| 12353543 |
Systems and methods for utilizing multiple analysis techniques to distinguish stalkerware from privacy-invasive application types |
Kevin Roundy |
2025-07-08 |
| 11816209 |
Systems and methods for protecting data on devices |
Yufei Han, Kevin Roundy, Daniel Kats |
2023-11-14 |
| 11812272 |
Systems and methods for utilizing user identity notifications to protect against potential privacy attacks on mobile devices |
Kevin Roundy, Yufei Han, Anil Sharma, Arif Mohammed Shaikh |
2023-11-07 |
| 11556653 |
Systems and methods for detecting inter-personal attack applications |
Yufei Han, Kevin Roundy |
2023-01-17 |
| 11469904 |
Systems and methods for authenticating digital media content |
Daniel Kats, Christopher Gates, Daniel Marino |
2022-10-11 |
| 11295015 |
Identifying and protecting against surveillance apps installed on client devices |
Kevin Roundy |
2022-04-05 |
| 11172258 |
Protecting against an impersonation scam in a live video stream |
Kevin Roundy, Daniel Kats, Platon Kotzias |
2021-11-09 |
| 11128473 |
Systems and methods for assuring authenticity of electronic sensor data |
Daniel Kats, Christopher Gates, Daniel Marino |
2021-09-21 |
| 11010680 |
Memory efficiency of production rule systems |
Daniel Marino, Kevin Roundy, Sandeep Bhatkar |
2021-05-18 |
| 10795999 |
Identifying and protecting against computer security threats while preserving privacy of individual client devices using condensed local differential privacy (CLDP) |
Mehmet Emre Gursoy |
2020-10-06 |
| 10789363 |
Identifying and protecting against computer security threats while preserving privacy of individual client devices using condensed local differential privacy (CLDP) |
Mehmet Emre Gursoy |
2020-09-29 |
| 10530805 |
Systems and methods for detecting security incidents |
Kevin Roundy, Michael Hart, Daniel Kats, Michael Spertus |
2020-01-07 |
| 10452841 |
Modeling malicious behavior that occurs in the absence of users |
Sandeep Bhatkar, Daniel Marino, Kevin Roundy |
2019-10-22 |
| 10455085 |
Systems and methods for real-time scam protection on phones |
Kevin Roundy, Mahmood Sharif |
2019-10-22 |
| 10142357 |
Systems and methods for preventing malicious network connections using correlation-based anomaly detection |
Kevin Roundy |
2018-11-27 |
| 9323924 |
Systems and methods for establishing reputations of files |
Kevin Roundy, Sourabh Satish |
2016-04-26 |
| 9185119 |
Systems and methods for detecting malware using file clustering |
Kevin Roundy, Daniel Marino |
2015-11-10 |
| 9148441 |
Systems and methods for adjusting suspiciousness scores in event-correlation graphs |
Kevin Roundy, Sandeep Bhatkar, Elias Khalil |
2015-09-29 |
| 9141790 |
Systems and methods for using event-correlation graphs to detect attacks on computing systems |
Kevin Roundy, Fanglu Guo, Sandeep Bhatkar, Tao Cheng, Jie Fu +4 more |
2015-09-22 |