Skip to main content

Showing 1–4 of 4 results for author: Borsos, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2510.03761  [pdf, ps, other

    cs.CR cs.AI

    You Have Been LaTeXpOsEd: A Systematic Analysis of Information Leakage in Preprint Archives Using Large Language Models

    Authors: Richard A. Dubniczky, Bertalan Borsos, Tihanyi Norbert

    Abstract: The widespread use of preprint repositories such as arXiv has accelerated the communication of scientific results but also introduced overlooked security risks. Beyond PDFs, these platforms provide unrestricted access to original source materials, including LaTeX sources, auxiliary code, figures, and embedded comments. In the absence of sanitization, submissions may disclose sensitive information… ▽ More

    Submitted 4 October, 2025; originally announced October 2025.

  2. arXiv:2506.17323  [pdf, ps, other

    cs.LG cs.AI cs.SE

    I Know Which LLM Wrote Your Code Last Summer: LLM generated Code Stylometry for Authorship Attribution

    Authors: Tamas Bisztray, Bilel Cherif, Richard A. Dubniczky, Nils Gruschka, Bertalan Borsos, Mohamed Amine Ferrag, Attila Kovacs, Vasileios Mavroeidis, Norbert Tihanyi

    Abstract: Detecting AI-generated code, deepfakes, and other synthetic content is an emerging research challenge. As code generated by Large Language Models (LLMs) becomes more common, identifying the specific model behind each sample is increasingly important. This paper presents the first systematic study of LLM authorship attribution for C programs. We released CodeT5-Authorship, a novel model that uses o… ▽ More

    Submitted 18 June, 2025; originally announced June 2025.

  3. arXiv:2410.15490  [pdf, other

    cs.AI cs.MA

    Dynamic Intelligence Assessment: Benchmarking LLMs on the Road to AGI with a Focus on Model Confidence

    Authors: Norbert Tihanyi, Tamas Bisztray, Richard A. Dubniczky, Rebeka Toth, Bertalan Borsos, Bilel Cherif, Mohamed Amine Ferrag, Lajos Muzsai, Ridhi Jain, Ryan Marinelli, Lucas C. Cordeiro, Merouane Debbah, Vasileios Mavroeidis, Audun Josang

    Abstract: As machine intelligence evolves, the need to test and compare the problem-solving abilities of different AI models grows. However, current benchmarks are often simplistic, allowing models to perform uniformly well and making it difficult to distinguish their capabilities. Additionally, benchmarks typically rely on static question-answer pairs that the models might memorize or guess. To address the… ▽ More

    Submitted 22 November, 2024; v1 submitted 20 October, 2024; originally announced October 2024.

  4. arXiv:2306.08740  [pdf, other

    cs.CR cs.IT

    Privacy-Preserving Password Cracking: How a Third Party Can Crack Our Password Hash Without Learning the Hash Value or the Cleartext

    Authors: Norbert Tihanyi, Tamas Bisztray, Bertalan Borsos, Sebastien Raveau

    Abstract: Using the computational resources of an untrusted third party to crack a password hash can pose a high number of privacy and security risks. The act of revealing the hash digest could in itself negatively impact both the data subject who created the password, and the data controller who stores the hash digest. This paper solves this currently open problem by presenting a Privacy-Preserving Passwor… ▽ More

    Submitted 14 June, 2023; originally announced June 2023.