Skip to main content
CenXiv.org
This website is in trial operation, support us!
We gratefully acknowledge support from all contributors.
Contribute
Donate
cenxiv logo > cs.CR

Help | Advanced Search

Cryptography and Security

Authors and titles for August 2025

Total of 599 entries : 1-50 51-100 101-150 151-200 ... 551-599
Showing up to 50 entries per page: fewer | more | all
[1] arXiv:2508.00293 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: ranDecepter: Real-time Identification and Deterrence of Ransomware Attacks
Title: ranDecepter:实时识别和阻止勒索软件攻击
Md Sajidul Islam Sajid, Jinpeng Wei, Ehab Al-Shaer
Comments: Accepted at IEEE Conference on Communications and Network Security (CNS) 2025
Subjects: Cryptography and Security (cs.CR)
[2] arXiv:2508.00351 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Cryptanalysis of Isogeny-Based Quantum Money with Rational Points
Title: 基于有理点的同源量子货币密码分析
Hyeonhak Kim, Donghoe Heo, Seokhie Hong
Subjects: Cryptography and Security (cs.CR)
[3] arXiv:2508.00368 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Preliminary Investigation into Uncertainty-Aware Attack Stage Classification
Title: 不确定感知攻击阶段分类的初步研究
Alessandro Gaudenzi, Lorenzo Nodari, Lance Kaplan, Alessandra Russo, Murat Sensoy, Federico Cerutti
Comments: Proceedings for SPAIML2025 workshop, 26/10/2025 Bologna Italy, co-located with ECAI2025
Subjects: Cryptography and Security (cs.CR) ; Machine Learning (cs.LG)
[4] arXiv:2508.00434 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Accurate Latent Inversion for Generative Image Steganography via Rectified Flow
Title: 通过校正流进行生成图像隐写术的精确潜在反转
Yuqi Qian, Yun Cao, Meiyang Lv, Haocheng Fu
Subjects: Cryptography and Security (cs.CR)
[5] arXiv:2508.00478 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: CyGATE: Game-Theoretic Cyber Attack-Defense Engine for Patch Strategy Optimization
Title: CyGATE:用于补丁策略优化的博弈论网络攻击防御引擎
Yuning Jiang, Nay Oo, Qiaoran Meng, Lu Lin, Dusit Niyato, Zehui Xiong, Hoon Wei Lim, Biplab Sikdar
Subjects: Cryptography and Security (cs.CR) ; Artificial Intelligence (cs.AI)
[6] arXiv:2508.00555 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Activation-Guided Local Editing for Jailbreaking Attacks
Title: 激活引导的局部编辑用于越狱攻击
Jiecong Wang, Haoran Li, Hao Peng, Ziqian Zeng, Zihao Wang, Haohua Du, Zhengtao Yu
Subjects: Cryptography and Security (cs.CR) ; Artificial Intelligence (cs.AI) ; Computation and Language (cs.CL)
[7] arXiv:2508.00602 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: LeakSealer: A Semisupervised Defense for LLMs Against Prompt Injection and Leakage Attacks
Title: LeakSealer:一种针对提示注入和泄露攻击的LLM半监督防御方法
Francesco Panebianco, Stefano Bonfanti, Francesco Trovò, Michele Carminati
Comments: 22 pages, preprint
Subjects: Cryptography and Security (cs.CR) ; Artificial Intelligence (cs.AI) ; Machine Learning (cs.LG)
[8] arXiv:2508.00636 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: FedGuard: A Diverse-Byzantine-Robust Mechanism for Federated Learning with Major Malicious Clients
Title: FedGuard:具有主要恶意客户端的联邦学习多样拜占庭鲁棒机制
Haocheng Jiang, Hua Shen, Jixin Zhang, Willy Susilo, Mingwu Zhang
Subjects: Cryptography and Security (cs.CR) ; Distributed, Parallel, and Cluster Computing (cs.DC)
[9] arXiv:2508.00659 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Demo: TOSense -- What Did You Just Agree to?
Title: 演示:TOSense -- 你刚刚同意了什么?
Xinzhang Chen, Hassan Ali, Arash Shaghaghi, Salil S. Kanhere, Sanjay Jha
Comments: Accepted as a demonstration paper at IEEE LCN 2025
Subjects: Cryptography and Security (cs.CR) ; Computation and Language (cs.CL)
[10] arXiv:2508.00682 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Unveiling Dynamic Binary Instrumentation Techniques
Title: 揭示动态二进制插装技术
Oscar Llorente-Vazquez, Xabier Ugarte-Pedrero, Igor Santos-Grueiro, Pablo Garcia Bringas
Subjects: Cryptography and Security (cs.CR) ; Software Engineering (cs.SE)
[11] arXiv:2508.00756 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: LeakyCLIP: Extracting Training Data from CLIP
Title: LeakyCLIP:从CLIP中提取训练数据
Yunhao Chen, Shujie Wang, Xin Wang, Xingjun Ma
Subjects: Cryptography and Security (cs.CR)
[12] arXiv:2508.00840 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Quantum-Resistant RSA Modulus Decomposition via Adaptive Rényi Entropy Optimization
Title: 基于自适应瑞尼熵优化的抗量子RSA模分解
Ruopengyu Xu, Chenglian Liu
Comments: 11 pages , 2 tables
Subjects: Cryptography and Security (cs.CR) ; Number Theory (math.NT) ; Quantum Physics (quant-ph)
[13] arXiv:2508.00851 (cross-list from cs.CR) [cn-pdf, pdf, other]
Title: eBPF-Based Real-Time DDoS Mitigation for IoT Edge Devices
Title: 基于eBPF的物联网边缘设备实时DDoS缓解方法
Abdurrahman Tolay
Comments: 10 pages, 5 figures, includes evaluation on Docker and Raspberry Pi testbeds. Keywords: IoT Security, DDoS Mitigation, eBPF, XDP, Raspberry Pi. Submitted to IEEE Internet of Things Journal
Subjects: Cryptography and Security (cs.CR) ; Networking and Internet Architecture (cs.NI)
[14] arXiv:2508.00874 (cross-list from cs.CR) [cn-pdf, pdf, other]
Title: Implementasi dan Pengujian Polimorfisme pada Malware Menggunakan Dasar Payload Metasploit Framework
Title: 实现和测试使用Metasploit框架基础有效载荷的恶意软件多态性
Luqman Muhammad Zagi
Comments: Masters thesis, in Indonesian language
Subjects: Cryptography and Security (cs.CR)
[15] arXiv:2508.00910 (cross-list from cs.CR) [cn-pdf, pdf, other]
Title: Cyber-Zero: Training Cybersecurity Agents without Runtime
Title: 网络零:无需运行时的网络安全代理训练
Terry Yue Zhuo, Dingmin Wang, Hantian Ding, Varun Kumar, Zijian Wang
Comments: Public Link: https://github.com/amazon-science/cyber-zero
Subjects: Cryptography and Security (cs.CR) ; Computation and Language (cs.CL) ; Machine Learning (cs.LG)
[16] arXiv:2508.00934 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: How Cybersecurity Behaviors affect the Success of Darknet Drug Vendors: A Quantitative Analysis
Title: 如何影响暗网毒品供应商成功的网络安全行为:定量分析
Syon Balakrishnan, Aaron Grinberg
Comments: 24 pages, 7 figures, 9 tables
Subjects: Cryptography and Security (cs.CR) ; Computers and Society (cs.CY)
[17] arXiv:2508.00935 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Measuring Harmfulness of Computer-Using Agents
Title: 测量计算机使用代理的危害性
Aaron Xuxiang Tian, Ruofan Zhang, Janet Tang, Ji Wang, Tianyu Shi, Jiaxin Wen
Comments: 17 pages, 9 figures
Subjects: Cryptography and Security (cs.CR) ; Artificial Intelligence (cs.AI)
[18] arXiv:2508.00943 (cross-list from cs.CR) [cn-pdf, pdf, other]
Title: LLMs Can Covertly Sandbag on Capability Evaluations Against Chain-of-Thought Monitoring
Title: LLMs 可以在链式思维监控下隐秘地降低能力评估
Chloe Li, Mary Phuong, Noah Y. Siegel
Comments: 25 pages, 9 figures
Subjects: Cryptography and Security (cs.CR) ; Artificial Intelligence (cs.AI)
[19] arXiv:2508.01054 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Autonomous Penetration Testing: Solving Capture-the-Flag Challenges with LLMs
Title: 自主渗透测试:使用大语言模型解决夺旗挑战
Isabelle Bakker, John Hastings
Comments: 6 pages, 2 figures, 3 tables
Subjects: Cryptography and Security (cs.CR) ; Artificial Intelligence (cs.AI) ; Computers and Society (cs.CY)
[20] arXiv:2508.01059 (cross-list from cs.CR) [cn-pdf, pdf, other]
Title: Llama-3.1-FoundationAI-SecurityLLM-8B-Instruct Technical Report
Title: Llama-3.1-基础AI-安全LLM-8B-指令 技术报告
Sajana Weerawardhena, Paul Kassianik, Blaine Nelson, Baturay Saglam, Anu Vellore, Aman Priyanshu, Supriti Vijay, Massimo Aufiero, Arthur Goldblatt, Fraser Burch, Ed Li, Jianliang He, Dhruv Kedia, Kojin Oshiba, Zhouran Yang, Yaron Singer, Amin Karbasi
Comments: 34 pages - Technical Report
Subjects: Cryptography and Security (cs.CR) ; Artificial Intelligence (cs.AI)
[21] arXiv:2508.01062 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: CP-FREEZER: Latency Attacks against Vehicular Cooperative Perception
Title: CP-FREEZER:针对车辆协同感知的延迟攻击
Chenyi Wang, Ruoyu Song, Raymond Muller, Jean-Philippe Monteuuis, Z. Berkay Celik, Jonathan Petit, Ryan Gerdes, Ming Li
Subjects: Cryptography and Security (cs.CR) ; Computer Vision and Pattern Recognition (cs.CV)
[22] arXiv:2508.01084 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Provably Secure Retrieval-Augmented Generation
Title: 可证明安全的检索增强生成
Pengcheng Zhou, Yinglun Feng, Zhongliang Yang
Subjects: Cryptography and Security (cs.CR) ; Artificial Intelligence (cs.AI)
[23] arXiv:2508.01085 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: An Unconditionally Secure Encryption Scheme for IoBT Networks
Title: 一种针对IoBT网络的无条件安全加密方案
Mohammad Moltafet, Hamid R. Sadjadpour, Zouheir Rezki
Comments: 14 pages, 8 figures
Subjects: Cryptography and Security (cs.CR) ; Information Theory (cs.IT)
[24] arXiv:2508.01107 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: AdVAR-DNN: Adversarial Misclassification Attack on Collaborative DNN Inference
Title: AdVAR-DNN:协同DNN推理的对抗误分类攻击
Shima Yousefi, Motahare Mounesan, Saptarshi Debroy
Subjects: Cryptography and Security (cs.CR) ; Distributed, Parallel, and Cluster Computing (cs.DC)
[25] arXiv:2508.01144 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Beyond Algorithmic Proofs: Towards Implementation-Level Provable Security
Title: 超越算法证明:面向实现级的可证明安全
Jiahui Shang, Luning Zhang, Zhongxiang Zheng
Subjects: Cryptography and Security (cs.CR)
[26] arXiv:2508.01207 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Showcasing standards and approaches for cybersecurity, safety, and privacy issues in connected and autonomous vehicles
Title: 展示用于连接和自动驾驶车辆的网络安全、安全和隐私问题的标准和方法
Ricardo M. Czekster
Subjects: Cryptography and Security (cs.CR)
[27] arXiv:2508.01249 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: AgentArmor: Enforcing Program Analysis on Agent Runtime Trace to Defend Against Prompt Injection
Title: AgentArmor:在代理运行时轨迹上执行程序分析以防御提示注入
Peiran Wang, Yang Liu, Yunfei Lu, Yifeng Cai, Hongbo Chen, Qingyou Yang, Jie Zhang, Jue Hong, Ye Wu
Subjects: Cryptography and Security (cs.CR) ; Artificial Intelligence (cs.AI) ; Computation and Language (cs.CL) ; Machine Learning (cs.LG) ; Software Engineering (cs.SE)
[28] arXiv:2508.01276 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Defending Against Beta Poisoning Attacks in Machine Learning Models
Title: 防御机器学习模型中的Beta中毒攻击
Nilufer Gulciftci, M. Emre Gursoy
Subjects: Cryptography and Security (cs.CR) ; Artificial Intelligence (cs.AI)
[29] arXiv:2508.01280 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Blockchain security based on cryptography: a review
Title: 基于密码学的区块链安全:综述
Wenwen Zhou, Dongyang Lyu, Xiaoqi Li
Subjects: Cryptography and Security (cs.CR)
[30] arXiv:2508.01332 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: BlockA2A: Towards Secure and Verifiable Agent-to-Agent Interoperability
Title: BlockA2A:面向安全和可验证的代理间互操作性
Zhenhua Zou, Zhuotao Liu, Lepeng Zhao, Qiuyang Zhan
Comments: 43 pages
Subjects: Cryptography and Security (cs.CR) ; Artificial Intelligence (cs.AI)
[31] arXiv:2508.01343 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: UEChecker: Detecting Unchecked External Call Vulnerabilities in DApps via Graph Analysis
Title: UEChecker:通过图分析检测DApps中的未检查外部调用漏洞
Dechao Kong, Xiaoqi Li, Wenkai Li
Subjects: Cryptography and Security (cs.CR) ; Artificial Intelligence (cs.AI)
[32] arXiv:2508.01346 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: MultiCFV: Detecting Control Flow Vulnerabilities in Smart Contracts Leveraging Multimodal Deep Learning
Title: MultiCFV:利用多模态深度学习检测智能合约中的控制流漏洞
Hongli Peng, Xiaoqi Li, Wenkai Li
Subjects: Cryptography and Security (cs.CR)
[33] arXiv:2508.01351 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: NATLM: Detecting Defects in NFT Smart Contracts Leveraging LLM
Title: NATLM:利用LLM检测NFT智能合约中的缺陷
Yuanzheng Niu, Xiaoqi Li, Wenkai Li
Subjects: Cryptography and Security (cs.CR)
[34] arXiv:2508.01365 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: ConfGuard: A Simple and Effective Backdoor Detection for Large Language Models
Title: ConfGuard:一种简单有效的大型语言模型后门检测方法
Zihan Wang, Rui Zhang, Hongwei Li, Wenshu Fan, Wenbo Jiang, Qingchuan Zhao, Guowen Xu
Comments: Under review
Subjects: Cryptography and Security (cs.CR) ; Computation and Language (cs.CL)
[35] arXiv:2508.01371 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Prompt to Pwn: Automated Exploit Generation for Smart Contracts
Title: 提示到入侵:智能合约的自动化漏洞生成
Zeke Xiao, Yuekang Li, Qin Wang, Shiping Chen
Subjects: Cryptography and Security (cs.CR) ; Artificial Intelligence (cs.AI) ; Emerging Technologies (cs.ET)
[36] arXiv:2508.01422 (cross-list from cs.CR) [cn-pdf, pdf, other]
Title: AI-Driven Cybersecurity Threat Detection: Building Resilient Defense Systems Using Predictive Analytics
Title: 基于人工智能的网络安全威胁检测:使用预测分析构建弹性防御系统
Biswajit Chandra Das, M Saif Sartaz, Syed Ali Reza, Arat Hossain, Md Nasiruddin, Kanchon Kumar Bishnu, Kazi Sharmin Sultana, Sadia Sharmeen Shatyi, MD Azam Khan, Joynal Abed
Subjects: Cryptography and Security (cs.CR)
[37] arXiv:2508.01448 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Nakamoto Consensus from Multiple Resources
Title: 来自多种资源的Nakamoto共识
Mirza Ahad Baig, Christoph U. Günther, Krzysztof Pietrzak
Comments: Full version of the paper published at AFT25
Subjects: Cryptography and Security (cs.CR) ; Distributed, Parallel, and Cluster Computing (cs.DC)
[38] arXiv:2508.01451 (cross-list from cs.CR) [cn-pdf, pdf, other]
Title: Think Broad, Act Narrow: CWE Identification with Multi-Agent Large Language Models
Title: 广义思考,具体行动:基于多智能体大语言模型的CWE识别
Mohammed Sayagh, Mohammad Ghafari
Subjects: Cryptography and Security (cs.CR) ; Software Engineering (cs.SE)
[39] arXiv:2508.01469 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: VWAttacker: A Systematic Security Testing Framework for Voice over WiFi User Equipments
Title: VWAttacker:针对语音 over WiFi 用户设备的系统安全测试框架
Imtiaz Karim, Hyunwoo Lee, Hassan Asghar, Kazi Samin Mubasshir, Seulgi Han, Mashroor Hasan Bhuiyan, Elisa Bertino
Subjects: Cryptography and Security (cs.CR) ; Networking and Internet Architecture (cs.NI) ; Systems and Control (eess.SY)
[40] arXiv:2508.01479 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Reconstructing Trust Embeddings from Siamese Trust Scores: A Direct-Sum Approach with Fixed-Point Semantics
Title: 从孪生信任得分中重构信任嵌入:一种具有固定点语义的直接和方法
Faruk Alpay, Taylan Alpay, Bugra Kilictas
Comments: 22 pages, 3 figures, 1 table
Subjects: Cryptography and Security (cs.CR) ; Artificial Intelligence (cs.AI) ; Machine Learning (cs.LG) ; Social and Information Networks (cs.SI)
[41] arXiv:2508.01530 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: DALEQ -- Explainable Equivalence for Java Bytecode
Title: DALEQ -- Java字节码的可解释等价性
Jens Dietrich, Behnaz Hassanshahi
Subjects: Cryptography and Security (cs.CR)
[42] arXiv:2508.01542 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Leveraging Machine Learning for Botnet Attack Detection in Edge-Computing Assisted IoT Networks
Title: 利用机器学习在边缘计算辅助的物联网网络中检测僵尸网络攻击
Dulana Rupanetti, Naima Kaabouch
Subjects: Cryptography and Security (cs.CR) ; Artificial Intelligence (cs.AI)
[43] arXiv:2508.01595 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: BeDKD: Backdoor Defense based on Dynamic Knowledge Distillation and Directional Mapping Modulator
Title: BeDKD:基于动态知识蒸馏和方向映射调制器的后门防御
Zhengxian Wu, Juan Wen, Wanli Peng, Yinghan Zhou, Changtong dou, Yiming Xue
Subjects: Cryptography and Security (cs.CR)
[44] arXiv:2508.01605 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Practical, Generalizable and Robust Backdoor Attacks on Text-to-Image Diffusion Models
Title: 实用、可泛化且鲁棒的文本到图像扩散模型后门攻击
Haoran Dai, Jiawen Wang, Ruo Yang, Manali Sharma, Zhonghao Liao, Yuan Hong, Binghui Wang
Subjects: Cryptography and Security (cs.CR)
[45] arXiv:2508.01638 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Semantic Encryption: Secure and Effective Interaction with Cloud-based Large Language Models via Semantic Transformation
Title: 语义加密:通过语义转换与基于云的大语言模型安全有效地交互
Dong Chen, Tong Yang, Feipeng Zhai, Pengpeng Ouyang, Qidong Liu, Yafei Li, Chong Fu, Mingliang Xu
Subjects: Cryptography and Security (cs.CR) ; Artificial Intelligence (cs.AI)
[46] arXiv:2508.01647 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: DUP: Detection-guided Unlearning for Backdoor Purification in Language Models
Title: DUP:基于检测的遗忘方法用于语言模型中的后门净化
Man Hu, Yahui Ding, Yatao Yang, Liangyu Chen, Yanhao Jia, Shuai Zhao
Subjects: Cryptography and Security (cs.CR) ; Artificial Intelligence (cs.AI) ; Computation and Language (cs.CL)
[47] arXiv:2508.01655 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: JSidentify-V2: Leveraging Dynamic Memory Fingerprinting for Mini-Game Plagiarism Detection
Title: JSidentify-V2:利用动态记忆指纹技术进行小型游戏抄袭检测
Zhihao Li, Chaozheng Wang, Zongjie Li, Xinyong Peng, Qun Xia, Haochuan Lu, Ting Xiong, Shuzheng Gao, Cuiyun Gao, Shuai Wang, Yuetang Deng, Huafeng Ma
Comments: 12 pages
Subjects: Cryptography and Security (cs.CR) ; Software Engineering (cs.SE)
[48] arXiv:2508.01694 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Performance and Storage Analysis of CRYSTALS Kyber as a Post Quantum Replacement for RSA and ECC
Title: CRYSTALS Kyber作为RSA和ECC后量子替代方案的性能和存储分析
Nicolas Rodriguez-Alvarez (1), Fernando Rodriguez-Merino (2) ((1) IES Parquesol, Valladolid, Spain, (2) Department of Theoretical, Atomic and Optical Physics, University of Valladolid, Valladolid, Spain)
Subjects: Cryptography and Security (cs.CR) ; Performance (cs.PF)
[49] arXiv:2508.01714 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: A Provably Secure Network Protocol for Private Communication with Analysis and Tracing Resistance
Title: 一种具有可证明安全性的网络协议,用于私密通信并具有分析和追踪抵抗性
Chao Ge, Wei Yuan, Ge Chen, Yanbin Pan, Yuan Shen
Subjects: Cryptography and Security (cs.CR) ; Systems and Control (eess.SY)
[50] arXiv:2508.01750 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: LLM-Assisted Model-Based Fuzzing of Protocol Implementations
Title: 基于大语言模型的协议实现模型模糊测试
Changze Huang, Di Wang, Zhi Quan Zhou
Subjects: Cryptography and Security (cs.CR) ; Software Engineering (cs.SE)
Total of 599 entries : 1-50 51-100 101-150 151-200 ... 551-599
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack

京ICP备2025123034号