Följ
Taesung Lee
Taesung Lee
IBM Research
Verifierad e-postadress på ibm.com - Startsida
Titel
Citeras av
Citeras av
År
Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering
B Chen, W Carvalho, N Baracaldo, H Ludwig, B Edwards, T Lee, I Molloy, ...
arXiv preprint arXiv:1811.03728, 2018
7262018
Deep embedding for natural language content based on semantic dependencies
T Lee, Y Park
US Patent 10,380,259, 2019
952019
Defending Against Neural Network Model Stealing Attacks Using Deceptive Perturbations
T Lee, B Edwards, I Molloy, D Su
2019 IEEE Security and Privacy Workshops (SPW), 43-49, 2019
852019
Attribute extraction and scoring: A probabilistic approach
T Lee, Z Wang, H Wang, S Hwang
2013 IEEE 29th International Conference on Data Engineering (ICDE), 194-205, 2013
842013
Advit: Adversarial frames identifier based on temporal consistency in videos
C Xiao, R Deng, B Li, T Lee, B Edwards, J Yi, D Song, M Liu, I Molloy
Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2019
552019
Supervising Unsupervised Open Information Extraction Models
A Roy, Y Park, T Lee, S Pan
Proceedings of the 2019 Conference on Empirical Methods in Natural Language …, 2019
522019
Deep Neural Network Hardening Framework
BJ Edwards, T Lee, IM Molloy, D Su
US Patent App. 15/844,442, 2019
482019
Using Gradients to Detect Backdoors in Neural Networks
W Carvalho, B Chen, BJ Edwards, T Lee, IM Molloy, J Zhang
US Patent App. 15/953,956, 2019
472019
Protecting cognitive systems from gradient based attacks through the use of deceiving gradients
T Lee, IM Molloy, F Tejani
US Patent 10,657,259, 2020
452020
Defending against model stealing attacks using deceptive perturbations
T Lee, B Edwards, I Molloy, D Su
arXiv preprint arXiv:1806.00054, 2018
402018
Web scale taxonomy cleansing
T Lee, Z Wang, H Wang, S Hwang
Proceedings of the VLDB Endowment 4 (12), 1295-1306, 2011
402011
Processing and optimizing main memory spatial-keyword queries
T Lee, J Park, S Lee, SW Hwang, S Elnikety, Y He
Proceedings of the VLDB Endowment 9 (3), 132-143, 2015
372015
Defending Against Machine Learning Model Stealing Attacks Using Deceptive Perturbations
T Lee, B Edwards, I Molloy, D Su
arXiv preprint arXiv:1806.00054, 2018
322018
Protecting Cognitive Systems from Model Stealing Attacks
T Lee, IM Molloy, D Su
US Patent App. 15/714,514, 2019
302019
Adversarial learning of privacy protection layers for image recognition services
BJ Edwards, H Huang, T Lee, IM Molloy, D Su
US Patent 10,535,120, 2020
262020
Bootstrapping entity translation on weakly comparable corpora
T Lee, S Hwang
Proceedings of the 51st Annual Meeting of the Association for Computational …, 2013
152013
Detecting poisoning attacks on neural networks by activation clustering
B Chen, W Carvalho, HH Ludwig, IM Molloy, T Lee, J Zhang, BJ Edwards
US Patent App. 16/057,706, 2020
132020
Clustering for detection of anomalous behavior and insider threat
S Chari, B Edwards, T Lee, IM Molloy
US Patent App. 10/341,372, 2019
10*2019
List intersection for web search: algorithms, cost models, and optimizations
S Kim, T Lee, S Hwang, S Elnikety
Proceedings of the VLDB Endowment 12 (1), 1-13, 2018
102018
Training Diverse and Robust Ensembles of Artificial Intelligence Computer Models
IM Molloy, T Lee, BJ Edwards
US Patent App. 16/816,625, 2021
92021
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20