| 11816241 |
Systems and methods for protecting user privacy |
Daniel Marino |
2023-11-14 |
| 11775673 |
Using physiological cues to measure data sensitivity and implement security on a user device |
Darren Shou |
2023-10-03 |
| 11551137 |
Machine learning adversarial campaign mitigation on a computing device |
Javier Echauz, Andrew B. Gardner, John Keith Kenemer, Jasjeet Dhaliwal |
2023-01-10 |
| 11509688 |
Virtual ad blocking on a computing device |
— |
2022-11-22 |
| 11210397 |
Systems and methods for training malware classifiers |
Mahmood Sharif, Kevin Roundy, Sandeep Bhatkar |
2021-12-28 |
| 11184162 |
Privacy preserving secure task automation |
Sandeep Bhatkar, Susanta K. Nanda, Yuqiong Sun |
2021-11-23 |
| 10958666 |
Systems and methods for verifying connection integrity |
Brian Witten, Qing Li, Ronald Frederick, Roelof Nico du Toit, Susanta K. Nanda +1 more |
2021-03-23 |
| 10887351 |
Security for IoT home voice assistants |
Susanta K. Nanda, Yuqiong Sun |
2021-01-05 |
| 10686816 |
Insider threat detection under user-resource bi-partite graphs |
Sandeep Bhatkar, Ashwin Kayyoor |
2020-06-16 |
| 10542034 |
Providing adversarial perturbations to media |
Reuben Feinman |
2020-01-21 |
| 10534933 |
Encrypting and decrypting sensitive files on a network device |
Kevin Roundy, Yuqiong Sun, Christopher Gates, Michael Hart, Brian Witten |
2020-01-14 |
| 10447663 |
Decrypting network traffic on a middlebox device using a trusted execution environment |
Yuqiong Sun, Daniel Marino, Susanta K. Nanda, Brian Witten, Ronald Frederick +1 more |
2019-10-15 |
| 10425435 |
Systems and methods for detecting anomalous behavior in shared data repositories |
Ashwin Kayyoor, Sandeep Bhatkar |
2019-09-24 |
| 10397266 |
Verifying that the influence of a user data point has been removed from a machine learning classifier |
Jasjeet Dhaliwal |
2019-08-27 |
| 10341373 |
Automatically detecting insider threats using user collaboration patterns |
Sandeep Bhatkar, Ashwin Kayyoor |
2019-07-02 |
| 10225277 |
Verifying that the influence of a user data point has been removed from a machine learning classifier |
Jasjeet Dhaliwal |
2019-03-05 |
| 10044691 |
Decrypting network traffic on a middlebox device using a trusted execution environment |
Yuqiong Sun, Daniel Marino, Susanta K. Nanda, Brian Witten, Ronald Frederick +1 more |
2018-08-07 |
| 10015182 |
Systems and methods for protecting computing resources |
Aleatha Parker-Wood |
2018-07-03 |
| 9692604 |
Probabilistic key distribution in vehicular networks with infrastructure support |
João Francisco Cordeiro de Oliveira Barros, Joäo Paulo Patriarca De Almeida, Mate Boban |
2017-06-27 |
| 9276743 |
Probabilistic key distribution in vehicular networks with infrastructure support |
João Francisco Cordeiro de Oliveira Barros, Joäo Paulo Patriarca De Almeida, Mate Boban |
2016-03-01 |