Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering B Chen, W Carvalho, N Baracaldo, H Ludwig, B Edwards, T Lee, I Molloy, ... arXiv preprint arXiv:1811.03728, 2018 | 827 | 2018 |
Deep embedding for natural language content based on semantic dependencies T Lee, Y Park US Patent 10,380,259, 2019 | 118 | 2019 |
Defending Against Neural Network Model Stealing Attacks Using Deceptive Perturbations T Lee, B Edwards, I Molloy, D Su 2019 IEEE Security and Privacy Workshops (SPW), 43-49, 2019 | 99 | 2019 |
Attribute extraction and scoring: A probabilistic approach T Lee, Z Wang, H Wang, S Hwang 2013 IEEE 29th International Conference on Data Engineering (ICDE), 194-205, 2013 | 84 | 2013 |
Advit: Adversarial frames identifier based on temporal consistency in videos C Xiao, R Deng, B Li, T Lee, B Edwards, J Yi, D Song, M Liu, I Molloy Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2019 | 63 | 2019 |
Using Gradients to Detect Backdoors in Neural Networks W Carvalho, B Chen, BJ Edwards, T Lee, IM Molloy, J Zhang US Patent App. 15/953,956, 2019 | 57 | 2019 |
Deep Neural Network Hardening Framework BJ Edwards, T Lee, IM Molloy, D Su US Patent App. 15/844,442, 2019 | 56 | 2019 |
Protecting cognitive systems from gradient based attacks through the use of deceiving gradients T Lee, IM Molloy, F Tejani US Patent 10,657,259, 2020 | 55 | 2020 |
Supervising Unsupervised Open Information Extraction Models A Roy, Y Park, T Lee, S Pan Proceedings of the 2019 Conference on Empirical Methods in Natural Language …, 2019 | 55 | 2019 |
Defending against model stealing attacks using deceptive perturbations T Lee, B Edwards, I Molloy, D Su arXiv preprint arXiv:1806.00054, 2018 | 42 | 2018 |
Defending Against Machine Learning Model Stealing Attacks Using Deceptive Perturbations T Lee, B Edwards, I Molloy, D Su arXiv preprint arXiv:1806.00054, 2018 | 40 | 2018 |
Web scale taxonomy cleansing T Lee, Z Wang, H Wang, S Hwang Proceedings of the VLDB Endowment 4 (12), 1295-1306, 2011 | 40 | 2011 |
Processing and optimizing main memory spatial-keyword queries T Lee, J Park, S Lee, SW Hwang, S Elnikety, Y He Proceedings of the VLDB Endowment 9 (3), 132-143, 2015 | 37 | 2015 |
Protecting Cognitive Systems from Model Stealing Attacks T Lee, IM Molloy, D Su US Patent App. 15/714,514, 2019 | 35 | 2019 |
Adversarial learning of privacy protection layers for image recognition services BJ Edwards, H Huang, T Lee, IM Molloy, D Su US Patent 10,535,120, 2020 | 28 | 2020 |
Bootstrapping entity translation on weakly comparable corpora T Lee, S Hwang Proceedings of the 51st Annual Meeting of the Association for Computational …, 2013 | 15 | 2013 |
Detecting poisoning attacks on neural networks by activation clustering B Chen, W Carvalho, HH Ludwig, IM Molloy, T Lee, J Zhang, BJ Edwards US Patent App. 16/057,706, 2020 | 14 | 2020 |
Recurrent Neural Network Based Anomaly Detection H Huang, T Lee, IM Molloy, Z Gu, J Zhang, JR Rao US Patent App. 16/351,718, 2020 | 12 | 2020 |
List intersection for web search: algorithms, cost models, and optimizations S Kim, T Lee, S Hwang, S Elnikety Proceedings of the VLDB Endowment 12 (1), 1-13, 2018 | 12 | 2018 |
Clustering for detection of anomalous behavior and insider threat S Chari, B Edwards, T Lee, IM Molloy US Patent App. 10/341,372, 2019 | 10* | 2019 |