Follow
Ian Molloy
Ian Molloy
IBM Research
Verified email at us.ibm.com
Title
Cited by
Cited by
Year
Detecting backdoor attacks on deep neural networks by activation clustering
B Chen, W Carvalho, N Baracaldo, H Ludwig, B Edwards, T Lee, I Molloy, ...
arXiv preprint arXiv:1811.03728, 2018
8412018
Adversarial Robustness Toolbox v1. 0.0
MI Nicolae, M Sinn, MN Tran, B Buesser, A Rawat, M Wistuba, ...
arXiv preprint arXiv:1807.01069, 2018
6262018
Protecting intellectual property of deep neural networks with watermarking
J Zhang, Z Gu, J Jang, H Wu, MP Stoecklin, H Huang, I Molloy
Proceedings of the 2018 on Asia conference on computer and communications …, 2018
5982018
Using probabilistic generative models for ranking risks of android apps
H Peng, C Gates, B Sarma, N Li, Y Qi, R Potharaju, C Nita-Rotaru, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
5502012
Android permissions: a perspective combining risks and benefits
BP Sarma, N Li, C Gates, R Potharaju, C Nita-Rotaru, I Molloy
Proceedings of the 17th ACM symposium on Access Control Models and …, 2012
4652012
Slicing: A new approach for privacy preserving data publishing
T Li, N Li, J Zhang, I Molloy
IEEE transactions on knowledge and data engineering 24 (3), 561-574, 2010
4262010
Mining roles with semantic meanings
I Molloy, H Chen, T Li, Q Wang, N Li, E Bertino, S Calo, J Lobo
Proceedings of the 13th ACM symposium on Access control models and …, 2008
2342008
Evaluating role mining algorithms
I Molloy, N Li, T Li, Z Mao, Q Wang, J Lobo
Proceedings of the 14th ACM symposium on Access control models and …, 2009
1882009
Techniques for reconciling permission usage with security policy for policy optimization and monitoring continuous compliance
SN Chari, IM Molloy, Y Park, W Teiken
US Patent 9,288,232, 2016
1792016
Protection and verification of user authentication credentials against server compromise
L Koved, IM Molloy, G Taban
US Patent 10,277,591, 2019
1652019
Detecting malicious user activity
SN Chari, TA Habeck, IM Molloy, Y Park, JR Rao, W Teiken
US Patent 10,599,837, 2020
1382020
Mining roles with multiple objectives
I Molloy, H Chen, T Li, Q Wang, N Li, E Bertino, S Calo, J Lobo
ACM Transactions on Information and System Security (TISSEC) 13 (4), 1-35, 2010
1252010
Ensuring continuous compliance through reconciling policy with usage
S Chari, I Molloy, Y Park, W Teiken
Proceedings of the 18th ACM symposium on Access control models and …, 2013
1242013
Defeating cross-site request forgery attacks with browser-enforced authenticity protection
Z Mao, N Li, I Molloy
Financial Cryptography and Data Security: 13th International Conference, FC …, 2009
1232009
Defending against neural network model stealing attacks using deceptive perturbations
T Lee, B Edwards, I Molloy, D Su
2019 IEEE Security and Privacy Workshops (SPW), 43-49, 2019
1042019
Risk-based security decisions under uncertainty
I Molloy, L Dickens, C Morisset, PC Cheng, J Lobo, A Russo
Proceedings of the second ACM conference on Data and Application Security …, 2012
902012
Generative models for access control policies: applications to role mining over logs with attribution
I Molloy, Y Park, S Chari
Proceedings of the 17th ACM symposium on Access Control Models and …, 2012
892012
Automatic mapping of valley networks on Mars
I Molloy, TF Stepinski
Computers & Geosciences 33 (6), 728-738, 2007
822007
Techniques for Generating Balanced and Class-Independent Training Data From Unlabeled Data Set
SN Chari, IM Molloy, Y Park, Z Qi
US Patent App. 13/274,002, 2013
792013
Securing input data of deep learning inference systems via partitioned enclave execution
Z Gu, H Huang, J Zhang, D Su, A Lamba, D Pendarakis, I Molloy
arXiv preprint arXiv:1807.00969, 1-14, 2018
77*2018
The system can't perform the operation now. Try again later.
Articles 1–20