Follow
Ian Molloy
Ian Molloy
IBM Research
Verified email at us.ibm.com
Title
Cited by
Cited by
Year
Using probabilistic generative models for ranking risks of android apps
H Peng, C Gates, B Sarma, N Li, Y Qi, R Potharaju, C Nita-Rotaru, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
5222012
Detecting backdoor attacks on deep neural networks by activation clustering
B Chen, W Carvalho, N Baracaldo, H Ludwig, B Edwards, T Lee, I Molloy, ...
arXiv preprint arXiv:1811.03728, 2018
5102018
Android permissions: a perspective combining risks and benefits
BP Sarma, N Li, C Gates, R Potharaju, C Nita-Rotaru, I Molloy
Proceedings of the 17th ACM symposium on Access Control Models and …, 2012
4312012
Slicing: A new approach for privacy preserving data publishing
T Li, N Li, J Zhang, I Molloy
IEEE transactions on knowledge and data engineering 24 (3), 561-574, 2010
4122010
Adversarial Robustness Toolbox v1. 0.0
MI Nicolae, M Sinn, MN Tran, B Buesser, A Rawat, M Wistuba, ...
arXiv preprint arXiv:1807.01069, 2018
4062018
Protecting intellectual property of deep neural networks with watermarking
J Zhang, Z Gu, J Jang, H Wu, MP Stoecklin, H Huang, I Molloy
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
3952018
Mining roles with semantic meanings
I Molloy, H Chen, T Li, Q Wang, N Li, E Bertino, S Calo, J Lobo
Proceedings of the 13th ACM symposium on Access control models and …, 2008
2252008
Evaluating role mining algorithms
I Molloy, N Li, T Li, Z Mao, Q Wang, J Lobo
Proceedings of the 14th ACM symposium on Access control models and …, 2009
1802009
Verifiable Deep Learning Training Service
Z Gu, H Huang, J Zhang, D Su, D Pendarakis, IM Molloy
US Patent App. 16/124,657, 2020
1562020
Techniques for reconciling permission usage with security policy for policy optimization and monitoring continuous compliance
SN Chari, IM Molloy, Y Park, W Teiken
US Patent 9,288,232, 2016
1532016
Protection and verification of user authentication credentials against server compromise
L Koved, IM Molloy, G Taban
US Patent 10,277,591, 2019
1262019
Mining roles with multiple objectives
I Molloy, H Chen, T Li, Q Wang, N Li, E Bertino, S Calo, J Lobo
ACM Transactions on Information and System Security (TISSEC) 13 (4), 1-35, 2010
1122010
Defeating cross-site request forgery attacks with browser-enforced authenticity protection
Z Mao, N Li, I Molloy
Financial Cryptography and Data Security: 13th International Conference, FC …, 2009
1122009
Ensuring continuous compliance through reconciling policy with usage
S Chari, I Molloy, Y Park, W Teiken
Proceedings of the 18th ACM symposium on Access control models and …, 2013
1032013
Detecting malicious user activity
SN Chari, TA Habeck, IM Molloy, Y Park, JR Rao, W Teiken
US Patent 10,599,837, 2020
962020
Risk-based security decisions under uncertainty
I Molloy, L Dickens, C Morisset, PC Cheng, J Lobo, A Russo
Proceedings of the second ACM conference on Data and Application Security …, 2012
842012
Generative models for access control policies: applications to role mining over logs with attribution
I Molloy, Y Park, S Chari
Proceedings of the 17th ACM symposium on Access Control Models and …, 2012
802012
Automatic mapping of valley networks on Mars
I Molloy, TF Stepinski
Computers & Geosciences 33 (6), 728-738, 2007
742007
Mining roles with noisy data
I Molloy, N Li, Y Qi, J Lobo, L Dickens
Proceedings of the 15th ACM symposium on Access control models and …, 2010
712010
Generating role-based access control policies based on discovered risk-averse roles
SN Chari, IM Molloy
US Patent 9,137,265, 2015
662015
The system can't perform the operation now. Try again later.
Articles 1–20