Issued Patents All Time
Showing 1–24 of 24 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12393464 | Selecting best cloud computing environment in a hybrid cloud scenario | Anton Zorin, Niels Dominic Pardon, Ritesh K. Gupta, Sameep Mehta | 2025-08-19 |
| 12248810 | Automatically orchestrating a computerized workflow | Anton Zorin, Niels Dominic Pardon, Ritesh K. Gupta, Sameep Mehta | 2025-03-11 |
| 11921861 | Providing the status of model extraction in the presence of colluding users | Vijay Arya, Sameep Mehta | 2024-03-05 |
| 11630833 | Extract-transform-load script generation | Sumit Bhatia, Sameep Mehta | 2023-04-18 |
| 11593511 | Dynamically identifying and redacting data from diagnostic operations via runtime monitoring of data sources | Akshar Kaul, Hong Min | 2023-02-28 |
| 11537724 | Generating data migration plan for in-place encryption of data | Akshar Kaul, Diptikalyan Saha, Gagandeep Singh | 2022-12-27 |
| 11475020 | Encryption scheme recommendation | Akshar Kaul, Gagandeep Singh, Sameep Mehta, Hong Min, James W. Pickel | 2022-10-18 |
| 11263188 | Generation and management of an artificial intelligence (AI) model documentation throughout its life cycle | Matthew R. Arnold, Rachel K. E. Bellamy, Kaoutar El Maghraoui, Michael Hind, Stephanie Houde +9 more | 2022-03-01 |
| 11243832 | Dynamically analyzing diagnostic operations data via machine learning techniques | Akshar Kaul, Hong Min | 2022-02-08 |
| 11194838 | Generating a data partitioning strategy for secure and efficient query processing | Akshar Kaul, Gagandeep Singh, Krishnasuri Narayanam | 2021-12-07 |
| 11157495 | Dynamically managing predicate expression columns in an encrypted database | Akshar Kaul, Gagandeep Singh, Hong Min | 2021-10-26 |
| 10885571 | Information set purchase recommendations | Akshar Kaul, Gagandeep Singh, Sameep Mehta | 2021-01-05 |
| 10824721 | Detecting and delaying effect of machine learning model attacks | Atul Kumar, Vijay Arya, Rakesh Rameshrao Pimplikar, Sameep Mehta | 2020-11-03 |
| 10742401 | Half-pyramid data encryption | Akshar Kaul, Sameep Mehta, Prasad G. Naldurg, Gagandeep Singh | 2020-08-11 |
| 10740209 | Tracking missing data using provenance traces and data simulation | Salil Joshi, Hima P. Karanam, Sameep Mehta | 2020-08-11 |
| 10733287 | Resiliency of machine learning models | Suranjana Samanta, Deepak Vijaykeerthy, Sameep Mehta, Karthik Sankaranarayanan | 2020-08-04 |
| 10700864 | Anonymous encrypted data | Spyridon Antonatos, Stefano Braghin, Akshar Kaul, Sameep Mehta | 2020-06-30 |
| 10700866 | Anonymous encrypted data | Spyridon Antonatos, Stefano Braghin, Akshar Kaul, Sameep Mehta | 2020-06-30 |
| 10693628 | Enabling distance-based operations on data encrypted using a homomorphic encryption scheme with inefficient decryption | Gagandeep Singh, Akshar Kaul, Sameep Mehta | 2020-06-23 |
| 10664338 | System and method for root cause analysis in large scale data curation flows using provenance | Hima P. Karanan, Salil Joshi, Mohit Jain, Sameep Mehta | 2020-05-26 |
| 10601580 | Secure order preserving string compression | Akshar Kaul, Sameep Mehta, Hong Min | 2020-03-24 |
| 10546032 | System and method for association rule mining from encrypted databases | Krishnasuri Narayanam, Sameep Mehta | 2020-01-28 |
| 10521359 | Secure distance computations | Gagandeep Singh, Akshar Kaul, Prasad G. Naldurg, Sameep Mehta | 2019-12-31 |
| 10055602 | Securely processing range predicates on cloud databases | Prasad M. Deshpande, Jayant R. Haritsa, Akshar Kaul, Gagandeep Singh | 2018-08-21 |