default search action
James Holt
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c25]Mohammad Mahmudul Alam, Edward Raff, Stella Biderman, Tim Oates, James Holt:
Holographic Global Convolutional Networks for Long-Range Prediction Tasks in Malware Detection. AISTATS 2024: 4042-4050 - [c24]Fred Lu, Ryan R. Curtin, Edward Raff, Francis Ferraro, James Holt:
High-Dimensional Distributed Sparse Classification with Scalable Communication-Efficient Global Updates. KDD 2024: 2037-2047 - [i21]Mohammad Mahmudul Alam, Edward Raff, Stella Biderman, Tim Oates, James Holt:
Holographic Global Convolutional Networks for Long-Range Prediction Tasks in Malware Detection. CoRR abs/2403.17978 (2024) - [i20]Chang Liu, Rebecca Saul, Yihao Sun, Edward Raff, Maya Fuchs, Townsend Southard Pantano, James Holt, Kristopher K. Micinski:
Assemblage: Automatic Binary Dataset Construction for Machine Learning. CoRR abs/2405.03991 (2024) - [i19]Fred Lu, Ryan R. Curtin, Edward Raff, Francis Ferraro, James Holt:
Optimizing the Optimal Weighted Average: Efficient Distributed Sparse Classification. CoRR abs/2406.01753 (2024) - [i18]Fred Lu, Ryan R. Curtin, Edward Raff, Francis Ferraro, James Holt:
High-Dimensional Distributed Sparse Classification with Scalable Communication-Efficient Global Updates. CoRR abs/2407.06346 (2024) - 2023
- [c23]Fred Lu, Edward Raff, James Holt:
A Coreset Learning Reality Check. AAAI 2023: 8940-8948 - [c22]Robert J. Joyce, Edward Raff, Charles Nicholas, James Holt:
MalDICT: Benchmark Datasets on Malware Behaviors, Platforms, Exploitation, and Packers. CAMLIS 2023: 105-121 - [c21]Tirth Patel, Fred Lu, Edward Raff, Charles Nicholas, Cynthia Matuszek, James Holt:
Small Effect Sizes in Malware Detection? Make Harder Train/Test Splits! CAMLIS 2023: 181-192 - [c20]Edward Raff, Mark McLean, James Holt:
An Easy Rejection Sampling Baseline via Gradient Refined Proposals. ECAI 2023: 1930-1937 - [c19]Mohammad Mahmudul Alam, Edward Raff, Stella Biderman, Tim Oates, James Holt:
Recasting Self-Attention with Holographic Reduced Representations. ICML 2023: 490-507 - [c18]Edward Raff, James Holt:
Reproducibility in Multiple Instance Learning: A Case For Algorithmic Unit Tests. NeurIPS 2023 - [c17]Mike Wong, Edward Raff, James Holt, Ravi Netravali:
Marvolo: Programmatic Data Augmentation for Deep Malware Detection. ECML/PKDD (1) 2023: 270-285 - [i17]Fred Lu, Edward Raff, James Holt:
A Coreset Learning Reality Check. CoRR abs/2301.06163 (2023) - [i16]Mohammad Mahmudul Alam, Edward Raff, Stella Biderman, Tim Oates, James Holt:
Recasting Self-Attention with Holographic Reduced Representations. CoRR abs/2305.19534 (2023) - [i15]Skyler Wu, Fred Lu, Edward Raff, James Holt:
Exploring the Sharpened Cosine Similarity. CoRR abs/2307.13855 (2023) - [i14]Robert J. Joyce, Edward Raff, Charles Nicholas, James Holt:
MalDICT: Benchmark Datasets on Malware Behaviors, Platforms, Exploitation, and Packers. CoRR abs/2310.11706 (2023) - [i13]Edward Raff, James Holt:
Reproducibility in Multiple Instance Learning: A Case For Algorithmic Unit Tests. CoRR abs/2310.17867 (2023) - [i12]Tirth Patel, Fred Lu, Edward Raff, Charles Nicholas, Cynthia Matuszek, James Holt:
Small Effect Sizes in Malware Detection? Make Harder Train/Test Splits! CoRR abs/2312.15813 (2023) - 2022
- [c16]André T. Nguyen, Fred Lu, Gary Lopez Munoz, Edward Raff, Charles Nicholas, James Holt:
Out of Distribution Data Detection Using Dropout Bayesian Neural Networks. AAAI 2022: 7877-7885 - [c15]Ethan M. Rudd, David Krisiloff, Daniel Olszewski, Edward Raff, James Holt:
Efficient Malware Analysis Using Metric Embeddings. CAMLIS 2022: 65-80 - [c14]André T. Nguyen, Richard Zak, Luke E. Richards, Maya Fuchs, Fred Lu, Robert Brandon, Gary Lopez Munoz, Edward Raff, Charles Nicholas, James Holt:
Minimizing Compute Costs: When Should We Run More Expensive Malware Analysis? CAMLIS 2022: 81-99 - [c13]Rebecca Saul, Mohammad Mahmudul Alam, John Hurwitz, Edward Raff, Tim Oates, James Holt:
Lempel-Ziv Networks. ICBINB 2022: 1-11 - [c12]Mohammad Mahmudul Alam, Edward Raff, Tim Oates, James Holt:
Deploying Convolutional Networks on Untrusted Platforms Using 2D Holographic Reduced Representations. ICML 2022: 367-393 - [i11]André T. Nguyen, Fred Lu, Gary Lopez Munoz, Edward Raff, Charles Nicholas, James Holt:
Out of Distribution Data Detection Using Dropout Bayesian Neural Networks. CoRR abs/2202.08985 (2022) - [i10]James Holt, Edward Raff, Ahmad Ridley, Dennis Ross, Arunesh Sinha, Diane Staheli, William Streilen, Milind Tambe, Yevgeniy Vorobeychik, Allan B. Wollaber:
Artificial Intelligence for Cyber Security (AICS). CoRR abs/2202.14010 (2022) - [i9]Michael D. Wong, Edward Raff, James Holt, Ravi Netravali:
Marvolo: Programmatic Data Augmentation for Practical ML-Driven Malware Detection. CoRR abs/2206.03265 (2022) - [i8]Mohammad Mahmudul Alam, Edward Raff, Tim Oates, James Holt:
Deploying Convolutional Networks on Untrusted Platforms Using 2D Holographic Reduced Representations. CoRR abs/2206.05893 (2022) - [i7]Rebecca Saul, Mohammad Mahmudul Alam, John Hurwitz, Edward Raff, Tim Oates, James Holt:
Lempel-Ziv Networks. CoRR abs/2211.13250 (2022) - [i6]Ethan M. Rudd, David Krisiloff, Scott E. Coull, Daniel Olszewski, Edward Raff, James Holt:
Efficient Malware Analysis Using Metric Embeddings. CoRR abs/2212.02663 (2022) - 2021
- [c11]Ashwinkumar Ganesan, Hang Gao, Sunil Gandhi, Edward Raff, Tim Oates, James Holt, Mark McLean:
Learning with Holographic Reduced Representations. NeurIPS 2021: 25606-25620 - [i5]André T. Nguyen, Edward Raff, Charles Nicholas, James Holt:
Leveraging Uncertainty for Improved Static Malware Detection Under Extreme False Positive Constraints. CoRR abs/2108.04081 (2021) - [i4]Ashwinkumar Ganesan, Hang Gao, Sunil Gandhi, Edward Raff, Tim Oates, James Holt, Mark McLean:
Learning with Holographic Reduced Representations. CoRR abs/2109.02157 (2021) - 2020
- [j8]Aritran Piplai, Sudip Mittal, Anupam Joshi, Tim Finin, James Holt, Richard Zak:
Creating Cybersecurity Knowledge Graphs From Malware After Action Reports. IEEE Access 8: 211691-211703 (2020) - [c10]Edward Raff, Richard Zak, Gary Lopez Munoz, William Fleming, Hyrum S. Anderson, Bobby Filar, Charles Nicholas, James Holt:
Automatic Yara Rule Generation Using Biclustering. AISec@CCS 2020: 71-82 - [c9]Edward Raff, Bobby Filar, James Holt:
Getting Passive Aggressive About False Positives: Patching Deployed Malware Detectors. ICDM (Workshops) 2020: 506-515 - [i3]Edward Raff, Richard Zak, Gary Lopez Munoz, William Fleming, Hyrum S. Anderson, Bobby Filar, Charles Nicholas, James Holt:
Automatic Yara Rule Generation Using Biclustering. CoRR abs/2009.03779 (2020) - [i2]Edward Raff, Bobby Filar, James Holt:
Getting Passive Aggressive About False Positives: Patching Deployed Malware Detectors. CoRR abs/2010.12080 (2020)
2010 – 2019
- 2019
- [j7]Kirk Bresniker, Ada Gavrilovska, James Holt, Dejan S. Milojicic, Trung Tran:
Grand Challenge: Applying Artificial Intelligence and Machine Learning to Cybersecurity. Computer 52(12): 45-52 (2019) - [c8]Aditya Pingle, Aritran Piplai, Sudip Mittal, Anupam Joshi, James Holt, Richard Zak:
RelExt: relation extraction using deep learning approaches for cybersecurity knowledge graph improvement. ASONAM 2019: 879-886 - [i1]Aditya Pingle, Aritran Piplai, Sudip Mittal, Anupam Joshi, James Holt, Richard Zak:
RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement. CoRR abs/1905.02497 (2019) - 2018
- [j6]Jeremy R. Wang, James Holt, Leonard McMillan, Corbin D. Jones:
FMLRC: Hybrid long read error correction using an FM-index. BMC Bioinform. 19(1): 50:1-50:11 (2018) - 2016
- [b1]James Holt:
Using the Multi-String Burrow-Wheeler transform for High-Throughput sequence Analysis. University of North Carolina, Chapel Hill, USA, 2016 - 2015
- [c7]Seth Greenstein, James Holt, Leonard McMillan:
Short read error correction using an FM-index. BIBM 2015: 101-104 - 2014
- [j5]Shunping Huang, James Holt, Chia-Yu Kao, Leonard McMillan, Wei Wang:
A novel multi-alignment pipeline for high-throughput sequencing data. Database J. Biol. Databases Curation 2014 (2014) - [j4]James Holt, Leonard McMillan:
Merging of multi-string BWTs with applications. Bioinform. 30(24): 3524-3531 (2014) - [j3]Jason Ruchti, Robert Senkbeil, James Carroll, Jared Dickinson, James Holt, Saad Biaz:
Unmanned Aerial System Collision Avoidance Using Artificial Potential Fields. J. Aerosp. Inf. Syst. 11(3): 140-144 (2014) - [j2]James Holt, Saad Biaz, Levent Yilmaz, Chadia Affane-Aji:
A symbiotic simulation architecture for evaluating UAVs collision avoidance techniques. J. Simulation 8(1): 64-75 (2014) - [c6]James Holt, Leonard McMillan:
Constructing burrows-wheeler transforms of large string collections via merging. BCB 2014: 464-471 - 2013
- [c5]James Holt, Shunping Huang, Leonard McMillan, Wei Wang:
Read Annotation Pipeline for High-Throughput Sequencing Data. BCB 2013: 605 - 2012
- [j1]David Burgess, Edmund Gieske, James Holt, Thomas Hoy, Gary Whisenhunt:
e6500: Freescale's Low-Power, High-Performance Multithreaded Embedded Processor. IEEE Micro 32(5): 26-36 (2012)
2000 – 2009
- 2006
- [c4]Hassan Al-Sukhni, James Holt, Daniel A. Connors:
Improved stride prefetching using extrinsic stream characteristics. ISPASS 2006: 166-176 - [c3]Hassan Al-Sukhni, David Lindberg, James Holt, Michele Reese:
Workload Slicing for Characterizing New Features in High Performance Microprocessors. MTV 2006: 61-67
1990 – 1999
- 1998
- [c2]James Holt, Wuxu Peng:
Improving the PIM Routing Protocol with Adaptive Switching Mechanism between Its Two Sparse Sub-Modes. ICCCN 1998: 768-773 - 1997
- [c1]James Holt, Wuxu Peng:
An Innovative Routing Protocol Evaluation Tool. ICCCN 1997: 524-
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 02:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint