Остановите войну!
for scientists:
default search action
Anupam Joshi
- > Home > Persons > Anupam Joshi
Publications
- 2023
- [j80]Aritran Piplai, Anantaa Kotal, Seyedreza Mohseni, Manas Gaur, Sudip Mittal, Anupam Joshi:
Knowledge-Enhanced Neurosymbolic Artificial Intelligence for Cybersecurity and Privacy. IEEE Internet Comput. 27(5): 43-48 (2023) - [i19]Aritran Piplai, Anantaa Kotal, Seyedreza Mohseni, Manas Gaur, Sudip Mittal, Anupam Joshi:
Knowledge-enhanced Neuro-Symbolic AI for Cybersecurity and Privacy. CoRR abs/2308.02031 (2023) - 2021
- [c210]Shaswata Mitra, Aritran Piplai, Sudip Mittal, Anupam Joshi:
Combating Fake Cyber Threat Intelligence using Provenance in Cybersecurity Knowledge Graphs. IEEE BigData 2021: 3316-3323 - [c208]Caitlin Moroney, Evan Crothers, Sudip Mittal, Anupam Joshi, Tülay Adali, Christine Mallinson, Nathalie Japkowicz, Zois Boukouvalas:
The Case for Latent Variable Vs Deep Learning Methods in Misinformation Detection: An Application to COVID-19. DS 2021: 422-432 - [c207]Priyanka Ranade, Aritran Piplai, Sudip Mittal, Anupam Joshi, Tim Finin:
Generating Fake Cyber Threat Intelligence Using Transformer-Based Models. IJCNN 2021: 1-9 - [c206]Sai Sree Laya Chukkapalli, Nisha Pillai, Sudip Mittal, Anupam Joshi:
Cyber-Physical System Security Surveillance using Knowledge Graph based Digital Twins - A Smart Farming Usecase. ISI 2021: 1-6 - [c204]Sai Sree Laya Chukkapalli, Priyanka Ranade, Sudip Mittal, Anupam Joshi:
A Privacy Preserving Anomaly Detection Framework for Cooperative Smart Farming Ecosystem. TPS-ISA 2021: 340-347 - [i13]Priyanka Ranade, Aritran Piplai, Sudip Mittal, Anupam Joshi, Tim Finin:
Generating Fake Cyber Threat Intelligence Using Transformer-Based Models. CoRR abs/2102.04351 (2021) - 2020
- [j75]Sai Sree Laya Chukkapalli, Sudip Mittal, Maanak Gupta, Mahmoud Abdelsalam, Anupam Joshi, Ravi S. Sandhu, Karuna P. Joshi:
Ontologies and Artificial Intelligence Systems for the Cooperative Smart Farming Ecosystem. IEEE Access 8: 164045-164064 (2020) - [j74]Aritran Piplai, Sudip Mittal, Anupam Joshi, Tim Finin, James Holt, Richard Zak:
Creating Cybersecurity Knowledge Graphs From Malware After Action Reports. IEEE Access 8: 211691-211703 (2020) - [c201]Nitu Kedarmal Choudhary, Sai Sree Laya Chukkapalli, Sudip Mittal, Maanak Gupta, Mahmoud Abdelsalam, Anupam Joshi:
YieldPredict: A Crop Yield Prediction Framework for Smart Farms. IEEE BigData 2020: 2340-2349 - [c199]Aritran Piplai, Priyanka Ranade, Anantaa Kotal, Sudip Mittal, Sandeep Nair Narayanan, Anupam Joshi:
Using Knowledge Graphs and Reinforcement Learning for Malware Analysis. IEEE BigData 2020: 2626-2633 - [c198]Sai Sree Laya Chukkapalli, Aritran Piplai, Sudip Mittal, Maanak Gupta, Anupam Joshi:
A Smart-Farming Ontology for Attribute Based Access Control. BigDataSecurity/HPSC/IDS 2020: 29-34 - [c195]Sina Sontowski, Maanak Gupta, Sai Sree Laya Chukkapalli, Mahmoud Abdelsalam, Sudip Mittal, Anupam Joshi, Ravi S. Sandhu:
Cyber Attacks on Smart Farming Infrastructure. CIC 2020: 135-143 - [c194]Aritran Piplai, Sudip Mittal, Mahmoud Abdelsalam, Maanak Gupta, Anupam Joshi, Tim Finin:
Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior. ISI 2020: 1-6 - [i11]Zois Boukouvalas, Christine Mallinson, Evan Crothers, Nathalie Japkowicz, Aritran Piplai, Sudip Mittal, Anupam Joshi, Tülay Adali:
Independent Component Analysis for Trustworthy Cyberspace during High Impact Events: An Application to Covid-19. CoRR abs/2006.01284 (2020) - 2019
- [c193]Aditya Pingle, Aritran Piplai, Sudip Mittal, Anupam Joshi, James Holt, Richard Zak:
RelExt: relation extraction using deep learning approaches for cybersecurity knowledge graph improvement. ASONAM 2019: 879-886 - [c192]Sowmya Ramapatruni, Sandeep Nair Narayanan, Sudip Mittal, Anupam Joshi, Karuna P. Joshi:
Anomaly Detection Models for Smart Home Security. BigDataSecurity/HPSC/IDS 2019: 19-24 - [c190]Nitika Khurana, Sudip Mittal, Aritran Piplai, Anupam Joshi:
Preventing Poisoning Attacks On AI Based Threat Intelligence Systems. MLSP 2019: 1-6 - [i10]Aditya Pingle, Aritran Piplai, Sudip Mittal, Anupam Joshi, James Holt, Richard Zak:
RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement. CoRR abs/1905.02497 (2019) - [i9]Sudip Mittal, Anupam Joshi, Tim Finin:
Cyber-All-Intel: An AI for Security related Threat Intelligence. CoRR abs/1905.02895 (2019) - 2018
- [c188]Vishal Rathod, Sandeep Nair Narayanan, Sudip Mittal, Anupam Joshi:
Semantically Rich, Context Aware Access Control for Openstack. CIC 2018: 460-465 - [c187]Lorenzo Neil, Sudip Mittal, Anupam Joshi:
Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports. ISI 2018: 7-12 - [c185]Priyanka Ranade, Sudip Mittal, Anupam Joshi, Karuna Pande Joshi:
Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence. ISI 2018: 238-243 - [i7]Nitika Khurana, Sudip Mittal, Anupam Joshi:
Preventing Poisoning Attacks on AI based Threat Intelligence Systems. CoRR abs/1807.07418 (2018) - [i6]Priyanka Ranade, Sudip Mittal, Anupam Joshi, Karuna P. Joshi:
Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence. CoRR abs/1807.07517 (2018) - [i4]Lorenzo Neil, Sudip Mittal, Anupam Joshi:
Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports. CoRR abs/1808.04673 (2018) - 2017
- [c182]Sudip Mittal, Aditi Gupta, Karuna P. Joshi, Claudia Pearce, Anupam Joshi:
A Question and Answering System for Management of Cloud Service Level Agreements. CLOUD 2017: 684-687 - [i2]Sudip Mittal, Anupam Joshi, Tim Finin:
Thinking, Fast and Slow: Combining Vector Spaces and Knowledge Graphs. CoRR abs/1708.03310 (2017) - 2016
- [c178]Aditi Gupta, Sudip Mittal, Karuna P. Joshi, Claudia Pearce, Anupam Joshi:
Streamlining Management of Multiple Cloud Services. CLOUD 2016: 481-488 - [c176]Karuna P. Joshi, Aditi Gupta, Sudip Mittal, Claudia Pearce, Anupam Joshi, Tim Finin:
ALDA: Cognitive Assistant for Legal Document Analytics. AAAI Fall Symposia 2016 - [c175]Sudip Mittal, Prajit Kumar Das, Varish Mulwad, Anupam Joshi, Tim Finin:
CyberTwitter: Using Twitter to generate alerts for cybersecurity threats and vulnerabilities. ASONAM 2016: 860-867 - [c174]Karuna P. Joshi, Aditi Gupta, Sudip Mittal, Claudia Pearce, Anupam Joshi, Tim Finin:
Semantic approach to automating management of big data privacy policies. IEEE BigData 2016: 482-491 - [c172]Sudip Mittal, Karuna P. Joshi, Claudia Pearce, Anupam Joshi:
Automatic Extraction of Metrics from SLAs for Cloud Service Management. IC2E 2016: 139-142 - [c167]Sandeep Nair Narayanan, Sudip Mittal, Anupam Joshi:
Using semantic technologies to mine vehicular context for security. Sarnoff Symposium 2016: 124-129 - [c162]Sandeep Nair Narayanan, Sudip Mittal, Anupam Joshi:
OBD_SecureAlert: An Anomaly Detection System for Vehicles. SMARTCOMP 2016: 1-6 - 2015
- [c161]Sudip Mittal, Karuna P. Joshi, Claudia Pearce, Anupam Joshi:
Parallelizing natural language techniques for knowledge extraction from cloud service level agreements. IEEE BigData 2015: 2831-2833 - [i1]Sandeep Nair Narayanan, Sudip Mittal, Anupam Joshi:
Using Data Analytics to Detect Anomalous States in Vehicles. CoRR abs/1512.08048 (2015)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-18 22:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint