


default search action
Aritran Piplai
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c20]Tosin Ige, Christopher Kiekintveld, Aritran Piplai:
An Investigation into the Performances of the State-of-the-art Machine Learning Approaches for Various Cyber-attack Detection: A Survey. EIT 2024: 135-144 - [c19]Tosin Ige, Christopher Kiekintveld, Aritran Piplai, Amy Wagler, Olukunle Kolade, Bolanle Hafiz Matti:
Towards an in-Depth Evaluation of the Performance, Suitability and Plausibility of Few-Shot Meta Transfer Learning on An Unknown Out-of-Distribution Cyber-attack Detection. ISNCC 2024: 1-6 - [c18]Tosin Ige, Christopher Kiekintveld, Aritran Piplai, Amy Wagler, Olukunle Kolade, Bolanle Hafiz Matti:
An in-Depth Investigation Into the Performance of State-of-the-Art Zero-Shot, Single-Shot, and Few-Shot Learning Approaches on an Out-of-Distribution Zero-Day Malware Attack Detection. ISNCC 2024: 1-6 - [c17]Elizabeth Mullins
, Adrian Portillo
, Kristalys Ruiz-Rohena
, Aritran Piplai
:
Enhancing classroom teaching with LLMs and RAG. SIGITE 2024: 145-146 - [i13]Shaswata Mitra, Trisha Chakraborty, Subash Neupane, Aritran Piplai, Sudip Mittal:
Use of Graph Neural Networks in Aiding Defensive Cyber Operations. CoRR abs/2401.05680 (2024) - [i12]Shaswata Mitra, Subash Neupane, Trisha Chakraborty, Sudip Mittal, Aritran Piplai, Manas Gaur
, Shahram Rahimi:
LOCALINTEL: Generating Organizational Threat Intelligence from Global and Local Cyber Knowledge. CoRR abs/2401.10036 (2024) - [i11]Tosin Ige, Christopher Kiekintveld, Aritran Piplai:
An Investigation into the Performances of the State-of-the-art Machine Learning Approaches for Various Cyber-attack Detection: A Survey. CoRR abs/2402.17045 (2024) - [i10]Tosin Ige, Christopher Kiekintveld, Aritran Piplai:
Deep Learning-Based Speech and Vision Synthesis to Improve Phishing Attack Detection through a Multi-layer Adaptive Framework. CoRR abs/2402.17249 (2024) - [i9]Leon Garza, Lavanya Elluri, Anantaa Kotal, Aritran Piplai, Deepti Gupta, Anupam Joshi:
PrivComp-KG : Leveraging Knowledge Graph and Large Language Models for Privacy Policy Compliance Verification. CoRR abs/2404.19744 (2024) - [i8]Elizabeth Mullins, Adrian Portillo, Kristalys Ruiz-Rohena, Aritran Piplai:
Enhancing classroom teaching with LLMs and RAG. CoRR abs/2411.04341 (2024) - [i7]Tosin Ige, Christopher Kiekintveld, Aritran Piplai, Amy Waggler, Olukunle Kolade, Bolanle Hafiz Matti:
An investigation into the performances of the Current state-of-the-art Naive Bayes, Non-Bayesian and Deep Learning Based Classifier for Phishing Detection: A Survey. CoRR abs/2411.16751 (2024) - 2023
- [j3]Aritran Piplai
, Anantaa Kotal, Seyedreza Mohseni
, Manas Gaur
, Sudip Mittal
, Anupam Joshi:
Knowledge-Enhanced Neurosymbolic Artificial Intelligence for Cybersecurity and Privacy. IEEE Internet Comput. 27(5): 43-48 (2023) - [c16]Aritran Piplai, Anupam Joshi, Tim Finin:
Offline RL+CKG: A hybrid AI model for cybersecurity tasks. AAAI Spring Symposium: MAKE 2023 - [i6]Aritran Piplai, Anantaa Kotal, Seyedreza Mohseni, Manas Gaur, Sudip Mittal, Anupam Joshi:
Knowledge-enhanced Neuro-Symbolic AI for Cybersecurity and Privacy. CoRR abs/2308.02031 (2023) - 2022
- [c15]Anantaa Kotal, Aritran Piplai, Sai Sree Laya Chukkapalli, Anupam Joshi:
PriveTAB: Secure and Privacy-Preserving sharing of Tabular Data. IWSPA@CODASPY 2022: 35-45 - [c14]Aritran Piplai, Mike Anoruo, Kayode Fasaye, Anupam Joshi, Tim Finin
, Ahmad Ridley:
Knowledge Guided Two-player Reinforcement Learning for Cyber Attacks and Defenses. ICMLA 2022: 1342-1349 - 2021
- [j2]Lavanya Elluri
, Aritran Piplai, Anantaa Kotal, Anupam Joshi, Karuna Pande Joshi:
A Policy-Driven Approach to Secure Extraction of COVID-19 Data From Research Papers. Frontiers Big Data 4: 701966 (2021) - [c13]Soham Dasgupta, Aritran Piplai, Priyanka Ranade, Anupam Joshi:
Cybersecurity Knowledge Graph Improvement with Graph Neural Networks. IEEE BigData 2021: 3290-3297 - [c12]Shaswata Mitra, Aritran Piplai, Sudip Mittal, Anupam Joshi:
Combating Fake Cyber Threat Intelligence using Provenance in Cybersecurity Knowledge Graphs. IEEE BigData 2021: 3316-3323 - [c11]Priyanka Ranade, Aritran Piplai, Anupam Joshi, Tim Finin
:
CyBERT: Contextualized Embeddings for the Cybersecurity Domain. IEEE BigData 2021: 3334-3342 - [c10]Priyanka Ranade, Aritran Piplai, Sudip Mittal, Anupam Joshi, Tim Finin
:
Generating Fake Cyber Threat Intelligence Using Transformer-Based Models. IJCNN 2021: 1-9 - [i5]Priyanka Ranade, Aritran Piplai, Sudip Mittal, Anupam Joshi, Tim Finin:
Generating Fake Cyber Threat Intelligence Using Transformer-Based Models. CoRR abs/2102.04351 (2021) - 2020
- [j1]Aritran Piplai
, Sudip Mittal
, Anupam Joshi
, Tim Finin
, James Holt
, Richard Zak:
Creating Cybersecurity Knowledge Graphs From Malware After Action Reports. IEEE Access 8: 211691-211703 (2020) - [c9]Soham Dasgupta, Aritran Piplai, Anantaa Kotal, Anupam Joshi:
A Comparative Study of Deep Learning based Named Entity Recognition Algorithms for Cybersecurity. IEEE BigData 2020: 2596-2604 - [c8]Aritran Piplai, Priyanka Ranade, Anantaa Kotal, Sudip Mittal, Sandeep Nair Narayanan, Anupam Joshi:
Using Knowledge Graphs and Reinforcement Learning for Malware Analysis. IEEE BigData 2020: 2626-2633 - [c7]Sai Sree Laya Chukkapalli, Aritran Piplai, Sudip Mittal, Maanak Gupta, Anupam Joshi
:
A Smart-Farming Ontology for Attribute Based Access Control. BigDataSecurity/HPSC/IDS 2020: 29-34 - [c6]Aritran Piplai, Sai Sree Laya Chukkapalli, Anupam Joshi
:
NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion. BigDataSecurity/HPSC/IDS 2020: 49-54 - [c5]Aritran Piplai, Sudip Mittal, Mahmoud Abdelsalam, Maanak Gupta, Anupam Joshi, Tim Finin
:
Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior. ISI 2020: 1-6 - [i4]Aritran Piplai, Sai Sree Laya Chukkapalli, Anupam Joshi:
NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion. CoRR abs/2002.08527 (2020) - [i3]Zois Boukouvalas, Christine Mallinson, Evan Crothers, Nathalie Japkowicz, Aritran Piplai, Sudip Mittal, Anupam Joshi, Tülay Adali:
Independent Component Analysis for Trustworthy Cyberspace during High Impact Events: An Application to Covid-19. CoRR abs/2006.01284 (2020)
2010 – 2019
- 2019
- [c4]Aditya Pingle, Aritran Piplai, Sudip Mittal, Anupam Joshi
, James Holt, Richard Zak
:
RelExt: relation extraction using deep learning approaches for cybersecurity knowledge graph improvement. ASONAM 2019: 879-886 - [c3]Nitika Khurana, Sudip Mittal, Aritran Piplai, Anupam Joshi
:
Preventing Poisoning Attacks On AI Based Threat Intelligence Systems. MLSP 2019: 1-6 - [i2]Aditya Pingle, Aritran Piplai, Sudip Mittal, Anupam Joshi, James Holt
, Richard Zak:
RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement. CoRR abs/1905.02497 (2019) - 2016
- [i1]Satrajit Mukherjee, Bodhisattwa Prasad Majumder, Aritran Piplai, Swagatam Das:
Kernelized Weighted SUSAN based Fuzzy C-Means Clustering for Noisy Image Segmentation. CoRR abs/1603.08564 (2016) - 2014
- [c2]Satrajit Mukherjee, Bodhisattwa Prasad Majumder, Aritran Piplai, Swagatam Das
:
A novel fuzzy non-homogeneity measure based kernelized image segmentation for noisy images. FUZZ-IEEE 2014: 245-252 - 2013
- [c1]Satrajit Mukherjee, Bodhisattwa Prasad Majumder, Aritran Piplai, Swagatam Das
:
An Adaptive Differential Evolution Based Fuzzy Approach for Edge Detection in Color and Grayscale Images. SEMCCO (1) 2013: 260-273
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:15 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint