Ian M. Molloy  Ian M. Molloy photo       

contact information

Manager - Information Security
Thomas J. Watson Research Center, Yorktown Heights, NY USA
  +1dash914dash945dash1681

links



2016

Graph Analytics for Real-time Scoring of Cross-channel Transactional Fraud
Ian Molloy, Suresh Chari, Ulrich Finkler, Mark Wiggerman, Coen Jonker, Ted Habeck, Youngja Park, Frank Jordens and Ron van Schaik
Financial Cryptography and Data Security 2016

DinTucker: Scaling Up Gaussian Process Models on Large Multidimensional Arrays
Shandian Zhe, Yuan Qi, Youngja Park, Zenglin Xu, Ian Molloy, Suresh Chari
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, February 12-17, 2016, Phoenix, Arizona, USA., pp. 2386--2392


2015

Learning from Others: User Anomaly Detection Using Anomalous Samples from Other Users
Youngja Park, Ian M. Molloy, Suresh N. Chari, Zenglin Xu, Christopher S. Gates, Ninghui Li
Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II, pp. 396--414


2014

PAKDD'12 best paper: generating balanced classifier-independent training samples from unlabeled data
Youngja Park, Zijie Qi, Suresh N. Chari, Ian Molloy
Knowl. Inf. Syst. 41(3), 871--892, 2014

Generating Summary Risk Scores for Mobile Applications
Christopher S. Gates, Ninghui Li, Hao Peng, Bhaskar Pratim Sarma, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotaru, Ian Molloy
IEEE Trans. Dependable Sec. Comput. 11(3), 238--251, 2014

Detecting Insider Information Theft Using Features from File Access Logs
Christopher S. Gates, Ninghui Li, Zenglin Xu, Suresh N. Chari, Ian Molloy, Youngja Park
Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II, pp. 383--400




2013

DinTucker: Scaling up Gaussian process models on multidimensional arrays with billions of elements
Shandian Zhe, Yuan Qi, Youngja Park, Ian Molloy, Suresh Chari
CoRRabs/1311.2663, 2013

A bigData platform for analytics on access control policies and logs
Suresh Chari, Ted Habeck, Ian Molloy, Youngja Park, Wilfried Teiken
SACMAT, pp. 185-188, 2013

Panel on granularity in access control
Ian Molloy, Mahesh V. Tripunitara, Volkmar Lotz, Martin Kuhlmann, Casey Schaufler, Vijay Atluri
SACMAT, pp. 85-86, 2013

Ensuring continuous compliance through reconciling policy with usage
Suresh Chari, Ian Molloy, Youngja Park, Wilfried Teiken
SACMAT, pp. 49-60, 2013


2012

Using probabilistic generative models for ranking risks of Android apps
Hao Peng, Christopher S. Gates, Bhaskar Pratim Sarma, Ninghui Li, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotaru, Ian Molloy
ACM Conference on Computer and Communications Security, pp. 241-252, 2012

Android Permissions: A Perspective Combining Risks and Benefits
B. Sarma, N. Li, C. Gates, R. Potharaju, C. Nita-Rotaru, I. Molloy
ACM Symposium on Access Control Models and Technologies (SACMAT), 2012

Generative Models for Access Control Policies: Applications to Role Mining Over Logs with Attribution
Ian Molloy, Youngja Park, and Suresh Chari.
ACM Symposium on Access Control Models and Technologies (SACMAT), 2012

Slicing: A New Approach for Privacy Preserving Data Publishing
Tiancheng Li, Ninghui Li, Jian Zhang, Ian Molloy
IEEE Trans. Knowl. Data Eng. 24(3), 561--574, 2012

Generating Balanced Classifier-Independent Training Samples from Unlabeled Data
Youngja Park, Zijie Qi, Suresh N Chari, Ian Molloy
Pacific-Asia Conference on Knowledge Discovery and Data Mining, 2012

Learning Stochastic Models of Information Flow
Luke Dickens, Ian Molloy, Jorge Lobo, Pau-Chen Cheng, Alessandra Russo
Proceedings of the 28th IEEE International Conference on Data Engineering (ICDE), 2012

Risk-Based Security Decisions Under Uncertainty
Ian Molloy, Luke Dickens, Charles Morisset, Pau-Chen Cheng, Jorge Lobo, Alessandra Russo
Proceedings of the Second ACM Conference on Data and Application Security and Privacy (CODASPY), 2012


2011

Adversaries' Holy Grail: access control analytics
I Molloy, J Lobo, S Chari
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, pp. 54--61, 2011

Attack on the GridCode one-time password
I Molloy, N Li
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pp. 306--315, 2011


2010

Approximate Inference for Nonparametric Bayesian Matrix Factorization
Nan Ding, Yuan (Alan) Qi, Rongjing Xiang, Ian Molloy, Ninghui Li
Journal Machine Learning Research, W&CP 9, Artificial Intelligence and Statistics (AISTATS'10), 2010

Towards an Integrated Approach to Role Engineering
Chris Giblin, Marcel Graf, Gunter Karjoth, Andreas Wespi, Ian Molloy, Jorge Lobo, Seraphin Calo
2nd ACM Workshop on Assurable & Usable Security Configuration (SafeConfig), 2010

Mining roles with noisy data
I Molloy, N Li, Y A Qi, J Lobo, L Dickens
Proceeding of the 15th ACM symposium on Access control models and technologies, pp. 45--54, ACM, 2010


2009

Evaluating Role Mining Algorithms
Ian Molloy and Ninghui Li and Tiancheng Li and Ziqing Mao and Qihua Wang and Jorge Lobo
Proceedings of the Fourteenth ACM Symposium on Access Control Models and Technologies (SACMAT'09), 2009

Slicing: A New Approach for Privacy Preserving Data Publishing
T Li, N Li, J Zhang, I Molloy
Knowledge and Data Engineering, IEEE Transactions on pp. 99, 1--1, IEEE, 2009


Defeating cross-site request forgery attacks with browser-enforced authenticity protection
Z Mao, N Li, I Molloy
Financial Cryptography and Data Security, 238--255, Springer, 2009


2008

Mining Roles with Semantic Meanings
Ian Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin Calo, Jorge Lobo
Proceedings of the Thirteenth ACM Symposium on Access Control Models and Technologies (SACMAT'08), 2008

Trading in Risk: Using Markets to Improve Access Control
Ian Molloy, Pau-Chen Cheng, Pankaj Rohatgi
Proceedings of the Fifteenth New Security Paradigms Workshop (NSPW'08), 2008

Web service for extracting stream networks from DEM data
W Luo, X Li, I Molloy, L Di, T Stepinski
GeoJournal on GIS and Built Environment, 2008


2007


Automatic mapping of valley networks on Mars
I Molloy, TF Stepinski
Computers \& geosciences 33(6), 728--738, Elsevier, 2007

Dynamic virtual credit card numbers
I Molloy, J Li, N Li
Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security, pp. 208--223, 2007


Year Unknown

Nonparametric Bayesian Matrix Factorization by Power-EP
N Ding, Y A Qi, R Xiang, I Molloy, N Li
cs.purdue.edu, 0