Recent Works
search all worksSorted by most recent date added to the index first, which may not be the same as publication date order.
2025 conference paper
NTK-DFL: Enhancing decentralized federated learning in heterogeneous settings via neural tangent kernel
International Conference on Machine Learning.
2025 conference paper
PortLLM: Personalizing evolving large language models with training-free and portable model patches
International Conference on Learning Representations.
2025 conference paper
SCALE: Towards collaborative content analysis in social science with large language model agents and human intervention
Annual Meeting of the Association for Computational Linguistics.
2025 conference paper
GateBleed: Exploiting On-Core Accelerator Power Gating for High Performance and Stealthy Attacks on AI
Kalyanapu, J., Dizani, F., Asher, D., Ghanbari, A., Cammarota, R., Aysu, A., & Ajorpaz, S. M. (2025, October 18).
2025 journal article
SoK: An empirical investigation of malware techniques in advanced persistent threat attacks
COMPUTERS & SECURITY, 157.
2025 conference paper
An Empirical Study on Reproducible Packaging in Open-Source Ecosystems
2025 IEEE/ACM 47th International Conference on Software Engineering (ICSE).
2025 conference paper
Context Matters: Qualitative Insights into Developers’ Approaches and Challenges with Software Composition Analysis
Proceedings of the USENIX Security Symposium. https://www.usenix.org/system/files/usenixsecurity25-lin-elizabeth.pdf
Contributors: E. Lin, S. Gowda, W. Enck & D. Wermke
2025 article
SpecMPK: Efficient In-Process Isolation with Speculative and Secure Permission Update Instruction
2025 IEEE INTERNATIONAL SYMPOSIUM ON HIGH PERFORMANCE COMPUTER ARCHITECTURE, HPCA, pp. 394–408.
2025 article
Exploring multidimensional factors influencing teachers' technology integration in K-12 education: A systematic review
Martin, F., Gezer, T., & Ceviker, E. (2025, July 29). JOURNAL OF RESEARCH ON TECHNOLOGY IN EDUCATION, Vol. 7.
2025 review
The affordances of Artificial Intelligence (AI) and ethical considerations across the instruction cycle: A systematic review of AI in online higher education
[Review of ]. INTERNET AND HIGHER EDUCATION, 67.
2025 article
Digital distractions in education: a systematic review of research on causes, consequences and prevention strategies
Martin, F., Long, S., Haywood, K., & Xie, K. (2025, August 7). ETR&D-EDUCATIONAL TECHNOLOGY RESEARCH AND DEVELOPMENT, Vol. 8.
2025 conference paper
Combating Dark-side of Computing - Exploring Perceptions of AI-augmented Mis/disinformation among Higher Education Students
Martin, F., DeLarm, J., Zhuang, M., Cheng, Y., Rand, W., & Lee, J. (2025, August 3).
2025 article
Mining temporal attack patterns from cyberthreat intelligence reports
Rahman, M. R., Wroblewski, B., Matthews, Q., Morgan, B., Menzies, T., & Williams, L. (2025, July 22). KNOWLEDGE AND INFORMATION SYSTEMS, Vol. 7.
2025 journal article
TikTok engagement traces over time and health risky behaviors: Combining data linkage and computational methods
TELEMATICS AND INFORMATICS, 101.
2025 article
Assessment Types, Strategies, and Feedback in Online Higher Education Courses in the Age of Artificial Intelligence: Perspectives of Instructional Designers
Martin, F., Kim, S., Bolliger, D. U., & DeLarm, J. (2025, July 22). TECHTRENDS, Vol. 7.
2025 article
Centers of teaching excellence in American universities: organizational structures, services, operations and evaluation
Wang, X., Kumar, S., Ritzhaupt, A. D., Lu, J., Pollard, R., & Martin, F. (2025, July 8). JOURNAL OF COMPUTING IN HIGHER EDUCATION, Vol. 7.
2025 conference paper
ProfessorX: Detecting Silent Vulnerabilities in Policy Engine Implementations
Weintraub, B., Liu, C., Enck, W., & Nita-Rotaru, C. (2025, July 8).
2025 journal article
THEMIS: <underline>T</underline>ime, <underline>H</underline>eterogeneity, and <underline>E</underline>nergy <underline>Mi</underline>nded <underline>S</underline>cheduling for Fair Multi-Tenant Use in FPGAs
IEEE TRANSACTIONS ON COMPUTERS, 74(7), 2515–2528.
2025 journal article
If you cannot Measure it, you cannot Secure it. A Case Study on Metrics for Informed Choice of Security Controls
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 92.
2025 article
Timed Physical Password or Authentication Keys
Martin, A., Kiptoo, D. J., Kanoy, D. S., Li, S., Du, C., Kumar, M., … Thuo, M. (2025, May 16). ACS APPLIED MATERIALS & INTERFACES, Vol. 5.
2025 article
Exploring the role of synchrony in asynchronous, synchronous, and quasi-synchronous online learner engagement
Culbreth, D., & Martin, F. (2025, May 8). ETR&D-EDUCATIONAL TECHNOLOGY RESEARCH AND DEVELOPMENT, Vol. 5.
2025 journal article
<i>Trusting Code in the Wild</i>: Exploring Contributor Reputation Measures to Review Dependencies in the Rust Ecosystem
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 51(4), 1319–1333.
2025 article
Assessing Compliance in Digital Advertising: A Deep Dive into Acceptable Ads Standards
PROCEEDINGS OF THE ACM WEB CONFERENCE 2025, WWW 2025, pp. 1536–1547.
2025 article
Keeping students safe: the experiences of educators implementing monitoring applications in K-12 settings
Garcia, M. A., Culbreth, D., Foxx, S. P., Martin, F., & Wang, W. (2025, April 11). EDUCATION AND INFORMATION TECHNOLOGIES, Vol. 4.
2025 journal article
Exploiting Intel AMX Power Gating
IEEE COMPUTER ARCHITECTURE LETTERS, 24(1), 113–116.