Alert button
Picture for Anupam Joshi

Anupam Joshi

Alert button

Privacy-Preserving Data Sharing in Agriculture: Enforcing Policy Rules for Secure and Confidential Data Synthesis

Add code
Bookmark button
Alert button
Nov 27, 2023
Anantaa Kotal, Lavanya Elluri, Deepti Gupta, Varun Mandalapu, Anupam Joshi

Figure 1 for Privacy-Preserving Data Sharing in Agriculture: Enforcing Policy Rules for Secure and Confidential Data Synthesis
Figure 2 for Privacy-Preserving Data Sharing in Agriculture: Enforcing Policy Rules for Secure and Confidential Data Synthesis
Figure 3 for Privacy-Preserving Data Sharing in Agriculture: Enforcing Policy Rules for Secure and Confidential Data Synthesis
Figure 4 for Privacy-Preserving Data Sharing in Agriculture: Enforcing Policy Rules for Secure and Confidential Data Synthesis
Viaarxiv icon

FABULA: Intelligence Report Generation Using Retrieval-Augmented Narrative Construction

Add code
Bookmark button
Alert button
Oct 20, 2023
Priyanka Ranade, Anupam Joshi

Figure 1 for FABULA: Intelligence Report Generation Using Retrieval-Augmented Narrative Construction
Figure 2 for FABULA: Intelligence Report Generation Using Retrieval-Augmented Narrative Construction
Figure 3 for FABULA: Intelligence Report Generation Using Retrieval-Augmented Narrative Construction
Figure 4 for FABULA: Intelligence Report Generation Using Retrieval-Augmented Narrative Construction
Viaarxiv icon

Change Management using Generative Modeling on Digital Twins

Add code
Bookmark button
Alert button
Sep 21, 2023
Nilanjana Das, Anantaa Kotal, Daniel Roseberry, Anupam Joshi

Figure 1 for Change Management using Generative Modeling on Digital Twins
Figure 2 for Change Management using Generative Modeling on Digital Twins
Figure 3 for Change Management using Generative Modeling on Digital Twins
Figure 4 for Change Management using Generative Modeling on Digital Twins
Viaarxiv icon

Knowledge-enhanced Neuro-Symbolic AI for Cybersecurity and Privacy

Add code
Bookmark button
Alert button
Jul 25, 2023
Aritran Piplai, Anantaa Kotal, Seyedreza Mohseni, Manas Gaur, Sudip Mittal, Anupam Joshi

Figure 1 for Knowledge-enhanced Neuro-Symbolic AI for Cybersecurity and Privacy
Viaarxiv icon

A Practical Entity Linking System for Tables in Scientific Literature

Add code
Bookmark button
Alert button
Jun 12, 2023
Varish Mulwad, Tim Finin, Vijay S. Kumar, Jenny Weisenberg Williams, Sharad Dixit, Anupam Joshi

Figure 1 for A Practical Entity Linking System for Tables in Scientific Literature
Figure 2 for A Practical Entity Linking System for Tables in Scientific Literature
Figure 3 for A Practical Entity Linking System for Tables in Scientific Literature
Figure 4 for A Practical Entity Linking System for Tables in Scientific Literature
Viaarxiv icon

CAPD: A Context-Aware, Policy-Driven Framework for Secure and Resilient IoBT Operations

Add code
Bookmark button
Alert button
Aug 02, 2022
Sai Sree Laya Chukkapalli, Anupam Joshi, Tim Finin, Robert F. Erbacher

Viaarxiv icon

Recognizing and Extracting Cybersecurtity-relevant Entities from Text

Add code
Bookmark button
Alert button
Aug 02, 2022
Casey Hanks, Michael Maiden, Priyanka Ranade, Tim Finin, Anupam Joshi

Figure 1 for Recognizing and Extracting Cybersecurtity-relevant Entities from Text
Figure 2 for Recognizing and Extracting Cybersecurtity-relevant Entities from Text
Figure 3 for Recognizing and Extracting Cybersecurtity-relevant Entities from Text
Figure 4 for Recognizing and Extracting Cybersecurtity-relevant Entities from Text
Viaarxiv icon

Generating Fake Cyber Threat Intelligence Using Transformer-Based Models

Add code
Bookmark button
Alert button
Feb 08, 2021
Priyanka Ranade, Aritran Piplai, Sudip Mittal, Anupam Joshi, Tim Finin

Figure 1 for Generating Fake Cyber Threat Intelligence Using Transformer-Based Models
Figure 2 for Generating Fake Cyber Threat Intelligence Using Transformer-Based Models
Figure 3 for Generating Fake Cyber Threat Intelligence Using Transformer-Based Models
Figure 4 for Generating Fake Cyber Threat Intelligence Using Transformer-Based Models
Viaarxiv icon

Independent Component Analysis for Trustworthy Cyberspace during High Impact Events: An Application to Covid-19

Add code
Bookmark button
Alert button
Jun 06, 2020
Zois Boukouvalas, Christine Mallinson, Evan Crothers, Nathalie Japkowicz, Aritran Piplai, Sudip Mittal, Anupam Joshi, Tülay Adalı

Figure 1 for Independent Component Analysis for Trustworthy Cyberspace during High Impact Events: An Application to Covid-19
Figure 2 for Independent Component Analysis for Trustworthy Cyberspace during High Impact Events: An Application to Covid-19
Figure 3 for Independent Component Analysis for Trustworthy Cyberspace during High Impact Events: An Application to Covid-19
Viaarxiv icon