Publications

Here are some publications I've worked on. I'll try to keep this updated as I work on new things.

11 Total
5 Published
6 In Progress
Search & Filter
Showing 11 of 11 publications
Alexander Towell
2026-04-08 Conference Paper

Knowledge bases in logic programming grow through fact accumulation but do not learn. We present DreamLog, a system that compresses its knowledge base through wake-sleep cycles, discovering rules that generalize to unseen entities. On a synthetic crafting domain with invented terms unknown to the …

compression logic programming wake-sleep cycles Solomonoff induction LLM knowledge base generalization
Alexander Towell, John Matta
2026-03-30 Conference Paper ISCS 2026 (Springer Proceedings)

We investigate whether AI conversation archives contain hierarchical structure analogous to human semantic memory. From a longitudinal archive of 1,908 ChatGPT conversations spanning 29 months, we extract semantic concepts using LLM-based analysis, embed them in a 768-dimensional semantic space, and …

semantic memory hierarchical clustering AI conversations complex networks small-world networks
Alexander Towell, John Matta
2026-03-15 Journal Article PLOS Complex Systems

How does a person's knowledge landscape evolve through sustained AI-assisted conversation? We extend our cognitive MRI methodology to the temporal domain, tracking how a semantic similarity network grows over 29 months across 1,908 ChatGPT conversations. The network exhibits super-linear …

temporal networks knowledge networks AI conversations complex networks network evolution densification
Alex Towell, John Matta
2025-12-09 Conference Paper Complex Networks 2025

Through a single-user case study of 449 ChatGPT conversations, we introduce a cognitive MRI applying network analysis to reveal thought topology hidden in linear conversation logs. We construct semantic similarity networks with user-weighted embeddings to identify knowledge communities and bridge …

complex networks AI conversation semantic embedding knowledge graphs ChatGPT network analysis community detection cognitive science
Alex Towell, Hiroshi Fujinoki
2025-04-08 Conference Paper 2025 7th International Conference on Computer Communication and the Internet (ICCCI)

This paper presents a novel approach to preventing ransomware damages through in-operation off-site backup systems designed to achieve an exceptionally low false-negative miss-detection rate of 10⁻⁸.

IEEE ransomware backup systems cybersecurity false-negative detection
Alex Towell
2024-01-10 Technical Report

How do you store infinity in 256 bits? This paper explores the fundamental deception at the heart of computational cryptography: using finite information to simulate infinite randomness. We prove why true random oracles are impossible, then show how lazy evaluation creates a beautiful lie—a finite …

cryptography philosophy
Alex Towell
2023-08-09 Thesis DOI

This paper investigates maximum likelihood techniques to estimate component reliability from masked failure data in series systems. A likelihood model accounts for right-censoring and candidate sets indicative of masked failure causes. Extensive simulation studies assess the accuracy and precision …

R statistics reliability series systems masked data maximum likelihood
Alexander A. Towell, Hiroshi Fujinoki
2016-11-02 Conference Paper 8th International Conference on Computing Communication and Networking Technologies (ICCCNT) DOI

This paper applies an approach of resilience engineering in studying how effective encrypted searches will be. One of the concerns on encrypted searches is frequency attacks. In frequency attacks, adversaries guess the meaning of the encrypted words by observing a large number of encrypted words in …

encrypted search oblivious computing frequency attacks known-plaintext attacks privacy-preserving search confidentiality estimation bootstrap method statistical analysis information retrieval cryptography security analysis access pattern leakage
Alex Towell
2015-05-01 Thesis ProQuest

Encrypted Search, a technique for securely searching documents on untrusted systems. The author designs and compares several secure index types to determine their performance in terms of time complexity, space complexity, and retrieval accuracy. The study also examines the risk to confidentiality …

encrypted search secure index information retrieval confidentiality oblivious computing privacy-preserving search query obfuscation false positives secure index poisoning adversarial access query histories frequency attacks access pattern leakage cryptography thesis