Featured Publications by NSA Researchers

Overview

NSA Research is the largest in-house research organization in the Intelligence Community, with experts in fields such as mathematics, computer science, engineering, cybersecurity, physics, neuroscience,
and linguistics. Our researchers are active in their fields within and outside of NSA. The following bibliography lists other publications for which one or more of the authors are NSA researchers.
 
YEAR CITATION
2022 Baron JD; Darling RWR. “Empirical complexity of comparator-based nearest neighbor descent.” 2022. Cornell University Library. Available at: https://doi.org/10.48550/arXiv.2202.00517.
2022 Bluher A. “A new identity of Dickson polynomials.” Finite Fields and Their Applications. 2022;80(102012). Available at: https://doi.org/10.1016/j.ffa.2022.102012.
2022 Bluher A. “Explicit Artin maps into PGL2.” Expositiones Mathematicae. 2022;40(1):45–93. Available at: https://doi.org/10.1016/j.exmath.2021.07.003.
2022 Brewster RA, Goldhar J, Morris M, Baumgartner G, Chembo Y. “Estimation of the CHSH parameter using HOM interference.” IEEE Transactions on Quantum Engineering. 2022;3(4100310):1–10. Available at: https://doi.org/10.1109/TQE.2022.3152170.
2022 Darling RWR. “Hidden ancestor graphs with assortative vertex attributes.” Scaling limits: From statistical mechanics to manifolds. A workshop in honor of James Norris' 60th birthday. 2022. Available at: http://dx.doi.org/10.13140/RG.2.2.14978.56006.
2022 Darling RWR, Emanuello JA, Purvine E, Ridley A (eds). Proceedings of TDA: Applications of Topological Data Analysis to Data Science, Artificial Intelligence, and Machine Learning Workshop at SDM 2022. Cornell University Library. Available at: https://doi.org/10.48550/arXiv.2204.01142.
2022 Gerstner CR, Farid H. "Detecting real-time deep-fake videos using active illumination." In: 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), 2022, pp. 53–60. Available at: https://doi.org/10.1109/CVPRW56347.2022.00015.
2022 Johnson C, Ferguson-Walter K, Gutzwiller R, Scott D, Cook N. “Investigating cyber attacker team cognition.” Proceedings of the Human Factors and Ergonomics Society Annual Meeting. 2022;66(1):105–109. Available at: https://doi.org/10.1177/1071181322661132.
2022 Medak A. "Hardening the hardware supply chain: Standardized artifacts enable automated accountability." The Next Wave. 2022;23(2):40–49. ISSN 2640-1789. Available at: https://www.nsa.gov/thenextwave.
2022 Pellicone A, Ketelhut D, Shokeen E, Weintrop D, Cukier M, Plane J. “Designing a game to promote equity in cybersecurity.” Proceedings of the 16th European Conference on Games Based Learning. 2022;16(1). Available at: https://doi.org/10.34190/ecgbl.16.1.825.
2022 Pellicone A, Shokeen E, Moon P, Weintrop D, Ketelhut D, Cukier M, Plane J. "It just felt more like a pyramid—Narrative and concept in game-based learning puzzles.” 2022 International Conference of Meaningful Play. Abstract available at: https://meaningfulplay.msu.edu/proceedings2022/.
2022 Shokeen E, Pellicone A, Weintrop D, Moon P, Cukier M, Ketelhut D, Plane J. "The game was designed to learn to think—Player perception of learning in an educational game.” In: Proceedings of the 16th International Conference of the Learning Sciences (ICLS) 2022. Available at: https://2022.isls.org/proceedings/.
2021 Baron JD, Darling RWR, Davis JL, Pettit R. "Partitioned K-nearest neighbor local depth for scalable comparison-based learning." 2021. Cornell University Library. Available at: https://doi.org/10.48550/arXiv.2108.08864.
2021 Bhandary P, Zieglar E, Nicholas C. "Searching for selfie in TLS 1.3 with the cryptographic protocol shapes analyzer." 2021. In: Dougherty D, Meseguer J, Mödersheim SA, Rowe P (eds), Protocols, Strands, and Logic. Lecture Notes in Computer Science, vol 13066. Springer, Cham. Available at: https://doi.org/10.1007/978-3-030-91631-2_3.
2021 Bilinski M, diVita J, Ferguson-Walter K, Fugate S, Gabrys R, Mauger J, Souza B. (2021). "No time to lie: Bounds on the learning rate of a defender for inferring attacker target preferences." 2021. In: Bošanský B, Gonzalez C, Rass S, Sinha A (eds), Decision and Game Theory for Security. GameSec 2021. Lecture Notes in Computer Science, vol 13061. Springer, Cham. Available at: https://doi.org/10.1007/978-3-030-90370-1_8.
2021 Bluher A. "New Wilson-like theorems arising from Dickson polynomials." Finite Fields and Their Application. 2021;72(101819). Available at: https://doi.org/10.1016/j.ffa.2021.101819.
2021 Bluher A. "Permutation properties of Dickson and Chebyshev polynomials with connections to number theory." Finite Fields and Their Application. 2021;76(101899). Available at: https://doi.org/10.1016/j.ffa.2021.101899.
2021 Burkhardt P. "Graph connectivity in log steps using label propagation." Parallel Processing Letters. 2021;31(4):1–23. Available at: https://doi.org/10.1142/S0129626421500213.
2021 Burkhardt P. "Optimal algebraic breadth-first search for sparse graphs." ACM Transactions on Knowledge Discovery from Data. 2021;15(5):1–19. Available at: https://doi.org/10.1145/3446216.
2021 Comar B. “Decoding and equalization of a joint Alamouti-WPM system.” In: IEEE International Symposium on Networks, Computers, and Communications (ISNCC), 2021. Available at: https://doi.org/10.1109/ISNCC52172.2021.9615704.
2021 Comar B. “Detection of sinusoids with frequency drift in white Gaussian noise.” IEEE International Conference on Information and Communication Technology (ICoICT), 2021. Available at: https://doi.org/10.1109/ICoICT52021.2021.9527437.
2021 Comar B. “Implementation of a QPSK symbol synchronizer in Xilinx system generator,” In: 2021 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2021, pp. 396–401. Available at: https://doi.org/10.1109/ISVLSI51109.2021.00078.
2021 Comar B. “Method of combining cryptography and LDPC coding for enhanced privacy.” IGI Global: International Journal of Interdisciplinary Telecommunications & Networking (IJITN). 2021;13(4). Available at: https://doi.org/10.4018/IJITN.2021100105.
2021 Comar B. “Tone detection system design for targets with frequency drift.” IEEE International Conference on Information and Communication Technology (ICoICT), 2021. Available at: https://doi.org/10.1109/ICoICT52021.2021.9527412.
2021 Comar B, Frazier S. “Design of a joint alamouti-MIMO and wavelet packet modulation system.” In: IEEE International Symposium on Networks, Computers, and Communications (ISNCC), 2021. Available at: https://doi.org/10.1109/ISNCC52172.2021.9615650.
2021 Darling RWR. "Hidden ancestor graphs with assortative vertex attributes" 2021. Cornell University Library. Available at: https://doi.org/10.48550/arXiv.2102.09581.
2021 Edwards CA, Goyal A, Rusheen AE, Kouzani AZ, Lee KH. "DeepNavNet: Automated landmark localization for neuronavigation." Frontiers in Neuroscience. 2021;15. Available at: https://doi.org/10.3389/fnins.2021.670287.
2021 Ferguson-Walter KJ, Major MM, Johnson CK, Muhleman DH. "Examining the efficacy of decoy-based and psychological cyber deception." In: Proceedings of the 30th USENIX Security Symposium; 2021 Aug 11–13. Available at: https://usenix.org/system/files/sec21-ferguson-walter.pdf.
2021 Golczynski A, Emanuello J. "End-to-end anomaly detection for identifying malicious cyber behavior through NLP-based log embeddings." 2021. Paper presented at the International Joint Conference on Artificial Intelligence (IJCAI) First International Conference on Adaptive Cyber Defense. Available at: https://doi.org/10.48550/arXiv.2108.12276.
2021 Khan A, Fleming E, Schofield N, Bishop M, Andrews N. 2021. “A deep metric learning approach to account linking.” In: Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2021, pp. 5275–5287. Available at: http://dx.doi.org/10.18653/v1/2021.naacl-main.415.
2021 Laird B, Tran T. "Data-informed CRLB derivations for indoor emitter localization." In: 2021 55th Asilomar Conference on Signals, Systems, and Computers, 2021, pp 509–516. Available at: https://doi.org/10.1109/IEEECONF53345.2021.9723413.
2021 Laird B, Tran T. "Quasi-norm kernel-based emitter localization." In: 2021 55th Asilomar Conference on Signals, Systems, and Computers, 2021, pp 534–538. Available at: https://doi.org/10.1109/IEEECONF53345.2021.9723416.
2021 Major MM, Souza BJ, DiVita J, Ferguson-Walter KJ. "Informing autonomous deception systems with cyber expert performance data." 2021. Paper presented at the International Joint Conference on Artificial Intelligence (IJCAI) First International Conference on Adaptive Cyber Defense. Available at: https://doi.org/10.48550/arXiv.2109.00066.
2021 Molina-Markham A, Miniter C, Powell B, Ridley A. "Network environment design for autonomous cyberdefense." 2021. Cornell University Library. Available at: https://doi.org/10.48550/arXiv.2103.07583.
2021 Molina-Markham A, Winder RK, Ridley A. "Network defense is not a game." 2021. Paper presented at 2021 SIAM International Conference on Data Mining Workshop on AI/ML for Cybersecurity: Challenges, Solutions and Novel Ideas. Available at: https://doi.org/10.48550/arXiv.2104.10262.
2021 Nguyen AT, Raff E, Nicholas C, Holt J. "Leveraging uncertainty for improved static malware detection under extreme false positive constraints." 2021. Paper presented at the International Joint Conference on Artificial Intelligence (IJCAI) First International Conference on Adaptive Cyber Defense. Available at: https://doi.org/10.48550/arXiv.2108.04081.
2021 Rivera-Soto RA, Miano OE, Ordonez J, Chen BY, Khan A, Bishop M, Andrews N. “Learning universal authorship representations.” In: Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, pp. 913–919, Online and Punta Cana, Dominican Republic, November 2021. Association for Computational Linguistics. Available at: http://dx.doi.org/10.18653/v1/2021.emnlp-main.70.
2021 Rolinger TB, Krieger CD, Sussman A. "Optimizing memory-compute colocation for irregular applications on a migratory thread architecture." In: 2021 IEEE International Parallel and Distributed Processing Symposium (IPDPS), 2021, pp. 58–67. Available at: https://doi.org/10.1109/IPDPS49936.2021.00015.
2021 Rolinger TB, Krieger CD, Sussman A. "Runtime optimizations for irregular applications in Chapel." In: 8th Annual Chapel Implementers and Users Workshop (CHIUW), 2021. Available at: https://chapel-lang.org/CHIUW/2021/Rolinger.pdf.
2021 Walter EC, Ferguson-Walter KJ, Ridley AD. "Incorporating deception into CyberBattleSim for autonomous defense." 2021. Paper presented at the International Joint Conference on Artificial Intelligence (IJCAI) First International Conference on Adaptive Cyber Defense. Available at: https://doi.org/10.48550/arXiv.2108.13980.
2021 Wong V, Emanuello J. "Robustness of ML-enhanced IDS to stealthy adversaries." 2021. Paper presented at 2021 SIAM International Conference on Data Mining Workshop on AI/ML for Cybersecurity: Challenges, Solutions and Novel Ideas. Available at: https://doi.org/10.48550/arXiv.2104.10742.