Anupam Joshi
YOU?
Author Swipe
View article: An Overview of Network-Related Challenges in Cell-Free 6G
An Overview of Network-Related Challenges in Cell-Free 6G Open
View article: A Literature Review on Quantifying Roadside Evolution Using Computer Vision and Deep Learning
A Literature Review on Quantifying Roadside Evolution Using Computer Vision and Deep Learning Open
View article: Optimization of Latency in 5G Networks
Optimization of Latency in 5G Networks Open
—This paper presents an exhaustive investigation of latency optimization in 5G Ultra-Reliable Low-Latency Commu- nication (URLLC) systems. The emergence of 5G Ultra-Reliable Low-Latency Communication (URLLC) has revolutionized wire- less s…
View article: Insightify: A Platform For The Betterment Of Students
Insightify: A Platform For The Betterment Of Students Open
This paper introduces Insightify, an online platform designed to support users in their educational and career development journeys. Insightify provides personalized tools for Course Recommendations, Roadmap Generation, Resume Enhancement,…
View article: Ensuring On-farm Food Safety through Good Agricultural Practices: A Review
Ensuring On-farm Food Safety through Good Agricultural Practices: A Review Open
With food-borne illnesses increasing every year and e-commerce operations reaching every location globally, ensuring food safety is of paramount importance. In India, 16 per cent of the total disease outbreaks are reported to be food-relat…
View article: Quantifying the Hidden Costs: A Review of True Cost Accounting in Agrifood Systems
Quantifying the Hidden Costs: A Review of True Cost Accounting in Agrifood Systems Open
Agrifood systems provide food along with providing employment opportunities to a large number of people around the globe. While the positive aspects are well known to all, many negative costs also arise out of agrifood systems which when g…
View article: Leveraging Machine Learning Techniques in Agriculture: Applications, Challenges, and Opportunities
Leveraging Machine Learning Techniques in Agriculture: Applications, Challenges, and Opportunities Open
Machine learning (ML) is rapidly transforming agriculture by introducing data-driven insights and automation into farming practices, enabling precision, efficiency, and sustainability. This paper explores the foundational concepts of ML, d…
View article: Environmental Sustainability in the Digital Age: The Role of Smart Technologies in Agriculture, Urban Development, and Energy Management
Environmental Sustainability in the Digital Age: The Role of Smart Technologies in Agriculture, Urban Development, and Energy Management Open
Environmental sustainability is a pressing global challenge that demands innovative solutions to balance ecological preservation with human development. In the digital age, smart technologies have emerged as transformative tools for addres…
View article: KIPPS: Knowledge infusion in Privacy Preserving Synthetic Data Generation
KIPPS: Knowledge infusion in Privacy Preserving Synthetic Data Generation Open
The integration of privacy measures, including differential privacy techniques, ensures a provable privacy guarantee for the synthetic data. However, challenges arise for Generative Deep Learning models when tasked with generating realisti…
View article: Neural Network-Driven Predictive Maintenance for Gas Turbines
Neural Network-Driven Predictive Maintenance for Gas Turbines Open
The thermophysical characteristics of flue gas are significantly altered when hydrogen fuel is used in gas turbines. More steam content and greater specific heat capacity indicate that hydrogen-fuelled gas turbines may experience major hea…
View article: KiNETGAN: Enabling Distributed Network Intrusion Detection through Knowledge-Infused Synthetic Data Generation
KiNETGAN: Enabling Distributed Network Intrusion Detection through Knowledge-Infused Synthetic Data Generation Open
In the realm of IoT/CPS systems connected over mobile networks, traditional intrusion detection methods analyze network traffic across multiple devices using anomaly detection techniques to flag potential security threats. However, these m…
View article: PrivComp-KG : Leveraging Knowledge Graph and Large Language Models for Privacy Policy Compliance Verification
PrivComp-KG : Leveraging Knowledge Graph and Large Language Models for Privacy Policy Compliance Verification Open
Data protection and privacy is becoming increasingly crucial in the digital era. Numerous companies depend on third-party vendors and service providers to carry out critical functions within their operations, encompassing tasks such as dat…
View article: Opioid and Antimicrobial Prescription Patterns During Emergency Medicine Encounters Among Uninsured Patients.
Opioid and Antimicrobial Prescription Patterns During Emergency Medicine Encounters Among Uninsured Patients. Open
The purpose of this study was to characterize opioid and antimicrobial prescribing among uninsured patients seeking emergency medical care and to build predictive machine learning models. Uninsured patients were less likely to receive an o…
View article: Privacy-Preserving Data Sharing in Agriculture: Enforcing Policy Rules for Secure and Confidential Data Synthesis
Privacy-Preserving Data Sharing in Agriculture: Enforcing Policy Rules for Secure and Confidential Data Synthesis Open
Big Data empowers the farming community with the information needed to optimize resource usage, increase productivity, and enhance the sustainability of agricultural practices. The use of Big Data in farming requires the collection and ana…
View article: FABULA: Intelligence Report Generation Using Retrieval-Augmented Narrative Construction
FABULA: Intelligence Report Generation Using Retrieval-Augmented Narrative Construction Open
Narrative construction is the process of representing disparate event\ninformation into a logical plot structure that models an end to end story.\nIntelligence analysis is an example of a domain that can benefit tremendously\nfrom narrativ…
View article: Change Management using Generative Modeling on Digital Twins
Change Management using Generative Modeling on Digital Twins Open
A key challenge faced by small and medium-sized business entities is securely managing software updates and changes. Specifically, with rapidly evolving cybersecurity threats, changes/updates/patches to software systems are necessary to st…
View article: Knowledge-Enhanced Neurosymbolic Artificial Intelligence for Cybersecurity and Privacy
Knowledge-Enhanced Neurosymbolic Artificial Intelligence for Cybersecurity and Privacy Open
Neurosymbolic artificial intelligence (AI) is an emerging and quickly advancing field that combines the subsymbolic strengths of (deep) neural networks and the explicit, symbolic knowledge contained in knowledge graphs (KGs) to enhance exp…
View article: Knowledge-enhanced Neuro-Symbolic AI for Cybersecurity and Privacy
Knowledge-enhanced Neuro-Symbolic AI for Cybersecurity and Privacy Open
Neuro-Symbolic Artificial Intelligence (AI) is an emerging and quickly advancing field that combines the subsymbolic strengths of (deep) neural networks and explicit, symbolic knowledge contained in knowledge graphs to enhance explainabili…
View article: A Practical Entity Linking System for Tables in Scientific Literature
A Practical Entity Linking System for Tables in Scientific Literature Open
Entity linking is an important step towards constructing knowledge graphs that facilitate advanced question answering over scientific documents, including the retrieval of relevant information included in tables within these documents. Thi…
View article: Knowledge Guided Two-player Reinforcement Learning for Cyber Attacks and Defenses
Knowledge Guided Two-player Reinforcement Learning for Cyber Attacks and Defenses Open
Cyber defense exercises are an important avenue to understand the technical capacity of organizations when faced with cyber-threats. Information derived from these exercises often leads to finding unseen methods to exploit vulnerabilities …
View article: DEVELOPING A MOBILE PHONE APPLICATION TO DETECT SOCIAL ISOLATION OVER MULTIPLE TIME POINTS
DEVELOPING A MOBILE PHONE APPLICATION TO DETECT SOCIAL ISOLATION OVER MULTIPLE TIME POINTS Open
Social isolation is an important predictor of mortality and morbidity in older persons. The increase in social isolation is often a result of major life events such as retirement, leading to the loss of social connections. The effects of t…
View article: CAPD: A Context-Aware, Policy-Driven Framework for Secure and Resilient IoBT Operations
CAPD: A Context-Aware, Policy-Driven Framework for Secure and Resilient IoBT Operations Open
The Internet of Battlefield Things (IoBT) will advance the operational effectiveness of infantry units. However, this requires autonomous assets such as sensors, drones, combat equipment, and uncrewed vehicles to collaborate, securely shar…
View article: Recognizing and Extracting Cybersecurtity-relevant Entities from Text
Recognizing and Extracting Cybersecurtity-relevant Entities from Text Open
Cyber Threat Intelligence (CTI) is information describing threat vectors, vulnerabilities, and attacks and is often used as training data for AI-based cyber defense systems such as Cybersecurity Knowledge Graphs (CKG). There is a strong ne…
View article: CAPD: a context-aware, policy-driven framework for secure and resilient IoBT operations
CAPD: a context-aware, policy-driven framework for secure and resilient IoBT operations Open
The Internet of Battlefield Things (IoBT) will advance the operational effectiveness of infantry units. However, this requires autonomous assets such as sensors, drones, combat equipment, and uncrewed vehicles to collaborate, securely shar…
View article: PriveTAB
PriveTAB Open
Machine Learning has increased our ability to model large quantities of data efficiently in a short time. Machine learning approaches in many application domains require collecting large volumes of data from distributed sources and combini…
View article: Computational Understanding of Narratives: A Survey
Computational Understanding of Narratives: A Survey Open
Storytelling, and the delivery of societal narratives, enable human beings to communicate, connect, and understand one another and the world around them. Narratives can be defined as spoken, visual, or written accounts of interconnected ev…
View article: Combating Fake Cyber Threat Intelligence using Provenance in Cybersecurity Knowledge Graphs
Combating Fake Cyber Threat Intelligence using Provenance in Cybersecurity Knowledge Graphs Open
Today there is a significant amount of fake cybersecurity related intelligence on the internet. To filter out such information, we build a system to capture the provenance information and represent it along with the captured Cyber Threat I…
View article: Cybersecurity Knowledge Graph Improvement with Graph Neural Networks
Cybersecurity Knowledge Graph Improvement with Graph Neural Networks Open
Cybersecurity Knowledge Graphs (CKGs) help in aggregating information about cyber-events. CKGs combined with reasoning and querying systems such as SPARQL enable security researchers to look up information about past cyberevents that is he…
View article: CyBERT: Contextualized Embeddings for the Cybersecurity Domain
CyBERT: Contextualized Embeddings for the Cybersecurity Domain Open
We present CyBERT, a domain-specific Bidirectional Encoder Representations from Transformers (BERT) model, fine-tuned with a large corpus of textual cybersecurity data. State-of-the-art natural language models that can process dense, fine-…
View article: A Privacy Preserving Anomaly Detection Framework for Cooperative Smart Farming Ecosystem
A Privacy Preserving Anomaly Detection Framework for Cooperative Smart Farming Ecosystem Open
The agriculture sector has seen growing applications of AI and data intensive systems. Typically, individual farm owners join together to form agricultural cooperatives to share resources, data, and domain knowledge. These data intensive c…