Posters > 2026
Artificial Intelligence
- Backdoor Attack on Differentially Private Federated Learning [2OH-MX4]
- Cognizant Deep Fakes (CDF): A Framework for Covert Communication via Neural Compression [IOA-PG0]
- Explainable AI for Document Fraud Detection in Digital Forensics Using Patch-Aggregated SHAP [LHC-6US]
- LLM-Designed Attacks Against Critical Freight Rail Infrastructure [WIX-6HB]
- Membership Privacy Risks of Sharpness Aware Minimization [5TQ-VYD]
- Multi-agent, Multi-protocol IoT Exploitation And Trace Generation [7C0-IUA]
- Toward Reliable Multi-Robot Collaboration via a Symbolically-Guided Decision Transformer [HER-BQK]
Assured Identity and Privacy
- Conditional Encryption with Applications to Secure Personalized Password Typo Correction [A7K-J0A]
- SpectralDNA [GZ5-BCD]
End System Security
- A Cybersecurity Testbed for Connected and Autonomous Vehicle Systems [AW8-21S]
- A Holistic Approach for Improving Safety of Existing C/C++ Programs [KRN-GFI]
- AES-GX: Native High-Throughput Symmetric Encryption on GPUs [71O-MGA]
- Enabling Component-level Memory Safety Verification via Unit Proof Generation [JXL-UBO]
- Forensic Examination of Tencent QQ Mobile Application Features for Evidence Collection on Android and iOS Devices [WQK-GZU]
- HPC-SBOM: Runtime Verification of Software Bill of Materials UsingHardware Performance Counters [NR2-LVQ]
- Temporal Split Learning: A Privacy-Preserving Intrusion Detection Framework for Distributed Medical IoT Networks​ [REV-ZOQ]
- VERA: A Dual-Validated, Behaviorally-Verified Repository of 15,000+ Raw Windows Ransomware Binaries [7KF-WMG]
Human Centric Security
- A Longitudinal Study of Usability in Identity-Based Software Signing [FRZ-S5G]
- CBDRA-IS: Centrality-Based Defense Resource Allocation for Securing Interdependent Systems [QJW-GRP]
- Dynamic Trust Based Access Control for Smart Homes [OYX-2VN]
- PishWife: A Psychometric Research Platform for Adaptive Phishing Simulation and Susceptibility Measurement [4UN-IZK]
Network Security
- Collusion Destabilization in Noisy Whistleblowing MPC [HPE-DPN]
- Quantum-Safe Hybrid Key Exchange [VBR-D0B]
Policy, Law and Management
- Is the US Government Acquisition Framework Ready for Artificial Intelligence? [W2U-T6M]
- Mapping Risks to Policy Mitigations for Enterprise Surveillance [SPI-FTG]
Prevention, Detection and Response
- An Agentic AI Pipeline for Enterprise Alert Correlation [MYO-JHO]
- LAFVT: LLM-Assisted Formal Verification Toolchain [YXE-DNF]
- MIRAGE: Detecting Fake Emergency Electronic Brake Light Attacks in V2X Networks via Event-Gated Behavioral Analysis [TWR-DXN]
- Risk Assessment of UAV Tracking Control against Stealthy Sensor Attacks [QXO-M40]