Issued Patents All Time
Showing 1–20 of 20 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11816241 | Systems and methods for protecting user privacy | Daniel Marino | 2023-11-14 |
| 11775673 | Using physiological cues to measure data sensitivity and implement security on a user device | Darren Shou | 2023-10-03 |
| 11551137 | Machine learning adversarial campaign mitigation on a computing device | Javier Echauz, Andrew B. Gardner, John Keith Kenemer, Jasjeet Dhaliwal | 2023-01-10 |
| 11509688 | Virtual ad blocking on a computing device | — | 2022-11-22 |
| 11210397 | Systems and methods for training malware classifiers | Mahmood Sharif, Kevin Roundy, Sandeep Bhatkar | 2021-12-28 |
| 11184162 | Privacy preserving secure task automation | Sandeep Bhatkar, Susanta K. Nanda, Yuqiong Sun | 2021-11-23 |
| 10958666 | Systems and methods for verifying connection integrity | Brian Witten, Qing Li, Ronald Frederick, Roelof Nico du Toit, Susanta K. Nanda +1 more | 2021-03-23 |
| 10887351 | Security for IoT home voice assistants | Susanta K. Nanda, Yuqiong Sun | 2021-01-05 |
| 10686816 | Insider threat detection under user-resource bi-partite graphs | Sandeep Bhatkar, Ashwin Kayyoor | 2020-06-16 |
| 10542034 | Providing adversarial perturbations to media | Reuben Feinman | 2020-01-21 |
| 10534933 | Encrypting and decrypting sensitive files on a network device | Kevin Roundy, Yuqiong Sun, Christopher Gates, Michael Hart, Brian Witten | 2020-01-14 |
| 10447663 | Decrypting network traffic on a middlebox device using a trusted execution environment | Yuqiong Sun, Daniel Marino, Susanta K. Nanda, Brian Witten, Ronald Frederick +1 more | 2019-10-15 |
| 10425435 | Systems and methods for detecting anomalous behavior in shared data repositories | Ashwin Kayyoor, Sandeep Bhatkar | 2019-09-24 |
| 10397266 | Verifying that the influence of a user data point has been removed from a machine learning classifier | Jasjeet Dhaliwal | 2019-08-27 |
| 10341373 | Automatically detecting insider threats using user collaboration patterns | Sandeep Bhatkar, Ashwin Kayyoor | 2019-07-02 |
| 10225277 | Verifying that the influence of a user data point has been removed from a machine learning classifier | Jasjeet Dhaliwal | 2019-03-05 |
| 10044691 | Decrypting network traffic on a middlebox device using a trusted execution environment | Yuqiong Sun, Daniel Marino, Susanta K. Nanda, Brian Witten, Ronald Frederick +1 more | 2018-08-07 |
| 10015182 | Systems and methods for protecting computing resources | Aleatha Parker-Wood | 2018-07-03 |
| 9692604 | Probabilistic key distribution in vehicular networks with infrastructure support | João Francisco Cordeiro de Oliveira Barros, Joäo Paulo Patriarca De Almeida, Mate Boban | 2017-06-27 |
| 9276743 | Probabilistic key distribution in vehicular networks with infrastructure support | João Francisco Cordeiro de Oliveira Barros, Joäo Paulo Patriarca De Almeida, Mate Boban | 2016-03-01 |