| 11182562 |
Deep embedding for natural language content based on semantic dependencies |
Taesung Lee |
2021-11-23 |
| 11176456 |
Pre-training neural networks using data clusters |
Kyusong Lee |
2021-11-16 |
| 11171946 |
Two-level sequence learning for analyzing, metering, generating, and cracking passwords |
Suresh N. Chari, Taesung Lee, Ian M. Molloy |
2021-11-09 |
| 11159547 |
Malware clustering approaches based on cognitive computing techniques |
Suresh N. Chari, Heqing Huang, Taesung Lee |
2021-10-26 |
| 11144718 |
Adaptable processing components |
Siddharth A. Patwardhan |
2021-10-12 |
| 11132507 |
Cross-subject model-generated training data for relation extraction modeling |
Taesung Lee, Arpita Roy |
2021-09-28 |
| 11089040 |
Cognitive analysis of security data with signal flow-based graph exploration |
Jiyong Jang, Dhilung Hang Kirat, Marc Philippe Stoecklin |
2021-08-10 |
| 11082434 |
Inferring temporal relationships for cybersecurity events |
Preeti Ravindra, Dhilung Hang Kirat, Jiyong Jang, Marc Philippe Stoecklin |
2021-08-03 |
| 10984323 |
Estimating asset sensitivity using information associated with users |
Suresh N. Chari, Christopher Gates, Stephen C. Gates, Wilfried Teiken |
2021-04-20 |
| 10984322 |
Estimating asset sensitivity using information associated with users |
Suresh N. Chari, Christopher Gates, Stephen C. Gates, Wilfried Teiken |
2021-04-20 |
| 10958672 |
Cognitive offense analysis using contextual data and knowledge graphs |
William A. Bird, Suzanne C. Deffeyes, Jiyong Jang, Dhilung Hang Kirat, Josyula R. Rao +1 more |
2021-03-23 |
| 10922407 |
Discriminant power based threat detection |
Raymund Lin, Charlie Wu |
2021-02-16 |
| 10891371 |
Detecting malicious user activity |
Suresh N. Chari, Ted A. Habeck, Ian M. Molloy, Josyula R. Rao, Wilfried Teiken |
2021-01-12 |