Picture for Aritran Piplai

Aritran Piplai

Enhancing classroom teaching with LLMs and RAG

Add code
Nov 07, 2024
Viaarxiv icon

PrivComp-KG : Leveraging Knowledge Graph and Large Language Models for Privacy Policy Compliance Verification

Add code
Apr 30, 2024
Viaarxiv icon

Deep Learning-Based Speech and Vision Synthesis to Improve Phishing Attack Detection through a Multi-layer Adaptive Framework

Add code
Feb 27, 2024
Viaarxiv icon

An Investigation into the Performances of the State-of-the-art Machine Learning Approaches for Various Cyber-attack Detection: A Survey

Add code
Feb 26, 2024
Viaarxiv icon

LOCALINTEL: Generating Organizational Threat Intelligence from Global and Local Cyber Knowledge

Add code
Jan 18, 2024
Viaarxiv icon

Use of Graph Neural Networks in Aiding Defensive Cyber Operations

Add code
Jan 11, 2024
Viaarxiv icon

Knowledge-enhanced Neuro-Symbolic AI for Cybersecurity and Privacy

Add code
Jul 25, 2023
Figure 1 for Knowledge-enhanced Neuro-Symbolic AI for Cybersecurity and Privacy
Viaarxiv icon

Generating Fake Cyber Threat Intelligence Using Transformer-Based Models

Add code
Feb 08, 2021
Figure 1 for Generating Fake Cyber Threat Intelligence Using Transformer-Based Models
Figure 2 for Generating Fake Cyber Threat Intelligence Using Transformer-Based Models
Figure 3 for Generating Fake Cyber Threat Intelligence Using Transformer-Based Models
Figure 4 for Generating Fake Cyber Threat Intelligence Using Transformer-Based Models
Viaarxiv icon

Independent Component Analysis for Trustworthy Cyberspace during High Impact Events: An Application to Covid-19

Add code
Jun 06, 2020
Figure 1 for Independent Component Analysis for Trustworthy Cyberspace during High Impact Events: An Application to Covid-19
Figure 2 for Independent Component Analysis for Trustworthy Cyberspace during High Impact Events: An Application to Covid-19
Figure 3 for Independent Component Analysis for Trustworthy Cyberspace during High Impact Events: An Application to Covid-19
Viaarxiv icon

NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion

Add code
Feb 20, 2020
Figure 1 for NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion
Figure 2 for NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion
Figure 3 for NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion
Figure 4 for NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion
Viaarxiv icon