Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for recent submissions

  • Thu, 28 Aug 2025
  • Wed, 27 Aug 2025
  • Tue, 26 Aug 2025
  • Mon, 25 Aug 2025
  • Fri, 22 Aug 2025

See today's new changes

Total of 142 entries : 1-50 51-100 101-142
Showing up to 50 entries per page: fewer | more | all

Thu, 28 Aug 2025 (showing 42 of 42 entries )

[1] arXiv:2508.20083 [pdf, other]
Title: Disabling Self-Correction in Retrieval-Augmented Generation via Stealthy Retriever Poisoning
Yanbo Dai, Zhenlan Ji, Zongjie Li, Kuan Li, Shuai Wang
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[2] arXiv:2508.20051 [pdf, html, other]
Title: SCAMPER -- Synchrophasor Covert chAnnel for Malicious and Protective ERrands
Prashanth Krishnamurthy, Ramesh Karri, Farshad Khorrami
Comments: 12 pages, 10 figures
Subjects: Cryptography and Security (cs.CR)
[3] arXiv:2508.19843 [pdf, html, other]
Title: SoK: Large Language Model Copyright Auditing via Fingerprinting
Shuo Shao, Yiming Li, Yu He, Hongwei Yao, Wenyuan Yang, Dacheng Tao, Zhan Qin
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[4] arXiv:2508.19825 [pdf, html, other]
Title: Every Keystroke You Make: A Tech-Law Measurement and Analysis of Event Listeners for Wiretapping
Shaoor Munir, Nurullah Demir, Qian Li, Konrad Kollnig, Zubair Shafiq
Subjects: Cryptography and Security (cs.CR)
[5] arXiv:2508.19819 [pdf, html, other]
Title: From Research to Reality: Feasibility of Gradient Inversion Attacks in Federated Learning
Viktor Valadi, Mattias Åkesson, Johan Östman, Salman Toor, Andreas Hellander
Comments: Under review at KDD 2026 (Research Track)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[6] arXiv:2508.19774 [pdf, html, other]
Title: The Art of Hide and Seek: Making Pickle-Based Model Supply Chain Poisoning Stealthy Again
Tong Liu, Guozhu Meng, Peng Zhou, Zizhuang Deng, Shuaiyin Yao, Kai Chen
Subjects: Cryptography and Security (cs.CR)
[7] arXiv:2508.19714 [pdf, html, other]
Title: Addressing Deepfake Issue in Selfie banking through camera based authentication
Subhrojyoti Mukherjee, Manoranjan Mohanty
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[8] arXiv:2508.19697 [pdf, html, other]
Title: Safety Alignment Should Be Made More Than Just A Few Attention Heads
Chao Huang, Zefeng Zhang, Juewei Yue, Quangang Li, Chuang Zhang, Tingwen Liu
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[9] arXiv:2508.19641 [pdf, html, other]
Title: Intellectual Property in Graph-Based Machine Learning as a Service: Attacks and Defenses
Lincan Li, Bolin Shen, Chenxi Zhao, Yuxiang Sun, Kaixiang Zhao, Shirui Pan, Yushun Dong
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[10] arXiv:2508.19525 [pdf, html, other]
Title: Breaking the Layer Barrier: Remodeling Private Transformer Inference with Hybrid CKKS and MPC
Tianshi Xu, Wen-jie Lu, Jiangrui Yu, Chen Yi, Chenqi Lin, Runsheng Wang, Meng Li
Comments: USENIX Security 2025
Subjects: Cryptography and Security (cs.CR)
[11] arXiv:2508.19500 [pdf, other]
Title: Servant, Stalker, Predator: How An Honest, Helpful, And Harmless (3H) Agent Unlocks Adversarial Skills
David Noever
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[12] arXiv:2508.19493 [pdf, html, other]
Title: Mind the Third Eye! Benchmarking Privacy Awareness in MLLM-powered Smartphone Agents
Zhixin Lin, Jungang Li, Shidong Pan, Yibo Shi, Yue Yao, Dongliang Xu
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[13] arXiv:2508.19472 [pdf, html, other]
Title: SIExVulTS: Sensitive Information Exposure Vulnerability Detection System using Transformer Models and Static Analysis
Kyler Katz, Sara Moshtari, Ibrahim Mujhid, Mehdi Mirakhorli, Derek Garcia
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[14] arXiv:2508.19465 [pdf, other]
Title: Addressing Weak Authentication like RFID, NFC in EVs and EVCs using AI-powered Adaptive Authentication
Onyinye Okoye
Comments: Research paper exploring AI-driven adaptive authentication in the Electric Vehicle industry
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[15] arXiv:2508.19456 [pdf, html, other]
Title: ReLATE+: Unified Framework for Adversarial Attack Detection, Classification, and Resilient Model Selection in Time-Series Classification
Cagla Ipek Kocal, Onat Gungor, Tajana Rosing, Baris Aksanli
Comments: Under review at IEEE TSMC Journal. arXiv admin note: text overlap with arXiv:2503.07882
Subjects: Cryptography and Security (cs.CR)
[16] arXiv:2508.19450 [pdf, html, other]
Title: CITADEL: Continual Anomaly Detection for Enhanced Learning in IoT Intrusion Detection
Elvin Li, Onat Gungor, Zhengli Shang, Tajana Rosing
Comments: Under review at IEEE IoTJ
Subjects: Cryptography and Security (cs.CR)
[17] arXiv:2508.19430 [pdf, html, other]
Title: Formal Verification of Physical Layer Security Protocols for Next-Generation Communication Networks
Kangfeng Ye, Roberto Metere, Jim Woodcock, Poonam Yadav
Comments: Submitted to ICFEM2025; 23 pages, 2 tables, and 6 figures
Subjects: Cryptography and Security (cs.CR); Formal Languages and Automata Theory (cs.FL); Logic in Computer Science (cs.LO)
[18] arXiv:2508.19395 [pdf, html, other]
Title: A NIS2 pan-European registry for identifying and classifying essential and important entities
Fabian Aude Steen, Daniel Assani Shabani
Subjects: Cryptography and Security (cs.CR)
[19] arXiv:2508.19368 [pdf, html, other]
Title: Just Dork and Crawl: Measuring Illegal Online Gambling Defacement in Indonesian Websites
Luqman Muhammad Zagi, Girindro Pringgo Digdo, Wervyan Shalannanda
Comments: 6 pages, 2 figures, IEEE Conference
Subjects: Cryptography and Security (cs.CR)
[20] arXiv:2508.19323 [pdf, other]
Title: A Technical Review on Comparison and Estimation of Steganographic Tools
Ms. Preeti P. Bhatt, Rakesh R. Savant
Comments: 20
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Graphics (cs.GR)
[21] arXiv:2508.19321 [pdf, html, other]
Title: An Investigation on Group Query Hallucination Attacks
Kehao Miao, Xiaolong Jin
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[22] arXiv:2508.19309 [pdf, other]
Title: Leveraging 3D Technologies for Hardware Security: Opportunities and Challenges
Peng Gu, Shuangchen Li, Dylan Stow, Russell Barnes, Liu Liu, Yuan Xie, Eren Kursshan
Journal-ref: IEEE GLSVLSI Conference 2016
Subjects: Cryptography and Security (cs.CR); Emerging Technologies (cs.ET)
[23] arXiv:2508.19292 [pdf, html, other]
Title: Stand on The Shoulders of Giants: Building JailExpert from Previous Attack Experience
Xi Wang, Songlei Jian, Shasha Li, Xiaopeng Li, Bin Ji, Jun Ma, Xiaodong Liu, Jing Wang, Feilong Bao, Jianfeng Zhang, Baosheng Wang, Jie Yu
Comments: 18 pages, EMNLP 2025 Main Conference
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[24] arXiv:2508.19288 [pdf, html, other]
Title: Tricking LLM-Based NPCs into Spilling Secrets
Kyohei Shiomi, Zhuotao Lian, Toru Nakanishi, Teruaki Kitasuka
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[25] arXiv:2508.19287 [pdf, html, other]
Title: Prompt-in-Content Attacks: Exploiting Uploaded Inputs to Hijack LLM Behavior
Zhuotao Lian, Weiyu Wang, Qingkui Zeng, Toru Nakanishi, Teruaki Kitasuka, Chunhua Su
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[26] arXiv:2508.19286 [pdf, html, other]
Title: RL-Finetuned LLMs for Privacy-Preserving Synthetic Rewriting
Zhan Shi, Yefeng Yuan, Yuhong Liu, Liang Cheng, Yi Fang
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[27] arXiv:2508.19284 [pdf, html, other]
Title: A Comprehensive Review of Denial of Wallet Attacks in Serverless Architectures
Mark Dorsett, Scott Mann, Jabed Chowdhury, Abdun Mahmood
Comments: 12 pages, 2 figures, 5 tables
Subjects: Cryptography and Security (cs.CR)
[28] arXiv:2508.19283 [pdf, html, other]
Title: Rethinking Denial-of-Service: A Conditional Taxonomy Unifying Availability and Sustainability Threats
Mark Dorsett, Scott Man, Tim Koussas
Comments: 7 pages, 3 figures, 3 tables,
Subjects: Cryptography and Security (cs.CR)
[29] arXiv:2508.19281 [pdf, html, other]
Title: CORTEX: Composite Overlay for Risk Tiering and Exposure in Operational AI Systems
Aoun E Muhammad, Kin Choong Yow, Jamel Baili, Yongwon Cho, Yunyoung Nam
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[30] arXiv:2508.19278 [pdf, html, other]
Title: Towards Production-Worthy Simulation for Autonomous Cyber Operations
Konur Tholl, Mariam El Mezouar, Ranwa Al Mallah
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[31] arXiv:2508.19273 [pdf, html, other]
Title: MixGAN: A Hybrid Semi-Supervised and Generative Approach for DDoS Detection in Cloud-Integrated IoT Networks
Tongxi Wu, Chenwei Xu, Jin Yang
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[32] arXiv:2508.19267 [pdf, html, other]
Title: The Aegis Protocol: A Foundational Security Framework for Autonomous AI Agents
Sai Teja Reddy Adapala, Yashwanth Reddy Alugubelly
Comments: 10 pages, 3 figures, 3 tables. Source compiled with pdfLaTeX; bibliography included via prebuilt this http URL. Code repository: available in paper
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Multiagent Systems (cs.MA)
[33] arXiv:2508.19250 [pdf, html, other]
Title: Tight Quantum-Security Bounds and Parameter Optimization for SPHINCS+ and NTRU
Ruopengyu Xu, Chenglian Liu
Comments: 15 pages, 2tables
Subjects: Cryptography and Security (cs.CR); Discrete Mathematics (cs.DM); Number Theory (math.NT); Quantum Physics (quant-ph)
[34] arXiv:2508.20086 (cross-list from cs.SE) [pdf, html, other]
Title: Smart Contract Intent Detection with Pre-trained Programming Language Model
Youwei Huang, Jianwen Li, Sen Fang, Yao Li, Peng Yang, Bin Hu, Tao Zhang
Comments: 10 pages, 5 figures, conference
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[35] arXiv:2508.19620 (cross-list from cs.IR) [pdf, html, other]
Title: A Scenario-Oriented Survey of Federated Recommender Systems: Techniques, Challenges, and Future Directions
Yunqi Mi, Jiakui Shen, Guoshuai Zhao, Jialie Shen, Xueming Qian
Subjects: Information Retrieval (cs.IR); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[36] arXiv:2508.19488 (cross-list from cs.LG) [pdf, html, other]
Title: PoolFlip: A Multi-Agent Reinforcement Learning Security Environment for Cyber Defense
Xavier Cadet, Simona Boboila, Sie Hendrata Dharmawan, Alina Oprea, Peter Chin
Comments: Accepted at GameSec 2025
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[37] arXiv:2508.19461 (cross-list from cs.AI) [pdf, html, other]
Title: Reliable Weak-to-Strong Monitoring of LLM Agents
Neil Kale, Chen Bo Calvin Zhang, Kevin Zhu, Ankit Aich, Paula Rodriguez, Scale Red Team, Christina Q. Knight, Zifan Wang
Comments: 18 pages, 15 figures
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[38] arXiv:2508.19458 (cross-list from cs.LG) [pdf, other]
Title: The Sample Complexity of Membership Inference and Privacy Auditing
Mahdi Haghifam, Adam Smith, Jonathan Ullman
Comments: 58 Pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[39] arXiv:2508.19381 (cross-list from cs.LG) [pdf, html, other]
Title: Towards Quantum Machine Learning for Malicious Code Analysis
Jesus Lopez, Saeefa Rubaiyet Nowmi, Viviana Cadena, Mohammad Saidur Rahman
Comments: 6 pages, 3 figures, 2 tables. Accepted at the International Workshop on Quantum Computing and Reinforcement Learning (QCRL) @ IEEE Quantum Week 2025
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[40] arXiv:2508.19324 (cross-list from cs.CV) [pdf, html, other]
Title: Deep Data Hiding for ICAO-Compliant Face Images: A Survey
Jefferson David Rodriguez Chivata, Davide Ghiani, Simone Maurizio La Cava, Marco Micheletto, Giulia Orrù, Federico Lama, Gian Luca Marcialis
Comments: In 2025 IEEE International Joint Conference on Biometrics (IJCB)
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Image and Video Processing (eess.IV)
[41] arXiv:2508.19277 (cross-list from cs.LG) [pdf, html, other]
Title: POT: Inducing Overthinking in LLMs via Black-Box Iterative Optimization
Xinyu Li, Tianjin Huang, Ronghui Mu, Xiaowei Huang, Gaojie Jin
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[42] arXiv:2508.16975 (cross-list from cs.CV) [pdf, html, other]
Title: Combating Digitally Altered Images: Deepfake Detection
Saksham Kumar, Rhythm Narang
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)

Wed, 27 Aug 2025 (showing first 8 of 23 entries )

[43] arXiv:2508.19219 [pdf, html, other]
Title: An Efficient Lightweight Blockchain for Decentralized IoT
Faezeh Dehghan Tarzjani, Mostafa Salehi
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[44] arXiv:2508.19115 [pdf, html, other]
Title: SecureV2X: An Efficient and Privacy-Preserving System for Vehicle-to-Everything (V2X) Applications
Joshua Lee, Ali Arastehfard, Weiran Liu, Xuegang Ban, Yuan Hong
Comments: 10 pages, 3 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[45] arXiv:2508.19072 [pdf, html, other]
Title: Attackers Strike Back? Not Anymore -- An Ensemble of RL Defenders Awakens for APT Detection
Sidahmed Benabderrahmane, Talal Rahwan
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[46] arXiv:2508.18976 [pdf, html, other]
Title: The Double-edged Sword of LLM-based Data Reconstruction: Understanding and Mitigating Contextual Vulnerability in Word-level Differential Privacy Text Sanitization
Stephen Meisenbacher, Alexandra Klymenko, Andreea-Elena Bodea, Florian Matthes
Comments: 15 pages, 4 figures, 8 tables. Accepted to WPES @ CCS 2025
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[47] arXiv:2508.18947 [pdf, html, other]
Title: LLMs in the SOC: An Empirical Study of Human-AI Collaboration in Security Operations Centres
Ronal Singh, Shahroz Tariq, Fatemeh Jalalvand, Mohan Baruwal Chhetri, Surya Nepal, Cecile Paris, Martin Lochner
Comments: 22 pages, 9 figures, under review
Subjects: Cryptography and Security (cs.CR)
[48] arXiv:2508.18942 [pdf, other]
Title: EnerSwap: Large-Scale, Privacy-First Automated Market Maker for V2G Energy Trading
Ahmed Mounsf Rafik Bendada, Yacine Ghamri-Doudane
Comments: 11 pages, 7 figures, 1 table, 1 algorithm, Paper accepted in 27th MSWiM Conference
Subjects: Cryptography and Security (cs.CR)
[49] arXiv:2508.18832 [pdf, html, other]
Title: A Tight Context-aware Privacy Bound for Histogram Publication
Sara Saeidian (1 and 2), Ata Yavuzyılmaz, Leonhard Grosse (1), Georg Schuppe (3), Tobias J. Oechtering (1) ((1) KTH Royal Institute of Technology, (2) Inria Saclay, (3) SEBx)
Comments: Submitted to IEEE Signal Processing Letters
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[50] arXiv:2508.18805 [pdf, other]
Title: Hidden Tail: Adversarial Image Causing Stealthy Resource Consumption in Vision-Language Models
Rui Zhang, Zihan Wang, Tianli Yang, Hongwei Li, Wenbo Jiang, Qingchuan Zhao, Yang Liu, Guowen Xu
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
Total of 142 entries : 1-50 51-100 101-142
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack