Skip to main content

Showing 1–8 of 8 results for author: Cherif, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2510.10493  [pdf, ps, other

    cs.CR cs.LG

    The Hidden DNA of LLM-Generated JavaScript: Structural Patterns Enable High-Accuracy Authorship Attribution

    Authors: Norbert Tihanyi, Bilel Cherif, Richard A. Dubniczky, Mohamed Amine Ferrag, Tamás Bisztray

    Abstract: In this paper, we present the first large-scale study exploring whether JavaScript code generated by Large Language Models (LLMs) can reveal which model produced it, enabling reliable authorship attribution and model fingerprinting. With the rapid rise of AI-generated code, attribution is playing a critical role in detecting vulnerabilities, flagging malicious content, and ensuring accountability.… ▽ More

    Submitted 12 October, 2025; originally announced October 2025.

  2. arXiv:2506.17323  [pdf, ps, other

    cs.LG cs.AI cs.SE

    I Know Which LLM Wrote Your Code Last Summer: LLM generated Code Stylometry for Authorship Attribution

    Authors: Tamas Bisztray, Bilel Cherif, Richard A. Dubniczky, Nils Gruschka, Bertalan Borsos, Mohamed Amine Ferrag, Attila Kovacs, Vasileios Mavroeidis, Norbert Tihanyi

    Abstract: Detecting AI-generated code, deepfakes, and other synthetic content is an emerging research challenge. As code generated by Large Language Models (LLMs) becomes more common, identifying the specific model behind each sample is increasingly important. This paper presents the first systematic study of LLM authorship attribution for C programs. We released CodeT5-Authorship, a novel model that uses o… ▽ More

    Submitted 18 June, 2025; originally announced June 2025.

  3. arXiv:2505.19973  [pdf, ps, other

    cs.CR cs.AI

    DFIR-Metric: A Benchmark Dataset for Evaluating Large Language Models in Digital Forensics and Incident Response

    Authors: Bilel Cherif, Tamas Bisztray, Richard A. Dubniczky, Aaesha Aldahmani, Saeed Alshehhi, Norbert Tihanyi

    Abstract: Digital Forensics and Incident Response (DFIR) involves analyzing digital evidence to support legal investigations. Large Language Models (LLMs) offer new opportunities in DFIR tasks such as log analysis and memory forensics, but their susceptibility to errors and hallucinations raises concerns in high-stakes contexts. Despite growing interest, there is no comprehensive benchmark to evaluate LLMs… ▽ More

    Submitted 26 May, 2025; originally announced May 2025.

  4. arXiv:2503.10784  [pdf, other

    cs.SE cs.AI

    Vulnerability Detection: From Formal Verification to Large Language Models and Hybrid Approaches: A Comprehensive Overview

    Authors: Norbert Tihanyi, Tamas Bisztray, Mohamed Amine Ferrag, Bilel Cherif, Richard A. Dubniczky, Ridhi Jain, Lucas C. Cordeiro

    Abstract: Software testing and verification are critical for ensuring the reliability and security of modern software systems. Traditionally, formal verification techniques, such as model checking and theorem proving, have provided rigorous frameworks for detecting bugs and vulnerabilities. However, these methods often face scalability challenges when applied to complex, real-world programs. Recently, the a… ▽ More

    Submitted 13 March, 2025; originally announced March 2025.

  5. arXiv:2410.15490  [pdf, other

    cs.AI cs.MA

    Dynamic Intelligence Assessment: Benchmarking LLMs on the Road to AGI with a Focus on Model Confidence

    Authors: Norbert Tihanyi, Tamas Bisztray, Richard A. Dubniczky, Rebeka Toth, Bertalan Borsos, Bilel Cherif, Mohamed Amine Ferrag, Lajos Muzsai, Ridhi Jain, Ryan Marinelli, Lucas C. Cordeiro, Merouane Debbah, Vasileios Mavroeidis, Audun Josang

    Abstract: As machine intelligence evolves, the need to test and compare the problem-solving abilities of different AI models grows. However, current benchmarks are often simplistic, allowing models to perform uniformly well and making it difficult to distinguish their capabilities. Additionally, benchmarks typically rely on static question-answer pairs that the models might memorize or guess. To address the… ▽ More

    Submitted 22 November, 2024; v1 submitted 20 October, 2024; originally announced October 2024.

  6. arXiv:2405.12750  [pdf, other

    cs.CR cs.AI

    Generative AI in Cybersecurity: A Comprehensive Review of LLM Applications and Vulnerabilities

    Authors: Mohamed Amine Ferrag, Fatima Alwahedi, Ammar Battah, Bilel Cherif, Abdechakour Mechri, Norbert Tihanyi, Tamas Bisztray, Merouane Debbah

    Abstract: This paper provides a comprehensive review of the future of cybersecurity through Generative AI and Large Language Models (LLMs). We explore LLM applications across various domains, including hardware design security, intrusion detection, software engineering, design verification, cyber threat intelligence, malware detection, and phishing detection. We present an overview of LLM evolution and its… ▽ More

    Submitted 17 January, 2025; v1 submitted 21 May, 2024; originally announced May 2024.

    Comments: 52 pages, 8 figures

  7. arXiv:2403.15078  [pdf, other

    cs.CR

    Real-time Threat Detection Strategies for Resource-constrained Devices

    Authors: Mounia Hamidouche, Biniam Fisseha Demissie, Bilel Cherif

    Abstract: As more devices connect to the internet, it becomes crucial to address their limitations and basic security needs. While much research focuses on utilizing ML and DL to tackle security challenges, there is often a tendency to overlook the practicality and feasibility of implementing these methods in real-time settings. This oversight stems from the constrained processing power and memory of certai… ▽ More

    Submitted 22 March, 2024; originally announced March 2024.

  8. Toward Intelligent Biped-Humanoids Gaits Generation

    Authors: Nizar Rokbani, Boudour Ammar Cherif, Adel M. Alimi

    Abstract: In this chapter we will highlight our experimental studies on natural human walking analysis and introduce a biologically inspired design for simple bipedal locomotion system of humanoid robots. Inspiration comes directly from human walking analysis and human muscles mechanism and control. A hybrid algorithm for walking gaits generation is then proposed as an innovative alternative to classically… ▽ More

    Submitted 8 December, 2012; originally announced December 2012.

    Comments: 15 pages

    Journal ref: Nizar Rokbani, Boudour Ammar Cherif and Adel M. Alimi (2009). Toward Intelligent Biped-Humanoids Gaits Generation, Humanoid Robots, Ben Choi (Ed.), ISBN: 978-953-7619-44-2, InTech