Ashish Kundu
Orcid: 0000-0003-1499-5558
According to our database1,
Ashish Kundu
authored at least 96 papers
between 2004 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
LLMalMorph: On The Feasibility of Generating Variant Malware using Large-Language-Models.
CoRR, July, 2025
AssistedDS: Benchmarking How External Domain Knowledge Assists LLMs in Automated Data Science.
CoRR, June, 2025
SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks.
CoRR, June, 2025
Apollo: A Posteriori Label-Only Membership Inference Attack Towards Machine Unlearning.
CoRR, June, 2025
CoRR, May, 2025
CoRR, May, 2025
Fingerprinting Implementations of Cryptographic Primitives and Protocols that Use Post-Quantum Algorithms.
CoRR, March, 2025
CoRR, March, 2025
LMN: A Tool for Generating Machine Enforceable Policies from Natural Language Access Control Rules using LLMs.
CoRR, February, 2025
Oblivious and distributed firewall policies for securing firewalls from malicious attacks.
Comput. Secur., 2025
Extraction of Machine Enforceable ABAC Policies from Natural Language Text using LLM Knowledge Distillation.
Proceedings of the 30th ACM Symposium on Access Control Models and Technologies, 2025
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025
Revisiting Concept Drift in Windows Malware Detection: Adaptation to Real Drifted Malware with Minimal Samples.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025
Proceedings of the Data and Applications Security and Privacy XXXIX, 2025
IoTDSCreator: A Framework to Create Labeled Datasets for IoT Intrusion Detection Systems.
Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy, 2025
Harmonizing Differential Privacy Mechanisms for Federated Learning: Boosting Accuracy and Convergence.
Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy, 2025
2024
ARIoTEDef: Adversarially Robust IoT Early Defense System Based on Self-Evolution against Multi-step Attacks.
ACM Trans. Internet Things, August, 2024
On the Vulnerability of Applying Retrieval-Augmented Generation within Knowledge-Intensive Application Domains.
CoRR, 2024
CoRR, 2024
Universally Harmonizing Differential Privacy Mechanisms for Federated Learning: Boosting Accuracy and Convergence.
CoRR, 2024
Improving Malware Detection with Adversarial Domain Adaptation and Control Flow Graphs.
CoRR, 2024
LMO-DP: Optimizing the Randomization Mechanism for Differentially Private Fine-Tuning (Large) Language Models.
CoRR, 2024
Trust and ethical considerations in a multi-modal, explainable AI-driven chatbot tutoring system: The case of collaboratively solving Rubik's Cube.
CoRR, 2024
Proceedings of the 5th IEEE International Conference on Trust, 2024
Proceedings of the 5th IEEE International Conference on Trust, 2024
MetaFL: Privacy-preserving User Authentication in Virtual Reality with Federated Learning.
Proceedings of the 22nd ACM Conference on Embedded Networked Sensor Systems, 2024
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024
RAW: A Robust and Agile Plug-and-Play Watermark Framework for AI-Generated Images with Provable Guarantees.
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Secure Normal Form: Mediation Among Cross Cryptographic Leakages in Encrypted Databases.
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024
Graphene: Towards Data-driven Holistic Security Posture Analysis using AI-generated Attack Graphs.
Proceedings of the 10th IEEE International Conference on Collaboration and Internet Computing, 2024
POSTER: Seccomp profiling with Dynamic Analysis via ChatGPT-assisted Test Code Generation.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
Prometheus: Infrastructure Security Posture Analysis with AI-generated Attack Graphs.
CoRR, 2023
CoRR, 2023
Proceedings of the 5th IEEE International Conference on Trust, 2023
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the International Conference on Machine Learning, 2023
Proceedings of the 9th IEEE International Conference on Collaboration and Internet Computing, 2023
2022
An Infection-Identifying and Self-Evolving System for IoT Early Defense from Multi-Step Attacks.
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the Asian Conference on Machine Learning, 2022
2021
Proceedings of the 3rd IEEE International Conference on Trust, 2021
Similarities and Learnings from Ancient Literature on Blockchain Consensus and Integrity.
Proceedings of the 3rd IEEE International Conference on Trust, 2021
2020
Proceedings of the Second IEEE International Conference on Trust, 2020
Proceedings of the Second IEEE International Conference on Trust, 2020
2019
Proceedings of the World Wide Web Conference, 2019
Proceedings of the First IEEE International Conference on Trust, 2019
Proceedings of the First IEEE International Conference on Trust, 2019
Proceedings of the 2019 IEEE International Congress on Internet of Things, 2019
2018
Efficient and Scalable Integrity Verification of Data and Query Results for Graph Databases.
IEEE Trans. Knowl. Data Eng., 2018
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018
Proceedings of the 21st International Conference on Extending Database Technology, 2018
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018
2017
Security Analytics of Network Flow Data of IoT and Mobile Devices (Work-in-progress).
CoRR, 2017
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017
2016
An Efficient Parallel Implementation of a Light-weight Data Privacy Method for Mobile Cloud Users.
Proceedings of the Seventh International Workshop on Data-Intensive Computing in the Clouds, 2016
Security, Compliance, and Agile Deployment of Personal Identifiable Information Solutions on a Public Cloud.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016
2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014
Proceedings of the IEEE International Conference on Services Computing, SCC 2014, Anchorage, AK, USA, June 27, 2014
2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the 2013 IEEE International Conference on Cloud Engineering, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Workshops Proceedings of the IEEE 28th International Conference on Data Engineering, 2012
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
2011
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011
2010
2009
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009
2008
IEEE Trans. Syst. Man Cybern. Part C, 2008
Inf. Process. Lett., 2008
Efficient Data Authentication in an Environment of Untrusted Third-Party Distributors.
Proceedings of the 24th International Conference on Data Engineering, 2008
2006
Proceedings of the Tenth IEEE International Enterprise Distributed Object Computing Conference (EDOC 2006), 2006
2005
Proceedings of the 14th international conference on World Wide Web, 2005
Proceedings of the Proceedings, 2005
2004
IEEE Pervasive Comput., 2004