• Home
  • Search
  • Browse Collections
  • My Account
  • About
  • DC Network Digital Commons Network™
Skip to main content
  • Home
  • About
  • FAQ
  • My Account
Beadle Scholar Dakota State University
  • Collections
  • Publications
  • Student Research

    Content Posted in 2026

    PDF

    Adaptive and Scalable Edge-Based Weed Classification Through Distilled Mixture of Experts And Metric Learning, Abderrezak Allalen

    PDF

    Advancing Cybersecurity Assurance: A Novel Outcome-Based Approach for Evaluating Cybersecurity Controls, Yousuf M. Muhammad

    PDF

    An Attack-Centric Approach to Security, Privacy, and Legal Challenges in Virtual Healthcare, Suvineetha Herath

    Link

    A Novel Approach to Quantum-Resistant Selective Encryption for Agricultural Sensors with Limited Resources, Aditya Jagatha, Akshay Kappala, Mahesh Kamepalli, Varghese Vaidyan, Eric Yocam, and Yong Wang

    PDF

    A Quantum Quandary: Does Algorithmic Complexity Inherently Diminish Security, Chinyere Isaac-Heslop

    Link

    A robust adversarial ensemble with causal (feature interaction) interpretations for image classification, Chunheng Zeng, Pierluigi Pisu, Gurcan Comert, Negash Begashaw, Varghese Vaidyan, and Nina Hubig

    Link

    Assessing Evasion Attacks on Tree-Based Machine Learning Models: Supervised vs. Unsupervised Approaches, Carson Koball, Yong Wang, Varghese Vaidyan, and John Hastings

    Link

    Automatic dependent surveillance: attacks, challenges and countermeasures, Andrew Morrow and Varghese Vaidyan

    Link

    Autonomous Penetration Testing: Solving Capture-the-Flag Challenges with LLMs, Isabelle Bakker and John Hastings

    Link

    Balancing Security and Correctness in Code Generation: An Empirical Study on Commercial Large Language Models PDF, Gavin Black, Bhaskar P. Rimal Dr., and Varghese Vaidyan

    PDF

    C2PROBER: A Framework to Identify and Label C2 Frameworks, Subash Adhikari

    Link

    Deep Learning in Computer Programming Courses: Designing Related Syllabus in the IS Curriculum, Mohammad Tafiqur Rahman

    PDF

    Detection of Malicious Office Document Macros Using Large Language Models, Mahesh Kalappattil

    PDF

    Do Developers Read Type Information? An Eye-Tracking Study on TypeScript, Samuel W. Flint, Robert Dyer, and Bonita Sharif

    PDF

    Evaluating and Proposing the Best Practices for DevSecOps: A Research-Based Analysis, Jayaprakash Reddy Cheenepalli

    Link

    Evaluating Large Language Models for Enhanced Fuzzing: An Analysis Framework for LLM-Driven Seed Generation, Gavin Black, Varghese Vaidyan, and Gurcan Comert

    Link

    Exploring LoRaWAN Class B and Class C Devices: Performance Analysis and Parameter Optimization Strategies, Aditya Jagatha, Bhaskar P. Rimal Dr., Varghese Vaidyan, and Yong Wang

    Link

    Exploring Machine Learning with FNNs for Identifying Modified DGAs through Noise and Linear Recursive Sequences (LRS), Anthony Rizi, Eric Yocam, Varghese Vaidyan, and Yong Wang

    Link

    From LLMs to Randomness: Analyzing Program Input Efficacy With Resource and Language Metrics, Gavin Black, Eric Yocam, Varghese Vaidyan, Gurcan Comert, and Yong Wang

    Link

    If You Have Nothing to Hide, You Still Have Something to Fear: How Libraries Can Support Alternative Information Channels, Abbie Steuhm

    Link

    Interpreting Office Document Macros with Bi-Directional Transformer Models, Mahesh Kalappattil, Varghese Vaidyan, Gurcan Comert, and Yong Wang

    Link

    Introducing Axlerod: An LLM-Based Chatbot for Assisting Independent Insurance Agents, Adam Bradley, John Hastings, and Khandaker Mamun Ahmed

    Link

    Leveraging Internet Speed Tests as a Covert Channel for Data Exfiltration, Janessa Palmieri and Andrew Kramer

    Link

    LibLMFuzz: LLM-Augmented Fuzz Target Generation for Black-Box Libraries, Ian Hardgrove and John Hastings

    PDF

    Logging and Telemetry Gap Identification of Remote Vulnerability Exploitation, ryan Holeman

    Link

    Machine Learning Security: Threat Model, Attacks, and Challenges, Carson Koball, Yong Wang, Bhaskar P. Rimal Dr., and Varghese Vaidyan

    Link

    Multi-level Post Quantum Encryption for Images with Quantum Fourier Transform, Baby Vennela Kothakonda, Nathaniel Ketema, Varghese Vaidyan, Ashley L. Podhradsky, Eric Yocam, and Yong Wang

    Link

    On the Effectiveness of Automatic Code Generation for Synthetic Dataset Creation, Josh Mitchell, Varghese Vaidyan, and Yong Wang

    PDF

    Prioritizing Privacy in Artificial Intelligence: A Practitioner-Grounded, Layered Framework, Prince Boadi

    PDF

    Privacy in Flux: A 35-Year Review of Trends, Legal Evolution, and Emerging Challenges, Kong Phang and Jihene Kaabi

    PDF

    PyRHOH: A meta-learning analysis framework for determining the impact of compilation on malicious JavaScript identification, Eli Fulkerson, Eric Yocam, Varghese Vaidyan, Mahesh Kamepalli, Yong Wang, and Gurcan Comert

    PDF

    Quantum Adversarial Machine Learning and Defense Strategies: Challenges and Opportunities, Eric Yocam, Anthony Rizi, Mahesh Kamepalli, Varghese Vaidyan, Yong Wang, and Gurcan Comert

    PDF

    Small-Object Detection at the Edge: A Pareto-Efficient Benchmark of Lightweight YOLO Models on UAV and Overhead Datasets, Bijay Shakya, Omar F. El-Gayar, Jihene Kaabi Dr., and Khandaker Mamun Ahmed

    Link

    The case for contextual copyleft: licensing open-source training data and generative AI, Grant Shanklin, Emmie Hine, Claudio Novelli, Tyler Schroder, and Luciano Floridi

    Link

    The Roles and Implications of Black Swan Events in Tackling Deep Uncertainty in Relief Distribution: A Collective Case Study, Mohammad Tafiqur Rahman and Maung Kyaw Sein

    PDF

    Towards an Artifact to Assess Differential Privacy in Microdata Streams, Sean McElroy, Varghese Vaidyan, and Gurcan Comert

    Link

    Towards Secure Healthcare: Intrusion Detection with GraphSAGE-Based Meta-Learning and Hybrid Deep Models, Abel Degu, Nnaemeka Igwe, Youssef Harrath, and Cole Drumheller

 
 
 

Browse

  • Collections
  • Exhibits
  • Disciplines
  • Authors

Search

Advanced Search

  • Notify me via email or RSS

Author Corner

  • Author FAQ
  • Policies & Submission Guidelines
  • Submit Research
 
Elsevier - Digital Commons

Home | About | FAQ | My Account | Accessibility Statement

Privacy Copyright