Picture for Aritran Piplai

Aritran Piplai

Semantic-Aware Contrastive Fine-Tuning: Boosting Multimodal Malware Classification with Discriminative Embeddings

Add code
Apr 25, 2025
Viaarxiv icon

Enhancing classroom teaching with LLMs and RAG

Add code
Nov 07, 2024
Viaarxiv icon

PrivComp-KG : Leveraging Knowledge Graph and Large Language Models for Privacy Policy Compliance Verification

Add code
Apr 30, 2024
Viaarxiv icon

Deep Learning-Based Speech and Vision Synthesis to Improve Phishing Attack Detection through a Multi-layer Adaptive Framework

Add code
Feb 27, 2024
Viaarxiv icon

An Investigation into the Performances of the State-of-the-art Machine Learning Approaches for Various Cyber-attack Detection: A Survey

Add code
Feb 26, 2024
Viaarxiv icon

LOCALINTEL: Generating Organizational Threat Intelligence from Global and Local Cyber Knowledge

Add code
Jan 18, 2024
Viaarxiv icon

Use of Graph Neural Networks in Aiding Defensive Cyber Operations

Add code
Jan 11, 2024
Viaarxiv icon

Knowledge-enhanced Neuro-Symbolic AI for Cybersecurity and Privacy

Add code
Jul 25, 2023
Figure 1 for Knowledge-enhanced Neuro-Symbolic AI for Cybersecurity and Privacy
Viaarxiv icon

Generating Fake Cyber Threat Intelligence Using Transformer-Based Models

Add code
Feb 08, 2021
Figure 1 for Generating Fake Cyber Threat Intelligence Using Transformer-Based Models
Figure 2 for Generating Fake Cyber Threat Intelligence Using Transformer-Based Models
Figure 3 for Generating Fake Cyber Threat Intelligence Using Transformer-Based Models
Figure 4 for Generating Fake Cyber Threat Intelligence Using Transformer-Based Models
Viaarxiv icon

Independent Component Analysis for Trustworthy Cyberspace during High Impact Events: An Application to Covid-19

Add code
Jun 06, 2020
Figure 1 for Independent Component Analysis for Trustworthy Cyberspace during High Impact Events: An Application to Covid-19
Figure 2 for Independent Component Analysis for Trustworthy Cyberspace during High Impact Events: An Application to Covid-19
Figure 3 for Independent Component Analysis for Trustworthy Cyberspace during High Impact Events: An Application to Covid-19
Viaarxiv icon