Follow
Joshua Saxe
Joshua Saxe
Sr. Staff Research Scientist, Meta
Verified email at fb.com - Homepage
Title
Cited by
Cited by
Year
The llama 3 herd of models
A Grattafiori, A Dubey, A Jauhri, A Pandey, A Kadian, A Al-Dahle, ...
arXiv preprint arXiv:2407.21783, 2024
36412024
Deep neural network based malware detection using two dimensional binary program features
J Saxe, K Berlin
2015 10th international conference on malicious and unwanted software …, 2015
9562015
eXpose: A character-level convolutional neural network with embeddings for detecting malicious URLs, file paths and registry keys
J Saxe, K Berlin
arXiv preprint arXiv:1702.08568, 2017
3072017
Methods and apparatus for machine learning based malware detection
JD Saxe, K Berlin
US Patent 9,690,938, 2017
1432017
Malicious behavior detection using windows audit logs
K Berlin, D Slater, J Saxe
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security …, 2015
1412015
Malware data science: attack detection and attribution
J Saxe, H Sanders
No Starch Press, 2018
842018
SeqDroid: Obfuscated Android malware detection using stacked convolutional and recurrent neural networks
WY Lee, J Saxe, R Harang
Deep learning applications for cyber security, 197-210, 2019
792019
Visualization of shared system call sequence relationships in large malware corpora
J Saxe, D Mentis, C Greamo
Proceedings of the ninth international symposium on visualization for cyber …, 2012
792012
Purple llama cyberseceval: A secure coding benchmark for language models
M Bhatt, S Chennabasappa, C Nikolaidis, S Wan, I Evtimov, D Gabi, ...
arXiv preprint arXiv:2312.04724, 2023
772023
Methods and apparatus for detection of malicious documents using machine learning
JD Saxe, R HARANG
US Patent 11,003,774, 2021
702021
Garbage in, garbage out: how purportedly great ML models can be screwed up by bad data
H Sanders, J Saxe
Proceedings of Blackhat 2017, 2017
642017
Methods and apparatus for detecting whether a string of characters represents malicious activity using machine learning
JD Saxe
US Patent 10,318,735, 2019
512019
Meade: Towards a malicious email attachment detection engine
EM Rudd, R Harang, J Saxe
2018 IEEE international symposium on technologies for homeland security (HST …, 2018
482018
Computer augmented threat evaluation
JD Saxe, AJ Thomas, R Humphries, SN Reed, KD Ray, JH Levy
US Patent 10,938,838, 2021
472021
A deep learning approach to fast, format-agnostic detection of malicious web content
J Saxe, R Harang, C Wild, H Sanders
2018 IEEE Security and Privacy Workshops (SPW), 8-14, 2018
452018
CATBERT: Context-aware tiny BERT for detecting social engineering emails
Y Lee, J Saxe, R Harang
arXiv preprint arXiv:2010.03484, 2020
432020
SEEM: a scalable visualization for comparing multiple large sets of attributes for malware analysis
R Gove, J Saxe, S Gold, A Long, G Bergamo
Proceedings of the Eleventh Workshop on Visualization for Cyber Security, 72-79, 2014
412014
Methods and apparatus for machine learning based malware detection
JD Saxe, K Berlin
US Patent 9,910,986, 2018
392018
Malware similarity identification using call graph based system call subsequence features
K Blokhin, J Saxe, D Mentis
2013 IEEE 33rd International Conference on Distributed Computing Systems …, 2013
352013
Cyberseceval 2: A wide-ranging cybersecurity evaluation suite for large language models
M Bhatt, S Chennabasappa, Y Li, C Nikolaidis, D Song, S Wan, F Ahmad, ...
arXiv preprint arXiv:2404.13161, 2024
342024
The system can't perform the operation now. Try again later.
Articles 1–20