Issued Patents All Time
Showing 26–50 of 63 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11262993 | Application binary rewriting to reduce binary attack surface area | Michael Vu Le, Jacob Tinkhauser | 2022-03-01 |
| 11227232 | Automatic generation of training data for anomaly detection using other user's data samples | Suresh N. Chari, Youngja Park | 2022-01-18 |
| 11221835 | Determining when to perform and performing runtime binary slimming | Michael Vu Le, Taemin Park | 2022-01-11 |
| 11188789 | Detecting poisoning attacks on neural networks by activation clustering | Bryant Chen, Wilka Carvalho, Heiko H. Ludwig, Taesung Lee, Jialong Zhang +1 more | 2021-11-30 |
| 11171946 | Two-level sequence learning for analyzing, metering, generating, and cracking passwords | Suresh N. Chari, Taesung Lee, Youngja Park | 2021-11-09 |
| 11132444 | Using gradients to detect backdoors in neural networks | Wilka Carvalho, Bryant Chen, Benjamin J. Edwards, Taesung Lee, Jialong Zhang | 2021-09-28 |
| 11023593 | Protecting cognitive systems from model stealing attacks | Taesung Lee, Dong Su | 2021-06-01 |
| 10902121 | Policy-based detection of anomalous control and data flow paths in an application program | Suresh N. Chari, Ashish Kundu, Dimitrios Pendarakis | 2021-01-26 |
| 10891371 | Detecting malicious user activity | Suresh N. Chari, Ted A. Habeck, Youngja Park, Josyula R. Rao, Wilfried Teiken | 2021-01-12 |
| 10805308 | Jointly discovering user roles and data clusters using both access and side information | Youngja Park, Taesung Lee, Suresh N. Chari, Benjamin J. Edwards | 2020-10-13 |
| 10657259 | Protecting cognitive systems from gradient based attacks through the use of deceiving gradients | Taesung Lee, Farhan Tejani | 2020-05-19 |
| 10628600 | Automatic audit logging of events in software applications performing regulatory workloads | Suresh N. Chari, Ted A. Habeck, Ashish Kundu | 2020-04-21 |
| 10609017 | Two-level sequence learning for analyzing, metering, generating, and cracking passwords | Suresh N. Chari, Taesung Lee, Youngja Park | 2020-03-31 |
| 10599837 | Detecting malicious user activity | Suresh N. Chari, Ted A. Habeck, Youngja Park, Josyula R. Rao, Wilfried Teiken | 2020-03-24 |
| 10545745 | Application binary rewriting to reduce binary attack surface area | Michael Vu Le, Jacob Tinkhauser | 2020-01-28 |
| 10540490 | Deep learning for targeted password generation with cognitive user information understanding | Suresh N. Chari, Benjamin J. Edwards, Taesung Lee, Youngja Park | 2020-01-21 |
| 10535120 | Adversarial learning of privacy protection layers for image recognition services | Benjamin J. Edwards, Heqing Huang, Taesung Lee, Dong Su | 2020-01-14 |
| 10503911 | Automatic generation of data-centric attack graphs | Suresh N. Chari, Ashish Kundu, Dimitrios Pendarakis, Josyula R. Rao | 2019-12-10 |
| 10482265 | Data-centric monitoring of compliance of distributed applications | Suresh N. Chari, Ted A. Habeck, Ashish Kundu, Dimitrios Pendarakis, Josyula R. Rao +1 more | 2019-11-19 |
| 10419224 | Preventing monoculture in application distribution | Suresh N. Chari, Wilfried Teiken | 2019-09-17 |
| 10375119 | Dynamic multi-factor authentication challenge generation | Hagai Aronowitz, Lawrence Koved, Bo Zhang | 2019-08-06 |
| 10341372 | Clustering for detection of anomalous behavior and insider threat | Suresh N. Chari, Benjamin J. Edwards, Taesung Lee | 2019-07-02 |
| 10277591 | Protection and verification of user authentication credentials against server compromise | Lawrence Koved, Gelareh Taban | 2019-04-30 |
| 10147049 | Automatic generation of training data for anomaly detection using other user's data samples | Suresh N. Chari, Youngja Park | 2018-12-04 |
| 10108803 | Automatic generation of data-centric attack graphs | Suresh N. Chari, Ashish Kundu, Dimitrios Pendarakis, Josyula R. Rao | 2018-10-23 |