We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 53

[ total of 133 entries: 1-100 | 54-133 ]
[ showing 100 entries per page: fewer | more | all ]

Tue, 9 Dec 2025

[54]  arXiv:2512.07827 [pdf, ps, other]
Title: An Adaptive Multi-Layered Honeynet Architecture for Threat Behavior Analysis via Deep Learning
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[55]  arXiv:2512.07725 [pdf, ps, other]
Title: Privacy Practices of Browser Agents
Subjects: Cryptography and Security (cs.CR)
[56]  arXiv:2512.07533 [pdf, ps, other]
Title: VulnLLM-R: Specialized Reasoning LLM with Agent Scaffold for Vulnerability Detection
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[57]  arXiv:2512.07495 [pdf, ps, other]
Title: Amulet: Fast TEE-Shielded Inference for On-Device Model Protection
Subjects: Cryptography and Security (cs.CR)
[58]  arXiv:2512.07342 [pdf, ps, other]
Title: PrivORL: Differentially Private Synthetic Dataset for Offline Reinforcement Learning
Comments: Accepted at NDSS 2026; code available at this https URL
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[59]  arXiv:2512.07292 [pdf, ps, other]
Title: Breaking ECDSA with Electromagnetic Side-Channel Attacks: Challenges and Practicality on Modern Smartphones
Comments: This work has been submitted to Euro S&P 2026 for possible publication
Subjects: Cryptography and Security (cs.CR)
[60]  arXiv:2512.07086 [pdf, ps, other]
Title: ThinkTrap: Denial-of-Service Attacks against Black-box LLM Services via Infinite Thinking
Comments: This version includes the final camera-ready manuscript accepted by NDSS 2026
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[61]  arXiv:2512.07038 [pdf, ps, other]
Title: Ideal Attribution and Faithful Watermarks for Language Models
Comments: 30 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[62]  arXiv:2512.07033 [pdf, ps, other]
Title: Managed TLS Under Migration: Authentication Authority Across CDN and Hosting Transitions
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[63]  arXiv:2512.07030 [pdf, ps, other]
Title: A Comprehensive Study of Supervised Machine Learning Models for Zero-Day Attack Detection: Analyzing Performance on Imbalanced Data
Comments: 13 pages, 5 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[64]  arXiv:2512.06914 [pdf, ps, other]
Title: SoK: Trust-Authorization Mismatch in LLM Agent Interactions
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[65]  arXiv:2512.06899 [pdf, ps, other]
Title: Patronus: Identifying and Mitigating Transferable Backdoors in Pre-trained Language Models
Comments: Work in progress
Subjects: Cryptography and Security (cs.CR)
[66]  arXiv:2512.06846 [pdf, ps, other]
Title: CKG-LLM: LLM-Assisted Detection of Smart Contract Access Control Vulnerabilities Based on Knowledge Graphs
Comments: 6 pages, 4 figures
Subjects: Cryptography and Security (cs.CR)
[67]  arXiv:2512.06781 [pdf, ps, other]
Title: From Description to Score: Can LLMs Quantify Vulnerabilities?
Comments: 10 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Programming Languages (cs.PL)
[68]  arXiv:2512.06747 [pdf, ps, other]
Title: PrivLLMSwarm: Privacy-Preserving LLM-Driven UAV Swarms for Secure IoT Surveillance
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[69]  arXiv:2512.06713 [pdf, ps, other]
Title: Look Twice before You Leap: A Rational Agent Framework for Localized Adversarial Anonymization
Comments: 16 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[70]  arXiv:2512.06660 [pdf, ps, other]
Title: Towards Small Language Models for Security Query Generation in SOC Workflows
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[71]  arXiv:2512.06659 [pdf, ps, other]
Title: The Evolution of Agentic AI in Cybersecurity: From Single LLM Reasoners to Multi-Agent Systems and Autonomous Pipelines
Authors: Vaishali Vinay
Comments: Accepted at ICAIC 2026
Subjects: Cryptography and Security (cs.CR)
[72]  arXiv:2512.06589 [pdf, ps, other]
Title: OmniSafeBench-MM: A Unified Benchmark and Toolbox for Multimodal Jailbreak Attack-Defense Evaluation
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[73]  arXiv:2512.06557 [pdf, ps, other]
Title: Characterizing Large-Scale Adversarial Activities Through Large-Scale Honey-Nets
Comments: Accepted at Conference IEEE UEMCON 2025
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[74]  arXiv:2512.06556 [pdf, ps, other]
Title: Securing the Model Context Protocol: Defending LLMs Against Tool Poisoning and Adversarial Attacks
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[75]  arXiv:2512.06555 [pdf, ps, other]
Title: BEACON: A Unified Behavioral-Tactical Framework for Explainable Cybercrime Analysis with Large Language Models
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY)
[76]  arXiv:2512.06500 [pdf, ps, other]
Title: PDRIMA: A Policy-Driven Runtime Integrity Measurement and Attestation Approach for ARM TrustZone-based TEE
Subjects: Cryptography and Security (cs.CR)
[77]  arXiv:2512.06467 [pdf, ps, other]
Title: Formalisation of Security for Federated Learning with DP and Attacker Advantage in IIIf for Satellite Swarms -- Extended Version
Subjects: Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)
[78]  arXiv:2512.06411 [pdf, ps, other]
Title: KyFrog: A High-Security LWE-Based KEM Inspired by ML-KEM
Subjects: Cryptography and Security (cs.CR); Rings and Algebras (math.RA)
[79]  arXiv:2512.06396 [pdf, ps, other]
Title: AgenticCyber: A GenAI-Powered Multi-Agent System for Multimodal Threat Detection and Adaptive Response in Cybersecurity
Authors: Shovan Roy
Comments: 6 pages for IEEE conference
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[80]  arXiv:2512.06390 [pdf, ps, other]
Title: Web Technologies Security in the AI Era: A Survey of CDN-Enhanced Defenses
Comments: Accepted at 2025 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob). 7 pages, 5 figures
Journal-ref: 2025 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob), Bali, Indonesia, 2025, pp. 180-186
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI); Performance (cs.PF)
[81]  arXiv:2512.06387 [pdf, ps, other]
Title: Beyond Model Jailbreak: Systematic Dissection of the "Ten DeadlySins" in Embodied Intelligence
Subjects: Cryptography and Security (cs.CR); Robotics (cs.RO)
[82]  arXiv:2512.06364 [pdf, ps, other]
Title: JEEVHITAA -- An End-to-End HCAI System to Support Collective Care
Comments: 14 pages, 4 figures, 6 tables, 2 algorithms, Preprint of work Submitted to MobiSys 2026 - Emergent Ideas Track
Subjects: Cryptography and Security (cs.CR); Emerging Technologies (cs.ET); Human-Computer Interaction (cs.HC)
[83]  arXiv:2512.06253 [pdf, ps, other]
Title: Privacy Loss of Noise Perturbation via Concentration Analysis of A Product Measure
Comments: Accepted by ACM International Conference on Management of Data (SIGMOD '26)
Subjects: Cryptography and Security (cs.CR)
[84]  arXiv:2512.06172 [pdf, ps, other]
Title: DEFEND: Poisoned Model Detection and Malicious Client Exclusion Mechanism for Secure Federated Learning-based Road Condition Classification
Comments: Accepted to the 41st ACM/SIGAPP Symposium on Applied Computing (SAC 2026)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[85]  arXiv:2512.06155 [pdf, ps, other]
Title: Sift or Get Off the PoC: Applying Information Retrieval to Vulnerability Research with SiftRank
Authors: Caleb Gross
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[86]  arXiv:2512.06048 [pdf, ps, other]
Title: The Road of Adaptive AI for Precision in Cybersecurity
Authors: Sahil Garg
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Machine Learning (cs.LG); Software Engineering (cs.SE)
[87]  arXiv:2512.06033 [pdf, ps, other]
Title: Sell Data to AI Algorithms Without Revealing It: Secure Data Valuation and Sharing via Homomorphic Encryption
Subjects: Cryptography and Security (cs.CR); General Economics (econ.GN)
[88]  arXiv:2512.07814 (cross-list from cs.SE) [pdf, ps, other]
Title: Understanding Privacy Risks in Code Models Through Training Dynamics: A Causal Approach
Comments: 21 pages, 8 figures
Subjects: Software Engineering (cs.SE); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[89]  arXiv:2512.07574 (cross-list from eess.IV) [pdf, ps, other]
Title: Precise Liver Tumor Segmentation in CT Using a Hybrid Deep Learning-Radiomics Framework
Subjects: Image and Video Processing (eess.IV); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[90]  arXiv:2512.07520 (cross-list from cs.AR) [pdf, ps, other]
Title: aLEAKator: HDL Mixed-Domain Simulation for Masked Hardware \& Software Formal Verification
Authors: Noé Amiot (ALSOC), Quentin L. Meunier (ALSOC), Karine Heydemann (ALSOC), Emmanuelle Encrenaz (ALSOC)
Subjects: Hardware Architecture (cs.AR); Cryptography and Security (cs.CR); Symbolic Computation (cs.SC)
[91]  arXiv:2512.07368 (cross-list from cs.SE) [pdf, ps, other]
Title: Challenges in Developing Secure Software -- Results of an Interview Study in the German Software Industry
Comments: This paper includes 6 pages, 1 table, 1 figure. It is an English translation of our paper published in the German journal "Softwaretechnik Trends": ISSN 0720-8928, vol. 45, no. 4, pp. 2-7, year 2025
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[92]  arXiv:2512.07247 (cross-list from cs.CV) [pdf, ps, other]
Title: AdLift: Lifting Adversarial Perturbations to Safeguard 3D Gaussian Splatting Assets Against Instruction-Driven Editing
Comments: 40 pages, 34 figures, 18 tables
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[93]  arXiv:2512.07228 (cross-list from cs.CV) [pdf, ps, other]
Title: Towards Robust Protective Perturbation against DeepFake Face Swapping
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[94]  arXiv:2512.06971 (cross-list from cs.LG) [pdf, ps, other]
Title: Prediction with Expert Advice under Local Differential Privacy
Comments: 19 pages, 3 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (stat.ML)
[95]  arXiv:2512.06925 (cross-list from cs.LG) [pdf, ps, other]
Title: Deep Reinforcement Learning for Phishing Detection with Transformer-Based Semantic Features
Authors: Aseer Al Faisal
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[96]  arXiv:2512.06906 (cross-list from cs.SE) [pdf, ps, other]
Title: MINES: Explainable Anomaly Detection through Web API Invariant Inference
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR); Databases (cs.DB); Machine Learning (cs.LG)
[97]  arXiv:2512.06716 (cross-list from cs.AI) [pdf, ps, other]
Title: Cognitive Control Architecture (CCA): A Lifecycle Supervision Framework for Robustly Aligned AI Agents
Subjects: Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[98]  arXiv:2512.06304 (cross-list from eess.AS) [pdf, ps, other]
Title: Degrading Voice: A Comprehensive Overview of Robust Voice Conversion Through Input Manipulation
Subjects: Audio and Speech Processing (eess.AS); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Sound (cs.SD)
[99]  arXiv:2512.06243 (cross-list from cs.LG) [pdf, ps, other]
Title: Quantization Blindspots: How Model Compression Breaks Backdoor Defenses
Authors: Rohan Pandey, Eric Ye
Comments: 10 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[100]  arXiv:2512.06123 (cross-list from cs.SE) [pdf, ps, other]
Title: Toward Patch Robustness Certification and Detection for Deep Learning Systems Beyond Consistent Samples
Comments: accepted by IEEE Transactions on Reliability; extended technical report
Subjects: Software Engineering (cs.SE); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)

Mon, 8 Dec 2025

[101]  arXiv:2512.05951 [pdf, ps, other]
Title: Trusted AI Agents in the Cloud
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Multiagent Systems (cs.MA)
[102]  arXiv:2512.05745 [pdf, ps, other]
Title: ARGUS: Defending Against Multimodal Indirect Prompt Injection via Steering Instruction-Following Behavior
Subjects: Cryptography and Security (cs.CR); Multimedia (cs.MM)
[103]  arXiv:2512.05707 [pdf, ps, other]
Title: Evaluating Concept Filtering Defenses against Child Sexual Abuse Material Generation by Text-to-Image Models
Subjects: Cryptography and Security (cs.CR)
[104]  arXiv:2512.05518 [pdf, ps, other]
Title: Matching Ranks Over Probability Yields Truly Deep Safety Alignment
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[105]  arXiv:2512.05485 [pdf, ps, other]
Title: TeleAI-Safety: A comprehensive LLM jailbreaking benchmark towards attacks, defenses, and evaluations
Subjects: Cryptography and Security (cs.CR)
[106]  arXiv:2512.05459 [pdf, ps, other]
Title: PrivCode: When Code Generation Meets Differential Privacy
Comments: Accepted at NDSS 2026; code available at this https URL
Subjects: Cryptography and Security (cs.CR)
[107]  arXiv:2512.05374 [pdf, ps, other]
Title: Please Don't Kill My Vibe: Empowering Agents with Data Flow Control
Comments: 7 pages, 7 figures, CIDR 2026
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Databases (cs.DB)
[108]  arXiv:2512.05321 [pdf, ps, other]
Title: A Practical Honeypot-Based Threat Intelligence Framework for Cyber Defence in the Cloud
Comments: 6 pages
Subjects: Cryptography and Security (cs.CR)
[109]  arXiv:2512.05288 [pdf, ps, other]
Title: Beyond Detection: A Comprehensive Benchmark and Study on Representation Learning for Fine-Grained Webshell Family Classification
Authors: Feijiang Han
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[110]  arXiv:2512.04429 (cross-list from quant-ph) [pdf, ps, other]
Title: Combined Quantum and Post-Quantum Security Performance Under Finite Keys
Comments: 10 pages, 5 figures, 1 table
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[111]  arXiv:2509.18874 (cross-list from cs.HC) [pdf, ps, other]
Title: When Ads Become Profiles: Uncovering the Invisible Risk of Web Advertising at Scale with LLMs
Subjects: Human-Computer Interaction (cs.HC); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computers and Society (cs.CY)

Fri, 5 Dec 2025

[112]  arXiv:2512.05065 [pdf, ps, other]
Title: Personalizing Agent Privacy Decisions via Logical Entailment
Subjects: Cryptography and Security (cs.CR)
[113]  arXiv:2512.04950 [pdf, ps, other]
Title: Opacity problems in multi-energy timed automata
Comments: This is the author version (extended with all proofs) of the manuscript of the same name published in the proceedings of the 41st ACM/SIGAPP Symposium on Applied Computing (SAC 2026)
Subjects: Cryptography and Security (cs.CR)
[114]  arXiv:2512.04908 [pdf, ps, other]
Title: Logic-Driven Cybersecurity: A Novel Framework for System Log Anomaly Detection using Answer Set Programming
Comments: Submitted to FLOPS 2026
Subjects: Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)
[115]  arXiv:2512.04855 [pdf, ps, other]
Title: A Novel Trust-Based DDoS Cyberattack Detection Model for Smart Business Environments
Comments: 22 Pages
Journal-ref: International Journal of Network Security & Its Applications (IJNSA) Vol.17, No.5/6, November 2025
Subjects: Cryptography and Security (cs.CR)
[116]  arXiv:2512.04841 [pdf, ps, other]
Title: SoK: a Comprehensive Causality Analysis Framework for Large Language Model Security
Authors: Wei Zhao, Zhe Li, Jun Sun
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[117]  arXiv:2512.04675 [pdf, ps, other]
Title: Cryptanalysis of Gleeok-128
Comments: 44 pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[118]  arXiv:2512.04668 [pdf, ps, other]
Title: Topology Matters: Measuring Memory Leakage in Multi-Agent LLMs
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[119]  arXiv:2512.04611 [pdf, ps, other]
Title: PBFuzz: Agentic Directed Fuzzing for PoV Generation
Comments: 24 pages, 8 figures
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[120]  arXiv:2512.04580 [pdf, ps, other]
Title: CryptoTensors: A Light-Weight Large Language Model File Format for Highly-Secure Model Distribution
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[121]  arXiv:2512.04436 [pdf, ps, other]
Title: ReFuzz: Reusing Tests for Processor Fuzzing with Contextual Bandits
Comments: To be published in the proceedings of the Network and Distributed System Security (NDSS) Symposium, 2026
Subjects: Cryptography and Security (cs.CR)
[122]  arXiv:2512.04368 [pdf, ps, other]
Title: AutoGuard: A Self-Healing Proactive Security Layer for DevSecOps Pipelines Using Reinforcement Learning
Comments: Accepted and Presented at 1st IEEE Uttar Pradesh Section Women in Engineering International Conference on Electrical Electronics and Computer Engineering (UPWIECON 2025) organized by NIELIT Dehradun held during 30th 31st October 2025
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Performance (cs.PF)
[123]  arXiv:2512.04338 [pdf, ps, other]
Title: One Detector Fits All: Robust and Adaptive Detection of Malicious Packages from PyPI to Enterprises
Comments: Proceedings of the 2025 Annual Computer Security Applications Conference (ACSAC' 25), December 8-12, 2025, Honolulu, Hawaii, USA
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[124]  arXiv:2512.04260 [pdf, ps, other]
Title: Breaking Isolation: A New Perspective on Hypervisor Exploitation via Cross-Domain Attacks
Subjects: Cryptography and Security (cs.CR)
[125]  arXiv:2512.04259 [pdf, ps, other]
Title: WildCode: An Empirical Analysis of Code Generated by ChatGPT
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[126]  arXiv:2512.04254 [pdf, ps, other]
Title: Hey GPT-OSS, Looks Like You Got It -- Now Walk Me Through It! An Assessment of the Reasoning Language Models Chain of Thought Mechanism for Digital Forensics
Comments: Accept at DFRWS EU 2026
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[127]  arXiv:2512.04237 [pdf, ps, other]
Title: Primitive Vector Cipher(PVC): A Hybrid Encryption Scheme based on the Vector Computational Diffie-Hellman (V-CDH) Problem
Comments: Submitted for publication. 19 pages
Subjects: Cryptography and Security (cs.CR)
[128]  arXiv:2512.04129 [pdf, ps, other]
Title: Tipping the Dominos: Topology-Aware Multi-Hop Attacks on LLM-Based Multi-Agent Systems
Subjects: Cryptography and Security (cs.CR)
[129]  arXiv:2512.04120 [pdf, ps, other]
Title: Towards Contextual Sensitive Data Detection
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Computers and Society (cs.CY); Databases (cs.DB); Information Retrieval (cs.IR)
[130]  arXiv:2512.05069 (cross-list from cs.LG) [pdf, ps, other]
Title: Hybrid Quantum-Classical Autoencoders for Unsupervised Network Intrusion Detection
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[131]  arXiv:2512.04785 (cross-list from cs.AI) [pdf, ps, other]
Title: ASTRIDE: A Security Threat Modeling Platform for Agentic-AI Applications
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[132]  arXiv:2512.04590 (cross-list from cs.LG) [pdf, ps, other]
Title: Exploiting ftrace's function_graph Tracer Features for Machine Learning: A Case Study on Encryption Detection
Comments: Conference paper presented at AICCSA 2025
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[133]  arXiv:2512.04106 (cross-list from cs.SE) [pdf, ps, other]
Title: Retrieval-Augmented Few-Shot Prompting Versus Fine-Tuning for Code Vulnerability Detection
Comments: Accepted in the 3rd International Conference on Foundation and Large Language Models (FLLM2025)
Subjects: Software Engineering (cs.SE); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[ total of 133 entries: 1-100 | 54-133 ]
[ showing 100 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2512, contact, help  (Access key information)