Aritran Piplai

Ph.D. Student, Student

Publications

2025

  1. A. Piplai, A. Kotal, S. Mittal, K. P. Joshi, T. Finin, and A. Joshi, "Enhancing Trustworthiness in LLM Generated Code: A Reinforcement Learning and Domain-Knowledge Constrained Approach", TechReport, CodeBot'25 Workshop, February 2025, 186 downloads.

2023

  1. A. Piplai, A. Kotal, S. Mohseni, M. Gaur, S. Mittal, and A. Joshi, "Knowledge-Enhanced Neurosymbolic Artificial Intelligence for Cybersecurity and Privacy", Article, IEEE Internet Computing, September 2023, 929 downloads.
  2. A. Piplai, "Knowledge Graphs and Reinforcement Learning: A Hybrid Approach for Cybersecurity Problems", PhdThesis, July 2023, 2110 downloads.
  3. A. Piplai, A. Joshi, and T. Finin, "Offline RL+CKG: A hybrid AI model for cybersecurity tasks", InProceedings, AAAI Spring Symposium on Challenges Requiring the Combination of Machine Learning and Knowledge Engineering, March 2023, 511 downloads.

2022

  1. A. Piplai, M. Anoruo, K. Fasaye, A. Joshi, T. Finin, and A. Ridley, "Knowledge guided Two-player Reinforcement Learning for Cyber Attacks and Defenses", InProceedings, International Conference on Machine Learning and Applications, December 2022, 1434 downloads.
  2. A. Kotal, A. Piplai, S. Chukkapalli, and A. Joshi, "PriveTAB : Secure and Privacy-Preserving sharing of Tabular Data", InProceedings, ACM International Workshop on Security and Privacy Analytics, April 2022, 654 downloads.
  3. S. Mitra, A. Piplai, S. Mittal, and A. Joshi, "Combating Fake Cyber Threat Intelligence using Provenance in Cybersecurity Knowledge Graphs", IEEE International Conference on Big Data 2021, January 2022, 1540 downloads.

2021

  1. S. Dasgupta, A. Piplai, P. Ranade, and A. Joshi, "Cybersecurity Knowledge Graph Improvement with Graph Neural Networks", InProceedings, International Conference on Big Data, December 2021, 779 downloads.
  2. P. Ranade, A. Piplai, A. Joshi, and T. Finin, "CyBERT: Contextualized Embeddings for the Cybersecurity Domain", InProceedings, IEEE International Conference on Big Data, December 2021, 2648 downloads.
  3. L. Elluri, A. Piplai, A. Kotal, A. Joshi, and K. P. Joshi, "A Policy-Driven Approach to Secure Extraction of COVID-19 Data From Research Papers", Article, Frontiers in Big Data, doi: 10.3389/fdata.2021.701966, August 2021, 600 downloads.
  4. P. Ranade, A. Piplai, S. Mittal, A. Joshi, and T. Finin, "Generating Fake Cyber Threat Intelligence Using Transformer-Based Models", Proceedings, International Joint Conference on Neural Networks (IJCNN 2021), July 2021, 1020 downloads, 110 citations.

2020

  1. S. Dasgupta, A. Piplai, A. Kotal, and A. Joshi, "A Comparative Study of Deep Learning based Named Entity Recognition Algorithms for Cybersecurity", InProceedings, IEEE International Conference on Big Data 2020, December 2020, 1388 downloads.
  2. A. Piplai, S. Mittal, A. Joshi, T. Finin, J. Holt, and R. Zak, "Creating Cybersecurity Knowledge Graphs from Malware After Action Reports", Article, IEEE Access Journal, December 2020, 1312 downloads.
  3. A. Piplai, P. Ranade, A. Kotal, S. Mittal, S. N. Narayanan, and A. Joshi, "Using Knowledge Graphs and Reinforcement Learning for Malware Analysis", InProceedings, IEEE International Conference on Big Data 2020, December 2020, 1399 downloads.
  4. A. Piplai, S. Mittal, M. Abdelsalam, M. Gupta, A. Joshi, and T. Finin, "Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior", InProceedings, IEEE International Conference on Intelligence and Security Informatics (ISI), November 2020, 884 downloads.
  5. Z. Boukouvalas, C. Mallinson, E. Crothers, N. Japkowicz, A. Piplai, S. Mittal, A. Joshi, and T. Adali, "Independent Component Analysis for Trustworthy Cyberspace during High Impact Events: An Application to Covid-19", Article, arXiv:2006.01284 [cs.LG], June 2020, 667 downloads.
  6. A. Piplai, S. Chukkapalli, and A. Joshi, "NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud, May 2020, 1477 downloads.
  7. S. Chukkapalli, A. Piplai, S. Mittal, M. Gupta, and A. Joshi, "A Smart-Farming Ontology for Attribute Based Access Control", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2020), March 2020, 1153 downloads.

2019

  1. N. Khurana, S. Mittal, A. Piplai, and A. Joshi, "Preventing Poisoning Attacks on AI based Threat Intelligence Systems", InProceedings, IEEE Machine Learning for Signal Processing, September 2019, 1206 downloads.
  2. A. Pingle, A. Piplai, S. Mittal, A. Joshi, J. Holt, and R. Zak, "RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement", InProceedings, IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2019), May 2019, 1280 downloads.