Publications

2025

  1. 3D-Prover: Diversity Driven Theorem Proving With Determinantal Point Processes
    Sean Lamont, Christian Walder, Amir Dezfouli, Paul Montague, and Michael Norrish
    NeurIPS, 2025
  2. Enhancing Malware Fingerprinting through Analysis of Evasive Techniques
    Alsharif Abuadbba, Sean Lamont, Ejaz Ahmed, Cody Christopher, Muhammad Ikram, Uday Tupakula, Daniel Coscia, Mohamed Ali Kaafar, and Surya Nepal
    arXiv preprint arXiv:2503.06495, 2025
  3. Facing the Challenge of Leveraging Untrained Humans in Malware Analysis
    Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Muhammad Ikram, Mohamed Ali Kaafar, Sean Lamont, and Daniel Coscia
    In ICT Systems Security and Privacy Protection, 2025
  4. RINSER: Accurate API Prediction Using Masked Language Models
    Muhammad Ejaz Ahmed, Christopher Cody, Muhammad Ikram, Sean Lamont, Alsharif Abuadbba, Seyit Camtepe, Surya Nepal, and Muhammad Ali Kaafar
    arXiv preprint arXiv:2509.04887, 2025

2024

  1. BAIT: Benchmarking (Embedding) Architectures for Interactive Theorem-Proving
    Sean Lamont, Michael Norrish, Amir Dezfouli, Christian Walder, and Paul Montague
    In Proceedings of the AAAI Conference on Artificial Intelligence, 2024

2023

  1. Use of cryptography in malware obfuscation
    Hassan Jameel Asghar, Benjamin Zi Hao Zhao, Muhammad Ikram, Giang Nguyen, Dali Kaafar, Sean Lamont, and Daniel Coscia
    Journal of Computer Virology and Hacking Techniques, 2023

2019

  1. Computer Assisted Composition in Continuous Time
    Chamin Hewa Koneputugodage, Rhys Healy, Sean Lamont, Ian Mallett, Matt Brown, Matt Walters, Ushini Attanayake, Libo Zhang, Roger T. Dean, Alexander Hunter, Charles Gretton, and Christian Walder
    arXiv preprint arXiv:1909.05030, 2019
  2. An End to End Machine Learning Model for Compositional Data
    Sean Lamont, Christian Walder, and Cheng Soon Ong
    Honours Thesis, 2019

2017

  1. Generalised Discount Functions applied to a Monte-Carlo AImu Implementation
    Sean Lamont, John Aslanides, Jan Leike, and Marcus Hutter
    Autonomous Agents and Multiagent Systems, 2017