Nathaniel D. Bastian
Orcid: 0000-0001-9957-2778
According to our database1,
Nathaniel D. Bastian
authored at least 106 papers
between 2013 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Optimizing Prompt Sequences using Monte Carlo Tree Search for LLM-Based Optimization.
CoRR, August, 2025
Prmpt2Adpt: Prompt-Based Zero-Shot Domain Adaptation for Resource-Constrained Environments.
CoRR, June, 2025
CoRR, June, 2025
Neurosymbolic Artificial Intelligence for Robust Network Intrusion Detection: From Scratch to Transfer Learning.
CoRR, June, 2025
Deep PackGen: A Deep Reinforcement Learning Framework for Adversarial Network Packet Generation.
ACM Trans. Priv. Secur., May, 2025
Consistency-based Abductive Reasoning over Perceptual Errors of Multiple Pre-trained Models in Novel Environments.
CoRR, May, 2025
Adaptive Pruning of Deep Neural Networks for Resource-Aware Embedded Intrusion Detection on the Edge.
CoRR, May, 2025
CoRR, May, 2025
A Few Large Shifts: Layer-Inconsistency Based Minimal Overhead Adversarial Example Detection.
CoRR, May, 2025
CoRR, May, 2025
Hydra: An Agentic Reasoning Approach for Enhancing Adversarial Robustness and Mitigating Hallucinations in Vision-Language Models.
CoRR, April, 2025
Towards Real-Time Network Intrusion Detection With Image-Based Sequential Packets Representation.
IEEE Trans. Big Data, February, 2025
Multiple Distribution Shift - Aerial (MDS-A): A Dataset for Test-Time Error Detection and Model Adaptation.
CoRR, February, 2025
CoRR, January, 2025
SAFE-NID: Self-Attention with Normalizing-Flow Encodings for Network Intrusion Detection.
Trans. Mach. Learn. Res., 2025
GTAE-IDS: Graph Transformer-Based Autoencoder Framework for Real-Time Network Intrusion Detection.
IEEE Trans. Inf. Forensics Secur., 2025
Intell. Syst. Appl., 2025
J. Inf. Secur. Appl., 2025
PACKETCLIP: multi-modal embedding of network traffic and language for cybersecurity reasoning.
Frontiers Artif. Intell., 2025
XG-NID: Dual-modality network intrusion detection using a heterogeneous graph neural network and large language model.
Expert Syst. Appl., 2025
Eng. Appl. Artif. Intell., 2025
FedNIDS: A Federated Learning Framework for Packet-Based Network Intrusion Detection System.
Digit. Threat. Res. Pract., 2025
Explainability of Network Intrusion Detection Using Transformers: A Packet-Level Approach.
IEEE Access, 2025
TriageHD: A Hyper-Dimensional Learning-to-Rank Framework for Dynamic Micro-Segmentation in Zero-Trust Network Security.
IEEE Access, 2025
Ensemble-Based Uncertainty Quantification for Reliable Large Language Model Classification in Social Data Applications.
IEEE Access, 2025
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2025
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2025
Adapting Under Fire: Multi-Agent Reinforcement Learning for Adversarial Drift in Network Security.
Proceedings of the 22nd International Conference on Security and Cryptography, 2025
Proceedings of the 7th Annual Learning for Dynamics & Control Conference, 2025
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2025
Continuous GNN-Based Anomaly Detection on Edge Using Efficient Adaptive Knowledge Graph Learning.
Proceedings of the Design, Automation & Test in Europe Conference, 2025
Proceedings of the 2025 AAAI Spring Symposium Series, 2025
Multiple Distribution Shift - Aerial (MDS-A): A Dataset for Test-Time Error Detection and Model Adaptation.
Proceedings of the 2025 AAAI Spring Symposium Series, 2025
2024
Constrained optimization based adversarial example generation for transfer attacks in network intrusion detection systems.
Optim. Lett., December, 2024
IEEE Trans. Syst. Man Cybern. Syst., November, 2024
Dataset, October, 2024
Multi-Memristor Based Distributed Decision Tree Circuit for Cybersecurity Applications.
IEEE Trans. Circuits Syst. I Regul. Pap., August, 2024
Human Intuition and Algorithmic Efficiency Must Be Balanced to Enhance Data Mesh Resilience.
Commun. ACM, May, 2024
CoRR, 2024
CoRR, 2024
A topological data analysis approach for detecting data poisoning attacks against machine learning based network intrusion detection systems.
Comput. Secur., 2024
A sequential deep learning framework for a robust and resilient network intrusion detection system.
Comput. Secur., 2024
Comput. Secur., 2024
Proceedings of the Winter Simulation Conference, 2024
Proceedings of the 55th ACM Technical Symposium on Computer Science Education, 2024
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024
Uncertainty-Quantified Neurosymbolic AI for Open Set Recognition in Network Intrusion Detection.
Proceedings of the IEEE Military Communications Conference, 2024
Co-Design of Decision Trees for Network Intrusion Detection at the Edge on Digital vs. Analog Hardware.
Proceedings of the IEEE Military Communications Conference, 2024
Proceedings of the IEEE Military Communications Conference, 2024
Proceedings of the IEEE Military Communications Conference, 2024
Defining and Measuring Deception in Sequential Decision Systems: Application to Network Defense.
Proceedings of the IEEE Military Communications Conference, 2024
Proceedings of the IEEE Military Communications Conference, 2024
Proceedings of the IEEE Military Communications Conference, 2024
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024
Proceedings of the AIxIA 2024 - Advances in Artificial Intelligence, 2024
Proceedings of the 58th Asilomar Conference on Signals, 2024
2023
SeNet-I: An approach for detecting network intrusions through serialized network traffic images.
Eng. Appl. Artif. Intell., November, 2023
Deep VULMAN: A deep reinforcement learning-enabled cyber vulnerability management framework.
Expert Syst. Appl., July, 2023
Neuro Symbolic Reasoning for Planning: Counterexample Guided Inductive Synthesis using Large Language Models and Satisfiability Solving.
CoRR, 2023
Proceedings of the Winter Simulation Conference, 2023
Performance Analysis of Deep-Learning Based Open Set Recognition Algorithms for Network Intrusion Detection Systems.
Proceedings of the NOMS 2023, 2023
Proceedings of the IEEE Military Communications Conference, 2023
Counterexample Guided Inductive Synthesis Using Large Language Models and Satisfiability Solving.
Proceedings of the IEEE Military Communications Conference, 2023
Neurosymbolic AI in Cybersecurity: Bridging Pattern Recognition and Symbolic Reasoning.
Proceedings of the IEEE Military Communications Conference, 2023
Detecting Unknown Attacks in IoT Environments: An Open Set Classifier for Enhanced Network Intrusion Detection.
Proceedings of the IEEE Military Communications Conference, 2023
Dehallucinating Large Language Models Using Formal Methods Guided Iterative Prompting.
Proceedings of the IEEE International Conference on Assured Autonomy, 2023
Novelty Detection in Network Traffic: Using Survival Analysis for Feature Identification.
Proceedings of the IEEE International Conference on Assured Autonomy, 2023
Preprocessing Network Traffic using Topological Data Analysis for Data Poisoning Detection.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2023
Towards Robust Learning using Diametrical Risk Minimization for Network Intrusion Detection.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2023
Empirical Evaluation of Autoencoder Models for Anomaly Detection in Packet-based NIDS.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2023
RIDE: Real-time Intrusion Detection via Explainable Machine Learning Implemented in a Memristor Hardware Architecture.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2023
2022
Inf. Sci., 2022
Generating realistic cyber data for training and evaluating machine learning classifiers for network intrusion detection systems.
Expert Syst. Appl., 2022
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Proceedings of the IEEE Military Communications Conference, 2022
Payload-Byte: A Tool for Extracting and Labeling Packet Capture Files of Modern Network Intrusion Detection Datasets.
Proceedings of the IEEE/ACM International Conference on Big Data Computing, 2022
2021
Expert Syst. Appl., 2021
Anomaly Detection in Cybersecurity: Unsupervised, Graph-Based and Supervised Learning Methods in Adversarial Environments.
CoRR, 2021
Robust Decision-Making in the Internet of Battlefield Things Using Bayesian Neural Networks.
Proceedings of the Winter Simulation Conference, 2021
Proceedings of the Winter Simulation Conference, 2021
A Sensitivity Analysis of Poisoning and Evasion Attacks in Network Intrusion Detection System Machine Learning Models.
Proceedings of the 2021 IEEE Military Communications Conference, 2021
An Adversarial Training Based Machine Learning Approach to Malware Classification under Adversarial Conditions.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
2020
Advancing the Research and Development of Assured Artificial Intelligence and Machine Learning Capabilities.
CoRR, 2020
CoRR, 2020
Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning, 2020
2019
CoRR, 2019
Proceedings of the 2019 Winter Simulation Conference, 2019
Solving The Army's Cyber Workforce Planning Problem Using Stochastic Optimization and Discrete-Event Simulation Modeling.
Proceedings of the 2019 Winter Simulation Conference, 2019
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
2017
Interfaces, 2017
Expert Syst. Appl., 2017
Machine Learning and Statistical Techniques to Predict Sepsis: Unifying Previous Work.
Proceedings of the Summit on Clinical Research Informatics, 2017
2016
Multi-criteria logistics modeling for military humanitarian assistance and disaster relief aerial delivery operations.
Optim. Lett., 2016
Data analytics in health promotion: Health market segmentation and classification of total joint replacement surgery patients.
Expert Syst. Appl., 2016
2015
A maximum expected covering problem for locating and dispatching two classes of military medical evacuation air assets.
Optim. Lett., 2015
Interfaces, 2015
2013
Simul., 2013