Joshua Saxe

According to our database1, Joshua Saxe authored at least 19 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
CYBERSECEVAL 3: Advancing the Evaluation of Cybersecurity Risks and Capabilities in Large Language Models.
CoRR, 2024

The Llama 3 Herd of Models.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
et al.
CoRR, 2024

CyberSecEval 2: A Wide-Ranging Cybersecurity Evaluation Suite for Large Language Models.
CoRR, 2024

Bridging the Gap: A Study of AI-based Vulnerability Management between Industry and Academia.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024

2023
Purple Llama CyberSecEval: A Secure Coding Benchmark for Language Models.
CoRR, 2023

2020
CATBERT: Context-Aware Tiny BERT for Detecting Social Engineering Emails.
CoRR, 2020

2018
MEADE: Towards a Malicious Email Attachment Detection Engine.
CoRR, 2018

A Deep Learning Approach to Fast, Format-Agnostic Detection of Malicious Web Content.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

A language-agnostic model for semantic source code labeling.
Proceedings of the 1st International Workshop on Machine Learning and Software Engineering in Symbiosis, 2018

2017
eXpose: A Character-Level Convolutional Neural Network with Embeddings For Detecting Malicious URLs, File Paths and Registry Keys.
CoRR, 2017

2016
Improving Zero-Day Malware Testing Methodology Using Statistically Significant Time-Lagged Test Samples.
CoRR, 2016

2015
Deep neural network based malware detection using two dimensional binary program features.
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015

Malicious Behavior Detection using Windows Audit Logs.
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security, 2015

2014
Detecting malware samples with similar image sets.
Proceedings of the 11th Workshop on Visualization for Cyber Security, 2014

SEEM: a scalable visualization for comparing multiple large sets of attributes for malware analysis.
Proceedings of the 11th Workshop on Visualization for Cyber Security, 2014

CrowdSource: Automated inference of high level malware functionality from low-level symbols using a crowd trained machine learning model.
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014

2013
Mining Web Technical Discussions to Identify Malware Capabilities.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

Malware Similarity Identification Using Call Graph Based System Call Subsequence Features.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

2012
Visualization of shared system call sequence relationships in large malware corpora.
Proceedings of the 9th International Symposium on Visualization for Cyber Security, 2012


  Loading...