Most Recent Additions*

Link

A robust adversarial ensemble with causal (feature interaction) interpretations for image classification
Chunheng Zeng, Pierluigi Pisu, Gurcan Comert, Negash Begashaw, Varghese Vaidyan, and Nina Hubig

Link

Interpreting Office Document Macros with Bi-Directional Transformer Models
Mahesh Kalappattil, Varghese Vaidyan, Gurcan Comert, and Yong Wang

PDF

PyRHOH: A meta-learning analysis framework for determining the impact of compilation on malicious JavaScript identification
Eli Fulkerson, Eric Yocam, Varghese Vaidyan, Mahesh Kamepalli, Yong Wang, and Gurcan Comert

Link

Multi-level Post Quantum Encryption for Images with Quantum Fourier Transform
Baby Vennela Kothakonda, Nathaniel Ketema, Varghese Vaidyan, Ashley L. Podhradsky, Eric Yocam, and Yong Wang

Link

From LLMs to Randomness: Analyzing Program Input Efficacy With Resource and Language Metrics
Gavin Black, Eric Yocam, Varghese Vaidyan, Gurcan Comert, and Yong Wang

PDF

Towards an Artifact to Assess Differential Privacy in Microdata Streams
Sean McElroy, Varghese Vaidyan, and Gurcan Comert

Link

A Novel Approach to Quantum-Resistant Selective Encryption for Agricultural Sensors with Limited Resources
Aditya Jagatha, Akshay Kappala, Mahesh Kamepalli, Varghese Vaidyan, Eric Yocam, and Yong Wang

PDF

Quantum Adversarial Machine Learning and Defense Strategies: Challenges and Opportunities
Eric Yocam, Anthony Rizi, Mahesh Kamepalli, Varghese Vaidyan, Yong Wang, and Gurcan Comert

Link

Machine Learning Security: Threat Model, Attacks, and Challenges
Carson Koball, Yong Wang, Bhaskar P. Rimal Dr., and Varghese Vaidyan

Link

The case for contextual copyleft: licensing open-source training data and generative AI
Grant Shanklin, Emmie Hine, Claudio Novelli, Tyler Schroder, and Luciano Floridi

*Updated as of 02/26/26.