Sagar Samtani

Orcid: 0000-0002-4513-805X

According to our database1, Sagar Samtani authored at least 74 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
The Art of Cybercrime Community Research.
ACM Comput. Surv., June, 2024

Learning Entangled Interactions of Complex Causality via Self-Paced Contrastive Learning.
ACM Trans. Knowl. Discov. Data, April, 2024

Creating Proactive Cyber Threat Intelligence with Hacker Exploit Labels: A Deep Transfer Learning Approach.
MIS Q., 2024

Improving Threat Mitigation Through a Cybersecurity Risk Management Framework: A Computational Design Science Approach.
J. Manag. Inf. Syst., 2024

Motion Sensor-Based Fall Prevention for Senior Care: A Hidden Markov Model with Generative Adversarial Network Approach.
Inf. Syst. Res., 2024

Applied Machine Learning for Information Security.
DTRAP, 2024

Evading Anti-Phishing Models: A Field Note Documenting an Experience in the Machine Learning Security Evasion Competition 2022.
DTRAP, 2024

Understand your shady neighborhood: An approach for detecting and investigating hacker communities.
Decis. Support Syst., 2024

The 4<sup>th</sup> Workshop on Artificial Intelligence-enabled Cybersecurity Analytics.
Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2024

Introduction to the Minitrack on Cybersecurity in the Age of Artificial Intelligence, AI for Cybersecurity, and Cybersecurity for AI.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

Suggesting Alternatives for Potentially Insecure Artificial Intelligence Repositories: An Unsupervised Graph Embedding Approach.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

2023
Additive Feature Attribution Explainable Methods to Craft Adversarial Attacks for Text Classification and Text Regression.
IEEE Trans. Knowl. Data Eng., December, 2023

A deep interpretable representation learning method for speech emotion recognition.
Inf. Process. Manag., November, 2023

A Multi-Label Classification with an Adversarial-Based Denoising Autoencoder for Medical Image Annotation.
ACM Trans. Manag. Inf. Syst., June, 2023

Secure Knowledge Management and Cybersecurity in the Era of Artificial Intelligence.
Inf. Syst. Frontiers, April, 2023

An Escalated Eavesdropping Attack on Mobile Devices via Low-Resolution Vibration Signals.
IEEE Trans. Dependable Secur. Comput., 2023

Deep Learning for Information Systems Research.
J. Manag. Inf. Syst., 2023

User Profiling and Vulnerability Introduction Prediction in Social Coding Repositories: A Dynamic Graph Embedding Approach: Vulnerability Introduction Prediction in Social Coding Repositories.
Proceedings of the 2023 Cyber Security Experimentation and Test Workshop, 2023

The 3rd Workshop on Artificial Intelligence-enabled Cybersecurity Analytics.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

Assessing the Vulnerabilities of the Open-Source Artificial Intelligence (AI) Landscape: A Large-Scale Analysis of the Hugging Face Platform.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2023

Mapping Exploit Code on Paste Sites to the MITRE ATT&CK Framework: A Multi-label Transformer Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2023

Disrupting Ransomware Actors on the Bitcoin Blockchain: A Graph Embedding Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2023

Towards Privacy-Preserving Depression Detection: Experiments on Passive Sensor Signal Data.
Proceedings of the IEEE International Conference on Digital Health, 2023

Benchmarking the Robustness of Phishing Email Detection Systems.
Proceedings of the 29th Americas Conference on Information Systems, 2023

2022
Linking Exploits from the Dark Web to Known Vulnerabilities for Proactive Cyber Threat Intelligence: An Attention-Based Deep Structured Semantic Model.
MIS Q., May, 2022

Cross-Lingual Cybersecurity Analytics in the International Dark Web with Adversarial Deep Representation Learning.
MIS Q., May, 2022

Explainable Artificial Intelligence for Cyber Threat Intelligence (XAI-CTI).
IEEE Trans. Dependable Secur. Comput., 2022

AccMyrinx: Speech Synthesis with Non-Acoustic Sensor.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022

Designing a Vulnerability Management Dashboard to Enhance Security Analysts' Decision Making Processes.
Proceedings of the PEARC '22: Practice and Experience in Advanced Research Computing, Boston, MA, USA, July 10, 2022

Exploring the Propagation of Vulnerabilities from GitHub Repositories Hosted by Major Technology Organizations.
Proceedings of the CSET 2022: Cyber Security Experimentation and Test Workshop, 2022

ACM KDD AI4Cyber/MLHat: Workshop on AI-enabled Cybersecurity Analytics and Deployable Defense.
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022

Identifying Patterns of Vulnerability Incidence in Foundational Machine Learning Repositories on GitHub: An Unsupervised Graph Embedding Approach.
Proceedings of the IEEE International Conference on Data Mining Workshops, 2022

Building and Testing a Network of Social Trust in an Underground Forum: Robust Connections and Overlapping Criminal Domains.
Proceedings of the APWG Symposium on Electronic Crime Research, 2022

Enforcement of Laws and Privacy Preferences in Modern Computing Systems.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

2021
Energy-efficient Collaborative Sensing: Learning the Latent Correlations of Heterogeneous Sensors.
ACM Trans. Sens. Networks, 2021

A Multi-Disciplinary Perspective for Conducting Artificial Intelligence-enabled Privacy Analytics: Connecting Data, Algorithms, and Systems.
ACM Trans. Manag. Inf. Syst., 2021

Machine Learning for Automated Industrial IoT Attack Detection: An Efficiency-Complexity Trade-off.
ACM Trans. Manag. Inf. Syst., 2021

A Deep Learning Approach for Recognizing Activity of Daily Living (ADL) for Senior Care: Exploiting Interaction Dependency and Temporal Patterns.
MIS Q., 2021

Fusion of heterogeneous attention mechanisms in multi-view convolutional neural network for text classification.
Inf. Sci., 2021

Linking Common Vulnerabilities and Exposures to the MITRE ATT&CK Framework: A Self-Distillation Approach.
CoRR, 2021

ACM KDD AI4Cyber: The 1st Workshop on Artificial Intelligence-enabled Cybersecurity Analytics.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021

Identifying and Categorizing Malicious Content on Paste Sites: A Neural Topic Modeling Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2021

Exploring the Evolution of Exploit-Sharing Hackers: An Unsupervised Graph Embedding Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2021

AI for Security and Security for AI.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

2020
Proactively Identifying Emerging Hacker Threats from the Dark Web: A Diachronic Graph Embedding Framework (D-GEF).
ACM Trans. Priv. Secur., 2020

Human Identification for Activities of Daily Living: A Deep Transfer Learning Approach.
J. Manag. Inf. Syst., 2020

Behavioral Biometrics for Continuous Authentication in the Internet-of-Things Era: An Artificial Intelligence Perspective.
IEEE Internet Things J., 2020

Deep Learning for Information Systems Research.
CoRR, 2020

On data-driven curation, learning, and analysis for inferring evolving internet-of-Things (IoT) botnets in the wild.
Comput. Secur., 2020

Detecting Cyber Threats in Non-English Hacker Forums: An Adversarial Cross-Lingual Knowledge Transfer Approach.
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020

Smart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

Linking Personally Identifiable Information from the Dark Web to the Surface Web: A Deep Entity Resolution Approach.
Proceedings of the 20th International Conference on Data Mining Workshops, 2020

2019
Fear Appeals and Information Security Behaviors: An Empirical Study on Mechanical Turk.
AIS Trans. Replication Res., 2019

Identifying High-Impact Opioid Products and Key Sellers in Dark Net Marketplaces: An Interpretable Text Analytics Approach.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019

Dark-Net Ecosystem Cyber-Threat Intelligence (CTI) Tool.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019

Rocket ship or Blimp? - Implications of Malicious Accounts removal on Twitter.
Proceedings of the 27th European Conference on Information Systems, 2019

2018
Developing Proactive Cyber Threat Intelligence from the Online Hacker Community: A Computational Design Science Approach.
PhD thesis, 2018

Identifying SCADA Systems and Their Vulnerabilities on the Internet of Things: A Text-Mining Approach.
IEEE Intell. Syst., 2018

Incremental Hacker Forum Exploit Collection and Classification for Proactive Cyber Threat Intelligence: An Exploratory Study.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Benchmarking Vulnerability Assessment Tools for Enhanced Cyber-Physical System (CPS) Resiliency.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Vulnerability Assessment, Remediation, and Automated Reporting: Case Studies of Higher Education Institutions.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Detecting Cyber Threats in Non-English Dark Net Markets: A Cross-Lingual Transfer Learning Approach.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Identifying, Collecting, and Presenting Hacker Community Data: Forums, IRC, Carding Shops, and DNMs.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

2017
Exploring Emerging Hacker Assets and Key Hackers for Proactive Cyber Threat Intelligence.
J. Manag. Inf. Syst., 2017

Identifying vulnerabilities of consumer Internet of Things (IoT) devices: A scalable approach.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017

Assessing medical device vulnerabilities on the Internet of Things.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017

Identifying mobile malware and key threat actors in online hacker forums for proactive cyber threat intelligence.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017

Benchmarking vulnerability scanners: An experiment on SCADA devices and scientific instruments.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017

2016
Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

AZSecure Hacker Assets Portal: Cyber threat intelligence and malware analysis.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

Using social network analysis to identify key hackers for keylogging tools in hacker forums.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

2015
Exploring hacker assets in underground forums.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015


  Loading...