


default search action
Aritran Piplai
Person information
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[i25]Md Tanvirul Alam, Aritran Piplai, Ionut Cardei, Nidhi Rastogi, Peter Worth Jr.:
Minerva: Reinforcement Learning with Verifiable Rewards for Cyber Threat Intelligence LLMs. CoRR abs/2602.00513 (2026)
[i24]Ondrej Lukás, Jihoon Shin, Emilia Rivas, Diego Forni, Maria Rigaki, Carlos Adrián Catania, Aritran Piplai, Christopher Kiekintveld, Sebastián García:
Evaluating Generalization Mechanisms in Autonomous Cyber Attack Agents. CoRR abs/2603.10041 (2026)- 2025
[c31]Ana M. Rodriguez, Jaime Acosta, Anantaa Kotal, Aritran Piplai:
AgentCyTE: Leveraging Agentic AI to Generate Cybersecurity Training & Experimentation Scenarios. ACSAC Workshops 2025: 451-458
[c30]Zalish Mahmud, Anantaa Kotal, Aritran Piplai:
ImpuGAN: Learning Conditional Generative Models for Robust Data Imputation. IEEE Big Data 2025: 2934-2942
[c29]Emre Umucu, Guillermina Solis, Leon Garza, Emilia Rivas, Beatrice Lee, Anantaa Kotal, Aritran Piplai:
Empathy by Design: Aligning Large Language Models for Healthcare Dialogue. IEEE Big Data 2025: 4693-4702
[c28]Ivan Montoya Sanchez, Shaswata Mitra, Aritran Piplai, Sudip Mittal:
Semantic-Aware Contrastive Fine-Tuning: Boosting Multimodal Malware Classification with Discriminative Embeddings. IJCNN 2025: 1-8
[c27]Md Tanvirul Alam, Aritran Piplai, Nidhi Rastogi:
ADAPT: A Pseudo-labeling Approach to Combat Concept Drift in Malware Detection. RAID 2025: 693-712
[c26]Emilia Rivas, Sabrina Saika, Ahtesham Bakht, Aritran Piplai, Nathaniel D. Bastian, Ankit Shah:
Adapting Under Fire: Multi-Agent Reinforcement Learning for Adversarial Drift in Network Security. SECRYPT 2025: 547-554
[c25]Leon Garza, Anantaa Kotal, Aritran Piplai, Lavanya Elluri, Prajit Kumar Das, Aman Chadha:
PRvL: Quantifying the Capabilities and Risks of Large Language Models for PII Redaction. TPS-ISA 2025: 148-159
[c24]Tosin Ige, Christopher Kiekintveld, Aritran Piplai, Asif Rahman
, Olukunle Kolade, Sasidhar Kunapuli:
MAD-OOD: A Deep Learning Cluster-Driven Framework for an Out-of-Distribution Malware Detection and Classification. TrustCom 2025: 2445-2450
[i23]Ivan Montoya Sanchez, Shaswata Mitra, Aritran Piplai, Sudip Mittal:
Semantic-Aware Contrastive Fine-Tuning: Boosting Multimodal Malware Classification with Discriminative Embeddings. CoRR abs/2504.21028 (2025)
[i22]Emilia Rivas, Sabrina Saika, Ahtesham Bakht, Aritran Piplai, Nathaniel D. Bastian, Ankit Shah:
Adapting Under Fire: Multi-Agent Reinforcement Learning for Adversarial Drift in Network Security. CoRR abs/2506.06565 (2025)
[i21]Shova Kuikel, Aritran Piplai, Palvi Aggarwal:
Evaluating Large Language Models for Phishing Detection, Self-Consistency, Faithfulness, and Explainability. CoRR abs/2506.13746 (2025)
[i20]Md Tanvirul Alam, Aritran Piplai, Nidhi Rastogi:
ADAPT: A Pseudo-labeling Approach to Combat Concept Drift in Malware Detection. CoRR abs/2507.08597 (2025)
[i19]Leon Garza, Anantaa Kotal, Aritran Piplai, Lavanya Elluri, Prajit Kumar Das, Aman Chadha:
PRvL: Quantifying the Capabilities and Risks of Large Language Models for PII Redaction. CoRR abs/2508.05545 (2025)
[i18]Shaswata Mitra, Azim Bazarov, Martin Duclos, Sudip Mittal, Aritran Piplai, Md. Rayhanur Rahman, Edward Zieglar, Shahram Rahimi
:
FALCON: Autonomous Cyber Threat Intelligence Mining with LLMs for IDS Rule Generation. CoRR abs/2508.18684 (2025)
[i17]Ana M. Rodriguez, Jaime Acosta, Anantaa Kotal, Aritran Piplai:
AgentCyTE: Leveraging Agentic AI to Generate Cybersecurity Training & Experimentation Scenarios. CoRR abs/2510.25189 (2025)
[i16]Zalish Mahmud, Anantaa Kotal, Aritran Piplai:
Impugan: Learning Conditional Generative Models for Robust Data Imputation. CoRR abs/2512.05950 (2025)
[i15]Emre Umucu, Guillermina Solis, Leon Garza, Emilia Rivas, Beatrice Lee, Anantaa Kotal, Aritran Piplai:
Empathy by Design: Aligning Large Language Models for Healthcare Dialogue. CoRR abs/2512.06097 (2025)
[i14]Tosin Ige, Christopher Kiekintveld, Aritran Piplai, Asif Rahman, Olukunle Kolade, Sasidhar Kunapuli:
MAD-OOD: A Deep Learning Cluster-Driven Framework for an Out-of-Distribution Malware Detection and Classification. CoRR abs/2512.17594 (2025)- 2024
[c23]Jihoon Shin
, Emilia Rivas, Daniel Lucio, Aritran Piplai, Lavanya Elluri:
Towards Building Generalizable Models for Malware Detection. IEEE Big Data 2024: 5656-5663
[c22]Tosin Ige, Christopher Kiekintveld, Aritran Piplai:
An Investigation into the Performances of the State-of-the-art Machine Learning Approaches for Various Cyber-attack Detection: A Survey. EIT 2024: 135-144
[c21]Shaswata Mitra
, Subash Neupane
, Trisha Chakraborty, Sudip Mittal
, Aritran Piplai
, Manas Gaur
, Shahram Rahimi
:
LocalIntel: Generating Organizational Threat Intelligence from Global and Local Cyber Knowledge. FPS (2) 2024: 63-78
[c20]Tosin Ige, Christopher Kiekintveld, Aritran Piplai, Amy Wagler, Olukunle Kolade, Bolanle Hafiz Matti:
Towards an in-Depth Evaluation of the Performance, Suitability and Plausibility of Few-Shot Meta Transfer Learning on An Unknown Out-of-Distribution Cyber-attack Detection. ISNCC 2024: 1-6
[c19]Tosin Ige, Christopher Kiekintveld, Aritran Piplai, Amy Wagler, Olukunle Kolade, Bolanle Hafiz Matti:
An in-Depth Investigation Into the Performance of State-of-the-Art Zero-Shot, Single-Shot, and Few-Shot Learning Approaches on an Out-of-Distribution Zero-Day Malware Attack Detection. ISNCC 2024: 1-6
[c18]Elizabeth Mullins
, Adrian Portillo
, Kristalys Ruiz-Rohena
, Aritran Piplai
:
Enhancing classroom teaching with LLMs and RAG. SIGITE 2024: 145-146
[c17]Leon Garza, Lavanya Elluri, Aritran Piplai, Anantaa Kotal, Deepti Gupta, Anupam Joshi:
PrivComp-KG: Leveraging KG and LLM for Compliance Verification. TPS-ISA 2024: 97-106
[i13]Shaswata Mitra, Trisha Chakraborty, Subash Neupane, Aritran Piplai, Sudip Mittal:
Use of Graph Neural Networks in Aiding Defensive Cyber Operations. CoRR abs/2401.05680 (2024)
[i12]Shaswata Mitra, Subash Neupane, Trisha Chakraborty, Sudip Mittal, Aritran Piplai, Manas Gaur
, Shahram Rahimi
:
LOCALINTEL: Generating Organizational Threat Intelligence from Global and Local Cyber Knowledge. CoRR abs/2401.10036 (2024)
[i11]Tosin Ige, Christopher Kiekintveld, Aritran Piplai:
An Investigation into the Performances of the State-of-the-art Machine Learning Approaches for Various Cyber-attack Detection: A Survey. CoRR abs/2402.17045 (2024)
[i10]Tosin Ige, Christopher Kiekintveld, Aritran Piplai:
Deep Learning-Based Speech and Vision Synthesis to Improve Phishing Attack Detection through a Multi-layer Adaptive Framework. CoRR abs/2402.17249 (2024)
[i9]Leon Garza, Lavanya Elluri, Anantaa Kotal, Aritran Piplai, Deepti Gupta, Anupam Joshi:
PrivComp-KG : Leveraging Knowledge Graph and Large Language Models for Privacy Policy Compliance Verification. CoRR abs/2404.19744 (2024)
[i8]Elizabeth Mullins, Adrian Portillo, Kristalys Ruiz-Rohena, Aritran Piplai:
Enhancing classroom teaching with LLMs and RAG. CoRR abs/2411.04341 (2024)
[i7]Tosin Ige, Christopher Kiekintveld, Aritran Piplai, Amy Waggler, Olukunle Kolade, Bolanle Hafiz Matti:
An investigation into the performances of the Current state-of-the-art Naive Bayes, Non-Bayesian and Deep Learning Based Classifier for Phishing Detection: A Survey. CoRR abs/2411.16751 (2024)- 2023
[j3]Aritran Piplai
, Anantaa Kotal, Seyedreza Mohseni
, Manas Gaur
, Sudip Mittal
, Anupam Joshi:
Knowledge-Enhanced Neurosymbolic Artificial Intelligence for Cybersecurity and Privacy. IEEE Internet Comput. 27(5): 43-48 (2023)
[c16]Aritran Piplai, Anupam Joshi, Tim Finin:
Offline RL+CKG: A hybrid AI model for cybersecurity tasks. AAAI Spring Symposium: MAKE 2023
[i6]Aritran Piplai, Anantaa Kotal, Seyedreza Mohseni, Manas Gaur, Sudip Mittal, Anupam Joshi:
Knowledge-enhanced Neuro-Symbolic AI for Cybersecurity and Privacy. CoRR abs/2308.02031 (2023)- 2022
[c15]Anantaa Kotal, Aritran Piplai, Sai Sree Laya Chukkapalli, Anupam Joshi:
PriveTAB: Secure and Privacy-Preserving sharing of Tabular Data. IWSPA@CODASPY 2022: 35-45
[c14]Aritran Piplai, Mike Anoruo, Kayode Fasaye, Anupam Joshi, Tim Finin
, Ahmad Ridley:
Knowledge Guided Two-player Reinforcement Learning for Cyber Attacks and Defenses. ICMLA 2022: 1342-1349- 2021
[j2]Lavanya Elluri
, Aritran Piplai, Anantaa Kotal, Anupam Joshi, Karuna Pande Joshi:
A Policy-Driven Approach to Secure Extraction of COVID-19 Data From Research Papers. Frontiers Big Data 4: 701966 (2021)
[c13]Soham Dasgupta, Aritran Piplai, Priyanka Ranade, Anupam Joshi:
Cybersecurity Knowledge Graph Improvement with Graph Neural Networks. IEEE BigData 2021: 3290-3297
[c12]Shaswata Mitra, Aritran Piplai, Sudip Mittal, Anupam Joshi:
Combating Fake Cyber Threat Intelligence using Provenance in Cybersecurity Knowledge Graphs. IEEE BigData 2021: 3316-3323
[c11]Priyanka Ranade, Aritran Piplai, Anupam Joshi, Tim Finin
:
CyBERT: Contextualized Embeddings for the Cybersecurity Domain. IEEE BigData 2021: 3334-3342
[c10]Priyanka Ranade, Aritran Piplai, Sudip Mittal, Anupam Joshi, Tim Finin
:
Generating Fake Cyber Threat Intelligence Using Transformer-Based Models. IJCNN 2021: 1-9
[i5]Priyanka Ranade, Aritran Piplai, Sudip Mittal, Anupam Joshi, Tim Finin:
Generating Fake Cyber Threat Intelligence Using Transformer-Based Models. CoRR abs/2102.04351 (2021)- 2020
[j1]Aritran Piplai
, Sudip Mittal
, Anupam Joshi
, Tim Finin
, James Holt
, Richard Zak:
Creating Cybersecurity Knowledge Graphs From Malware After Action Reports. IEEE Access 8: 211691-211703 (2020)
[c9]Soham Dasgupta, Aritran Piplai, Anantaa Kotal, Anupam Joshi:
A Comparative Study of Deep Learning based Named Entity Recognition Algorithms for Cybersecurity. IEEE BigData 2020: 2596-2604
[c8]Aritran Piplai, Priyanka Ranade, Anantaa Kotal, Sudip Mittal, Sandeep Nair Narayanan, Anupam Joshi:
Using Knowledge Graphs and Reinforcement Learning for Malware Analysis. IEEE BigData 2020: 2626-2633
[c7]Sai Sree Laya Chukkapalli, Aritran Piplai, Sudip Mittal, Maanak Gupta, Anupam Joshi
:
A Smart-Farming Ontology for Attribute Based Access Control. BigDataSecurity/HPSC/IDS 2020: 29-34
[c6]Aritran Piplai, Sai Sree Laya Chukkapalli, Anupam Joshi
:
NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion. BigDataSecurity/HPSC/IDS 2020: 49-54
[c5]Aritran Piplai, Sudip Mittal, Mahmoud Abdelsalam, Maanak Gupta, Anupam Joshi, Tim Finin
:
Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior. ISI 2020: 1-6
[i4]Aritran Piplai, Sai Sree Laya Chukkapalli, Anupam Joshi:
NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion. CoRR abs/2002.08527 (2020)
[i3]Zois Boukouvalas, Christine Mallinson, Evan Crothers, Nathalie Japkowicz, Aritran Piplai, Sudip Mittal, Anupam Joshi, Tülay Adali:
Independent Component Analysis for Trustworthy Cyberspace during High Impact Events: An Application to Covid-19. CoRR abs/2006.01284 (2020)
2010 – 2019
- 2019
[c4]Aditya Pingle, Aritran Piplai, Sudip Mittal, Anupam Joshi
, James Holt, Richard Zak
:
RelExt: relation extraction using deep learning approaches for cybersecurity knowledge graph improvement. ASONAM 2019: 879-886
[c3]Nitika Khurana, Sudip Mittal, Aritran Piplai, Anupam Joshi
:
Preventing Poisoning Attacks On AI Based Threat Intelligence Systems. MLSP 2019: 1-6
[i2]Aditya Pingle, Aritran Piplai, Sudip Mittal, Anupam Joshi, James Holt
, Richard Zak:
RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement. CoRR abs/1905.02497 (2019)- 2016
[i1]Satrajit Mukherjee, Bodhisattwa Prasad Majumder, Aritran Piplai, Swagatam Das:
Kernelized Weighted SUSAN based Fuzzy C-Means Clustering for Noisy Image Segmentation. CoRR abs/1603.08564 (2016)- 2014
[c2]Satrajit Mukherjee, Bodhisattwa Prasad Majumder, Aritran Piplai, Swagatam Das
:
A novel fuzzy non-homogeneity measure based kernelized image segmentation for noisy images. FUZZ-IEEE 2014: 245-252- 2013
[c1]Satrajit Mukherjee, Bodhisattwa Prasad Majumder, Aritran Piplai, Swagatam Das
:
An Adaptive Differential Evolution Based Fuzzy Approach for Edge Detection in Color and Grayscale Images. SEMCCO (1) 2013: 260-273
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-04-11 00:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







