IM

Ian M. Molloy

IBM: 59 patents #1,342 of 70,183Top 2%
AH Arkose Labs Holdings: 2 patents #2 of 11Top 20%
Globalfoundries: 1 patents #2,221 of 4,424Top 55%
SU Syracuse University: 1 patents #122 of 327Top 40%
📍 Thornwood, NY: #2 of 51 inventorsTop 4%
🗺 New York: #1,271 of 115,490 inventorsTop 2%
Overall (All Time): #35,424 of 4,157,543Top 1%
63
Patents All Time

Issued Patents All Time

Showing 26–50 of 63 patents

Patent #TitleCo-InventorsDate
11262993 Application binary rewriting to reduce binary attack surface area Michael Vu Le, Jacob Tinkhauser 2022-03-01
11227232 Automatic generation of training data for anomaly detection using other user's data samples Suresh N. Chari, Youngja Park 2022-01-18
11221835 Determining when to perform and performing runtime binary slimming Michael Vu Le, Taemin Park 2022-01-11
11188789 Detecting poisoning attacks on neural networks by activation clustering Bryant Chen, Wilka Carvalho, Heiko H. Ludwig, Taesung Lee, Jialong Zhang +1 more 2021-11-30
11171946 Two-level sequence learning for analyzing, metering, generating, and cracking passwords Suresh N. Chari, Taesung Lee, Youngja Park 2021-11-09
11132444 Using gradients to detect backdoors in neural networks Wilka Carvalho, Bryant Chen, Benjamin J. Edwards, Taesung Lee, Jialong Zhang 2021-09-28
11023593 Protecting cognitive systems from model stealing attacks Taesung Lee, Dong Su 2021-06-01
10902121 Policy-based detection of anomalous control and data flow paths in an application program Suresh N. Chari, Ashish Kundu, Dimitrios Pendarakis 2021-01-26
10891371 Detecting malicious user activity Suresh N. Chari, Ted A. Habeck, Youngja Park, Josyula R. Rao, Wilfried Teiken 2021-01-12
10805308 Jointly discovering user roles and data clusters using both access and side information Youngja Park, Taesung Lee, Suresh N. Chari, Benjamin J. Edwards 2020-10-13
10657259 Protecting cognitive systems from gradient based attacks through the use of deceiving gradients Taesung Lee, Farhan Tejani 2020-05-19
10628600 Automatic audit logging of events in software applications performing regulatory workloads Suresh N. Chari, Ted A. Habeck, Ashish Kundu 2020-04-21
10609017 Two-level sequence learning for analyzing, metering, generating, and cracking passwords Suresh N. Chari, Taesung Lee, Youngja Park 2020-03-31
10599837 Detecting malicious user activity Suresh N. Chari, Ted A. Habeck, Youngja Park, Josyula R. Rao, Wilfried Teiken 2020-03-24
10545745 Application binary rewriting to reduce binary attack surface area Michael Vu Le, Jacob Tinkhauser 2020-01-28
10540490 Deep learning for targeted password generation with cognitive user information understanding Suresh N. Chari, Benjamin J. Edwards, Taesung Lee, Youngja Park 2020-01-21
10535120 Adversarial learning of privacy protection layers for image recognition services Benjamin J. Edwards, Heqing Huang, Taesung Lee, Dong Su 2020-01-14
10503911 Automatic generation of data-centric attack graphs Suresh N. Chari, Ashish Kundu, Dimitrios Pendarakis, Josyula R. Rao 2019-12-10
10482265 Data-centric monitoring of compliance of distributed applications Suresh N. Chari, Ted A. Habeck, Ashish Kundu, Dimitrios Pendarakis, Josyula R. Rao +1 more 2019-11-19
10419224 Preventing monoculture in application distribution Suresh N. Chari, Wilfried Teiken 2019-09-17
10375119 Dynamic multi-factor authentication challenge generation Hagai Aronowitz, Lawrence Koved, Bo Zhang 2019-08-06
10341372 Clustering for detection of anomalous behavior and insider threat Suresh N. Chari, Benjamin J. Edwards, Taesung Lee 2019-07-02
10277591 Protection and verification of user authentication credentials against server compromise Lawrence Koved, Gelareh Taban 2019-04-30
10147049 Automatic generation of training data for anomaly detection using other user's data samples Suresh N. Chari, Youngja Park 2018-12-04
10108803 Automatic generation of data-centric attack graphs Suresh N. Chari, Ashish Kundu, Dimitrios Pendarakis, Josyula R. Rao 2018-10-23