Follow
Taesung Lee
Title
Cited by
Cited by
Year
Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering
B Chen, W Carvalho, N Baracaldo, H Ludwig, B Edwards, T Lee, I Molloy, ...
arXiv preprint arXiv:1811.03728, 2018
4412018
Attribute extraction and scoring: A probabilistic approach
T Lee, Z Wang, H Wang, S Hwang
2013 IEEE 29th International Conference on Data Engineering (ICDE), 194-205, 2013
862013
Deep embedding for natural language content based on semantic dependencies
T Lee, Y Park
US Patent 10,380,259, 2019
612019
Defending Against Neural Network Model Stealing Attacks Using Deceptive Perturbations
T Lee, B Edwards, I Molloy, D Su
2019 IEEE Security and Privacy Workshops (SPW), 43-49, 2019
402019
Web scale taxonomy cleansing
T Lee, Z Wang, H Wang, S Hwang
Proceedings of the VLDB Endowment 4 (12), 1295-1306, 2011
402011
Defending against model stealing attacks using deceptive perturbations
T Lee, B Edwards, I Molloy, D Su
arXiv preprint arXiv:1806.00054, 2018
362018
Advit: Adversarial frames identifier based on temporal consistency in videos
C Xiao, R Deng, B Li, T Lee, B Edwards, J Yi, D Song, M Liu, I Molloy
Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2019
352019
Deep Neural Network Hardening Framework
BJ Edwards, T Lee, IM Molloy, D Su
US Patent App. 15/844,442, 2019
332019
Processing and optimizing main memory spatial-keyword queries
T Lee, J Park, S Lee, SW Hwang, S Elnikety, Y He
Proceedings of the VLDB Endowment 9 (3), 132-143, 2015
312015
Supervising Unsupervised Open Information Extraction Models
A Roy, Y Park, T Lee, S Pan
Proceedings of the 2019 Conference on Empirical Methods in Natural Language …, 2019
302019
Protecting cognitive systems from gradient based attacks through the use of deceiving gradients
T Lee, IM Molloy, F Tejani
US Patent 10,657,259, 2020
282020
Defending Against Machine Learning Model Stealing Attacks Using Deceptive Perturbations
T Lee, B Edwards, I Molloy, D Su
arXiv preprint arXiv:1806.00054, 2018
242018
Protecting Cognitive Systems from Model Stealing Attacks
T Lee, IM Molloy, D Su
US Patent App. 15/714,514, 2019
212019
Adversarial learning of privacy protection layers for image recognition services
BJ Edwards, H Huang, T Lee, IM Molloy, D Su
US Patent 10,535,120, 2020
172020
Using Gradients to Detect Backdoors in Neural Networks
W Carvalho, B Chen, BJ Edwards, T Lee, IM Molloy, J Zhang
US Patent App. 15/953,956, 2019
162019
Bootstrapping entity translation on weakly comparable corpora
T Lee, S Hwang
Proceedings of the 51st Annual Meeting of the Association for Computational …, 2013
142013
Clustering for detection of anomalous behavior and insider threat
S Chari, B Edwards, T Lee, IM Molloy
US Patent App. 10/341,372, 2019
10*2019
List intersection for web search: algorithms, cost models, and optimizations
S Kim, T Lee, S Hwang, S Elnikety
Proceedings of the VLDB Endowment 12 (1), 1-13, 2018
82018
Detecting poisoning attacks on neural networks by activation clustering
B Chen, W Carvalho, HH Ludwig, IM Molloy, T Lee, J Zhang, BJ Edwards
US Patent App. 16/057,706, 2020
72020
A new measure for overfitting and its implications for backdooring of deep learning
K Grosse, T Lee, Y Park, M Backes, I Molloy
arXiv preprint arXiv:2006.06721, 2020
62020
The system can't perform the operation now. Try again later.
Articles 1–20