Issued Patents All Time
Showing 25 most recent of 54 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12430464 | Data leakage protection using generative large language models | Jeffery L. Crume, Aankur Bhatia, Walid Rjaibi | 2025-09-30 |
| 12019720 | Spatiotemporal deep learning for behavioral biometrics | Taesung Lee, Ian M. Molloy | 2024-06-25 |
| 11977625 | Using multimodal model consistency to detect adversarial attacks | Ian M. Molloy, Taesung Lee, Wenjie Wang | 2024-05-07 |
| 11755839 | Low resource named entity recognition for sensitive personal information | Jatin Arora | 2023-09-12 |
| 11675896 | Using multimodal model consistency to detect adversarial attacks | Ian M. Molloy, Taesung Lee, Wenjie Wang | 2023-06-13 |
| 11494496 | Measuring overfitting of machine learning computer model and susceptibility to security threats | Kathrin Grosse, Taesung Lee, Ian M. Molloy | 2022-11-08 |
| 11227232 | Automatic generation of training data for anomaly detection using other user's data samples | Suresh N. Chari, Ian M. Molloy | 2022-01-18 |
| 11182562 | Deep embedding for natural language content based on semantic dependencies | Taesung Lee | 2021-11-23 |
| 11176456 | Pre-training neural networks using data clusters | Kyusong Lee | 2021-11-16 |
| 11171946 | Two-level sequence learning for analyzing, metering, generating, and cracking passwords | Suresh N. Chari, Taesung Lee, Ian M. Molloy | 2021-11-09 |
| 11159547 | Malware clustering approaches based on cognitive computing techniques | Suresh N. Chari, Heqing Huang, Taesung Lee | 2021-10-26 |
| 11144718 | Adaptable processing components | Siddharth A. Patwardhan | 2021-10-12 |
| 11132507 | Cross-subject model-generated training data for relation extraction modeling | Taesung Lee, Arpita Roy | 2021-09-28 |
| 11089040 | Cognitive analysis of security data with signal flow-based graph exploration | Jiyong Jang, Dhilung Hang Kirat, Marc Philippe Stoecklin | 2021-08-10 |
| 11082434 | Inferring temporal relationships for cybersecurity events | Preeti Ravindra, Dhilung Hang Kirat, Jiyong Jang, Marc Philippe Stoecklin | 2021-08-03 |
| 10984323 | Estimating asset sensitivity using information associated with users | Suresh N. Chari, Christopher Gates, Stephen C. Gates, Wilfried Teiken | 2021-04-20 |
| 10984322 | Estimating asset sensitivity using information associated with users | Suresh N. Chari, Christopher Gates, Stephen C. Gates, Wilfried Teiken | 2021-04-20 |
| 10958672 | Cognitive offense analysis using contextual data and knowledge graphs | William A. Bird, Suzanne C. Deffeyes, Jiyong Jang, Dhilung Hang Kirat, Josyula R. Rao +1 more | 2021-03-23 |
| 10922407 | Discriminant power based threat detection | Raymund Lin, Charlie Wu | 2021-02-16 |
| 10891371 | Detecting malicious user activity | Suresh N. Chari, Ted A. Habeck, Ian M. Molloy, Josyula R. Rao, Wilfried Teiken | 2021-01-12 |
| 10805308 | Jointly discovering user roles and data clusters using both access and side information | Taesung Lee, Ian M. Molloy, Suresh N. Chari, Benjamin J. Edwards | 2020-10-13 |
| 10733286 | Composite propensity profile detector | Anni R. Coden, Keith Coleman Houck, Ching-Yung Lin, Wanyi Lin, Peter K. Malkin +2 more | 2020-08-04 |
| 10686830 | Corroborating threat assertions by consolidating security and threat intelligence with kinetics data | Jiyong Jang, Dhilung Hang Kirat, Marc Philippe Stoecklin | 2020-06-16 |
| 10609017 | Two-level sequence learning for analyzing, metering, generating, and cracking passwords | Suresh N. Chari, Taesung Lee, Ian M. Molloy | 2020-03-31 |
| 10599837 | Detecting malicious user activity | Suresh N. Chari, Ted A. Habeck, Ian M. Molloy, Josyula R. Rao, Wilfried Teiken | 2020-03-24 |