Management Systems. 352-354 - Omar Achkar, Shahryar Raza, James McAvoy, Rushikesh Shirsat, Neil Klingensmith, Kyuin Lee:
In-Progress: Exploring Tire Pressure Monitoring Systems (TPMS) for Secure Key Generation for Intra-Vehicular Device Authentication. 355-357 - Sohan Gyawali, Yili Jiang, Jiaqi Huang
:
In-Progress: Augmenting Explainable AI with LLMs to Enhance User Trust in Intelligent Transportation Systems. 358-360 - A K. M. Sazzadul Alam, Xiali Hei, Yunpeng Zhang:
In-Progress: Enhancing Traffic Signal Perception for Connected and Autonomous Vehicles (CAVs) via Multi-Sensor Fusion of Camera, LiDAR, Radar, and SPaT Data. 361-363 - Wesley Duclos, Yujing Zhou, Jian Wang, Yongxin Liu, Huihui Wang:
In-Progress: Reinforcement Learning for Cyberattack Defense in Autonomous Intersection Management Systems. 364-366 - Rohini Poolat Parameswarath, Biplab Sikdar:
Privacy-Preserving Mutual Authentication Protocol for Federated Learning in Intelligent Transportation Systems. 367-369 - Jiamu Zhang, Shaochen Zhong, Hoang Anh Duy Le, Xia Hu:
In-Progress: Structured Pruning in the Wild: Benchmarking Practical Robustness Under Real-World Corruptions. 370-373

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.