Joshua Saxe
According to our database1,
Joshua Saxe
authored at least 19 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
CYBERSECEVAL 3: Advancing the Evaluation of Cybersecurity Risks and Capabilities in Large Language Models.
CoRR, 2024
CyberSecEval 2: A Wide-Ranging Cybersecurity Evaluation Suite for Large Language Models.
CoRR, 2024
Bridging the Gap: A Study of AI-based Vulnerability Management between Industry and Academia.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
2023
2020
2018
A Deep Learning Approach to Fast, Format-Agnostic Detection of Malicious Web Content.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018
Proceedings of the 1st International Workshop on Machine Learning and Software Engineering in Symbiosis, 2018
2017
eXpose: A Character-Level Convolutional Neural Network with Embeddings For Detecting Malicious URLs, File Paths and Registry Keys.
CoRR, 2017
2016
Improving Zero-Day Malware Testing Methodology Using Statistically Significant Time-Lagged Test Samples.
CoRR, 2016
2015
Deep neural network based malware detection using two dimensional binary program features.
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security, 2015
2014
Proceedings of the 11th Workshop on Visualization for Cyber Security, 2014
SEEM: a scalable visualization for comparing multiple large sets of attributes for malware analysis.
Proceedings of the 11th Workshop on Visualization for Cyber Security, 2014
CrowdSource: Automated inference of high level malware functionality from low-level symbols using a crowd trained machine learning model.
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014
2013
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013
Malware Similarity Identification Using Call Graph Based System Call Subsequence Features.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013
2012
Proceedings of the 9th International Symposium on Visualization for Cyber Security, 2012