The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications of Ian M. Molloy Ian Molloy ( http://dblp.L3S.de/Authors/Ian_M._Molloy )

  Author page on DBLP  Author page in RDF  Community of Ian M. Molloy in ASPL-2

Publication years (Num. hits)
2005-2011 (16) 2012-2014 (16) 2015-2019 (18)
Publication types (Num. hits)
article(14) inproceedings(34) proceedings(2)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 15 occurrences of 11 keywords

Results
Found 51 publication records. Showing 50 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Carlos Alzate, Anna Monreale, Haytham Assem, Albert Bifet, Teodora Sandra Buda, Bora Caglayan, Brett Drury, Eva García-Martín, Ricard Gavaldà, Stefan Kramer 0001, Niklas Lavesson, Michael Madden 0002, Ian Molloy, Maria-Irina Nicolae, Mathieu Sinn (eds.) ECML PKDD 2018 Workshops - Nemesis 2018, UrbReas 2018, SoGood 2018, IWAISe 2018, and Green Data Mining 2018, Dublin, Ireland, September 10-14, 2018, Proceedings Search on Bibsonomy Nemesis/UrbReas/SoGood/IWAISe/GDM@PKDD/ECML The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Zhongshu Gu, Hani Jamjoom, Dong Su, Heqing Huang, Jialong Zhang, Tengfei Ma, Dimitrios Pendarakis, Ian Molloy Reaching Data Confidentiality and Model Accountability on the CalTrain. Search on Bibsonomy DSN The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Bryant Chen, Wilka Carvalho, Nathalie Baracaldo, Heiko Ludwig, Benjamin Edwards, Taesung Lee, Ian Molloy, Biplav Srivastava Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering. Search on Bibsonomy SafeAI@AAAI The full citation details ... 2019 DBLP  BibTeX  RDF
1Taesung Lee, Benjamin Edwards, Ian Molloy, Dong Su Defending Against Neural Network Model Stealing Attacks Using Deceptive Perturbations. Search on Bibsonomy IEEE Symposium on Security and Privacy Workshops The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Maria-Irina Nicolae, Mathieu Sinn, Tran Ngoc Minh, Ambrish Rawat, Martin Wistuba, Valentina Zantedeschi, Ian M. Molloy, Benjamin Edwards Adversarial Robustness Toolbox v0.2.2. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
1Xuejing Yuan, Yuxuan Chen, Aohui Wang, Kai Chen 0012, Shengzhi Zhang, Heqing Huang, Ian M. Molloy All Your Alexa Are Belong to Us: A Remote Voice Control Attack against Echo. Search on Bibsonomy GLOBECOM The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Taesung Lee, Benjamin Edwards, Ian Molloy, Dong Su Defending Against Model Stealing Attacks Using Deceptive Perturbations. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
1Zhongshu Gu, Hani Jamjoom, Dong Su, Heqing Huang, Jialong Zhang, Tengfei Ma, Dimitrios Pendarakis, Ian Molloy Reaching Data Confidentiality and Model Accountability on the CalTrain. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
1Bryant Chen, Wilka Carvalho, Nathalie Baracaldo, Heiko Ludwig, Benjamin Edwards, Taesung Lee, Ian Molloy, Biplav Srivastava Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
1Zhongshu Gu, Heqing Huang, Jialong Zhang, Dong Su, Ankita Lamba, Dimitrios Pendarakis, Ian Molloy Securing Input Data of Deep Learning Inference Systems via Partitioned Enclave Execution. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
1Jialong Zhang, Zhongshu Gu, Jiyong Jang, Hui Wu, Marc Ph. Stoecklin, Heqing Huang, Ian Molloy Protecting Intellectual Property of Deep Neural Networks with Watermarking. Search on Bibsonomy AsiaCCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1David Barrera, Ian Molloy, Heqing Huang IDIoT: Securing the Internet of Things like it's 1994. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
1Weining Yang, Ninghui Li, Ian M. Molloy, Youngja Park, Suresh N. Chari Comparing Password Ranking Algorithms on Real-World Password Datasets. Search on Bibsonomy ESORICS (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Suresh Chari, Ted Habeck, Ian Molloy, Youngja Park, Josyula R. Rao, Wilfried Teiken A platform and analytics for usage and entitlement analytics. Search on Bibsonomy IBM Journal of Research and Development The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ian Molloy, Suresh Chari, Ulrich Finkler, Mark Wiggerman, Coen Jonker, Ted Habeck, Youngja Park, Frank Jordens, Ron van Schaik Graph Analytics for Real-Time Scoring of Cross-Channel Transactional Fraud. Search on Bibsonomy Financial Cryptography The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Shandian Zhe, Yuan Qi, Youngja Park, Zenglin Xu, Ian Molloy, Suresh Chari DinTucker: Scaling Up Gaussian Process Models on Large Multidimensional Arrays. Search on Bibsonomy AAAI The full citation details ... 2016 DBLP  BibTeX  RDF
1Haining Chen, Omar Chowdhury, Ninghui Li, Warut Khern-am-nuai, Suresh Chari, Ian Molloy, Youngja Park Tri-Modularization of Firewall Policies. Search on Bibsonomy SACMAT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Youngja Park, Ian M. Molloy, Suresh N. Chari, Zenglin Xu, Christopher S. Gates, Ninghui Li Learning from Others: User Anomaly Detection Using Anomalous Samples from Other Users. Search on Bibsonomy ESORICS (2) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Youngja Park, Zijie Qi, Suresh N. Chari, Ian Molloy PAKDD'12 best paper: generating balanced classifier-independent training samples from unlabeled data. Search on Bibsonomy Knowl. Inf. Syst. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Christopher S. Gates, Ninghui Li, Hao Peng, Bhaskar Pratim Sarma, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotaru, Ian Molloy Generating Summary Risk Scores for Mobile Applications. Search on Bibsonomy IEEE Trans. Dependable Sec. Comput. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sylvia L. Osborn, Mahesh V. Tripunitara, Ian Molloy (eds.) 19th ACM Symposium on Access Control Models and Technologies, SACMAT '14, London, ON, Canada - June 25 - 27, 2014 Search on Bibsonomy SACMAT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Christopher S. Gates, Ninghui Li, Zenglin Xu, Suresh N. Chari, Ian Molloy, Youngja Park Detecting Insider Information Theft Using Features from File Access Logs. Search on Bibsonomy ESORICS (2) The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Shandian Zhe, Yuan Qi, Youngja Park, Ian Molloy, Suresh Chari DinTucker: Scaling up Gaussian process models on multidimensional arrays with billions of elements. Search on Bibsonomy CoRR The full citation details ... 2013 DBLP  BibTeX  RDF
1Ian Molloy, Mahesh V. Tripunitara, Volkmar Lotz, Martin Kuhlmann, Casey Schaufler, Vijay Atluri Panel on granularity in access control. Search on Bibsonomy SACMAT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Suresh Chari, Ted Habeck, Ian Molloy, Youngja Park, Wilfried Teiken A bigData platform for analytics on access control policies and logs. Search on Bibsonomy SACMAT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Suresh Chari, Ian Molloy, Youngja Park, Wilfried Teiken Ensuring continuous compliance through reconciling policy with usage. Search on Bibsonomy SACMAT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Tiancheng Li, Ninghui Li, Jian Zhang 0003, Ian Molloy Slicing: A New Approach for Privacy Preserving Data Publishing. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Hao Peng, Christopher S. Gates, Bhaskar Pratim Sarma, Ninghui Li, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotaru, Ian Molloy Using probabilistic generative models for ranking risks of Android apps. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ian Molloy, Luke Dickens, Charles Morisset, Pau-Chen Cheng, Jorge Lobo 0001, Alessandra Russo Risk-based security decisions under uncertainty. Search on Bibsonomy CODASPY The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Luke Dickens, Ian Molloy, Jorge Lobo 0001, Pau-Chen Cheng, Alessandra Russo Learning Stochastic Models of Information Flow. Search on Bibsonomy ICDE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Bhaskar Pratim Sarma, Ninghui Li, Christopher S. Gates, Rahul Potharaju, Cristina Nita-Rotaru, Ian Molloy Android permissions: a perspective combining risks and benefits. Search on Bibsonomy SACMAT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Suresh Chari, Jorge Lobo 0001, Ian Molloy Practical risk aggregation in RBAC models. Search on Bibsonomy SACMAT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ian Molloy, Youngja Park, Suresh Chari Generative models for access control policies: applications to role mining over logs with attribution. Search on Bibsonomy SACMAT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Youngja Park, Zijie Qi, Suresh Chari, Ian Molloy Generating Balanced Classifier-Independent Training Samples from Unlabeled Data. Search on Bibsonomy PAKDD (1) The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ian Molloy, Ninghui Li Attack on the GridCode one-time password. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ian Molloy, Jorge Lobo 0001, Suresh Chari Adversaries' Holy Grail: access control analytics. Search on Bibsonomy BADGERS@EuroSys The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Nan Ding, Yuan (Alan) Qi, Rongjing Xiang, Ian Molloy, Ninghui Li Nonparametric Bayesian Matrix Factorization by Power-EP. Search on Bibsonomy AISTATS The full citation details ... 2010 DBLP  BibTeX  RDF
1Ian Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin B. Calo, Jorge Lobo 0001 Mining Roles with Multiple Objectives. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Chris Giblin, Marcel Graf, Günter Karjoth, Andreas Wespi, Ian Molloy, Jorge Lobo 0001, Seraphin B. Calo Towards an integrated approach to role engineering. Search on Bibsonomy SafeConfig The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ian Molloy, Ninghui Li, Yuan (Alan) Qi, Jorge Lobo 0001, Luke Dickens Mining roles with noisy data. Search on Bibsonomy SACMAT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF prediction, approximation, noise, role mining, rbac
1Tiancheng Li, Ninghui Li, Jian Zhang 0003, Ian Molloy Slicing: A New Approach to Privacy Preserving Data Publishing Search on Bibsonomy CoRR The full citation details ... 2009 DBLP  BibTeX  RDF
1Ziqing Mao, Ninghui Li, Ian Molloy Defeating Cross-Site Request Forgery Attacks with Browser-Enforced Authenticity Protection. Search on Bibsonomy Financial Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Cross-Site Request Forgery, Web Security, Browser Security
1Ian Molloy, Ninghui Li, Tiancheng Li On the (In)Security and (Im)Practicality of Outsourcing Precise Association Rule Mining. Search on Bibsonomy ICDM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ian Molloy, Ninghui Li, Tiancheng Li, Ziqing Mao, Qihua Wang, Jorge Lobo 0001 Evaluating role mining algorithms. Search on Bibsonomy SACMAT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF evaluation, role engineering, role mining, rbac
1Ian Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin B. Calo, Jorge Lobo 0001 Mining roles with semantic meanings. Search on Bibsonomy SACMAT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF RBAC, role engineering, role mining
1Ian Molloy, Pau-Chen Cheng, Pankaj Rohatgi Trading in risk: using markets to improve access control. Search on Bibsonomy NSPW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1William R. Speirs, Ian Molloy Making Large Hash Functions From Small Compression Functions. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2007 DBLP  BibTeX  RDF
1Ian Molloy, Jiangtao Li 0001, Ninghui Li Dynamic Virtual Credit Card Numbers. Search on Bibsonomy Financial Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF credit card theft, e-commerce
1Ian Molloy Environmental Management Systems and Information Management - Strategic-Systematical Integration of Green Value Added. Search on Bibsonomy ITEE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Ian Molloy Supply Chain Management goes RoHS - The Need to Include Compliance Related Information in the Supply Chain Information Flow. Search on Bibsonomy ITEE The full citation details ... 2005 DBLP  BibTeX  RDF
Displaying result #1 - #50 of 50 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license