Alert button
Picture for James Holt

James Holt

Alert button

Proceedings of the Artificial Intelligence for Cyber Security (AICS) Workshop at AAAI 2022

Add code
Bookmark button
Alert button
Mar 01, 2022
James Holt, Edward Raff, Ahmad Ridley, Dennis Ross, Arunesh Sinha, Diane Staheli, William Streilen, Milind Tambe, Yevgeniy Vorobeychik, Allan Wollaber

Viaarxiv icon

Out of Distribution Data Detection Using Dropout Bayesian Neural Networks

Add code
Bookmark button
Alert button
Feb 18, 2022
Andre T. Nguyen, Fred Lu, Gary Lopez Munoz, Edward Raff, Charles Nicholas, James Holt

Figure 1 for Out of Distribution Data Detection Using Dropout Bayesian Neural Networks
Figure 2 for Out of Distribution Data Detection Using Dropout Bayesian Neural Networks
Figure 3 for Out of Distribution Data Detection Using Dropout Bayesian Neural Networks
Figure 4 for Out of Distribution Data Detection Using Dropout Bayesian Neural Networks
Viaarxiv icon

Learning with Holographic Reduced Representations

Add code
Bookmark button
Alert button
Sep 05, 2021
Ashwinkumar Ganesan, Hang Gao, Sunil Gandhi, Edward Raff, Tim Oates, James Holt, Mark McLean

Figure 1 for Learning with Holographic Reduced Representations
Figure 2 for Learning with Holographic Reduced Representations
Figure 3 for Learning with Holographic Reduced Representations
Figure 4 for Learning with Holographic Reduced Representations
Viaarxiv icon

Leveraging Uncertainty for Improved Static Malware Detection Under Extreme False Positive Constraints

Add code
Bookmark button
Alert button
Aug 09, 2021
Andre T. Nguyen, Edward Raff, Charles Nicholas, James Holt

Figure 1 for Leveraging Uncertainty for Improved Static Malware Detection Under Extreme False Positive Constraints
Figure 2 for Leveraging Uncertainty for Improved Static Malware Detection Under Extreme False Positive Constraints
Figure 3 for Leveraging Uncertainty for Improved Static Malware Detection Under Extreme False Positive Constraints
Figure 4 for Leveraging Uncertainty for Improved Static Malware Detection Under Extreme False Positive Constraints
Viaarxiv icon

Getting Passive Aggressive About False Positives: Patching Deployed Malware Detectors

Add code
Bookmark button
Alert button
Oct 22, 2020
Edward Raff, Bobby Filar, James Holt

Figure 1 for Getting Passive Aggressive About False Positives: Patching Deployed Malware Detectors
Figure 2 for Getting Passive Aggressive About False Positives: Patching Deployed Malware Detectors
Figure 3 for Getting Passive Aggressive About False Positives: Patching Deployed Malware Detectors
Figure 4 for Getting Passive Aggressive About False Positives: Patching Deployed Malware Detectors
Viaarxiv icon

Automatic Yara Rule Generation Using Biclustering

Add code
Bookmark button
Alert button
Sep 06, 2020
Edward Raff, Richard Zak, Gary Lopez Munoz, William Fleming, Hyrum S. Anderson, Bobby Filar, Charles Nicholas, James Holt

Figure 1 for Automatic Yara Rule Generation Using Biclustering
Figure 2 for Automatic Yara Rule Generation Using Biclustering
Figure 3 for Automatic Yara Rule Generation Using Biclustering
Figure 4 for Automatic Yara Rule Generation Using Biclustering
Viaarxiv icon

RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement

Add code
Bookmark button
Alert button
May 16, 2019
Aditya Pingle, Aritran Piplai, Sudip Mittal, Anupam Joshi, James Holt, Richard Zak

Figure 1 for RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement
Figure 2 for RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement
Figure 3 for RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement
Figure 4 for RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement
Viaarxiv icon