James Holt

According to our database1, James Holt authored at least 24 papers between 1997 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2022
Deploying Convolutional Networks on Untrusted Platforms Using 2D Holographic Reduced Representations.
CoRR, 2022

Marvolo: Programmatic Data Augmentation for Practical ML-Driven Malware Detection.
CoRR, 2022

Artificial Intelligence for Cyber Security (AICS).
CoRR, 2022

Out of Distribution Data Detection Using Dropout Bayesian Neural Networks.
CoRR, 2022

2021
Leveraging Uncertainty for Improved Static Malware Detection Under Extreme False Positive Constraints.
CoRR, 2021

Learning with Holographic Reduced Representations.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

2020
Creating Cybersecurity Knowledge Graphs From Malware After Action Reports.
IEEE Access, 2020

Getting Passive Aggressive About False Positives: Patching Deployed Malware Detectors.
Proceedings of the 20th International Conference on Data Mining Workshops, 2020

Automatic Yara Rule Generation Using Biclustering.
Proceedings of the AISec@CCS 2020: Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security, 2020

2019
Grand Challenge: Applying Artificial Intelligence and Machine Learning to Cybersecurity.
Computer, 2019

RelExt: relation extraction using deep learning approaches for cybersecurity knowledge graph improvement.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019

2018
FMLRC: Hybrid long read error correction using an FM-index.
BMC Bioinform., 2018

2015
Short read error correction using an FM-index.
Proceedings of the 2015 IEEE International Conference on Bioinformatics and Biomedicine, 2015

2014
A symbiotic simulation architecture for evaluating UAVs collision avoidance techniques.
J. Simulation, 2014

Unmanned Aerial System Collision Avoidance Using Artificial Potential Fields.
J. Aerosp. Inf. Syst., 2014

Merging of multi-string BWTs with applications.
Bioinform., 2014

A novel multi-alignment pipeline for high-throughput sequencing data.
Database J. Biol. Databases Curation, 2014

Constructing burrows-wheeler transforms of large string collections via merging.
Proceedings of the 5th ACM Conference on Bioinformatics, 2014

2013
Read Annotation Pipeline for High-Throughput Sequencing Data.
Proceedings of the ACM Conference on Bioinformatics, 2013

2012
e6500: Freescale's Low-Power, High-Performance Multithreaded Embedded Processor.
IEEE Micro, 2012

2006
Workload Slicing for Characterizing New Features in High Performance Microprocessors.
Proceedings of the Seventh International Workshop on Microprocessor Test and Verification (MTV 2006), 2006

Improved stride prefetching using extrinsic stream characteristics.
Proceedings of the 2006 IEEE International Symposium on Performance Analysis of Systems and Software, 2006

1998
Improving the PIM Routing Protocol with Adaptive Switching Mechanism between Its Two Sparse Sub-Modes.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1998), 1998

1997
An Innovative Routing Protocol Evaluation Tool.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1997), 1997


  Loading...