Alert button
Picture for James Holt

James Holt

Alert button

Small Effect Sizes in Malware Detection? Make Harder Train/Test Splits!

Dec 25, 2023
Tirth Patel, Fred Lu, Edward Raff, Charles Nicholas, Cynthia Matuszek, James Holt

Viaarxiv icon

Reproducibility in Multiple Instance Learning: A Case For Algorithmic Unit Tests

Oct 27, 2023
Edward Raff, James Holt

Figure 1 for Reproducibility in Multiple Instance Learning: A Case For Algorithmic Unit Tests
Figure 2 for Reproducibility in Multiple Instance Learning: A Case For Algorithmic Unit Tests
Figure 3 for Reproducibility in Multiple Instance Learning: A Case For Algorithmic Unit Tests
Figure 4 for Reproducibility in Multiple Instance Learning: A Case For Algorithmic Unit Tests
Viaarxiv icon

Exploring the Sharpened Cosine Similarity

Jul 25, 2023
Skyler Wu, Fred Lu, Edward Raff, James Holt

Figure 1 for Exploring the Sharpened Cosine Similarity
Figure 2 for Exploring the Sharpened Cosine Similarity
Figure 3 for Exploring the Sharpened Cosine Similarity
Figure 4 for Exploring the Sharpened Cosine Similarity
Viaarxiv icon

Recasting Self-Attention with Holographic Reduced Representations

May 31, 2023
Mohammad Mahmudul Alam, Edward Raff, Stella Biderman, Tim Oates, James Holt

Figure 1 for Recasting Self-Attention with Holographic Reduced Representations
Figure 2 for Recasting Self-Attention with Holographic Reduced Representations
Figure 3 for Recasting Self-Attention with Holographic Reduced Representations
Figure 4 for Recasting Self-Attention with Holographic Reduced Representations
Viaarxiv icon

A Coreset Learning Reality Check

Jan 15, 2023
Fred Lu, Edward Raff, James Holt

Figure 1 for A Coreset Learning Reality Check
Figure 2 for A Coreset Learning Reality Check
Figure 3 for A Coreset Learning Reality Check
Figure 4 for A Coreset Learning Reality Check
Viaarxiv icon

Efficient Malware Analysis Using Metric Embeddings

Dec 05, 2022
Ethan M. Rudd, David Krisiloff, Scott Coull, Daniel Olszewski, Edward Raff, James Holt

Figure 1 for Efficient Malware Analysis Using Metric Embeddings
Figure 2 for Efficient Malware Analysis Using Metric Embeddings
Figure 3 for Efficient Malware Analysis Using Metric Embeddings
Figure 4 for Efficient Malware Analysis Using Metric Embeddings
Viaarxiv icon

Lempel-Ziv Networks

Nov 23, 2022
Rebecca Saul, Mohammad Mahmudul Alam, John Hurwitz, Edward Raff, Tim Oates, James Holt

Figure 1 for Lempel-Ziv Networks
Figure 2 for Lempel-Ziv Networks
Figure 3 for Lempel-Ziv Networks
Figure 4 for Lempel-Ziv Networks
Viaarxiv icon

Deploying Convolutional Networks on Untrusted Platforms Using 2D Holographic Reduced Representations

Jun 13, 2022
Mohammad Mahmudul Alam, Edward Raff, Tim Oates, James Holt

Figure 1 for Deploying Convolutional Networks on Untrusted Platforms Using 2D Holographic Reduced Representations
Figure 2 for Deploying Convolutional Networks on Untrusted Platforms Using 2D Holographic Reduced Representations
Figure 3 for Deploying Convolutional Networks on Untrusted Platforms Using 2D Holographic Reduced Representations
Figure 4 for Deploying Convolutional Networks on Untrusted Platforms Using 2D Holographic Reduced Representations
Viaarxiv icon

Marvolo: Programmatic Data Augmentation for Practical ML-Driven Malware Detection

Jun 07, 2022
Michael D. Wong, Edward Raff, James Holt, Ravi Netravali

Figure 1 for Marvolo: Programmatic Data Augmentation for Practical ML-Driven Malware Detection
Figure 2 for Marvolo: Programmatic Data Augmentation for Practical ML-Driven Malware Detection
Figure 3 for Marvolo: Programmatic Data Augmentation for Practical ML-Driven Malware Detection
Figure 4 for Marvolo: Programmatic Data Augmentation for Practical ML-Driven Malware Detection
Viaarxiv icon

Proceedings of the Artificial Intelligence for Cyber Security (AICS) Workshop at AAAI 2022

Mar 01, 2022
James Holt, Edward Raff, Ahmad Ridley, Dennis Ross, Arunesh Sinha, Diane Staheli, William Streilen, Milind Tambe, Yevgeniy Vorobeychik, Allan Wollaber

Viaarxiv icon