Detecting backdoor attacks on deep neural networks by activation clustering B Chen, W Carvalho, N Baracaldo, H Ludwig, B Edwards, T Lee, I Molloy, ... arXiv preprint arXiv:1811.03728, 2018 | 841 | 2018 |
Adversarial Robustness Toolbox v1. 0.0 MI Nicolae, M Sinn, MN Tran, B Buesser, A Rawat, M Wistuba, ... arXiv preprint arXiv:1807.01069, 2018 | 626 | 2018 |
Protecting intellectual property of deep neural networks with watermarking J Zhang, Z Gu, J Jang, H Wu, MP Stoecklin, H Huang, I Molloy Proceedings of the 2018 on Asia conference on computer and communications …, 2018 | 598 | 2018 |
Using probabilistic generative models for ranking risks of android apps H Peng, C Gates, B Sarma, N Li, Y Qi, R Potharaju, C Nita-Rotaru, ... Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 550 | 2012 |
Android permissions: a perspective combining risks and benefits BP Sarma, N Li, C Gates, R Potharaju, C Nita-Rotaru, I Molloy Proceedings of the 17th ACM symposium on Access Control Models and …, 2012 | 465 | 2012 |
Slicing: A new approach for privacy preserving data publishing T Li, N Li, J Zhang, I Molloy IEEE transactions on knowledge and data engineering 24 (3), 561-574, 2010 | 426 | 2010 |
Mining roles with semantic meanings I Molloy, H Chen, T Li, Q Wang, N Li, E Bertino, S Calo, J Lobo Proceedings of the 13th ACM symposium on Access control models and …, 2008 | 234 | 2008 |
Evaluating role mining algorithms I Molloy, N Li, T Li, Z Mao, Q Wang, J Lobo Proceedings of the 14th ACM symposium on Access control models and …, 2009 | 188 | 2009 |
Techniques for reconciling permission usage with security policy for policy optimization and monitoring continuous compliance SN Chari, IM Molloy, Y Park, W Teiken US Patent 9,288,232, 2016 | 179 | 2016 |
Protection and verification of user authentication credentials against server compromise L Koved, IM Molloy, G Taban US Patent 10,277,591, 2019 | 165 | 2019 |
Detecting malicious user activity SN Chari, TA Habeck, IM Molloy, Y Park, JR Rao, W Teiken US Patent 10,599,837, 2020 | 138 | 2020 |
Mining roles with multiple objectives I Molloy, H Chen, T Li, Q Wang, N Li, E Bertino, S Calo, J Lobo ACM Transactions on Information and System Security (TISSEC) 13 (4), 1-35, 2010 | 125 | 2010 |
Ensuring continuous compliance through reconciling policy with usage S Chari, I Molloy, Y Park, W Teiken Proceedings of the 18th ACM symposium on Access control models and …, 2013 | 124 | 2013 |
Defeating cross-site request forgery attacks with browser-enforced authenticity protection Z Mao, N Li, I Molloy Financial Cryptography and Data Security: 13th International Conference, FC …, 2009 | 123 | 2009 |
Defending against neural network model stealing attacks using deceptive perturbations T Lee, B Edwards, I Molloy, D Su 2019 IEEE Security and Privacy Workshops (SPW), 43-49, 2019 | 104 | 2019 |
Risk-based security decisions under uncertainty I Molloy, L Dickens, C Morisset, PC Cheng, J Lobo, A Russo Proceedings of the second ACM conference on Data and Application Security …, 2012 | 90 | 2012 |
Generative models for access control policies: applications to role mining over logs with attribution I Molloy, Y Park, S Chari Proceedings of the 17th ACM symposium on Access Control Models and …, 2012 | 89 | 2012 |
Automatic mapping of valley networks on Mars I Molloy, TF Stepinski Computers & Geosciences 33 (6), 728-738, 2007 | 82 | 2007 |
Techniques for Generating Balanced and Class-Independent Training Data From Unlabeled Data Set SN Chari, IM Molloy, Y Park, Z Qi US Patent App. 13/274,002, 2013 | 79 | 2013 |
Securing input data of deep learning inference systems via partitioned enclave execution Z Gu, H Huang, J Zhang, D Su, A Lamba, D Pendarakis, I Molloy arXiv preprint arXiv:1807.00969, 1-14, 2018 | 77* | 2018 |