关注
Aritran Piplai
标题
引用次数
引用次数
年份
RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement
A Pingle, A Piplai, S Mittal, A Joshi
International Conference on Advances in Social Networks Analysis and Mining …, 2019
1492019
Creating cybersecurity knowledge graphs from malware after action reports
A Piplai, S Mittal, A Joshi, T Finin, J Holt, R Zak
IEEE Access 2020, 2019
1182019
Generating Fake Cyber Threat Intelligence Using Transformer-Based Models
P Ranade, A Piplai, S Mittal, A Joshi, T Finin
International Joint Conference on Neural Networks 2021 (IJCNN 2021), 2021
852021
Cybert: Contextualized embeddings for the cybersecurity domain
P Ranade, A Piplai, A Joshi, T Finin
2021 IEEE International Conference on Big Data (Big Data), 3334-3342, 2021
832021
NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion
A Piplai, SSL Chukkapalli, A Joshi
2020 IEEE Big Data Security/HPSC/IDS, 6, 2020
672020
Preventing poisoning attacks on AI based threat intelligence systems
N Khurana, S Mittal, A Piplai, A Joshi
2019 IEEE 29th International Workshop on Machine Learning for Signal …, 2019
662019
A smart-farming ontology for attribute based access control
SSL Chukkapalli, A Piplai, S Mittal, M Gupta, A Joshi
2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity …, 2020
482020
Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior
A Piplai, S Mittal, M Abdelsalam, M Gupta, A Joshi, T Finin
18th IEEE International Conference on Intelligence and Security Informatics …, 2020
392020
Using knowledge graphs and reinforcement learning for malware analysis
A Piplai, P Ranade, A Kotal, S Mittal, SN Narayanan, A Joshi
2020 IEEE International Conference on Big Data (Big Data), 2626-2633, 2020
372020
A comparative study of deep learning based named entity recognition algorithms for cybersecurity
S Dasgupta, A Piplai, A Kotal, A Joshi
2020 IEEE International Conference on Big Data (Big Data), 2596-2604, 2020
352020
Privetab: Secure and privacy-preserving sharing of tabular data
A Kotal, A Piplai, SSL Chukkapalli, A Joshi
Proceedings of the 2022 ACM on International Workshop on Security and …, 2022
302022
Combating fake cyber threat intelligence using provenance in cybersecurity knowledge graphs
S Mitra, A Piplai, S Mittal, A Joshi
2021 IEEE International Conference on Big Data (Big Data), 3316-3323, 2021
302021
Deep Learning-Based Speech and Vision Synthesis to Improve Phishing Attack Detection through a Multi-layer Adaptive Framework
T Ige, C Kiekintveld, A Piplai
arXiv preprint arXiv:2402.17249, 2024
242024
An investigation into the performances of the state-of-the-art machine learning approaches for various cyber-attack detection: A survey
T Ige, C Kiekintveld, A Piplai
2024 IEEE International Conference on Electro Information Technology (eIT …, 2024
202024
Knowledge guided two-player reinforcement learning for cyber attacks and defenses
A Piplai, M Anoruo, K Fasaye, A Joshi, T Finin, A Ridley
2022 21st IEEE International Conference on Machine Learning and Applications …, 2022
202022
Localintel: Generating organizational threat intelligence from global and local cyber knowledge
S Mitra, S Neupane, T Chakraborty, S Mittal, A Piplai, M Gaur, S Rahimi
arXiv preprint arXiv:2401.10036, 2024
192024
Knowledge-enhanced neurosymbolic artificial intelligence for cybersecurity and privacy
A Piplai, A Kotal, S Mohseni, M Gaur, S Mittal, A Joshi
IEEE Internet Computing 27 (5), 43-48, 2023
192023
An in-Depth Investigation Into the Performance of State-of-the-Art Zero-Shot, Single-Shot, and Few-Shot Learning Approaches on an Out-of-Distribution Zero-Day Malware Attack …
T Ige, C Kiekintveld, A Piplai, A Wagler, O Kolade, BH Matti
2024 International Symposium on Networks, Computers and Communications …, 2024
132024
A policy-driven approach to secure extraction of covid-19 data from research papers
L Elluri, A Piplai, A Kotal, A Joshi, KP Joshi
Frontiers in big Data 4, 701966, 2021
132021
An investigation into the performances of the Current state-of-the-art Naive Bayes, Non-Bayesian and Deep Learning Based Classifier for Phishing Detection: A Survey
T Ige, C Kiekintveld, A Piplai, A Waggler, O Kolade, BH Matti
arXiv preprint arXiv:2411.16751, 2024
112024
系统目前无法执行此操作,请稍后再试。
文章 1–20