| 11131712 |
Device and method for inspecting a condition of rotor windings of a generator |
Yuewu Zhang, Chicheng Liu, Jingrong Chen, Genyin Wu, Xu Han +9 more |
2021-09-28 |
| 10802989 |
Detecting data corruption by control flow interceptions |
Xiaoning Li, Ravi L. Sahita |
2020-10-13 |
| 10455811 |
Compression resistant and long-lasting scented dog toy and its preparation method |
— |
2019-10-29 |
| 10366228 |
Detection and mitigation of malicious invocation of sensitive code |
Ravi L. Sahita, Lu Deng, Vedvyas Shanbhogue, Alexander Shepsen, Igor Tatourian |
2019-07-30 |
| 10289570 |
Detecting data corruption by control flow interceptions |
Xiaoning Li, Ravi L. Sahita |
2019-05-14 |
| 10210331 |
Executing full logical paths for malware detection |
Ravi L. Sahita, Xiaoning Li, Lu Deng, Alexander Shepsen, Xiang Xu +3 more |
2019-02-19 |
| 10204224 |
Systems and methods of processing data associated with detection and/or handling of malware |
— |
2019-02-12 |
| 10025930 |
Hardware assisted branch transfer self-check mechanism |
Xiaoning Li, Ravi L. Sahita |
2018-07-17 |
| 9961102 |
Detection of stack pivoting |
Xiaoning Li, Lu Deng |
2018-05-01 |
| 9898605 |
Monitoring executed script for zero-day attack of malware |
Ravi L. Sahita, Xiaoning Li, Lu Deng, Alexander Shepsen, Xiang Xu +3 more |
2018-02-20 |
| 9886577 |
Detection and mitigation of malicious invocation of sensitive code |
Ravi L. Sahita, Lu Deng, Vedvyas Shanbhogue, Alexander Shepsen, Igor Tatourian |
2018-02-06 |
| 9213838 |
Systems and methods of processing data associated with detection and/or handling of malware |
— |
2015-12-15 |