RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement A Pingle, A Piplai, S Mittal, A Joshi International Conference on Advances in Social Networks Analysis and Mining …, 2019 | 149 | 2019 |
Creating cybersecurity knowledge graphs from malware after action reports A Piplai, S Mittal, A Joshi, T Finin, J Holt, R Zak IEEE Access 2020, 2019 | 118 | 2019 |
Generating Fake Cyber Threat Intelligence Using Transformer-Based Models P Ranade, A Piplai, S Mittal, A Joshi, T Finin International Joint Conference on Neural Networks 2021 (IJCNN 2021), 2021 | 85 | 2021 |
Cybert: Contextualized embeddings for the cybersecurity domain P Ranade, A Piplai, A Joshi, T Finin 2021 IEEE International Conference on Big Data (Big Data), 3334-3342, 2021 | 83 | 2021 |
NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion A Piplai, SSL Chukkapalli, A Joshi 2020 IEEE Big Data Security/HPSC/IDS, 6, 2020 | 67 | 2020 |
Preventing poisoning attacks on AI based threat intelligence systems N Khurana, S Mittal, A Piplai, A Joshi 2019 IEEE 29th International Workshop on Machine Learning for Signal …, 2019 | 66 | 2019 |
A smart-farming ontology for attribute based access control SSL Chukkapalli, A Piplai, S Mittal, M Gupta, A Joshi 2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity …, 2020 | 48 | 2020 |
Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior A Piplai, S Mittal, M Abdelsalam, M Gupta, A Joshi, T Finin 18th IEEE International Conference on Intelligence and Security Informatics …, 2020 | 39 | 2020 |
Using knowledge graphs and reinforcement learning for malware analysis A Piplai, P Ranade, A Kotal, S Mittal, SN Narayanan, A Joshi 2020 IEEE International Conference on Big Data (Big Data), 2626-2633, 2020 | 37 | 2020 |
A comparative study of deep learning based named entity recognition algorithms for cybersecurity S Dasgupta, A Piplai, A Kotal, A Joshi 2020 IEEE International Conference on Big Data (Big Data), 2596-2604, 2020 | 35 | 2020 |
Privetab: Secure and privacy-preserving sharing of tabular data A Kotal, A Piplai, SSL Chukkapalli, A Joshi Proceedings of the 2022 ACM on International Workshop on Security and …, 2022 | 30 | 2022 |
Combating fake cyber threat intelligence using provenance in cybersecurity knowledge graphs S Mitra, A Piplai, S Mittal, A Joshi 2021 IEEE International Conference on Big Data (Big Data), 3316-3323, 2021 | 30 | 2021 |
Deep Learning-Based Speech and Vision Synthesis to Improve Phishing Attack Detection through a Multi-layer Adaptive Framework T Ige, C Kiekintveld, A Piplai arXiv preprint arXiv:2402.17249, 2024 | 24 | 2024 |
An investigation into the performances of the state-of-the-art machine learning approaches for various cyber-attack detection: A survey T Ige, C Kiekintveld, A Piplai 2024 IEEE International Conference on Electro Information Technology (eIT …, 2024 | 20 | 2024 |
Knowledge guided two-player reinforcement learning for cyber attacks and defenses A Piplai, M Anoruo, K Fasaye, A Joshi, T Finin, A Ridley 2022 21st IEEE International Conference on Machine Learning and Applications …, 2022 | 20 | 2022 |
Localintel: Generating organizational threat intelligence from global and local cyber knowledge S Mitra, S Neupane, T Chakraborty, S Mittal, A Piplai, M Gaur, S Rahimi arXiv preprint arXiv:2401.10036, 2024 | 19 | 2024 |
Knowledge-enhanced neurosymbolic artificial intelligence for cybersecurity and privacy A Piplai, A Kotal, S Mohseni, M Gaur, S Mittal, A Joshi IEEE Internet Computing 27 (5), 43-48, 2023 | 19 | 2023 |
An in-Depth Investigation Into the Performance of State-of-the-Art Zero-Shot, Single-Shot, and Few-Shot Learning Approaches on an Out-of-Distribution Zero-Day Malware Attack … T Ige, C Kiekintveld, A Piplai, A Wagler, O Kolade, BH Matti 2024 International Symposium on Networks, Computers and Communications …, 2024 | 13 | 2024 |
A policy-driven approach to secure extraction of covid-19 data from research papers L Elluri, A Piplai, A Kotal, A Joshi, KP Joshi Frontiers in big Data 4, 701966, 2021 | 13 | 2021 |
An investigation into the performances of the Current state-of-the-art Naive Bayes, Non-Bayesian and Deep Learning Based Classifier for Phishing Detection: A Survey T Ige, C Kiekintveld, A Piplai, A Waggler, O Kolade, BH Matti arXiv preprint arXiv:2411.16751, 2024 | 11 | 2024 |