default search action
Ian M. Molloy
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c39]Kevin Eykholt, Taesung Lee, Douglas Lee Schales, Jiyong Jang, Ian M. Molloy, Masha Zorin:
URET: Universal Robustness Evaluation Toolkit (for Evasion). USENIX Security Symposium 2023: 3817-3833 - [i13]Kevin Eykholt, Taesung Lee, Douglas Lee Schales, Jiyong Jang, Ian M. Molloy, Masha Zorin:
URET: Universal Robustness Evaluation Toolkit (for Evasion). CoRR abs/2308.01840 (2023) - 2022
- [j8]Kathrin Grosse, Taesung Lee, Battista Biggio, Youngja Park, Michael Backes, Ian M. Molloy:
Backdoor smoothing: Demystifying backdoor attacks on deep neural networks. Comput. Secur. 120: 102814 (2022) - 2021
- [j7]Heqing Huang, Cong Zheng, Junyuan Zeng, Wu Zhou, Sencun Zhu, Peng Liu, Ian M. Molloy, Suresh Chari, Ce Zhang, Quanlong Guan:
A Large-Scale Study of Android Malware Development Phenomenon on Public Malware Submission and Scanning Platform. IEEE Trans. Big Data 7(2): 255-270 (2021) - [c38]Shiqi Wang, Kevin Eykholt, Taesung Lee, Jiyong Jang, Ian M. Molloy:
Adaptive Verifiable Training Using Pairwise Class Similarity. AAAI 2021: 10201-10209 - [c37]Ian M. Molloy, Josyula R. Rao, Marc Ph. Stoecklin:
AI vs. AI: Exploring the Intersections of AI and Cybersecurity. IWSPA@CODASPY 2021: 1 - 2020
- [c36]Wenjie Wang, Youngja Park, Taesung Lee, Ian M. Molloy, Pengfei Tang, Li Xiong:
Utilizing Multimodal Feature Consistency to Detect Adversarial Examples on Clinical Summaries. ClinicalNLP@EMNLP 2020: 259-268 - [i12]Kathrin Grosse, Taesung Lee, Youngja Park, Michael Backes, Ian M. Molloy:
A new measure for overfitting and its implications for backdooring of deep learning. CoRR abs/2006.06721 (2020) - [i11]Nico Döttling, Kathrin Grosse, Michael Backes, Ian M. Molloy:
Adversarial Examples and Metrics. CoRR abs/2007.06993 (2020) - [i10]Shiqi Wang, Kevin Eykholt, Taesung Lee, Jiyong Jang, Ian M. Molloy:
Adaptive Verifiable Training Using Pairwise Class Similarity. CoRR abs/2012.07887 (2020)
2010 – 2019
- 2019
- [c35]Bryant Chen, Wilka Carvalho, Nathalie Baracaldo, Heiko Ludwig, Benjamin Edwards, Taesung Lee, Ian M. Molloy, Biplav Srivastava:
Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering. SafeAI@AAAI 2019 - [c34]Zhongshu Gu, Hani Jamjoom, Dong Su, Heqing Huang, Jialong Zhang, Tengfei Ma, Dimitrios Pendarakis, Ian M. Molloy:
Reaching Data Confidentiality and Model Accountability on the CalTrain. DSN 2019: 336-348 - [c33]Chaowei Xiao, Ruizhi Deng, Bo Li, Taesung Lee, Benjamin Edwards, Jinfeng Yi, Dawn Song, Mingyan Liu, Ian M. Molloy:
AdvIT: Adversarial Frames Identifier Based on Temporal Consistency in Videos. ICCV 2019: 3967-3976 - [c32]Taesung Lee, Benjamin Edwards, Ian M. Molloy, Dong Su:
Defending Against Neural Network Model Stealing Attacks Using Deceptive Perturbations. IEEE Symposium on Security and Privacy Workshops 2019: 43-49 - [e2]Carlos Alzate, Anna Monreale, Haytham Assem, Albert Bifet, Teodora Sandra Buda, Bora Caglayan, Brett Drury, Eva García-Martín, Ricard Gavaldà, Stefan Kramer, Niklas Lavesson, Michael Madden, Ian M. Molloy, Maria-Irina Nicolae, Mathieu Sinn:
ECML PKDD 2018 Workshops - Nemesis 2018, UrbReas 2018, SoGood 2018, IWAISe 2018, and Green Data Mining 2018, Dublin, Ireland, September 10-14, 2018, Proceedings. Lecture Notes in Computer Science 11329, Springer 2019, ISBN 978-3-030-13452-5 [contents] - 2018
- [c31]Jialong Zhang, Zhongshu Gu, Jiyong Jang, Hui Wu, Marc Ph. Stoecklin, Heqing Huang, Ian M. Molloy:
Protecting Intellectual Property of Deep Neural Networks with Watermarking. AsiaCCS 2018: 159-172 - [c30]Xuejing Yuan, Yuxuan Chen, Aohui Wang, Kai Chen, Shengzhi Zhang, Heqing Huang, Ian M. Molloy:
All Your Alexa Are Belong to Us: A Remote Voice Control Attack against Echo. GLOBECOM 2018: 1-6 - [i9]Taesung Lee, Benjamin Edwards, Ian M. Molloy, Dong Su:
Defending Against Model Stealing Attacks Using Deceptive Perturbations. CoRR abs/1806.00054 (2018) - [i8]Zhongshu Gu, Heqing Huang, Jialong Zhang, Dong Su, Ankita Lamba, Dimitrios Pendarakis, Ian M. Molloy:
Securing Input Data of Deep Learning Inference Systems via Partitioned Enclave Execution. CoRR abs/1807.00969 (2018) - [i7]Maria-Irina Nicolae, Mathieu Sinn, Tran Ngoc Minh, Ambrish Rawat, Martin Wistuba, Valentina Zantedeschi, Ian M. Molloy, Benjamin Edwards:
Adversarial Robustness Toolbox v0.2.2. CoRR abs/1807.01069 (2018) - [i6]Bryant Chen, Wilka Carvalho, Nathalie Baracaldo, Heiko Ludwig, Benjamin Edwards, Taesung Lee, Ian M. Molloy, Biplav Srivastava:
Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering. CoRR abs/1811.03728 (2018) - [i5]Zhongshu Gu, Hani Jamjoom, Dong Su, Heqing Huang, Jialong Zhang, Tengfei Ma, Dimitrios Pendarakis, Ian M. Molloy:
Reaching Data Confidentiality and Model Accountability on the CalTrain. CoRR abs/1812.03230 (2018) - 2017
- [i4]David Barrera, Ian M. Molloy, Heqing Huang:
IDIoT: Securing the Internet of Things like it's 1994. CoRR abs/1712.03623 (2017) - 2016
- [j6]Suresh Chari, Ted Habeck, Ian M. Molloy, Youngja Park, Josyula R. Rao, Wilfried Teiken:
A platform and analytics for usage and entitlement analytics. IBM J. Res. Dev. 60(4): 7 (2016) - [c29]Shandian Zhe, Yuan Qi, Youngja Park, Zenglin Xu, Ian M. Molloy, Suresh Chari:
DinTucker: Scaling Up Gaussian Process Models on Large Multidimensional Arrays. AAAI 2016: 2386-2392 - [c28]Weining Yang, Ninghui Li, Ian M. Molloy, Youngja Park, Suresh N. Chari:
Comparing Password Ranking Algorithms on Real-World Password Datasets. ESORICS (1) 2016: 69-90 - [c27]Ian M. Molloy, Suresh Chari, Ulrich Finkler, Mark Wiggerman, Coen Jonker, Ted Habeck, Youngja Park, Frank Jordens, Ron van Schaik:
Graph Analytics for Real-Time Scoring of Cross-Channel Transactional Fraud. Financial Cryptography 2016: 22-40 - [c26]Haining Chen, Omar Chowdhury, Ninghui Li, Warut Khern-am-nuai, Suresh Chari, Ian M. Molloy, Youngja Park:
Tri-Modularization of Firewall Policies. SACMAT 2016: 37-48 - 2015
- [c25]Youngja Park, Ian M. Molloy, Suresh N. Chari, Zenglin Xu, Christopher S. Gates, Ninghui Li:
Learning from Others: User Anomaly Detection Using Anomalous Samples from Other Users. ESORICS (2) 2015: 396-414 - 2014
- [j5]Youngja Park, Zijie Qi, Suresh N. Chari, Ian M. Molloy:
PAKDD'12 best paper: generating balanced classifier-independent training samples from unlabeled data. Knowl. Inf. Syst. 41(3): 871-892 (2014) - [j4]Christopher S. Gates, Ninghui Li, Hao Peng, Bhaskar Pratim Sarma, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotaru, Ian M. Molloy:
Generating Summary Risk Scores for Mobile Applications. IEEE Trans. Dependable Secur. Comput. 11(3): 238-251 (2014) - [c24]Christopher S. Gates, Ninghui Li, Zenglin Xu, Suresh N. Chari, Ian M. Molloy, Youngja Park:
Detecting Insider Information Theft Using Features from File Access Logs. ESORICS (2) 2014: 383-400 - [e1]Sylvia L. Osborn, Mahesh V. Tripunitara, Ian M. Molloy:
19th ACM Symposium on Access Control Models and Technologies, SACMAT '14, London, ON, Canada - June 25 - 27, 2014. ACM 2014, ISBN 978-1-4503-2939-2 [contents] - 2013
- [c23]Suresh Chari, Ian M. Molloy, Youngja Park, Wilfried Teiken:
Ensuring continuous compliance through reconciling policy with usage. SACMAT 2013: 49-60 - [c22]Ian M. Molloy, Mahesh V. Tripunitara, Volkmar Lotz, Martin Kuhlmann, Casey Schaufler, Vijay Atluri:
Panel on granularity in access control. SACMAT 2013: 85-86 - [c21]Suresh Chari, Ted Habeck, Ian M. Molloy, Youngja Park, Wilfried Teiken:
A bigData platform for analytics on access control policies and logs. SACMAT 2013: 185-188 - [i3]Shandian Zhe, Yuan Qi, Youngja Park, Ian M. Molloy, Suresh Chari:
DinTucker: Scaling up Gaussian process models on multidimensional arrays with billions of elements. CoRR abs/1311.2663 (2013) - 2012
- [j3]Tiancheng Li, Ninghui Li, Jian Zhang, Ian M. Molloy:
Slicing: A New Approach for Privacy Preserving Data Publishing. IEEE Trans. Knowl. Data Eng. 24(3): 561-574 (2012) - [c20]Hao Peng, Christopher S. Gates, Bhaskar Pratim Sarma, Ninghui Li, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotaru, Ian M. Molloy:
Using probabilistic generative models for ranking risks of Android apps. CCS 2012: 241-252 - [c19]Ian M. Molloy, Luke Dickens, Charles Morisset, Pau-Chen Cheng, Jorge Lobo, Alessandra Russo:
Risk-based security decisions under uncertainty. CODASPY 2012: 157-168 - [c18]Luke Dickens, Ian M. Molloy, Jorge Lobo, Pau-Chen Cheng, Alessandra Russo:
Learning Stochastic Models of Information Flow. ICDE 2012: 570-581 - [c17]Youngja Park, Zijie Qi, Suresh Chari, Ian M. Molloy:
Generating Balanced Classifier-Independent Training Samples from Unlabeled Data. PAKDD (1) 2012: 266-281 - [c16]Bhaskar Pratim Sarma, Ninghui Li, Christopher S. Gates, Rahul Potharaju, Cristina Nita-Rotaru, Ian M. Molloy:
Android permissions: a perspective combining risks and benefits. SACMAT 2012: 13-22 - [c15]Ian M. Molloy, Youngja Park, Suresh Chari:
Generative models for access control policies: applications to role mining over logs with attribution. SACMAT 2012: 45-56 - [c14]Suresh Chari, Jorge Lobo, Ian M. Molloy:
Practical risk aggregation in RBAC models. SACMAT 2012: 117-118 - 2011
- [c13]Ian M. Molloy, Jorge Lobo, Suresh Chari:
Adversaries' Holy Grail: access control analytics. BADGERS@EuroSys 2011: 54-61 - [c12]Ian M. Molloy, Ninghui Li:
Attack on the GridCode one-time password. AsiaCCS 2011: 306-315 - 2010
- [b1]Ian M. Molloy:
Automatic migration to role based access control. Purdue University, USA, 2010 - [j2]Ian M. Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin B. Calo, Jorge Lobo:
Mining Roles with Multiple Objectives. ACM Trans. Inf. Syst. Secur. 13(4): 36:1-36:35 (2010) - [c11]Ian M. Molloy, Ninghui Li, Yuan (Alan) Qi, Jorge Lobo, Luke Dickens:
Mining roles with noisy data. SACMAT 2010: 45-54 - [c10]Chris Giblin, Marcel Graf, Günter Karjoth, Andreas Wespi, Ian M. Molloy, Jorge Lobo, Seraphin B. Calo:
Towards an integrated approach to role engineering. SafeConfig 2010: 63-70 - [c9]Nan Ding, Yuan (Alan) Qi, Rongjing Xiang, Ian M. Molloy, Ninghui Li:
Nonparametric Bayesian Matrix Factorization by Power-EP. AISTATS 2010: 169-176
2000 – 2009
- 2009
- [c8]Ziqing Mao, Ninghui Li, Ian M. Molloy:
Defeating Cross-Site Request Forgery Attacks with Browser-Enforced Authenticity Protection. Financial Cryptography 2009: 238-255 - [c7]Ian M. Molloy, Ninghui Li, Tiancheng Li:
On the (In)Security and (Im)Practicality of Outsourcing Precise Association Rule Mining. ICDM 2009: 872-877 - [c6]Ian M. Molloy, Ninghui Li, Tiancheng Li, Ziqing Mao, Qihua Wang, Jorge Lobo:
Evaluating role mining algorithms. SACMAT 2009: 95-104 - [i2]Tiancheng Li, Ninghui Li, Jian Zhang, Ian M. Molloy:
Slicing: A New Approach to Privacy Preserving Data Publishing. CoRR abs/0909.2290 (2009) - 2008
- [c5]Ian M. Molloy, Pau-Chen Cheng, Pankaj Rohatgi:
Trading in risk: using markets to improve access control. NSPW 2008: 107-125 - [c4]Ian M. Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin B. Calo, Jorge Lobo:
Mining roles with semantic meanings. SACMAT 2008: 21-30 - 2007
- [j1]Ian M. Molloy, Tomasz F. Stepinski:
Automatic mapping of valley networks on Mars. Comput. Geosci. 33(6): 728-738 (2007) - [c3]Ian M. Molloy, Jiangtao Li, Ninghui Li:
Dynamic Virtual Credit Card Numbers. Financial Cryptography 2007: 208-223 - [c2]Ian M. Molloy:
Environmental Management Systems and Information Management - Strategic-Systematical Integration of Green Value Added. ITEE 2007: 251-260 - [i1]William R. Speirs II, Ian M. Molloy:
Making Large Hash Functions From Small Compression Functions. IACR Cryptol. ePrint Arch. 2007: 239 (2007) - 2005
- [c1]Ian M. Molloy:
Supply Chain Management goes RoHS - The Need to Include Compliance Related Information in the Supply Chain Information Flow. ITEE 2005: 12-22
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint