Location
https://www.kennesaw.edu/ccse/events/computing-showcase/sp25-cday-program.php
Event Website
http://agenticdapp.s3-website-us-east-1.amazonaws.com
Document Type
Event
Start Date
15-4-2025 4:00 PM
Description
Our research introduces a decentralized agent mesh architecture that transforms blockchain application development from fragmented human-driven processes to autonomous, systematized workflows through human-AI collaboration. We’ve reimagined blockchain application development from the ground up by creating a decentralized agent ecosystem where humans and AI collaborate as peers rather than tools. Our innovation lies in the autonomous yet interconnected nature of specialized LLM powered agents handling contract creation, backend logic, frontend interfaces, and security auditing. Our proposed architecture distributes expertise across AI agents that operate in a peer-to-peer network. Furthermore, to address the emerging threat of systemic vulnerabilities from AI-generated code patterns, we’ve integrated diverse verification methods that challenge and strengthen code before deployment.
Included in
GRP-071 Next-Generation DAPPs Development with Self-Service AI Agents
https://www.kennesaw.edu/ccse/events/computing-showcase/sp25-cday-program.php
Our research introduces a decentralized agent mesh architecture that transforms blockchain application development from fragmented human-driven processes to autonomous, systematized workflows through human-AI collaboration. We’ve reimagined blockchain application development from the ground up by creating a decentralized agent ecosystem where humans and AI collaborate as peers rather than tools. Our innovation lies in the autonomous yet interconnected nature of specialized LLM powered agents handling contract creation, backend logic, frontend interfaces, and security auditing. Our proposed architecture distributes expertise across AI agents that operate in a peer-to-peer network. Furthermore, to address the emerging threat of systemic vulnerabilities from AI-generated code patterns, we’ve integrated diverse verification methods that challenge and strengthen code before deployment.
https://digitalcommons.kennesaw.edu/cday/Spring_2025/PhD_Research/4