Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for September 2025

Total of 255 entries : 1-50 51-100 101-150 151-200 ... 251-255
Showing up to 50 entries per page: fewer | more | all
[1] arXiv:2509.00005 [pdf, html, other]
Title: Per-sender neural network classifiers for email authorship validation
Rohit Dube
Comments: 11 pages, 5 figures, 8 tables
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Applications (stat.AP)
[2] arXiv:2509.00006 [pdf, other]
Title: Case Studies: Effective Approaches for Navigating Cross-Border Cloud Data Transfers Amid U.S. Government Privacy and Safety Concerns
Motunrayo Adebayo
Comments: Privacy, Security
Journal-ref: European Journal of Applied Sciences Vol. 12 No. 06 (2024)
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[3] arXiv:2509.00043 [pdf, html, other]
Title: Keystroke Detection by Exploiting Unintended RF Emission from Repaired USB Keyboards
Md Faizul Bari, Yi Xie, Meghna Roy Choudhury, Shreyas Sen
Comments: This journal version is an extended version of a previously published conference paper which can be found here: this https URL
Subjects: Cryptography and Security (cs.CR)
[4] arXiv:2509.00059 [pdf, other]
Title: Cryptographic Challenges: Masking Sensitive Data in Cyber Crimes through ASCII Art
Andres Alejandre, Kassandra Delfin, Victor Castano
Comments: 11 pages, 4 figures
Subjects: Cryptography and Security (cs.CR)
[5] arXiv:2509.00081 [pdf, html, other]
Title: Enabling Transparent Cyber Threat Intelligence Combining Large Language Models and Domain Ontologies
Luca Cotti, Anisa Rula, Devis Bianchini, Federico Cerutti
Comments: 14 pages, 3 figures, 6 tables, accepted at XAI-KRKG@ECAI25: First International ECAI Workshop on eXplainable AI, Knowledge Representation and Knowledge Graphs, October 25-30, 2025, Bologna, Italy
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[6] arXiv:2509.00085 [pdf, html, other]
Title: Private, Verifiable, and Auditable AI Systems
Tobin South
Comments: PhD thesis
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY)
[7] arXiv:2509.00088 [pdf, html, other]
Title: AEGIS : Automated Co-Evolutionary Framework for Guarding Prompt Injections Schema
Ting-Chun Liu, Ching-Yu Hsu, Kuan-Yi Lee, Chi-An Fu, Hung-yi Lee
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[8] arXiv:2509.00104 [pdf, html, other]
Title: Enhanced Rényi Entropy-Based Post-Quantum Key Agreement with Provable Security and Information-Theoretic Guarantees
Ruopengyu Xu, Chenglian Liu
Comments: 11 pages, 3 tables
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Quantum Physics (quant-ph)
[9] arXiv:2509.00124 [pdf, html, other]
Title: A Whole New World: Creating a Parallel-Poisoned Web Only AI-Agents Can See
Shaked Zychlinski
Comments: 10 pages, 1 figure
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY)
[10] arXiv:2509.00266 [pdf, html, other]
Title: A Systematic Approach to Estimate the Security Posture of a Cyber Infrastructure: A Technical Report
Qishen Sam Liang
Comments: 11 pages, 5 figures, technical report
Subjects: Cryptography and Security (cs.CR)
[11] arXiv:2509.00300 [pdf, html, other]
Title: ShadowScope: GPU Monitoring and Validation via Composable Side Channel Signals
Ghadeer Almusaddar, Yicheng Zhang, Saber Ganjisaffar, Barry Williams, Yu David Liu, Dmitry Ponomarev, Nael Abu-Ghazaleh
Subjects: Cryptography and Security (cs.CR)
[12] arXiv:2509.00437 [pdf, html, other]
Title: A Hybrid AI-based and Rule-based Approach to DICOM De-identification: A Solution for the MIDI-B Challenge
Hamideh Haghiri, Rajesh Baidya, Stefan Dvoretskii, Klaus H. Maier-Hein, Marco Nolden
Subjects: Cryptography and Security (cs.CR)
[13] arXiv:2509.00476 [pdf, html, other]
Title: Cross-Domain Malware Detection via Probability-Level Fusion of Lightweight Gradient Boosting Models
Omar Khalid Ali Mohamed
Comments: 5 pages, 3 figures, 3 tables. Conference-style formatting (IEEEtran)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[14] arXiv:2509.00561 [pdf, html, other]
Title: FreeTalk:A plug-and-play and black-box defense against speech synthesis attacks
Yuwen Pu, Zhou Feng, Chunyi Zhou, Jiahao Chen, Chunqiang Hu, Haibo Hu, Shouling Ji
Comments: under review
Subjects: Cryptography and Security (cs.CR)
[15] arXiv:2509.00615 [pdf, other]
Title: Federated Survival Analysis with Node-Level Differential Privacy: Private Kaplan-Meier Curves
Narasimha Raghavan Veeraragavan, Jan Franz Nygård
Comments: This is the author's accepted version of the paper in IEEE FLTA 2025. The final version of record will appear in Proceedings of the IEEE International Conference on Federated Learning Technologies and Applications (FLTA 2025)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[16] arXiv:2509.00634 [pdf, html, other]
Title: Enabling Trustworthy Federated Learning via Remote Attestation for Mitigating Byzantine Threats
Chaoyu Zhang, Heng Jin, Shanghao Shi, Hexuan Yu, Sydney Johns, Y. Thomas Hou, Wenjing Lou
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[17] arXiv:2509.00647 [pdf, html, other]
Title: LLM-HyPZ: Hardware Vulnerability Discovery using an LLM-Assisted Hybrid Platform for Zero-Shot Knowledge Extraction and Refinement
Yu-Zheng Lin, Sujan Ghimire, Abhiram Nandimandalam, Jonah Michael Camacho, Unnati Tripathi, Rony Macwan, Sicong Shao, Setareh Rafatirad, Rozhin Yasaei, Pratik Satam, Soheil Salehi
Comments: 10 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[18] arXiv:2509.00662 [pdf, html, other]
Title: Virtual Reality, Real Problems: A Longitudinal Security Analysis of VR Firmware
Vamsi Shankar Simhadri, Yichang Xiong, Habiba Farrukh, Xiaokuan Zhang
Comments: 17 pages, 25 figures, 6 tables, To appear on ACM CCS 2025
Subjects: Cryptography and Security (cs.CR)
[19] arXiv:2509.00706 [pdf, html, other]
Title: X-PRINT:Platform-Agnostic and Scalable Fine-Grained Encrypted Traffic Fingerprinting
YuKun Zhu, ManYuan Hua, Hai Huang, YongZhao Zhang, Jie Yang, FengHua Xu, RuiDong Chen, XiaoSong Zhang, JiGuo Yu, Yong Ma
Subjects: Cryptography and Security (cs.CR)
[20] arXiv:2509.00770 [pdf, html, other]
Title: Bayesian and Multi-Objective Decision Support for Real-Time Cyber-Physical Incident Mitigation
Shaofei Huang, Christopher M. Poskitt, Lwin Khin Shar
Subjects: Cryptography and Security (cs.CR)
[21] arXiv:2509.00811 [pdf, html, other]
Title: MAESTROCUT: Dynamic, Noise-Adaptive, and Secure Quantum Circuit Cutting on Near-Term Hardware
Samuel Punch, Krishnendu Guha
Comments: 14 Pages
Subjects: Cryptography and Security (cs.CR)
[22] arXiv:2509.00812 [pdf, html, other]
Title: Adaptive t Design Dummy-Gate Obfuscation for Cryogenic Scale Enforcement
Samuel Punch, Krishnendu Guha
Comments: 6
Subjects: Cryptography and Security (cs.CR)
[23] arXiv:2509.00820 [pdf, html, other]
Title: Unlocking the Effectiveness of LoRA-FP for Seamless Transfer Implantation of Fingerprints in Downstream Models
Zhenhua Xu, Zhaokun Yan, Binhan Xu, Xin Tong, Haitao Xu, Yourong Chen, Meng Han
Comments: Accepted By EMNLP2025
Subjects: Cryptography and Security (cs.CR)
[24] arXiv:2509.00882 [pdf, html, other]
Title: VulSolver: Vulnerability Detection via LLM-Driven Constraint Solving
Xiang Li, Yueci Su, Jiahao Liu, Zhiwei Lin, Yuebing Hou, Peiming Gao, Yuanchao Zhang
Subjects: Cryptography and Security (cs.CR)
[25] arXiv:2509.00896 [pdf, other]
Title: AI-Enhanced Intelligent NIDS Framework: Leveraging Metaheuristic Optimization for Robust Attack Detection and Prevention
Maryam Mahdi Alhusseini, Mohammad Reza Feizi Derakhshi
Comments: 16 pages, 12 figures, Second version
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[26] arXiv:2509.00918 [pdf, html, other]
Title: PREE: Towards Harmless and Adaptive Fingerprint Editing in Large Language Models via Knowledge Prefix Enhancement
Xubin Yue, Zhenhua Xu, Wenpeng Xing, Jiahui Yu, Mohan Li, Meng Han
Subjects: Cryptography and Security (cs.CR)
[27] arXiv:2509.00973 [pdf, html, other]
Title: Clone What You Can't Steal: Black-Box LLM Replication via Logit Leakage and Distillation
Kanchon Gharami, Hansaka Aluvihare, Shafika Showkat Moni, Berker Peköz
Comments: 8 pages. Accepted for publication in the proceedings of 7th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (IEEE TPS 2025)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[28] arXiv:2509.01046 [pdf, html, other]
Title: Lightening the Load: A Cluster-Based Framework for A Lower-Overhead, Provable Website Fingerprinting Defense
Khashayar Khajavi, Tao Wang
Subjects: Cryptography and Security (cs.CR)
[29] arXiv:2509.01178 [pdf, html, other]
Title: Efficient and High-Accuracy Secure Two-Party Protocols for a Class of Functions with Real-number Inputs
Hao Guo, Zhaoqian Liu, Liqiang Peng, Shuaishuai Li, Ximing Fu, Weiran Liu, Lin Qu
Comments: 17 pages, 3 figures
Subjects: Cryptography and Security (cs.CR)
[30] arXiv:2509.01211 [pdf, html, other]
Title: Web Fraud Attacks Against LLM-Driven Multi-Agent Systems
Dezhang Kong, Hujin Peng, Yilun Zhang, Lele Zhao, Zhenhua Xu, Shi Lin, Changting Lin, Meng Han
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Multiagent Systems (cs.MA)
[31] arXiv:2509.01253 [pdf, html, other]
Title: Practical and Private Hybrid ML Inference with Fully Homomorphic Encryption
Sayan Biswas, Philippe Chartier, Akash Dhasade, Tom Jurien, David Kerriou, Anne-Marie Kerrmarec, Mohammed Lemou, Franklin Tranie, Martijn de Vos, Milos Vujasinovic
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[32] arXiv:2509.01271 [pdf, other]
Title: An Automated Attack Investigation Approach Leveraging Threat-Knowledge-Augmented Large Language Models
Rujie Dai, Peizhuo Lv, Yujiang Gui, Qiujian Lv, Yuanyuan Qiao, Yan Wang, Degang Sun, Weiqing Huang, Yingjiu Li, XiaoFeng Wang
Subjects: Cryptography and Security (cs.CR)
[33] arXiv:2509.01375 [pdf, html, other]
Title: Anomaly detection in network flows using unsupervised online machine learning
Alberto Miguel-Diez, Adrián Campazas-Vega, Ángel Manuel Guerrero-Higueras, Claudia Álvarez-Aparicio, Vicente Matellán-Olivera
Comments: 14 pages, 3 figures, 6 tables
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[34] arXiv:2509.01434 [pdf, html, other]
Title: LiFeChain: Lightweight Blockchain for Secure and Efficient Federated Lifelong Learning in IoT
Handi Chen, Jing Deng, Xiuzhe Wu, Zhihan Jiang, Xinchen Zhang, Xianhao Chen, Edith C.H. Ngai
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[35] arXiv:2509.01463 [pdf, html, other]
Title: LLMHoney: A Real-Time SSH Honeypot with Large Language Model-Driven Dynamic Response Generation
Pranjay Malhotra
Comments: 7 Pages
Subjects: Cryptography and Security (cs.CR)
[36] arXiv:2509.01470 [pdf, html, other]
Title: Privacy-preserving authentication for military 5G networks
I.D. Lutz, A.M. Hill, M.C. Valenti
Comments: To appear in Proc. IEEE Military Commun. Conf. (MILCOM), (Los Angeles, CA), Oct. 2025
Subjects: Cryptography and Security (cs.CR)
[37] arXiv:2509.01509 [pdf, html, other]
Title: Insight-LLM: LLM-enhanced Multi-view Fusion in Insider Threat Detection
Chengyu Song, Jianming Zheng
Subjects: Cryptography and Security (cs.CR)
[38] arXiv:2509.01592 [pdf, html, other]
Title: Securing Radiation Detection Systems with an Efficient TinyML-Based IDS for Edge Devices
Einstein Rivas Pizarro, Wajiha Zaheer, Li Yang, Khalil El-Khatib, Glenn Harvel
Comments: Preprint author original pre review. Accepted and Presented at NPIC & HMIT 2025. The official proceedings version is available in the ANS Digital Library
Journal-ref: Proc. NPIC HMIT 2025 pp. 651-661 (2025)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Systems and Control (eess.SY)
[39] arXiv:2509.01597 [pdf, html, other]
Title: Statistics-Friendly Confidentiality Protection for Establishment Data, with Applications to the QCEW
Kaitlyn Webb, Prottay Protivash, John Durrell, Daniell Toth, Aleksandra Slavković, Daniel Kifer
Comments: 37 pages (14 main text and 24 appendix pages), 7 figures
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Applications (stat.AP)
[40] arXiv:2509.01599 [pdf, html, other]
Title: An Efficient Intrusion Detection System for Safeguarding Radiation Detection Systems
Nathanael Coolidge, Jaime González Sanz, Li Yang, Khalil El Khatib, Glenn Harvel, Nelson Agbemava, I Putu Susila, Mehmet Yavuz Yagci
Comments: Preprint author original pre review. Accepted and Presented at ISOFIC 2024. The official proceedings version is available on the conference site
Journal-ref: Proc. ISOFIC 2024 (2024)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Systems and Control (eess.SY)
[41] arXiv:2509.01701 [pdf, html, other]
Title: AmphiKey: A Dual-Mode Secure Authenticated Key Encapsulation Protocol for Smart Grid
Kazi Hassan Shakib, Muhammad Asfand Hafeez, Arslan Munir
Subjects: Cryptography and Security (cs.CR)
[42] arXiv:2509.01717 [pdf, other]
Title: Designing a Layered Framework to Secure Data via Improved Multi Stage Lightweight Cryptography in IoT Cloud Systems
Hojjat Farshadinia, Ali Barati, Hamid Barati
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[43] arXiv:2509.01731 [pdf, html, other]
Title: Are Enterprises Ready for Quantum-Safe Cybersecurity?
Tran Duc Le, Phuc Hao Do, Truong Duy Dinh, Van Dai Pham
Comments: Are Enterprises Ready for Quantum-Safe Cybersecurity?
Subjects: Cryptography and Security (cs.CR)
[44] arXiv:2509.01742 [pdf, html, other]
Title: BOLT: Bandwidth-Optimized Lightning-Fast Oblivious Map powered by Secure HBM Accelerators
Yitong Guo, Hongbo Chen, Haobin Hiroki Chen, Yukui Luo, XiaoFeng Wang, Chenghong Wang
Comments: Accepted by CCS 2025
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[45] arXiv:2509.01791 [pdf, other]
Title: E-PhishGen: Unlocking Novel Research in Phishing Email Detection
Luca Pajola, Eugenio Caripoti, Simeone Pizzi, Mauro Conti, Stefan Banzer, Giovanni Apruzzese
Comments: Accepted to ACM AISec '26
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[46] arXiv:2509.01835 [pdf, html, other]
Title: From CVE Entries to Verifiable Exploits: An Automated Multi-Agent Framework for Reproducing CVEs
Saad Ullah, Praneeth Balasubramanian, Wenbo Guo, Amanda Burnett, Hammond Pearce, Christopher Kruegel, Giovanni Vigna, Gianluca Stringhini
Subjects: Cryptography and Security (cs.CR)
[47] arXiv:2509.02004 [pdf, html, other]
Title: Augmented Shuffle Differential Privacy Protocols for Large-Domain Categorical and Key-Value Data
Takao Murakami, Yuichi Sei, Reo Eriguchi
Comments: Full version of the paper accepted at NDSS 2026
Subjects: Cryptography and Security (cs.CR)
[48] arXiv:2509.02042 [pdf, html, other]
Title: Targeted Physical Evasion Attacks in the Near-Infrared Domain
Pascal Zimmer, Simon Lachnit, Alexander Jan Zielinski, Ghassan Karame
Comments: To appear in the Proceedings of the Network and Distributed Systems Security Symposium (NDSS) 2026
Subjects: Cryptography and Security (cs.CR)
[49] arXiv:2509.02076 [pdf, other]
Title: Forecasting Future DDoS Attacks Using Long Short Term Memory (LSTM) Model
Kong Mun Yeen, Rafidah Md Noor, Wahidah Md Shah, Aslinda Hassan, Muhammad Umair Munir
Comments: 18 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[50] arXiv:2509.02077 [pdf, html, other]
Title: From Attack Descriptions to Vulnerabilities: A Sentence Transformer-Based Approach
Refat Othman, Diaeddin Rimawi, Bruno Rossi, Barbara Russo
Comments: Accepted in The Journal of Systems and Software (2025)
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
Total of 255 entries : 1-50 51-100 101-150 151-200 ... 251-255
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack