Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Piplai, Aritran
add a person with the name Piplai, Aritran
 

Other publications of authors with the same name

An Investigation into the Performances of the State-of-the-art Machine Learning Approaches for Various Cyber-attack Detection: A Survey., , and . CoRR, (2024)LOCALINTEL: Generating Organizational Threat Intelligence from Global and Local Cyber Knowledge., , , , , , and . CoRR, (2024)Use of Graph Neural Networks in Aiding Defensive Cyber Operations., , , , and . CoRR, (2024)A Smart-Farming Ontology for Attribute Based Access Control., , , , and . BigDataSecurity/HPSC/IDS, page 29-34. IEEE, (2020)Offline RL+CKG: A hybrid AI model for cybersecurity tasks., , and . AAAI Spring Symposium: MAKE, volume 3433 of CEUR Workshop Proceedings, CEUR-WS.org, (2023)Deep Learning-Based Speech and Vision Synthesis to Improve Phishing Attack Detection through a Multi-layer Adaptive Framework., , and . CoRR, (2024)Independent Component Analysis for Trustworthy Cyberspace during High Impact Events: An Application to Covid-19., , , , , , , and . CoRR, (2020)A novel fuzzy non-homogeneity measure based kernelized image segmentation for noisy images., , , and . FUZZ-IEEE, page 245-252. IEEE, (2014)Combating Fake Cyber Threat Intelligence using Provenance in Cybersecurity Knowledge Graphs., , , and . IEEE BigData, page 3316-3323. IEEE, (2021)Cybersecurity Knowledge Graph Improvement with Graph Neural Networks., , , and . IEEE BigData, page 3290-3297. IEEE, (2021)