Issued Patents All Time
Showing 1–25 of 63 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12326940 | Graph exploration framework for adversarial example generation | Taesung Lee, Kevin Eykholt, Douglas Lee Schales, Jiyong Jang | 2025-06-10 |
| 12288154 | Adaptive robustness certification against adversarial examples | Kevin Eykholt, Taesung Lee, Jiyong Jang, Shiqi Wang | 2025-04-29 |
| 12050993 | Dynamic gradient deception against adversarial examples in machine learning models | Taesung Lee | 2024-07-30 |
| 12045713 | Detecting adversary attacks on a deep neural network (DNN) | Jialong Zhang, Zhongshu Gu, Jiyong Jang, Marc Philippe Stoecklin | 2024-07-23 |
| 12019747 | Adversarial interpolation backdoor detection | Heiko H. Ludwig, Ebube Chuba, Bryant Chen, Benjamin J. Edwards, Taesung Lee | 2024-06-25 |
| 12019720 | Spatiotemporal deep learning for behavioral biometrics | Taesung Lee, Youngja Park | 2024-06-25 |
| 11977625 | Using multimodal model consistency to detect adversarial attacks | Youngja Park, Taesung Lee, Wenjie Wang | 2024-05-07 |
| 11886989 | System for measuring information leakage of deep learning models | Zhongshu Gu, Heqing Huang, Jialong Zhang, Dong Su, Dimitrios Pendarakis | 2024-01-30 |
| 11853436 | Protecting cognitive systems from model stealing attacks | Taesung Lee, Dong Su | 2023-12-26 |
| 11847555 | Constraining neural networks for robustness through alternative encoding | Kevin Eykholt, Taesung Lee, Jiyong Jang | 2023-12-19 |
| 11816575 | Verifiable deep learning training service | Zhongshu Gu, Heqing Huang, Jialong Zhang, Dong Su, Dimitrios Pendarakis | 2023-11-14 |
| 11783025 | Training diverse and robust ensembles of artificial intelligence computer models | Taesung Lee, Benjamin J. Edwards | 2023-10-10 |
| 11775637 | Recurrent neural network based anomaly detection | Heqing Huang, Taesung Lee, Zhongshu Gu, Jialong Zhang, Josyula R. Rao | 2023-10-03 |
| 11748480 | Policy-based detection of anomalous control and data flow paths in an application program | Suresh N. Chari, Ashish Kundu, Dimitrios Pendarakis | 2023-09-05 |
| 11675896 | Using multimodal model consistency to detect adversarial attacks | Youngja Park, Taesung Lee, Wenjie Wang | 2023-06-13 |
| 11650801 | Determining when to perform and performing runtime binary slimming | Michael Vu Le, Taemin Park | 2023-05-16 |
| 11522880 | Analytics engine for data exploration and analytics | Sulakshan Vajipayajula, Paul Coccoli, James B. Peterson, Michael Vu Le | 2022-12-06 |
| 11494496 | Measuring overfitting of machine learning computer model and susceptibility to security threats | Kathrin Grosse, Taesung Lee, Youngja Park | 2022-11-08 |
| 11455569 | Device discovery and classification from encrypted network traffic | Enriquillo Valdez, Pau-Chen Cheng, Dimitrios Pendarakis | 2022-09-27 |
| 11443182 | Privacy enhancing deep learning cloud service using a trusted execution environment | Zhongshu Gu, Heqing Huang, Jialong Zhang, Dong Su, Dimitrios Pendarakis | 2022-09-13 |
| 11443178 | Deep neural network hardening framework | Benjamin J. Edwards, Taesung Lee, Dong Su | 2022-09-13 |
| 11416771 | Self-learning peer group analysis for optimizing identity and access management environments | Priti P. Patil, Kushaal Veijay | 2022-08-16 |
| 11372997 | Automatic audit logging of events in software applications performing regulatory workloads | Suresh N. Chari, Ted A. Habeck, Ashish Kundu | 2022-06-28 |
| 11301563 | Recurrent neural network based anomaly detection | Heqing Huang, Taesung Lee, Zhongshu Gu, Jialong Zhang, Josyula R. Rao | 2022-04-12 |
| 11277434 | Reducing attack surface by selectively collocating applications on host computers | Michael Vu Le, Hani T. Jamjoom | 2022-03-15 |