YX

Yinglian Xie

Microsoft: 16 patents #2,383 of 40,388Top 6%
DV Data Visor: 9 patents #2 of 20Top 10%
Overall (All Time): #162,181 of 4,157,543Top 4%
25
Patents All Time

Issued Patents All Time

Patent #TitleCo-InventorsDate
11539716 Online user behavior analysis service backed by deep learning models trained on shared digital information Cong Meng, Yuetong Wang, Yang Xu, Buodo Li, Ting-Fang Yen +1 more 2022-12-27
11522873 Detecting network attacks Kuanyu Chu, Hongyu Cui, Arthur Meng, Zhong Wu, Yunfeng Xi +2 more 2022-12-06
11232364 Automated rule recommendation engine Catherine Lu, Patrick Glenn Murray, Ming Qi, Shuo Shan, Fang Yu +1 more 2022-01-25
10771497 Using IP address data to detect malicious activities Fang Yu 2020-09-08
10135788 Using hypergraphs to determine suspicious user activities Fang Yu 2018-11-20
10129288 Using IP address data to detect malicious activities Fang Yu 2018-11-13
10110616 Using group analysis to determine suspicious accounts or activities Fang Yu 2018-10-23
10098069 Determining cause of energy spike using energy reports Ranveer Chandra, Omid Fatemieh, Parya Moinzadeh, Chandramohan A. Thekkath 2018-10-09
10009358 Graph based framework for detecting malicious or compromised accounts Fang Yu 2018-06-26
9787640 Using hypergraphs to determine suspicious user activities Fang Yu 2017-10-10
9235396 Optimizing data partitioning for data-parallel computing Qifa Ke, Vijayan Prabhakaran, Yuan Yu, Jingyue Wu, Junfeng Yang 2016-01-12
9148434 Determining populated IP addresses Fang Yu, Chi-Yao Hong 2015-09-29
8997220 Automatic detection of search results poisoning attacks Fang Yu, Martin Abadi, John Payyappillil John, Arvind Krishnamurthy 2015-03-31
8856360 Automatically identifying dynamic internet protocol addresses Kannan Achan, Eliot C. Gillum, Fang Yu 2014-10-07
8789171 Mining user behavior data for IP address space intelligence Ivan Osipkov, Geoffrey J. Hulten, John D. Mehr, Fang Yu 2014-07-22
8745731 Clustering botnet behavior using parameterized models Kannan Achan, Fang Yu 2014-06-03
8745738 Vouching for user account using social networking relationship Fang Yu, Qifa Ke, Martin Abadi, Eliot C. Gillum, Krishna Vitaldevara +1 more 2014-06-03
8677141 Enhanced security and performance of web applications Ulfar Erlingsson, Ben Livshits, Cedric Fournet 2014-03-18
8615605 Automatic identification of travel and non-travel network addresses Fang Yu, Martin Abadi, Stefan Savage, Geoffrey Michael Voelker, Andreas Pitsillidis 2013-12-24
8495742 Identifying malicious queries Martin Abadi, Fang Yu, John Payyappillil John 2013-07-23
8434150 Using social graphs to combat malicious attacks Fang Yu, Martin Abadi, Eliot C. Gillum, Junxian Huang, Zhuoqing Morley Mao +2 more 2013-04-30
8387145 Blocking malicious activity using blacklist Fang Yu, Martin Abadi 2013-02-26
8185613 Host accountability using unreliable identifiers Fang Yu, Martin Abadi 2012-05-22
8069210 Graph based bot-user detection Eliot C. Gillum, Qifa Ke, Fang Yu, Yao Zhao 2011-11-29
8069374 Fingerprinting event logs for system management troubleshooting Rina Panigrahy, Chad Verbowski, Junfeng Yang, Ding Yuan 2011-11-29