Follow
Aritran Piplai
Title
Cited by
Cited by
Year
RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement
A Pingle, A Piplai, S Mittal, A Joshi
International Conference on Advances in Social Networks Analysis and Mining …, 2019
1242019
Creating cybersecurity knowledge graphs from malware after action reports
A Piplai, S Mittal, A Joshi, T Finin, J Holt, R Zak
IEEE Access 2020, 2019
872019
Generating Fake Cyber Threat Intelligence Using Transformer-Based Models
P Ranade, A Piplai, S Mittal, A Joshi, T Finin
International Joint Conference on Neural Networks 2021 (IJCNN 2021), 2021
652021
Preventing poisoning attacks on AI based threat intelligence systems
N Khurana, S Mittal, A Piplai, A Joshi
2019 IEEE 29th International Workshop on Machine Learning for Signal …, 2019
582019
NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion
A Piplai, SSL Chukkapalli, A Joshi
2020 IEEE Big Data Security/HPSC/IDS, 6, 2020
512020
Cybert: Contextualized embeddings for the cybersecurity domain
P Ranade, A Piplai, A Joshi, T Finin
2021 IEEE International Conference on Big Data (Big Data), 3334-3342, 2021
422021
A smart-farming ontology for attribute based access control
SSL Chukkapalli, A Piplai, S Mittal, M Gupta, A Joshi
2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity …, 2020
392020
Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior
A Piplai, S Mittal, M Abdelsalam, M Gupta, A Joshi, T Finin
18th IEEE International Conference on Intelligence and Security Informatics …, 2020
352020
A comparative study of deep learning based named entity recognition algorithms for cybersecurity
S Dasgupta, A Piplai, A Kotal, A Joshi
2020 IEEE International Conference on Big Data (Big Data), 2596-2604, 2020
262020
Using knowledge graphs and reinforcement learning for malware analysis
A Piplai, P Ranade, A Kotal, S Mittal, SN Narayanan, A Joshi
2020 IEEE International Conference on Big Data (Big Data), 2626-2633, 2020
252020
Combating fake cyber threat intelligence using provenance in cybersecurity knowledge graphs
S Mitra, A Piplai, S Mittal, A Joshi
2021 IEEE International Conference on Big Data (Big Data), 3316-3323, 2021
232021
Privetab: Secure and privacy-preserving sharing of tabular data
A Kotal, A Piplai, SSL Chukkapalli, A Joshi
Proceedings of the 2022 ACM on International Workshop on Security and …, 2022
152022
Knowledge guided two-player reinforcement learning for cyber attacks and defenses
A Piplai, M Anoruo, K Fasaye, A Joshi, T Finin, A Ridley
2022 21st IEEE International Conference on Machine Learning and Applications …, 2022
112022
A policy-driven approach to secure extraction of covid-19 data from research papers
L Elluri, A Piplai, A Kotal, A Joshi, KP Joshi
Frontiers in big Data 4, 701966, 2021
112021
Independent component analysis for trustworthy cyberspace during high impact events: an application to Covid-19
Z Boukouvalas, C Mallinson, E Crothers, N Japkowicz, A Piplai, S Mittal, ...
arXiv preprint arXiv:2006.01284, 2020
92020
LOCALINTEL: Generating Organizational Threat Intelligence from Global and Local Cyber Knowledge
S Mitra, S Neupane, T Chakraborty, S Mittal, A Piplai, M Gaur, S Rahimi
arXiv preprint arXiv:2401.10036, 2024
62024
Cybersecurity knowledge graph improvement with graph neural networks
S Dasgupta, A Piplai, P Ranade, A Joshi
2021 IEEE International Conference on Big Data (Big Data), 3290-3297, 2021
62021
Knowledge-enhanced neurosymbolic artificial intelligence for cybersecurity and privacy
A Piplai, A Kotal, S Mohseni, M Gaur, S Mittal, A Joshi
IEEE Internet Computing 27 (5), 43-48, 2023
52023
Offline RL+ CKG: A hybrid AI model for cybersecurity tasks
A Piplai, A Joshi, T Finin
AAAI Challenges Requiring the Combination of Machine Learning and Knowledge …, 2023
52023
An adaptive differential evolution based fuzzy approach for edge detection in color and grayscale images
S Mukherjee, BP Majumder, A Piplai, S Das
Swarm, Evolutionary, and Memetic Computing: 4th International Conference …, 2013
42013
The system can't perform the operation now. Try again later.
Articles 1–20