| 11928232 |
Protecting sensitive data from being exposed in graph embedding vectors |
Yun Shen |
2024-03-12 |
| 11816209 |
Systems and methods for protecting data on devices |
Kevin Roundy, Acar Tamersoy, Daniel Kats |
2023-11-14 |
| 11812272 |
Systems and methods for utilizing user identity notifications to protect against potential privacy attacks on mobile devices |
Kevin Roundy, Acar Tamersoy, Anil Sharma, Arif Mohammed Shaikh |
2023-11-07 |
| 11783031 |
Systems and methods for utilizing federated machine-learning to protect against potentially malicious data |
Lella Bilge, Chris Gates |
2023-10-10 |
| 11556653 |
Systems and methods for detecting inter-personal attack applications |
Kevin Roundy, Acar Tamersoy |
2023-01-17 |
| 11361100 |
Systems and methods for detecting potentially malicious content in decentralized machine-learning model updates |
Christopher Gates |
2022-06-14 |
| 11227050 |
Systems and methods for verifying decentralized federated data using influence evaluation |
Christopher Gates |
2022-01-18 |
| 11075933 |
Abnormal user behavior detection |
Brandon Fetters, Xiaolin Wang |
2021-07-27 |
| 11025666 |
Systems and methods for preventing decentralized malware attacks |
Yuzhe Ma, Kevin Roundy, Chris Gates, Yun Shen |
2021-06-01 |
| 11025649 |
Systems and methods for malware classification |
Leyla Bilge, Oystein Fladby |
2021-06-01 |
| 11023580 |
Systems and methods for cross-product malware categorization |
Yun Shen |
2021-06-01 |
| 11012454 |
Detecting abnormal user behavior via temporally regularized tensor factorization |
Xiaolin Wang |
2021-05-18 |
| 10785243 |
Identifying evidence of attacks by analyzing log text |
Michael Hart, Joseph Lopilato |
2020-09-22 |
| 10547623 |
Security network devices by forecasting future security incidents for a network based on past security incidents |
Yun Shen, Leylya Yumer, Pierre-Antoine Vervier, Petros Efstathopoulos |
2020-01-28 |
| 10516680 |
Systems and methods for assessing cyber risks using incident-origin information |
Pierre-Antoine Vervier, Leylya Bilge, Matteo Dell'Amico |
2019-12-24 |
| 10437994 |
Systems and methods for determining the reputations of unknown files |
Yun Shen, Pierre-Antoine Vervier |
2019-10-08 |
| 10367845 |
Systems and methods for evaluating infection risks based on profiled user behaviors |
Leylya Yumer, Pierre-Antoine Vervier, Matteo Dell'Amico |
2019-07-30 |
| 10313379 |
Systems and methods for making security-related predictions |
Kevin Roundy, Michael Hart, Christopher Gates |
2019-06-04 |
| 10242201 |
Systems and methods for predicting security incidents triggered by security software |
Shang-Tse Chen, Chris Gates, Michael Hart, Kevin Roundy |
2019-03-26 |
| 10148690 |
Accurate real-time identification of malicious BGP hijacks |
Yun Shen, Pierre-Antoine Vervier |
2018-12-04 |
| 10116680 |
Systems and methods for evaluating infection risks based on profiled user behaviors |
Leylya Yumer, Pierre-Antoine Vervier, Matteo Dell'Amico |
2018-10-30 |
| 10063582 |
Securing compromised network devices in a network |
Wangyan Feng, Shuning Wu, Yun Shen |
2018-08-28 |
| 9628506 |
Systems and methods for detecting security events |
Yun Shen |
2017-04-18 |
| 8243391 |
Slider and suspension composite fiber solder joints |
Hanxiang He, Shaoyong Liu, Boon Kee Tan |
2012-08-14 |
| 8159778 |
Hard disk drive contamination control |
Feng Gao, Hongyan Jiang, Shaoyong Liu |
2012-04-17 |