IEEE TPS 2025

The 7th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications

Wyndham Grand Pittsburgh Downtown, Nov. 11-14, 2025, Pittsburgh, PA, USA

Co-located with IEEE CIC 2025 and IEEE CogMI 2025

IEEE TPS 2025 Accepted Papers

We are pleased to announce the accepted papers for IEEE TPS 2025. The conference received numerous high-quality submissions across various tracks. All accepted papers will be published in the IEEE Proceedings and oral presented at the conference.


Enabling Privacy-Preserving Model Evaluation in Federated Learning via Fully Homomorphic Encryption

Cem Ata Baykara (University of Tübingen, Germany), Ali Burak Ünal (University of Tübingen, Germany), and Mete Akgün (University of Tübingen, Germany)

HERL: Tiered Federated Learning with Adaptive Homomorphic Encryption Using Reinforcement Learning

Jiaxang Tang (University of Minnesota, USA), Zeshan Fayyaz (University of Waterloo, Canada), Mohammad A. Salahuddin (University of Waterloo, Canada), Raouf Boutaba (University of Waterloo, Canada), Zhi-Li Zhang (University of Minnesota, USA), and Ali Anwar (University of Minnesota, USA)

PPFL-RDSN: Privacy-Preserving Federated Learning-Based Residual Dense Spatial Networks for Encrypted Lossy Image Reconstruction

Peilin He (University of Pittsburgh, USA) and James Joshi (University of Pittsburgh, USA)

One-Shot Secure Aggregation: A Hybrid Cryptographic Protocol for Private Federated Learning in IoT

Imraul Kayes Emmaka (University of Arkansas at Little Rock, USA) and Tran Viet Xuan Phuong (University of Arkansas at Little Rock, USA)

RBBD: A Representation-Based Framework for Edge-Case Backdoor Defense in Federated Learning

Samir Poudel (Middle Tennessee State University, TN), Kritagya Upadhyay (Middle Tennessee State University, TN), and Jiblal Upadhya (Lander University, S.C.)

Enhancing Resilience in Industrial Control Systems: Rapid Attack Detection, Recovery, and Monotonicity Preservation Through STL-GT Online Monitoring

Chidi Agbo (University of Nebraska at Kearney, USA) and Hoda Mehrpouyan (Boise State University, USA)

Robust Physically Realizable Backdoor Attack

Md Jahirul Islam (Kennesaw State University, USA) and Kazi Aminul Islam (Kennesaw State University, USA)

Fidelity-Optimizing Defense Mechanism Against Membership Inference Attacks

Md Faisal Ahmed (George Mason University) and Zhengdao Wang (George Mason University)

NatGVD: Natural Adversarial Example Attack Towards Graph-Based Vulnerability Detection

Avilash Rath (The University of Texas at Dallas), Weiliang Qi (The University of Texas at Dallas), Youpeng Li (The University of Texas at Dallas), and Xinda Wang (The University of Texas at Dallas)

Explainable but Vulnerable: Adversarial Attacks on XAI Explanation in Cybersecurity Applications

Maraz Mia (Tennessee Tech University, USA) and Mir Mehedi Ahsan Pritom (Tennessee Tech University, USA)

Anomaly Detection in Graphs via Topology-Aware Attention Mechanisms

Narges Alipourjeddi (Toronto Metropolitan University, Canada) and Ali Miri (Toronto Metropolitan University, Canada)

It’s About Time!: Exploiting Timing Variance for IoT Device-Type Fingerprinting

Maxwel Bar-on (Colorado State University, USA), Alanood Alqobaisi (Colorado State University, USA), Bruhadeshwar Bezawada (Southern Arkansas University, USA), Indrakshi Ray (Colorado State University, USA), and Indrajit Ray (Colorado State University, USA)

Data Access Control in Large Language Models

Nouha Oualha (Université Paris-Saclay, France) and Christophe Janneteau (Université Paris-Saclay, France)

Clone What You Can’t Steal: Black-Box LLM Replication via Logit Leakage and Distillation

Kanchon Gharami (Embry-Riddle Aeronautical University, USA), Hansaka Aluvihare (Embry-Riddle Aeronautical University, USA), Shafika Showkat Moni (Embry-Riddle Aeronautical University, USA), and Berker Peköz (Embry-Riddle Aeronautical University, USA)

PRvL: Quantifying the Capabilities and Risks of Large Language Models for PII Redaction

Leon Garza (The University of Texas at El Paso, USA), Anantaa Kotal (The University of Texas at El Paso, USA), Aritran Piplai (The University of Texas at El Paso, USA), Lavanya Elluri (Texas A&M University-Central Texas, USA), Prajit Kumar Das (Cisco Systems Inc, USA), and Aman Chadha (Amazon Web Services, USA)

LLMalMorph: On The Feasibility of Generating Variant Malware Using Large-Language-Models

Md Ajwad Akil (Purdue University, USA), Adrian Shuai Li (Purdue University, USA), Imtiaz Karim (The University of Texas at Dallas, USA), Arun Iyengar (Intelligent Data Management and Analytics, LLC, USA), Ashish Kundu (Cisco Research, USA), Vinny Parla (Cisco Systems, Inc, USA), and Elisa Bertino (Purdue University, USA)

CipherBERT: A Systematic Framework for High-Accuracy Encrypted Transformer Inference

Nisarg Bhavsar (Indian Institute of Technology Kharagpur, India) and Zaid Ahmed Khan (Indian Institute of Technology Kharagpur, India)

CoDICE: Roll the DICE for Firmware Attestation

Rakesh Podder (Colorado State University, USA), Jason Simental (Colorado State University, USA), Elmaddin Azizli (Colorado State University, USA), Bharadwaj Mantha (Colorado State University, USA), and Indrajit Ray (Colorado State University, USA)

Limitations of Watermarking AI-Generated Speech Using AudioSeal

Shameer Faziludeen (University College Cork, Ireland), Arun Sankar M. S. (South East Technological University, Ireland), Phillip L. De Leon (University of Colorado Denver, USA), and Utz Roedig (University College Cork, Ireland)

Diffusion Based Face Generation via Image Editing and Image Morphing

Liyue Fan (University of North Carolina at Charlotte, USA) and Joseph Roberson (University of North Carolina at Charlotte, USA)

EDL: Efficient Data-Oblivious Loops

Biniyam Tiruye (University of Michigan, USA), Lauren Biernacki (Lafayette College, USA), and Todd Austin (University of Michigan, USA)

Decoding the Decoders: An Empirical Study of Reverse Engineering Questions on Stack Exchange

Md Rakibul Islam (Lamar University, USA), Md Humaun Kabir (Lamar University, USA), and Anwarul Islam Sifat (Lamar University, USA)

PQC-LEO: An Evaluation Framework for Post-Quantum Cryptographic Algorithms

Callum Turino (Edinburgh Napier University, UK), William J. Buchanan (Edinburgh Napier University, UK), Owen Lo (Edinburgh Napier University, UK), and Christoph Thümmler (6GHI, Germany)

Explainable AI in Data Poisoning Threat Models Across the CIA Triad: A Smart Grid Case Study

Gustavo Sánchez (Karlsruhe Institute of Technology (KIT), Germany), Ghada Elbez (Karlsruhe Institute of Technology (KIT), Germany), and Veit Hagenmeyer (Karlsruhe Institute of Technology (KIT), Germany)

A Privacy-Fidelity Tradeoff Framework in Post-Processed Machine Learning

Md Faisal Ahmed (George Mason University) and Zhengdao Wang (George Mason University)

Learning from Literature: A Retraining-Free Framework for LLM Jailbreak Defense via NLP-Based Adversarial Literature Analysis

Sheikh Samit Muhaimin (University of Notre Dame, USA) and Spyridon Mastorakis (University of Notre Dame, USA)

Images in Motion?: A First Look into Video Leakage in Collaborative Deep Learning

Md Fazle Rasul (Colorado State University, USA), Alanood Alqobaisi (Colorado State University, USA), Bruhadeshwar Bezawada (Southern Arkansas University, USA), and Indrakshi Ray (Colorado State University, USA)

Privacy-Preserving AI-Enabled Decentralized Learning and Employment Records System

Yuqiao Xu (Case Western Reserve University, USA), Mina Namazi (Case Western Reserve University, USA), Sahith Reddy Jalapally (Case Western Reserve University, USA), Osama Zafar (Case Western Reserve University, USA), Youngjin Yoo (The London School of Economics and Political Science, United Kingdom), and Erman Ayday (Case Western Reserve University, USA)

FALCON: Federated Anomaly Learning and COllaborative Network for Secure Autonomous Vehicles

Riadh Ben Chaabene (École de technologie supérieure (ÉTS), Canada), Darine Amayed (École de technologie supérieure (ÉTS), Canada), Fehmi Jaafar (Université du Québec à Chicoutimi (UQAC), Canada), and Mohamed Cheriet (École de technologie supérieure (ÉTS), Canada)

MAVUL: Multi-Agent Vulnerability Detection via Contextual Reasoning and Interactive Refinement

Youpeng Li (University of Texas at Dallas, USA), Kartik Joshi (University of Texas at Dallas, USA), Xinda Wang (University of Texas at Dallas, USA), and Eric Wong (University of Texas at Dallas, USA)

Leveraging Transformer Models and eXplainable Reinforcement Learning Methods for Advanced Intrusion Detection and Response System

Mohammad Ghasemigol (Old Dominion University, USA) and Daniel Takabi (Old Dominion University, USA)

GPS Spoofing Attacks and Pilot Responses Using a Flight Simulator Environment

Mathilde Durieux (École de l’air et de l’espace Chemin St Jean, France), Kayla D. Taylor (Embry-Riddle Aeronautical University, USA), Laxima Niure Kandel (Embry-Riddle Aeronautical University, USA), and Deepti Gupta (Texas A&M University-Central Texas, TX)

VulnDetective: Using LLM Agents to Analyze Common Weaknesses and Identify Smart Contract Vulnerabilities

Thanmai Mandala (University of Texas at Dallas), Cora Zeger (University of Denver), Tessa E. Andersen (Brigham Young University), Gaby G. Dagher (Boise State University), and Jun Zhuang (Boise State University)

XAST: Explainable AST-Transformer for Smart Contract Vulnerability Detection

Harshith Sai Veeraiah (California State University, Sacramento), Syed Badruddoja (California State University, Sacramento), and Ram Dantu (University of North Texas)

Guiding Reinforcement Learning Using Uncertainty-Aware Large Language Models

Maryam Shoaeinaeini (University of Kentucky) and Brent Harrison (University of Kentucky)

Security of Operations on Random Numbers

Tejas Sharma (IIT Bombay, India) and Ashish Kundu (Cisco Research, USA)

Experiences Building Enterprise-Level Privacy-Preserving Federated Learning to Power AI for Science

Zilinghan Li (Argonne National Laboratory; National Center for Supercomputing Applications), Aditya Sinha (Argonne National Laboratory; National Center for Supercomputing Applications; University of Illinois at Urbana-Champaign), Yijiang Li (Argonne National Laboratory), Kyle Chard (Argonne National Laboratory; The University of Chicago), Kibaek Kim (Argonne National Laboratory; The University of Chicago), and Ravi Madduri (Argonne National Laboratory; The University of Chicago)

Detection of Blacktopped Counterfeit ICs Using Surface Texture Analysis

John M. Klamut (University of Pittsburgh, USA), Mai Abdelhakim (University of Pittsburgh, USA), Samuel J. Dickerson (University of Pittsburgh, USA), Ashish Avachat (University of Pittsburgh, USA), Heng Ban (University of Pittsburgh, USA), and Philip Santillo (University of Pittsburgh, USA)

Upgrade or Switch: Do We Need a Next-Gen Trusted Architecture for the Internet of AI Agents?

Ramesh Raskar (Massachusetts Institute of Technology), Pradyumna Chari (Massachusetts Institute of Technology), Mahesh Lambe (Independent Researcher), Robert Lincourt (Dell Technologies), Raghu Bala (Synergetics AI), Aditi Joshi (Independent Researcher), Jared Grogan (Independent Researcher), Abhishek Singh (Massachusetts Institute of Technology), Ayush Chopra (Massachusetts Institute of Technology), Rajesh Ranjan (Independent Researcher), Shailja Gupta (Independent Researcher), Dimitris Strepalis (Flower AI), Maria Gorskikh (Independent Researcher), and Sichao Wang (Cisco Systems)

Challenges in Identifying Illicit Actors in Financial Networks

Amro Aljundi (University of Virginia, USA), Abhijin Adiga (University of Virginia, USA), Philip Potter (University of Virginia, USA), Samarth Swarup (University of Virginia, USA), Anil Vullikanti (University of Virginia, USA), and Madhav Marathe (University of Virginia, USA)

A Multi-Layered Embedded Intrusion Detection Framework for Programmable Logic Controllers

Rishabh Das (Ohio University, USA), Aaron Werth (The University of Alabama in Huntsville, USA), and Tommy Morris (The University of Alabama in Huntsville, USA)

Investigating Physical Consequences of Cyber-Attacks Using a Cyber-Physical Model of a Compressor Station

Andrew S. Hahn (Sandia National Laboratories, NM), Adam J. Beauchaine (Sandia National Laboratories, NM), Lee T. Maccarone (Sandia National Laboratories, NM), Titus A. Gray (Sandia National Laboratories, NM), and Robert S. Lois (Sandia National Laboratories, NM)

TPM-Based Continuous Remote Attestation and Integrity Verification for 5G VNFs on Kubernetes

Al Nahian Bin Emran (George Mason University, USA), Rajendra Upadhyay (George Mason University, USA), Rajendra Paudyal (George Mason University, USA), Lisa Donnan (George Mason University, USA), and Duminda Wijesekera (George Mason University, USA)

Resilience to Dynamic Load Attacks Under AI Demand and Hyperscale Data Centers

Masoud Barati (University of Pittsburgh, USA)

Quantitative Analysis of UAV Intrusion Mitigation for Border Security in 5G with LEO Backhaul Impairments

Rajendra Upadhyay (George Mason University, USA), Al Nahian Bin Emran (George Mason University, USA), Rajendra Paudyal (George Mason University, USA), Lisa Donnan (George Mason University, USA), and Duminda Wijesekera (George Mason University, USA)

Route Choice Prediction Through User Behavior Analysis: Towards Robustness Assessment Under External Perturbations

Gustavo Sánchez (Karlsruhe Institute of Technology, Germany), Fatih Ünal (Karlsruhe Institute of Technology, Germany), and Alexandra Wins (Mercedes-Benz Tech Innovation GmbH, Germany)

Grid-Computer Symbiosis: Towards the Industrial Internet of Things

Danielle McGuire (Duquesne Light Company, PA)

Space-Based Fog Computing Across LEO and MEO Constellations for On-Orbit Hypersonic Detection and Space Domain Awareness

Jackson Artis (Cornell University, USA) and Gregory Falco (Cornell University, USA)

WaveVerif: Acoustic Side-Channel Based Verification of Robotic Workflows

Zeynep Yasemin Erdogan (Newcastle University), Shishir Nagaraja (Newcastle University), Chuadhry Mujeeb Ahmed (Newcastle University), and Ryan Shah (Sapphire)

AegisBlock: A Privacy-Preserving Medical Research Framework Using Blockchain

Calkin Garg (Georgia Institute of Technology), Omar Rios Cruz (California State University, Stanislaus), Tessa E. Andersen (Brigham Young University), Gaby G. Dagher (Boise State University), Donald Winiecki (Boise State University), and Min Long (Boise State University)

Exploring Membership Inference Vulnerabilities in Clinical Large Language Models

Alexander Nemecek (Case Western Reserve University, USA), Zebin Yun (Tel Aviv University, Israel), Zahra Rahmani (Case Western Reserve University, USA), Yaniv Harel (Tel Aviv University, Israel), Vipin Chaudhary (Case Western Reserve University, USA), Mahmood Sharif (Tel Aviv University, Israel), and Erman Ayday (Case Western Reserve University, USA)

Convergence of Operational Technology/Industrial Control Systems/Internet of Medical Things: Internet-Exposed Medical Device Threats

J. Malakai Bailey (Alyn, Inc., USA), William Yurcik (Centers for Medicare & Medicaid Services (CMS), USA), O. Sami Saydjari (Dartmouth College, USA), Rodolfo da Silva Avelino (Insper, Brazil), João Luisi Vieira (Insper, Brazil), Pedro Umbelino (Bitsight Technologies, USA), and Gregory Pluta (University of Illinois at Urbana-Champaign, USA)

Examining The CoVCues Dataset: Supporting COVID Infodemic Research Through A Novel User Assessment Study

Shreetika Poudel (Northern Kentucky University, USA) and Ankur Chattopadhyay (Northern Kentucky University, USA)

Evaluating Security Features in Mobile Health Apps: A Systematic Review

Yuanyuan Cao (University of Pittsburgh, USA), Yi Xu (University of Pittsburgh, USA), and Leming Zhou (University of Pittsburgh, USA)

A High-Assurance Systems Approach to Medical Device Security

Daniel G Cole (University of Pittsburgh, PA) and William W Clark (University of Pittsburgh, PA)

An Unsupervised Domain Adaptation Method to Enhance Diagnostic Model Resilience on Heterogeneous Medical Imaging Data

Zhiwei Gong (University of Pittsburgh, USA), Dooman Arefan (University of Pittsburgh, USA), Wendie A. Berg (University of Pittsburgh, USA), and Shandong Wu (University of Pittsburgh, USA)

Privacy at Scale in Networked Healthcare

M. Amin Rahimian (University of Pittsburgh), Benjamin Panny (University of Pittsburgh), and James B.D. Joshi (University of Pittsburgh)

Architectural Approaches to Fault-Tolerant Distributed Quantum Computing and Their Entanglement Overheads

Nitish Chandra (University of Pittsburgh, USA), Eneet Kaur (Cisco Quantum Lab, USA), and Kaushik Seshadreesan (University of Pittsburgh, USA)

Not All Qubits are Utilized Equally

Jeremie Pope (Pennsylvania State University, USA) and Swaroop Ghosh (Pennsylvania State University, USA)

Quantum Heuristics for Linear Optimization over Large Separable Operators

Ankith Mohan (Virginia Tech, USA), Tobias Haug (Technology Innovation Institute, UAE), Kishor Bharti (Agency for Science, Technology and Research, Singapore), and Jamie Sikora (Virginia Tech, USA)

Towards Quantum-Driven Multimodal Machine Learning: Methods, Challenges, and Future Directions

Debashis Das (Meharry Medical College, USA), Jaclyn Claiborne (Meharry Medical College, USA), Lexus Brinkley-Tapp (Meharry Medical College, USA), Mikel Houston (Meharry Medical College, USA), Pushpita Chatterjee (Meharry Medical College, USA), and Uttam Ghosh (Meharry Medical College, USA)

Quantum-Resistant Networks Using Post-Quantum Cryptography

Xin Jin (University of Pittsburgh, USA), Nitish Kumar Chandra (University of Pittsburgh, USA), Mohadeseh Azari (University of Pittsburgh, USA), Kaushik P. Seshadreesan (University of Pittsburgh, USA), and Junyu Liu (University of Pittsburgh, USA)

Towards Symmetry-Aware Efficient Simulation of Quantum Systems and Beyond

Min Chen (University of Pittsburgh, USA), Minzhao Liu (University of Chicago, USA; Argonne National Laboratory, USA), Changhun Oh (Korea Advanced Institute of Science and Technology, Korea; University of Chicago, USA), Liang Jiang (University of Chicago, USA), Yuri Alexeev (Argonne National Laboratory, USA; NVIDIA Corporation, USA), and Junyu Liu (University of Pittsburgh, USA; University of Chicago, USA)

A Decentralized Framework for Auditing Large Language Model Reasoning

Morris Yu-Chao Huang (University of North Carolina at Chapel Hill, USA), Zhen Tan (Arizona State University, USA), Mohan Zhang (University of North Carolina at Chapel Hill, USA), Pingzhi Li (University of North Carolina at Chapel Hill, USA), Zezhen Ding (The Hong Kong University of Science and Technology, China), Zhuo Zhang (Columbia University, USA), and Tianlong Chen (University of North Carolina at Chapel Hill, USA)

Perspective on AI-Empowered Design of Realistic Quantum Optical Device

Chaohan Cui (University of Maryland, USA), Kailu Zhou (University of Michigan, USA), and Zheshen Zhang (University of Michigan, USA)

Measuring Privacy Literacy on Generative AI: A Pilot Study of Generation Z

Jing Hua (La Roche University, USA) and Wenli Wang (Robert Morris University, USA)

Detecting and Correcting Hallucinations in Paragraph-Level Text with Ensemble-Based Evaluation

Shivangi Tripathi (Texas State University, USA) and Heena Rathore (Texas State University, USA)

Trustworthy LLM-Mediated Communication: Evaluating Information Fidelity in LLM as a Communicator (LAAC) Framework in Multiple Application Domains

Mohammed Musthafa Rafi (Iowa State University, USA), Adarsh Krishnamurthy (Iowa State University, USA), and Aditya Balu (Iowa State University, USA)

Topic Modeling Analysis of Ethical Framework Separability in LLM-Generated Moral Justifications

Bishal Thapa (Texas State University, TX) and Heena Rathore (Texas State University, TX)

The Mediating Role of Explainable AI on Phishing Susceptibility

Masialeti Masialeti (Robert Morris University, USA) and Wenli Wang (Robert Morris University, USA)

Machine Learning-Based Frameworks for Malware Detection with SHAP Explainability

Afia Darko Asante (The University of Akron, USA), Sumaila Iddrisu (The University of Akron, USA), and Nadhem Ebrahim (The University of Akron, USA)

RegEase: Simplifying Insurance Compliance

Samhitha Poreddy (Verisk Analytics)

Backdoor-Aware Adaptive Aggregation for Wireless Ad Hoc Federated Learning

Atsuya Muramatsu (The University of Tokyo, Japan) and Hideya Ochiai (The University of Tokyo, Japan)

Certified Attribute Privacy in GAN Latent Space

Jamil Arbas (Toronto Metropolitan University, Canada), Shadan Ghaffaripour (Toronto Metropolitan University, Canada), and Ali Miri (Toronto Metropolitan University, Canada)

Voice Design and Trust in Automated Vehicles: Findings and a Research Agenda

Jiongyu Chen (Arizona State University, USA) and Qiaoning Zhang (Arizona State University, USA)

The Role of Perceived Social Identity in Human-AI Collaboration

Jessica K. Barfield (University of Kentucky, USA)

Quantifying Trust in Human-AI Teams: A Statistical Framework for Task-Based Calibration of AI Autonomy in Compliance Auditing

Priya Mohan (Independent Researcher, USA), Yugandhar Reddy Suthari (University of the Cumberlands, USA), and Sahil Dhir (Independent Researcher, USA)

Uncertainty Quantification for Deep Learning-Based Medical Imaging Classification Model Evaluation and Individualized Risk Estimation

Jiren Li (University of Pittsburgh, USA), Dooman Arefan (University of Pittsburgh, USA), and Shandong Wu (University of Pittsburgh, USA)

Multimodal Deep Fusion Architecture for Human Activity and Fall Detection in Elderly Care

Debashis Das (Meharry Medical College, Nashville, TN, USA), Laure Bien Aime (Meharry Medical College, Nashville, TN, USA), Pushpita Chatterjee (Meharry Medical College, Nashville, TN, USA), and Uttam Ghosh (Meharry Medical College, Nashville, TN, USA)