Anomaly sensor framework for detecting advanced persistent threat attacks TF Yen, A Juels, A Kuppa, K Onarlioglu, A Oprea US Patent 9,378,361, 2016 | 124 | 2016 |
Financial cybercrime: A comprehensive survey of deep learning approaches to tackle the evolving financial crime landscape J Nicholls, A Kuppa, NA Le-Khac Ieee Access 9, 163965-163986, 2021 | 91 | 2021 |
Black Box Attacks on Explainable Artificial Intelligence (XAI) methods in Cyber Security A Kuppa, NA Le-Khac IEEE International Joint Conference on Neural Networks (IJCNN 2020), 2020 | 86 | 2020 |
Black box attacks on deep anomaly detectors A Kuppa, S Grzonkowski, MR Asghar, NA Le-Khac Proceedings of the 14th international conference on availability …, 2019 | 59 | 2019 |
Adversarial XAI methods in cybersecurity A Kuppa, NA Le-Khac IEEE transactions on information forensics and security 16, 4924-4938, 2021 | 50 | 2021 |
Linking cve’s to mitre att&ck techniques A Kuppa, L Aouad, NA Le-Khac Proceedings of the 16th International Conference on Availability …, 2021 | 42 | 2021 |
Legalbench: A collaboratively built benchmark for measuring legal reasoning in large language models N Guha, J Nyarko, D Ho, C Ré, A Chilton, A Chohlas-Wood, A Peters, ... Advances in Neural Information Processing Systems 36, 2024 | 36 | 2024 |
Enabling trust in deep learning models: a digital forensics case study A Kuppa, S Grzonkowski, NA Lekhac 2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | 34 | 2018 |
Systems and methods for detecting anomalous behavior within computing sessions A Kuppa, S Grzonkowski, S Pipriya US Patent 11,178,170, 2021 | 18 | 2021 |
Towards improving privacy of synthetic datasets A Kuppa, L Aouad, NA Le-Khac Annual Privacy Forum, 106-119, 2021 | 16 | 2021 |
Detecting advanced persistent threats SD Saklikar, A Kuppa, DR Moreau, R Zolfonoon US Patent 8,904,531, 2014 | 16 | 2014 |
Finding Rats in Cats: Detecting Stealthy Attacks using Group Anomaly Detection A Kuppa, S Grzonkowski, MR Asghar, NA Le-Khac 18th IEEE International Conference On Trust, Security And Privacy In …, 2019 | 15 | 2019 |
Riskwriter: Predicting cyber risk of an enterprise A Kuppa, S Grzonkowski, NA Le-Khac International Conference on Information Systems Security, 88-106, 2018 | 12* | 2018 |
Learn to adapt: Robust drift detection in security domain A Kuppa, NA Le-Khac Computers and Electrical Engineering 102, 108239, 2022 | 9 | 2022 |
Chain of reference prompting helps llm to think like a lawyer A Kuppa, N Rasumov-Rahe, M Voses Generative AI+ Law Workshop, 2023 | 8 | 2023 |
SoK: The next phase of identifying illicit activity in Bitcoin J Nicholls, A Kuppa, NA Le-Khac 2023 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 1-10, 2023 | 5 | 2023 |
Identifying web shell applications through file analysis A Kuppa, O Keyes, J Kennedy, I Biryukov US Patent 10,366,234, 2019 | 5 | 2019 |
Effect of security controls on patching window: A causal inference based approach A Kuppa, L Aouad, NA Le-Khac Proceedings of the 36th Annual Computer Security Applications Conference …, 2020 | 3 | 2020 |
Continuous scoring of security controls and dynamic tuning of security policies A Kuppa, L Aouad, B Doyle US Patent 11,973,788, 2024 | 2 | 2024 |
Identifying and protecting against an attack against an anomaly detector machine learning classifier A Kuppa, S Grzonkowski US Patent 11,297,083, 2022 | 2 | 2022 |