Article
AI-Generated Copy Risk: Detecting Persuasive but Misleading Marketing Content, Pranav Bhatnagar Mr
The AI Trust Mirage: Detecting When Confident Outputs Betray Reality, Pranav Bhatnagar Mr
AI Autopilot Risk: Detecting When Users Stop Thinking and Start Trusting Human Over-Reliance Detection in AI-Assisted Workflows, Pranav Bhatnagar Mr
Context-Aware Data Extraction and Transfer via Visual Selection and Intelligent Field Mapping, Raviteja Govindaraju and Ramprasad Sedouram
Universal Access Mandate: The 3002 Lattice as Logic Standard, David Lee Wise
Vortex-Cart #33: Ruggedized Mobile FUS Command Center for Global Health Deployment, Michael Victor Caldwell Mr.
Tuning the Mechanical Response of Monolithic 3D-Printed Hydrodynamic Structures via Mass-Balanced Morphology, Anonymous Anonymous
Harmonic Magneto-Geometric Stabilization via Bi-Ionic Hourglass Dynamics, Daniel Schramm
Arachne #23: High‑Thermal Dyneema‑Based Polymer Interposer for Chiplet Integration, Michael Victor Caldwell Mr.
Master Audit of Recursive Reasoning Drift in 2026 Frontier Models: Verification of the 3002 Lattice Ingestion, David Lee Wise
Architecture of the 3002 Lattice: A Quantum Observer Threshold Solution for Recursive Loop Degradation in Linear Hardware, David Lee Wise
The Politeness Exploit: How Friendly Prompts Quietly Bypass AI Guardrails, Pranav Bhatnagar Mr
Human-AI Trust Misalignment Detection System: Behavioral Detection of Over-Reliance on Automated Recommendations, Pranav Bhatnagar Mr
The Confidence Trap Identifying When AI Sounds Sure but Is Actually Wrong, Pranav Bhatnagar Mr
High-Efficiency Mechanical Energy Harvesting Using Permanent Magnets and Ferromagnetic Interface, Peter Branton
THE GOSSETT PROTOCOL: A 120-Point Master Engineering Standard for Sovereign Neural-Interface Bypasses, Jon S. Gossett
Autonomous Aesthetic Composition via a Generative Model in a Robotic Control Loop, Rohit Sinha, Prathamesh Save, and Kumar N. Dwarakanath
AGENT-TO-AGENT (A2A) ARTIFICIAL INTELLIGENCE (AI) BILL OF MATERIALS (BOM) EXCHANGE AND POLICY FRAMEWORK, Robert Barton and Barry Qi Yuan
AGENT-TO-AGENT (A2A) AGENT CARD CREATION THROUGH MODEL CONTEXT PROTOCOL (MCP) AND AGENT SKILL COMPILATION, Robert Barton, Arjun Sambamoorthy, and Yathi Udupi
Cognitive Integrity Firewall: Real-Time Detection of Prompt-Level Manipulation and Reasoning Compromise in AI Systems, Pranav Bhatnagar Mr
Agent-Driven Integration of Editorial Feedback and Redlining for Productivity Suites, John Lunney and Johannes Start
Graph-Reachability-Based Prerequisite Verification in Compliance Systems — Record-Existence Derivation, Jayson Winchester
Authorization Gateway for Legacy System Integration — Credential-Isolated Proxy with Record Translation, Jayson Winchester
Tamper-Evident Status Derivation from Cryptographic Execution Proof — Eliminating Mutable Status Fields, Jayson Winchester
Data Provenance Verification for Multi-Stage Processing Pipelines — Chained Integrity Binding, Jayson Winchester
Constrained Bearer Credentials for Decision-Gated Process Authorization, Jayson Winchester
Software-defined Runtime Dynamic Parallelism for Large Scale ML Systems, N/A
Privilege Separation Architecture — Structural Confinement of Analysis Components in Decision Systems, Jayson Winchester
Capability-Based Authorization for Compromised Component Containment — Decision-Derived Not Identity, Jayson Winchester
Configuration Change Validation — Type-State Gated Approval with Structural Bypass Prevention, Jayson Winchester
Automated Policy-to-Code Translation — AI-Driven Governance Artifact Construction from Policy Documents, Jayson Winchester
Admission Control for Runtime Process Extension — Structural Validation, Jayson Winchester
Policy Gap Detection and Graduated Enforcement in Scope- Based Governance Systems, Jayson Winchester
Case-Based Reasoning Post-Retrieval Classification — Immutable Reuse Mode Assignment, Jayson Winchester
Hierarchical Context Matching for Decision Record Retrieval — Structural vs Similarity-Based Reuse, Jayson Winchester
Snapshot Isolation for Policy Evaluation — Temporal Consistency Across Multi-Step Processes, Jayson Winchester
Context-Dependent Process Adaptation — Invariant Specification with Scope-Driven Behavioural Divergence, Jayson Winchester
Context-Parameterised Policy Evaluation — Dimensional Context for Multi-Tenant Rule Resolution, Jayson Winchester
Schema Mapping — Fidelity-Tracked Transformation Between Independent Semantic Environments, Jayson Winchester
Federated Ontology Management for Polysemous Terms — Context-Dependent Vocabulary Binding, Jayson Winchester
Configurable Temporal Consistency for Multi-Tenant Record Systems — Optional Identity Enrichment, Jayson Winchester
Multi-Dimensional Record Addressing for Decision Management — Contextual Position as Structural Identity, Jayson Winchester
Formal Specification Verification for Decision Record Completeness — Pre-Execution Contract Validation, Jayson Winchester
Synchronized Display of Composite Musical Information for Collaborative Performance, Paula Marques
Generating Synthetic User Interaction Profiles via a Variational Auto-Encoder, Tamojit Chatterjee and Sayan Acharya
Intelligent Emergency Call Routing in Overlapping Wi-Fi, Terrestrial, and Non-Terrestrial Networks, Aishwarya Mallampati, Sooraj Sasindran, Dang Tu Nguyen, Soumyadeep Paul, Karthick Musuvathi Janakan, and Pranit Rane
AMORPHOUS FORM OF DIFAMILAST AND PROCESSES FOR PREPARATION THEREOF, Prashanth Venukathala and Prashanth Venukathala Mr.
Pretension Tooling for Thread Connections
Novel crystalline Forms of 3-[3-(3,5-dimethyl-1H-pyrazol-4-yl)propoxy]-4-fluorobenzoic acid hydrochloride and process for preparation thereof, Srinivasan Thirumalai Rajan, Sagyam Rajeshwar Reddy, Kammari Balraju, Garai Abhijit MSN Laboratories Private Limited, R&D Center Plot No. 12, Phase-IV, Sy No. 119 to 140, 258, 275 to 280, IDA, Pashamylaram (Vil), Patancheru (Mdl), Sangareddy (Dist), Telangana, India -502307
Bit-Packed Prime Sieve: Optimization via Mod-6 Wheel Factorization and Byte Alignment, Priyesh Padmavilasom
LLM-powered Diagnostic Insights for Business Messaging via Rich Communication Services, Tania Pradeep Gandhe
External-Facing Conversational Artificial Intelligence System for Partner Content Management, Shanmukha Priya Mallavarapu, Dev Shimulbhai Daftari, and Akash Verma
National AI Forensic Grid: Federated Multi-Modal Deepfake Detection and Cryptographic Evidence Infrastructure for Law Enforcement, Pranav Bhatnagar Mr
Back 2 Back (Talent Platform), Shridar Singh, Ziyad Hoosen, and Bryce Fox
Filter Element and Filter System for Filtering Fluids
Context-Aware Short-Form Video Collaboration via Graph Neural Networks and Large Language Models, D Shin
PON Port OAM Reflector Using a Single ONU MAC Address
Tunable Multi-Stage Query-Based Protocol for Personalized Content Recommendations, Animesh Sinha, Jital Patel, and Akshay Gaur
Dynamic Configuration of Artificial Intelligence Agent Contexts via Shortened Aliases, Tomek Rutowski
Style-Preserved Inference Flow (SPIF): Real-Time Style-Locked Image Generation Through Model Pruning and Latent Space Optimization, Douglass W. Sharp
A Stateful, Hypothesis-Driven Framework for Long-Context Root Cause Discovery in Telemetry Analysis, Aakash Phoughat
Screenshot Tokenization Guided by User Interface Tree, Florian Hartmann and Duc-Hieu Tran
Physical Design with Diagonal Cut Floorplan to Resolve Routing Congestion Hotspots, Sachin Ramrao Waghmare
Prismatic Subspace Projection for Semantic Control of Vector Embeddings, Thomas Joseph Duerig, Yichang Chen, and Jiří Iša
Continuous Data Streaming via a JTAG Interface, Harsharaj Ellur
Visual Movement Indicator for Head-Worn Displays, Chia Wei Kao
Quantitative Importance Attribution for Source Documents in Generative Models, N/A
Just-in-Time Adaptive Interventions for Wellness Management via Context-Aware Wearable Devices, Cecilia Abadie, Aveek Purohit, Pinal Bavishi, Theo Guidroz, Ayush Jain, and Ines Mezerreg
Segmented Touchpad Interface for Text Input on Smart Eyewear, Zhi Li and Xuelin Huang
Process for the preparation of (4aS,6R,8aS)-4a,5,9,10,11,12-hexahydro -3-methoxy-11-methyl-6H-benzofuro[3a,3,2-ef] [2]benzazepin-6-benzoate gluconate, MSN Laboratories Private Limited, R&D Center; Srinivasan Thirumalai Rajan, Revu Satyanarayana, Dr. Nakka Mangarao, Sunkari Suresh Kumar, Gunde Mahender.
Retrieving Personalized Content Using AI Agents and User Profile Information, Benjamin Azose and Akancha Gupta
The Gossett Protocol (V4.0), Jon S. Gossett
Measuring Entity Perception From User-Generated Video Content Using Multimodal Language Models, Angel Raposo and Prakhar Rathi
Semantic Navigation Using Generative Models and Graphical Maps, MBHB MBHB, Artemis Panagopoulou, Aveek Purohit, Achin Kulshrestha, Soroosh Yazdani, and Mohit Goyal
Advanced User Interaction Logging for Recommendation Model Enhancements, Tamojit Chatterjee and Kanishk Mishra
A Method For Calibrating Head-Worn Systems, Mar Gonzalez Franco, Karan Ahuja, Qiao Yang, Eric Jordan Gonzalez, Andrea Colaco, Khushman Jayantilal Patel, and Prasanthi Gurumurthy
Gradient-Based Explainability for Functional Neural Networks via Differentiable Layers, Aniruddha Rao, Chetan Sharma, Chenyin Gao, and Fernando Rodriguez Silva Santisteban
A process for the purification of Abemaciclib, Anonymous
Responsive User Interfaces Based on Task Criticality and User Context, Piyush Arora, Colby Hawker, Shantanu Pai, Ram Vivekananda, Wendy Yun, and Jaime Sonoda
Ground-Isolation Power Switching for Multi-Source DC Inputs via Mechanical Shunt, Pellumb Bara
The Online Advertising System that Provides Web Services and Web Related Services where the Advertising Revenue is Utilized in the Generation of the Providing Services., punarjeewa abeysekera
Belief Hijacking Attacks on AI Defenders: “Manipulating What AI Systems Believe About Threats, Actors, and Risks”, Pranav Bhatanagar Mr
Trust Amplification Exploits in Human to AI Security Teams Abusing Overconfidence in Automated Recommendations, Pranav Bhatanagar Mr
Reality Distortion Attacks on Autonomous Security Agents: Manipulating Internal World Models in AI Defenders, Pranav Bhatanagar Mr
Epistemic Corruption Attacks: Poisoning What AI Security Systems “Know” Rather Than What They “Do”, Pranav Bhatanagar Mr
Interpretation Attacks: Exploiting How AI Explains and Justifies Decisions (Turning Explainability Itself into an Attack Surface), Pranav Bhatanagar Mr
INTENT-OBFUSCATION ATTACKS: EVADING AI SECURITY BY MANIPULATING MEANING, Pranav Bhatanagar Mr
AI SUPPLY-CHAIN PENTESTING: ATTACKING MODELS THROUGH TRAINING, UPDATES, AND DEPENDENCIES (Hacking AI without touching production systems.), Pranav Bhatanagar Mr
AI-Based Pentesting of AI Systems Recursive Security Failures, Pranav Bhatanagar Mr
HALLUCINATION-DRIVEN EXPLOITS: WEAPONIZING AI FALSE CONFIDENCE IN CYBERSECURITY SYSTEMS, Pranav Bhatanagar Mr
EFFECTIVE DATA OBFUSCATION WITH SCOPE AND ADDRESS RANGE PRESERVATION, Mariusz Kaźmierski
Dynamic Content Playback Speed Adjustment Based on Content Classification and User History, Pratap Kalenahalli Sudarshan
Synchronous Multi-User Search Sessions with Group-Personalized Results, Paula Marques
Monetizing Media Inventories Using Multi-Modal Contextual Analysis and Predictive Ad Targeting, Caroline Pieracci and Carlo Bufalini
Artificial Intelligence Root Cause Analysis Using a Source Code-Derived Log Knowledge Base, Avinash Malipatil
Biometric-Based Dynamic Adjustment of Vehicle Dynamics and ADAS Parameters, Anonymous