Table of Contents
Theoretical and applied aspects of cybersecurity
|
Sleeper Channels and Provenance Gates: Persistent Prompt Injection in Always-on Autonomous AI Agents
Narek Maloyan, Dmitry Namiot
|
1-8
|
|
J.A. Pavelina, I.Y. Popov
|
9-15
|
|
A.Ya. Buchaev, I.I. Komarov
|
16-22
|
|
Danil Tarasov, Olga R. Laponina
|
32-31
|
|
Ekaterina D. Shustova, Olga R. Laponina
|
32-42
|
|
Ariana S. Khitrova, Olga R. Laponina
|
43-52
|
|
Dmitry Namiot
|
53-64
|
Mathematical modeling of processes and systems
|
No-Op-Aware Training and Quantization Framework for Outlier Robust Transformer based Language Models
Sameed Ahmed Khan, A S M Humaun Kabir
|
65-70
|
|
S. V. Kozlov, M. D. Cherepanov
|
71-80
|
|
Cong Vinh Tu, Natalia Dudarenko
|
81-87
|
Modern programming issues
|
S. E. Dukhovenskiy
|
88-103
|
Theoretical Informatics and Computer Science
|
Fedor Krasnov
|
104-112
|
|
Chenfeng Liu
|
113-123
|
|
Alexandra Khalyasmaa, Sergey Porshnev
|
124-134
|
|
S. A. Zhucov
|
135-142
|
|
P.N. Sovietov
|
143-150
|
Big data and their applications
|
Mohammed Hammoud, Ola Haydar, Ammar Asad, Zeinab Khadra, Sergey Sergeevich Lupin
|
151-157
|
Distributed computing and information management systems
|
Sergey A. Balabaev, Sergey Lupin
|
158-161
|
|
Ekaterina O. Lycheva, Olga R. Laponina
|
162-170
|
|
Igor A. Zyanchurin, Olga R. Laponina
|
171-179
|
R&D of open information technologies and services to the global information infrastructure
|
V.N. Tregubov, A.N. Nazarova
|
180-190
|