James Holt

According to our database1, James Holt authored at least 24 papers between 1997 and 2022.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


Deploying Convolutional Networks on Untrusted Platforms Using 2D Holographic Reduced Representations.
CoRR, 2022

Marvolo: Programmatic Data Augmentation for Practical ML-Driven Malware Detection.
CoRR, 2022

Artificial Intelligence for Cyber Security (AICS).
CoRR, 2022

Out of Distribution Data Detection Using Dropout Bayesian Neural Networks.
CoRR, 2022

Leveraging Uncertainty for Improved Static Malware Detection Under Extreme False Positive Constraints.
CoRR, 2021

Learning with Holographic Reduced Representations.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

Creating Cybersecurity Knowledge Graphs From Malware After Action Reports.
IEEE Access, 2020

Getting Passive Aggressive About False Positives: Patching Deployed Malware Detectors.
Proceedings of the 20th International Conference on Data Mining Workshops, 2020

Automatic Yara Rule Generation Using Biclustering.
Proceedings of the AISec@CCS 2020: Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security, 2020

Grand Challenge: Applying Artificial Intelligence and Machine Learning to Cybersecurity.
Computer, 2019

RelExt: relation extraction using deep learning approaches for cybersecurity knowledge graph improvement.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019

FMLRC: Hybrid long read error correction using an FM-index.
BMC Bioinform., 2018

Short read error correction using an FM-index.
Proceedings of the 2015 IEEE International Conference on Bioinformatics and Biomedicine, 2015

A symbiotic simulation architecture for evaluating UAVs collision avoidance techniques.
J. Simulation, 2014

Unmanned Aerial System Collision Avoidance Using Artificial Potential Fields.
J. Aerosp. Inf. Syst., 2014

Merging of multi-string BWTs with applications.
Bioinform., 2014

A novel multi-alignment pipeline for high-throughput sequencing data.
Database J. Biol. Databases Curation, 2014

Constructing burrows-wheeler transforms of large string collections via merging.
Proceedings of the 5th ACM Conference on Bioinformatics, 2014

Read Annotation Pipeline for High-Throughput Sequencing Data.
Proceedings of the ACM Conference on Bioinformatics, 2013

e6500: Freescale's Low-Power, High-Performance Multithreaded Embedded Processor.
IEEE Micro, 2012

Workload Slicing for Characterizing New Features in High Performance Microprocessors.
Proceedings of the Seventh International Workshop on Microprocessor Test and Verification (MTV 2006), 2006

Improved stride prefetching using extrinsic stream characteristics.
Proceedings of the 2006 IEEE International Symposium on Performance Analysis of Systems and Software, 2006

Improving the PIM Routing Protocol with Adaptive Switching Mechanism between Its Two Sparse Sub-Modes.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1998), 1998

An Innovative Routing Protocol Evaluation Tool.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1997), 1997