Folgen
Ian Molloy
Ian Molloy
IBM Research
Bestätigte E-Mail-Adresse bei us.ibm.com
Titel
Zitiert von
Zitiert von
Jahr
Detecting backdoor attacks on deep neural networks by activation clustering
B Chen, W Carvalho, N Baracaldo, H Ludwig, B Edwards, T Lee, I Molloy, ...
arXiv preprint arXiv:1811.03728, 2018
9352018
Adversarial Robustness Toolbox v1. 0.0
MI Nicolae, M Sinn, MN Tran, B Buesser, A Rawat, M Wistuba, ...
arXiv preprint arXiv:1807.01069, 2018
6882018
Protecting intellectual property of deep neural networks with watermarking
J Zhang, Z Gu, J Jang, H Wu, MP Stoecklin, H Huang, I Molloy
Proceedings of the 2018 on Asia conference on computer and communications …, 2018
6452018
Using probabilistic generative models for ranking risks of android apps
H Peng, C Gates, B Sarma, N Li, Y Qi, R Potharaju, C Nita-Rotaru, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
5562012
Android permissions: a perspective combining risks and benefits
BP Sarma, N Li, C Gates, R Potharaju, C Nita-Rotaru, I Molloy
Proceedings of the 17th ACM symposium on Access Control Models and …, 2012
4682012
Slicing: A new approach for privacy preserving data publishing
T Li, N Li, J Zhang, I Molloy
IEEE transactions on knowledge and data engineering 24 (3), 561-574, 2010
4392010
Mining roles with semantic meanings
I Molloy, H Chen, T Li, Q Wang, N Li, E Bertino, S Calo, J Lobo
Proceedings of the 13th ACM symposium on Access control models and …, 2008
2362008
Evaluating role mining algorithms
I Molloy, N Li, T Li, Z Mao, Q Wang, J Lobo
Proceedings of the 14th ACM symposium on Access control models and …, 2009
1892009
Techniques for reconciling permission usage with security policy for policy optimization and monitoring continuous compliance
SN Chari, IM Molloy, Y Park, W Teiken
US Patent 9,288,232, 2016
1852016
Protection and verification of user authentication credentials against server compromise
L Koved, IM Molloy, G Taban
US Patent 10,277,591, 2019
1762019
Detecting malicious user activity
SN Chari, TA Habeck, IM Molloy, Y Park, JR Rao, W Teiken
US Patent 10,599,837, 2020
1442020
Ensuring continuous compliance through reconciling policy with usage
S Chari, I Molloy, Y Park, W Teiken
Proceedings of the 18th ACM symposium on Access control models and …, 2013
1292013
Mining roles with multiple objectives
I Molloy, H Chen, T Li, Q Wang, N Li, E Bertino, S Calo, J Lobo
ACM Transactions on Information and System Security (TISSEC) 13 (4), 1-35, 2010
1292010
Defeating cross-site request forgery attacks with browser-enforced authenticity protection
Z Mao, N Li, I Molloy
Financial Cryptography and Data Security: 13th International Conference, FC …, 2009
1252009
Defending against neural network model stealing attacks using deceptive perturbations
T Lee, B Edwards, I Molloy, D Su
2019 IEEE Security and Privacy Workshops (SPW), 43-49, 2019
1142019
Generative models for access control policies: applications to role mining over logs with attribution
I Molloy, Y Park, S Chari
Proceedings of the 17th ACM symposium on Access Control Models and …, 2012
912012
Risk-based security decisions under uncertainty
I Molloy, L Dickens, C Morisset, PC Cheng, J Lobo, A Russo
Proceedings of the second ACM conference on Data and Application Security …, 2012
892012
Techniques for Generating Balanced and Class-Independent Training Data From Unlabeled Data Set
SN Chari, IM Molloy, Y Park, Z Qi
US Patent App. 13/274,002, 2013
832013
Securing input data of deep learning inference systems via partitioned enclave execution
Z Gu, H Huang, J Zhang, D Su, A Lamba, D Pendarakis, I Molloy
arXiv preprint arXiv:1807.00969, 1-14, 2018
82*2018
Automatic mapping of valley networks on Mars
I Molloy, TF Stepinski
Computers & Geosciences 33 (6), 728-738, 2007
822007
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20