Content Posted in 2026
A Capability Maturity Model for Artificial Intelligence Integration in Supply Chain Management, Lordt Becklines
Adaptive and Scalable Edge-Based Weed Classification Through Distilled Mixture of Experts And Metric Learning, Abderrezak Allalen
Advancing Cybersecurity Assurance: A Novel Outcome-Based Approach for Evaluating Cybersecurity Controls, Yousuf M. Muhammad
AI and Radiology: Exploring People, Process, and Technology through a Meta-Analysis, Cherie Noteboom, Sai Mounika Chintalapudi, and Vahini Atluri
AI-SCM CMM: A Capability Maturity Model for Artificial Intelligence Integration in Supply Chain Management, Lordt Becklines, Omar F. El-Gayar, Patti Brooks, and Insu Park
An Attack-Centric Approach to Security, Privacy, and Legal Challenges in Virtual Healthcare, Suvineetha Herath
A Novel Approach to Quantum-Resistant Selective Encryption for Agricultural Sensors with Limited Resources, Aditya Jagatha, Akshay Kappala, Mahesh Kamepalli, Varghese Vaidyan, Eric Yocam, and Yong Wang
A Quantum Quandary: Does Algorithmic Complexity Inherently Diminish Security, Chinyere Isaac-Heslop
A robust adversarial ensemble with causal (feature interaction) interpretations for image classification, Chunheng Zeng, Pierluigi Pisu, Gurcan Comert, Negash Begashaw, Varghese Vaidyan, and Nina Hubig
Assessing Evasion Attacks on Tree-Based Machine Learning Models: Supervised vs. Unsupervised Approaches, Carson Koball, Yong Wang, Varghese Vaidyan, and John Hastings
A systematic literature review of AI, education, and change in radiology practice, Cherie Noteboom, Vahini Atluri, and Sai Mounika Chintalapudi
A systematic literature review on AI chatbots in automating customer support for e-commerce, Sai Mounika Chintalapudi, Omar F. El-Gayar, and Cherie Noteboom
Automatic dependent surveillance: attacks, challenges and countermeasures, Andrew Morrow and Varghese Vaidyan
Autonomous Penetration Testing: Solving Capture-the-Flag Challenges with LLMs, Isabelle Bakker and John Hastings
Balancing Security and Correctness in Code Generation: An Empirical Study on Commercial Large Language Models PDF, Gavin Black, Bhaskar P. Rimal Dr., and Varghese Vaidyan
Bardella and the Curse of Silence, Karl Lexvold
Building Explainable RAG-based Clinical Decision Support, Irina Pecherskaia, Jason Mixon, Andrew Behrens, and Andrew Smith
C2PROBER: A Framework to Identify and Label C2 Frameworks, Subash Adhikari
Classification of Images Derived from Variable-Length N-Grams Representing Inherent Entropic Boundaries, Gregory Sunderland
Comparative Analysis of Shipping Costs Across Multiple Routes Using FedEx API Data, Valerija Curikova and Andrew Kramer
Constructing Information Systems: Technology Frames and Career Interest Among Middle School Students, Sai Mounika Chintalapudi and Cherie Noteboom
Deep Learning in Computer Programming Courses: Designing Related Syllabus in the IS Curriculum, Mohammad Tafiqur Rahman
Detection of Malicious Office Document Macros Using Large Language Models, Mahesh Kalappattil
Do Developers Read Type Information? An Eye-Tracking Study on TypeScript, Samuel W. Flint, Robert Dyer, and Bonita Sharif
Evaluating and Proposing the Best Practices for DevSecOps: A Research-Based Analysis, Jayaprakash Reddy Cheenepalli
Evaluating Large Language Models for Enhanced Fuzzing: An Analysis Framework for LLM-Driven Seed Generation, Gavin Black, Varghese Vaidyan, and Gurcan Comert
Evaluating the Impact of AI and Blockchain for Supply Chain Risk Mitigation: A Predictive Analytics Approach, Sai Neelima Seru and David Zeng
Evaluating the Reliability and Equity Implication of Acute Hospital Readmission Metrics in New Zealand, Christopher D. Elce, Martinson Ofori, and Andrew Behrens
EXAIM: A Real-Time Explainability Middleware for Multi-Agent Clinical Decision Support Systems, Abem Woldesenbet and Andrew Behrens
Exploring LoRaWAN Class B and Class C Devices: Performance Analysis and Parameter Optimization Strategies, Aditya Jagatha, Bhaskar P. Rimal Dr., Varghese Vaidyan, and Yong Wang
Exploring Machine Learning with FNNs for Identifying Modified DGAs through Noise and Linear Recursive Sequences (LRS), Anthony Rizi, Eric Yocam, Varghese Vaidyan, and Yong Wang
From imaging to insights: AI’s role in radiology transformation through 2PDT and 4Aim, Cherie Noteboom, Sai Mounika Chintalapudi, and Vahini Atluri
From LLMs to Randomness: Analyzing Program Input Efficacy With Resource and Language Metrics, Gavin Black, Eric Yocam, Varghese Vaidyan, Gurcan Comert, and Yong Wang
Hardening the OSv Unikernel with Efficient Address Randomization: Design and Performance Evaluation, Alex Wollman and John Hastings
Hardware Side-Channel Security of Quantum System Controllers: A Timing Attack Perspective, Darpan Basnet, Anshu Bista, and Varghese Vaidyan
If You Have Nothing to Hide, You Still Have Something to Fear: How Libraries Can Support Alternative Information Channels, Abbie Steuhm
Integrating Artificial Intelligence into Radiology: A Meta-Analysis of Educational Interventions and Technological Trends, Cherie Noteboom, Vahini Atluri, and Sai Mounika Chintalapudi
Interactions of Bad Actors with Honeypots, Maryam Aliyeva and Andrew Kramer
Interpreting Office Document Macros with Bi-Directional Transformer Models, Mahesh Kalappattil, Varghese Vaidyan, Gurcan Comert, and Yong Wang
Introducing Axlerod: An LLM-Based Chatbot for Assisting Independent Insurance Agents, Adam Bradley, John Hastings, and Khandaker Mamun Ahmed
Leveraging Internet Speed Tests as a Covert Channel for Data Exfiltration, Janessa Palmieri and Andrew Kramer
LibLMFuzz: LLM-Augmented Fuzz Target Generation for Black-Box Libraries, Ian Hardgrove and John Hastings
LLM Security Agents: Harness Design and Static vs Dynamic Challenges, Joe Hammond, Eddie French, and Austin O'Brien
Logging and Telemetry Gap Identification of Remote Vulnerability Exploitation, ryan Holeman
Machine Learning Security: Threat Model, Attacks, and Challenges, Carson Koball, Yong Wang, Bhaskar P. Rimal Dr., and Varghese Vaidyan
Mapping the Intersection of Blockchain and Project Management: A Bibliometric Review, Cherie Noteboom, David Zeng, Sai Neelima Seru, and Sai Mounika Chintalapudi
Mid-Generation Jailbreaks in Open-Source LLMs Using a Pause-and-Edit Attack, Aman Singh, Komal More, Samyam Aryal, and Mark Spanier
Multi-level Post Quantum Encryption for Images with Quantum Fourier Transform, Baby Vennela Kothakonda, Nathaniel Ketema, Varghese Vaidyan, Ashley L. Podhradsky, Eric Yocam, and Yong Wang
On the Effectiveness of Automatic Code Generation for Synthetic Dataset Creation, Josh Mitchell, Varghese Vaidyan, and Yong Wang
Packet Scheduling in Mixed Traffic Networks: A Simulation Study Using NS-3, Landon Mohr
Postmortem Analysis of Israel's 7 October 2023 Intelligence Failure, Emily Helgeson and William Bendix
Post-Quantum Cryptography Secure Communication, IoT, and Blockchain, Nidhish Bhanse and Mark Spanier
Prioritizing Privacy in Artificial Intelligence: A Practitioner-Grounded, Layered Framework, Prince Boadi
Privacy in Flux: A 35-Year Review of Trends, Legal Evolution, and Emerging Challenges, Kong Phang and Jihene Kaabi
Privacy-Preserving Synthetic Data Generation for Federated Learning in Imbalanced Credit Card Fraud Detection: A Comparative Analysis of SMOTE vs. GAN Approaches, Muhammad Bhutta and Abid Mehmood
PyRHOH: A meta-learning analysis framework for determining the impact of compilation on malicious JavaScript identification, Eli Fulkerson, Eric Yocam, Varghese Vaidyan, Mahesh Kamepalli, Yong Wang, and Gurcan Comert
Quantum Adversarial Machine Learning and Defense Strategies: Challenges and Opportunities, Eric Yocam, Anthony Rizi, Mahesh Kamepalli, Varghese Vaidyan, Yong Wang, and Gurcan Comert
Romance Scam Reporting and Support: Help-Seeking Timing, Trust, and Escalation, LD Herrera
Scattering phase shift in quantum mechanics on quantum computers, Peng Guo, Paul LeVan, Frank Lee, and Yong Zhao
Secure-Home: Detect and Redact PII, Hajar Niroomand and Omar F. El-Gayar
Small-Object Detection at the Edge: A Pareto-Efficient Benchmark of Lightweight YOLO Models on UAV and Overhead Datasets, Bijay Shakya, Omar F. El-Gayar, Jihene Kaabi Dr., and Khandaker Mamun Ahmed
Streamlining Literacy Assessment, Sheila Mulder, Katie Anderson, and Samuel W. Flint
The case for contextual copyleft: licensing open-source training data and generative AI, Grant Shanklin, Emmie Hine, Claudio Novelli, Tyler Schroder, and Luciano Floridi
The Roles and Implications of Black Swan Events in Tackling Deep Uncertainty in Relief Distribution: A Collective Case Study, Mohammad Tafiqur Rahman and Maung Kyaw Sein
The Underpromoter's Riddle: A Computational Analysis of the Knight Promotion in Chess, Yelarys Seidin
Towards an Artifact to Assess Differential Privacy in Microdata Streams, Sean McElroy, Varghese Vaidyan, and Gurcan Comert
Towards Secure Healthcare: Intrusion Detection with GraphSAGE-Based Meta-Learning and Hybrid Deep Models, Abel Degu, Nnaemeka Igwe, Youssef Harrath, and Cole Drumheller
Using a Spherical Speaker to Explore Sound, David Provance