Nathaniel D. Bastian

Orcid: 0000-0001-9957-2778

According to our database1, Nathaniel D. Bastian authored at least 106 papers between 2013 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Optimizing Prompt Sequences using Monte Carlo Tree Search for LLM-Based Optimization.
CoRR, August, 2025

Prmpt2Adpt: Prompt-Based Zero-Shot Domain Adaptation for Resource-Constrained Environments.
CoRR, June, 2025

TOGA: Temporally Grounded Open-Ended Video QA with Weak Supervision.
CoRR, June, 2025

Neurosymbolic Artificial Intelligence for Robust Network Intrusion Detection: From Scratch to Transfer Learning.
CoRR, June, 2025

Deep PackGen: A Deep Reinforcement Learning Framework for Adversarial Network Packet Generation.
ACM Trans. Priv. Secur., May, 2025

Consistency-based Abductive Reasoning over Perceptual Errors of Multiple Pre-trained Models in Novel Environments.
CoRR, May, 2025

Adaptive Pruning of Deep Neural Networks for Resource-Aware Embedded Intrusion Detection on the Edge.
CoRR, May, 2025

VLC Fusion: Vision-Language Conditioned Sensor Fusion for Robust Object Detection.
CoRR, May, 2025

A Few Large Shifts: Layer-Inconsistency Based Minimal Overhead Adversarial Example Detection.
CoRR, May, 2025

Calibrating Uncertainty Quantification of Multi-Modal LLMs using Grounding.
CoRR, May, 2025

Hydra: An Agentic Reasoning Approach for Enhancing Adversarial Robustness and Mitigating Hallucinations in Vision-Language Models.
CoRR, April, 2025

Towards Real-Time Network Intrusion Detection With Image-Based Sequential Packets Representation.
IEEE Trans. Big Data, February, 2025

Multiple Distribution Shift - Aerial (MDS-A): A Dataset for Test-Time Error Detection and Model Adaptation.
CoRR, February, 2025

Deceptive Sequential Decision-Making via Regularized Policy Optimization.
CoRR, January, 2025

SAFE-NID: Self-Attention with Normalizing-Flow Encodings for Network Intrusion Detection.
Trans. Mach. Learn. Res., 2025

GTAE-IDS: Graph Transformer-Based Autoencoder Framework for Real-Time Network Intrusion Detection.
IEEE Trans. Inf. Forensics Secur., 2025

Cognitive map formation under uncertainty via local prediction learning.
Intell. Syst. Appl., 2025

Neurosymbolic AI for network intrusion detection systems: A survey.
J. Inf. Secur. Appl., 2025

PACKETCLIP: multi-modal embedding of network traffic and language for cybersecurity reasoning.
Frontiers Artif. Intell., 2025

XG-NID: Dual-modality network intrusion detection using a heterogeneous graph neural network and large language model.
Expert Syst. Appl., 2025

Data-efficient Federated Learning for Edge Network Intrusion Detection.
Eng. Appl. Artif. Intell., 2025

FedNIDS: A Federated Learning Framework for Packet-Based Network Intrusion Detection System.
Digit. Threat. Res. Pract., 2025

Explainability of Network Intrusion Detection Using Transformers: A Packet-Level Approach.
IEEE Access, 2025

TriageHD: A Hyper-Dimensional Learning-to-Rank Framework for Dynamic Micro-Segmentation in Zero-Trust Network Security.
IEEE Access, 2025

Ensemble-Based Uncertainty Quantification for Reliable Large Language Model Classification in Social Data Applications.
IEEE Access, 2025

Zero-Shot Detection of Out-of-Context Objects Using Foundation Models.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2025

VLTP: Vision-Language Guided Token Pruning for Task-Oriented Segmentation.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2025

Adapting Under Fire: Multi-Agent Reinforcement Learning for Adversarial Drift in Network Security.
Proceedings of the 22nd International Conference on Security and Cryptography, 2025

Hybrid Modeling of Heterogeneous Human Teams for Collaborative Decision Processes.
Proceedings of the 7th Annual Learning for Dynamics & Control Conference, 2025

A Moving Source Angle-of-Arrival Estimation in Real-Time Using Machine Learning.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2025

Continuous GNN-Based Anomaly Detection on Edge Using Efficient Adaptive Knowledge Graph Learning.
Proceedings of the Design, Automation & Test in Europe Conference, 2025

Probabilistic Foundations for Metacognition via Hybrid-AI.
Proceedings of the 2025 AAAI Spring Symposium Series, 2025

Multiple Distribution Shift - Aerial (MDS-A): A Dataset for Test-Time Error Detection and Model Adaptation.
Proceedings of the 2025 AAAI Spring Symposium Series, 2025

2024
Constrained optimization based adversarial example generation for transfer attacks in network intrusion detection systems.
Optim. Lett., December, 2024

A Hypergraph-Based Machine Learning Ensemble Network Intrusion Detection System.
IEEE Trans. Syst. Man Cybern. Syst., November, 2024

Unified Multimodal Network Intrusion Detection Systems Dataset.
Dataset, October, 2024

Multi-Memristor Based Distributed Decision Tree Circuit for Cybersecurity Applications.
IEEE Trans. Circuits Syst. I Regul. Pap., August, 2024

Human Intuition and Algorithmic Efficiency Must Be Balanced to Enhance Data Mesh Resilience.
Commun. ACM, May, 2024

ACI IoT Network Traffic Dataset 2023.
Dataset, April, 2024

Addressing Uncertainty in LLMs to Enhance Reliability in Generative AI.
CoRR, 2024

A Synergistic Approach In Network Intrusion Detection By Neurosymbolic AI.
CoRR, 2024

TrojFM: Resource-efficient Backdoor Attacks against Very Large Foundation Models.
CoRR, 2024

A topological data analysis approach for detecting data poisoning attacks against machine learning based network intrusion detection systems.
Comput. Secur., 2024

A sequential deep learning framework for a robust and resilient network intrusion detection system.
Comput. Secur., 2024

AIS-NIDS: An intelligent and self-sustaining network intrusion detection system.
Comput. Secur., 2024

Offline Reinforcement Learning for Autonomous Cyber Defense Agents.
Proceedings of the Winter Simulation Conference, 2024

Seeing the Whole Elephant - A Comprehensive Framework for Data Education.
Proceedings of the 55th ACM Technical Symposium on Computer Science Education, 2024

RGMDT: Return-Gap-Minimizing Decision Tree Extraction in Non-Euclidean Metric Space.
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024

Uncertainty-Quantified Neurosymbolic AI for Open Set Recognition in Network Intrusion Detection.
Proceedings of the IEEE Military Communications Conference, 2024

Co-Design of Decision Trees for Network Intrusion Detection at the Edge on Digital vs. Analog Hardware.
Proceedings of the IEEE Military Communications Conference, 2024

ACI-IoT-2023: A Robust Dataset for Internet of Things Network Security Analysis.
Proceedings of the IEEE Military Communications Conference, 2024

Model Poisoning Detection via Forensic Analysis.
Proceedings of the IEEE Military Communications Conference, 2024

Defining and Measuring Deception in Sequential Decision Systems: Application to Network Defense.
Proceedings of the IEEE Military Communications Conference, 2024

Post-hoc Uncertainty Quantification for Neurosymbolic Artificial Intelligence.
Proceedings of the IEEE Military Communications Conference, 2024

varMax: Towards Confidence-Based Zero-Day Attack Recognition.
Proceedings of the IEEE Military Communications Conference, 2024

Predicting F1-Scores of Classifiers in Network Intrusion Detection Systems.
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024

A Neuro-Symbolic Artificial Intelligence Network Intrusion Detection System.
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024

Neuro-Symbolic Integration for Open Set Recognition in Network Intrusion Detection.
Proceedings of the AIxIA 2024 - Advances in Artificial Intelligence, 2024

Adversarial Inverse Learning of Defense Policies Conditioned on Human Factor Models.
Proceedings of the 58th Asilomar Conference on Signals, 2024

2023
SeNet-I: An approach for detecting network intrusions through serialized network traffic images.
Eng. Appl. Artif. Intell., November, 2023

Deep VULMAN: A deep reinforcement learning-enabled cyber vulnerability management framework.
Expert Syst. Appl., July, 2023

Transfer learning for raw network traffic detection.
Expert Syst. Appl., 2023

Real-time Network Intrusion Detection via Decision Transformers.
CoRR, 2023

Neuro Symbolic Reasoning for Planning: Counterexample Guided Inductive Synthesis using Large Language Models and Satisfiability Solving.
CoRR, 2023

Analysis of Media Writing Style Bias through Text-Embedding Networks.
CoRR, 2023

Measuring Classification Decision Certainty and Doubt.
CoRR, 2023

Uncertainty-Quantified, Robust Deep Learning for Network Intrusion Detection.
Proceedings of the Winter Simulation Conference, 2023

Performance Analysis of Deep-Learning Based Open Set Recognition Algorithms for Network Intrusion Detection Systems.
Proceedings of the NOMS 2023, 2023

Challenges and Opportunities in Neuro-Symbolic Composition of Foundation Models.
Proceedings of the IEEE Military Communications Conference, 2023

Counterexample Guided Inductive Synthesis Using Large Language Models and Satisfiability Solving.
Proceedings of the IEEE Military Communications Conference, 2023

Neurosymbolic AI in Cybersecurity: Bridging Pattern Recognition and Symbolic Reasoning.
Proceedings of the IEEE Military Communications Conference, 2023

Detecting Unknown Attacks in IoT Environments: An Open Set Classifier for Enhanced Network Intrusion Detection.
Proceedings of the IEEE Military Communications Conference, 2023

Dehallucinating Large Language Models Using Formal Methods Guided Iterative Prompting.
Proceedings of the IEEE International Conference on Assured Autonomy, 2023

Novelty Detection in Network Traffic: Using Survival Analysis for Feature Identification.
Proceedings of the IEEE International Conference on Assured Autonomy, 2023

Preprocessing Network Traffic using Topological Data Analysis for Data Poisoning Detection.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2023

Towards Robust Learning using Diametrical Risk Minimization for Network Intrusion Detection.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2023

Empirical Evaluation of Autoencoder Models for Anomaly Detection in Packet-based NIDS.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2023

RIDE: Real-time Intrusion Detection via Explainable Machine Learning Implemented in a Memristor Hardware Architecture.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2023

2022
A ranked solution for social media fact checking using epidemic spread modeling.
Inf. Sci., 2022

Generating realistic cyber data for training and evaluating machine learning classifiers for network intrusion detection systems.
Expert Syst. Appl., 2022

Off-Policy Evaluation for Action-Dependent Non-stationary Environments.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Context-aware Collaborative Neuro-Symbolic Inference in IoBTs.
Proceedings of the IEEE Military Communications Conference, 2022

Payload-Byte: A Tool for Extracting and Labeling Packet Capture Files of Modern Network Intrusion Detection Datasets.
Proceedings of the IEEE/ACM International Conference on Big Data Computing, 2022

2021
Adversarial machine learning in Network Intrusion Detection Systems.
Expert Syst. Appl., 2021

Anomaly Detection in Cybersecurity: Unsupervised, Graph-Based and Supervised Learning Methods in Adversarial Environments.
CoRR, 2021

Robust Decision-Making in the Internet of Battlefield Things Using Bayesian Neural Networks.
Proceedings of the Winter Simulation Conference, 2021

CHALLENGES AND OPPORTUNITIES FOR GENERATIVE METHODS IN THE CYBER DOMAIN.
Proceedings of the Winter Simulation Conference, 2021

A Sensitivity Analysis of Poisoning and Evasion Attacks in Network Intrusion Detection System Machine Learning Models.
Proceedings of the 2021 IEEE Military Communications Conference, 2021

An Adversarial Training Based Machine Learning Approach to Malware Classification under Adversarial Conditions.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

Evaluating Model Robustness to Adversarial Samples in Network Intrusion Detection.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
The spatially conscious machine learning model.
Stat. Anal. Data Min., 2020

Advancing the Research and Development of Assured Artificial Intelligence and Machine Learning Capabilities.
CoRR, 2020

Stacked Generalizations in Imbalanced Fraud Data Sets using Resampling Methods.
CoRR, 2020

Algorithm selection framework for cyber attack detection.
Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning, 2020

2019
Intelligent Systems Design for Malware Classification Under Adversarial Conditions.
CoRR, 2019

Simulation for Cyber Risk Management - Where are we, and Where do we Want to Go?
Proceedings of the 2019 Winter Simulation Conference, 2019

Solving The Army's Cyber Workforce Planning Problem Using Stochastic Optimization and Discrete-Event Simulation Modeling.
Proceedings of the 2019 Winter Simulation Conference, 2019

Intelligent Feature Engineering for Cybersecurity.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2017
Optimizing Student Team and Job Assignments for the Holy Family Academy.
Interfaces, 2017

A hybrid recommender system using artificial neural networks.
Expert Syst. Appl., 2017

Machine Learning and Statistical Techniques to Predict Sepsis: Unifying Previous Work.
Proceedings of the Summit on Clinical Research Informatics, 2017

2016
Multi-criteria logistics modeling for military humanitarian assistance and disaster relief aerial delivery operations.
Optim. Lett., 2016

Data analytics in health promotion: Health market segmentation and classification of total joint replacement surgery patients.
Expert Syst. Appl., 2016

2015
A maximum expected covering problem for locating and dispatching two classes of military medical evacuation air assets.
Optim. Lett., 2015

The AMEDD Uses Goal Programming to Optimize Workforce Planning Decisions.
Interfaces, 2015

2013
Rainwater harvesting system using a non-parametric stochastic rainfall generator.
Simul., 2013


  Loading...