Ashish Kundu

Orcid: 0000-0003-1499-5558

According to our database1, Ashish Kundu authored at least 96 papers between 2004 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
LLMalMorph: On The Feasibility of Generating Variant Malware using Large-Language-Models.
CoRR, July, 2025

AssistedDS: Benchmarking How External Domain Knowledge Assists LLMs in Automated Data Science.
CoRR, June, 2025

SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks.
CoRR, June, 2025

Apollo: A Posteriori Label-Only Membership Inference Attack Towards Machine Unlearning.
CoRR, June, 2025

How Good LLM-Generated Password Policies Are?
CoRR, June, 2025

VulBinLLM: LLM-powered Vulnerability Detection for Stripped Binaries.
CoRR, May, 2025

An Outlook on the Opportunities and Challenges of Multi-Agent AI Systems.
CoRR, May, 2025

Fingerprinting Implementations of Cryptographic Primitives and Protocols that Use Post-Quantum Algorithms.
CoRR, March, 2025

A Generative Caching System for Large Language Models.
CoRR, March, 2025

Malware Detection at the Edge with Lightweight LLMs: A Performance Evaluation.
CoRR, March, 2025

LMN: A Tool for Generating Machine Enforceable Policies from Natural Language Access Control Rules using LLMs.
CoRR, February, 2025

Security of Operations on Random Numbers: A Review.
IACR Cryptol. ePrint Arch., 2025

Oblivious and distributed firewall policies for securing firewalls from malicious attacks.
Comput. Secur., 2025

Extraction of Machine Enforceable ABAC Policies from Natural Language Text using LLM Knowledge Distillation.
Proceedings of the 30th ACM Symposium on Access Control Models and Technologies, 2025

Translating C To Rust: Lessons from a User Study.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025

Revisiting Concept Drift in Windows Malware Detection: Adaptation to Real Drifted Malware with Minimal Samples.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025

Automated Privacy Policy Analysis Using Large Language Models.
Proceedings of the Data and Applications Security and Privacy XXXIX, 2025

IoTDSCreator: A Framework to Create Labeled Datasets for IoT Intrusion Detection Systems.
Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy, 2025

Harmonizing Differential Privacy Mechanisms for Federated Learning: Boosting Accuracy and Convergence.
Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy, 2025

2024
ARIoTEDef: Adversarially Robust IoT Early Defense System Based on Self-Evolution against Multi-step Attacks.
ACM Trans. Internet Things, August, 2024

Evaluating Synthetic Command Attacks on Smart Voice Assistants.
CoRR, 2024

On the Vulnerability of Applying Retrieval-Augmented Generation within Knowledge-Intensive Application Domains.
CoRR, 2024

Using Retriever Augmented Large Language Models for Attack Graph Generation.
CoRR, 2024

Universally Harmonizing Differential Privacy Mechanisms for Federated Learning: Boosting Accuracy and Convergence.
CoRR, 2024

Improving Malware Detection with Adversarial Domain Adaptation and Control Flow Graphs.
CoRR, 2024

Code Hallucination.
CoRR, 2024

LMO-DP: Optimizing the Randomization Mechanism for Differentially Private Fine-Tuning (Large) Language Models.
CoRR, 2024

Transfer Learning for Security: Challenges and Future Directions.
CoRR, 2024

Trust and ethical considerations in a multi-modal, explainable AI-driven chatbot tutoring system: The case of collaboratively solving Rubik's Cube.
CoRR, 2024

Large Language Models to Enhance Malware Detection in Edge Computing.
Proceedings of the 5th IEEE International Conference on Trust, 2024

Automated Consistency Analysis of LLMs.
Proceedings of the 5th IEEE International Conference on Trust, 2024

MetaFL: Privacy-preserving User Authentication in Virtual Reality with Federated Learning.
Proceedings of the 22nd ACM Conference on Embedded Networked Sensor Systems, 2024

AI/ML, Graphs and Access Control: Towards Holistic Identity and Access Management.
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024

RAW: A Robust and Agile Plug-and-Play Watermark Framework for AI-Generated Images with Provable Guarantees.
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024

Demystifying Poisoning Backdoor Attacks from a Statistical Perspective.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

Secure Normal Form: Mediation Among Cross Cryptographic Leakages in Encrypted Databases.
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024

Poster: Benchmarking of Code Generative LLMs.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024

Poster: CrystalBall - Attack Graphs Using Large Language Models and RAGs.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024

Poster: Secure Data Sharing with Decentralised Data Ring Fencing.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024

Graphene: Towards Data-driven Holistic Security Posture Analysis using AI-generated Attack Graphs.
Proceedings of the 10th IEEE International Conference on Collaboration and Internet Computing, 2024

POSTER: Seccomp profiling with Dynamic Analysis via ChatGPT-assisted Test Code Generation.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
Prometheus: Infrastructure Security Posture Analysis with AI-generated Attack Graphs.
CoRR, 2023

Evaluating Chatbots to Promote Users' Trust - Practices and Open Problems.
CoRR, 2023

Large Language Models and Computer Security.
Proceedings of the 5th IEEE International Conference on Trust, 2023

On the Dual Nature of Necessity in Use of Rust Unsafe Code.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

A Unified Detection Framework for Inference-Stage Backdoor Defenses.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Understanding Backdoor Attacks through the Adaptability Hypothesis.
Proceedings of the International Conference on Machine Learning, 2023

A Pro-Active Defense Framework for IoT Systems.
Proceedings of the 9th IEEE International Conference on Collaboration and Internet Computing, 2023

2022
Edge Security: Challenges and Issues.
CoRR, 2022

An Infection-Identifying and Self-Evolving System for IoT Early Defense from Multi-Step Attacks.
Proceedings of the Computer Security - ESORICS 2022, 2022

BeautifAI - Personalised Occasion-based Makeup Recommendation.
Proceedings of the Asian Conference on Machine Learning, 2022

2021
AI-Driven Selective Protection of Multimedia Data.
Proceedings of the 3rd IEEE International Conference on Trust, 2021

Similarities and Learnings from Ancient Literature on Blockchain Consensus and Integrity.
Proceedings of the 3rd IEEE International Conference on Trust, 2021

2020
StackVault: Protection from Untrusted Functions.
Proceedings of the Second IEEE International Conference on Trust, 2020

Energy Attacks on Mobile Devices.
Proceedings of the Second IEEE International Conference on Trust, 2020

2019
Data Transparency with Blockchain and AI Ethics.
ACM J. Data Inf. Qual., 2019

Uncheatable Machine Learning Inference.
CoRR, 2019

PrivIdEx: Privacy Preserving and Secure Exchange of Digital Identity Assets.
Proceedings of the World Wide Web Conference, 2019

Towards Deep Federated Defenses Against Malware in Cloud Ecosystems.
Proceedings of the First IEEE International Conference on Trust, 2019

Malware Containment in Cloud.
Proceedings of the First IEEE International Conference on Trust, 2019

How Secure Is Your IoT Network?
Proceedings of the 2019 IEEE International Congress on Internet of Things, 2019

2018
Efficient and Scalable Integrity Verification of Data and Query Results for Graph Databases.
IEEE Trans. Knowl. Data Eng., 2018

Healthcare Informatics and Privacy.
IEEE Internet Comput., 2018

A Trusted Healthcare Data Analytics Cloud Platform.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

Research Directions in Blockchain Data Management and Analytics.
Proceedings of the 21st International Conference on Extending Database Technology, 2018

Collaborative and Accountable Hardware Governance Using Blockchain.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

2017
Principle of Need-to-Act.
CoRR, 2017

Security Analytics of Network Flow Data of IoT and Mobile Devices (Work-in-progress).
CoRR, 2017

Risk-Based Packet Routing for Privacy and Compliance-Preserving SDN.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

Compliance-Aware Provisioning of Containers on Cloud.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
Managing sensitive applications in the public cloud.
IBM J. Res. Dev., 2016

An Efficient Parallel Implementation of a Light-weight Data Privacy Method for Mobile Cloud Users.
Proceedings of the Seventh International Workshop on Data-Intensive Computing in the Clouds, 2016

Security, Compliance, and Agile Deployment of Personal Identifiable Information Solutions on a Public Cloud.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2014
Towards a Systematic Study of the Covert Channel Attacks in Smartphones.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Service Usage Metering in Hybrid Cloud Environments.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014

Security of graph data: hashing schemes and definitions.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

Use-Case Centric Dashboard for Cloud Solutions.
Proceedings of the IEEE International Conference on Services Computing, SCC 2014, Anchorage, AK, USA, June 27, 2014

2013
Privacy-preserving authentication of trees and graphs.
Int. J. Inf. Sec., 2013

Towards Authenticated Objects.
Proceedings of the Network and System Security - 7th International Conference, 2013

Network-Level Access Control Management for the Cloud.
Proceedings of the 2013 IEEE International Conference on Cloud Engineering, 2013

2012
On Hashing Graphs.
IACR Cryptol. ePrint Arch., 2012

Efficient Leakage-free Authentication of Trees, Graphs and Forests.
IACR Cryptol. ePrint Arch., 2012

Authentication of Data on Devices.
Proceedings of the Workshops Proceedings of the IEEE 28th International Conference on Data Engineering, 2012

Leakage-free redactable signatures.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

2011
A New Class of Buffer Overflow Attacks.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

2010
Data in the cloud: Authentication without leaking
PhD thesis, 2010

How to authenticate graphs without leaking.
Proceedings of the EDBT 2010, 2010

2009
SN2K Attacks and Honest Services.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

2008
A New Model for Secure Dissemination of XML Content.
IEEE Trans. Syst. Man Cybern. Part C, 2008

Structural signatures for tree data structures.
Proc. VLDB Endow., 2008

A tree-covering problem arising in integrity of tree-structured data.
Inf. Process. Lett., 2008

Efficient Data Authentication in an Environment of Untrusted Third-Party Distributors.
Proceedings of the 24th International Conference on Data Engineering, 2008

2006
Secure Dissemination of XML Content Using Structure-based Routing.
Proceedings of the Tenth IEEE International Enterprise Distributed Object Computing Conference (EDOC 2006), 2006

2005
A service creation environment based on end to end composition of Web services.
Proceedings of the 14th international conference on World Wide Web, 2005

Building Applications Using End to End Composition of Web Services.
Proceedings of the Proceedings, 2005

2004
An Authoring Technology for Multidevice Web Applications.
IEEE Pervasive Comput., 2004


  Loading...