Sylvester Kaczmarek (Imperial College London)

Static defenses are brittle against the non-stationary threats common in long-duration space missions. We propose a framework for self-organizing resilience where a Spiking Neural Network (SNN) dynamically adapts its own structure to counter novel adversarial tactics. Governed by an informationtheoretic objective that balances representational fidelity against computational cost, the network autonomously grows or prunes neural populations to specialize against previously unseen threat signatures. We present preliminary results from a cislunar gateway case study where the adaptive SNN is subjected to a low-rate data injection attack designed to evade static detectors. The adaptive model successfully learned the new threat pattern, reducing per-window inference time by over 40% compared to its static counterpart, with no degradation in nominal performance. We provide explicit triggers, a two-stage commit with rollback, and an audit log, treating online adaptation as a security control bounded by runtime envelopes.

View More Papers

CHAMELEOSCAN: Demystifying and Detecting iOS Chameleon Apps via LLM-Powered...

Hongyu Lin (Zhejiang University), Yicheng Hu (Zhejiang University), Haitao Xu (Zhejiang University), Yanchen Lu (Zhejiang University), Mengxia Ren (Zhejiang University), Shuai Hao (Old Dominion University), Chuan Yue (Colorado School of Mines), Zhao Li (Hangzhou Yugu Technology), Fan Zhang (Zhejiang University), Yixin Jiang (Electric Power Research Institute, CSG)

Read More

CAT: Can Trust be Predicted with Context-Awareness in Dynamic...

Jie Wang (State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University), Zheng Yan (State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University and Hangzhou Institute of Technology, Xidian University), Jiahe Lan (State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University), Xuyan Li (Hangzhou…

Read More

Practical Traceable Over-Threshold Multi-Party Private Set Intersection

Le Yang (School of Cyber Science and Technology, University of Science and Technology of China), Weijing You (Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fujian Normal University), Huiyang He (School of Cyber Science and Technology, University of Science and Technology of China), Kailiang Ji (NIO Inc), Jingqiang…

Read More