Follow
Joshua Saxe
Joshua Saxe
Sr. Staff Research Scientist, Meta
Verified email at fb.com - Homepage
Title
Cited by
Cited by
Year
Deep neural network based malware detection using two dimensional binary program features
J Saxe, K Berlin
2015 10th international conference on malicious and unwanted software …, 2015
8362015
eXpose: A character-level convolutional neural network with embeddings for detecting malicious URLs, file paths and registry keys
J Saxe, K Berlin
arXiv preprint arXiv:1702.08568, 2017
2732017
Malicious behavior detection using windows audit logs
K Berlin, D Slater, J Saxe
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security …, 2015
1202015
Methods and apparatus for machine learning based malware detection
JD Saxe, K Berlin
US Patent 9,690,938, 2017
1192017
Visualization of shared system call sequence relationships in large malware corpora
J Saxe, D Mentis, C Greamo
Proceedings of the ninth international symposium on visualization for cyber …, 2012
752012
Malware data science: attack detection and attribution
J Saxe, H Sanders
No Starch Press, 2018
712018
SeqDroid: Obfuscated Android malware detection using stacked convolutional and recurrent neural networks
WY Lee, J Saxe, R Harang
Deep learning applications for cyber security, 197-210, 2019
642019
Methods and apparatus for detection of malicious documents using machine learning
JD Saxe, R HARANG
US Patent 11,003,774, 2021
542021
Methods and apparatus for detecting whether a string of characters represents malicious activity using machine learning
JD Saxe
US Patent 10,318,735, 2019
442019
A deep learning approach to fast, format-agnostic detection of malicious web content
J Saxe, R Harang, C Wild, H Sanders
2018 IEEE Security and Privacy Workshops (SPW), 8-14, 2018
432018
SEEM: a scalable visualization for comparing multiple large sets of attributes for malware analysis
R Gove, J Saxe, S Gold, A Long, G Bergamo
Proceedings of the Eleventh Workshop on Visualization for Cyber Security, 72-79, 2014
412014
Meade: Towards a malicious email attachment detection engine
EM Rudd, R Harang, J Saxe
2018 IEEE International Symposium on Technologies for Homeland Security (HST …, 2018
402018
Computer augmented threat evaluation
JD Saxe, AJ Thomas, R Humphries, SN Reed, KD Ray, JH Levy
US Patent 10,938,838, 2021
382021
Methods and apparatus for machine learning based malware detection
JD Saxe, K Berlin
US Patent 9,910,986, 2018
332018
CATBERT: Context-aware tiny BERT for detecting social engineering emails
Y Lee, J Saxe, R Harang
arXiv preprint arXiv:2010.03484, 2020
322020
Malware similarity identification using call graph based system call subsequence features
K Blokhin, J Saxe, D Mentis
2013 IEEE 33rd International Conference on Distributed Computing Systems …, 2013
322013
Methods and apparatus for using machine learning on multiple file fragments to identify malware
JD Saxe, R Harang
US Patent 10,635,813, 2020
292020
CrowdSource: Automated inference of high level malware functionality from low-level symbols using a crowd trained machine learning model
J Saxe, R Turner, K Blokhin
2014 9th International Conference on Malicious and Unwanted Software: The …, 2014
282014
Methods and apparatus for detecting malware samples with similar image sets
AM Long, JD Saxe
US Patent 9,672,358, 2017
252017
Detecting malware samples with similar image sets
A Long, J Saxe, R Gove
Proceedings of the Eleventh Workshop on Visualization for Cyber Security, 88-95, 2014
222014
The system can't perform the operation now. Try again later.
Articles 1–20