Search Results - "Molloy, Ian"
-
1
PAKDD’12 best paper: generating balanced classifier-independent training samples from unlabeled data
Published in Knowledge and information systems (01-12-2014)“…We consider the problem of generating balanced training samples from an unlabeled data set with an unknown class distribution. While random sampling works well…”
Get full text
Journal Article -
2
Slicing: A New Approach for Privacy Preserving Data Publishing
Published in IEEE transactions on knowledge and data engineering (01-03-2012)“…Several anonymization techniques, such as generalization and bucketization, have been designed for privacy preserving microdata publishing. Recent work has…”
Get full text
Journal Article -
3
Backdoor smoothing: Demystifying backdoor attacks on deep neural networks
Published in Computers & security (01-09-2022)“…Backdoor attacks mislead machine-learning models to output an attacker-specified class when presented a specific trigger at test time. These attacks require…”
Get full text
Journal Article -
4
AdvIT: Adversarial Frames Identifier Based on Temporal Consistency in Videos
Published in 2019 IEEE/CVF International Conference on Computer Vision (ICCV) (01-10-2019)“…Deep neural networks (DNNs) have been widely applied in various applications, including autonomous driving and surveillance systems. However, DNNs are found to…”
Get full text
Conference Proceeding -
5
On the (In)Security and (Im)Practicality of Outsourcing Precise Association Rule Mining
Published in 2009 Ninth IEEE International Conference on Data Mining (01-12-2009)“…The recent interest in outsourcing IT services onto the cloud raises two main concerns: security and cost. One task that could be outsourced is data mining. In…”
Get full text
Conference Proceeding -
6
Reaching Data Confidentiality and Model Accountability on the CalTrain
Published in 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (01-06-2019)“…Distributed collaborative learning (DCL) paradigms enable building joint machine learning models from distrusted multi-party participants. Data confidentiality…”
Get full text
Conference Proceeding -
7
A Large-Scale Study of Android Malware Development Phenomenon on Public Malware Submission and Scanning Platform
Published in IEEE transactions on big data (01-06-2021)“…With the steady growth of Android malware, we suspect that, during the malware development phase, some Android malware writers use the popular public scanning…”
Get full text
Journal Article -
8
Web Service for extracting stream networks from DEM data
Published in GeoJournal (01-04-2014)“…This paper describes the implementation of a morphology based algorithm for extracting stream networks from data as a Web Service within the framework of…”
Get full text
Journal Article -
9
Generating Summary Risk Scores for Mobile Applications
Published in IEEE transactions on dependable and secure computing (01-05-2014)“…One of Android's main defense mechanisms against malicious apps is a risk communication mechanism which, before a user installs an app, warns the user about…”
Get full text
Journal Article -
10
URET: Universal Robustness Evaluation Toolkit (for Evasion)
Published 03-08-2023“…Machine learning models are known to be vulnerable to adversarial evasion attacks as illustrated by image classification models. Thoroughly understanding such…”
Get full text
Journal Article -
11
Learning Stochastic Models of Information Flow
Published in 2012 IEEE 28th International Conference on Data Engineering (01-04-2012)“…An understanding of information flow has many applications, including for maximizing marketing impact on social media, limiting malware propagation, and…”
Get full text
Conference Proceeding -
12
Defending Against Neural Network Model Stealing Attacks Using Deceptive Perturbations
Published in 2019 IEEE Security and Privacy Workshops (SPW) (01-05-2019)“…Machine learning architectures are readily available, but obtaining the high quality labeled data for training is costly. Pre-trained models available as cloud…”
Get full text
Conference Proceeding -
13
Adaptive Verifiable Training Using Pairwise Class Similarity
Published 14-12-2020“…Verifiable training has shown success in creating neural networks that are provably robust to a given amount of noise. However, despite only enforcing a single…”
Get full text
Journal Article -
14
Adversarial Examples and Metrics
Published 14-07-2020“…Adversarial examples are a type of attack on machine learning (ML) systems which cause misclassification of inputs. Achieving robustness against adversarial…”
Get full text
Journal Article -
15
All Your Alexa Are Belong to Us: A Remote Voice Control Attack against Echo
Published in 2018 IEEE Global Communications Conference (GLOBECOM) (01-12-2018)“…Voice controlled system becomes increasingly popular these days due to the convenient and natural control over lots of functionalities and smart devices…”
Get full text
Conference Proceeding -
16
IDIoT: Securing the Internet of Things like it's 1994
Published 10-12-2017“…Over 20 billion Internet of Things devices are set to come online by 2020. Protecting such a large number of underpowered, UI-less, network-connected devices…”
Get full text
Journal Article -
17
Automatic migration to role based access control
Published 01-01-2010“…The success of role-based access control both within the research community and industry is undeniable. One of the main reasons for RBAC’s adoption is its…”
Get full text
Dissertation -
18
Backdoor Smoothing: Demystifying Backdoor Attacks on Deep Neural Networks
Published 11-06-2020“…Backdoor attacks mislead machine-learning models to output an attacker-specified class when presented a specific trigger at test time. These attacks require…”
Get full text
Journal Article -
19
Defending Against Machine Learning Model Stealing Attacks Using Deceptive Perturbations
Published 31-05-2018“…Machine learning models are vulnerable to simple model stealing attacks if the adversary can obtain output labels for chosen inputs. To protect against these…”
Get full text
Journal Article -
20
Reaching Data Confidentiality and Model Accountability on the CalTrain
Published 07-12-2018“…Distributed collaborative learning (DCL) paradigms enable building joint machine learning models from distrusting multi-party participants. Data…”
Get full text
Journal Article