Ian Molloy

According to our database1, Ian Molloy authored at least 48 papers between 2005 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
A new measure for overfitting and its implications for backdooring of deep learning.
CoRR, 2020

2019
Defending Against Neural Network Model Stealing Attacks Using Deceptive Perturbations.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

AdvIT: Adversarial Frames Identifier Based on Temporal Consistency in Videos.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019

Reaching Data Confidentiality and Model Accountability on the CalTrain.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering.
Proceedings of the Workshop on Artificial Intelligence Safety 2019 co-located with the Thirty-Third AAAI Conference on Artificial Intelligence 2019 (AAAI-19), 2019

2018
Adversarial Robustness Toolbox v0.2.2.
CoRR, 2018

Securing Input Data of Deep Learning Inference Systems via Partitioned Enclave Execution.
CoRR, 2018

Defending Against Model Stealing Attacks Using Deceptive Perturbations.
CoRR, 2018

All Your Alexa Are Belong to Us: A Remote Voice Control Attack against Echo.
Proceedings of the IEEE Global Communications Conference, 2018

Protecting Intellectual Property of Deep Neural Networks with Watermarking.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
IDIoT: Securing the Internet of Things like it's 1994.
CoRR, 2017

2016
A platform and analytics for usage and entitlement analytics.
IBM J. Res. Dev., 2016

Tri-Modularization of Firewall Policies.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

Graph Analytics for Real-Time Scoring of Cross-Channel Transactional Fraud.
Proceedings of the Financial Cryptography and Data Security, 2016

Comparing Password Ranking Algorithms on Real-World Password Datasets.
Proceedings of the Computer Security - ESORICS 2016, 2016

DinTucker: Scaling Up Gaussian Process Models on Large Multidimensional Arrays.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

2015
Learning from Others: User Anomaly Detection Using Anomalous Samples from Other Users.
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
Generating Summary Risk Scores for Mobile Applications.
IEEE Trans. Dependable Secur. Comput., 2014

PAKDD'12 best paper: generating balanced classifier-independent training samples from unlabeled data.
Knowl. Inf. Syst., 2014

Detecting Insider Information Theft Using Features from File Access Logs.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
DinTucker: Scaling up Gaussian process models on multidimensional arrays with billions of elements.
CoRR, 2013

Panel on granularity in access control.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

Ensuring continuous compliance through reconciling policy with usage.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

A bigData platform for analytics on access control policies and logs.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

2012
Slicing: A New Approach for Privacy Preserving Data Publishing.
IEEE Trans. Knowl. Data Eng., 2012

Android permissions: a perspective combining risks and benefits.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Generative models for access control policies: applications to role mining over logs with attribution.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Practical risk aggregation in RBAC models.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Generating Balanced Classifier-Independent Training Samples from Unlabeled Data.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2012

Learning Stochastic Models of Information Flow.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012

Risk-based security decisions under uncertainty.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

Using probabilistic generative models for ranking risks of Android apps.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Attack on the GridCode one-time password.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Adversaries' Holy Grail: access control analytics.
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011

2010
Mining Roles with Multiple Objectives.
ACM Trans. Inf. Syst. Secur., 2010

Nonparametric Bayesian Matrix Factorization by Power-EP.
Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, 2010

Towards an integrated approach to role engineering.
Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, 2010

Mining roles with noisy data.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

2009
Slicing: A New Approach to Privacy Preserving Data Publishing
CoRR, 2009

Evaluating role mining algorithms.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

On the (In)Security and (Im)Practicality of Outsourcing Precise Association Rule Mining.
Proceedings of the ICDM 2009, 2009

Defeating Cross-Site Request Forgery Attacks with Browser-Enforced Authenticity Protection.
Proceedings of the Financial Cryptography and Data Security, 2009

2008
Mining roles with semantic meanings.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Trading in risk: using markets to improve access control.
Proceedings of the 2008 Workshop on New Security Paradigms, 2008

2007
Making Large Hash Functions From Small Compression Functions.
IACR Cryptol. ePrint Arch., 2007

Environmental Management Systems and Information Management - Strategic-Systematical Integration of Green Value Added.
Proceedings of the Information Technologies in Environmental Engineering, 2007

Dynamic Virtual Credit Card Numbers.
Proceedings of the Financial Cryptography and Data Security, 2007

2005
Supply Chain Management goes RoHS - The Need to Include Compliance Related Information in the Supply Chain Information Flow.
Proceedings of the ITEE 2005, 2005


  Loading...