


default search action
Anupam Joshi
- > Home > Persons > Anupam Joshi
Publications
- 2024
- [c222]Leon Garza, Lavanya Elluri, Aritran Piplai, Anantaa Kotal, Deepti Gupta, Anupam Joshi:
PrivComp-KG: Leveraging KG and LLM for Compliance Verification. TPS-ISA 2024: 97-106 - [i23]Leon Garza, Lavanya Elluri, Anantaa Kotal, Aritran Piplai, Deepti Gupta, Anupam Joshi:
PrivComp-KG : Leveraging Knowledge Graph and Large Language Models for Privacy Policy Compliance Verification. CoRR abs/2404.19744 (2024) - 2023
- [j80]Aritran Piplai
, Anantaa Kotal, Seyedreza Mohseni
, Manas Gaur
, Sudip Mittal
, Anupam Joshi:
Knowledge-Enhanced Neurosymbolic Artificial Intelligence for Cybersecurity and Privacy. IEEE Internet Comput. 27(5): 43-48 (2023) - [c220]Aritran Piplai, Anupam Joshi, Tim Finin:
Offline RL+CKG: A hybrid AI model for cybersecurity tasks. AAAI Spring Symposium: MAKE 2023 - [i19]Aritran Piplai, Anantaa Kotal, Seyedreza Mohseni, Manas Gaur, Sudip Mittal, Anupam Joshi:
Knowledge-enhanced Neuro-Symbolic AI for Cybersecurity and Privacy. CoRR abs/2308.02031 (2023) - 2022
- [c213]Anantaa Kotal, Aritran Piplai, Sai Sree Laya Chukkapalli, Anupam Joshi:
PriveTAB: Secure and Privacy-Preserving sharing of Tabular Data. IWSPA@CODASPY 2022: 35-45 - [c212]Aritran Piplai, Mike Anoruo, Kayode Fasaye, Anupam Joshi, Tim Finin
, Ahmad Ridley:
Knowledge Guided Two-player Reinforcement Learning for Cyber Attacks and Defenses. ICMLA 2022: 1342-1349 - 2021
- [j76]Lavanya Elluri
, Aritran Piplai, Anantaa Kotal, Anupam Joshi, Karuna Pande Joshi:
A Policy-Driven Approach to Secure Extraction of COVID-19 Data From Research Papers. Frontiers Big Data 4: 701966 (2021) - [c211]Soham Dasgupta, Aritran Piplai, Priyanka Ranade, Anupam Joshi:
Cybersecurity Knowledge Graph Improvement with Graph Neural Networks. IEEE BigData 2021: 3290-3297 - [c210]Shaswata Mitra, Aritran Piplai, Sudip Mittal, Anupam Joshi:
Combating Fake Cyber Threat Intelligence using Provenance in Cybersecurity Knowledge Graphs. IEEE BigData 2021: 3316-3323 - [c209]Priyanka Ranade, Aritran Piplai, Anupam Joshi, Tim Finin
:
CyBERT: Contextualized Embeddings for the Cybersecurity Domain. IEEE BigData 2021: 3334-3342 - [c207]Priyanka Ranade, Aritran Piplai, Sudip Mittal, Anupam Joshi, Tim Finin
:
Generating Fake Cyber Threat Intelligence Using Transformer-Based Models. IJCNN 2021: 1-9 - [i13]Priyanka Ranade, Aritran Piplai, Sudip Mittal, Anupam Joshi, Tim Finin:
Generating Fake Cyber Threat Intelligence Using Transformer-Based Models. CoRR abs/2102.04351 (2021) - 2020
- [j74]Aritran Piplai
, Sudip Mittal
, Anupam Joshi
, Tim Finin
, James Holt
, Richard Zak:
Creating Cybersecurity Knowledge Graphs From Malware After Action Reports. IEEE Access 8: 211691-211703 (2020) - [c200]Soham Dasgupta, Aritran Piplai, Anantaa Kotal, Anupam Joshi:
A Comparative Study of Deep Learning based Named Entity Recognition Algorithms for Cybersecurity. IEEE BigData 2020: 2596-2604 - [c199]Aritran Piplai, Priyanka Ranade, Anantaa Kotal, Sudip Mittal, Sandeep Nair Narayanan, Anupam Joshi:
Using Knowledge Graphs and Reinforcement Learning for Malware Analysis. IEEE BigData 2020: 2626-2633 - [c198]Sai Sree Laya Chukkapalli, Aritran Piplai, Sudip Mittal, Maanak Gupta, Anupam Joshi
:
A Smart-Farming Ontology for Attribute Based Access Control. BigDataSecurity/HPSC/IDS 2020: 29-34 - [c196]Aritran Piplai, Sai Sree Laya Chukkapalli, Anupam Joshi
:
NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion. BigDataSecurity/HPSC/IDS 2020: 49-54 - [c194]Aritran Piplai, Sudip Mittal, Mahmoud Abdelsalam, Maanak Gupta, Anupam Joshi, Tim Finin
:
Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior. ISI 2020: 1-6 - [i12]Aritran Piplai, Sai Sree Laya Chukkapalli, Anupam Joshi:
NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion. CoRR abs/2002.08527 (2020) - [i11]Zois Boukouvalas, Christine Mallinson, Evan Crothers, Nathalie Japkowicz, Aritran Piplai, Sudip Mittal, Anupam Joshi, Tülay Adali:
Independent Component Analysis for Trustworthy Cyberspace during High Impact Events: An Application to Covid-19. CoRR abs/2006.01284 (2020) - 2019
- [c193]Aditya Pingle, Aritran Piplai, Sudip Mittal, Anupam Joshi
, James Holt, Richard Zak
:
RelExt: relation extraction using deep learning approaches for cybersecurity knowledge graph improvement. ASONAM 2019: 879-886 - [c190]Nitika Khurana, Sudip Mittal, Aritran Piplai, Anupam Joshi
:
Preventing Poisoning Attacks On AI Based Threat Intelligence Systems. MLSP 2019: 1-6 - [i10]Aditya Pingle, Aritran Piplai, Sudip Mittal, Anupam Joshi, James Holt
, Richard Zak:
RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement. CoRR abs/1905.02497 (2019)

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-06-19 01:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint