Sagar Samtani
Orcid: 0000-0002-4513-805X
According to our database1,
Sagar Samtani
authored at least 75 papers
between 2015 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Learning Entangled Interactions of Complex Causality via Self-Paced Contrastive Learning.
ACM Trans. Knowl. Discov. Data, April, 2024
Creating Proactive Cyber Threat Intelligence with Hacker Exploit Labels: A Deep Transfer Learning Approach.
MIS Q., 2024
Improving Threat Mitigation Through a Cybersecurity Risk Management Framework: A Computational Design Science Approach.
J. Manag. Inf. Syst., 2024
Motion Sensor-Based Fall Prevention for Senior Care: A Hidden Markov Model with Generative Adversarial Network Approach.
Inf. Syst. Res., 2024
Evading Anti-Phishing Models: A Field Note Documenting an Experience in the Machine Learning Security Evasion Competition 2022.
DTRAP, 2024
Understand your shady neighborhood: An approach for detecting and investigating hacker communities.
Decis. Support Syst., 2024
The 4<sup>th</sup> Workshop on Artificial Intelligence-enabled Cybersecurity Analytics.
Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2024
Introduction to the Minitrack on Cybersecurity in the Age of Artificial Intelligence, AI for Cybersecurity, and Cybersecurity for AI.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024
Suggesting Alternatives for Potentially Insecure Artificial Intelligence Repositories: An Unsupervised Graph Embedding Approach.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024
2023
Additive Feature Attribution Explainable Methods to Craft Adversarial Attacks for Text Classification and Text Regression.
IEEE Trans. Knowl. Data Eng., December, 2023
Inf. Process. Manag., November, 2023
A Multi-Label Classification with an Adversarial-Based Denoising Autoencoder for Medical Image Annotation.
ACM Trans. Manag. Inf. Syst., June, 2023
Inf. Syst. Frontiers, April, 2023
An Escalated Eavesdropping Attack on Mobile Devices via Low-Resolution Vibration Signals.
IEEE Trans. Dependable Secur. Comput., 2023
User Profiling and Vulnerability Introduction Prediction in Social Coding Repositories: A Dynamic Graph Embedding Approach: Vulnerability Introduction Prediction in Social Coding Repositories.
Proceedings of the 2023 Cyber Security Experimentation and Test Workshop, 2023
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023
Assessing the Vulnerabilities of the Open-Source Artificial Intelligence (AI) Landscape: A Large-Scale Analysis of the Hugging Face Platform.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2023
Mapping Exploit Code on Paste Sites to the MITRE ATT&CK Framework: A Multi-label Transformer Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2023
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2023
Towards Privacy-Preserving Depression Detection: Experiments on Passive Sensor Signal Data.
Proceedings of the IEEE International Conference on Digital Health, 2023
Proceedings of the 29th Americas Conference on Information Systems, 2023
2022
Linking Exploits from the Dark Web to Known Vulnerabilities for Proactive Cyber Threat Intelligence: An Attention-Based Deep Structured Semantic Model.
MIS Q., May, 2022
Cross-Lingual Cybersecurity Analytics in the International Dark Web with Adversarial Deep Representation Learning.
MIS Q., May, 2022
IEEE Trans. Dependable Secur. Comput., 2022
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022
Designing a Vulnerability Management Dashboard to Enhance Security Analysts' Decision Making Processes.
Proceedings of the PEARC '22: Practice and Experience in Advanced Research Computing, Boston, MA, USA, July 10, 2022
Exploring the Propagation of Vulnerabilities from GitHub Repositories Hosted by Major Technology Organizations.
Proceedings of the CSET 2022: Cyber Security Experimentation and Test Workshop, 2022
ACM KDD AI4Cyber/MLHat: Workshop on AI-enabled Cybersecurity Analytics and Deployable Defense.
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022
Identifying Patterns of Vulnerability Incidence in Foundational Machine Learning Repositories on GitHub: An Unsupervised Graph Embedding Approach.
Proceedings of the IEEE International Conference on Data Mining Workshops, 2022
Building and Testing a Network of Social Trust in an Underground Forum: Robust Connections and Overlapping Criminal Domains.
Proceedings of the APWG Symposium on Electronic Crime Research, 2022
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
2021
Energy-efficient Collaborative Sensing: Learning the Latent Correlations of Heterogeneous Sensors.
ACM Trans. Sens. Networks, 2021
A Multi-Disciplinary Perspective for Conducting Artificial Intelligence-enabled Privacy Analytics: Connecting Data, Algorithms, and Systems.
ACM Trans. Manag. Inf. Syst., 2021
Machine Learning for Automated Industrial IoT Attack Detection: An Efficiency-Complexity Trade-off.
ACM Trans. Manag. Inf. Syst., 2021
A Deep Learning Approach for Recognizing Activity of Daily Living (ADL) for Senior Care: Exploiting Interaction Dependency and Temporal Patterns.
MIS Q., 2021
Fusion of heterogeneous attention mechanisms in multi-view convolutional neural network for text classification.
Inf. Sci., 2021
Informing Cyber Threat Intelligence through Dark Web Situational Awareness: The AZSecure Hacker Assets Portal.
DTRAP, 2021
Linking Common Vulnerabilities and Exposures to the MITRE ATT&CK Framework: A Self-Distillation Approach.
CoRR, 2021
ACM KDD AI4Cyber: The 1st Workshop on Artificial Intelligence-enabled Cybersecurity Analytics.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021
Identifying and Categorizing Malicious Content on Paste Sites: A Neural Topic Modeling Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2021
Exploring the Evolution of Exploit-Sharing Hackers: An Unsupervised Graph Embedding Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2021
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
2020
Proactively Identifying Emerging Hacker Threats from the Dark Web: A Diachronic Graph Embedding Framework (D-GEF).
ACM Trans. Priv. Secur., 2020
Human Identification for Activities of Daily Living: A Deep Transfer Learning Approach.
J. Manag. Inf. Syst., 2020
Behavioral Biometrics for Continuous Authentication in the Internet-of-Things Era: An Artificial Intelligence Perspective.
IEEE Internet Things J., 2020
On data-driven curation, learning, and analysis for inferring evolving internet-of-Things (IoT) botnets in the wild.
Comput. Secur., 2020
Detecting Cyber Threats in Non-English Hacker Forums: An Adversarial Cross-Lingual Knowledge Transfer Approach.
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020
Smart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020
Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020
Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020
Linking Personally Identifiable Information from the Dark Web to the Surface Web: A Deep Entity Resolution Approach.
Proceedings of the 20th International Conference on Data Mining Workshops, 2020
2019
Fear Appeals and Information Security Behaviors: An Empirical Study on Mechanical Turk.
AIS Trans. Replication Res., 2019
Identifying High-Impact Opioid Products and Key Sellers in Dark Net Marketplaces: An Interpretable Text Analytics Approach.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019
Proceedings of the 27th European Conference on Information Systems, 2019
2018
Developing Proactive Cyber Threat Intelligence from the Online Hacker Community: A Computational Design Science Approach.
PhD thesis, 2018
Identifying SCADA Systems and Their Vulnerabilities on the Internet of Things: A Text-Mining Approach.
IEEE Intell. Syst., 2018
Incremental Hacker Forum Exploit Collection and Classification for Proactive Cyber Threat Intelligence: An Exploratory Study.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018
Benchmarking Vulnerability Assessment Tools for Enhanced Cyber-Physical System (CPS) Resiliency.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018
Vulnerability Assessment, Remediation, and Automated Reporting: Case Studies of Higher Education Institutions.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018
Detecting Cyber Threats in Non-English Dark Net Markets: A Cross-Lingual Transfer Learning Approach.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018
Identifying, Collecting, and Presenting Hacker Community Data: Forums, IRC, Carding Shops, and DNMs.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018
2017
Exploring Emerging Hacker Assets and Key Hackers for Proactive Cyber Threat Intelligence.
J. Manag. Inf. Syst., 2017
Identifying vulnerabilities of consumer Internet of Things (IoT) devices: A scalable approach.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017
Identifying mobile malware and key threat actors in online hacker forums for proactive cyber threat intelligence.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017
Benchmarking vulnerability scanners: An experiment on SCADA devices and scientific instruments.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017
2016
Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016
Using social network analysis to identify key hackers for keylogging tools in hacker forums.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016
2015
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015