🏛️ The Cryptography & Security Crypt
cs.CR: Where Cryptography & Security papers rest without their code.
22949
Total Papers
20484
No Code
114
Twilight
2351
Has Code
10.2%
Survival Rate
R.I.P.
👻
Ghosted
R.I.P.
👻
Ghosted
Collecting Telemetry Data Privately
R.I.P.
👻
Ghosted
Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing
R.I.P.
💀
404 Not Found
Backdoor Learning: A Survey
R.I.P.
👻
Ghosted
On the (Statistical) Detection of Adversarial Examples
R.I.P.
👻
Ghosted
DolphinAtack: Inaudible Voice Commands
R.I.P.
👻
Ghosted
Evaluating Fuzz Testing
R.I.P.
👻
Ghosted
IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT
R.I.P.
👻
Ghosted
Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features
R.I.P.
👻
Ghosted
A Survey of Network-based Intrusion Detection Data Sets
R.I.P.
👻
Ghosted
BlockChain: A distributed solution to automotive security and privacy
R.I.P.
👻
Ghosted
Casper the Friendly Finality Gadget
R.I.P.
👻
Ghosted
Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection
R.I.P.
👻
Ghosted
Machine Learning DDoS Detection for Consumer Internet of Things Devices
R.I.P.
👻
Ghosted
Finding The Greedy, Prodigal, and Suicidal Contracts at Scale
R.I.P.
👻
Ghosted
Optimal Selfish Mining Strategies in Bitcoin
R.I.P.
👻
Ghosted
Software Grand Exposure: SGX Cache Attacks Are Practical
R.I.P.
👻
Ghosted
Machine Learning in IoT Security: Current Solutions and Future Challenges
R.I.P.
👻
Ghosted
Smart Contract-Based Access Control for the Internet of Things
R.I.P.
👻
Ghosted
Flush+Flush: A Fast and Stealthy Cache Attack
R.I.P.
👻
Ghosted
Prompt Injection attack against LLM-integrated Applications
R.I.P.
👻
Ghosted
IoT Security Techniques Based on Machine Learning
R.I.P.
👻
Ghosted
Blockchain Technologies for the Internet of Things: Research Issues and Challenges
R.I.P.
👻
Ghosted