Следене
Ian Molloy
Ian Molloy
IBM Research
Потвърден имейл адрес: us.ibm.com
Заглавие
Позовавания
Позовавания
Година
Detecting backdoor attacks on deep neural networks by activation clustering
B Chen, W Carvalho, N Baracaldo, H Ludwig, B Edwards, T Lee, I Molloy, ...
arXiv preprint arXiv:1811.03728, 2018
9302018
Adversarial Robustness Toolbox v1. 0.0
MI Nicolae, M Sinn, MN Tran, B Buesser, A Rawat, M Wistuba, ...
arXiv preprint arXiv:1807.01069, 2018
6982018
Protecting intellectual property of deep neural networks with watermarking
J Zhang, Z Gu, J Jang, H Wu, MP Stoecklin, H Huang, I Molloy
Proceedings of the 2018 on Asia conference on computer and communications …, 2018
6462018
Using probabilistic generative models for ranking risks of android apps
H Peng, C Gates, B Sarma, N Li, Y Qi, R Potharaju, C Nita-Rotaru, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
5452012
Android permissions: a perspective combining risks and benefits
BP Sarma, N Li, C Gates, R Potharaju, C Nita-Rotaru, I Molloy
Proceedings of the 17th ACM symposium on Access Control Models and …, 2012
4612012
Slicing: A new approach for privacy preserving data publishing
T Li, N Li, J Zhang, I Molloy
IEEE transactions on knowledge and data engineering 24 (3), 561-574, 2010
4412010
Mining roles with semantic meanings
I Molloy, H Chen, T Li, Q Wang, N Li, E Bertino, S Calo, J Lobo
Proceedings of the 13th ACM symposium on Access control models and …, 2008
2372008
Verifiable deep learning training service
Z Gu, H Huang, J Zhang, D Su, D Pendarakis, IM Molloy
US Patent 11,816,575, 2023
2032023
Evaluating role mining algorithms
I Molloy, N Li, T Li, Z Mao, Q Wang, J Lobo
Proceedings of the 14th ACM symposium on Access control models and …, 2009
1912009
Techniques for reconciling permission usage with security policy for policy optimization and monitoring continuous compliance
SN Chari, IM Molloy, Y Park, W Teiken
US Patent 9,288,232, 2016
1852016
Protection and verification of user authentication credentials against server compromise
L Koved, IM Molloy, G Taban
US Patent 10,277,591, 2019
1812019
Detecting malicious user activity
SN Chari, TA Habeck, IM Molloy, Y Park, JR Rao, W Teiken
US Patent 10,599,837, 2020
1492020
Mining roles with multiple objectives
I Molloy, H Chen, T Li, Q Wang, N Li, E Bertino, S Calo, J Lobo
ACM Transactions on Information and System Security (TISSEC) 13 (4), 1-35, 2010
1302010
Ensuring continuous compliance through reconciling policy with usage
S Chari, I Molloy, Y Park, W Teiken
Proceedings of the 18th ACM symposium on Access control models and …, 2013
1292013
Defeating cross-site request forgery attacks with browser-enforced authenticity protection
Z Mao, N Li, I Molloy
Financial Cryptography and Data Security: 13th International Conference, FC …, 2009
1262009
Defending against neural network model stealing attacks using deceptive perturbations
T Lee, B Edwards, I Molloy, D Su
2019 IEEE Security and Privacy Workshops (SPW), 43-49, 2019
1162019
Generative models for access control policies: applications to role mining over logs with attribution
I Molloy, Y Park, S Chari
Proceedings of the 17th ACM symposium on Access Control Models and …, 2012
912012
Risk-based security decisions under uncertainty
I Molloy, L Dickens, C Morisset, PC Cheng, J Lobo, A Russo
Proceedings of the second ACM conference on Data and Application Security …, 2012
892012
Techniques for Generating Balanced and Class-Independent Training Data From Unlabeled Data Set
SN Chari, IM Molloy, Y Park, Z Qi
US Patent App. 13/274,002, 2013
862013
Automatic generation of data-centric attack graphs
SN Chari, A Kundu, IM Molloy, D Pendarakis, JR Rao
US Patent 10,108,803, 2018
842018
Системата не може да изпълни операцията сега. Опитайте отново по-късно.
Статии 1–20