Alert button
Picture for Aritran Piplai

Aritran Piplai

Alert button

Deep Learning-Based Speech and Vision Synthesis to Improve Phishing Attack Detection through a Multi-layer Adaptive Framework

Add code
Bookmark button
Alert button
Feb 27, 2024
Tosin Ige, Christopher Kiekintveld, Aritran Piplai

Viaarxiv icon

An Investigation into the Performances of the State-of-the-art Machine Learning Approaches for Various Cyber-attack Detection: A Survey

Add code
Bookmark button
Alert button
Feb 26, 2024
Tosin Ige, Christopher Kiekintveld, Aritran Piplai

Viaarxiv icon

LOCALINTEL: Generating Organizational Threat Intelligence from Global and Local Cyber Knowledge

Add code
Bookmark button
Alert button
Jan 18, 2024
Shaswata Mitra, Subash Neupane, Trisha Chakraborty, Sudip Mittal, Aritran Piplai, Manas Gaur, Shahram Rahimi

Viaarxiv icon

Use of Graph Neural Networks in Aiding Defensive Cyber Operations

Add code
Bookmark button
Alert button
Jan 11, 2024
Shaswata Mitra, Trisha Chakraborty, Subash Neupane, Aritran Piplai, Sudip Mittal

Viaarxiv icon

Knowledge-enhanced Neuro-Symbolic AI for Cybersecurity and Privacy

Add code
Bookmark button
Alert button
Jul 25, 2023
Aritran Piplai, Anantaa Kotal, Seyedreza Mohseni, Manas Gaur, Sudip Mittal, Anupam Joshi

Figure 1 for Knowledge-enhanced Neuro-Symbolic AI for Cybersecurity and Privacy
Viaarxiv icon

Generating Fake Cyber Threat Intelligence Using Transformer-Based Models

Add code
Bookmark button
Alert button
Feb 08, 2021
Priyanka Ranade, Aritran Piplai, Sudip Mittal, Anupam Joshi, Tim Finin

Figure 1 for Generating Fake Cyber Threat Intelligence Using Transformer-Based Models
Figure 2 for Generating Fake Cyber Threat Intelligence Using Transformer-Based Models
Figure 3 for Generating Fake Cyber Threat Intelligence Using Transformer-Based Models
Figure 4 for Generating Fake Cyber Threat Intelligence Using Transformer-Based Models
Viaarxiv icon

Independent Component Analysis for Trustworthy Cyberspace during High Impact Events: An Application to Covid-19

Add code
Bookmark button
Alert button
Jun 06, 2020
Zois Boukouvalas, Christine Mallinson, Evan Crothers, Nathalie Japkowicz, Aritran Piplai, Sudip Mittal, Anupam Joshi, Tülay Adalı

Figure 1 for Independent Component Analysis for Trustworthy Cyberspace during High Impact Events: An Application to Covid-19
Figure 2 for Independent Component Analysis for Trustworthy Cyberspace during High Impact Events: An Application to Covid-19
Figure 3 for Independent Component Analysis for Trustworthy Cyberspace during High Impact Events: An Application to Covid-19
Viaarxiv icon

NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion

Add code
Bookmark button
Alert button
Feb 20, 2020
Aritran Piplai, Sai Sree Laya Chukkapalli, Anupam Joshi

Figure 1 for NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion
Figure 2 for NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion
Figure 3 for NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion
Figure 4 for NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion
Viaarxiv icon

RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement

Add code
Bookmark button
Alert button
May 16, 2019
Aditya Pingle, Aritran Piplai, Sudip Mittal, Anupam Joshi, James Holt, Richard Zak

Figure 1 for RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement
Figure 2 for RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement
Figure 3 for RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement
Figure 4 for RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement
Viaarxiv icon