🏠홈📊트렌드🏆논문👤마이
🎓
CS-Pedia
TrendsBest Papers
CS Conference Hub

Deadlines, Rankings
& Best Papers — all in one.

Acceptance rates · Best papers · Conference deadlines for CS researchers

← 학회 목록으로

CCS

SecurityD-5

ACM Conference on Computer and Communications Security

📍 The Hague, The Netherlands · 2026-11-15 ~ 2026-11-19

공식 웹사이트DBLP정보 오류 신고
채택률19.5%(2024, 249/1,280)
키워드PrivacyEfficientAdversarialVulnerabilityDifferential Privacy

기관 인정 현황?

BK21
4점
KIISE
최우수
KAIST
최우수
SNU
✓
POST
최우수

데드라인

2026 (first)
📍 The Hague, The Netherlands
📋 Abstract: 2026-01-07
📝 Paper: 2026-01-14
📬 Notification: 2026-04-09
📅 학회: 2026-11-15 ~ 2026-11-19
2026 (second)
📍 The Hague, The Netherlands
📋 Abstract: 2026-04-22
📝 Paper: 2026-04-29
📬 Notification: 2026-07-17
📅 학회: 2026-11-15 ~ 2026-11-19

데드라인은 변경될 수 있습니다. 제출 전 공식 웹사이트에서 최종 일정을 확인하세요.

Acceptance Rate?

연도제출채택채택률
202297121822.5%
20231,22223419.1%
20241,28024919.5%
20201,19812110.1%
202187919622.3%

Research Trend?

Best Papers

🏆 2025Distinguished Paper Award
A Decade-long Landscape of Advanced Persistent Threats: Longitudinal Analysis and Global Trends
Doowon Kim et al.
APTThreat Intelligence
🏆 2025Distinguished Paper Award
Adversarial Observations in Weather Forecasting
Erik Imgrund, Thorsten Eisenhofer, Konrad Rieck
Adversarial MLAI Security
🏆 2025Distinguished Paper Award
Harnessing Vital Sign Vibration Harmonics for Effortless and Inbuilt XR User Authentication
Yingying Chen et al.
AuthenticationXRBiometrics
🏆 2025Distinguished Paper Award
Leaky Apps: Large-scale Analysis of Secrets Distributed in Android and iOS Apps
David Schmidt, Sebastian Schrittwieser, Edgar Weippl
Mobile SecurityPrivacy
🏆 2025Distinguished Paper Award
On the Security of SSH Client Signatures
Fabian Bäumer, Marcus Brinkmann, Maximilian Radoy, Jörg Schwenk, Juraj Somorovsky
SSHCryptography
🏆 2024Distinguished Paper Award
Cross-silo Federated Learning with Record-level Personalized Differential Privacy
Liu, Lou, Xiong, Liu, Meng
Federated LearningPrivacy
🏆 2024Distinguished Paper Award
Organic or Diffused: Can We Distinguish Human Art from AI-generated Images?
Ha, Passananti, Bhaskar, Shan, Southen, Zheng, Zhao
DiffusionDetection
🏆 2024Distinguished Paper Award
QueryCheetah: Fast Automated Discovery of Attribute Inference Attacks Against Query-Based Systems
Stevanoski, Cretu, de Montjoye
PrivacyInference Attack
🏆 2024Distinguished Paper Award
ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries
Xie, Zhang, Jiang, Xu, Tan, Zhang
LLMBinary Analysis
🏆 2024Distinguished Paper Award
The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC
Heftrig, Schulmann, Vogel, Waidner
DNSDoS
🏆 2023Distinguished Paper Award
Alert Alchemy: SOC Workflows and Decisions in the Management of NIDS Rules
Vermeer et al.
Network SecuritySOC
🏆 2023Distinguished Paper Award
FutORAMa: A Concretely Efficient Hierarchical Oblivious RAM
Gilad Asharov, Ilan Komargodski, Elaine Shi
ORAMCryptography
🏆 2023Distinguished Paper Award
HE3DB: An Efficient and Elastic Encrypted Database Via Arithmetic-And-Logic Fully Homomorphic Encryption
Bian et al.
Homomorphic EncryptionDatabase
🏆 2023Distinguished Paper Award
Large Language Models for Code: Security Hardening and Adversarial Testing
Jingxuan He, Martin Vechev
LLMSecurityCode
🏆 2023Distinguished Paper Award
Security Verification of Low-Trust Architectures
Qinhan Tan, Zhibo Liu, Siqi Ma, Elisa Bertino, Kim Laine, Kanav Gupta, Nitin Agrawal, Shivam Bhasin, Tianwei Zhang
Security VerificationArchitecture
🏆 2023Distinguished Paper Award
Stealing the Decoding Algorithms of Language Models
Ali Naseh, Kalpesh Krishna, Mohit Iyyer, Amir Houmansadr
LLMPrivacyAttacks
🏆 2023Distinguished Paper Award
Uncle Maker: (Time)Stamping Out The Competition in Ethereum
Aviv Yaish, Gilad Stern, Aviv Zohar
BlockchainEthereum
🏆 2022Distinguished Paper Award
Proving UNSAT in Zero Knowledge
Luo, Antonopoulos, Harris, Piskac, Tromer, Wang
Zero-KnowledgeFormal Verification
🏆 2022Distinguished Paper Award
Victory by KO: Attacking OpenPGP Using Key Overwriting
Paterson, Bruseghini, Huigens
CryptographyPGP
🏆 2022Distinguished Paper Award
Zapper: Smart Contracts with Data and Identity Privacy
Steffen, Bichsel, Vechev
Smart ContractPrivacy
🏆 2021Best Paper Award
XSinator.com: From a Formal Model to the Automatic Evaluation of Cross-Site Leaks in Web Browsers
Lukas Knittel, Christian Mainka, Marcus Niemietz, Dominik Trevor Noss, Jorg Schwenk
web securitycross-site leaksbrowsers

CS-Pedia — 한국 CS 연구자를 위한 학회 통합 플랫폼

데이터 출처: DBLP (CC0), OpenAlex (CC0), Semantic Scholar, aideadlin.es (MIT), 한국연구재단, 한국정보과학회, jeffhuang.com

제출 전 데드라인·학회 일정은 공식 웹사이트에서 반드시 확인하세요.

소개·개인정보 처리방침·이용약관·문의