Picture for Deepa Krishnan

Deepa Krishnan

Insider Threat Detection Using GCN and Bi-LSTM with Explicit and Implicit Graph Representations

Add code
Dec 20, 2025
Figure 1 for Insider Threat Detection Using GCN and Bi-LSTM with Explicit and Implicit Graph Representations
Figure 2 for Insider Threat Detection Using GCN and Bi-LSTM with Explicit and Implicit Graph Representations
Figure 3 for Insider Threat Detection Using GCN and Bi-LSTM with Explicit and Implicit Graph Representations
Figure 4 for Insider Threat Detection Using GCN and Bi-LSTM with Explicit and Implicit Graph Representations
Viaarxiv icon