Issued Patents All Time
Showing 1–25 of 25 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11928232 | Protecting sensitive data from being exposed in graph embedding vectors | Yun Shen | 2024-03-12 |
| 11816209 | Systems and methods for protecting data on devices | Kevin Roundy, Acar Tamersoy, Daniel Kats | 2023-11-14 |
| 11812272 | Systems and methods for utilizing user identity notifications to protect against potential privacy attacks on mobile devices | Kevin Roundy, Acar Tamersoy, Anil Sharma, Arif Mohammed Shaikh | 2023-11-07 |
| 11783031 | Systems and methods for utilizing federated machine-learning to protect against potentially malicious data | Lella Bilge, Chris Gates | 2023-10-10 |
| 11556653 | Systems and methods for detecting inter-personal attack applications | Kevin Roundy, Acar Tamersoy | 2023-01-17 |
| 11361100 | Systems and methods for detecting potentially malicious content in decentralized machine-learning model updates | Christopher Gates | 2022-06-14 |
| 11227050 | Systems and methods for verifying decentralized federated data using influence evaluation | Christopher Gates | 2022-01-18 |
| 11075933 | Abnormal user behavior detection | Brandon Fetters, Xiaolin Wang | 2021-07-27 |
| 11025666 | Systems and methods for preventing decentralized malware attacks | Yuzhe Ma, Kevin Roundy, Chris Gates, Yun Shen | 2021-06-01 |
| 11025649 | Systems and methods for malware classification | Leyla Bilge, Oystein Fladby | 2021-06-01 |
| 11023580 | Systems and methods for cross-product malware categorization | Yun Shen | 2021-06-01 |
| 11012454 | Detecting abnormal user behavior via temporally regularized tensor factorization | Xiaolin Wang | 2021-05-18 |
| 10785243 | Identifying evidence of attacks by analyzing log text | Michael Hart, Joseph Lopilato | 2020-09-22 |
| 10547623 | Security network devices by forecasting future security incidents for a network based on past security incidents | Yun Shen, Leylya Yumer, Pierre-Antoine Vervier, Petros Efstathopoulos | 2020-01-28 |
| 10516680 | Systems and methods for assessing cyber risks using incident-origin information | Pierre-Antoine Vervier, Leylya Bilge, Matteo Dell'Amico | 2019-12-24 |
| 10437994 | Systems and methods for determining the reputations of unknown files | Yun Shen, Pierre-Antoine Vervier | 2019-10-08 |
| 10367845 | Systems and methods for evaluating infection risks based on profiled user behaviors | Leylya Yumer, Pierre-Antoine Vervier, Matteo Dell'Amico | 2019-07-30 |
| 10313379 | Systems and methods for making security-related predictions | Kevin Roundy, Michael Hart, Christopher Gates | 2019-06-04 |
| 10242201 | Systems and methods for predicting security incidents triggered by security software | Shang-Tse Chen, Chris Gates, Michael Hart, Kevin Roundy | 2019-03-26 |
| 10148690 | Accurate real-time identification of malicious BGP hijacks | Yun Shen, Pierre-Antoine Vervier | 2018-12-04 |
| 10116680 | Systems and methods for evaluating infection risks based on profiled user behaviors | Leylya Yumer, Pierre-Antoine Vervier, Matteo Dell'Amico | 2018-10-30 |
| 10063582 | Securing compromised network devices in a network | Wangyan Feng, Shuning Wu, Yun Shen | 2018-08-28 |
| 9628506 | Systems and methods for detecting security events | Yun Shen | 2017-04-18 |
| 8243391 | Slider and suspension composite fiber solder joints | Hanxiang He, Shaoyong Liu, Boon Kee Tan | 2012-08-14 |
| 8159778 | Hard disk drive contamination control | Feng Gao, Hongyan Jiang, Shaoyong Liu | 2012-04-17 |