| 12348525 |
Generating zero-trust policy for application access using machine learning |
Dianhuan Lin, Raimi Shah, Rex Shang, Loc Bui, Subramanian Srinivasan +4 more |
2025-07-01 |
| 12174956 |
Pattern similarity measures to quantify uncertainty in malware classification |
Changsha Ma, Dianhuan Lin, Rex Shang, Kevin Guo |
2024-12-24 |
| 12111928 |
Utilizing machine learning to detect malicious executable files efficiently and effectively |
Changsha Ma, Nirmal Singh, Naveen Selvan, Tarun Dewan, Uday Pratap Singh +7 more |
2024-10-08 |
| 11861472 |
Machine learning model abstraction layer for runtime efficiency |
Rex Shang, Dianhuan Lin, Changsha Ma, Douglas A. Koch, Shashank Gupta +3 more |
2024-01-02 |
| 11803641 |
Utilizing Machine Learning to detect malicious executable files efficiently and effectively |
Changsha Ma, Nirmal Singh, Naveen Selvan, Tarun Dewan, Uday Pratap Singh +7 more |
2023-10-31 |
| 11785022 |
Building a Machine Learning model without compromising data privacy |
Changsha Ma, Dianhuan Lin, Rex Shang, Douglas A. Koch, Dong Guo |
2023-10-10 |
| 11755726 |
Utilizing machine learning for smart quarantining of potentially malicious files |
Changsha Ma, Rex Shang, Douglas A. Koch, Dianhuan Lin, Bharath Kumar +4 more |
2023-09-12 |
| 11669779 |
Prudent ensemble models in machine learning with high precision for use in network security |
Dianhuan Lin, Rex Shang, Changsha Ma, Kevin Guo |
2023-06-06 |
| 11475368 |
Machine learning model abstraction layer for runtime efficiency |
Rex Shang, Dianhuan Lin, Changsha Ma, Douglas A. Koch, Shashank Gupta +3 more |
2022-10-18 |
| 9110728 |
Elastic allocation of computing resources to software applications |
Jianjun Shen, Ying He, Hailing Xu, Juntao Liu, Shudong Zhou |
2015-08-18 |