| 1 |
TIE Grammar: Stratified Generative Pipeline for Training Generalizable Deep Reinforcement Learning Cyber Agents |
Bahirah Adewunmi (UMBC) |
| 2 |
COG-IMMUNE Toward a Cognitive Immune System for Large Language Models |
Sylvester Kaczmarek (Imperial College London) |
| 3 |
Gated Cross-Attention Matcher for Aligning Course with Relevant KUs |
Aashish Pandey (University of North Texas) |
| 4 |
HE-LoRA:- Privacy-Preserving Network Intrusion Detection via Homomorphic Encryption LoRA Fine-Tuning of BERT |
Raushan Kumar Pandit (University of North Texas) |
| 5 |
Towards Practical Edge Security: Energy-Efficient RF Anomaly Detection on the NVIDIA Jetson Orin Nano |
Nicholas Redmond (University of Memphis) |
| 6 |
Systemic Risk Modeling of United States In-Person Voting: Threat Analysis of Precinct Count Optical Scanners |
Natalie Scala (Towson University) |
| 7 |
Mobility From Motion: Constrained Deepfake Video |
Sirisha Talapuru (University of North Texas) |
| 8 |
Darknet Anomaly Detection in Internet Access Using Machine Learning: A Big Data Analytics Examination |
Mason Turner (University of Michigan) |
| 9 |
Security of Biomedical Large Language Models: Threats, Defenses, and Open Challenges |
Zahid Hassan Tushar (UMBC) |