| 12341784 |
Controlling access to secured data via timed filtering of data |
Christopher Charles Yasko |
2025-06-24 |
| 12314828 |
Verification of electronic identity components |
Piyushkumar Patel, Sunit Sivaraj |
2025-05-27 |
| 12282530 |
Secure resource management to prevent fraudulent resource access |
Michael McBurnett |
2025-04-22 |
| 12061671 |
Data compression techniques for machine learning models |
Bo Guo |
2024-08-13 |
| 11995470 |
Secure resource management to prevent resource abuse |
Ligaj PRADHAN, Piyush Patel |
2024-05-28 |
| 11893493 |
Clustering techniques for machine learning models |
Piyush Patel |
2024-02-06 |
| 11876807 |
Secure online access control to prevent identification information misuse |
Piyush Patel, Samiyuru Geethanjana Senarathne Menik Hitihami Mudiyanselage |
2024-01-16 |
| 11489843 |
Controlling access to secured data via timed filtering of data |
Christopher Charles Yasko |
2022-11-01 |
| 11475235 |
Clustering techniques for machine learning models |
Piyush Patel |
2022-10-18 |
| 11425144 |
Controlling access to multi-granularity data |
Christopher Charles Yasko |
2022-08-23 |
| 11416509 |
Data processing systems and methods for efficiently transforming entity descriptors in textual data |
Piyushkumar Patel |
2022-08-16 |
| 11356460 |
Secure online access control to prevent identification information misuse |
Piyush Patel, Samiyuru Geethanjana Senarathne Menik Hitihami Mudiyanselage |
2022-06-07 |
| 10671812 |
Text classification using automatically generated seed data |
Allan Joshua, Hongchao Li, Hannah Wang |
2020-06-02 |
| 10643154 |
Transforming attributes for training automated modeling systems |
Trevis J. Litherland, Li Hao |
2020-05-05 |