Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for June 2025

Total of 731 entries : 1-25 ... 376-400 401-425 426-450 451-475 476-500 501-525 526-550 ... 726-731
Showing up to 25 entries per page: fewer | more | all
[451] arXiv:2506.19635 [pdf, html, other]
Title: On the efficacy of old features for the detection of new bots
Rocco De Nicola, Marinella Petrocchi, Manuel Pratelli
Comments: pre-print version
Journal-ref: Information Processing & Management, Volume 58, Issue 6, November 2021, 102685
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Social and Information Networks (cs.SI)
[452] arXiv:2506.19676 [pdf, html, other]
Title: A Survey of LLM-Driven AI Agent Communication: Protocols, Security Risks, and Defense Countermeasures
Dezhang Kong, Shi Lin, Zhenhua Xu, Zhebo Wang, Minghao Li, Yufeng Li, Yilun Zhang, Hujin Peng, Zeyang Sha, Yuyuan Li, Changting Lin, Xun Wang, Xuan Liu, Ningyu Zhang, Chaochao Chen, Muhammad Khurram Khan, Meng Han
Comments: 41 pages, 13 figures, submitted to IEEE COMST
Subjects: Cryptography and Security (cs.CR)
[453] arXiv:2506.19802 [pdf, html, other]
Title: KnowML: Improving Generalization of ML-NIDS with Attack Knowledge Graphs
Xin Fan Guo, Albert Merono Penuela, Sergio Maffeis, Fabio Pierazzi
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[454] arXiv:2506.19836 [pdf, html, other]
Title: Machine Learning with Privacy for Protected Attributes
Saeed Mahloujifar, Chuan Guo, G. Edward Suh, Kamalika Chaudhuri
Journal-ref: 2025 IEEE Symposium on Security and Privacy (SP)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[455] arXiv:2506.19870 [pdf, other]
Title: Secure Energy Transactions Using Blockchain Leveraging AI for Fraud Detection and Energy Market Stability
Md Asif Ul Hoq Khan, MD Zahedul Islam, Istiaq Ahmed, Md Masud Karim Rabbi, Farhana Rahman Anonna, MD Abdul Fahim Zeeshan, Mehedi Hasan Ridoy, Bivash Ranjan Chowdhury, Md Nazmul Shakir Rabbi, GM Alamin Sadnan
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[456] arXiv:2506.19871 [pdf, html, other]
Title: An Attack Method for Medical Insurance Claim Fraud Detection based on Generative Adversarial Network
Yining Pang, Chenghan Li
Comments: arXiv admin note: text overlap with arXiv:2405.12076 by other authors
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[457] arXiv:2506.19874 [pdf, html, other]
Title: Towards Provable (In)Secure Model Weight Release Schemes
Xin Yang, Bintao Tang, Yuhao Wang, Zimo Ji, Terry Jingchen Zhang, Wenyuan Jiang
Comments: 8 pages, 2 figures; author name typos and institutions corrected
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[458] arXiv:2506.19877 [pdf, html, other]
Title: Robust Anomaly Detection in Network Traffic: Evaluating Machine Learning Models on CICIDS2017
Zhaoyang Xu, Yunbo Liu
Comments: submitted to IEEE CNS 2025
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[459] arXiv:2506.19881 [pdf, html, other]
Title: Blameless Users in a Clean Room: Defining Copyright Protection for Generative Models
Aloni Cohen
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Machine Learning (cs.LG)
[460] arXiv:2506.19886 [pdf, html, other]
Title: Diffusion-based Task-oriented Semantic Communications with Model Inversion Attack
Xuesong Wang, Mo Li, Xingyan Shi, Zhaoqian Liu, Shenghao Yang
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (cs.LG)
[461] arXiv:2506.19889 [pdf, html, other]
Title: Retrieval-Confused Generation is a Good Defender for Privacy Violation Attack of Large Language Models
Wanli Peng, Xin Chen, Hang Fu, XinYu He, Xue Yiming, Juan Wen
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[462] arXiv:2506.19892 [pdf, html, other]
Title: RepuNet: A Reputation System for Mitigating Malicious Clients in DFL
Isaac Marroqui Penalva, Enrique Tomás Martínez Beltrán, Manuel Gil Pérez, Alberto Huertas Celdrán
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG); Performance (cs.PF)
[463] arXiv:2506.19899 [pdf, html, other]
Title: Anti-Phishing Training (Still) Does Not Work: A Large-Scale Reproduction of Phishing Training Inefficacy Grounded in the NIST Phish Scale
Andrew T. Rozema, James C. Davis
Comments: 22 pages, 9 figures, 2 tables, 2 appendices. Empirical study with N=12,511 participants at a financial technology firm. Reproduction study validating NIST Phish Scale and evaluating phishing training effectiveness
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[464] arXiv:2506.19934 [pdf, other]
Title: A Hybrid Intrusion Detection System with a New Approach to Protect the Cybersecurity of Cloud Computing
Maryam Mahdi Al-Husseini
Comments: 1. Acknowledgment for: Supervisor: Prof. Dr. Alireza Rouhi Advisor: Prof. Dr. Einollah Pira 2. Thesis of MSc. degree for Azarbaijan Shahid Madani University Faculty of Information Technology and Computer Engineering 3. Number of pages: 103 4. Number of Figures: 66
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[465] arXiv:2506.19943 [pdf, html, other]
Title: Quantum-Resistant Domain Name System: A Comprehensive System-Level Study
Juyoul Lee, Sanzida Hoque, Abdullah Aydeger, Engin Zeydan
Comments: Manuscript submitted to ACM, 29 pages, 8 Figures, 15 Tables
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Performance (cs.PF)
[466] arXiv:2506.20000 [pdf, html, other]
Title: Can One Safety Loop Guard Them All? Agentic Guard Rails for Federated Computing
Narasimha Raghavan Veeraragavan, Jan Franz Nygård
Comments: Accepted at ICML 2025 Workshop on Collaborative and Federated Agentic Workflows (CFAgentic@ICML'25)
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[467] arXiv:2506.20082 [pdf, html, other]
Title: Attack Smarter: Attention-Driven Fine-Grained Webpage Fingerprinting Attacks
Yali Yuan, Weiyi Zou, Guang Cheng
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[468] arXiv:2506.20101 [pdf, html, other]
Title: Secure Multi-Key Homomorphic Encryption with Application to Privacy-Preserving Federated Learning
Jiahui Wu, Tiecheng Sun, Fucai Luo, Haiyan Wang, Weizhe Zhang
Subjects: Cryptography and Security (cs.CR)
[469] arXiv:2506.20102 [pdf, other]
Title: Autonomous Cyber Resilience via a Co-Evolutionary Arms Race within a Fortified Digital Twin Sandbox
Malikussaid, Sutiyo
Comments: 17 pages, 2 figures, 4 equations, 2 algorithms, 4 tables, to be published in ISPACS Conference 2025, unabridged version
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Systems and Control (eess.SY)
[470] arXiv:2506.20109 [pdf, html, other]
Title: Evaluating Disassembly Errors With Only Binaries
Lambang Akbar Wijayadi, Yuancheng Jiang, Roland H.C. Yap, Zhenkai Liang, Zhuohao Liu
Comments: To appear in ACM ASIA Conference on Computer and Communications Security (ASIACCS), 2025
Subjects: Cryptography and Security (cs.CR)
[471] arXiv:2506.20170 [pdf, html, other]
Title: JsDeObsBench: Measuring and Benchmarking LLMs for JavaScript Deobfuscation
Guoqiang Chen, Xin Jin, Zhiqiang Lin
Comments: Accepted by ACM CCS 2025
Subjects: Cryptography and Security (cs.CR)
[472] arXiv:2506.20228 [pdf, other]
Title: Measuring Modern Phishing Tactics: A Quantitative Study of Body Obfuscation Prevalence, Co-occurrence, and Filter Impact
Antony Dalmiere (LAAS), Zheng Zhou (LAAS), Guillaume Auriol (LAAS-TRUST, INSA Toulouse), Vincent Nicomette (LAAS-TSF, LAAS-TRUST), Pascal Marchand (LERASS, IUT Paul Sabatier)
Subjects: Cryptography and Security (cs.CR)
[473] arXiv:2506.20234 [pdf, html, other]
Title: Communication-Efficient Publication of Sparse Vectors under Differential Privacy
Quentin Hillebrand, Vorapong Suppakitpaisarn, Tetsuo Shibuya
Subjects: Cryptography and Security (cs.CR)
[474] arXiv:2506.20290 [pdf, html, other]
Title: Don't Hash Me Like That: Exposing and Mitigating Hash-Induced Unfairness in Local Differential Privacy
Berkay Kemal Balioglu, Alireza Khodaie, Mehmet Emre Gursoy
Subjects: Cryptography and Security (cs.CR)
[475] arXiv:2506.20415 [pdf, html, other]
Title: SV-LLM: An Agentic Approach for SoC Security Verification using Large Language Models
Dipayan Saha, Shams Tarek, Hasan Al Shaikh, Khan Thamid Hasan, Pavan Sai Nalluri, Md. Ajoad Hasan, Nashmin Alam, Jingbo Zhou, Sujan Kumar Saha, Mark Tehranipoor, Farimah Farahmandi
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Multiagent Systems (cs.MA)
Total of 731 entries : 1-25 ... 376-400 401-425 426-450 451-475 476-500 501-525 526-550 ... 726-731
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack