RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement A Pingle, A Piplai, S Mittal, A Joshi International Conference on Advances in Social Networks Analysis and Mining …, 2019 | 133 | 2019 |
Creating cybersecurity knowledge graphs from malware after action reports A Piplai, S Mittal, A Joshi, T Finin, J Holt, R Zak IEEE Access 2020, 2019 | 98 | 2019 |
Generating Fake Cyber Threat Intelligence Using Transformer-Based Models P Ranade, A Piplai, S Mittal, A Joshi, T Finin International Joint Conference on Neural Networks 2021 (IJCNN 2021), 2021 | 70 | 2021 |
Preventing poisoning attacks on AI based threat intelligence systems N Khurana, S Mittal, A Piplai, A Joshi 2019 IEEE 29th International Workshop on Machine Learning for Signal …, 2019 | 57 | 2019 |
NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion A Piplai, SSL Chukkapalli, A Joshi 2020 IEEE Big Data Security/HPSC/IDS, 6, 2020 | 56 | 2020 |
Cybert: Contextualized embeddings for the cybersecurity domain P Ranade, A Piplai, A Joshi, T Finin 2021 IEEE International Conference on Big Data (Big Data), 3334-3342, 2021 | 49 | 2021 |
A smart-farming ontology for attribute based access control SSL Chukkapalli, A Piplai, S Mittal, M Gupta, A Joshi 2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity …, 2020 | 42 | 2020 |
Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior A Piplai, S Mittal, M Abdelsalam, M Gupta, A Joshi, T Finin 18th IEEE International Conference on Intelligence and Security Informatics …, 2020 | 37 | 2020 |
Using knowledge graphs and reinforcement learning for malware analysis A Piplai, P Ranade, A Kotal, S Mittal, SN Narayanan, A Joshi 2020 IEEE International Conference on Big Data (Big Data), 2626-2633, 2020 | 29 | 2020 |
A comparative study of deep learning based named entity recognition algorithms for cybersecurity S Dasgupta, A Piplai, A Kotal, A Joshi 2020 IEEE International Conference on Big Data (Big Data), 2596-2604, 2020 | 28 | 2020 |
Combating fake cyber threat intelligence using provenance in cybersecurity knowledge graphs S Mitra, A Piplai, S Mittal, A Joshi 2021 IEEE International Conference on Big Data (Big Data), 3316-3323, 2021 | 25 | 2021 |
Privetab: Secure and privacy-preserving sharing of tabular data A Kotal, A Piplai, SSL Chukkapalli, A Joshi Proceedings of the 2022 ACM on International Workshop on Security and …, 2022 | 17 | 2022 |
Knowledge guided two-player reinforcement learning for cyber attacks and defenses A Piplai, M Anoruo, K Fasaye, A Joshi, T Finin, A Ridley 2022 21st IEEE International Conference on Machine Learning and Applications …, 2022 | 14 | 2022 |
A policy-driven approach to secure extraction of covid-19 data from research papers L Elluri, A Piplai, A Kotal, A Joshi, KP Joshi Frontiers in big Data 4, 701966, 2021 | 11 | 2021 |
Independent component analysis for trustworthy cyberspace during high impact events: an application to Covid-19 Z Boukouvalas, C Mallinson, E Crothers, N Japkowicz, A Piplai, S Mittal, ... arXiv preprint arXiv:2006.01284, 2020 | 10 | 2020 |
Localintel: Generating organizational threat intelligence from global and local cyber knowledge S Mitra, S Neupane, T Chakraborty, S Mittal, A Piplai, M Gaur, S Rahimi arXiv preprint arXiv:2401.10036, 2024 | 8 | 2024 |
Offline RL+ CKG: A hybrid AI model for cybersecurity tasks A Piplai, A Joshi, T Finin AAAI Challenges Requiring the Combination of Machine Learning and Knowledge …, 2023 | 8 | 2023 |
Knowledge-enhanced neurosymbolic artificial intelligence for cybersecurity and privacy A Piplai, A Kotal, S Mohseni, M Gaur, S Mittal, A Joshi IEEE Internet Computing 27 (5), 43-48, 2023 | 7 | 2023 |
Cybersecurity knowledge graph improvement with graph neural networks S Dasgupta, A Piplai, P Ranade, A Joshi 2021 IEEE International Conference on Big Data (Big Data), 3290-3297, 2021 | 6 | 2021 |
An adaptive differential evolution based fuzzy approach for edge detection in color and grayscale images S Mukherjee, BP Majumder, A Piplai, S Das Swarm, Evolutionary, and Memetic Computing: 4th International Conference …, 2013 | 4 | 2013 |