Aditya Kuppa

Orcid: 0000-0002-6855-6334

According to our database1, Aditya Kuppa authored at least 20 papers between 2011 and 2024.

Collaborative distances:

Timeline

2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
6
1
1
1
2
1
1
3
3
2
2
2
1

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
The next phase of identifying illicit activity in Bitcoin.
Int. J. Netw. Manag., 2024

Manipulating Prompts and Retrieval-Augmented Generation for LLM Service Providers.
Proceedings of the 21st International Conference on Security and Cryptography, 2024

2023
Enhancing Illicit Activity Detection using XAI: A Multimodal Graph-LLM Framework.
CoRR, 2023


SoK: The Next Phase of Identifying Illicit Activity in Bitcoin.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

FraudLens: Graph Structural Learning for Bitcoin Illicit Activity Identification.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
Learn to Adapt: Robust Drift Detection in Security Domain.
CoRR, 2022

2021
Adversarial XAI Methods in Cybersecurity.
IEEE Trans. Inf. Forensics Secur., 2021

Financial Cybercrime: A Comprehensive Survey of Deep Learning Approaches to Tackle the Evolving Financial Crime Landscape.
IEEE Access, 2021

Deep Learning Based Plant Disease Classification With Explainable AI and Mitigation Recommendation.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2021

Towards Improving Privacy of Synthetic DataSets.
Proceedings of the Privacy Technologies and Policy - 9th Annual Privacy Forum, 2021

Linking CVE's to MITRE ATT&CK Techniques.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Black Box Attacks on Explainable Artificial Intelligence(XAI) methods in Cyber Security.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Effect of Security Controls on Patching Window: A Causal Inference based Approach.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Finding Rats in Cats: Detecting Stealthy Attacks using Group Anomaly Detection.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Black Box Attacks on Deep Anomaly Detectors.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Enabling Trust in Deep Learning Models: A Digital Forensics Case Study.
Proceedings of the 17th IEEE International Conference On Trust, 2018

RiskWriter: Predicting Cyber Risk of an Enterprise.
Proceedings of the Information Systems Security - 14th International Conference, 2018

2011
Development of Bio-Machine Based on the Plant Response to External Stimuli.
J. Robotics, 2011

Development of Bio-machine based on the plant response to external stimuli.
Proceedings of the 2011 IEEE International Conference on Robotics and Biomimetics, 2011


  Loading...