Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for September 2025

Total of 407 entries : 1-25 26-50 51-75 76-100 ... 401-407
Showing up to 25 entries per page: fewer | more | all
[1] arXiv:2509.00005 [pdf, html, other]
Title: Per-sender neural network classifiers for email authorship validation
Rohit Dube
Comments: 11 pages, 5 figures, 8 tables
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Applications (stat.AP)
[2] arXiv:2509.00006 [pdf, other]
Title: Case Studies: Effective Approaches for Navigating Cross-Border Cloud Data Transfers Amid U.S. Government Privacy and Safety Concerns
Motunrayo Adebayo
Comments: Privacy, Security
Journal-ref: European Journal of Applied Sciences Vol. 12 No. 06 (2024)
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[3] arXiv:2509.00043 [pdf, html, other]
Title: Keystroke Detection by Exploiting Unintended RF Emission from Repaired USB Keyboards
Md Faizul Bari, Yi Xie, Meghna Roy Choudhury, Shreyas Sen
Comments: This journal version is an extended version of a previously published conference paper which can be found here: this https URL
Subjects: Cryptography and Security (cs.CR)
[4] arXiv:2509.00059 [pdf, other]
Title: Cryptographic Challenges: Masking Sensitive Data in Cyber Crimes through ASCII Art
Andres Alejandre, Kassandra Delfin, Victor Castano
Comments: 11 pages, 4 figures
Subjects: Cryptography and Security (cs.CR)
[5] arXiv:2509.00081 [pdf, html, other]
Title: Enabling Transparent Cyber Threat Intelligence Combining Large Language Models and Domain Ontologies
Luca Cotti, Anisa Rula, Devis Bianchini, Federico Cerutti
Comments: 14 pages, 3 figures, 6 tables, accepted at XAI-KRKG@ECAI25: First International ECAI Workshop on eXplainable AI, Knowledge Representation and Knowledge Graphs, October 25-30, 2025, Bologna, Italy
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[6] arXiv:2509.00085 [pdf, html, other]
Title: Private, Verifiable, and Auditable AI Systems
Tobin South
Comments: PhD thesis
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY)
[7] arXiv:2509.00088 [pdf, html, other]
Title: AEGIS : Automated Co-Evolutionary Framework for Guarding Prompt Injections Schema
Ting-Chun Liu, Ching-Yu Hsu, Kuan-Yi Lee, Chi-An Fu, Hung-yi Lee
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[8] arXiv:2509.00104 [pdf, html, other]
Title: Enhanced Rényi Entropy-Based Post-Quantum Key Agreement with Provable Security and Information-Theoretic Guarantees
Ruopengyu Xu, Chenglian Liu
Comments: 11 pages, 3 tables
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Quantum Physics (quant-ph)
[9] arXiv:2509.00124 [pdf, html, other]
Title: A Whole New World: Creating a Parallel-Poisoned Web Only AI-Agents Can See
Shaked Zychlinski
Comments: 10 pages, 1 figure
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY)
[10] arXiv:2509.00266 [pdf, html, other]
Title: A Systematic Approach to Estimate the Security Posture of a Cyber Infrastructure: A Technical Report
Qishen Sam Liang
Comments: 11 pages, 5 figures, technical report
Subjects: Cryptography and Security (cs.CR)
[11] arXiv:2509.00300 [pdf, html, other]
Title: ShadowScope: GPU Monitoring and Validation via Composable Side Channel Signals
Ghadeer Almusaddar, Yicheng Zhang, Saber Ganjisaffar, Barry Williams, Yu David Liu, Dmitry Ponomarev, Nael Abu-Ghazaleh
Subjects: Cryptography and Security (cs.CR)
[12] arXiv:2509.00437 [pdf, html, other]
Title: A Hybrid AI-based and Rule-based Approach to DICOM De-identification: A Solution for the MIDI-B Challenge
Hamideh Haghiri, Rajesh Baidya, Stefan Dvoretskii, Klaus H. Maier-Hein, Marco Nolden
Subjects: Cryptography and Security (cs.CR)
[13] arXiv:2509.00476 [pdf, html, other]
Title: Cross-Domain Malware Detection via Probability-Level Fusion of Lightweight Gradient Boosting Models
Omar Khalid Ali Mohamed
Comments: 5 pages, 3 figures, 3 tables. Conference-style formatting (IEEEtran)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[14] arXiv:2509.00561 [pdf, html, other]
Title: FreeTalk:A plug-and-play and black-box defense against speech synthesis attacks
Yuwen Pu, Zhou Feng, Chunyi Zhou, Jiahao Chen, Chunqiang Hu, Haibo Hu, Shouling Ji
Comments: under review
Subjects: Cryptography and Security (cs.CR)
[15] arXiv:2509.00615 [pdf, other]
Title: Federated Survival Analysis with Node-Level Differential Privacy: Private Kaplan-Meier Curves
Narasimha Raghavan Veeraragavan, Jan Franz Nygård
Comments: This is the author's accepted version of the paper in IEEE FLTA 2025. The final version of record will appear in Proceedings of the IEEE International Conference on Federated Learning Technologies and Applications (FLTA 2025)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[16] arXiv:2509.00634 [pdf, html, other]
Title: Enabling Trustworthy Federated Learning via Remote Attestation for Mitigating Byzantine Threats
Chaoyu Zhang, Heng Jin, Shanghao Shi, Hexuan Yu, Sydney Johns, Y. Thomas Hou, Wenjing Lou
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[17] arXiv:2509.00647 [pdf, html, other]
Title: LLM-HyPZ: Hardware Vulnerability Discovery using an LLM-Assisted Hybrid Platform for Zero-Shot Knowledge Extraction and Refinement
Yu-Zheng Lin, Sujan Ghimire, Abhiram Nandimandalam, Jonah Michael Camacho, Unnati Tripathi, Rony Macwan, Sicong Shao, Setareh Rafatirad, Rozhin Yasaei, Pratik Satam, Soheil Salehi
Comments: 10 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[18] arXiv:2509.00662 [pdf, html, other]
Title: Virtual Reality, Real Problems: A Longitudinal Security Analysis of VR Firmware
Vamsi Shankar Simhadri, Yichang Xiong, Habiba Farrukh, Xiaokuan Zhang
Comments: 17 pages, 25 figures, 6 tables, To appear on ACM CCS 2025
Subjects: Cryptography and Security (cs.CR)
[19] arXiv:2509.00706 [pdf, html, other]
Title: X-PRINT:Platform-Agnostic and Scalable Fine-Grained Encrypted Traffic Fingerprinting
YuKun Zhu, ManYuan Hua, Hai Huang, YongZhao Zhang, Jie Yang, FengHua Xu, RuiDong Chen, XiaoSong Zhang, JiGuo Yu, Yong Ma
Subjects: Cryptography and Security (cs.CR)
[20] arXiv:2509.00770 [pdf, html, other]
Title: Bayesian and Multi-Objective Decision Support for Real-Time Cyber-Physical Incident Mitigation
Shaofei Huang, Christopher M. Poskitt, Lwin Khin Shar
Subjects: Cryptography and Security (cs.CR)
[21] arXiv:2509.00811 [pdf, html, other]
Title: MAESTROCUT: Dynamic, Noise-Adaptive, and Secure Quantum Circuit Cutting on Near-Term Hardware
Samuel Punch, Krishnendu Guha
Comments: 14 Pages
Subjects: Cryptography and Security (cs.CR)
[22] arXiv:2509.00812 [pdf, html, other]
Title: Adaptive t Design Dummy-Gate Obfuscation for Cryogenic Scale Enforcement
Samuel Punch, Krishnendu Guha
Comments: 6
Subjects: Cryptography and Security (cs.CR)
[23] arXiv:2509.00820 [pdf, html, other]
Title: Unlocking the Effectiveness of LoRA-FP for Seamless Transfer Implantation of Fingerprints in Downstream Models
Zhenhua Xu, Zhaokun Yan, Binhan Xu, Xin Tong, Haitao Xu, Yourong Chen, Meng Han
Comments: Accepted By EMNLP2025
Subjects: Cryptography and Security (cs.CR)
[24] arXiv:2509.00882 [pdf, html, other]
Title: VulSolver: Vulnerability Detection via LLM-Driven Constraint Solving
Xiang Li, Yueci Su, Jiahao Liu, Zhiwei Lin, Yuebing Hou, Peiming Gao, Yuanchao Zhang
Subjects: Cryptography and Security (cs.CR)
[25] arXiv:2509.00896 [pdf, other]
Title: AI-Enhanced Intelligent NIDS Framework: Leveraging Metaheuristic Optimization for Robust Attack Detection and Prevention
Maryam Mahdi Alhusseini, Mohammad Reza Feizi Derakhshi
Comments: 16 pages, 12 figures, Second version
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
Total of 407 entries : 1-25 26-50 51-75 76-100 ... 401-407
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack