Samtani, Sagar
58  results:
Search for persons X
?
1

Improving Threat Mitigation Through a Cybersecurity Risk Ma..:

Ampel, Benjamin M. ; Samtani, Sagar ; Zhu, Hongyi..
Journal of Management Information Systems.  41 (2024)  1 - p. 236-265 , 2024
 
?
2

Evading Anti-Phishing Models: A Field Note Documenting an E..:

Gao, Yang ; Ampel, Benjamin M. ; Samtani, Sagar
Digital Threats: Research and Practice.  5 (2024)  1 - p. 1-8 , 2024
 
?
3

The Art of Cybercrime Community Research:

Hughes, Jack ; Pastrana, Sergio ; Hutchings, Alice...
ACM Computing Surveys.  56 (2024)  6 - p. 1-26 , 2024
 
?
5

Applied Machine Learning for Information Security:

Samtani, Sagar ; Raff, Edward ; Anderson, Hyrum
Digital Threats: Research and Practice.  5 (2024)  1 - p. 1-5 , 2024
 
?
6

User Profiling and Vulnerability Introduction Prediction in..:

, In: Proceedings of the 16th Cyber Security Experimentation and Test Workshop,
Sachdeva, Agrim ; Lazarine, Ben ; Zhu, Hongyi. - p. 19-25 , 2023
 
?
7

Towards Privacy-Preserving Depression Detection: Experiment..:

, In: 2023 IEEE International Conference on Digital Health (ICDH),
Yuan, Aijia ; Xu, Michael ; Zhu, Hongyi.. - p. 115-117 , 2023
 
?
8

A deep interpretable representation learning method for spe..:

Jing, Erkang ; Liu, Yezheng ; Chai, Yidong...
Information Processing & Management.  60 (2023)  6 - p. 103501 , 2023
 
?
9

An Escalated Eavesdropping Attack on Mobile Devices via Low..:

Liang, Yunji ; Qin, Yuchen ; Li, Qi...
IEEE Transactions on Dependable and Secure Computing.  20 (2023)  4 - p. 3037-3050 , 2023
 
?
11

The 3rd Workshop on Artificial Intelligence-enabled Cyberse..:

, In: Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining,
Samtani, Sagar ; Yang, Shanchieh ; Chen, Hsinchun - p. 5880-5881 , 2023
 
?
12

A Multi-Label Classification with an Adversarial-Based Deno..:

Chai, Yidong ; Liu, Hongyan ; Xu, Jie...
ACM Transactions on Management Information Systems.  14 (2023)  2 - p. 1-21 , 2023
 
?
13

Disrupting Ransomware Actors on the Bitcoin Blockchain: A G..:

, In: 2023 IEEE International Conference on Intelligence and Security Informatics (ISI),
 
?
14

Assessing the Vulnerabilities of the Open-Source Artificial..:

, In: 2023 IEEE International Conference on Intelligence and Security Informatics (ISI),
 
?
15

Mapping Exploit Code on Paste Sites to the MITRE ATT&CK Fra..:

, In: 2023 IEEE International Conference on Intelligence and Security Informatics (ISI),
 
1-15