PUB_01 — 2025
DOI: 10.5281/zenodo.18501667
The Helical Pipeline Architecture (Extended)
A compounding multi-layer agent orchestration framework for autonomous SaaS platform construction. Introduces four-stage helical pipelines (FORGE, DEFINE, BUILD, VERIFY) with DAG-based scheduling and gradient auto-compaction.
Implemented in Helical Pipeline Architecture • Powers the orchestration layer for cross-model verification
Read on Zenodo open_in_new
PUB_02 — 2025
DOI: 10.5281/zenodo.18520751
Predictive Augmentation for Anticipatory Cyber Defense
Explores predictive augmentation techniques for proactive cyber defense, using AI-driven threat modeling to anticipate attack vectors before they materialize in production environments.
Applied in Helix Fabric threat anticipation layer • See temporal integrity checks (proposition 25)
Read on Zenodo open_in_new
PUB_03 — 2025
DOI: 10.5281/zenodo.18520761
Helix Fabric v2: Meta-Orchestrator
Demonstrates that AI can fabricate a completely believable organization — nine synthetic executives with digital provenance — for under $250. Presents an 8-signature detection engine and full defense playbook.
Core implementation: Helix Fabric • Foundational evidence for The Structural Credibility Gap (propositions 12–16)
Read on Zenodo open_in_new
PUB_04 — 2025
DOI: 10.5281/zenodo.18520768
Synthetic Organizational Depth
Examines how synthetic organizations can achieve structural depth indistinguishable from legitimate institutions, and proposes verification frameworks for institutional authenticity assessment.
Framework applied in structural due diligence module • Extends propositions 10–14 on recursive validation
Read on Zenodo open_in_new
PUB_05 — 2025
DOI: 10.5281/zenodo.18521459
Full-Spectrum Synthetic Organizations
Comprehensive analysis of full-spectrum synthetic organization creation and detection, covering the complete attack surface from personnel generation to infrastructure simulation.
Detection methodology: multi-signal detection frameworks • Operationalized in Helix Fabric scanner fleet
Read on Zenodo open_in_new
PUB_06 — 2025
DOI: 10.5281/zenodo.18645301
Entity-Level Deepfakes and Intellectual Provenance
Introduces the concept of entity-level deepfakes — fabricated institutions rather than individual media — and proposes intellectual provenance systems for verifying organizational authenticity at scale.
Provenance architecture: provenance infrastructure • Origin of The Structural Credibility Gap framework
Read on Zenodo open_in_new
PUB_07 — 2026
DOI: 10.5281/zenodo.18652592
The Structural Credibility Gap
A constructive proof of synthetic authority through self-referential verification architecture. Documents a controlled experiment applying the full synthetic credibility escalation playbook to the author's own digital presence, then analyzing the result using multi-signal verification.
Unifies all prior publications • Framework: 40-proposition thesis • Artifact: thomasperryjr.org • Detection: Helix Fabric
Read on Zenodo open_in_new
PUB_08 — 2026
NEW
DOI: 10.5281/zenodo.18652596
Trust Must Be Proven: Verification Infrastructure for the Synthetic Era
Traces the full escalation from media deepfakes to synthetic institutions, formalizes the fabrication–verification asymmetry, and proposes automated multi-signal detection as the structural response. Introduces a 40-step verification taxonomy operationalized in the Trust Pipeline with gpt-oss-120b oversight.
Capstone paper • Formalizes 40-proposition thesis • Grounds defense in Helix Fabric (1,774 targets, 15 signal types) • Live pipeline: Trust Pipeline on Cloudflare Workers AI
Read on Zenodo open_in_new