| 11847481 |
Security in a computing environment by automatically defining the scope and services of components within the computing environment |
Zhen Mo, Vijay Ganti, Vamsi Krishna Akkineni |
2023-12-19 |
| 11750381 |
Minimizing traffic drop when rekeying in a distributed security group |
Gang Xu, Bin Qian, Ganesan Chandrashekhar |
2023-09-05 |
| 11741236 |
Feature selection using term frequency-inverse document frequency (TF-IDF) model |
Zhen Mo, Vijay Ganti, Vamsi Krishna Akkineni |
2023-08-29 |
| 11726829 |
Adaptive, performance-oriented, and compression-assisted encryption scheme |
Dexiang Wang, Calvin Qian, Dan Wing, Gang Xu |
2023-08-15 |
| 11645539 |
Machine learning-based techniques for representing computing processes as vectors |
Zhen Mo, Vamsi Krishna Akkineni, Vijay Ganti |
2023-05-09 |
| 11620180 |
Holo-entropy adaptive boosting based anomaly detection |
Zhen Mo, Vijay Ganti, Vamsi Krishna Akkineni, HengJun Tian |
2023-04-04 |