Sudip Mittal

Orcid: 0000-0001-9151-8347

According to our database1, Sudip Mittal authored at least 96 papers between 2013 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Patient-centric knowledge graphs: a survey of current methods, challenges, and applications.
Frontiers Artif. Intell., 2024

AAD-LLM: Adaptive Anomaly Detection Using Large Language Models.
CoRR, 2024

Medical-GAT: Cancer Document Classification Leveraging Graph-Based Residual Network for Scenarios with Limited Data.
CoRR, 2024

Transfer Learning Applied to Computer Vision Problems: Survey on Current Progress, Limitations, and Opportunities.
CoRR, 2024

Explainable Anomaly Detection: Counterfactual driven What-If Analysis.
CoRR, 2024

A Survey on Privacy Attacks Against Digital Twin Systems in AI-Robotics.
CoRR, 2024

A Survey of Transformer Enabled Time Series Synthesis.
CoRR, 2024

From Questions to Insightful Answers: Building an Informed Chatbot for University Resources.
CoRR, 2024

Generating Synthetic Time Series Data for Cyber-Physical Systems.
CoRR, 2024

AI Ethics: A Bibliometric Analysis, Critical Issues, and Key Gaps.
CoRR, 2024

MedInsight: A Multi-Source Context Augmentation Framework for Generating Patient-Centric Medical Responses using Large Language Models.
CoRR, 2024

A Bibliometric View of AI Ethics Development.
CoRR, 2024

Utilizing Large Language Models to Translate RFC Protocol Specifications to CPSA Definitions.
CoRR, 2024

Eclectic Rule Extraction for Explainability of Deep Neural Network based Intrusion Detection Systems.
CoRR, 2024

LOCALINTEL: Generating Organizational Threat Intelligence from Global and Local Cyber Knowledge.
CoRR, 2024

Use of Graph Neural Networks in Aiding Defensive Cyber Operations.
CoRR, 2024

Security Considerations in AI-Robotics: A Survey of Current Methods, Challenges, and Opportunities.
IEEE Access, 2024

Explainable Predictive Maintenance: A Survey of Current Methods, Challenges and Opportunities.
IEEE Access, 2024

Defending Multi-Cloud Applications Against Man-in-the-Middle Attacks.
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024

2023
Semantically Rich Framework to Automate Cyber Insurance Services.
IEEE Trans. Serv. Comput., 2023

Knowledge-Enhanced Neurosymbolic Artificial Intelligence for Cybersecurity and Privacy.
IEEE Internet Comput., 2023

Emergent (In)Security of Multi-Cloud Environments.
CoRR, 2023

URA*: Uncertainty-aware Path Planning using Image-based Aerial-to-Ground Traversability Estimation for Off-road Environments.
CoRR, 2023

Knowledge-enhanced Neuro-Symbolic AI for Cybersecurity and Privacy.
CoRR, 2023

Impacts and Risk of Generative AI Technology on Cyber Defense.
CoRR, 2023

Systemic Risk and Vulnerability Analysis of Multi-cloud Environments.
CoRR, 2023

REGARD: Rules of EngaGement for Automated cybeR Defense to aid in Intrusion Response.
CoRR, 2023

Explainable Intrusion Detection Systems Using Competitive Learning Techniques.
CoRR, 2023

AI Security Threats against Pervasive Robotic Systems: A Course for Next Generation Cybersecurity Workforce.
CoRR, 2023

TwinExplainer: Explaining Predictions of an Automotive Digital Twin.
CoRR, 2023

Survey of Malware Analysis through Control Flow Graph using Machine Learning.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

CAPoW: Context-Aware AI-Assisted Proof of Work Based DDoS Defense.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

KiL 2023 : 3rd International Workshop on Knowledge-infused Learning.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

A Comparative Study of Continual, Lifelong, and Online Supervised Learning Libraries.
Proceedings of the Thirty-Sixth International Florida Artificial Intelligence Research Society Conference, 2023

2022
irs-partition: An Intrusion Response System utilizing Deep Q-Networks and system partitions.
SoftwareX, 2022

AI_Adaptive_POW: An AI assisted Proof Of Work (POW) framework for DDoS defense.
Softw. Impacts, 2022

Risks to Zero Trust in a Federated Mission Partner Environment.
CoRR, 2022

A White-Box Adversarial Attack Against a Digital Twin.
CoRR, 2022

Self-Sovereign Identity in a World of Authentication: Architecture and Domain Usecases.
CoRR, 2022

Designing an Artificial Immune System inspired Intrusion Detection System.
CoRR, 2022

CTI4AI: Threat Intelligence Generation and Sharing after Red Teaming AI Models.
CoRR, 2022

An Intrusion Response System utilizing Deep Q-Networks and System Partitions.
CoRR, 2022

Explainable Intrusion Detection Systems (X-IDS): A Survey of Current Methods, Challenges, and Opportunities.
IEEE Access, 2022

Creating an Explainable Intrusion Detection System Using Self Organizing Maps.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2022

A Policy Driven AI-Assisted PoW Framework.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

A Temporal Anomaly Detection System for Vehicles utilizing Functional Working Groups and Sensor Channels.
Proceedings of the 8th IEEE International Conference on Collaboration and Internet Computing, 2022

Enforcement of Laws and Privacy Preferences in Modern Computing Systems.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

Security and Privacy for Emerging IoT and CPS Domains.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

Poster CTI4AI: Threat Intelligence Generation and Sharing after Red Teaming AI Models.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Secure V2V and V2I Technologies for the Next-Generation Intelligent Transportation Systems.
Computer, 2021

A Privacy Preserving Anomaly Detection Framework for Cooperative Smart Farming Ecosystem.
Proceedings of the 3rd IEEE International Conference on Trust, 2021

Cyber-Physical System Security Surveillance using Knowledge Graph based Digital Twins - A Smart Farming Usecase.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2021

Generating Fake Cyber Threat Intelligence Using Transformer-Based Models.
Proceedings of the International Joint Conference on Neural Networks, 2021

The Case for Latent Variable Vs Deep Learning Methods in Misinformation Detection: An Application to COVID-19.
Proceedings of the Discovery Science - 24th International Conference, 2021

Is there a Security Mindset and Can it be Taught?
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

Ontology driven AI and Access Control Systems for Smart Fisheries.
Proceedings of the SAT-CPS@CODASPY 2021, 2021

AI for Security and Security for AI.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

Artificial Intelligence Assisted Malware Analysis.
Proceedings of the SAT-CPS@CODASPY 2021, 2021

Combating Fake Cyber Threat Intelligence using Provenance in Cybersecurity Knowledge Graphs.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
AI assisted Malware Analysis: A Course for Next Generation Cybersecurity Workforce.
CoRR, 2020

Independent Component Analysis for Trustworthy Cyberspace during High Impact Events: An Application to Covid-19.
CoRR, 2020

Enabling and Enforcing Social Distancing Measures using Smart City and ITS Infrastructures: A COVID-19 Use Case.
CoRR, 2020

Creating Cybersecurity Knowledge Graphs From Malware After Action Reports.
IEEE Access, 2020

Security and Privacy in Smart Farming: Challenges and Opportunities.
IEEE Access, 2020

Ontologies and Artificial Intelligence Systems for the Cooperative Smart Farming Ecosystem.
IEEE Access, 2020

Cybersecurity Threat Intelligence Augmentation and Embedding Improvement - A Healthcare Usecase.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

Cyber Attacks on Smart Farming Infrastructure.
Proceedings of the 6th IEEE International Conference on Collaboration and Internet Computing, 2020

Analyzing CNN Based Behavioural Malware Detection Techniques on Cloud IaaS.
Proceedings of the Cloud Computing - CLOUD 2020, 2020

A Smart-Farming Ontology for Attribute Based Access Control.
Proceedings of the 6th IEEE International Conference on Big Data Security on Cloud, 2020

Using Knowledge Graphs and Reinforcement Learning for Malware Analysis.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

YieldPredict: A Crop Yield Prediction Framework for Smart Farms.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2019
Cyber-All-Intel: An AI for Security related Threat Intelligence.
CoRR, 2019

Preventing Poisoning Attacks On AI Based Threat Intelligence Systems.
Proceedings of the 29th IEEE International Workshop on Machine Learning for Signal Processing, 2019

A Semantic Approach for Automating Knowledge in Policies of Cyber Insurance Services.
Proceedings of the 2019 IEEE International Conference on Web Services, 2019

Anomaly Detection Models for Smart Home Security.
Proceedings of the 5th IEEE International Conference on Big Data Security on Cloud, 2019

RelExt: relation extraction using deep learning approaches for cybersecurity knowledge graph improvement.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019

2018
Preventing Poisoning Attacks on AI based Threat Intelligence Systems.
CoRR, 2018

Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Semantically Rich, Context Aware Access Control for Openstack.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

2017
Thinking, Fast and Slow: Combining Vector Spaces and Knowledge Graphs.
CoRR, 2017

Semantically Rich, Oblivious Access Control Using ABAC for Secure Cloud Storage.
Proceedings of the IEEE International Conference on Edge Computing, 2017

A Question and Answering System for Management of Cloud Service Level Agreements.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
OBD_SecureAlert: An Anomaly Detection System for Vehicles.
Proceedings of the 2016 IEEE International Conference on Smart Computing, 2016

Using semantic technologies to mine vehicular context for security.
Proceedings of the 37th IEEE Sarnoff Symposium 2016, Newark, NJ, USA, 2016

Automatic Extraction of Metrics from SLAs for Cloud Service Management.
Proceedings of the 2016 IEEE International Conference on Cloud Engineering, 2016

Semantic approach to automating management of big data privacy policies.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016

CyberTwitter: Using Twitter to generate alerts for cybersecurity threats and vulnerabilities.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

ALDA: Cognitive Assistant for Legal Document Analytics.
Proceedings of the 2016 AAAI Fall Symposia, Arlington, Virginia, USA, November 17-19, 2016, 2016

Streamlining Management of Multiple Cloud Services.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
Using Data Analytics to Detect Anomalous States in Vehicles.
CoRR, 2015

Parallelizing natural language techniques for knowledge extraction from cloud service level agreements.
Proceedings of the 2015 IEEE International Conference on Big Data (IEEE BigData 2015), Santa Clara, CA, USA, October 29, 2015

2014
Broker Bots: Analyzing automated activity during High Impact Events on Twitter.
CoRR, 2014

Pinned it! A Large Scale Study of the Pinterest Network.
Proceedings of the 1st IKDD Conference on Data Sciences, Delhi, India, March 21 - 23, 2014, 2014

2013
The Pin-Bang Theory: Discovering The Pinterest World.
CoRR, 2013


  Loading...