Ian M. Molloy
According to our database1,
Ian M. Molloy
authored at least 57 papers
between 2005 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2023
Proceedings of the 32nd USENIX Security Symposium, 2023
2022
Comput. Secur., 2022
2021
A Large-Scale Study of Android Malware Development Phenomenon on Public Malware Submission and Scanning Platform.
IEEE Trans. Big Data, 2021
Proceedings of the IWSPA@CODASPY 2021: ACM Workshop on Security and Privacy Analytics, 2021
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021
2020
CoRR, 2020
Utilizing Multimodal Feature Consistency to Detect Adversarial Examples on Clinical Summaries.
Proceedings of the 3rd Clinical Natural Language Processing Workshop, 2020
2019
Defending Against Neural Network Model Stealing Attacks Using Deceptive Perturbations.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
Proceedings of the Workshop on Artificial Intelligence Safety 2019 co-located with the Thirty-Third AAAI Conference on Artificial Intelligence 2019 (AAAI-19), 2019
2018
Securing Input Data of Deep Learning Inference Systems via Partitioned Enclave Execution.
CoRR, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
2016
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016
Proceedings of the Financial Cryptography and Data Security, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016
2015
Learning from Others: User Anomaly Detection Using Anomalous Samples from Other Users.
Proceedings of the Computer Security - ESORICS 2015, 2015
2014
IEEE Trans. Dependable Secur. Comput., 2014
PAKDD'12 best paper: generating balanced classifier-independent training samples from unlabeled data.
Knowl. Inf. Syst., 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
2013
DinTucker: Scaling up Gaussian process models on multidimensional arrays with billions of elements.
CoRR, 2013
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013
2012
IEEE Trans. Knowl. Data Eng., 2012
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012
Generative models for access control policies: applications to role mining over logs with attribution.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2012
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011
2010
Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, 2010
Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, 2010
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010
2009
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009
On the (In)Security and (Im)Practicality of Outsourcing Precise Association Rule Mining.
Proceedings of the ICDM 2009, 2009
Defeating Cross-Site Request Forgery Attacks with Browser-Enforced Authenticity Protection.
Proceedings of the Financial Cryptography and Data Security, 2009
2008
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008
Proceedings of the 2008 Workshop on New Security Paradigms, 2008
2007
IACR Cryptol. ePrint Arch., 2007
Environmental Management Systems and Information Management - Strategic-Systematical Integration of Green Value Added.
Proceedings of the Information Technologies in Environmental Engineering, 2007
Proceedings of the Financial Cryptography and Data Security, 2007
2005
Supply Chain Management goes RoHS - The Need to Include Compliance Related Information in the Supply Chain Information Flow.
Proceedings of the ITEE 2005, 2005