Zobrazeno 1 - 10
of 40
pro vyhledávání: '"Ian M. Molloy"'
Autor:
Quanlong Guan, Ce Zhang, Junyuan Zeng, Suresh Chari, Ian M. Molloy, Heqing Huang, Peng Liu, Cong Zheng, Wu Zhou, Sencun Zhu
Publikováno v:
IEEE Transactions on Big Data. 7:255-270
With the steady growth of Android malware, we suspect that, during the malware development phase, some Android malware writers use the popular public scanning services (e.g., VirusTotal) for testing the evasion capability of their malware samples, wh
Publikováno v:
IWSPA@CODASPY
The future of cybersecurity will pit AI against AI. In this talk, we explore the role of AI in strengthening security defenses as well as the role of security in protecting AI services. We expect that the scale, scope and frequency of cyber attacks w
Autor:
Chaowei Xiao, Dawn Song, Bo Li, Mingyan Liu, Taesung Lee, Jinfeng Yi, Benjamin Edwards, Ian M. Molloy, Ruizhi Deng
Publikováno v:
ICCV
Deep neural networks (DNNs) have been widely applied in various applications, including autonomous driving and surveillance systems. However, DNNs are found to be vulnerable to adversarial examples, which are carefully crafted inputs aiming to mislea
Publikováno v:
IEEE Symposium on Security and Privacy Workshops
Machine learning architectures are readily available, but obtaining the high quality labeled data for training is costly. Pre-trained models available as cloud services can be used to generate this costly labeled data, and would allow an attacker to
Autor:
Zhongshu Gu, Jialong Zhang, Heqing Huang, Tengfei Ma, Ian M. Molloy, Dimitrios Pendarakis, Dong Su, Hani Jamjoom
Publikováno v:
DSN
Distributed collaborative learning (DCL) paradigms enable building joint machine learning models from distrusting multi-party participants. Data confidentiality is guaranteed by retaining private training data on each participant's local infrastructu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8c322b230017497bf76d1d8477b12f51
http://arxiv.org/abs/1812.03230
http://arxiv.org/abs/1812.03230
Publikováno v:
GLOBECOM
Voice controlled system becomes increasingly popular these days due to the convenient and natural control over lots of functionalities and smart devices. Amazon Echo, designed around Alexa, is capable of controlling smart devices such as locks, sendi
Autor:
Ian M. Molloy, Jialong Zhang, Marc Ph. Stoecklin, Heqing Huang, Hui Wu, Zhongshu Gu, Jiyong Jang
Publikováno v:
AsiaCCS
Deep learning technologies, which are the key components of state-of-the-art Artificial Intelligence (AI) services, have shown great success in providing human-level capabilities for a variety of tasks, such as visual analysis, speech recognition, an
Publikováno v:
Proceedings 2018 Workshop on Decentralized IoT Security and Standards.
Autor:
Ian M. Molloy, Ted A. Habeck, Suresh Chari, Mark Wiggerman, Youngja Park, Coen Jonker, Frank Jordens, Ron van Schaik, Ulrich Finkler
Publikováno v:
Financial Cryptography and Data Security ISBN: 9783662549698
Financial Cryptography
Financial Cryptography
We present a new approach to cross channel fraud detection: build graphs representing transactions from all channels and use analytics on features extracted from these graphs. Our underlying hypothesis is community based fraud detection: an account (
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a256cd0b64b8a853d5b9f62e61f26b65
https://doi.org/10.1007/978-3-662-54970-4_2
https://doi.org/10.1007/978-3-662-54970-4_2
Publikováno v:
GeoJournal. 79:183-193
This paper describes the implementation of a morphology based algorithm for extracting stream networks from data as a Web Service within the framework of GeoBrain, an open, interoperable, distributed, standard-compliant, multi-tier web-based geospati