Issued Patents All Time
Showing 25 most recent of 46 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12326940 | Graph exploration framework for adversarial example generation | Kevin Eykholt, Douglas Lee Schales, Jiyong Jang, Ian M. Molloy | 2025-06-10 |
| 12301236 | Equalizer for removing inter symbol interference of data signal by increasing pulse widths of logic low level and logic high level of data signal | Daehoon Na, Seonkyoo Lee, Seungjun Bae | 2025-05-13 |
| 12288154 | Adaptive robustness certification against adversarial examples | Kevin Eykholt, Jiyong Jang, Shiqi Wang, Ian M. Molloy | 2025-04-29 |
| 12211745 | Methods of fabricating semiconductor devices | Uihyoung Lee, Honyun Park, Jongseok Lee, Sewan Kim | 2025-01-28 |
| 12147879 | Federated learning with dataset sketch commitment based malicious participant identification | Lei Yu, Qi Zhang, Petr Novotny | 2024-11-19 |
| 12050993 | Dynamic gradient deception against adversarial examples in machine learning models | Ian M. Molloy | 2024-07-30 |
| 12047082 | Semiconductor device including delay compensation circuit | Anil Kavala, Seonkyoo Lee, Jeongdon Ihm, Byunghoon Jeong | 2024-07-23 |
| 12019747 | Adversarial interpolation backdoor detection | Heiko H. Ludwig, Ebube Chuba, Bryant Chen, Benjamin J. Edwards, Ian M. Molloy | 2024-06-25 |
| 12019720 | Spatiotemporal deep learning for behavioral biometrics | Ian M. Molloy, Youngja Park | 2024-06-25 |
| 11977625 | Using multimodal model consistency to detect adversarial attacks | Ian M. Molloy, Youngja Park, Wenjie Wang | 2024-05-07 |
| 11853436 | Protecting cognitive systems from model stealing attacks | Ian M. Molloy, Dong Su | 2023-12-26 |
| 11847555 | Constraining neural networks for robustness through alternative encoding | Kevin Eykholt, Ian M. Molloy, Jiyong Jang | 2023-12-19 |
| 11783025 | Training diverse and robust ensembles of artificial intelligence computer models | Ian M. Molloy, Benjamin J. Edwards | 2023-10-10 |
| 11775637 | Recurrent neural network based anomaly detection | Heqing Huang, Ian M. Molloy, Zhongshu Gu, Jialong Zhang, Josyula R. Rao | 2023-10-03 |
| 11675896 | Using multimodal model consistency to detect adversarial attacks | Ian M. Molloy, Youngja Park, Wenjie Wang | 2023-06-13 |
| 11522550 | Semiconductor device including delay compensation circuit | Anil Kavala, Seonkyoo Lee, Jeongdon Ihm, Byunghoon Jeong | 2022-12-06 |
| 11494496 | Measuring overfitting of machine learning computer model and susceptibility to security threats | Kathrin Grosse, Youngja Park, Ian M. Molloy | 2022-11-08 |
| 11443178 | Deep neural network hardening framework | Benjamin J. Edwards, Ian M. Molloy, Dong Su | 2022-09-13 |
| 11301563 | Recurrent neural network based anomaly detection | Heqing Huang, Ian M. Molloy, Zhongshu Gu, Jialong Zhang, Josyula R. Rao | 2022-04-12 |
| 11188789 | Detecting poisoning attacks on neural networks by activation clustering | Bryant Chen, Wilka Carvalho, Heiko H. Ludwig, Ian M. Molloy, Jialong Zhang +1 more | 2021-11-30 |
| 11182562 | Deep embedding for natural language content based on semantic dependencies | Youngja Park | 2021-11-23 |
| 11171946 | Two-level sequence learning for analyzing, metering, generating, and cracking passwords | Suresh N. Chari, Ian M. Molloy, Youngja Park | 2021-11-09 |
| 11159547 | Malware clustering approaches based on cognitive computing techniques | Suresh N. Chari, Heqing Huang, Youngja Park | 2021-10-26 |
| 11132507 | Cross-subject model-generated training data for relation extraction modeling | Youngja Park, Arpita Roy | 2021-09-28 |
| 11132444 | Using gradients to detect backdoors in neural networks | Wilka Carvalho, Bryant Chen, Benjamin J. Edwards, Ian M. Molloy, Jialong Zhang | 2021-09-28 |