| Home | Registration | Program | Directions |
| Time | Type | Title & Author(s) |
|---|---|---|
| 14:00–14:30 | Keynote | Data-Centric Evaluation of Large Code Models By: Qiang Hu, Tianjin University |
| 14:30–14:45 | Paper S39205 | RAG Security and Privacy: Formalizing the Threat Model and Attack Surface Atousa Arzanipour, Rouzbeh Behnia, Reza Ebrahimi, Kaushik Dutta |
| 14:45–15:00 | Paper S39204 | Security Charter Effectiveness in LLM Code Generation Shivani Shukla, Himanshu Joshi |
| 15:00–15:30 | Keynote | Toward Intelligent and Automated Binary Security Analysis with LLMs By: Yaowen Zheng, Chinese Academy of Sciences |
| 15:30–16:00 | Break | |
| 16:00–16:30 | Keynote | ML for Cellular Network Security: Challenges, Tools, and Opportunities By: Imtiaz Karim, UT Dallas |
| 16:30–16:45 | Paper S39203 | Multi-Speaker Conversational Audio Deepfake: Taxonomy, Dataset and Pilot Study Alabi Ahmed, Vandana Janeja, Sanjay Purushotham |
| 16:45–17:00 | Paper S39207 | Reliable Audio Deepfake Detection via Quantum‑Kernel SVMs Lisan Al Amin, Vandana Janeja |
| 17:00–17:15 | Paper S39202 | Class-Aware Hierarchical Feature Clustering for Ransomware Detection Busra Caliskan |
| 17:15–17:30 | Paper S39201 | Data-driven IDS Rule Generation for Malicious Traffic Mohammad Akidul Hoque, Anuradha Choudhury, Jaime Acosta, M. Shahriar Hossain, Monika Akbar |