Content Posted in 2026
Adaptive and Scalable Edge-Based Weed Classification Through Distilled Mixture of Experts And Metric Learning, Abderrezak Allalen
Advancing Cybersecurity Assurance: A Novel Outcome-Based Approach for Evaluating Cybersecurity Controls, Yousuf M. Muhammad
An Attack-Centric Approach to Security, Privacy, and Legal Challenges in Virtual Healthcare, Suvineetha Herath
A Novel Approach to Quantum-Resistant Selective Encryption for Agricultural Sensors with Limited Resources, Aditya Jagatha, Akshay Kappala, Mahesh Kamepalli, Varghese Vaidyan, Eric Yocam, and Yong Wang
A Quantum Quandary: Does Algorithmic Complexity Inherently Diminish Security, Chinyere Isaac-Heslop
A robust adversarial ensemble with causal (feature interaction) interpretations for image classification, Chunheng Zeng, Pierluigi Pisu, Gurcan Comert, Negash Begashaw, Varghese Vaidyan, and Nina Hubig
Assessing Evasion Attacks on Tree-Based Machine Learning Models: Supervised vs. Unsupervised Approaches, Carson Koball, Yong Wang, Varghese Vaidyan, and John Hastings
Automatic dependent surveillance: attacks, challenges and countermeasures, Andrew Morrow and Varghese Vaidyan
Autonomous Penetration Testing: Solving Capture-the-Flag Challenges with LLMs, Isabelle Bakker and John Hastings
Balancing Security and Correctness in Code Generation: An Empirical Study on Commercial Large Language Models PDF, Gavin Black, Bhaskar P. Rimal Dr., and Varghese Vaidyan
C2PROBER: A Framework to Identify and Label C2 Frameworks, Subash Adhikari
Deep Learning in Computer Programming Courses: Designing Related Syllabus in the IS Curriculum, Mohammad Tafiqur Rahman
Detection of Malicious Office Document Macros Using Large Language Models, Mahesh Kalappattil
Do Developers Read Type Information? An Eye-Tracking Study on TypeScript, Samuel W. Flint, Robert Dyer, and Bonita Sharif
Evaluating and Proposing the Best Practices for DevSecOps: A Research-Based Analysis, Jayaprakash Reddy Cheenepalli
Evaluating Large Language Models for Enhanced Fuzzing: An Analysis Framework for LLM-Driven Seed Generation, Gavin Black, Varghese Vaidyan, and Gurcan Comert
Exploring LoRaWAN Class B and Class C Devices: Performance Analysis and Parameter Optimization Strategies, Aditya Jagatha, Bhaskar P. Rimal Dr., Varghese Vaidyan, and Yong Wang
Exploring Machine Learning with FNNs for Identifying Modified DGAs through Noise and Linear Recursive Sequences (LRS), Anthony Rizi, Eric Yocam, Varghese Vaidyan, and Yong Wang
From LLMs to Randomness: Analyzing Program Input Efficacy With Resource and Language Metrics, Gavin Black, Eric Yocam, Varghese Vaidyan, Gurcan Comert, and Yong Wang
If You Have Nothing to Hide, You Still Have Something to Fear: How Libraries Can Support Alternative Information Channels, Abbie Steuhm
Interpreting Office Document Macros with Bi-Directional Transformer Models, Mahesh Kalappattil, Varghese Vaidyan, Gurcan Comert, and Yong Wang
Introducing Axlerod: An LLM-Based Chatbot for Assisting Independent Insurance Agents, Adam Bradley, John Hastings, and Khandaker Mamun Ahmed
Leveraging Internet Speed Tests as a Covert Channel for Data Exfiltration, Janessa Palmieri and Andrew Kramer
LibLMFuzz: LLM-Augmented Fuzz Target Generation for Black-Box Libraries, Ian Hardgrove and John Hastings
Logging and Telemetry Gap Identification of Remote Vulnerability Exploitation, ryan Holeman
Machine Learning Security: Threat Model, Attacks, and Challenges, Carson Koball, Yong Wang, Bhaskar P. Rimal Dr., and Varghese Vaidyan
Multi-level Post Quantum Encryption for Images with Quantum Fourier Transform, Baby Vennela Kothakonda, Nathaniel Ketema, Varghese Vaidyan, Ashley L. Podhradsky, Eric Yocam, and Yong Wang
On the Effectiveness of Automatic Code Generation for Synthetic Dataset Creation, Josh Mitchell, Varghese Vaidyan, and Yong Wang
Prioritizing Privacy in Artificial Intelligence: A Practitioner-Grounded, Layered Framework, Prince Boadi
Privacy in Flux: A 35-Year Review of Trends, Legal Evolution, and Emerging Challenges, Kong Phang and Jihene Kaabi
PyRHOH: A meta-learning analysis framework for determining the impact of compilation on malicious JavaScript identification, Eli Fulkerson, Eric Yocam, Varghese Vaidyan, Mahesh Kamepalli, Yong Wang, and Gurcan Comert
Quantum Adversarial Machine Learning and Defense Strategies: Challenges and Opportunities, Eric Yocam, Anthony Rizi, Mahesh Kamepalli, Varghese Vaidyan, Yong Wang, and Gurcan Comert
Small-Object Detection at the Edge: A Pareto-Efficient Benchmark of Lightweight YOLO Models on UAV and Overhead Datasets, Bijay Shakya, Omar F. El-Gayar, Jihene Kaabi Dr., and Khandaker Mamun Ahmed
The case for contextual copyleft: licensing open-source training data and generative AI, Grant Shanklin, Emmie Hine, Claudio Novelli, Tyler Schroder, and Luciano Floridi
The Roles and Implications of Black Swan Events in Tackling Deep Uncertainty in Relief Distribution: A Collective Case Study, Mohammad Tafiqur Rahman and Maung Kyaw Sein
Towards an Artifact to Assess Differential Privacy in Microdata Streams, Sean McElroy, Varghese Vaidyan, and Gurcan Comert
Towards Secure Healthcare: Intrusion Detection with GraphSAGE-Based Meta-Learning and Hybrid Deep Models, Abel Degu, Nnaemeka Igwe, Youssef Harrath, and Cole Drumheller