Research

I like problems at the boundary between theory and deployment — methods that can actually run inside systems.

IEEE Chilecon 2021 · Network Security

An Empirical Evaluation of Machine Learning for Hardening Security Devices in Data Networks

Evaluated machine learning approaches to improve robustness of security devices in networked environments, combining traffic analysis, anomaly detection, and deployment tradeoffs.

View on IEEE Xplore →
LLMs · Agentic AI · Ongoing

Understanding Failure Modes in Multi-Agent LLM Systems (Working)

Exploratory work on when multi-agent setups actually help vs hurt: compounding errors, coordination overhead, and how to design evaluation that detects silent failures.

Draft in progress — will be linked here and on Google Scholar when available.

RAG · Evaluation · Upcoming

Probing RAG Pipelines via Perturbation-Based Evaluation (Planned)

A planned line of work on evaluating retrieval-augmented generation by perturbing both documents and queries, and scoring the sensitivity and robustness of systems end-to-end.

More

For a complete and always up-to-date list of publications and citations, please visit my Google Scholar profile:

Open Google Scholar