Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering B Chen, W Carvalho, N Baracaldo, H Ludwig, B Edwards, T Lee, I Molloy, ... arXiv preprint arXiv:1811.03728, 2018 | 925 | 2018 |
Deep embedding for natural language content based on semantic dependencies T Lee, Y Park US Patent 10,380,259, 2019 | 129 | 2019 |
Defending Against Neural Network Model Stealing Attacks Using Deceptive Perturbations T Lee, B Edwards, I Molloy, D Su 2019 IEEE Security and Privacy Workshops (SPW), 43-49, 2019 | 114 | 2019 |
Attribute extraction and scoring: A probabilistic approach T Lee, Z Wang, H Wang, S Hwang 2013 IEEE 29th International Conference on Data Engineering (ICDE), 194-205, 2013 | 85 | 2013 |
Advit: Adversarial frames identifier based on temporal consistency in videos C Xiao, R Deng, B Li, T Lee, B Edwards, J Yi, D Song, M Liu, I Molloy Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2019 | 71 | 2019 |
Using gradients to detect backdoors in neural networks W Carvalho, B Chen, BJ Edwards, T Lee, IM Molloy, J Zhang US Patent 11,132,444, 2021 | 66 | 2021 |
Deep neural network hardening framework BJ Edwards, T Lee, IM Molloy, D Su US Patent 11,443,178, 2022 | 62 | 2022 |
Protecting cognitive systems from gradient based attacks through the use of deceiving gradients T Lee, IM Molloy, F Tejani US Patent 10,657,259, 2020 | 58 | 2020 |
Supervising Unsupervised Open Information Extraction Models A Roy, Y Park, T Lee, S Pan Proceedings of the 2019 Conference on Empirical Methods in Natural Language …, 2019 | 57 | 2019 |
Defending against model stealing attacks using deceptive perturbations T Lee, B Edwards, I Molloy, D Su arXiv preprint arXiv:1806.00054, 2018 | 46 | 2018 |
Defending Against Machine Learning Model Stealing Attacks Using Deceptive Perturbations T Lee, B Edwards, I Molloy, D Su arXiv preprint arXiv:1806.00054, 2018 | 45 | 2018 |
Web scale taxonomy cleansing T Lee, Z Wang, H Wang, S Hwang Proceedings of the VLDB Endowment 4 (12), 1295-1306, 2011 | 40 | 2011 |
Processing and optimizing main memory spatial-keyword queries T Lee, J Park, S Lee, SW Hwang, S Elnikety, Y He Proceedings of the VLDB Endowment 9 (3), 132-143, 2015 | 39 | 2015 |
Protecting cognitive systems from model stealing attacks T Lee, IM Molloy, D Su US Patent 11,023,593, 2021 | 37 | 2021 |
Adversarial learning of privacy protection layers for image recognition services BJ Edwards, H Huang, T Lee, IM Molloy, D Su US Patent 10,535,120, 2020 | 29 | 2020 |
Recurrent neural network based anomaly detection H Huang, T Lee, IM Molloy, Z Gu, J Zhang, JR Rao US Patent 11,301,563, 2022 | 16 | 2022 |
Bootstrapping entity translation on weakly comparable corpora T Lee, S Hwang Proceedings of the 51st Annual Meeting of the Association for Computational …, 2013 | 15 | 2013 |
Detecting poisoning attacks on neural networks by activation clustering B Chen, W Carvalho, HH Ludwig, IM Molloy, T Lee, J Zhang, BJ Edwards US Patent 11,188,789, 2021 | 14 | 2021 |
Clustering for detection of anomalous behavior and insider threat S Chari, B Edwards, T Lee, IM Molloy US Patent 10,341,372, 2019 | 12 | 2019 |
List intersection for web search: algorithms, cost models, and optimizations S Kim, T Lee, S Hwang, S Elnikety Proceedings of the VLDB Endowment 12 (1), 1-13, 2018 | 12 | 2018 |