James Holt

Orcid: 0000-0002-6368-8696

According to our database1, James Holt authored at least 37 papers between 1997 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Small Effect Sizes in Malware Detection? Make Harder Train/Test Splits!
CoRR, 2023

MalDICT: Benchmark Datasets on Malware Behaviors, Platforms, Exploitation, and Packers.
CoRR, 2023

Exploring the Sharpened Cosine Similarity.
CoRR, 2023

Marvolo: Programmatic Data Augmentation for Deep Malware Detection.
Proceedings of the Machine Learning and Knowledge Discovery in Databases: Research Track, 2023

Reproducibility in Multiple Instance Learning: A Case For Algorithmic Unit Tests.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Recasting Self-Attention with Holographic Reduced Representations.
Proceedings of the International Conference on Machine Learning, 2023

An Easy Rejection Sampling Baseline via Gradient Refined Proposals.
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023

A Coreset Learning Reality Check.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Efficient Malware Analysis Using Metric Embeddings.
CoRR, 2022

Marvolo: Programmatic Data Augmentation for Practical ML-Driven Malware Detection.
CoRR, 2022

Artificial Intelligence for Cyber Security (AICS).
CoRR, 2022

Deploying Convolutional Networks on Untrusted Platforms Using 2D Holographic Reduced Representations.
Proceedings of the International Conference on Machine Learning, 2022

Lempel-Ziv Networks.
Proceedings of the Proceedings on "I Can't Believe It's Not Better!, 2022

Efficient Malware Analysis Using Metric Embeddings.
Proceedings of the Conference on Applied Machine Learning in Information Security, 2022

Minimizing Compute Costs: When Should We Run More Expensive Malware Analysis?
Proceedings of the Conference on Applied Machine Learning in Information Security, 2022

Out of Distribution Data Detection Using Dropout Bayesian Neural Networks.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Leveraging Uncertainty for Improved Static Malware Detection Under Extreme False Positive Constraints.
CoRR, 2021

Learning with Holographic Reduced Representations.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

2020
Creating Cybersecurity Knowledge Graphs From Malware After Action Reports.
IEEE Access, 2020

Getting Passive Aggressive About False Positives: Patching Deployed Malware Detectors.
Proceedings of the 20th International Conference on Data Mining Workshops, 2020

Automatic Yara Rule Generation Using Biclustering.
Proceedings of the AISec@CCS 2020: Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security, 2020

2019
Grand Challenge: Applying Artificial Intelligence and Machine Learning to Cybersecurity.
Computer, 2019

RelExt: relation extraction using deep learning approaches for cybersecurity knowledge graph improvement.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019

2018
FMLRC: Hybrid long read error correction using an FM-index.
BMC Bioinform., 2018

2016
Using the Multi-String Burrow-Wheeler transform for High-Throughput sequence Analysis.
PhD thesis, 2016

2015
Short read error correction using an FM-index.
Proceedings of the 2015 IEEE International Conference on Bioinformatics and Biomedicine, 2015

2014
A symbiotic simulation architecture for evaluating UAVs collision avoidance techniques.
J. Simulation, 2014

Unmanned Aerial System Collision Avoidance Using Artificial Potential Fields.
J. Aerosp. Inf. Syst., 2014

Merging of multi-string BWTs with applications.
Bioinform., 2014

A novel multi-alignment pipeline for high-throughput sequencing data.
Database J. Biol. Databases Curation, 2014

Constructing burrows-wheeler transforms of large string collections via merging.
Proceedings of the 5th ACM Conference on Bioinformatics, 2014

2013
Read Annotation Pipeline for High-Throughput Sequencing Data.
Proceedings of the ACM Conference on Bioinformatics, 2013

2012
e6500: Freescale's Low-Power, High-Performance Multithreaded Embedded Processor.
IEEE Micro, 2012

2006
Workload Slicing for Characterizing New Features in High Performance Microprocessors.
Proceedings of the Seventh International Workshop on Microprocessor Test and Verification (MTV 2006), 2006

Improved stride prefetching using extrinsic stream characteristics.
Proceedings of the 2006 IEEE International Symposium on Performance Analysis of Systems and Software, 2006

1998
Improving the PIM Routing Protocol with Adaptive Switching Mechanism between Its Two Sparse Sub-Modes.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1998), 1998

1997
An Innovative Routing Protocol Evaluation Tool.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1997), 1997


  Loading...