• Home
  • Search
  • Browse Collections
  • My Account
  • About
  • DC Network Digital Commons Network™
Skip to main content
  • Home
  • About
  • FAQ
  • My Account
Beadle Scholar Dakota State University
  • Collections
  • Publications
  • Student Research

    Content Posted in 2026

    PDF

    A Capability Maturity Model for Artificial Intelligence Integration in Supply Chain Management, Lordt Becklines

    PDF

    Adaptive and Scalable Edge-Based Weed Classification Through Distilled Mixture of Experts And Metric Learning, Abderrezak Allalen

    PDF

    Advancing Cybersecurity Assurance: A Novel Outcome-Based Approach for Evaluating Cybersecurity Controls, Yousuf M. Muhammad

    PDF

    AI and Radiology: Exploring People, Process, and Technology through a Meta-Analysis, Cherie Noteboom, Sai Mounika Chintalapudi, and Vahini Atluri

    PDF

    AI-SCM CMM: A Capability Maturity Model for Artificial Intelligence Integration in Supply Chain Management, Lordt Becklines, Omar F. El-Gayar, Patti Brooks, and Insu Park

    PDF

    An Attack-Centric Approach to Security, Privacy, and Legal Challenges in Virtual Healthcare, Suvineetha Herath

    Link

    A Novel Approach to Quantum-Resistant Selective Encryption for Agricultural Sensors with Limited Resources, Aditya Jagatha, Akshay Kappala, Mahesh Kamepalli, Varghese Vaidyan, Eric Yocam, and Yong Wang

    PDF

    A Quantum Quandary: Does Algorithmic Complexity Inherently Diminish Security, Chinyere Isaac-Heslop

    Link

    A robust adversarial ensemble with causal (feature interaction) interpretations for image classification, Chunheng Zeng, Pierluigi Pisu, Gurcan Comert, Negash Begashaw, Varghese Vaidyan, and Nina Hubig

    Link

    Assessing Evasion Attacks on Tree-Based Machine Learning Models: Supervised vs. Unsupervised Approaches, Carson Koball, Yong Wang, Varghese Vaidyan, and John Hastings

    PDF

    A systematic literature review of AI, education, and change in radiology practice, Cherie Noteboom, Vahini Atluri, and Sai Mounika Chintalapudi

    PDF

    A systematic literature review on AI chatbots in automating customer support for e-commerce, Sai Mounika Chintalapudi, Omar F. El-Gayar, and Cherie Noteboom

    Link

    Automatic dependent surveillance: attacks, challenges and countermeasures, Andrew Morrow and Varghese Vaidyan

    Link

    Autonomous Penetration Testing: Solving Capture-the-Flag Challenges with LLMs, Isabelle Bakker and John Hastings

    Link

    Balancing Security and Correctness in Code Generation: An Empirical Study on Commercial Large Language Models PDF, Gavin Black, Bhaskar P. Rimal Dr., and Varghese Vaidyan

    PDF

    Bardella and the Curse of Silence, Karl Lexvold

    PDF

    Building Explainable RAG-based Clinical Decision Support, Irina Pecherskaia, Jason Mixon, Andrew Behrens, and Andrew Smith

    PDF

    C2PROBER: A Framework to Identify and Label C2 Frameworks, Subash Adhikari

    PDF

    Classification of Images Derived from Variable-Length N-Grams Representing Inherent Entropic Boundaries, Gregory Sunderland

    PDF

    Comparative Analysis of Shipping Costs Across Multiple Routes Using FedEx API Data, Valerija Curikova and Andrew Kramer

    PDF

    Constructing Information Systems: Technology Frames and Career Interest Among Middle School Students, Sai Mounika Chintalapudi and Cherie Noteboom

    Link

    Deep Learning in Computer Programming Courses: Designing Related Syllabus in the IS Curriculum, Mohammad Tafiqur Rahman

    PDF

    Detection of Malicious Office Document Macros Using Large Language Models, Mahesh Kalappattil

    PDF

    Do Developers Read Type Information? An Eye-Tracking Study on TypeScript, Samuel W. Flint, Robert Dyer, and Bonita Sharif

    PDF

    Evaluating and Proposing the Best Practices for DevSecOps: A Research-Based Analysis, Jayaprakash Reddy Cheenepalli

    Link

    Evaluating Large Language Models for Enhanced Fuzzing: An Analysis Framework for LLM-Driven Seed Generation, Gavin Black, Varghese Vaidyan, and Gurcan Comert

    PDF

    Evaluating the Impact of AI and Blockchain for Supply Chain Risk Mitigation: A Predictive Analytics Approach, Sai Neelima Seru and David Zeng

    PDF

    Evaluating the Reliability and Equity Implication of Acute Hospital Readmission Metrics in New Zealand, Christopher D. Elce, Martinson Ofori, and Andrew Behrens

    PDF

    EXAIM: A Real-Time Explainability Middleware for Multi-Agent Clinical Decision Support Systems, Abem Woldesenbet and Andrew Behrens

    Link

    Exploring LoRaWAN Class B and Class C Devices: Performance Analysis and Parameter Optimization Strategies, Aditya Jagatha, Bhaskar P. Rimal Dr., Varghese Vaidyan, and Yong Wang

    Link

    Exploring Machine Learning with FNNs for Identifying Modified DGAs through Noise and Linear Recursive Sequences (LRS), Anthony Rizi, Eric Yocam, Varghese Vaidyan, and Yong Wang

    PDF

    From imaging to insights: AI’s role in radiology transformation through 2PDT and 4Aim, Cherie Noteboom, Sai Mounika Chintalapudi, and Vahini Atluri

    Link

    From LLMs to Randomness: Analyzing Program Input Efficacy With Resource and Language Metrics, Gavin Black, Eric Yocam, Varghese Vaidyan, Gurcan Comert, and Yong Wang

    PDF

    Hardening the OSv Unikernel with Efficient Address Randomization: Design and Performance Evaluation, Alex Wollman and John Hastings

    PDF

    Hardware Side-Channel Security of Quantum System Controllers: A Timing Attack Perspective, Darpan Basnet, Anshu Bista, and Varghese Vaidyan

    Link

    If You Have Nothing to Hide, You Still Have Something to Fear: How Libraries Can Support Alternative Information Channels, Abbie Steuhm

    PDF

    Integrating Artificial Intelligence into Radiology: A Meta-Analysis of Educational Interventions and Technological Trends, Cherie Noteboom, Vahini Atluri, and Sai Mounika Chintalapudi

    PDF

    Interactions of Bad Actors with Honeypots, Maryam Aliyeva and Andrew Kramer

    Link

    Interpreting Office Document Macros with Bi-Directional Transformer Models, Mahesh Kalappattil, Varghese Vaidyan, Gurcan Comert, and Yong Wang

    Link

    Introducing Axlerod: An LLM-Based Chatbot for Assisting Independent Insurance Agents, Adam Bradley, John Hastings, and Khandaker Mamun Ahmed

    Link

    Leveraging Internet Speed Tests as a Covert Channel for Data Exfiltration, Janessa Palmieri and Andrew Kramer

    Link

    LibLMFuzz: LLM-Augmented Fuzz Target Generation for Black-Box Libraries, Ian Hardgrove and John Hastings

    PDF

    LLM Security Agents: Harness Design and Static vs Dynamic Challenges, Joe Hammond, Eddie French, and Austin O'Brien

    PDF

    Logging and Telemetry Gap Identification of Remote Vulnerability Exploitation, ryan Holeman

    Link

    Machine Learning Security: Threat Model, Attacks, and Challenges, Carson Koball, Yong Wang, Bhaskar P. Rimal Dr., and Varghese Vaidyan

    PDF

    Mapping the Intersection of Blockchain and Project Management: A Bibliometric Review, Cherie Noteboom, David Zeng, Sai Neelima Seru, and Sai Mounika Chintalapudi

    PDF

    Mid-Generation Jailbreaks in Open-Source LLMs Using a Pause-and-Edit Attack, Aman Singh, Komal More, Samyam Aryal, and Mark Spanier

    Link

    Multi-level Post Quantum Encryption for Images with Quantum Fourier Transform, Baby Vennela Kothakonda, Nathaniel Ketema, Varghese Vaidyan, Ashley L. Podhradsky, Eric Yocam, and Yong Wang

    Link

    On the Effectiveness of Automatic Code Generation for Synthetic Dataset Creation, Josh Mitchell, Varghese Vaidyan, and Yong Wang

    PDF

    Packet Scheduling in Mixed Traffic Networks: A Simulation Study Using NS-3, Landon Mohr

    PDF

    Postmortem Analysis of Israel's 7 October 2023 Intelligence Failure, Emily Helgeson and William Bendix

    PDF

    Post-Quantum Cryptography Secure Communication, IoT, and Blockchain, Nidhish Bhanse and Mark Spanier

    PDF

    Prioritizing Privacy in Artificial Intelligence: A Practitioner-Grounded, Layered Framework, Prince Boadi

    PDF

    Privacy in Flux: A 35-Year Review of Trends, Legal Evolution, and Emerging Challenges, Kong Phang and Jihene Kaabi

    PDF

    Privacy-Preserving Synthetic Data Generation for Federated Learning in Imbalanced Credit Card Fraud Detection: A Comparative Analysis of SMOTE vs. GAN Approaches, Muhammad Bhutta and Abid Mehmood

    PDF

    PyRHOH: A meta-learning analysis framework for determining the impact of compilation on malicious JavaScript identification, Eli Fulkerson, Eric Yocam, Varghese Vaidyan, Mahesh Kamepalli, Yong Wang, and Gurcan Comert

    PDF

    Quantum Adversarial Machine Learning and Defense Strategies: Challenges and Opportunities, Eric Yocam, Anthony Rizi, Mahesh Kamepalli, Varghese Vaidyan, Yong Wang, and Gurcan Comert

    PDF

    Romance Scam Reporting and Support: Help-Seeking Timing, Trust, and Escalation, LD Herrera

    Link

    Scattering phase shift in quantum mechanics on quantum computers, Peng Guo, Paul LeVan, Frank Lee, and Yong Zhao

    PDF

    Secure-Home: Detect and Redact PII, Hajar Niroomand and Omar F. El-Gayar

    PDF

    Small-Object Detection at the Edge: A Pareto-Efficient Benchmark of Lightweight YOLO Models on UAV and Overhead Datasets, Bijay Shakya, Omar F. El-Gayar, Jihene Kaabi Dr., and Khandaker Mamun Ahmed

    PDF

    Streamlining Literacy Assessment, Sheila Mulder, Katie Anderson, and Samuel W. Flint

    Link

    The case for contextual copyleft: licensing open-source training data and generative AI, Grant Shanklin, Emmie Hine, Claudio Novelli, Tyler Schroder, and Luciano Floridi

    Link

    The Roles and Implications of Black Swan Events in Tackling Deep Uncertainty in Relief Distribution: A Collective Case Study, Mohammad Tafiqur Rahman and Maung Kyaw Sein

    Link

    The Underpromoter's Riddle: A Computational Analysis of the Knight Promotion in Chess, Yelarys Seidin

    PDF

    Towards an Artifact to Assess Differential Privacy in Microdata Streams, Sean McElroy, Varghese Vaidyan, and Gurcan Comert

    Link

    Towards Secure Healthcare: Intrusion Detection with GraphSAGE-Based Meta-Learning and Hybrid Deep Models, Abel Degu, Nnaemeka Igwe, Youssef Harrath, and Cole Drumheller

    PDF

    Using a Spherical Speaker to Explore Sound, David Provance

 
 
 

Browse

  • Collections
  • Exhibits
  • Disciplines
  • Authors

Search

Advanced Search

  • Notify me via email or RSS

Author Corner

  • Author FAQ
  • Policies & Submission Guidelines
  • Submit Research
 
Elsevier - Digital Commons

Home | About | FAQ | My Account | Accessibility Statement

Privacy Copyright