Computing & Information Technology

Exploiting Vulnerabilities and Security Threats in Retrieval-Augmented Generative Models: The LIAR Attack Framework

Computational Method to Identify Protein Hotspots and Allosteric Sites

Computational Method to Identify Mutational Epistasis in Proteins

JPEG2000 Encoding with Perceptual Distortion Control

BlogTrackers: Combining Domain Knowledge and Novel Search Capabilities for Assessing Political Risks

A One Dimensional Approach to Control Grid Interpolation

Adaptive Batch Mode Active Learning for Evolving a Classifier

Stochastic Multi Attribute Analysis for Life Cycle Impact Assessment

Causal Rule Learning for Combat Information

The HAPPY (Having a Positive Perception of You) App