| 11551137 |
Machine learning adversarial campaign mitigation on a computing device |
Javier Echauz, John Keith Kenemer, Jasjeet Dhaliwal, Saurabh Shintre |
2023-01-10 |
| 11361084 |
Identifying and protecting against a computer security threat while preserving privacy of individual client devices using differential privacy for text documents |
Geoffrey So, Melanie Beck, Jasjeet Dhaliwal, Aleatha Parker-Wood |
2022-06-14 |
| 10366344 |
Systems and methods for selecting features for classification |
Nikolaos Vasiloglou, Jugal Parikh |
2019-07-30 |
| 10366233 |
Systems and methods for trichotomous malware classification |
Reuben Feinman, Javier Echauz |
2019-07-30 |
| 10284585 |
Tree rotation in random classification forests to improve efficacy |
Mark Kennedy |
2019-05-07 |
| 10250617 |
Systems and methods for detecting malware using machine learning |
Walter Bogorad, Jun Mao |
2019-04-02 |
| 10146740 |
Sparse data set processing |
Nikolaos Vasiloglou |
2018-12-04 |
| 10037425 |
Detecting suspicious file prospecting activity from patterns of user activity |
Aleatha Parker-Wood |
2018-07-31 |
| 9992211 |
Systems and methods for improving the classification accuracy of trustworthiness classifiers |
Petrus Johannes Viljoen, Douglas Schlatter, Carey Nachenberg |
2018-06-05 |
| 9858410 |
Techniques for automated application analysis |
Mark Kennedy, Vincent Cheong |
2018-01-02 |