Publications & Pre-prints
Academic papers, architecture reports, and technical research — served directly from this repository via Fastly's edge CDN.
HQ-Mamba-PAC: A Generalizable Hybrid Quantum State-Space Framework for High-Fidelity Object Classification
HQ-Mamba-PAC is a hybrid quantum-classical vision framework that combines semantic distillation, quantum encoding, messenger-linked quantum processing, selective state-space fusion, and PAC-Bayesian regularization in one pipeline. The goal is to keep the long-range modeling benefits of advanced vision systems while improving trainability, robustness under domain shift, and theoretical control over generalization, including deployment for non-invasive chick gender classification.
Mixture-of-Depths Meets Thresholded Differential Attention: Omni-PAIFT, a Universal Sink-Free Multimodal Foundation Transformer with Gradient-Orthogonal Fusion and Active Uncertainty Routing
Omni-PAIFT is a unified multimodal foundation architecture designed to reduce information dilution, attention sinks, gradient interference, and expensive uncertainty estimation in large-scale systems. It combines threshold-gated mixture-of-depths differential attention, cross-modal fusion, single-pass uncertainty routing, evolutionary multi-task optimization, and speculative sparse execution to improve long-context efficiency and downstream task performance with only modest additional compute.
Rhythm in the Air: Real-Time Continuous Gesture-to-Music Generation via Liquid State Dynamics and Flow-Matching
This paper presents a real-time gesture-to-music generation system that turns continuous human motion into expressive audio rather than mapping gestures to fixed pre-recorded outputs. It uses Liquid Time-Constant networks for low-latency motion understanding, an audio-visual mixture-of-experts router for latent control, and flow-matching or diffusion-based generation to synthesize music and vocals on the fly while aligning the system with human aesthetic intent through GDPO.
Self-Defending 6G Networks Through AI-Driven Adaptive Decoy Generation at the Edge
This paper proposes an adaptive security framework for 6G networks that moves beyond passive intrusion detection by generating and deploying realistic AI-driven decoys at the network edge. The system combines conditional GANs for context-aware decoy creation, PPO-based reinforcement learning for dynamic decoy placement and resource control, adversarial feedback from attacker interactions for continuous refinement, and federated synchronization across edge nodes to preserve privacy while improving collective defense.
CareerCompass: A Privacy-Preserving Agentic Framework for Causal Employability Prediction and Generative Curriculum Synthesis
CareerCompass is a privacy-first employability prediction framework that allows multiple institutions to train a shared model without centralizing sensitive student records. It combines federated learning for decentralized prediction, propensity-score-based causal inference to test whether suggested interventions truly improve employability, and GraphRAG over a knowledge graph to generate personalized learning paths tailored to each student's current skills and career goals.
Generative Causal-Curriculum: A Privacy-Preserving Federated Framework for Synthetic Hard-Example Mining in Brain Tumor Segmentation
This work proposes a federated brain tumor segmentation framework that turns model failure patterns into anonymous causal error vectors instead of sharing raw medical images. A server-side latent diffusion model then generates synthetic hard examples that specifically target those blind spots, while MO-DGPO and TreeGRPO make the optimization more stable and reduce generation overhead for practical federated training.
Cerebro-TabM: Contextual Evidential Retrieval & Ensembling with Bounded Rademacher Optimization for Clinical Stroke Prediction
Cerebro-TabM is a clinical stroke prediction architecture built for highly imbalanced and partially missing healthcare data, where rare positive cases and missing-not-at-random features can mislead standard tabular models. It introduces a missingness-aware tokenizer, an evidential BatchEnsemble that outputs uncertainty-aware Dirichlet evidence, and a PAC-Bayes-grounded focal loss that aims to improve calibration, fairness, and edge-deployment readiness for safety-critical decision support.
Cross-Attention with Squeeze-and-Excitation Layers for Tabular Data
This architecture is designed for tabular learning with mixed numerical and categorical features, using a shared embedding space followed by cross-attention to model interactions between feature types. It further applies squeeze-and-excitation recalibration, lightweight feedforward blocks, and efficiency techniques such as blockwise attention, sparse masking, pruning, and quantization to improve performance without making the model too expensive to train or deploy.
HelixVantage: Context-Aware Medical Orchestration via Semantic IoT-Edge Fusion and Dynamic Neural Routing
HelixVantage is a hierarchical medical AI orchestration system that grounds language-based reasoning in live physiological signals rather than relying only on static text retrieval. It converts edge sensor streams into HL7 FHIR observations, combines those signals with user queries through a context-aware router, and applies a safety-oriented regularizer so the final response stays closer to clinical guidelines while reducing hallucinations.
BrepHCC: Lightweight Cross-Modal B-Rep Point Fusion with Hierarchical Contrastive Clustering for Non-Categorical 3D Jewelry CAD Organization
BrepHCC is an unsupervised 3D CAD clustering framework built for large jewelry design repositories, where visual similarity alone is not enough to capture style, topology, and manufacturing structure. It fuses native Rhino B-Rep topology with dense point-cloud features through a lightweight top-2 mixture-of-experts router and trains with a hierarchical contrastive clustering loss that preserves geometric detail, curvature patterns, and cross-model similarity.
Signed and Sealed: Protocol-Level Isolation with Cryptographic Integrity (PLICI) for Secure LLM Agents
PLICI is a deterministic security middleware for LLM agents that shifts defense away from fragile prompt-level heuristics toward verifiable protocol enforcement. It uses session-scoped Ed25519 signatures to verify data origin, schema-locked enclaves to isolate tool payloads before the agent reads them, and an NLI-based semantic filter to catch logic hijacking, sharply reducing attack success while keeping latency low enough for real-time agent systems.