PUBLICATIONS

Research

Peer-reviewed papers on AI orchestration, synthetic identity detection, anticipatory cyber defense, and internet trust systems. All published via Zenodo with permanent DOIs.

PUB_01 — 2025 DOI: 10.5281/zenodo.18501667

The Helical Pipeline Architecture (Extended)

A compounding multi-layer agent orchestration framework for autonomous SaaS platform construction. Introduces four-stage helical pipelines (FORGE, DEFINE, BUILD, VERIFY) with DAG-based scheduling and gradient auto-compaction.

Implemented in Helical Pipeline Architecture • Powers the orchestration layer for cross-model verification

Read on Zenodo open_in_new
PUB_02 — 2025 DOI: 10.5281/zenodo.18520751

Predictive Augmentation for Anticipatory Cyber Defense

Explores predictive augmentation techniques for proactive cyber defense, using AI-driven threat modeling to anticipate attack vectors before they materialize in production environments.

Applied in Helix Fabric threat anticipation layer • See temporal integrity checks (proposition 25)

Read on Zenodo open_in_new
PUB_03 — 2025 DOI: 10.5281/zenodo.18520761

Helix Fabric v2: Meta-Orchestrator

Demonstrates that AI can fabricate a completely believable organization — nine synthetic executives with digital provenance — for under $250. Presents an 8-signature detection engine and full defense playbook.

Core implementation: Helix Fabric • Foundational evidence for The Structural Credibility Gap (propositions 12–16)

Read on Zenodo open_in_new
PUB_04 — 2025 DOI: 10.5281/zenodo.18520768

Synthetic Organizational Depth

Examines how synthetic organizations can achieve structural depth indistinguishable from legitimate institutions, and proposes verification frameworks for institutional authenticity assessment.

Framework applied in structural due diligence module • Extends propositions 10–14 on recursive validation

Read on Zenodo open_in_new
PUB_05 — 2025 DOI: 10.5281/zenodo.18521459

Full-Spectrum Synthetic Organizations

Comprehensive analysis of full-spectrum synthetic organization creation and detection, covering the complete attack surface from personnel generation to infrastructure simulation.

Detection methodology: multi-signal detection frameworks • Operationalized in Helix Fabric scanner fleet

Read on Zenodo open_in_new
PUB_06 — 2025 DOI: 10.5281/zenodo.18645301

Entity-Level Deepfakes and Intellectual Provenance

Introduces the concept of entity-level deepfakes — fabricated institutions rather than individual media — and proposes intellectual provenance systems for verifying organizational authenticity at scale.

Provenance architecture: provenance infrastructure • Origin of The Structural Credibility Gap framework

Read on Zenodo open_in_new
PUB_07 — 2026 DOI: 10.5281/zenodo.18652592

The Structural Credibility Gap

A constructive proof of synthetic authority through self-referential verification architecture. Documents a controlled experiment applying the full synthetic credibility escalation playbook to the author's own digital presence, then analyzing the result using multi-signal verification.

Unifies all prior publications • Framework: 40-proposition thesis • Artifact: thomasperryjr.org • Detection: Helix Fabric

Read on Zenodo open_in_new
PUB_08 — 2026 NEW
DOI: 10.5281/zenodo.18652596

Trust Must Be Proven: Verification Infrastructure for the Synthetic Era

Traces the full escalation from media deepfakes to synthetic institutions, formalizes the fabrication–verification asymmetry, and proposes automated multi-signal detection as the structural response. Introduces a 40-step verification taxonomy operationalized in the Trust Pipeline with gpt-oss-120b oversight.

Capstone paper • Formalizes 40-proposition thesis • Grounds defense in Helix Fabric (1,774 targets, 15 signal types) • Live pipeline: Trust Pipeline on Cloudflare Workers AI

Read on Zenodo open_in_new